Using Sequential Pattern Mining and Social Network Analysis to Identify Similarities, Differences and Evolving Behaviour in Event Logs
نویسندگان
چکیده
This paper reports on findings resulting from our research conducted for the 2015 Business Process Intelligence Challenge (BPIC), an annual competition in which participants are tasked with conducting process mining-related analysis on a real-life dataset. This year’s data was provided by 5 Dutch municipalities, and contained activity pertaining to their building permit application process. Questions regarding the underlying process posed to the participants centered around identifying differences in control flow among municipalities, the responsible factors for longer processing times, and differences in the various roles of employees involved, to name a few. Our approach to addressing these questions involved the application of methods from the field of sequential pattern mining, an area of research that identifies frequently occurring sequences of events in potentially large databases. In particular, sequence classification is used to identify statistically significant differences in control flow among municipalities. Also, value-based sequential pattern mining is used to identify patterns in control flow that are linked to 1) high/low throughput times, in order to identify similarities and differences among the five municipalities, and 2) earlier/later process instances, in order to examine how municipalities’ underlying process may have changed over time, and how these changes may be similar among municipalities. We also employ traditional methods from the field of process mining to shed light on the the social network-related aspects of the data, such as how the roles of employees differ among municipalities in terms of task similarity.
منابع مشابه
A programming method to estimate proximate parameters of coal beds from well-logging data using a sequential solving of linear equation systems
This paper presents an innovative solution for estimating the proximate parameters of coal beds from the well-logs. To implement the solution, the C# programming language was used. The data from four exploratory boreholes was used in a case study to express the method and determine its accuracy. Then two boreholes were selected as the reference, namely the boreholes with available well-logging ...
متن کاملIdentification of the Origin and Behaviour of Arsenic in Mine Waste Dumps Using Correlation Analysis: A Case Study Sarcheshmeh Copper Mine
Knowledge of the probable origin and behaviour of arsenic certainly gives valuable insights into the potential for transfer in the environment and of the risks involved in mining sites. Sequential extraction analyses are common experiments often used to study the origin and behaviour of potentially toxic elements. The method, however, presents some deficiencies, including labor-intensive proced...
متن کاملIdentifying the software and their families using the exploration techniques of sequential patterns in dynamic analysis
Nowadays, crypto-ransomware is considered as one of the most threats in cybersecurity. Crypto ransomware removes data access by encrypting valuable data and requests a ransom payment to allow data decryption. As ransomware is still new in the field of cybersecurity, there are few pieces of research focusing on detecting ransomware samples. Most published works considered System File and process...
متن کاملTemporal Query Processig Using Sql Server
Most data sources in real-life are not static but change their information in time. This evolution of data in time can give valuable insights to business analysts. Temporal data refers to data, where changes over time or temporal aspects play a central role. Temporal data denotes the evaluation of object characteristics over time. One of the main unresolved problems that arise during the data m...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کامل