Part III – Beyond control-flow...
Transcript of Part III – Beyond control-flow...
![Page 1: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/1.jpg)
Process Mining
Part III – Beyond control-flow mining
Organizational miningDiscovery of social netsExtension algorithms
![Page 2: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/2.jpg)
2
OutlinePart I – Introduction to Process Mining
Context, motivation and goal General characteristics of the analyzed processes and logsClassification of Process Mining approaches
Part II – Workflow discoveryInduction of basic Control Flow graphsOther techniques (α-algorithm, Heuristic Miner, Fuzzy mining)
Part III – Beyond control-flow miningOrganizational mining Social net discoveryExtension algorithms
Part IV – Evaluation and validation of discovered modelsConformance CheckLog-based property verification
Part V – Clustering-based Process MiningDiscovery of hierarchical process modelsDiscovery of process taxonomiesOutlier detection
![Page 3: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/3.jpg)
3
Start
Register order
Prepareshipment
Ship goods
(Re)send bill
Receive paymentContactcustomer
Archive order
End
ProcessProcess ModelModel
OrganizationalOrganizational ModelModel
SocialSocial NetworkNetwork
Organizational mining Organizational mining techniquestechniques
![Page 4: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/4.jpg)
4
Organizational Mining Algorithms
Objective: Discover the organizational model (i.e., roles, departments,etc.) without prior knowledge about the structure of the organizationAid in understanding and improving social and organizational structures
Two types of algorithmsOrganizational Model
Mining of roles and teams in organizationsProM Plug-in: Organizational Miner
Social NetworksDiscovery of relationships among originatorsProM Plug-ins: Social Network Miner and Analyze Social Network
![Page 5: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/5.jpg)
5
Organizational Miner
Main idea: Which originators are executing which tasksMethods to mine roles
Default miningDoing Similar Tasks
Methods to mine teamsWorking together
![Page 6: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/6.jpg)
6
Organizational Miner
Main idea: Which performers
are executing which tasks
Methods to mine roles Default miningDefault miningDoing Similar Tasks
Methods to mine teamsWorking together
![Page 7: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/7.jpg)
7
Organizational Miner
Main idea: Which performers
are executing which tasks
Methods to mine roles Default miningDoing Similar TasksDoing Similar Tasks
Methods to mine teamsWorking together
![Page 8: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/8.jpg)
8
Default MiningDefault Mining
Doing Similar TasksDoing Similar Tasks
![Page 9: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/9.jpg)
9
Organizational Miner
Main idea: Which performers
are executing which tasks
Methods to mine roles Default miningDoing Similar Tasks
Methods to mine teamsWorking togetherWorking together
![Page 10: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/10.jpg)
10
Organizational Miner
Why is the notion of process instances
necessary to mine teams but unnecessary to mine
roles?
![Page 11: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/11.jpg)
11
OutlinePart I – Introduction to Process Mining
Context, motivation and goal General characteristics of the analyzed processes and logsClassification of Process Mining approaches
Part II – Workflow discoveryInduction of basic Control Flow graphsOther techniques (α-algorithm, Heuristic Miner, Fuzzy mining)
Part III – Beyond control-flow miningOrganizational mining Social net discoveryExtension algorithms
Part IV – Evaluation and validation of discovered modelsConformance CheckLog-based property verification
Part V – Clustering-based Process MiningDiscovery of hierarchical process modelsDiscovery of process taxonomiesOutlier detection
![Page 12: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/12.jpg)
12
Social Network Miner
Aim: Monitor how individual process instances are routed between originators
MetricsHandover of workSubcontractingReassignmentWorking togetherSimilar task
![Page 13: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/13.jpg)
13
Social Network Miner
Aim: Monitor how individual process instances are routed between originators
MetricsHandover of workHandover of workSubcontractingReassignmentWorking togetherSimilar task
JohnJohn MaryMary
![Page 14: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/14.jpg)
14
Social Network Miner
Aim: Monitor how individual process instances are routed between originators
MetricsHandover of workSubcontractingSubcontractingReassignmentWorking togetherSimilar task
JohnJohn MaryMary
JohnJohn
![Page 15: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/15.jpg)
15
Social Network Miner
Aim: Monitor how individual process instances are routed between originators
MetricsHandover of workSubcontractingReassignmentReassignmentWorking togetherSimilar task
![Page 16: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/16.jpg)
16
Social Network Miner
Aim: Monitor how individual process instances are routed between originators
MetricsHandover of workSubcontractingReassignmentWorking togetherSimilar task
Based on ordering Based on ordering relations derived relations derived from a log!from a log!
![Page 17: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/17.jpg)
17
Social Network Miner: Example John Alex Lucia Peter Mary John 0 0 0 0 2 Alex 0 0 0 0 0 Lucia 0 0 0 2 2 Peter 0 0 2 0 2 Mary 2 0 2 2 0
![Page 18: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/18.jpg)
18
Plugin Analyze Social Network
Better graphical view for the results of the Social Network Miner
Includes different metrics to measure centrality of nodes
Example: subcontracting
![Page 19: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/19.jpg)
19
Which testers have never
subcontracted work?
Which testers subcontract the
most?
![Page 20: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/20.jpg)
20
OutlinePart I – Introduction to Process Mining
Context, motivation and goal General characteristics of the analyzed processes and logsClassification of Process Mining approaches
Part II – Workflow discoveryInduction of basic Control Flow graphsOther techniques (α-algorithm, Heuristic Miner, Fuzzy mining)
Part III – Beyond control-flow miningOrganizational mining Social net discoveryExtension algorithms
Part IV – Evaluation and validation of discovered modelsConformance CheckLog-based property verification
Part V – Clustering-based Process MiningDiscovery of hierarchical process modelsDiscovery of process taxonomiesOutlier detection in a process mining setting
![Page 21: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/21.jpg)
21
Start
Register order
Prepareshipment
Ship goods
(Re)send bill
Receive paymentContactcustomer
Archive order
End
Bottlenecks/Bottlenecks/Business Business RulesRulesProcessProcess ModelModel
Performance Performance AnalysisAnalysis
Extension techniques
Enhance existing models with information discovered from logsThe Decision Point Analysis plug-in can discover the “business rules” for the moments of choice in a process modelThe Performance Analysis with Petri Nets plug-in provides various KPIs w.r.t. the execution of processes
![Page 22: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/22.jpg)
22
Decision Point Analysis: Main IdeaDetection of data dependencies that affect the rounting the routing of process instances
MotivationsMake tacit knowledge explicitBetter understand the process model
WhichWhich conditionsconditions influenceinfluencethe the choicechoice betweenbetween a full a full check and a check and a policypolicy onlyonly oneone??
![Page 23: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/23.jpg)
23
Decision Point Analysis: Motivation
![Page 24: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/24.jpg)
24
Decision Point Analysis: Approach
![Page 25: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/25.jpg)
25
Decision Point Analysis
1. Read a log + model
2. Identify the decision points in a model
3. Find out which alternative branch has been taken for a given process instance and decision point
4. Discover the rules for each decision point
5. Return the enhanced model with the discovered rules
![Page 26: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/26.jpg)
26
Decision Point Analysis
1. Read a log + model
2. Identify the decision points in a model
3. Find out which alternative branch has been taken for a given process instance and decision point
4. Discover the rules for each decision point
5. Return the enhanced model with the discovered rules
Which elements are the classes and which
are the attributes?
![Page 27: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/27.jpg)
27
Step 4
Training examplesfor decision point "p0"
Discovered decisiontree for point "p0"
![Page 28: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/28.jpg)
28
Decision Point Analysis: Example in ProM
![Page 29: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/29.jpg)
29
Decision Point Analysis: Example in ProM
![Page 30: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/30.jpg)
30
Decision Point Analysis
![Page 31: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/31.jpg)
31
Extension techniques
Decision Miner
Performance Analysis
![Page 32: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/32.jpg)
32
Performance analysis: pattern visualization
![Page 33: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/33.jpg)
33
Performance Analysis with Petri Nets
MotivationProvide different Key Performance Indicators (KPIs) relating to the execution of processes
Main ideaReplay the log in a model and detect
BottlenecksThroughput timesExecution timesWaiting timesSynchronization timesPath probabilities etc
![Page 34: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/34.jpg)
34
Bottlenecks – Throughput Times
![Page 35: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/35.jpg)
35
Bottlenecks – Synchronization Times
![Page 36: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/36.jpg)
36
Bottlenecks – Synchronization Times
20.8 minutes20.8 minutes
1.3 minutes1.3 minutes
What are these average synchronization times
telling us?
![Page 37: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/37.jpg)
37
Bottlenecks – Path Probabilities
What are these path probabilities telling
us?
![Page 38: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques](https://reader034.fdocuments.us/reader034/viewer/2022042400/5f0ef0107e708231d441ad45/html5/thumbnails/38.jpg)
38
Performance Analysis with Petri Nets