Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology

Slides:



Advertisements
Similar presentations
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining Nikola Trčka Mykola Pechenizkiy.
Advertisements

Workflow Mining: Concepts and Algorithm Dr. Boleslaw Mikolajczak.
1 Fault Diagnosis for Timed Automata Stavros Tripakis VERIMAG.
Jorge Muñoz-Gama Josep Carmona
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
Han-na Yang Trace Clustering in Process Mining M. Song, C.W. Gunther, and W.M.P. van der Aalst.
CONFORMANCE CHECKING IN THE LARGE: PARTITIONING AND TOPOLOGY Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Diagnosability Verification with Parallel LTL-X Model Checking Based on Petri Net Unfoldings Agnes Madalinski 1, and Victor Khomenko 2 1 Faculty of Engineering.
Process Mining in the Context of Web Services Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven, The Netherlands.
Data Conformance Checking using Optimal Alignments Felix Mannhardt, Massimiliano de Leoni, Hajo A. Reijers.
Aligning Event Logs and Process Models for Multi- perspective Conformance Checking: An Approach Based on ILP Massimiliano de Leoni Wil M. P. van der Aalst.
© C. Kemke1Expert Systems Tasks COMP 4200: Expert Systems Dr. Christel Kemke Department of Computer Science University of Manitoba.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Business Alignment Using Process Mining as a Tool for Delta Analysis Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information.
Bridging the gap between Interaction- and Process-Oriented Choreographies Talk by Ivan Lanese Joint work with Claudio Guidi, Fabrizio Montesi and Gianluigi.
/faculteit technologie management Dutch-Belgian Database Day 2007 The Challenges of Process Mining A.J.M.M. Weijters (and many others)
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
Discovering Coordination Patterns using Process Mining Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology.
Boudewijn van Dongen April 27, 2005 The ProM-framework A framework for integrating process mining tools.
Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.
Database – Part 2 Dr. V.T. Raja Oregon State University.
Business Process Modeling Workflow Patterns Ang Chen July 8, 2005.
/faculteit technologie management 1 Process Mining: Extension Mining Algorithms Ana Karla Alves de Medeiros Ana Karla Alves de Medeiros Eindhoven University.
1 Software Testing and Quality Assurance Lecture 1 Software Verification & Validation.
A university for the world real R © 2009, Chapter 17 Process Mining and Simulation Moe Wynn Anne Rozinat Wil van der Aalst Arthur.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
Scientific Workflows Within the Process Mining Domain Martina Caccavale 17 April 2014.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Jorge Munoz-Gama Advisor: Josep Carmona December 2014 CONFORMANCE CHECKING AND DIAGNOSIS IN PROCESS MINING.
HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
EVENT-BASED REAL-TIME DECOMPOSED CONFORMANCE ANALYSIS Seppe vanden Broucke, Jorge Munoz-Gama, Josep Carmona, Bart Baesens, and Jan Vanthienen CoopIS 2014.
Overview of Formal Methods. Topics Introduction and terminology FM and Software Engineering Applications of FM Propositional and Predicate Logic Program.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Querying Business Processes Under Models of Uncertainty Daniel Deutch, Tova Milo Tel-Aviv University ERP HR System eComm CRM Logistics Customer Bank Supplier.
DECOMPOSED CONFORMANCE Jorge Munoz-Gama, Josep Carmona and W.M.P van der Aalst.
This chapter is extracted from Sommerville’s slides. Textbook chapter
Efficiency of Alignment-based algorithms B.F. van Dongen Laziness! (Gu)estimation! Implementation effort?
Han-na Yang Rediscovering Workflow Models from Event-Based Data using Little Thumb.
Compliance Management Elham Ramezani 1. Enterprises are governed by regulations Compliance Report ✓ ✗ ✗ ✓ ✗ ✗ Laws & Regulations Diagnostic Information.
1 Computer Group Engineering Department University of Science and Culture S. H. Davarpanah
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Alignment-based Precision Checking A. Adriansyah 1, J. Munoz Gamma 2, J. Carmona 2, B.F. van Dongen 1, W.M.P. van der Aalst 1 Tallinn, 3 September 2012.
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
"Decomposing Alignment- based Conformance Checking of Data-aware Process Models" Massimiliano de Leoni, Jorge Muñoz-Gama, Josep Carmona, Wil van der Aalst.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
This chapter is extracted from Sommerville’s slides. Textbook chapter 22 1 Chapter 8 Validation and Verification 1.
Controlling Break-the- glass Through Alignment A. Adriansyah B.F. van Dongen N. Zannone Washington D.C., 11.
KPI-based Schedule Optimisation M.L. van Eck. Work-related Stress Costs over €25 billion a year in the EU. (EU-OSHA) 10% of work-related illness caused.
Understanding Deviations AIS Nov.2014 Elham Ramezani Dirk Fahland Wil M.P. van der Aalst.
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
Business process management (BPM)
Outlier Detection Identifying anomalous values in the real- world database is important both for improving the quality of original data and for reducing.
Profiling based unstructured process logs
1 Queensland University of Technology, Brisbane, Australia
Exploring processes and deviations
Efficient implementations of Alignment-based algorithms
Business process management (BPM)
Patterns extraction from process executions
Decomposed Process Mining: The ILP Case
Towards a Generic On Line Auditing Tool (OLAT)
Department of Computer Science Abdul Wali Khan University Mardan
3 mei 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
Business Alignment Using Process Mining as a Tool for Delta Analysis
Predictability Verification with Petri Net Unfoldings
Workflow Mining: Concepts and Algorithm
5 juli 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
Presentation Title August 8, 2019
Presentation transcript:

Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology

Process Mining Discovering processes How do people behave? Compliance oriented Where and why do people deviate from standards / rules / regulations? Performance oriented Where are bottlenecks in my processes?

Aligning models to Observed Behavior

Introduction: Alignments Alignments are used for conformance checking Alignments are computed over a trace and a model: −A trace is a (partial) order of activities −A model is a labeled Petri labeled with activities An alignment explains exactly where deviations occur: −A synchronous move mean that an activity is in the log and a corresponding transition was enabled in the model −A log move means that no corresponding activity is found in the model −A model move means that no corresponding activity appeared in the log

Example model: ABDE … … log

Logged “A” aligns nicely to model model: ABDE … … log A A

Logged “B” aligns nicely to model model: ABDE … … log A A B B

Logged “D” does not fit the model model: ABDE … … log A A B BD

“C” was probably executed, but was not logged model: ABDE … … log A A B BD C

Logged “E” aligns nicely to model model: ABDE … … log A A B BD C E E

Alignment shows where deviations occurred model: ABDE … … log A A B BD C E E Alignment: The best way to fit the trace in the model Alignment: The best way to fit the trace in the model

Alignments Alignments specify exactly where deviations occurred when comparing logs to models Alignments can be used for: Fitness/precision computations Performance analysis Model repair... Compliance analysis

Use of alignment techniques in compliance 13 elicit compliance rules formalize compliance rules compliance checking and analysis implement compliance measures compliance improvement ?

Automated compliance checking business process compliance requirement diagnostic information compliance specification compliance checker

Automated compliance checking business process compliance requirement diagnostic information compliance checker Log compliance Petri net pattern alignment A B F F B Ƭ

Specifying Compliance Rules compliance specifier compliance checker rule repository Which compliance pattern? precise Petri net pattern How to prune the Petri net pattern? Log

Elicit Compliance RuleProM6 ( X-ray Patient registration others Patient registration X-Ray Patient registration Compliance Checking Using Conformance Checking Implementation

Conclusions Alignments provide a powerful method to explain where operational processes deviated from models Using the right models, alignments can detect (and predict) possible violations of compliance rules Alignments provide guarantees on non-deviating cases

Future directions Current challenges: 1.Representation and extraction of multi-dimensional event data for deviation detection 2.Representation and management of deviations 3.Detection and diagnosis of deviations 4.Online, real time deviation prediction 5.Integration of prototypes applicable to high-volume data 6.Application on real-life cases

Questions