You are currently on the new version of our website. Access the old version .

870 Results Found

  • Article
  • Open Access
1 Citations
2,989 Views
14 Pages

26 June 2021

Semiconductor equipment consists of a complex system in which numerous components are organically connected and controlled by many controllers. EventLog records all the information available during system processes. Because the EventLog records syste...

  • Article
  • Open Access
5 Citations
2,158 Views
14 Pages

28 February 2023

In the research field of the automated process discovery and analysis, the purity of event log datasets ought to be a matter of vital importance to the success of discovering sound and exact process models. Moreover, there exist various types of anom...

  • Article
  • Open Access
9 Citations
3,462 Views
18 Pages

Mining Shift Work Operation from Event Logs

  • Nur Ichsan Utama,
  • Riska Asriana Sutrisnowati,
  • Imam Mustafa Kamal,
  • Hyerim Bae and
  • You-Jin Park

15 October 2020

Event logs are records of events that are generally used in process mining to determine the manner in which various processes are practically implemented. Previous studies on process mining attempted to combine the results based on different perspect...

  • Article
  • Open Access
6 Citations
4,318 Views
24 Pages

Semi-Automated Approach for Building Event Logs for Process Mining from Relational Database

  • Jaciel David Hernandez-Resendiz,
  • Edgar Tello-Leal,
  • Ulises Manuel Ramirez-Alcocer and
  • Bárbara A. Macías-Hernández

26 October 2022

Process mining is a novel alternative that uses event logs to discover, monitor, and improve real business processes through knowledge extraction. Event logs are a prerequisite for any process mining technique. The extraction of event data and event...

  • Article
  • Open Access
7 Citations
3,918 Views
21 Pages

Towards a Domain-Specific Modeling Language for Extracting Event Logs from ERP Systems

  • Ana Pajić Simović,
  • Slađan Babarogić,
  • Ognjen Pantelić and
  • Stefan Krstović

12 June 2021

Enterprise resource planning (ERP) systems are often seen as viable sources of data for process mining analysis. To perform most of the existing process mining techniques, it is necessary to obtain a valid event log that is fully compliant with the e...

  • Article
  • Open Access
1,165 Views
21 Pages

9 August 2024

Process discovery aims to discover process models from event logs to describe actual business processes. The quality of event logs has an impact on the quality of process models, so preprocessing methods can be used to improve the quality of event lo...

  • Article
  • Open Access
11 Citations
4,070 Views
18 Pages

Process mining is a relatively new subject that builds a bridge between traditional process modeling and data mining. Process discovery is one of the most critical parts of process mining, which aims at discovering process models automatically from e...

  • Article
  • Open Access
5 Citations
2,943 Views
23 Pages

Process mining aims to gain knowledge of business processes via the discovery of process models from event logs generated by information systems. The insights revealed from process mining heavily rely on the quality of the event logs. Activities extr...

  • Article
  • Open Access
6 Citations
3,312 Views
23 Pages

10 June 2019

Work transference network is a type of enterprise social network centered on the interactions among performers participating in the workflow processes. It is thought that the work transference networks hidden in workflow enactment histories are able...

  • Article
  • Open Access
1 Citations
2,012 Views
26 Pages

27 March 2025

Process mining facilitates the discovery, conformance, and enhancement of business processes using event logs. However, incomplete event logs and the complexities of concurrent activities present significant challenges in achieving accurate process m...

  • Feature Paper
  • Article
  • Open Access
4 Citations
21,261 Views
18 Pages

9 November 2019

A USB mass storage device yields a lot of artifacts when connected to a system. These artifacts are persistent in nature and are retained even after the system has been shut down and the information they contain may assist in carrying out forensic an...

  • Article
  • Open Access
1 Citations
1,971 Views
17 Pages

15 August 2022

Outcome-based predictive process monitoring concerns predicting the outcome of a running process case using historical events stored as so-called process event logs. This prediction problem has been approached using different learning models in the l...

  • Article
  • Open Access
102 Citations
14,208 Views
19 Pages

LogEvent2vec: LogEvent-to-Vector Based Anomaly Detection for Large-Scale Logs in Internet of Things

  • Jin Wang,
  • Yangning Tang,
  • Shiming He,
  • Changqing Zhao,
  • Pradip Kumar Sharma,
  • Osama Alfarraj and
  • Amr Tolba

26 April 2020

Log anomaly detection is an efficient method to manage modern large-scale Internet of Things (IoT) systems. More and more works start to apply natural language processing (NLP) methods, and in particular word2vec, in the log feature extraction. Word2...

  • Article
  • Open Access
3 Citations
3,845 Views
34 Pages

A Novel Process of Parsing Event-Log Activities for Process Mining Based on Information Content

  • Fadilul-lah Yassaanah Issahaku,
  • Xianwen Fang,
  • Sumaiya Bashiru Danwana,
  • Edem Kwedzo Bankas and
  • Ke Lu

Process mining has piqued the interest of researchers and technology manufacturers. Process mining aims to extract information from event activities and their interdependencies from events recorded by some enterprise systems. An enterprise system&rsq...

  • Review
  • Open Access
92 Citations
17,223 Views
29 Pages

Event Log Preprocessing for Process Mining: A Review

  • Heidy M. Marin-Castro and
  • Edgar Tello-Leal

10 November 2021

Process Mining allows organizations to obtain actual business process models from event logs (discovery), to compare the event log or the resulting process model in the discovery task with the existing reference model of the same process (conformance...

  • Article
  • Open Access
2 Citations
1,808 Views
27 Pages

14 August 2025

This article presents an analysis of a logistics process using process mining methods. Additionally, it highlights the possibilities of analyzing industrial process data using the process mining tools available in the ProM software 6.12. The paper ex...

  • Article
  • Open Access
5 Citations
4,735 Views
20 Pages

Eliminating Non-Value-Added Activities and Optimizing Manufacturing Processes Using Process Mining: A Stock of Challenges for Family SMEs

  • Abderrazak Laghouag,
  • Faiz bin Zafrah,
  • Mohamed Rafik Noor Mohamed Qureshi and
  • Alhussain Ali Sahli

19 February 2024

Family small and medium enterprises (FSMEs) differ from non-family SMEs regarding leadership type, human resource management practices, innovation orientation, change management, information and communication technology deployment, process maturity,...

  • Article
  • Open Access
2 Citations
1,810 Views
28 Pages

21 September 2024

In process mining, an event log is a structured collection of recorded events that describes the execution of processes within an organization. The completeness of event logs is crucial for ensuring accurate and reliable process models. Incomplete ev...

  • Article
  • Open Access
1 Citations
910 Views
17 Pages

A Process Tree-Based Incomplete Event Log Repair Approach

  • Qiushi Wang,
  • Liye Zhang,
  • Rui Cao,
  • Na Guo,
  • Haijun Zhang and
  • Cong Liu

The low quality of business process event logs—particularly the widespread occurrence of incomplete traces—poses significant challenges to the reliability, accuracy, and efficiency of process mining analysis. In real-world scenarios, thes...

  • Article
  • Open Access
4,245 Views
18 Pages

27 October 2021

In many embedded systems, we face the problem of correlating signals characterising device operation (e.g., performance parameters, anomalies) with events describing internal device activities. This leads to the investigation of two types of data: ti...

  • Article
  • Open Access
7 Citations
4,701 Views
21 Pages

Behavioral and Performance Analysis of a Real-Time Case Study Event Log: A Process Mining Approach

  • Naveed Anwer Butt,
  • Zafar Mahmood,
  • Muhammad Usman Sana,
  • Isabel de la Torre Díez,
  • Juan Castanedo Galán,
  • Santiago Brie and
  • Imran Ashraf

24 March 2023

Project-based organizations need to procure different commodities, and the failure/success of a project depends heavily on procurement management. Companies must refine and develop methods to simplify and optimize the procurement process in a highly...

  • Article
  • Open Access
4 Citations
4,658 Views
39 Pages

Event Log Data Quality Issues and Solutions

  • Dusanka Dakic,
  • Darko Stefanovic,
  • Teodora Vuckovic,
  • Marina Zizakov and
  • Branislav Stevanov

26 June 2023

Process mining is a discipline that analyzes real event data extracted from information systems that support a business process to construct as-is process models and detect performance issues. Process event data are transformed into event logs, where...

  • Article
  • Open Access
5 Citations
4,526 Views
21 Pages

25 May 2022

Process mining (PM) exploits event logs to obtain meaningful information about the processes that produced them. As the number of applications developed on cloud infrastructures is increasing, it becomes important to study and discover their underlyi...

  • Article
  • Open Access
29 Citations
4,978 Views
21 Pages

DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs

  • Juergen Mangler,
  • Joscha Grüger,
  • Lukas Malburg,
  • Matthias Ehrendorfer,
  • Yannis Bertrand,
  • Janik-Vasily Benzin,
  • Stefanie Rinderle-Ma,
  • Estefania Serral Asensio and
  • Ralph Bergmann

14 March 2023

The Internet of Things (IoT) has been shown to be very valuable for Business Process Management (BPM), for example, to better track and control process executions. While IoT actuators can automatically trigger actions, IoT sensors can monitor the cha...

  • Article
  • Open Access
1,897 Views
32 Pages

4 February 2025

One of the most actively researched areas in the field of process mining is process discovery, which aims to construct a schema that aligns with existing event trace sequences. Current standard industrial workflow schema induction methods impose cert...

  • Article
  • Open Access
1 Citations
654 Views
17 Pages

Sampling-Based Next-Event Prediction for Wind-Turbine Maintenance Processes

  • Huiling Li,
  • Cong Liu,
  • Qinjun Du,
  • Qingtian Zeng,
  • Jinglin Zhang,
  • Georgios Theodoropoulo and
  • Long Cheng

9 August 2025

Accurate and efficient next-event prediction in wind-turbine maintenance processes (WTMPs) is crucial for proactive resource planning and early fault detection. However, existing deep-learning-based prediction approaches often encounter performance c...

  • Article
  • Open Access
3 Citations
1,867 Views
23 Pages

Discovery of Business Process Models from Incomplete Logs

  • Lili Wang,
  • Xianwen Fang and
  • Chifeng Shao

3 October 2022

The completeness of event logs and long-distance dependencies are two major challenges for process mining. Until now, most process mining methods have not been able to discover long-distance dependency and assume that the directly-follows relationshi...

  • Article
  • Open Access
5 Citations
3,340 Views
17 Pages

27 May 2022

The development of models for process outcome prediction using event logs has evolved in the literature with a clear focus on performance improvement. In this paper, we take a different perspective, focusing on obtaining interpretable predictive mode...

  • Article
  • Open Access
405 Views
26 Pages

ProcessGFM: A Domain-Specific Graph Pretraining Prototype for Predictive Process Monitoring

  • Yikai Hu,
  • Jian Lu,
  • Xuhai Zhao,
  • Yimeng Li,
  • Zhen Tian and
  • Zhiping Li

15 December 2025

Predictive process monitoring estimates the future behaviour of running process instances based on historical event logs, with typical tasks including next-activity prediction, remaining-time estimation, and risk assessment. Existing recurrent and Tr...

  • Article
  • Open Access
2 Citations
2,024 Views
16 Pages

11 June 2022

The aim of this study was to identify user strategies to infer their intentions in developing activities, from the current process model and the real process model of the business. A user’s intentions can be used to identify their behavior, and...

  • Article
  • Open Access
25 Citations
5,262 Views
28 Pages

Strategies to Automatically Derive a Process Model from a Configurable Process Model Based on Event Data

  • Mauricio Arriagada-Benítez,
  • Marcos Sepúlveda,
  • Jorge Munoz-Gama and
  • Joos C. A. M. Buijs

4 October 2017

Configurable process models are frequently used to represent business workflows and other discrete event systems among different branches of large organizations: they unify commonalities shared by all branches and describe their differences, at the s...

  • Proceeding Paper
  • Open Access
3,232 Views
6 Pages

Currently, organizations are experiencing rapid growth in the digitization of their processes, which generates a high availability of data and metadata in information systems generated by the activities of operations and support areas. This is import...

  • Article
  • Open Access
2 Citations
2,571 Views
38 Pages

7 November 2024

Traffic inspection (TraffIns) work in this article is positioned as a specific module of road traffic with its primary function oriented towards monitoring and sustainably controlling safe traffic and the execution of significant events within a part...

  • Article
  • Open Access
4 Citations
4,365 Views
28 Pages

RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root

  • Juan Carlos López-Pimentel,
  • Luis Alberto Morales-Rosales and
  • Raúl Monroy

18 November 2021

Logging system activities are required to provide credibility and confidence in the systems used by an organization. Logs in computer systems must be secured from the root user so that they are true and fair. This paper introduces RootLogChain, a blo...

  • Article
  • Open Access
5 Citations
1,784 Views
22 Pages

2 March 2025

The Inertial Navigation System (INS) and Doppler Velocity Log (DVL) combination navigation system has been widely used in Autonomous Underwater Vehicles (AUVs) due to its independence, stealth, and high accuracy. Compared to the standalone INS or DVL...

  • Article
  • Open Access
1 Citations
1,482 Views
14 Pages

Discovery of Cloud Applications from Logs

  • Ashot Harutyunyan,
  • Arnak Poghosyan,
  • Tigran Bunarjyan,
  • Andranik Haroyan,
  • Marine Harutyunyan,
  • Lilit Harutyunyan and
  • Nelson Baloian

Continuous discovery and update of applications or their boundaries running in cloud environments in an automatic way is a highly required function of modern data center operation solutions. Prior attempts to address this problem within various produ...

  • Article
  • Open Access
4 Citations
2,885 Views
22 Pages

Modelling Dynamics of a Log-Yard through Discrete-Event Mathematics

  • Kalvis Kons,
  • Pedro La Hera and
  • Dan Bergström

30 January 2020

This article deals with the topic of modelling the log-yard of one of our industry partners. To this end, our framework is based on discrete-events modelling (DEM), as consequence that many stages of the process run as a sequence of events. The seque...

  • Article
  • Open Access
777 Views
20 Pages

This study addresses the problem of automatic attack detection targeting Linux-based machines and web applications through the analysis of system logs, with a particular focus on reducing the computational requirements of existing solutions. The aim...

  • Article
  • Open Access
1 Citations
2,517 Views
16 Pages

Generating Block-Structured Parallel Process Models by Demonstration

  • Julijana Lekić,
  • Dragan Milićev and
  • Dragan Stanković

20 February 2021

Programming by demonstration (PBD) is a technique which allows end users to create, modify, accommodate, and expand programs by demonstrating what the program is supposed to do. Although the ideal of common-purpose programming by demonstration or by...

  • Article
  • Open Access
10 Citations
2,969 Views
18 Pages

10 November 2023

Recent successes in deep learning have inspired researchers to apply deep neural networks to Acoustic Event Classification (AEC). While deep learning methods can train effective AEC models, they are susceptible to overfitting due to the models’...

  • Article
  • Open Access
10 Citations
4,030 Views
12 Pages

9 September 2020

In recent years, process mining has been attracting attention as an effective method for improving business operations by analyzing event logs that record what is done in business processes. The event log may contain missing data due to technical or...

  • Article
  • Open Access
5 Citations
5,895 Views
19 Pages

Log files are essential assets for IT engineers engaged in the security of server and computer systems. They provide crucial information for identifying malicious events, conducting cybersecurity incident analyses, performing audits, system maintenan...

  • Article
  • Open Access
9 Citations
5,842 Views
25 Pages

21 February 2020

In this paper, we propose an integrated approach for seamlessly and effectively providing the mining and the analyzing functionalities to redesigning work for very large-scale and massively parallel process models that are discovered from their enact...

  • Article
  • Open Access
243 Views
23 Pages

Vision-Based People Counting and Tracking for Urban Environments

  • Daniyar Nurseitov,
  • Kairat Bostanbekov,
  • Nazgul Toiganbayeva,
  • Aidana Zhalgas,
  • Didar Yedilkhan and
  • Beibut Amirgaliyev

Population growth and expansion of urban areas increase the need for the introduction of intelligent passenger traffic monitoring systems. Accurate estimation of the number of passengers is an important condition for improving the efficiency, safety...

  • Article
  • Open Access
35 Citations
7,210 Views
18 Pages

11 August 2021

Today’s business environments face rapid digital transformation, engendering the continuous emerging of new technologies. Robotic Process Automation (RPA) is one of the new technologies rapidly and increasingly grabbing the attention of businesses. R...

  • Feature Paper
  • Article
  • Open Access
2,765 Views
22 Pages

An Exponentiality Test of Fit Based on a Tail Characterization against Heavy and Light-Tailed Alternatives

  • Alex Karagrigoriou,
  • Ioannis Mavrogiannis,
  • Georgia Papasotiriou and
  • Ilia Vonta

28 September 2023

Log-concavity and log-convexity play a key role in various scientific fields, especially in those where the distinction between exponential and non-exponential distributions is necessary for inferential purposes. In the present study, we introduce a...

  • Proceeding Paper
  • Open Access
926 Views
10 Pages

28 October 2025

Process mining has become an essential technique for analyzing and optimizing business processes by leveraging digital traces recorded by enterprise systems. However, traditional process mining methods rely heavily on the concept of case identifiers,...

  • Article
  • Open Access
6 Citations
2,494 Views
25 Pages

Process Discovery Techniques Recommendation Framework

  • Mohammed Abdulhakim Al-Absi and
  • Hind R’bigui

In a competitive environment, organizations need to continuously understand, analyze and improve the behavior of processes to maintain their position in the market. Process mining is a set of techniques that allows organizations to have an X-ray view...

  • Article
  • Open Access
14 Citations
6,681 Views
16 Pages

Research on Log Anomaly Detection Based on Sentence-BERT

  • Caiping Hu,
  • Xuekui Sun,
  • Hua Dai,
  • Hangchuan Zhang and
  • Haiqiang Liu

24 August 2023

Log anomaly detection is crucial for computer systems. By analyzing and processing the logs generated by a system, abnormal events or potential problems in the system can be identified, which is helpful for its stability and reliability. At present,...

  • Article
  • Open Access
17 Citations
5,604 Views
17 Pages

ConAnomaly: Content-Based Anomaly Detection for System Logs

  • Dan Lv,
  • Nurbol Luktarhan and
  • Yiyong Chen

13 September 2021

Enterprise systems typically produce a large number of logs to record runtime states and important events. Log anomaly detection is efficient for business management and system maintenance. Most existing log-based anomaly detection methods use log pa...

of 18