Business Process Mining Approaches: A Relative Comparison

نویسندگان

  • Saiqa Aleem
  • Luiz Fernando Capretz
  • Faheem Ahmed
چکیده

Recently, information systems like ERP, CRM and WFM record different business events or activities in a log named as event log. Process mining aims at extracting information from event logs to capture business process as it is being executed. Process mining is an important learning task based on captured processes. In order to be competent organizations in the business world; they have to adjust their business process along with the changing environment. Sometimes a change in the business process implies a change into the whole system. Process mining allows for the automated discovery of process models from event logs. Process mining techniques has the ability to support automatically business process (re)design. Typically, these techniques discover a concrete workflow model and all possible processes registered in a given events log. In this paper, detailed comparison among process mining methods used in the business process mining and differences in their approaches have been provided.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Rough Set Theory in Data Mining for Decision Support Systems (DSSs)

Decision support systems (DSSs) are prevalent information systems for decision making in many competitive business environments. In a DSS, decision making process is intimately related to some factors which determine the quality of information systems and their related products. Traditional approaches to data analysis usually cannot be implemented in sophisticated Companies, where managers ne...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

Business Process Mining: From Theory to Practice

Purpose This paper presents a comparison of a number of business process mining tools currently available in the UK market. An outline of the practice of business process mining is given along with an analysis of the main techniques developed by academia and commercial entities. This paper also acts as a primer for the acceptance and further use of process mining in industry suggesting future d...

متن کامل

Advanced Data Mining Techniques

The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. I dedicate this book to my grandchildren. Preface The intent of this book is to describe some recent data mining tools that have p...

متن کامل

A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models

Role-based access control (RBAC) is commonly used to implement authorization procedures in Process-aware information systems (PAIS). Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of real-world processes. Beyond pure control ow mining, some techniques focus on the discovery of organizational information fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1507.05654  شماره 

صفحات  -

تاریخ انتشار 2015