SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
Chapter 6
Advanced Process
Discovery Techniques
prof.dr.ir. Wil van der Aalst
www.processmining.org
Overview
Chapter 1
Introduction



Part I: Preliminaries

Chapter 2                   Chapter 3
Process Modeling and        Data Mining
Analysis


Part II: From Event Logs to Process Models

Chapter 4                  Chapter 5               Chapter 6
Getting the Data           Process Discovery: An   Advanced Process
                           Introduction            Discovery Techniques


Part III: Beyond Process Discovery

Chapter 7                   Chapter 8              Chapter 9
Conformance                 Mining Additional      Operational Support
Checking                    Perspectives


Part IV: Putting Process Mining to Work

Chapter 10                  Chapter 11             Chapter 12
Tool Support                Analyzing “Lasagna     Analyzing “Spaghetti
                            Processes”             Processes”


Part V: Reflection

Chapter 13                  Chapter 14
Cartography and             Epilogue
Navigation
                                                                          PAGE 1
Process discovery

                              supports/
      “world”    business
                               controls
                processes                      software
   people   machines                            system
        components
           organizations                              records
                                                   events, e.g.,
                                                    messages,
                                   specifies       transactions,
    models
                                  configures            etc.
   analyzes
                                 implements
                                   analyzes


                            discovery
        (process)                                 event
                            conformance
          model                                    logs
                            enhancement
                                                                   PAGE 2
Challenge

 “able to replay event log”                 “Occam’s razor”

          fitness                             simplicity

                               process
                              discovery



generalization                                precision
 “not overfitting the log”                “not underfitting the log”



                                                              PAGE 3
Observing a stable process infinitely long

       frequent                  all behavior
       behavior    trace in   (including noise)
                  event log




                                                  PAGE 4
Target model


               target model




                              PAGE 5
Non-fitting model


                    non-fitting model




                                        PAGE 6
Overfitting model


                    overfitting model




                                        PAGE 7
Underfitting model


               underfitting model




                                    PAGE 8
Characteristics of process discovery
 algorithms
• Representational bias
   −   Inability to represent concurrency
   −   Inability to deal with (arbitrary) loops
   −   Inability to represent silent actions
   −   Inability to represent duplicate actions
   −   Inability to model OR-splits/joins
   −   Inability to represent non-free-choice behavior
   −   Inability to represent hierarchy
• Ability to deal with noise
• Completeness notion assumed
• Approach used (direct algorithmic approaches, two-
  phase approaches, computational intelligence
  approaches, partial approaches, etc.)                  PAGE 9
Examples
• Algorithmic techniques
  • Alpha miner
  • Alpha+, Alpha++, Alpha#
  • FSM miner
  • Fuzzy miner
  • Heuristic miner
  • Multi phase miner
• Genetic process mining
  • Single/duplicate tasks
  • Distributed GM
• Region-based process mining
  • State-based regions
  • Language based regions
• Classical approaches not dealing with concurrency
  • Inductive inference (Mark Gold, Dana Angluin et al.)
  • Sequence mining
                                                           PAGE 10
Heuristic mining

• To deal with noise and incompleteness.
• To have a better representational bias than the α
  algorithm (AND/XOR/OR/skip).
• Uses C-nets.


                            b
                          check
                          policy

               a            c                 e
            register       check             close
             claim        damage             case

                            d
                                   consult
                                   expert
                                                      PAGE 11
Example log; problem α algorithm




                 p5

                 b



        a   p1   d      p3   e

start                              end

            p2    c     p4

                                         PAGE 12
Taking into account frequencies




                                  PAGE 13
Dependency measure




                     PAGE 14
Example




          PAGE 15
Lower threshold (2 direct successions and
a dependency of at least 0.7)
       5(0.83)

                      b

           11(0.92)       11(0.92)

  a                   c                    e
         11(0.92)            11(0.92)


      13(0.93)                  13(0.93)
                      d

          4(0.80)




                                               PAGE 16
Higher threshold (5 direct successions
and a dependency of at least 0.9)

                  b
    11(0.92)             11(0.92)



a                 c                 e
       11(0.92)       11(0.92)


    13(0.93)             13(0.93)
                  d




                                         PAGE 17
Learning splits and joins

                          5
                                  20    b       20

                                       21
           5             20                          20         5


                    20            20            20   20
      a                                 c                        e
      40                 20            21            20         40
                                                           13
               13
                                  13            13
                    13                                13
                                        d
                              4        17
                                            4
                                  4



                                                                     PAGE 18
Alternative visualization

                     5
                             20   b        20

                                  21
     5              20                          20         5


               20            20            20   20
a                                  c                        e
40                  20            21            20         40
                                                      13
         13
                             13            13
               13                                13
                                  d                                       b
                         4        17
                                       4
                             4
                                                                    AND       AND
                                                                a         c         e




                                                                          d




                                                                                        PAGE 19
Characteristics of heuristic mining

• Can deal with noise and therefore quite robust.
• Improved representational bias.
• Split and join rules are only considered locally
  (therefore most of the discovered model are not
  sound and require repair actions).




                                                     PAGE 20
Genetic process mining

                    create initial
                     population



   event log                                                  mutation

                                     next generation
                  compute
                   fitness
                                       elitism
  termination
                       tournament                           children

                                                       crossover

    select best                  parents
     individual



                             “dead” individuals



                                                                         PAGE 21
Design decisions

•   Representation of individuals
•   Initialization
•   Fitness function
•   Selection strategy (tournament and elitism)
•   Crossover                                   create initial
                                                 population


•   Mutation                   event log                                                  mutation

                                                                 next generation
                                              compute
                                               fitness
                                                                   elitism
                              termination
                                                   tournament                           children

                                                                                   crossover

                                select best                  parents
                                 individual



                                                         “dead” individuals




                                                                                                     PAGE 22
Example: crossover

                        b                                                                           b
                    examine                                                                     examine
                   thoroughly                                                                  thoroughly
                                                            g                                                                           g
                                                           pay                                                                         pay
                        c                                                                           c
                                                       compensation                                                                compensation
           a                          e                                                a                          e
                    examine                                                                     examine
start   register    casually      decide                              end   start   register    casually      decide                              end
        request                                                                     request
                                                            h                                                                           h
                        d                                                                           d
                                                          reject                                                                      reject
                   check ticket                          request                               check ticket                          request
                                  f                                                                           f
                                          reinitiate                                                                  reinitiate
                                           request                                                                     request




                        b                                                                           b
                    examine                                                                     examine
                   thoroughly                                                                  thoroughly
                                                            g                                                                           g
                                                           pay                                                                         pay
                        c                                                                           c
                                                       compensation                                                                compensation
           a                          e                                                a                          e
                    examine                                                                     examine
start   register    casually      decide                              end   start   register    casually      decide                              end
        request                                                                     request
                                                            h                                                                           h
                        d                                                                           d
                                                          reject                                                                      reject
                   check ticket                          request                               check ticket                          request
                                  f                                                                           f
                                          reinitiate
                                                                                                                      reinitiate
                                           request
                                                                                                                       request




                                                                                                                                            PAGE 23
Example: mutation



                                  remove place

                        b                                                                           b
                    examine                                                                     examine
                   thoroughly                                                                  thoroughly
                                                            g                                                                           g
                                                           pay                                                                         pay
                        c                                                                           c
                                                       compensation                                                                compensation
           a                          e                                                a                          e
                    examine                                                                     examine
start   register    casually      decide                              end   start   register    casually      decide                              end
        request                                                                     request
                                                            h                                                                           h
                        d                                                                           d
                                                          reject                                                                      reject
                   check ticket                          request                               check ticket                          request
                                  f                                                                           f
                                          reinitiate                                                                  reinitiate
                                           request
                                                                            added arc                                  request




                                                                                                                                        PAGE 24
Characteristics of genetic
 process mining




• Requires a lot of computing power.
• Can be distributed easily.
• Can deal with noise, infrequent behavior, duplicate tasks,
  invisible tasks, etc.
• Allows for incremental improvement and combinations
  with other approaches (heuristics post-optimization, etc.).
                                                       PAGE 25
Region-based mining

• Two types of regions theory:
   − State-based regions
   − Language-based regions
• All about discovering places (like in the α algorithm)!


              a1                          b1


              a2                          b2

              ...         p(A,B)          ...
              am                          bn


        A={a1,a2, … am}            B={b1,b2, … bn}
                                                      PAGE 26
State-based regions

Two steps:
1.Discover a transition system (different abstractions
  are possible)
2.Convert transition system into an “equivalent” Petri
  net.




                                                     PAGE 27
Step 1: learning a transition system

                                 current state


       trace:   abcdcdcde faghhhi
                      past                       future

                             past and future

•   past, future, past+future
•   sequence, multiset, set abstraction
•   limited horizon to abstract further
•   filtering e.g. based on transaction type, names, etc.
•   labels based on activity name or other features
                                                            PAGE 28
Past without abstraction (full sequence)


                    c             d
       ‹a,b›
                        ‹a,b,c›       ‹a,b,c,d›
                b
      a             e             d
 ‹›       ‹a›           ‹a,e›         ‹a,e,d›
                c
                    b             d
       ‹a,c›
                        ‹a,c,b›       ‹a,c,b,d›

                                                PAGE 29
Future without abstraction


             a             b        ‹c,d›
 ‹a,b,c,d›       ‹b,c,d›       c
             a             e              d
  ‹a,e,d›         ‹e,d›            ‹d ›       ‹›
                               b
             a             c
                                    ‹b,d›
 ‹a,c,b,d›       ‹c,b,d›

                                                   PAGE 30
Past with multiset abstraction

           [a,e]
                             d
                                      [a,d,e]
                e       [a,b]
      a             b
 []       [a]
                c        c
                    b             d
           [a,c]        [a,b,c]       [a,b,c,d]

                                                  PAGE 31
Only last event matters for state

                                ‹e›
                    e                      d
        a               b
                                ‹ b›       d
  ‹›         ‹a ›           c          b       ‹d›
                    c                      d

                                ‹c›

                                                     PAGE 32
Step 2: constructing a Petri net using
regions
                                            a = enter
               b                d           b = enter
       a                            e       c = exit
                                            d = exit
                   f            d           e = do not cross
   e                                        f = do not cross
           e

                       f        c
       a

                           R


                       a                c

           e                                      f
                           pR
                       b                d

                                                               PAGE 33
Example

                                                      d
                                        e
                                            [a,e]             [a,d,e]
                               [ a,b]
             a             b
        []       [a]                    c
                       c
                           b                          d
                  [a,c]                     [a,b,c]           [a,b,c,d]




                               b



        a        p1            e              p3          d

start                                                                end

                 p2            c              p4
                                                                           PAGE 34
Language based regions


                  f                  c1

                          a1                    b1

              e                       c                      d
                                     pR
                          a2                    b2


                          X                     Y

Region R = (X,Y,c) corresponding to place pR: X = {a1,a2,c1} =
transitions producing a token for pR, Y = {b1,b2,c1} = transitions
consuming a token from pR, and c is the initial marking of pR.       PAGE 35
Based idea: enough tokens should be
present when consuming
                           A place is feasible if it
                           can be added without
       f        c1         disabling any of the
                           traces in the event log.

           a1        b1

   e            c          d
                pR
           a2        b2


           X         Y



                                               PAGE 36
Example




          PAGE 37
Regions




          PAGE 38
Model

        a        p5            d

                      c
 p1         p2            p3       p4
        b                      e

                 p6




                                        PAGE 39
Characteristics of region-based mining

• Can be used to discover more complex control-flow
  structures.
• Classical approaches need to be adapted
  (overfitting!).
• Representational bias can be parameterized (e.g.,
  free-choice nets, label splitting, etc.).
• Problems dealing with noise.




                                                  PAGE 40
Other approaches, e.g. fuzzy mining




                                      PAGE 41
Evaluating the discovered process



                         Fitness: Is the event log
                         possible according to the
                         model?

Precision: Is the model                        Generalization: Is the model
not underfitting (allow for                    not overfitting (only allow for
too much)?                                     the “accidental” examples)?


                         Structure: Is this the
                         simplest model (Occam's
                         Razor)?



                                                                          PAGE 42

Mais conteúdo relacionado

Mais procurados

Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Data Warehouse Modeling
Data Warehouse ModelingData Warehouse Modeling
Data Warehouse Modelingvivekjv
 
Process Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational SupportProcess Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational SupportWil van der Aalst
 
Introduction to data warehousing
Introduction to data warehousing   Introduction to data warehousing
Introduction to data warehousing Girish Dhareshwar
 
Better decision making with proper business intelligence
Better decision making with proper business intelligenceBetter decision making with proper business intelligence
Better decision making with proper business intelligencemadhavlankapati
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Bernardo Najlis
 
Sample - Data Warehouse Requirements
Sample -  Data Warehouse RequirementsSample -  Data Warehouse Requirements
Sample - Data Warehouse RequirementsDavid Walker
 
Use Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services IndustryUse Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services IndustryCelonis
 
Data mining introduction
Data mining introductionData mining introduction
Data mining introductionBasma Gamal
 
Introduction To Data Warehousing
Introduction To Data WarehousingIntroduction To Data Warehousing
Introduction To Data WarehousingAlex Meadows
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecturepcherukumalla
 
Business Intelligence Presentation 1 (15th March'16)
Business Intelligence Presentation 1 (15th March'16)Business Intelligence Presentation 1 (15th March'16)
Business Intelligence Presentation 1 (15th March'16)Muhammad Fahad
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligenceHadi Fadlallah
 
Design and implementation of the web (extract, transform, load) process in da...
Design and implementation of the web (extract, transform, load) process in da...Design and implementation of the web (extract, transform, load) process in da...
Design and implementation of the web (extract, transform, load) process in da...IAESIJAI
 
Business Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesBusiness Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesSlideTeam
 
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Salah Amean
 
Knowledge management system
Knowledge management system Knowledge management system
Knowledge management system Setyagus Sucipto
 
BIM Data Mining Unit1 by Tekendra Nath Yogi
 BIM Data Mining Unit1 by Tekendra Nath Yogi BIM Data Mining Unit1 by Tekendra Nath Yogi
BIM Data Mining Unit1 by Tekendra Nath YogiTekendra Nath Yogi
 

Mais procurados (20)

Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Data Warehouse Modeling
Data Warehouse ModelingData Warehouse Modeling
Data Warehouse Modeling
 
Data mining
Data miningData mining
Data mining
 
Process Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational SupportProcess Mining - Chapter 9 - Operational Support
Process Mining - Chapter 9 - Operational Support
 
Introduction to data warehousing
Introduction to data warehousing   Introduction to data warehousing
Introduction to data warehousing
 
Better decision making with proper business intelligence
Better decision making with proper business intelligenceBetter decision making with proper business intelligence
Better decision making with proper business intelligence
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)
 
Sample - Data Warehouse Requirements
Sample -  Data Warehouse RequirementsSample -  Data Warehouse Requirements
Sample - Data Warehouse Requirements
 
Use Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services IndustryUse Case: Celonis in the Financial Services Industry
Use Case: Celonis in the Financial Services Industry
 
Data mining introduction
Data mining introductionData mining introduction
Data mining introduction
 
Introduction To Data Warehousing
Introduction To Data WarehousingIntroduction To Data Warehousing
Introduction To Data Warehousing
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Business Intelligence Presentation 1 (15th March'16)
Business Intelligence Presentation 1 (15th March'16)Business Intelligence Presentation 1 (15th March'16)
Business Intelligence Presentation 1 (15th March'16)
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligence
 
Design and implementation of the web (extract, transform, load) process in da...
Design and implementation of the web (extract, transform, load) process in da...Design and implementation of the web (extract, transform, load) process in da...
Design and implementation of the web (extract, transform, load) process in da...
 
Business Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation SlidesBusiness Process Modelling PowerPoint Presentation Slides
Business Process Modelling PowerPoint Presentation Slides
 
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
 
Knowledge management system
Knowledge management system Knowledge management system
Knowledge management system
 
Bi case study
Bi case studyBi case study
Bi case study
 
BIM Data Mining Unit1 by Tekendra Nath Yogi
 BIM Data Mining Unit1 by Tekendra Nath Yogi BIM Data Mining Unit1 by Tekendra Nath Yogi
BIM Data Mining Unit1 by Tekendra Nath Yogi
 

Destaque

Process Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and AnalysisProcess Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and AnalysisWil van der Aalst
 
Process Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data MiningProcess Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data MiningWil van der Aalst
 
Process Mining - a new governance approach
Process Mining - a new governance approachProcess Mining - a new governance approach
Process Mining - a new governance approachMartin Pscheidl
 
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesProcess Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesWil van der Aalst
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataWil van der Aalst
 
Process Mining - Chapter 14 - Epilogue
Process Mining - Chapter 14 - EpilogueProcess Mining - Chapter 14 - Epilogue
Process Mining - Chapter 14 - EpilogueWil van der Aalst
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesWil van der Aalst
 
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingDistributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingWil van der Aalst
 
Process Mining for ERP Systems
Process Mining for ERP SystemsProcess Mining for ERP Systems
Process Mining for ERP SystemsDirk Fahland
 
Process mining with alpha++ algorithm
Process mining with alpha++ algorithmProcess mining with alpha++ algorithm
Process mining with alpha++ algorithmFadlika Dita Nurjanto
 
Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comkashif kashif
 
Process mining in business process management
Process mining in business process managementProcess mining in business process management
Process mining in business process managementRamez Al-Fayez
 
Building Information Model (BIM) based process mining
Building Information Model (BIM) based process miningBuilding Information Model (BIM) based process mining
Building Information Model (BIM) based process miningStijn van Schaijk
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Stijn van Schaijk
 
Process Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryProcess Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryWil van der Aalst
 
Process Mining - Chapter 13 - Cartography and Navigation
Process Mining - Chapter 13 - Cartography and NavigationProcess Mining - Chapter 13 - Cartography and Navigation
Process Mining - Chapter 13 - Cartography and NavigationWil van der Aalst
 
Process Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportProcess Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportWil van der Aalst
 
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSEYandex
 

Destaque (20)

Process Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and AnalysisProcess Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and Analysis
 
Process Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data MiningProcess Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data Mining
 
Process Mining - a new governance approach
Process Mining - a new governance approachProcess Mining - a new governance approach
Process Mining - a new governance approach
 
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti ProcessesProcess Mining - Chapter 12 - Analyzing Spaghetti Processes
Process Mining - Chapter 12 - Analyzing Spaghetti Processes
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
 
Process Mining - Chapter 14 - Epilogue
Process Mining - Chapter 14 - EpilogueProcess Mining - Chapter 14 - Epilogue
Process Mining - Chapter 14 - Epilogue
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional Perspectives
 
Distributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance CheckingDistributed Process Discovery and Conformance Checking
Distributed Process Discovery and Conformance Checking
 
Process Mining for ERP Systems
Process Mining for ERP SystemsProcess Mining for ERP Systems
Process Mining for ERP Systems
 
Process mining with alpha++ algorithm
Process mining with alpha++ algorithmProcess mining with alpha++ algorithm
Process mining with alpha++ algorithm
 
Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.com
 
Ontologies And Process Mining
Ontologies And Process MiningOntologies And Process Mining
Ontologies And Process Mining
 
Process mining in business process management
Process mining in business process managementProcess mining in business process management
Process mining in business process management
 
Building Information Model (BIM) based process mining
Building Information Model (BIM) based process miningBuilding Information Model (BIM) based process mining
Building Information Model (BIM) based process mining
 
Bim based process mining master thesis presentation
Bim based process mining master thesis presentation Bim based process mining master thesis presentation
Bim based process mining master thesis presentation
 
Process Mining Book
Process Mining BookProcess Mining Book
Process Mining Book
 
Process Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process DiscoveryProcess Mining - Chapter 5 - Process Discovery
Process Mining - Chapter 5 - Process Discovery
 
Process Mining - Chapter 13 - Cartography and Navigation
Process Mining - Chapter 13 - Cartography and NavigationProcess Mining - Chapter 13 - Cartography and Navigation
Process Mining - Chapter 13 - Cartography and Navigation
 
Process Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool SupportProcess Mining - Chapter 10 - Tool Support
Process Mining - Chapter 10 - Tool Support
 
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
Process Mining: Data Science in Action - Wil van der Aalst, TU/e, DSC/e, HSE
 

Semelhante a Process Mining - Chapter 6 - Advanced Process Discovery_techniques

Process mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingProcess mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingMuhammad Ajmal
 
Process mining chapter_05_process_discovery
Process mining chapter_05_process_discoveryProcess mining chapter_05_process_discovery
Process mining chapter_05_process_discoveryMuhammad Ajmal
 
Process mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectivesProcess mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectivesMuhammad Ajmal
 
Discovering Concurrency: Learning (Business) Process Models from Examples
Discovering Concurrency: Learning (Business) Process Models from ExamplesDiscovering Concurrency: Learning (Business) Process Models from Examples
Discovering Concurrency: Learning (Business) Process Models from ExamplesWil van der Aalst
 
Process mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesProcess mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesMuhammad Ajmal
 
Process mining chapter_01_introduction
Process mining chapter_01_introductionProcess mining chapter_01_introduction
Process mining chapter_01_introductionMuhammad Ajmal
 
Discovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementDiscovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementWil van der Aalst
 
Repairing Process Models to Match Reality
Repairing Process Models to Match RealityRepairing Process Models to Match Reality
Repairing Process Models to Match RealityDirk Fahland
 
Process mining chapter_14_epilogue
Process mining chapter_14_epilogueProcess mining chapter_14_epilogue
Process mining chapter_14_epilogueMuhammad Ajmal
 
Virtual memory
Virtual memoryVirtual memory
Virtual memoryMohd Arif
 
Keynote Gartner Business Process Management Summit, February 2009, London
Keynote Gartner Business Process Management Summit, February 2009, London Keynote Gartner Business Process Management Summit, February 2009, London
Keynote Gartner Business Process Management Summit, February 2009, London Wil van der Aalst
 
Simplifying Mined Process Models
Simplifying Mined Process ModelsSimplifying Mined Process Models
Simplifying Mined Process ModelsDirk Fahland
 
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Wil van der Aalst
 
Back To The Future
Back To The FutureBack To The Future
Back To The FutureBill Scott
 
Process mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesProcess mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesMuhammad Ajmal
 
On Failure and Resilience
On Failure and ResilienceOn Failure and Resilience
On Failure and ResilienceMike Brittain
 
OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09Catherine Nuel
 
TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)Wil van der Aalst
 

Semelhante a Process Mining - Chapter 6 - Advanced Process Discovery_techniques (20)

Process mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checkingProcess mining chapter_07_conformance_checking
Process mining chapter_07_conformance_checking
 
Process mining chapter_05_process_discovery
Process mining chapter_05_process_discoveryProcess mining chapter_05_process_discovery
Process mining chapter_05_process_discovery
 
Process mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectivesProcess mining chapter_08_mining_additional_perspectives
Process mining chapter_08_mining_additional_perspectives
 
Discovering Concurrency: Learning (Business) Process Models from Examples
Discovering Concurrency: Learning (Business) Process Models from ExamplesDiscovering Concurrency: Learning (Business) Process Models from Examples
Discovering Concurrency: Learning (Business) Process Models from Examples
 
Process mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processesProcess mining chapter_12_analyzing_spaghetti_processes
Process mining chapter_12_analyzing_spaghetti_processes
 
Process mining chapter_01_introduction
Process mining chapter_01_introductionProcess mining chapter_01_introduction
Process mining chapter_01_introduction
 
Discovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process ManagementDiscovering Petri Nets: Evidence-Based Business Process Management
Discovering Petri Nets: Evidence-Based Business Process Management
 
Repairing Process Models to Match Reality
Repairing Process Models to Match RealityRepairing Process Models to Match Reality
Repairing Process Models to Match Reality
 
Process mining chapter_14_epilogue
Process mining chapter_14_epilogueProcess mining chapter_14_epilogue
Process mining chapter_14_epilogue
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Keynote Gartner Business Process Management Summit, February 2009, London
Keynote Gartner Business Process Management Summit, February 2009, London Keynote Gartner Business Process Management Summit, February 2009, London
Keynote Gartner Business Process Management Summit, February 2009, London
 
Simplifying Mined Process Models
Simplifying Mined Process ModelsSimplifying Mined Process Models
Simplifying Mined Process Models
 
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...Business Process Configuration in the Cloud: How to Support and Analyze Multi...
Business Process Configuration in the Cloud: How to Support and Analyze Multi...
 
Back To The Future
Back To The FutureBack To The Future
Back To The Future
 
Process mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processesProcess mining chapter_11_analyzing_lasagna_processes
Process mining chapter_11_analyzing_lasagna_processes
 
Introduction to R for Data Mining
Introduction to R for Data MiningIntroduction to R for Data Mining
Introduction to R for Data Mining
 
On Failure and Resilience
On Failure and ResilienceOn Failure and Resilience
On Failure and Resilience
 
Prdc2012
Prdc2012Prdc2012
Prdc2012
 
OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09OW2 Petals Dragon SOA Linuxtag09
OW2 Petals Dragon SOA Linuxtag09
 
TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)TomTom for Business Process Managment (TomTom4BPM)
TomTom for Business Process Managment (TomTom4BPM)
 

Mais de Wil van der Aalst

Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Wil van der Aalst
 
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskEverything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskWil van der Aalst
 
20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)Wil van der Aalst
 
Earth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingEarth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingWil van der Aalst
 
Using Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesUsing Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesWil van der Aalst
 
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Wil van der Aalst
 
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Wil van der Aalst
 
Configurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsConfigurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsWil van der Aalst
 
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...Wil van der Aalst
 
A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...Wil van der Aalst
 
Service Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisService Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisWil van der Aalst
 
Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Wil van der Aalst
 
Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Wil van der Aalst
 

Mais de Wil van der Aalst (13)

Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
Process Mining: BPM on Steroids (CPOs@BPM&O 2019 Keynote)
 
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To AskEverything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
Everything You Always Wanted To Know About Petri Nets, But Were Afraid To Ask
 
20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)20 years of Process Mining Research (ICPM 2019 keynote)
20 years of Process Mining Research (ICPM 2019 keynote)
 
Earth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance CheckingEarth Movers’ Stochastic Conformance Checking
Earth Movers’ Stochastic Conformance Checking
 
Using Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared ServicesUsing Process Mining to Remove Operational Friction in Shared Services
Using Process Mining to Remove Operational Friction in Shared Services
 
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
Object-Centric Process Mining: Dealing With Divergence and Convergence in Eve...
 
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
Process Mining In Today’s Platforms Economy: Opportunities and Challenges (WI...
 
Configurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible ModelsConfigurable Declare: Designing Customizable Flexible Models
Configurable Declare: Designing Customizable Flexible Models
 
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
On the Role of Fitness, Precision, Generalization and Simplicity in Process D...
 
A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...A Decade of Business Process Management Conferences: Reflections on a Develop...
A Decade of Business Process Management Conferences: Reflections on a Develop...
 
Service Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and AnalysisService Interaction: Patterns, Formalization, and Analysis
Service Interaction: Patterns, Formalization, and Analysis
 
Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011Keynote on Process Mining at SSCI 2010 / CIDM 2011
Keynote on Process Mining at SSCI 2010 / CIDM 2011
 
Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...Keynote at 18th International Conference on Cooperative Information Systems (...
Keynote at 18th International Conference on Cooperative Information Systems (...
 

Último

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 

Último (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

Process Mining - Chapter 6 - Advanced Process Discovery_techniques

  • 1. Chapter 6 Advanced Process Discovery Techniques prof.dr.ir. Wil van der Aalst www.processmining.org
  • 2. Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Chapter 3 Process Modeling and Data Mining Analysis Part II: From Event Logs to Process Models Chapter 4 Chapter 5 Chapter 6 Getting the Data Process Discovery: An Advanced Process Introduction Discovery Techniques Part III: Beyond Process Discovery Chapter 7 Chapter 8 Chapter 9 Conformance Mining Additional Operational Support Checking Perspectives Part IV: Putting Process Mining to Work Chapter 10 Chapter 11 Chapter 12 Tool Support Analyzing “Lasagna Analyzing “Spaghetti Processes” Processes” Part V: Reflection Chapter 13 Chapter 14 Cartography and Epilogue Navigation PAGE 1
  • 3. Process discovery supports/ “world” business controls processes software people machines system components organizations records events, e.g., messages, specifies transactions, models configures etc. analyzes implements analyzes discovery (process) event conformance model logs enhancement PAGE 2
  • 4. Challenge “able to replay event log” “Occam’s razor” fitness simplicity process discovery generalization precision “not overfitting the log” “not underfitting the log” PAGE 3
  • 5. Observing a stable process infinitely long frequent all behavior behavior trace in (including noise) event log PAGE 4
  • 6. Target model target model PAGE 5
  • 7. Non-fitting model non-fitting model PAGE 6
  • 8. Overfitting model overfitting model PAGE 7
  • 9. Underfitting model underfitting model PAGE 8
  • 10. Characteristics of process discovery algorithms • Representational bias − Inability to represent concurrency − Inability to deal with (arbitrary) loops − Inability to represent silent actions − Inability to represent duplicate actions − Inability to model OR-splits/joins − Inability to represent non-free-choice behavior − Inability to represent hierarchy • Ability to deal with noise • Completeness notion assumed • Approach used (direct algorithmic approaches, two- phase approaches, computational intelligence approaches, partial approaches, etc.) PAGE 9
  • 11. Examples • Algorithmic techniques • Alpha miner • Alpha+, Alpha++, Alpha# • FSM miner • Fuzzy miner • Heuristic miner • Multi phase miner • Genetic process mining • Single/duplicate tasks • Distributed GM • Region-based process mining • State-based regions • Language based regions • Classical approaches not dealing with concurrency • Inductive inference (Mark Gold, Dana Angluin et al.) • Sequence mining PAGE 10
  • 12. Heuristic mining • To deal with noise and incompleteness. • To have a better representational bias than the α algorithm (AND/XOR/OR/skip). • Uses C-nets. b check policy a c e register check close claim damage case d consult expert PAGE 11
  • 13. Example log; problem α algorithm p5 b a p1 d p3 e start end p2 c p4 PAGE 12
  • 14. Taking into account frequencies PAGE 13
  • 16. Example PAGE 15
  • 17. Lower threshold (2 direct successions and a dependency of at least 0.7) 5(0.83) b 11(0.92) 11(0.92) a c e 11(0.92) 11(0.92) 13(0.93) 13(0.93) d 4(0.80) PAGE 16
  • 18. Higher threshold (5 direct successions and a dependency of at least 0.9) b 11(0.92) 11(0.92) a c e 11(0.92) 11(0.92) 13(0.93) 13(0.93) d PAGE 17
  • 19. Learning splits and joins 5 20 b 20 21 5 20 20 5 20 20 20 20 a c e 40 20 21 20 40 13 13 13 13 13 13 d 4 17 4 4 PAGE 18
  • 20. Alternative visualization 5 20 b 20 21 5 20 20 5 20 20 20 20 a c e 40 20 21 20 40 13 13 13 13 13 13 d b 4 17 4 4 AND AND a c e d PAGE 19
  • 21. Characteristics of heuristic mining • Can deal with noise and therefore quite robust. • Improved representational bias. • Split and join rules are only considered locally (therefore most of the discovered model are not sound and require repair actions). PAGE 20
  • 22. Genetic process mining create initial population event log mutation next generation compute fitness elitism termination tournament children crossover select best parents individual “dead” individuals PAGE 21
  • 23. Design decisions • Representation of individuals • Initialization • Fitness function • Selection strategy (tournament and elitism) • Crossover create initial population • Mutation event log mutation next generation compute fitness elitism termination tournament children crossover select best parents individual “dead” individuals PAGE 22
  • 24. Example: crossover b b examine examine thoroughly thoroughly g g pay pay c c compensation compensation a e a e examine examine start register casually decide end start register casually decide end request request h h d d reject reject check ticket request check ticket request f f reinitiate reinitiate request request b b examine examine thoroughly thoroughly g g pay pay c c compensation compensation a e a e examine examine start register casually decide end start register casually decide end request request h h d d reject reject check ticket request check ticket request f f reinitiate reinitiate request request PAGE 23
  • 25. Example: mutation remove place b b examine examine thoroughly thoroughly g g pay pay c c compensation compensation a e a e examine examine start register casually decide end start register casually decide end request request h h d d reject reject check ticket request check ticket request f f reinitiate reinitiate request added arc request PAGE 24
  • 26. Characteristics of genetic process mining • Requires a lot of computing power. • Can be distributed easily. • Can deal with noise, infrequent behavior, duplicate tasks, invisible tasks, etc. • Allows for incremental improvement and combinations with other approaches (heuristics post-optimization, etc.). PAGE 25
  • 27. Region-based mining • Two types of regions theory: − State-based regions − Language-based regions • All about discovering places (like in the α algorithm)! a1 b1 a2 b2 ... p(A,B) ... am bn A={a1,a2, … am} B={b1,b2, … bn} PAGE 26
  • 28. State-based regions Two steps: 1.Discover a transition system (different abstractions are possible) 2.Convert transition system into an “equivalent” Petri net. PAGE 27
  • 29. Step 1: learning a transition system current state trace: abcdcdcde faghhhi past future past and future • past, future, past+future • sequence, multiset, set abstraction • limited horizon to abstract further • filtering e.g. based on transaction type, names, etc. • labels based on activity name or other features PAGE 28
  • 30. Past without abstraction (full sequence) c d ‹a,b› ‹a,b,c› ‹a,b,c,d› b a e d ‹› ‹a› ‹a,e› ‹a,e,d› c b d ‹a,c› ‹a,c,b› ‹a,c,b,d› PAGE 29
  • 31. Future without abstraction a b ‹c,d› ‹a,b,c,d› ‹b,c,d› c a e d ‹a,e,d› ‹e,d› ‹d › ‹› b a c ‹b,d› ‹a,c,b,d› ‹c,b,d› PAGE 30
  • 32. Past with multiset abstraction [a,e] d [a,d,e] e [a,b] a b [] [a] c c b d [a,c] [a,b,c] [a,b,c,d] PAGE 31
  • 33. Only last event matters for state ‹e› e d a b ‹ b› d ‹› ‹a › c b ‹d› c d ‹c› PAGE 32
  • 34. Step 2: constructing a Petri net using regions a = enter b d b = enter a e c = exit d = exit f d e = do not cross e f = do not cross e f c a R a c e f pR b d PAGE 33
  • 35. Example d e [a,e] [a,d,e] [ a,b] a b [] [a] c c b d [a,c] [a,b,c] [a,b,c,d] b a p1 e p3 d start end p2 c p4 PAGE 34
  • 36. Language based regions f c1 a1 b1 e c d pR a2 b2 X Y Region R = (X,Y,c) corresponding to place pR: X = {a1,a2,c1} = transitions producing a token for pR, Y = {b1,b2,c1} = transitions consuming a token from pR, and c is the initial marking of pR. PAGE 35
  • 37. Based idea: enough tokens should be present when consuming A place is feasible if it can be added without f c1 disabling any of the traces in the event log. a1 b1 e c d pR a2 b2 X Y PAGE 36
  • 38. Example PAGE 37
  • 39. Regions PAGE 38
  • 40. Model a p5 d c p1 p2 p3 p4 b e p6 PAGE 39
  • 41. Characteristics of region-based mining • Can be used to discover more complex control-flow structures. • Classical approaches need to be adapted (overfitting!). • Representational bias can be parameterized (e.g., free-choice nets, label splitting, etc.). • Problems dealing with noise. PAGE 40
  • 42. Other approaches, e.g. fuzzy mining PAGE 41
  • 43. Evaluating the discovered process Fitness: Is the event log possible according to the model? Precision: Is the model Generalization: Is the model not underfitting (allow for not overfitting (only allow for too much)? the “accidental” examples)? Structure: Is this the simplest model (Occam's Razor)? PAGE 42