Open Access Open Access  Restricted Access Subscription or Fee Access

Coupled Hidden Markov Model for Process Mining of Invisible Prime Tasks


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i6.9555

Abstract


Process mining provides process improvement in a variety of application domains. A primary focus of process mining is transferring information from event logs into process model. One of the issues of process mining is dealing with invisible prime tasks. An invisible prime task is an additional task in the process model to assist in showing real processes. However, a few of algorithm solves the issue. This research proposes an algorithm for dealing with invisible prime tasks. The proposed algorithm contains rules and equations utilizing probability of state transition of Coupled Hidden Markov and double time-stamped in event logs. The rules and equations are used for determining invisible prime tasks and parallel control-flows patterns. In addition to dealing with invisible prime tasks, the experiment results also show that the proposed algorithm obtains right parallel control-flow patterns from non-complete event logs. This proposed algorithm also decreases usage of the invisible prime task in A# algorithm without reducing the quality of discovered process models. It has proven with the fitness of process models obtained by the proposed algorithm are relatively high as those obtained by A# algorithm.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Coupled Hidden Markov Model; Double Time-stamped Event Log; Fitness; Invisible Prime Tasks; Process Mining

Full Text:

PDF


References


W. M. P. van der Aalst, Process Mining: discovery, conformance and enhancement of business processes (Springer Science and Business Media, 2011).
http://dx.doi.org/10.4258/hir.2014.20.2.157

N. Y. Setiawan, R. Sarno, Multi-Criteria Decision Making for Selecting Semantic Web Service Considering Variability and Complexity Trade-Off, (2016) Journal of Theoretical and Applied Information Technology, 86 (2), pp. 316-326.

Sarno, R., Sari, P. L. I., Ginardi, H., Sunaryono, D., Decision mining for multi choice workflow patterns, Computer, Control, Informatics and Its Applications (IC3INA) (Page: 337-342 Year of Publication: 2013).
http://dx.doi.org/10.1109/ic3ina.2013.6819197

Sarno, R., Pamungkas, E. W., Ginardi, H., Sunaryono, D., Clustering of ERP business process fragments, Computer, Control, Informatics and Its Applications (IC3INA) (Page: 319 - 324, Year of Publication: 2013).
http://dx.doi.org/10.1109/ic3ina.2013.6819194

R. Sarno, R. D. Dewandono, T. Ahmad, M. F. Naufal, F. Sinaga, Hybrid Association Rule Learning and Process mining for Fraud Detection, (2015) IAENG International Journal of Computer Science, 42 (2), pp. 59-72.

L. Wen, J. Wang, W. M. P. van der Aalst, B. Huang, J. Sun, Mining process models with prime invisible prime tasks, (2010) Data & Knowledge Engineering, 69 (10), pp. 999-1021.
http://dx.doi.org/10.1016/j.datak.2010.06.001

R. Sarno, W. A. Wibowo, Kartini, F. Haryadita, Determining Model Using Non-Linear Heuristics Miner and Control-Flow Pattern, (2016) TELKOMNIKA (Telecommunication Computing Electronics and Control), 14 (1), pp. 349-360.
http://dx.doi.org/10.12928/telkomnika.v14i1.3257

Sarno, R., Effendi, Y., Haryadita, F., Modified Time-Based Heuristics Miner for Parallel Business Processes, (2016) International Review on Computers and Software (IRECOS), 11 (3), pp. 249-260.
http://dx.doi.org/10.15866/irecos.v11i3.8717

Nefian, Liang, L., Pi, X., Xiaoxiang, L., Mao, Murphy, A coupled HMM for audio-visual speech recognition, IEEE International Conference on Acoustics Speech and Signal Processing (Year of Publication: 2002).
http://dx.doi.org/10.1109/icassp.2002.1006167

A H. Abdelaziz, S. Zeiler, D. Kolossa, Learning Dynamic Stream Weights for Coupled-HMM-based Audio-visual Speech Recognition, (2015) IEEE/ACM Transactions on Audio, Speech, and Languange Processing, 1 (1).
http://dx.doi.org/10.1109/taslp.2015.2409785

H. Zhou, J. Chen, G. Dong, H. Wang, H. Yuan, Bearing fault recognition method based on neighbourhood component analysis and coupled hidden Markov model, (2016) Mechanical Systems and Signal Processing, 66, pp. 568-581.
http://dx.doi.org/10.1016/j.ymssp.2015.04.037

Rezek, I., Roberts, S.J., Estimation of coupled hidden Markov models with application to biosignal signal interaction modelling, Neural Networks for Signal Processing X. Proceedings of the 2000 IEEE Signal Processing Society Workshop (Year of Publication: 2000).
http://dx.doi.org/10.1109/nnsp.2000.890160

Raghavan, V., ver Steeg, G., Galstyan, A., Tartakovsky, A.G., Coupled hidden markov models for user activity in social networks, IEEE International Conference on Multimedia and Expo Workshops (Year of Publication: 2013).
http://dx.doi.org/10.1109/icmew.2013.6618397

Sarno, R., Sungkono, K., Hidden Markov Model for Process Mining of Parallel Business Processes, (2016) International Review on Computers and Software (IRECOS), 11 (4), pp. 290-300.
http://dx.doi.org/10.15866/irecos.v11i4.8700

W. M. P. van der Aalst, The application of Petri nets to Workflow Management, (1998) Journal of Circuits, Systems and Computers, 8 (1), pp. 21-66.
http://dx.doi.org/10.1142/s0218126698000043

S. De Cnudde, J. Claes, G. Poels, Improving the Quality of the Heuristics Miner in Prom 6.2, (2014) Expert System with Application, 41, pp. 7678-7690.
http://dx.doi.org/10.1016/j.eswa.2014.05.055

Weijters, A.J.M.M., Ribeiro, J.T.S., Flexible Heuristics Miner (FHM), Proceedings of IEEE Symposium on Computational Intelligence and Data Mining (Year of Publication: 2011).
http://dx.doi.org/10.1109/cidm.2011.5949453


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize