Yana A. Bekeneva, I. Kholod, E. Novikova, Denis Shevelev, A. Shorov
{"title":"Event Pattern Constructing Technique for Prediction of Violations in Technological Processes","authors":"Yana A. Bekeneva, I. Kholod, E. Novikova, Denis Shevelev, A. Shorov","doi":"10.1109/EICONRUS.2019.8656901","DOIUrl":null,"url":null,"abstract":"The problem of the prediction of violations in business processes is considered in the paper. The authors suggest application of the frequent item sets mining technique for analysis of the event streams. This approach allows investigation of the event sequences and revealing of the event sequences which lead to the violations. The detected violation patterns then could be used for monitoring data in the real time mode. The proposed technique could be applied when analyzing data from sensors of different type and used in distributed systems. The method is able to predict a violation before it occurs avoiding thus dangerous situations.","PeriodicalId":6748,"journal":{"name":"2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"22 1","pages":"182-186"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EICONRUS.2019.8656901","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The problem of the prediction of violations in business processes is considered in the paper. The authors suggest application of the frequent item sets mining technique for analysis of the event streams. This approach allows investigation of the event sequences and revealing of the event sequences which lead to the violations. The detected violation patterns then could be used for monitoring data in the real time mode. The proposed technique could be applied when analyzing data from sensors of different type and used in distributed systems. The method is able to predict a violation before it occurs avoiding thus dangerous situations.