242 research outputs found
Revisiting the Alpha Algorithm To Enable Real-Life Process Discovery Applications -- Extended Report
The Alpha algorithm was the first process discovery algorithm that was able
to discover process models with concurrency based on incomplete event data
while still providing formal guarantees. However, as was stated in the original
paper, practical applicability is limited when dealing with exceptional
behavior and processes that cannot be described as a structured workflow net
without short loops. This paper presents the Alpha+++ algorithm that overcomes
many of these limitations, making the algorithm competitive with more recent
process mining approaches. The different steps provide insights into the
practical challenges of learning process models with concurrency, choices,
sequences, loops, and skipping from event data. The approach was implemented in
ProM and tested on various publicly available, real-life event logs.Comment: 52 pages, 95 figure
Применение программного продукта Eclipse для оптимизации разработки нефтяных месторождений Западно-Сибирского региона
Применение программного продукта Eclipse для оптимизации разработки нефтяных месторождений Западно-Сибирского регионаApplication software Eclipse to optimize the development of oil fields of West Siberi
Recommended from our members
Investigation of emitter homogeneity on laser doped emitters
The selective emitter formation by laser doping is a well known process to increase the efficiency of silicon solar cells [1], [2]. For the characterization of laser doped emitters, SIMS (Secondary Ion Mass Spectroscopy) and ECV (Electrochemical Capacitance Voltage Measurement) techniques are used to analyze the emitter profile [3]. It is very difficult to get acceptable result by SIMS on a textured surface, so only ECV can be used. It has been shown, that a charge carrier depth profile can be measured on a homogeneous emitter only by ECV. The use of laser doping results in a non-homogeneous emitter. We have shown that the emitter depth is not just a function of the pulse power, but in addition of the surface structure of the wafer. The texture seems responsible for a strong variability in the doping profile. It has been shown, that the ECV measurement is not applicable to characterize the emitter depth on laser doped areas, because of the microscopic inhomogeneities in the emitter on the macroscopic measurement area. The real emitter profiles are to complex to be characterized by SIMS or ECV. We have shown that the variation in the emitter profile is resulting from the texture in the laser-doped regions
Investigation of emitter homogeneity on laser doped emitters
The selective emitter formation by laser doping is a well known process to increase the efficiency of silicon solar cells [1], [2]. For the characterization of laser doped emitters, SIMS (Secondary Ion Mass Spectroscopy) and ECV (Electrochemical Capacitance Voltage Measurement) techniques are used to analyze the emitter profile [3]. It is very difficult to get acceptable result by SIMS on a textured surface, so only ECV can be used. It has been shown, that a charge carrier depth profile can be measured on a homogeneous emitter only by ECV. The use of laser doping results in a non-homogeneous emitter. We have shown that the emitter depth is not just a function of the pulse power, but in addition of the surface structure of the wafer. The texture seems responsible for a strong variability in the doping profile. It has been shown, that the ECV measurement is not applicable to characterize the emitter depth on laser doped areas, because of the microscopic inhomogeneities in the emitter on the macroscopic measurement area. The real emitter profiles are to complex to be characterized by SIMS or ECV. We have shown that the variation in the emitter profile is resulting from the texture in the laser-doped regions
Preoperative CA125 Significantly Improves Risk Stratification in High-Grade Endometrial Cancer
Advanced stage; Endometrial cancer; OutcomeEtapa avançada; Càncer d'endometri; ResultatEtapa avanzada; Cáncer de endometrio; ResultadoPatients with high-grade endometrial carcinoma (EC) have an increased risk of tumor spread and lymph node metastasis (LNM). Preoperative imaging and CA125 can be used in work-up. As data on cancer antigen 125 (CA125) in high-grade EC are limited, we aimed to study primarily the predictive value of CA125, and secondarily the contributive value of computed tomography (CT) for advanced stage and LNM. Patients with high-grade EC (n = 333) and available preoperative CA125 were included retrospectively. The association of CA125 and CT findings with LNM was analyzed by logistic regression. Elevated CA125 ((>35 U/mL), (35.2% (68/193)) was significantly associated with stage III-IV disease (60.3% (41/68)) compared with normal CA125 (20.8% (26/125), [p < 0.001]), and with reduced disease-specific—(DSS) (p < 0.001) and overall survival (OS) (p < 0.001). The overall accuracy of predicting LNM by CT resulted in an area under the curve (AUC) of 0.623 (p < 0.001) independent of CA125. Stratification by CA125 resulted in an AUC of 0.484 (normal), and 0.660 (elevated). In multivariate analysis elevated CA125, non-endometrioid histology, pathological deep myometrial invasion ≥50%, and cervical involvement were significant predictors of LNM, whereas suspected LNM on CT was not. This shows that elevated CA125 is a relevant independent predictor of advanced stage and outcome specifically in high-grade EC
Public Evidence from Secret Ballots
Elections seem simple---aren't they just counting? But they have a unique,
challenging combination of security and privacy requirements. The stakes are
high; the context is adversarial; the electorate needs to be convinced that the
results are correct; and the secrecy of the ballot must be ensured. And they
have practical constraints: time is of the essence, and voting systems need to
be affordable and maintainable, and usable by voters, election officials, and
pollworkers. It is thus not surprising that voting is a rich research area
spanning theory, applied cryptography, practical systems analysis, usable
security, and statistics. Election integrity involves two key concepts:
convincing evidence that outcomes are correct and privacy, which amounts to
convincing assurance that there is no evidence about how any given person
voted. These are obviously in tension. We examine how current systems walk this
tightrope.Comment: To appear in E-Vote-Id '1
- …