SlideShare uma empresa Scribd logo
1 de 23
Multi-perspective Process Analysis:
Mining the Association between
Control Flow and Data Objects
Dina Bayomie, Kate Revoredo, Jan Mendling
PAGE 2
Introduction
Multi-
perspective
Control-
flow
Resource
Time
Data
objects
-
-
-
-
PAGE 3
Introduction
RQ: What is the relation between control-
flow perspective and data objects behavior
perspective?
We propose a multi-perspective mining
technique based on association rule mining
to discover the data connections between
the control-flow and data objects behavior.
-
-
-
-
PAGE 4
Event Log Rule Miner (EL-RM)
PAGE 5
Preparing the Event log
• Prepare the data to align with the process analysts analysis
objectives
Log partition-
time frame
-
-
-
-
-
-
-
-
-
-
PAGE 6
Encoding event log into transaction table
• A transaction table sustains the control-flow perspective and
the change behavior over the data perspective.
• A transaction represents the
behavior of the data attributes
over a pair of events.
Control-flow perspective Atomic perspective Complex perspective
-
-
PAGE 7
Encoding event log into transaction table
-
-
PAGE 8
Encoding event log into transaction table
PAGE 9
Association rule mining
𝐈𝐅 𝑒𝑖. 𝐴𝑐𝑡 = 𝑎 ∧ 𝑒𝑗. 𝐴𝑐𝑡 = 𝑏 𝐓𝐇𝐄𝐍 𝑒𝑖. 𝐴𝑡𝑡𝑟 ≶ 𝑒𝑗. 𝐴𝑡𝑡𝑟
≶: < | > | = | ≠
PAGE 10
Association rule mining
PAGE 11
Analysing the rules
Ranking
Combining
Comparing
PAGE 12
Analysing the rules - Ranking
 We rank the rules using the known measures of association rules.
𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑅 =
|(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡) ⊆ 𝑇 |
|𝑇|
where 𝑇 𝑖𝑠 𝑡ℎ𝑒 𝑡𝑟𝑎𝑛𝑠𝑎𝑐𝑡𝑖𝑜𝑛𝑠
𝑐𝑜𝑛𝑓𝑖𝑑𝑒𝑛𝑐𝑒 𝑅 =
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅)
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡)
𝑙𝑖𝑓𝑡 𝑅 =
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅)
𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 ∗ 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡)
 In this step, We prepare the rules to align with the analysis objectives.
PAGE 13
Analysing the rules - combining
 EL-RM aggregates the rules based on common antecedent and common
consequent. We propose three possible aggregations.
1. The first option focuses on the control-flow perspective.
2. The second option focuses on the data object perspective.
3. The third option focuses on combine both the perspectives.
PAGE 14
Analysing the rules - combining
PAGE 15
Analysing the rules - compare
• we compare the rules generated from the different partitions to detect
the changes in behaviour over the divisions.
• We induce various sets of rules from the extracted rules by using the set
operations:
 All rules (Union set operation)
 Common rules (intersection set operation)
 Difference rules in a partition against Common rules (difference set operation)
 Partition unique rules (difference set operation)
 We conducted three exploratory experiments on three real datasets.
PAGE 16
Evaluation
 BPIC-2017 contains the events of the loan application
process of a Dutch financial institute. The events are
generated from three sub-processes, i.e., application,
offer and workflow.
 The log contains cases that started at the beginning
of 2016 until the 1st of February 2017.
PAGE 17
Experiment 1 – BPIC2017
Discovered rules = 751
Combine rules = 15
Confidence = [0.94,1]
Lift = [0.95, 13.63]
• R1: IF ei.Act = “OCreate Offer” and
ej.Act = “ OCreated”
THEN ei.EventID = ej.OfferID
• R2: IF ei.Act =”A_Complete” and
ej.Act = “ W_ValideApplication”
THEN ei.Resource = ej.Resource
 We conducted three exploratory experiments on three real datasets.
PAGE 18
Evaluation
 BPIC-2020 (prepaid travel) contains the events of
the prepaid travel request process at Eindhoven
University of Technology (TU/e).
 The log covers the cases from the beginning of
2017 till the 21st of February 2019.
PAGE 19
Experiment 2 – BPIC2020(prepaid travel)
All rules = 425
Common rules = 85
Confidence = [0.99, 1]
Lift = [1, 8.90]
• R1: IF ei.Act =“Permit APPROVED by
ADMINISTRATION” and ej.Act =
“Permit APPROVED by BUDGET
OWNER” THEN ei.Resource =
ej.Resource
• R2: IF ei.Act = “Permit APPROVED by
BUDGET OWNER” and ej.Act = “Permit
FINAL_APPROVED by SUPERVISOR”
THEN ei.org:role != ei.org:role
 We conducted three exploratory experiments on three real datasets.
PAGE 20
Evaluation
 Road traffic fine management process dataset
contains the events of the road traffic fines process.
The cases have a diverse cycle time duration
behavior. [mention duration of shortest and longest]
 The log covers the cases from the beginning of 2000
till the 18th of June 2013
PAGE 21
Experiment 3 – Road traffic fine
All rules = 239
Common rules = 159
Average confidence = 0.96
Average lift = 1.98
• R1: IF ei.Act =“Insert Fine Notification”
and ej.Act = “Insert Date Appeal to
Prefecture” THEN ei.NotifcationType !=
ej. NotifcationType
• R2: IF ei.Act =“Create Fine” and ej.Act =
“payment” THEN ei.NotifcationType =
ej. NotifcationType
 We proposed a multi-perspective mining technique for the discovery of data
connection.
 Our method uses association rules to represent the relation between the control
flow perspective and its impacts on the behavior of the data objects perspective
 The results of our evaluation showed the potential of the approach to extract
relevant insights about the change behavior of the attributes over
the events.
PAGE 22
Conclusion
Dina Bayomie
dbayomie@wu.ac.at
PAGE 23

Mais conteúdo relacionado

Semelhante a Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects

IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET Journal
 
Anuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnupritaBhoyar
 
Using human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsUsing human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsLeonardo ENERGY
 
09 planning techniques
09 planning techniques09 planning techniques
09 planning techniquesAman Palway
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTheAnfieldGroup
 
Lecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveLecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveRiri Ariyanty
 
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAMINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAcscpconf
 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data csandit
 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkSudhendu Rai
 
Three Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementThree Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementMichael Douglas
 
SA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfSA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfManjuAppukuttan2
 
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET Journal
 
Enfos erci webinar 20150224
Enfos erci webinar 20150224Enfos erci webinar 20150224
Enfos erci webinar 20150224Chris Wade
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCEkendahudson
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docxaulasnilda
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docxherminaprocter
 
Case Study: Energy Audit
Case Study: Energy AuditCase Study: Energy Audit
Case Study: Energy AuditIRJET Journal
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesMichael zur Muehlen
 

Semelhante a Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects (20)

IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
 
Anuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPT
 
Using human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsUsing human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programs
 
09 planning techniques
09 planning techniques09 planning techniques
09 planning techniques
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
Lecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveLecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs Behave
 
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAMINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data
 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
 
Business process compliance
Business process compliance Business process compliance
Business process compliance
 
Three Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementThree Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve Management
 
SA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfSA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdf
 
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
 
Enfos erci webinar 20150224
Enfos erci webinar 20150224Enfos erci webinar 20150224
Enfos erci webinar 20150224
 
Energy audit
Energy auditEnergy audit
Energy audit
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
 
Case Study: Energy Audit
Case Study: Energy AuditCase Study: Energy Audit
Case Study: Energy Audit
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business Processes
 

Último

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 

Último (20)

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 

Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects

  • 1. Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects Dina Bayomie, Kate Revoredo, Jan Mendling
  • 3. PAGE 3 Introduction RQ: What is the relation between control- flow perspective and data objects behavior perspective? We propose a multi-perspective mining technique based on association rule mining to discover the data connections between the control-flow and data objects behavior. - - - -
  • 4. PAGE 4 Event Log Rule Miner (EL-RM)
  • 5. PAGE 5 Preparing the Event log • Prepare the data to align with the process analysts analysis objectives Log partition- time frame - - - - - - - -
  • 6. - - PAGE 6 Encoding event log into transaction table • A transaction table sustains the control-flow perspective and the change behavior over the data perspective. • A transaction represents the behavior of the data attributes over a pair of events. Control-flow perspective Atomic perspective Complex perspective
  • 7. - - PAGE 7 Encoding event log into transaction table
  • 8. - - PAGE 8 Encoding event log into transaction table
  • 9. PAGE 9 Association rule mining 𝐈𝐅 𝑒𝑖. 𝐴𝑐𝑡 = 𝑎 ∧ 𝑒𝑗. 𝐴𝑐𝑡 = 𝑏 𝐓𝐇𝐄𝐍 𝑒𝑖. 𝐴𝑡𝑡𝑟 ≶ 𝑒𝑗. 𝐴𝑡𝑡𝑟 ≶: < | > | = | ≠
  • 11. PAGE 11 Analysing the rules Ranking Combining Comparing
  • 12. PAGE 12 Analysing the rules - Ranking  We rank the rules using the known measures of association rules. 𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑅 = |(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡) ⊆ 𝑇 | |𝑇| where 𝑇 𝑖𝑠 𝑡ℎ𝑒 𝑡𝑟𝑎𝑛𝑠𝑎𝑐𝑡𝑖𝑜𝑛𝑠 𝑐𝑜𝑛𝑓𝑖𝑑𝑒𝑛𝑐𝑒 𝑅 = 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅) 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡) 𝑙𝑖𝑓𝑡 𝑅 = 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅) 𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 ∗ 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡)
  • 13.  In this step, We prepare the rules to align with the analysis objectives. PAGE 13 Analysing the rules - combining
  • 14.  EL-RM aggregates the rules based on common antecedent and common consequent. We propose three possible aggregations. 1. The first option focuses on the control-flow perspective. 2. The second option focuses on the data object perspective. 3. The third option focuses on combine both the perspectives. PAGE 14 Analysing the rules - combining
  • 15. PAGE 15 Analysing the rules - compare • we compare the rules generated from the different partitions to detect the changes in behaviour over the divisions. • We induce various sets of rules from the extracted rules by using the set operations:  All rules (Union set operation)  Common rules (intersection set operation)  Difference rules in a partition against Common rules (difference set operation)  Partition unique rules (difference set operation)
  • 16.  We conducted three exploratory experiments on three real datasets. PAGE 16 Evaluation  BPIC-2017 contains the events of the loan application process of a Dutch financial institute. The events are generated from three sub-processes, i.e., application, offer and workflow.  The log contains cases that started at the beginning of 2016 until the 1st of February 2017.
  • 17. PAGE 17 Experiment 1 – BPIC2017 Discovered rules = 751 Combine rules = 15 Confidence = [0.94,1] Lift = [0.95, 13.63] • R1: IF ei.Act = “OCreate Offer” and ej.Act = “ OCreated” THEN ei.EventID = ej.OfferID • R2: IF ei.Act =”A_Complete” and ej.Act = “ W_ValideApplication” THEN ei.Resource = ej.Resource
  • 18.  We conducted three exploratory experiments on three real datasets. PAGE 18 Evaluation  BPIC-2020 (prepaid travel) contains the events of the prepaid travel request process at Eindhoven University of Technology (TU/e).  The log covers the cases from the beginning of 2017 till the 21st of February 2019.
  • 19. PAGE 19 Experiment 2 – BPIC2020(prepaid travel) All rules = 425 Common rules = 85 Confidence = [0.99, 1] Lift = [1, 8.90] • R1: IF ei.Act =“Permit APPROVED by ADMINISTRATION” and ej.Act = “Permit APPROVED by BUDGET OWNER” THEN ei.Resource = ej.Resource • R2: IF ei.Act = “Permit APPROVED by BUDGET OWNER” and ej.Act = “Permit FINAL_APPROVED by SUPERVISOR” THEN ei.org:role != ei.org:role
  • 20.  We conducted three exploratory experiments on three real datasets. PAGE 20 Evaluation  Road traffic fine management process dataset contains the events of the road traffic fines process. The cases have a diverse cycle time duration behavior. [mention duration of shortest and longest]  The log covers the cases from the beginning of 2000 till the 18th of June 2013
  • 21. PAGE 21 Experiment 3 – Road traffic fine All rules = 239 Common rules = 159 Average confidence = 0.96 Average lift = 1.98 • R1: IF ei.Act =“Insert Fine Notification” and ej.Act = “Insert Date Appeal to Prefecture” THEN ei.NotifcationType != ej. NotifcationType • R2: IF ei.Act =“Create Fine” and ej.Act = “payment” THEN ei.NotifcationType = ej. NotifcationType
  • 22.  We proposed a multi-perspective mining technique for the discovery of data connection.  Our method uses association rules to represent the relation between the control flow perspective and its impacts on the behavior of the data objects perspective  The results of our evaluation showed the potential of the approach to extract relevant insights about the change behavior of the attributes over the events. PAGE 22 Conclusion

Notas do Editor

  1. Classical techniques focus on control-flow perspective.
  2. A key challenge of root cause analysis is to identify as many potential explanations for a process issue as possible
  3. Inspired by knowledge discovery in database process
  4. Put method small and highlight kill more text animate the figures
  5. Remove the final results
  6. Row by row and colors Animation for how we build the transition table define complex attribute explain ei ej transaction building
  7. Row by row and colors Animation for how we build the transition table define complex attribute explain ei ej transaction building
  8. Play with colors
  9. Play with colors 26 rules
  10. ADD THE EQUATION SUPPORT AND CONFIDENCE
  11. ADD THE EQUATION SUPPORT AND CONFIDENCE
  12. The log contains 6872 offer ids
  13. R1 applies for 24% in 2018 but I doesnot apply for cases in 2017
  14. Cases took from 0.5 to 1.5 year to execute
  15. What do you think about the method usefulness? As process analyst would that be useful for you. How would you like to rank the rules ?