SlideShare una empresa de Scribd logo
1 de 38
Beyond Process Mining:
Discovering Business Rules
From Event Logs
Marlon Dumas
University of Tartu, Estonia
With contributions from LucianoGarcía-Bañuelos,
FabrizioMaggi&Massimiliano de Leoni
Brazilian BPM Workshop (WBPM’ 2013)
Business Process Mining
2
Start
Register order
Prepare
shipment
Ship goods
(Re)send bill
Receive payment
Contact
customer
Archive order
End
Performance Analysis
Process Model
Organizational Model
Social Network
Event
Log
Slide byAna Karla Alves de Medeiros
Process mining tool
(ProM, Disco, IBM
BPI)
Automated Process Discovery
3
Enter Loan
Application
Retrieve
Applicant
Data
Compute
Installments
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
CID Task Time Stamp …
13219 Enter Loan Application 2007-11-09 T 11:20:10 -
13219 Retrieve Applicant Data 2007-11-09 T 11:22:15 -
13220 Enter Loan Application 2007-11-09 T 11:22:40 -
13219 Compute Installments 2007-11-09 T 11:22:45 -
13219 Notify Eligibility 2007-11-09 T 11:23:00 -
13219 Approve Simple Application 2007-11-09 T 11:24:30 -
13220 ComputeInstallements 2007-11-09 T 11:24:35 -
… … … …
The Problem of Process Mining
Dealing with Complexity
• Question: How to cope with complexity in
(information) system specifications?
• Aggregate-Decompose (“part-of”)
• Generalize-Specialize (“is a”)
• Special cases
• Summarize by aggregating and ignoring
“uninteresting” parts
• Summarize by specializing and ignoring
“uninteresting” specialized classes
Approach 1: Aggregation
Bose, Veerbeck& van det Aalst: Discovering Hierarchical Process Models using ProM
ProM’s Fuzzy Miner
Remove Infrequent Behavior & Aggregate
Approach 2: Trace Clustering
G. Greco et al., Discovering Expressive Process Models by Clustering Log Traces, TKDE, 2006
Trace clustering in a nutshell
Slide by Dirk Fahland
Bottom-Line
Do we want models
or do we want insights?
www.interactiveinsightsgroup.com
Discovering Business Rules
Decision rules
• Why does something happen at a given point in
time?
Descriptive (temporal) rules
• When and why does something happen?
Discriminative rules
• When and why does something wrong happen?
Mining Decision Rules
What’s missing?
13
Enter Loan
Application
Retrieve
Applicant
Data
Compute
Installments
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
salaryage
installment
amount
length
Decision
points
ProM’s Decision Miner
14
Enter Loan
Application
Retrieve
Applicant
Data
Compute
Installments
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
salaryage
installment
amount
length
CID Amount Len Salary Age Installm TaskCID Amount Len Salary Age Installm Task
13219 8500 1 NULL NULL NULL ELA
Event
Log
CID Task Data Time Stamp …
13219 ELA
Amount=8500
Len=1
2007-11-09 T 11:20:10 -
13219 RAP
Salary=2000
Age=25
2007-11-09 T 11:22:15 -
13220 ELA
Amount=25000
Len=1
2007-11-09 T 11:22:40 -
13219 CI Installm=750 2007-11-09 T 11:22:45 -
13219 NE 2007-11-09 T 11:23:00 -
13219 ASA 2007-11-09 T 11:24:30 -
13220 CI Installm=1200 2007-11-09 T 11:24:35 -
… … … … …
CID Amount Len Salary Age Installm Task
13219 8500 1 NULL NULL NULL ELA
13219 8500 1 2000 25 NULL RAP
13219 8500 1 2000 25 750 RAP
13219 8500 1 2000 25 750 NE
(amount < 10000)(amount < 10000) ∨
(amount ≥ 10000 ∧ age < 35)
amount
Approve Simple
Application (ASA)
≥10000 <10000
Approve Complex
Application (ACA)
Approve Simple
Application (ASA)
≥ 35
age
< 35
ProM’s Decision Miner / 2
CID Amount Installm Salary Age Len Task
13219 8500 750 2000 25 1 ASA
13220 12500 1200 3500 35 4 ACA
13221 9000 450 2500 27 2 ASA
… … … … … … …
15
Approve
Simple
Application
Approve
Complex
Application
Decision tree
learning
amount ≥ 10000
∧ age ≥35
ProM’s Decision Miner – Limitations
• Decision tree learning cannot discover expressions
of the form “v op v”
16
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
installment > salary
The decision miner would return:
installment ≤ 1760 ∧ salary ≤ 1750 ∨
installment ≤ 1810 ∧salary ≤ 1800 ∨
installment ≤ 1875 ∧ salary ≤ 1850 ∨
installment ≤ 1960 ∧ salary ≤ 1950 ∨
installment ≤ 1975 ∧ salary ≤ 1970 ∨
installment ≤ 2000 ∧ salary ≤ 1990 ∨ …
Generalized Decision Rule
Mining in Business Processes
• Discover of decision rules composed of atoms of the
form “v op c” and “v op v”, including linear equations
or inequalities involving multiple variables
• Approach:
– Likely invariant discovery (Daikon)
– Decision tree learning
17
De Leoni et al. FASE’2013
CID Amount Installm Salary Age Len Task
13210 20000 2000 2000 25 1 NR
13220 25000 1200 3500 35 2 NE
13221 9000 450 2500 27 2 NE
13219 8500 750 2000 25 1 ASA
13220 25000 1200 3500 35 2 ACA
13221 9000 450 2500 27 2 ASA
… … … … … … …
Daikon: Mining Likely Invariants
18
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
Daikon
installment > salary
amount ≥ 5000
length < age
…
installment ≤ salary
amount ≥ 5000
length < age
…
installment ≤ salary
amount ≤ 9500
length < age
…
installment ≤ salary
amount ≥ 10000
length < age
…
• Information Gain (IG) quantifies the discriminating power of a
predicate (with respect to two different outcomes)
• Approach:
– Use Daikon for discovering invariants
– Combine invariants in a conjunction so as to maximize the overall IG
19
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
a1: installment >
salary
a2: amount ≥ 5000
a3: length < age
…
IG(a1) = 0.8
IG(a2) = 0.2
IG(a3) = 0
…
IG(a1∧a2) = 0.8
…
Conjunctive Decision Rule Mining
Disjunctive Decision Rule Mining
20
…
Partition
1
Partition2
Conjunctive
Miner
Conjunctive
Miner
CONJ1 CONJ2
Partitionn
Conjunctive
Miner
CONJn
Event
Log
21
…
Partition
1
Partition2
Conjunctive
BranchMiner
Conjunctive
BranchMiner
CONJ1 CONJ2
Event
Log
Notify
Rejection
Notify
Eligibility
Notify
Rejection
Decision Tree
…
IG(CONJ1) = 0.4
IG(CONJ2) = 0.45
IG(CONJ3) = 0.5
…
IG(CONJ1∨CONJ2) = 0.78
IG(CONJ1∨CONJ3) = 0.6
…
Disjunctive Decision Rule Mining
Mining Descriptive Temporal
Rules
Problem Statement
• Given a log, discover a set of temporal rules
(LTL) that describe the underlying process,
e.g.
– In a lab analysis process, every leukocyte
count is eventually followed by a platelet count
• ☐(leukocyte_countplatelet_count)
– Patients who undergo surgery X do not
undergo surgery Y later
• ☐(X ☐ not Y)
DeclareMiner
(Maggi et al.)
Oh no! Not again!
What went wrong?
• Not all rules are interesting
• What is “interesting”?
– Not necessarily what is frequent (expected)
– But what deviates from the expected
• Example:
– Every patient who is diagnosed with
condition X undergoes surgery Y
• But not if the have previously been diagnosed
with condition Z
Interesting Rules
Something should have “normally” happened but
did not happen, why?
Something should normally not have happened but
it happened, why?
Something happens only when things go “well”
Something happens only when things go “wrong”
Discovering Refined Temporal Rules
• Discover temporal rules that are frequently
“activated” but not always “fulfilled”, e.g.
– When A occurs, eventually B occurs in 90% of
cases
• ☐(A  B) has 90% fulfillment ratio
– Discover a rule that describes the remaining
10% of cases, e.g. using data attributes
• ☐(A [age < 70]  B) has 100% fulfillment ratio
Now it’s better
Bose et al. BPM’2013
And better (with data)
Maggi et al. BPM’2013
Discriminative Rules Mining
Problem Statement
• Given a log partitioned into classes
– e.g. good vs bad cases, on-time vs late cases
• Discover a set of temporal rules that
distinguish one class from the other, e.g.
• Claims for house damage that end up in a
complaint, are often those for which at two or more
data entry errors are made by the customer when
filing the claim
Mining Anomalous Software
Development Issues (Sun et al. 2013)
• Extract features from traces based on which
events occur in the trace
• Apply a contrasting itemset mining technique
 features in one class and not in the other
• Decision tree to construct readable rules
Discovering Signature Patterns
Bose & van der Aalst 2013
K-nearest neighbor, one-class SVM
kgrams, tandem repeats, …
Decision trees, class association rules
Cross validation
IBM Business Process Insight
1. Apply sequence mining to extract
frequent patterns from event logs
2. Determine which patterns best
discriminate between different outcomes
– Uses Information Gain (IG) to rank patterns
according to their discriminative power
Lakshmanan et al. BPM’2013
Conclusion
Business rules discovery goes beyond automated
discovery of process models
• Enhances mined process models with decision rules
• Describes an event log in terms of frequent patterns (descriptive rules)
• Provides insights into:
• Unexpected behavior
• Undesirable behavior
Lots of open challenges
• Define & validate metrics of rule interestingness
• Design scalable algorithms
• Case studies with user feedback
• Interactive business rule mining
References
• Mining decision rules
– Rozinat, van der Aalst: “Decision Mining in ProM”. BPM’2006
– De Leoni, Dumas, García-Bañuelos: “Discovering Branching Conditions from
Business Process Execution Logs”. FASE’2013
• Mining rule-based process models
– Maggi, Bose, van der Aalst: “Efficient Discovery of Understandable Declarative
Process Models from Event Logs”. CAiSE'2012.
– Di Ciccio, Mecella: “A Two-Step Fast Algorithm for the Automated Discovery of
Declarative Workflows”. CIDM’2013.
– Maggi, Dumas, García-Bañuelos, Montali: “Discovering Data-Aware
Declarative Process Models from Event Logs”. BPM’2013
– Bose, Maggi, van der Aalst: “Enhancing Declare Maps Based on Event
Correlations”. BPM’2013.
• Discriminative rules mining
– Sun et al. Mining “Explicit Rules for Software Process Evaluation”. ICSSP’2013
– Bose and van der Aalst: “Discovering Signature Patterns from Event Logs”.
CIDM’2013.
– Lakshmanan et al. “Investigating Clinical Care Pathways Correlated With
Outcomes”. BPM’2013
Beyond Process Mining: Discovering Business Rules From Event Logs

Más contenido relacionado

La actualidad más candente

In Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business ProcessesIn Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business ProcessesMarlon Dumas
 
AI for Business Process Management
AI for Business Process ManagementAI for Business Process Management
AI for Business Process ManagementMarlon Dumas
 
Evidence-Based Business Process Management
Evidence-Based Business Process ManagementEvidence-Based Business Process Management
Evidence-Based Business Process ManagementMarlon Dumas
 
Introduction to Business Process Monitoring and Process Mining
Introduction to Business Process Monitoring and Process MiningIntroduction to Business Process Monitoring and Process Mining
Introduction to Business Process Monitoring and Process MiningMarlon Dumas
 
Process Mining and Predictive Process Monitoring in Apromore
Process Mining and Predictive Process Monitoring in ApromoreProcess Mining and Predictive Process Monitoring in Apromore
Process Mining and Predictive Process Monitoring in ApromoreMarlon Dumas
 
Predictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataPredictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataMarlon Dumas
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsMarlon Dumas
 
Business Process Monitoring and Mining
Business Process Monitoring and MiningBusiness Process Monitoring and Mining
Business Process Monitoring and MiningMarlon Dumas
 
Process Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to ActionsProcess Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to ActionsMarlon Dumas
 
Automated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and PerspectivesAutomated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and PerspectivesMarlon Dumas
 
AI for Business Process Management
AI for Business Process ManagementAI for Business Process Management
AI for Business Process ManagementMarlon Dumas
 
Caterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management SystemCaterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management SystemMarlon Dumas
 
White-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysisWhite-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysisMarlon Dumas
 
Business Process Automation and Data Processing Workflows
Business Process Automation and Data Processing WorkflowsBusiness Process Automation and Data Processing Workflows
Business Process Automation and Data Processing WorkflowsMarlon Dumas
 
Artificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsArtificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsMarlon Dumas
 
Visualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsVisualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsMithileysh Sathiyanarayanan
 
Predictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter OptimizationPredictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter OptimizationMarlon Dumas
 
Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...
Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...
Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...Marlon Dumas
 
Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionPrescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionMarlon Dumas
 

La actualidad más candente (20)

In Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business ProcessesIn Processes We Trust: Privacy and Trust in Business Processes
In Processes We Trust: Privacy and Trust in Business Processes
 
AI for Business Process Management
AI for Business Process ManagementAI for Business Process Management
AI for Business Process Management
 
Evidence-Based Business Process Management
Evidence-Based Business Process ManagementEvidence-Based Business Process Management
Evidence-Based Business Process Management
 
Introduction to Business Process Monitoring and Process Mining
Introduction to Business Process Monitoring and Process MiningIntroduction to Business Process Monitoring and Process Mining
Introduction to Business Process Monitoring and Process Mining
 
Process Mining and Predictive Process Monitoring in Apromore
Process Mining and Predictive Process Monitoring in ApromoreProcess Mining and Predictive Process Monitoring in Apromore
Process Mining and Predictive Process Monitoring in Apromore
 
Predictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured DataPredictive Business Process Monitoring with Structured and Unstructured Data
Predictive Business Process Monitoring with Structured and Unstructured Data
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to Predictions
 
Business Process Monitoring and Mining
Business Process Monitoring and MiningBusiness Process Monitoring and Mining
Business Process Monitoring and Mining
 
Process Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to ActionsProcess Mining 2.0: From Insights to Actions
Process Mining 2.0: From Insights to Actions
 
Automated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and PerspectivesAutomated Process Improvement: Status, Challenges, and Perspectives
Automated Process Improvement: Status, Challenges, and Perspectives
 
AI for Business Process Management
AI for Business Process ManagementAI for Business Process Management
AI for Business Process Management
 
Caterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management SystemCaterpillar: A Blockchain-Based Business Proces Management System
Caterpillar: A Blockchain-Based Business Proces Management System
 
White-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysisWhite-box prediction of process performance indicators via flow analysis
White-box prediction of process performance indicators via flow analysis
 
Business Process Automation and Data Processing Workflows
Business Process Automation and Data Processing WorkflowsBusiness Process Automation and Data Processing Workflows
Business Process Automation and Data Processing Workflows
 
Artificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) YearsArtificial Intelligence: The Next 5(0) Years
Artificial Intelligence: The Next 5(0) Years
 
Visualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsVisualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri nets
 
Predictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter OptimizationPredictive Process Monitoring with Hyperparameter Optimization
Predictive Process Monitoring with Hyperparameter Optimization
 
Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...
Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...
Process Mining Meets Causal Machine Learning: Discovering Causal Rules From E...
 
Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time ReductionPrescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
Prescriptive Process Monitoring for Cost-Aware Cycle Time Reduction
 
I tlecture2
I tlecture2I tlecture2
I tlecture2
 

Destacado

Introduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMIntroduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMSarbashrestha Panda
 
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Marlon Dumas
 
Caso de Éxito: Mineria de Procesos en investigación del cancer
Caso de Éxito: Mineria de Procesos en investigación del cancerCaso de Éxito: Mineria de Procesos en investigación del cancer
Caso de Éxito: Mineria de Procesos en investigación del cancerG2, Gobierno y Gestión de TI, SL
 
Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...
Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...
Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...Marlon Dumas
 
Discovering Branching Conditions from Business Process Execution Logs
Discovering Branching Conditions from Business Process Execution LogsDiscovering Branching Conditions from Business Process Execution Logs
Discovering Branching Conditions from Business Process Execution LogsMarlon Dumas
 
Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM
Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM
Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM G2, Gobierno y Gestión de TI, SL
 
Process Mining Introduction
Process Mining IntroductionProcess Mining Introduction
Process Mining IntroductionVala Ali Rohani
 
Decomposition-Driven Consolidation of Business Process Models
Decomposition-Driven Consolidation of Business Process ModelsDecomposition-Driven Consolidation of Business Process Models
Decomposition-Driven Consolidation of Business Process ModelsMarlon Dumas
 
Erp for mining industry
Erp for mining industryErp for mining industry
Erp for mining industryJaimin Dave
 
Business Process Insight - SRII 2012
Business Process Insight - SRII 2012Business Process Insight - SRII 2012
Business Process Insight - SRII 2012Szabolcs Rozsnyai
 
Large-Scale Distributed Storage System for Business Provenance - Cloud 2011
Large-Scale Distributed Storage System for Business Provenance - Cloud 2011Large-Scale Distributed Storage System for Business Provenance - Cloud 2011
Large-Scale Distributed Storage System for Business Provenance - Cloud 2011Szabolcs Rozsnyai
 
Automated Correlation Discovery for Semi-Structured Business Processes
Automated Correlation Discovery for Semi-Structured Business ProcessesAutomated Correlation Discovery for Semi-Structured Business Processes
Automated Correlation Discovery for Semi-Structured Business ProcessesSzabolcs Rozsnyai
 
La minería de procesos en la auditoria de sistemas de información
La minería de procesos en la auditoria de sistemas de informaciónLa minería de procesos en la auditoria de sistemas de información
La minería de procesos en la auditoria de sistemas de informaciónG2, Gobierno y Gestión de TI, SL
 
Minería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMinería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMarlon Dumas
 
Modul Odoo ERP
Modul Odoo ERPModul Odoo ERP
Modul Odoo ERPryan28_sp
 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignMarlon Dumas
 
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
From Conceptual to Executable BPMN Process Models A Step-by-Step MethodFrom Conceptual to Executable BPMN Process Models A Step-by-Step Method
From Conceptual to Executable BPMN Process Models A Step-by-Step MethodMarlon Dumas
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementAlan McSweeney
 

Destacado (19)

Introduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMIntroduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPM
 
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
Fundamentals of Business Process Management: A Quick Introduction to Value-Dr...
 
Caso de Éxito: Mineria de Procesos en investigación del cancer
Caso de Éxito: Mineria de Procesos en investigación del cancerCaso de Éxito: Mineria de Procesos en investigación del cancer
Caso de Éxito: Mineria de Procesos en investigación del cancer
 
Process mining and lean
Process mining and leanProcess mining and lean
Process mining and lean
 
Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...
Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...
Discovering Unbounded Synchronization Conditions in Artifact-Centric Process ...
 
Discovering Branching Conditions from Business Process Execution Logs
Discovering Branching Conditions from Business Process Execution LogsDiscovering Branching Conditions from Business Process Execution Logs
Discovering Branching Conditions from Business Process Execution Logs
 
Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM
Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM
Ponencia: Posibilidades de uso de la Minería de Procesos para la mejora en ITSM
 
Process Mining Introduction
Process Mining IntroductionProcess Mining Introduction
Process Mining Introduction
 
Decomposition-Driven Consolidation of Business Process Models
Decomposition-Driven Consolidation of Business Process ModelsDecomposition-Driven Consolidation of Business Process Models
Decomposition-Driven Consolidation of Business Process Models
 
Erp for mining industry
Erp for mining industryErp for mining industry
Erp for mining industry
 
Business Process Insight - SRII 2012
Business Process Insight - SRII 2012Business Process Insight - SRII 2012
Business Process Insight - SRII 2012
 
Large-Scale Distributed Storage System for Business Provenance - Cloud 2011
Large-Scale Distributed Storage System for Business Provenance - Cloud 2011Large-Scale Distributed Storage System for Business Provenance - Cloud 2011
Large-Scale Distributed Storage System for Business Provenance - Cloud 2011
 
Automated Correlation Discovery for Semi-Structured Business Processes
Automated Correlation Discovery for Semi-Structured Business ProcessesAutomated Correlation Discovery for Semi-Structured Business Processes
Automated Correlation Discovery for Semi-Structured Business Processes
 
La minería de procesos en la auditoria de sistemas de información
La minería de procesos en la auditoria de sistemas de informaciónLa minería de procesos en la auditoria de sistemas de información
La minería de procesos en la auditoria de sistemas de información
 
Minería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de NegocioMinería de Procesos y de Reglas de Negocio
Minería de Procesos y de Reglas de Negocio
 
Modul Odoo ERP
Modul Odoo ERPModul Odoo ERP
Modul Odoo ERP
 
Introduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and RedesignIntroduction to Business Process Analysis and Redesign
Introduction to Business Process Analysis and Redesign
 
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
From Conceptual to Executable BPMN Process Models A Step-by-Step MethodFrom Conceptual to Executable BPMN Process Models A Step-by-Step Method
From Conceptual to Executable BPMN Process Models A Step-by-Step Method
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 

Similar a Beyond Process Mining: Discovering Business Rules From Event Logs

Data warehousing and mining furc
Data warehousing and mining furcData warehousing and mining furc
Data warehousing and mining furcShani729
 
Process Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teamsProcess Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teamsMarlon Dumas
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining SlidesLaney Dale
 
The Era of Evidence-Based Business Process Management by Marlon Dumas
The Era of Evidence-Based Business Process Management by Marlon DumasThe Era of Evidence-Based Business Process Management by Marlon Dumas
The Era of Evidence-Based Business Process Management by Marlon DumasLEADingPractice
 
System and User Aspects of Web Search Latency
System and User Aspects of Web Search LatencySystem and User Aspects of Web Search Latency
System and User Aspects of Web Search LatencyTelefonica Research
 
RS in the context of Big Data-v4
RS in the context of Big Data-v4RS in the context of Big Data-v4
RS in the context of Big Data-v4Khadija Atiya
 
Operational Intelligence with WSO2 BAM
Operational Intelligence with WSO2 BAM Operational Intelligence with WSO2 BAM
Operational Intelligence with WSO2 BAM WSO2
 
Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...
Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...
Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...confluent
 
Overview of the financial architecture in oracle e business suite release 12
Overview of the  financial architecture in oracle e business suite release 12Overview of the  financial architecture in oracle e business suite release 12
Overview of the financial architecture in oracle e business suite release 12magnificsairam
 
Overview of the financial architecture in oracle e business suite release 12
Overview of the  financial architecture in oracle e business suite release 12Overview of the  financial architecture in oracle e business suite release 12
Overview of the financial architecture in oracle e business suite release 12magnificbsr
 
Overview of the financial architecture in oracle e business suite release 12
Overview of the  financial architecture in oracle e business suite release 12Overview of the  financial architecture in oracle e business suite release 12
Overview of the financial architecture in oracle e business suite release 12babymagnific
 
Pitfalls and pro-tips for effective and transparent Business Intelligence too...
Pitfalls and pro-tips for effective and transparent Business Intelligence too...Pitfalls and pro-tips for effective and transparent Business Intelligence too...
Pitfalls and pro-tips for effective and transparent Business Intelligence too...Data Con LA
 
How Do You Measure Up
How Do You Measure UpHow Do You Measure Up
How Do You Measure Upjccvi1
 
introDMintroDMintroDMintroDMintroDMintroDM.ppt
introDMintroDMintroDMintroDMintroDMintroDM.pptintroDMintroDMintroDMintroDMintroDMintroDM.ppt
introDMintroDMintroDMintroDMintroDMintroDM.pptDEEPAK948083
 
Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...Institute for Transport Studies (ITS)
 
ISO 9001 Supervisor Awareness.pptx.pdf
ISO 9001 Supervisor Awareness.pptx.pdfISO 9001 Supervisor Awareness.pptx.pdf
ISO 9001 Supervisor Awareness.pptx.pdfmohamed735413
 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Marlon Dumas
 
How Eastern Bank Uses Big Data to Better Serve and Protect its Customers
How Eastern Bank Uses Big Data to Better Serve and Protect its CustomersHow Eastern Bank Uses Big Data to Better Serve and Protect its Customers
How Eastern Bank Uses Big Data to Better Serve and Protect its CustomersBrian Griffith
 

Similar a Beyond Process Mining: Discovering Business Rules From Event Logs (20)

Data warehousing and mining furc
Data warehousing and mining furcData warehousing and mining furc
Data warehousing and mining furc
 
Process Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teamsProcess Mining in Action: Self-service data science for business teams
Process Mining in Action: Self-service data science for business teams
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
The Era of Evidence-Based Business Process Management by Marlon Dumas
The Era of Evidence-Based Business Process Management by Marlon DumasThe Era of Evidence-Based Business Process Management by Marlon Dumas
The Era of Evidence-Based Business Process Management by Marlon Dumas
 
System and User Aspects of Web Search Latency
System and User Aspects of Web Search LatencySystem and User Aspects of Web Search Latency
System and User Aspects of Web Search Latency
 
RS in the context of Big Data-v4
RS in the context of Big Data-v4RS in the context of Big Data-v4
RS in the context of Big Data-v4
 
Operational Intelligence with WSO2 BAM
Operational Intelligence with WSO2 BAM Operational Intelligence with WSO2 BAM
Operational Intelligence with WSO2 BAM
 
Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...
Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...
Connecting Kafka to Cash (CKC) (Lyndon Hedderly, Confluent) Kafka Summit Lond...
 
Overview of the financial architecture in oracle e business suite release 12
Overview of the  financial architecture in oracle e business suite release 12Overview of the  financial architecture in oracle e business suite release 12
Overview of the financial architecture in oracle e business suite release 12
 
Overview of the financial architecture in oracle e business suite release 12
Overview of the  financial architecture in oracle e business suite release 12Overview of the  financial architecture in oracle e business suite release 12
Overview of the financial architecture in oracle e business suite release 12
 
Overview of the financial architecture in oracle e business suite release 12
Overview of the  financial architecture in oracle e business suite release 12Overview of the  financial architecture in oracle e business suite release 12
Overview of the financial architecture in oracle e business suite release 12
 
Pitfalls and pro-tips for effective and transparent Business Intelligence too...
Pitfalls and pro-tips for effective and transparent Business Intelligence too...Pitfalls and pro-tips for effective and transparent Business Intelligence too...
Pitfalls and pro-tips for effective and transparent Business Intelligence too...
 
How Do You Measure Up
How Do You Measure UpHow Do You Measure Up
How Do You Measure Up
 
ISO 90001.pdf
ISO 90001.pdfISO 90001.pdf
ISO 90001.pdf
 
introDMintroDMintroDMintroDMintroDMintroDM.ppt
introDMintroDMintroDMintroDMintroDMintroDM.pptintroDMintroDMintroDMintroDMintroDMintroDM.ppt
introDMintroDMintroDMintroDMintroDMintroDM.ppt
 
introDM.ppt
introDM.pptintroDM.ppt
introDM.ppt
 
Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...
 
ISO 9001 Supervisor Awareness.pptx.pdf
ISO 9001 Supervisor Awareness.pptx.pdfISO 9001 Supervisor Awareness.pptx.pdf
ISO 9001 Supervisor Awareness.pptx.pdf
 
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...Learning Accurate Business Process Simulation Models from Event Logs via Auto...
Learning Accurate Business Process Simulation Models from Event Logs via Auto...
 
How Eastern Bank Uses Big Data to Better Serve and Protect its Customers
How Eastern Bank Uses Big Data to Better Serve and Protect its CustomersHow Eastern Bank Uses Big Data to Better Serve and Protect its Customers
How Eastern Bank Uses Big Data to Better Serve and Protect its Customers
 

Más de Marlon Dumas

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?Marlon Dumas
 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationMarlon Dumas
 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Marlon Dumas
 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Marlon Dumas
 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesMarlon Dumas
 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Marlon Dumas
 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesMarlon Dumas
 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process ManagementMarlon Dumas
 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationMarlon Dumas
 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationMarlon Dumas
 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Marlon Dumas
 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsMarlon Dumas
 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process MiningMarlon Dumas
 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Marlon Dumas
 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersMarlon Dumas
 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxMarlon Dumas
 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business ProcessesMarlon Dumas
 
Optimización de procesos basada en datos
Optimización de procesos basada en datosOptimización de procesos basada en datos
Optimización de procesos basada en datosMarlon Dumas
 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementMarlon Dumas
 
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...Marlon Dumas
 

Más de Marlon Dumas (20)

How GenAI will (not) change your business?
How GenAI will (not)  change your business?How GenAI will (not)  change your business?
How GenAI will (not) change your business?
 
Walking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process OptimizationWalking the Way from Process Mining to AI-Driven Process Optimization
Walking the Way from Process Mining to AI-Driven Process Optimization
 
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...Discovery and Simulation of Business Processes with Probabilistic Resource Av...
Discovery and Simulation of Business Processes with Probabilistic Resource Av...
 
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
Can I Trust My Simulation Model? Measuring the Quality of Business Process Si...
 
Business Process Optimization: Status and Perspectives
Business Process Optimization: Status and PerspectivesBusiness Process Optimization: Status and Perspectives
Business Process Optimization: Status and Perspectives
 
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
Learning When to Treat Business Processes: Prescriptive Process Monitoring wi...
 
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business ProcessesWhy am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
Why am I Waiting Data-Driven Analysis of Waiting Times in Business Processes
 
Augmented Business Process Management
Augmented Business Process ManagementAugmented Business Process Management
Augmented Business Process Management
 
Process Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process SimulationProcess Mining and Data-Driven Process Simulation
Process Mining and Data-Driven Process Simulation
 
Modeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process SimulationModeling Extraneous Activity Delays in Business Process Simulation
Modeling Extraneous Activity Delays in Business Process Simulation
 
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...Business Process Simulation with Differentiated Resources: Does it Make a Dif...
Business Process Simulation with Differentiated Resources: Does it Make a Dif...
 
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource ConstraintsPrescriptive Process Monitoring Under Uncertainty and Resource Constraints
Prescriptive Process Monitoring Under Uncertainty and Resource Constraints
 
Robotic Process Mining
Robotic Process MiningRobotic Process Mining
Robotic Process Mining
 
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
Accurate and Reliable What-If Analysis of Business Processes: Is it Achievable?
 
Process Mining: A Guide for Practitioners
Process Mining: A Guide for PractitionersProcess Mining: A Guide for Practitioners
Process Mining: A Guide for Practitioners
 
Process Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptxProcess Mining for Process Improvement.pptx
Process Mining for Process Improvement.pptx
 
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
Data-Driven Analysis of  Batch Processing Inefficiencies  in Business ProcessesData-Driven Analysis of  Batch Processing Inefficiencies  in Business Processes
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
 
Optimización de procesos basada en datos
Optimización de procesos basada en datosOptimización de procesos basada en datos
Optimización de procesos basada en datos
 
Process Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process Improvement
 
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...
Mine Your Simulation Model: Automated Discovery of Business Process Simulatio...
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Beyond Process Mining: Discovering Business Rules From Event Logs

  • 1. Beyond Process Mining: Discovering Business Rules From Event Logs Marlon Dumas University of Tartu, Estonia With contributions from LucianoGarcía-Bañuelos, FabrizioMaggi&Massimiliano de Leoni Brazilian BPM Workshop (WBPM’ 2013)
  • 2. Business Process Mining 2 Start Register order Prepare shipment Ship goods (Re)send bill Receive payment Contact customer Archive order End Performance Analysis Process Model Organizational Model Social Network Event Log Slide byAna Karla Alves de Medeiros Process mining tool (ProM, Disco, IBM BPI)
  • 3. Automated Process Discovery 3 Enter Loan Application Retrieve Applicant Data Compute Installments Approve Simple Application Approve Complex Application Notify Rejection Notify Eligibility CID Task Time Stamp … 13219 Enter Loan Application 2007-11-09 T 11:20:10 - 13219 Retrieve Applicant Data 2007-11-09 T 11:22:15 - 13220 Enter Loan Application 2007-11-09 T 11:22:40 - 13219 Compute Installments 2007-11-09 T 11:22:45 - 13219 Notify Eligibility 2007-11-09 T 11:23:00 - 13219 Approve Simple Application 2007-11-09 T 11:24:30 - 13220 ComputeInstallements 2007-11-09 T 11:24:35 - … … … …
  • 4. The Problem of Process Mining
  • 5. Dealing with Complexity • Question: How to cope with complexity in (information) system specifications? • Aggregate-Decompose (“part-of”) • Generalize-Specialize (“is a”) • Special cases • Summarize by aggregating and ignoring “uninteresting” parts • Summarize by specializing and ignoring “uninteresting” specialized classes
  • 6. Approach 1: Aggregation Bose, Veerbeck& van det Aalst: Discovering Hierarchical Process Models using ProM
  • 7. ProM’s Fuzzy Miner Remove Infrequent Behavior & Aggregate
  • 8. Approach 2: Trace Clustering G. Greco et al., Discovering Expressive Process Models by Clustering Log Traces, TKDE, 2006
  • 9. Trace clustering in a nutshell Slide by Dirk Fahland
  • 10. Bottom-Line Do we want models or do we want insights? www.interactiveinsightsgroup.com
  • 11. Discovering Business Rules Decision rules • Why does something happen at a given point in time? Descriptive (temporal) rules • When and why does something happen? Discriminative rules • When and why does something wrong happen?
  • 14. ProM’s Decision Miner 14 Enter Loan Application Retrieve Applicant Data Compute Installments Approve Simple Application Approve Complex Application Notify Rejection Notify Eligibility salaryage installment amount length CID Amount Len Salary Age Installm TaskCID Amount Len Salary Age Installm Task 13219 8500 1 NULL NULL NULL ELA Event Log CID Task Data Time Stamp … 13219 ELA Amount=8500 Len=1 2007-11-09 T 11:20:10 - 13219 RAP Salary=2000 Age=25 2007-11-09 T 11:22:15 - 13220 ELA Amount=25000 Len=1 2007-11-09 T 11:22:40 - 13219 CI Installm=750 2007-11-09 T 11:22:45 - 13219 NE 2007-11-09 T 11:23:00 - 13219 ASA 2007-11-09 T 11:24:30 - 13220 CI Installm=1200 2007-11-09 T 11:24:35 - … … … … … CID Amount Len Salary Age Installm Task 13219 8500 1 NULL NULL NULL ELA 13219 8500 1 2000 25 NULL RAP 13219 8500 1 2000 25 750 RAP 13219 8500 1 2000 25 750 NE
  • 15. (amount < 10000)(amount < 10000) ∨ (amount ≥ 10000 ∧ age < 35) amount Approve Simple Application (ASA) ≥10000 <10000 Approve Complex Application (ACA) Approve Simple Application (ASA) ≥ 35 age < 35 ProM’s Decision Miner / 2 CID Amount Installm Salary Age Len Task 13219 8500 750 2000 25 1 ASA 13220 12500 1200 3500 35 4 ACA 13221 9000 450 2500 27 2 ASA … … … … … … … 15 Approve Simple Application Approve Complex Application Decision tree learning amount ≥ 10000 ∧ age ≥35
  • 16. ProM’s Decision Miner – Limitations • Decision tree learning cannot discover expressions of the form “v op v” 16 Approve Simple Application Approve Complex Application Notify Rejection Notify Eligibility installment > salary The decision miner would return: installment ≤ 1760 ∧ salary ≤ 1750 ∨ installment ≤ 1810 ∧salary ≤ 1800 ∨ installment ≤ 1875 ∧ salary ≤ 1850 ∨ installment ≤ 1960 ∧ salary ≤ 1950 ∨ installment ≤ 1975 ∧ salary ≤ 1970 ∨ installment ≤ 2000 ∧ salary ≤ 1990 ∨ …
  • 17. Generalized Decision Rule Mining in Business Processes • Discover of decision rules composed of atoms of the form “v op c” and “v op v”, including linear equations or inequalities involving multiple variables • Approach: – Likely invariant discovery (Daikon) – Decision tree learning 17 De Leoni et al. FASE’2013
  • 18. CID Amount Installm Salary Age Len Task 13210 20000 2000 2000 25 1 NR 13220 25000 1200 3500 35 2 NE 13221 9000 450 2500 27 2 NE 13219 8500 750 2000 25 1 ASA 13220 25000 1200 3500 35 2 ACA 13221 9000 450 2500 27 2 ASA … … … … … … … Daikon: Mining Likely Invariants 18 Approve Simple Application Approve Complex Application Notify Rejection Notify Eligibility Daikon installment > salary amount ≥ 5000 length < age … installment ≤ salary amount ≥ 5000 length < age … installment ≤ salary amount ≤ 9500 length < age … installment ≤ salary amount ≥ 10000 length < age …
  • 19. • Information Gain (IG) quantifies the discriminating power of a predicate (with respect to two different outcomes) • Approach: – Use Daikon for discovering invariants – Combine invariants in a conjunction so as to maximize the overall IG 19 Approve Simple Application Approve Complex Application Notify Rejection Notify Eligibility a1: installment > salary a2: amount ≥ 5000 a3: length < age … IG(a1) = 0.8 IG(a2) = 0.2 IG(a3) = 0 … IG(a1∧a2) = 0.8 … Conjunctive Decision Rule Mining
  • 20. Disjunctive Decision Rule Mining 20 … Partition 1 Partition2 Conjunctive Miner Conjunctive Miner CONJ1 CONJ2 Partitionn Conjunctive Miner CONJn Event Log
  • 21. 21 … Partition 1 Partition2 Conjunctive BranchMiner Conjunctive BranchMiner CONJ1 CONJ2 Event Log Notify Rejection Notify Eligibility Notify Rejection Decision Tree … IG(CONJ1) = 0.4 IG(CONJ2) = 0.45 IG(CONJ3) = 0.5 … IG(CONJ1∨CONJ2) = 0.78 IG(CONJ1∨CONJ3) = 0.6 … Disjunctive Decision Rule Mining
  • 23. Problem Statement • Given a log, discover a set of temporal rules (LTL) that describe the underlying process, e.g. – In a lab analysis process, every leukocyte count is eventually followed by a platelet count • ☐(leukocyte_countplatelet_count) – Patients who undergo surgery X do not undergo surgery Y later • ☐(X ☐ not Y)
  • 25. Oh no! Not again!
  • 26. What went wrong? • Not all rules are interesting • What is “interesting”? – Not necessarily what is frequent (expected) – But what deviates from the expected • Example: – Every patient who is diagnosed with condition X undergoes surgery Y • But not if the have previously been diagnosed with condition Z
  • 27. Interesting Rules Something should have “normally” happened but did not happen, why? Something should normally not have happened but it happened, why? Something happens only when things go “well” Something happens only when things go “wrong”
  • 28. Discovering Refined Temporal Rules • Discover temporal rules that are frequently “activated” but not always “fulfilled”, e.g. – When A occurs, eventually B occurs in 90% of cases • ☐(A  B) has 90% fulfillment ratio – Discover a rule that describes the remaining 10% of cases, e.g. using data attributes • ☐(A [age < 70]  B) has 100% fulfillment ratio
  • 29. Now it’s better Bose et al. BPM’2013
  • 30. And better (with data) Maggi et al. BPM’2013
  • 32. Problem Statement • Given a log partitioned into classes – e.g. good vs bad cases, on-time vs late cases • Discover a set of temporal rules that distinguish one class from the other, e.g. • Claims for house damage that end up in a complaint, are often those for which at two or more data entry errors are made by the customer when filing the claim
  • 33. Mining Anomalous Software Development Issues (Sun et al. 2013) • Extract features from traces based on which events occur in the trace • Apply a contrasting itemset mining technique  features in one class and not in the other • Decision tree to construct readable rules
  • 34. Discovering Signature Patterns Bose & van der Aalst 2013 K-nearest neighbor, one-class SVM kgrams, tandem repeats, … Decision trees, class association rules Cross validation
  • 35. IBM Business Process Insight 1. Apply sequence mining to extract frequent patterns from event logs 2. Determine which patterns best discriminate between different outcomes – Uses Information Gain (IG) to rank patterns according to their discriminative power Lakshmanan et al. BPM’2013
  • 36. Conclusion Business rules discovery goes beyond automated discovery of process models • Enhances mined process models with decision rules • Describes an event log in terms of frequent patterns (descriptive rules) • Provides insights into: • Unexpected behavior • Undesirable behavior Lots of open challenges • Define & validate metrics of rule interestingness • Design scalable algorithms • Case studies with user feedback • Interactive business rule mining
  • 37. References • Mining decision rules – Rozinat, van der Aalst: “Decision Mining in ProM”. BPM’2006 – De Leoni, Dumas, García-Bañuelos: “Discovering Branching Conditions from Business Process Execution Logs”. FASE’2013 • Mining rule-based process models – Maggi, Bose, van der Aalst: “Efficient Discovery of Understandable Declarative Process Models from Event Logs”. CAiSE'2012. – Di Ciccio, Mecella: “A Two-Step Fast Algorithm for the Automated Discovery of Declarative Workflows”. CIDM’2013. – Maggi, Dumas, García-Bañuelos, Montali: “Discovering Data-Aware Declarative Process Models from Event Logs”. BPM’2013 – Bose, Maggi, van der Aalst: “Enhancing Declare Maps Based on Event Correlations”. BPM’2013. • Discriminative rules mining – Sun et al. Mining “Explicit Rules for Software Process Evaluation”. ICSSP’2013 – Bose and van der Aalst: “Discovering Signature Patterns from Event Logs”. CIDM’2013. – Lakshmanan et al. “Investigating Clinical Care Pathways Correlated With Outcomes”. BPM’2013

Notas del editor

  1. Discovering rules that describe not what happens but why it happens