Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (8): 2527-2536.DOI: 10.11772/j.issn.1001-9081.2022070980
• Computer software technology • Previous Articles Next Articles
					
						                                                                                                                                                                                    Haoyu ZHANG1, Lili WANG1,2( )
)
												  
						
						
						
					
				
Received:2022-07-07
															
							
																	Revised:2022-12-12
															
							
																	Accepted:2022-12-13
															
							
							
																	Online:2023-01-15
															
							
																	Published:2023-08-10
															
							
						Contact:
								Lili WANG   
													About author:ZHANG Haoyu, born in 1998, M. S. candidate. His research interests include Petri nets, model repair.				
													Supported by:通讯作者:
					王丽丽
							作者简介:张昊宇(1998—),男,安徽合肥人,硕士研究生,主要研究方向:Petri网、模型修复;
				
							基金资助:CLC Number:
Haoyu ZHANG, Lili WANG. Model repair method based on behavioral profile and logical Petri nets[J]. Journal of Computer Applications, 2023, 43(8): 2527-2536.
张昊宇, 王丽丽. 基于行为轮廓和逻辑Petri网的模型修复方法[J]. 《计算机应用》唯一官方网站, 2023, 43(8): 2527-2536.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022070980
| 迹 | CBC | MBC | 
|---|---|---|
| 1.00 | 1.00 | |
| 1.00 | 1.00 | |
| 0.76 | 0.78 | 
Tab. 2 Compliance results of Log1
| 迹 | CBC | MBC | 
|---|---|---|
| 1.00 | 1.00 | |
| 1.00 | 1.00 | |
| 0.76 | 0.78 | 
| 迹 | CBC | MBC | 迹 | CBC | MBC | 
|---|---|---|---|---|---|
| 1.00 | 1.00 | 0.83 | 0.84 | ||
| 1.00 | 1.00 | 0.83 | 0.84 | 
Tab. 3 Compliance results of Log2
| 迹 | CBC | MBC | 迹 | CBC | MBC | 
|---|---|---|---|---|---|
| 1.00 | 1.00 | 0.83 | 0.84 | ||
| 1.00 | 1.00 | 0.83 | 0.84 | 
| 迹 | 服从度违反三元组 | 
|---|---|
| (j,m, (n,k,+) | |
| (j,k, (n,l,+) | 
Tab. 4 σ5 and σ6 non-conformance feedback
| 迹 | 服从度违反三元组 | 
|---|---|
| (j,m, (n,k,+) | |
| (j,k, (n,l,+) | 
| 迹 | CBC | MBC | 
|---|---|---|
| 1.00 | 1.00 | |
| 1.00 | 1.00 | |
| 1.00 | 1.00 | |
| 0.84 | 0.84 | 
Tab. 5 Compliance results of Log3
| 迹 | CBC | MBC | 
|---|---|---|
| 1.00 | 1.00 | |
| 1.00 | 1.00 | |
| 1.00 | 1.00 | |
| 0.84 | 0.84 | 
| 迹 | MCC | 
|---|---|
| 0.80 | |
| 0.80 | 
Tab. 6 MCC results of some non-conformance traces inLog3
| 迹 | MCC | 
|---|---|
| 0.80 | |
| 0.80 | 
| 迹 | 服从度违反三元组 | 
|---|---|
| (a,g, | |
| (a,f, | |
| (a,f,→),(f,g,→),(f,a,→ -1),(g,f,→ -1) | 
Tab. 7 Non-conformance feedback of σ7 - σ9 in Log3
| 迹 | 服从度违反三元组 | 
|---|---|
| (a,g, | |
| (a,f, | |
| (a,f,→),(f,g,→),(f,a,→ -1),(g,f,→ -1) | 
| 1 | FAHLAND D, W M P van der AALST. Model repair — aligning process models to reality[J]. Information Systems, 2015, 47: 220-243. 10.1016/j.is.2013.12.007 | 
| 2 | BUIJS J C A M, B F van DONGEN, W M P van der AALST. On the role of fitness, precision, generalization and simplicity in process discovery[C]// Proceedings of the 2012 OTM Confederated International Conferences "On the Move to Meaningful Internet Systems", LNCS 7565. Berlin: Springer, 2012: 305-322. | 
| 3 | PEGORARO M, UYSAL M S, W M P van der AALST. Conformance checking over uncertain event data[J]. Information Systems, 2021, 102: No.101810. 10.1016/j.is.2021.101810 | 
| 4 | ZHONG H, MEI H. Mining repair model for exception-related bug[J]. Journal of Systems and Software, 2018, 141: 16-31. 10.1016/j.jss.2018.03.046 | 
| 5 | W M P van der AALST. Process discovery from event data: relating models and logs through abstractions[J]. WIREs Data Mining and Knowledge Discovery, 2018, 8(3): No.e1244. 10.1002/widm.1244 | 
| 6 | van DONGEN B, CARMONA J, CHATAIN T, et al. Aligning modeled and observed behavior: a compromise between computation complexity and quality[C]// Proceedings of the 2017 International Conference on Advanced Information Systems Engineering, LNCS 10253. Cham: Springer, 2017: 94-109. | 
| 7 | W van der AALST, ADRIANSYAH A, van DONGEN B. Replaying history on process models for conformance checking and performance analysis[J]. WIREs Data Mining and Knowledge Discovery, 2012, 2(2): 182-192. 10.1002/widm.1045 | 
| 8 | ROZINAT A, W M P van der AALST. Conformance checking of processes based on monitoring real behavior[J]. Information Systems, 2008, 33(1): 64-95. 10.1016/j.is.2007.07.001 | 
| 9 | BLOEMEN V, van ZELST S, W van der AALST, et al. Aligning observed and modelled behaviour by maximizing synchronous moves and using milestones[J]. Information Systems, 2022, 103: No.101456. 10.1016/j.is.2019.101456 | 
| 10 | S J van ZELST, BOLT A, HASSANI M, et al. Online conformance checking: relating event streams to process models using prefix-alignments[J]. International Journal of Data Science and Analytics, 2019, 8(3): 269-284. 10.1007/s41060-017-0078-6 | 
| 11 | SCHUSTER D, S J van ZELST. Online process monitoring using incremental state-space expansion: an exact algorithm[C]// Proceedings of the 2020 International Conference on Business Process Management, LNCS 12168. Cham: Springer, 2020: 147-164. 10.1007/978-3-030-58666-9_9 | 
| 12 | SANI M F, S J van ZELST, W M P van der AALST. Conformance checking approximation using subset selection and edit distance[C]// Proceedings of the 2020 International Conference on Advanced Information Systems Engineering, LNCS 12127. Cham: Springer, 2020: 234-251. | 
| 13 | van der AA H, LEOPOLD H, REIJERS H A. Efficient process conformance checking on the basis of uncertain event-to-activity mappings[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 32(5): 927-940. 10.1109/tkde.2019.2897557 | 
| 14 | ZHANG X, DU Y Y, QI L, et al. An approach for repairing process models based on logic Petri nets[J]. IEEE Access, 2018, 6: 29926-29939. 10.1109/access.2018.2843137 | 
| 15 | XU Y H, DU Y Y, QI L, et al. A logic Petri net-based model repair approach by constructing choice bridges[J]. IEEE Access, 2019, 7: 18531-18545. 10.1109/access.2019.2896079 | 
| 16 | XU Y H, DU Y Y, LUAN W J, et al. Repairing process models with logical concurrent and casual relations via logical Petri nets[J]. IEEE Access, 2018, 6: 56340-56355. 10.1109/access.2018.2872640 | 
| 17 | BAI E J, SU N, LIANG Y, et al. Method for repairing process models with selection structures based on token replay[J]. Computing and Informatics, 2021, 40(2): 446-468. 10.31577/cai_2021_2_446 | 
| 18 | REISSNER D, ARMAS-CERVANTES A, CONFORTI R, et al. Scalable alignment of process models and event logs: an approach based on automata and S-components[J]. Information Systems, 2020, 94: No.101561. 10.1016/j.is.2020.101561 | 
| 19 | KO J, COMUZZI M. Keeping our rivers clean: information-theoretic online anomaly detection for streaming business process events[J]. Information Systems, 2022, 104: No.101894. 10.1016/j.is.2021.101894 | 
| 20 | LEEMANS S J J, W M P van der AALST, BROCKHOFF T, et al. Stochastic process mining: earth movers’ stochastic conformance[J]. Information Systems, 2021, 102: No.101724. 10.1016/j.is.2021.101724 | 
| 21 | HE Z Y, DU Y Y, QI L, et al. A model repair approach based on Petri nets by constructing free-loop structures[J]. IEEE Access, 2019, 7: 24214-24230. 10.1109/access.2019.2899963 | 
| 22 | 盛梦君. 基于行为轮廓的模块化流程模型修复方法[D]. 淮南:安徽理工大学, 2021:28-44. 10.3969/j.issn.1672-1098.2021.02.013 | 
| SHENG M J. Modular process model repair method based on behavioral profile[D]. Huainan: Anhui University of Science and Technology, 2021:28-44. 10.3969/j.issn.1672-1098.2021.02.013 | |
| 23 | FAHLAND D, W M P van der AALST. Repairing process models to reflect reality[C]// Proceedings of the 2012 International Conference on Business Process Management, LNCS 7481. Berlin: Springer, 2012: 229-245. | 
| 24 | POLYVYANYY A, W M P van der AALST, HOFSTEDE A H M T, et al. Impact-driven process model repair[J]. ACM Transactions on Software Engineering and Methodology, 2016, 25(4): No.28. 10.1145/2980764 | 
| 25 | DIEDRICH F, JANSEN K. Improved approximation algorithms for scheduling with fixed jobs[C]// Proceedings of the 2009 20th Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, PA: SIAM, 2009: 675-684. 10.1137/1.9781611973068.74 | 
| 26 | W M P van der AALST. Making work flow: on the application of petri nets to business process management[C]// Proceedings of the 2002 International Conference on Application and Theory of Petri Nets, LNCS 2360. Berlin: Springer, 2002: 1-22. | 
| 27 | WEIDLICH M, POLYVYANYY A, DESAI N, et al. Process compliance analysis based on behavioural profiles[J]. Information Systems, 2011, 36(7): 1009-1025. 10.1016/j.is.2011.04.002 | 
| 28 | WANG Z, LUAN W J, DU Y Y, et al. Composition and application of extended colored logic Petri nets to E-commerce systems[J]. IEEE Access, 2020, 8: 36386-36397. 10.1109/access.2020.2974883 | 
| 29 | 吴哲辉. Petri网导论[M]. 北京:机械工业出版社, 2006: 1-26. | 
| WU Z H. Introduction to Petri Nets[M]. Beijing: China Machine Press, 2006: 1-26. | 
| [1] | Hua HUANG, Ziyi YANG, Xiaolong LI, Chuang LI. Predictive business process monitoring method based on concept drift [J]. Journal of Computer Applications, 2024, 44(10): 3167-3176. | 
| [2] | Sheng YE, Jing WANG, Jianfeng XIN, Guiling WANG, Chenhong GUO. Dynamic evolution method for microservice composition systems in cloud-edge environment [J]. Journal of Computer Applications, 2023, 43(6): 1696-1704. | 
| [3] | Erjing BAI, Xiaoyan LI, Yuyue DU. Repair method for process models with concurrent structures based on token replay [J]. Journal of Computer Applications, 2023, 43(2): 499-506. | 
| [4] | Duoqin LI, Xianwen FANG. Process modeling recommendation method based on behavioral profile definition target rules [J]. Journal of Computer Applications, 2022, 42(1): 223-229. | 
| [5] | SUN Huiming, DU Yuyue. Process model mining method for multi-concurrent 2-loops of triangles [J]. Journal of Computer Applications, 2019, 39(3): 851-857. | 
| [6] | XU Tao, MENG Ye. Importance sorting method of organizational enities based on trace clustering [J]. Journal of Computer Applications, 2016, 36(5): 1284-1289. | 
| [7] | SHI Mei-hong CAO Kai-duan CHEN Liang WANG Quan-feng. Method of process pattern mining based on probability statistics of adjacent event [J]. Journal of Computer Applications, 2011, 31(05): 1378-1381. | 
| [8] | qian deFu. Study of VO process based on migrating workflow system in VBE [J]. Journal of Computer Applications, 2010, 30(2): 394-397. | 
| [9] | . Study of data race for process based on BPEL [J]. Journal of Computer Applications, 2010, 30(07): 1959-1961. | 
| [10] | . Modeling and simulation optimization of purchasing process based on Petri net [J]. Journal of Computer Applications, 2009, 29(10): 2871-2874. | 
| [11] | . Process mining based on parallel recombination simulated annealing algorithm [J]. Journal of Computer Applications, 2009, 29(05): 1389-1392. | 
| [12] | . Web service selection based on genetic algorithm with tree dual-structure code [J]. Journal of Computer Applications, 2008, 28(12): 3017-3020. | 
| [13] | Hong-Mei Huang Yun ZHANG. Process mining algorithm based on synchronized-manager [J]. Journal of Computer Applications, 2008, 28(12): 3235-3239. | 
| [14] | Hong-mei HUANG Yun ZHANG. Process mining algorithm to discover non-certain choice and parallel relation [J]. Journal of Computer Applications, 2008, 28(11): 2922-2925. | 
| [15] | Guo-feng ZHANG Jun HE Cong-fu XU. BPEL based method for general security control module design [J]. Journal of Computer Applications, 2008, 28(11): 2926-2928. | 
| Viewed | ||||||
| Full text |  | |||||
| Abstract |  | |||||