|
|
|
Kashan Ahmed, Ayesha Altaf, Nor Shahida Mohd Jamail, Faiza Iqbal and Rabia Latif
Modern distributed systems that operate concurrently generate interleaved logs. Identifiers (ID) are always associated with active instances or entities in order to track them in logs. Consequently, log messages with similar IDs can be categorized to aid...
ver más
|
|
|
|
|
|
|
Qifan Chen, Yang Lu, Charmaine S. Tam and Simon K. Poon
Process mining aims to gain knowledge of business processes via the discovery of process models from event logs generated by information systems. The insights revealed from process mining heavily rely on the quality of the event logs. Activities extracte...
ver más
|
|
|
|
|
|
|
Irina Teryokhina
Pág. 21 - 27
The paper discusses the problem of process mining with further anomalies detection for constructed process models. The algorithms extension for the case of several running processes with some restrictions on their structure has been investigated. An acyc...
ver más
|
|
|
|
|
|
|
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da...
ver más
|
|
|
|
|
|
|
Eric Forcael, Alejandro Martínez-Rocamora, Javier Sepúlveda-Morales, Rodrigo García-Alvarado, Alberto Nope-Bernal and Francisco Leighton
This research has specific applications in architecture firms developing Building Information Modeling (BIM) projects where coordinators and managers are willing to analyze behavioral patterns and efficiency of their modelers and to identify further trai...
ver más
|
|
|
|
|
|
|
Kwanghoon Pio Kim
In this paper, we propose an integrated approach for seamlessly and effectively providing the mining and the analyzing functionalities to redesigning work for very large-scale and massively parallel process models that are discovered from their enactment...
ver más
|
|
|
|
|
|
|
Mohamad Farhan Mohamad Mohsin,Mohd Noor Abdul Hamid,Nurakmal Ahmad Mustaffa,Razamin Ramli,Kamarudin Abdullah
Pág. pp. 140 - 152
CSR UUMWiFi is a CSR project under Universiti Utara Malaysia (UUM) that provides unlimited free internet connection for the Changlun community. Launched in 2015, the service has accumulated a huge number of users with diverse background and interest. Thi...
ver más
|
|
|
|
|
|
|
Jiannan Zheng, Z. Jane Wang and Chunsheng Zhu
Food image recognition is a key enabler for many smart home applications such as smart kitchen and smart personal nutrition log. In order to improve living experience and life quality, smart home systems collect valuable insights of users? preferences, n...
ver más
|
|
|
|
|
|
|
Chun-Kai Huang, Knowledge Chinhamu, Chun-Sung Huang, Jahvaid Hammujuddy
South Africa is a cornucopia of mineral riches and the performance of its mining industry has significant impacts on the economy. Hence, an accurate distributional assumption of the underlying mining index returns is imperative for the forecasting and un...
ver más
|
|
|
|
|
|
|
K. YUREKLI,M. TAGHI SATTARI,A. S. ANLI,M. A. HINIS
This study examines the seasonal regional drought analysis based on the standardized precipitation index (SPI) method and the decision tree technique which is a data-mining approach. The cumulative rainfall series for five reference periods (four seasona...
ver más
|
|
|
|