Extended KNN Imputation Based LOF Prediction Algorithm for Real-time Business Process Monitoring Method

In this paper, we propose a novel approach to fault prediction for real-time business process monitoring method using extended KNN imputation based LOF prediction. Existing rule-based approaches to process monitoring has some limitations like late alarm for fault occurrence or no indicators about real-time progress, since there exist unobserved attributes according to the monitoring phase during process executions. To improve these limitations, we propose an algorithm for LOF prediction by adopting the imputation method to assume unobserved attributes. LOF of ongoing instance is calculated by assuming next probable progresses after the monitoring phase, which is conducted during entire monitoring phases so that we can predict the abnormal termination of the ongoing instance. By visualizing the real-time progress in terms of the probability on abnormal termination, we can provide more proactive operations to opportunities or risks during the real-time monitoring.

[1]  Fabio Casati,et al.  Improving Business Process Quality through Exception Understanding, Prediction, and Prevention , 2001, VLDB.

[2]  Fabio Casati,et al.  Predictive business operations management , 2005, Int. J. Comput. Sci. Eng..

[3]  Bokyoung Kang,et al.  REAL-TIME RISK MEASUREMENT FOR BUSINESS ACTIVITY MONITORING (BAM) , 2009 .

[4]  Jeng-Chung Chen,et al.  Diagnosis for monitoring system of municipal solid waste incineration plant , 2008, Expert Syst. Appl..

[5]  Uma Sudhakar Rao,et al.  Stochastic Optimization Modeling and Quantitative Project Management , 2008, IEEE Software.

[6]  Aleksandar Lazarevic,et al.  Incremental Local Outlier Detection for Data Streams , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.

[7]  Jaideep Srivastava,et al.  A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.

[8]  Fabio Casati,et al.  Business Process Intelligence , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[9]  Andrew P. Robinson,et al.  Development and testing of regeneration imputation models for forests in Minnesota , 1997 .

[10]  I. V. Rudakova,et al.  Real time diagnostics of technological processes and field equipment , 2007 .

[11]  Bokyoung Kang,et al.  Real-time Process Quality Control for Business Activity Monitoring , 2009, 2009 International Conference on Computational Science and Its Applications.

[12]  Jose A. Romagnoli,et al.  Robust multi-scale principal components analysis with applications to process monitoring , 2005 .

[13]  Chao-Hsien Chu,et al.  A Review of Data Mining-Based Financial Fraud Detection Research , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Frank Leymann,et al.  Runtime Prediction of Service Level Agreement Violations for Composite Services , 2009, ICSOC/ServiceWave Workshops.

[15]  Guido Dedene,et al.  Auto claim fraud detection using Bayesian learning neural networks , 2005, Expert Syst. Appl..

[16]  Ying Liu,et al.  Decision analysis of data mining project based on Bayesian risk , 2009, Expert Syst. Appl..

[17]  Ramakant Nevatia,et al.  Event Detection and Analysis from Video Streams , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD 2000.