SlideShare a Scribd company logo
Multi-perspective Process Analysis:
Mining the Association between
Control Flow and Data Objects
Dina Bayomie, Kate Revoredo, Jan Mendling
PAGE 2
Introduction
Multi-
perspective
Control-
flow
Resource
Time
Data
objects
-
-
-
-
PAGE 3
Introduction
RQ: What is the relation between control-
flow perspective and data objects behavior
perspective?
We propose a multi-perspective mining
technique based on association rule mining
to discover the data connections between
the control-flow and data objects behavior.
-
-
-
-
PAGE 4
Event Log Rule Miner (EL-RM)
PAGE 5
Preparing the Event log
• Prepare the data to align with the process analysts analysis
objectives
Log partition-
time frame
-
-
-
-
-
-
-
-
-
-
PAGE 6
Encoding event log into transaction table
• A transaction table sustains the control-flow perspective and
the change behavior over the data perspective.
• A transaction represents the
behavior of the data attributes
over a pair of events.
Control-flow perspective Atomic perspective Complex perspective
-
-
PAGE 7
Encoding event log into transaction table
-
-
PAGE 8
Encoding event log into transaction table
PAGE 9
Association rule mining
𝐈𝐅 𝑒𝑖. 𝐴𝑐𝑡 = 𝑎 ∧ 𝑒𝑗. 𝐴𝑐𝑡 = 𝑏 𝐓𝐇𝐄𝐍 𝑒𝑖. 𝐴𝑡𝑡𝑟 ≶ 𝑒𝑗. 𝐴𝑡𝑡𝑟
≶: < | > | = | ≠
PAGE 10
Association rule mining
PAGE 11
Analysing the rules
Ranking
Combining
Comparing
PAGE 12
Analysing the rules - Ranking
 We rank the rules using the known measures of association rules.
𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑅 =
|(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡) ⊆ 𝑇 |
|𝑇|
where 𝑇 𝑖𝑠 𝑡ℎ𝑒 𝑡𝑟𝑎𝑛𝑠𝑎𝑐𝑡𝑖𝑜𝑛𝑠
𝑐𝑜𝑛𝑓𝑖𝑑𝑒𝑛𝑐𝑒 𝑅 =
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅)
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡)
𝑙𝑖𝑓𝑡 𝑅 =
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅)
𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 ∗ 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡)
 In this step, We prepare the rules to align with the analysis objectives.
PAGE 13
Analysing the rules - combining
 EL-RM aggregates the rules based on common antecedent and common
consequent. We propose three possible aggregations.
1. The first option focuses on the control-flow perspective.
2. The second option focuses on the data object perspective.
3. The third option focuses on combine both the perspectives.
PAGE 14
Analysing the rules - combining
PAGE 15
Analysing the rules - compare
• we compare the rules generated from the different partitions to detect
the changes in behaviour over the divisions.
• We induce various sets of rules from the extracted rules by using the set
operations:
 All rules (Union set operation)
 Common rules (intersection set operation)
 Difference rules in a partition against Common rules (difference set operation)
 Partition unique rules (difference set operation)
 We conducted three exploratory experiments on three real datasets.
PAGE 16
Evaluation
 BPIC-2017 contains the events of the loan application
process of a Dutch financial institute. The events are
generated from three sub-processes, i.e., application,
offer and workflow.
 The log contains cases that started at the beginning
of 2016 until the 1st of February 2017.
PAGE 17
Experiment 1 – BPIC2017
Discovered rules = 751
Combine rules = 15
Confidence = [0.94,1]
Lift = [0.95, 13.63]
• R1: IF ei.Act = “OCreate Offer” and
ej.Act = “ OCreated”
THEN ei.EventID = ej.OfferID
• R2: IF ei.Act =”A_Complete” and
ej.Act = “ W_ValideApplication”
THEN ei.Resource = ej.Resource
 We conducted three exploratory experiments on three real datasets.
PAGE 18
Evaluation
 BPIC-2020 (prepaid travel) contains the events of
the prepaid travel request process at Eindhoven
University of Technology (TU/e).
 The log covers the cases from the beginning of
2017 till the 21st of February 2019.
PAGE 19
Experiment 2 – BPIC2020(prepaid travel)
All rules = 425
Common rules = 85
Confidence = [0.99, 1]
Lift = [1, 8.90]
• R1: IF ei.Act =“Permit APPROVED by
ADMINISTRATION” and ej.Act =
“Permit APPROVED by BUDGET
OWNER” THEN ei.Resource =
ej.Resource
• R2: IF ei.Act = “Permit APPROVED by
BUDGET OWNER” and ej.Act = “Permit
FINAL_APPROVED by SUPERVISOR”
THEN ei.org:role != ei.org:role
 We conducted three exploratory experiments on three real datasets.
PAGE 20
Evaluation
 Road traffic fine management process dataset
contains the events of the road traffic fines process.
The cases have a diverse cycle time duration
behavior. [mention duration of shortest and longest]
 The log covers the cases from the beginning of 2000
till the 18th of June 2013
PAGE 21
Experiment 3 – Road traffic fine
All rules = 239
Common rules = 159
Average confidence = 0.96
Average lift = 1.98
• R1: IF ei.Act =“Insert Fine Notification”
and ej.Act = “Insert Date Appeal to
Prefecture” THEN ei.NotifcationType !=
ej. NotifcationType
• R2: IF ei.Act =“Create Fine” and ej.Act =
“payment” THEN ei.NotifcationType =
ej. NotifcationType
 We proposed a multi-perspective mining technique for the discovery of data
connection.
 Our method uses association rules to represent the relation between the control
flow perspective and its impacts on the behavior of the data objects perspective
 The results of our evaluation showed the potential of the approach to extract
relevant insights about the change behavior of the attributes over
the events.
PAGE 22
Conclusion
Dina Bayomie
dbayomie@wu.ac.at
PAGE 23

More Related Content

Similar to Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects

IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET Journal
 
Anuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPT
AnupritaBhoyar
 
Using human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsUsing human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programs
Leonardo ENERGY
 
09 planning techniques
09 planning techniques09 planning techniques
09 planning techniques
Aman Palway
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
TheAnfieldGroup
 
Lecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveLecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs Behave
Riri Ariyanty
 
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAMINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
cscpconf
 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data
csandit
 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Sudhendu Rai
 
Business process compliance
Business process compliance Business process compliance
Business process compliance
Hugo Andrés López
 
Three Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementThree Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve Management
Michael Douglas
 
SA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfSA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdf
ManjuAppukuttan2
 
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET Journal
 
Enfos erci webinar 20150224
Enfos erci webinar 20150224Enfos erci webinar 20150224
Enfos erci webinar 20150224
Chris Wade
 
Energy audit
Energy auditEnergy audit
Energy audit
swathiyarnagula
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
kendahudson
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
aulasnilda
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
herminaprocter
 
Case Study: Energy Audit
Case Study: Energy AuditCase Study: Energy Audit
Case Study: Energy Audit
IRJET Journal
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business Processes
Michael zur Muehlen
 

Similar to Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects (20)

IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
 
Anuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPT
 
Using human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsUsing human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programs
 
09 planning techniques
09 planning techniques09 planning techniques
09 planning techniques
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
Lecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveLecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs Behave
 
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAMINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data
 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
 
Business process compliance
Business process compliance Business process compliance
Business process compliance
 
Three Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementThree Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve Management
 
SA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfSA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdf
 
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
 
Enfos erci webinar 20150224
Enfos erci webinar 20150224Enfos erci webinar 20150224
Enfos erci webinar 20150224
 
Energy audit
Energy auditEnergy audit
Energy audit
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
 
Case Study: Energy Audit
Case Study: Energy AuditCase Study: Energy Audit
Case Study: Energy Audit
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business Processes
 

Recently uploaded

AWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdf
karim wahed
 
Folding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a seriesFolding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a series
Philip Schwarz
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
sudsdeep
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...
karim wahed
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
DNUG e.V.
 
Il Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazioneIl Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazione
confluent
 
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docxComprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
Aardwolf Security
 
11 Top Cross Browser Testing Tools to Know About.pdf
11 Top Cross Browser Testing Tools to Know About.pdf11 Top Cross Browser Testing Tools to Know About.pdf
11 Top Cross Browser Testing Tools to Know About.pdf
kalichargn70th171
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
DNUG e.V.
 
Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...
Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...
Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...
rachitkumar09887
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
karim wahed
 
introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...
sachin chaurasia
 
Odoo E-commerce website development guides
Odoo E-commerce website development guidesOdoo E-commerce website development guides
Odoo E-commerce website development guides
jhkdigitalmarketing
 
welcome to presentation on Google Apps
welcome to   presentation on Google Appswelcome to   presentation on Google Apps
welcome to presentation on Google Apps
AsifKarimJim
 
WEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service ProvidersWEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service Providers
Severalnines
 
The Ultimate Guide to Phone Spy Apps: Everything You Need to Know
The Ultimate Guide to Phone Spy Apps: Everything You Need to KnowThe Ultimate Guide to Phone Spy Apps: Everything You Need to Know
The Ultimate Guide to Phone Spy Apps: Everything You Need to Know
onemonitarsoftware
 
Google ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learningGoogle ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learning
VishrutGoyani1
 
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
jealousviolet
 
Introduction_to_Security_Assessments.ppt
Introduction_to_Security_Assessments.pptIntroduction_to_Security_Assessments.ppt
Introduction_to_Security_Assessments.ppt
sudsdeep
 
Top 10 Tips To Get Google AdSense For Your Website
Top 10 Tips To Get Google AdSense For Your WebsiteTop 10 Tips To Get Google AdSense For Your Website
Top 10 Tips To Get Google AdSense For Your Website
e-Definers Technology
 

Recently uploaded (20)

AWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) .pdf
 
Folding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a seriesFolding Cheat Sheet #7 - seventh in a series
Folding Cheat Sheet #7 - seventh in a series
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Final Course Know...
 
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdfdachnug51 - HCL Sametime 12 as a Software Appliance.pdf
dachnug51 - HCL Sametime 12 as a Software Appliance.pdf
 
Il Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazioneIl Data Streaming per un’AI real-time di nuova generazione
Il Data Streaming per un’AI real-time di nuova generazione
 
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docxComprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
 
11 Top Cross Browser Testing Tools to Know About.pdf
11 Top Cross Browser Testing Tools to Know About.pdf11 Top Cross Browser Testing Tools to Know About.pdf
11 Top Cross Browser Testing Tools to Know About.pdf
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
 
Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...
Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...
Agra Girls Call Agra 0X0000000X Unlimited Short Providing Girls Service Avail...
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdfAWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) AWS Security .pdf
 
introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...introduction of Ansys software and basic and advance knowledge of modelling s...
introduction of Ansys software and basic and advance knowledge of modelling s...
 
Odoo E-commerce website development guides
Odoo E-commerce website development guidesOdoo E-commerce website development guides
Odoo E-commerce website development guides
 
welcome to presentation on Google Apps
welcome to   presentation on Google Appswelcome to   presentation on Google Apps
welcome to presentation on Google Apps
 
WEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service ProvidersWEBINAR SLIDES: CCX for Cloud Service Providers
WEBINAR SLIDES: CCX for Cloud Service Providers
 
The Ultimate Guide to Phone Spy Apps: Everything You Need to Know
The Ultimate Guide to Phone Spy Apps: Everything You Need to KnowThe Ultimate Guide to Phone Spy Apps: Everything You Need to Know
The Ultimate Guide to Phone Spy Apps: Everything You Need to Know
 
Google ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learningGoogle ML-Kit - Understanding on-device machine learning
Google ML-Kit - Understanding on-device machine learning
 
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
VVIP Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
 
Introduction_to_Security_Assessments.ppt
Introduction_to_Security_Assessments.pptIntroduction_to_Security_Assessments.ppt
Introduction_to_Security_Assessments.ppt
 
Top 10 Tips To Get Google AdSense For Your Website
Top 10 Tips To Get Google AdSense For Your WebsiteTop 10 Tips To Get Google AdSense For Your Website
Top 10 Tips To Get Google AdSense For Your Website
 

Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects

  • 1. Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects Dina Bayomie, Kate Revoredo, Jan Mendling
  • 3. PAGE 3 Introduction RQ: What is the relation between control- flow perspective and data objects behavior perspective? We propose a multi-perspective mining technique based on association rule mining to discover the data connections between the control-flow and data objects behavior. - - - -
  • 4. PAGE 4 Event Log Rule Miner (EL-RM)
  • 5. PAGE 5 Preparing the Event log • Prepare the data to align with the process analysts analysis objectives Log partition- time frame - - - - - - - -
  • 6. - - PAGE 6 Encoding event log into transaction table • A transaction table sustains the control-flow perspective and the change behavior over the data perspective. • A transaction represents the behavior of the data attributes over a pair of events. Control-flow perspective Atomic perspective Complex perspective
  • 7. - - PAGE 7 Encoding event log into transaction table
  • 8. - - PAGE 8 Encoding event log into transaction table
  • 9. PAGE 9 Association rule mining 𝐈𝐅 𝑒𝑖. 𝐴𝑐𝑡 = 𝑎 ∧ 𝑒𝑗. 𝐴𝑐𝑡 = 𝑏 𝐓𝐇𝐄𝐍 𝑒𝑖. 𝐴𝑡𝑡𝑟 ≶ 𝑒𝑗. 𝐴𝑡𝑡𝑟 ≶: < | > | = | ≠
  • 11. PAGE 11 Analysing the rules Ranking Combining Comparing
  • 12. PAGE 12 Analysing the rules - Ranking  We rank the rules using the known measures of association rules. 𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑅 = |(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡) ⊆ 𝑇 | |𝑇| where 𝑇 𝑖𝑠 𝑡ℎ𝑒 𝑡𝑟𝑎𝑛𝑠𝑎𝑐𝑡𝑖𝑜𝑛𝑠 𝑐𝑜𝑛𝑓𝑖𝑑𝑒𝑛𝑐𝑒 𝑅 = 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅) 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡) 𝑙𝑖𝑓𝑡 𝑅 = 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅) 𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 ∗ 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡)
  • 13.  In this step, We prepare the rules to align with the analysis objectives. PAGE 13 Analysing the rules - combining
  • 14.  EL-RM aggregates the rules based on common antecedent and common consequent. We propose three possible aggregations. 1. The first option focuses on the control-flow perspective. 2. The second option focuses on the data object perspective. 3. The third option focuses on combine both the perspectives. PAGE 14 Analysing the rules - combining
  • 15. PAGE 15 Analysing the rules - compare • we compare the rules generated from the different partitions to detect the changes in behaviour over the divisions. • We induce various sets of rules from the extracted rules by using the set operations:  All rules (Union set operation)  Common rules (intersection set operation)  Difference rules in a partition against Common rules (difference set operation)  Partition unique rules (difference set operation)
  • 16.  We conducted three exploratory experiments on three real datasets. PAGE 16 Evaluation  BPIC-2017 contains the events of the loan application process of a Dutch financial institute. The events are generated from three sub-processes, i.e., application, offer and workflow.  The log contains cases that started at the beginning of 2016 until the 1st of February 2017.
  • 17. PAGE 17 Experiment 1 – BPIC2017 Discovered rules = 751 Combine rules = 15 Confidence = [0.94,1] Lift = [0.95, 13.63] • R1: IF ei.Act = “OCreate Offer” and ej.Act = “ OCreated” THEN ei.EventID = ej.OfferID • R2: IF ei.Act =”A_Complete” and ej.Act = “ W_ValideApplication” THEN ei.Resource = ej.Resource
  • 18.  We conducted three exploratory experiments on three real datasets. PAGE 18 Evaluation  BPIC-2020 (prepaid travel) contains the events of the prepaid travel request process at Eindhoven University of Technology (TU/e).  The log covers the cases from the beginning of 2017 till the 21st of February 2019.
  • 19. PAGE 19 Experiment 2 – BPIC2020(prepaid travel) All rules = 425 Common rules = 85 Confidence = [0.99, 1] Lift = [1, 8.90] • R1: IF ei.Act =“Permit APPROVED by ADMINISTRATION” and ej.Act = “Permit APPROVED by BUDGET OWNER” THEN ei.Resource = ej.Resource • R2: IF ei.Act = “Permit APPROVED by BUDGET OWNER” and ej.Act = “Permit FINAL_APPROVED by SUPERVISOR” THEN ei.org:role != ei.org:role
  • 20.  We conducted three exploratory experiments on three real datasets. PAGE 20 Evaluation  Road traffic fine management process dataset contains the events of the road traffic fines process. The cases have a diverse cycle time duration behavior. [mention duration of shortest and longest]  The log covers the cases from the beginning of 2000 till the 18th of June 2013
  • 21. PAGE 21 Experiment 3 – Road traffic fine All rules = 239 Common rules = 159 Average confidence = 0.96 Average lift = 1.98 • R1: IF ei.Act =“Insert Fine Notification” and ej.Act = “Insert Date Appeal to Prefecture” THEN ei.NotifcationType != ej. NotifcationType • R2: IF ei.Act =“Create Fine” and ej.Act = “payment” THEN ei.NotifcationType = ej. NotifcationType
  • 22.  We proposed a multi-perspective mining technique for the discovery of data connection.  Our method uses association rules to represent the relation between the control flow perspective and its impacts on the behavior of the data objects perspective  The results of our evaluation showed the potential of the approach to extract relevant insights about the change behavior of the attributes over the events. PAGE 22 Conclusion

Editor's Notes

  1. Classical techniques focus on control-flow perspective.
  2. A key challenge of root cause analysis is to identify as many potential explanations for a process issue as possible
  3. Inspired by knowledge discovery in database process
  4. Put method small and highlight kill more text animate the figures
  5. Remove the final results
  6. Row by row and colors Animation for how we build the transition table define complex attribute explain ei ej transaction building
  7. Row by row and colors Animation for how we build the transition table define complex attribute explain ei ej transaction building
  8. Play with colors
  9. Play with colors 26 rules
  10. ADD THE EQUATION SUPPORT AND CONFIDENCE
  11. ADD THE EQUATION SUPPORT AND CONFIDENCE
  12. The log contains 6872 offer ids
  13. R1 applies for 24% in 2018 but I doesnot apply for cases in 2017
  14. Cases took from 0.5 to 1.5 year to execute
  15. What do you think about the method usefulness? As process analyst would that be useful for you. How would you like to rank the rules ?