SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 1, February 2020, pp. 106~113
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i1.12982  106
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Graph-based algorithm for checking wrong indirect
relationships in non-free choice
Agung Wiratmo, Kelly Rossa Sungkono, Riyanarto Sarno
Department of Informatics, Faculty of Information Technology and Communication,
Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia
Article Info ABSTRACT
Article history:
Received May 15, 2019
Revised Jun 14, 2019
Accepted Jul 1, 2019
In this context, this paper proposes a combination of parameterised decision
mining and relation sequences to detect wrong indirect relationship in
the non-free choice. The existing decision mining without parameter can only
detect the direction, but not the correctness. This paper aims to identify
the direction and correctness with decision mining with parameter. This paper
discovers a graph process model based on the event log. Then, it analyses
the graph process model for obtaining decision points. Each decision point is
processed by using parameterised decision mining, so that decision rules are
formed. The derived decision rules are used as parameters of checking wrong
indirect relationship in the non-free choice. The evaluation shows that
the checking wrong indirect relationships in non-free choice with
parameterised decision mining have 100% accuracy, whereas the existing
decision mining has 90.7% accuracy.
Keywords:
Decision mining
Parameterize decision mining
Process model
Wrong indirect relationships
This is an open access article under the CC BY-SA license.
Corresponding Author:
Riyanarto Sarno,
Department of Informatics, Faculty of Information Technology and Communication,
Institut Teknologi Sepuluh Nopember,
Surabaya, Indonesia.
Email: riyanarto@if.its.ac.id
1. INTRODUCTION
Each company records events carried out in the event log. The analysation of information from
the event log obtains the obtain knowledge [1]. The process of gaining knowledge from event log extraction is
called the process mining, which aims to find out, monitoring and improving the processes that occur [2]. In
the process mining, there are two most prominent processes, namely: 1) conformance checking [3] and
2) process discovery [4]. The process mining founds the wrong process in the event log. This paper discovers
a graph process model based on the event log. The analysation of the graph process model obtains decision
points. Each decision point is processed by using parameterised decision mining, so that decision rules are
formed. The derived decision rules are used as parameters of checking wrong indirect relationship in
the non-free choice.
Several previous studies discuss decision mining in recent years. A study conducted by Rozinat [5]
explains decision mining on business processes. However, decision mining is not implemented as a decision
rule for checking errors in event logs. Horita [6] made decisions on event logs that result in linear temporal
logic, but the temporal logic is not applied for error searches in event logs. The existing methods in checking
indirect relationships [7, 8] in non-free choice only using direction so the error can be detected only from
directional error, but correctness from choosing directional cannot be obtained. The proposed method, namely
parameterized decision mining is to use the decision rule in checking event logs with notice not only from
TELKOMNIKA Telecommun Comput El Control 
Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo)
107
the direction but also the parameters in the event log. In this research, the decision rule is used to find errors in
the event log, so the failure of event logs can be finding more accurate in terms of the direction and correctness
of choice.
2. RESEARCH METHOD
In this section, parameterized decision mining will be presented to find a wrong indirect relationship
in non-free choice using the graph database. The non-free choice is a condition that is not free to make choices,
but choices depend on the results of the previous election [9]. Checking process models on the non-free choice
part of the event log can be done correctly must consider all dependencies [10]. There are two types of
dependence on the process of the model, direct dependence or referred to as direct relationship and indirect
dependence or referred to an indirect relationship [7, 11, 12]. A direct relationship is a relationship or
dependency that is directly between tasks. Conversely, an indirect relationship is a relationship or a dependence
that is indirectly between tasks [13]. A graph database is a NoSQL database where is depicted in the form of
graph [14-16]. Graph databases will form data as nodes and relations between nodes [15, 17]. The process
mining is used to extract information from the event log to see business processes [10, 18, 19]. The process
mining can be used to build a process model [16, 20–23]. Decision mining is used to study parameters that can
influence the selection of grooves [24, 25].
Decision mining is used to find rules for branching from each decision point. By using a graph
database, a decision point can be known from a node that has a xorsplit relation. The algorithm used in decision
mining research is using the C4.5 decision tree algorithm [5, 26]. A decision tree is used to predict an activity
seen from the parameters of a data. The decision tree has several terms. Those terms are a root as the initial
node, a leaf node as the child of a node, and the depth of a node as the length of the path between the nodes to
the leaf node [27, 28]. The first step is to discover graph process model of the event log based on the graph
database. Then, graph process model be analyzed to find the decision point. The second step is discovering
decision rule using decision mining from each decision point with notice parameter in event log. This decision
rule will be used as a parameter in determining the wrong decision in non-free choice. The last step searches
each case in the event log with the parameters stated earlier.
2.1. Discovery process model based on graph database
The first step for the discovery of the graph model process is to enter event logs like in Table 1 into
the graph database using a query like in Table 2. The parameters in the event log used in the graph database
are Case_ID, Activity, and Time. In the Table 2 shown queries in the graph database for: (1) Import all data in
event log, (2) Import only unique activity, (3) create relation: sequence, xorsplit, xorjoin, andsplit, andjoin,
non-free choice, and (4) get the decision point.
In the model process, there will be several relationships such as xorsplit [29], xorjoin [29],
andsplit [30], andjoin [30] and non-free choice shown in Figure 1. Joint relations are a relation of the union
from branching to split relations at the base of branching. The xor relation is a branching relation which means
that the flow of the event log can only choose one of the entire branches of the event log. The and relation is
a flow relationship that will do all events even though the different order. The results of working on queries in
Table 2 produce the model process shown in Figure 1. After each activity is represented in the node, the next
step is to make relations between nodes such as sequence, xorsplit, xorjoin, andjoin, andsplit relations, and
non-free choice.
Figure 1. Examples of the process model
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 106 - 113
108
After the graph process model is formed. The next step is to determine the decision point by using
the query in Table 2. Decision point is the node where branching of the process begins. In Figure 1 shows
graph process model where containing the decision points in node A and node E. Node A is the base of member
node B or node C. Node E is the base of branching node G and node F. furthermore, decision rule would be
discovered by decision mining to find parameters each branching of each decision point.
2.2. Extracting a parameter in decision points
The decision point shown in Figure 1, there are two decision point points. Each decision point will be
analyzed by considering the parameters in the event log to get the decision rule. The process for extraction
decision rule is called decision mining. The algorithm of decision mining is used C4.5 decision tree algorithm.
The first step is getting leaf nodes from each decision point. Then, the next step is getting an event log that has
activities such as leaf nodes with algorithm in Table 3.
The data needed in algorithm in Table 3 is 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑜𝑖𝑛𝑡, 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒, dan 𝑒𝑣𝑒𝑛𝑡𝐿𝑜𝑔. Each decision
point of leaf nodes obtained from algorithm in Table 3 is used in the decision mining process. The decision
mining algorithm is seen in Table 4. Algorithm in Table 4 has five data variables: X is the event log on node
leaf. Y is an attribute owned by X. The 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐴𝑡𝑟𝑖𝑏𝑢𝑡𝑒 is an attribute used as a solving parameter.
The 𝑎𝑡𝑟𝑖𝑏𝑢𝑡𝑒𝑆𝑒𝑙𝑒𝑐𝑡𝑖𝑜𝑛𝑀𝑒𝑡ℎ𝑜𝑑 is the method used to find the best fraction value. The method used to find
the best splitting criterion is C4.5 with the gini index parameter in (2) and (3). The function of (1) is to evaluate
the separation in event log each attribute. The function of (2) is to evaluate the separation in event log
each parameter.
𝐺𝑖𝑛𝑖( 𝑡) = 1 − ∑[𝑝(
𝑗
𝑡
)]2
(2)
where 𝑝(
𝑗
𝑡
) represents the frequency of the j attribute in activity t.
𝐺𝑖𝑛𝑖 𝑠𝑝𝑙𝑖𝑡 = ∑
𝑛 𝑖
𝑛
𝐺𝑖𝑛𝑖(𝑖)𝑘
𝑖=1 (3)
where 𝑘 is the number of partitions, 𝑛𝑖 is the amount of data in 𝑖 partition, 𝑛 is the amount of data in the 𝑝 node.
The best split value is indicated by the smallest 𝐺𝑖𝑛𝑖 𝑠𝑝𝑙𝑖𝑡 . The 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐶𝑟𝑖𝑡𝑒𝑟𝑖𝑎 is the value of the parameter
that is used as a solver. 𝑁 is a node. The algorithm in Table 4 will continue to be repeated until the data is 𝑋
empty. The results of algorithm in Table 4 are a decision tree by showing the parameters and the leaf values
can be seen in Figure 2.
Table 1. Process mining will be carried out by the event log
Case_ID amount stackType Status Time Activity
PP10 3 nonreefer complete 3/11/2016 0:52 A
PP10 3 nonreefer complete 3/11/2016 2:00 C
PP10 3 nonreefer complete 3/11/2016 3:08 D
PP10 3 nonreefer complete 3/11/2016 4:16 E
PP10 3 nonreefer complete 3/11/2016 5:24 F
PP10 3 nonreefer complete 3/11/2016 6:32 H
PP412 17 reefer incomplete 7/2/2016 22:28 A
PP412 17 reefer incomplete 7/2/2016 23:36 C
PP412 17 reefer incomplete 7/3/2016 0:44 D
PP412 17 reefer incomplete 7/3/2016 1:52 E
PP412 17 reefer incomplete 7/3/2016 3:00 G
PP412 17 reefer incomplete 7/3/2016 4:08 H
PP735 13 nonreefer incomplete 10/2/2016 10:52 A
PP735 13 nonreefer incomplete 10/2/2016 12:00 B
PP735 13 nonreefer incomplete 10/2/2016 13:08 D
PP735 13 nonreefer incomplete 10/2/2016 14:16 E
PP735 13 nonreefer incomplete 10/2/2016 15:24 G
PP735 13 nonreefer incomplete 10/2/2016 16:32 H
PP1050 10 nonreefer complete 12/30/2016 16:52 A
PP1050 10 nonreefer complete 12/30/2016 18:00 B
PP1050 10 nonreefer complete 12/30/2016 19:08 D
PP1050 10 nonreefer complete 12/30/2016 20:16 E
PP1050 10 nonreefer complete 12/30/2016 21:24 F
PP1050 10 nonreefer complete 12/30/2016 22:32 H
TELKOMNIKA Telecommun Comput El Control 
Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo)
109
Table 2. Queries in the graph database
No Queries
1 def importActivityT (tx, fileName):
tx.run ("LOAD CSV with headers FROM 'file:///"+fileName+"' AS line "
"Merge (: Activity {CaseId: line. Case_ID, Name: line. Activity, Amount: toInt (line. amount), StackType:
line. stackType, Status: line. status, Time: line. Time})")
2 def importCaseActivity (tx, fileName):
tx.run ("LOAD CSV with headers FROM 'file:///"+fileName+"' AS line Merge (: CaseActivity {Name: line.
Activity}) “)
3 def createRelationship(tx):
# create sequence relation
tx.run ("MATCH (c: Activity) "
"WITH COLLECT(c) AS Caselist "
"UNWIND RANGE (0, Size (Caselist) - 2) as idx "
"WITH Caselist[idx] AS s1, Caselist[idx+1] AS s2 "
"MATCH (b: CaseActivity), (a: CaseActivity) "
"WHERE s1. CaseId = s2. CaseId AND s1. Name = a. Name AND s2. Name = b. Name "
"MERGE (a)- [r: SEQUENCE]->(b)")
# create xorsplit relation
tx.run ("MATCH (bef)-[r]->(aft) "
"WHERE size((bef)--> ())>1 AND size((aft)<--()) =1 AND (size((aft)--> ()) =1 OR size((aft)--> ())>1) "
"CREATE (bef)- [: XORSPLIT]->(aft) "
"DELETE r")
# create xorjoin relation
tx.run ("MATCH (bef)-[r]->(aft) "
"WHERE (size((bef)--> ()) =1 OR size((bef)--> ())>1) AND size((aft)<--())>1 "
"CREATE (bef)- [: XORJOIN]->(aft) "
"DELETE r")
# create andsplit relation
tx.run ("MATCH (aft1) <-[r]-(bef)-[s]->(aft2)"
"WHERE size((bef)--> ())>1 "
"AND size((aft2) --> ()) =size((bef)--> ()) AND size((aft1) --> ()) =size((bef)--> ()) "
"AND not (aft1)- [: SEQUENCE]->(bef) AND not (aft2)- [: SEQUENCE]->(bef) "
"MERGE (aft1) <- [: ANDSPLIT] -(bef)- [: ANDSPLIT]->(aft2) "
"DELETE r, s")
# create andjoin relation
tx.run ("MATCH (aft1)-[r]->(bef)<-[s]-(aft2) "
"WHERE size((bef)<--())>1 "
"AND size((aft2) --> ()) =size((bef)<--()) AND size((aft1) --> ()) =size((bef)<--()) "
"AND not ()- [: ANDSPLIT]->(bef) "
"MERGE (aft1)- [: ANDJOIN]->(bef)<-[: ANDJOIN]-(aft2) "
"DELETE r, s")
# create Non-Free Choice
tx.run ("match ()- [c: XORSPLIT]->(n) "
"match (a)- [b: XORJOIN]-> () "
"match (k: Activity), (l: Activity) "
"where a. Name<>n.Name and k. Name=a.Name and l. Name=n.Name and k. CaseId=l.CaseId and k.
Time<l.Time "
"merge (a)- [: NONFREECHOICE]->(n)")
4 def printStartingNodeNonFreeChoice(tx):
nodes = []
global nodeStartedNonFreeChoice
for record in tx.run ("MATCH (p)- [r: XORSPLIT]-> () RETURN p. Name ORDER BY p. Name"): nodes.
append (record ["p. Name"])
nodeStartedNonFreeChoice = np. unique (np. array(nodes))
return nodeStartedNonFreeChoice
Table 3. Algorithm for getting event log of leaf nodes each decision point
Data: 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑜𝑖𝑛𝑡, 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒, 𝑒𝑣𝑒𝑛𝑡𝐿𝑜𝑔
Result: 𝐸𝑣𝑒𝑛𝑡 𝑙𝑜𝑔 𝑝𝑎𝑑𝑎 𝑙𝑒𝑎𝑓 𝑛𝑜𝑑𝑒
No Pseudocode
1 𝐷𝑎𝑡𝑎𝐿𝑒𝑎𝑓
2 𝑓𝑜𝑟 𝑒𝑎𝑐ℎ 𝑥 𝑜𝑓 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑜𝑖𝑛𝑡 𝑑𝑜
3 𝑓𝑜𝑟 𝑒𝑎𝑐ℎ 𝑦 𝑜𝑓 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒 𝑜𝑓 𝑒𝑎𝑐ℎ 𝑥 𝑑𝑜
4 𝑓𝑜𝑟 𝑧 𝑜𝑓 𝑒𝑣𝑒𝑛𝑡𝐿𝑜𝑔 𝑑𝑜
5 𝑖𝑓 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑒𝑎𝑐ℎ 𝑧 𝑜𝑓 𝑡𝑟𝑢𝑒𝐸𝑣𝑒𝑛𝑡𝐿𝑜𝑔 𝑒𝑞𝑢𝑎𝑙𝑠 𝑤𝑖𝑡ℎ 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑦 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒 𝑡ℎ𝑒𝑛
6 𝑎𝑡𝑡𝑎𝑐ℎ 𝑎 𝑒𝑣𝑒𝑛𝑡 𝐿𝑜𝑔 𝑧 𝑡𝑜 𝐷𝑎𝑡𝑎𝐿𝑒𝑎𝑓
7 𝑒𝑛𝑑
8 𝑒𝑛𝑑
9 𝑒𝑛𝑑
10 𝑒𝑛𝑑
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 106 - 113
110
Table 4. Algorithm for extracting a parameter each decision point using decision mining
Data: X,Y, splitingAtribute,atributeSelectionMethod, splitingCriteria,N
Result: Parameter decision in decision point showed by decision tree
No Pseudocode
1 𝐶𝑟𝑒𝑎𝑡𝑒 𝑁𝑜𝑑𝑒 𝑁
2 𝑖𝑓 𝑡𝑢𝑝𝑙𝑒 𝑖𝑛 𝑋 𝑎𝑟𝑒 𝑎𝑙𝑙 𝑜𝑓 𝑡ℎ𝑒 𝑠𝑎𝑚𝑒 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑡ℎ𝑒𝑛
3 𝑟𝑒𝑡𝑢𝑟𝑛 𝑁 𝑎𝑠 𝑎 𝑙𝑒𝑎𝑓 𝑛𝑜𝑑𝑒 𝑙𝑎𝑏𝑒𝑙𝑒𝑑 𝑤𝑖𝑡ℎ 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑋
4 𝑒𝑛𝑑
5 𝑖𝑓 𝑌 𝑖𝑠 𝑒𝑚𝑝𝑡𝑦 𝑡ℎ𝑒𝑛
6 𝑟𝑒𝑡𝑢𝑟𝑛 𝑁 𝑎𝑠 𝑎 𝑙𝑒𝑎𝑓 𝑛𝑜𝑑𝑒 𝑙𝑎𝑏𝑒𝑙𝑒𝑑 𝑤𝑖𝑡ℎ 𝑚𝑎𝑗𝑜𝑟𝑖𝑡𝑦 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑋
7 𝑒𝑛𝑑
8 𝑎𝑡𝑟𝑖𝑏𝑢𝑡𝑒𝑆𝑒𝑙𝑒𝑐𝑡𝑖𝑜𝑛𝑀𝑒𝑡ℎ𝑜𝑑(𝑋, 𝑌)
9 𝑖𝑓 (𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐴𝑡𝑟𝑖𝑏𝑢𝑡𝑒 𝑖𝑠 𝑑𝑖𝑠𝑐𝑟𝑒𝑡𝑒 − 𝑣𝑎𝑙𝑢𝑒𝑑) 𝑡ℎ𝑒𝑛
10 𝑌 ← 𝑌 − 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐴𝑡𝑟𝑖𝑏𝑢𝑡𝑒
11 𝑒𝑛𝑑
12 𝑓𝑜𝑟 𝑒𝑎𝑐ℎ 𝑜𝑢𝑡𝑐𝑜𝑚𝑒 𝑖 𝑜𝑓 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐶𝑟𝑖𝑡𝑒𝑟𝑖𝑎 𝑑𝑜
13 𝑙𝑒𝑡 𝑋𝑖 𝑏𝑒 𝑡ℎ𝑒 𝑠𝑒𝑡 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑡𝑢𝑝𝑙𝑒𝑠 𝑖𝑛 𝑋 𝑠𝑎𝑡𝑖𝑠𝑓𝑦𝑖𝑛𝑔 𝑡ℎ𝑒 𝑜𝑢𝑡𝑐𝑜𝑚𝑒 𝑗
14 𝑖𝑓 𝑋𝑖 𝑖𝑠 𝑒𝑚𝑝𝑡𝑦 𝑡ℎ𝑒𝑛
15 𝑎𝑡𝑡𝑎𝑐ℎ 𝑎 𝑙𝑒𝑎𝑓 𝑙𝑎𝑏𝑒𝑙𝑒𝑑 𝑤𝑖𝑡ℎ 𝑚𝑎𝑗𝑜𝑟𝑖𝑡𝑦 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑋 𝑡𝑜 𝑛𝑜𝑑𝑒 𝑁
16 𝑒𝑙𝑠𝑒
17 𝑎𝑡𝑟𝑖𝑏𝑢𝑡𝑒𝑆𝑒𝑙𝑒𝑐𝑡𝑖𝑜𝑛𝑀𝑒𝑡ℎ𝑜𝑑(𝑋𝑖, 𝑌)
18 𝑒𝑛𝑑
19 𝑒𝑛𝑑
20 𝑟𝑒𝑡𝑢𝑟𝑛 𝑁
Figure 2. Decision tree in: (a) node A, and (b) node E
From Figure 2 (a) it can be concluded that the condition for doing activity B is ((status = complete
AND amount > 8.5) OR (status = incomplete AND amount ≤ 9)). Whereas to do activity C it must be
conditioned ((status = complete AND amount ≤ 8.5) OR (status = incomplete AND amount > 9)). From
Figure 2 (b) it can be concluded that the condition for doing activity F is ((status = complete AND
amount > 8.5) OR (status = incomplete AND amount ≤ 9)). Whereas to do activity G must be conditioned
((status = complete AND amount ≤ 8.5) OR (status = incomplete AND amount t> 9)). The next step is to check
the event log with parameters that have been obtained previously.
TELKOMNIKA Telecommun Comput El Control 
Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo)
111
2.3. Checking wrong indirect relationships
After finding these parameters, then looking for wrong indirect relationship in non-free choice.
Checking is done in each case. This is because each case has different parameters. The goal is to find faults
with precession far better than just using the direction of each case. Checking scheme for non-free choices
containing indirect relations as in algorithm in Table 5. From the algorithm in Table 5, there are needed several
parameters like decisionParameter and 𝐸𝑣𝑒𝑛𝑡𝐿𝑜𝑔. The process will repeat as many cases as in EventLog and
checking in case i with 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑎𝑟𝑎𝑚𝑒𝑡𝑒𝑟. If the process is not same with the rule, then the case i will be
added in 𝐼𝑛𝑑𝑖𝑟𝑒𝑐𝑡𝑅𝑒𝑙𝑎𝑡𝑖𝑜𝑛𝑠ℎ𝑖𝑝.
Table 5. Algorithm for checking indirect relationship in non-free choice
Data: decisionParameter,EventLog
Result: IndirectRelationship
No Pseudocode
1 IndirectRelationship
2 for each case i of EventLog do
3 if case i parameter not equal with decisionParameter then
4 attach a case i to node IndirectRelationship
5 end
6 end
3. RESULTS AND ANALYSIS
The proposed method is implemented in 1199 cases in event log. The event log has many various of
attribute in parameter like amount, stackType, status, and times as in Table 1. From the 1199 case activity,
the results of checking using the proposed method can be seen in Figure 3. From Figure 3 (a) having
the sequence of events A → C → D → E → F → H is the sequence of events that are wrong based on
the parameters and based on the order of non-free choice. Case_ID PP10 has several parameters, which value
of parameter status is complete and in parameter amount has 3. In Figure 3 (a) shows after activity A goes to
activity C is a correct but wrong decision after activity E goes to activity F.
Figure 3 (b) has the order of events A → C → D → E → G → H is the sequence of events incorrectly
based on parameters due to incomplete and amount 7 status parameters. In decision parameters obtained from
decision mining requires that it can pass activity C then conditions fulfilled ((status = complete AND amount
8.5) OR (status = incomplete AND amount > 9)) and conditions for passing activity G must meet
the requirements ((status = complete AND amount 8.5) OR (status = incomplete AND amount > 9)). However,
when viewed based on the order non-free choice is correct.
Figure 3 (c) has the sequence of events A → B → D → E → G → H is the sequence of events that
are wrong based on the parameters and based on the order of non-free choice. Case_ID PP735 has several
parameters, which value of parameter status is incomplete and in parameter amount has 13. In Figure 3 (a)
shows after activity A goes to activity B is a correct but wrong decision after activity E goes to activity G.
Figure 3 (d) has the order of events A → B → D → E → F → H is the sequence of events wrong
based on parameters because complete status parameters and amount 3. In the decision parameters obtained
from decision mining requires that it can pass activity B then the conditions fulfilled ((status = complete AND
amount > 8.5) OR (status = incomplete AND amount 9)) and the condition for passing activity F must meet
the requirements ((status = complete AND amount > 8.5) OR (status = incomplete AND amount 9)) . However,
when viewed based on the order non-free choice is correct.
Accuracy of the existing method shows 900 case activity in 𝑇𝑃, 188 case activity in 𝑇𝑁, 111 case
activity in 𝐹𝑃 dan zero activity in 𝐹𝑁.
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
900+188
900+188+111+0
𝑥 100%
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 0.907 𝑥 100%
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 90.7%
The accuracy of the parameterize decision mining shows 900 case activity in 𝑇𝑃, 299 case activity in 𝑇𝑁, zero
case activity in 𝐹𝑃 dan zero activity in 𝐹𝑁.
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
900+299
900+299+0+0
𝑥 100%
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 106 - 113
112
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 1 𝑥 100%
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 100%
Figure 3. The result of the process which contains wrong indirect relationship in
Case_ID: (a) PP10, (b) PP412, (c) PP735, and (d) PP1050
4. CONCLUSION
The decision mining overcomes the correct flow in a direction but not in a parameterize direction.
The parameterized decision mining considers parameters in the selection of grooves. This paper proposes a
combination of parameterized decision mining and relation sequences to detect the direction and correctness.
Firstly, discovering a graph process model based on the event log. Then, an analysis of the graph process model
obtains decision points. The process of each decision point is using parameterized decision mining, so that
decision rules are formed. The derived decision rules are used as parameters of checking wrong indirect
relationship in the non-free choice. The accuracy of the parameterized decision mining reaches 100%. It means
the proposed method can detect errors far more precisely than the existing method only get 90.7% accuracy.
REFERENCES
[1] Tax N., Sidorova N., Van Der Aalst W. M. P., "Discovering more precise process models from event logs by filtering
out chaotic activities," Journal of Intelligent Information Systems, vol. 52, no. 1, pp. 107–139, 2019.
[2] Van Der Aalst W. M. P., "Decomposing Petri nets for process mining: A generic approach," Distributed and Parallel
Databases, vol. 31, no. 4, pp. 471–507, 2013.
[3] Aleem S., Fernando Capretz L., Ahmed F., "Business Process Mining Approaches: A Relative Comparison,"
International Journal of Science, Technology & Management, vol. 4, no. 1, pp. 1557–1564, 2015.
[4] Van der Aalst W., "Process Discovery: An Introduction," Process Mining-Springer, pp. 125–156, 2011.
[5] Rozinat A, Van der Aalst W. M. P., "Decision Mining in ProM," International Conference on Business Process
Management, pp. 420–425, 2006.
[6] Horita H., Hirayama H., Hayase T., Tahara Y, Ohsuga A., "Process mining approach based on partial structures of
event logs and decision tree learning," Proceedings - 2016 5th
IIAI International Congress on Advanced Applied
Informatics, IIAI-AAI, 2016.
[7] Wen L., Wang J., Sun J., "Detecting implicit dependencies between tasks from event logs," Asia-Pacific Web
Conference, pp. 591–603, 2006.
[8] Van Der Aalst W. M. P., De Medeiros A. K. A., "Process mining and security: Detecting anomalous process
executions and checking process conformance," Electronic Notes in Theoretical Computer Science, vol. 121,
pp. 3-21, 2005.
[9] Sungkono K. R., Sarno R., "Constructing control-flow patterns containing invisible task and non-free choice based
on declarative model," International Journal of Innovative Computing, Information and Control, vol. 14, no. 4,
pp. 1285-1299, 2018.
[10] Wen L., Van Der Aalst W. M. P., Wang J., Sun J., "Mining process models with non-free-choice constructs,"
Data Mining and Knowledge Discovery, vol. 15, no. 2, pp. 145–180, 2007.
[11] Kalynychenko O., Chalyi S., Bodyanskiy Y., Golian V., Golian N., "Implementation of search mechanism for implicit
dependences in process mining," Proceedings of the 2013 IEEE 7th
International Conference on Intelligent Data
Acquisition and Advanced Computing Systems, 2013.
[12] Van Der Aalst W. M. P., De Beer H. T., Van Dongen B. F., "Process Mining and Verification of Properties:
An Approach based on Temporal Logic," Proceedings of the 2005 Confederated International Conference on On
the Move to Meaningful Internet Systems, pp. 130–147, 2005.
TELKOMNIKA Telecommun Comput El Control 
Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo)
113
[13] Chabrol M., Dalmas B., Norre S., Rodier S., "A process tree-based algorithm for the detection of implicit
dependencies," 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS),
2016.
[14] Joishi J., Sureka A., "Graph or Relational Databases: A Speed Comparison for Process Mining Algorithm,"
ArXiv, 2016.
[15] Kushwaha A., Pandey R.S., "A Graph Based Approach To Identify Objects Using Identifying Attribute," Indonesian
Journal of Electrical Engineering and Computer Science, vol. 6, no. 2, pp. 438-446, 2017.
[16] Patil N. S., Kiran P., Kiran N. P., Naresh P. K. M., "A Survey on Graph Database Management Techniques for Huge
Unstructured Data," International Journal of Electrical and Computer Engineering, vol. 8, no. 2, pp. 1140-1149,
2018.
[17] Sarno R., Sungkono K., Johanes R., Sunaryono D., "Graph-Based Algorithms for Discovering a Process Model
Containing Invisible Tasks," International Journal of Intelligent Engineering and Systems, vol. 12, no. 2,
pp. 85-94, 2019.
[18] Iwasaki K., Kuriyama Y., Kondoh S., Shirayori A., "Structuring engineers’ implicit knowledge of forming process
design by using a graph model," Procedia CIRP, vol. 67, pp. 563–568, 2018.
[19] Chapela-Campa D., Mucientes M., Lama M., "Mining Frequent Patterns in Process Models," Information Sciences,
vol. 472, pp. 235–257, 2019.
[20] Caesarita Y., Sarno R., Sungkono K. R., "Identifying bottlenecks and fraud of business process using alpha ++ and
heuristic miner algorithms (Case study: CV. Wicaksana Artha)," 2017 11th
International Conference on Information
& Communication Technology and System, 2017.
[21] Bolt A., de Leoni M., van der Aalst W. M. P., "Process variant comparison: Using event logs to detect differences in
behavior and business rules," Information Systems, vol. 74, pp. 53–66, 2018.
[22] Dakic D., Stefanovic D., "Business Process Mining Application: A Literature Review," Proceedings of the 29th
International DAAAM Symposium, pp. 0866–0875, 2018.
[23] Rezaiee A. M., Karimi A., "A New Dynamic Intelligent Model to Determine Reliability and Trust of Online Banking
by Using Fuzzy C-Mean," Indonesian Journal of Electrical Engineering and Computer Science, vol. 4, no. 3,
pp. 605-610, 2016.
[24] Ait-Mlouk A., Agouti T., Gharnati F., "Mining and prioritization of association rules for big data: multi-criteria
decision analysis approach," Journal of Big Data, vol. 4, no. 42, pp. 1-21, 2017.
[25] Mannhardt F., De Leoni M., Reijers H. A., Van Der Aalst W. M. P., "Decision Mining Revisited-Discovering
Overlapping Rules," International Conference on Advanced Information Systems Engineering, pp. 377-392, 2016.
[26] Singh D., Choudhary N., Samota J., "Analysis of Data Mining Classification with Decision tree Technique," Global
Journals Inc. (USA), vol. 13, pp. 1-5, 2013.
[27] Bombara G., Vasile C-I, Penedo F., Yasuoka H., Belta C., "A Decision Tree Approach to Data Classification using
Signal Temporal Logic," Proceedings of the 19th
International Conference on Hybrid Systems: Computation and
Control - HSCC ’16, 2016.
[28] Saettler A., Laber E, de A., Mello Pereira F., "Decision tree classification with bounded number of errors,"
Information Processing Letters, vol. 127, pp. 27-31, 2017.
[29] Cardoso J., "Business Process Control-Flow Complexity: Metric, Evaluation, and Validation," International Journal
of Web Services Research, vol. 5, no. 2, pp. 49-76, 2008.
[30] Lim H. W., Kerschbaum F., Wang H., "Workflow Signatures for Business Process Compliance," IEEE Transactions
on Dependable and Secure Computing, vol. 9, no. 5, pp. 756-769, 2012.

Weitere ähnliche Inhalte

Was ist angesagt?

EFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATA
EFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATAEFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATA
EFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATAIJCI JOURNAL
 
Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...
Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...
Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...CSCJournals
 
An integrated mechanism for feature selection
An integrated mechanism for feature selectionAn integrated mechanism for feature selection
An integrated mechanism for feature selectionsai kumar
 
A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...
A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...
A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...theijes
 
A Review on Feature Selection Methods For Classification Tasks
A Review on Feature Selection Methods For Classification TasksA Review on Feature Selection Methods For Classification Tasks
A Review on Feature Selection Methods For Classification TasksEditor IJCATR
 
PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...
PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...
PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...IJCSEA Journal
 
IRJET- Analyzing Voting Results using Influence Matrix
IRJET- Analyzing Voting Results using Influence MatrixIRJET- Analyzing Voting Results using Influence Matrix
IRJET- Analyzing Voting Results using Influence MatrixIRJET Journal
 
Data Mining using SAS
Data Mining using SASData Mining using SAS
Data Mining using SASTanu Puri
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelWaqas Tariq
 
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesAnomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesTELKOMNIKA JOURNAL
 
A survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniquesA survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniquesIAEME Publication
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Sagar Deogirkar
 
An experimental study of feature
An experimental study of featureAn experimental study of feature
An experimental study of featureijscai
 
A NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBT
A NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBTA NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBT
A NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBTieijjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Prep abstract yk edit0612
Prep abstract yk edit0612Prep abstract yk edit0612
Prep abstract yk edit0612Soo-il Kim
 
Poor man's missing value imputation
Poor man's missing value imputationPoor man's missing value imputation
Poor man's missing value imputationLeonardo Auslender
 

Was ist angesagt? (20)

EFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATA
EFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATAEFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATA
EFFICIENT FEATURE SUBSET SELECTION MODEL FOR HIGH DIMENSIONAL DATA
 
Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...
Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...
Multi-Dimensional Features Reduction of Consistency Subset Evaluator on Unsup...
 
An integrated mechanism for feature selection
An integrated mechanism for feature selectionAn integrated mechanism for feature selection
An integrated mechanism for feature selection
 
C054
C054C054
C054
 
A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...
A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...
A Survey and Comparative Study of Filter and Wrapper Feature Selection Techni...
 
A Review on Feature Selection Methods For Classification Tasks
A Review on Feature Selection Methods For Classification TasksA Review on Feature Selection Methods For Classification Tasks
A Review on Feature Selection Methods For Classification Tasks
 
PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...
PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...
PROPOSAL OF A TWO WAY SORTING ALGORITHM AND PERFORMANCE COMPARISON WITH EXIST...
 
IRJET- Analyzing Voting Results using Influence Matrix
IRJET- Analyzing Voting Results using Influence MatrixIRJET- Analyzing Voting Results using Influence Matrix
IRJET- Analyzing Voting Results using Influence Matrix
 
Data Mining using SAS
Data Mining using SASData Mining using SAS
Data Mining using SAS
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power Model
 
[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...
[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...
[IJET-V1I3P11] Authors : Hemangi Bhalekar, Swati Kumbhar, Hiral Mewada, Prati...
 
Ijetr042153
Ijetr042153Ijetr042153
Ijetr042153
 
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business ProcessesAnomaly Detection based on Control-flow Pattern of Parallel Business Processes
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
 
A survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniquesA survey of memory based methods for collaborative filtering based techniques
A survey of memory based methods for collaborative filtering based techniques
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
An experimental study of feature
An experimental study of featureAn experimental study of feature
An experimental study of feature
 
A NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBT
A NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBTA NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBT
A NEW INNOVATION TECHNIQUE OF STATE TRANSITION TESTING USED FOR DBT
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Prep abstract yk edit0612
Prep abstract yk edit0612Prep abstract yk edit0612
Prep abstract yk edit0612
 
Poor man's missing value imputation
Poor man's missing value imputationPoor man's missing value imputation
Poor man's missing value imputation
 

Ähnlich wie Graph-based algorithm for checking wrong indirect relationships in non-free choice

fmelleHumanActivityRecognitionWithMobileSensors
fmelleHumanActivityRecognitionWithMobileSensorsfmelleHumanActivityRecognitionWithMobileSensors
fmelleHumanActivityRecognitionWithMobileSensorsFridtjof Melle
 
CS598 DataMining Capstore Paper Review Presentation - sbrama2.pdf
CS598 DataMining Capstore Paper Review Presentation -  sbrama2.pdfCS598 DataMining Capstore Paper Review Presentation -  sbrama2.pdf
CS598 DataMining Capstore Paper Review Presentation - sbrama2.pdfSathish R
 
Knowledge Identification using Rough Set Theory in Software Development Proce...
Knowledge Identification using Rough Set Theory in Software Development Proce...Knowledge Identification using Rough Set Theory in Software Development Proce...
Knowledge Identification using Rough Set Theory in Software Development Proce...ijcnes
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
 
An Improved Leader Election Algorithm for Distributed Systems
An Improved Leader Election Algorithm for Distributed SystemsAn Improved Leader Election Algorithm for Distributed Systems
An Improved Leader Election Algorithm for Distributed Systemsijngnjournal
 
Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...
Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...
Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...Universitas Bhayangkara Jakarta Raya
 
A02610104
A02610104A02610104
A02610104theijes
 
Re-Mining Association Mining Results Through Visualization, Data Envelopment ...
Re-Mining Association Mining Results Through Visualization, Data Envelopment ...Re-Mining Association Mining Results Through Visualization, Data Envelopment ...
Re-Mining Association Mining Results Through Visualization, Data Envelopment ...ertekg
 
Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...Gurdal Ertek
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
K-means and bayesian networks to determine building damage levels
K-means and bayesian networks to determine building damage levelsK-means and bayesian networks to determine building damage levels
K-means and bayesian networks to determine building damage levelsTELKOMNIKA JOURNAL
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507IJRAT
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET Journal
 
A Trinity Construction for Web Extraction Using Efficient Algorithm
A Trinity Construction for Web Extraction Using Efficient AlgorithmA Trinity Construction for Web Extraction Using Efficient Algorithm
A Trinity Construction for Web Extraction Using Efficient AlgorithmIOSR Journals
 
Design and implementation for
Design and implementation forDesign and implementation for
Design and implementation forIJDKP
 
Machine learning classification analysis model community satisfaction with tr...
Machine learning classification analysis model community satisfaction with tr...Machine learning classification analysis model community satisfaction with tr...
Machine learning classification analysis model community satisfaction with tr...IAESIJAI
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docpraveena06
 

Ähnlich wie Graph-based algorithm for checking wrong indirect relationships in non-free choice (20)

fmelleHumanActivityRecognitionWithMobileSensors
fmelleHumanActivityRecognitionWithMobileSensorsfmelleHumanActivityRecognitionWithMobileSensors
fmelleHumanActivityRecognitionWithMobileSensors
 
CS598 DataMining Capstore Paper Review Presentation - sbrama2.pdf
CS598 DataMining Capstore Paper Review Presentation -  sbrama2.pdfCS598 DataMining Capstore Paper Review Presentation -  sbrama2.pdf
CS598 DataMining Capstore Paper Review Presentation - sbrama2.pdf
 
Knowledge Identification using Rough Set Theory in Software Development Proce...
Knowledge Identification using Rough Set Theory in Software Development Proce...Knowledge Identification using Rough Set Theory in Software Development Proce...
Knowledge Identification using Rough Set Theory in Software Development Proce...
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
 
An Improved Leader Election Algorithm for Distributed Systems
An Improved Leader Election Algorithm for Distributed SystemsAn Improved Leader Election Algorithm for Distributed Systems
An Improved Leader Election Algorithm for Distributed Systems
 
Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...
Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...
Comparative Analysis of Naive Bayes and Decision Tree Algorithms in Data Mini...
 
A02610104
A02610104A02610104
A02610104
 
Re-Mining Association Mining Results Through Visualization, Data Envelopment ...
Re-Mining Association Mining Results Through Visualization, Data Envelopment ...Re-Mining Association Mining Results Through Visualization, Data Envelopment ...
Re-Mining Association Mining Results Through Visualization, Data Envelopment ...
 
Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
K-means and bayesian networks to determine building damage levels
K-means and bayesian networks to determine building damage levelsK-means and bayesian networks to determine building damage levels
K-means and bayesian networks to determine building damage levels
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence Chain
 
H017124652
H017124652H017124652
H017124652
 
A Trinity Construction for Web Extraction Using Efficient Algorithm
A Trinity Construction for Web Extraction Using Efficient AlgorithmA Trinity Construction for Web Extraction Using Efficient Algorithm
A Trinity Construction for Web Extraction Using Efficient Algorithm
 
Design and implementation for
Design and implementation forDesign and implementation for
Design and implementation for
 
Machine learning classification analysis model community satisfaction with tr...
Machine learning classification analysis model community satisfaction with tr...Machine learning classification analysis model community satisfaction with tr...
Machine learning classification analysis model community satisfaction with tr...
 
V1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.docV1_I2_2012_Paper6.doc
V1_I2_2012_Paper6.doc
 

Mehr von TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

Mehr von TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Kürzlich hochgeladen

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Kürzlich hochgeladen (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Graph-based algorithm for checking wrong indirect relationships in non-free choice

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 1, February 2020, pp. 106~113 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i1.12982  106 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Graph-based algorithm for checking wrong indirect relationships in non-free choice Agung Wiratmo, Kelly Rossa Sungkono, Riyanarto Sarno Department of Informatics, Faculty of Information Technology and Communication, Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia Article Info ABSTRACT Article history: Received May 15, 2019 Revised Jun 14, 2019 Accepted Jul 1, 2019 In this context, this paper proposes a combination of parameterised decision mining and relation sequences to detect wrong indirect relationship in the non-free choice. The existing decision mining without parameter can only detect the direction, but not the correctness. This paper aims to identify the direction and correctness with decision mining with parameter. This paper discovers a graph process model based on the event log. Then, it analyses the graph process model for obtaining decision points. Each decision point is processed by using parameterised decision mining, so that decision rules are formed. The derived decision rules are used as parameters of checking wrong indirect relationship in the non-free choice. The evaluation shows that the checking wrong indirect relationships in non-free choice with parameterised decision mining have 100% accuracy, whereas the existing decision mining has 90.7% accuracy. Keywords: Decision mining Parameterize decision mining Process model Wrong indirect relationships This is an open access article under the CC BY-SA license. Corresponding Author: Riyanarto Sarno, Department of Informatics, Faculty of Information Technology and Communication, Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia. Email: riyanarto@if.its.ac.id 1. INTRODUCTION Each company records events carried out in the event log. The analysation of information from the event log obtains the obtain knowledge [1]. The process of gaining knowledge from event log extraction is called the process mining, which aims to find out, monitoring and improving the processes that occur [2]. In the process mining, there are two most prominent processes, namely: 1) conformance checking [3] and 2) process discovery [4]. The process mining founds the wrong process in the event log. This paper discovers a graph process model based on the event log. The analysation of the graph process model obtains decision points. Each decision point is processed by using parameterised decision mining, so that decision rules are formed. The derived decision rules are used as parameters of checking wrong indirect relationship in the non-free choice. Several previous studies discuss decision mining in recent years. A study conducted by Rozinat [5] explains decision mining on business processes. However, decision mining is not implemented as a decision rule for checking errors in event logs. Horita [6] made decisions on event logs that result in linear temporal logic, but the temporal logic is not applied for error searches in event logs. The existing methods in checking indirect relationships [7, 8] in non-free choice only using direction so the error can be detected only from directional error, but correctness from choosing directional cannot be obtained. The proposed method, namely parameterized decision mining is to use the decision rule in checking event logs with notice not only from
  • 2. TELKOMNIKA Telecommun Comput El Control  Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo) 107 the direction but also the parameters in the event log. In this research, the decision rule is used to find errors in the event log, so the failure of event logs can be finding more accurate in terms of the direction and correctness of choice. 2. RESEARCH METHOD In this section, parameterized decision mining will be presented to find a wrong indirect relationship in non-free choice using the graph database. The non-free choice is a condition that is not free to make choices, but choices depend on the results of the previous election [9]. Checking process models on the non-free choice part of the event log can be done correctly must consider all dependencies [10]. There are two types of dependence on the process of the model, direct dependence or referred to as direct relationship and indirect dependence or referred to an indirect relationship [7, 11, 12]. A direct relationship is a relationship or dependency that is directly between tasks. Conversely, an indirect relationship is a relationship or a dependence that is indirectly between tasks [13]. A graph database is a NoSQL database where is depicted in the form of graph [14-16]. Graph databases will form data as nodes and relations between nodes [15, 17]. The process mining is used to extract information from the event log to see business processes [10, 18, 19]. The process mining can be used to build a process model [16, 20–23]. Decision mining is used to study parameters that can influence the selection of grooves [24, 25]. Decision mining is used to find rules for branching from each decision point. By using a graph database, a decision point can be known from a node that has a xorsplit relation. The algorithm used in decision mining research is using the C4.5 decision tree algorithm [5, 26]. A decision tree is used to predict an activity seen from the parameters of a data. The decision tree has several terms. Those terms are a root as the initial node, a leaf node as the child of a node, and the depth of a node as the length of the path between the nodes to the leaf node [27, 28]. The first step is to discover graph process model of the event log based on the graph database. Then, graph process model be analyzed to find the decision point. The second step is discovering decision rule using decision mining from each decision point with notice parameter in event log. This decision rule will be used as a parameter in determining the wrong decision in non-free choice. The last step searches each case in the event log with the parameters stated earlier. 2.1. Discovery process model based on graph database The first step for the discovery of the graph model process is to enter event logs like in Table 1 into the graph database using a query like in Table 2. The parameters in the event log used in the graph database are Case_ID, Activity, and Time. In the Table 2 shown queries in the graph database for: (1) Import all data in event log, (2) Import only unique activity, (3) create relation: sequence, xorsplit, xorjoin, andsplit, andjoin, non-free choice, and (4) get the decision point. In the model process, there will be several relationships such as xorsplit [29], xorjoin [29], andsplit [30], andjoin [30] and non-free choice shown in Figure 1. Joint relations are a relation of the union from branching to split relations at the base of branching. The xor relation is a branching relation which means that the flow of the event log can only choose one of the entire branches of the event log. The and relation is a flow relationship that will do all events even though the different order. The results of working on queries in Table 2 produce the model process shown in Figure 1. After each activity is represented in the node, the next step is to make relations between nodes such as sequence, xorsplit, xorjoin, andjoin, andsplit relations, and non-free choice. Figure 1. Examples of the process model
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 106 - 113 108 After the graph process model is formed. The next step is to determine the decision point by using the query in Table 2. Decision point is the node where branching of the process begins. In Figure 1 shows graph process model where containing the decision points in node A and node E. Node A is the base of member node B or node C. Node E is the base of branching node G and node F. furthermore, decision rule would be discovered by decision mining to find parameters each branching of each decision point. 2.2. Extracting a parameter in decision points The decision point shown in Figure 1, there are two decision point points. Each decision point will be analyzed by considering the parameters in the event log to get the decision rule. The process for extraction decision rule is called decision mining. The algorithm of decision mining is used C4.5 decision tree algorithm. The first step is getting leaf nodes from each decision point. Then, the next step is getting an event log that has activities such as leaf nodes with algorithm in Table 3. The data needed in algorithm in Table 3 is 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑜𝑖𝑛𝑡, 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒, dan 𝑒𝑣𝑒𝑛𝑡𝐿𝑜𝑔. Each decision point of leaf nodes obtained from algorithm in Table 3 is used in the decision mining process. The decision mining algorithm is seen in Table 4. Algorithm in Table 4 has five data variables: X is the event log on node leaf. Y is an attribute owned by X. The 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐴𝑡𝑟𝑖𝑏𝑢𝑡𝑒 is an attribute used as a solving parameter. The 𝑎𝑡𝑟𝑖𝑏𝑢𝑡𝑒𝑆𝑒𝑙𝑒𝑐𝑡𝑖𝑜𝑛𝑀𝑒𝑡ℎ𝑜𝑑 is the method used to find the best fraction value. The method used to find the best splitting criterion is C4.5 with the gini index parameter in (2) and (3). The function of (1) is to evaluate the separation in event log each attribute. The function of (2) is to evaluate the separation in event log each parameter. 𝐺𝑖𝑛𝑖( 𝑡) = 1 − ∑[𝑝( 𝑗 𝑡 )]2 (2) where 𝑝( 𝑗 𝑡 ) represents the frequency of the j attribute in activity t. 𝐺𝑖𝑛𝑖 𝑠𝑝𝑙𝑖𝑡 = ∑ 𝑛 𝑖 𝑛 𝐺𝑖𝑛𝑖(𝑖)𝑘 𝑖=1 (3) where 𝑘 is the number of partitions, 𝑛𝑖 is the amount of data in 𝑖 partition, 𝑛 is the amount of data in the 𝑝 node. The best split value is indicated by the smallest 𝐺𝑖𝑛𝑖 𝑠𝑝𝑙𝑖𝑡 . The 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐶𝑟𝑖𝑡𝑒𝑟𝑖𝑎 is the value of the parameter that is used as a solver. 𝑁 is a node. The algorithm in Table 4 will continue to be repeated until the data is 𝑋 empty. The results of algorithm in Table 4 are a decision tree by showing the parameters and the leaf values can be seen in Figure 2. Table 1. Process mining will be carried out by the event log Case_ID amount stackType Status Time Activity PP10 3 nonreefer complete 3/11/2016 0:52 A PP10 3 nonreefer complete 3/11/2016 2:00 C PP10 3 nonreefer complete 3/11/2016 3:08 D PP10 3 nonreefer complete 3/11/2016 4:16 E PP10 3 nonreefer complete 3/11/2016 5:24 F PP10 3 nonreefer complete 3/11/2016 6:32 H PP412 17 reefer incomplete 7/2/2016 22:28 A PP412 17 reefer incomplete 7/2/2016 23:36 C PP412 17 reefer incomplete 7/3/2016 0:44 D PP412 17 reefer incomplete 7/3/2016 1:52 E PP412 17 reefer incomplete 7/3/2016 3:00 G PP412 17 reefer incomplete 7/3/2016 4:08 H PP735 13 nonreefer incomplete 10/2/2016 10:52 A PP735 13 nonreefer incomplete 10/2/2016 12:00 B PP735 13 nonreefer incomplete 10/2/2016 13:08 D PP735 13 nonreefer incomplete 10/2/2016 14:16 E PP735 13 nonreefer incomplete 10/2/2016 15:24 G PP735 13 nonreefer incomplete 10/2/2016 16:32 H PP1050 10 nonreefer complete 12/30/2016 16:52 A PP1050 10 nonreefer complete 12/30/2016 18:00 B PP1050 10 nonreefer complete 12/30/2016 19:08 D PP1050 10 nonreefer complete 12/30/2016 20:16 E PP1050 10 nonreefer complete 12/30/2016 21:24 F PP1050 10 nonreefer complete 12/30/2016 22:32 H
  • 4. TELKOMNIKA Telecommun Comput El Control  Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo) 109 Table 2. Queries in the graph database No Queries 1 def importActivityT (tx, fileName): tx.run ("LOAD CSV with headers FROM 'file:///"+fileName+"' AS line " "Merge (: Activity {CaseId: line. Case_ID, Name: line. Activity, Amount: toInt (line. amount), StackType: line. stackType, Status: line. status, Time: line. Time})") 2 def importCaseActivity (tx, fileName): tx.run ("LOAD CSV with headers FROM 'file:///"+fileName+"' AS line Merge (: CaseActivity {Name: line. Activity}) “) 3 def createRelationship(tx): # create sequence relation tx.run ("MATCH (c: Activity) " "WITH COLLECT(c) AS Caselist " "UNWIND RANGE (0, Size (Caselist) - 2) as idx " "WITH Caselist[idx] AS s1, Caselist[idx+1] AS s2 " "MATCH (b: CaseActivity), (a: CaseActivity) " "WHERE s1. CaseId = s2. CaseId AND s1. Name = a. Name AND s2. Name = b. Name " "MERGE (a)- [r: SEQUENCE]->(b)") # create xorsplit relation tx.run ("MATCH (bef)-[r]->(aft) " "WHERE size((bef)--> ())>1 AND size((aft)<--()) =1 AND (size((aft)--> ()) =1 OR size((aft)--> ())>1) " "CREATE (bef)- [: XORSPLIT]->(aft) " "DELETE r") # create xorjoin relation tx.run ("MATCH (bef)-[r]->(aft) " "WHERE (size((bef)--> ()) =1 OR size((bef)--> ())>1) AND size((aft)<--())>1 " "CREATE (bef)- [: XORJOIN]->(aft) " "DELETE r") # create andsplit relation tx.run ("MATCH (aft1) <-[r]-(bef)-[s]->(aft2)" "WHERE size((bef)--> ())>1 " "AND size((aft2) --> ()) =size((bef)--> ()) AND size((aft1) --> ()) =size((bef)--> ()) " "AND not (aft1)- [: SEQUENCE]->(bef) AND not (aft2)- [: SEQUENCE]->(bef) " "MERGE (aft1) <- [: ANDSPLIT] -(bef)- [: ANDSPLIT]->(aft2) " "DELETE r, s") # create andjoin relation tx.run ("MATCH (aft1)-[r]->(bef)<-[s]-(aft2) " "WHERE size((bef)<--())>1 " "AND size((aft2) --> ()) =size((bef)<--()) AND size((aft1) --> ()) =size((bef)<--()) " "AND not ()- [: ANDSPLIT]->(bef) " "MERGE (aft1)- [: ANDJOIN]->(bef)<-[: ANDJOIN]-(aft2) " "DELETE r, s") # create Non-Free Choice tx.run ("match ()- [c: XORSPLIT]->(n) " "match (a)- [b: XORJOIN]-> () " "match (k: Activity), (l: Activity) " "where a. Name<>n.Name and k. Name=a.Name and l. Name=n.Name and k. CaseId=l.CaseId and k. Time<l.Time " "merge (a)- [: NONFREECHOICE]->(n)") 4 def printStartingNodeNonFreeChoice(tx): nodes = [] global nodeStartedNonFreeChoice for record in tx.run ("MATCH (p)- [r: XORSPLIT]-> () RETURN p. Name ORDER BY p. Name"): nodes. append (record ["p. Name"]) nodeStartedNonFreeChoice = np. unique (np. array(nodes)) return nodeStartedNonFreeChoice Table 3. Algorithm for getting event log of leaf nodes each decision point Data: 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑜𝑖𝑛𝑡, 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒, 𝑒𝑣𝑒𝑛𝑡𝐿𝑜𝑔 Result: 𝐸𝑣𝑒𝑛𝑡 𝑙𝑜𝑔 𝑝𝑎𝑑𝑎 𝑙𝑒𝑎𝑓 𝑛𝑜𝑑𝑒 No Pseudocode 1 𝐷𝑎𝑡𝑎𝐿𝑒𝑎𝑓 2 𝑓𝑜𝑟 𝑒𝑎𝑐ℎ 𝑥 𝑜𝑓 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑜𝑖𝑛𝑡 𝑑𝑜 3 𝑓𝑜𝑟 𝑒𝑎𝑐ℎ 𝑦 𝑜𝑓 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒 𝑜𝑓 𝑒𝑎𝑐ℎ 𝑥 𝑑𝑜 4 𝑓𝑜𝑟 𝑧 𝑜𝑓 𝑒𝑣𝑒𝑛𝑡𝐿𝑜𝑔 𝑑𝑜 5 𝑖𝑓 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑒𝑎𝑐ℎ 𝑧 𝑜𝑓 𝑡𝑟𝑢𝑒𝐸𝑣𝑒𝑛𝑡𝐿𝑜𝑔 𝑒𝑞𝑢𝑎𝑙𝑠 𝑤𝑖𝑡ℎ 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑦 𝑙𝑒𝑎𝑓𝑁𝑜𝑑𝑒 𝑡ℎ𝑒𝑛 6 𝑎𝑡𝑡𝑎𝑐ℎ 𝑎 𝑒𝑣𝑒𝑛𝑡 𝐿𝑜𝑔 𝑧 𝑡𝑜 𝐷𝑎𝑡𝑎𝐿𝑒𝑎𝑓 7 𝑒𝑛𝑑 8 𝑒𝑛𝑑 9 𝑒𝑛𝑑 10 𝑒𝑛𝑑
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 106 - 113 110 Table 4. Algorithm for extracting a parameter each decision point using decision mining Data: X,Y, splitingAtribute,atributeSelectionMethod, splitingCriteria,N Result: Parameter decision in decision point showed by decision tree No Pseudocode 1 𝐶𝑟𝑒𝑎𝑡𝑒 𝑁𝑜𝑑𝑒 𝑁 2 𝑖𝑓 𝑡𝑢𝑝𝑙𝑒 𝑖𝑛 𝑋 𝑎𝑟𝑒 𝑎𝑙𝑙 𝑜𝑓 𝑡ℎ𝑒 𝑠𝑎𝑚𝑒 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑡ℎ𝑒𝑛 3 𝑟𝑒𝑡𝑢𝑟𝑛 𝑁 𝑎𝑠 𝑎 𝑙𝑒𝑎𝑓 𝑛𝑜𝑑𝑒 𝑙𝑎𝑏𝑒𝑙𝑒𝑑 𝑤𝑖𝑡ℎ 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑋 4 𝑒𝑛𝑑 5 𝑖𝑓 𝑌 𝑖𝑠 𝑒𝑚𝑝𝑡𝑦 𝑡ℎ𝑒𝑛 6 𝑟𝑒𝑡𝑢𝑟𝑛 𝑁 𝑎𝑠 𝑎 𝑙𝑒𝑎𝑓 𝑛𝑜𝑑𝑒 𝑙𝑎𝑏𝑒𝑙𝑒𝑑 𝑤𝑖𝑡ℎ 𝑚𝑎𝑗𝑜𝑟𝑖𝑡𝑦 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑋 7 𝑒𝑛𝑑 8 𝑎𝑡𝑟𝑖𝑏𝑢𝑡𝑒𝑆𝑒𝑙𝑒𝑐𝑡𝑖𝑜𝑛𝑀𝑒𝑡ℎ𝑜𝑑(𝑋, 𝑌) 9 𝑖𝑓 (𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐴𝑡𝑟𝑖𝑏𝑢𝑡𝑒 𝑖𝑠 𝑑𝑖𝑠𝑐𝑟𝑒𝑡𝑒 − 𝑣𝑎𝑙𝑢𝑒𝑑) 𝑡ℎ𝑒𝑛 10 𝑌 ← 𝑌 − 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐴𝑡𝑟𝑖𝑏𝑢𝑡𝑒 11 𝑒𝑛𝑑 12 𝑓𝑜𝑟 𝑒𝑎𝑐ℎ 𝑜𝑢𝑡𝑐𝑜𝑚𝑒 𝑖 𝑜𝑓 𝑠𝑝𝑙𝑖𝑡𝑖𝑛𝑔𝐶𝑟𝑖𝑡𝑒𝑟𝑖𝑎 𝑑𝑜 13 𝑙𝑒𝑡 𝑋𝑖 𝑏𝑒 𝑡ℎ𝑒 𝑠𝑒𝑡 𝑜𝑓 𝑑𝑎𝑡𝑎 𝑡𝑢𝑝𝑙𝑒𝑠 𝑖𝑛 𝑋 𝑠𝑎𝑡𝑖𝑠𝑓𝑦𝑖𝑛𝑔 𝑡ℎ𝑒 𝑜𝑢𝑡𝑐𝑜𝑚𝑒 𝑗 14 𝑖𝑓 𝑋𝑖 𝑖𝑠 𝑒𝑚𝑝𝑡𝑦 𝑡ℎ𝑒𝑛 15 𝑎𝑡𝑡𝑎𝑐ℎ 𝑎 𝑙𝑒𝑎𝑓 𝑙𝑎𝑏𝑒𝑙𝑒𝑑 𝑤𝑖𝑡ℎ 𝑚𝑎𝑗𝑜𝑟𝑖𝑡𝑦 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑖𝑛 𝑋 𝑡𝑜 𝑛𝑜𝑑𝑒 𝑁 16 𝑒𝑙𝑠𝑒 17 𝑎𝑡𝑟𝑖𝑏𝑢𝑡𝑒𝑆𝑒𝑙𝑒𝑐𝑡𝑖𝑜𝑛𝑀𝑒𝑡ℎ𝑜𝑑(𝑋𝑖, 𝑌) 18 𝑒𝑛𝑑 19 𝑒𝑛𝑑 20 𝑟𝑒𝑡𝑢𝑟𝑛 𝑁 Figure 2. Decision tree in: (a) node A, and (b) node E From Figure 2 (a) it can be concluded that the condition for doing activity B is ((status = complete AND amount > 8.5) OR (status = incomplete AND amount ≤ 9)). Whereas to do activity C it must be conditioned ((status = complete AND amount ≤ 8.5) OR (status = incomplete AND amount > 9)). From Figure 2 (b) it can be concluded that the condition for doing activity F is ((status = complete AND amount > 8.5) OR (status = incomplete AND amount ≤ 9)). Whereas to do activity G must be conditioned ((status = complete AND amount ≤ 8.5) OR (status = incomplete AND amount t> 9)). The next step is to check the event log with parameters that have been obtained previously.
  • 6. TELKOMNIKA Telecommun Comput El Control  Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo) 111 2.3. Checking wrong indirect relationships After finding these parameters, then looking for wrong indirect relationship in non-free choice. Checking is done in each case. This is because each case has different parameters. The goal is to find faults with precession far better than just using the direction of each case. Checking scheme for non-free choices containing indirect relations as in algorithm in Table 5. From the algorithm in Table 5, there are needed several parameters like decisionParameter and 𝐸𝑣𝑒𝑛𝑡𝐿𝑜𝑔. The process will repeat as many cases as in EventLog and checking in case i with 𝑑𝑒𝑐𝑖𝑠𝑖𝑜𝑛𝑃𝑎𝑟𝑎𝑚𝑒𝑡𝑒𝑟. If the process is not same with the rule, then the case i will be added in 𝐼𝑛𝑑𝑖𝑟𝑒𝑐𝑡𝑅𝑒𝑙𝑎𝑡𝑖𝑜𝑛𝑠ℎ𝑖𝑝. Table 5. Algorithm for checking indirect relationship in non-free choice Data: decisionParameter,EventLog Result: IndirectRelationship No Pseudocode 1 IndirectRelationship 2 for each case i of EventLog do 3 if case i parameter not equal with decisionParameter then 4 attach a case i to node IndirectRelationship 5 end 6 end 3. RESULTS AND ANALYSIS The proposed method is implemented in 1199 cases in event log. The event log has many various of attribute in parameter like amount, stackType, status, and times as in Table 1. From the 1199 case activity, the results of checking using the proposed method can be seen in Figure 3. From Figure 3 (a) having the sequence of events A → C → D → E → F → H is the sequence of events that are wrong based on the parameters and based on the order of non-free choice. Case_ID PP10 has several parameters, which value of parameter status is complete and in parameter amount has 3. In Figure 3 (a) shows after activity A goes to activity C is a correct but wrong decision after activity E goes to activity F. Figure 3 (b) has the order of events A → C → D → E → G → H is the sequence of events incorrectly based on parameters due to incomplete and amount 7 status parameters. In decision parameters obtained from decision mining requires that it can pass activity C then conditions fulfilled ((status = complete AND amount 8.5) OR (status = incomplete AND amount > 9)) and conditions for passing activity G must meet the requirements ((status = complete AND amount 8.5) OR (status = incomplete AND amount > 9)). However, when viewed based on the order non-free choice is correct. Figure 3 (c) has the sequence of events A → B → D → E → G → H is the sequence of events that are wrong based on the parameters and based on the order of non-free choice. Case_ID PP735 has several parameters, which value of parameter status is incomplete and in parameter amount has 13. In Figure 3 (a) shows after activity A goes to activity B is a correct but wrong decision after activity E goes to activity G. Figure 3 (d) has the order of events A → B → D → E → F → H is the sequence of events wrong based on parameters because complete status parameters and amount 3. In the decision parameters obtained from decision mining requires that it can pass activity B then the conditions fulfilled ((status = complete AND amount > 8.5) OR (status = incomplete AND amount 9)) and the condition for passing activity F must meet the requirements ((status = complete AND amount > 8.5) OR (status = incomplete AND amount 9)) . However, when viewed based on the order non-free choice is correct. Accuracy of the existing method shows 900 case activity in 𝑇𝑃, 188 case activity in 𝑇𝑁, 111 case activity in 𝐹𝑃 dan zero activity in 𝐹𝑁. 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 900+188 900+188+111+0 𝑥 100% 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 0.907 𝑥 100% 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 90.7% The accuracy of the parameterize decision mining shows 900 case activity in 𝑇𝑃, 299 case activity in 𝑇𝑁, zero case activity in 𝐹𝑃 dan zero activity in 𝐹𝑁. 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 900+299 900+299+0+0 𝑥 100%
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 1, February 2020: 106 - 113 112 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 1 𝑥 100% 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 100% Figure 3. The result of the process which contains wrong indirect relationship in Case_ID: (a) PP10, (b) PP412, (c) PP735, and (d) PP1050 4. CONCLUSION The decision mining overcomes the correct flow in a direction but not in a parameterize direction. The parameterized decision mining considers parameters in the selection of grooves. This paper proposes a combination of parameterized decision mining and relation sequences to detect the direction and correctness. Firstly, discovering a graph process model based on the event log. Then, an analysis of the graph process model obtains decision points. The process of each decision point is using parameterized decision mining, so that decision rules are formed. The derived decision rules are used as parameters of checking wrong indirect relationship in the non-free choice. The accuracy of the parameterized decision mining reaches 100%. It means the proposed method can detect errors far more precisely than the existing method only get 90.7% accuracy. REFERENCES [1] Tax N., Sidorova N., Van Der Aalst W. M. P., "Discovering more precise process models from event logs by filtering out chaotic activities," Journal of Intelligent Information Systems, vol. 52, no. 1, pp. 107–139, 2019. [2] Van Der Aalst W. M. P., "Decomposing Petri nets for process mining: A generic approach," Distributed and Parallel Databases, vol. 31, no. 4, pp. 471–507, 2013. [3] Aleem S., Fernando Capretz L., Ahmed F., "Business Process Mining Approaches: A Relative Comparison," International Journal of Science, Technology & Management, vol. 4, no. 1, pp. 1557–1564, 2015. [4] Van der Aalst W., "Process Discovery: An Introduction," Process Mining-Springer, pp. 125–156, 2011. [5] Rozinat A, Van der Aalst W. M. P., "Decision Mining in ProM," International Conference on Business Process Management, pp. 420–425, 2006. [6] Horita H., Hirayama H., Hayase T., Tahara Y, Ohsuga A., "Process mining approach based on partial structures of event logs and decision tree learning," Proceedings - 2016 5th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI, 2016. [7] Wen L., Wang J., Sun J., "Detecting implicit dependencies between tasks from event logs," Asia-Pacific Web Conference, pp. 591–603, 2006. [8] Van Der Aalst W. M. P., De Medeiros A. K. A., "Process mining and security: Detecting anomalous process executions and checking process conformance," Electronic Notes in Theoretical Computer Science, vol. 121, pp. 3-21, 2005. [9] Sungkono K. R., Sarno R., "Constructing control-flow patterns containing invisible task and non-free choice based on declarative model," International Journal of Innovative Computing, Information and Control, vol. 14, no. 4, pp. 1285-1299, 2018. [10] Wen L., Van Der Aalst W. M. P., Wang J., Sun J., "Mining process models with non-free-choice constructs," Data Mining and Knowledge Discovery, vol. 15, no. 2, pp. 145–180, 2007. [11] Kalynychenko O., Chalyi S., Bodyanskiy Y., Golian V., Golian N., "Implementation of search mechanism for implicit dependences in process mining," Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013. [12] Van Der Aalst W. M. P., De Beer H. T., Van Dongen B. F., "Process Mining and Verification of Properties: An Approach based on Temporal Logic," Proceedings of the 2005 Confederated International Conference on On the Move to Meaningful Internet Systems, pp. 130–147, 2005.
  • 8. TELKOMNIKA Telecommun Comput El Control  Graph-based algorithm for checking wrong indirect relationships in non-free choice (Agung Wiratmo) 113 [13] Chabrol M., Dalmas B., Norre S., Rodier S., "A process tree-based algorithm for the detection of implicit dependencies," 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), 2016. [14] Joishi J., Sureka A., "Graph or Relational Databases: A Speed Comparison for Process Mining Algorithm," ArXiv, 2016. [15] Kushwaha A., Pandey R.S., "A Graph Based Approach To Identify Objects Using Identifying Attribute," Indonesian Journal of Electrical Engineering and Computer Science, vol. 6, no. 2, pp. 438-446, 2017. [16] Patil N. S., Kiran P., Kiran N. P., Naresh P. K. M., "A Survey on Graph Database Management Techniques for Huge Unstructured Data," International Journal of Electrical and Computer Engineering, vol. 8, no. 2, pp. 1140-1149, 2018. [17] Sarno R., Sungkono K., Johanes R., Sunaryono D., "Graph-Based Algorithms for Discovering a Process Model Containing Invisible Tasks," International Journal of Intelligent Engineering and Systems, vol. 12, no. 2, pp. 85-94, 2019. [18] Iwasaki K., Kuriyama Y., Kondoh S., Shirayori A., "Structuring engineers’ implicit knowledge of forming process design by using a graph model," Procedia CIRP, vol. 67, pp. 563–568, 2018. [19] Chapela-Campa D., Mucientes M., Lama M., "Mining Frequent Patterns in Process Models," Information Sciences, vol. 472, pp. 235–257, 2019. [20] Caesarita Y., Sarno R., Sungkono K. R., "Identifying bottlenecks and fraud of business process using alpha ++ and heuristic miner algorithms (Case study: CV. Wicaksana Artha)," 2017 11th International Conference on Information & Communication Technology and System, 2017. [21] Bolt A., de Leoni M., van der Aalst W. M. P., "Process variant comparison: Using event logs to detect differences in behavior and business rules," Information Systems, vol. 74, pp. 53–66, 2018. [22] Dakic D., Stefanovic D., "Business Process Mining Application: A Literature Review," Proceedings of the 29th International DAAAM Symposium, pp. 0866–0875, 2018. [23] Rezaiee A. M., Karimi A., "A New Dynamic Intelligent Model to Determine Reliability and Trust of Online Banking by Using Fuzzy C-Mean," Indonesian Journal of Electrical Engineering and Computer Science, vol. 4, no. 3, pp. 605-610, 2016. [24] Ait-Mlouk A., Agouti T., Gharnati F., "Mining and prioritization of association rules for big data: multi-criteria decision analysis approach," Journal of Big Data, vol. 4, no. 42, pp. 1-21, 2017. [25] Mannhardt F., De Leoni M., Reijers H. A., Van Der Aalst W. M. P., "Decision Mining Revisited-Discovering Overlapping Rules," International Conference on Advanced Information Systems Engineering, pp. 377-392, 2016. [26] Singh D., Choudhary N., Samota J., "Analysis of Data Mining Classification with Decision tree Technique," Global Journals Inc. (USA), vol. 13, pp. 1-5, 2013. [27] Bombara G., Vasile C-I, Penedo F., Yasuoka H., Belta C., "A Decision Tree Approach to Data Classification using Signal Temporal Logic," Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control - HSCC ’16, 2016. [28] Saettler A., Laber E, de A., Mello Pereira F., "Decision tree classification with bounded number of errors," Information Processing Letters, vol. 127, pp. 27-31, 2017. [29] Cardoso J., "Business Process Control-Flow Complexity: Metric, Evaluation, and Validation," International Journal of Web Services Research, vol. 5, no. 2, pp. 49-76, 2008. [30] Lim H. W., Kerschbaum F., Wang H., "Workflow Signatures for Business Process Compliance," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5, pp. 756-769, 2012.