SlideShare a Scribd company logo
By
Kashif Kashif
Kashif.namal@gmail.com
University of Camerino Italy
Process Mining
 A Process Managmenet technique that allows for the
analysis of business Process based on event logs.
 Algorithms are applied to event log datasets to find
patterns and details contained in event logs recorded
by an information system
 Objective is Effiecient and improve
Classification
 Discovery
A discovery technique takes an event log and
produces a process model without using any a-priori
information.
 Conformance checking
An existing process model is compared with an
event log of the same process.
 Enhancement
The main idea is to extend or improve an existing process
model using information about the actual process
recorded in some event log.
Approach Used
 Direct Algorithmic Approaches
 Two-Phase Approaches
 Computational Intelligence Approaches
 Partial Approaches
Direct Algorithmic Approaches
 Extracts footprint from the event log and uses this
footprint to directly construct a process model
 Also called language-based regions
 Extracted from the log and based on this relation a
Petri net is constructed
 Alpha Algorithem is Example of Direct Approach
 We apply an algorithm on the logs and derive directly
the process model
Two Phases Approach
 Uses a two-step approach in which first a “low-level model” (e.g., a
transition system , Markov model) is constructed.
 2nd step is that low-level model is converted into a “high-level model”
that can express concurrency and other (more advanced) control-flow
patterns.
 Transition system is extracted from the log using a customizable
abstraction mechanism.
 Transition system is converted into a Petri net using called statebased
regions The resulting model can be visualized as a Petri net, but can
also be converted into other notations (e.g., BPMN and EPCs).
 Similar approaches can be envisioned using hidden Markov models.
Using an Expectation-Maximization(EM) algorithm such as the Baum–
Welch algorithm, the “most likely” Markov model can be derived from
a log.
 Model is converted into highlevel model.
Hidden Morkov Model
 Set of states: {s1, s2, s3…. sn }
 Process moves from one state to another generating
 a sequence of states : s1, s2….
 Markov chain property: probability of each subsequent
state depends only on what was the previous state
Hidden Morkov Model
 You are going to find robot mood that either rebot is
happy or sad by watching movie(W), sleeping S,
Crying C, Facebook F.
 X=h if you happy X=s if unknown Y observation . w, s,
c or f .
 We want to answer queries, such as:
 P(X= h|Y =f) ?
 P(X= s|Y =c) ?
Hidden Morkov Model
Computational Intelligence
Approaches
 Techniques originating from the field of computational intelligence form the
basis for the third family of process discovery approaches.
 Examples of techniques are genetic programming, genetic algorithms,
simulated annealing, reinforcement learning, machine learning, neural
networks, fuzzy sets, rough sets, and swarm intelligence.
 The log is not directly converted into a model but uses an iterative procedure to
mimic the process of natural evaluation.
 Using genetic process mining approach starts with initial population of
individuals. Each individual corresponds to a randomly generated process
model. For each individual a fitness value is computed describing how well the
model fits with the log.
 Populations evolve by selecting the fittest individuals and generating new
individuals using genetic operators such as crossover (combining parts of two
individuals) and mutation (random modification of an individual). The fitness
gradually increases from generation to generation. The process stops once an
individual of acceptable quality is found.
Machine Learning
 Determine rules from data/facts
 Improve performance with experience
 Getting computers to program themselves
Sketch of an Induction Algorithm
 Calculate for each attribute,
 how good it classifies the elements of the training set
 Classify with the best attribute
 Repeat for each resutling subtree the first two steps
 Stop this recursive process as soon as a termination
condition is satisfied
Partial Approaches
 The approaches produce a complete end-to-end process
model.
 It is also possible to focus on rules or frequent patterns
approach for mining of sequential patterns.
 This approach is similar to the discovery of association
rules, however, now the order of events is taken into
account.
 Here a sliding window is used to analyze how frequent an
“episode” ( partial order) is appearing.
 Approaches exist to learn declarative (LTL-based)
languages like Declare.
PROLOG
 PROLOG (=PROgramming in LOGic) is a
programming language based on Horn clauses
 father(peter,mary).
 father(peter,john).
 mother(mary,mark).
 mother(jane,mary).
 grandfather(X,Z) :- father(X,Y), father(Y,Z).
grandfather(X,Z) :- father(X,Y), mother(Y,Z).
Heuristic miner
 Heuristics Miner is a practical applicable mining algorithm
that can deal with noise, and can be used to express the
main behavior that is not all details and exceptions,
registered in an event log.
 Extends alpha algorithm by considering the frequency of
traces in the log.
 The Heuristics Miner Plug-in mines the control flow
perspective of a process model.
 Considers the order of the events within a case.
 these algorithms take frequencies of events and sequences
into account when constructing a process model
Steps
 The construction of the dependency graph
 For each activity, the construction of the input and output
expressions
 The search for long distance dependency relations
 1. Read a log
 2. Get the set of tasks
 3. Infer the ordering relations based on their frequencies
 4. Build the net based on inferred relations
 5. Output the net
Genetic Miner
 Genetic miner uses a genetic algorithm to mine a petri
net representation of the process model from
execution traces.
 A global search strategy (the quality or fitness of a
candidate model is calculated by comparing the
process model with all traces in the event log the
search process takes place at a global level. For a local
strategy there is no guarantee that the outcome of the
locally optimal steps
Steps
 The first is to define the internal representation.
 The second concern is to define the fitness measure.
 The third concern relates to the genetic operators
(crossover and mutation)
 Read event log
 Build the initial population
 Calculate fitness of the individuals in the population
 Stop and return the fittest individuals
 Create next population
Fuzzy miner
 Process Mining is a technique for extracting process
models from execution logs.
 People have an idealized view of reality.
 Real-life processes turn out to be less structured than
people tend to believe.
 Model spaghetti-like
Output
 Phase I: Fuse similar behaving attributes
 Phase II: Generate Meta rules
 Phase III: Generate frequent fuzzy itemsets
 Phase IV: Make fuzzy association rules.
Questions

More Related Content

What's hot

A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...
IEEEFINALYEARPROJECTS
 
High dimesional data (FAST clustering ALG) PPT
High dimesional data (FAST clustering ALG) PPTHigh dimesional data (FAST clustering ALG) PPT
High dimesional data (FAST clustering ALG) PPT
deepan v
 
Optimal feature selection from v mware esxi 5.1 feature set
Optimal feature selection from v mware esxi 5.1 feature setOptimal feature selection from v mware esxi 5.1 feature set
Optimal feature selection from v mware esxi 5.1 feature set
ijccmsjournal
 
Using SHAP to Understand Black Box Models
Using SHAP to Understand Black Box ModelsUsing SHAP to Understand Black Box Models
Using SHAP to Understand Black Box Models
Jonathan Bechtel
 
Machine learning interview questions and answers
Machine learning interview questions and answersMachine learning interview questions and answers
Machine learning interview questions and answers
kavinilavuG
 
Machine Learning Interview Questions
Machine Learning Interview QuestionsMachine Learning Interview Questions
Machine Learning Interview Questions
Rock Interview
 
Fundamentals of data structures ellis horowitz & sartaj sahni
Fundamentals of data structures   ellis horowitz & sartaj sahniFundamentals of data structures   ellis horowitz & sartaj sahni
Fundamentals of data structures ellis horowitz & sartaj sahniHitesh Wagle
 
A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...
IEEEFINALYEARPROJECTS
 
RapidMiner: Learning Schemes In Rapid Miner
RapidMiner:  Learning Schemes In Rapid MinerRapidMiner:  Learning Schemes In Rapid Miner
RapidMiner: Learning Schemes In Rapid Miner
DataminingTools Inc
 
Wrapper feature selection method
Wrapper feature selection methodWrapper feature selection method
Wrapper feature selection method
Amir Razmjou
 
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine LearningA Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
Venkata Karthik Gullapalli
 
Fuzzy logic based model of GRN Inference
Fuzzy logic based model of GRN InferenceFuzzy logic based model of GRN Inference
Fuzzy logic based model of GRN Inference
Ali Zaid
 
Intelligent control applicatoin
Intelligent control applicatoinIntelligent control applicatoin
Intelligent control applicatoin
NJUSTAiMo
 
Iaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithmIaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithm
Iaetsd Iaetsd
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...
IEEEGLOBALSOFTTECHNOLOGIES
 
Which is not a step in the problem
Which is not a step in the problemWhich is not a step in the problem
Which is not a step in the problemkasguest
 

What's hot (16)

A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...
 
High dimesional data (FAST clustering ALG) PPT
High dimesional data (FAST clustering ALG) PPTHigh dimesional data (FAST clustering ALG) PPT
High dimesional data (FAST clustering ALG) PPT
 
Optimal feature selection from v mware esxi 5.1 feature set
Optimal feature selection from v mware esxi 5.1 feature setOptimal feature selection from v mware esxi 5.1 feature set
Optimal feature selection from v mware esxi 5.1 feature set
 
Using SHAP to Understand Black Box Models
Using SHAP to Understand Black Box ModelsUsing SHAP to Understand Black Box Models
Using SHAP to Understand Black Box Models
 
Machine learning interview questions and answers
Machine learning interview questions and answersMachine learning interview questions and answers
Machine learning interview questions and answers
 
Machine Learning Interview Questions
Machine Learning Interview QuestionsMachine Learning Interview Questions
Machine Learning Interview Questions
 
Fundamentals of data structures ellis horowitz & sartaj sahni
Fundamentals of data structures   ellis horowitz & sartaj sahniFundamentals of data structures   ellis horowitz & sartaj sahni
Fundamentals of data structures ellis horowitz & sartaj sahni
 
A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...A fast clustering based feature subset selection algorithm for high-dimension...
A fast clustering based feature subset selection algorithm for high-dimension...
 
RapidMiner: Learning Schemes In Rapid Miner
RapidMiner:  Learning Schemes In Rapid MinerRapidMiner:  Learning Schemes In Rapid Miner
RapidMiner: Learning Schemes In Rapid Miner
 
Wrapper feature selection method
Wrapper feature selection methodWrapper feature selection method
Wrapper feature selection method
 
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine LearningA Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
 
Fuzzy logic based model of GRN Inference
Fuzzy logic based model of GRN InferenceFuzzy logic based model of GRN Inference
Fuzzy logic based model of GRN Inference
 
Intelligent control applicatoin
Intelligent control applicatoinIntelligent control applicatoin
Intelligent control applicatoin
 
Iaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithmIaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithm
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A fast clustering based feature subse...
 
Which is not a step in the problem
Which is not a step in the problemWhich is not a step in the problem
Which is not a step in the problem
 

Viewers also liked

Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
kashif kashif
 
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.comMcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
kashif kashif
 
Process Mining For Customer Support
Process Mining For Customer SupportProcess Mining For Customer Support
Process Mining For Customer Support
Haim Toeg
 
Ontologies And Process Mining
Ontologies And Process MiningOntologies And Process Mining
Ontologies And Process Mining
George Varvaressos
 
Process Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the DataProcess Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the Data
Wil van der Aalst
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
Wil van der Aalst
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional Perspectives
Wil van der Aalst
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
Wil van der Aalst
 
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Wil van der Aalst
 
Building Information Model (BIM) based process mining
Building Information Model (BIM) based process miningBuilding Information Model (BIM) based process mining
Building Information Model (BIM) based process mining
Stijn van Schaijk
 
Process Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesProcess Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna Processes
Wil van der Aalst
 
Process Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - IntroductionProcess Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - Introduction
Wil van der Aalst
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation
Stijn van Schaijk
 
Process Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational SupportProcess Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational Support
Wil van der Aalst
 
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Yandex
 
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesProcess Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
Wil van der Aalst
 

Viewers also liked (16)

Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large...
 
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.comMcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
 
Process Mining For Customer Support
Process Mining For Customer SupportProcess Mining For Customer Support
Process Mining For Customer Support
 
Ontologies And Process Mining
Ontologies And Process MiningOntologies And Process Mining
Ontologies And Process Mining
 
Process Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the DataProcess Mining - Chapter 4 - Getting the Data
Process Mining - Chapter 4 - Getting the Data
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional Perspectives
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
 
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
 
Building Information Model (BIM) based process mining
Building Information Model (BIM) based process miningBuilding Information Model (BIM) based process mining
Building Information Model (BIM) based process mining
 
Process Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesProcess Mining - Chapter 11 - Analyzing Lasagna Processes
Process Mining - Chapter 11 - Analyzing Lasagna Processes
 
Process Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - IntroductionProcess Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - Introduction
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation
 
Process Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational SupportProcess Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational Support
 
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesProcess Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
 

Similar to Process mining approaches kashif.namal@gmail.com

Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on HmmEquirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
International Journal of Engineering Inventions www.ijeijournal.com
 
Occurrence Prediction_NLP
Occurrence Prediction_NLPOccurrence Prediction_NLP
Occurrence Prediction_NLP
Guttenberg Ferreira Passos
 
MEME – An Integrated Tool For Advanced Computational Experiments
MEME – An Integrated Tool For Advanced Computational ExperimentsMEME – An Integrated Tool For Advanced Computational Experiments
MEME – An Integrated Tool For Advanced Computational ExperimentsGIScRG
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
Dinusha Dilanka
 
Machine Can Think
Machine Can ThinkMachine Can Think
Machine Can Think
Rahul Jaiman
 
machinecanthink-160226155704.pdf
machinecanthink-160226155704.pdfmachinecanthink-160226155704.pdf
machinecanthink-160226155704.pdf
PranavPatil822557
 
IRJET- Content Based Video Activity Classifier
IRJET- Content Based Video Activity ClassifierIRJET- Content Based Video Activity Classifier
IRJET- Content Based Video Activity Classifier
IRJET Journal
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming Assignments
IRJET Journal
 
machine learning
machine learningmachine learning
machine learning
Mounisha A
 
I0343047049
I0343047049I0343047049
I0343047049
inventionjournals
 
Architecture of a morphological malware detector
Architecture of a morphological malware detectorArchitecture of a morphological malware detector
Architecture of a morphological malware detectorUltraUploader
 
Nature Inspired Models And The Semantic Web
Nature Inspired Models And The Semantic WebNature Inspired Models And The Semantic Web
Nature Inspired Models And The Semantic Web
Stefan Ceriu
 
Progressive Duplicate Detection
Progressive Duplicate DetectionProgressive Duplicate Detection
Progressive Duplicate Detection
1crore projects
 
Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...
infopapers
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
Venkat Projects
 
E034023028
E034023028E034023028
E034023028
ijceronline
 
A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...
MuskanRath1
 
Myanmar Named Entity Recognition with Hidden Markov Model
Myanmar Named Entity Recognition with Hidden Markov ModelMyanmar Named Entity Recognition with Hidden Markov Model
Myanmar Named Entity Recognition with Hidden Markov Model
ijtsrd
 

Similar to Process mining approaches kashif.namal@gmail.com (20)

Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on HmmEquirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
Equirs: Explicitly Query Understanding Information Retrieval System Based on Hmm
 
Occurrence Prediction_NLP
Occurrence Prediction_NLPOccurrence Prediction_NLP
Occurrence Prediction_NLP
 
MEME – An Integrated Tool For Advanced Computational Experiments
MEME – An Integrated Tool For Advanced Computational ExperimentsMEME – An Integrated Tool For Advanced Computational Experiments
MEME – An Integrated Tool For Advanced Computational Experiments
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
 
Machine Can Think
Machine Can ThinkMachine Can Think
Machine Can Think
 
machinecanthink-160226155704.pdf
machinecanthink-160226155704.pdfmachinecanthink-160226155704.pdf
machinecanthink-160226155704.pdf
 
IRJET- Content Based Video Activity Classifier
IRJET- Content Based Video Activity ClassifierIRJET- Content Based Video Activity Classifier
IRJET- Content Based Video Activity Classifier
 
A Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming AssignmentsA Literature Review on Plagiarism Detection in Computer Programming Assignments
A Literature Review on Plagiarism Detection in Computer Programming Assignments
 
machine learning
machine learningmachine learning
machine learning
 
I0343047049
I0343047049I0343047049
I0343047049
 
Architecture of a morphological malware detector
Architecture of a morphological malware detectorArchitecture of a morphological malware detector
Architecture of a morphological malware detector
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
 
Nature Inspired Models And The Semantic Web
Nature Inspired Models And The Semantic WebNature Inspired Models And The Semantic Web
Nature Inspired Models And The Semantic Web
 
Progressive Duplicate Detection
Progressive Duplicate DetectionProgressive Duplicate Detection
Progressive Duplicate Detection
 
Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...Using genetic algorithms and simulation as decision support in marketing stra...
Using genetic algorithms and simulation as decision support in marketing stra...
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
 
E034023028
E034023028E034023028
E034023028
 
Simulation
SimulationSimulation
Simulation
 
A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...A report on designing a model for improving CPU Scheduling by using Machine L...
A report on designing a model for improving CPU Scheduling by using Machine L...
 
Myanmar Named Entity Recognition with Hidden Markov Model
Myanmar Named Entity Recognition with Hidden Markov ModelMyanmar Named Entity Recognition with Hidden Markov Model
Myanmar Named Entity Recognition with Hidden Markov Model
 

Recently uploaded

The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
Areesha Ahmad
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
muralinath2
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
IvanMallco1
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
anitaento25
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
muralinath2
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
Richard Gill
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 

Recently uploaded (20)

The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 

Process mining approaches kashif.namal@gmail.com

  • 2. Process Mining  A Process Managmenet technique that allows for the analysis of business Process based on event logs.  Algorithms are applied to event log datasets to find patterns and details contained in event logs recorded by an information system  Objective is Effiecient and improve
  • 3. Classification  Discovery A discovery technique takes an event log and produces a process model without using any a-priori information.  Conformance checking An existing process model is compared with an event log of the same process.  Enhancement The main idea is to extend or improve an existing process model using information about the actual process recorded in some event log.
  • 4. Approach Used  Direct Algorithmic Approaches  Two-Phase Approaches  Computational Intelligence Approaches  Partial Approaches
  • 5. Direct Algorithmic Approaches  Extracts footprint from the event log and uses this footprint to directly construct a process model  Also called language-based regions  Extracted from the log and based on this relation a Petri net is constructed  Alpha Algorithem is Example of Direct Approach  We apply an algorithm on the logs and derive directly the process model
  • 6. Two Phases Approach  Uses a two-step approach in which first a “low-level model” (e.g., a transition system , Markov model) is constructed.  2nd step is that low-level model is converted into a “high-level model” that can express concurrency and other (more advanced) control-flow patterns.  Transition system is extracted from the log using a customizable abstraction mechanism.  Transition system is converted into a Petri net using called statebased regions The resulting model can be visualized as a Petri net, but can also be converted into other notations (e.g., BPMN and EPCs).  Similar approaches can be envisioned using hidden Markov models. Using an Expectation-Maximization(EM) algorithm such as the Baum– Welch algorithm, the “most likely” Markov model can be derived from a log.  Model is converted into highlevel model.
  • 7. Hidden Morkov Model  Set of states: {s1, s2, s3…. sn }  Process moves from one state to another generating  a sequence of states : s1, s2….  Markov chain property: probability of each subsequent state depends only on what was the previous state
  • 8. Hidden Morkov Model  You are going to find robot mood that either rebot is happy or sad by watching movie(W), sleeping S, Crying C, Facebook F.  X=h if you happy X=s if unknown Y observation . w, s, c or f .  We want to answer queries, such as:  P(X= h|Y =f) ?  P(X= s|Y =c) ?
  • 10. Computational Intelligence Approaches  Techniques originating from the field of computational intelligence form the basis for the third family of process discovery approaches.  Examples of techniques are genetic programming, genetic algorithms, simulated annealing, reinforcement learning, machine learning, neural networks, fuzzy sets, rough sets, and swarm intelligence.  The log is not directly converted into a model but uses an iterative procedure to mimic the process of natural evaluation.  Using genetic process mining approach starts with initial population of individuals. Each individual corresponds to a randomly generated process model. For each individual a fitness value is computed describing how well the model fits with the log.  Populations evolve by selecting the fittest individuals and generating new individuals using genetic operators such as crossover (combining parts of two individuals) and mutation (random modification of an individual). The fitness gradually increases from generation to generation. The process stops once an individual of acceptable quality is found.
  • 11. Machine Learning  Determine rules from data/facts  Improve performance with experience  Getting computers to program themselves
  • 12. Sketch of an Induction Algorithm  Calculate for each attribute,  how good it classifies the elements of the training set  Classify with the best attribute  Repeat for each resutling subtree the first two steps  Stop this recursive process as soon as a termination condition is satisfied
  • 13. Partial Approaches  The approaches produce a complete end-to-end process model.  It is also possible to focus on rules or frequent patterns approach for mining of sequential patterns.  This approach is similar to the discovery of association rules, however, now the order of events is taken into account.  Here a sliding window is used to analyze how frequent an “episode” ( partial order) is appearing.  Approaches exist to learn declarative (LTL-based) languages like Declare.
  • 14. PROLOG  PROLOG (=PROgramming in LOGic) is a programming language based on Horn clauses  father(peter,mary).  father(peter,john).  mother(mary,mark).  mother(jane,mary).  grandfather(X,Z) :- father(X,Y), father(Y,Z). grandfather(X,Z) :- father(X,Y), mother(Y,Z).
  • 15. Heuristic miner  Heuristics Miner is a practical applicable mining algorithm that can deal with noise, and can be used to express the main behavior that is not all details and exceptions, registered in an event log.  Extends alpha algorithm by considering the frequency of traces in the log.  The Heuristics Miner Plug-in mines the control flow perspective of a process model.  Considers the order of the events within a case.  these algorithms take frequencies of events and sequences into account when constructing a process model
  • 16. Steps  The construction of the dependency graph  For each activity, the construction of the input and output expressions  The search for long distance dependency relations  1. Read a log  2. Get the set of tasks  3. Infer the ordering relations based on their frequencies  4. Build the net based on inferred relations  5. Output the net
  • 17. Genetic Miner  Genetic miner uses a genetic algorithm to mine a petri net representation of the process model from execution traces.  A global search strategy (the quality or fitness of a candidate model is calculated by comparing the process model with all traces in the event log the search process takes place at a global level. For a local strategy there is no guarantee that the outcome of the locally optimal steps
  • 18. Steps  The first is to define the internal representation.  The second concern is to define the fitness measure.  The third concern relates to the genetic operators (crossover and mutation)  Read event log  Build the initial population  Calculate fitness of the individuals in the population  Stop and return the fittest individuals  Create next population
  • 19.
  • 20. Fuzzy miner  Process Mining is a technique for extracting process models from execution logs.  People have an idealized view of reality.  Real-life processes turn out to be less structured than people tend to believe.  Model spaghetti-like
  • 21. Output  Phase I: Fuse similar behaving attributes  Phase II: Generate Meta rules  Phase III: Generate frequent fuzzy itemsets  Phase IV: Make fuzzy association rules.