{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T19:34:58Z","timestamp":1648668898195},"reference-count":38,"publisher":"Walter de Gruyter GmbH","issue":"3","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8,1]]},"abstract":"Abstract<\/jats:title>The supervisor of the activities of a system user should benefit from the knowledge contained in the event logs of the user. They allow the monitoring of the sequential and parallel user activities. To make event logs more accessible to the supervisor, we suggest a process mining approach, including first the design of an understanding model of the activities of a system user. The model design is based on the relationships between the event logs and the activities of a system user. An intervention model completes the understanding model to assist the supervisor. The intervention model enables an action of the supervisor on the critical activities, and the detection of anomalies. The models are automatically designed with a model-driven engineering approach. An experiment on a smart home system illustrates this tooled design, where the supervisor is a medical or paramedical staff member.<\/jats:p>","DOI":"10.1515\/jisys-2014-0143","type":"journal-article","created":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T17:23:26Z","timestamp":1424712206000},"page":"371-382","source":"Crossref","is-referenced-by-count":1,"title":["Activity Monitoring Process based on Model-Driven Engineering \u2013 Application to Ambient Assisted Living"],"prefix":"10.1515","volume":"24","author":[{"given":"Jacques","family":"Simonin","sequence":"first","affiliation":[{"name":"1Institute Mines-Telecom, T\u00e9l\u00e9com Bretagne, UMR CNRS 6285, Lab-STICC, Universit\u00e9 Europ\u00e9enne de Bretagne, 29238 Brest, France"}]},{"given":"Julie","family":"Soulas","sequence":"additional","affiliation":[{"name":"1Institute Mines-Telecom, T\u00e9l\u00e9com Bretagne, UMR CNRS 6285, Lab-STICC, Universit\u00e9 Europ\u00e9enne de Bretagne, 29238 Brest, France"}]},{"given":"Philippe","family":"Lenca","sequence":"additional","affiliation":[{"name":"1Institute Mines-Telecom, T\u00e9l\u00e9com Bretagne, UMR CNRS 6285, Lab-STICC, Universit\u00e9 Europ\u00e9enne de Bretagne, 29238 Brest, France"}]}],"member":"374","reference":[{"key":"ref41","first-page":"104","article-title":"Mining temporal sequences to discover interesting patterns in Workshop on Mining Temporal and Sequential Data pp","author":"Heierman","year":"2004"},{"key":"ref291","article-title":"and complexity Introduction to the complex thought \u00e9diteur","author":"Morin","year":"1990","journal-title":"Communication"},{"key":"ref61","first-page":"99","article-title":"Visualizing event log clusters in th Conference on Privacy and Trust","author":"Makanju","year":"2008","journal-title":"IEEE Security IEEE Computer Society"},{"key":"ref231","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MC.2012.328","article-title":"a smart home in a box","author":"Cook","year":"2013","journal-title":"IEEE Computer"},{"key":"ref351","first-page":"39","article-title":"Model driven engineering","author":"Schmidt","year":"2006","journal-title":"IEEE Computer"},{"key":"ref401","first-page":"1","article-title":"der Aalst comprehensive survey Software","author":"van","year":"2013","journal-title":"Business process management Eng"},{"key":"ref111","first-page":"71","article-title":"When cognitive assistance brings autonomy in daily living the experience","author":"Pigot","year":"2010","journal-title":"DOMUS"},{"key":"ref391","first-page":"1128","article-title":"van der Aalst mining discovering process models from event logs on Knowledge and Data","volume":"16","author":"Weijters","year":"2004","journal-title":"IEEE Transactions Engineering"},{"key":"ref251","doi-asserted-by":"crossref","first-page":"391","DOI":"10.2307\/2987742","article-title":"Measuring skewness kurtosis Series The","author":"Groeneveld","year":"1984","journal-title":"Stat Soc Statistician"},{"key":"ref271","first-page":"67","article-title":"Process performance measurement system : a tool to support process - based organizations Total","volume":"11","author":"Kueng","year":"2000","journal-title":"Qual Manage"},{"key":"ref371","first-page":"8154","article-title":"Monitoring the habits of elderly people through data mining from home automation devices data in th Portuguese Conference on Artificial of in Artificial","volume":"16","author":"Soulas","year":"2013","journal-title":"Intelligence Lecture Notes Intelligence"},{"key":"ref91","first-page":"279","article-title":"van der Aalst Bra Process mining online assessment data in International Working Group on Educational Data Mining pp","author":"Pechenizkiy","year":"2009"},{"key":"ref181","first-page":"1","article-title":"der Aalst comprehensive survey Software","author":"van","year":"2013","journal-title":"Business process management Eng"},{"key":"ref331","first-page":"71","article-title":"When cognitive assistance brings autonomy in daily living the experience","author":"Pigot","year":"2010","journal-title":"DOMUS"},{"key":"ref141","first-page":"117","article-title":"and improvement of the alignment between business and information system for telecom services Software","author":"Simonin","year":"2011","journal-title":"Analysis Int J Adv"},{"key":"ref201","first-page":"489","article-title":"An activity monitoring system for elderly care using generative and discriminative models Personal Ubiquitous","volume":"14","author":"van Kasteren","year":"2010","journal-title":"Computing"},{"key":"ref241","first-page":"33","article-title":"Technologies for an aging a systematic review of smart home applications of","author":"Demiris","year":"2008","journal-title":"society Yearbook Medical Informatics"},{"key":"ref151","first-page":"8154","article-title":"Monitoring the habits of elderly people through data mining from home automation devices data in th Portuguese Conference on Artificial of in Artificial","volume":"16","author":"Soulas","year":"2013","journal-title":"Intelligence Lecture Notes Intelligence"},{"key":"ref341","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1109\/JBHI.2012.2234129","article-title":"survey on ambient assisted living tools for older adults","volume":"17","author":"Rashidi","year":"2013","journal-title":"IEEE Health Inform"},{"key":"ref381","first-page":"258","article-title":"recognition based on the combination of RFID and accelerometer sensing in Technologies for Healthcare Second International Conference on PervasiveHealth","author":"Stikic","year":"2008","journal-title":"Pervasive Computing IEEE IEEE Computer Society"},{"key":"ref361","first-page":"117","article-title":"and improvement of the alignment between business and information system for telecom services Software","author":"Simonin","year":"2011","journal-title":"Analysis Int J Adv"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"391","DOI":"10.2307\/2987742","article-title":"Measuring skewness kurtosis Series The","author":"Groeneveld","year":"1984","journal-title":"Stat Soc Statistician"},{"key":"ref21","first-page":"33","article-title":"Technologies for an aging a systematic review of smart home applications of","author":"Demiris","year":"2008","journal-title":"society Yearbook Medical Informatics"},{"key":"ref71","article-title":"and complexity Introduction to the complex thought \u00e9diteur","author":"Morin","year":"1990","journal-title":"Communication"},{"key":"ref321","first-page":"396","article-title":"Mining access patterns efficiently from web logs in Knowledge Discovery and Data Mining Current Issues and New Applications pp","author":"Pei","year":"2000"},{"key":"ref121","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1109\/JBHI.2012.2234129","article-title":"survey on ambient assisted living tools for older adults","volume":"17","author":"Rashidi","year":"2013","journal-title":"IEEE Health Inform"},{"key":"ref161","first-page":"258","article-title":"recognition based on the combination of RFID and accelerometer sensing in Technologies for Healthcare Second International Conference on PervasiveHealth","author":"Stikic","year":"2008","journal-title":"Pervasive Computing IEEE IEEE Computer Society"},{"key":"ref311","first-page":"279","article-title":"van der Aalst Bra Process mining online assessment data in International Working Group on Educational Data Mining pp","author":"Pechenizkiy","year":"2009"},{"key":"ref131","first-page":"39","article-title":"Model driven engineering","author":"Schmidt","year":"2006","journal-title":"IEEE Computer"},{"key":"ref261","first-page":"104","article-title":"Mining temporal sequences to discover interesting patterns in Workshop on Mining Temporal and Sequential Data pp","author":"Heierman","year":"2004"},{"key":"ref171","first-page":"1128","article-title":"van der Aalst mining discovering process models from event logs on Knowledge and Data","volume":"16","author":"Weijters","year":"2004","journal-title":"IEEE Transactions Engineering"},{"key":"ref211","first-page":"276","article-title":"framework for information systems architecture IBM","volume":"26","author":"Zachman","year":"1987","journal-title":"Syst J"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MC.2012.328","article-title":"a smart home in a box","author":"Cook","year":"2013","journal-title":"IEEE Computer"},{"key":"ref421","first-page":"489","article-title":"An activity monitoring system for elderly care using generative and discriminative models Personal Ubiquitous","volume":"14","author":"van Kasteren","year":"2010","journal-title":"Computing"},{"key":"ref431","first-page":"276","article-title":"framework for information systems architecture IBM","volume":"26","author":"Zachman","year":"1987","journal-title":"Syst J"},{"key":"ref51","first-page":"67","article-title":"Process performance measurement system : a tool to support process - based organizations Total","volume":"11","author":"Kueng","year":"2000","journal-title":"Qual Manage"},{"key":"ref281","first-page":"99","article-title":"Visualizing event log clusters in th Conference on Privacy and Trust","author":"Makanju","year":"2008","journal-title":"IEEE Security IEEE Computer Society"},{"key":"ref101","first-page":"396","article-title":"Mining access patterns efficiently from web logs in Knowledge Discovery and Data Mining Current Issues and New Applications pp","author":"Pei","year":"2000"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/24\/3\/article-p371.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/jisys-2014-0143\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T02:13:31Z","timestamp":1619057611000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/jisys-2014-0143\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,1]]},"references-count":38,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1515\/jisys-2014-0143","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2015,8,1]]}}}