Next Article in Journal
Implementing Project-Based Language Teaching to Develop EFL High School Students’ Key Competences
Next Article in Special Issue
A Hybrid Brain Storm Optimization Algorithm to Solve the Emergency Relief Routing Model
Previous Article in Journal
MagWasteVal Project—Towards Sustainability of Mining Waste
Previous Article in Special Issue
A Dynamic Social Network Matching Model for Virtual Power Plants and Distributed Energy Resources with Probabilistic Linguistic Information
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Behavior Change Mining Method Based on Complete Logs with Hidden Transitions and Their Applications in Disaster Chain Risk Analysis

1
Research Institute for Risk Governance and Emergency Decision Making, School of Management Science and Engineering, Nanjing University of Information Science & Technology, Nanjing 210044, China
2
School of Mathematics and Finance, Chuzhou University, Chuzhou 239000, China
3
School of Business, Linyi University, Linyi 276005, China
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(2), 1655; https://doi.org/10.3390/su15021655
Submission received: 11 November 2022 / Revised: 4 January 2023 / Accepted: 11 January 2023 / Published: 14 January 2023

Abstract

:
The aim of change mining is to discover changes in process models based on execution data recorded in event logs. There may be hidden transitions in the process models related to, for example, business integration and user requirements that do not exist in event logs. Behavioral change mining in the case of hidden transitions is a fundamental problem in the field of change mining. Existing research on change mining has not considered the effects of hidden transitions. This paper proposes a novel method based on complete logs with hidden transitions for mining behavioral changes. We analyze the behavioral relations of activities based on changed logs under the condition that the original model is unknown. Log-driven change mining is realized by calculating the log behavioral profile, minimum successor relation, and log-weighted coefficient, which allows the mining of hidden transitions, as well as changed behavioral relations. Finally, this method is applied to disaster chain risk analysis, and the evolution of disaster chains in different scenarios is mined from disaster logs to determine the type of disaster chain. The results of this paper provide a scientific basis for the strategy of chain-cutting disaster mitigation in the emergency management of disaster chains.

1. Introduction

With the continuous innovation and development of theory and workflow technology in business process management, an increasing number of large enterprises and management organizations are using process models to formalize internal business processes. However, business process models are constantly changing with the successful development of enterprise management and changes in regulations, policies, user requirements, and software maintenance [1]. These changing factors affect the behavior and structure of the models. Therefore, correctly identifying and mining process model changes is important for fault detection and diagnosis and the maintenance of business systems [2].

1.1. Problem Statement and Research Questions

Previous studies on changes in business process models have mainly focused on the change region, change propagation, change logs, and anomaly detection. In recent years, many scholars have focused on detecting the differences between different models in the change region and the change propagation analysis of process models [3,4,5]. Meanwhile, in the case that the process model is out of sync and inconsistent, the change queue has been used to propagate changes and achieve synchronous continuity. The model change analysis technology proposed in this paper is beneficial for the detection of the abnormal behavior of process models in actual operation. Previously, a submodel of the labelled business process model was constructed on the basis of analyzing the behavioral characteristics of Petri nets, and the concept of the action mode was proposed to determine the minimum change region [3].
Once the model changes, model management technology becomes indispensable. A synchronization method based on model elements [4] has been used for change management between process models at different levels of abstraction. A method of change propagation [5] that detects existing changes between different models has been proposed to determine the change region and solve the inconsistency of a model in layered refinement. Fang et al. proposed a dynamic analysis method based on Petri net modules to search for the change region [6] and introduced the T invariant to optimize the method and thus obtain the change region most accurately. Their method also improved the accuracy and excellence of the model change detection. A change propagation technology based on software maintenance [7] has been proposed to provide a powerful tool in solving the change propagation of process models in software maintenance and evolution. In addition to the research on the change region and change propagation, several scholars have analyzed change fragments in process models in recent years [8,9,10]. Cross-organization collaboration becomes more complex as business requirements become more complex. The concept of configurable process fragments has been proposed to solve the changes in the complexity of similar process models [8]. Here, event logs are used as input to construct a configurable process model that contains change fragments. A method is presented which is based on the improved process structure tree and software product line [9] to automatically identify reusable variable fragments and merge similar fragments into main fragments. This method mainly starts from the change fragments and restructures the design of the model. Process fragments have been defined [10], and an improved fragment called the morphological fragment has been proposed for detecting process model changes and reusing process combinations. In the case that the original reference model is unknown [11], the morphological fragment provides a new cornerstone for research on business process change mining whereby business process changes can be discovered from the joint occurrence relations of incomplete event logs. BINet, a neural network architecture for real-time multi-perspective anomaly detection in business process event logs, has been introduced [12]. Additionally, a set of heuristics has been proposed for automatically setting the threshold of an anomaly-detection algorithm automatically. A novel approach to detecting event log anomalies in process event streams has been described [12]. This approach focuses on a general framework into which different anomaly-detection methods can be plugged. As early as 2018, Fang et al. investigated log mining model changes [13], but they compared system logs with the actual models to obtain possible change patterns.
In recent years, an increasing number of scholars have researched business process anomaly detection [12,14], workaround detection methods [15], and business process monitoring techniques [16]. Nolle et al. proposed a method [14] that uses autoencoders to detect and analyze anomalies. This method has been further refined in terms of performance and evaluated on more sophisticated datasets. Anomaly detection also focuses on detecting temporal workarounds in business processes. Weinzierl et al. proposed a deep-learning-based method [15] that helps to detect different workaround types in event logs. The method is accurate and functions most effectively in business processes, having fewer variations and a higher number of different activities. A technique for explainable predictive process monitoring was proposed in [16], where relevance values for process activities are extracted from a graph neural network. This method is the first to use gated graph neural networks (GGNNs) to make decisions more explainable. In short, anomaly detection research mainly focuses on business process detection and workaround detection. Change mining is a branch in data mining [17] that focus on researching the behavioral changes caused by changed logs. These are widespread research branches in business process management. By identifying outliers, researchers can gain important knowledge and make better data decisions.
A Petri net is also widely used in practical application scenarios of risk assessment and disaster chain analysis since this method dynamically simulates the evolution of disaster chains as a discrete modeling tool. Examples of its application can be seen for earthquakes [18], coal mining [19], floods [20], and oil spills [21]. A colored Petri net demonstrates the recovery process by simulating the behavior of a disaster and capturing the differences in resource allocation following an earthquake disaster [18]. At the same time, Petri net technology addresses delays in decision making, responses to conflicts, and limited resources during emergencies [19]. The construction of an evolutionary analysis model of a flood disaster chain [20] not only allows an analysis of disaster elements but also helps to quickly and effectively curb the spread of a disaster. These benefits are similar to those of an oil spill disaster chain model [21], with both models providing a scientific basis for a chain break mitigation strategy of disaster chain emergency management through a dynamic derivation of the evolutionary process of the disaster and an analysis of the maximum risk path.
However, previous studies on disaster chain risk analysis require a known Petri net model. In contrast, the actual reference model is unknown or contains hidden transitions in most business processes. The hidden transition is also called the invisible transition, and it mainly plays the role of routing. Research on the mining of business process changes is based on models [3,4,5,6,7,8,9,10] or logs [11,12,13,22] and fails to consider the effects of hidden transitions on model changes. In this paper, we propose a behavioral-change-mining method considering hidden transitions to improve existing methods under the condition of complete logs. We demonstrate the superior performance of our proposed method in experiments.

1.2. Contributions and Research Method

The innovations of the present study are summarized as follows.
  • The concepts of the log minimum successor relation and log-weighted coefficient are proposed to quantify the occurrence dependencies of pairs of activities in logs.
  • The behavioral relations of pairs of activities are quantitatively analyzed by calculating the log behavioral profiles and the log minimum successor relations. Additionally, the behavioral relations of pairs of activities are further refined.
  • A change-mining method based on hidden transitions is proposed to mine different kinds of hidden transitions and solve the problem of searching for behavioral relation changes with hidden transitions in event logs.
The remainder of the paper is arranged as follows. Section 2 introduces a motivating example. Section 3 presents related knowledge on the event log, log behavioral profile, and log minimum successor relation. Section 4 constructs change-mining methods based on complete logs and presents examples. Section 5 presents an experiment to verify the correctness of the method. Section 6 describes a specific disaster case to validate the practicability of the proposed method. Section 7 concludes the paper with suggestions for future work.

2. Motivating Example

A hidden transition is also called an invisible transition. Since hidden transitions do not appear in any event trace, it is a challenging problem to discover behavioral changes that contain hidden transitions in the field of change mining. A complete log is a log that contains all transition activities and possible behavioral relations among all activities. In what follows, we illustrate the necessity of the change-mining method proposed in this paper by giving a detailed example.
Firstly, it is necessary to understand the history logs and actual logs of the system. To simplify notation, the history logs are denoted L h i s , the actual logs are denoted L a c t , a mapped letter set for logs is denoted Y L , and the log behavioral profiles are denoted B P L . For complete event logs L h i s = { < A B D > , < A C D > } and L a c t = { < A B C D > , < A C B D > } , it is clear that Y L h i s is equal to Y L a c t . If the mapping letters of the history logs and actual logs are equal, we need to further calculate the log behavioral profiles of B P L h i s and B P L a c t . Behavioral profile relations are shown in Table 1 and Table 2.
A comparison of the behavioral relations in Table 1 and Table 2 show that B P L h i s B P L a c t . The changed behavioral relations are marked with dotted boxes. The log behavioral profiles have changed when the model does not perform a “Delete”, “Move”, or “Insert” change operation. It is assumed that the occurrence of hidden transitions affects the actual log behavioral relations. Therefore, it is necessary to investigate the behavioral changes of the model with hidden transitions using complete event logs.

3. Preliminaries of Models and Methods

We use event logs as our formal grounding. A class of Petri nets and a Petri net system is used for process modeling and analysis. This paper refers to basic definitions [23] of Petri nets, Petri net systems, and behavioral profiles. This section recalls some related concepts, whereas others are omitted for brevity.
Definition 1. 
(Event Log [24]) Let  T  be the set of activities, where  σ T  is an event trace. Let  L B ( T )  be an event log, where  B ( T )  is the set of event traces.
Definition 2. 
(Log Behavioral Profile ( B P ) [25]) Let  L p = n 1 , n m  be a log of a process model  P = ( A , a i , a o , C , F , T ) . A pair  ( x , y ) ( A L × A L )  has at most one of the following relations:
(1) 
The strict order relation  L , if  x L y , y L x ;
(2) 
The interleaving order relation  | | L , if  x L y , y L x .
The set of relations is written as  B P L = { L , L } .
Definition 3. 
(Log Minimum Successor Relation ( M S R ) [26]) Let  σ L  be a log trace and let  x σ , y σ  be the transitions, and  k N . The log minimum successor relation is defined by:  x k σ y 1 i | σ | [ σ ( i ) = x σ ( i + k ) = y ] , and the log minimum successor relation is abbreviated as  M S R . Therefore,  M S R ( x , y ) = k  in log  L .
In Definition 3, if transitions x and y are contained in the trace σ , such as σ = < x x 1 x 2 x 3 y > , it can be obtained that σ ( 1 ) = x σ ( 1 + 4 ) = y . The log minimum successor relation of ( x , y ) is denoted as M S R ( x , y ) = 4 .

4. Change-Mining Methods for Models with Hidden Transitions Based on Complete Logs

Before introducing the behavioral change-mining method in detail, we first provide the classification rules and the types of hidden transition.

4.1. Classification Rules of Hidden Transitions

Let N = ( P , T , F ) be a labelled Petri net, where τ i , i { 1 , 2 , n } denotes the hidden transition, A τ i denotes the set of all activities, and it holds that t i A .
Rule 1. 
If both  τ 1 = t 1 = 1  and  τ 1 = t 2 = 1  are satisfied, then  τ 1  is defined as a strict hidden transition. Figure 1 gives a demonstration for Rule 1.
Rule 2. 
If both  τ 2 = 1  and  τ 2 > 1  hold, then  τ 2  is defined as an and-split hidden transition. If both  τ 3 > 1  and  τ 3 = 1  hold, then  τ 3  is defined as an and-join hidden transition. Figure 2 gives a demonstration for Rule 2.
Rule 3. 
If  τ 4 t 3 ,  τ 4 t 4 = 1  and  τ 4 t 4 = 1  are all satisfied, then  τ 4  is defined as a skip hidden transition. Figure 3 gives a demonstration for Rule 3.
Rule 4. 
If both  t 5 τ 5  and  τ 5 t 8  are satisfied, then  τ 5  is defined as a loop hidden transition. Figure 4 gives a demonstration for Rule 4.
Rule 5. 
If both  t 11 + t 14  and t 11 = τ 6 ,  τ 6 = t 14  are satisfied, then  τ 6  is defined as a switch hidden transition. Figure 5 gives a demonstration for Rule 5.

4.2. Constructing Change-Mining Methods

This section mainly investigates the behavioral changes of models with hidden transitions under complete event logs. Previous research in the field of change mining has mainly focused on changes in model behavior [6,7,8,9] when the original system models are known. Additionally, few studies have concentrated on mining model changes based on incomplete event logs [11]. On the one hand, previous studies did not consider the effects of hidden transitions on model changes. On the other hand, hidden transitions are difficult to mine because they do not appear in any event trace. In the following, the related concepts of the log-weighted coefficient and the behavior-relation-change-mining algorithm are proposed.
Definition 4. 
(Log-Weighted Coefficient) Let  L  be an event log and let  t i L ( i = 1 , 2 , 3 )  be a transition. A coefficient is assigned to the arcs (drawn as directed edges) connecting transitions with others. This coefficient is called the log-weighted coefficient and denoted  r .
Example 1. 
(Interpretation of the log-weighted coefficient) We first provide a workflow log  L =   < σ 1 , σ 2 , σ 3 , σ 4 > , which contains  σ 1 = < A B H I > ,  σ 2 = < A D G E C I > ,  σ 3 = < A D E G C I > , and  σ 4 = < A G D E C I > . Transition activities (drawn as rectangles) are taken as the start and end points of each arc, and each arc is labelled with a coefficient (as shown in Figure 6), the log-weighted coefficient. It can be seen that  ( G , D )  and  ( G , E )  have the relations  G L D , D L G  and  G L E , E L G  according to  σ 2 , σ 3 , σ 4 . These relations are written as  G D  and  G E , respectively. Therefore, there are behavioral relations  G a a D G b b E  (where a , b  are the weighted coefficients of arc  G , D  and  G , E  respectively). It is clear that  a = a  and  b = b  hold, and the relations of  ( G , D )  and  ( G , E )  are called a strict order relation and inverse strict order relation such that the values  a  and  a  offset each other. The following does not consider a pair of transitions with an interleaving order a behavioral relation.
Figure 6 gives a demonstration of Definition 4. The arcs of A B H I are generated by the trace σ 1 , and each arc is labelled with a weighted coefficient of 1/3. Specifically, there are three arcs connected to transition A, namely arc AB, arc AD, and arc AG, whose coefficients are r A B = 1 3 , r A D = 1 3 , and r A G = 1 3 .
Definition 5. 
(Rules for Determining the Log-Weighted Coefficient) For a complete event log  L , if the weighted coefficients are given for each arc, the weighted coefficients of the event logs are uniquely determined. The log-weighted coefficients need to be determined according to the two following rules.
Rule 6. 
The coefficients of the output arcs are equal.
In a complete event log, the log-weighted coefficients of the strict order structures generated by single transition nodes are equal. Generally, the value of the output arc coefficient of the transition is 1. If the transition has n output arcs, then the coefficients of these output arcs are r 1 = r 2 = r 3 = = r n = 1 n .
Rule 7. 
The sum of the coefficients of the arcs is conserved.
For any initial transition, the weighted coefficients of the output arcs are equal to the weighted coefficients of the input arcs of the final transition. Suppose there are n output arcs with coefficients r 1 r 2 r n and m input arcs with coefficients b 1 b 2 b m that satisfy i = 1 n a i = j = 1 m b j .
In the following, Algorithm 1 details the procedures of hidden transition change mining. The purpose of Algorithm 1 is to mine different types of hidden transitions and changed behavioral relations. To make it more readable, Algorithm 1 is divided into five phases. Taking the second phase as an example, we need to first determine whether the log L h i s and L a c t are equal. If L h i s is not equal to L a c t , B P , M S R , and r of the logs must be calculated (Definitions 2–4). If there is a pair of transition activity ( a i , b j ) satisfying B P L h i s ( a i , b j ) = and B P L a c t ( a i , b j ) = { L a c t } under the condition of M S R L a c t M S R L h i s , r L a c t r L h i s , this leads to the conclusion that the hidden transition is and-split and the changed behavioral relation is R c h = B P L a c t B P L h i s = B P L a c t ( a i , b j ) = { L a c t } .
Algorithm 1 Behavior-Relation-Change-Mining Algorithm Considering Hidden Transitions (BRCM algorithm)
Input: Original   complete   event   log   L h i s ,   actual   complete   event   log   L a c t
Output: Changed   behavioral   relations   R c h
First ,   calculate   the   log   behavioral   profiles ,   denoted   B P L h i s   and   B P L a c t ,   the   minimum   successor   relations ,   denoted   M S R L h i s   and   M S R L a c t ,   and   the   log - weighted   coefficients ,   denoted   r L h i s   and   r L a c t .
Mining strict hidden transitions:
1 :   Judge   the   equivalence   of   L h i s   and   L a c t .
2 :   If   L a c t = L h i s σ i L a c t σ j L h i s ( i = j = 1 ) hold,
3 :   then   it   can   be   deduced   B P L a c t = B P L h i s M S R L a c t = M S R L h i s r L a c t = r L h i s hold,
4 :   return   R c h = , σ 1 = σ 2 , and the hidden transition is a strict transition.
Mining and-split hidden transitions:
5 :   Suppose   that   a   set   of   transitions   are   mapped   to   Y L h i s   and   Y L a c t .
6 :   If   Y L h i s = Y L a c t L a c t L h i s L a c t L h i s L h i s L a c t M S R L a c t M S R L h i s r L a c t r L h i s hold,
7 :   else if   a i , b j Y L h i s , i , j N ,   because   of   Y L h i s = Y L a c t .   Similarly ,   a i , b j Y L a c t , i , j N .   This   will   not   be   described   subsequently .   Additionally ,   B P L h i s ( a i , b j ) =   and   B P L a c t ( a i , b j ) = { L a c t } .
8 :   Return   R c h = B P L a c t B P L h i s .   The   hidden   transition   is   an   and - split   transition .   Using   the   same   method ,   we   deduce   the   and - join   hidden   transition   and   the   changed   behavioral   relations   R c h .
Mining skip hidden transitions:
9 :   If Y L h i s = Y L a c t L a c t L h i s M S R L a c t M S R L h i s r L a c t r L h i s hold,
10 :   else if L a c t L h i s = L h i s L a c t ,
11 :   return   B P L h i s B P L a c t .
12 :   If   a i , b j Y L h i s , i , j N ,   B P L h i s ( a i , b j ) = { L h i s } = B P L a c t ( a i , b j ) ,   M S R L h i s ( a i , b j ) = n ,   and M S R L a c t ( a i , b j ) < n hold,
13 :   else if c i , d j , e m Y L h i s , i , j , m N .   According   to   the   original   event   log ,   the   value   of   the   weighted   coefficient   is   r L h i s ( c i , d j ) = 1 .   However ,   the   value   of   the   weighted   coefficient   is   r L a c t ( c i , d j ) = r L a c t ( c i , e m ) = 1 2 in the actual log.
14 :   Return   R c h = B P L a c t B P L h i s . The hidden transition is a skip transition.
Mining loop hidden transitions:
15 :   If   Y L h i s = Y L a c t L a c t L h i s M S R L a c t M S R L h i s r L a c t r L h i s hold,
16 :   else if a i   o r   b j Y L h i s , i , j , m N .   B P L h i s ( a i , a i ) = B P L h i s ( b j , b j ) = ,   B P L a c t ( a i , a i ) , B P L a c t ( b j , b j ) , M S R L h i s ( a i , a i ) = M S R L h i s ( b j , b j ) = , M S R L a c t ( a i , a i ) ,   and   M S R L a c t ( b j , b j ) hold.
17 :   There   exist   a i , b j Y L h i s , i , j N   satisfying   one   of   the   following   behavioral   relations :   ( 1 ) B P L h i s ( a i , a i ) = ,   B P L a c t ( a i , a i ) = { } ;   ( 2 ) a i L h i s b j , b j L h i s a i , a i L a c t b j , b j L a c t a i ;   ( 3 )   a i L h i s a i , b j L h i s b j ,   a i L a c t a i , b j L a c t b j .
18 :   Return R c h = B P L a c t B P L h i s , and the hidden transition is a loop transition.
Mining switch hidden transitions:
19 :   If   Y L h i s = Y L a c t L a c t L h i s L a c t L h i s M S R L a c t M S R L h i s r L a c t r L h i s hold,
20 :   else if there   exists   ( a i , b j ) Y L h i s , i , j N satisfying   B P L h i s ( a i , b j ) = ,
21 :   return M S R L h i s ( a i , b j ) =   and   r L h i s ( a i , b j ) = .
22 :   else if   B P L a c t ( a i , b j ) = { L a c t } M S R L a c t ( a i , b j ) = 1 r L a c t ( a i , b j ) > 0 ,
23 :   return R c h = B P L a c t B P L h i s . The hidden transition is a switch transition.

4.3. Examples

We choose the specific event logs with hidden transitions for analysis in this section. Five groups of complete logs are selected for investigation, and each group of logs contains at least one execution trace. Table 3 provides the relevant information on the trace for the first group of event logs.
Table 3 shows that the original event log is L h i s = { < A B C > } and the actual log is L a c t = { < A B C > } , where L h i s = L a c t , M S R L a c t = M S R L h i s and r L a c t = r L h i s hold. In terms of Algorithm 1, we conclude that the actual log L a c t contains a strict hidden transition and the changed behavioral relation is R c h = .
Table 4 gives the relevant information of the trace for the second group of event logs.
Table 4 shows the original event log L h i s = { < A B C F > , < A D E F > } and the actual event log L a c t = { < A B D C E F > , < A B D E C F > , < A D B C E F > , < A D B E C F > } . We calculate log behavioral profiles B P L h i s and B P L a c t according to Definition 2. The log minimum successor relations calculated using Definition 3 are given in Table 5 and Table 6.
Table 6 shows the minimum successor relations of transition activities. For example, the behavioral relation between transition activities A and B is a strict order relation, and the value of minimum successor relation is 1, marked as (1). Figure 7 and Figure 8 present two case descriptions of log-weighted coefficients for L h i s and L a c t according to Definition 4.
A comparison of Table 5 and Table 6 clearly shows that there are two pairs of transition activities ( B , D ) and ( C , E ) , satisfying B P L h i s ( B , D ) = , B P L a c t ( B , D ) = { } , B P L h i s ( C , E ) = , and B P L a c t ( C , E ) = { } . M S R L a c t M S R L h i s and r L a c t r L h i s are under the condition that Y L h i s = Y L a c t , where the actual log L a c t contains an and-split hidden transition and the changed behavioral relations are R c h = B P L a c t B P L h i s = B P ( B , D ) ( L a c t ) + B P ( B , E ) ( L a c t ) + B P ( C , E ) ( L a c t ) + B P ( D , C ) ( L a c t ) .
Table 7 shows the relevant information of the trace for the third group of event logs.
Table 8 and Table 9 show the log behavioral profiles and log minimum successor relations calculated using Definitions 2 and 3, respectively.
We see that the original logs and actual logs satisfy L a c t L h i s = L h i s . According to Definition 5, the log-weighted coefficients are calculated as r L h i s ( A , B ) = r L h i s ( B , C ) = 1 and r L a c t ( A , B ) = r L a c t ( A , C ) = r L a c t ( B , C ) = 1 2 . It is inferred that the actual log L a c t contains a skip hidden transition and the changed behavioral relation is R c h = B P L a c t B P L h i s = . Meanwhile, the log minimum successor relations changed from M S R L h i s ( A , C ) = 2 to M S R L a c t ( A , C ) = 1 .
Table 10 and Table 11 present the log instances of groups 4 and 5, respectively. B · C · indicates that the transition activity BC is enabled in an infinite loop in σ 14 .
Table 12 and Table 13 show the calculated log behavioral profiles and log minimum successor relations of group 4, respectively.
It is inferred that Y L h i s = Y L a c t , L a c t L h i s , M S R L a c t M S R L h i s , and r L a c t r L h i s hold. Moreover, the transition activity B , C satisfies B P L h i s ( B , B ) = B P L h i s ( C , C ) = , B P L a c t ( B , B ) , B P L a c t ( C , C ) , M S R L h i s ( B , B ) = M S R L h i s ( C , C ) = , M S R L a c t ( B , B ) , and M S R L a c t ( C , C ) . The pair transition activity ( B , C ) satisfies Sustainability 15 01655 i002 B L a c t C , C L a c t B , B L h i s C , C L h i s B , Sustainability 15 01655 i003 B L h i s B , C L h i s C , and B L a c t B , C L a c t C .
Additionally, Table 12 and Table 13 show that the changed behavioral relations are R c h = B P L a c t B P L h i s = B P ( B , B ) ( L a c t ) + B P ( B , C ) ( L a c t ) + B P ( C , C ) ( L a c t ) in the actual logs and contain the loop hidden transition.
Table 14 and Table 15 show the calculated log behavioral profiles and log minimum successor relations of group 5, respectively.
For the logs of group 5, Y L h i s = Y L a c t , L a c t L h i s L a c t L h i s = L h i s , and M S R L a c t M S R L h i s . According to Definition 4, the log-weighted coefficients are calculated as r L a c t r L h i s . A comparison of Table 14 and Table 15 clearly shows that B P L h i s ( C , F ) = is satisfied.
However, in the actual log L a c t , B P L a c t ( C , F ) = { L a c t } and M S R L a c t ( C , F ) = 1 r L a c t ( C , F ) > 0 are satisfied. The changed relation is written as R c h = B P L a c t B P L h i s = B P ( C , F ) ( L a c t ) and the changed transition, called a switch hidden transition, is mined in the actual log.
In this section, we discussed several behavioral-change-mining methods. The behavioral relation between the strict hidden transition and other transitions is usually a strict order relation, such that the strict hidden transition does not affect the model behavior. Meanwhile, the effects of four types of hidden transitions, namely the and-split, skip, loop, and switch transitions, on the model behavior can be divided into four categories:
(1)
Strict order relation { } interleaving order relation { } ;
(2)
Interleaving order relation { } strict order relation ( ) ;
(3)
B P ( a 1 , a 2 ) = B P ( a 1 , a 2 ) = { } or B P ( a 1 , a 2 ) = { } B P ( a 1 , a 2 ) = ;
(4)
B P ( a 1 , a 2 ) = B P ( a 1 , a 2 ) = { } or B P ( a 1 , a 2 ) = { } B P ( a 1 , a 2 ) = .

5. Experimental Evaluation

The computing resource used in the experiments was an Intel Core I5 eight-generation central processing unit with 8 GB RAM and a Windows 10 64-bit operating system. The event logs used in the experiment were typical artificial structured control flow event logs, namely Artificial Structured Control Flow. Figure 9 presents the results obtained using the Inductive Miner method in the ProM process mining tool to model the artificial structured control flow event logs.
Figure 9 shows that the number of typical structured control flow event logs is large, the behavioral relations are relatively complex, and the workload of studying the overall behavior structure of the model is heavy. A representative local model is thus selected as the research object to further analyze and verify the effectiveness of the algorithm proposed in this paper. Figure 10 is a partial view of the ProM simulation diagram mined from the artificial structured control flow event logs. Table 16 presents model logs obtained using the online simulation tool CPN Tools, denoted L h i s .
Table 17 presents the behavioral profiles and log minimum successor relations of L h i s calculated using Definitions 2 and 3.
The actual logs that contain the hidden transitions are presented in Table 18, and the corresponding behavioral profile relations and log minimum successor relations are presented in Table 19.
It is first inferred that Y L h i s = Y L a c t , L a c t L h i s L a c t L h i s L h i s L a c t , M S R L a c t M S R L h i s , and r L a c t r L h i s hold. The following conclusions are then drawn from the operation and analysis of Algorithm 1.
(1)
a 16 , a 17 Y h i s are present. Similarly, a 16 , a 17 Y a c t are present because Y h i s = Y a c t . Additionally, we obtain B P L h i s ( a 16 , a 17 ) = and B P L a c t ( a 16 , a 17 ) = { a c t } . It is inferred from Algorithm 1 (5–8) that the hidden transition contained in the actual log is an and-split transition, and the changed behavioral relation is R c h = B P L a c t ( a 16 , a 17 ) B P L h i s ( a 16 , a 17 ) = { } .
(2)
The following are present: a 13 Y L h i s , B P L h i s ( a 13 , a 13 ) = , B P L a c t ( a 13 , a 13 ) = { } , M S R L h i s ( a 13 , a 13 ) = , and M S R L a c t ( a 13 , a 13 ) = 1 . It is inferred from Algorithm 1 (15–18) that the hidden transition is a loop transition, and the changed behavioral relation is R c h = B P L a c t ( a 13 , a 13 ) B P L h i s ( a 13 , a 13 ) = { } .
(3)
( a 12 , a 24 ) Y L h i s satisfies B P L h i s ( a 12 , a 24 ) = and M S R L h i s ( a 12 , a 24 ) = such that we obtain r L h i s ( a 12 , a 24 ) = . However, B P L a c t ( a 12 , a 24 ) = { L a c t } and M S R L a c t ( a 12 , a 24 ) = 1 hold. r L a c t ( a 12 , a 24 ) = 1 6 is obtained from Definition 5. It is inferred from Algorithm 1 (19–23) that the hidden transition is a switch transition, and the changed behavioral relation is R c h = B P L a c t ( a 12 , a 24 ) B P L h i s ( a 12 , a 24 ) = { } .
To verify the correctness of the method, the artificial structured control flow event logs with hidden transitions are mined using ProM Tools, and the Petri net model shown in Figure 11 is obtained. The model shown in Figure 11 differs from that in Figure 10 due to the triggering of hidden transitions. As a more intuitive illustration, the model with hidden transitions in Figure 11 is drawn in Figure 12a, and the original model without hidden transitions is drawn in Figure 12b.
It is seen that and-split, loop, and switch hidden transitions are enabled in the actual model. The simulation results are consistent with the calculation results of the method presented in this paper regarding the types of change transitions and the model behavioral relations, which further verifies the correctness of the method.

6. Case Study

6.1. Basic Types of Disaster Chains

Research on disaster chains is still in its infancy, and further research in terms of risk assessment, disaster loss estimation, and chain-cutting disaster mitigation is necessary in conjunction with the adoption of other related technologies. The Petri net as a mathematical tool for modeling discrete and distributed systems has been widely used in risk assessment and disaster chain analysis in recent years. Additionally, the Petri net can model the disaster chains and express the triggering factors in the assessment of safety, reliability, and risk. Before conducting the actual disaster scenario analysis, four basic types of disaster chain are introduced from the perspective of disaster interrelationships, namely the causal disaster chain, concurrent disaster chain, exclusive disaster chain, and coupled disaster chain. These basic forms are shown in Figure 13.
Figure 13a shows the causal disaster chain: D S E c h a i n 1 triggers D S E c h a i n 2 . The sequential structure of the causal disaster chain is relatively simple and can help to distinguish between precursor disasters and subsequent disasters, such as P r e ( D S E c h a i n 2 ) = D S E c h a i n 1 and S u b ( D S E c h a i n 1 ) = D S E c h a i n 2 . Figure 13b shows the concurrent disaster chain: D S E c h a i n 1 triggers D S E c h a i n 2 and D S E c h a i n 3 .The probabilities of subsequent disasters are equal, i.e., r ( D S E c h a i n 1 D S E c h a i n 2 ) = r ( D S E c h a i n 1 D S E c h a i n 3 ) . Figure 13c shows the exclusive disaster chain, where the occurrence of disaster events A and B is exclusive, meaning that one disaster occurs and the other does not occur or diminishes. Figure 13d shows the coupled disaster chain where D S E c h a i n 1 and D S E c h a i n 2 together trigger D S E c h a i n 3 . The risk of a coupled disaster chain is higher than the risk posed by other disaster chains.

6.2. Application of the Method

The dynamic evolution of a disaster chain is analyzed for the environmental pollution and ecological damage caused by a petrochemical leak, taking the 2018 petrochemical leak of Donggang Petrochemical Chemical Industry Co., Ltd. in the city of Quanzhou, Fujian Province as an example. During this leak, petrochemicals spread to beaches, causing great harm to the coastal environment, local industries, and residents. The disaster events of the oil spill were mapped to log transition activities to clearly describe the effects of the petrochemical spill on the environment and the lives of the nearby residents. Table 20 and Table 21 show the execution traces of this oil spill disaster and the semantic description of transition activities, respectively.
Table 20 presents all the execution traces of the oil spill disaster event, denoted as L = < σ 1 , σ 2 σ 29 > . The study of the dynamic evolution of the disaster chain from the perspective of the event logs intuitively obtains the primary disaster, secondary disaster, and derived disaster. Disaster event t 0 , as the primary disaster of the overall disaster chain, triggers a series of subsequent disaster events. Taking event trace B as an example, the dynamic transformational relations of the disaster chain are shown in Figure 14. The chain is a typical causal disaster chain, which is the most common type of disaster chain in the logs.
There are many more event traces and transition activities in the disaster event logs, corresponding to a huge amount of data and a complex model. In view of the detailed introduction and calculation of the behavioral profile relations and log minimum successor relations described in Section 3, this section does not give the complete behavioral profile matrix but only calculates and analyzes some of the event traces. Taking the sequence of traces σ 4 to σ 9 as an example, we calculate the mutual behavioral profile relations and the log minimum successor relations of the transitions t 20 t 21 t 22 , which satisfy B P ( t 20 , t 21 ) = , M S R ( t 20 , t 21 ) = 1 , B P ( t 20 , t 22 ) = , M S R ( t 20 , t 22 ) = 1 , B P ( t 21 , t 22 ) = , and M S R ( t 21 , t 22 ) = 1 . To gain a more intuitive understanding, the behavioral relations of t 20 t 21 t 22 are simulated using the Petri net model. The model structure shown in Figure 15 is obtained.
Similarly, the calculation rules and determination method in Algorithm 1 can be used to calculate exclusive and coupled disaster chains. However, it should be noted that for coupled disaster chains, the cause is the coupling of multiple disasters, and their risks and damage degree are thus higher [27]. This paper mainly introduces the method of change mining using log behavioral profile relations and does not discuss how to conduct risk assessment research for a coupled disaster chain or how to transform strong coupling into weak coupling or zero coupling, which are topics to be explored in further research.
The logical order of disaster events is usually different in different scenarios. Affected by different environmental and social factors, the previous and subsequent events of a disaster chain are slightly different: σ 10 = t 0 t 3 t 23 t 24 t 26 and B P ( t 26 , t 28 ) = in L d i s . The trace indicates that the oil spill caused responder poisoning during the rescue process. In different situations, responder poisoning can directly lead to the occurrence of t 28 (negative public opinions on the network). Therefore, σ 10 ' = t 0 t 3 t 23 t 24 t 26 t 28 includes behavioral relations, denoted B P ( t 26 , t 28 ) = , M S R ( t 26 , t 28 ) = 1 r ( t 26 , t 28 ) > 0 . An analysis of Algorithm 1 reveals that the occurrence of the switch hidden transition leads to behavioral changes. We can clearly observe that an oil spill eventually leads to the occurrence of social mass incidents from σ 4 to σ 9 . The social mass incidents then lead to the continued fermentation of negative network public opinion. On the basis of this dynamic description, an execution sequence of L = < σ 4 , σ 5 , σ 6 , σ 7 , σ 8 , σ 9 > occurs, where σ 4 = t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 · t 20 · t 21 · t 22 · , σ 5 = t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 · t 20 · t 22 · t 21 · , σ 6 = t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 · t 21 · t 20 · t 22 · , σ 7 = t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 · t 21 · t 22 · t 20 · , σ 8 = t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 · t 22 · t 20 · t 21 · , and σ 9 = t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 · t 22 · t 21 · t 20 · . We deduce from Algorithm 1 that the occurrence of the loop hidden transition may lead to changes in the disaster logs. However, because the disaster chain is a concurrent disaster chain, the location of the hidden transition has three possibilities, which are marked with dotted boxes in Figure 16 and Figure 17 showing the specific simulation results.
Figure 16 and Figure 17 are Petri net models of the disaster events with and without hidden transitions. Using Algorithm 1, we can mine the dynamic evolution process of disaster chains in different scenarios when only the disaster event logs are given, and we can clarify the basic types of disaster chain. For example, if there is a higher risk of a coupled disaster chain, the decision maker can make a reasonable judgment to cut this chain for disaster mitigation.

7. Conclusions

This paper proposed a method for mining behavioral changes based on complete logs with hidden transitions. Firstly, to capture the dependencies between transition activities more accurately, the method of calculating the log minimum successor relations was defined. Secondly, we proposed classification rules of hidden transitions and calculation rules of log-weighted coefficients. Process models with strict, and-split, and-join, skip, loop, and switch hidden transitions were then identified by combining the log behavioral profile, log minimum successor relation, log-weighted coefficient and changed behavioral relations. Finally, the correctness and feasibility of the approach were verified in experiments and a case study. There are three main aspects of future research: (1) improving the methodology so that it can be applied to non-freely chosen structures; (2) considering how to correctly mine hidden transitions and changed behavioral relations when the behavioral relations of logs are incomplete, and (3) considering further application of the methodology to disaster chain risk assessment by adding probabilistic constraints to estimate the probability of subsequent disaster events occurring.

Author Contributions

S.S.: conceptualization, writing—original draft, data curation. Q.L.: validation, writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

The research was supported by the National Natural Science Foundation of China (grant numbers 71971121), NUIST-UoR International Research Institute, the Major Project Plan of Philosophy and Social Sciences Research at Jiangsu University (grant number 2018SJZDA038). Additionally, we thank Liwen Bianji (Edanz) (www.liwenbianji.cn accessed on 28 December 2022) for editing the language of a draft of this manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Choueiri, A.C.; Santos, E.A.P. Discovery of path-attribute dependency in manufacturing environments: A process mining approach. J. Manuf. Syst. 2021, 61, 54–65. [Google Scholar] [CrossRef]
  2. Ko, J.; Comuzzi, M. Detecting anomalies in business process event logs using statistical leverage. Inf. Sci. 2021, 549, 53–67. [Google Scholar] [CrossRef]
  3. Fang, X.W.; Yan, Y.; Liu, X. An Analysis Method about Change Region of Business Process Model Based On Action Pattern. Int. J. Multimed. Eng. 2014, 5, 251–262. [Google Scholar] [CrossRef]
  4. Weidmann, M.; Alvi, M.; Koetter, F. Business process change management based on process model synchronization of multiple abstraction levels. In Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, Irvine, CA, USA, 12–14 December 2011. [Google Scholar]
  5. Weidlich, M.; Mendling, J.; Weske, M. Propagating change between aligned process models. J. Syst. Software 2012, 85, 1885–1898. [Google Scholar] [CrossRef] [Green Version]
  6. Fang, X.W.; Liu, L.; Liu, X.W. Analyzing method of change region in BPM based on modules of Petri net. ITJ 2013, 12, 1655–1659. [Google Scholar] [CrossRef] [Green Version]
  7. Dam, H.K.; Michael, W. An Agent-Oriented Approach to Change Propagation in Software Maintenance. Auton. Agent. Multi-Ag. 2011, 23, 384–452. [Google Scholar] [CrossRef]
  8. Assy, N.; Gaaloul, W.; Defude, B. Mining Confgurable Process Fragments for Business Process Design. In Proceedings of the 9th International Conference on Design Science Research in Information Systems and Technology, Miami, FL, USA, 22 May 2014. [Google Scholar]
  9. Gao, X.; Chen, Y.; Ding, Z.Z. Process Model Fragmentization, Clustering and Merging: An Empirical Study. In Proceedings of the 11th International Conference on Business Process Management, Beijing, China, 26–30 August 2013. [Google Scholar]
  10. Pourmasoumi, A.; Kahani, M.; Bagheri, E. Mining variable fragments from process event logs. Inform. Syst. Front. 2017, 19, 1423–1443. [Google Scholar] [CrossRef]
  11. Fang, H.; Sun, S.Y.; Fang, X.W. Behavior change mining methods based on incomplete logs conjoint occurrence relation. CIMS 2020, 26, 1887–1895. (In Chinese) [Google Scholar]
  12. Nolle, T.; Luettgen, S.; Seeliger, A. BINet: Multi-perspective business process anomaly classifcation. Inform. Syst. 2022, 103, 101458. [Google Scholar] [CrossRef] [Green Version]
  13. Fang, H.; Zhang, Y.; Wu, Q.L. A log induced change mining method for fault diagnosis using structure causality in BPMSs. Control. Theor. Technol. 2018, 35, 1167–1176. [Google Scholar]
  14. Nolle, T.; Luettgen, S.; Seeliger, A. Analyzing business process anomalies using autoencoders. J. Mach. Learn. 2018, 107, 1875–1893. [Google Scholar] [CrossRef] [Green Version]
  15. Weinzierl, S.; Wolf, V.; Pauli, T. Detecting temporal workarounds in business processes–A deep-learning-based method for analysing event log data. J. J. Bus. Anal. 2022, 5, 76–100. [Google Scholar] [CrossRef]
  16. Harl, M.; Weinzierl, S.; Stierle, M. Explainable predictive business process monitoring using gated graph neural networks. J. Decis. Syst. 2020, 29, 312–327. [Google Scholar] [CrossRef]
  17. Liu, B.; Hsu, W.; Han, H.S. Mining changes for real-life applications. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery, London, UK, 4–6 September 2000. [Google Scholar]
  18. Luna, R.; Balakrishnan, N.; Dagli, C.H. Postearthquake recovery of a water distribution system: Discrete event simulation using colored petri nets. J. Infrastruct. Syst. 2011, 17, 25–34. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Huang, S.H.; Dang, D.; Ruan, H. Evaluation of Natural Disaster Emergency Response Procedure Based on Petri Net. Appl. Mech. Mater 2013, 339, 236–241. [Google Scholar] [CrossRef]
  20. Qi, C.; Luo, L.J. Analysis of Flood Disaster Case Based on Event Chain and Generalized Stochastic Petri Nets. J. Wuhan. Univ. Technol. 2017, 39, 130–134. [Google Scholar]
  21. Zhao, Q.; Wang, J. Disaster Chain Scenarios Evolutionary Analysis and Simulation Based on Fuzzy Petri Net: A Case Study on Marine Oil Spill Disaster. IEEE Access. 2019, 99, 183010–183023. [Google Scholar] [CrossRef]
  22. Ko, J.; Comuzz, M. Keeping our rivers clean: Information-theoretic online anomaly detection for streaming business process events. Inform. Syst. 2021, 104, 101894. [Google Scholar] [CrossRef]
  23. Wu, Z.H. Introduction to Petri; Machinery Industry Press: Beijing, China, 2006; pp. 1–3. (In Chinese) [Google Scholar]
  24. Van der Aalst, W. Process Discovery: Capturing the Invisible. IEEE. Comput. Intell. M. 2010, 5, 28–41. [Google Scholar] [CrossRef] [Green Version]
  25. Weidlich, M.; Polyvyanyy, A.; Desai, N. Process Compliance Measurement Based on Behavioural Profles. Inform. Syst. 2011, 36, 1009–1025. [Google Scholar] [CrossRef]
  26. Kunze, M.; Weidlich, M.; Weske, M. Querying process models by behavior inclusion. Softw. Syst. Model. 2015, 14, 1105–1125. [Google Scholar] [CrossRef]
  27. Lin, Z.; Zhang, B.; Guo, J. Analysis of a Water-Inrush Disaster Caused by Coal Seam Subsidence Karst Collapse Column under the Action of Multi-Field Coupling in Taoyuan Coal Mine. Cmes-Comp. Model. Eng. 2021, 126, 311–330. [Google Scholar]
Figure 1. A case demonstration for strict hidden transition.
Figure 1. A case demonstration for strict hidden transition.
Sustainability 15 01655 g001
Figure 2. A case demonstration for the and-split hidden transition and and-join hidden transition.
Figure 2. A case demonstration for the and-split hidden transition and and-join hidden transition.
Sustainability 15 01655 g002
Figure 3. A case demonstration for the skip hidden transition.
Figure 3. A case demonstration for the skip hidden transition.
Sustainability 15 01655 g003
Figure 4. A case demonstration for the loop hidden transition.
Figure 4. A case demonstration for the loop hidden transition.
Sustainability 15 01655 g004
Figure 5. A case demonstration for the switch hidden transition.
Figure 5. A case demonstration for the switch hidden transition.
Sustainability 15 01655 g005
Figure 6. Illustration of the log-weighted coefficient.
Figure 6. Illustration of the log-weighted coefficient.
Sustainability 15 01655 g006
Figure 7. Case description for L h i s .
Figure 7. Case description for L h i s .
Sustainability 15 01655 g007
Figure 8. Case description for L a c t .
Figure 8. Case description for L a c t .
Sustainability 15 01655 g008
Figure 9. Model mining results obtained using ProM (Inductive Miner).
Figure 9. Model mining results obtained using ProM (Inductive Miner).
Sustainability 15 01655 g009
Figure 10. Partial view of the ProM simulation diagram.
Figure 10. Partial view of the ProM simulation diagram.
Sustainability 15 01655 g010
Figure 11. Model mined by ProM with hidden transitions.
Figure 11. Model mined by ProM with hidden transitions.
Sustainability 15 01655 g011
Figure 12. Comparisons of two types of models: (a) model with hidden transitions; (b) original model without hidden transitions.
Figure 12. Comparisons of two types of models: (a) model with hidden transitions; (b) original model without hidden transitions.
Sustainability 15 01655 g012
Figure 13. Basic types of disaster chain: (a) causal disaster chain; (b) concurrent disaster chain; (c) exclusive disaster chain; (d) coupled disaster chain.
Figure 13. Basic types of disaster chain: (a) causal disaster chain; (b) concurrent disaster chain; (c) exclusive disaster chain; (d) coupled disaster chain.
Sustainability 15 01655 g013
Figure 14. Dynamic conversion diagram of event trace σ 4 .
Figure 14. Dynamic conversion diagram of event trace σ 4 .
Sustainability 15 01655 g014
Figure 15. Petri net model of a concurrent disaster chain.
Figure 15. Petri net model of a concurrent disaster chain.
Sustainability 15 01655 g015
Figure 16. Petri net model with hidden transitions for oil spill disaster events.
Figure 16. Petri net model with hidden transitions for oil spill disaster events.
Sustainability 15 01655 g016
Figure 17. Original Petri net model for oil spill disaster events.
Figure 17. Original Petri net model for oil spill disaster events.
Sustainability 15 01655 g017
Table 1. Behavioral profile relations ( B P L h i s ).
Table 1. Behavioral profile relations ( B P L h i s ).
ABCD
A
B
C
D
Table 2. Behavioral profile relations ( B P L a c t ).
Table 2. Behavioral profile relations ( B P L a c t ).
ABCD
A
B Sustainability 15 01655 i001
C Sustainability 15 01655 i001
D
Table 3. Original event logs and actual logs in group 1.
Table 3. Original event logs and actual logs in group 1.
SymbolTrace
σ 1 L h i s = < < A B C > >
σ 2 L a c t = < < A B C > >
Table 4. Original event logs and actual logs in group 2.
Table 4. Original event logs and actual logs in group 2.
SymbolTrace
σ 3 L h i s = < < A B C F > >
σ 4 L h i s = < < A D E F > >
σ 5 L a c t = < < A B D C E F > >
σ 6 L a c t = < < A B D E C F > >
σ 7 L a c t = < < A D B C E F > >
σ 8 L a c t = < < A D B E C F > >
Table 5. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 2).
Table 5. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 2).
A B C D E F
A (1) (2) (1) (2) (3)
B (1) (2)
C (1)
D (1) (2)
E (1)
F
Table 6. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 2).
Table 6. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 2).
A B C D E F
A (1) (3) (1) (3) (5)
B (1)||(1) (1) (4)
C ||(1) (3)
D ||(1) (1) (1) (2)
E ||(1) (1)
F
Table 7. Original event logs and actual logs in group 3.
Table 7. Original event logs and actual logs in group 3.
SymbolTrace
σ 9 L h i s = < < A B C > >
σ 10 L a c t = < < A B C > >
σ 11 L a c t = < < A C > >
Table 8. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 3).
Table 8. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 3).
ABC
A (1) (2)
B (1)
C
Table 9. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 3).
Table 9. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 3).
ABC
A (1) (1)
B (1)
C
Table 10. Original event logs and actual logs in group 4.
Table 10. Original event logs and actual logs in group 4.
SymbolTrace
σ 12 L h i s = < < A B C D > >
σ 13 L a c t = < < A B C D > >
σ 14 L a c t = < < A B C B C B C B · C · > >
Table 11. Original event logs and actual logs in group 5.
Table 11. Original event logs and actual logs in group 5.
SymbolTrace
σ 15 L h i s = < < A B C D G > >
σ 16 L h i s = < < A B E F G > >
σ 17 L a c t = < < A B C D G > >
σ 18 L a c t = < < A B E F G > >
σ 19 L a c t = < < A B C F G > >
Table 12. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 4).
Table 12. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 4).
A B C D
A (1) (2) (3)
B (1) (2)
C (1)
D
Table 13. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 4).
Table 13. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 4).
A B C D
A (1) (2) (3)
B (2)||(1) (2)
C ||(1) (2) (1)
D
Table 14. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 5).
Table 14. Behavioral profiles ( B P L h i s ) and log minimum successor relations ( M S R L h i s )(group 5).
A B C D E F G
A (1) (2) (3) (2) (3) (4)
B (1) (2) (1) (2) (3)
C (1) (2)
D (1)
E (1) (2)
F (1)
G
Table 15. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 5).
Table 15. Behavioral profiles ( B P L a c t ) and log minimum successor relations ( M S R L a c t )(group 5).
A B C D E F G
A (1) (2) (3) (2) (3) (4)
B (1) (2) (1) (2) (3)
C (1) (1) (2)
D (1)
E (1) (2)
F (1)
G
Table 16. Original event logs L h i s obtained by CPN Tools.
Table 16. Original event logs L h i s obtained by CPN Tools.
SymbolTraceSymbolTrace
σ 1 L h i s = < < a 3 a 15 a 21 a 22 a 13 > > σ 10 L h i s = < < a 3 a 17 a 21 a 22 a 13 > >
σ 2 L h i s = < < a 3 a 15 a 21 a 12 a 19 > > σ 11 L h i s = < < a 3 a 17 a 21 a 12 a 19 > >
σ 3 L h i s = < < a 3 a 15 a 21 a 23 a 24 > > σ 12 L h i s = < < a 3 a 17 a 21 a 23 a 24 > >
σ 4 L h i s = < < a 3 a 20 a 21 a 22 a 13 > > σ 13 L h i s = < < a 3 a 18 a 21 a 22 a 13 > >
σ 5 L h i s = < < a 3 a 20 a 21 a 12 a 19 > > σ 14 L h i s = < < a 3 a 18 a 21 a 12 a 19 > >
σ 6 L h i s = < < a 3 a 20 a 21 a 23 a 24 > > σ 15 L h i s = < < a 3 a 18 a 21 a 23 a 24 > >
σ 7 L h i s = < < a 3 a 16 a 21 a 22 a 13 > > σ 16 L h i s = < < a 3 a 14 a 21 a 22 a 13 > >
σ 8 L h i s = < < a 3 a 16 a 21 a 12 a 19 > > σ 17 L h i s = < < a 3 a 14 a 21 a 12 a 19 > >
σ 9 L h i s = < < a 3 a 16 a 21 a 23 a 24 > > σ 18 L h i s = < < a 3 a 14 a 21 a 23 a 24 > >
Table 17. B P L h i s and M S R L h i s corresponding to the logs in Table 16.
Table 17. B P L h i s and M S R L h i s corresponding to the logs in Table 16.
a 3 a 12 a 13 a 14 a 15 a 16 a 17 a 18 a 19 a 20 a 21 a 22 a 23 a 24
a 3 (3) (4) (1) (1) (1) (1) (1) (4) (1) (2) (3) (3) (4)
a 12 (1)
a 13
a 14 (2) (3) (3) (1) (2) (2) (3)
a 15 (2) (3) (3) (1) (2) (2) (3)
a 16 (2) (3) (3) (1) (2) (2) (3)
a 17 (2) (3) (3) (1) (2) (2) (3)
a 18 (2) (3) (3) (1) (2) (2) (3)
a 19
a 20 (2) (3) (3) (1) (2) (2) (3)
a 21 (1) (2) (2) (1) (1) (2)
a 22 (1)
a 23 (1)
a 24
Table 18. Actual event logs L a c t .
Table 18. Actual event logs L a c t .
SymbolTraceSymbolTrace
σ 1 L a c t = < < a 3 a 15 a 21 a 22 a 13 > > σ 16 L a c t = < < a 3 a 17 a 16 a 21 a 22 a 13 > >
σ 2 L a c t = < < a 3 a 15 a 21 a 22 a 13 · > > σ 17 L a c t = < < a 3 a 17 a 16 a 21 a 22 a 13 · > >
σ 3 L a c t = < < a 3 a 15 a 21 a 12 a 19 > > σ 18 L a c t = < < a 3 a 17 a 16 a 21 a 12 a 19 > >
σ 4 L a c t = < < a 3 a 15 a 21 a 23 a 24 > > σ 19 L a c t = < < a 3 a 17 a 16 a 21 a 23 a 24 > >
σ 5 L a c t = < < a 3 a 15 a 21 a 12 a 24 > > σ 20 L a c t = < < a 3 a 17 a 16 a 21 a 12 a 24 > >
σ 6 L a c t = < < a 3 a 20 a 21 a 22 a 13 > > σ 21 L a c t = < < a 3 a 18 a 21 a 22 a 13 > >
σ 7 L a c t = < < a 3 a 20 a 21 a 22 a 13 · > > σ 22 L a c t = < < a 3 a 18 a 21 a 22 a 13 · > >
σ 8 L a c t = < < a 3 a 20 a 21 a 12 a 19 > > σ 23 L a c t = < < a 3 a 18 a 21 a 12 a 19 > >
σ 9 L a c t = < < a 3 a 20 a 21 a 23 a 24 > > σ 24 L a c t = < < a 3 a 18 a 21 a 23 a 24 > >
σ 10 L a c t = < < a 3 a 20 a 21 a 12 a 24 > > σ 25 L a c t = < < a 3 a 18 a 21 a 12 a 24 > >
σ 11 L a c t = < < a 3 a 16 a 17 a 21 a 22 a 13 > > σ 26 L a c t = < < a 3 a 14 a 21 a 22 a 13 > >
σ 12 L a c t = < < a 3 a 16 a 17 a 21 a 22 a 13 · > > σ 27 L a c t = < < a 3 a 14 a 21 a 22 a 13 · > >
σ 13 L a c t = < < a 3 a 16 a 17 a 21 a 12 a 19 > > σ 28 L a c t = < < a 3 a 14 a 21 a 12 a 19 > >
σ 14 L a c t = < < a 3 a 16 a 17 a 21 a 23 a 24 > > σ 29 L a c t = < < a 3 a 14 a 21 a 23 a 24 > >
σ 15 L a c t = < < a 3 a 16 a 17 a 21 a 12 a 24 > > σ 30 L a c t = < < a 3 a 14 a 21 a 12 a 24 > >
Table 19. B P L a c t and M S R L a c t of L a c t .
Table 19. B P L a c t and M S R L a c t of L a c t .
a 3 a 12 a 13 a 14 a 15 a 16 a 17 a 18 a 19 a 20 a 21 a 22 a 23 a 24
a 3 (3) (4) (1) (1) (1) (1) (1) (4) (1) (2) (3) (3) (4)
a 12 (1) (1)
a 13 (1)
a 14 (2) (3) (3) (1) (2) (2) (3)
a 15 (2) (3) (3) (1) (2) (2) (3)
a 16 (2) (3) (1) (3) (1) (2) (2) (3)
a 17 (2) (3) (1) (3) (1) (2) (2) (3)
a 18 (2) (3) (3) (1) (2) (2) (3)
a 19
a 20 (2) (3) (3) (1) (2) (2) (3)
a 21 (1) (2) (2) (1) (1) (2)
a 22 (1)
a 23 (1)
a 24
Table 20. Disaster event logs of the oil spill.
Table 20. Disaster event logs of the oil spill.
Event   Logs   L d i s
σ 1 t 0 t 1 t 9 t 10 t 11 σ 16 t 0 t 6 t 38 t 39
σ 2 t 0 t 1 t 10 t 9 t 11 σ 17 t 0 t 7 t 40
σ 3 t 0 t 2 t 12 t 13 t 15 σ 18 t 0 t 8 t 46 t 41 t 42 t 43 t 44 t 45
σ 4 t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 t 20 t 21 t 22 σ 19 t 0 t 8 t 46 t 41 t 42 t 43 t 45 t 44
σ 5 t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 t 20 t 22 t 21 σ 20 t 0 t 8 t 46 t 41 t 42 t 44 t 43 t 45
σ 6 t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 t 21 t 20 t 22 σ 21 t 0 t 8 t 46 t 41 t 42 t 44 t 45 t 43
σ 7 t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 t 21 t 22 t 20 σ 22 t 0 t 8 t 46 t 41 t 42 t 45 t 43 t 44
σ 8 t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 t 22 t 20 t 21 σ 23 t 0 t 8 t 46 t 41 t 42 t 45 t 44 t 43
σ 9 t 0 t 2 t 12 t 14 t 16 t 17 t 18 t 19 t 22 t 21 t 20 σ 24 t 0 t 8 t 41 t 46 t 42 t 43 t 44 t 45
σ 10 t 0 t 3 t 23 t 24 t 26 σ 25 t 0 t 8 t 41 t 46 t 42 t 43 t 45 t 44
σ 11 t 0 t 3 t 23 t 25 t 27 t 28 σ 26 t 0 t 8 t 41 t 46 t 42 t 44 t 43 t 45
σ 12 t 0 t 4 t 29 t 30 σ 27 t 0 t 8 t 41 t 46 t 42 t 44 t 45 t 43
σ 13 t 0 t 4 t 29 t 31 t 32 t 33 σ 28 t 0 t 8 t 41 t 46 t 42 t 45 t 43 t 44
σ 14 t 0 t 5 t 34 t 35 t 36 t 37 t 38 t 39 σ 29 t 0 t 8 t 41 t 46 t 42 t 45 t 44 t 43
σ 15 t 0 t 5 t 34 t 35 t 37 t 36 t 38 t 39
Table 21. Semantic descriptions.
Table 21. Semantic descriptions.
SymbolSemanticSymbolSemanticSymbolSemantic
t 0 Oil spill t 16 Aquatic death t 32 Injury and death
t 1 Nature reserve t 17 Inflow into the market t 33 Negative network public opinion
t 2 Amount of oil spill t 18 Food contamination t 34 Maritime traffic disruption
t 3 Volatility of oil t 19 Negative network public opinion t 35 Unconditional trigger
t 4 Flammability of oil t 20 Market fluctuation t 36 Freight break
t 5 Maritime traffic area t 21 Unsalted aquatic products t 37 Tourism damage
t 6 Scenic area t 22 Social mass incidents t 38 Unconditional trigger
t 7 Controversial area t 23 Air pollution t 39 Service industry damage
t 8 Shoreline t 24 Oil spill responders t 40 Foreign-related events
t 9 Ecological destruction t 25 Coastal residential area t 41 Shore beach pollution
t 10 Wildlife death t 26 responder poisoning t 42 Coastal industrial area
t 11 Animal epidemic event t 27 Mass poisoning event t 43 Industrial production damage
t 12 Water pollution t 28 Negative network public opinion t 44 School suspension
t 13 Urban water supply area t 29 Hazardous chemicals explosion t 45 Transport industry damage
t 14 Aquaculture t 30 Negative network public opinion t 46 Soil pollution
t 15 Urban water supply interruption t 31 Human existence
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sun, S.; Li, Q. A Behavior Change Mining Method Based on Complete Logs with Hidden Transitions and Their Applications in Disaster Chain Risk Analysis. Sustainability 2023, 15, 1655. https://doi.org/10.3390/su15021655

AMA Style

Sun S, Li Q. A Behavior Change Mining Method Based on Complete Logs with Hidden Transitions and Their Applications in Disaster Chain Risk Analysis. Sustainability. 2023; 15(2):1655. https://doi.org/10.3390/su15021655

Chicago/Turabian Style

Sun, Shuya, and Qingsheng Li. 2023. "A Behavior Change Mining Method Based on Complete Logs with Hidden Transitions and Their Applications in Disaster Chain Risk Analysis" Sustainability 15, no. 2: 1655. https://doi.org/10.3390/su15021655

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop