The document discusses advanced process discovery techniques. It begins by describing the challenges of process discovery, including the need for models to be able to replay event logs while avoiding overfitting or underfitting the logs. It then provides examples of algorithmic techniques like the heuristic miner and genetic process mining. Region-based process mining is also introduced. The document discusses characteristics of different process discovery algorithms and provides examples to illustrate concepts like heuristic mining, genetic operations, and region-based mining.
Discovering Petri Nets: Evidence-Based Business Process ManagementWil van der Aalst
The document discusses process mining and the discovery of process models from event logs. It provides examples of simple process models that could be discovered from an event log containing traces of a request handling process. The models range from very simple models that underfit the data to very complex models that overfit the data. An ideal model balances fitness, precision, generalization, and simplicity. The document uses these examples to illustrate challenges in process discovery like avoiding underfitting or overfitting the event log.
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Distributed Process Discovery and Conformance CheckingWil van der Aalst
The document discusses process discovery and conformance checking. It begins with an introduction to different roles of process models and examples of process discovery on real event logs. It then covers topics like replay, conformance checking, and analyzing models based on criteria like fitness and simplicity. Process discovery algorithms discussed include state-based regions and language-based regions approaches. The document explains how conformance checking involves replaying traces and calculating alignments between event logs and models.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Discovering Petri Nets: Evidence-Based Business Process ManagementWil van der Aalst
The document discusses process mining and the discovery of process models from event logs. It provides examples of simple process models that could be discovered from an event log containing traces of a request handling process. The models range from very simple models that underfit the data to very complex models that overfit the data. An ideal model balances fitness, precision, generalization, and simplicity. The document uses these examples to illustrate challenges in process discovery like avoiding underfitting or overfitting the event log.
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Distributed Process Discovery and Conformance CheckingWil van der Aalst
The document discusses process discovery and conformance checking. It begins with an introduction to different roles of process models and examples of process discovery on real event logs. It then covers topics like replay, conformance checking, and analyzing models based on criteria like fitness and simplicity. Process discovery algorithms discussed include state-based regions and language-based regions approaches. The document explains how conformance checking involves replaying traces and calculating alignments between event logs and models.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_07_conformance_checkingMuhammad Ajmal
The document summarizes the key aspects and goals of conformance checking in process mining. Conformance checking involves replaying event logs on process models to detect deviations. It can identify problems like missing or remaining tokens, as well as extract timing information. Diagnostics from replay can detect non-conformance at the trace and log levels, and quantify differences to understand problems in detail. Conformance checking is important for auditing, compliance, and aligning systems and processes.
Process mining chapter_05_process_discoveryMuhammad Ajmal
The document discusses process discovery and introduces the α algorithm. It begins by defining key terms like process discovery, fitness, precision, generalization, and simplicity. It then walks through examples of event logs and the corresponding process models that could be discovered from them. The α algorithm is introduced and explained as a basic process discovery technique. Limitations of the α algorithm are also discussed, such as its inability to handle implicit places, loops, and non-local dependencies. The challenges of process discovery are summarized, including noise, incompleteness, and balancing between underfitting and overfitting models.
Process Mining - Chapter 8 - Mining Additional PerspectivesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_08_mining_additional_perspectivesMuhammad Ajmal
This document discusses mining additional perspectives from event logs beyond the initial process model. It describes how event logs contain attributes relating to various perspectives like resources, time, cases, and costs. These additional attributes can be analyzed and visualized using techniques like social network analysis, resource behavior analysis, and decision mining to gain additional insights into the process. Classification techniques can also be applied to the event data to understand reasons for decisions, delays, or non-conformance in the process.
Process Mining: Understanding and Improving Desire Lines in Big DataWil van der Aalst
We are pleased to announce the lecture: “Process Mining: Understanding and Improving Desire Lines in Big Data”
in honour of doctor honoris causa Wil van der Aalst.
Wednesday May 30th - 10.00 a.m. - 12 a.m.,
Hasselt University, campus Diepenbeek (Agoralaan, building D) - auditorium H5
The Faculty of Business Economics of Hasselt University is pleased to invite you to the lecture
“Process Mining: Understanding and Improving Desire Lines in Big Data”.
This lecture is organised to honour prof. dr. Wil van der Aalst, on whom the degree of ‘doctor honoris causa’ will be conferred by Hasselt University, Faculty of Business Economics (promotor prof. Koen Vanhoof). Professor van der Aalst is a full professor of Information Systems at the Technische Universiteit Eindhoven (TU/e). Currently he is also an adjunct professor at Queensland University of Technology (QUT).His research interests include workflow management, process mining, Petri nets, business process management, process modeling, and process analysis. Many of his ideas have influenced researchers, software developers and standardization committees working on process support.
Process mining chapter_12_analyzing_spaghetti_processesMuhammad Ajmal
The document discusses analyzing "Spaghetti processes" using process mining. It provides examples of Spaghetti processes from ASML, Philips Healthcare, and an AMC hospital. Spaghetti processes typically have many activities, cases, and individuals involved. Process mining can help analyze such complex processes by discovering models from event logs, checking conformance to reference models, and identifying bottlenecks and deviations. While more difficult than structured processes, analyzing Spaghetti processes can provide significant insights to improve performance and redesign disorganized workflows.
The document provides an overview of process mining and its applications. It introduces process modeling and analysis, data mining, and the three main types of process mining: process discovery, conformance checking, and process enhancement. It also discusses different perspectives that can be analyzed from event logs, including the control-flow, organizational, case, and time perspectives. The starting point for process mining is an event log that can be used to discover process models and check for conformance.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Repairing Process Models to Match RealityDirk Fahland
The document discusses repairing process models to improve conformance to event logs. It presents an approach for repairing models that involves aligning the log and model, identifying sublogs of events that cannot be replayed, and using these to add optional/remove activities or add subprocesses to the model. The approach was implemented in ProM and evaluated on a case study, showing it can effectively repair models while maintaining a low distance to the original model.
This document provides an overview of process mining techniques and how process mining can be used to analyze business processes. It discusses the challenges of process discovery and conformance checking. Process mining aims to bridge the gap between data mining and business process management by using event logs to discover, monitor and improve processes. The document encourages readers to start using process mining today with freely available open-source tools.
This document provides an overview of process mining techniques and how process mining can be used to analyze business processes. It discusses the challenges of process discovery and conformance checking. Process mining aims to bridge the gap between data mining and business process management by using event logs to discover, monitor and improve real processes. The document encourages readers to start using process mining today with freely available tools to analyze event data and discover business processes based on facts.
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSEYandex
Data science is the profession of the future, because organizations that are unable to use (big) data in a smart way will not survive. It is not sufficient to focus on data storage and data analysis. The data scientist also needs to relate data to process analysis. Process mining bridges the gap between traditional model-based process analysis (e.g., simulation and other business process management techniques) and data-centric analysis techniques, such as machine learning and data mining. Process mining seeks to find a connection between event data (i.e., observed behavior) and process models (hand-made or discovered automatically). This technology has become available only recently, but it can be applied to any type of operational processes (organizations and systems). Example applications can include: analyzing treatment processes in hospitals, improving customer service processes in multinational companies, understanding browsing behavior of customers on a booking site, analyzing failures of a baggage handling system, or improving user interface of the X-ray machine. What all of these applications have in common is the need to relate dynamic behavior to process models. Not only does process mining provide a bridge between data mining and business process management, but it also helps to address the classical divide between "business" and "IT". Evidence-based business process management based on process mining helps to create a common ground for business process improvement and information systems development.
The document summarizes key aspects of virtual memory, including:
1) Virtual memory allows programs to have a virtual address space larger than physical memory by storing unused portions on disk and swapping them in and out of RAM as needed. This allows more programs to run simultaneously.
2) Address translation converts virtual addresses to physical addresses using a page table. If a page is not in memory, a page fault occurs which triggers swapping the needed page in from disk.
3) Page replacement algorithms like FIFO, LRU, and optimal selection determine which page to swap out when a new page needs to be brought in and no empty page frames are available. The algorithm with the fewest page faults is optimal
Keynote Gartner Business Process Management Summit, February 2009, London Wil van der Aalst
This document provides an overview of process mining and its applications. Process mining enables the discovery of process models from event logs, conformance checking of realized processes against models, and other analysis like performance and bottleneck identification. It moves beyond traditional business intelligence and can provide insights into the actual operational processes. The document outlines trends in business process management, the basics of process mining including software support, and examples of applications in various domains like healthcare, manufacturing, and government.
The document describes techniques for simplifying process models mined from event logs to make them more readable and understandable for users. It involves unfolding the mined model based on the event log to represent concurrency explicitly, then refolding and merging equivalent nodes. Implied places that do not restrict behavior can be removed. The resulting model has less complexity but the same behavior as the original model. Experimental results on benchmark logs show the techniques can significantly reduce model complexity while maintaining precision.
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
Process mining can help analyze multi-tenant processes in the cloud in three key ways:
1) It allows for cross-organizational process mining by analyzing event logs from different organizations using cloud-based systems.
2) It supports the use of configurable process models to deal with process variability across organizations and account for different configurations in the cloud.
3) Process mining techniques like discovery, conformance checking, and extension can provide insights into processes and configurations in the cloud to detect deviations, bottlenecks, and suggest improvements.
Keynote for the Yahoo! Frontend Developer's Summit 2008 held at the Yahoo! campus in Sunnyvale, CA. Looks at lessons from programming from the past and applies to web developer's today.
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_11_analyzing_lasagna_processesMuhammad Ajmal
The document describes analyzing a "Lasagna process" of handling requests for household help (WMO process) at a Dutch municipality. It summarizes the key steps and findings of process mining analysis on an event log from the municipality containing 528 cases over approximately one year. It describes discovering a process model from the log, checking conformance, detecting bottlenecks, and identifying groups of resources. The analysis helps understand the process and identify opportunities for improvement.
We at Revolution Analytics are often asked “What is the best way to learn R?” While acknowledging that there may be as many effective learning styles as there are people we have identified three factors that greatly facilitate learning R. For a quick start:
- Find a way of orienting yourself in the open source R world
- Have a definite application area in mind
- Set an initial goal of doing something useful and then build on it
In this webinar, we focus on data mining as the application area and show how anyone with just a basic knowledge of elementary data mining techniques can become immediately productive in R. We will:
- Provide an orientation to R’s data mining resources
- Show how to use the "point and click" open source data mining GUI, rattle, to perform the basic data mining functions of exploring and visualizing data, building classification models on training data sets, and using these models to classify new data.
- Show the simple R commands to accomplish these same tasks without the GUI
- Demonstrate how to build on these fundamental skills to gain further competence in R
- Move away from using small test data sets and show with the same level of skill one could analyze some fairly large data sets with RevoScaleR
Data scientists and analysts using other statistical software as well as students who are new to data mining should come away with a plan for getting started with R.
Process mining chapter_13_cartography_and_navigationMuhammad Ajmal
This chapter discusses how process mining can be used for cartography and navigation of business processes. It draws parallels between how cartographers map geographical areas and how process mining can map business processes. Process mining can aggregate and abstract processes to highlight important paths and structures. It also allows seamless zooming to different levels of detail. Process mining maps can project dynamic information and support process navigation by recommending next steps based on goals and detected events, similar to how navigation systems guide drivers.
This document discusses tool support for process mining. It introduces the process mining tool ProM, which supports all the techniques discussed in the book and slides. ProM has a pluggable architecture and the major differences between versions 5.2 and 6 are highlighted. Screenshots of the ProM user interface are provided. Example plug-ins in ProM 6 for the alpha miner and social network analyzer are described. Other process mining tools mentioned include Futura Reflect, which can show process views and social networks, and tools for loading and converting event logs like XESame, Nitro, and ProMimport.
More Related Content
Similar to Process mining chapter_06_advanced_process_discovery_techniques
Process mining chapter_07_conformance_checkingMuhammad Ajmal
The document summarizes the key aspects and goals of conformance checking in process mining. Conformance checking involves replaying event logs on process models to detect deviations. It can identify problems like missing or remaining tokens, as well as extract timing information. Diagnostics from replay can detect non-conformance at the trace and log levels, and quantify differences to understand problems in detail. Conformance checking is important for auditing, compliance, and aligning systems and processes.
Process mining chapter_05_process_discoveryMuhammad Ajmal
The document discusses process discovery and introduces the α algorithm. It begins by defining key terms like process discovery, fitness, precision, generalization, and simplicity. It then walks through examples of event logs and the corresponding process models that could be discovered from them. The α algorithm is introduced and explained as a basic process discovery technique. Limitations of the α algorithm are also discussed, such as its inability to handle implicit places, loops, and non-local dependencies. The challenges of process discovery are summarized, including noise, incompleteness, and balancing between underfitting and overfitting models.
Process Mining - Chapter 8 - Mining Additional PerspectivesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_08_mining_additional_perspectivesMuhammad Ajmal
This document discusses mining additional perspectives from event logs beyond the initial process model. It describes how event logs contain attributes relating to various perspectives like resources, time, cases, and costs. These additional attributes can be analyzed and visualized using techniques like social network analysis, resource behavior analysis, and decision mining to gain additional insights into the process. Classification techniques can also be applied to the event data to understand reasons for decisions, delays, or non-conformance in the process.
Process Mining: Understanding and Improving Desire Lines in Big DataWil van der Aalst
We are pleased to announce the lecture: “Process Mining: Understanding and Improving Desire Lines in Big Data”
in honour of doctor honoris causa Wil van der Aalst.
Wednesday May 30th - 10.00 a.m. - 12 a.m.,
Hasselt University, campus Diepenbeek (Agoralaan, building D) - auditorium H5
The Faculty of Business Economics of Hasselt University is pleased to invite you to the lecture
“Process Mining: Understanding and Improving Desire Lines in Big Data”.
This lecture is organised to honour prof. dr. Wil van der Aalst, on whom the degree of ‘doctor honoris causa’ will be conferred by Hasselt University, Faculty of Business Economics (promotor prof. Koen Vanhoof). Professor van der Aalst is a full professor of Information Systems at the Technische Universiteit Eindhoven (TU/e). Currently he is also an adjunct professor at Queensland University of Technology (QUT).His research interests include workflow management, process mining, Petri nets, business process management, process modeling, and process analysis. Many of his ideas have influenced researchers, software developers and standardization committees working on process support.
Process mining chapter_12_analyzing_spaghetti_processesMuhammad Ajmal
The document discusses analyzing "Spaghetti processes" using process mining. It provides examples of Spaghetti processes from ASML, Philips Healthcare, and an AMC hospital. Spaghetti processes typically have many activities, cases, and individuals involved. Process mining can help analyze such complex processes by discovering models from event logs, checking conformance to reference models, and identifying bottlenecks and deviations. While more difficult than structured processes, analyzing Spaghetti processes can provide significant insights to improve performance and redesign disorganized workflows.
The document provides an overview of process mining and its applications. It introduces process modeling and analysis, data mining, and the three main types of process mining: process discovery, conformance checking, and process enhancement. It also discusses different perspectives that can be analyzed from event logs, including the control-flow, organizational, case, and time perspectives. The starting point for process mining is an event log that can be used to discover process models and check for conformance.
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Repairing Process Models to Match RealityDirk Fahland
The document discusses repairing process models to improve conformance to event logs. It presents an approach for repairing models that involves aligning the log and model, identifying sublogs of events that cannot be replayed, and using these to add optional/remove activities or add subprocesses to the model. The approach was implemented in ProM and evaluated on a case study, showing it can effectively repair models while maintaining a low distance to the original model.
This document provides an overview of process mining techniques and how process mining can be used to analyze business processes. It discusses the challenges of process discovery and conformance checking. Process mining aims to bridge the gap between data mining and business process management by using event logs to discover, monitor and improve processes. The document encourages readers to start using process mining today with freely available open-source tools.
This document provides an overview of process mining techniques and how process mining can be used to analyze business processes. It discusses the challenges of process discovery and conformance checking. Process mining aims to bridge the gap between data mining and business process management by using event logs to discover, monitor and improve real processes. The document encourages readers to start using process mining today with freely available tools to analyze event data and discover business processes based on facts.
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSEYandex
Data science is the profession of the future, because organizations that are unable to use (big) data in a smart way will not survive. It is not sufficient to focus on data storage and data analysis. The data scientist also needs to relate data to process analysis. Process mining bridges the gap between traditional model-based process analysis (e.g., simulation and other business process management techniques) and data-centric analysis techniques, such as machine learning and data mining. Process mining seeks to find a connection between event data (i.e., observed behavior) and process models (hand-made or discovered automatically). This technology has become available only recently, but it can be applied to any type of operational processes (organizations and systems). Example applications can include: analyzing treatment processes in hospitals, improving customer service processes in multinational companies, understanding browsing behavior of customers on a booking site, analyzing failures of a baggage handling system, or improving user interface of the X-ray machine. What all of these applications have in common is the need to relate dynamic behavior to process models. Not only does process mining provide a bridge between data mining and business process management, but it also helps to address the classical divide between "business" and "IT". Evidence-based business process management based on process mining helps to create a common ground for business process improvement and information systems development.
The document summarizes key aspects of virtual memory, including:
1) Virtual memory allows programs to have a virtual address space larger than physical memory by storing unused portions on disk and swapping them in and out of RAM as needed. This allows more programs to run simultaneously.
2) Address translation converts virtual addresses to physical addresses using a page table. If a page is not in memory, a page fault occurs which triggers swapping the needed page in from disk.
3) Page replacement algorithms like FIFO, LRU, and optimal selection determine which page to swap out when a new page needs to be brought in and no empty page frames are available. The algorithm with the fewest page faults is optimal
Keynote Gartner Business Process Management Summit, February 2009, London Wil van der Aalst
This document provides an overview of process mining and its applications. Process mining enables the discovery of process models from event logs, conformance checking of realized processes against models, and other analysis like performance and bottleneck identification. It moves beyond traditional business intelligence and can provide insights into the actual operational processes. The document outlines trends in business process management, the basics of process mining including software support, and examples of applications in various domains like healthcare, manufacturing, and government.
The document describes techniques for simplifying process models mined from event logs to make them more readable and understandable for users. It involves unfolding the mined model based on the event log to represent concurrency explicitly, then refolding and merging equivalent nodes. Implied places that do not restrict behavior can be removed. The resulting model has less complexity but the same behavior as the original model. Experimental results on benchmark logs show the techniques can significantly reduce model complexity while maintaining precision.
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
Process mining can help analyze multi-tenant processes in the cloud in three key ways:
1) It allows for cross-organizational process mining by analyzing event logs from different organizations using cloud-based systems.
2) It supports the use of configurable process models to deal with process variability across organizations and account for different configurations in the cloud.
3) Process mining techniques like discovery, conformance checking, and extension can provide insights into processes and configurations in the cloud to detect deviations, bottlenecks, and suggest improvements.
Keynote for the Yahoo! Frontend Developer's Summit 2008 held at the Yahoo! campus in Sunnyvale, CA. Looks at lessons from programming from the past and applies to web developer's today.
Process Mining - Chapter 11 - Analyzing Lasagna ProcessesWil van der Aalst
Slides supporting the book "Process Mining: Discovery, Conformance, and Enhancement of Business Processes" by Wil van der Aalst. See also http://springer.com/978-3-642-19344-6 (ISBN 978-3-642-19344-6) and the website http://www.processmining.org/book/start providing sample logs.
Process mining chapter_11_analyzing_lasagna_processesMuhammad Ajmal
The document describes analyzing a "Lasagna process" of handling requests for household help (WMO process) at a Dutch municipality. It summarizes the key steps and findings of process mining analysis on an event log from the municipality containing 528 cases over approximately one year. It describes discovering a process model from the log, checking conformance, detecting bottlenecks, and identifying groups of resources. The analysis helps understand the process and identify opportunities for improvement.
We at Revolution Analytics are often asked “What is the best way to learn R?” While acknowledging that there may be as many effective learning styles as there are people we have identified three factors that greatly facilitate learning R. For a quick start:
- Find a way of orienting yourself in the open source R world
- Have a definite application area in mind
- Set an initial goal of doing something useful and then build on it
In this webinar, we focus on data mining as the application area and show how anyone with just a basic knowledge of elementary data mining techniques can become immediately productive in R. We will:
- Provide an orientation to R’s data mining resources
- Show how to use the "point and click" open source data mining GUI, rattle, to perform the basic data mining functions of exploring and visualizing data, building classification models on training data sets, and using these models to classify new data.
- Show the simple R commands to accomplish these same tasks without the GUI
- Demonstrate how to build on these fundamental skills to gain further competence in R
- Move away from using small test data sets and show with the same level of skill one could analyze some fairly large data sets with RevoScaleR
Data scientists and analysts using other statistical software as well as students who are new to data mining should come away with a plan for getting started with R.
Similar to Process mining chapter_06_advanced_process_discovery_techniques (20)
Process mining chapter_13_cartography_and_navigationMuhammad Ajmal
This chapter discusses how process mining can be used for cartography and navigation of business processes. It draws parallels between how cartographers map geographical areas and how process mining can map business processes. Process mining can aggregate and abstract processes to highlight important paths and structures. It also allows seamless zooming to different levels of detail. Process mining maps can project dynamic information and support process navigation by recommending next steps based on goals and detected events, similar to how navigation systems guide drivers.
This document discusses tool support for process mining. It introduces the process mining tool ProM, which supports all the techniques discussed in the book and slides. ProM has a pluggable architecture and the major differences between versions 5.2 and 6 are highlighted. Screenshots of the ProM user interface are provided. Example plug-ins in ProM 6 for the alpha miner and social network analyzer are described. Other process mining tools mentioned include Futura Reflect, which can show process views and social networks, and tools for loading and converting event logs like XESame, Nitro, and ProMimport.
Process mining chapter_09_operational_supportMuhammad Ajmal
This document provides an overview of Chapter 9 on Operational Support from the book. Operational support uses event log data from ongoing ("pre-mortem") cases to detect violations, predict outcomes, and recommend suitable next steps based on goals like minimizing costs or time. It works by annotating process models with case data from the event log and using the annotated model to inform predictions and recommendations in real-time.
Process mining chapter_07_conformance_checkingMuhammad Ajmal
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Process mining chapter_04_getting_the_dataMuhammad Ajmal
The document discusses getting data for process mining. It explains that process mining analyzes data from event logs of software systems or other records to discover, monitor and improve processes. Event logs contain information about cases, the order of events within cases, and attributes of events like activity, time, resource and costs. The document provides examples of standard event log structures and attributes. It also discusses transforming and filtering data from different sources into a format suitable for process mining analysis.
This document provides an overview of key concepts in data mining. It discusses how data mining has grown with the increase in digital data and is now a mature discipline. The document outlines different types of data, variables, and learning techniques used in data mining like supervised learning, unsupervised learning, decision trees, clustering, association rule learning, and hidden Markov models. It also compares data mining and process mining, and discusses evaluating the quality of mining results using metrics like confusion matrices and cross-validation.
Process mining chapter_02_process_modeling_and_analysisMuhammad Ajmal
This document provides an overview of process modeling and analysis techniques. It discusses how process models have historically been used for operations management and decision making. However, process models often do not accurately capture reality. Process mining aims to address this by extracting models directly from event logs, allowing users to view processes at different levels of abstraction based on facts rather than an idealized model. It also discusses limitations of model-based analysis when models do not align with reality.
This document introduces process mining and provides an overview of the book "Process Mining: Discovery, Conformance and Enhancement of Business Processes" by Wil van der Aalst. The book is divided into 5 parts covering preliminaries on process modeling and data mining, discovering process models from event logs, conformance checking and additional analysis, applying process mining in practice, and reflections on process mining. The document acknowledges contributors to process mining research and tools, and provides pointers to related works, software, and the IEEE task force on process mining.
2. Overview
Chapter 1
Introduction
Part I: Preliminaries
Chapter 2 Chapter 3
Process Modeling and Data Mining
Analysis
Part II: From Event Logs to Process Models
Chapter 4 Chapter 5 Chapter 6
Getting the Data Process Discovery: An Advanced Process
Introduction Discovery Techniques
Part III: Beyond Process Discovery
Chapter 7 Chapter 8 Chapter 9
Conformance Mining Additional Operational Support
Checking Perspectives
Part IV: Putting Process Mining to Work
Chapter 10 Chapter 11 Chapter 12
Tool Support Analyzing “Lasagna Analyzing “Spaghetti
Processes” Processes”
Part V: Reflection
Chapter 13 Chapter 14
Cartography and Epilogue
Navigation
PAGE 1
3. Process discovery
supports/
“world” business
controls
processes software
people machines system
components
organizations records
events, e.g.,
messages,
specifies transactions,
models
configures etc.
analyzes
implements
analyzes
discovery
(process) event
conformance
model logs
enhancement
PAGE 2
4. Challenge
“able to replay event log” “Occam’s razor”
fitness simplicity
process
discovery
generalization precision
“not overfitting the log” “not underfitting the log”
PAGE 3
5. Observing a stable process infinitely long
frequent all behavior
behavior trace in (including noise)
event log
PAGE 4
10. Characteristics of process discovery
algorithms
• Representational bias
− Inability to represent concurrency
− Inability to deal with (arbitrary) loops
− Inability to represent silent actions
− Inability to represent duplicate actions
− Inability to model OR-splits/joins
− Inability to represent non-free-choice behavior
− Inability to represent hierarchy
• Ability to deal with noise
• Completeness notion assumed
• Approach used (direct algorithmic approaches, two-
phase approaches, computational intelligence
approaches, partial approaches, etc.) PAGE 9
11. Examples
• Algorithmic techniques
• Alpha miner
• Alpha+, Alpha++, Alpha#
• FSM miner
• Fuzzy miner
• Heuristic miner
• Multi phase miner
• Genetic process mining
• Single/duplicate tasks
• Distributed GM
• Region-based process mining
• State-based regions
• Language based regions
• Classical approaches not dealing with concurrency
• Inductive inference (Mark Gold, Dana Angluin et al.)
• Sequence mining
PAGE 10
12. Heuristic mining
• To deal with noise and incompleteness.
• To have a better representational bias than the α
algorithm (AND/XOR/OR/skip).
• Uses C-nets.
b
check
policy
a c e
register check close
claim damage case
d
consult
expert
PAGE 11
17. Lower threshold (2 direct successions and
a dependency of at least 0.7)
5(0.83)
b
11(0.92) 11(0.92)
a c e
11(0.92) 11(0.92)
13(0.93) 13(0.93)
d
4(0.80)
PAGE 16
18. Higher threshold (5 direct successions
and a dependency of at least 0.9)
b
11(0.92) 11(0.92)
a c e
11(0.92) 11(0.92)
13(0.93) 13(0.93)
d
PAGE 17
19. Learning splits and joins
5
20 b 20
21
5 20 20 5
20 20 20 20
a c e
40 20 21 20 40
13
13
13 13
13 13
d
4 17
4
4
PAGE 18
20. Alternative visualization
5
20 b 20
21
5 20 20 5
20 20 20 20
a c e
40 20 21 20 40
13
13
13 13
13 13
d b
4 17
4
4
AND AND
a c e
d
PAGE 19
21. Characteristics of heuristic mining
• Can deal with noise and therefore quite robust.
• Improved representational bias.
• Split and join rules are only considered locally
(therefore most of the discovered model are not
sound and require repair actions).
PAGE 20
22. Genetic process mining
create initial
population
event log mutation
next generation
compute
fitness
elitism
termination
tournament children
crossover
select best parents
individual
“dead” individuals
PAGE 21
23. Design decisions
• Representation of individuals
• Initialization
• Fitness function
• Selection strategy (tournament and elitism)
• Crossover create initial
population
• Mutation event log mutation
next generation
compute
fitness
elitism
termination
tournament children
crossover
select best parents
individual
“dead” individuals
PAGE 22
24. Example: crossover
b b
examine examine
thoroughly thoroughly
g g
pay pay
c c
compensation compensation
a e a e
examine examine
start register casually decide end start register casually decide end
request request
h h
d d
reject reject
check ticket request check ticket request
f f
reinitiate reinitiate
request request
b b
examine examine
thoroughly thoroughly
g g
pay pay
c c
compensation compensation
a e a e
examine examine
start register casually decide end start register casually decide end
request request
h h
d d
reject reject
check ticket request check ticket request
f f
reinitiate
reinitiate
request
request
PAGE 23
25. Example: mutation
remove place
b b
examine examine
thoroughly thoroughly
g g
pay pay
c c
compensation compensation
a e a e
examine examine
start register casually decide end start register casually decide end
request request
h h
d d
reject reject
check ticket request check ticket request
f f
reinitiate reinitiate
request
added arc request
PAGE 24
26. Characteristics of genetic
process mining
• Requires a lot of computing power.
• Can be distributed easily.
• Can deal with noise, infrequent behavior, duplicate tasks,
invisible tasks, etc.
• Allows for incremental improvement and combinations
with other approaches (heuristics post-optimization, etc.).
PAGE 25
27. Region-based mining
• Two types of regions theory:
− State-based regions
− Language-based regions
• All about discovering places (like in the α algorithm)!
a1 b1
a2 b2
... p(A,B) ...
am bn
A={a1,a2, … am} B={b1,b2, … bn}
PAGE 26
28. State-based regions
Two steps:
1.Discover a transition system (different abstractions
are possible)
2.Convert transition system into an “equivalent” Petri
net.
PAGE 27
29. Step 1: learning a transition system
current state
trace: abcdcdcde faghhhi
past future
past and future
• past, future, past+future
• sequence, multiset, set abstraction
• limited horizon to abstract further
• filtering e.g. based on transaction type, names, etc.
• labels based on activity name or other features
PAGE 28
30. Past without abstraction (full sequence)
c d
‹a,b›
‹a,b,c› ‹a,b,c,d›
b
a e d
‹› ‹a› ‹a,e› ‹a,e,d›
c
b d
‹a,c›
‹a,c,b› ‹a,c,b,d›
PAGE 29
31. Future without abstraction
a b ‹c,d›
‹a,b,c,d› ‹b,c,d› c
a e d
‹a,e,d› ‹e,d› ‹d › ‹›
b
a c
‹b,d›
‹a,c,b,d› ‹c,b,d›
PAGE 30
32. Past with multiset abstraction
[a,e]
d
[a,d,e]
e [a,b]
a b
[] [a]
c c
b d
[a,c] [a,b,c] [a,b,c,d]
PAGE 31
33. Only last event matters for state
‹e›
e d
a b
‹ b› d
‹› ‹a › c b ‹d›
c d
‹c›
PAGE 32
34. Step 2: constructing a Petri net using
regions
a = enter
b d b = enter
a e c = exit
d = exit
f d e = do not cross
e f = do not cross
e
f c
a
R
a c
e f
pR
b d
PAGE 33
35. Example
d
e
[a,e] [a,d,e]
[ a,b]
a b
[] [a] c
c
b d
[a,c] [a,b,c] [a,b,c,d]
b
a p1 e p3 d
start end
p2 c p4
PAGE 34
36. Language based regions
f c1
a1 b1
e c d
pR
a2 b2
X Y
Region R = (X,Y,c) corresponding to place pR: X = {a1,a2,c1} =
transitions producing a token for pR, Y = {b1,b2,c1} = transitions
consuming a token from pR, and c is the initial marking of pR. PAGE 35
37. Based idea: enough tokens should be
present when consuming
A place is feasible if it
can be added without
f c1 disabling any of the
traces in the event log.
a1 b1
e c d
pR
a2 b2
X Y
PAGE 36
41. Characteristics of region-based mining
• Can be used to discover more complex control-flow
structures.
• Classical approaches need to be adapted
(overfitting!).
• Representational bias can be parameterized (e.g.,
free-choice nets, label splitting, etc.).
• Problems dealing with noise.
PAGE 40
43. Evaluating the discovered process
Fitness: Is the event log
possible according to the
model?
Precision: Is the model Generalization: Is the model
not underfitting (allow for not overfitting (only allow for
too much)? the “accidental” examples)?
Structure: Is this the
simplest model (Occam's
Razor)?
PAGE 42