摘要:
First metadata associated with a first e-learning course are read, the first metadata are compared with metadata associated with a desired e-learning course, a dissimilarity between the first course and a desired e-learning course is determined based on a comparison of the first metadata with metadata associated with the desired course, and a cost of transforming the first course into the desired course is determined.
摘要:
Various embodiments of systems and methods for process model extraction and weak-spot analysis from plain event logs are described herein. In an aspect, the method involves obtaining an event log that includes events grouped by process instances. Based on analyzing the event log a process graph is generated. In another aspect, one or more visual representations of the generated process graph, indicating the weak-spots, are generated. At least one of the one or more visual representations of the process model is rendered in response to receiving a selection of the at least one visual representation. In yet another aspect, the weak-spots are transformed into a data structure and provided as input to a rule mining algorithm for generating a set of rules defining the weak-spots. The set of rules received from the rule mining algorithm are rendered on a graphical user interface (GUI).