Cardenas 2015 neural networks_artificial
Cardenas 2015 neural networks_artificial
www.emeraldinsight.com/1463-7154.htm
Abstract
Purpose – Process mining is a research area used to discover, monitor and improve real business
processes by extracting knowledge from event logs available in process-aware information systems.
The purpose of this paper is to evaluate the application of artificial neural networks (ANNs)
and support vector machines (SVMs) in data mining tasks in the process mining context. The goal was
to understand how these computational intelligence techniques are currently being applied in
process mining.
Design/methodology/approach – The authors conducted a systematic literature review with three
research questions formulated to evaluate the use of ANNs and SVMs in process mining.
Findings – The authors identified 11 papers as primary studies according to the criteria established in
the review protocol. Most of them deal with process mining enhancement, mainly using ANNs.
Regarding the data mining task, the authors identified three types of tasks used: categorical prediction
(or classification); numeric prediction, considering the “regression” type, and clustering analysis.
Originality/value – Although there is scientific interest in process mining, little attention has been
specifically given to ANNs and SVM. This scenario does not reflect the general context of data mining,
where these two techniques are widely used. This low use may be possibly due to a relative lack of
knowledge about their potential for this type of problem, which the authors seek to reverse with the
completion of this study.
Keywords Process mining, Data mining, Artificial neural networks, Computational intelligence,
Support-vector machines
Paper type Literature review
1. Introduction
Business process management (BPM) includes methods, techniques and tools to
support the design, enactment, management and analysis of business processes,
previously called business workflows, or simply workflows (van der Aalst et al., 2003).
The BPM life cycle includes the following stages: business processes modeling; Business Process Management
implementation of business process models; execution and supervision of business Journal
Vol. 21 No. 6, 2015
pp. 1391-1415
This work was supported by Fapesp (São Paulo Research Foundation) and Capes (Coordination © Emerald Group Publishing Limited
1463-7154
for the Improvement of Higher Education Personnel), Brazil. DOI 10.1108/BPMJ-02-2015-0017
BPMJ process instances; monitoring and auditing of running business process instances; and
21,6 evaluation and improvement of business process models (Weske, 2012). In this last
stage, the execution and monitoring histories of the instances of a business process can
be evaluated aiming its optimization.
According to Han and Kamber (2006), data mining refers to extracting or mining
knowledge from lage amounts of data. Moreover, data mining can be seen as a stage in
1392 a larger process called Knowledge Discovery from Data (Fayyad et al., 1996). In this
larger process, data from a specific context is collected, transformed and organized
before undergoing mining. After mining, the result should be organized in a structure
that is accessible to direct human interpretation. There are different tasks to be
addressed in data mining, with different techniques that can be applied to each one.
Among these techniques, those from the computational intelligence area are commonly
used (Wang and Fu, 2005), especially those using inductive reasoning, such as artificial
neural networks (ANN) and support vector machines (SVM), since they can be applied
in different data mining tasks (Stahl and Jordanov, 2012; Cortez, 2010). SVM, for
example, was included among the top ten algorithms in data mining according to the
sixth IEEE International Conference on Data Mining held in 2006 (Wu et al., 2007). In
addition, both techniques are quite capable of conducting non-complex linear
mappings, common in data mining contexts, and therefore the potential to achieve
highly accurate predictions. Finally, these models can extract knowledge, which is
useful in decision-making environments (Cortez et al., 2009).
The combination of both areas – BPM and data mining – establishes a new field of
study, known as business process mining, or simply process mining (van der Aalst,
2011). It deals with applying data mining tasks on data from the BPM lifecycle. Its goal
is to extract knowledge about events/data from the work carried out in the different
phases of a business process, seeking to improve it, discovering associations between
variables, behavior or misbehavior patterns (van der Aalst, 2011).
In this context, the main objective of this paper is to present the results of a study
that identified and analyzed the primary studies related to process mining that
exclusively use ANN or SVM as the data mining technique. Our intention was to reach
an overview of this type of process mining approach and also to more carefully
explore the use of two of the most important computational intelligence techniques.
With this purpose, this paper presents the following sections: a theoretical background;
the detailed SLR methodology; the results overview; the analysis of the selected
primary studies; a discussion on the results; the validity threats analysis; and, finally,
the conclusions.
2. Theoretical background
This section presents the main concepts related to this SLR: data mining and
process mining.
Scopus
TITLE-ABS-KEY((“process mining” OR “processes mining” OR “workflow mining” OR “workflows
mining” OR “mining process” OR “mining processes” OR “mining workflow” OR “mining workflows”
OR ((“business process” OR “business processes” OR workflow OR workflows) AND “data mining”))
AND ((neural OR SOM OR “Self Organizing” OR “Self-Organizing” OR “Organizing Map” OR
“Organizing Maps” OR MLP OR “Multilayer Perceptron” OR “Backpropagation” OR “Back-
Propagation” OR RBF OR “Radial Basis Function” OR artmap OR “Adaptive Resonance Theory” OR
hopfield OR LVQ OR “Learning Vector Quantization”) OR (SVM OR SVR OR SVC OR “Support
Vector” OR “Support-Vector”))) AND PUBYEAR W 2003 AND (LIMIT-TO(LANGUAGE, “English”))
AND (LIMIT-TO(DOCTYPE, “cp”) OR LIMIT-TO(DOCTYPE, “ar”) OR LIMIT-TO(DOCTYPE, “ip”))
AND (LIMIT-TO(SUBJAREA, “COMP”) OR LIMIT-TO(SUBJAREA, “ENGI”) OR LIMIT-TO
(SUBJAREA, “MATH”) OR LIMIT-TO(SUBJAREA, “BUSI”) OR LIMIT-TO(SUBJAREA, “MULT”))
ISI Web of Science
Topic ¼ ((“process mining” OR “processes mining” OR “workflow mining” OR “workflows mining” OR
“mining process” OR “mining processes” OR “mining workflow” OR “mining workflows” OR
((“business process” OR “business processes” OR workflow OR workflows) AND “data mining”)) AND
((neural OR SOM OR “Self Organizing” OR “Self-Organizing” OR “Organizing Map” OR “Organizing
Maps” OR MLP OR “Multilayer Perceptron” OR “Backpropagation” OR “Back-Propagation” OR RBF
OR “Radial Basis Function” OR ARTMAP OR “Adaptive Resonance Theory” OR Hopfield OR LVQ OR
“Learning Vector Quantization”) OR (“SVM” OR “SVR” OR “SVC” OR “Support Vector” OR “Support-
Vector”))); Refined by: Language: (ENGLISH) AND Document Types: (PROCEEDINGS PAPER OR
PAPER) AND Research Ares: (COMPUTER SCIENCE OR ENGINEERING OR OPERATIONS
Table II. RESEARCH MANAGEMENT SCIENCE OR MATHEMATICAL COMPUTATIONAL BIOLOGY OR
Search strings MATHEMATICS OR MEDICAL INFORMATICS OR BUSINESS ECONOMICS OR AUTOMATION
specific for each CONTROL SYSTEMS OR SCIENCE TECHNOLOGY OTHER TOPICS) Timespan ¼ 2004-2014.
data source Databases ¼ SCIEXPANDED, CPCI-S, BKCI-S
protocol (as explained in the following inclusion and exclusion criteria), when the ANN and
specific search engines for each data source enable doing it, in order to perform a pre- support vector
filter to discard applicable records for this SLR.
We first applied the search at the end of 2013 and reapplied it at the end of 2014.
machines
B. Primary study selection strategy. We specified a set of inclusion and exclusion
criteria based on the analysis scope and the quality of the papers found to guarantee
that only works actually related to the context of process mining with ANN or SVM 1397
would be selected as the primary studies. A study, identified after applying the search
string, is selected as primary study if it meets all the predefined inclusion criteria; but it
is eliminated if it meets any of the predefined exclusion criteria. Considering the
purpose of this SLR, as well as its respective identified research questions, we defined
the following criteria:
B.1. Inclusion criteria
IC-1 The paper essentially addresses data mining, i.e., data mining is directly related
to the main scope of the work rather than to data mining terms merely mentioned in a
generalized manner.
IC-2 The paper essentially addresses business processes (including workflow),
i.e., business processes and/or workflow rely directly to the main scope of the work rather
than to business processes/workflow terms merely mentioned in a generalized manner.
IC-3 Both data mining and business processes are addressed together in the paper to
present a process mining approach rather than each one of them being addressed
independently.
IC-4 The paper presents as its main objective the use of ANN or SVM as a technique
to implement data mining tasks in the process mining context.
B.2. Exclusion criteria
EC-1 The paper is not electronically available on the web.
EC-2 The paper is not presented entirely in the English language.
EC-3 The paper is not related primarily to the Computer Science or Information
Systems fields (e.g. the paper is related primarily to Medicine or Industrial
Engineering).
EC-4 The data register identified after applying the search string does not actually
refer to a scientific paper, but to some non-peer reviewed publication, such as: technical
reports; books and book chapters; proceedings’ prefaces; and journal’s editorials.
EC-5 The paper presents some type of review, such as a survey or some SLR
(i.e. a secondary study), and not the outcomes of some specific research work
(i.e. a primary study).
EC-6 The paper was published over 11 years ago.
data sources (see Table II) to the respective search engines. The searches
returned 188 registers, considering the sum of both data sources
and eliminating duplicate results. We regard this as a reasonable
number since we significantly delimited the search string considering the
given research area.
• Step 2. Applying the inclusion and exclusion criteria: in this step, we analyzed for
inclusion or exclusion, based on the predefined criteria, each data register
returned and identified as a candidate to be a primary study (as defined in
Section 3.1.3). We applied the inclusion and exclusion criteria based on a
thorough reading and analysis of the title, abstract and keywords of the
respective paper. To provide more reliability to the result, when it was not
completely clear if the paper should be included or excluded only with this first
reading, we also considered the introduction and conclusion sections. As a result
of applying the inclusion and exclusion criteria, out of the 188 initial candidate
registers, we selected only 11 primary studies, considered as the primary studies
for this SLR.
• Step 3. Assessing the quality of primary studies: this step is considered critical
and mandatory to assess the quality of primary studies (Kitchenham, 2007).
However, specifically for this SLR, no further exclusions were done based on the
quality assessment, as originally proposed by Chen and Ali Babar (2011).
Alternatively, we only carried out the quality assessment considering four
attributes and 11 sub-attributes used to categorize the primary studies through
an adaptation of the evaluation approach proposed by Dyba and Dingsøyr (2008).
Table III describes the attributes – “reporting”, “rigor”, “credibility” and
“relevance” and their sub-attributes.
Table IV shows a summary of the 11 primary studies, resulting from Step 2, described
above. The data show that seven were published in journals and four were published in
conferences.
Attribute Description
ANN and
support vector
Reporting Concerned with the quality of the information being reported in terms of a study’s rationale, machines
objectives, and context
Rep.1 Is the primary study based on research (or merely a “lessons learned” report based on
expert opinion)?
Rep.2 Is there a clear statement of the research goals?
Rep.3 Is there an adequate description of the context in which the research was carried out? 1399
Rigor Concerned with the accuracy of the research methods employed to establish the validity of data
collection tools and the analysis methods, and hence the trustworthiness of the findings
Rig.1 Was the research design appropriate to address the research goals?
Rig.2 Was the recruitment strategy appropriate for the research goals?
Rig.3 Was there a control group to compare the treatments?
Rig.4 Was the data collected in such a way that it addressed the research issue?
Rig.5 Was the data analysis sufficiently rigorous?
Credibility Concerned with the trustworthiness of the study methods used for ensuring that the findings
were valid and meaningful
Cre.1 Was the relationship between researcher and participants adequately considered?
Cre.2 Is there a clear statement of the findings?
Relevance Concerned with the assessment of the significance of the study for the software industry at
large and the research community Table III.
Rel.1 Is the study of value for research or practice? Quality assessment
Source: Based on Dyba and Dingsøyr (2008) attributes
3.2.2 Data extraction and synthesis. During this stage, all selected primary studies
underwent more in-depth readings, going beyond their introduction and conclusion
sections, mainly seeking to answer the research questions specified (as presented in
Section 3.1.2). Moreover, during such a detailed reading and analysis, the application of
exclusion criteria could be refined in some cases. Specifically for data extraction, we
used a form to capture relevant information from the primary studies, in order to
answer the research questions. We used a set of common attributes, in such a form, to
extract data from each primary study; these attributes were: publishing vehicle
(workshop, conference, or journal); title; and, author(s). Besides theses common
attributes, we also used a series of other specific attributes during the paper analysis
and the completion of the form; these specific attributes were used to extract data
taking into account each of the different research questions, to which specific
extraction strategies were also established.
4. Results overview
This section presents an overview of the results produced by conducting this SLR
according to the protocol presented in the Section 3. Figure 2 shows the temporal
distribution of the primary studies (from 2004 to 2014). According to the data
presented, there is a concentration of primary studies published in the last four years of
the period assessed.
An analysis of the selected primary studies produced the classifications and
structured results presented as follows, specifically related to the assessment of the
quality attributes and the responses of the research questions.
Quality assessment. Assessing the quality of primary studies.
BPMJ Publication
21,6 Year ID Authors Title type
2004 J-1 Ho, Lau, Ip and Ning An intelligent information infrastructure to Journal
support the streamlining of integrated logistics
workflow
2006 J-2 Ho, Lau, Lee, Ip and Pun An intelligent production workflow mining Journal
1400 system for continual quality enhancement
C-1 Tsang, Lau and Kwok Development of a distributed process mining Conference
system for reactive ion etching enhancement
C-2 Thomas, Adam, Leyking A fuzzy paradigm approach for business Conference
and Loos process intelligence
2011 J-3 Kang, Lee, Kim and Kang KNNI-SVM: A hybrid algorithm integrating Journal
imputation and support vector machine for
real-time business process monitoring
C-3 Zhang, Yang, Shen and Process optimization of candy production Conference
Chen based on data mining
2012 J-4 Liu, Cheng and Ni Mining event logs to support workflow Journal
resource allocation
2013 J-5 Song, Yang, Siadat and A comparative study of dimensionality Journal
Pechenizhiy reduction techniques to enhance trace
clustering performances
C-4 Esteva, Xu, Felix and Data mining for “big archives” analysis: A case Conference
Anantha study
2014 J-6 Kranjc, Smailovića, Active learning for sentiment analysis on data Journal
Podpečana, Grčara, streams: Methodology and workflow
Žnidaršiča, Lavrača implementation in the ClowdFlows platform
Table IV. J-7 Seret, Broucke, Baesens and A dynamic understanding of customer Journal
Final list of primary Vanthienen behavior processes based on clustering and
studies sequence mining
Number of studies
3
2
Figure 2.
Distribution of 1
primary studies by
publication year 0
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
Table V presents data regarding the quality evaluation of the selected primary studies
taking into account the attributes defined in Table III. Each sub-attribute was assessed
and scored as “Complete – 1.0 point”, “Partial – 0.5 point” or “None – 0 point”. Studies
were best assessed in terms of the attributes “reporting” and “relevance”, with relative
rates of 91 and 82 percent, respectively. In contrast, they were worst assessed in terms
of the attributes “credibility” and “rigor”, with relative rates of 61 and 56 percent,
respectively:
RQ1. What types of ANN or SVM are used to implement data mining tasks when
specifically applied to the process mining context?
Reporting Rigor Credibility Relevance
ANN and
ID Rep.1 Rep.2 Rep.3 Rig.1 Rig.2 Rig.3 Rig.4 Rig.5 Cre.1 Cre.2 Rel.1 Quality score support vector
machines
J-1 C C C C P N P P P C C 8.0
J-2 C C P C C N C P P C C 8.5
C-1 C P P C N N C P N P P 5.5
C-2 C C P P N N P N N P P 4.5
J-3 C C C C N N P N N P P 5.5 1401
C-3 C P P P N N P N N P P 4.0
J-4 C C C C C N C C P C C 9.5
J-5 C C C C C N C C C C C 10.0
C-4 C C C C C N C C C C C 10.0
J-6 C C C C P N C P P C C 8.5 Table V.
J-7 C C C C C N C C P C C 9.5 Classification of
Notes: C, complete (1.0 point); P, partial (0.5 point); N, none (0 point) primary studies
Source: Dyba and Dingsøyr (2008) regarding quality
Tables VI, VII and VIII illustrate a summary of the data extraction and classification
result from the 11 primary studies scope of this SLR in order to answer this first
research question. With regard to the approaches identified in these primary studies
using ANN, the data of Table VI and Table VIII show that most of them have
multilayer architecture with supervised learning. As for the approaches identified in
these primary studies using SVM, the data of Tables VII and VIII show that all studies
used the basic model for SVM classification with supervised learning:
RQ2. Which data mining tasks are addressed in process mining when applying
ANN and SVM?
J-1 X
J-2 X
C-1 X
C-2 X
C-3 X Table VI.
J-5 X Classification of
J-7 X primary studies
Note: X means that the evaluated attributes (at the first line) were found in the evaluated primary regarding ANN
studies (at the first column) architectures
J-3 X
J-4 X Table VII.
C-4 X Classification of
J-6 X primary studies
Note: X means that the evaluated attributes (at the first line) were found in the evaluated primary regarding SVM
studies (at the first column) variations
BPMJ In relation to data mining tasks, the data in Table IX show that for the approaches
21,6 identified in the primary studies scope of this SLR, three of the five categories are
covered when considering its resolution with ANN or SVM. Representatives for the
following tasks were found: categorical prediction (or classification), numeric prediction
(“regression” type), and clustering analysis. No study has been identified for the other
two categories: numeric prediction (“trend identification” type), and frequent patterns,
1402 association and correlation rules discovery. In fact, two studies involve frequent
patterns discovery task, but are solved with techniques other than ANN and SVM, thus
not counted in Table IX:
RQ3. What types of process mining are treated by ANN and SVM when these
techniques are used to address data mining tasks in this context?
With regards to the type of process mining, whose objective is to verify the ANN and
SVM applications in the area of interest, the data in Table X show that two studies
J-1 X
J-2 X
C-1 X
C-2 X
J-3 X
C-3 X
J-4 X
J-5 X
Table VIII. C-4 X
Classification of J-6 X
primary studies J-7 X
regarding ANN and Note: X means that the evaluated attributes (at the first line) were found in the evaluated primary
SVM learning type studies (at the first column)
Numeric prediction
Categorical “Trends frequent patterns discovery,
prediction (or “Regression” identification” Clustering association and correlation rules
ID classification) type type analysis discovery
J-1 X
J-2 X
C-1 X
C-2 X
J-3 X
C-3 X
J-4 X
J-5 X
Table IX. C-4 X
Classification of J-6 X
primary studies J-7 X
regarding data Note: X means that the evaluated attributes (at the first line) were found in the evaluated primary
mining task type studies (at the first column)
ID Discovery Conformance Enhancement
ANN and
support vector
J-1 X machines
J-2 X
C-1 X
C-2 X
J-3 X
C-3 X 1403
J-4 X
J-5 X
C-4 X Table X.
J-6 X Classification of
J-7 X primary studies
Note: X means that the evaluated attributes (at the first line) were found in the evaluated primary regarding the
studies (at the first column) process mining type
relate to the discovery type, three to enhancement, and six to conformance. Although
this classification was carried out considering the definitions given by van der Aalst
(2011), most studies in fact do not strictly follow the definitions proposed by that expert
for the process mining area. Therefore the classification in Table X refers to an
approximation of that proposal by van der Aalst (2011) taking into account the analysis
conducted by the authors of this study.
6. Discussion
Based on the information presented in the previous sections we conducted some
analyses, whose the results may be useful for the community of researchers interested
in using ANN and SVM to perform process mining.
First, regarding the number of identified primary studies, there is still a limited
number of studies being conducted with the goal of applying ANN and SVM in process
mining. Considering that approximately 620 works were initially identified in the area
of process mining, the 11 final studies selected represent only about 2 percent of all this
entire area. With respect to a possible trend regarding the distribution during the
11-year period evaluated, as shown in Figure 2, it appears that two-thirds of the studies
were published in the last four years, after a four-year period without any publication,
which may indicate an apparent research retake and interest in this area.
Moreover, in the studies evaluated the authors usually report optimistic impressions
regarding the use of these techniques in the process mining context, including
reasonable numerical results, by supporting the production of useful knowledge for
the business areas involved in the studies. However, considering the point of view
of the computational intelligence area, an analysis of the test and metrics strategies to
evaluate the quantitative results presented in these studies reveals a degree of
immaturity of these works in the standardization of the evaluation methods and the
availability of benchmark data sets that allow the reproducibility of the studies.
In order to support the analyses and discussion further presented here, Table XI
presents a summary of the data previously presented in Tables VI-X. It allows
to visualize in an integrated way all the 11 primary studies regarding all the evaluated
21,6
BPMJ
1408
Table XI.
mining type)
Classification
together (ANN
summarized of
primary studies
regarding all the
architectures, SVM
J-1 X 8.0
J-2 X 8.5
C-1 X 5.5
C-2 X 4.5
J-3 X 5.5
C-3 X 4.0
J-4 X 9.5
J-5 X 10.0
C-4 X 10.0
J-6 X 8.5
J-7 X 9.5
Note: X means that the evaluated attributes (at the first line) were found in the evaluated primary studies (at the first column)
aspects together as defined through the three research questions, i.e.: process mining ANN and
type, data mining task type, and details of the technique used. For sake of simplicity, support vector
Table XI presents only the attributes, and the combinations of attributes, that
were used in the previous tables. For example, the ANN architecture “feedforward
machines
single-layer” is not present in Table XI, since there is no study presented in Table VI
classified in such an attribute. Also aiming to summarize all the results together,
Figure 3 presents a cross-analysis considering the type of process mining versus the 1409
type of data mining task and some information regarding the technique used in each
primary study.
The works identified in this SLR share a pattern in relation to the items that we
investigated through the specific research questions. Most of the papers are studies
that perform some form of process mining enhancement, mainly using ANN. The
following presents specific analyses for each of the research questions investigated in
this SRL, as well as some crossed SRL analysis.
Regarding the type of process mining treated in the primary studies assessed,
according to Table XI and Figure 3, approximately 55 percent of the papers refer to
enhancement, followed by approximately 27 percent that refer to conformance, and about
18 percent refer to discovery. Although this classification takes into consideration the
definitions proposed by van der Aalst (2011), most of the primary studies identified in
this SLR did not fully adhere to the concepts presented by this process mining expert. For
example, only four of the 11 primary studies explicitly refer to the term process mining
( J-4, J-5, C-1, C-2) and one of them explicitly refers to the term workflow mining ( J-2).
Thus, slightly more than half of the identified primary studies were evaluated for
referring to the application of data mining in the business process context (or workflow),
which was understood as process mining indirectly. Additionally, only five of the 11
studies explicitly mention the use of logs in their approach, called event logs or process
logs, or instance logs, and other terms ( J-2, J-3, J-4, J-5, C-1). This means that slightly more
than half of the identified primary studies are not based on the analysis of event logs to
perform data mining tasks and may not accurately represent what is defined as process
mining. Finally, only five studies explicitly deal with process models or workflow models,
which is considered the basis for the three types of process mining according to van der
Aalst (2011) ( J-4, J-5, J-6, C-2, C-3). Overall, only two studies meet these three evaluated
characteristics together ( J-4 and J-5) (i.e. 22 percent) while three studies do not meet any
such characteristics ( J-1, J-7, C-4) (i.e. 33 percent).
Clustering analysis -
2
Unsupervised learning - Competitive layer ANN
7. Validity threats
In order to avoid threats to construct validity (Feldt and Magazinius, 2010), the “process
mining” and “workflow mining” terms were well established and are therefore sufficiently
stable to be used as search strings. Similarly, “business process” and “workflow”, together
with “data mining” terms, were also well established. Another point is to ensure
discovering all the primary studies in the theme chosen. For this purpose, two reputable
databases were used, namely, Scopus and ISI WoS. Together they index most of the
papers also indexed by other reputable databases, such as IEEEXplore, ACM Digital
Library, SpringerLink, ScienceDirect and Engineering Village.
As a threat to the internal validity (Alves et al., 2010), some subjective decisions may
have occurred during paper selection and data extraction since some primary studies
did not provide a clear description or proper purposes and results, making difficult the
objective application of the inclusion/exclusion criteria or the impartial data extraction.
To minimize selection and extraction systematic mistakes, several meetings were held
by the authors of this review work to discuss the type of proper treatment to the
identified conflicts. In order to minimize internal validity threats regarding data
analysis, this SLR uses some descriptive statistics techniques, such as: graphs to
summarize data; tabular description; and, parametric description (average).
Regarding external validity (Perry et al. 2000; Alves et al., 2010), we consider that
both scientific and industrial communities in the BPM and data mining domains can
benefit from the results of this SLR, and possibly the Information Systems and
computational intelligence fields as a whole. On the other hand, as a threat to external
validity, the scope of this SLR might not generalize to broader study selections other
than peer-reviewed papers, basically conference and journal papers.
BPMJ In terms of reliability purpose (Alves et al., 2010), we defined the search string and
21,6 procedures so that they could be directly and objectively replicated by other researchers.
Classification, however, is a source of reliability threat since evaluators inherently consider
subjective factors during primary studies analysis, even if carried out by several evaluators
in order to minimize distortions. Thus, there is no guarantee that other researchers could
achieve the same result as the primary studies classification presented herein.
1412
8. Conclusion
Through this SLR, it is found that although there is scientific interest in the area of
process mining, little has been specifically invested in ANN and SVM. In addition to the
relatively low number of primary studies identified, they do not cover the various
possible combinations in this context, not exploring the different existing possibilities
regarding the types of process mining or the types of architecture and learning related
ANN or to SVM variations. Considering the careful protocol we used for this SLR, is not
likely there are other studies that we did not identify here.
This scenario identified for the process mining context does not reflect the general
context of data mining, since, in this second case, ANN and SVM are widely used to solve
specific types of problems, as well as other computational intelligence techniques (Wang
and Fu, 2005; Wu et al., 2007). This low use of ANN and SVM may be due to a lack of
knowledge about their potential capability for this type of problem. Given that the area of
process mining involves multi-disciplinary knowledge, this may occasionally result in the
lack of expertise in certain areas of knowledge.
This SLR focussed only on ANN and SVM, which represent only about 2 percent of
all process mining studies currently developed and published. Other reviews must be
carried out with other computational intelligence techniques such as fuzzy set theory,
probabilistic reasoning evolutionary computing – including genetic algorithms and
genetic programing, etc. Our research group intends to investigate whether these other
techniques, also widely used in data mining in general, and which have already
presented good results, have been applied in process mining.
Notes
1. www.scopus.com
2. www.webofknowledge.com
3. Online Analytical Processing (OLAP): technology that uses a multidimensional view of
aggregate data to provide quick access to strategic information for further analysis. OLAP
enables analysts, managers, and executives to gain insight into data through fast, consistent,
interactive access to a wide variety of possible views of information (source: OLAP Council
White Paper - www.olapcouncil.org/research/whtpaply.htm).
4. TAGS: an identification system consisting of acronyms and words specifically designed to
organize communications disseminated throughout US Departments (source: www.state.gov/
documents/organization/89320.pdf).
References
Abonyí, J., Feil, B. and Abraham, A. (2005), “Computational intelligence in data mining”,
Informatica, Vol. 29 No. 1, pp. 3-12.
Alves, V., Niu, N., Alves, C. and Valenca, G. (2010), “Requirements engineering for software
product lines: a systematic literature review”, Information and Software Technology
(INFSOF), Vol. 52 No. 8, pp. 806-820.
Biolchini, J., Mian, P.G., Natali, A.C.C. and Travassos, G.H. (2005), “Systematic review in software ANN and
engineering”, Technical Report RT-ES 679/05, Federal University of Rio de Janeiro, Rio de
Janeiro, May.
support vector
Chen, L. and Ali Babar, M. (2011), “A systematic review of evaluation of variability management
machines
approaches in software product lines”, Information and Software Technology (INFSOF),
Vol. 53 No. 4, pp. 344-362.
Cortez, P. (2010), “Data mining with neural networks and support vector machines using the 1413
R/rminer tool*”, in Perner, P. (Ed.), Proceedings of 10th International Conference on Data
Mining, ICDM 2010, Springer-Verlag, Berlin, pp. 572-583.
Cortez, P., Cerdeira, A., Almeida, F., Matos, T. and Reis, J. (2009), “Modeling wine preferences by data
mining from physicochemical properties”, Decision Support Systems, Vol. 47 No. 4, pp. 547-533.
Cristianini, N. and Shawe-Taylor, J. (2000), An Introduction to Support Vector Machines and Other
Kernel-based Learning Methods, Cambridge University Press, Cambridge.
Dyba, T. and Dingsøyr, T. (2008), “Strength of evidence in systematic reviews in software
engineering”, in Rombach, H.D., Elbaum, S.G. and Münch, J. (Eds), Proceedings of the 2nd
International Symposium on Empirical Software Engineering and Measurement, ESEM
2008, ACM Press, Kaiserslautern, pp. 178-187.
Fausett, L. (1994), Fundamentals of Neural Networks Architectures, Algorithms and Applications,
Prentice Hall, Upper Saddle River, NJ, 461pp.
Fayyad, U., Piatetsky-Shapiro, G. and Smyth, P. (1996), “From data mining to knowledge
discovery in databases”, AI Magazine, Vol. 17 No. 3, pp 37-54.
Feldt, R. and Magazinius, A. (2010), “Validity threats in empirical software engineering research –
an initial survey”, Proceedings of the 22nd International Conference on Software
Engineering and Knowledge Engineering, SEKE 2010, Knowledge Systems Institute
Graduate School, Redwood City, CA, pp. 374-379.
Han, J. and Kamber, M. (2006), Data Mining – Concepts and Techniques, 2nd ed., Morgan
Kaufmann, Waltham, MA, 743pp.
Haykin, S. (2005), Neural Networks a Comprehensive Foundation, 2nd ed., Prentice Hall,
Upper Saddle River, NJ, 302pp.
Kitchenham, B. (2007), “Guidelines for performing systematic literature reviews”, Software
Engineering, Technical Report EBSE-2007-01, Software Engineering Group, School of
Computer Science and Mathematics, Keele University, Keele and Department of Computer
Science, University of Durham, Durham, July 9.
Nazem, S.M. and Shin, B. (2002), “Data mining: new arsenal for strategic decision-making”, in Becker,
S. (Ed.), Data Warehousing and Web Engineering, IRM Press, Hershey, PA, pp. 103-112.
Perry, D.E., Porter, A.A. and Votta, L.G. (2000), “Empirical studies of software engineering:
a roadmap”, Proceedings of the 22nd International Conference on Software Engineering,
Future of Software Engineering Track, ICSE 2000, ACM Press, Limerick, June 4-11,
pp. 345-355.
Stahl, F. and Jordanov, I. (2012), “An overview of the use of neural networks for data mining tasks”,
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol. 2 No. 3, pp. 193-208.
Tiwari, A. and Turner, C.J. (2008), “A review of business process mining: state-of-the-art and
future trends”, Business Process Management Journal, Vol. 14 No. 1, pp. 5-22.
van der Aalst, V.M.P. (2011), Process Mining – Discovery, Conformance and Enhancement of
Business Processes, Springer-Verlag, Heidelberg, Berlin, 352pp.
van der Aalst, W.M.P., Hofstede, A.H.M.T. and Weske, M. (2003), “Business process management:
a survey”, Proceedings of the International Conference on Business Process Management –
BPM, pp. 1-12.
BPMJ Vapnik, V.N. (1995), The Nature of Statistical Learning Theory, Springer-Verlag, Berlin and
Heidelberg, 314pp.
21,6
Wang, L. and Fu, X. (2005), Data Mining with Computational Intelligence, Springer-Verlag, Berlin
and Heidelberg, 276pp.
Weske, M. (2012), Business Process Management: Concepts, Languages, Architectures, 2nd ed.,
Springer-Verlag, Berlin and Heidelberg, 403pp.
1414 Wu, X., Kumar, V., Quinlan, F.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Kiu, B.,
Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J. and Steinberg, D. (2007), “Top 10 algorithms
in data mining”, Knowledge Information Systems, Vol. 14 No. 1, pp. 1-37.
Further reading
Esteva, M., Felix, J.T., Xu, W. and Anantha, K.P. (2013), “Data mining for ‘big archives’ analysis: a
case study”, in Bouthillier, F. and Ju, B. (Eds), Proceedings of the Association for Information
Science and Technology, ASIS&T 2013, ASIS&T Press, Montreal, pp. 90.01-90.10.
Ho, G.T.S., Lau, H.C.W., Ip, A.W.H. and Ning, A. (2004), “An intelligent information infrastructure
to support the streamlining of integrated logistics workflow”, Expert Systems, Vol. 21 No. 3,
pp. 123-137.
Ho, G.T.S., Lau, H.C.W., Lee, C.K.M., Ip, A.W.H. and Pun, K.F. (2006), “An intelligent production
workflow mining system for continual quality enhancement”, International Journal of
Advanced Manufacturing Technology, Vol. 28 No. 7, pp. 792-809.
Kang, B., Lee, J., Kim, D. and Kang, S.-H. (2011), “KNNI-SVM: a hybrid algorithm integrating
imputation and support vector machine for real-time business process monitoring”, ICIC
Express Letters – An International Journal of Research and Surveys, Vol. 5 No. 8(B)
pp. 2863-2868.
Kranjc, J., Smailovića, J., Podpečana, V., Grčara, M., Žnidaršiča, M. and Lavrača, N. (2014), “Active
learning for sentiment analysis on data streams: methodology and workflow
implementation in the ClowdFlows platform”, Information Processing and Management,
Vol. 51 No. 2, pp. 187-203.
Liu, T., Cheng, Y. and Ni, Z. (2012), “Mining event logs to support workflow resource allocation”,
Knowledge-Based Systems, Vol. 35, November, pp. 320-331.
Seret, A., Broucke, S., Baesens, B. and Vanthienen, J. (2014), “A dynamic understanding of
customer behavior processes based on clustering and sequence mining”, Expert Systems
with Applications, Vol. 41 No. 10, pp. 4648-4657.
Song, M., Yang, H., Siadat, S.H. and Pechenizhiy, M. (2013), “A comparative study of
dimensionality reduction techniques to enhance trace clustering performances”, Expert
Systems with Applications, Vol. 40 No. 9, pp. 3722-3737.
Thomas, O., Adam, O., Leyking, K. and Loos, P. (2006), “A fuzzy paradigm approach for business
process intelligence”, Proceedings of the 8th IEEE International Conference on E-Commerce
Technology (CEC 2006) and the 3rd IEEE International Conference on Enterprise
Computing, E-Commerce and E-Services (EEE 2006), IEEE Computer Society, Palo Alto,
CA, June 26-29, pp. 27.
Tsang, K.F., Lau, H.C. and Kwok, S.K. (2006), “Development of a distributed process mining
system for reactive ion etching enhancement”, Proceedings of the IEEE International
Conference on Industrial Informatics (INDIN 2006), IEEE Press, Singapore, August 16-18,
pp. 282-287.
Zhang, J.L., Yang, J.G., Shen, S.G. and Chen, H.Y. (2011), “Process optimization of candy production
based on data mining”, Advanced Materials Research, Vols-282-283, July, pp. 662-665.
About the authors ANN and
Ana Rocío Cárdenas Maita is a Graduate Student of the Master of Science Program in support vector
Information Systems at the University of São Paulo, Brazil. Bachelor in Computer Engineering
and Systems (2011) at the National University of San Antonio Abad del Cusco, Peru. Her main machines
research interests are information technology and business process management.
Lucas Corrêa Martins is an Undergraduate Student of the Bachelor Program in Information
Systems at the University of São Paulo, Brazil.
Dr Carlos Ramón López Paz is an Assistant Professor at the Higher Polytechnic Institute “José 1415
Antonio Echeverría”, Cuba. PhD in Technical Sciences (2011) at the University of Alicante, Spain;
Master in Applied Computing (2006) and a Bachelor in Computer Engineering (2006) at the
Higher Polytechnic Institute “José Antonio Echeverría”, Cuba. Dr. Carlos Paz has worked as a
Visiting Researcher (2013) at the University of São Paulo, Brazil. His main research interests are
consulting in business processes management, design science in information systems, strategic
alignment between business and IT, and IT governance.
Dr Sarajane Marques Peres is an Assistant Professor at the University of Säo Paulo, Brazil. PhD
in Electric Engineering (2006) at the University of Campinas; Master of Manufacturing Engineering
(1999) at the Federal University of Santa Catarina; a Bachelor in Computer Science (1996) at the
State University of Maringá, Brazil. She worked as Assistant Professor at the State University of
Western Paraná (1998-2005) and at the State University of Maringá (2005-2007), Brazil. Currently,
She is the tutor of the PET Information Systems USP group, under the Tutorial Education Program
of the Ministry of Education, Brazil. Her main research interests are computational intelligence,
data mining, machine learning, pattern recognition and gesture analysis.
Dr Marcelo Fantinato is an Associate Professor at the University of Säo Paulo, Brazil. PhD in
Computer Science (2007) and Master of Engineering (2002) at the University of Campinas;
Bachelor in Computer Science (1999) at the State University of Maringá, Brazil. He worked as a
Software Testing Specialist at the CPqD Foundation (2001-2006) and as a specialist in research
and development at Motorola (2006-2008), Brazil. He has a Green Belt certification in the Motorola
Six Sigma program for process improvement. His main research interests are business process
management, service-oriented computing, software product line, and software testing.
Dr Marcelo Fantinato is the corresponding author and can be contacted at: [email protected]
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: [email protected]