Process Mining With Semantics: Real-Time Processing and Application

Process Mining With Semantics: Real-Time Processing and Application

Copyright: © 2020 |Pages: 36
DOI: 10.4018/978-1-7998-2668-2.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter contains the application of the semantic process mining approach in real-time. This includes the series of analysis that were performed not only to show how the method is applied in different scenarios or settings for process mining purposes, but also how to technically apply the method for semantic process mining tasks. In the first section, the work shows how the authors practically apply the current tools that supports the process mining through its participation in the Process Discovery Contest organised by the IEEE CIS Task Force on Process Mining. In the second section, the chapter shows how it expounds the results and amalgamation of the two process mining techniques, namely fuzzy miner and business process modelling notation (BPMN) approach, in order to demonstrate the capability of the proposed semantic-based fuzzy miner being able to perform a more conceptual and accurate classification of the individual traces within the process or input models.
Chapter Preview
Top

Fuzzy-Bpmn Mining Approach

In this section, the work shows how we practically apply the current tools that support the process mining through participation in the First Process Discovery Contest (Carmona, et al., 2016) organized by the IEEE CIS Task Force on Process Mining (IEEE CIS Task Force on Process Mining, 2016; Van der Aalst, et al., 2012). In theory, the IEEE group has introduced the contest to foster scientific research within the area of process mining with the primary aim of promoting the techniques and its main applications in real-world settings. According to Carmona, et al (2016) the process mining contest is dedicated to the assessment of tools and methods that discover business process models from the event logs. Accordingly, a number of event logs were provided for the purpose of the different analysis by the group (Carmona, et al., 2016). Typically, the provided events log were generated from business process models that show different behavioral characteristics. The main objective is to compare the efficiency of the different techniques that can discover fitting process models, that in turn, are capable of providing a proper balance between “overfitting” and “underfitting” models. In other words, the discovered models are seen as overfitting (the event log) if it is too restrictive by disallowing behaviours which are part of the underlying process. On the other hand, the model is considered as underfitting (the reality) if it is not restrictive enough by allowing behaviours which are not part of the underlying process. Thus:

  • Given a trace (t) representing real process behaviour, the process model (m) classifies it as allowed, or

  • Given a trace (t) representing a behaviour not related to the process, the process model (m) classifies it as disallowed (Carmona, et al., 2016)

Moreover, each of the test event logs precisely ((test_log_april_1 to test_log_april_10) and (test_log_may_1 to test_log_may_10)) which can be found in (Carmona, et al., 2016) represents part of the original model that was not initially revealed for the purpose of the analysis. Also, the test logs with a complete total of 20 traces for each log are considered to consist of 10 traces which are replayable (allowed) and another 10 traces which are not replayable (disallowed) by the model. Therefore, the total number of traces for the test logs is distributed as follows:

10 test logs x 20 traces which equals to a total of = 200 Traces for each of the April log and May log respectively

The aim of the resultant analysis as represented in this section is to carry out a classification task to determine the individual traces that make up the two test event logs, as well as, establish their fitness within the original model as follows:

To do this, firstly, the work discovers the set of 10 process models from the training sets (Carmona, et al., 2016) using the Fuzzy miner (G¨unther, 2009; Günther & Van der Aalst, 2007; Rozinat & Gunther, 2012) and then second, make use of the Business Process Modelling Notations (BPMN) (Van der Aalst, 2016) to analyse and provide the replaying semantics for each of the process models. The details about the 10 different process models that are discovered using the method is described in Okoye et al (2016 & 2017) and are provided in the Appendix A section of this book.

Furthermore, the work performs a classification task for the test set (Carmona, et al., 2016), to generate the various cases (traces) that make up each of the process executions. Again, the work summarises in this section how it generates the 20 individual traces for each of the test logs including the sequence of the activity executions for each of the individual traces. Further details about the classification method and the results are also provided in Okoye et al (2016 & 2017).

Complete Chapter List

Search this Book:
Reset