Knowledge (XXG)

Process mining

Source 📝

242:: The first step in process mining. The main goal of process discovery is to transform the event log into a process model. An event log can come from any data storage system that records the activities in an organisation along with the timestamps for those activities. Such an event log is required to contain a case id (a unique identifier to recognise the case to which activity belongs), activity description (a textual description of the activity executed), and timestamp of the activity execution. The result of process discovery is generally a process model which is representative of the event log. Such a process model can be discovered, for example, using techniques such as 150:
state-of-the-art in process mining, promote the use of process mining techniques and tools and stimulate new applications, play a role in standardization efforts for logging event data (e.g., XES), organize tutorials, special sessions, workshops, competitions, panels, and develop material (papers, books, online courses, movies, etc.) to inform and guide people new to the field. The IEEE Task Force on Process Mining established the International Process Mining Conference (ICPM) series, lead the development of the IEEE XES standard for storing and exchanging event data, and wrote the Process Mining Manifesto which was translated into 16 languages.
284:: Helps in comparing an event log with an existing process model to analyse the discrepancies between them. Such a process model can be constructed manually or with the help of a discovery algorithm. For example, a process model may indicate that purchase orders of more than 1 million euros require two checks. Another example is the checking of the so-called "four-eyes" principle. Conformance checking may be used to detect deviations (compliance checking), or evaluate the discovery algorithms, or enrich an existing process model. An example is the extension of a process model with performance data, i.e., some 274:) based on an event log. Recently, process mining research has started targeting other perspectives (e.g., data, resources, time, etc.). One example is the technique described in (Aalst, Reijers, & Song, 2005), which can be used to construct a social network. Nowadays, techniques such as "streaming process mining" are being developed to work with continuous online data that has to be processed on the spot. 804:, Beer, H., & Dongen, B. van (2005). Process Mining and Verification of Properties: An Approach based on Temporal Logic. In R. Meersman & Z. T. et al. (Eds.), On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005 (Vol. 3760, pp. 130–147). Springer-Verlag, Berlin. 321:
to check conformance, but rather to improve the performance of the existing model with respect to certain process performance measures. An example is the extension of a process model with performance data, i.e., some prior process model dynamically annotated with performance data. It is also possible
961:
Grigori, D., Casati, F., Dayal, U., & Shan, M. (2001). Improving Business Process Quality through Exception Understanding, Prediction, and Prevention. In P. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of 27th international conference on Very
977:
zur Muehlen, M., & Rosemann, M. (2000). Workflow-based Process Monitoring and Controlling – Technical and Organizational Issues. In R. Sprague (Ed.), Proceedings of the 33rd Hawaii international conference on system science (HICSS-33) (pp. 1–10). IEEE Computer Society Press, Los Alamitos,
331:
Process mining software helps organizations analyze and visualize their business processes based on data extracted from various sources, such as transaction logs or event data. This software can identify patterns, bottlenecks, and inefficiencies within a process, enabling organizations to improve
149:
was established in October 2009 as part of the IEEE Computational Intelligence Society. This is a vendor-neutral organization aims to promote the research, development, education and understanding of process mining, make end-users, developers, consultants, and researchers aware of the
218:
on process mining. By the year 2018, nearly 30+ commercially available process mining tools were in the picture. The year 2019 earmarked the first process mining conference. Today we have over 35 vendors offering tools and techniques for process discovery and conformance checking.
222:
Process mining should be viewed as a bridge between data science and process science. Process mining focuses on transforming event log into a meaningful representation of the process which can lead to the formation of several data science and machine learning related problems.
141:
problems. After discovering a process model and aligning the event log, it is possible to create basic supervised and unsupervised learning problems. For example, to predict the remaining processing time of a running case or to identify the root causes of compliance problems.
66:
Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of existing documentation is questionable. For example, application of process mining methodology to the audit trails of a
124:
techniques. For example, process discovery techniques in the field of process mining try to discover end-to-end process models that are able to describe sequential, choice relation, concurrent and loop behavior. Conformance checking techniques are closer to
817:(2006a). Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. In C. Bussler et al. (Ed.), BPM 2005 Workshops (Workshop on Business Process Intelligence) (Vol. 3812, pp. 163–176). Springer-Verlag, Berlin. 955:. A Practitioner's Guide to Process Mining: Limitations of the Directly-Follows Graph. In International Conference on Enterprise Information Systems (Centeris 2019), volume 164 of Procedia Computer Science, pages 321-328. Elsevier, 2019. 296:
process model and analyses every choice in the process model. The event log is consulted for each option to see which information is typically available the moment the choice is made. Conformance checking has various techniques such as
1002:
Garcia, Cleiton dos Santos; Meincheim, Alex; et al. (2019). Process mining techniques and applications – A systematic mapping study». Expert Systems with Applications. 133: 260–295. ISSN 0957-4174. doi:10.1016/j.eswa.2019.05.003
34:
that contain case id, a unique identifier for a particular process instance; an activity, a description of the event that is occurring; a timestamp; and sometimes other information such as resources, costs, and so on.
305:" that are used depending on the system needs.Then classical data mining techniques are used to see which data elements influence the choice. As a result, a decision tree is generated for each choice in the process. 190:" for conformance checking purposes. Apart from the mainstream techniques of process discovery and conformance checking, process mining branched out into multiple areas leading to the discovery and development of " 206:", a governing body was formed in the year 2009 that began to overlook the norms and standards related to process mining. Further techniques were developed for conformance checking which led to the publishing of " 985:(2006b). Decision Mining in ProM. In S. Dustdar, J. Faideiro, & A. Sheth (Eds.), International Conference on Business Process Management (BPM 2006) (Vol. 4102, pp. 420–425). Springer-Verlag, Berlin. 949:(2005). The ProM framework: A New Era in Process Mining Tool Support. In G. Ciardo & P. Darondeau (Eds.), Application and Theory of Petri Nets 2005 (Vol. 3536, pp. 444–454). Springer-Verlag, Berlin. 988:
Sayal, M., Casati, F., Dayal, U., & Shan, M. (2002). Business Process Cockpit. In Proceedings of 28th international conference on very large data bases (VLDB’02) (pp. 880–883). Morgan Kaufmann.
968:
Ingvaldsen, J.E., & J.A. Gulla. (2006). Model Based Business Process Mining. Journal of Information Systems Management, Vol. 23, No. 1, Special Issue on Business Intelligence, Auerbach Publications
569:
Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine, IEEE, 32(4), 14-16.
942:
Jans, M., van der Werf, J.M., Lybaert, N., Vanhoof, K. (2011) A business process mining application for internal transaction fraud mitigation, Expert Systems with Applications, 38 (10), 13351–13359
85:
model(s) to understand whether the observations conform to a prescriptive or descriptive model. It is required that the event logs data be linked to a case ID, activities, and timestamps.
992: 933:, Dongen, B. van, Herbst, J., Maruster, L., Schimm, G., & Weijters, A. (2003). Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering, 47 (2), 237–267. 971:
Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven Business Process Management in Healthcare Settings . Technology and Society Magazine, IEEE, 32(4), 14-16.
761:
Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining Process Models from Workflow Logs. In Sixth international conference on extending database technology (pp. 469–483).
752:, Weijters, A., & Maruster, L. (2004). Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering, 16 (9), 1128–1142. 770:
Cook, J., & Wolf, A. (1998). Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology, 7 (3), 215–249.
997:
Ross-Talbot S, The importance and potential of descriptions to our industry. Keynote at The 10th International Federated Conference on Distributed Computing Techniques
779:
Datta, A. (1998). Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches. Information Systems Research, 9 (3), 275–301.
863: 974:
zur Muehlen, M. (2004). Workflow-based Process Controlling: Foundation, Design and Application of workflow-driven Process Information Systems. Logos, Berlin.
958:
Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., & Shan, M. (2004). Business Process Intelligence. Computers in Industry, 53 (3), 321–343.
372:
also provided a list of products of best process mining tools for 2024 and released the updated 2024 Gartner® Magic Quadrant™ for Process Mining Platforms:
317:
model. The model is extended with additional performance information such as processing times, cycle times, waiting times, costs, etc., so that the goal is
590: 579: 1008:
van der Aalst, W.M.P. and Berti A. Discovering Object-Centric Petri Nets. Fundamenta Informaticae, 175(1-4):1-40, 2020. doi:10.3233/FI-2020-1946
202:" in the year 2005 and 2006 respectively. In the year 2007, the first-ever commercial process mining company "Futura Pi" was established. The " 965:
IDS Scheer. (2002). ARIS Process Performance Manager (ARIS PPM): Measure, Analyze and Optimize Your Business Process Performance (whitepaper).
991:
Huser V, Starren JB, EHR Data Pre-processing Facilitating Process Mining: an Application to Chronic Kidney Disease. AMIA Annu Symp Proc 2009
924: 910: 905:
Carmona, J., van Dongen, B.F., Solti, A., Weidlich, M. (2018). Conformance Checking: Relating Processes and Models. Springer Verlag, Berlin (
899: 888: 672: 79:
in a hospital can result in models describing processes of organizations. Event log analysis can also be used to compare event logs with
939:, Reijers, H., & Song, M. (2005). Discovering Social Networks from Event Logs. Computer Supported Cooperative work, 14 (6), 549–593. 259: 247: 175: 792:(2003). Rediscovering Workflow Models from Event-Based Data using Little Thumb. Integrated Computer-Aided Engineering, 10 (2), 151–162. 163: 162:. Thus began a new field of research that emerged under the umbrella of techniques related to data science and process science at the 22:
is a family of techniques used to analyze event data in order to understand and improve operational processes. Part of the fields of
551: 302: 93: 191: 591:
Symeon Christodoulou, Raimar Scherer (2016). eWork and eBusiness in Architecture, Engineering and Construction: ECPPM 2016
97: 322:
to extend process models with additional information such as decision rules and organisational information (e.g., roles).
146: 89: 72: 568: 411: 101: 27: 828: 416: 271: 237: 105: 68: 919:(2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Verlag, Berlin ( 580:
Luis M. Camarinha-Matos, Frederick Benaben, Willy Picard (2015). Risks and Resilience of Collaborative Networks
538: 521: 76: 894:
Reinkemeyer, L. (2020). Process Mining in Action: Principles, Use Cases and Outlook. Springer Verlag, Berlin (
656:
IEEE Standard for eXtensible Event Stream (XES) for Achieving Interoperability in Event Logs and Event Streams
195: 1058: 138: 121: 199: 1004: 335:
In March 2023 The Analytics Insight Magazine identified top 5 process mining software companies for 2023:
158:
The term "process mining" was first coined in a research proposal written by the Dutch computer scientist
1023:
is the annual international process mining conference organized by the IEEE Task Force on Process Mining.
166:
in 1999. In the early days, process mining techniques were often convoluted with the techniques used for
210:" in the year 2010. In 2011, the first-ever process mining book was published. Further along in 2014, a 1009: 421: 279: 183: 1042: 167: 31: 456: 298: 187: 178:" was introduced in the research papers. Further along the link more powerful algorithms such as 174:
was developed. The very next year, in 2001, a much similar algorithm based on heuristics called "
254:. Many established techniques exist for automatically constructing process models (for example, 207: 982: 952: 946: 936: 930: 920: 916: 906: 895: 884: 880: 849: 814: 801: 789: 749: 668: 501: 481: 393: 159: 81: 660: 461: 451: 431: 263: 170:. In the year 2000, the very first practically applicable algorithm for process discovery, " 130: 113: 441: 251: 243: 179: 171: 129:
than to traditional learning approaches. However, process mining can be used to generate
182:
were developed for process discovery. As the field of process mining began to evolve,
1052: 267: 332:
their operational efficiency, reduce costs, and enhance their customer experience.
998: 436: 288:
process model is used to project the potential bottlenecks. Another example is the
126: 23: 100:) illustrate the interest in supporting diagnosis functionality in the context of 664: 505: 485: 446: 356: 134: 117: 654: 721: 255: 186:
became an integral part of it. The year 2004 earmarked the development of "
883:(2016). Process Mining: Data Science in Action. Springer Verlag, Berlin ( 426: 215: 376: 369: 339: 864:"Key Takeaways: 2024 Gartner Magic Quadrant for Process Mining Tools" 387: 344: 1032: 362: 112:
information systems). Process mining is different from mainstream
211: 1026: 962:
Large Data Bases (VLDB’01) (pp. 159–168). Morgan Kaufmann.
945:
Dongen, B. van, Medeiros, A., Verbeek, H., Weijters, A., &
1038: 381: 350: 1020: 628: 695: 38:
There are three main classes of process mining techniques:
292:
described in (Rozinat & Aalst, 2006b), which takes an
602: 231:
There are three categories of process mining techniques.
203: 1029:
at Eindhoven University of Technology, the Netherlands.
629:"International Process Mining Conference (ICPM) series" 702:. IEEE Task Force on Process Mining. 11 November 2016 552:"Gartner Top 10 Strategic Technology Trends for 2020" 829:"Top 5 Process Mining Software Companies for 2023" 607:Home page of the task force on process mining 522:"Automated Business Process Discovery (ABPD)" 8: 88:Contemporary management trends such as BAM ( 728:. IEEE Task Force on Process Mining. 2011 850:"Best Process Mining Tools Reviews 2024" 745: 743: 1021:International Process Mining Conference 633:Home page of the ICPM conference series 473: 30:, process mining is generally built on 507:Process Mining: Data Science in Action 487:Process Mining: Data Science in Action 16:Data mining technique using event logs 7: 208:Alignment-based conformance checking 635:. IEEE Task Force on Process Mining 609:. IEEE Task Force on Process Mining 603:"IEEE Task Force on Process Mining" 56:utomated business process discovery 246:(a didactically driven approach), 14: 154:History and place in data science 696:"eXtensible Event Stream (XES)" 303:streaming conformance checking 94:business operations management 1: 1035:at Ghent University, Belgium. 700:eXtensible Event Stream (XES) 353:Signavio Process Intelligence 98:business process intelligence 71:, the transaction logs of an 665:10.1109/IEEESTD.2016.7740858 390:Business Automation Platform 147:Task Force on Process Mining 90:business activity monitoring 73:enterprise resource planning 412:Business Process Management 106:workflow management systems 102:business process management 1075: 722:"Process Mining Manifesto" 659:. ieee. 11 November 2016. 77:electronic patient records 69:workflow management system 50:. In the past, terms like 726:Process Mining Manifesto 313:: Used when there is an 1039:Process mining research 1033:Process mining research 1027:Process mining research 831:. The Analytics Insight 327:Process mining software 139:artificial intelligence 122:artificial intelligence 827:Zaveria (2023-03-26). 214:course was offered by 204:IEEE task force on PM 200:organizational mining 788:Weijters, A., & 528:. Gartner, Inc. 2015 422:Conformance Checking 310:Performance analysis 280:Conformance checking 192:performance analysis 184:conformance checking 164:Eindhoven University 44:conformance checking 1043:University of Padua 981:Rozinat, A., & 813:Rozinat, A., & 427:Workflow Management 359:ARIS Process Mining 168:workflow management 48:process enhancement 539:Gartner Definition 502:van der Aalst, Wil 482:van der Aalst, Wil 457:Data visualization 299:token-based replay 188:Token-based replay 104:technology (e.g., 58:(ABPD) were used. 28:process management 983:Aalst, W. van der 953:Aalst, W. van der 947:Aalst, W. van der 937:Aalst, W. van der 931:Aalst, W. van der 925:978-3-642-19344-6 917:Aalst, W. van der 911:978-3-319-99413-0 900:978-3-030-40171-9 889:978-3-662-49850-7 881:Aalst, W. van der 815:Aalst, W. van der 802:Aalst, W. van der 790:Aalst, W. van der 750:Aalst, W. van der 674:978-1-5044-2421-9 417:Process Discovery 264:activity diagrams 238:Process discovery 160:Wil van der Aalst 40:process discovery 1066: 868: 867: 860: 854: 853: 846: 840: 839: 837: 836: 824: 818: 811: 805: 799: 793: 786: 780: 777: 771: 768: 762: 759: 753: 747: 738: 737: 735: 733: 718: 712: 711: 709: 707: 692: 686: 685: 683: 681: 651: 645: 644: 642: 640: 625: 619: 618: 616: 614: 599: 593: 588: 582: 577: 571: 566: 560: 559: 548: 542: 537: 535: 533: 518: 512: 511: 498: 492: 491: 478: 462:Process analysis 452:Intention mining 432:Machine Learning 131:machine learning 114:machine learning 1074: 1073: 1069: 1068: 1067: 1065: 1064: 1063: 1049: 1048: 1017: 877: 875:Further reading 872: 871: 862: 861: 857: 848: 847: 843: 834: 832: 826: 825: 821: 812: 808: 800: 796: 787: 783: 778: 774: 769: 765: 760: 756: 748: 741: 731: 729: 720: 719: 715: 705: 703: 694: 693: 689: 679: 677: 675: 653: 652: 648: 638: 636: 627: 626: 622: 612: 610: 601: 600: 596: 589: 585: 578: 574: 567: 563: 550: 549: 545: 531: 529: 520: 519: 515: 500: 499: 495: 480: 479: 475: 470: 442:Sequence mining 408: 329: 252:inductive miner 248:heuristic miner 244:alpha algorithm 229: 196:decision mining 180:inductive miner 176:Heuristic miner 156: 75:system, or the 64: 52:workflow mining 17: 12: 11: 5: 1072: 1070: 1062: 1061: 1059:Process mining 1051: 1050: 1047: 1046: 1036: 1030: 1024: 1016: 1015:External links 1013: 1012: 1011: 1006: 1000: 995: 989: 986: 979: 975: 972: 969: 966: 963: 959: 956: 950: 943: 940: 934: 928: 914: 903: 892: 876: 873: 870: 869: 866:. 13 May 2024. 855: 841: 819: 806: 794: 781: 772: 763: 754: 739: 713: 687: 673: 646: 620: 594: 583: 572: 561: 543: 513: 493: 472: 471: 469: 466: 465: 464: 459: 454: 449: 444: 439: 434: 429: 424: 419: 414: 407: 404: 403: 402: 399: 398:Scout Platform 396: 391: 385: 384:Process Mining 379: 367: 366: 360: 354: 348: 347:Process Mining 342: 328: 325: 324: 323: 306: 290:decision miner 275: 268:State diagrams 228: 225: 155: 152: 63: 60: 20:Process mining 15: 13: 10: 9: 6: 4: 3: 2: 1071: 1060: 1057: 1056: 1054: 1044: 1040: 1037: 1034: 1031: 1028: 1025: 1022: 1019: 1018: 1014: 1010: 1007: 1005: 1001: 999: 996: 994: 990: 987: 984: 980: 976: 973: 970: 967: 964: 960: 957: 954: 951: 948: 944: 941: 938: 935: 932: 929: 926: 922: 918: 915: 912: 908: 904: 901: 897: 893: 890: 886: 882: 879: 878: 874: 865: 859: 856: 851: 845: 842: 830: 823: 820: 816: 810: 807: 803: 798: 795: 791: 785: 782: 776: 773: 767: 764: 758: 755: 751: 746: 744: 740: 727: 723: 717: 714: 701: 697: 691: 688: 676: 670: 666: 662: 658: 657: 650: 647: 634: 630: 624: 621: 608: 604: 598: 595: 592: 587: 584: 581: 576: 573: 570: 565: 562: 557: 553: 547: 544: 540: 527: 523: 517: 514: 509: 508: 503: 497: 494: 489: 488: 483: 477: 474: 467: 463: 460: 458: 455: 453: 450: 448: 445: 443: 440: 438: 435: 433: 430: 428: 425: 423: 420: 418: 415: 413: 410: 409: 405: 400: 397: 395: 392: 389: 386: 383: 380: 378: 375: 374: 373: 371: 364: 361: 358: 355: 352: 349: 346: 343: 341: 338: 337: 336: 333: 326: 320: 316: 312: 311: 307: 304: 300: 295: 291: 287: 283: 282: 281: 276: 273: 269: 265: 261: 260:BPMN diagrams 257: 253: 249: 245: 241: 240: 239: 234: 233: 232: 226: 224: 220: 217: 213: 209: 205: 201: 197: 193: 189: 185: 181: 177: 173: 169: 165: 161: 153: 151: 148: 143: 140: 136: 132: 128: 123: 119: 115: 111: 110:process-aware 107: 103: 99: 95: 91: 86: 84: 83: 78: 74: 70: 61: 59: 57: 53: 49: 45: 41: 36: 33: 29: 25: 21: 858: 844: 833:. Retrieved 822: 809: 797: 784: 775: 766: 757: 730:. Retrieved 725: 716: 704:. Retrieved 699: 690: 678:. Retrieved 655: 649: 637:. Retrieved 632: 623: 611:. Retrieved 606: 597: 586: 575: 564: 555: 546: 530:. Retrieved 525: 516: 506: 496: 486: 476: 437:Data Science 368: 334: 330: 318: 314: 309: 308: 293: 289: 285: 278: 277: 236: 235: 230: 221: 172:Alpha miner" 157: 144: 127:optimization 109: 96:), and BPI ( 87: 80: 65: 55: 51: 47: 43: 39: 37: 24:data science 19: 18: 978:California. 526:Gartner.com 447:Data mining 357:Software AG 135:data mining 118:data mining 852:. Gartner. 835:2023-05-05 732:10 January 706:10 January 680:10 January 639:10 January 613:10 January 468:References 256:Petri nets 227:Categories 108:and other 532:6 January 145:The IEEE 1053:Category 1045:, Italy. 504:(2011). 484:(2016). 406:See also 394:Apromore 365:Timeline 315:a priori 294:a priori 286:a priori 216:Coursera 92:), BOM ( 62:Overview 556:Gartner 377:Celonis 370:Gartner 340:Celonis 198:" and " 923:  909:  898:  887:  671:  388:UiPath 345:UiPath 270:, and 137:, and 120:, and 46:, and 363:ABBYY 250:, or 82:prior 54:and a 993:link 921:ISBN 907:ISBN 896:ISBN 885:ISBN 734:2021 708:2021 682:2021 669:ISBN 641:2021 615:2021 534:2015 401:ARIS 301:", " 272:EPCs 212:MOOC 194:", " 32:logs 26:and 1041:at 661:doi 382:IBM 351:SAP 319:not 1055:: 927:). 913:). 902:). 891:). 742:^ 724:. 698:. 667:. 631:. 605:. 554:. 524:. 266:, 262:, 258:, 133:, 116:, 42:, 838:. 736:. 710:. 684:. 663:: 643:. 617:. 558:. 541:. 536:. 510:. 490:. 297:"

Index

data science
process management
logs
workflow management system
enterprise resource planning
electronic patient records
prior
business activity monitoring
business operations management
business process intelligence
business process management
workflow management systems
machine learning
data mining
artificial intelligence
optimization
machine learning
data mining
artificial intelligence
Task Force on Process Mining
Wil van der Aalst
Eindhoven University
workflow management
Alpha miner"
Heuristic miner
inductive miner
conformance checking
Token-based replay
performance analysis
decision mining

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.