2019
DOI: 10.22266/ijies2019.0430.09
|View full text |Cite
|
Sign up to set email alerts
|

Graph-Based Algorithms for Discovering a Process Model Containing Invisible Tasks

Abstract: An event log records the business processes of a company. Modeling event logs aim to help users in analyzing business processes. One of the problems in modeling event logs automatically is the addition of invisible tasks. Invisible tasks are dummy activities, other than activities of an event log, that are added to a process model to describe a correct process model. This research proposes a graph-based algorithm to mine the data from an event log. From the data, the graph-based algorithm establishes an additi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…The complete SOP can be used as a reference to detect anomalies in a running process and existing data that may contain fraud. Analyzing the anomalies in a business process can be done using process mining techniques [18][19][20][21][22].…”
Section: Types Of Fraudmentioning
confidence: 99%
“…The complete SOP can be used as a reference to detect anomalies in a running process and existing data that may contain fraud. Analyzing the anomalies in a business process can be done using process mining techniques [18][19][20][21][22].…”
Section: Types Of Fraudmentioning
confidence: 99%
“…The discovered model can be beneficial, starting from inspection and finding valuable insights to observing the conformance with the reference model. Several methods are known for discovering business process models from event logs, including alpha miner [2], heuristic miner [3], inductive miner [4], fuzzy miner [5], split miner [6,7], and graphbased miner [8,9]. Graph-based miner algorithms outperform others in lower time complexity [10].…”
Section: Introductionmentioning
confidence: 99%
“…In previous graph-based miner studies, several algorithms have been introduced to find process models, including detecting parallel processes [8,11], recognize and insert the invisible task [9], and discovering Non-free Choice [14].…”
Section: Introductionmentioning
confidence: 99%
“…The algorithms of process discovery have been developed rapidly to discover several types of relations [8][9][10][11][12][13]. Table 1 describes the existing algorithms which can discover types of relations depicted by the columns.…”
Section: Introductionmentioning
confidence: 99%
“…Existing graph-based process discovery methods [13,[20][21][22] do not directly interact with the system, so those methods import the event log of the system and convert the log to graph-database. The conversion process causes ineffective computing time.…”
Section: Introductionmentioning
confidence: 99%