SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 3 Issue 4 ǁ April 2014 ǁ PP.47-49
www.ijesi.org 47 | Page
Analysis of process mining model for label splitting problem
V.Priyadharshini1
A.Malathi2
1
(Ph.D. Research Scholar, PG & Research Department of CS, Govt. Arts College, Coimbatore – 18,
2
(Assistant Professor, PG & Research Department of CS, Govt. Arts College, Coimbatore – 18,
ABSTRACT: Process mining is a process management system that analyzes business processes builtusing
event logs. The information is extracted from event logs by using knowledge retrieval techniques. The process
mining algorithms are capable of inevitably discover models to give details of all the events registered in some
log traces provided as input. The theory of regions is a valuable tool in process discovery: it aims at learning a
formal model (Petri nets) from a set of traces. The foremost objective of this paper is to propose new concept for
label splitting. The experiment is done based on standard bench mark dataset HELIX and RALIC datasets. The
performance of the proposed system is better than other existing methods.
KEYWORDS: HELIX Dataset, Label splitting, Process Discovery, Process Mining, and RALIC Dataset.
I. INTRODUCTION
Process discovery is one of the most challenging process mining tasks. Based on event log, a process
model is constructed by capturing the behavior of the log [1]. Event logs essentially capture the business
activities happened at a certain time period [2]. The basic plan is to extract data from event logs recorded by a
data system. The method mining aims at rising this by providing techniques and tools for locating method,
control, data, structure, and social structures from event logs. The research domain that is concerned with
knowledge discovery from event logs is called process mining [3]. More traditional data mining techniques can
be used in process mining. New techniques are developed to perform process mining i.e. mining of process
models. It is the traditional analysis of business processes based on the opinion of process expert [4]. The
business process mining attempts to reconstruct a complete process model from data logs that contain real
process execution data [5]. Many techniques highlight the possibility of combining a number of process mining
approaches to mine more stimulating event logs, such as those that contain noise.
Petri nets are a widespread formalism to model concurrent systems. By labeling transitions with
symbols from a given alphabet, transitions can be interpreted as the occurrence of events or the execution of
tasks in a system [9]. Labeled Petri Nets have been used in numerous applications: design and specifications of
asynchronous circuits, resource allocation in operating systems and distributed computation, analysis of
concurrent programs, performance analysis and timing verification and high-level design. Petri Nets are popular
due to their inherent ability to express concurrency, choice and causality between events in a system, without
explicit enumeration of global states. Although checking properties of Petri Nets could be difficult in general,
for some subclasses of Petri Nets there are efficient verification algorithms [10]. In this paper, we will deal with
safe Petri Nets. Safe nets have high expressive power; in particular every finite state system can be expressed as
a safe labeled PN. On the other hand, safe nets are also well suited for verification.
The necessary background in Section II describes related work. Section III presents existing ECTS
algorithm that describes previous work done. Section IV describes the proposed implemented work. The result
and discussion is presented in Section V. Conclusion and future work is discussed in Section VI.
II. RELATED WORK
In [6] J. Carmona et al describes the label splitting problemto find an optimal sequence of splitting’s
that induces the minimal number of transitions in the derived Petrinets. It isdefined on the sets of states
computed when searching for regions in state-basedsynthesis methods. In [7] J. Cortadella et al describehow
label splitting for excitation closure is done by computing the optimal coloring of a graph, i.e., the chromatic
number. In[8] the author J. Carmona definesthe conditions under which an optimal label splitting can be derived
to accomplish excitation closure.
Analysis of process mining model for label splitting problem
www.ijesi.org 48 | Page
III. ECTS ALGORITHM
Non – minimal regions can be removed from a state in TS to derive a state in the reachability graph of
the synthesized net. The ECTS ensures that this preserves the transition in both transition systems. Based on
this, a dissimulation is defined between the states of TS and states of reachability graph of Petrinets. The
algorithm is complete if excitation closure holds the initial transition system and a set of minimal region to
derive a Petrinets.
IV. PROPOSED SYSTEM
This work is applying label splitting is a technique that is used to improve the visualization of the PN,
it is also used to avoiding over generalization. In some cases the derived Petri net equivalent to the initial
transition system is required. This cannot be always accomplished. We solve this problem by defining a
property excitation closure that TS must satisfy in order to derive a PN with bi-similar behavior. A label
splitting technique is presented here is used to repair excitation closure violations in a Transition system [11].
This allows to present a method for obtain bi-similar k-bounded PNs; excitation closure is used to reduce the
number of necessary regions while preserving the properties in the derived net.
Two open problems are formulated in the previous work,
1) If the existence of an optimal net can be characterized in terms of the TSs and
2) If there exist at most one optimal net which could be considered canonical.
Our work gives a positive answer to the first problem and a negative answer to the second problem.
 They did not address the problem of merging and splitting “equivalent” labels, which model the same
event, but must be split in order to yield a valid or/and efficient Petri Net. We, for the first time, provide a
method for label splitting which seems to satisfactorily solve the problem [13].
 They were inadequate to elementary TSs, which are moderately restricted, while we can handle the full
class of TSs by means of transition splitting.
 They produce a PN with an RG isomorphic to the TS, which appears to be too strong a degree of
correspondence. Our method extends this result to excitation closed TSs (ECTS), which include not only
Elementary Transition Systems (ETS)s, but also all those TSs that have dissimilarETS.
4.1 Steps for synthesis of PNs from TSs
 Initially, the labels of TS are split to obtain a split-morphic ECTS. Next, all minimal pre-regions that are
predecessors of some event are generated to derive a minimal saturated PN. This restriction to event
predecessors only is due to our region generation mechanism and has been shown to be sufficient in
practice to obtain good results using a reasonable amount of computation time [14].
 Then, an irredundant subset of pre-regions is calculated and a place-irredundant PN obtained.
 Finally, by merging minimal pre-regions, further minimization of regions can be obtained. Exploring all
place-irredundant nets can be computationally very expensive. Hence, we use only a greedy place
merging starting from a place-irredundant net, thus yielding a quasi-place-minimal PN [12].
The function generate_min_preregions generates all minimal preregions for one event. The function
find_irredundant_cover produces an irredundant set of regions. From this set, a place-irredundant net is
generated. The function split_labels performs the splitting of labels if the initial TS are not an ECTS. The
function map_to_PN is the final step for constructing a PN from the set of regions.
4.2 Datasets
Helix and RALIC datasets is a compilation of release histories of a number of non-trivial Java Open
Source Software System. It contains class files for each release of the system along with meta-data. A metric
history is derived from extraction of releases and this data is directly used in research works.
V. RESULT AND DISCUSSION
In the work helix and RALIC dataset are used for the experiment. By using proposed label splitting in
this system, we obtain the high fitness value. So the effective performance is obtained comparatively. The
experiment is based on fitness value calculation and fraction of unconnected transitions (Tu). The second
experiment is based on fraction of unconnected transitions (Tu), we calculate the Tu corresponding to existing
and proposed approaches. The Tu is decreased for the proposed label splitting technique. This will also increase
the performance of the proposed system compared to existing system. Finally we can conclude as the proposed
label splitting approach has more effective than the existing system.
Analysis of process mining model for label splitting problem
www.ijesi.org 49 | Page
Fig.1 Positive and Negative Fitness value
VI. CONCLUSION AND FUTURE WORK
In this work both positive and negative value are obtained using the proposed algorithm, which shows
performance of proposed system. The datasets were used with real time events for unconnected transitions and
the result is shown. In future, we will look for improvements of the existing process discovery and visualization
techniques that allow for the construction of comprehensible models based on realistic characteristics of an
event logs.
REFERENCES
[1] Aalst, W.M.P.v.d., et al.,” Workflow Mining: Discovering Process Models from Event Logs”. IEEE Transactions on Knowledge
and Data Engineering, 16(9), 2004, 1128–1142.
[2] S.J.J.Leemans et al, “Discovering block-structured process models from event logs- A constructive approach”.
[3] Joonsoo Bae et al, “Development of distance measures for process mining, discovery and integration” International journal of
web services research, 10(10), 2010.
[4] Process Mining Manifesto. IEEE Task Force on Process Mining.
[5] Arya Adriansyah, Peter van den brand et al, “Process mining manifesto”, Business process management, 99, 2012, 169-194.
[6] J. Carmona, J. Cortadella, M. Kishinevsky,“New region-based algorithms forderiving bounded Petri nets”, IEEE Transactions on
Computers, 59(3), 2009,371–384.
[7] J. Cortadella, M. Kishinevsky, L. Lavagno, A. Yakovlev,“Deriving Petri netsfrom finite transition systems”, IEEE Transactions
on Computers, 47(8), 1998,859–882.
[8] The Label Splitting Problem, J. Carmona
[9] A. A. Kalenkova and I. A. Lomazova, “Discovery of Cancellation Regions withinProcess Mining Techniques”.
[10] J. Carmona, J. Cortadella, M. Kishinevsky, “A Region-based Algorithm for DiscoveringPetri Nets from Event Logs”, 2009.
[11] Jianmin Wang, Tengfei He, Lijie Wen, Nianhua Wu et al, “A Behavioral Similarity Measure betweenLabeled Petri Nets Based
on PrincipalTransition Sequences”, 2009.
[12] Wil M.P. van der Aalst, “Decomposing Petri Nets for Process Mining - A Generic Approach”, Technical Report, BPM Center,
2012.
[13] Wil M.P. van der Aalst, V. Rubin et al, “Process Mining: A Two-Step Approach usingTransition Systems and Regions”, 2006.
[14] W.M.P. van der Aalst, H.A. Reijers, M. Song,“Discovering Social Networksfrom Event Logs”, Computer Supported Cooperative
work, 14(6), 2005, 549–593.

Weitere ähnliche Inhalte

Was ist angesagt?

Integration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisIntegration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysis
Patricia Tavares Boralli
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
neeraj7svp
 
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
acijjournal
 

Was ist angesagt? (20)

SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
 
Entropy 12-02268-v2
Entropy 12-02268-v2Entropy 12-02268-v2
Entropy 12-02268-v2
 
50120140503004
5012014050300450120140503004
50120140503004
 
Integration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisIntegration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysis
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
Applications and Analysis of Bio-Inspired Eagle Strategy for Engineering Opti...
 
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) ToolsAn Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document Clustering
 
Ay4201347349
Ay4201347349Ay4201347349
Ay4201347349
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming data
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
 
Final proj 2 (1)
Final proj 2 (1)Final proj 2 (1)
Final proj 2 (1)
 
Ju3517011704
Ju3517011704Ju3517011704
Ju3517011704
 
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
 
Job Scheduling on the Grid Environment using Max-Min Firefly Algorithm
Job Scheduling on the Grid Environment using Max-Min  Firefly AlgorithmJob Scheduling on the Grid Environment using Max-Min  Firefly Algorithm
Job Scheduling on the Grid Environment using Max-Min Firefly Algorithm
 
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
 
A Template Matching Approach to Classification of QAM Modulation using Geneti...
A Template Matching Approach to Classification of QAM Modulation using Geneti...A Template Matching Approach to Classification of QAM Modulation using Geneti...
A Template Matching Approach to Classification of QAM Modulation using Geneti...
 
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data sets
 
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
ICFHR 2014 Competition on Handwritten KeyWord Spotting (H-KWS 2014)
 

Ähnlich wie I0343047049

Progressive Duplicate Detection
Progressive Duplicate DetectionProgressive Duplicate Detection
Progressive Duplicate Detection
1crore projects
 
accessible-streaming-algorithms
accessible-streaming-algorithmsaccessible-streaming-algorithms
accessible-streaming-algorithms
Farhan Zaki
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Problems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor SystemProblems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor System
ijtsrd
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel based
IJITCA Journal
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
Richard Ashworth
 

Ähnlich wie I0343047049 (20)

Optimal buffer allocation in
Optimal buffer allocation inOptimal buffer allocation in
Optimal buffer allocation in
 
USE OF ADAPTIVE COLOURED PETRI NETWORK IN SUPPORT OF DECISIONMAKING
USE OF ADAPTIVE COLOURED PETRI NETWORK IN SUPPORT OF DECISIONMAKINGUSE OF ADAPTIVE COLOURED PETRI NETWORK IN SUPPORT OF DECISIONMAKING
USE OF ADAPTIVE COLOURED PETRI NETWORK IN SUPPORT OF DECISIONMAKING
 
Progressive Duplicate Detection
Progressive Duplicate DetectionProgressive Duplicate Detection
Progressive Duplicate Detection
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithm
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot net
 
accessible-streaming-algorithms
accessible-streaming-algorithmsaccessible-streaming-algorithms
accessible-streaming-algorithms
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique Algorithms
 
Survey on Efficient Techniques of Text Mining
Survey on Efficient Techniques of Text MiningSurvey on Efficient Techniques of Text Mining
Survey on Efficient Techniques of Text Mining
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
Novel Scheme for Minimal Iterative PSO Algorithm for Extending Network Lifeti...
Novel Scheme for Minimal Iterative PSO Algorithm for Extending Network Lifeti...Novel Scheme for Minimal Iterative PSO Algorithm for Extending Network Lifeti...
Novel Scheme for Minimal Iterative PSO Algorithm for Extending Network Lifeti...
 
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
 
Problems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor SystemProblems in Task Scheduling in Multiprocessor System
Problems in Task Scheduling in Multiprocessor System
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel based
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
 
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 
Gk3611601162
Gk3611601162Gk3611601162
Gk3611601162
 
A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

I0343047049

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 3 Issue 4 ǁ April 2014 ǁ PP.47-49 www.ijesi.org 47 | Page Analysis of process mining model for label splitting problem V.Priyadharshini1 A.Malathi2 1 (Ph.D. Research Scholar, PG & Research Department of CS, Govt. Arts College, Coimbatore – 18, 2 (Assistant Professor, PG & Research Department of CS, Govt. Arts College, Coimbatore – 18, ABSTRACT: Process mining is a process management system that analyzes business processes builtusing event logs. The information is extracted from event logs by using knowledge retrieval techniques. The process mining algorithms are capable of inevitably discover models to give details of all the events registered in some log traces provided as input. The theory of regions is a valuable tool in process discovery: it aims at learning a formal model (Petri nets) from a set of traces. The foremost objective of this paper is to propose new concept for label splitting. The experiment is done based on standard bench mark dataset HELIX and RALIC datasets. The performance of the proposed system is better than other existing methods. KEYWORDS: HELIX Dataset, Label splitting, Process Discovery, Process Mining, and RALIC Dataset. I. INTRODUCTION Process discovery is one of the most challenging process mining tasks. Based on event log, a process model is constructed by capturing the behavior of the log [1]. Event logs essentially capture the business activities happened at a certain time period [2]. The basic plan is to extract data from event logs recorded by a data system. The method mining aims at rising this by providing techniques and tools for locating method, control, data, structure, and social structures from event logs. The research domain that is concerned with knowledge discovery from event logs is called process mining [3]. More traditional data mining techniques can be used in process mining. New techniques are developed to perform process mining i.e. mining of process models. It is the traditional analysis of business processes based on the opinion of process expert [4]. The business process mining attempts to reconstruct a complete process model from data logs that contain real process execution data [5]. Many techniques highlight the possibility of combining a number of process mining approaches to mine more stimulating event logs, such as those that contain noise. Petri nets are a widespread formalism to model concurrent systems. By labeling transitions with symbols from a given alphabet, transitions can be interpreted as the occurrence of events or the execution of tasks in a system [9]. Labeled Petri Nets have been used in numerous applications: design and specifications of asynchronous circuits, resource allocation in operating systems and distributed computation, analysis of concurrent programs, performance analysis and timing verification and high-level design. Petri Nets are popular due to their inherent ability to express concurrency, choice and causality between events in a system, without explicit enumeration of global states. Although checking properties of Petri Nets could be difficult in general, for some subclasses of Petri Nets there are efficient verification algorithms [10]. In this paper, we will deal with safe Petri Nets. Safe nets have high expressive power; in particular every finite state system can be expressed as a safe labeled PN. On the other hand, safe nets are also well suited for verification. The necessary background in Section II describes related work. Section III presents existing ECTS algorithm that describes previous work done. Section IV describes the proposed implemented work. The result and discussion is presented in Section V. Conclusion and future work is discussed in Section VI. II. RELATED WORK In [6] J. Carmona et al describes the label splitting problemto find an optimal sequence of splitting’s that induces the minimal number of transitions in the derived Petrinets. It isdefined on the sets of states computed when searching for regions in state-basedsynthesis methods. In [7] J. Cortadella et al describehow label splitting for excitation closure is done by computing the optimal coloring of a graph, i.e., the chromatic number. In[8] the author J. Carmona definesthe conditions under which an optimal label splitting can be derived to accomplish excitation closure.
  • 2. Analysis of process mining model for label splitting problem www.ijesi.org 48 | Page III. ECTS ALGORITHM Non – minimal regions can be removed from a state in TS to derive a state in the reachability graph of the synthesized net. The ECTS ensures that this preserves the transition in both transition systems. Based on this, a dissimulation is defined between the states of TS and states of reachability graph of Petrinets. The algorithm is complete if excitation closure holds the initial transition system and a set of minimal region to derive a Petrinets. IV. PROPOSED SYSTEM This work is applying label splitting is a technique that is used to improve the visualization of the PN, it is also used to avoiding over generalization. In some cases the derived Petri net equivalent to the initial transition system is required. This cannot be always accomplished. We solve this problem by defining a property excitation closure that TS must satisfy in order to derive a PN with bi-similar behavior. A label splitting technique is presented here is used to repair excitation closure violations in a Transition system [11]. This allows to present a method for obtain bi-similar k-bounded PNs; excitation closure is used to reduce the number of necessary regions while preserving the properties in the derived net. Two open problems are formulated in the previous work, 1) If the existence of an optimal net can be characterized in terms of the TSs and 2) If there exist at most one optimal net which could be considered canonical. Our work gives a positive answer to the first problem and a negative answer to the second problem.  They did not address the problem of merging and splitting “equivalent” labels, which model the same event, but must be split in order to yield a valid or/and efficient Petri Net. We, for the first time, provide a method for label splitting which seems to satisfactorily solve the problem [13].  They were inadequate to elementary TSs, which are moderately restricted, while we can handle the full class of TSs by means of transition splitting.  They produce a PN with an RG isomorphic to the TS, which appears to be too strong a degree of correspondence. Our method extends this result to excitation closed TSs (ECTS), which include not only Elementary Transition Systems (ETS)s, but also all those TSs that have dissimilarETS. 4.1 Steps for synthesis of PNs from TSs  Initially, the labels of TS are split to obtain a split-morphic ECTS. Next, all minimal pre-regions that are predecessors of some event are generated to derive a minimal saturated PN. This restriction to event predecessors only is due to our region generation mechanism and has been shown to be sufficient in practice to obtain good results using a reasonable amount of computation time [14].  Then, an irredundant subset of pre-regions is calculated and a place-irredundant PN obtained.  Finally, by merging minimal pre-regions, further minimization of regions can be obtained. Exploring all place-irredundant nets can be computationally very expensive. Hence, we use only a greedy place merging starting from a place-irredundant net, thus yielding a quasi-place-minimal PN [12]. The function generate_min_preregions generates all minimal preregions for one event. The function find_irredundant_cover produces an irredundant set of regions. From this set, a place-irredundant net is generated. The function split_labels performs the splitting of labels if the initial TS are not an ECTS. The function map_to_PN is the final step for constructing a PN from the set of regions. 4.2 Datasets Helix and RALIC datasets is a compilation of release histories of a number of non-trivial Java Open Source Software System. It contains class files for each release of the system along with meta-data. A metric history is derived from extraction of releases and this data is directly used in research works. V. RESULT AND DISCUSSION In the work helix and RALIC dataset are used for the experiment. By using proposed label splitting in this system, we obtain the high fitness value. So the effective performance is obtained comparatively. The experiment is based on fitness value calculation and fraction of unconnected transitions (Tu). The second experiment is based on fraction of unconnected transitions (Tu), we calculate the Tu corresponding to existing and proposed approaches. The Tu is decreased for the proposed label splitting technique. This will also increase the performance of the proposed system compared to existing system. Finally we can conclude as the proposed label splitting approach has more effective than the existing system.
  • 3. Analysis of process mining model for label splitting problem www.ijesi.org 49 | Page Fig.1 Positive and Negative Fitness value VI. CONCLUSION AND FUTURE WORK In this work both positive and negative value are obtained using the proposed algorithm, which shows performance of proposed system. The datasets were used with real time events for unconnected transitions and the result is shown. In future, we will look for improvements of the existing process discovery and visualization techniques that allow for the construction of comprehensible models based on realistic characteristics of an event logs. REFERENCES [1] Aalst, W.M.P.v.d., et al.,” Workflow Mining: Discovering Process Models from Event Logs”. IEEE Transactions on Knowledge and Data Engineering, 16(9), 2004, 1128–1142. [2] S.J.J.Leemans et al, “Discovering block-structured process models from event logs- A constructive approach”. [3] Joonsoo Bae et al, “Development of distance measures for process mining, discovery and integration” International journal of web services research, 10(10), 2010. [4] Process Mining Manifesto. IEEE Task Force on Process Mining. [5] Arya Adriansyah, Peter van den brand et al, “Process mining manifesto”, Business process management, 99, 2012, 169-194. [6] J. Carmona, J. Cortadella, M. Kishinevsky,“New region-based algorithms forderiving bounded Petri nets”, IEEE Transactions on Computers, 59(3), 2009,371–384. [7] J. Cortadella, M. Kishinevsky, L. Lavagno, A. Yakovlev,“Deriving Petri netsfrom finite transition systems”, IEEE Transactions on Computers, 47(8), 1998,859–882. [8] The Label Splitting Problem, J. Carmona [9] A. A. Kalenkova and I. A. Lomazova, “Discovery of Cancellation Regions withinProcess Mining Techniques”. [10] J. Carmona, J. Cortadella, M. Kishinevsky, “A Region-based Algorithm for DiscoveringPetri Nets from Event Logs”, 2009. [11] Jianmin Wang, Tengfei He, Lijie Wen, Nianhua Wu et al, “A Behavioral Similarity Measure betweenLabeled Petri Nets Based on PrincipalTransition Sequences”, 2009. [12] Wil M.P. van der Aalst, “Decomposing Petri Nets for Process Mining - A Generic Approach”, Technical Report, BPM Center, 2012. [13] Wil M.P. van der Aalst, V. Rubin et al, “Process Mining: A Two-Step Approach usingTransition Systems and Regions”, 2006. [14] W.M.P. van der Aalst, H.A. Reijers, M. Song,“Discovering Social Networksfrom Event Logs”, Computer Supported Cooperative work, 14(6), 2005, 549–593.