39
Process Mining from discovery to checking Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box 513, 5600 MB Eindhoven, The Netherlands [email protected]

Process Mining from discovery to checking

  • Upload
    alika

  • View
    43

  • Download
    1

Embed Size (px)

DESCRIPTION

Process Mining from discovery to checking. Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box 513, 5600 MB Eindhoven, The Netherlands [email protected]. Outline. BPM lifecycle Process mining overview ProM framework Example - PowerPoint PPT Presentation

Citation preview

Page 1: Process Mining from discovery to checking

Process Miningfrom discovery to checking

Prof.dr.ir. Wil van der AalstEindhoven University of Technology, Department of Information Systems, P.O. Box 513, 5600 MB Eindhoven, The Netherlands

[email protected]

Page 2: Process Mining from discovery to checking

Outline

• BPM lifecycle

• Process mining overview

• ProM framework

• Example– discovery algorithms– LTL

• Conclusion

Thanks to Ton Weijters, Boudewijn van Dongen, Ana Karla Alves de Medeiros, Minseok Song, Laura Maruster, Eric Verbeek, Monique Jansen-Vullers, Hajo Reijers, Michael Rosemann, Anne Rozinat, Christian Guenther

Peter van den Brand, Huub de Beer, Andrey Nikolov, et al. for their on-going work on process mining.

Page 3: Process Mining from discovery to checking

The BPM life-cycle

processdesign

implementation/configuration

processenactment

diagnosis

Page 4: Process Mining from discovery to checking

1993

processdesign

implementation/configuration

processenactment

diagnosis

Page 5: Process Mining from discovery to checking

1998

processdesign

implementation/configuration

processenactment

diagnosis

Page 6: Process Mining from discovery to checking

2003

processdesign

implementation/configuration

processenactment

diagnosis

Page 7: Process Mining from discovery to checking

2008 ???

processdesign

implementation/configuration

processenactment

diagnosis

Page 8: Process Mining from discovery to checking

Design-time (a-priori) and run-time (a-posteriori) questions

processdesign

implementation/configuration

processenactment

diagnosis

Run-time Design-time

- process mining- verification- validation- performance analysis

Page 9: Process Mining from discovery to checking

informationsystem

operationalprocess

processmodels

eventlogs

models

processdiscovery

conformancetesting

records

configures

supports/controls

(un)desiredproperties

log-based verification

refers to

focus of this paper

Page 10: Process Mining from discovery to checking

Process discovery: Reversing the process

process discovery

Registerorder

Prepareshipment

Shipgoods

Receivepayment

(Re)sendbill

Contactcustomer

Archiveorder

Page 11: Process Mining from discovery to checking

Conformance testing

Registerorder

Prepareshipment

Shipgoods

Receivepayment

(Re)sendbill

Contactcustomer

Archiveorder

Materialis released

TO itemconfirmed

withoutdifferences

Warehouse/Stores

Transferorderitem

is confirmed

Paymentmust

be effected

PurchaseRequisition

Requirementfor materialhas arisen

Requisitionreleased

for schedulingagreement

schedule/SA release

InvoiceVerification

Purchaserequisitionreleased

for purchaseorder

Inbounddeliveryentered

Goodsreceived

Goodsreceiptposted

GoodsReceipt

Purchaseorder

created

Purchasing

Invoicereceived

Decide To Buy Computer

Choose Model

Save Money

Read Test Reviews

Check Bank Account

[reviews ok]

[bad reviews]

[enough]

Order Machine

Order Screen

Receive Machine

[desktop]

Receive Screen

Set Up And Connect

Plug In And Power On

[laptop]

Open Lid

Choose Operating System

Order Windows

Receive Windows

[windows]

Download Linux

[linux]

Install Operating System

Work Hard

[not enough]

[laptop]

[desktop]

Page 12: Process Mining from discovery to checking

Log based verification

formula four_eyes_principle(a1:activity,a2:activity) :=forall[p:person | (!(execute(p,a1)) \/ !(execute(p,a2)))];

Page 13: Process Mining from discovery to checking

ProM framework

Page 14: Process Mining from discovery to checking

ProMStaffware

InConcert

MQ Series

workflow management systems

FLOWer

Vectus

Siebel

case handling / CRM systems

SAP R/3

BaaN

Peoplesoft

ERP systems

common XML format for storing/exchanging workflow logs

input/outputCore

Plugins

ProMframework

visualization analysis

alpha algorithmgenetic

algorithmTsinghua alpha

algorithmMulti phasealgorithms

social networkminer

case dataextraction

property verifier

ExternalTools

NetMiner Viscovery ......

...

ARIS/ARIS PPM

YAWL

Caramba

CPN Tools

Page 15: Process Mining from discovery to checking

Converter plug-in: EMailAnalyzer

Page 16: Process Mining from discovery to checking

XML format

Page 17: Process Mining from discovery to checking

ProM architecture

UserInterface

+User

Interaction

StaffwareFlowerSAPInConcert...

Heuristic NetAris Graph Format(Aris AML Format)PNMLTPN...

MiningPlugin

ImportPlugin

ExportPlugin

AnalysisPlugin

ConversionPlugin

Heuristic Net PNMLAris Graph format TPNNetMiner file Agna fileAris PPM Instances DOTComma Seperated Values …...

Log Filter

VisualisationEngine

XML Log

ResultFrame

Page 18: Process Mining from discovery to checking

Example

A

E

G

invitereviewers

D

get review 2

time-out 2

collectreviews

H

decide

I

accept

J

reject

inviteadditionalreviewer

K

M

L

get review X

time-out X

C

B

get review 1

time-out 1

G

F

get review 3

time-out 3

Page 19: Process Mining from discovery to checking

Snapshot of log (100 cases)

Page 20: Process Mining from discovery to checking

Alpha plug-in (1)

Page 21: Process Mining from discovery to checking

Alpha plug-in (2)

Page 22: Process Mining from discovery to checking

Multi-phase mining plug-in

Page 23: Process Mining from discovery to checking

Genetic miner (1)

Page 24: Process Mining from discovery to checking

Genetic miner (2)

Page 25: Process Mining from discovery to checking

Social network mining plug-in

Page 26: Process Mining from discovery to checking

SNA with Netminer

betweenness metric points out that the editor and the two editorial assistants are

most central

Page 27: Process Mining from discovery to checking

Netminer (2)

Page 28: Process Mining from discovery to checking

LTL checker: Input

Page 29: Process Mining from discovery to checking

Question 1

formula accept_or_reject_but_not_both() := {}

(<>(activity == "accept") <-> !(<>(activity == "reject")));

Page 30: Process Mining from discovery to checking

Question 2

formula action_follows_decision() := {Is every decision followed by one of the three

possible actions? }[]( (activity == "decide" -> _O( ((activity ==

"accept" \/ activity == "reject") \/ activity == "invite additional reviewer") )));

Page 31: Process Mining from discovery to checking

Question 3

subformula execute( p : person, a : activity ) := {Is a specfic activity executed by a specific person?}

<> ( (activity == a /\ person == p ) ) ;

formula not_the_same_reviewer() := {Is every reviewer unique?}

forall[p:person | (((!(execute(p,"get review 1")) \/ !(execute(p,"get review 2"))) /\ (!(execute(p,"get review 1")) \/ !(execute(p,"get review 3")))) /\ (!(execute(p,"get review 2")) \/ !(execute(p,"get review 3")))) ];

Page 32: Process Mining from discovery to checking

Question 4

subformula accept(a : activity ) := {Is the result a some activity an accept?}

<> ( (activity == a /\ ate.result == "accept" ) ) ;

formula dont_reject_paper_unjustified() :={Are all papers with strong support indeed

accepted.}(((accept("get review 1") /\ accept("get review

2")) /\ accept("get review 3")) -> <> ( activity == "accept" ) );

accept

reject

Page 33: Process Mining from discovery to checking

Question 5

formula four_eyes_principle(a1:activity,a2:activity) :={

<h2>The four-eyes-principle</h2> <p> Check whether two activities are never executed by the same

person for a given case.</p> <p> Arguments:<br>

<ul> <li><b>a1</b> of type string denoting an activity</li> <li><b>a2</b> of type string denoting an activity</li>

</ul> </p>

} forall[p:person |(!(execute(p,a1)) \/ !(execute(p,a2)))];

Page 34: Process Mining from discovery to checking

A related plug-in: Conformance checker

informationsystem

operationalprocess

processmodels

eventlogs

models

processdiscovery

conformancetesting

records

configures

supports/controls

(un)desiredproperties

log-based verification

refers to

Page 35: Process Mining from discovery to checking

Conformance checker (1)

Page 36: Process Mining from discovery to checking

Conformance checker (2)

Page 37: Process Mining from discovery to checking

Conformance checker (3)

Page 38: Process Mining from discovery to checking

Additional plug-ins

• State space analysis, invariants, EPC reduction/verification, etc.

Page 39: Process Mining from discovery to checking

Conclusion• Process mining is an exciting topic both from a

practical and scientific point of view.

• Join us by:– Applying this in different setting.– Contributing logs, adapters, and plug-ins.

• www.processmining.org

• www.workflowpatterns.com

• BPMcenter.org

• www.workflowcourse.com

• www.citi.qut.edu.au/babel/

• www.yawl-system.com

useful links: