Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 693450, 13 pages
http://dx.doi.org/10.1155/2015/693450
Research Article

Modeling the Process of Event Sequence Data Generated for Working Condition Diagnosis

1Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
2Institute of Information System & Engineering, School of Software, Tsinghua University, Beijing 100084, China
3School of Software, Tsinghua University, East Main Building, Beijing 100084, China

Received 1 June 2015; Accepted 5 July 2015

Academic Editor: Xiaoyu Song

Copyright © 2015 Jianwei Ding et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Holler, V. Tsiatsis, C. Mulligan, S. Avesand, S. Karnouskos, and D. Boyle, From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence, Academic Press, 2014.
  2. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Sensing as a service model for smart cities supported by Internet of Things,” Transactions on Emerging Telecommunications Technologies, vol. 25, no. 1, pp. 81–93, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. R. F. Mesquita Brandão and J. A. Beleza Carvalho, “The importance of control monitoring systems in wind parks maintenance,” British Journal of Applied Science & Technology, vol. 4, no. 10, pp. 1461–1471, 2014. View at Google Scholar
  4. C. J. Crabtree, D. Zappalá, and P. J. Tavner, “Survey of commercially available condition monitoring systems for wind turbines,” Tech. Rep., Durham University, 2014. View at Google Scholar
  5. D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent dirichlet allocation,” The Journal of Machine Learning Research, vol. 3, no. 4-5, pp. 993–1022, 2003. View at Google Scholar · View at Scopus
  6. S. Kandula, R. Mahajan, P. Verkaik, S. Agarwal, J. Padhye, and P. Bahl, “Detailed diagnosis in enterprise networks,” in Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM '09), vol. 39, pp. 243–254, ACM, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. J.-G. Lou, Q. Fu, Y. Wang, and J. Li, “Mining dependency in distributed systems through unstructured logs analysis,” ACM SIGOPS Operating Systems Review, vol. 44, no. 1, pp. 91–96, 2010. View at Google Scholar
  8. C. Luo, J.-G. Lou, Q. Lin et al., “Correlating events with time series for incident diagnosis,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), pp. 1583–1592, ACM, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Chen and R. Kumar, “Online failure diagnosis of stochastic discrete event systems,” in Proceedings of the IEEE Conference on Computer Aided Control System Design (CACSD '13), pp. 194–199, IEEE, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Chen and R. Kumar, “Failure diagnosis of discrete-time stochastic systems subject to temporal logic correctness requirements,” in Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control (ICNSC '14), pp. 42–47, IEEE, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. Business Process Model and Notation (BPMN) Version 2.0, OMG Specification, Object Management Group, 2011.
  12. F. Leymann, “Bpel vs. bpmn 2.0: should you care?” in Business Process Modeling Notation, pp. 8–13, Springer, Berlin, Germany, 2011. View at Google Scholar
  13. C. C. Aggarwal, Managing and Mining Sensor Data, Springer, 2013. View at Publisher · View at Google Scholar
  14. N. H. Gehani, H. V. Jagadish, and O. Shmueli, “Composite event specification in active databases: model and implementation,” in Proceedings of the 18th VLDB Conference Vancouver (VLDB '92), vol. 92, pp. 327–338, Citeseer, British Columbia, Canada, 1992.
  15. I. Davidson, S. Gilpin, and P. B. Walker, “Behavioral event data and their analysis,” Data Mining and Knowledge Discovery, vol. 25, no. 3, pp. 635–653, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  16. J. Han and M. Kamber, Data Mining, Southeast Asia Edition: Concepts and Techniques, Morgan Kaufmann, 2006.
  17. H. R. Motahari-Nezhad, R. Saint-Paul, F. Casati, and B. Benatallah, “Event correlation for process discovery from web service interaction logs,” The VLDB Journal, vol. 20, no. 3, pp. 417–444, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. F. Skopik and R. Fiedler, “Intrusion detection in distributed systems using fingerprinting and massive event correlation,” in GI-Jahrestagung, pp. 2240–2254, 2013. View at Google Scholar
  19. G. A. Wilkin, P. Eugster, and K. R. Jayaram, “Decentralized fault-tolerant event correlation,” ACM Transactions on Internet Technology, vol. 14, no. 1, article 5, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. H. Wei, “A correlation analysis method for network security events,” in Informatics and Management Science III, vol. 206 of Lecture Notes in Electrical Engineering, pp. 269–277, Springer, London, UK, 2013. View at Publisher · View at Google Scholar
  21. W. Van Der Aalst, A. Adriansyah, A. K. A. de Medeiros et al., “Process mining manifesto,” in Usiness Process Management Workshops, pp. 169–194, Springer, Berlin, Germany, 2012. View at Google Scholar
  22. J. C. A. M. Buijs, B. F. van Dongen, and W. M. P. van der Aalst, “Mining configurable process models from collections of event logs,” in Business Process Management, pp. 33–48, Springer, 2013. View at Google Scholar
  23. Á. Rebuge and D. R. Ferreira, “Business process analysis in healthcare environments: a methodology based on process mining,” Information Systems, vol. 37, no. 2, pp. 99–116, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. J. Wang, R. K. Wong, J. Ding, Q. Guo, and L. Wen, “On recommendation of process mining algorithms,” in Proceedings of the IEEE 19th International Conference on Web Services (ICWS '12), pp. 311–318, IEEE, Honolulu, Hawaii, USA, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. R. S. Mans, W. M. P. van der Aalst, and H. M. W. Verbeek, “Supporting process mining workflows with rapidprom,” in Proceedings of the Business Process Management Demo Sessions (BPMD ’14), vol. 1295, pp. 56–60, Eindhoven, The Netherlands, September 2014.
  26. C. Li, M. Reichert, and A. Wombacher, “Mining business process variants: challenges, scenarios, algorithms,” Data & Knowledge Engineering, vol. 70, no. 5, pp. 409–434, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. R. Accorsi, T. Stocker, and G. Müller, “On the exploitation of process mining for security audits: the process discovery case,” in Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1462–1468, ACM, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. B.-J. Lee, S.-G. Park, K.-B. Min et al., “The relationship between working condition factors and well-being,” Annals of Occupational and Environmental Medicine, vol. 26, no. 1, article 34, 2014. View at Publisher · View at Google Scholar
  29. J. Cohen, Statistical Power Analysis for the Behavioral Sciences, Routledge Academic, New York, NY, USA, 2013.
  30. P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang, “Towards highly reliable enterprise network services via inference of multi-level dependencies,” ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 13–24, 2007. View at Google Scholar
  31. B. Rosner, Fundamentals of Biostatistics, Cengage Learning, 2010.
  32. A. Zimmermann, “Colored petri nets,” in Stochastic Discrete Event Systems: Modeling, Evaluation, Applications, pp. 99–124, Springer, 2008. View at Google Scholar
  33. A. Adriansyah, B. F. van Dongen, and W. M. P. van der Aalst, “Towards robust conformance checking,” in Business Process Management Workshops, vol. 66 of Lecture Notes in Business Information Processing, pp. 122–133, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  34. M. Weidlich and M. Weske, Business Process Modeling Notation, Springer, Berlin, Germany, 2010.
  35. C. M. Bishop and J. Lasserre, “Generative or discriminative? Getting the best of both worlds,” in Bayesian Statistics, J. M. Bernardo, M. J. Bayarri, J. O. Berger et al., Eds., vol. 8, pp. 3–23, Oxford University, 2007. View at Google Scholar
  36. C. M. Bishop, Pattern Recognition and Machine Learning. Volume 1, Springer, New York, NY, USA, 2006.
  37. D. M. Blei and J. D. Lafferty, “Dynamic topic models,” in Proceedings of the 23rd International Conference on Machine Learning (ICML '06), pp. 113–120, ACM, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  38. J. Foulds, L. Boyles, C. DuBois, P. Smyth, and M. Welling, “Stochastic collapsed variational Bayesian inference for latent dirichlet allocation,” in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 446–454, ACM, 2013.
  39. J. Pearl, Bayesian Networks, Department of Statistics, UCLA, 2011.
  40. I. Porteous, D. Newman, A. Ihler, A. Asuncion, P. Smyth, and M. Welling, “Fast collapsed gibbs sampling for latent dirichlet allocation,” in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '08), pp. 569–577, ACM, August 2008. View at Publisher · View at Google Scholar · View at Scopus