Performance Analysis and Activity Deviation Discovery in Event Log Using Process Mining Tool for Hospital System
Subject Areas : Machine learningShanmuga Sundari M 1 , Rudra Kalyan Nayak 2 * , Vijaya Chandra Jadala 3 , Sai Kiran Pasupuleti 4
1 - Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation
2 - School of Computing Science and Engineering, VIT Bhopal University, Bhopal-Indore Highway, Kothrikalan, Sehore, Madhya Pradesh - 466114
3 - Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation
4 - Department of CSE, Prasad V Potluri Siddhartha Institute of Technology
Keywords: Alpha Miner, Event log, Fuzzy Miner, Hospital Process, Process Mining,
Abstract :
All service and manufacturing businesses are resilient and strive for a more efficient and better end in today's world. Data mining is data-driven and necessitates significant data to analyze the pattern and train the model. Assume the data is incorrect and was not collected from reliable sources, causing the analysis to be skewed. We introduce a procedure in which the dataset is split into test and training datasets with a specific ratio to overcome this challenge. Process mining will find the traces of actions to streamline the process and aid data mining in producing a more efficient result. The most responsible domain is the healthcare industry. In this study, we used the activity data from the hospital and applied process mining algorithms such as alpha miner and fuzzy miner. Process mining is used to check for conformity in the event log and do performance analysis, and a pattern of accuracy is exhibited. Finally, we used process mining techniques to show the deviation flow and fix the process flow. This study showed that there was a variation in the flow by employing alpha and fuzzy miners in the hospital.
[1] G. Li and R. M. De Carvalho, “Process Mining in Social Media: Applying Object-Centric Behavioral Constraint Models,” IEEE Access, 2019, vol. 7, pp. 84360–84373, doi: 10.1109/ACCESS.2019.2925105.
[2] “Root Cause,” 2021. [Online]. Available: https://appian.com/process-mining/root-cause-analysis.html#:~:text=The root cause analysis aims,impact factors such as bottlenecks.
[3] J. Xu and J. Liu, “A Profile Clustering Based Event Logs Repairing Approach for Process Mining,” IEEE Access, 2019, vol. 7, pp. 17872–17881, doi: 10.1109/ACCESS.2019.2894905.
[4] G. Akhila, N. Madhubhavana, N. V. Ramareddy, M. Hurshitha, and N. Ravinder, “A survey on health prediction using human activity patterns through smart devices,” Int. J. Eng. Technol., 2018, doi: 10.14419/ijet.v7i1.1.9472.
[5] W. Li, Y. Fan, W. Liu, M. Xin, H. Wang, and Q. Jin, “A Self-Adaptive Process Mining Algorithm Based on Information Entropy to Deal with Uncertain Data,” IEEE Access, 2019, vol. 7, pp. 131681–131691, doi: 10.1109/ACCESS.2019.2939565.
[6] Q. Zeng, H. Duan, and C. Liu, “Top-Down Process Mining from Multi-Source Running Logs Based on Refinement of Petri Nets,” IEEE Access, 2020, vol. 8, pp. 61355–61369, doi: 10.1109/ACCESS.2020.2984057.
[7] Z. Huang et al., “Safety Assessment of Emergency Training for Industrial Accident Scenarios Based on Analytic Hierarchy Process and Gray-Fuzzy Comprehensive Assessment,” IEEE Access, 2020, vol. 8, pp. 144767–144777, doi: 10.1109/ACCESS.2020.3013671.
[8] W. Van der Aalst, Process mining: Data science in action. 2016.
[9] R. Tripathy et al., “Spectral Clustering Based Fuzzy C-Means Algorithm for Prediction of Membrane Cholesterol from ATP-Binding Cassette Transporters,” in Intelligent and Cloud Computing, Springer, 2021, pp. 439–448.
[10] C. Subbalakshmi, G. Ramakrishna, and S. Krishna Mohan Rao, “Evaluation of data mining strategies using fuzzy clustering in dynamic environment,” 2016, doi: 10.1007/978-81-322-2529-4_55.
[11] M. Anila and G. Pradeepini, “Study of prediction algorithms for selecting appropriate classifier in machine learning,” J. Adv. Res. Dyn. Control Syst., 2017.
[12] G. Dorgo, K. Varga, and J. Abonyi, “Hierarchical frequent sequence mining algorithm for the analysis of alarm cascades in chemical processes,” IEEE Access, 2018, vol. 6, pp. 50197–50216, doi: 10.1109/ACCESS.2018.2868415.
[13] J. Jin, W. Sun, F. Al-Turjman, M. B. Khan, and X. Yang, “Activity pattern mining for healthcare,” IEEE Access, 2020, doi: 10.1109/ACCESS.2020.2981670.
[14] T. G. Erdogan and A. Tarhan, “Systematic Mapping of Process Mining Studies in Healthcare,” IEEE Access, 2018, doi: 10.1109/ACCESS.2018.2831244.
[15] W. Li, H. Zhu, W. Liu, D. Chen, J. Jiang, and Q. Jin, “An anti-noise process mining algorithm based on minimum spanning tree clustering,” IEEE Access, 2018, vol. 6, pp. 48756–48764, doi: 10.1109/ACCESS.2018.2865540.
[16] P. I. C. Kumari, P. Gayathri, N. Rajesh, S. Umar, G. C. Sekhar, and A. M. Abdul, “Designing of medical processor unit for intelligent network-based medical usage,” Indones. J. Electr. Eng. Comput. Sci., 2016, doi: 10.11591/ijeecs.v4.i3.pp532-537.
[17] M. J. Hasan, A. Rai, Z. Ahmad, and J. M. Kim, “A Fault Diagnosis Framework for Centrifugal Pumps by Scalogram-Based Imaging and Deep Learning,” IEEE Access, 2021, vol. 9, pp. 58052–58066, doi: 10.1109/ACCESS.2021.3072854.
[18] M. J. Hasan, D. Shon, K. Im, H. K. Choi, D. S. Yoo, and J. M. Kim, “Sleep state classification using power spectral density and residual neural network with multichannel EEG signals,” Appl. Sci., 2020, vol. 10, no. 21, pp. 1–13, doi: 10.3390/app10217639.
[19] M. J. Hasan, J. Uddin, and S. N. Pinku, “A novel modified SFTA approach for feature extraction,” 2016 3rd Int. Conf. Electr. Eng. Inf. Commun. Technol. iCEEiCT 2016, 2017, pp. 1–5, doi: 10.1109/CEEICT.2016.7873115.
[20] M. S. Sundari and R. K. Nayak, “Process mining in healthcare systems: A critical review and its future,” Int. J. Emerg. Trends Eng. Res., 2020, vol. 8, no. 9, pp. 5197–5208, doi: 10.30534/ijeter/2020/50892020.
[21] V. S. Reddy and B. T. Rao, “A combined clustering and geometric data perturbation approach for enriching privacy preservation of healthcare data in hybrid clouds,” Int. J. Intell. Eng. Syst., 2018, doi: 10.22266/ijies2018.0228.21.
[22] K. M. Hanga, Y. Kovalchuk, and M. M. Gaber, “A graph-based approach to interpreting recurrent neural networks in process mining,” IEEE Access, 2020, vol. 8, pp. 172923–172938, doi: 10.1109/ACCESS.2020.3025999.
[23] A. E. Marquez-Chamorro, K. Revoredo, M. Resinas, A. Del-Rio-Ortega, F. M. Santoro, and A. Ruiz-Cortes, “Context-Aware Process Performance Indicator Prediction,” IEEE Access, 2020, vol. 8, pp. 222050–222063, doi: 10.1109/ACCESS.2020.3044670.
[24] R. Tripathy, R. K. Nayak, P. Das, and D. Mishra, “Cellular cholesterol prediction of mammalian ATP-binding cassette (ABC) proteins based on fuzzy c-means with support vector machine algorithms,” J. Intell. Fuzzy Syst., 2020, vol. 39, no. 2, doi: 10.3233/JIFS-179934.
[25] A. Massmann, P. Gentine, and J. Runge, “Causal inference for process understanding in Earth sciences,” 2021, pp. 1–24, [Online]. Available: http://arxiv.org/abs/2105.00912.
[26] A. K. A. De Medeiros, A. J. M. M. Weijters, and W. M. P. Van Der Aalst, “Genetic process mining: An experimental evaluation,” Data Min. Knowl. Discov., 2007, doi: 10.1007/s10618-006-0061-7.
[27] E. Kim et al., “Discovery of outpatient care process of a tertiary university hospital using process mining,” Healthc. Inform. Res., 2013, vol. 19, no. 1, pp. 42–49, doi: 10.4258/hir.2013.19.1.42.
[28] P. Nets, A. Networks, and R. C. Language, “Modeling of Resource Allocation Mechanisms in Distributed Computing Systems using Petri Nets and Stochastic Activity Networks (SAN): a Review and Reo-based Suggestion.”
[29] R. K. Nayak. Sundari, M. Shanmuga, Efficient Tracing and Detection of Activity Deviation in Event Log Using ProM in Health Care Industry, 2021, 5th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud (ISMAC 2021).
[30] S. C. Sekaran, V. Saravanan, R. RudraKalyanNayak, and S. S. Shankar, “Human Health and Velocity Aware Network Selection Scheme for WLAN/WiMAX Integrated Networks with QoS,” Int. J. Innov. Technol. Explor. Eng. (IJITEE), ISSN, pp. 2278–3075.
[31] https://data.4tu.nl/articles/dataset/BPI_Challenge_2012/12689204/1.
[32] P. Selvaraj, V. K. Burugari, D. Sumathi, R. K. Nayak, and R. Tripathy, “Ontology based Recommendation System for Domain Specific Seekers,” Proc. 3rd Int. Conf. I-SMAC IoT Soc. Mobile, Anal. Cloud, I-SMAC 2019, no. December, 2019, pp. 341–345, doi: 10.1109/I-SMAC47947.2019.9032634.