Presentation is loading. Please wait.

Presentation is loading. Please wait.

Process Mining from discovery to checking Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box.

Similar presentations


Presentation on theme: "Process Mining from discovery to checking Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box."— Presentation transcript:

1 Process Mining from discovery to checking Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box 513, 5600 MB Eindhoven, The Netherlands w.m.p.v.d.aalst@tm.tue.nl

2 Outline BPM lifecycle Process mining overview ProM framework Example –discovery algorithms –LTL Conclusion Thanks to Ton Weijters, Boudewijn van Dongen, Ana Karla Alves de Medeiros, Minseok Song, Laura Maruster, Eric Verbeek, Monique Jansen-Vullers, Hajo Reijers, Michael Rosemann, Anne Rozinat, Christian Guenther Peter van den Brand, Huub de Beer, Andrey Nikolov, et al. for their on-going work on process mining.

3 The BPM life-cycle

4 1993

5 1998

6 2003

7 2008 ???

8 Design-time (a-priori) and run-time (a-posteriori) questions Run-timeDesign-time - process mining - verification - validation - performance analysis

9 focus of this paper

10 Process discovery: Reversing the process process discovery

11 Conformance testing

12 Log based verification formula four_eyes_principle (a1:activity,a2:activity) := forall[p:person | (!(execute(p,a1)) \/ !(execute(p,a2)))];

13 ProM framework

14 Overview 1) basic performance metrics 2) process model3) organizational model4) social network 5) performance characteristics If …then … 6) auditing/security www.processmining.org

15 ProM ARIS/ARIS PPM YAWL Caramba CPN Tools

16 Converter plug-in: EMailAnalyzer

17 XML format

18 ProM architecture

19 Example

20 Snapshot of log (100 cases)

21 Alpha plug-in (1)

22 Alpha plug-in (2)

23 Multi-phase mining plug-in

24 Genetic miner (1)

25 Genetic miner (2)

26 Social network mining plug-in

27 SNA with Netminer betweenness metric points out that the editor and the two editorial assistants are most central

28 Netminer (2)

29 LTL checker: Input

30 Question 1 formula accept_or_reject_but_not_both() := {} (<>(activity == "accept") !(<>(activity == "reject")));

31 Question 2 formula action_follows_decision() := {Is every decision followed by one of the three possible actions? } []( (activity == "decide" -> _O( ((activity == "accept" \/ activity == "reject") \/ activity == "invite additional reviewer") )));

32 Question 3 subformula execute( p : person, a : activity ) := {Is a specfic activity executed by a specific person?} <> ( (activity == a /\ person == p ) ) ; formula not_the_same_reviewer() := {Is every reviewer unique?} forall[p:person | (((!(execute(p,"get review 1")) \/ !(execute(p,"get review 2"))) /\ (!(execute(p,"get review 1")) \/ !(execute(p,"get review 3")))) /\ (!(execute(p,"get review 2")) \/ !(execute(p,"get review 3")))) ];

33 Question 4 subformula accept(a : activity ) := {Is the result a some activity an accept?} <> ( (activity == a /\ ate.result == "accept" ) ) ; formula dont_reject_paper_unjustified() := {Are all papers with strong support indeed accepted.} (((accept("get review 1") /\ accept("get review 2")) /\ accept("get review 3")) -> <> ( activity == "accept" ) ); accept reject

34 Question 5 formula four_eyes_principle(a1:activity,a2:activity) := { The four-eyes-principle Check whether two activities are never executed by the same person for a given case. Arguments: a1 of type string denoting an activity a2 of type string denoting an activity } forall[p:person |(!(execute(p,a1)) \/ !(execute(p,a2)))];

35 A related plug-in: Conformance checker

36 Conformance checker (1)

37 Conformance checker (2)

38 Conformance checker (3)

39 Additional plug-ins State space analysis, invariants, EPC reduction/verification, etc.

40 Conclusion Process mining is an exciting topic both from a practical and scientific point of view. Join us by: –Applying this in different setting. –Contributing logs, adapters, and plug-ins. www.processmining.org www.workflowpatterns.com BPMcenter.org www.workflowcourse.com www.citi.qut.edu.au/babel/ www.yawl-system.com useful links:


Download ppt "Process Mining from discovery to checking Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box."

Similar presentations


Ads by Google