SlideShare une entreprise Scribd logo
1  sur  23
Multi-perspective Process Analysis:
Mining the Association between
Control Flow and Data Objects
Dina Bayomie, Kate Revoredo, Jan Mendling
PAGE 2
Introduction
Multi-
perspective
Control-
flow
Resource
Time
Data
objects
-
-
-
-
PAGE 3
Introduction
RQ: What is the relation between control-
flow perspective and data objects behavior
perspective?
We propose a multi-perspective mining
technique based on association rule mining
to discover the data connections between
the control-flow and data objects behavior.
-
-
-
-
PAGE 4
Event Log Rule Miner (EL-RM)
PAGE 5
Preparing the Event log
• Prepare the data to align with the process analysts analysis
objectives
Log partition-
time frame
-
-
-
-
-
-
-
-
-
-
PAGE 6
Encoding event log into transaction table
• A transaction table sustains the control-flow perspective and
the change behavior over the data perspective.
• A transaction represents the
behavior of the data attributes
over a pair of events.
Control-flow perspective Atomic perspective Complex perspective
-
-
PAGE 7
Encoding event log into transaction table
-
-
PAGE 8
Encoding event log into transaction table
PAGE 9
Association rule mining
𝐈𝐅 𝑒𝑖. 𝐴𝑐𝑡 = 𝑎 ∧ 𝑒𝑗. 𝐴𝑐𝑡 = 𝑏 𝐓𝐇𝐄𝐍 𝑒𝑖. 𝐴𝑡𝑡𝑟 ≶ 𝑒𝑗. 𝐴𝑡𝑡𝑟
≶: < | > | = | ≠
PAGE 10
Association rule mining
PAGE 11
Analysing the rules
Ranking
Combining
Comparing
PAGE 12
Analysing the rules - Ranking
 We rank the rules using the known measures of association rules.
𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑅 =
|(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡) ⊆ 𝑇 |
|𝑇|
where 𝑇 𝑖𝑠 𝑡ℎ𝑒 𝑡𝑟𝑎𝑛𝑠𝑎𝑐𝑡𝑖𝑜𝑛𝑠
𝑐𝑜𝑛𝑓𝑖𝑑𝑒𝑛𝑐𝑒 𝑅 =
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅)
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡)
𝑙𝑖𝑓𝑡 𝑅 =
𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅)
𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 ∗ 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡)
 In this step, We prepare the rules to align with the analysis objectives.
PAGE 13
Analysing the rules - combining
 EL-RM aggregates the rules based on common antecedent and common
consequent. We propose three possible aggregations.
1. The first option focuses on the control-flow perspective.
2. The second option focuses on the data object perspective.
3. The third option focuses on combine both the perspectives.
PAGE 14
Analysing the rules - combining
PAGE 15
Analysing the rules - compare
• we compare the rules generated from the different partitions to detect
the changes in behaviour over the divisions.
• We induce various sets of rules from the extracted rules by using the set
operations:
 All rules (Union set operation)
 Common rules (intersection set operation)
 Difference rules in a partition against Common rules (difference set operation)
 Partition unique rules (difference set operation)
 We conducted three exploratory experiments on three real datasets.
PAGE 16
Evaluation
 BPIC-2017 contains the events of the loan application
process of a Dutch financial institute. The events are
generated from three sub-processes, i.e., application,
offer and workflow.
 The log contains cases that started at the beginning
of 2016 until the 1st of February 2017.
PAGE 17
Experiment 1 – BPIC2017
Discovered rules = 751
Combine rules = 15
Confidence = [0.94,1]
Lift = [0.95, 13.63]
• R1: IF ei.Act = “OCreate Offer” and
ej.Act = “ OCreated”
THEN ei.EventID = ej.OfferID
• R2: IF ei.Act =”A_Complete” and
ej.Act = “ W_ValideApplication”
THEN ei.Resource = ej.Resource
 We conducted three exploratory experiments on three real datasets.
PAGE 18
Evaluation
 BPIC-2020 (prepaid travel) contains the events of
the prepaid travel request process at Eindhoven
University of Technology (TU/e).
 The log covers the cases from the beginning of
2017 till the 21st of February 2019.
PAGE 19
Experiment 2 – BPIC2020(prepaid travel)
All rules = 425
Common rules = 85
Confidence = [0.99, 1]
Lift = [1, 8.90]
• R1: IF ei.Act =“Permit APPROVED by
ADMINISTRATION” and ej.Act =
“Permit APPROVED by BUDGET
OWNER” THEN ei.Resource =
ej.Resource
• R2: IF ei.Act = “Permit APPROVED by
BUDGET OWNER” and ej.Act = “Permit
FINAL_APPROVED by SUPERVISOR”
THEN ei.org:role != ei.org:role
 We conducted three exploratory experiments on three real datasets.
PAGE 20
Evaluation
 Road traffic fine management process dataset
contains the events of the road traffic fines process.
The cases have a diverse cycle time duration
behavior. [mention duration of shortest and longest]
 The log covers the cases from the beginning of 2000
till the 18th of June 2013
PAGE 21
Experiment 3 – Road traffic fine
All rules = 239
Common rules = 159
Average confidence = 0.96
Average lift = 1.98
• R1: IF ei.Act =“Insert Fine Notification”
and ej.Act = “Insert Date Appeal to
Prefecture” THEN ei.NotifcationType !=
ej. NotifcationType
• R2: IF ei.Act =“Create Fine” and ej.Act =
“payment” THEN ei.NotifcationType =
ej. NotifcationType
 We proposed a multi-perspective mining technique for the discovery of data
connection.
 Our method uses association rules to represent the relation between the control
flow perspective and its impacts on the behavior of the data objects perspective
 The results of our evaluation showed the potential of the approach to extract
relevant insights about the change behavior of the attributes over
the events.
PAGE 22
Conclusion
Dina Bayomie
dbayomie@wu.ac.at
PAGE 23

Contenu connexe

Similaire à Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects

IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET Journal
 
Anuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnupritaBhoyar
 
Using human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsUsing human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsLeonardo ENERGY
 
09 planning techniques
09 planning techniques09 planning techniques
09 planning techniquesAman Palway
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTheAnfieldGroup
 
Lecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveLecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveRiri Ariyanty
 
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAMINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAcscpconf
 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data csandit
 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkSudhendu Rai
 
Three Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementThree Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementMichael Douglas
 
SA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfSA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfManjuAppukuttan2
 
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET Journal
 
Enfos erci webinar 20150224
Enfos erci webinar 20150224Enfos erci webinar 20150224
Enfos erci webinar 20150224Chris Wade
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCEkendahudson
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docxaulasnilda
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docxherminaprocter
 
Case Study: Energy Audit
Case Study: Energy AuditCase Study: Energy Audit
Case Study: Energy AuditIRJET Journal
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesMichael zur Muehlen
 

Similaire à Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects (20)

IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank WebsiteIRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
IRJET- Web Scraping Techniques to Collect Bank Offer Data from Bank Website
 
Anuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPTAnuprita Bhoyar BPM PPT
Anuprita Bhoyar BPM PPT
 
Using human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programsUsing human-centred design to improve energy efficiency programs
Using human-centred design to improve energy efficiency programs
 
09 planning techniques
09 planning techniques09 planning techniques
09 planning techniques
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
Lecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs BehaveLecture 3 Determining How Costs Behave
Lecture 3 Determining How Costs Behave
 
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATAMINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
MINING FUZZY ASSOCIATION RULES FROM WEB USAGE QUANTITATIVE DATA
 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data
 
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel TalkWinter Simulation Conference 2021 - Process Wind Tunnel Talk
Winter Simulation Conference 2021 - Process Wind Tunnel Talk
 
Business process compliance
Business process compliance Business process compliance
Business process compliance
 
Three Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve ManagementThree Critical Financial Controls for Environmental Reserve Management
Three Critical Financial Controls for Environmental Reserve Management
 
SA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdfSA UNIT I STREAMING ANALYTICS.pdf
SA UNIT I STREAMING ANALYTICS.pdf
 
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
IRJET- Analysis of Well Head Pressure Sensor Data for Anomaly Detection in Oi...
 
Enfos erci webinar 20150224
Enfos erci webinar 20150224Enfos erci webinar 20150224
Enfos erci webinar 20150224
 
Energy audit
Energy auditEnergy audit
Energy audit
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
 
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
1Running Head AUDIT EVIDENCE2AUDIT EVIDENCE.docx
 
Case Study: Energy Audit
Case Study: Energy AuditCase Study: Energy Audit
Case Study: Energy Audit
 
Integrating Business Rules and Business Processes
Integrating Business Rules and Business ProcessesIntegrating Business Rules and Business Processes
Integrating Business Rules and Business Processes
 

Dernier

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Dernier (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects

  • 1. Multi-perspective Process Analysis: Mining the Association between Control Flow and Data Objects Dina Bayomie, Kate Revoredo, Jan Mendling
  • 3. PAGE 3 Introduction RQ: What is the relation between control- flow perspective and data objects behavior perspective? We propose a multi-perspective mining technique based on association rule mining to discover the data connections between the control-flow and data objects behavior. - - - -
  • 4. PAGE 4 Event Log Rule Miner (EL-RM)
  • 5. PAGE 5 Preparing the Event log • Prepare the data to align with the process analysts analysis objectives Log partition- time frame - - - - - - - -
  • 6. - - PAGE 6 Encoding event log into transaction table • A transaction table sustains the control-flow perspective and the change behavior over the data perspective. • A transaction represents the behavior of the data attributes over a pair of events. Control-flow perspective Atomic perspective Complex perspective
  • 7. - - PAGE 7 Encoding event log into transaction table
  • 8. - - PAGE 8 Encoding event log into transaction table
  • 9. PAGE 9 Association rule mining 𝐈𝐅 𝑒𝑖. 𝐴𝑐𝑡 = 𝑎 ∧ 𝑒𝑗. 𝐴𝑐𝑡 = 𝑏 𝐓𝐇𝐄𝐍 𝑒𝑖. 𝐴𝑡𝑡𝑟 ≶ 𝑒𝑗. 𝐴𝑡𝑡𝑟 ≶: < | > | = | ≠
  • 11. PAGE 11 Analysing the rules Ranking Combining Comparing
  • 12. PAGE 12 Analysing the rules - Ranking  We rank the rules using the known measures of association rules. 𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑅 = |(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡) ⊆ 𝑇 | |𝑇| where 𝑇 𝑖𝑠 𝑡ℎ𝑒 𝑡𝑟𝑎𝑛𝑠𝑎𝑐𝑡𝑖𝑜𝑛𝑠 𝑐𝑜𝑛𝑓𝑖𝑑𝑒𝑛𝑐𝑒 𝑅 = 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅) 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡) 𝑙𝑖𝑓𝑡 𝑅 = 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑅) 𝑠𝑢𝑝𝑝𝑜𝑟𝑡 𝑎𝑛𝑡𝑒𝑐𝑒𝑑𝑒𝑛𝑡 ∗ 𝑠𝑢𝑝𝑝𝑜𝑟𝑡(𝑐𝑜𝑛𝑠𝑒𝑞𝑢𝑒𝑛𝑡)
  • 13.  In this step, We prepare the rules to align with the analysis objectives. PAGE 13 Analysing the rules - combining
  • 14.  EL-RM aggregates the rules based on common antecedent and common consequent. We propose three possible aggregations. 1. The first option focuses on the control-flow perspective. 2. The second option focuses on the data object perspective. 3. The third option focuses on combine both the perspectives. PAGE 14 Analysing the rules - combining
  • 15. PAGE 15 Analysing the rules - compare • we compare the rules generated from the different partitions to detect the changes in behaviour over the divisions. • We induce various sets of rules from the extracted rules by using the set operations:  All rules (Union set operation)  Common rules (intersection set operation)  Difference rules in a partition against Common rules (difference set operation)  Partition unique rules (difference set operation)
  • 16.  We conducted three exploratory experiments on three real datasets. PAGE 16 Evaluation  BPIC-2017 contains the events of the loan application process of a Dutch financial institute. The events are generated from three sub-processes, i.e., application, offer and workflow.  The log contains cases that started at the beginning of 2016 until the 1st of February 2017.
  • 17. PAGE 17 Experiment 1 – BPIC2017 Discovered rules = 751 Combine rules = 15 Confidence = [0.94,1] Lift = [0.95, 13.63] • R1: IF ei.Act = “OCreate Offer” and ej.Act = “ OCreated” THEN ei.EventID = ej.OfferID • R2: IF ei.Act =”A_Complete” and ej.Act = “ W_ValideApplication” THEN ei.Resource = ej.Resource
  • 18.  We conducted three exploratory experiments on three real datasets. PAGE 18 Evaluation  BPIC-2020 (prepaid travel) contains the events of the prepaid travel request process at Eindhoven University of Technology (TU/e).  The log covers the cases from the beginning of 2017 till the 21st of February 2019.
  • 19. PAGE 19 Experiment 2 – BPIC2020(prepaid travel) All rules = 425 Common rules = 85 Confidence = [0.99, 1] Lift = [1, 8.90] • R1: IF ei.Act =“Permit APPROVED by ADMINISTRATION” and ej.Act = “Permit APPROVED by BUDGET OWNER” THEN ei.Resource = ej.Resource • R2: IF ei.Act = “Permit APPROVED by BUDGET OWNER” and ej.Act = “Permit FINAL_APPROVED by SUPERVISOR” THEN ei.org:role != ei.org:role
  • 20.  We conducted three exploratory experiments on three real datasets. PAGE 20 Evaluation  Road traffic fine management process dataset contains the events of the road traffic fines process. The cases have a diverse cycle time duration behavior. [mention duration of shortest and longest]  The log covers the cases from the beginning of 2000 till the 18th of June 2013
  • 21. PAGE 21 Experiment 3 – Road traffic fine All rules = 239 Common rules = 159 Average confidence = 0.96 Average lift = 1.98 • R1: IF ei.Act =“Insert Fine Notification” and ej.Act = “Insert Date Appeal to Prefecture” THEN ei.NotifcationType != ej. NotifcationType • R2: IF ei.Act =“Create Fine” and ej.Act = “payment” THEN ei.NotifcationType = ej. NotifcationType
  • 22.  We proposed a multi-perspective mining technique for the discovery of data connection.  Our method uses association rules to represent the relation between the control flow perspective and its impacts on the behavior of the data objects perspective  The results of our evaluation showed the potential of the approach to extract relevant insights about the change behavior of the attributes over the events. PAGE 22 Conclusion

Notes de l'éditeur

  1. Classical techniques focus on control-flow perspective.
  2. A key challenge of root cause analysis is to identify as many potential explanations for a process issue as possible
  3. Inspired by knowledge discovery in database process
  4. Put method small and highlight kill more text animate the figures
  5. Remove the final results
  6. Row by row and colors Animation for how we build the transition table define complex attribute explain ei ej transaction building
  7. Row by row and colors Animation for how we build the transition table define complex attribute explain ei ej transaction building
  8. Play with colors
  9. Play with colors 26 rules
  10. ADD THE EQUATION SUPPORT AND CONFIDENCE
  11. ADD THE EQUATION SUPPORT AND CONFIDENCE
  12. The log contains 6872 offer ids
  13. R1 applies for 24% in 2018 but I doesnot apply for cases in 2017
  14. Cases took from 0.5 to 1.5 year to execute
  15. What do you think about the method usefulness? As process analyst would that be useful for you. How would you like to rank the rules ?