博碩士論文 964201058 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:24 、訪客IP:18.190.239.122
姓名 張原誠(Yuan-cheng Chang)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 以活動為基礎挖掘特例工作時程之研究
(Activity-based Algorithm for Mining Temporal Outlier)
相關論文
★ 在社群網站上作互動推薦及研究使用者行為對其效果之影響★ 以AHP法探討伺服器品牌大廠的供應商遴選指標的權重決定分析
★ 以AHP法探討智慧型手機產業營運中心區位選擇考量關鍵因素之研究★ 太陽能光電產業經營績效評估-應用資料包絡分析法
★ 建構國家太陽能電池產業競爭力比較模式之研究★ 以序列採礦方法探討景氣指標與進出口值的關聯
★ ERP專案成員組合對績效影響之研究★ 推薦期刊文章至適合學科類別之研究
★ 品牌故事分析與比較-以古早味美食產業為例★ 以方法目的鏈比較Starbucks與Cama吸引消費者購買因素
★ 探討創意店家創業價值之研究- 以赤峰街、民生社區為例★ 以領先指標預測企業長短期借款變化之研究
★ 應用層級分析法遴選電競筆記型電腦鍵盤供應商之關鍵因子探討★ 以互惠及利他行為探討信任關係對知識分享之影響
★ 結合人格特質與海報主色以類神經網路推薦電影之研究★ 資料視覺化圖表與議題之關聯
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 工作流程在時程上的管理上是一個很重要的議題,工作時程中異常的延遲時間將導致企業營運不彰,使得企業無法發揮最大的績效。因此本研究提出挖掘特例工作時程的演算法,根據過去工作時程記錄找出工作流程上異常延遲時間的活動,作為日後調整工作流程的參考依據。在管理上的意涵能輔助企業主管或顧問找出企業流程當中各個活動延遲的可能,透過改善以利日後有效控制特例的情況,另一方面則是可以方便管理者找出工作流程中時間異常的癥結點。
本研究中以活動為基礎,提出目前工作流程延遲時間最完整的可量化測量種類探討,而在演算法的設計部分則使用三維陣列存放方式,讓延遲時間計算上更有效率,並透過真實的資料所得到的實驗結果,提供管理者改善的方向。
摘要(英) The concept of workflow is an critical issue in time management. Irrational delay time not only causes a firm’s inefficient operations but also hinder a firm’s ability to optimize performance. This research provides an algorithm which based on workflow’s abnormal delay time. By finding out company’s workflow outlier and take it as a reference for adjusting the whole workflow, the algorithm presented in this research helps managers and consultants recognize all possible delay types of workflow’s activities as well as figure out the crucial activity of irregular instances of workflow easily. Building on the activity-based method, we explore possible types of workflow delay time and further propose complete uantifiable measurements. Three-dimension data store on struct is applied in the algorithm to compute time delay effectively. Besides, empirical data are drawn to validate our model as to provide practitioners additional instructions to improve operational performance.
關鍵字(中) ★ 異常偵測
★ 工作流程
★ 延遲時間
關鍵字(英) ★ Outlier detection
★ Delay time
★ Workflow mining
論文目次 中文摘要i
英文摘要ii
目錄iii
圖目錄v
表目錄vi
第一章 緒論1
1-1 研究動機1
1-2 研究目的5
第二章 文獻探討7
2-1 工作流程樣本挖掘(Workflow frequency pattern Mining)和圖
形挖掘(Graph Mining)7
2-2 異常偵測(Outlier Detection)11
第三章 模型描述19
3-1 工作流程19
3-2 延遲種類24
第四章 演算法28
4-1 資料結構28
4-2 活動特例延遲時間挖掘演算法29
4-2-1 執行時間異常29
4-2-2 傳遞時間異常31
4-2-3 積壓(或閒置)時間異常33
4-2-4 拖延時間異常35
第五章 實證分析39
5-1 實驗設計39
5-2 實驗結果與分析42
第六章 結論與未來展望69
6-1 結論 69
6-2 未來研究建議70
參考文獻72
參考文獻 [1] Hollingsworth D., "Workflow Management Coalition: the Workflow Reference Model", TC00-1003, 1995.
[2] Jorge Cardoso, Amit P. Sheth, and John Miller, "Workflow Quality of Service", presented at the Proceedings of the IFIP TC5/WG5.12 International Conference on Enterprise Integration and Modeling Technique: Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, 2003
[3] James G. Kobielus, Workflow Strategies. (IDG Books Worldwide, Inc., 1997).
[4] Zhiping Walter Jeffrey L. Rummel, Rajiv Dewan and Abraham Seidmann, "Activity consolidation to improve responsiveness", European Journal of Operational Research, Vol 161 (3), pp. 683-703, 2005.
[5] Anthony J. Bonner, "Workflow, transactions and datalog", presented at the Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 1999
[6] Hasan Davulcu, Michael Kifer, C. R. Ramakrishnan, and I. V. Ramakrishnan, "Logic based modeling and analysis of workflows", presented at the Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, 1998
[7] Dirk Wodtke and Gerhard Weikum, "A Formal Foundation for Distributed Workflow Execution Based on State Charts", presented at 73 the Proceedings of the 6th International Conference on Database Theory, 1997
[8] Dirk Wodtke, Jeanine Wei, enfels, Gerhard Weikum, and Angelika Kotz Dittrich, "The Mentor Project: Steps Toward Enterprise-Wide Workflow Management", presented at the Proceedings of the Twelfth International Conference on Data Engineering, 1996
[9] Munindar P Singh, "Semantical considerations on workflows: An algebra for intertask dependencies", In Proc. of the Workshop on Database Programming Languages, pp. 6-8, 1995.
[10] W.M.P. van der Aalst, "The application of petri nets to worflow management", Circuits, Systems, and Computers, Vol 8, pp. 21–66, 1998.
[11] Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, and Domenico Saccà, "Mining unconnected patterns in workflows", Information Systems Vol 32 (5), pp. 685-712, 2007.
[12] R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules", presented at the Conference on Very Large Databases, 1994
[13] Jiawei Han, Jian Pei, Yiwen Yin, and Runying Mao, "Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach", Data Min. Knowl. Discov., Vol 8 (1), pp. 53-87, 2004.
[14] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal, and M. Hsu, "Prefixspan: Mining sequential patterns by prefix-projected growth", presented at the IEEE International Conference on Data Mining, 2001
[15] J. Han J. Pei, H. Lu, S. Nishio, S. Tang, and D. Yang, "H-Mine: 74 Hyper-structure mining of frequent patterns", presented at the IEEE International Conference on Data Mining, 2001 [16] T. Washi A. Inokuchi, and H. Motoda, "An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data", 4th European on Principles of Data Mining and Knowledge Discovery, pp. 13–23, 2000.
[17] Luc Dehaspe and Hannu Toivonen, "Discovery of frequent DATALOG patterns", Data Min. Knowl. Discov., Vol 3 (1), pp. 7-36, 1999.
[18] Akihiro and Washio Inokuchi, Takashi and Motoda, Hiroshi "An a priori-based algorithm for mining frequent substructures from graph data ", presented at the 4th European Conference on Principles and Practice of Knowledge Discovery in Databases, 2000
[19] Akihiro Inokuchi, Takashi Washio, and Hiroshi Motoda, "Complete Mining of Frequent Patterns from Graphs: Mining Graph Data", Mach. Learn., Vol 50 (3), pp. 321-354, 2003.
[20] Michihiro Kuramochi and George Karypis, "Frequent Subgraph Discovery", presented at the Proceedings of the 2001 IEEE International Conference on Data Mining, 2001
[21] Xifeng Yan and Jiawei Han, "gSpan: Graph-Based Substructure Pattern Mining", presented at the Proceedings of the 2002 IEEE International Conference on Data Mining, 2002
[22] J. Huan, W. Wang, and J. Prins, "Efficient mining of frequent subgraph in the presence of isomorphism", presented at the IEEE International Conference on Data Mining, 2003
[23] Xifeng Yan and Jiawei Han, "CloseGraph: mining closed frequent 75 graph patterns", presented at the Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 2003
[24] Siegfried Nijssen and Joost N. Kok, "A quickstart in frequent structure mining can make a difference", presented at the Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, 2004
[25] D. Cook L. Holder, and S. Djoko, "Substructure discovery in the SUBDUE system", In Proc. of the Workshop on Knowledge Discovery in Databases, pp. 169–180, 1994.
[26] C.-W. K. Chen and D. Y. Y. Yun, "Unifying graph matching problem with a practical solution", presented at the In Proceedings of International Conference on Systems, Signals, Control, Computers, 1998
[27] K. Yoshida and H. Motoda, "CLIP: Concept learning from inference patterns", Artificial Intelligence, pp. 63 92, 1995.
[28] H. K¨alvi¨ainen and E. Oja, "Comparisons of attributed graph matching algorithms for computer vision", In Proc. of STEP-90, Finnish Artificial Intelligence Symposium, pp. 354–368, 1990.
[29] D. A. L. Piriyakumar and P. Levi, "An efficient A* based algorithm for optimal graph matching applied to computer vision", In GRWSIA-98, 1998.
[30]V. A. Cicirello, "Intelligent retrieval of solid models", Master’s thesis, Drexel University, Philadelphia,PA, 1999.
[31] D. Dupplaw and P. H. Lewis, "Content-based image retrieval with scale-spaced object trees", presented at the Proc. of SPIE: Storage 76 and Retrieval for Media Databases, 2000
[32] H. Toivonen L. Dehaspe, and R. D. King, "Finding frequent substructures in chemical compounds", presente at the Proc. of the 4th International Conference on Knowledge Discovery and Data Mining, 1998
[33] A. Srinivasan, R. D. King, S. H. Muggleton, and M. Sternberg, "The predictive toxicology evaluation challenge", presented at the In Proc. of the 15th International Joint Conference on Artificial Intelligence (IJCAI), 1997
[34] Hawkins, Identification of outliers. (London:Chapman & Hall, 1980).
[35] Zengyou He, Xiaofei Xu, Joshua Zhexue Huang, and Shengchun Deng, "Mining class outliers: concepts, algorithms and applications in CRM", Expert Syst Appl, Vol 27 (4), pp. 681-697, 2004.
[36] Maneesh K. Singh and Narendra Ahuja, "Mean-Shift Segmentation with Wavelet-based Bandwidth Selection", presented at the Proceedings of the Sixth IEEE Workshop on Applications of Computer Vision, 2002
[37] R. J. Beckman and R. D. Cook, "Outlier.s", Technometrics, Vol 25, pp. 119-163, 1983.
[38] J. F. Gentleman and M. B. Wilk, "Detecting Outliers in a Two-Way Table: I. Statistical Behavior of Residuals", Technometrics, Vol 17, pp. 1-14, 1975.
[39] Mervyn G. Marasinghe, "A Multistage Procedure for Detecting Several Outliers in Linear Regression", Technometrics, Vol 27, pp. 395-399, 1985. 77
[40] Bernard Rosner, "Percentage Points for a Generalized ESD Many-Outlier Procedure", Technometrics, Vol 25, pp. 165-172 1983.
[41] S. R. Paul and Karen Y. Fung, "A Generalized Extreme Studentized Residual Multiple-Outlier-Detection Procedure in Linear Regression", Technometrics, Vol 33, pp. 339-348, 1991.
[42] Kenji Yamanishi, Jun-Ichi Takeuchi, Graham Williams, and Peter Milne, "On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms", Data Min. Knowl. Discov., Vol 8 (3), pp. 275-300, 2004.
[43] Kenji Yamanishi and Jun-ichi Takeuchi, "Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner", presented at the Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, 2001
[44] Kenji Yamanishi and Jun-ichi Takeuchi, "A unifying framework for detecting outliers and change points from non-stationary time series data", presented at the Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, 2002
[45] Tukey J W, Exploratory Data Analysis. (1994).
[46]Franco P. Preparata and Michael I. Shamos, Computational geometry: an introduction. (Springer-Verlag New York, Inc., 1985).
[47] Struyf A and Rousseeuw P J, "High-dimensional computation of the deepest location", Computational Statistics & Data Analysis, Vol 34 (4), pp. 415-426, 2000.
[48] Ida Ruts and Peter J. Rousseeuw, "Computing depth contours of 78 bivariate point clouds", Comput. Stat. Data Anal., Vol 23 (1), pp. 153-168, 1996.
[49] Arning A, Agrawal R, and Raghavan P, "A Linear Method for DeviationDetection in Large Database", presented at the DataMining and Knowledge( Special Issue on High Performance Data Mining) 1996
[50] Sunita Sarawagi, Rakesh Agrawal, and Nimrod Megiddo, "Discovery-Driven Exploration of OLAP Data Cubes", presented at the Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology, 1998
[51] H. V. Jagadish, Nick Koudas, and S. Muthukrishnan, "Mining Deviants in a Time Series Database", presented at the Proceedings of the 25th International Conference on Very Large Data Bases, 1999[52] Edwin M. Knorr and Raymond T. Ng, " A Unified Notion of Outliers: Properties and Computation ", presented at the In Proc. of the International Conference on Knowledge Discovery and Data Mining, 1997
[53] E. Knorr, & Ng, R., "Finding intentional knowledge of distance-based outliers", VLDB99, pp. 211–222, 1999.
[54] Sridhar Ramaswamy, Rajeev Rastogi, and Kyuseok Shim, "Efficient algorithms for mining outliers from large data sets", presented at the Proceedings of the 2000 ACM SIGMOD international conference on Management of data, 2000
[55] Fabrizio Angiulli and Clara Pizzuti, "Fast Outlier Detection in High Dimensional Spaces", presented at the Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge 79 Discovery, 2002
[56] Micheline Kamber Jiawei Han, Data mining: concepts and techniques. (Morgan Kaufmann, 2006).
[57] Stephen D. Bay and Mark Schwabacher, "Mining distance based outliers in near linear time with randomization and a simple pruning rule", presented at the Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 2003
[58] Norio Katayama and Shin'ichi Satoh, "The SR-tree: an index structure for high-dimensional nearest neighbor queries", presented at the Proceedings of the 1997 ACM SIGMOD international conference on Management of data, 1997
[59] Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, and Prabhakar Raghavan, "Automatic subspace clustering of high dimensional data for data mining applications", presented at the Proceedings of the 1998 ACM SIGMOD international conference on Management of data, 1998
[60] Charu C. Aggarwal and Philip S. Yu, "Finding generalized projected clusters in high dimensional spaces", presented at the Proceedings of the 2000 ACM SIGMOD international conference on Management of data, 2000
[61] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and Jorg Sander, "OPTICS-OF: Identifying Local Outliers", 1999
[62] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, J, and rg Sander, "LOF: identifying density-based local outliers", SIGMOD Rec., Vol 29 (2), pp. 93-104, 2000. 80
[63] Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, and David Wai-Lok Cheung, "Enhancing Effectiveness of Outlier Detections for Low Density Patterns", presented at the Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, 2002
[64] A.L.M. Chiu and Ada Wai-chee Fu, "Enhancements on local outlier detection", IDEAS03, pp. 298- 307, 2003.
[65] Ravindra N. Chittimoori, Lawrence B. Holder, and Diane J. Cook, "Applying the Subdue Substructure Discovery System to the Chemical Toxicity Domain", presented at the Proceedings of the Twelfth International Florida Artificial Intelligence Research Society Conference, 1999
指導教授 許秉瑜(Ping-yu Hsu) 審核日期 2009-6-17
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明