Abstract

Event log records all events of performed business process on the system. Analysts used the event log to detect occurred anomalies, one of which is wrong pattern, in the process. However, there are conditions, i.e. skip condition, redo condition, and switch condition, which can be misinterpreted as wrong pattern. Uniquely, those conditions cannot be depicted in the reference model without utilizing additional tasks, namely invisible tasks. This research proposes rules which can check the wrong pattern in the process model containing those conditions. This research automatically formed declarative miner rules carrying invisible tasks based on a process model. The form of the used process model in this research is a graph model. Then, the rules are used to checking the wrong pattern. The experiment uses real data, i.e. port-container handling processes, and several simulation data. The analysis explains that declarative miners have 100% accuracy to check the wrong pattern in the process model that contains each invisible task including skip condition, redo condition, and switch condition.

Original languageEnglish
Title of host publicationProceedings - 2020 International Seminar on Application for Technology of Information and Communication
Subtitle of host publicationIT Challenges for Sustainability, Scalability, and Security in the Age of Digital Disruption, iSemantic 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages470-475
Number of pages6
ISBN (Electronic)9781728190686
DOIs
Publication statusPublished - 19 Sept 2020
Event2020 International Seminar on Application for Technology of Information and Communication, iSemantic 2020 - Semarang, Indonesia
Duration: 19 Sept 202020 Sept 2020

Publication series

NameProceedings - 2020 International Seminar on Application for Technology of Information and Communication: IT Challenges for Sustainability, Scalability, and Security in the Age of Digital Disruption, iSemantic 2020

Conference

Conference2020 International Seminar on Application for Technology of Information and Communication, iSemantic 2020
Country/TerritoryIndonesia
CitySemarang
Period19/09/2020/09/20

Keywords

  • declarative miner
  • event log
  • invisible task
  • wrong pattern

Fingerprint

Dive into the research topics of 'Checking wrong pattern in process model containing invisible task by using declarative miner'. Together they form a unique fingerprint.

Cite this