{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:41:14Z","timestamp":1725716474012},"reference-count":61,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1016\/j.eswa.2017.03.039","type":"journal-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T13:45:54Z","timestamp":1490017554000},"page":"263-272","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["A probabilistic approach to event log completeness"],"prefix":"10.1016","volume":"80","author":[{"given":"Femi Emmanuel","family":"Ayo","sequence":"first","affiliation":[]},{"given":"Olusegun","family":"Folorunso","sequence":"additional","affiliation":[]},{"given":"Friday Thomas","family":"Ibharalu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2017.03.039_bib0001","first-page":"5","article-title":"Comprehensive analysis of big data variety landscape","volume":"30","author":"Abawajy","year":"2015"},{"key":"10.1016\/j.eswa.2017.03.039_bib0002","first-page":"476","article-title":"Bayesian networks. In: Handbook of knowledge representation","volume":"11","author":"Adnan","year":"2008"},{"key":"10.1016\/j.eswa.2017.03.039_bib0003","series-title":"Fuzzy logic. In intelligent techniques for data science","first-page":"95","author":"Akerkar","year":"2016"},{"issue":"05","key":"10.1016\/j.eswa.2017.03.039_bib0004","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1142\/S0218488507004868","article-title":"A multi-objective genetic algorithm for tuning and rule selection to obtain accurate and compact linguistic fuzzy rule-based systems","volume":"15","author":"Alcal\u00e1","year":"2007","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, World Scientific: Singapore"},{"issue":"4","key":"10.1016\/j.eswa.2017.03.039_bib0005","article-title":"Selecting an appropriate algorithm for risk identification in business processes: Case study insurance company","volume":"5","author":"Ashoori","year":"2017","journal-title":"Majlesi Journal of Mechatronic Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0006","series-title":"Proceedings of the 30th annual ACM symposium on applied computing","first-page":"1225","article-title":"Matching of events and activities: An approach based on behavioral constraint satisfaction","author":"Baier","year":"2015"},{"key":"10.1016\/j.eswa.2017.03.039_bib0007","series-title":"Dynamics in logistics","first-page":"77","article-title":"Process maintenance of heterogeneous logistic systems\u2014a process mining approach","author":"Becker","year":"2017"},{"key":"10.1016\/j.eswa.2017.03.039_bib0008","series-title":"OTM Confederated International Conferences\" On the Move to Meaningful Internet Systems\"","first-page":"305","article-title":"On the role of fitness, precision, generalization and simplicity in process discovery","author":"Buijs","year":"2012"},{"issue":"3","key":"10.1016\/j.eswa.2017.03.039_bib0009","first-page":"1","article-title":"From process mining to process design: A simulation model to reduce conformance risk","volume":"23","author":"Centobelli","year":"2015","journal-title":"Engineering Letters"},{"key":"10.1016\/j.eswa.2017.03.039_bib0010","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.dss.2015.08.003","article-title":"Process mining on noisy logs\u2014Can log sanitization help to improve performance?","volume":"79","author":"Cheng","year":"2015","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0011","first-page":"1","article-title":"Business process flexibility-a systematic literature review with a software systems perspective","author":"Cognini","year":"2016","journal-title":"Information Systems Frontiers"},{"key":"10.1016\/j.eswa.2017.03.039_bib0012","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.dss.2014.10.006","article-title":"A recommendation system for predicting risks across multiple business process instances","volume":"69","author":"Conforti","year":"2015","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0013","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.artmed.2016.01.002","article-title":"From complex questionnaire and interviewing data to intelligent Bayesian network models for medical decision support","volume":"67","author":"Constantinou","year":"2016","journal-title":"Artificial Intelligence in Medicine"},{"key":"10.1016\/j.eswa.2017.03.039_bib0014","first-page":"1","article-title":"Temporal electronic phenotyping by mining careflows of breast cancer patients","author":"Dagliati","year":"2017","journal-title":"Journal of Biomedical Informatics"},{"key":"10.1016\/j.eswa.2017.03.039_bib0015","series-title":"International Conference on Business Process Management","first-page":"367","article-title":"Process mining on databases: Unearthing historical data from redo logs","author":"de Murillas","year":"2015"},{"key":"10.1016\/j.eswa.2017.03.039_bib0016","series-title":"Computational Intelligence and Data Mining (CIDM), IEEE Symposium","first-page":"254","article-title":"A comprehensive benchmarking framework (CoBeFra) for conformance analysis between procedural process models and event logs in ProM","author":"De Weerdt","year":"2013"},{"issue":"1","key":"10.1016\/j.eswa.2017.03.039_bib0017","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s13740-014-0038-4","article-title":"Knowledge-intensive processes: Characteristics, requirements and analysis of contemporary approaches","volume":"4","author":"Di Ciccio","year":"2015","journal-title":"Journal on Data Semantics"},{"key":"10.1016\/j.eswa.2017.03.039_bib0018","series-title":"Components and services for IoT platforms","first-page":"251","article-title":"Fuzzy inference systems design approaches for WSNs","author":"Dima","year":"2017"},{"key":"10.1016\/j.eswa.2017.03.039_bib0019","series-title":"Information and software technology","first-page":"1","article-title":"Applying process mining techniques in software process appraisals","author":"do Valle","year":"2017"},{"key":"10.1016\/j.eswa.2017.03.039_bib0020","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.knosys.2015.01.013","article-title":"Revisiting evolutionary fuzzy systems: Taxonomy, applications, new trends and challenges","volume":"80","author":"Fernandez","year":"2015","journal-title":"Knowledge-Based Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0021","series-title":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","first-page":"5","article-title":"Process mining for clinical workflows","author":"Garg","year":"2016"},{"key":"10.1016\/j.eswa.2017.03.039_bib0022","series-title":"India Conference (INDICON), Annual","first-page":"1","article-title":"Improved particle swarm optimization based load frequency control in a single area power system","author":"Gautam","year":"2010"},{"issue":"1","key":"10.1016\/j.eswa.2017.03.039_bib0023","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1504\/IJEH.2016.078745","article-title":"Process mining in healthcare: A systematised literature review","volume":"9","author":"Ghasemi","year":"2016","journal-title":"International Journal of Electronic Healthcare"},{"issue":"2","key":"10.1016\/j.eswa.2017.03.039_bib0024","doi-asserted-by":"crossref","first-page":"1697","DOI":"10.1016\/j.asoc.2010.04.025","article-title":"Process discovery in event logs: An application in the telecom industry","volume":"11","author":"Goedertier","year":"2011","journal-title":"Applied Soft Computing"},{"issue":"2","key":"10.1016\/j.eswa.2017.03.039_bib0025","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1023\/A:1022602019183","article-title":"Genetic algorithms and machine learning","volume":"3","author":"Goldberg","year":"1988","journal-title":"Machine Learning"},{"key":"10.1016\/j.eswa.2017.03.039_bib0026","series-title":"Foundations for a social workflow platform","first-page":"11","article-title":"Fundamentals","author":"G\u00f6rg","year":"2016"},{"key":"10.1016\/j.eswa.2017.03.039_bib0027","series-title":"International Conference on Business Process Management","first-page":"109","article-title":"Mining invisible tasks in non-free-choice constructs","author":"Guo","year":"2015"},{"key":"10.1016\/j.eswa.2017.03.039_bib0028","series-title":"Application and theory of petri nets and concurrency","first-page":"91","article-title":"Discovering block-structured process models from incomplete event logs","author":"Leemans","year":"2014"},{"key":"10.1016\/j.eswa.2017.03.039_bib0029","series-title":"Business process management workshops","first-page":"66","article-title":"Discovering block-structured process models from event logs containing infrequent behaviour","author":"Leemans","year":"2014"},{"key":"10.1016\/j.eswa.2017.03.039_bib0030","series-title":"Proceedings of the 25th International conference on world wide web (pp. 555-565). International world wide web conferences steering committee","article-title":"Behavior driven topic transition for search task identification","author":"Li","year":"2016"},{"key":"10.1016\/j.eswa.2017.03.039_bib0031","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.dss.2016.07.003","article-title":"A snail shell process model for knowledge discovery via data analytics","volume":"91","author":"Li","year":"2016","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0032","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.is.2016.10.005","article-title":"Change visualisation: Analysing the resource and timing differences between two event logs","volume":"65","author":"Low","year":"2017","journal-title":"Information Systems"},{"issue":"3","key":"10.1016\/j.eswa.2017.03.039_bib0033","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/2845086","article-title":"Synchronization-core-based discovery of processes with decomposable cyclic dependencies","volume":"10","author":"Lu","year":"2016","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"10.1016\/j.eswa.2017.03.039_bib0034","first-page":"209","article-title":"Compliance monitoring in business processes: Functionalities, application, and tool-support","volume":"54","author":"Ly","year":"2015"},{"issue":"3","key":"10.1016\/j.eswa.2017.03.039_bib0035","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1002\/asi.20456","article-title":"Process\u2010aware information systems: Bridging people and software through process technology","volume":"58","author":"Ma","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"10.1016\/j.eswa.2017.03.039_bib0036","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s11069-016-2594-4","article-title":"Fuzzy inference-based approach to the mining-induced pipeline failure estimation","volume":"85","author":"Malinowska","year":"2017","journal-title":"Natural Hazards"},{"issue":"2","key":"10.1016\/j.eswa.2017.03.039_bib0037","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10270-014-0420-6","article-title":"A process mining-based analysis of business process work-arounds","volume":"15","author":"Outmazgin","year":"2016","journal-title":"Software & Systems Modeling"},{"key":"10.1016\/j.eswa.2017.03.039_bib0038","first-page":"475","article-title":"Workflow management","volume":"1","author":"Ouyang","year":"2015"},{"key":"10.1016\/j.eswa.2017.03.039_bib0039","series-title":"ICT and Knowledge Engineering (ICT and Knowledge Engineering), 2014 12th International Conference on","first-page":"83","article-title":"Process and deviation exploration through Alpha-algorithm and Heuristic miner techniques","author":"Porouhan","year":"2014"},{"issue":"6","key":"10.1016\/j.eswa.2017.03.039_bib0040","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TSC.2015.2476463","article-title":"Event correlation analytics: Scaling process mining using mapreduce-aware event correlation discovery techniques","volume":"8","author":"Reguieg","year":"2015","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.eswa.2017.03.039_bib0041","series-title":"International conference on business process management","first-page":"179","article-title":"In log and model we trust? A generalized conformance checking framework","author":"Rogge-Solti","year":"2016"},{"key":"10.1016\/j.eswa.2017.03.039_bib0042","series-title":"Handbook on business process management 1","first-page":"105","article-title":"The six core elements of business process management","author":"Rosemann","year":"2015"},{"key":"10.1016\/j.eswa.2017.03.039_bib0043","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.eswa.2015.08.043","article-title":"Optimization of adaptive fuzzy logic controller using novel combined evolutionary algorithms, and its application in Diez Lagos flood controlling system, Southern New Mexico","volume":"43","author":"Sabzi","year":"2016","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2017.03.039_bib0044","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2016.08.001","article-title":"Modern meta-heuristics based on nonlinear physics processes: A review of models and design procedures","volume":"655","author":"Salcedo-Sanz","year":"2016","journal-title":"Physics Reports"},{"key":"10.1016\/j.eswa.2017.03.039_bib0045","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.dss.2016.06.012","article-title":"A framework for efficiently mining the organisational perspective of business processes","volume":"89","author":"Sch\u00f6nig","year":"2016","journal-title":"Decision Support Systems"},{"issue":"6","key":"10.1016\/j.eswa.2017.03.039_bib0046","first-page":"818","article-title":"System runs analysis with process mining","volume":"22","author":"Shershakov","year":"2015","journal-title":"Information Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0047","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/j.rser.2015.04.037","article-title":"Applications of fuzzy logic in renewable energy systems\u2013a review","volume":"48","author":"Suganthi","year":"2015","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"10.1016\/j.eswa.2017.03.039_bib0048","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.is.2016.07.011","article-title":"Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs","volume":"64","author":"Suriadi","year":"2017","journal-title":"Information Systems, Science & Technology"},{"key":"10.1016\/j.eswa.2017.03.039_bib0049","doi-asserted-by":"crossref","unstructured":"van der Aalst W.M.P. & Weijters, A.J.M.M.(Eds.) (2004). In Process mining, special issue of computers in industry, Netherlands, Elsevier BV, 53, 3.","DOI":"10.1016\/j.compind.2003.10.001"},{"issue":"2","key":"10.1016\/j.eswa.2017.03.039_bib0050","first-page":"7","article-title":"Process mining: Overview and opportunities","volume":"3","author":"van der Aalst","year":"2012","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"key":"10.1016\/j.eswa.2017.03.039_bib0051","series-title":"Process mining","first-page":"353","article-title":"Process mining in the large","author":"van der Aalst","year":"2016"},{"key":"10.1016\/j.eswa.2017.03.039_bib0052","series-title":"Process mining: Discovery, conformance and enhancement of business processes","first-page":"1","author":"van der Aalst","year":"2011"},{"issue":"1","key":"10.1016\/j.eswa.2017.03.039_bib0053","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/FI-2014-1006","article-title":"Process discovery and conformance checking using passages","volume":"131","author":"van der Aalst","year":"2014","journal-title":"Fundamenta Informaticae"},{"key":"10.1016\/j.eswa.2017.03.039_bib0054","series-title":"Applications and theory of petri nets","first-page":"48","article-title":"Genetic process mining","author":"van der Aalst","year":"2005"},{"issue":"4","key":"10.1016\/j.eswa.2017.03.039_bib0055","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s10799-016-0262-8","article-title":"On the gap between reality and registration: A business event analysis classification framework","volume":"17","author":"vanden Broucke","year":"2016","journal-title":"Information Technology and Management"},{"key":"10.1016\/j.eswa.2017.03.039_bib0056","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.knosys.2016.03.003","article-title":"Recompiling learning processes from event logs","volume":"100","author":"Vidal","year":"2016","journal-title":"Knowledge-Based Systems"},{"key":"10.1016\/j.eswa.2017.03.039_bib0057","series-title":"GCC Conference and Exhibition (GCC)","first-page":"625","article-title":"A framework for comparing process mining algorithms","author":"Weber","year":"2011"},{"issue":"10","key":"10.1016\/j.eswa.2017.03.039_bib0058","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1016\/j.datak.2010.06.001","article-title":"Mining process models with prime invisible tasks","volume":"69","author":"Wen","year":"2010","journal-title":"Data & Knowledge Engineering"},{"issue":"3","key":"10.1016\/j.eswa.2017.03.039_bib0059","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"},{"issue":"1","key":"10.1016\/j.eswa.2017.03.039_bib0060","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/0020-0255(75)90017-1","article-title":"The concept of a linguistic variable and its application to approximate reasoning-III","volume":"9","author":"Zadeh","year":"1975","journal-title":"Information Sciences"},{"key":"10.1016\/j.eswa.2017.03.039_bib0061","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.fss.2015.05.009","article-title":"Fuzzy logic\u2014a personal perspective","volume":"281","author":"Zadeh","year":"2015","journal-title":"Fuzzy Sets and Systems"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417417301938?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417417301938?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T00:48:35Z","timestamp":1601772515000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417417301938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":61,"alternative-id":["S0957417417301938"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2017.03.039","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2017,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A probabilistic approach to event log completeness","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2017.03.039","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}