IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
|
|
|
- Marilyn Veronica Barton
- 10 years ago
- Views:
Transcription
1 Journal homepage: ISSN: IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated to Savitribai Phule Pune University) Pune, India 1 [email protected], 2 [email protected] Abstract : In modern commerce, the specialization of the business process and frequent changes of custom demands require the capacity of the modeling process for enterprises effectively and efficiently. Existing processes improving business modeling use workflow mining and process retrieval and require much manual work. In this paper workflow recommendation technique is proposed to provide process designers with support for automatically creating the new business process that is under deliberation. With the help of the minimum depth-first search (DFS) codes of business process graphs for calculating the distance between process fragments and select candidate node sets for recommendation purpose. We will implement recommendation method for improving the modeling efficiency and accuracy. And last, based on both synthetic and real-world datasets, we will compare the proposed method with other methods and the experiment results prove its effectiveness for practical applications. Keywords: Business process modeling, enterprise systems, industrial informatics, string edit distance, workflow, workflow recommendation. 1. INTRODUCTION To facilitate the coordination of work across the organization and cooperation, enterprise systems (ES) have been developed to integrate computer systems that support all phases of an organization s operations. Enterprise System [1] has adopted many organizations for their mission critical [2][3] applications. ES has been fueled by the global economy and the 370 P a g e
2 development in information technology including industrial informatics. Enterprise Systems integrate business processes and align IT to support business strategy and workflow technology is essential and is threaded through the very core of the system architecture. Business process is one of the main tool to develop workflow technology. Business process specifies various business logics and handles different business operations. Thus, business process modeling [4][5] plays important role in operating modern enterprises. However, business process is time consuming process which often involves selecting concrete activities to be performed such as determining their execution order and dealing with the exceptions that may occur. Business process is complex process. Besides, in modern commerce, both frequent changes of custom demands and the specialism of the business process require the capacity of modeling business processes for enterprises in an effective and efficient manner. Existing processes improving business modeling use workflow mining and process retrieval and require much manual work. 2. RELATED WORK Nowadays, research work has been focusing on improving business process modeling. Designing the workflow process use workflow mining [9], its time consuming process. Workflow mining helps the modelers improve process modeling with discovered process models. The construction new business process is referred to the pre-discovered template model and modelers have to construct the process themselves. Instead of the workflow repository, our method can not only automate the construction process but also provide guidance for recommending the most likely nodes. However, taking the result form the workflow mining as the provenance for workflow repositories, then accuracy of workflow recommendation will increase, which means have complementary advantage. Process retrieval [10][11] can help modelers improve the modeling by retrieving the similar fragments from the workflow repository. Similar to workflow mining much manual work is still involved. A limited number of literature [11][12] available for above research. Workflow recommendation technique also called flow Recommendation [12]. flow Recommendation features a more robust exploration capability to identify the upstream dependency patterns that are essential to the accuracy of workflow recommendation. This leverages source of workflows to provide recommendation for the best node that needs to be chosen to complete the workflow. Flow Recommender consist of complex structure does not support patterns (e.g. AND-join, OR-join, etc.) and it would fail facing with candidate node with multiple influencing upstream sub paths. Flow recommender cannot widely used in real applications. Since our work starts from the graph model its complex structure, in this paper we proposed 371 P a g e
3 recommendation method is more practical and could be applied to real application scenarios. Other related research work was carried out on service discovery and optimization for composition[13][14][15] in the domain of Service Computing. Traditional service composition issues refer to the web services scenarios recommended based on certain given or predefined business template in which high-level abstract web services are well specified by users when the workflow is designed. 3. PROPOSED SYSTEM New business process promotes the efficiency and accuracy of modeling so-called workflow repository which contain set of already developed process models. Business process model repository for structurally and semantically related models. Similar to the search on internet a user expresses a BPMN-Q query and results receive a list of process models ordered by germaneness of the query. There are more than hundreds and even thousands of business process models in the repository. Large number of process models could serve knowledge base for guidance for the modeling effort. Nowadays existing methods based on the graphs. For example, event-driven process chains (EPC), Petri nets, and Business Process Modeling Notation (BPMN)[9]. Since similarity of two business process proved the most effective way to distinguish between two business processes,starting from the graphs and combining with traditional recommendation. we plan to proceed associate rules mining between business activity nodes and process fragments within the workflow repository, and provide related decision support or information for modeling processes. We call it workflow recommendation. A business process modeling fragments under modeling as a reference model and pattern are called the influencing upstream subgraphs of the activity nodes that determine the occurrence of these nodes in the workflows. The rule of mining to refer pattern extraction is the foundation of workflow recommendation. In this paper, we use a graph-mining technique to extract the patterns from the workflow repository. The minimum depth-first search [6] codes are used as label for business process models of fragments.these codes we proposes an efficient string edit distance (SED) [7]. Similarity metric This turns the graph-matching problem into string matching problem. The method is not only more efficient than GED-based distance metric methods [8], but also overcomes the drawback of the GED method which requires to determine different cost functions for different scenarios, for analyzing and measuring the distance between 372 P a g e
4 reference model and process patterns. Based on the results system selects most probable activities or task for recommendation. Workflow recommendation technique can do the following: 1) Speed up the business process design and reducing the deliberation time which is needed when domain knowledge is inadequate or missing. 2) Choosing most likely task by minimizing the errors that are possibly made in business process design work. 4. CONCLUSION AND FUTURE WORK In this paper We not only address the problem of distance calculation between two process containing complicated structures such as AND-Join and OR-Split, but also improved the efficiency for matching two fragments. we proposed SED-based workflow recommendation method which is improving the business process model for providing the guidance to extend or complete the business process under construction. And we proposed a framework for prototype implementation and two algorithms respectively for pattern discovery and workflow recommendation. The experimental evaluations conducted on synthetic and real world datasets, which is showed that our method achieved better or equal performance in both efficiency and effectiveness when comparing with other methods (i.e., GED-based method and FlowRecommender). It turns out to be a promising approach for improving the efficiency and accuracy of business process modeling in real applications. Much work still needs to be in the future. Iteration structure which is not supported in our work, is common in business process, we plan to solve this problem using redefining the pattern location or redesign new method to distance calculation. 5. ACKNOWLEGEMENT I wish to express my sincere thanks to the guide and Head of Department, Prof. Soumitra S.Das, as well as our Director Dr. S.S.Sonavane. also grateful thanks to our PG Coordinator Prof.P. M. Agarkar and last but not least, the departmental staff members for their support. REFERENCES [1]. L. D. Xu, Enterprise systems: State-of-the-art and future trends, IEEE Trans. Ind. Inf., vol. 7, no. 4, pp , Nov [2]. L. D. Xu, C. Wang, Z. Bi, and J. Yu, Autoassem: An automated assembly planning system for complex products, IEEE Trans. Ind. Inf., vol. 8, no. 3, pp , Nov [3]. L. Li, R.-L. Ge, S.-M. Zhou, and R. Valerdi, Guest editorial: Integrated healthcare information systems, IEEE Trans. Inf. Technol. Biomed., [4]. L. Aldin and S. de Cesare, A literature review on business process modelling: New frontiers of reusability, Enterp. Inf. Syst., vol. 5, no. 3, pp , P a g e
5 [5]. B. Wetzstein, P. Leitner, F. Rosenberg, S. Dustdar, and F. Leymann, Identifying influential factors of business process performance using dependency analysis, Enterp. Inf. Syst., vol. 5, no. 1, pp , [6]. X. Yan and J. Han, gspan: Graph-based substructure pattern mining, in Proc. IEEE Int. Conf. Data Mining, 2002, pp [7]. V. I. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals, Sov. Phys. Doklady, vol. 10, no. 8, pp , [8]. B. Cao, J. Yin, S. Deng, D. Wang, and Z.Wu, Graph-based workflow recommendation: On improving business process modeling, in Proc. 21st ACM Int. Conf. Inf. Knowl. Manag., 2012, pp [9]. B. van Dongen, R. Dijkman, and J. Mendling, Measuring similarity between business process models, in Advanced Information Systems Engineering. New York, NY, USA: Springer, 2008, pp [10]. R. Dijkman, M. Dumas, B. Van Dongen, R. Käärik, and J. Mendling, Similarity of business process models: Metrics and evaluation, Inf. Syst., vol. 36, no. 2, pp , [11]. R. Zeng, X. He, andw. M. P. van deraalst, Amethod to mine workflows from provenance for assisting scientific workflow composition, in Proc. IEEE World Congress Services, 2011, pp [12]. J. Zhang, Q. Liu, and K. Xu, Flowrecommender: A workflow recommendation technique for process provenance, in Proc. 8th Australasian Data Mining Conf.: Data Mining Analytics, 2009, pp [13]. M. Nikola and M. Miroslaw, Current solutions for web service composition, IEEE Internet Computing, vol. 8, no. 6, pp , [14]. W. Viriyasitavat, L. D. Xu, and A. Martin, SWSPEC: The requirements specification language in service workflow environments, IEEE Trans. Ind. Inf., vol. 8, no. 3, pp , [15]. L. D. Xu, W. Viriyasitavat, P. Ruchikachorn, and A. Martin, Using propositional logic for requirements verification of service workflow, IEEE Trans. Ind. Inf., vol. 8, no. 3, pp , Aug P a g e
PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL
Journal homepage: www.mjret.in ISSN:2348-6953 PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Utkarsha Vibhute, Prof. Soumitra
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
KEYWORD SEARCH IN RELATIONAL DATABASES
KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Structural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
Process Mining by Measuring Process Block Similarity
Process Mining by Measuring Process Block Similarity Joonsoo Bae, James Caverlee 2, Ling Liu 2, Bill Rouse 2, Hua Yan 2 Dept of Industrial & Sys Eng, Chonbuk National Univ, South Korea jsbae@chonbukackr
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
POQL: A New Query Language for Process-Oriented Case-Based Reasoning
POQL: A New Query Language for Process-Oriented Case-Based Reasoning Gilbert Müller and Ralph Bergmann Business Information Systems II University of Trier 54286 Trier, Germany [muellerg][bergmann]@uni-trier.de,
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts
Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
Automatic Annotation Wrapper Generation and Mining Web Database Search Result
Automatic Annotation Wrapper Generation and Mining Web Database Search Result V.Yogam 1, K.Umamaheswari 2 1 PG student, ME Software Engineering, Anna University (BIT campus), Trichy, Tamil nadu, India
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Client Perspective Based Documentation Related Over Query Outcomes from Numerous Web Databases
Beyond Limits...Volume: 2 Issue: 2 International Journal Of Advance Innovations, Thoughts & Ideas Client Perspective Based Documentation Related Over Query Outcomes from Numerous Web Databases B. Santhosh
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
Semantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India [email protected]
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
Portable Cloud Services Using TOSCA
Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
Application of Data Mining Techniques for Improving Software Engineering
Application of Data Mining Techniques for Improving Software Engineering Wahidah Husain 1, Pey Ven Low 2, Lee Koon Ng 3, Zhen Li Ong 4, School of Computer Sciences, Universiti Sains Malaysia 11800 USM,
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Optimization of Image Search from Photo Sharing Websites Using Personal Data
Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology [email protected] Abstract This paper is
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
ELEVATING FORENSIC INVESTIGATION SYSTEM FOR FILE CLUSTERING
ELEVATING FORENSIC INVESTIGATION SYSTEM FOR FILE CLUSTERING Prashant D. Abhonkar 1, Preeti Sharma 2 1 Department of Computer Engineering, University of Pune SKN Sinhgad Institute of Technology & Sciences,
Winery A Modeling Tool for TOSCA-based Cloud Applications
Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University
Delta Analysis of Role-Based Access Control Models
Delta Analysis of Role-Based Access Control Models Maria Leitner University of Vienna, Austria Faculty of Computer Science [email protected] Abstract. Role-based Access Control (RBAC) is de facto
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION S. Naisha Sultana 1, Gandikota Ramu 2 and Prof. B. Eswara Reddy 3 1, 2&3 Dept of Computer Science & Engineering, JNTUA College
The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net
Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the
A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement
A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement Shuchi Gupta 1, Prof. Praveen Bhanodia 2 1 Department of Computer Science & Engineering, Patel College
MULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset
P P P Health An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset Peng Liu 1, Elia El-Darzi 2, Lei Lei 1, Christos Vasilakis 2, Panagiotis Chountas 2, and Wei Huang
How To Cluster On A Search Engine
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,
Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath
Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath Abstract Now a days, Cloud computing is becoming more popular research topic. Building high-quality cloud applications
Framework for Intelligent Crawler Engine on IaaS Cloud Service Model
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1783-1789 International Research Publications House http://www. irphouse.com Framework for
Client Trust and Prioritization based Workflow Scheduling in Cloud
Client Trust and Prioritization based Workflow Scheduling in Cloud NeerajKumari Khairwal #1, Deven Shah *2 # Information Technology,Terna Engineering College, Mumbai University,Nerul,Navi Mumbai, India
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
A Business Process Services Portal
A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,
Data-Aware Service Choreographies through Transparent Data Exchange
Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application
SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY
SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY G.Evangelin Jenifer #1, Mrs.J.Jaya Sherin *2 # PG Scholar, Department of Electronics and Communication Engineering(Communication and Networking), CSI Institute
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science
Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS
BPMN PATTERNS USED IN MANAGEMENT INFORMATION SYSTEMS Gabriel Cozgarea 1 Adrian Cozgarea 2 ABSTRACT: Business Process Modeling Notation (BPMN) is a graphical standard in which controls and activities can
KNOWLEDGE DISCOVERY and SAMPLING TECHNIQUES with DATA MINING for IDENTIFYING TRENDS in DATA SETS
KNOWLEDGE DISCOVERY and SAMPLING TECHNIQUES with DATA MINING for IDENTIFYING TRENDS in DATA SETS Prof. Punam V. Khandar, *2 Prof. Sugandha V. Dani Dept. of M.C.A., Priyadarshini College of Engg., Nagpur,
Formal Methods for Preserving Privacy for Big Data Extraction Software
Formal Methods for Preserving Privacy for Big Data Extraction Software M. Brian Blake and Iman Saleh Abstract University of Miami, Coral Gables, FL Given the inexpensive nature and increasing availability
Survey On: Nearest Neighbour Search With Keywords In Spatial Databases
Survey On: Nearest Neighbour Search With Keywords In Spatial Databases SayaliBorse 1, Prof. P. M. Chawan 2, Prof. VishwanathChikaraddi 3, Prof. Manish Jansari 4 P.G. Student, Dept. of Computer Engineering&
Web Page Prediction System Based on Web Logs and Web Domain Using Cluster Technique
Web Page Prediction System Based on Web Logs and Web Domain Using Cluster Technique Vasim Mujawar M.E, Department of Computer Engineering, DPCOE, Wagholi, Pune, India ABSTRACT: In intelligent web system
Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement
Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy
Collecting Polish German Parallel Corpora in the Internet
Proceedings of the International Multiconference on ISSN 1896 7094 Computer Science and Information Technology, pp. 285 292 2007 PIPS Collecting Polish German Parallel Corpora in the Internet Monika Rosińska
Exploration and Visualization of Post-Market Data
Exploration and Visualization of Post-Market Data Jianying Hu, PhD Joint work with David Gotz, Shahram Ebadollahi, Jimeng Sun, Fei Wang, Marianthi Markatou Healthcare Analytics Research IBM T.J. Watson
A Survey of Different Encryption Techniques for Secure Cloud Storage
Journal homepage: www.mjret.in ISSN: 2348-6953 Rutuja R. Sadul KJCOEMR,Pune, India. Asawari Rankhambe KJCOEMR,Pune, India. Neha Subhekar KJCOEMR,Pune, India. A Survey of Different Encryption Techniques
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
jeti: A Tool for Remote Tool Integration
jeti: A Tool for Remote Tool Integration Tiziana Margaria 1, Ralf Nagel 2, and Bernhard Steffen 2 1 Service Engineering for Distributed Systems, Institute for Informatics, University of Göttingen, Germany
A Statistical Text Mining Method for Patent Analysis
A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, [email protected] Abstract Most text data from diverse document databases are unsuitable for analytical
Robust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
Log Mining Based on Hadoop s Map and Reduce Technique
Log Mining Based on Hadoop s Map and Reduce Technique ABSTRACT: Anuja Pandit Department of Computer Science, [email protected] Amruta Deshpande Department of Computer Science, [email protected]
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India [email protected] Suraj Sanjay Dangat
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 Over viewing issues of data mining with highlights of data warehousing Rushabh H. Baldaniya, Prof H.J.Baldaniya,
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
