Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Process Analysis
Contents
1 Introduction
4 Process mining
5 Process compliance
References
W.Grossmann, Stefanie Rinderle-Ma, University of Vienna – Chapter 7: Process Analysis 2
1 Introduction
Taking a fresh
approach to data
science
Process Science
Goals:
The aim of this chapter is to convey process analysis methods and
techniques, in particular:
− Understanding the difference between static and dynamic process
analysis
− Introducing the concept of process warehousing
− Introducing the basic idea of process mining
− Presenting selected process mining algorithms
− Pointing to further process mining scenarios
− Summarizing the key challenges of business process compliance
1 Introduction
4 Process mining
5 Process compliance
References
W.Grossmann, Stefanie Rinderle-Ma, University of Vienna – Chapter 7: Process Analysis 8
2 Process analysis and simulation
− Tools:
Signavio
BOC
ARIS
Bonapart
CPN Tools
Process optimization
− Can be based on insights from static and dynamic analysis
− Example: eliminate identified bottlenecks
− Optimization dimensions1: cost, time, quality, flexibility
− Partly conflicting
− Structural optimizations include, e.g., eliminating, combining,
reordering activities
− Organization optimizations, e.g., empowering users (specialist
generalist)
− No automatism, only best practices
− Important to analyze process after optimizations again
1Selma Limam Mansar, Hajo A. Reijers: Best practices in business process redesign: use and impact. Business Proc. Manag.
Journal 13(2): 193-213 (2007)
1 Introduction
4 Process mining
5 Process compliance
References
W.Grossmann, Stefanie Rinderle-Ma, University of Vienna – Chapter 7: Process Analysis 14
3 Process performance management and warehousing
InstanceID
Duration
ProcessVersion ProcessName ProcessID Day Month Quarter Year
Cost
Week
Decision tree:
The activities with a
duration above 40 are
performed by Actor XY
1 Introduction
4 Process mining
5 Process compliance
References
W.Grossmann, Stefanie Rinderle-Ma, University of Vienna – Chapter 7: Process Analysis 19
4 Process mining
3Wil M. P. van der Aalst: Process Mining - Data Science in Action, Second Edition. Springer 2016, ISBN 978-3-662-49850-7,
pp. 3-452
Prepare Ship
Start A shipment goods
Start B
End A Register
order
(Re)send
bill
Archive
order
….
Receive
payment
4Ana Karla A. de Medeiros, Wil M. P. van der Aalst, A. J. M. M. Weijters: Workflow Mining: Current Status and Future
Directions. CoopIS/DOA/ODBASE 2003: 389-406
5A. J. M. M. Weijters, J. T. S. Ribeiro: Flexible Heuristics Miner (FHM). CIDM 2011: 310-317
6Wil M. P. van der Aalst, Ana Karla A. de Medeiros, A. J. M. M. Weijters: Genetic Process Mining. ICATPN 2005: 48-69
EXERCISE: For the following log, apply the α-algorithm and derive
the corresponding Petri Net:
Result:
Alpha Miner
applied to Higher
Education Data
Heuristics Miner6
1. Read a log
2. Get the set of tasks
3. Infer the ordering relations based on their frequencies
4. Build the net based on inferred relations
5. Output the net
6Weijters,AJMM (Ton), van der WMP (Wil) Aalst, und de AKA (Ana Karla) Medeiros. 2006. Process mining with the
HeuristicsMiner algorithm. Technische Universiteit Eindhoven. http://repository.tue.nl/615595.
Heuristics Miner6:
Let W be an event log over T, and a, b ∈ T:
• |𝑎𝑎 > 𝑊𝑊 𝑏𝑏| is the number of times 𝑎𝑎 > 𝑊𝑊 𝑏𝑏 occurs in W,
𝑎𝑎 >𝑊𝑊 𝑏𝑏 −|𝑏𝑏 >𝑊𝑊 𝑎𝑎|
• 𝑎𝑎 ⟹ 𝑊𝑊 𝑏𝑏 =
𝑎𝑎 >𝑊𝑊 𝑏𝑏 + 𝑏𝑏 >𝑊𝑊 𝑎𝑎 +1
Insight:
The more frequently a task A directly follows another task B, and
the less frequently the opposite occurs, the higher the probability
that A causally follows B!
6Weijters,AJMM (Ton), van der WMP (Wil) Aalst, und de AKA (Ana Karla) Medeiros. 2006. Process mining with the
HeuristicsMiner algorithm. Technische Universiteit Eindhoven. http://repository.tue.nl/615595.
7A.K.A.Medeiros, A.J.M.M. Weijters, und W.M.P. Aalst, “Genetic process mining: an experimental evaluation,” Data Mining
and Knowledge Discovery, 14:245-304 (2007)
1 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑚𝑚𝑚𝑚 1 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑟𝑟𝑟𝑟
𝑓𝑓 = ∗ 1 − + ∗ 1− where
2 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑐𝑐𝑐𝑐 2 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑃𝑃𝑃𝑃
8Anne Rozinat, Wil M. P. van der Aalst: Conformance checking of processes based on monitoring real behavior. Inf.
Syst. 33(1): 64-95 (2008)
3Wil M. P. van der Aalst: Process Mining - Data Science in Action, Second Edition. Springer 2016, ISBN 978-3-662-49850-7,
pp. 3-452
Conformance checking8
− Problem: given a process model P and a set of traces T,
determine how „good“ P reflects the behavior set out by T
− Based on fitness function f
1 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑚𝑚𝑚𝑚 1 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑟𝑟𝑟𝑟
𝑓𝑓 = ∗ 1 − + ∗ 1− where
2 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑐𝑐𝑐𝑐 2 ∑𝑘𝑘
𝑖𝑖=1 𝑛𝑛𝑖𝑖 ∗𝑃𝑃𝑃𝑃
1 Introduction
4 Process mining
5 Process compliance
References
W.Grossmann, Stefanie Rinderle-Ma, University of Vienna – Chapter 7: Process Analysis 42
5 Process compliance
1 Introduction
4 Process mining
5 Process compliance
References
W.Grossmann, Stefanie Rinderle-Ma, University of Vienna – Chapter 7: Process Analysis 45
6 Summary & outlook