Presentation is loading. Please wait.

Presentation is loading. Please wait.

Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.

Similar presentations


Presentation on theme: "Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data."— Presentation transcript:

1 Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.

2 Alpha Algorithm  Process mining is the method of distilling a structured process description from a set of real executions (event logs).  Alpha algorithm assumes:  each event refers to a task  each event refers to a case  events are totally ordered  Expresses the discovered model in terms of petri nets  Model constructed can be used to:  Gain insight in the actual process in a work flow system  comparing the actual process with some predefined process

3 Alpha Algorithm  Alpha has some limitation  Noise in log  Workflow logs need to contain sufficient information

4 Section 1 Petri net definitions

5 Petri nets  A Petri net is (P/T-nets)1 An Place/Transition net, or simply P/T-net, is a tuple  (P, T, F) where: 1. P is a finite set of places, 2. T is a finite set of transitions such that P ∩ T = ∅, and 3. F ⊆ (P × T) ∪ (T × P) is a set of directed arcs, called the flow relation.  A marked P/T-net is a pair (N, s), where N = (P, T, F) is a P/T- net and where s is a bag over P denoting the marking of the net. The set of all marked P/T-nets is denoted N.

6 Enabling of Transitions  Transition t is enabled in state s 1 if and only if: For all p elements of P such that there exists a state s 1, and p has a number of tokens in its places greater or equal to its input places

7 Firing of Transitions  If transition t is enabled in state s 1, it can fire and the resulting state is s 2 :  The number of tokens in place p after firing p, s2(p), is equal to The original number of tokens s1(p), minus the number consumed, I(p,t), plus the number of produced tokens, O(t,p)

8 Firing Sequence  A Petri net (P,T,I,O) defines the following transition system (S,TR):

9 Connectedness  A net N = (P, T, F) is weakly connected, or simply connected, iff, for every two nodes x and y in P ∪ T, x(F ∪ F − 1) ∗ y, where R − 1 is the inverse and R ∗ the reflexive and transitive closure of a relation R. Net N is strongly connected iff, for every two nodes x and y, xF ∗ y.

10 Boundedness, Safeness  A marked net (N = (P, T, F), s) is bounded iff the set of reachable markings [N, s is finite. It is safe iff, for any s ∈ [N, s and any p ∈ P, s(p) ≤ 1. NB. safeness implies boundedness.

11 Dead transitions, liveness  Let (N = (P, T, F), s) be a marked P/T-net. A transition t ∈ T is dead in (N, s) iff there is no reachable marking s ∈ [N, s such that (N, s)[t. (N, s) is live iff, for every reachable marking s ∈ [N, s and t ∈ T, there is a reachable marking s ∈ [N, s such that (N, s)[t. Note that liveness implies the absence of dead transitions.

12 Workflow nets  Composed of the following building blocks  AND-split,  AND-join,  OR-split,  OR-join  Let N = (P, T, F) be a P/T-net and ¯t a fresh identifier not in P ∪ T. N is a workflow net (WF-net) iff: 1. object creation: P contains an input place i such that i = ∅, 2. object completion: P contains an output place o such that o = ∅, 3. connectedness: ¯N = (P, T ∪ {¯t}, F ∪ {(o, ¯t), (¯t, i)}) is strongly connected,

13 Soundness  Let N = (P, T, F) be a WF-net with input place i and output place o. N is sound iff: 1. safeness: (N, [i]) is safe, 2. proper completion: for any marking s ∈ [N, [i], o ∈ s implies s = [o], 3. option to complete: for any marking s ∈ [N, [i], [o] ∈ [N, s, and 4. absence of dead tasks: (N, [i]) contains no dead transitions.  The set of all sound WF-nets is denoted W.

14 Section 2 Process Rediscovery

15 Workflow trace, Workflow log  Let T be a set of tasks. σ ∈ T ∗ is a workflow trace and W ∈ P(T ∗ ) is a workflow log.  The frequency of traces helps in identifying noise

16 Log-based ordering relations  Let W be a workflow log over T, i.e., W ∈ P(T ∗ ). Let a, b ∈ T:  a >W b iff there is a trace σ = t 1 t 2 t 3... t n − 1 and i ∈ {1,..., n − 2} such that σ ∈ W and t i = a and t i+1 = b,  a → W b iff a >W b and b />W a,  a#Wb iff a />W b and b />W a, and  aWb iff a >W b and b >W a.

17 ∈, first, last  Let A be a set, a ∈ A, and σ = a1a2... an ∈ A ∗ a sequence over A of length n. ∈, first, last are defined as follows: 1. a ∈ σ iff a ∈ {a1, a2,... an}, 2. first( σ ) = a 1, if n ≥ 1, and 3. last( σ ) = a n, if n ≥ 1.

18 Complete workflow log  Let N = (P, T, F) be a sound WF-net, i.e., N ∈ W. W is a workflow log of N iff W ∈ P(T ∗ ) and every trace σ ∈ W is a firing sequence of N starting in state [i] and ending in [o], i.e., (N, [i])[ σ (N, [o]). W is a complete workflow log of N iff 1. for any workflow log W of N: >W ⊆ >W, and 2. for any t ∈ T there is a σ ∈ W such that t ∈ σ.

19 Ability to rediscover  Let N = (P, T, F) be a sound WF-net, i.e., N ∈ W, and let α be a mining algorithm which maps workflow logs of N onto sound WF-nets, i.e., α : P(T ∗ ) → W. If for any complete workflow log W of N the mining algorithm returns N (modulo renaming of places), then α is able to rediscover N.

20 My Reflections  Clustering and association mining can be useful in ascertaining a pattern of events therefore making an observation on behaviour.  Process mining can be used to discover the process that produces that pattern thereby providing insight into possible causes for behaviour.

21 Work Flow Mining Section 3

22 Causal relations imply connecting places  If there is a causal relation between two transitions according to the workflow log, then there has to be a place connecting these two transitions.  Theorem 4.1. Let N = (P, T, F) be a sound WF-net and let W be a complete workflow log of N. For any a, b ∈ T: a → W b implies a ∩ b = ∅.

23 Connecting places “often” imply causal relations  Implicit places can be detected by simply inspecting the log.  Mining algorithms do not detect implicit places because they often do not change the behavior of the net and therefore is not visible in the log.  Mining constraints- relate to synchronisation. Workflows that conform are called structured workflow nets.  Choice and synchronisation should never meet  Synchronisation should not precede an OR join

24 SWF-net  A WF-net N = (P, T, F) is an SWF-net (Structured workflow net) iff: 1. For all p ∈ P and t ∈ T with (p, t) ∈ F: |p | > 1 implies | t| = 1. 2. For all p ∈ P and t ∈ T with (p, t) ∈ F: | t| > 1 implies | p| = 1. 3. There are no implicit places.  Property: Let N = (P, T, F) be an SWF-net. For any a, b ∈ T and p1, p2 ∈ P: if p1 ∈ a ∩ b and p2 ∈ a ∩ b, then p1 = p2.

25 References  Workflow Mining: Discovering process models from event logs W.M.P. van der Aalst, A.J.M.M. Weijters, and L. Maruster


Download ppt "Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data."

Similar presentations


Ads by Google