+ All Categories
Home > Documents > Part III – Beyond control-flow...

Part III – Beyond control-flow...

Date post: 26-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
38
Process Mining Part III – Beyond control-flow mining Organizational mining Discovery of social nets Extension algorithms
Transcript
Page 1: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

Process Mining

Part III – Beyond control-flow mining

Organizational miningDiscovery of social netsExtension algorithms

Page 2: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

2

OutlinePart I – Introduction to Process Mining

Context, motivation and goal General characteristics of the analyzed processes and logsClassification of Process Mining approaches

Part II – Workflow discoveryInduction of basic Control Flow graphsOther techniques (α-algorithm, Heuristic Miner, Fuzzy mining)

Part III – Beyond control-flow miningOrganizational mining Social net discoveryExtension algorithms

Part IV – Evaluation and validation of discovered modelsConformance CheckLog-based property verification

Part V – Clustering-based Process MiningDiscovery of hierarchical process modelsDiscovery of process taxonomiesOutlier detection

Page 3: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

3

Start

Register order

Prepareshipment

Ship goods

(Re)send bill

Receive paymentContactcustomer

Archive order

End

ProcessProcess ModelModel

OrganizationalOrganizational ModelModel

SocialSocial NetworkNetwork

Organizational mining Organizational mining techniquestechniques

Page 4: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

4

Organizational Mining Algorithms

Objective: Discover the organizational model (i.e., roles, departments,etc.) without prior knowledge about the structure of the organizationAid in understanding and improving social and organizational structures

Two types of algorithmsOrganizational Model

Mining of roles and teams in organizationsProM Plug-in: Organizational Miner

Social NetworksDiscovery of relationships among originatorsProM Plug-ins: Social Network Miner and Analyze Social Network

Page 5: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

5

Organizational Miner

Main idea: Which originators are executing which tasksMethods to mine roles

Default miningDoing Similar Tasks

Methods to mine teamsWorking together

Page 6: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

6

Organizational Miner

Main idea: Which performers

are executing which tasks

Methods to mine roles Default miningDefault miningDoing Similar Tasks

Methods to mine teamsWorking together

Page 7: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

7

Organizational Miner

Main idea: Which performers

are executing which tasks

Methods to mine roles Default miningDoing Similar TasksDoing Similar Tasks

Methods to mine teamsWorking together

Page 8: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

8

Default MiningDefault Mining

Doing Similar TasksDoing Similar Tasks

Page 9: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

9

Organizational Miner

Main idea: Which performers

are executing which tasks

Methods to mine roles Default miningDoing Similar Tasks

Methods to mine teamsWorking togetherWorking together

Page 10: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

10

Organizational Miner

Why is the notion of process instances

necessary to mine teams but unnecessary to mine

roles?

Page 11: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

11

OutlinePart I – Introduction to Process Mining

Context, motivation and goal General characteristics of the analyzed processes and logsClassification of Process Mining approaches

Part II – Workflow discoveryInduction of basic Control Flow graphsOther techniques (α-algorithm, Heuristic Miner, Fuzzy mining)

Part III – Beyond control-flow miningOrganizational mining Social net discoveryExtension algorithms

Part IV – Evaluation and validation of discovered modelsConformance CheckLog-based property verification

Part V – Clustering-based Process MiningDiscovery of hierarchical process modelsDiscovery of process taxonomiesOutlier detection

Page 12: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

12

Social Network Miner

Aim: Monitor how individual process instances are routed between originators

MetricsHandover of workSubcontractingReassignmentWorking togetherSimilar task

Page 13: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

13

Social Network Miner

Aim: Monitor how individual process instances are routed between originators

MetricsHandover of workHandover of workSubcontractingReassignmentWorking togetherSimilar task

JohnJohn MaryMary

Page 14: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

14

Social Network Miner

Aim: Monitor how individual process instances are routed between originators

MetricsHandover of workSubcontractingSubcontractingReassignmentWorking togetherSimilar task

JohnJohn MaryMary

JohnJohn

Page 15: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

15

Social Network Miner

Aim: Monitor how individual process instances are routed between originators

MetricsHandover of workSubcontractingReassignmentReassignmentWorking togetherSimilar task

Page 16: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

16

Social Network Miner

Aim: Monitor how individual process instances are routed between originators

MetricsHandover of workSubcontractingReassignmentWorking togetherSimilar task

Based on ordering Based on ordering relations derived relations derived from a log!from a log!

Page 17: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

17

Social Network Miner: Example John Alex Lucia Peter Mary John 0 0 0 0 2 Alex 0 0 0 0 0 Lucia 0 0 0 2 2 Peter 0 0 2 0 2 Mary 2 0 2 2 0

Page 18: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

18

Plugin Analyze Social Network

Better graphical view for the results of the Social Network Miner

Includes different metrics to measure centrality of nodes

Example: subcontracting

Page 19: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

19

Which testers have never

subcontracted work?

Which testers subcontract the

most?

Page 20: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

20

OutlinePart I – Introduction to Process Mining

Context, motivation and goal General characteristics of the analyzed processes and logsClassification of Process Mining approaches

Part II – Workflow discoveryInduction of basic Control Flow graphsOther techniques (α-algorithm, Heuristic Miner, Fuzzy mining)

Part III – Beyond control-flow miningOrganizational mining Social net discoveryExtension algorithms

Part IV – Evaluation and validation of discovered modelsConformance CheckLog-based property verification

Part V – Clustering-based Process MiningDiscovery of hierarchical process modelsDiscovery of process taxonomiesOutlier detection in a process mining setting

Page 21: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

21

Start

Register order

Prepareshipment

Ship goods

(Re)send bill

Receive paymentContactcustomer

Archive order

End

Bottlenecks/Bottlenecks/Business Business RulesRulesProcessProcess ModelModel

Performance Performance AnalysisAnalysis

Extension techniques

Enhance existing models with information discovered from logsThe Decision Point Analysis plug-in can discover the “business rules” for the moments of choice in a process modelThe Performance Analysis with Petri Nets plug-in provides various KPIs w.r.t. the execution of processes

Page 22: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

22

Decision Point Analysis: Main IdeaDetection of data dependencies that affect the rounting the routing of process instances

MotivationsMake tacit knowledge explicitBetter understand the process model

WhichWhich conditionsconditions influenceinfluencethe the choicechoice betweenbetween a full a full check and a check and a policypolicy onlyonly oneone??

Page 23: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

23

Decision Point Analysis: Motivation

Page 24: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

24

Decision Point Analysis: Approach

Page 25: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

25

Decision Point Analysis

1. Read a log + model

2. Identify the decision points in a model

3. Find out which alternative branch has been taken for a given process instance and decision point

4. Discover the rules for each decision point

5. Return the enhanced model with the discovered rules

Page 26: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

26

Decision Point Analysis

1. Read a log + model

2. Identify the decision points in a model

3. Find out which alternative branch has been taken for a given process instance and decision point

4. Discover the rules for each decision point

5. Return the enhanced model with the discovered rules

Which elements are the classes and which

are the attributes?

Page 27: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

27

Step 4

Training examplesfor decision point "p0"

Discovered decisiontree for point "p0"

Page 28: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

28

Decision Point Analysis: Example in ProM

Page 29: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

29

Decision Point Analysis: Example in ProM

Page 30: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

30

Decision Point Analysis

Page 31: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

31

Extension techniques

Decision Miner

Performance Analysis

Page 32: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

32

Performance analysis: pattern visualization

Page 33: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

33

Performance Analysis with Petri Nets

MotivationProvide different Key Performance Indicators (KPIs) relating to the execution of processes

Main ideaReplay the log in a model and detect

BottlenecksThroughput timesExecution timesWaiting timesSynchronization timesPath probabilities etc

Page 34: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

34

Bottlenecks – Throughput Times

Page 35: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

35

Bottlenecks – Synchronization Times

Page 36: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

36

Bottlenecks – Synchronization Times

20.8 minutes20.8 minutes

1.3 minutes1.3 minutes

What are these average synchronization times

telling us?

Page 37: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

37

Bottlenecks – Path Probabilities

What are these path probabilities telling

us?

Page 38: Part III – Beyond control-flow miningstaff.icar.cnr.it/pontieri/didattica/PM/slides/PM_mining...Part II – Workflow discovery Induction of basic Control Flow graphs Other techniques

38

Performance Analysis with Petri Nets


Recommended