Figures & data
Table 1. An example of event logs.
Table 2. The comparisons of different process variants discovery methods.
Figure 1. A reference model and its process variant. (a) The mined reference model for log
using inductive mining method (b) A process variant model
from
by personalised operations.
![Figure 1. A reference model and its process variant. (a) The mined reference model M1 for log L1 using inductive mining method (b) A process variant model M2 from M1 by personalised operations.](/cms/asset/5dc621e4-5d06-4b13-8b33-511e982baaf7/ccos_a_2194578_f0001_ob.jpg)
Figure 3. Two clusters deduced from log L through tracing clustering method (Xu & Liu, Citation2019). (a) The first cluster model through tracing clustering method (b) The second cluster model through tracing clustering method.
![Figure 3. Two clusters deduced from log L through tracing clustering method (Xu & Liu, Citation2019). (a) The first cluster model through tracing clustering method (b) The second cluster model through tracing clustering method.](/cms/asset/b1649d67-e6a1-4e04-9ff5-a6f673608556/ccos_a_2194578_f0003_ob.jpg)
Table 3. Experimental results comparison among different methods for log .
Table 4. An example of event log L to illustrate context log.
Table 5. Event logs of credit disposal processes.
Table 6. Frequency of activities.
Table 7. kth-strict order relationships of nodes b and h.
Table 8. Activity alphabet with node b of length k.
Table 9. Activity alphabet with node h length k.
Table 10. Context logs for nodes b and h.
Table 11. Weighted frequency cosine similarity calculation results.
Figure 6. Process variants (a), (b), (c), (d) found in the event log. (a) Housing loan process (b) Student loan process (c) Commercial loan process (d) Small loan process.
![Figure 6. Process variants (a), (b), (c), (d) found in the event log. (a) Housing loan process (b) Student loan process (c) Commercial loan process (d) Small loan process.](/cms/asset/b43c5e45-6d4f-4d28-92ce-dc7c588d4c9e/ccos_a_2194578_f0006_ob.jpg)
Table 12. Comparison of process variants discovery methods.
Table 13. Holistic information of datasets.
Table 14. Performance indicators comparisons with (Chan et al., Citation2014).
Table 15. Performance indicators comparisons with (Xu & Liu, Citation2019).
Figure 7. Fitness and precision comparisons based on daset1 and dataset2. (a) Performance comparisons with (Chan et al., Citation2014) (b) Performance comparisons with (Xu & Liu, Citation2019).
![Figure 7. Fitness and precision comparisons based on daset1 and dataset2. (a) Performance comparisons with (Chan et al., Citation2014) (b) Performance comparisons with (Xu & Liu, Citation2019).](/cms/asset/090d3e72-43c6-418c-b85d-2a80855db9f8/ccos_a_2194578_f0007_oc.jpg)
Table 16. Comparisons among different methods for log .
Table 17. Comparisons among different methods for BPIC 2015 log.
Figure 8. Fitness and precision comparisons for event logs with different variant distributions. (a) fitness of (b) precision of
(c) fitness of BPIC2015 (d) precision of BPIC2015.
![Figure 8. Fitness and precision comparisons for event logs with different variant distributions. (a) fitness of L′ (b) precision of L′ (c) fitness of BPIC2015 (d) precision of BPIC2015.](/cms/asset/d994b76a-724a-4bb4-bcd9-b4b61c8fcad6/ccos_a_2194578_f0008_oc.jpg)