Boost Fertility New Invention Ups Success Rates.pdf
Beyond Process Mining: Discovering Business Rules From Event Logs
1. Beyond Process Mining:
Discovering Business Rules
From Event Logs
Marlon Dumas
University of Tartu, Estonia
With contributions from LucianoGarcía-Bañuelos,
FabrizioMaggi&Massimiliano de Leoni
Brazilian BPM Workshop (WBPM’ 2013)
2. Business Process Mining
2
Start
Register order
Prepare
shipment
Ship goods
(Re)send bill
Receive payment
Contact
customer
Archive order
End
Performance Analysis
Process Model
Organizational Model
Social Network
Event
Log
Slide byAna Karla Alves de Medeiros
Process mining tool
(ProM, Disco, IBM
BPI)
3. Automated Process Discovery
3
Enter Loan
Application
Retrieve
Applicant
Data
Compute
Installments
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
CID Task Time Stamp …
13219 Enter Loan Application 2007-11-09 T 11:20:10 -
13219 Retrieve Applicant Data 2007-11-09 T 11:22:15 -
13220 Enter Loan Application 2007-11-09 T 11:22:40 -
13219 Compute Installments 2007-11-09 T 11:22:45 -
13219 Notify Eligibility 2007-11-09 T 11:23:00 -
13219 Approve Simple Application 2007-11-09 T 11:24:30 -
13220 ComputeInstallements 2007-11-09 T 11:24:35 -
… … … …
5. Dealing with Complexity
• Question: How to cope with complexity in
(information) system specifications?
• Aggregate-Decompose (“part-of”)
• Generalize-Specialize (“is a”)
• Special cases
• Summarize by aggregating and ignoring
“uninteresting” parts
• Summarize by specializing and ignoring
“uninteresting” specialized classes
11. Discovering Business Rules
Decision rules
• Why does something happen at a given point in
time?
Descriptive (temporal) rules
• When and why does something happen?
Discriminative rules
• When and why does something wrong happen?
17. Generalized Decision Rule
Mining in Business Processes
• Discover of decision rules composed of atoms of the
form “v op c” and “v op v”, including linear equations
or inequalities involving multiple variables
• Approach:
– Likely invariant discovery (Daikon)
– Decision tree learning
17
De Leoni et al. FASE’2013
19. • Information Gain (IG) quantifies the discriminating power of a
predicate (with respect to two different outcomes)
• Approach:
– Use Daikon for discovering invariants
– Combine invariants in a conjunction so as to maximize the overall IG
19
Approve
Simple
Application
Approve
Complex
Application
Notify
Rejection
Notify
Eligibility
a1: installment >
salary
a2: amount ≥ 5000
a3: length < age
…
IG(a1) = 0.8
IG(a2) = 0.2
IG(a3) = 0
…
IG(a1∧a2) = 0.8
…
Conjunctive Decision Rule Mining
23. Problem Statement
• Given a log, discover a set of temporal rules
(LTL) that describe the underlying process,
e.g.
– In a lab analysis process, every leukocyte
count is eventually followed by a platelet count
• ☐(leukocyte_countplatelet_count)
– Patients who undergo surgery X do not
undergo surgery Y later
• ☐(X ☐ not Y)
26. What went wrong?
• Not all rules are interesting
• What is “interesting”?
– Not necessarily what is frequent (expected)
– But what deviates from the expected
• Example:
– Every patient who is diagnosed with
condition X undergoes surgery Y
• But not if the have previously been diagnosed
with condition Z
27. Interesting Rules
Something should have “normally” happened but
did not happen, why?
Something should normally not have happened but
it happened, why?
Something happens only when things go “well”
Something happens only when things go “wrong”
28. Discovering Refined Temporal Rules
• Discover temporal rules that are frequently
“activated” but not always “fulfilled”, e.g.
– When A occurs, eventually B occurs in 90% of
cases
• ☐(A B) has 90% fulfillment ratio
– Discover a rule that describes the remaining
10% of cases, e.g. using data attributes
• ☐(A [age < 70] B) has 100% fulfillment ratio
32. Problem Statement
• Given a log partitioned into classes
– e.g. good vs bad cases, on-time vs late cases
• Discover a set of temporal rules that
distinguish one class from the other, e.g.
• Claims for house damage that end up in a
complaint, are often those for which at two or more
data entry errors are made by the customer when
filing the claim
33. Mining Anomalous Software
Development Issues (Sun et al. 2013)
• Extract features from traces based on which
events occur in the trace
• Apply a contrasting itemset mining technique
features in one class and not in the other
• Decision tree to construct readable rules
34. Discovering Signature Patterns
Bose & van der Aalst 2013
K-nearest neighbor, one-class SVM
kgrams, tandem repeats, …
Decision trees, class association rules
Cross validation
35. IBM Business Process Insight
1. Apply sequence mining to extract
frequent patterns from event logs
2. Determine which patterns best
discriminate between different outcomes
– Uses Information Gain (IG) to rank patterns
according to their discriminative power
Lakshmanan et al. BPM’2013
36. Conclusion
Business rules discovery goes beyond automated
discovery of process models
• Enhances mined process models with decision rules
• Describes an event log in terms of frequent patterns (descriptive rules)
• Provides insights into:
• Unexpected behavior
• Undesirable behavior
Lots of open challenges
• Define & validate metrics of rule interestingness
• Design scalable algorithms
• Case studies with user feedback
• Interactive business rule mining
37. References
• Mining decision rules
– Rozinat, van der Aalst: “Decision Mining in ProM”. BPM’2006
– De Leoni, Dumas, García-Bañuelos: “Discovering Branching Conditions from
Business Process Execution Logs”. FASE’2013
• Mining rule-based process models
– Maggi, Bose, van der Aalst: “Efficient Discovery of Understandable Declarative
Process Models from Event Logs”. CAiSE'2012.
– Di Ciccio, Mecella: “A Two-Step Fast Algorithm for the Automated Discovery of
Declarative Workflows”. CIDM’2013.
– Maggi, Dumas, García-Bañuelos, Montali: “Discovering Data-Aware
Declarative Process Models from Event Logs”. BPM’2013
– Bose, Maggi, van der Aalst: “Enhancing Declare Maps Based on Event
Correlations”. BPM’2013.
• Discriminative rules mining
– Sun et al. Mining “Explicit Rules for Software Process Evaluation”. ICSSP’2013
– Bose and van der Aalst: “Discovering Signature Patterns from Event Logs”.
CIDM’2013.
– Lakshmanan et al. “Investigating Clinical Care Pathways Correlated With
Outcomes”. BPM’2013
Notas del editor
Discovering rules that describe not what happens but why it happens