ARTÍCULO
TITULO

Process Discovery of Business Processes Using Temporal Causal Relation

Yutika Amelia Effendi    
Nania Nuzulita    

Resumen

Background: Nowadays, enterprise computing manages business processes which has grown up rapidly. This situation triggers the production of a massive event log. One type of event log is double timestamp event log. The double timestamp has a start time and complete time of each activity executed in the business process. It also has a close relationship with temporal causal relation. The temporal causal relation is a pattern of event log that occurs from each activity performed in the process.Objective: In this paper, seven types of temporal causal relation between activities were presented as an extended version of relations used in the double timestamp event log. Since the event log was not always executed sequentially, therefore using temporal causal relation, the event log was divided into several small groups to determine the relations of activities and to mine the business process.Methods: In these experiments, the temporal causal relation based on time interval which were presented in Gantt chart also determined whether each case could be classified as sequential or parallel relations. Then to obtain the business process, each temporal causal relation was combined into one business process based on the timestamp of activity in the event log.Results: The experimental results, which were implemented in two real-life event logs, showed that using temporal causal relation and double timestamp event log could discover business process models.Conclusion: Considering the findings, this study concludes that business process models and their sequential and parallel AND, OR, XOR relations can be discovered by using temporal causal relation and double timestamp event log.Keywords:Business Process, Process Discovery, Process Mining, Temporal Causal Relation, Double Timestamp Event Log

 Artículos similares

       
 
Imran, Megat Farez Azril Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam and Mazliham Mohd Su?ud    
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrence... ver más
Revista: Applied Sciences

 
Weizhen Guo, Min Zhu, Bo Yang, Yanbo Wu and Xinguo Li    
Underwater wireless sensor networks (UWSNs) are significantly different from terrestrial sensor networks in the following aspects: low bandwidth, high latency, variable topology, limited battery, low processing power and so on. These new features pose ma... ver más

 
Maria Carmela Groccia, Rosita Guido, Domenico Conforti, Corrado Pelaia, Giuseppe Armentaro, Alfredo Francesco Toscani, Sofia Miceli, Elena Succurro, Marta Letizia Hribal and Angela Sciacqua    
Chronic heart failure (CHF) is a clinical syndrome characterised by symptoms and signs due to structural and/or functional abnormalities of the heart. CHF confers risk for cardiovascular deterioration events which cause recurrent hospitalisations and hig... ver más
Revista: Information

 
Yuqian Wu, Miao Wang, Wenkui Chu and Guoqing Wang    
Organization preference knowledge is critical to enhancing the intelligence and efficiency of the multi-platform aircraft mission system (MPAMS), particularly the collaboration tactics of task behaviors, platform types, and mount resources. However, it i... ver más
Revista: Aerospace

 
Zhongqi Luo, Hexia Huang, Huijun Tan, Gang Liang, Jinghao Lv, Yuwen Wu and Liugang Li    
In this paper, the transient flow simulation in an annular isolator under rotating feedback pressure perturbations simplified from the rotating denotation wave (RDW) is performed. The instantaneous flow characteristics and the self-similarity of the isol... ver más
Revista: Aerospace