Keynote talk at the 36th International Conference on Application and Theory of Petri Nets and Concurrency (Petri Nets 2015).
Screencast available at: https://youtu.be/9bQr0r_WaoE
In Processes We Trust: Privacy and Trust in Business ProcessesMarlon Dumas
This document discusses challenges and opportunities around privacy and trust in business processes. It begins by defining key concepts like security, privacy, and trust. It then outlines topics related to business process security and privacy, such as access control, flow analysis to detect unauthorized data access, and privacy-aware business process execution. The document proposes approaches for privacy-aware business processes using techniques like k-anonymization and multi-party computation. It describes a system called Pleak.io that aims to model stakeholders, data flows, and privacy-enhancing technologies to quantify privacy leaks and accuracy loss in processes. The document concludes by discussing challenges around collaborative processes with untrusted parties and the potential use of distributed ledgers and smart contracts to address issues of
White-box prediction of process performance indicators via flow analysisMarlon Dumas
Presentation delivered by Ilya Verenich at the International Conference on Software Processes (ICSSP'2017), Paris, France, July 2017. This paper received the best paper award at the conference. Paper available at: http://kodu.ut.ee/~dumas/pubs/icssp2017whitebox.pdf
Process Mining and Predictive Process MonitoringMarlon Dumas
This document discusses process mining and predictive process monitoring. It begins with an overview of offline process mining techniques like process discovery, conformance checking, and deviance mining. It then discusses applying these techniques online for predictive process monitoring, including predicting outcomes, deviations, or failures. Various techniques are presented like nearest neighbor classification of partial traces and clustering traces before classification. The goal is to accurately predict outcomes during process execution based on control flow, data attributes, and textual case data.
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Marlon Dumas
Paper presentation at the 12th International BPM Conference, Eindhoven, The Netherlands, September 2014. The corresponding paper can be found at: http://math.ut.ee/~dumas/pubs/bpm2014bpmnminer.pdf
Process Mining and Predictive Process Monitoring in ApromoreMarlon Dumas
Seminar delivered at University of Hasselt on 14 May 2019. The seminar covers the research efforts underpinning Apromore's automated process discovery, conformance checking, log delta analysis, and predictive process monitoring plugins.
Process Mining and Predictive Process MonitoringMarlon Dumas
Presentation delivered at the Second Colombian Forum on Business Process Management, University of Los Andes, Bogotá, 22 June 2018 - https://sistemas.uniandes.edu.co/en/foros-isis/temas-foros-isis/bpm/foro-2/80-foros-isis/bpm
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...Marlon Dumas
Paper presentation delivered by Adriano Augusto at the IEEE International Conference on Data Mining (ICDM'2017) on 21 November 2017. The paper is available at: http://kodu.ut.ee/~dumas/pubs/icdm2017-split-miner.pdf
Multi-Perspective Comparison of Business Processes Variants Based on Event LogsMarlon Dumas
This document presents a method for multi-perspective comparison of business process variants based on event logs. The method involves constructing perspective graphs from different abstractions of event logs to analyze processes from different perspectives based on event attributes. Differential perspective graphs are then used to identify statistically significant differences between two event logs, representing different process variants. The method was experimentally applied to compare differences between divisions in an IT incident handling process using various abstractions and observations. The experiments revealed differences in activity statuses, control flows between countries, and control flow frequencies over time between the divisions.
In Processes We Trust: Privacy and Trust in Business ProcessesMarlon Dumas
This document discusses challenges and opportunities around privacy and trust in business processes. It begins by defining key concepts like security, privacy, and trust. It then outlines topics related to business process security and privacy, such as access control, flow analysis to detect unauthorized data access, and privacy-aware business process execution. The document proposes approaches for privacy-aware business processes using techniques like k-anonymization and multi-party computation. It describes a system called Pleak.io that aims to model stakeholders, data flows, and privacy-enhancing technologies to quantify privacy leaks and accuracy loss in processes. The document concludes by discussing challenges around collaborative processes with untrusted parties and the potential use of distributed ledgers and smart contracts to address issues of
White-box prediction of process performance indicators via flow analysisMarlon Dumas
Presentation delivered by Ilya Verenich at the International Conference on Software Processes (ICSSP'2017), Paris, France, July 2017. This paper received the best paper award at the conference. Paper available at: http://kodu.ut.ee/~dumas/pubs/icssp2017whitebox.pdf
Process Mining and Predictive Process MonitoringMarlon Dumas
This document discusses process mining and predictive process monitoring. It begins with an overview of offline process mining techniques like process discovery, conformance checking, and deviance mining. It then discusses applying these techniques online for predictive process monitoring, including predicting outcomes, deviations, or failures. Various techniques are presented like nearest neighbor classification of partial traces and clustering traces before classification. The goal is to accurately predict outcomes during process execution based on control flow, data attributes, and textual case data.
Beyond Tasks and Gateways: Automated Discovery of BPMN Models with Subprocess...Marlon Dumas
Paper presentation at the 12th International BPM Conference, Eindhoven, The Netherlands, September 2014. The corresponding paper can be found at: http://math.ut.ee/~dumas/pubs/bpm2014bpmnminer.pdf
Process Mining and Predictive Process Monitoring in ApromoreMarlon Dumas
Seminar delivered at University of Hasselt on 14 May 2019. The seminar covers the research efforts underpinning Apromore's automated process discovery, conformance checking, log delta analysis, and predictive process monitoring plugins.
Process Mining and Predictive Process MonitoringMarlon Dumas
Presentation delivered at the Second Colombian Forum on Business Process Management, University of Los Andes, Bogotá, 22 June 2018 - https://sistemas.uniandes.edu.co/en/foros-isis/temas-foros-isis/bpm/foro-2/80-foros-isis/bpm
Split Miner: Discovering Accurate and Simple Business Process Models from Eve...Marlon Dumas
Paper presentation delivered by Adriano Augusto at the IEEE International Conference on Data Mining (ICDM'2017) on 21 November 2017. The paper is available at: http://kodu.ut.ee/~dumas/pubs/icdm2017-split-miner.pdf
Multi-Perspective Comparison of Business Processes Variants Based on Event LogsMarlon Dumas
This document presents a method for multi-perspective comparison of business process variants based on event logs. The method involves constructing perspective graphs from different abstractions of event logs to analyze processes from different perspectives based on event attributes. Differential perspective graphs are then used to identify statistically significant differences between two event logs, representing different process variants. The method was experimentally applied to compare differences between divisions in an IT incident handling process using various abstractions and observations. The experiments revealed differences in activity statuses, control flows between countries, and control flow frequencies over time between the divisions.
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Marlon Dumas
Research paper presentation at the 35th International Conference on Conceptual Modeling (ER'2016), Gifu, Japan, 15 Nov. 2016
Presentation delivered by Raffaele Conforti.
Paper available at: http://goo.gl/5EN3l2
Apromore: Advanced Business Process Analytics on the CloudMarlon Dumas
Tutorial delivered at the 16th International Conference on Business Process Management (BPM'2018), Sydney, Australia, 13 September 2018. The tutorial provides an introduction to process mining and predictive process monitoring using Apromore
Business Process Analytics: From Insights to PredictionsMarlon Dumas
Keynote talk at the 13th Baltic Conference on Databases and Information Systems, Trakai, Lithuania, 2 July 2018.
Abstract
Business process analytics is a body of methods for analyzing data generated by the execution of business processes in order to extract insights about weaknesses and improvement opportunities, both at the tactical and operational levels. Tactical process analytics methods (also known as process mining) allow us to understand how a given business process is actually executed, if and how its execution deviates with respect to expected or normative pathways, and what factors contribute to poor process performance or undesirable outcomes. Meantime, operational process analytics methods allow us to monitor ongoing executions of a business process in order to predict future states and undesirable outcomes at runtime (predictive process monitoring). Existing methods in this space allow us to predict, for example, which task will be executed next in a case, when, and who will perform it? When will an ongoing case complete? What will its outcome be and how can negative outcomes be avoided? This keynote will present a framework for conceptualizing business process analytics methods and applications. The talk will provide an overview of state-of-art methods and tools in the field and will outline open challenges and research opportunities.
Collaborative Business Process Execution on Blockchain: The Caterpillar ApproachMarlon Dumas
Invited talk at the CAiSE'2019 Workshop on Blockchains for Inter-Organizational Collaboration and Flexible Advanced Information Systems (BIOC & FAiSE 2019).
Caterpillar: A Blockchain-Based Business Proces Management SystemMarlon Dumas
Caterpillar is a blockchain-based business process management system (BPMS) that uses smart contracts to store process state and drive process execution without a database or separate execution engine. Key process data like the process model and instance state are stored on the blockchain, providing a single source of truth. Process models designed in BPMN can be automatically translated to smart contracts. This ensures correct and transparent execution across participants on the blockchain network. While promising, challenges remain around transaction costs, throughput limits, and handling large amounts of process data efficiently.
Introduction to Business Process Monitoring and Process MiningMarlon Dumas
Two-day course delivered at the Chinese Business Process Management (BPM) Summer School in Jinan, China, 23-24 August 2018. The course introduces a range of techniques, tools, and algorithms for process monitoring and mining.
Automated Discovery of Data Transformations for Robotic Process AutomationMarlon Dumas
Paper presentation by Artem Polyvyanyy at the AAAI Workshop on Intelligent Process Automation (IPA), New York, 7 February 2020. Paper available at: https://arxiv.org/pdf/1912.01855.pdf
Interpreted Execution of Business Process Models on BlockchainMarlon Dumas
Research paper presentation delivered at the IEEE Enterprise Computing Conference (EDOC), Paris, France, 30 October 2019. The paper introduces the technical details of Caterpillar´s business process execution engine v3.0 https://git.io/caterpillar - Paper available at https://arxiv.org/pdf/1906.01420.pdf
Keynote talk by Marlon Dumas at the Bolzano Rules and Artificial INtelligence Summit (BRAIN 2019), RuleML+RR and GCAI Conferences, Bolzano, Italy, 17 September 2019. The talk gives an overview of state-of-the-art methods in the field of process mining and predictive process monitoring and spells out research challenges in the fields of prescriptive process monitoring and automated process improvement.
Discovering Branching Conditions from Business Process Execution LogsMarlon Dumas
Paper presentation given at the International Conference on Fundamental Approaches to Software Engineering (FASE) in March 2013. The paper can be found <a>here</a>.
Process Mining and Predictive Process Monitoring: From Technology to Business...Marlon Dumas
This document discusses process mining and predictive process monitoring. It begins with an overview of business process management and how process mining fits within the broader process architecture. It then covers the key techniques in process mining like process discovery, conformance checking, performance mining, and predictive process monitoring. Examples of process mining case studies in different domains are provided. The document concludes with a discussion of how process mining can be used to enable automated process improvement.
Process Mining 2.0: From Insights to ActionsMarlon Dumas
The document discusses several topics in process mining research including predictive process monitoring, prescriptive process monitoring, robotic process mining, data-driven simulation, and causal process mining. It provides references for further research on each topic, with links to relevant papers that outline techniques in each area.
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 3: Combined Error Propagation Analysis and Runtime Event Detection in Process-driven Systems
Predictive Process Monitoring with Hyperparameter OptimizationMarlon Dumas
1. The document presents a predictive process monitoring framework that is enhanced with technique and hyperparameter optimization.
2. The framework evaluates multiple configurations of machine learning techniques and their hyperparameters on historical execution traces to identify the most suitable configuration for a given prediction problem and dataset.
3. An evaluation of the framework on two prediction problems and datasets found that it was able to identify suitable configurations within a reasonable time frame, though the best configuration varied depending on the prediction problem and users' performance criteria.
Minimizing Overprocessing Waste in Business Processes via Predictive Activity...Marlon Dumas
This document presents an approach to minimize overprocessing waste in business processes by predictively ordering activities. It does so by first executing the activity that is most likely to reject a case based on predictive models of each case's attributes. This avoids performing expensive downstream activities unnecessarily. The approach is evaluated on two real-world datasets, showing it reduces the average number of process checks required by selectively performing the knockout activity earlier. Overall, predictive activity ordering provides a way to reduce overprocessing waste in business processes.
My business processes are deviant! What should I do about it?Marlon Dumas
This document discusses techniques for identifying and addressing deviant business processes. It defines deviance as processes that violate compliance rules, service level objectives, or cost targets. The document recommends a two-pronged approach of deviance mining and predictive monitoring. Deviance mining involves analyzing process event logs to discover patterns that distinguish normal and deviant cases, in order to explain the causes of deviance. Predictive monitoring uses the patterns to predict future deviance and generate alerts. Several case studies are described where organizations successfully applied these techniques to problems like late deliveries, faulty products, and software issues. The key takeaway is that organizations should quantify, analyze, monitor, and predict deviance to preempt problems in their business processes.
Business Process Performance Mining with Staged Process FlowsMarlon Dumas
This document proposes a new technique called staged process flows to analyze how business process performance evolves over time. It introduces measures to quantify the performance of each process stage and the overall process. These measures are calculated over time periods to show how performance changes. The approach is evaluated on two real-world event logs where it is able to answer questions about how overall performance, bottlenecks, and demand/capacity affect the processes over time. The technique provides novel visual analytics to help investigate process patterns and bottlenecks.
Automated Discovery of Structured Process Models: Discover Structured vs Disc...Marlon Dumas
Research paper presentation at the 35th International Conference on Conceptual Modeling (ER'2016), Gifu, Japan, 15 Nov. 2016
Presentation delivered by Raffaele Conforti.
Paper available at: http://goo.gl/5EN3l2
Apromore: Advanced Business Process Analytics on the CloudMarlon Dumas
Tutorial delivered at the 16th International Conference on Business Process Management (BPM'2018), Sydney, Australia, 13 September 2018. The tutorial provides an introduction to process mining and predictive process monitoring using Apromore
Business Process Analytics: From Insights to PredictionsMarlon Dumas
Keynote talk at the 13th Baltic Conference on Databases and Information Systems, Trakai, Lithuania, 2 July 2018.
Abstract
Business process analytics is a body of methods for analyzing data generated by the execution of business processes in order to extract insights about weaknesses and improvement opportunities, both at the tactical and operational levels. Tactical process analytics methods (also known as process mining) allow us to understand how a given business process is actually executed, if and how its execution deviates with respect to expected or normative pathways, and what factors contribute to poor process performance or undesirable outcomes. Meantime, operational process analytics methods allow us to monitor ongoing executions of a business process in order to predict future states and undesirable outcomes at runtime (predictive process monitoring). Existing methods in this space allow us to predict, for example, which task will be executed next in a case, when, and who will perform it? When will an ongoing case complete? What will its outcome be and how can negative outcomes be avoided? This keynote will present a framework for conceptualizing business process analytics methods and applications. The talk will provide an overview of state-of-art methods and tools in the field and will outline open challenges and research opportunities.
Collaborative Business Process Execution on Blockchain: The Caterpillar ApproachMarlon Dumas
Invited talk at the CAiSE'2019 Workshop on Blockchains for Inter-Organizational Collaboration and Flexible Advanced Information Systems (BIOC & FAiSE 2019).
Caterpillar: A Blockchain-Based Business Proces Management SystemMarlon Dumas
Caterpillar is a blockchain-based business process management system (BPMS) that uses smart contracts to store process state and drive process execution without a database or separate execution engine. Key process data like the process model and instance state are stored on the blockchain, providing a single source of truth. Process models designed in BPMN can be automatically translated to smart contracts. This ensures correct and transparent execution across participants on the blockchain network. While promising, challenges remain around transaction costs, throughput limits, and handling large amounts of process data efficiently.
Introduction to Business Process Monitoring and Process MiningMarlon Dumas
Two-day course delivered at the Chinese Business Process Management (BPM) Summer School in Jinan, China, 23-24 August 2018. The course introduces a range of techniques, tools, and algorithms for process monitoring and mining.
Automated Discovery of Data Transformations for Robotic Process AutomationMarlon Dumas
Paper presentation by Artem Polyvyanyy at the AAAI Workshop on Intelligent Process Automation (IPA), New York, 7 February 2020. Paper available at: https://arxiv.org/pdf/1912.01855.pdf
Interpreted Execution of Business Process Models on BlockchainMarlon Dumas
Research paper presentation delivered at the IEEE Enterprise Computing Conference (EDOC), Paris, France, 30 October 2019. The paper introduces the technical details of Caterpillar´s business process execution engine v3.0 https://git.io/caterpillar - Paper available at https://arxiv.org/pdf/1906.01420.pdf
Keynote talk by Marlon Dumas at the Bolzano Rules and Artificial INtelligence Summit (BRAIN 2019), RuleML+RR and GCAI Conferences, Bolzano, Italy, 17 September 2019. The talk gives an overview of state-of-the-art methods in the field of process mining and predictive process monitoring and spells out research challenges in the fields of prescriptive process monitoring and automated process improvement.
Discovering Branching Conditions from Business Process Execution LogsMarlon Dumas
Paper presentation given at the International Conference on Fundamental Approaches to Software Engineering (FASE) in March 2013. The paper can be found <a>here</a>.
Process Mining and Predictive Process Monitoring: From Technology to Business...Marlon Dumas
This document discusses process mining and predictive process monitoring. It begins with an overview of business process management and how process mining fits within the broader process architecture. It then covers the key techniques in process mining like process discovery, conformance checking, performance mining, and predictive process monitoring. Examples of process mining case studies in different domains are provided. The document concludes with a discussion of how process mining can be used to enable automated process improvement.
Process Mining 2.0: From Insights to ActionsMarlon Dumas
The document discusses several topics in process mining research including predictive process monitoring, prescriptive process monitoring, robotic process mining, data-driven simulation, and causal process mining. It provides references for further research on each topic, with links to relevant papers that outline techniques in each area.
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 3: Combined Error Propagation Analysis and Runtime Event Detection in Process-driven Systems
Predictive Process Monitoring with Hyperparameter OptimizationMarlon Dumas
1. The document presents a predictive process monitoring framework that is enhanced with technique and hyperparameter optimization.
2. The framework evaluates multiple configurations of machine learning techniques and their hyperparameters on historical execution traces to identify the most suitable configuration for a given prediction problem and dataset.
3. An evaluation of the framework on two prediction problems and datasets found that it was able to identify suitable configurations within a reasonable time frame, though the best configuration varied depending on the prediction problem and users' performance criteria.
Minimizing Overprocessing Waste in Business Processes via Predictive Activity...Marlon Dumas
This document presents an approach to minimize overprocessing waste in business processes by predictively ordering activities. It does so by first executing the activity that is most likely to reject a case based on predictive models of each case's attributes. This avoids performing expensive downstream activities unnecessarily. The approach is evaluated on two real-world datasets, showing it reduces the average number of process checks required by selectively performing the knockout activity earlier. Overall, predictive activity ordering provides a way to reduce overprocessing waste in business processes.
My business processes are deviant! What should I do about it?Marlon Dumas
This document discusses techniques for identifying and addressing deviant business processes. It defines deviance as processes that violate compliance rules, service level objectives, or cost targets. The document recommends a two-pronged approach of deviance mining and predictive monitoring. Deviance mining involves analyzing process event logs to discover patterns that distinguish normal and deviant cases, in order to explain the causes of deviance. Predictive monitoring uses the patterns to predict future deviance and generate alerts. Several case studies are described where organizations successfully applied these techniques to problems like late deliveries, faulty products, and software issues. The key takeaway is that organizations should quantify, analyze, monitor, and predict deviance to preempt problems in their business processes.
Business Process Performance Mining with Staged Process FlowsMarlon Dumas
This document proposes a new technique called staged process flows to analyze how business process performance evolves over time. It introduces measures to quantify the performance of each process stage and the overall process. These measures are calculated over time periods to show how performance changes. The approach is evaluated on two real-world event logs where it is able to answer questions about how overall performance, bottlenecks, and demand/capacity affect the processes over time. The technique provides novel visual analytics to help investigate process patterns and bottlenecks.
Complete and Interpretable Conformance Checking of Business ProcessesMarlon Dumas
This document presents a new approach for conformance checking of business processes that identifies all differences between a process model and an event log. It generates natural language statements to describe each difference. The approach works by translating the model and log into prime event structures and extracting mismatches by comparing their partially synchronized product. It can identify seven elementary mismatch patterns to characterize deviations. The approach was implemented in a standalone Java tool and evaluated on a real-life process with over 150,000 event traces.
Predictive Business Process Monitoring with Structured and Unstructured DataMarlon Dumas
Presentation delivered by Irene Teinemaa at the BPM'2016 conference, Rio de Janeiro, 22 September 2016. Paper available at: http://kodu.ut.ee/~dumas/pubs/bpm2016predictivemonitoring.pdf
Evidence-Based Business Process ManagementMarlon Dumas
1. The document discusses trends in business process management, specifically the rise of evidence-based business process management using process mining techniques.
2. Process mining allows companies to analyze process data from event logs to understand their actual processes, quantify the impact of changes, and discover opportunities for improvement.
3. The techniques discussed include process discovery, conformance checking, predictive monitoring, and rule mining to provide insights into deviations, bottlenecks, and other process issues.
Introduction to Business Process Analysis and RedesignMarlon Dumas
Special course on business process analysis and design delivered at University of Granada on 23-24 January 2014. The course covers qualitative and quantitative process analysis techniques and redesign heuristics. Based on the textbook Fundamentals of Business Process Management by Dumas et al.
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Marlon Dumas
Marlon Dumas of University of Tartu gives an introduction and quick tour of the business process management lifecycle. Seminar given at the Estonian BPM Roundtable, 10 October 2013.
Minería de Procesos y de Reglas de NegocioMarlon Dumas
Charla sobre minería de procesos y reglas de negocio en el 1er Foro Colombiano de BPM organizado por la Universidad de los Andes (Bogotá), 29 de Noviembre 2013 - http://forosisis.uniandes.edu.co/bpm/1er-forodebpm/
Introduction to Business Process ManagementAlan McSweeney
Training Course - Introduction to Business Process Management
It is intended to be a good general and practical introduction to the subject. It covers the following topics:
1. Business Process Management
2. Process Modelling
3. Process Analysis
4. Process Design
5. Process Performance Management
6. Process Transformation
7. Process Management Organisation
8. Enterprise Process Management
9. Business Process Management Technologies
10. Business Process Management and Business Analysis
11. Business Process Management Technology Review
Process monitoring falls under program evaluation and assesses how program activities are implemented. It involves regularly tracking implementation through methods like reviewing reports and field observations. Process monitoring aims to improve efficiency and inform reprogramming. It answers questions about what is being done, by whom, for whom, how, when, and where. The information collected through process monitoring can then be used by managers, donors, governments, and communities to improve implementation and inform future programs. A successful process monitoring framework involves determining the purpose and uses of monitoring, developing measurable objectives, evaluation questions, collecting credible evidence, analyzing the information, and reporting findings.
Predictive Analytics Powered By Process Mining: It’s The Process, Stupid!Rising Media Ltd.
Prof. Dr. Wil van der Aalst, Distinguished University Professor, Eindhoven University of Technology
Recently, process mining emerged as a new scientific discipline on the interface between process models and event data. Conventional Business Process Management (BPM) and Workflow Management (WfM) approaches and tools are mostly model-driven with little consideration for event data. Data Mining (DM), Business Intelligence (BI), and Machine Learning (ML) focus on data without considering end-to-end process models. Process mining aims to bridge the gap between BPM and WfM on the one hand and DM, BI, and ML on the other hand. The challenge is to turn torrents of event data ("Big Data") into valuable insights related to performance and compliance. Process mining is one of the few mature approaches that can indeed be used to identify, understand, and predict bottlenecks, inefficiencies, deviations, and risks. Process mining helps organizations to "mine their own business": they are enabled to discover, monitor and improve real processes by extracting knowledge from event logs. In his talk, Wil van der Aalst will provide an overview of this exciting field. Moreover, he will focus on the predictive value of process mining. All of this will be illustrated using many real-life examples demonstrating the unique capabilities of today’s process mining tools.
This document discusses developing an Office of Strategic Management (OSM) to ensure ongoing success with the Balanced Scorecard approach. It outlines key attributes for leading an OSM, including being a strategist who owns the strategic process, a scorekeeper who manages how strategy is structured and implemented, and a gatekeeper and guide who focuses attention and provides direction. The document also discusses how focusing on successful customer outcomes can help align organizations and drive innovation when developing a balanced scorecard.
Industrial Analytics and Predictive Maintenance 2017 - 2022Rising Media Ltd.
In this session we will present the results of two recent, international studies on the state of data analytics in industrial settings. You will get insights from an in-depth industry survey of 151 analytics professionals and decision-makers in industrial companies, providing a deep-dive into strategies, project types, cost structures and skill-demand in IoT-based analytics. In addition we will present a survey focusing on predictive analytics covering the market potential and expected development until 2022.
1) Process mining uses event data to discover, monitor and improve real processes. It serves as a new type of spreadsheet to analyze event data and discover processes.
2) Process mining tools like ProM can be used to perform process discovery from event logs, conformance checking by comparing modeled and observed behavior, and other types of analysis without requiring process modeling.
3) The main challenges in data science and process mining include dealing with high volume and velocity data, extracting useful knowledge from data to answer known and unknown questions, and ensuring responsible use of data and algorithms that considers fairness, accuracy, transparency and other factors.
Business Process Monitoring and MiningMarlon Dumas
Lecture delivered at the Second Latin-American Summer School in Business Process Management, Bogota, Colombia, 28 June 2017 - http://ii-las-bpm.uniandes.edu.co/
ReComp, the complete story: an invited talk at Cardiff UniversityPaolo Missier
The document describes the ReComp framework for efficiently recomputing analytics processes when changes occur. ReComp uses provenance data from past executions to estimate the impact of changes and selectively re-execute only affected parts of processes. It identifies changes, computes data differences, and estimates impacts on past outputs to determine the minimum re-executions needed. For genomic analysis workflows, ReComp reduced re-executions from 495 to 71 by caching intermediate data and re-running only impacted fragments. The framework is customizable via difference and impact functions tailored to specific applications and data types.
Efficient Re-computation of Big Data Analytics Processes in the Presence of C...Paolo Missier
This document discusses efficient re-computation of big data analytics processes when changes occur. It presents the ReComp framework which uses process execution history and provenance to selectively re-execute only the relevant parts of a process that are impacted by changes, rather than fully re-executing the entire process from scratch. This approach estimates the impact of changes using type-specific difference functions and impact estimation functions. It then identifies the minimal subset of process fragments that need to be re-executed based on change impact analysis and provenance traces. The framework is able to efficiently re-compute complex processes like genomics analytics workflows in response to changes in reference databases or other dependencies.
Scalable frequent itemset mining using heterogeneous computing par apriori a...ijdpsjournal
Association Rule mining is one of the dominant tasks of data mining, which concerns in finding frequent
itemsets in large volumes of data in order to produce summarized models of mined rules. These models are
extended to generate association rules in various applications such as e-commerce, bio-informatics,
associations between image contents and non image features, analysis of effectiveness of sales and retail
industry, etc. In the vast increasing databases, the major challenge is the frequent itemsets mining in a
very short period of time. In the case of increasing data, the time taken to process the data should be
almost constant. Since high performance computing has many processors, and many cores, consistent runtime
performance for such very large databases on association rules mining is achieved. We, therefore,
must rely on high performance parallel and/or distributed computing. In literature survey, we have studied
the sequential Apriori algorithms and identified the fundamental problems in sequential environment and
parallel environment. In our proposed ParApriori, we have proposed parallel algorithm for GPGPU, and
we have also done the results analysis of our GPU parallel algorithm. We find that proposed algorithm
improved the computing time, consistency in performance over the increasing load. The empirical analysis
of the algorithm also shows that efficiency and scalability is verified over the series of datasets
experimented on many core GPU platform.
Automated Process Improvement: Status, Challenges, and PerspectivesMarlon Dumas
Automated process improvement uses process mining techniques to recommend optimizations to business processes. It can suggest changes to tasks, control flow, decisions, and resource allocation based on event log analysis. Process mining discovers predictive models and simulates the effects of different changes to identify sets of improvements that optimize given performance metrics. Key challenges include scaling to real processes, estimating impacts on multiple metrics, and usability of change recommendations.
Stream-IT: Continuous and Dynamic Processing of Production Systems Data (thro...Hannaneh Najdataei
1) Stream processing enables real-time analysis of manufacturing data by continuously processing data as it is generated. This is more feasible than traditional batch processing approaches.
2) A case study on detecting throughput bottlenecks uses an active period method to classify machine states and identify the machine with the highest average active period as the bottleneck.
3) The method is implemented using a streaming approach where data about machine states and durations is processed in real-time to continuously calculate and identify the bottleneck, providing results with low latency. Evaluation on real manufacturing data showed the architecture could identify bottlenecks across shifts.
This document discusses data-aware business processes and data-centric process modeling. It introduces data-centric dynamic systems (DCDSs) as a formal model for artifact-centric systems that uses a relational data layer and process layer to evolve the data. An example of a travel reimbursement process is used to illustrate DCDS modeling, including defining the data schema, modeling process actions that update the data, and showing an example execution. Automated enactment and verification of DCDS models is also discussed.
This session took place at New York City on November 4th, 2019.
Speaker Bio:
Chemere is a Senior Data Science Training Specialist for H2O.ai. Chemere has a Master's in Business Administration with focus in Marketing Analytics from the University of North Carolina at Charlotte. She is an experienced data scientist with a diverse background in transformational decision-making in various industries including Banking, Manufacturing, Logistics, and Medical Devices. Chemere joins us from Venus Concept/2two5, where she was the Lead Data Scientist focused on building predictive models with Internet of Things (IoT) data and for a subscription-based marketing product for B2B customers. Prior to that, Chemere worked as a Senior Data Scientist at Wells Fargo Bank focused on various applied predictive analytic solutions.
More details about the event can be had here: https://www.eventbrite.com/e/dive-into-h2o-new-york-tickets-76351721053
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Marlon Dumas
Paper presentation at the International Conference on Advanced Information Systems Engineering (CAiSE).
This paper presents an approach to automatically discover business process simulation models from event logs by combining process mining and deep learning techniques.
Paper available at: https://link.springer.com/chapter/10.1007/978-3-031-07472-1_4
Explainable Predictive and Prescriptive Process AnalyticsRiccardoGalanti2
The document discusses explainable predictive and prescriptive process analytics of customizable business KPIs. It proposes approaches for generating explanations for predictions made by black-box models, including SHAP and intrinsic post-hoc methods. It also describes developing a process-aware recommender system that predicts outcomes of possible next activities and suggests actions to improve process execution and expected KPIs. An evaluation with users found the explanations to be comprehensible and the system easy to use.
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Marlon Dumas
This document discusses using event logs to generate business process simulation models. It describes traditional discrete event simulation approaches that discover simulation models from event logs recorded by information systems. Deep learning techniques are also discussed that can generate traces without an explicit process model. The document suggests that combining discrete event simulation and deep learning may produce more accurate simulations, but challenges remain around validating such hybrid approaches and testing them in previously unseen scenarios. More research is needed before these data-driven simulation methods can reliably predict the effects of interventions.
Zipline is Airbnb’s data management platform specifically designed for ML use cases. Previously, ML practitioners at Airbnb spent roughly 60% of their time on collecting and writing transformations for machine learning tasks. Zipline reduces this task from months to days – by making the process declarative. It allows data scientists to easily define features in a simple configuration language. The framework then provides access to point-in-time correct features – for both – offline model training and online inference. In this talk we will describe the architecture of our system and the algorithm that makes the problem of efficient point-in-time correct feature generation, tractable.
The attendee will learn
Importance of point-in-time correct features for achieving better ML model performance
Importance of using change data capture for generating feature views
An algorithm – to efficiently generate features over change data. We use interval trees to efficiently compress time series features. The algorithm allows generating feature aggregates over this compressed representation.
A lambda architecture – that enables using the above algorithm – for online feature generation.
A framework, based on category theory, to understand how feature aggregations be distributed, and independently composed.
While the talk if fairly technical – we will introduce all the concepts from first principles with examples. Basic understanding of data-parallel distributed computation and machine learning might help, but are not required.
Kakfa summit london 2019 - the art of the event-streaming appNeil Avery
Have you ever imagined what it would be like to build a massively scalable streaming application on Kafka, the challenges, the patterns and the thought process involved? How much of the application can be reused? What patterns will you discover? How does it all fit together? Depending upon your use case and business, this can mean many things. Starting out with a data pipeline is one thing, but evolving into a company-wide real-time application that is business critical and entirely dependent upon a streaming platform is a giant leap. Large-scale streaming applications are also called event streaming applications. They are classically different from other data systems; event streaming applications are viewed as a series of interconnected streams that are topologically defined using stream processors; they hold state that models your use case as events. Almost like a deconstructed real-time database.
In this talk, I step through the origins of event streaming systems, understanding how they are developed from raw events to evolve into something that can be adopted at an organizational scale. I start with event-first thinking, Domain Driven Design to build data models that work with the fundamentals of Streams, Kafka Streams, KSQL and Serverless (FaaS).
Building upon this, I explain how to build common business functionality by stepping through the patterns for: – Scalable payment processing – Run it on rails: Instrumentation and monitoring – Control flow patterns Finally, all of these concepts are combined in a solution architecture that can be used at an enterprise scale. I will introduce enterprise patterns such as events-as-a-backbone, events as APIs and methods for governance and self-service. You will leave talk with an understanding of how to model events with event-first thinking, how to work towards reusable streaming patterns and most importantly, how it all fits together at scale.
The Art of The Event Streaming Application: Streams, Stream Processors and Sc...confluent
1) The document discusses the art of building event streaming applications using various techniques like bounded contexts, stream processors, and architectural pillars.
2) Key aspects include modeling the application as a collection of loosely coupled bounded contexts, handling state using Kafka Streams, and building reusable stream processing patterns for instrumentation.
3) Composition patterns involve choreographing and orchestrating interactions between bounded contexts to capture business workflows and functions as event-driven data flows.
Winter Simulation Conference 2021 - Process Wind Tunnel TalkSudhendu Rai
The talk associated with this presentation can be accessed at:
https://youtu.be/VXEVuXW9knU
Abstract
In this talk, we will introduce a simulation-based process improvement framework and methodology called the Process Wind Tunnel. We will describe this framework and introduce the underlying technologies namely process mapping and data collection, data wrangling, exploratory data analysis and visualization, process mining, discrete-event simulation optimization and solution implementation. We will discuss how Process Wind Tunnel framework was utilized to improve a critical business process namely, the post-execution trade settlement process. The work builds upon and generalizes the Lean Document Production solution (2008 Edelman finalist) for optimizing printshops to more general and complex business processes found within the insurance and financial services industry.
Process wind tunnel - A novel capability for data-driven business process imp...Sudhendu Rai
A talk I gave recently on data-driven process improvement methodology and techniques with applications and results from insurance and finance processes
The document discusses predictive maintenance using Azure AI. It describes key concepts of predictive maintenance including predicting failures in advance to schedule timely repairs. It shows the architecture of a predictive maintenance solution template in Azure, including ingesting sensor data, training and testing models, and deploying models for online predictions. The template aims to help reduce operational risks, increase asset utilization, and lower maintenance costs.
How GenAI will (not) change your business?Marlon Dumas
Not all new technology waves are the same. Some waves are vertical (3D printing, digital twins, blockchain) while others are horizontal (the PC in the 80s, the Web in the 90s). GenAI is a horizontal wave. The question is not if GenAI will impact my business, but what will be the scope of this impact. In this talk, we will go through a journey of collisions: GenAI colliding with customer service, clerical work, information search, content production, IT development, product design, and other knowledge work. A common thread to understand the impact of GenAI is to distinguish between descriptive use cases (search, summarize, expand, transcribe & translate) versus creative use.
Walking the Way from Process Mining to AI-Driven Process OptimizationMarlon Dumas
While generative AI grabs headlines, most organizations are yet to achieve continuous process improvement from predictive and prescriptive analytics.
Why? It’s largely about data, people, and a methodical approach to deploy AI to connect data and people. The good news is that if your organization has built a process mining capability, you are well placed to climb the ladder to achieve AI-driven process optimization. But to get there, you need a disciplined step-by-step approach along two tracks: a tactical management track and an operational management track.
First, it’s about predicting what will happen if you leave your process as-is, and what will happen if you implement a change in your process. At a tactical level, a predictive capability allows you to prioritize improvement opportunities. At an operational level, it allows you to predict issues, such as deadline violations. The challenges here are how to manage the inherent uncertainty of data-driven AI systems, and how to change your people and culture to manage processes proactively, rather than reactively. One thing is to deploy predictive dashboards, another entirely different thing is to get people to use them effectively to improve the processes.
Next, it’s about becoming preemptive: continuously optimizing your processes by leveraging streams of data-driven recommendations to trigger changes and actions. At the tactical level, this prescriptive capability allows you to implement the right changes to maximize competing KPIs. At the operational level, it means triggering interventions in your processes to “wow” customers and to meet SLAs in a cost-effective manner. The challenge here is how to help process owners, workers, and other stakeholders to understand the causes of performance issues and how the recommendations generated by the AI-driven optimization system will tackle those causes?
And finally, as an icing on the cake, generative AI allows you to produce improvement scenarios to adapt to external changes. Importantly, the transformative potential of generative AI in the context of process improvement does not come from its ability to provide question-and-answer interfaces to query data. It comes from its ability to support continuous process adaptation by generating and validating hypotheses based on a holistic view of your organization.
In this talk, we will discuss how organizations are driving sustainable business value by strategically layering predictive, prescriptive, and generative AI onto a process mining foundation, one brick at a time.
Industry keynote talk by Marlon Dumas at the 5th International Conference on Process Mining (ICPM'2023), Rome, Italy, 25 October 2023
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Marlon Dumas
In the field of business process simulation, the availability of resources is captured by assigning a calendar to each resource, e.g., Monday-Friday 9:00-18:00. Resources are assumed to be always available to perform activities during their calendar. This assumption often does not hold due to interruptions, breaks, or because resources time-share across multiple processes. A simulation model that captures availability via crisp time slots (a resource is either on or off during a slot) does not capture these behaviors, leading to inaccuracies in the simulation output. This paper presents a simulation approach wherein resource availability is modeled probabilistically. In this approach, each availability time slot is associated with a probability, allowing us to capture, for example, that a resource is available on Fridays between 14:00-15:00 with 90% probability and between 17:00-18:00 with 50% probability. The paper proposes an algorithm to discover probabilistic availability calendars from event logs. An empirical evaluation shows that simulation models with probabilistic calendars discovered from event logs, replicate the temporal distribution of activity instances and cycle times of a process more closely than simulation models with crisp calendars.
This presentation was delivered at the 5th International Conference on Process Mining (ICPM'2023), Rome, Italy, October 2023.
The paper is available at: https://easychair.org/publications/preprint/Rz9g
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Marlon Dumas
Business Process Simulation (BPS) is an approach to analyze the performance of business processes under different scenarios. For example, BPS allows us to estimate what would be the cycle time of a process if one or more resources became unavailable. The starting point of BPS is a process model annotated with simulation parameters (a BPS model). BPS models may be manually designed, based on information collected from stakeholders and empirical observations, or automatically discovered from execution data. Regardless of its origin, a key question when using a BPS model is how to assess its quality. In this paper, we propose a collection of measures to evaluate the quality of a BPS model w.r.t. its ability to replicate the observed behavior of the process. We advocate an approach whereby different measures tackle different process perspectives. We evaluate the ability of the proposed measures to discern the impact of modifications to a BPS model, and their ability to uncover the relative strengths and weaknesses of two approaches for automated discovery of BPS models. The evaluation shows that the measures not only capture how close a BPS model is to the observed behavior, but they also help us to identify sources of discrepancies.
Presentation delivered by David Chapela-Campa at the BPM'2023 conference, Utrecht, September 2023.
Business Process Optimization: Status and PerspectivesMarlon Dumas
For decades, business process optimization has been largely about art and craft (and sometimes wizardry). Apart from narrowly scoped approaches to optimize resource allocation (often assuming that workers behave like robots), a lot of business process optimization relies on high-level guidelines, with A/B testing for idea validation, which is hard to scale to complex processes. As a result, managers end up settling for a "good enough" process. Can we do more? In this talk, we review recent work on the use of high-fidelity simulation models discovered from execution data. The talk also explores the possibilities (and perils) that LLMs bring to the field of business process optimization.
This talk was delivered at the Workshop on Data-Driven Business Process Optimization at the BPM'2023 conference.
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Marlon Dumas
Paper presentation at the 35th International Conference on Advanced Information Systems Engineering (CAiSE'2023).
Abstract.
Increasing the success rate of a process, i.e. the percentage of cases that end in a positive outcome, is a recurrent process improvement goal. At runtime, there are often certain actions (a.k.a. treatments) that workers may execute to lift the probability that a case ends in a positive outcome. For example, in a loan origination process, a possible treatment is to issue multiple loan offers to increase the probability that the customer takes a loan. Each treatment has a cost. Thus, when defining policies for prescribing treatments to cases, managers need to consider the net gain of the treatments. Also, the effect of a treatment varies over time: treating a case earlier may be more effective than later in a case. This paper presents a prescriptive monitoring method that automates this decision-making task. The method combines causal inference and reinforcement learning to learn treatment policies that maximize the net gain. The method leverages a conformal prediction technique to speed up the convergence of the reinforcement learning mechanism by separating cases that are likely to end up in a positive or negative outcome, from uncertain cases. An evaluation on two real-life datasets shows that the proposed method outperforms a state-of-the-art baseline.
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesMarlon Dumas
Presentation of a research paper at the 35th International Conference on Advanced Information Systems Engineering (CAiSE) in Zaragoza Spain. The paper presents a classification of causes of waiting times in business processes and a method to automatically detect and quantify the presence of each of these causes in a business process recorded in an event log.
This talk introduces the concept of Augmented Business Process Management System: An ABPMS is a process-aware information system that relies on trustworthy AI technology to
reason and act upon data, within a set of restrictions, with the aim to continuously adapt and
improve a set of business processes with respect to one or more key performance indicators.
The talk describes the transition from existing process mining technology to AI-Augmented BPM as a pyramid, where predictive, prescriptive, conversational and reasoning capabilities are stacked up incrementally to reach the level of Augmented BPM.
Talk delivered at the AAAI'2023 Workshop on AI for Business Process Management.
Process Mining and Data-Driven Process SimulationMarlon Dumas
Guest lecture delivered at the - Institut Teknologi Sepuluh on 8 December 2022.
This lecture gives an overview of process mining and simulation techniques, and how the two can be used together in process improvement projects.
Modeling Extraneous Activity Delays in Business Process SimulationMarlon Dumas
This paper presents a technique to enhance the fidelity of business process simulation models by detecting unexplained (extraneous) delays from business process execution data, and modeling these delays in the simulation model, via timer events.
The presentation was delivered at the 4th International Conference on Process Mining (ICPM'2022).
Paper available at: https://arxiv.org/abs/2206.14051
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Marlon Dumas
Existing methods for discovering business process simulation models from execution data (event logs) assume that all resources in a pool have the same performance and share the same availability calendars. This paper proposes a method for discovering simulation models, wherein each resource is treated as an individual entity, with its own performance and availability calendar. An evaluation shows that simulation models with differentiated resources more closely replicate the distributions of cycle times and the work rhythm in a process than models with undifferentiated resources. The paper is available at: https://link.springer.com/chapter/10.1007/978-3-031-16103-2_24
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsMarlon Dumas
This paper presents an approach to trigger runtime interventions at runtime, in order to improve the success rate of a process, when the number of resources who can perform these interventions is limited.
The paper is available at: https://link.springer.com/chapter/10.1007/978-3-031-16171-1_13
The presentation delivered at the 20th International Conference on Business Process Management (BPM'2022), in Muenster, Germany, September 2022.
Slides of a lecture delivered at the First Process Mining Summer School in Aachen, Germany, July 2022.
This lecture introduces techniques in the area of "task mining" with an emphasis on Robotic Process Mining. Robotic Process Mining (RPM) is a family of techniques to discover repetitive routines that can be automated using Robotic Process Automation (RPA) technology, by analyzing interactions between
one or more workers and one or more software applications, during the performance of one or more tasks in a business process. In general, RPM techniques take as input logs of User Interactions (UI logs). These UI logs are recorded while workers interact with one or more applications, typically desktop applications. Based on these logs, RPM techniques produce specifications of one or more routines that can be automated using RPA or related tools.
Process Mining: A Guide for PractitionersMarlon Dumas
This document presents a guide for practitioners on process mining. It introduces process mining and discusses its main use cases. These use cases are categorized into discovery oriented, future and change oriented, alignment oriented, variant oriented, and performance oriented. The document also provides a framework to classify use cases and discusses the business-oriented questions that can be answered using different process mining use cases, such as improving transparency, quality, agility, efficiency and conformance.
Process Mining for Process Improvement.pptxMarlon Dumas
Presentation of a research paper at the 16th International Conference on Research Challenges in Information Science (RCIS). The paper presents the results of an empirical study on how practitioners use process mining to identify business process improvement opportunities. The paper is available at: https://link.springer.com/chapter/10.1007/978-3-031-05760-1_13
Data-Driven Analysis of Batch Processing Inefficiencies in Business ProcessesMarlon Dumas
Slides of a research paper presentation at the 16th International Conference on Research Challenges in Information Science (RCIS).
The research paper presents an approach to analyze event logs of business processes in order to identify batched activities and to analyze the waiting times caused by these activities.
Paper available at: https://link.springer.com/chapter/10.1007/978-3-031-05760-1_14
Optimización de procesos basada en datosMarlon Dumas
Ponencia en BPM Day Lima 2021.
En esta charla, hablaremos de métodos y aplicaciones emergentes en el ámbito de la optimización de procesos basada en datos. Hablaremos de avances en el área de la minería de procesos, de métodos de construcción de gemelos digitales de procesos y de métodos de monitoreo predictivo. Mostraremos por medio de ejemplos y casos de estudio, cómo estos métodos permiten guiar las iniciativas de transformación digital y de mejora continua de procesos, En particular, ilustraremos el uso de estos métodos para: (1) analizar el rendimiento de los procesos de negocio de manera a identificar fricciones y oportunidades de automatización; (2) predecir el impacto de cambios, y en particular, predecir el impacto de una iniciativa de automatización; (3) realizar predicciones sobre el rendimiento del proceso y ajustar la ejecución del proceso de manera a prevenir incumplimientos del SLA, quejas de clientes, y otros eventos indeseables.
Process Mining and AI for Continuous Process ImprovementMarlon Dumas
Talk delivered at BPM Day Rio Grande do Sul on 11 November 2021.
Abstract.
Process mining is a technology that marries methods from business process management and from data science, to support operational excellence and digital transformation. Process mining tools can transform data extracted from enterprise systems, into visualizations and reports that allow managers to improve organizational performance along different dimensions, such as efficiency, quality, and compliance. In this talk, we will give an overview of the capabilities of process mining tools, and we will illustrate the benefits of process mining via several case studies in the fields of insurance, manufacturing, and IT service management.
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionMarlon Dumas
Paper presentation at the 3rd International Conference on Process Mining (ICPM), 4 November 2021.
The paper is available at: https://arxiv.org/abs/2105.07111
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...Marlon Dumas
Keynote talk by Marlon Dumas at the SIMULTECH 2021 conference. The talk gives an overview of ongoing research on automated construction of simulation models / digital twins from business process execution logs, including approaches that combine discrete event simulation with deep learning methods.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
5. Alpha Algorithm
• Direct successors:
A > B, B > C, C > D,
A > C, C > B, B > E, E > F
C > E, E > G
B > D
A B C D
A C B E F
• Causality:
A → B, C → D, A → C, B → E,
C → E, E → F, E → G , B → D
• Concurrency:
B ║ C
• Exclusiveness: all other pairs
A B C E G
A
C
B
D
5
6. Alpha Relations Matrix
A B C D E F G
A # → → → # # #
B ← # || → → # #
C ← || # → → # #
D # ← ← # # # #
E # ← ← # # → →
F # # # # ← # #
G # # # # ← # #
6
7. A B C D E F G
A # → → # # # #
B ← # || → → # #
C ← || # → → # #
D # ← ← # # # #
E # ← ← # # → →
F # # # # ← # #
G # # # # ← # #
Alpha Algorithm – Patterns
7
⇔
a→ b,
a→ c,
b ║ c
8. Automated Process Discovery
• Relations-based
– Alpha: lossy (Badouel, Petri Nets 2012)
– Alpha++
– Heuristics miner (frequency information)
• Genetic
• Region theory
• Petri net synthesis
• Integer Linear Programming (ILP)
• …
8
11. Alignment-Based Conformance
Log Model
A B C D EA B B C
Alignment
E
Fitness Precision
How much behavior of the log
is captured by the model?
How accurate is the model
describing the log?
Munoz-Gama et al. Petri nets 2013
11
12. Deviance Mining
12
T1 <e11[d111:v111, …, d11n:v11n] e12[d121:v121, …, d12m:v12m] … e1p[d1p1:v1p1, …, d1pm:v1pm]>
…
Tq <eq1[dq11:vq11, …, dq1n:vq1n] eq2[dq21:vq21, …, dq2m:vq2m] … eqp[dqp1:vqp1, …, dqpm:vqpm]>
T1 <e11[d111:v111, …, d11n:v11n] e12[d121:v121, …, d12m:v12m] … e1p[d1p1:v1p1, …, d1pm:v1pm]>
…
Tq <eq1[dq11:vq11, …, dq1n:vq1n] eq2[dq21:vq21, …, dq2m:vq2m] … eqp[dqp1:vqp1, …, dqpm:vqpm]>
Find a function F: Trace Boolean (or probability [0…1])
s.t.
•F is an accurate approximation of the given labeling
•F is explainable, e.g. set of simple predicates
13. Simple “timely” claims Simple “slow” claims
Deviance Mining via
Model Delta Analysis
13
Suriadi et al. Understanding Process Behaviours in a Large Insurance Company in Australia. CAiSE 2013
15. Deviance Mining via
Sequence Classification
• Apply discriminative sequence mining methods to
extract features characteristic of one class
• Build classification models (e.g. decision trees)
• Extract difference diagnostics from classification model
C. Sun et al. Mining explicit rules for software process evaluation.
15
17. (Prime) Event Structures
• Model of concurrency based on events
(occurrences of actions) and three relations
– Causality
– Conflict
– Concurrency
17
18. Petri Nets Event Structures
18
b
a
b
c
d
d
c
b
d
d
a
b
c
d
d
c
b
d
d
0
1
2
3
4
5
6
7
8
0
4
5
6 7
a
b
c
d
d d
9
19. Nets With Cycles Prefix
Unfolding
21
Petri net NPetri net N
Complete prefix
unfolding
Complete prefix
unfolding
Causality-preserving
prefix unfolding
Causality-preserving
prefix unfolding
20. Comparison of Event Structures
22
?
ES1
ES2
Armas-Cervantes et al. Behavioral Comparison of Process Models Based on […] Event Structures. BPM’2014
Partially
Synchronized
Product (PSP)
22. Comparison of Event Structures
24
In ES1, tasks C and B are
mutually exclusive, while
in ES2, B precedes C
In ES1, tasks C and B are
mutually exclusive, while
in ES2, B precedes C
?
ES1
ES2
Armas-Cervantes et al. Behavioral Comparison of Process Models Based on […] Event Structures. BPM’2014
24. Event Logs Event Structures
B || C
Concurrency
Oracle
Run
Merger
55 22 33
26
25. Event Structures for
Log Delta Analysis
27
van Beest et al. Log delta analysis: Interpretable differencing of business process event logs. BPM’2015
26. Event Structures for
Log Delta Analysis
In L1, task C can be
skipped after B,
whereas in L2 it cannot
In L1, task C can be
skipped after B,
whereas in L2 it cannot
van Beest et al. Log delta analysis: Interpretable differencing of business process event logs. BPM’2015
28
27. Log Delta Analysis
vs. Sequence Classification
448 cases
7329 events
363 cases,
7496 events
Sequence classification 106-
130 statements
IF |“NursingProgressNotes”| > 7.5
THEN L1
IF |“Nursing Progress Notes”| ≤ 7.5
AND |“Nursing Assessment”| > 1.5
THEN L2
…
Sequence classification 106-
130 statements
IF |“NursingProgressNotes”| > 7.5
THEN L1
IF |“Nursing Progress Notes”| ≤ 7.5
AND |“Nursing Assessment”| > 1.5
THEN L2
…
Log delta analysis
48 statements
In L1, “Nursing Primary
Assessment” is repeated after
“Medical Assign Start” and “Triage
Request”, while in L2 it is not.
…
Log delta analysis
48 statements
In L1, “Nursing Primary
Assessment” is repeated after
“Medical Assign Start” and “Triage
Request”, while in L2 it is not.
…
29
van Beest et al. Log delta analysis: Interpretable differencing of business process event logs. BPM’2015
29. Event Structures
for Conformance Checking
31
In the model, task C and
B are in conflict, whereas
in the log, B precedes C
In the model, task C and
B are in conflict, whereas
in the log, B precedes C
30. … vs. alignment-based
conformance checking
32
ABDE
ADBE
ACDE
ADCE
ABCDE
ABDCE
ADBCE
A B C D E
A C D E
A B D C E
A B D E
A D B C E
A D C E
?
33. The Road Ahead
• Developing more accurate concurrency
oracles
– Dealing with (short) loops in parallel branches
• Defining folding operators to generalize &
simplify Petri nets synthesized from ES
– Controlled generalization
• Extensions to events with data payloads
35
State-of-the-art conformance approach based on alignments
Find the optimal trace in model that better describes each trace on the log.
Occam RazorFitness
Precision
Other dimensions but here only this.