TWINCLE : A Constrained Sequential Rule Mining Algorithm for Event Logs
نویسندگان
چکیده
Discovering workflow patterns in event-logs is important for many organizations to understand and optimize organizational processes. Although numerous algorithms have been proposed in the literature to discover patterns in sequences of symbols, most of them are inadequate to discover patterns in rich event-log data. In this paper, motivated by the analysis of patient pathways in the health domain, a rich type of event logs, called activity-cost event logs, is considered where each event is associated with a cost. The paper formalizes the problem of mining interesting low-cost patterns in these logs by combining novel concepts of penalties (activity costs) and consistency of patterns, with traditional measures of confidence, length, and time. Furthermore, to extract these patterns efficiently from event logs, an algorithm named TWINCLE (Time-WINdow, Cost and LEngth constrained sequential rule mining) is proposed. Experiments carried out on benchmark datasets and real-life healthcare event logs show that proposed algorithm is efficient and can discover interesting patterns. © 2016 The Authors. Published by Elsevier B.V. Peer-review under responsibility of KES International.
منابع مشابه
Discovery of Frequent Episodes in Event Logs
Lion’s share of process mining research focuses on the discovery of end-to-end process models describing the characteristic behavior of observed cases. The notion of a process instance (i.e., the case) plays an important role in process mining. Pattern mining techniques (such as frequent itemset mining, association rule learning, sequence mining, and traditional episode mining) do not consider ...
متن کاملA new stochastic 3D seismic inversion using direct sequential simulation and co-simulation in a genetic algorithm framework
Stochastic seismic inversion is a family of inversion algorithms in which the inverse solution was carried out using geostatistical simulation. In this work, a new 3D stochastic seismic inversion was developed in the MATLAB programming software. The proposed inversion algorithm is an iterative procedure that uses the principle of cross-over genetic algorithms as the global optimization techniqu...
متن کاملExploring business process Deviance with Declare
This thesis introduces business process deviance mining, which belongs to the group of process mining, and gives an overview on multiple deviance mining approaches. After that we focus on deviance mining using discriminative patterns, which belongs to the group of sequential patterns mining techniques. In this work we propose new discriminative pattern mining algorithm based on the Declare lang...
متن کاملMining Lifecycle Event Logs for Enhancing Service- Based Applications
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a variety of events (e.g., messages being sent and received between service components) to proper log files, i.e., event logs. These files constitute a huge and valuable source of knowledge that may be extracted through data mining techniques. To this end, process mining is increasingly gaining interest...
متن کاملA programming method to estimate proximate parameters of coal beds from well-logging data using a sequential solving of linear equation systems
This paper presents an innovative solution for estimating the proximate parameters of coal beds from the well-logs. To implement the solution, the C# programming language was used. The data from four exploratory boreholes was used in a case study to express the method and determine its accuracy. Then two boreholes were selected as the reference, namely the boreholes with available well-logging ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017