1 / 32

Process mining

Process mining. Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box 513, 5600 MB Eindhoven, The Netherlands w.m.p.v.d.aalst@tm.tue.nl. from languages and systems to analysis .

lynn
Download Presentation

Process mining

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Process mining Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box 513, 5600 MB Eindhoven, The Netherlands w.m.p.v.d.aalst@tm.tue.nl

  2. from languages and systems to analysis ...

  3. Design-time (a-priori) and run-time (a-posteriori) questions Run-time Design-time ProM -verification- validation- performance analysis - process mining

  4. A-posteriori analysis: ProM

  5. Process discovery: Reversing the process process discovery 1

  6. Conformance testing 2

  7. Log based verification formula four_eyes_principle (a1:activity,a2:activity) := forall[p:person | (!(execute(p,a1)) \/ !(execute(p,a2)))]; 3

  8. Outlook ProM CPN Tools ARIS/ARIS PPM YAWL Caramba

  9. XML format

  10. ProM architecture

  11. Demo

  12. More on ProM

  13. Example

  14. Snapshot of log (100 cases)

  15. Alpha plug-in (1)

  16. Alpha plug-in (2)

  17. Multi-phase mining plug-in

  18. Genetic miner (1)

  19. Genetic miner (2)

  20. Social network mining plug-in

  21. SNA with Netminer betweenness metric points out that the editor and the two editorial assistants are most central

  22. Netminer (2)

  23. LTL checker: Input

  24. subformula accept(a : activity ) := {Is the result a some activity an accept?} <> ( (activity == a /\ ate.result == "accept" ) ) ; formula dont_reject_paper_unjustified() := {Are all papers with strong support indeed accepted.} (((accept("get review 1") /\ accept("get review 2")) /\ accept("get review 3")) -> <> ( activity == "accept" ) ); Question 4 accept reject

  25. formula four_eyes_principle(a1:activity,a2:activity) := { <h2>The four-eyes-principle</h2> <p> Check whether two activities are never executed by the same person for a given case.</p> <p> Arguments:<br> <ul> <li><b>a1</b> of type string denoting an activity</li> <li><b>a2</b> of type string denoting an activity</li> </ul> </p> } forall[p:person |(!(execute(p,a1)) \/ !(execute(p,a2)))]; Question 5

  26. A related plug-in: Conformance checker

  27. Conformance checker (1)

  28. Conformance checker (2)

  29. Conformance checker (3)

  30. Additional plug-ins • State space analysis, invariants, EPC reduction/verification, etc.

  31. useful links: • www.processmining.org • www.workflowpatterns.com • is.tm.tue.nl/research/woflan/ • www.workflowcourse.com • BPMcenter.org • www.yawl-system.com

More Related