SlideShare a Scribd company logo
1 of 207
Introduction to Business
Process Monitoring and
Process Mining
Marlon Dumas
University of Tartu, Estonia
marlon.dumas@ut.ee
3 months later
2
1. Any process is better than no process
2. A good process is better than a bad process
3. Even a good process can be improved
4. Any good process eventually becomes a bad process
ā€¢ [ā€¦unless continuously cared for]
ā€¢ Michael Hammer
Back to basicsā€¦
3
4
Part 1: Techniques for
Business Process
Monitoring
5
Business Process Monitoring
Dashboards & reports
Process miningEvent
stream
DB logs
Event
log
Process
Dashboards
Operational
dashboards
(runtime)
Tactical
dashboards
(historical)
Strategic
dashboards
(historical)
Types of process dashboards
Operational process dashboards
ā€¢ Aimed at process workers & operational managers
ā€¢ Emphasis on monitoring (detect-and-respond), e.g.:
- Work-in-progress
- Problematic cases ā€“ e.g. overdue/at-risk cases
- Resource load
ā€¢ Aimed at process owners / managers
ā€¢ Emphasis on analysis and management
ā€¢ E.g. detecting bottlenecks
ā€¢ Typical process performance indicators
ā€¢ Cycle times
ā€¢ Error rates
ā€¢ Resource utilization
Tactical dashboards
Tactical Performance Dashboard
@ Australian Insurer
ā€¢ Aimed at executives & managers
ā€¢ Emphasis on linking process performance to strategic
objectives
Strategic dashboards
Manage
Unplanned
Outages
Manage
Emergencies &
Disasters
Manage Work
Programming &
Resourcing
Manage
Procurement
Customer
Satisfaction
0.5 0.55 - 0.2
Customer
Complaint
0.6 - - 0.5
Customer
Feedback
0.4 - - 0.8
Connection Less
Than Agreed Time
0.3 0.6 0.7 -
Key Performance
Process
Strategic Performance Dashboard
@ Australian Utilities Provider
Process: Manage Emergencies & Disasters
Process: Manage Procurement
Process: Manage Unplanned Outages
Overall Process Performance
Financial People
Customer
Excellence
Operational
Excellence
Risk
Management
Health
& Safety
Customer
Satisfaction
Customer
Complaint
Customer
Rating (%)
Customer
Loyalty Index
Average Time
Spent on Plan
1st Layer
Key Result
Area
2nd Layer
Key Performance
Satisfied
Customer Index
Market
Share (%)
3rd & 4th Layer
Process Performance
Measures
0.65
0.6 0.7
0.7 0.6 0.8
0.4 0.8
0.5 0.4 0.5 0.8 0.4
0.54
0.58
0.67
Sketch operational and tactical process monitoring
dashboards for CVS Pharmacyā€™s prescription
fulfillment process.
Consider the viewpoints of each stakeholder in the
process.
Teamwork
Business Process Monitoring
Dashboards & reports
Process miningEvent
stream
DB logs
Event
log
Business Process Monitoring
Dashboards & reports
Process miningEvent
stream
DB logs
Event
log
Process Mining
17
ļƒ¼/ļƒ»
event log
discovered model
Process
Discovery
Conformance
Checking
Variants
Analysis
Difference
diagnostics
Performance
Mining
input model
Enhanced model
event logā€™
Event logs structure: minimum
requirements
Concrete formats:
ā€¢ Comma-Separated Values (CSV)
ā€¢ XES (XML format)
Automated Process Discovery
19
Enter Loan
Application
Retrieve
Applicant
Data
Compute
Installments
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
CID Task Time Stamp ā€¦
13219 Enter Loan Application 2007-11-09 T 11:20:10 -
13219 Retrieve Applicant Data 2007-11-09 T 11:22:15 -
13220 Enter Loan Application 2007-11-09 T 11:22:40 -
13219 Compute Installments 2007-11-09 T 11:22:45 -
13219 Notify Eligibility 2007-11-09 T 11:23:00 -
13219 Approve Simple Application 2007-11-09 T 11:24:30 -
13220 Compute Installements 2007-11-09 T 11:24:35 -
ā€¦ ā€¦ ā€¦ ā€¦
Process Mining Tools
Open-source
ā€¢ Apromore
ā€¢ ProM
ā€¢ bupaR
Lightweight
ā€¢ Disco
Mid-range
ā€¢ Minit
ā€¢ myInvenio
ā€¢ ProcessGold
ā€¢ QPR Process
Analyzer
ā€¢ Signavio Process
Intelligence
ā€¢ StereoLOGIC
Discovery Analyst
Heavyweight
ā€¢ ARIS Process
Performance Manager
ā€¢ Celonis Process Mining
ā€¢ Perceptive Process
Mining (Lexmark)
ā€¢ Interstage Process
Discovery (Fujitsu)
20
Fluxicon Disco
21
Process Maps
ā€¢ A process map of an event log is a graph where:
ā€¢ Each activity is represented by one node
ā€¢ An arc from activity A to activity B means that B is directly
followed by A in at least one trace in the log
ā€¢ Arcs in a process map can be annotated with:
ā€¢ Absolute frequency: how many times B directly follows A?
ā€¢ Relative frequency: in what percentage of times when A is
executed, it is directly followed by B?
ā€¢ Time: What is the average time between the occurrence of A
and the occurrence of B?
22
Process Maps ā€“ Example
23
Event log:
10: a,b,c,g,e,h
10: a,b,c,f,g,h
10: a,b,d,g,e,h
10: a,b,d,e,g,h
10: a,b,e,c,g,h
10: a,b,e,d,g,h
10: a,c,b,e,g,h
10: a,c,b,f,g,h
10: a,d,b,e,g,h
10: a,d,b,f,g,h
Process Maps ā€“ Exercise
Case
ID Task Name Originator Timestamp
Case
ID Task Name Originator Timestamp
1 File Fine Anne 20-07-2004 14:00:00 3 Reminder John 21-08-2004 10:00:00
2 File Fine Anne 20-07-2004 15:00:00 2 Process Payment system 22-08-2004 09:05:00
1 Send Bill system 20-07-2004 15:05:00 2 Close case system 22-08-2004 09:06:00
2 Send Bill system 20-07-2004 15:07:00 4 Reminder John 22-08-2004 15:10:00
3 File Fine Anne 21-07-2004 10:00:00 4 Reminder Mary 22-08-2004 17:10:00
3 Send Bill system 21-07-2004 14:00:00 4 Process Payment system 29-08-2004 14:01:00
4 File Fine Anne 22-07-2004 11:00:00 4 Close Case system 29-08-2004 17:30:00
4 Send Bill system 22-07-2004 11:10:00 3 Reminder John 21-09-2004 10:00:00
1
Process
Payment system 24-07-2004 15:05:00 3 Reminder John 21-10-2004 10:00:00
1 Close Case system 24-07-2004 15:06:00 3 Process Payment system 25-10-2004 14:00:00
2 Reminder Mary 20-08-2004 10:00:00 3 Close Case system 25-10-2004 14:01:00
24
Process Maps in Disco
ā€¢ Disco (and other commercial process mining tools) use
process maps as the main visualization technique for
event logs
ā€¢ These tools also provide three types of operations:
1. Abstract the process map:
ā€¢ Show only most frequent activities
ā€¢ Show only most frequent arcs
2. Filter the traces in the event logā€¦
25
Types of filters
ā€¢ Event filters
ā€¢ Retain only events that fulfil a given condition (e.g. all events
of type ā€œCreate purchase orderā€)
ā€¢ Performance filter
ā€¢ Retain traces that have a duration above or below a given
value
ā€¢ Event pair filter (a.k.a. ā€œfollowerā€ filter)
ā€¢ Retain traces where there is a pair of events that fulfil a given
condition (e.g. ā€œCreate invoiceā€ followed by ā€œCreate purchase
orderā€)
ā€¢ Endpoint filter
ā€¢ Retain traces that start with or finish with an event that fulfils
a given condition
26
Process Maps in Disco
ā€¢ Disco (and other commercial process mining tools) use
process maps as the main visualization technique for
event logs
ā€¢ These tools also provide three types of operations:
1. Abstract the process map:
ā€¢ Show only most frequent activities
ā€¢ Show only most frequent arcs
2. Filter the traces in the event log
3. Enhance the process map
27
Process Map Enhancement
ā€¢ Nodes and arcs in a process map can be color-
coded or thickness-coded to capture:
ā€¢ Frequency: How often a given task or a given directly-
follows relation occurs?
ā€¢ Time performance: processing times, waiting times,
cycles times of tasks
ā€¢ More advanced tools support enhancement by other
attributes, e.g. cost, revenue, etc. if the data is available.
28
Hands-on Disco demo
29
Using Disco, answer the following questions on the
PurchasingExample log:
ā€¢ How many cases had to settle a dispute with the
purchasing agent?
ā€¢ Is there a difference in cycle time for the cases that
had to settle a dispute with the purchasing agent,
compared to the ones that did not? Make sure you
only compare cases that actually reach the endpoint
ā€˜Pay invoiceā€™
ā€¢ Are there any cases where the invoice is released and
authorized by the same resource? And if so, who is
doing this most often?
Exercise
Exercise by Anne Rozinat, Fluxicon
Consider the dataset of a refund process from an electronics manufacturer.
Customer complaints and the inspection of individual cases indicate that this
process suffers from inefficiencies and overly long cycle times. Assume that only
cases that have reached the ā€˜Order completedā€™ event are finished.
Questions:
1. Is it a problem if you take the average cycle time of all cases, also the ones
that have not finished yet?
2. In general, which channel(s) have the biggest problems with missing
documents that need to be requested from the customer?
3. How many customers have received a refund without the product being
received by the electronics manufacturing company? This should not happen
in this process.
4. Has a customer ever received a double payment? This should not happen in
this process.
To complete this exercise use the log of RefundProcess.fbt
One more exercise: Refund process
Process Maps - Limitations
ā€¢ Process maps over-generalize: some paths of a
process map might not exist and might not make
sense
ā€¢ Example: Draw the process map of [ abc, adc, afce, afec ]
and check which traces it can recognize, for which there is
no support in the event log.
ā€¢ Process maps make it difficult to distinguish
conditional branching, parallelism, and loops.
ā€¢ See previous exampleā€¦ or a simpler one: [abcd, acbd]
ā€¢ Solution: automated BPMN process discovery
ā€¢ More on this tomorrowā€¦
33
Process Mining
34
ļƒ¼/ļƒ»
event log
discovered model
Process
Discovery
Conformance
Checking
Variants
Analysis
Difference
diagnostics
Performance
Mining
input model
Enhanced model
event logā€™
ā€¢ Dotted charts
ā€¢ One line per trace, each line contains points, one point per event
ā€¢ Each event type is mapped to a colour
ā€¢ Position of the point denotes its occurrence time (in a relative scale)
ā€¢ Birds-eye view of the timing of different events (e.g. activity end times), but does
not allow one to see the ā€œprocessingā€ times of activities
ā€¢ Timeline diagrams
ā€¢ One line per trace, each line contains segments capturing the start and end of tasks
ā€¢ Captures process time (unlike dotted charts)
ā€¢ Not scalable for large event logs ā€“ good to show ā€œrepresentativeā€ traces
ā€¢ Performance-enhanced process maps
ā€¢ Process maps where nodes are colour-coded w.r.t a performance measure. Nodes
may represent activities (default option)
ā€¢ But they may represent resources and then arcs denote hands-offs between
resources
Process Performance Mining
Slide 36
Dotted chart
Slide 37
Timeline diagram
See: http://timelines.nirdizati.org
Slide 38
Performance-enhanced process map
Nodes are activities (default)
Screenshot of Disco
Slide 39
Performance-enhanced process map
Nodes are tasks (handoff graph)
Screenshot of MyInvenio
Exercise
ā€¢ Consider the following event log of a telephone
repair process: http://tinyurl.com/repairLogs
ā€¢ What are the bottlenecks in this process?
ā€¢ Which task has the longest waiting time and which one
has the longest processing time?
40
Process Mining
41
ļƒ¼/ļƒ»
event log
discovered model
Process
Discovery
Conformance
Checking
Variants
Analysis
Difference
diagnostics
Performance
Mining
input model
Enhanced model
event logā€™
Given two logs, find the differences and root causes for
variation or deviance between the two logs
Variants Analysis
ā‰ 
Case Study: Variants Analysis at Suncorp
OK
OK Good
Bad Expected
Performance
Line
Simple claims and quick Simple claims and slow
Variants Analysis via Process Map
Comparison
?
S. Suriadi et al.: Understanding Process Behaviours in a Large Insurance Company in Australia: A Case Study. CAiSE 2013
Variants analysis - Exercise
We consider a process for handling health insurance claims, for which
we have extracted two event logs, namely L1 and L2. Log L1 contains
all the cases executed in 2011, while L2 contains all cases executed in
2012. The logs are available in the bookā€™s companion website or
directly at: http://tinyurl.com/InsuranceLogs
Based on these logs, answer the following questions using a process
mining tool:
1. What is the cycle time of each log?
2. Where are the bottlenecks (highest waiting times) in each of the
two logs and how do these bottlenecks differ?
3. Describe the differences between the frequency of tasks and the
order in which tasks are executed in 2011 (L1) versus 2012 (L2).
Hint: If you are using process maps, you should consider using the
abstraction slider in your tool to hide some of the most
infrequent arcs so as to make the maps more readable
45
Process Mining
46
ļƒ¼/ļƒ»
event log
discovered model
Process
Discovery
Conformance
Checking
Variants
Analysis
Difference
diagnostics
Performance
Mining
input model
Enhanced model
event logā€™
Conformance Checking
47
ā‰ 
Conformance Checking:
Unfitting vs. Additional Behavior
Unfitting behaviour:
ā€¢ Task C is optional (i.e. may be skipped) in the log
Additional behavior:
ā€¢ The cycle including IGDF is not observed in the log
Event log:
ABCDEH
ACBDEH
ABCDFH
ACBDFH
ABDEH
ABDFH
Conformance Checking in Apromore
49
Full demo at:
https://www.youtube.com/watch?v=3d00pORc9X8
Open-source tools: Apromore
(apromore.org)ā€¢ Open-source BPM analytics platform as Software as a Service
ā€¢ Focus is on end users (business analytics and operations managers), not on data
scientists
ā€¢ Over 40 plugins
!
!
Key features
ā€¢ Repository of process models and event logs (BPMN, AML, XPDL, EPML, AML, YAWL, XES, MXML)
ā€¢ Offers a range of features along the BPM lifecycle:
From logs
ā€¢ Automated discovery of BPMN models
ā€¢ Filter noise from log
ā€¢ Visualize log
ā€¢ Mine process stages
From models
ā€¢ Structure model
On logs
ā€¢ Animate logs
ā€¢ Compare model-log, log-log
ā€¢ Detect and characterize drifts
ā€¢ Measure log complexity
ā€¢ Mine process performance
On models
ā€¢ Measure model complexity
ā€¢ Compare model-model
ā€¢ Detect clones
ā€¢ Search similar models
ā€¢ Simulate model
On models
ā€¢ Merge model variants
ā€¢ Configure model with
questionnaire
From logs
ā€¢ Animate logs
ā€¢ Compare model-log, log-log
ā€¢ Detect and characterize drifts
ā€¢ Mine process performance
ā€¢ Predict outcomes and
performance (via Nirdizati)
Access Apromore
You can access it in the cloud or download and install a standalone version
Cloud-version
ā€¢ Node 1(Estonia): http://apromore.cs.ut.ee
ā€¢ Node 2 (Australia): http://apromore.qut.edu.au
Standalone
ā€¢ One-click: a lightweight version of Apromore. Simply unzip and run from
localhost
ā€¢ Full-fledged: for developers and advanced users, this distribution gives you
full control over Apromore
Source code
ā€¢ Apromoreā€™s source code is open-source, licensed under LGPL 3.0
ā€¢ The code can be accessed from GitHub
ProM: the very first process mining tool
ā€¢ 600+ plug-ins available for the whole process mining
spectrum
ā€¢ Open source license
ā€¢ Download it from www.processmining.org
Nirdizati: predictive process monitoring
(nirdizati.com)ā€¢ Predict process outcome (e.g. ā€œIs this loan offer going to be rejected?ā€)
ā€¢ Predict process performance (e.g. ā€œWill this claim take longer than 5 days to
be handled?ā€)
ā€¢ Predict future events (e.g. ā€œWhat activity is likely to be executed next? And
after that?ā€)
Part 2: Process Mining
Algorithms
55
BPMN-Based Process Mining
56
ļƒ¼/ļƒ»
event log
discovered model
Process
Discovery
Conformance
Checking
Variants
Analysis
Difference
diagnostics
Performance
Mining
input model
Enhanced model
event logā€™
Conformance Checking:
Unfitting vs. Additional Behavior
Unfitting behaviour:
ā€¢ Task C is optional (i.e. may be skipped) in the log
Additional behavior:
ā€¢ The cycle including IGDF is not observed in the log
Event log:
ABCDEH
ACBDEH
ABCDFH
ACBDFH
ABDEH
ABDFH
58
Process
Model
Log
Unfitting
behavior (lack
of fitness)
Additional
behavior (lack
of precision)
Lack of
generalization
Accuracy of Automatically
Discovered Process Models
Accuracy of Automatically Discovered
Process Models
ā€¢ Fitness: To what extent the behaviour observed in the
event log fits the process model?
ā€¢ No unfitting behaviour ļƒØ Fitness = 1
ā€¢ Precision: How much additional behaviour the process
model allows that is not observed in the event log
ā€¢ No additional behaviour ļƒØ Precision = 1
ā€¢ Generalization (of an algorithm): If we have a (partial)
event log of a process, to what extent the discovery
algorithm produces models that fit the behaviour of the
process that is not observed in the log
59
Measuring Fitness
ā€¢ Replay
ā€¢ Replay each trace against the model
ā€¢ When a parsing error occurs, repair it locally
ā€¢ Keep track of the ā€œparsing errorā€
ā€¢ Does not calculate an exact distance measure!
ā€¢ Optimal Trace Alignment
ā€¢ For each trace in the model t, find the trace tā€™ of the
process model such that the string-edit distance of t and
tā€™ is minimal
ā€¢ Use the string-edit distances
ā€¢ Calculates a ā€œdistanceā€ between log and model
60
Conformance Checking via Replay
A B C E
Conformance Checking via Replay
B C E
Conformance Checking via Replay
B C E
Conformance Checking via Replay
C E
Conformance Checking via Replay
C E
Conformance Checking via Replay
E
Conformance Checking via Replay
E
Conformance Checking via Replay
E
Conformance Checking via Replay
Conformance Checking via Replay
Conformance Checking via Replay
A C E
Conformance Checking via Replay
C E
Conformance Checking via Replay
C E
Conformance Checking via Replay
C E
Conformance Checking via Replay
E
Conformance Checking via Replay
E
Conformance Checking via Replay
E missing token
Conformance Checking via Replay
E
Conformance Checking via Replay
Conformance Checking via Replay
Conformance Checking via Replay
remaining token
Accuracy of automatically
discovered process models
The accuracy of an automatically discovered process models consists of three
quality dimensions:
1. Fitness: the discovered model should allow for the behavior seen in the
event log.
ļ‚§ A model has a perfect fitness if all traces in the log can be replayed from the
beginning to the end.
Accuracy of process models
The accuracy of an automatically discovered process models consists of three
quality dimensions:
1. Fitness
2. Precision (avoid underfitting): the discovered model should not allow for
behavior completely unrelated to what was seen in the event log.
The accuracy of an automatically discovered process models consists of three
quality dimensions:
1. Fitness:
2. Precision (avoid underfitting)
3. Generalization (avoid overfitting): the discovered model should generalize
the example behavior seen in the event log.
Accuracy of process models
Flower model (underfitting)
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
Enumerating model
(overfitting)
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
Something in the middleā€¦
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Computing fitness: basic approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Computing fitness: basic
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
Computing fitness: basic
approach
A B I J K L
Computing fitness: basic
approach
A B I J K L
Computing fitness: basic
approach
B I J K L
Computing fitness: basic
approach
B I J K L
Computing fitness: basic
approach
I J K L
Computing fitness: basic
approach
I J K L
Computing fitness: basic
approach
I J K L
non-conformance
Computing fitness: basic
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
A ā€œbasic approachā€ to compute fitness is to count the fraction of cases that can be
ā€œparsed completelyā€ (i.e., the proportion of cases corresponding to firing sequences
leading from [start] to [end]).
Computing fitness: basic
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
A ā€œbasic approachā€ to compute fitness is to count the fraction of cases that can be
ā€œparsed completelyā€ (i.e., the proportion of cases corresponding to firing sequences
leading from [start] to [end]).
Fitness = 0.97
Computing fitness: Event-based
approach
ā€¢ In the simple fitness computation, we stopped replaying a trace
once we encounter a problem and mark it as non-fitting.
ā€¢ An event-based approach to calculate fitness consists of just
continue replaying the trace on the model and:
ā€¢ record all situations where a transition is forced to fire without being
enabled, i.e., we count all missing tokens.
ā€¢ record the tokens that remain at the end.
ā€¢ Use of four counters:
ā€¢ p = produced tokens
ā€¢ c = consumed tokens
ā€¢ m = missing tokens
ā€¢ r = remaining tokens
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
Computing fitness: Event-based
approach
A B I J K L
Computing fitness: Event-based
approach
p = 1
c = 0
m = 0
r = 0
A B I J K L
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
B I J K L
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
B I J K L
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
I J K L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
I J K L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
I J K L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 0
m = 1
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
I J K L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 0
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
J K L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 0
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
K L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
L
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 1
m = 1
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 12
c = 12
m = 1
r = 1
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
p = 12
c = 12
m = 1
r = 1
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 12
c = 12
m = 1
r = 1
Fitness = 0.9166
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 13
c = 13
m = 0
r = 0
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 13
c = 13
m = 0
r = 0
Fitness = 1
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 0
m = 0
r = 0
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 1
m = 0
r = 0
p = 1
c = 0
m = 0
r = 1
p = 0
c = 0
m = 0
r = 0
p = 12
c = 11
m = 0
r = 1
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 12
c = 11
m = 0
r = 1
Fitness = 0.9583
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 13
c = 13
m = 0
r = 0
Computing fitness: Event-based
approach
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
p = 13
c = 13
m = 0
r = 0
Fitness = 1
Computing fitness at log level
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Computing fitness at log level
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
Number of occurrences of a specific trace in
the log (e.g., if a trace Ļƒ appears 200 times in
the log, L(Ļƒ) will be equal to 200 )
Computing fitness at log level
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 13
c = 13
m = 0
r = 0
p = 12
c = 12
m = 1
r = 1
p = 13
c = 13
m = 0
r = 0
p = 12
c = 11
m = 0
r = 1
Computing fitness at log level
L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
p = 13
c = 13
m = 0
r = 0
p = 12
c = 12
m = 1
r = 1
p = 13
c = 13
m = 0
r = 0
p = 12
c = 11
m = 0
r = 1
Fitness = 0.998
Calculating precision
ā€¢ Precision = 1 ļƒØ the behaviour allowed by the model
is contained or equal to the behavior in the log
ā€¢ Precision close to 0 ļƒØ None of the behaviour in the
model is observed in the log
ā€¢ Precision can be calculated as a ā€œdifferenceā€
between a state space representing the behaviour of
the model, and a state space representing the
behaviour of the log
ā€¢ Adriano Augusto et al. ā€œAbstract-and-Compare: A Family
of Scalable Precision Measures for Automated Process
Discoveryā€. In Proceedings of BPMā€™2018
133
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Discovery
Measuring generalization of a process
discovery algorithm via cross-validation
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Fitness
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Fitness
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Fitness
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Fitness
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Fitness
Measuring generalization of a process
discovery algorithm via cross-validation
L
L1
L2
L3
L4
L5
N1
N2
N3
N4
N5
Avg Fitness
Automated Discovery of
BPMN Process Models
142
Ī±-algorithm: the Origin of
Process Discovery
van der Aalst, W. M. P. and Weijters, A. J. M. M. and Maruster,
L. (2003). Workflow Mining: Discovering process models
from event logs, IEEE Transactions on Knowledge and Data
Engineering
Ī±-algorithm
Basic Idea: Ordering relations
ā€¢ Direct succession:
x>y iff for some case
x is directly followed
by y.
ā€¢ Causality: xļ‚®y iff
x>y and not y>x.
ā€¢ Parallel: x||y iff x>y
and y>x
ā€¢ Unrelated: x#y iff
not x>y and not y>x.
case 1 : task A
case 2 : task A
case 3 : task A
case 3 : task B
case 1 : task B
case 1 : task C
case 2 : task C
case 4 : task A
case 2 : task B
...
A>B
A>C
B>C
B>D
C>B
C>D
E>F
Aļ‚®B
Aļ‚®C
Bļ‚®D
Cļ‚®D
Eļ‚®F
B||C
C||B
ABCD
ACBD
EF
Basic Idea: Example
Basic Idea: Example
Basic Idea: Footprints
Ī±-Algorithm
ā€¢ Idea (a)
ļƒ›
Ī±-Algorithm
ā€¢ Idea (a)
a ļ‚® b
ļƒ›
Ī±-Algorithm
ā€¢ Idea (b)
ļƒ›
Ī±-Algorithm
ā€¢ Idea (b)
aļ‚® b, aļ‚® c and b # c
ļƒ›
Ī±-Algorithm
ā€¢ Idea (c)
ļƒ›
Ī±-Algorithm
ā€¢ Idea (c)
bļ‚® d, cļ‚® d and b # c
ļƒ›
Ī±-Algorithm
ā€¢ Idea (d)
ļƒ›
Ī±-Algorithm
ā€¢ Idea (d)
aļ‚® b, aļ‚® c and b || c
ļƒ›
Ī±-Algorithm
ā€¢ Idea (e)
ļƒ›
Ī±-Algorithm
ā€¢ Idea (e)
bļ‚® d, cļ‚® d and b || c
ļƒ›
Ī±-algorithm: Applicative Example
Ī±(L) = ?
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
ALPHABET
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
ALPHABET
{a,b,c,d,e,f,g}
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
INITIAL ACTIVITIES
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
INITIAL ACTIVITIES
{a}
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
FINAL ACTIVITIES
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
FINAL ACTIVITIES
{g}
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
Ī±-algorithm: Applicative Example
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
a b c d e f g
a # > > # # # #
b < # || > # # #
c < || # > # # #
d # < < # > > #
e # # # < # # >
f # # # < # # >
g # # # # < < #
FOOTPRINTS
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
Ī±-algorithm: Applicative Example
Ī±(L) = ?
L= { <a,b,c,d,e,f> 4, <a,g,h,d,f,e> 2, <a,b,c,d,f,e> 3, <a,g,h,d,e,f> 3}
Limitations of alpha miner
Completeness
All possible traces of the process (model)
need to be in the log
Short loops
c>b and b>c implies c||b and b||c
instead of cļ‚®b and bļ‚®c
Self-loops
b>b and not b>b implies bļ‚®b (impossible!)
Frequency of the Ordering Relations?
Little Thumb to Deal with Noise
van der Aalst, W. M. P. and Weijters, A. J. M. M. (2003).
Rediscovering workflow models from event-based data
using little thumb, Integrated Computer-Aided Engineering
Heuristics Miner
Heuristics Miner
number between -1 and 1 indicating strength of causal dependency between a and b
Heuristics Miner
Heuristics Miner
Heuristics Miner
Whatā€™s the
corresponding
process model?
Automated Process Discovery
Automated
process
discovery
method
Simplicity
minimal size & structural
complexity
Precision
does not parse
traces not in the log
Fitness
parses the traces of the log
Generalization
parses traces of the
process not included in
the log
188
Process Discovery Algorithms:
The Two Worlds
High-Fitness
High-Precision
Heuristic Miner
Fodina Miner
High-Fitness
Low-Complexity
Process Model discovered with
Heuristics Miner
Process Model discovered with
Inductive Miner
ā€¢ Structured by construction
ā€¢ Based on process tree
Process Discovery Algorithms:
The Two Worlds
High-Fitness
High-Precision
High complexity
Heuristic Miner
Fodina Miner
High-Fitness
Low Precision
Low-Complexity
Inductive Miner
Evolutionary
Tree Miner
Split Miner
Augusto, A. and Conforti, R. and Dumas, M. and La Rosa, M.
(2017). Split Miner: Discovering Accurate and Simple
Business Process Models from Event Logs. ICDM 2017
Process Model discovered with
Split Miner
Process Discovery Algorithms
High-Fitness
High-Precision
Low-Complexity
Split Miner
From Event Log to Process Model in 5
Steps
196
Directly-Follows
Graph and
Loops Discovery
Filtering
Concurrency
Discovery
Splits
Discovery
Joins
Discovery
Event
Log
Process
Model
Trace #obs
a Ā» b Ā» c Ā» g Ā» e Ā» h 10
a Ā» b Ā» c Ā» f Ā» g Ā» h 10
a Ā» b Ā» d Ā» g Ā» e Ā» h 10
a Ā» b Ā» d Ā» e Ā» g Ā» h 10
a Ā» b Ā» e Ā» c Ā» g Ā» h 10
a Ā» b Ā» e Ā» d Ā» g Ā» h 10
a Ā» c Ā» b Ā» e Ā» g Ā» h 10
a Ā» c Ā» b Ā» f Ā» g Ā» h 10
a Ā» d Ā» b Ā» e Ā» g Ā» h 10
a Ā» d Ā» b Ā» f Ā» g Ā» h 10
197
Directly-Follows
Graph and
Loops Discovery
Concurrency
DiscoveryEvent Log Filtering
Splits
Discovery
Joins
Discovery
Process
Model
Trace #obs
a Ā» b Ā» c Ā» g Ā» e Ā» h 10
a Ā» b Ā» c Ā» f Ā» g Ā» h 10
a Ā» b Ā» d Ā» g Ā» e Ā» h 10
a Ā» b Ā» d Ā» e Ā» g Ā» h 10
a Ā» b Ā» e Ā» c Ā» g Ā» h 10
a Ā» b Ā» e Ā» d Ā» g Ā» h 10
a Ā» c Ā» b Ā» e Ā» g Ā» h 10
a Ā» c Ā» b Ā» f Ā» g Ā» h 10
a Ā» d Ā» b Ā» e Ā» g Ā» h 10
a Ā» d Ā» b Ā» f Ā» g Ā» h 10
198
Directly-Follows
Graph and
Loops Discovery
Concurrency
DiscoveryEvent Log Filtering
Splits
Discovery
Joins
Discovery
Process
Model
199
Directly-Follows
Graph and
Loops Discovery
Concurrency
DiscoveryEvent Log Filtering
Splits
Discovery
Joins
Discovery
Process
Model
(b || c) (b || d) (d || e) (e || g)
200
Directly-Follows
Graph and
Loops Discovery
Concurrency
DiscoveryEvent Log Filtering
Splits
Discovery
Joins
Discovery
Process
Model
201
Break for Make-up!
202
Directly-Follows
Graph and
Loops Discovery
Concurrency
DiscoveryEvent Log Filtering
Splits
Discovery
Joins
Discovery
Process
Model
(b || c) (b || d) (d || e) (e || g)
203
Directly-Follows
Graph and
Loops Discovery
Concurrency
DiscoveryEvent Log Filtering
Splits
Discovery
Joins
Discovery
Process
Model
204
Done!
Automated discovery of BPM
Process Models in Apromore
205
Process
Dashboards
Operational
dashboards
Tactical
dashboards
Strategic
dashboards
Process
Mining
Automated
process
discovery
Conformance
checking
Performance
mining
Variants
analysis
Summary
Topics not covered in this class
ā€¢ Event log filtering
ā€¢ Removing anomalous or infrequent behaviour from an
event log
ā€¢ Business process drift detection
ā€¢ Detecting changes in a business process (over time)
using event logs
ā€¢ Predictive process monitoring
ā€¢ Predicting the outcome or a future property of a process
based on an event log containing completed cases, and
an incomplete case
207
Thank you!
http://fundamentals-of-bpm.org
Chapter 12:
Process Monitoring

More Related Content

What's hot

Bpm lifecycle ppt
Bpm lifecycle pptBpm lifecycle ppt
Bpm lifecycle pptKushal Malhan
Ā 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process ModelingSandy Kemsley
Ā 
Business Process Monitoring and Mining
Business Process Monitoring and MiningBusiness Process Monitoring and Mining
Business Process Monitoring and MiningMarlon Dumas
Ā 
Introduction to Business Intelligence
Introduction to Business IntelligenceIntroduction to Business Intelligence
Introduction to Business IntelligenceRonan Soares
Ā 
How to use BPMN* for modelling business processes
How to use BPMN* for modelling business processesHow to use BPMN* for modelling business processes
How to use BPMN* for modelling business processesAlexander SAMARIN
Ā 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingWil van der Aalst
Ā 
Business Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesBusiness Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesSlideTeam
Ā 
Business Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second editionBusiness Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second editionGregor Polančič
Ā 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process ManagementAmin Kazemi
Ā 
Power BI Architecture
Power BI ArchitecturePower BI Architecture
Power BI ArchitectureArthur Graus
Ā 
Growing a BPM Center of Excellence
Growing a BPM Center of ExcellenceGrowing a BPM Center of Excellence
Growing a BPM Center of ExcellenceMichael zur Muehlen
Ā 
Business Process Management Training | By ex-Deloitte & McKinsey Consultants
Business Process Management Training | By ex-Deloitte & McKinsey ConsultantsBusiness Process Management Training | By ex-Deloitte & McKinsey Consultants
Business Process Management Training | By ex-Deloitte & McKinsey ConsultantsAurelien Domont, MBA
Ā 
BPM PowerPoint Presentation Slides
BPM PowerPoint Presentation SlidesBPM PowerPoint Presentation Slides
BPM PowerPoint Presentation SlidesSlideTeam
Ā 
Strategy & Business Process Management
Strategy & Business Process ManagementStrategy & Business Process Management
Strategy & Business Process Management451 Research
Ā 
Starting from Scratch: Build a New Business Case
Starting from Scratch: Build a New Business CaseStarting from Scratch: Build a New Business Case
Starting from Scratch: Build a New Business CaseCelonis
Ā 
Business Process Automation and Data Processing Workflows
Business Process Automation and Data Processing WorkflowsBusiness Process Automation and Data Processing Workflows
Business Process Automation and Data Processing WorkflowsMarlon Dumas
Ā 
BPM (Business Process Management) Introduction
BPM (Business Process Management) IntroductionBPM (Business Process Management) Introduction
BPM (Business Process Management) IntroductionIntegrify
Ā 
Business one ppt
Business one pptBusiness one ppt
Business one pptVaibhav Jagtap
Ā 
Business Process Management Introduction
Business Process Management IntroductionBusiness Process Management Introduction
Business Process Management IntroductionGBTEC Software AG
Ā 

What's hot (20)

Bpm lifecycle ppt
Bpm lifecycle pptBpm lifecycle ppt
Bpm lifecycle ppt
Ā 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
Ā 
Business Process Monitoring and Mining
Business Process Monitoring and MiningBusiness Process Monitoring and Mining
Business Process Monitoring and Mining
Ā 
Introduction to Business Intelligence
Introduction to Business IntelligenceIntroduction to Business Intelligence
Introduction to Business Intelligence
Ā 
How to use BPMN* for modelling business processes
How to use BPMN* for modelling business processesHow to use BPMN* for modelling business processes
How to use BPMN* for modelling business processes
Ā 
Process mining
Process miningProcess mining
Process mining
Ā 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
Ā 
Business Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesBusiness Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation Slides
Ā 
Business Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second editionBusiness Process Modeling with BPMN 2.0 - Second edition
Business Process Modeling with BPMN 2.0 - Second edition
Ā 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
Ā 
Power BI Architecture
Power BI ArchitecturePower BI Architecture
Power BI Architecture
Ā 
Growing a BPM Center of Excellence
Growing a BPM Center of ExcellenceGrowing a BPM Center of Excellence
Growing a BPM Center of Excellence
Ā 
Business Process Management Training | By ex-Deloitte & McKinsey Consultants
Business Process Management Training | By ex-Deloitte & McKinsey ConsultantsBusiness Process Management Training | By ex-Deloitte & McKinsey Consultants
Business Process Management Training | By ex-Deloitte & McKinsey Consultants
Ā 
BPM PowerPoint Presentation Slides
BPM PowerPoint Presentation SlidesBPM PowerPoint Presentation Slides
BPM PowerPoint Presentation Slides
Ā 
Strategy & Business Process Management
Strategy & Business Process ManagementStrategy & Business Process Management
Strategy & Business Process Management
Ā 
Starting from Scratch: Build a New Business Case
Starting from Scratch: Build a New Business CaseStarting from Scratch: Build a New Business Case
Starting from Scratch: Build a New Business Case
Ā 
Business Process Automation and Data Processing Workflows
Business Process Automation and Data Processing WorkflowsBusiness Process Automation and Data Processing Workflows
Business Process Automation and Data Processing Workflows
Ā 
BPM (Business Process Management) Introduction
BPM (Business Process Management) IntroductionBPM (Business Process Management) Introduction
BPM (Business Process Management) Introduction
Ā 
Business one ppt
Business one pptBusiness one ppt
Business one ppt
Ā 
Business Process Management Introduction
Business Process Management IntroductionBusiness Process Management Introduction
Business Process Management Introduction
Ā 

Similar to Introduction to Business Process Monitoring and Process Mining

2018Lecture12.pptx
2018Lecture12.pptx2018Lecture12.pptx
2018Lecture12.pptxssuser0d0f881
Ā 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringMarlon Dumas
Ā 
Process Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teamsProcess Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teamsMarlon Dumas
Ā 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignMarlon Dumas
Ā 
Apromore: Advanced Business Process Analytics on the Cloud
Apromore: Advanced Business Process Analytics on the CloudApromore: Advanced Business Process Analytics on the Cloud
Apromore: Advanced Business Process Analytics on the CloudMarlon Dumas
Ā 
Metrics-Based Process Mapping
Metrics-Based Process MappingMetrics-Based Process Mapping
Metrics-Based Process MappingTKMG, Inc.
Ā 
Quantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on IntelligenceQuantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on IntelligenceDoug Brockway
Ā 
Activity Based Scoping and Pricing for Document Imaging Projects
Activity Based Scoping and Pricing for Document Imaging ProjectsActivity Based Scoping and Pricing for Document Imaging Projects
Activity Based Scoping and Pricing for Document Imaging ProjectsSRIIA Technologies, Inc.
Ā 
Process+analysis
Process+analysisProcess+analysis
Process+analysisvideoaakash15
Ā 
ITlecture1.ppt
ITlecture1.pptITlecture1.ppt
ITlecture1.pptname954606
Ā 
10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf
10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf
10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdfBENCHERMUSHEMEZA1
Ā 
how-to-understand-and-complete-a-value-stream-map
how-to-understand-and-complete-a-value-stream-maphow-to-understand-and-complete-a-value-stream-map
how-to-understand-and-complete-a-value-stream-mapBENCHERMUSHEMEZA1
Ā 
Unbiased, Fine-Grained Description of Processes Performance from Event Data
Unbiased, Fine-Grained Description of Processes Performance from Event DataUnbiased, Fine-Grained Description of Processes Performance from Event Data
Unbiased, Fine-Grained Description of Processes Performance from Event DataVadim Denisov
Ā 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkSudhendu Rai
Ā 
Growing into a proactive Data Platform
Growing into a proactive Data PlatformGrowing into a proactive Data Platform
Growing into a proactive Data PlatformLivePerson
Ā 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationMarlon Dumas
Ā 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptxMaryam522887
Ā 
ch01-Design.ppt
ch01-Design.pptch01-Design.ppt
ch01-Design.pptLuckySaigon1
Ā 
1. Introduction to Business Process Analysys
1. Introduction to Business Process Analysys1. Introduction to Business Process Analysys
1. Introduction to Business Process AnalysysGentaSahuri2
Ā 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsMarlon Dumas
Ā 

Similar to Introduction to Business Process Monitoring and Process Mining (20)

2018Lecture12.pptx
2018Lecture12.pptx2018Lecture12.pptx
2018Lecture12.pptx
Ā 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
Ā 
Process Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teamsProcess Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teams
Ā 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and Redesign
Ā 
Apromore: Advanced Business Process Analytics on the Cloud
Apromore: Advanced Business Process Analytics on the CloudApromore: Advanced Business Process Analytics on the Cloud
Apromore: Advanced Business Process Analytics on the Cloud
Ā 
Metrics-Based Process Mapping
Metrics-Based Process MappingMetrics-Based Process Mapping
Metrics-Based Process Mapping
Ā 
Quantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on IntelligenceQuantified Process Improvement Opportunities - Return on Intelligence
Quantified Process Improvement Opportunities - Return on Intelligence
Ā 
Activity Based Scoping and Pricing for Document Imaging Projects
Activity Based Scoping and Pricing for Document Imaging ProjectsActivity Based Scoping and Pricing for Document Imaging Projects
Activity Based Scoping and Pricing for Document Imaging Projects
Ā 
Process+analysis
Process+analysisProcess+analysis
Process+analysis
Ā 
ITlecture1.ppt
ITlecture1.pptITlecture1.ppt
ITlecture1.ppt
Ā 
10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf
10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf
10-vcc-how-to-understand-and-complete-a-value-stream-map-v2.pdf
Ā 
how-to-understand-and-complete-a-value-stream-map
how-to-understand-and-complete-a-value-stream-maphow-to-understand-and-complete-a-value-stream-map
how-to-understand-and-complete-a-value-stream-map
Ā 
Unbiased, Fine-Grained Description of Processes Performance from Event Data
Unbiased, Fine-Grained Description of Processes Performance from Event DataUnbiased, Fine-Grained Description of Processes Performance from Event Data
Unbiased, Fine-Grained Description of Processes Performance from Event Data
Ā 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Ā 
Growing into a proactive Data Platform
Growing into a proactive Data PlatformGrowing into a proactive Data Platform
Growing into a proactive Data Platform
Ā 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process Simulation
Ā 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
Ā 
ch01-Design.ppt
ch01-Design.pptch01-Design.ppt
ch01-Design.ppt
Ā 
1. Introduction to Business Process Analysys
1. Introduction to Business Process Analysys1. Introduction to Business Process Analysys
1. Introduction to Business Process Analysys
Ā 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to Predictions
Ā 

More from Marlon Dumas

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?Marlon Dumas
Ā 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationMarlon Dumas
Ā 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Marlon Dumas
Ā 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Marlon Dumas
Ā 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesMarlon Dumas
Ā 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Marlon Dumas
Ā 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesMarlon Dumas
Ā 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process ManagementMarlon Dumas
Ā 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationMarlon Dumas
Ā 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Marlon Dumas
Ā 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsMarlon Dumas
Ā 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process MiningMarlon Dumas
Ā 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Marlon Dumas
Ā 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Marlon Dumas
Ā 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersMarlon Dumas
Ā 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxMarlon Dumas
Ā 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business ProcessesMarlon Dumas
Ā 
OptimizaciĆ³n de procesos basada en datos
OptimizaciĆ³n de procesos basada en datosOptimizaciĆ³n de procesos basada en datos
OptimizaciĆ³n de procesos basada en datosMarlon Dumas
Ā 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementMarlon Dumas
Ā 
Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionPrescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionMarlon Dumas
Ā 

More from Marlon Dumas (20)

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?
Ā 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process Optimization
Ā 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Ā 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Ā 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and Perspectives
Ā 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Ā 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Ā 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process Management
Ā 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process Simulation
Ā 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Ā 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Ā 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process Mining
Ā 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Ā 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Ā 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for Practitioners
Ā 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptx
Ā 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Ā 
OptimizaciĆ³n de procesos basada en datos
OptimizaciĆ³n de procesos basada en datosOptimizaciĆ³n de procesos basada en datos
OptimizaciĆ³n de procesos basada en datos
Ā 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process Improvement
Ā 
Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionPrescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Ā 

Recently uploaded

GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]šŸ“Š Markus Baersch
Ā 
äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹
äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹
äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹yuu sss
Ā 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
Ā 
办ē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€F La
Ā 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
Ā 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
Ā 
From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...
From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...
From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...Florian Roscheck
Ā 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
Ā 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
Ā 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
Ā 
办ē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€F La
Ā 
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
Ā 
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...soniya singh
Ā 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
Ā 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
Ā 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
Ā 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
Ā 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
Ā 

Recently uploaded (20)

GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
Ā 
äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹
äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹
äø“äøšäø€ęƔäø€ē¾Žå›½äæ„äŗ„äæ„大学ęƕäøščÆęˆē»©å•pdfē”µå­ē‰ˆåˆ¶ä½œäæ®ę”¹
Ā 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
Ā 
办ē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UWICęƕäøščƁ书)č‹±å›½å”čæŖ夫城åø‚大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
Ā 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
Ā 
From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...
From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...
From idea to production in a day ā€“ Leveraging Azure ML and Streamlit to build...
Ā 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
Ā 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Ā 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
Ā 
办ē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(VancouveręƕäøščƁ书)加ę‹æ大ęø©å“„华岛大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Ā 
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
Ā 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
Ā 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
Ā 
Call Girls in Saket 99530šŸ” 56974 Escort Service
Call Girls in Saket 99530šŸ” 56974 Escort ServiceCall Girls in Saket 99530šŸ” 56974 Escort Service
Call Girls in Saket 99530šŸ” 56974 Escort Service
Ā 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
Ā 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
Ā 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Ā 

Introduction to Business Process Monitoring and Process Mining

  • 1. Introduction to Business Process Monitoring and Process Mining Marlon Dumas University of Tartu, Estonia marlon.dumas@ut.ee
  • 3. 1. Any process is better than no process 2. A good process is better than a bad process 3. Even a good process can be improved 4. Any good process eventually becomes a bad process ā€¢ [ā€¦unless continuously cared for] ā€¢ Michael Hammer Back to basicsā€¦ 3
  • 4. 4
  • 5. Part 1: Techniques for Business Process Monitoring 5
  • 6. Business Process Monitoring Dashboards & reports Process miningEvent stream DB logs Event log
  • 8. Operational process dashboards ā€¢ Aimed at process workers & operational managers ā€¢ Emphasis on monitoring (detect-and-respond), e.g.: - Work-in-progress - Problematic cases ā€“ e.g. overdue/at-risk cases - Resource load
  • 9. ā€¢ Aimed at process owners / managers ā€¢ Emphasis on analysis and management ā€¢ E.g. detecting bottlenecks ā€¢ Typical process performance indicators ā€¢ Cycle times ā€¢ Error rates ā€¢ Resource utilization Tactical dashboards
  • 10. Tactical Performance Dashboard @ Australian Insurer
  • 11. ā€¢ Aimed at executives & managers ā€¢ Emphasis on linking process performance to strategic objectives Strategic dashboards
  • 12. Manage Unplanned Outages Manage Emergencies & Disasters Manage Work Programming & Resourcing Manage Procurement Customer Satisfaction 0.5 0.55 - 0.2 Customer Complaint 0.6 - - 0.5 Customer Feedback 0.4 - - 0.8 Connection Less Than Agreed Time 0.3 0.6 0.7 - Key Performance Process Strategic Performance Dashboard @ Australian Utilities Provider
  • 13. Process: Manage Emergencies & Disasters Process: Manage Procurement Process: Manage Unplanned Outages Overall Process Performance Financial People Customer Excellence Operational Excellence Risk Management Health & Safety Customer Satisfaction Customer Complaint Customer Rating (%) Customer Loyalty Index Average Time Spent on Plan 1st Layer Key Result Area 2nd Layer Key Performance Satisfied Customer Index Market Share (%) 3rd & 4th Layer Process Performance Measures 0.65 0.6 0.7 0.7 0.6 0.8 0.4 0.8 0.5 0.4 0.5 0.8 0.4 0.54 0.58 0.67
  • 14. Sketch operational and tactical process monitoring dashboards for CVS Pharmacyā€™s prescription fulfillment process. Consider the viewpoints of each stakeholder in the process. Teamwork
  • 15. Business Process Monitoring Dashboards & reports Process miningEvent stream DB logs Event log
  • 16. Business Process Monitoring Dashboards & reports Process miningEvent stream DB logs Event log
  • 17. Process Mining 17 ļƒ¼/ļƒ» event log discovered model Process Discovery Conformance Checking Variants Analysis Difference diagnostics Performance Mining input model Enhanced model event logā€™
  • 18. Event logs structure: minimum requirements Concrete formats: ā€¢ Comma-Separated Values (CSV) ā€¢ XES (XML format)
  • 19. Automated Process Discovery 19 Enter Loan Application Retrieve Applicant Data Compute Installments Approve Simple Application Approve Complex Application Notify Rejection Notify Eligibility CID Task Time Stamp ā€¦ 13219 Enter Loan Application 2007-11-09 T 11:20:10 - 13219 Retrieve Applicant Data 2007-11-09 T 11:22:15 - 13220 Enter Loan Application 2007-11-09 T 11:22:40 - 13219 Compute Installments 2007-11-09 T 11:22:45 - 13219 Notify Eligibility 2007-11-09 T 11:23:00 - 13219 Approve Simple Application 2007-11-09 T 11:24:30 - 13220 Compute Installements 2007-11-09 T 11:24:35 - ā€¦ ā€¦ ā€¦ ā€¦
  • 20. Process Mining Tools Open-source ā€¢ Apromore ā€¢ ProM ā€¢ bupaR Lightweight ā€¢ Disco Mid-range ā€¢ Minit ā€¢ myInvenio ā€¢ ProcessGold ā€¢ QPR Process Analyzer ā€¢ Signavio Process Intelligence ā€¢ StereoLOGIC Discovery Analyst Heavyweight ā€¢ ARIS Process Performance Manager ā€¢ Celonis Process Mining ā€¢ Perceptive Process Mining (Lexmark) ā€¢ Interstage Process Discovery (Fujitsu) 20
  • 22. Process Maps ā€¢ A process map of an event log is a graph where: ā€¢ Each activity is represented by one node ā€¢ An arc from activity A to activity B means that B is directly followed by A in at least one trace in the log ā€¢ Arcs in a process map can be annotated with: ā€¢ Absolute frequency: how many times B directly follows A? ā€¢ Relative frequency: in what percentage of times when A is executed, it is directly followed by B? ā€¢ Time: What is the average time between the occurrence of A and the occurrence of B? 22
  • 23. Process Maps ā€“ Example 23 Event log: 10: a,b,c,g,e,h 10: a,b,c,f,g,h 10: a,b,d,g,e,h 10: a,b,d,e,g,h 10: a,b,e,c,g,h 10: a,b,e,d,g,h 10: a,c,b,e,g,h 10: a,c,b,f,g,h 10: a,d,b,e,g,h 10: a,d,b,f,g,h
  • 24. Process Maps ā€“ Exercise Case ID Task Name Originator Timestamp Case ID Task Name Originator Timestamp 1 File Fine Anne 20-07-2004 14:00:00 3 Reminder John 21-08-2004 10:00:00 2 File Fine Anne 20-07-2004 15:00:00 2 Process Payment system 22-08-2004 09:05:00 1 Send Bill system 20-07-2004 15:05:00 2 Close case system 22-08-2004 09:06:00 2 Send Bill system 20-07-2004 15:07:00 4 Reminder John 22-08-2004 15:10:00 3 File Fine Anne 21-07-2004 10:00:00 4 Reminder Mary 22-08-2004 17:10:00 3 Send Bill system 21-07-2004 14:00:00 4 Process Payment system 29-08-2004 14:01:00 4 File Fine Anne 22-07-2004 11:00:00 4 Close Case system 29-08-2004 17:30:00 4 Send Bill system 22-07-2004 11:10:00 3 Reminder John 21-09-2004 10:00:00 1 Process Payment system 24-07-2004 15:05:00 3 Reminder John 21-10-2004 10:00:00 1 Close Case system 24-07-2004 15:06:00 3 Process Payment system 25-10-2004 14:00:00 2 Reminder Mary 20-08-2004 10:00:00 3 Close Case system 25-10-2004 14:01:00 24
  • 25. Process Maps in Disco ā€¢ Disco (and other commercial process mining tools) use process maps as the main visualization technique for event logs ā€¢ These tools also provide three types of operations: 1. Abstract the process map: ā€¢ Show only most frequent activities ā€¢ Show only most frequent arcs 2. Filter the traces in the event logā€¦ 25
  • 26. Types of filters ā€¢ Event filters ā€¢ Retain only events that fulfil a given condition (e.g. all events of type ā€œCreate purchase orderā€) ā€¢ Performance filter ā€¢ Retain traces that have a duration above or below a given value ā€¢ Event pair filter (a.k.a. ā€œfollowerā€ filter) ā€¢ Retain traces where there is a pair of events that fulfil a given condition (e.g. ā€œCreate invoiceā€ followed by ā€œCreate purchase orderā€) ā€¢ Endpoint filter ā€¢ Retain traces that start with or finish with an event that fulfils a given condition 26
  • 27. Process Maps in Disco ā€¢ Disco (and other commercial process mining tools) use process maps as the main visualization technique for event logs ā€¢ These tools also provide three types of operations: 1. Abstract the process map: ā€¢ Show only most frequent activities ā€¢ Show only most frequent arcs 2. Filter the traces in the event log 3. Enhance the process map 27
  • 28. Process Map Enhancement ā€¢ Nodes and arcs in a process map can be color- coded or thickness-coded to capture: ā€¢ Frequency: How often a given task or a given directly- follows relation occurs? ā€¢ Time performance: processing times, waiting times, cycles times of tasks ā€¢ More advanced tools support enhancement by other attributes, e.g. cost, revenue, etc. if the data is available. 28
  • 30. Using Disco, answer the following questions on the PurchasingExample log: ā€¢ How many cases had to settle a dispute with the purchasing agent? ā€¢ Is there a difference in cycle time for the cases that had to settle a dispute with the purchasing agent, compared to the ones that did not? Make sure you only compare cases that actually reach the endpoint ā€˜Pay invoiceā€™ ā€¢ Are there any cases where the invoice is released and authorized by the same resource? And if so, who is doing this most often? Exercise Exercise by Anne Rozinat, Fluxicon
  • 31. Consider the dataset of a refund process from an electronics manufacturer. Customer complaints and the inspection of individual cases indicate that this process suffers from inefficiencies and overly long cycle times. Assume that only cases that have reached the ā€˜Order completedā€™ event are finished. Questions: 1. Is it a problem if you take the average cycle time of all cases, also the ones that have not finished yet? 2. In general, which channel(s) have the biggest problems with missing documents that need to be requested from the customer? 3. How many customers have received a refund without the product being received by the electronics manufacturing company? This should not happen in this process. 4. Has a customer ever received a double payment? This should not happen in this process. To complete this exercise use the log of RefundProcess.fbt One more exercise: Refund process
  • 32. Process Maps - Limitations ā€¢ Process maps over-generalize: some paths of a process map might not exist and might not make sense ā€¢ Example: Draw the process map of [ abc, adc, afce, afec ] and check which traces it can recognize, for which there is no support in the event log. ā€¢ Process maps make it difficult to distinguish conditional branching, parallelism, and loops. ā€¢ See previous exampleā€¦ or a simpler one: [abcd, acbd] ā€¢ Solution: automated BPMN process discovery ā€¢ More on this tomorrowā€¦ 33
  • 33. Process Mining 34 ļƒ¼/ļƒ» event log discovered model Process Discovery Conformance Checking Variants Analysis Difference diagnostics Performance Mining input model Enhanced model event logā€™
  • 34. ā€¢ Dotted charts ā€¢ One line per trace, each line contains points, one point per event ā€¢ Each event type is mapped to a colour ā€¢ Position of the point denotes its occurrence time (in a relative scale) ā€¢ Birds-eye view of the timing of different events (e.g. activity end times), but does not allow one to see the ā€œprocessingā€ times of activities ā€¢ Timeline diagrams ā€¢ One line per trace, each line contains segments capturing the start and end of tasks ā€¢ Captures process time (unlike dotted charts) ā€¢ Not scalable for large event logs ā€“ good to show ā€œrepresentativeā€ traces ā€¢ Performance-enhanced process maps ā€¢ Process maps where nodes are colour-coded w.r.t a performance measure. Nodes may represent activities (default option) ā€¢ But they may represent resources and then arcs denote hands-offs between resources Process Performance Mining
  • 36. Slide 37 Timeline diagram See: http://timelines.nirdizati.org
  • 37. Slide 38 Performance-enhanced process map Nodes are activities (default) Screenshot of Disco
  • 38. Slide 39 Performance-enhanced process map Nodes are tasks (handoff graph) Screenshot of MyInvenio
  • 39. Exercise ā€¢ Consider the following event log of a telephone repair process: http://tinyurl.com/repairLogs ā€¢ What are the bottlenecks in this process? ā€¢ Which task has the longest waiting time and which one has the longest processing time? 40
  • 40. Process Mining 41 ļƒ¼/ļƒ» event log discovered model Process Discovery Conformance Checking Variants Analysis Difference diagnostics Performance Mining input model Enhanced model event logā€™
  • 41. Given two logs, find the differences and root causes for variation or deviance between the two logs Variants Analysis ā‰ 
  • 42. Case Study: Variants Analysis at Suncorp OK OK Good Bad Expected Performance Line
  • 43. Simple claims and quick Simple claims and slow Variants Analysis via Process Map Comparison ? S. Suriadi et al.: Understanding Process Behaviours in a Large Insurance Company in Australia: A Case Study. CAiSE 2013
  • 44. Variants analysis - Exercise We consider a process for handling health insurance claims, for which we have extracted two event logs, namely L1 and L2. Log L1 contains all the cases executed in 2011, while L2 contains all cases executed in 2012. The logs are available in the bookā€™s companion website or directly at: http://tinyurl.com/InsuranceLogs Based on these logs, answer the following questions using a process mining tool: 1. What is the cycle time of each log? 2. Where are the bottlenecks (highest waiting times) in each of the two logs and how do these bottlenecks differ? 3. Describe the differences between the frequency of tasks and the order in which tasks are executed in 2011 (L1) versus 2012 (L2). Hint: If you are using process maps, you should consider using the abstraction slider in your tool to hide some of the most infrequent arcs so as to make the maps more readable 45
  • 45. Process Mining 46 ļƒ¼/ļƒ» event log discovered model Process Discovery Conformance Checking Variants Analysis Difference diagnostics Performance Mining input model Enhanced model event logā€™
  • 47. Conformance Checking: Unfitting vs. Additional Behavior Unfitting behaviour: ā€¢ Task C is optional (i.e. may be skipped) in the log Additional behavior: ā€¢ The cycle including IGDF is not observed in the log Event log: ABCDEH ACBDEH ABCDFH ACBDFH ABDEH ABDFH
  • 48. Conformance Checking in Apromore 49 Full demo at: https://www.youtube.com/watch?v=3d00pORc9X8
  • 49. Open-source tools: Apromore (apromore.org)ā€¢ Open-source BPM analytics platform as Software as a Service ā€¢ Focus is on end users (business analytics and operations managers), not on data scientists ā€¢ Over 40 plugins ! !
  • 50. Key features ā€¢ Repository of process models and event logs (BPMN, AML, XPDL, EPML, AML, YAWL, XES, MXML) ā€¢ Offers a range of features along the BPM lifecycle: From logs ā€¢ Automated discovery of BPMN models ā€¢ Filter noise from log ā€¢ Visualize log ā€¢ Mine process stages From models ā€¢ Structure model On logs ā€¢ Animate logs ā€¢ Compare model-log, log-log ā€¢ Detect and characterize drifts ā€¢ Measure log complexity ā€¢ Mine process performance On models ā€¢ Measure model complexity ā€¢ Compare model-model ā€¢ Detect clones ā€¢ Search similar models ā€¢ Simulate model On models ā€¢ Merge model variants ā€¢ Configure model with questionnaire From logs ā€¢ Animate logs ā€¢ Compare model-log, log-log ā€¢ Detect and characterize drifts ā€¢ Mine process performance ā€¢ Predict outcomes and performance (via Nirdizati)
  • 51. Access Apromore You can access it in the cloud or download and install a standalone version Cloud-version ā€¢ Node 1(Estonia): http://apromore.cs.ut.ee ā€¢ Node 2 (Australia): http://apromore.qut.edu.au Standalone ā€¢ One-click: a lightweight version of Apromore. Simply unzip and run from localhost ā€¢ Full-fledged: for developers and advanced users, this distribution gives you full control over Apromore Source code ā€¢ Apromoreā€™s source code is open-source, licensed under LGPL 3.0 ā€¢ The code can be accessed from GitHub
  • 52. ProM: the very first process mining tool ā€¢ 600+ plug-ins available for the whole process mining spectrum ā€¢ Open source license ā€¢ Download it from www.processmining.org
  • 53. Nirdizati: predictive process monitoring (nirdizati.com)ā€¢ Predict process outcome (e.g. ā€œIs this loan offer going to be rejected?ā€) ā€¢ Predict process performance (e.g. ā€œWill this claim take longer than 5 days to be handled?ā€) ā€¢ Predict future events (e.g. ā€œWhat activity is likely to be executed next? And after that?ā€)
  • 54. Part 2: Process Mining Algorithms 55
  • 55. BPMN-Based Process Mining 56 ļƒ¼/ļƒ» event log discovered model Process Discovery Conformance Checking Variants Analysis Difference diagnostics Performance Mining input model Enhanced model event logā€™
  • 56. Conformance Checking: Unfitting vs. Additional Behavior Unfitting behaviour: ā€¢ Task C is optional (i.e. may be skipped) in the log Additional behavior: ā€¢ The cycle including IGDF is not observed in the log Event log: ABCDEH ACBDEH ABCDFH ACBDFH ABDEH ABDFH
  • 57. 58 Process Model Log Unfitting behavior (lack of fitness) Additional behavior (lack of precision) Lack of generalization Accuracy of Automatically Discovered Process Models
  • 58. Accuracy of Automatically Discovered Process Models ā€¢ Fitness: To what extent the behaviour observed in the event log fits the process model? ā€¢ No unfitting behaviour ļƒØ Fitness = 1 ā€¢ Precision: How much additional behaviour the process model allows that is not observed in the event log ā€¢ No additional behaviour ļƒØ Precision = 1 ā€¢ Generalization (of an algorithm): If we have a (partial) event log of a process, to what extent the discovery algorithm produces models that fit the behaviour of the process that is not observed in the log 59
  • 59. Measuring Fitness ā€¢ Replay ā€¢ Replay each trace against the model ā€¢ When a parsing error occurs, repair it locally ā€¢ Keep track of the ā€œparsing errorā€ ā€¢ Does not calculate an exact distance measure! ā€¢ Optimal Trace Alignment ā€¢ For each trace in the model t, find the trace tā€™ of the process model such that the string-edit distance of t and tā€™ is minimal ā€¢ Use the string-edit distances ā€¢ Calculates a ā€œdistanceā€ between log and model 60
  • 60. Conformance Checking via Replay A B C E
  • 61. Conformance Checking via Replay B C E
  • 62. Conformance Checking via Replay B C E
  • 70. Conformance Checking via Replay A C E
  • 76. Conformance Checking via Replay E missing token
  • 80. Conformance Checking via Replay remaining token
  • 81. Accuracy of automatically discovered process models The accuracy of an automatically discovered process models consists of three quality dimensions: 1. Fitness: the discovered model should allow for the behavior seen in the event log. ļ‚§ A model has a perfect fitness if all traces in the log can be replayed from the beginning to the end.
  • 82. Accuracy of process models The accuracy of an automatically discovered process models consists of three quality dimensions: 1. Fitness 2. Precision (avoid underfitting): the discovered model should not allow for behavior completely unrelated to what was seen in the event log.
  • 83. The accuracy of an automatically discovered process models consists of three quality dimensions: 1. Fitness: 2. Precision (avoid underfitting) 3. Generalization (avoid overfitting): the discovered model should generalize the example behavior seen in the event log. Accuracy of process models
  • 84. Flower model (underfitting) L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
  • 85. Enumerating model (overfitting) L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
  • 86. Something in the middleā€¦ L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
  • 87. Computing fitness: basic approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
  • 88. Computing fitness: basic approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
  • 95. Computing fitness: basic approach I J K L non-conformance
  • 96. Computing fitness: basic approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360} A ā€œbasic approachā€ to compute fitness is to count the fraction of cases that can be ā€œparsed completelyā€ (i.e., the proportion of cases corresponding to firing sequences leading from [start] to [end]).
  • 97. Computing fitness: basic approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360} A ā€œbasic approachā€ to compute fitness is to count the fraction of cases that can be ā€œparsed completelyā€ (i.e., the proportion of cases corresponding to firing sequences leading from [start] to [end]). Fitness = 0.97
  • 98. Computing fitness: Event-based approach ā€¢ In the simple fitness computation, we stopped replaying a trace once we encounter a problem and mark it as non-fitting. ā€¢ An event-based approach to calculate fitness consists of just continue replaying the trace on the model and: ā€¢ record all situations where a transition is forced to fire without being enabled, i.e., we count all missing tokens. ā€¢ record the tokens that remain at the end. ā€¢ Use of four counters: ā€¢ p = produced tokens ā€¢ c = consumed tokens ā€¢ m = missing tokens ā€¢ r = remaining tokens
  • 99. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
  • 100. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
  • 102. Computing fitness: Event-based approach p = 1 c = 0 m = 0 r = 0 A B I J K L
  • 103. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0 B I J K L
  • 104. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 B I J K L p = 1 c = 0 m = 0 r = 0
  • 105. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 I J K L p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 106. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 I J K L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 107. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 I J K L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 0 m = 1 r = 0
  • 108. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 I J K L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 0 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 109. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 J K L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 0 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 110. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 K L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 111. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 112. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 L p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 113. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 0
  • 114. Computing fitness: Event-based approach p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 1 m = 1 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 12 c = 12 m = 1 r = 1
  • 115. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360}
  • 116. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360} p = 12 c = 12 m = 1 r = 1
  • 117. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 12 c = 12 m = 1 r = 1 Fitness = 0.9166
  • 118. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
  • 119. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 13 c = 13 m = 0 r = 0
  • 120. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 13 c = 13 m = 0 r = 0 Fitness = 1
  • 121. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
  • 122. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 0 m = 0 r = 0
  • 123. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 1 m = 0 r = 0 p = 1 c = 0 m = 0 r = 1 p = 0 c = 0 m = 0 r = 0 p = 12 c = 11 m = 0 r = 1
  • 124. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 12 c = 11 m = 0 r = 1 Fitness = 0.9583
  • 125. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
  • 126. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 13 c = 13 m = 0 r = 0
  • 127. Computing fitness: Event-based approach L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l> 360} p = 13 c = 13 m = 0 r = 0 Fitness = 1
  • 128. Computing fitness at log level L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360}
  • 129. Computing fitness at log level L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} Number of occurrences of a specific trace in the log (e.g., if a trace Ļƒ appears 200 times in the log, L(Ļƒ) will be equal to 200 )
  • 130. Computing fitness at log level L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 13 c = 13 m = 0 r = 0 p = 12 c = 12 m = 1 r = 1 p = 13 c = 13 m = 0 r = 0 p = 12 c = 11 m = 0 r = 1
  • 131. Computing fitness at log level L= { <a,b,i,j,k,l>10, <a,b,g,j,k,i,l>140, <a,f,g,j,i,k>5, <a,f,g,i,j,k,l>360} p = 13 c = 13 m = 0 r = 0 p = 12 c = 12 m = 1 r = 1 p = 13 c = 13 m = 0 r = 0 p = 12 c = 11 m = 0 r = 1 Fitness = 0.998
  • 132. Calculating precision ā€¢ Precision = 1 ļƒØ the behaviour allowed by the model is contained or equal to the behavior in the log ā€¢ Precision close to 0 ļƒØ None of the behaviour in the model is observed in the log ā€¢ Precision can be calculated as a ā€œdifferenceā€ between a state space representing the behaviour of the model, and a state space representing the behaviour of the log ā€¢ Adriano Augusto et al. ā€œAbstract-and-Compare: A Family of Scalable Precision Measures for Automated Process Discoveryā€. In Proceedings of BPMā€™2018 133
  • 133. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5
  • 134. L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Discovery Measuring generalization of a process discovery algorithm via cross-validation
  • 135. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Fitness
  • 136. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Fitness
  • 137. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Fitness
  • 138. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Fitness
  • 139. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Fitness
  • 140. Measuring generalization of a process discovery algorithm via cross-validation L L1 L2 L3 L4 L5 N1 N2 N3 N4 N5 Avg Fitness
  • 141. Automated Discovery of BPMN Process Models 142
  • 142. Ī±-algorithm: the Origin of Process Discovery van der Aalst, W. M. P. and Weijters, A. J. M. M. and Maruster, L. (2003). Workflow Mining: Discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering
  • 143. Ī±-algorithm Basic Idea: Ordering relations ā€¢ Direct succession: x>y iff for some case x is directly followed by y. ā€¢ Causality: xļ‚®y iff x>y and not y>x. ā€¢ Parallel: x||y iff x>y and y>x ā€¢ Unrelated: x#y iff not x>y and not y>x. case 1 : task A case 2 : task A case 3 : task A case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task A case 2 : task B ... A>B A>C B>C B>D C>B C>D E>F Aļ‚®B Aļ‚®C Bļ‚®D Cļ‚®D Eļ‚®F B||C C||B ABCD ACBD EF
  • 150. Ī±-Algorithm ā€¢ Idea (b) aļ‚® b, aļ‚® c and b # c ļƒ›
  • 152. Ī±-Algorithm ā€¢ Idea (c) bļ‚® d, cļ‚® d and b # c ļƒ›
  • 154. Ī±-Algorithm ā€¢ Idea (d) aļ‚® b, aļ‚® c and b || c ļƒ›
  • 156. Ī±-Algorithm ā€¢ Idea (e) bļ‚® d, cļ‚® d and b || c ļƒ›
  • 157. Ī±-algorithm: Applicative Example Ī±(L) = ? L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 158. Ī±-algorithm: Applicative Example ALPHABET L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 159. Ī±-algorithm: Applicative Example ALPHABET {a,b,c,d,e,f,g} L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 160. Ī±-algorithm: Applicative Example INITIAL ACTIVITIES L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 161. Ī±-algorithm: Applicative Example INITIAL ACTIVITIES {a} L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 162. Ī±-algorithm: Applicative Example FINAL ACTIVITIES L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 163. Ī±-algorithm: Applicative Example FINAL ACTIVITIES {g} L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 164. Ī±-algorithm: Applicative Example FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4} a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < #
  • 165. Ī±-algorithm: Applicative Example FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4} a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < #
  • 166. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 167. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 168. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 169. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 170. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 171. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 172. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 173. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 174. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 175. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 176. Ī±-algorithm: Applicative Example a b c d e f g a # > > # # # # b < # || > # # # c < || # > # # # d # < < # > > # e # # # < # # > f # # # < # # > g # # # # < < # FOOTPRINTS L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 177. Ī±-algorithm: Applicative Example L= { <a,b,c,d,e,g> 3, <a,c,b,d,e,g> 2, <a,b,c,d,f,g>, <a,c,b,d,f,g> 4}
  • 178. Ī±-algorithm: Applicative Example Ī±(L) = ? L= { <a,b,c,d,e,f> 4, <a,g,h,d,f,e> 2, <a,b,c,d,f,e> 3, <a,g,h,d,e,f> 3}
  • 179. Limitations of alpha miner Completeness All possible traces of the process (model) need to be in the log Short loops c>b and b>c implies c||b and b||c instead of cļ‚®b and bļ‚®c Self-loops b>b and not b>b implies bļ‚®b (impossible!)
  • 180. Frequency of the Ordering Relations?
  • 181. Little Thumb to Deal with Noise van der Aalst, W. M. P. and Weijters, A. J. M. M. (2003). Rediscovering workflow models from event-based data using little thumb, Integrated Computer-Aided Engineering
  • 183. Heuristics Miner number between -1 and 1 indicating strength of causal dependency between a and b
  • 187. Automated Process Discovery Automated process discovery method Simplicity minimal size & structural complexity Precision does not parse traces not in the log Fitness parses the traces of the log Generalization parses traces of the process not included in the log 188
  • 188. Process Discovery Algorithms: The Two Worlds High-Fitness High-Precision Heuristic Miner Fodina Miner High-Fitness Low-Complexity
  • 189. Process Model discovered with Heuristics Miner
  • 190. Process Model discovered with Inductive Miner ā€¢ Structured by construction ā€¢ Based on process tree
  • 191. Process Discovery Algorithms: The Two Worlds High-Fitness High-Precision High complexity Heuristic Miner Fodina Miner High-Fitness Low Precision Low-Complexity Inductive Miner Evolutionary Tree Miner
  • 192. Split Miner Augusto, A. and Conforti, R. and Dumas, M. and La Rosa, M. (2017). Split Miner: Discovering Accurate and Simple Business Process Models from Event Logs. ICDM 2017
  • 193. Process Model discovered with Split Miner
  • 195. From Event Log to Process Model in 5 Steps 196 Directly-Follows Graph and Loops Discovery Filtering Concurrency Discovery Splits Discovery Joins Discovery Event Log Process Model
  • 196. Trace #obs a Ā» b Ā» c Ā» g Ā» e Ā» h 10 a Ā» b Ā» c Ā» f Ā» g Ā» h 10 a Ā» b Ā» d Ā» g Ā» e Ā» h 10 a Ā» b Ā» d Ā» e Ā» g Ā» h 10 a Ā» b Ā» e Ā» c Ā» g Ā» h 10 a Ā» b Ā» e Ā» d Ā» g Ā» h 10 a Ā» c Ā» b Ā» e Ā» g Ā» h 10 a Ā» c Ā» b Ā» f Ā» g Ā» h 10 a Ā» d Ā» b Ā» e Ā» g Ā» h 10 a Ā» d Ā» b Ā» f Ā» g Ā» h 10 197 Directly-Follows Graph and Loops Discovery Concurrency DiscoveryEvent Log Filtering Splits Discovery Joins Discovery Process Model
  • 197. Trace #obs a Ā» b Ā» c Ā» g Ā» e Ā» h 10 a Ā» b Ā» c Ā» f Ā» g Ā» h 10 a Ā» b Ā» d Ā» g Ā» e Ā» h 10 a Ā» b Ā» d Ā» e Ā» g Ā» h 10 a Ā» b Ā» e Ā» c Ā» g Ā» h 10 a Ā» b Ā» e Ā» d Ā» g Ā» h 10 a Ā» c Ā» b Ā» e Ā» g Ā» h 10 a Ā» c Ā» b Ā» f Ā» g Ā» h 10 a Ā» d Ā» b Ā» e Ā» g Ā» h 10 a Ā» d Ā» b Ā» f Ā» g Ā» h 10 198 Directly-Follows Graph and Loops Discovery Concurrency DiscoveryEvent Log Filtering Splits Discovery Joins Discovery Process Model
  • 198. 199 Directly-Follows Graph and Loops Discovery Concurrency DiscoveryEvent Log Filtering Splits Discovery Joins Discovery Process Model (b || c) (b || d) (d || e) (e || g)
  • 199. 200 Directly-Follows Graph and Loops Discovery Concurrency DiscoveryEvent Log Filtering Splits Discovery Joins Discovery Process Model
  • 201. 202 Directly-Follows Graph and Loops Discovery Concurrency DiscoveryEvent Log Filtering Splits Discovery Joins Discovery Process Model (b || c) (b || d) (d || e) (e || g)
  • 202. 203 Directly-Follows Graph and Loops Discovery Concurrency DiscoveryEvent Log Filtering Splits Discovery Joins Discovery Process Model
  • 204. Automated discovery of BPM Process Models in Apromore 205
  • 206. Topics not covered in this class ā€¢ Event log filtering ā€¢ Removing anomalous or infrequent behaviour from an event log ā€¢ Business process drift detection ā€¢ Detecting changes in a business process (over time) using event logs ā€¢ Predictive process monitoring ā€¢ Predicting the outcome or a future property of a process based on an event log containing completed cases, and an incomplete case 207