Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (8): 2527-2536.DOI: 10.11772/j.issn.1001-9081.2022070980
• Computer software technology • Previous Articles Next Articles
Haoyu ZHANG1, Lili WANG1,2()
Received:
2022-07-07
Revised:
2022-12-12
Accepted:
2022-12-13
Online:
2023-01-15
Published:
2023-08-10
Contact:
Lili WANG
About author:
ZHANG Haoyu, born in 1998, M. S. candidate. His research interests include Petri nets, model repair.
Supported by:
通讯作者:
王丽丽
作者简介:
张昊宇(1998—),男,安徽合肥人,硕士研究生,主要研究方向:Petri网、模型修复;
基金资助:
CLC Number:
Haoyu ZHANG, Lili WANG. Model repair method based on behavioral profile and logical Petri nets[J]. Journal of Computer Applications, 2023, 43(8): 2527-2536.
张昊宇, 王丽丽. 基于行为轮廓和逻辑Petri网的模型修复方法[J]. 《计算机应用》唯一官方网站, 2023, 43(8): 2527-2536.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022070980
迹 | CBC | MBC |
---|---|---|
1.00 | 1.00 | |
1.00 | 1.00 | |
0.76 | 0.78 |
Tab. 2 Compliance results of Log1
迹 | CBC | MBC |
---|---|---|
1.00 | 1.00 | |
1.00 | 1.00 | |
0.76 | 0.78 |
迹 | CBC | MBC | 迹 | CBC | MBC |
---|---|---|---|---|---|
1.00 | 1.00 | 0.83 | 0.84 | ||
1.00 | 1.00 | 0.83 | 0.84 |
Tab. 3 Compliance results of Log2
迹 | CBC | MBC | 迹 | CBC | MBC |
---|---|---|---|---|---|
1.00 | 1.00 | 0.83 | 0.84 | ||
1.00 | 1.00 | 0.83 | 0.84 |
迹 | 服从度违反三元组 |
---|---|
(j,m, (n,k,+) | |
(j,k, (n,l,+) |
Tab. 4 σ5 and σ6 non-conformance feedback
迹 | 服从度违反三元组 |
---|---|
(j,m, (n,k,+) | |
(j,k, (n,l,+) |
迹 | CBC | MBC |
---|---|---|
1.00 | 1.00 | |
1.00 | 1.00 | |
1.00 | 1.00 | |
0.84 | 0.84 |
Tab. 5 Compliance results of Log3
迹 | CBC | MBC |
---|---|---|
1.00 | 1.00 | |
1.00 | 1.00 | |
1.00 | 1.00 | |
0.84 | 0.84 |
迹 | MCC |
---|---|
0.80 | |
0.80 |
Tab. 6 MCC results of some non-conformance traces inLog3
迹 | MCC |
---|---|
0.80 | |
0.80 |
迹 | 服从度违反三元组 |
---|---|
(a,g, | |
(a,f, | |
(a,f,→),(f,g,→),(f,a,→ -1),(g,f,→ -1) |
Tab. 7 Non-conformance feedback of σ7 - σ9 in Log3
迹 | 服从度违反三元组 |
---|---|
(a,g, | |
(a,f, | |
(a,f,→),(f,g,→),(f,a,→ -1),(g,f,→ -1) |
1 | FAHLAND D, W M P van der AALST. Model repair — aligning process models to reality[J]. Information Systems, 2015, 47: 220-243. 10.1016/j.is.2013.12.007 |
2 | BUIJS J C A M, B F van DONGEN, W M P van der AALST. On the role of fitness, precision, generalization and simplicity in process discovery[C]// Proceedings of the 2012 OTM Confederated International Conferences "On the Move to Meaningful Internet Systems", LNCS 7565. Berlin: Springer, 2012: 305-322. |
3 | PEGORARO M, UYSAL M S, W M P van der AALST. Conformance checking over uncertain event data[J]. Information Systems, 2021, 102: No.101810. 10.1016/j.is.2021.101810 |
4 | ZHONG H, MEI H. Mining repair model for exception-related bug[J]. Journal of Systems and Software, 2018, 141: 16-31. 10.1016/j.jss.2018.03.046 |
5 | W M P van der AALST. Process discovery from event data: relating models and logs through abstractions[J]. WIREs Data Mining and Knowledge Discovery, 2018, 8(3): No.e1244. 10.1002/widm.1244 |
6 | van DONGEN B, CARMONA J, CHATAIN T, et al. Aligning modeled and observed behavior: a compromise between computation complexity and quality[C]// Proceedings of the 2017 International Conference on Advanced Information Systems Engineering, LNCS 10253. Cham: Springer, 2017: 94-109. |
7 | W van der AALST, ADRIANSYAH A, van DONGEN B. Replaying history on process models for conformance checking and performance analysis[J]. WIREs Data Mining and Knowledge Discovery, 2012, 2(2): 182-192. 10.1002/widm.1045 |
8 | ROZINAT A, W M P van der AALST. Conformance checking of processes based on monitoring real behavior[J]. Information Systems, 2008, 33(1): 64-95. 10.1016/j.is.2007.07.001 |
9 | BLOEMEN V, van ZELST S, W van der AALST, et al. Aligning observed and modelled behaviour by maximizing synchronous moves and using milestones[J]. Information Systems, 2022, 103: No.101456. 10.1016/j.is.2019.101456 |
10 | S J van ZELST, BOLT A, HASSANI M, et al. Online conformance checking: relating event streams to process models using prefix-alignments[J]. International Journal of Data Science and Analytics, 2019, 8(3): 269-284. 10.1007/s41060-017-0078-6 |
11 | SCHUSTER D, S J van ZELST. Online process monitoring using incremental state-space expansion: an exact algorithm[C]// Proceedings of the 2020 International Conference on Business Process Management, LNCS 12168. Cham: Springer, 2020: 147-164. 10.1007/978-3-030-58666-9_9 |
12 | SANI M F, S J van ZELST, W M P van der AALST. Conformance checking approximation using subset selection and edit distance[C]// Proceedings of the 2020 International Conference on Advanced Information Systems Engineering, LNCS 12127. Cham: Springer, 2020: 234-251. |
13 | van der AA H, LEOPOLD H, REIJERS H A. Efficient process conformance checking on the basis of uncertain event-to-activity mappings[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 32(5): 927-940. 10.1109/tkde.2019.2897557 |
14 | ZHANG X, DU Y Y, QI L, et al. An approach for repairing process models based on logic Petri nets[J]. IEEE Access, 2018, 6: 29926-29939. 10.1109/access.2018.2843137 |
15 | XU Y H, DU Y Y, QI L, et al. A logic Petri net-based model repair approach by constructing choice bridges[J]. IEEE Access, 2019, 7: 18531-18545. 10.1109/access.2019.2896079 |
16 | XU Y H, DU Y Y, LUAN W J, et al. Repairing process models with logical concurrent and casual relations via logical Petri nets[J]. IEEE Access, 2018, 6: 56340-56355. 10.1109/access.2018.2872640 |
17 | BAI E J, SU N, LIANG Y, et al. Method for repairing process models with selection structures based on token replay[J]. Computing and Informatics, 2021, 40(2): 446-468. 10.31577/cai_2021_2_446 |
18 | REISSNER D, ARMAS-CERVANTES A, CONFORTI R, et al. Scalable alignment of process models and event logs: an approach based on automata and S-components[J]. Information Systems, 2020, 94: No.101561. 10.1016/j.is.2020.101561 |
19 | KO J, COMUZZI M. Keeping our rivers clean: information-theoretic online anomaly detection for streaming business process events[J]. Information Systems, 2022, 104: No.101894. 10.1016/j.is.2021.101894 |
20 | LEEMANS S J J, W M P van der AALST, BROCKHOFF T, et al. Stochastic process mining: earth movers’ stochastic conformance[J]. Information Systems, 2021, 102: No.101724. 10.1016/j.is.2021.101724 |
21 | HE Z Y, DU Y Y, QI L, et al. A model repair approach based on Petri nets by constructing free-loop structures[J]. IEEE Access, 2019, 7: 24214-24230. 10.1109/access.2019.2899963 |
22 | 盛梦君. 基于行为轮廓的模块化流程模型修复方法[D]. 淮南:安徽理工大学, 2021:28-44. 10.3969/j.issn.1672-1098.2021.02.013 |
SHENG M J. Modular process model repair method based on behavioral profile[D]. Huainan: Anhui University of Science and Technology, 2021:28-44. 10.3969/j.issn.1672-1098.2021.02.013 | |
23 | FAHLAND D, W M P van der AALST. Repairing process models to reflect reality[C]// Proceedings of the 2012 International Conference on Business Process Management, LNCS 7481. Berlin: Springer, 2012: 229-245. |
24 | POLYVYANYY A, W M P van der AALST, HOFSTEDE A H M T, et al. Impact-driven process model repair[J]. ACM Transactions on Software Engineering and Methodology, 2016, 25(4): No.28. 10.1145/2980764 |
25 | DIEDRICH F, JANSEN K. Improved approximation algorithms for scheduling with fixed jobs[C]// Proceedings of the 2009 20th Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, PA: SIAM, 2009: 675-684. 10.1137/1.9781611973068.74 |
26 | W M P van der AALST. Making work flow: on the application of petri nets to business process management[C]// Proceedings of the 2002 International Conference on Application and Theory of Petri Nets, LNCS 2360. Berlin: Springer, 2002: 1-22. |
27 | WEIDLICH M, POLYVYANYY A, DESAI N, et al. Process compliance analysis based on behavioural profiles[J]. Information Systems, 2011, 36(7): 1009-1025. 10.1016/j.is.2011.04.002 |
28 | WANG Z, LUAN W J, DU Y Y, et al. Composition and application of extended colored logic Petri nets to E-commerce systems[J]. IEEE Access, 2020, 8: 36386-36397. 10.1109/access.2020.2974883 |
29 | 吴哲辉. Petri网导论[M]. 北京:机械工业出版社, 2006: 1-26. |
WU Z H. Introduction to Petri Nets[M]. Beijing: China Machine Press, 2006: 1-26. |
[1] | Hua HUANG, Ziyi YANG, Xiaolong LI, Chuang LI. Predictive business process monitoring method based on concept drift [J]. Journal of Computer Applications, 2024, 44(10): 3167-3176. |
[2] | Sheng YE, Jing WANG, Jianfeng XIN, Guiling WANG, Chenhong GUO. Dynamic evolution method for microservice composition systems in cloud-edge environment [J]. Journal of Computer Applications, 2023, 43(6): 1696-1704. |
[3] | Erjing BAI, Xiaoyan LI, Yuyue DU. Repair method for process models with concurrent structures based on token replay [J]. Journal of Computer Applications, 2023, 43(2): 499-506. |
[4] | Duoqin LI, Xianwen FANG. Process modeling recommendation method based on behavioral profile definition target rules [J]. Journal of Computer Applications, 2022, 42(1): 223-229. |
[5] | SUN Huiming, DU Yuyue. Process model mining method for multi-concurrent 2-loops of triangles [J]. Journal of Computer Applications, 2019, 39(3): 851-857. |
[6] | XU Tao, MENG Ye. Importance sorting method of organizational enities based on trace clustering [J]. Journal of Computer Applications, 2016, 36(5): 1284-1289. |
[7] | SHI Mei-hong CAO Kai-duan CHEN Liang WANG Quan-feng. Method of process pattern mining based on probability statistics of adjacent event [J]. Journal of Computer Applications, 2011, 31(05): 1378-1381. |
[8] | qian deFu. Study of VO process based on migrating workflow system in VBE [J]. Journal of Computer Applications, 2010, 30(2): 394-397. |
[9] | . Study of data race for process based on BPEL [J]. Journal of Computer Applications, 2010, 30(07): 1959-1961. |
[10] | . Modeling and simulation optimization of purchasing process based on Petri net [J]. Journal of Computer Applications, 2009, 29(10): 2871-2874. |
[11] | . Process mining based on parallel recombination simulated annealing algorithm [J]. Journal of Computer Applications, 2009, 29(05): 1389-1392. |
[12] | . Web service selection based on genetic algorithm with tree dual-structure code [J]. Journal of Computer Applications, 2008, 28(12): 3017-3020. |
[13] | Hong-Mei Huang Yun ZHANG. Process mining algorithm based on synchronized-manager [J]. Journal of Computer Applications, 2008, 28(12): 3235-3239. |
[14] | Hong-mei HUANG Yun ZHANG. Process mining algorithm to discover non-certain choice and parallel relation [J]. Journal of Computer Applications, 2008, 28(11): 2922-2925. |
[15] | Guo-feng ZHANG Jun HE Cong-fu XU. BPEL based method for general security control module design [J]. Journal of Computer Applications, 2008, 28(11): 2926-2928. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||