SlideShare a Scribd company logo
Process Mining On the Interplay Between Data Science and Behavioral Science 
Open Lecture High Tech Campus Eindhoven, 11-12-2014 
Wil van der Aalst 
Scientific director of the DSC/e
https://www.coursera.org/course/procmin 
A new profession is emerging, just like computer science in the early 1980-ties!
https://www.coursera.org/course/procmin 
Requires a combination of competences!
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
DSC/e Data Science Competences
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
industrial 
engineering 
databases 
privacy 
algorithms 
visual 
analytics 
data 
science 
statistics 
stochastics 
Statistics and Stochastics
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Data Mining and Machine Learning
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Process Mining
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Large Scale Distributed Computing
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Visualization and Visual Analytics
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Domain Knowledge
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
behavioral/ 
social 
sciences 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Behavioral/Social Sciences & Privacy
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Industrial Engineering
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
data 
mining 
process 
mining visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
Databases & Algorithms
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Internet of Events
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Internet of Events: 4 sources of event data 
Internet of Events
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Internet of Events: 4 sources of event data 
Internet of ContentInternet of Events“Big Data”
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Internet of Events: 4 sources of event data 
Internet of ContentInternet of People“social” Internet of Events“Big Data”
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Internet of Events: 4 sources of event data 
Internet of ContentInternet of People“social” Internet of Things“cloud” Internet of Events“Big Data”
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Internet of Events: 4 sources of event data 
Internet of ContentInternet of People“social” Internet of ThingsInternet of Places“cloud”“mobility” Internet of Events“Big Data”
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
"Der Datenflüsterer" 
Building a relationship with data
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
DSC/e: Competences and Research Programs 
28 groups involved 
Context: Why are we using data science, 
does it have the intended effect, and will 
people accept it? 
Analysis: How to turn data into real value 
(models, answers/decisions, and 
visualizations/insights)? 
Enabling technologies: How to get the 
data and deal with computational/ 
infrastructural challenges (big data and 
hard questions)? 
Probability and Statistics 
Stochastic Networks 
Data Mining 
Process Mining 
Visualization 
Large-Scale Distributed 
Systems 
Data-Intensive Algorithms 
Data-Driven Operations 
Management 
Data-Driven Innovation and 
Business 
Human and Social Analytics 
Privacy, Security, Ethics, and 
Governance 
Internet of Things 
systems 
infrastructures 
cities 
organizations 
people 
[RP1] Process Analytics: 
Improving Service While Cutting Costs 
[RP2] Customer Journey: 
Correlating Events to Learn and Influence 
Customer Behavior 
[RP3] Smart Maintenance & Diagnostics: 
Safeguarding Availability 
[RP4] Quantified Self: 
Improving Performance and Well-Being 
[RP5] Data Value and Privacy: 
Economic and Legal Aspects of Data Science 
[RP6] Smart Cities: 
Ensuring Safety and Convenience for Citizens 
[RP7] Smart Grids: 
Data Intensive Infrastructures 
[RP1] Process Analytics: 
Improving Service While Cutting Costs 
[RP2] Customer Journey: 
Correlating Events to Learn and Influence Customer Behavior 
[RP3] Smart Maintenance & Diagnostics: 
Safeguarding Availability 
[RP4] Quantified Self: 
Improving Performance and Well-Being 
[RP5] Data Value and Privacy: 
Economic and Legal Aspects of Data Science 
[RP6] Smart Cities: 
Ensuring Safety and Convenience for Citizens 
[RP7] Smart Grids: 
Data Intensive Infrastructures
Data Science Flagship (Philips & DSC/e) 
•4 Strategic topics 
•4 TU/e departments 
•16 PhD students 
•30 Data science specialists 
1.Data Driven Value Propositions 
2.Healthcare Smart Maintenance 
3.Optimizing Healthcare Workflows 
4.Continuous Personal Health
Process Mining Let's Play
data 
mining 
process 
mining 
visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics
data 
mining 
process 
mining 
visualization 
data 
science 
behavioral/ 
social 
sciences 
domain 
knowledge 
machine 
learning 
large scale 
distributed 
computing 
statistics industrial 
engineering 
databases 
stochastics 
privacy 
algorithms 
visual 
analytics 
formal 
methods 
business 
process 
management 
concurrency 
business 
process re-engineering 
process 
science 
model 
checking Petri nets 
BPMN
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
Case Activity Timestamp Resource 
432 register travel request (a) 18-3-2014:9.15 John 
432 get support from local manager (b) 18-3-2014:9.25 Mary 
432 check budget by finance (d) 19-3-2014:8.55 John 
432 decide (e) 19-3-2014:9.36 Sue 
432 accept request (g) 19-3-2014:9.48 Mary 
Play-In 
Play-Out 
Replay 
Let's play
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Play-Out 
register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startend Case Activity TimestampResource432 register travel request (a)18-3-2014:9.15John432 get support from local manager (b) 18-3-2014:9.25Mary432 check budget by finance (d)19-3-2014:8.55John432 decide (e)19-3-2014:9.36Sue432 accept request (g)19-3-2014:9.48Mary
Play Out: A possible scenario 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
AND-split 
XOR-split 
XOR-join 
XOR-join 
AND-join 
XOR-split 
XOR-join 
a b d e g 
Case Activity Timestamp Resource 
432 register travel request (a) 18-3-2014:9.15 John 
432 get support from local manager (b) 18-3-2014:9.25 Mary 
432 check budget by finance (d) 19-3-2014:8.55 John 
432 decide (e) 19-3-2014:9.36 Sue 
432 accept request (g) 19-3-2014:9.48 Mary
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Play Out: Another scenario 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
a d c e f b d e h
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Play Out: Process model allows for many 
more scenarios 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
abdeg 
abcefbdeh 
adceg adbeh 
acbefbdeh 
acdefcdefbdeh 
adcefcdefbdefbdeg 
adceahd beh abdeg 
acdefcdefabcdbeehfb deg 
adcefcdefbdefbdeg 
abdeg 
adceh 
adbeh 
acdefcdefabcdbeehf bdeg 
adcefcdefbdefbdeg 
abdeg
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Play-In 
register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startend Case Activity TimestampResource432 register travel request (a)18-3-2014:9.15John432 get support from local manager (b) 18-3-2014:9.25Mary432 check budget by finance (d)19-3-2014:8.55John432 decide (e)19-3-2014:9.36Sue432 accept request (g)19-3-2014:9.48Mary
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Loesje van der Aalst 
desire line
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Play In: Simple process allowing for 4 traces 
abdeg 
adbeg 
abdeh 
adbeh 
abdeg 
adbeg 
abdeh 
adbeh 
abdeh 
abdeh 
abdeh 
adbeh 
adbeh 
register travel request (a) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) startend
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Play In: Process allowing for more traces 
abdeg 
abcefbdeh 
adceg 
adbeh 
acbefbdeh 
acdefcdefbdeh 
adcefcdefbdefbdeg 
abdeg 
adceh 
adbeh 
acbefbdeg 
acdefcdefbdeh 
adcefcdefbdefbdeg 
abdeg 
adceh 
adbeh 
acbefbdeg 
acdefcdefbdeh 
adcefcdefbdefbdeg 
abdeg 
register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startend
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
No modeling needed!
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Example Process Discovery (Dutch housing agency, 208 cases, 5987 events)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Replay 
register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startendCase Activity TimestampResource432 register travel request (a)18-3-2014:9.15John432 get support from local manager (b) 18-3-2014:9.25Mary432 check budget by finance (d)19-3-2014:8.55John432 decide (e)19-3-2014:9.36Sue432 accept request (g)19-3-2014:9.48Mary
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
event data 
process model
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
desire line 
very safe system
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Replay 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
a c d e g
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Replay 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
a c 
check budget (d) 
is missing! 
e g 
?
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Replay 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
a c h d e g 
reject request (h) is 
impossible ?
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Conformance Checking (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Replay with timestamps 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
a9.15 c9.20 d9.35 e10.15 g11.30 
9.15 
9.20 
9.35 
10.15 
11.30 
5 55 
20 40 
75
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Replay with timestamps 
register travel 
request (a) 
get detailed 
motivation 
letter (c) 
get support 
from local 
manager (b) 
check budget 
by finance (d) 
decide (e) 
accept 
request (g) 
reject 
request (h) 
reinitiate 
request (f) 
start end 
5 55 
20 
40 
75 
15 
20 
60 
45 
65 
20 
25 
45 
55 
50 
5 55 
20 40 
75 
15 
20 
60 
45 
65 
20 
25 
45 
55 
50 
5 
20 55 
40 
75 
15 
20 
60 
45 
65 
20 
25 
45 
55 
50
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Performance Analysis Using Replay (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
software 
system 
(process) 
model 
event 
logs 
models 
analyzes 
discovery 
records 
events, e.g., 
messages, 
transactions, 
etc. 
specifies 
configures 
implements 
analyzes 
supports/ 
controls 
enhancement 
conformance 
“world” 
people machines 
organizations 
components 
business 
processes 
Overview 
Play-In 
Play-Out 
Replay
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Process Mining Software
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
600+ plug-ins available covering the whole process mining spectrum
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
Process Discovery
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Starting point for process mining: Event data 
student name 
course name 
exam date 
mark 
Peter Jones 
Business Information systems 
16-1-2014 
8 
Sandy Scott 
Business Information systems 
16-1-2014 
5 
Bridget White 
Business Information systems 
16-1-2014 
9 
John Anderson 
Business Information systems 
16-1-2014 
8 
Sandy Scott 
BPM Systems 
17-1-2014 
7 
Bridget White 
BPM Systems 
17-1-2014 
8 
Sandy Scott 
Process Mining 
20-1-2014 
5 
Bridget White 
Process Mining 
20-1-2014 
9 
John Anderson 
Process Mining 
20-1-2014 
8 
… 
… 
… 
… 
case id 
activity name 
timestamp 
other data 
every row is an event 
(here: an exam attempt)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Another event log: patient treatment 
patient 
activity 
timestamp 
doctor 
age 
cost 
5781 
make X-ray 
23-1-2014@10.30 
Dr. Jones 
45 
70.00 
5541 
blood test 
23-1-2014@10.18 
Dr. Scott 
61 
40.00 
5833 
blood test 
23-1-2014@10.27 
Dr. Scott 
24 
40.00 
5781 
blood test 
23-1-2014@10.49 
Dr. Scott 
45 
40.00 
5781 
CT scan 
23-1-2014@11.10 
Dr. Fox 
45 
1200.00 
5833 
surgery 
23-1-2014@12.34 
Dr. Scott 
24 
2300.00 
5781 
handle payment 
23-1-2014@12.41 
Carol Hope 
45 
0.00 
5541 
radiation therapy 
23-1-2014@13.57 
Dr. Jones 
61 
140.00 
5541 
radiation therapy 
23-1-2014@13.08 
Dr. Jones 
61 
140.00 
… 
… 
… 
… 
… 
… 
case id 
activity name 
timestamp 
other data 
resource
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Another event log: order handling 
order number 
activity 
timestamp 
user 
product 
quantity 
9901 
register order 
22-1-2014@09.15 
Sara Jones 
iPhone5S 
1 
9902 
register order 
22-1-2014@09.18 
Sara Jones 
iPhone5S 
2 
9903 
register order 
22-1-2014@09.27 
Sara Jones 
iPhone4S 
1 
9901 
check stock 
22-1-2014@09.49 
Pete Scott 
iPhone5S 
1 
9901 
ship order 
22-1-2014@10.11 
Sue Fox 
iPhone5S 
1 
9903 
check stock 
22-1-2014@10.34 
Pete Scott 
iPhone4S 
1 
9901 
handle payment 
22-1-2014@10.41 
Carol Hope 
iPhone5S 
1 
9902 
check stock 
22-1-2014@10.57 
Pete Scott 
iPhone5S 
2 
9902 
cancel order 
22-1-2014@11.08 
Carol Hope 
iPhone5S 
2 
… 
… 
… 
… 
… 
… 
case id 
activity name 
timestamp 
other data 
resource
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Simplifying event logs when focusing on control-flow 
order number 
activity 
timestamp 
user 
product 
quantity 
9901 
register order 
22-1-2014@09.15 
Sara Jones 
iPhone5S 
1 
9902 
register order 
22-1-2014@09.18 
Sara Jones 
iPhone5S 
2 
9903 
register order 
22-1-2014@09.27 
Sara Jones 
iPhone4S 
1 
9901 
check stock 
22-1-2014@09.49 
Pete Scott 
iPhone5S 
1 
9901 
ship order 
22-1-2014@10.11 
Sue Fox 
iPhone5S 
1 
9903 
check stock 
22-1-2014@10.34 
Pete Scott 
iPhone4S 
1 
9901 
handle payment 
22-1-2014@10.41 
Carol Hope 
iPhone5S 
1 
9902 
check stock 
22-1-2014@10.57 
Pete Scott 
iPhone5S 
2 
9902 
cancel order 
22-1-2014@11.08 
Carol Hope 
iPhone5S 
2 
… 
… 
… 
… 
… 
… 
[ register_order, check_stock,ship_order,handle_payment, 
register_order, check_stock,cancel_order, 
register_order, check_stock , …]
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Simple event log 
•An event log is a multiset of traces (same trace may appear multiple times). 
•A trace is a sequence of activity names (we abstract from all other attributes, but events are ordered).
alpha 
mining
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Goal of Alpha algorithm 
a 
b 
c 
e d 
p2 
end 
p4 
p1 p3 
start 
Event log contains all possible 
traces of model and vice versa.
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Another example 
a 
b 
c 
f d 
p2 
end 
p4 
p1 p3 
start 
e 
p5 
Generalization: event 
log contains only 
subset of all possible 
traces of model.
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Notation is less relevant (e.g. BPMN) 
a 
b 
c 
e d 
p2 
end 
p4 
p1 p3 
start 
a 
start end 
b 
c 
e 
d
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Another BPMN example 
a 
b 
c 
f d 
p2 
end 
p4 
p1 p3 
start 
e 
p5 
a 
start end 
b 
c 
e 
d 
f
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
>,,||,# relations 
•Direct succession: x>y iff for some case x is directly followed by y. 
•Causality: xy iff x>y and not y>x. 
•Parallel: x||y iff x>y and y>x 
•Choice: x#y iff not x>y and not y>x. 
a>b 
a>c 
a>e 
b>c 
b>d 
c>b 
c>d 
e>d 
ab 
ac 
ae 
bd 
cd 
ed 
b||c 
c||b 
abcd 
acbd 
aed 
b#e 
e#b 
c#e 
a#d 
…
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Basic Idea Used by Alpha Algorithm (1) 
ab(a) sequence pattern: a→b
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Basic Idea Used by Alpha Algorithm (2) 
a 
b 
c 
(b) XOR-split pattern: 
a→b, a→c, and b#c 
a 
b 
c 
(b) XOR-split pattern: 
a→b, a→c, and b#c 
b 
c 
d 
(c) XOR-join pattern: 
b→d, c→d, and b#c
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Basic Idea Used by Alpha Algorithm (3) 
a 
b 
c 
(d) AND-split pattern: 
a→b, a→c, and b||c 
b 
c 
d 
(e) AND-join pattern: 
b→d, c→d, and b||c 
a 
b 
c 
(d) AND-split pattern: 
a→b, a→c, and b||c
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Example Revisited 
Result produced by 
the Alpha algorithm 
a>b 
a>c 
a>e 
b>c 
b>d 
c>b 
c>d 
e>d 
ab 
ac 
ae 
bd 
cd 
ed 
b||c 
c||b 
b#e 
e#b 
c#e 
a#d 
… 
a 
b 
c 
e d 
p2 
end 
p4 
p1 p3 
start
inductive 
mining
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split event logs based on activity labels 
abdef 
acdef 
adbef 
adcef 
abdeg 
acdeg 
adbeg 
adceg
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split {a,b,c,d,e,f,g,h} into {a,b,c,d} and {e,f,g} using sequence decomposition 
abdef 
acdef 
adbef 
adcef 
abdeg 
acdeg 
adbeg 
adceg
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Result 
abd 
acd 
adb 
adc 
abd 
acd 
adb 
adc 
ef 
ef 
ef 
ef 
eg 
eg 
eg 
eg 
seq 
abdef 
acdef 
adbef 
adcef 
abdeg 
acdeg 
adbeg 
adceg
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split {a,b,c,d} into {a} and {b,c,d} using sequence decomposition 
abd 
acd 
adb 
adc 
abd 
acd 
adb 
adc 
ef 
ef 
ef 
ef 
eg 
eg 
eg 
eg 
seq
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Result 
bd 
cd 
db 
dc 
bd 
cd 
db 
dc 
ef 
ef 
ef 
ef 
eg 
eg 
eg 
eg 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split {e,f,g} into {e} and {f,g} using sequence decomposition 
bd 
cd 
db 
dc 
bd 
cd 
db 
dc 
ef 
ef 
ef 
ef 
eg 
eg 
eg 
eg 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Result 
bd 
cd 
db 
dc 
bd 
cd 
db 
dc 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
f 
f 
f 
f 
g 
g 
g 
g
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split {f,g} into {f} and {g} using XOR decomposition 
bd 
cd 
db 
dc 
bd 
cd 
db 
dc 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
f 
f 
f 
f 
g 
g 
g 
g
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Result 
bd 
cd 
db 
dc 
bd 
cd 
db 
dc 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
f 
f 
f 
f 
g 
g 
g 
g 
xor
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split {b,c,d} into {b,c} and {d} using AND decomposition 
bd 
cd 
db 
dc 
bd 
cd 
db 
dc 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
f 
f 
f 
f 
g 
g 
g 
g 
xor
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Result 
d 
d 
d 
d 
d 
d 
d 
d 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
f 
f 
f 
f 
g 
g 
g 
g 
xor 
b 
c 
b 
c 
b 
c 
b 
c 
par
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Split {b,c} into {b} and {c} using XOR decomposition 
d 
d 
d 
d 
d 
d 
d 
d 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
f 
f 
f 
f 
g 
g 
g 
g 
xor 
b 
c 
b 
c 
b 
c 
b 
c 
par
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Result 
d 
d 
d 
d 
d 
d 
d 
d 
e 
e 
e 
e 
e 
e 
e 
e 
seq 
a 
a 
a 
a 
a 
a 
a 
a 
seq 
seq 
par 
b 
b 
b 
b 
c 
c 
c 
c 
xor 
… 
no further decomposition is possible
©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 
Process tree 
abdef 
acdef 
adbef 
adcef 
abdeg 
acdeg 
adbeg 
adceg 
seq 
abd 
acd 
adb 
adc 
ef 
eg 
a 
bd 
cd 
db 
dc 
seq 
seq 
e 
f 
g xor 
f 
g 
par 
d 
b 
c xor 
b 
c 
a 
start 
b 
c 
d 
e 
f 
g 
end 
a 
c 
b 
d 
e 
f 
g start end
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
Conclusion
data science 
process science
process miningdata-oriented analysis process model analysis (simulation, verification, optimization, gaming, etc.) (data mining, machine learning, business intelligence)
process miningdata-oriented analysis process model analysis performance- oriented questions, problems and solutionscompliance- oriented questions, problems and solutions(simulation, verification, optimization, gaming, etc.) (data mining, machine learning, business intelligence)
Process Mining 
Data Science in Action 
https://www.coursera.org/course/procmin 
38.000+ people joined!
ProM
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
©Wil van der Aalst & TU/e (use only with permission & acknowledgements)

More Related Content

Similar to Open Lecture Wil van der Aalst

Big Data Expo 2015 - Cisco Connected Analytics
Big Data Expo 2015 - Cisco Connected AnalyticsBig Data Expo 2015 - Cisco Connected Analytics
Big Data Expo 2015 - Cisco Connected Analytics
BigDataExpo
 
Risk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growthRisk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growth
DataWorks Summit
 
Risk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growthRisk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growth
DataWorks Summit
 
Smart Cities, Smart Cars, Smart Living
Smart Cities, Smart Cars, Smart LivingSmart Cities, Smart Cars, Smart Living
Smart Cities, Smart Cars, Smart Living
Marie-Paule Odini
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
brigel529
 
A management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - ChallengesA management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - Challenges
Sven Beauprez
 
THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...
THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...
THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...
Denodo
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector
Bessie Wang
 
Big data in freight transport
Big data in freight transportBig data in freight transport
Big data in freight transport
Per Olof Arnäs
 
Semantic Data Enrichment: a Human-in-the-Loop Perspective
Semantic Data Enrichment: a Human-in-the-Loop PerspectiveSemantic Data Enrichment: a Human-in-the-Loop Perspective
Semantic Data Enrichment: a Human-in-the-Loop Perspective
Università degli Studi di Milano-Bicocca
 
Big Data & Smart City Applications
Big Data & Smart City ApplicationsBig Data & Smart City Applications
Big Data & Smart City Applications
Amit Sheth
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
IPPAI
 
Meeting the future - Big data in freight transport
Meeting the future - Big data in freight transportMeeting the future - Big data in freight transport
Meeting the future - Big data in freight transport
Per Olof Arnäs
 
Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...
Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...
Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...
Kai Wähner
 
No big data without small data
No big data without small dataNo big data without small data
No big data without small data
Norman Manley
 
New York City Technology Forum 2015
New York City Technology Forum 2015New York City Technology Forum 2015
New York City Technology Forum 2015
Splunk
 
NYC Technology Forum 2015
NYC Technology Forum 2015NYC Technology Forum 2015
NYC Technology Forum 2015
Splunk
 
Smart Cities: M&A Opportunities
Smart Cities: M&A OpportunitiesSmart Cities: M&A Opportunities
Smart Cities: M&A Opportunities
World Financial Symposiums
 
Executive Summit for ISV & Application builders - January 2015
Executive Summit for ISV & Application builders - January 2015Executive Summit for ISV & Application builders - January 2015
Executive Summit for ISV & Application builders - January 2015
Microsoft Developer Network (MSDN) - Belgium and Luxembourg
 
SplunkLive! Utrecht - Keynote - Rick Fitz
SplunkLive! Utrecht - Keynote - Rick FitzSplunkLive! Utrecht - Keynote - Rick Fitz
SplunkLive! Utrecht - Keynote - Rick Fitz
Splunk
 

Similar to Open Lecture Wil van der Aalst (20)

Big Data Expo 2015 - Cisco Connected Analytics
Big Data Expo 2015 - Cisco Connected AnalyticsBig Data Expo 2015 - Cisco Connected Analytics
Big Data Expo 2015 - Cisco Connected Analytics
 
Risk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growthRisk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growth
 
Risk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growthRisk listening: monitoring for profitable growth
Risk listening: monitoring for profitable growth
 
Smart Cities, Smart Cars, Smart Living
Smart Cities, Smart Cars, Smart LivingSmart Cities, Smart Cars, Smart Living
Smart Cities, Smart Cars, Smart Living
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
A management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - ChallengesA management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - Challenges
 
THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...
THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...
THE INDUSTRY'S FIRST VIRTUAL EVENT IN ROMANIA - Why Data Virtualization is a ...
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector
 
Big data in freight transport
Big data in freight transportBig data in freight transport
Big data in freight transport
 
Semantic Data Enrichment: a Human-in-the-Loop Perspective
Semantic Data Enrichment: a Human-in-the-Loop PerspectiveSemantic Data Enrichment: a Human-in-the-Loop Perspective
Semantic Data Enrichment: a Human-in-the-Loop Perspective
 
Big Data & Smart City Applications
Big Data & Smart City ApplicationsBig Data & Smart City Applications
Big Data & Smart City Applications
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
 
Meeting the future - Big data in freight transport
Meeting the future - Big data in freight transportMeeting the future - Big data in freight transport
Meeting the future - Big data in freight transport
 
Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...
Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...
Apache Kafka in the Public Sector (Government, National Security, Citizen Ser...
 
No big data without small data
No big data without small dataNo big data without small data
No big data without small data
 
New York City Technology Forum 2015
New York City Technology Forum 2015New York City Technology Forum 2015
New York City Technology Forum 2015
 
NYC Technology Forum 2015
NYC Technology Forum 2015NYC Technology Forum 2015
NYC Technology Forum 2015
 
Smart Cities: M&A Opportunities
Smart Cities: M&A OpportunitiesSmart Cities: M&A Opportunities
Smart Cities: M&A Opportunities
 
Executive Summit for ISV & Application builders - January 2015
Executive Summit for ISV & Application builders - January 2015Executive Summit for ISV & Application builders - January 2015
Executive Summit for ISV & Application builders - January 2015
 
SplunkLive! Utrecht - Keynote - Rick Fitz
SplunkLive! Utrecht - Keynote - Rick FitzSplunkLive! Utrecht - Keynote - Rick Fitz
SplunkLive! Utrecht - Keynote - Rick Fitz
 

More from High Tech Campus Eindhoven

Open Lecture Aarnout Brombacher - July 18, 2016
Open Lecture Aarnout Brombacher - July 18, 2016Open Lecture Aarnout Brombacher - July 18, 2016
Open Lecture Aarnout Brombacher - July 18, 2016
High Tech Campus Eindhoven
 
Open Lecture Peter Hilbers - July 8, 2016
Open Lecture Peter Hilbers - July 8, 2016Open Lecture Peter Hilbers - July 8, 2016
Open Lecture Peter Hilbers - July 8, 2016
High Tech Campus Eindhoven
 
Campus comm mngrs bijeenkomst January 2013
Campus comm mngrs bijeenkomst January 2013Campus comm mngrs bijeenkomst January 2013
Campus comm mngrs bijeenkomst January 2013
High Tech Campus Eindhoven
 
High Tech Campus Eindhoven - General presentation NL
High Tech Campus Eindhoven - General presentation NLHigh Tech Campus Eindhoven - General presentation NL
High Tech Campus Eindhoven - General presentation NLHigh Tech Campus Eindhoven
 
High Tech Campus Eindhoven - General presentation eng
High Tech Campus Eindhoven - General presentation engHigh Tech Campus Eindhoven - General presentation eng
High Tech Campus Eindhoven - General presentation eng
High Tech Campus Eindhoven
 
Presentatie leo sleuwaegen eindhoven 22 juni
Presentatie leo sleuwaegen   eindhoven 22 juniPresentatie leo sleuwaegen   eindhoven 22 juni
Presentatie leo sleuwaegen eindhoven 22 juni
High Tech Campus Eindhoven
 
Nl2040 eindhoven 100909
Nl2040 eindhoven 100909Nl2040 eindhoven 100909
Nl2040 eindhoven 100909
High Tech Campus Eindhoven
 

More from High Tech Campus Eindhoven (8)

Open Lecture Aarnout Brombacher - July 18, 2016
Open Lecture Aarnout Brombacher - July 18, 2016Open Lecture Aarnout Brombacher - July 18, 2016
Open Lecture Aarnout Brombacher - July 18, 2016
 
Open Lecture Peter Hilbers - July 8, 2016
Open Lecture Peter Hilbers - July 8, 2016Open Lecture Peter Hilbers - July 8, 2016
Open Lecture Peter Hilbers - July 8, 2016
 
Campus comm mngrs bijeenkomst January 2013
Campus comm mngrs bijeenkomst January 2013Campus comm mngrs bijeenkomst January 2013
Campus comm mngrs bijeenkomst January 2013
 
High Tech Campus Eindhoven - General presentation NL
High Tech Campus Eindhoven - General presentation NLHigh Tech Campus Eindhoven - General presentation NL
High Tech Campus Eindhoven - General presentation NL
 
High Tech Campus Eindhoven - General presentation eng
High Tech Campus Eindhoven - General presentation engHigh Tech Campus Eindhoven - General presentation eng
High Tech Campus Eindhoven - General presentation eng
 
Presentatie leo sleuwaegen eindhoven 22 juni
Presentatie leo sleuwaegen   eindhoven 22 juniPresentatie leo sleuwaegen   eindhoven 22 juni
Presentatie leo sleuwaegen eindhoven 22 juni
 
Campus communicatie mngr meeting 13 december
Campus communicatie mngr meeting   13 decemberCampus communicatie mngr meeting   13 december
Campus communicatie mngr meeting 13 december
 
Nl2040 eindhoven 100909
Nl2040 eindhoven 100909Nl2040 eindhoven 100909
Nl2040 eindhoven 100909
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Open Lecture Wil van der Aalst

  • 1. Process Mining On the Interplay Between Data Science and Behavioral Science Open Lecture High Tech Campus Eindhoven, 11-12-2014 Wil van der Aalst Scientific director of the DSC/e
  • 2. https://www.coursera.org/course/procmin A new profession is emerging, just like computer science in the early 1980-ties!
  • 4. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics DSC/e Data Science Competences
  • 5. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization behavioral/ social sciences domain knowledge machine learning large scale distributed computing industrial engineering databases privacy algorithms visual analytics data science statistics stochastics Statistics and Stochastics
  • 6. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Data Mining and Machine Learning
  • 7. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Process Mining
  • 8. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Large Scale Distributed Computing
  • 9. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Visualization and Visual Analytics
  • 10. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Domain Knowledge
  • 11. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science domain knowledge machine learning large scale distributed computing statistics industrial engineering behavioral/ social sciences databases stochastics privacy algorithms visual analytics Behavioral/Social Sciences & Privacy
  • 12. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Industrial Engineering
  • 13. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics Databases & Algorithms
  • 14. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Internet of Events
  • 15. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Internet of Events: 4 sources of event data Internet of Events
  • 16. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Internet of Events: 4 sources of event data Internet of ContentInternet of Events“Big Data”
  • 17. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Internet of Events: 4 sources of event data Internet of ContentInternet of People“social” Internet of Events“Big Data”
  • 18. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Internet of Events: 4 sources of event data Internet of ContentInternet of People“social” Internet of Things“cloud” Internet of Events“Big Data”
  • 19. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Internet of Events: 4 sources of event data Internet of ContentInternet of People“social” Internet of ThingsInternet of Places“cloud”“mobility” Internet of Events“Big Data”
  • 20. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) "Der Datenflüsterer" Building a relationship with data
  • 21.
  • 22. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) DSC/e: Competences and Research Programs 28 groups involved Context: Why are we using data science, does it have the intended effect, and will people accept it? Analysis: How to turn data into real value (models, answers/decisions, and visualizations/insights)? Enabling technologies: How to get the data and deal with computational/ infrastructural challenges (big data and hard questions)? Probability and Statistics Stochastic Networks Data Mining Process Mining Visualization Large-Scale Distributed Systems Data-Intensive Algorithms Data-Driven Operations Management Data-Driven Innovation and Business Human and Social Analytics Privacy, Security, Ethics, and Governance Internet of Things systems infrastructures cities organizations people [RP1] Process Analytics: Improving Service While Cutting Costs [RP2] Customer Journey: Correlating Events to Learn and Influence Customer Behavior [RP3] Smart Maintenance & Diagnostics: Safeguarding Availability [RP4] Quantified Self: Improving Performance and Well-Being [RP5] Data Value and Privacy: Economic and Legal Aspects of Data Science [RP6] Smart Cities: Ensuring Safety and Convenience for Citizens [RP7] Smart Grids: Data Intensive Infrastructures [RP1] Process Analytics: Improving Service While Cutting Costs [RP2] Customer Journey: Correlating Events to Learn and Influence Customer Behavior [RP3] Smart Maintenance & Diagnostics: Safeguarding Availability [RP4] Quantified Self: Improving Performance and Well-Being [RP5] Data Value and Privacy: Economic and Legal Aspects of Data Science [RP6] Smart Cities: Ensuring Safety and Convenience for Citizens [RP7] Smart Grids: Data Intensive Infrastructures
  • 23. Data Science Flagship (Philips & DSC/e) •4 Strategic topics •4 TU/e departments •16 PhD students •30 Data science specialists 1.Data Driven Value Propositions 2.Healthcare Smart Maintenance 3.Optimizing Healthcare Workflows 4.Continuous Personal Health
  • 25. data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics
  • 26. data mining process mining visualization data science behavioral/ social sciences domain knowledge machine learning large scale distributed computing statistics industrial engineering databases stochastics privacy algorithms visual analytics formal methods business process management concurrency business process re-engineering process science model checking Petri nets BPMN
  • 27. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end Case Activity Timestamp Resource 432 register travel request (a) 18-3-2014:9.15 John 432 get support from local manager (b) 18-3-2014:9.25 Mary 432 check budget by finance (d) 19-3-2014:8.55 John 432 decide (e) 19-3-2014:9.36 Sue 432 accept request (g) 19-3-2014:9.48 Mary Play-In Play-Out Replay Let's play
  • 28. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Play-Out register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startend Case Activity TimestampResource432 register travel request (a)18-3-2014:9.15John432 get support from local manager (b) 18-3-2014:9.25Mary432 check budget by finance (d)19-3-2014:8.55John432 decide (e)19-3-2014:9.36Sue432 accept request (g)19-3-2014:9.48Mary
  • 29. Play Out: A possible scenario register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end AND-split XOR-split XOR-join XOR-join AND-join XOR-split XOR-join a b d e g Case Activity Timestamp Resource 432 register travel request (a) 18-3-2014:9.15 John 432 get support from local manager (b) 18-3-2014:9.25 Mary 432 check budget by finance (d) 19-3-2014:8.55 John 432 decide (e) 19-3-2014:9.36 Sue 432 accept request (g) 19-3-2014:9.48 Mary
  • 30. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Play Out: Another scenario register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end a d c e f b d e h
  • 31. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Play Out: Process model allows for many more scenarios register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end abdeg abcefbdeh adceg adbeh acbefbdeh acdefcdefbdeh adcefcdefbdefbdeg adceahd beh abdeg acdefcdefabcdbeehfb deg adcefcdefbdefbdeg abdeg adceh adbeh acdefcdefabcdbeehf bdeg adcefcdefbdefbdeg abdeg
  • 32. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Play-In register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startend Case Activity TimestampResource432 register travel request (a)18-3-2014:9.15John432 get support from local manager (b) 18-3-2014:9.25Mary432 check budget by finance (d)19-3-2014:8.55John432 decide (e)19-3-2014:9.36Sue432 accept request (g)19-3-2014:9.48Mary
  • 33. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Loesje van der Aalst desire line
  • 34. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Play In: Simple process allowing for 4 traces abdeg adbeg abdeh adbeh abdeg adbeg abdeh adbeh abdeh abdeh abdeh adbeh adbeh register travel request (a) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) startend
  • 35. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Play In: Process allowing for more traces abdeg abcefbdeh adceg adbeh acbefbdeh acdefcdefbdeh adcefcdefbdefbdeg abdeg adceh adbeh acbefbdeg acdefcdefbdeh adcefcdefbdefbdeg abdeg adceh adbeh acbefbdeg acdefcdefbdeh adcefcdefbdefbdeg abdeg register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startend
  • 36. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) No modeling needed!
  • 37. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Example Process Discovery (Dutch housing agency, 208 cases, 5987 events)
  • 38. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Replay register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) startendCase Activity TimestampResource432 register travel request (a)18-3-2014:9.15John432 get support from local manager (b) 18-3-2014:9.25Mary432 check budget by finance (d)19-3-2014:8.55John432 decide (e)19-3-2014:9.36Sue432 accept request (g)19-3-2014:9.48Mary
  • 39. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) event data process model
  • 40. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) desire line very safe system
  • 41. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Replay register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end a c d e g
  • 42. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Replay register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end a c check budget (d) is missing! e g ?
  • 43. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Replay register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end a c h d e g reject request (h) is impossible ?
  • 44. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Conformance Checking (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988)
  • 45. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Replay with timestamps register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end a9.15 c9.20 d9.35 e10.15 g11.30 9.15 9.20 9.35 10.15 11.30 5 55 20 40 75
  • 46. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Replay with timestamps register travel request (a) get detailed motivation letter (c) get support from local manager (b) check budget by finance (d) decide (e) accept request (g) reject request (h) reinitiate request (f) start end 5 55 20 40 75 15 20 60 45 65 20 25 45 55 50 5 55 20 40 75 15 20 60 45 65 20 25 45 55 50 5 20 55 40 75 15 20 60 45 65 20 25 45 55 50
  • 47. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Performance Analysis Using Replay (WOZ objections Dutch municipality, 745 objections, 9583 event, f= 0.988)
  • 48. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) software system (process) model event logs models analyzes discovery records events, e.g., messages, transactions, etc. specifies configures implements analyzes supports/ controls enhancement conformance “world” people machines organizations components business processes Overview Play-In Play-Out Replay
  • 49. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Process Mining Software
  • 50. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) 600+ plug-ins available covering the whole process mining spectrum
  • 51. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
  • 53. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Starting point for process mining: Event data student name course name exam date mark Peter Jones Business Information systems 16-1-2014 8 Sandy Scott Business Information systems 16-1-2014 5 Bridget White Business Information systems 16-1-2014 9 John Anderson Business Information systems 16-1-2014 8 Sandy Scott BPM Systems 17-1-2014 7 Bridget White BPM Systems 17-1-2014 8 Sandy Scott Process Mining 20-1-2014 5 Bridget White Process Mining 20-1-2014 9 John Anderson Process Mining 20-1-2014 8 … … … … case id activity name timestamp other data every row is an event (here: an exam attempt)
  • 54. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Another event log: patient treatment patient activity timestamp doctor age cost 5781 make X-ray 23-1-2014@10.30 Dr. Jones 45 70.00 5541 blood test 23-1-2014@10.18 Dr. Scott 61 40.00 5833 blood test 23-1-2014@10.27 Dr. Scott 24 40.00 5781 blood test 23-1-2014@10.49 Dr. Scott 45 40.00 5781 CT scan 23-1-2014@11.10 Dr. Fox 45 1200.00 5833 surgery 23-1-2014@12.34 Dr. Scott 24 2300.00 5781 handle payment 23-1-2014@12.41 Carol Hope 45 0.00 5541 radiation therapy 23-1-2014@13.57 Dr. Jones 61 140.00 5541 radiation therapy 23-1-2014@13.08 Dr. Jones 61 140.00 … … … … … … case id activity name timestamp other data resource
  • 55. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Another event log: order handling order number activity timestamp user product quantity 9901 register order 22-1-2014@09.15 Sara Jones iPhone5S 1 9902 register order 22-1-2014@09.18 Sara Jones iPhone5S 2 9903 register order 22-1-2014@09.27 Sara Jones iPhone4S 1 9901 check stock 22-1-2014@09.49 Pete Scott iPhone5S 1 9901 ship order 22-1-2014@10.11 Sue Fox iPhone5S 1 9903 check stock 22-1-2014@10.34 Pete Scott iPhone4S 1 9901 handle payment 22-1-2014@10.41 Carol Hope iPhone5S 1 9902 check stock 22-1-2014@10.57 Pete Scott iPhone5S 2 9902 cancel order 22-1-2014@11.08 Carol Hope iPhone5S 2 … … … … … … case id activity name timestamp other data resource
  • 56. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Simplifying event logs when focusing on control-flow order number activity timestamp user product quantity 9901 register order 22-1-2014@09.15 Sara Jones iPhone5S 1 9902 register order 22-1-2014@09.18 Sara Jones iPhone5S 2 9903 register order 22-1-2014@09.27 Sara Jones iPhone4S 1 9901 check stock 22-1-2014@09.49 Pete Scott iPhone5S 1 9901 ship order 22-1-2014@10.11 Sue Fox iPhone5S 1 9903 check stock 22-1-2014@10.34 Pete Scott iPhone4S 1 9901 handle payment 22-1-2014@10.41 Carol Hope iPhone5S 1 9902 check stock 22-1-2014@10.57 Pete Scott iPhone5S 2 9902 cancel order 22-1-2014@11.08 Carol Hope iPhone5S 2 … … … … … … [ register_order, check_stock,ship_order,handle_payment, register_order, check_stock,cancel_order, register_order, check_stock , …]
  • 57. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Simple event log •An event log is a multiset of traces (same trace may appear multiple times). •A trace is a sequence of activity names (we abstract from all other attributes, but events are ordered).
  • 59. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Goal of Alpha algorithm a b c e d p2 end p4 p1 p3 start Event log contains all possible traces of model and vice versa.
  • 60. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Another example a b c f d p2 end p4 p1 p3 start e p5 Generalization: event log contains only subset of all possible traces of model.
  • 61. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Notation is less relevant (e.g. BPMN) a b c e d p2 end p4 p1 p3 start a start end b c e d
  • 62. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Another BPMN example a b c f d p2 end p4 p1 p3 start e p5 a start end b c e d f
  • 63. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) >,,||,# relations •Direct succession: x>y iff for some case x is directly followed by y. •Causality: xy iff x>y and not y>x. •Parallel: x||y iff x>y and y>x •Choice: x#y iff not x>y and not y>x. a>b a>c a>e b>c b>d c>b c>d e>d ab ac ae bd cd ed b||c c||b abcd acbd aed b#e e#b c#e a#d …
  • 64. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Basic Idea Used by Alpha Algorithm (1) ab(a) sequence pattern: a→b
  • 65. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Basic Idea Used by Alpha Algorithm (2) a b c (b) XOR-split pattern: a→b, a→c, and b#c a b c (b) XOR-split pattern: a→b, a→c, and b#c b c d (c) XOR-join pattern: b→d, c→d, and b#c
  • 66. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Basic Idea Used by Alpha Algorithm (3) a b c (d) AND-split pattern: a→b, a→c, and b||c b c d (e) AND-join pattern: b→d, c→d, and b||c a b c (d) AND-split pattern: a→b, a→c, and b||c
  • 67. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Example Revisited Result produced by the Alpha algorithm a>b a>c a>e b>c b>d c>b c>d e>d ab ac ae bd cd ed b||c c||b b#e e#b c#e a#d … a b c e d p2 end p4 p1 p3 start
  • 69. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split event logs based on activity labels abdef acdef adbef adcef abdeg acdeg adbeg adceg
  • 70. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split {a,b,c,d,e,f,g,h} into {a,b,c,d} and {e,f,g} using sequence decomposition abdef acdef adbef adcef abdeg acdeg adbeg adceg
  • 71. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Result abd acd adb adc abd acd adb adc ef ef ef ef eg eg eg eg seq abdef acdef adbef adcef abdeg acdeg adbeg adceg
  • 72. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split {a,b,c,d} into {a} and {b,c,d} using sequence decomposition abd acd adb adc abd acd adb adc ef ef ef ef eg eg eg eg seq
  • 73. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Result bd cd db dc bd cd db dc ef ef ef ef eg eg eg eg seq a a a a a a a a seq
  • 74. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split {e,f,g} into {e} and {f,g} using sequence decomposition bd cd db dc bd cd db dc ef ef ef ef eg eg eg eg seq a a a a a a a a seq
  • 75. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Result bd cd db dc bd cd db dc e e e e e e e e seq a a a a a a a a seq seq f f f f g g g g
  • 76. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split {f,g} into {f} and {g} using XOR decomposition bd cd db dc bd cd db dc e e e e e e e e seq a a a a a a a a seq seq f f f f g g g g
  • 77. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Result bd cd db dc bd cd db dc e e e e e e e e seq a a a a a a a a seq seq f f f f g g g g xor
  • 78. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split {b,c,d} into {b,c} and {d} using AND decomposition bd cd db dc bd cd db dc e e e e e e e e seq a a a a a a a a seq seq f f f f g g g g xor
  • 79. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Result d d d d d d d d e e e e e e e e seq a a a a a a a a seq seq f f f f g g g g xor b c b c b c b c par
  • 80. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Split {b,c} into {b} and {c} using XOR decomposition d d d d d d d d e e e e e e e e seq a a a a a a a a seq seq f f f f g g g g xor b c b c b c b c par
  • 81. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Result d d d d d d d d e e e e e e e e seq a a a a a a a a seq seq par b b b b c c c c xor … no further decomposition is possible
  • 82. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements) Process tree abdef acdef adbef adcef abdeg acdeg adbeg adceg seq abd acd adb adc ef eg a bd cd db dc seq seq e f g xor f g par d b c xor b c a start b c d e f g end a c b d e f g start end
  • 83. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
  • 86. process miningdata-oriented analysis process model analysis (simulation, verification, optimization, gaming, etc.) (data mining, machine learning, business intelligence)
  • 87. process miningdata-oriented analysis process model analysis performance- oriented questions, problems and solutionscompliance- oriented questions, problems and solutions(simulation, verification, optimization, gaming, etc.) (data mining, machine learning, business intelligence)
  • 88. Process Mining Data Science in Action https://www.coursera.org/course/procmin 38.000+ people joined!
  • 89. ProM
  • 90. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
  • 91. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
  • 92. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
  • 93. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)
  • 94. ©Wil van der Aalst & TU/e (use only with permission & acknowledgements)