A Case-based Approach to Business Process Monitoring S. Montani 1, G. Leonardi 1 1 Dipartimento di Informatica, University of Piemonte Orientale, Alessandria,

Slides:



Advertisements
Similar presentations
Nursing Diagnosis: Definition
Advertisements

Accident and Incident Investigation
Flexible and efficient retrieval of haemodialysis time series S. Montani, G. Leonardi, A. Bottrighi, L. Portinale, P. Terenziani DISIT, Sezione di Informatica,
Business Development Suit Presented by Thomas Mathews.
Exploiting decision theory for supporting therapy selection in computerized clinical guidelines Stefania Montani, Paolo Terenziani, Alessio Bottrighi DI,
Han-na Yang Trace Clustering in Process Mining M. Song, C.W. Gunther, and W.M.P. van der Aalst.
Preventing Strokes One at a Time Acute Interventions and Management 2009.
Chapter 4 Quality Assurance in Context
Architecture Tutorial 1 Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
Information System Engineering
ERT 312 SAFETY & LOSS PREVENTION IN BIOPROCESS ACCIDENT INVESTIGATION Prepared by: Miss Hairul Nazirah Abdul Halim.
Chapter 11 Artificial Intelligence and Expert Systems.
2005rel-xml-ii1 The SilkRoute system  The system goals  Scenario, examples  View Forests  View forest and query composition  View forest efficient.
SIM5102 Software Evaluation
1212 Management and Communication of Distributed Conceptual Design Knowledge in the Building and Construction Industry Dr.ir. Jos van Leeuwen Eindhoven.
Software Process and Product Metrics
Hospital Management System (Requirement). Requirement 1.Admissions 2.Doctor Appointments 3.Tests Appointments 4.Bed Allotment 5.Undergo Operation 6.Login.
1 Coding Automation Tool Coding Automation Tool (CAT) extracts text from any medical document. Immediately converts text into billing-ready format (with.
Process-oriented System Automation Executable Process Modeling & Process Automation.
Insuring Sensitive Processes through Process Mining Jorge Munoz-Gama Isao Echizen Jorge Munoz-Gama and Isao Echizen.
What is Business Analysis Planning & Monitoring?
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
REFACTORING Lecture 4. Definition Refactoring is a process of changing the internal structure of the program, not affecting its external behavior and.
THE PROTOTYPING MODEL The prototyping model begins with requirements gathering. Developer and customer meet and define the overall objectives for the software.
1 Accreditation and Certification: Definition  Certification: Procedures by which a third party gives written assurance that a product, process or service.
A knowledge-based Assistant for real-time Planning and Execution of PSS Engineering Change Processes Michael Abramovici, Youssef Aidi IT in Mechanical.
Architecture Tutorial 1 Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
RFX-mod Programme Workshop 2009 – January 2009 Scaling and validation plans Paolo Franz, Monica Spolaore.
Flexible genome retrieval for supporting in-silico studies of endobacteria-AMFs S. Montani 1, G. Leonardi 1, S. Ghignone 2, L. Lanfranco 2 1 Dipartimento.
Process Improvement. It is not necessary to change. Survival is not mandatory. »W. Edwards Deming Both change and stability are fundamental to process.
Telmo Zarraonandia Laboratorio DEI. Dpto. de Informática U. Carlos III de Madrid A Late Modelling Approach for the Definition of Computer-Supported Learning.
Significant Events. Significant Event Analysis (SEA) An SEA is concerned with investigating any occurrence which are identified by any practice members.
Chapter 3: Software Project Management Metrics
E.Bertino, L.Matino Object-Oriented Database Systems 1 Chapter 5. Evolution Seoul National University Department of Computer Engineering OOPSLA Lab.
Basic Nursing: Foundations of Skills & Concepts Chapter 9
Methodology – Physical Database Design for Relational Databases.
A State Perspective Mentoring Conference New Orleans, LA 2/28/2005 RCRAInfo Network Exchange.
Conversational Case- Based Reasoning Support for Business Process Management Barbara Weber, Univ. of Innsbruck Werner Wild, Evolution Consulting.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 7 Slide 1 Requirements Engineering Processes.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Measuring Results of Improvement Actions Márcio Rodrigues, Tallin, 13/01/2015.
SQL Based Knowledge Representation And Knowledge Editor UMAIR ABDULLAH AFTAB AHMED MOHAMMAD JAMIL SAWAR (Presented by Lei Jiang)
Recording Actor Provenance in Scientific Workflows Ian Wootten, Shrija Rajbhandari, Omer Rana Cardiff University, UK.
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
Automatic Discovery and Processing of EEG Cohorts from Clinical Records Mission: Enable comparative research by automatically uncovering clinical knowledge.
Session 1 Module 1: Introduction to Data Integrity
Objectives Understand Corrective, Perfective and Preventive maintenance Discuss the general concepts of software configuration management.
Generating Query Substitutions Alicia Wood. What is the problem to be solved?
Provenance in Distr. Organ Transplant Management EU PROVENANCE project: an open provenance architecture for distributed.
Function BIRN The ability to find a subject who may have participated in multiple experiments and had multiple assessments done is a critical component.
Effectiveness of risk management process towards error reduction in the laboratory at Sakra World Hospital AUTHORS: Dr. Shabnam Roohi Mr. Deepak Agarkhed.
Windows Workflow Foundation Guy Burstein Senior Consultant Advantech – Microsoft Division
Toward a New ATM Software Safety Assessment Methodology dott. Francesca Matarese.
Understanding Deviations AIS Nov.2014 Elham Ramezani Dirk Fahland Wil M.P. van der Aalst.
 The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the requirements.  However,
MSG-085 2RS Common Interest Group SINEX OVERVIEW
KANAL: Knowledge ANALysis
Profiling based unstructured process logs
Paolo Terenziani, Alessio Bottrighi, Stefania Montani
Patterns extraction from process executions
4.5 Checking and Corrective Action Monitoring and Measurement
The Nursing Process and Pharmacology Jeanelle F. Jimenez RN, BSN, CCRN
Case-Based Reasoning System for Bearing Design
EPIC Tools for Clinical Research
Test Case Test case Describes an input Description and an expected output Description. Test case ID Section 1: Before execution Section 2: After execution.
Escape the Trap Climbing Over the Professional Service Need Assessment College of Medical Laboratory Science, Sri Lanka December 30, Teaching Hospital,
Presentation Title August 8, 2019
A SIEM for the Forensic Analysis of Database Management System Logs
EPIC Tools for Clinical Research
Presentation transcript:

A Case-based Approach to Business Process Monitoring S. Montani 1, G. Leonardi 1 1 Dipartimento di Informatica, University of Piemonte Orientale, Alessandria, Italy

Business Process Management BP: collection of related activities which produce a service or a product BPM: defining, executing, monitoring and optimizing BPs BP Optimization: flexibly change and adapt BP: Expected situations (new laws, reengineering) Unanticipated exceptions (emergencies) BP not correctly applied

Business Process Monitoring Agile Workflow Technology: solution for process adaptation and overriding: Modifications of process schema (by process engineers) Ad-hoc changes of process instances (by end users) Business Process Monitoring: highlighting and organizing non-compliances Allows verification of process conformance Suggests long-term changes to deal with non-compliances

Case-based Business Process Monitoring Analysis based on retrieval of traces similar to the current one Trace: Sequence of actions occoured in a process instance Suggestions on how to modify the default process schema: Analysing most similar examples of changes in retrieved traces Inspecting clusters obtained on the base of trace similarity To perform analysis: Case definition Similarity measure

Case Structure Case: a trace of execution of a given process schema Process schema: general schema definition suggesting what has to be done Trace: sequence of actions actually performed by the working team Actions ordered by execution time, and stored with additional information: the timestamp of the event, the performer or originator of the event (i.e., the person/resource executing or initiating the action), data elements recorded with the event (e.g., the dosage of a drug) ID action start end actor 1. A : :35Robert 2. A : :00Frank 3. A : :30Louise 4. A : :03Carla 5. A : :55Joseph 6. ………

Similarity Measure Edit Distance: given two traces T1, and T2, ED (T1, T2) = number of operation needed to obtain T1 = T2 Edit operations on traces: Substitute one action with a different one Insert a new action Delete an action Each edit operation has cost set to 1 Trace T1: A1, A2, A1, A4, A5 Trace T2: A1, A1, A3, A5 To obtain T1 = T2: - Delete A2 in trace T1 - Substitute A4 with A3 in trace T1 (or sub. A3 with A4 in T2) ED(T1, T2) = 2

Taxonomy of Actions In our case, the cost of a substitution is not always 1: The cost is a value [0, 1] The cost is domain dependent Actions are grouped in a taxonomy derived from domain knowledge Distance of actions (A1, A2) proportional to distance in the taxonomy All Actions EmergencyHospitalization DiagnosticTherapiesDiagnosticTherapies C.A.T.EvaluationN.M.R.Rehabilitation

Taxonomical Distance Let α and β be two actions in taxonomy T; Let γ be the common ancestor of α and β; Taxonomical distance between α and β: N1 = n. arcs in the path between α and γ; N2 = n. arcs in the path between β and γ; N3 = n. arcs between γ and the root of T All Actions EmergencyHospitalization DiagnosticTherapiesDiagnosticTherapies C.A.T.EvaluationN.M.R.Rehabilitation dt(C.A.T., N.M.R) = (3 + 3) / ( *0) = 1 N1 = 3; N2 = 3; N3 = 0 α β γ All Actions EmergencyHospitalization DiagnosticTherapiesDiagnosticTherapies C.A.T.EvaluationN.M.R.Rehabilitation dt(C.A.T., Evaluation) = (1 + 1) / ( *2) = 0.33 N1 = 1; N2 = 1; N3 = 2 α β γ

Action Weight Also the cost of an insertion or deletion (indirection) is domain dependent: Some indirections can cause important effects (high weight value); other indirections cause minor impact (low weight value). Let α be an action, its weight w α is defined as: w α [0, 1[ if α generates an indirection w α = 1 otherwhise

Trace Edit Distance Let P, Q be two traces of actions; let α and β be two actions taxonomy T. Trace Edit Distance d(P, Q) is defined as: Where: (e 1,..., e k ) transforms P into Q, and: C(e i ) = dt(α, β) if e i is the substitution of α with β C(e i ) = 1*w α if e i is the insertion (or deletion) of α in P (from Q)

Trace Edit Distance: case 1 B and B’ are comparable: dt(B, B’) ≤ τ: B and B’ considered aligned Next actions are checked (C and C’)

Trace Edit Distance: case 2 B and B’ are not comparable: dt(B, B’) ≥ τ, and A and A’ not comparable: B is substituted with B’ Dt(B, B’) is added to d(P, Q)

Trace Edit Distance: case 3 B and B’ are not comparable: dt(B, B’) ≥ τ, and A and A’ comparable, and B and C’ comparable: B aligned with C’; B’ considered as indirection 1*w B’ is added to d(P, Q)

Trace Edit Distance: case 4 B and B’ are not comparable: dt(B, B’) ≥ τ, and A and A’ comparable, and C and C’ comparable: B is substituted with B’ Dt(B, B’) is added to d(P, Q)

Application Example: The Stroke Domain Stroke: loss of brain function due to ischemia or blood hemorrage Medical emergency, potentially leading to permanent damage or to death Number 2 cause of death worldwide (soon becoming number 1) Stroke patient management in 4 phases: Emergency management; Hospitalization; Discharge; Follow-up.

A “correct” Patient Management Emergency management: Symptoms recognition; C.A.T Hospitalization in neurological ward/stroke unit Diagnosis: Neurological evaluation + E.C.G. + other diagnostic investigations (i.e. chest X.R.) Therapy: antiaggregants; physical rehabilitation Discharge – Follow-up: no data available

Retrieval Example: Query Case Description Atypical situation: Emergency: Stroke diagnosed directly after C.A.T., without need of further investigations  antiaggregant therapy started immediately Hospitalization: Patient condition probably unstable, therefore further investigations: additional tests and a further anticoagulant therapy. Physical rehabilitation NOT started

Retrieval Example: Case Retrieved Query CaseMost Similar Case Indirection: diagnosis and therapy started in Hospitalization Indirections: less investigations have been performed Anticoagulant and antiaggregants are comparable: very close in the taxonomy since very similar effect Query case: # in the trace DB Trace DB composed by more than 300 traces K-Nearest Neighbor retrieval using: K = 20 Trace Similarity Distance Retrieval time: 1.2 seconds on an Intel Core2 Duo T9400 – 4Gb ram No physical rehabilitation even in the retrieved trace – atypical situation captured

Conclusion and Future Work CBR-based BP Monitoring: Cases are traces of execution Trace Edit Distance Helps in adapting BP on the basis of deviations in past traces of the same BP Clustering to identify the most frequent changes to the BP schema Implemented (single linkage clustering), but not fully validated Integration in the Process Mining tool ProM (W. van der Aalst) Extension of Trace Edit Distance considering temporal delays