TY - GEN
T1 - Checking wrong pattern in process model containing invisible task by using declarative miner
AU - Salsabila, Nadia P.
AU - Palembiya, Revi A.
AU - Sungkono, Kelly R.
AU - Sarno, Riyanarto
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/9/19
Y1 - 2020/9/19
N2 - Event log records all events of performed business process on the system. Analysts used the event log to detect occurred anomalies, one of which is wrong pattern, in the process. However, there are conditions, i.e. skip condition, redo condition, and switch condition, which can be misinterpreted as wrong pattern. Uniquely, those conditions cannot be depicted in the reference model without utilizing additional tasks, namely invisible tasks. This research proposes rules which can check the wrong pattern in the process model containing those conditions. This research automatically formed declarative miner rules carrying invisible tasks based on a process model. The form of the used process model in this research is a graph model. Then, the rules are used to checking the wrong pattern. The experiment uses real data, i.e. port-container handling processes, and several simulation data. The analysis explains that declarative miners have 100% accuracy to check the wrong pattern in the process model that contains each invisible task including skip condition, redo condition, and switch condition.
AB - Event log records all events of performed business process on the system. Analysts used the event log to detect occurred anomalies, one of which is wrong pattern, in the process. However, there are conditions, i.e. skip condition, redo condition, and switch condition, which can be misinterpreted as wrong pattern. Uniquely, those conditions cannot be depicted in the reference model without utilizing additional tasks, namely invisible tasks. This research proposes rules which can check the wrong pattern in the process model containing those conditions. This research automatically formed declarative miner rules carrying invisible tasks based on a process model. The form of the used process model in this research is a graph model. Then, the rules are used to checking the wrong pattern. The experiment uses real data, i.e. port-container handling processes, and several simulation data. The analysis explains that declarative miners have 100% accuracy to check the wrong pattern in the process model that contains each invisible task including skip condition, redo condition, and switch condition.
KW - declarative miner
KW - event log
KW - invisible task
KW - wrong pattern
UR - http://www.scopus.com/inward/record.url?scp=85096829379&partnerID=8YFLogxK
U2 - 10.1109/iSemantic50169.2020.9234264
DO - 10.1109/iSemantic50169.2020.9234264
M3 - Conference contribution
AN - SCOPUS:85096829379
T3 - Proceedings - 2020 International Seminar on Application for Technology of Information and Communication: IT Challenges for Sustainability, Scalability, and Security in the Age of Digital Disruption, iSemantic 2020
SP - 470
EP - 475
BT - Proceedings - 2020 International Seminar on Application for Technology of Information and Communication
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 International Seminar on Application for Technology of Information and Communication, iSemantic 2020
Y2 - 19 September 2020 through 20 September 2020
ER -