An efficient process mining model for Petri Nets in process discovery
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Process mining is a process management system used to analyze business processes based on event logs. The knowledge is extracted from event logs by using knowledge retrieval techniques. The process mining algorithms are accomplished of inevitably discover models to give details of all the events registered in some log traces provided as input. The theory of regions is a valuable tool in process discovery: it aims at learning a formal model (Petri nets) from a set of traces. The main objective of this paper is to propose new concepts for noise filtering and label splitting problem. The experiment is done based on standard bench mark dataset HELIX and RALIC datasets. The performance of the proposed system is better than other existing methods.
Authors and Affiliations
V. Priyadharshini , Dr. A. Malathi
Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve our understanding and also should provide security to network data. The most existing encryption algorithms desig...
Glaucoma Detection Using Enhanced K-Strange Points Clustering Algorithm and Classification
Glaucoma is an eye disorder that majorly affects the optic nerve head in the retina. The damage caused to optic disc leads to gradual loss of peripheral vision which may further result in complete blindness. Glaucoma can...
Review of Various Text Categorization Methods
Abstract : Measuring the similarity between documents is an important operation in the text processing field.Text categorization (also known as text classification, or topic spotting) is the task of automatically s...
Software effort estimation through clustering techniques of RBFN network
Now a day’s software cost/effort estimation is a very complex job to do. Several estimation techniques have been developed in this regard. This assessment of parameters like, time, cost, and number of staff requi...
Automatic Detection of Social Engineering Attacks Using Dialog
Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate...