Path: Top -> Journal -> Telkomnika -> 2021 -> Vol 19, No 3, June

Mapping log data activity using heuristic miner algorithm in manufacture and logistics company

Journal from gdlhub / 2021-09-04 16:52:25
Oleh : Syafrial Fachri Pane, Rolly Maulana Awan, M. Amran Hakim Siregar, Dinda Majesty, Telkomnika
Dibuat : 2021-09-04, dengan 0 file

Keyword : heuristic miner, log data, logistics, manufacturing, Python, XML
Url : http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/18153
Sumber pengambilan dokumen : Web

Strategies for the procurement of goods and services are essential for companies in Indonesia's manufacturing and logistics sectors. The solution to reducing the existing problem is to make a mapping plan, such as verifying documents from each department, so that it takes a long time, resulting in many issues, such as procedural misuse findings. Heuristics miner algorithms get data to form logs that consist of goods and services procurement activities. Processing log data into XML data (data extraction), which produces a dependency model and business and casual matrix (discovery process), then determines the value of fitness and precision (suitability) called the conformity checking phase process. This phase aims to produce a new business (process enhancement phase), which will create a solution to the risk of delay and procedural abuse. The results of each of these processes rank each stage of the procurement of goods and services sequentially and together to provide time-efficient and accurate decisions, resulting in project implementation comparable to the company's business strategy. Implement the heuristics miner algorithm using the Python programming language.

Deskripsi Alternatif :

Strategies for the procurement of goods and services are essential for companies in Indonesia's manufacturing and logistics sectors. The solution to reducing the existing problem is to make a mapping plan, such as verifying documents from each department, so that it takes a long time, resulting in many issues, such as procedural misuse findings. Heuristics miner algorithms get data to form logs that consist of goods and services procurement activities. Processing log data into XML data (data extraction), which produces a dependency model and business and casual matrix (discovery process), then determines the value of fitness and precision (suitability) called the conformity checking phase process. This phase aims to produce a new business (process enhancement phase), which will create a solution to the risk of delay and procedural abuse. The results of each of these processes rank each stage of the procurement of goods and services sequentially and together to provide time-efficient and accurate decisions, resulting in project implementation comparable to the company's business strategy. Implement the heuristics miner algorithm using the Python programming language.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiTelkomnika
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • Editor: Calvin