Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms
نویسنده
چکیده
Process mining aims at automatically generating process models from event logs. The main idea is to use the discovered models as an objective start point to deploy systems that support the execution of business processes (for instance, workflow management systems) or as a feedback mechanism to check if the prescribed models fit the executed ones. When developing an algorithm to do process mining, one needs some logs to test it. Using real-life logs seems to be the natural choice. However, the real-life event logs usually contain imperfections that can hinder the tuning of the mining algorithm. For instance, real-life logs can be incomplete and/or contain noise. Thus, a more common approach is to first test the accuracy of new process mining algorithms in logs created via simulation. This allows the researcher to have more control about the properties of the event log and to fine tune his/her mining algorithm. Besides, having the original model (the simulated one) may also be a useful aid to assess the quality of the mining algorithm. In our research group, we work with the ProM framework [6] mining tool which receives as input an XML event log. This XML format is also supported by process mining tools of other research groups [4]. This paper shows how to extend CP-nets to generate XML event logs that can be mined by process mining tools supporting this format. This way we benefit from the simulation capabilities of CPN Tools and, therefore, we avoid reinventing the wheel. The extension we made consisted of implementing (i) some ML functions that can be used to annotate the CP-net, and (ii) a ProMimport -framework [2] plug-in that bundles up the files (generated by the CP-net simulation) into a single XML file that is ready to be mined.
منابع مشابه
Mining CPN Models Discovering Process Models with Data from Event Logs
Process-aware information systems typically log events (e.g., in transaction logs or audit trails) related to the actual execution of business processes. Analysis of these execution logs may reveal important knowledge that can help organizations to improve the quality of their services. Starting from a process model, which can be discovered by conventional process mining algorithms, we analyze ...
متن کاملDiscovering simulation models
Process mining is a tool to extract non-trivial and useful information from process execution logs. These so-called event logs (also called audit trails, or transaction logs) are the starting point for various discovery and analysis techniques that help to gain insight into certain characteristics of the process. In this paper we use a combination of process mining techniques to discover multip...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملDiscovering Coordination Patterns using Process Mining
Recently, process mining has become a vivid research area [5, 6]. The basic idea of process mining is to diagnose business processes by mining event logs for knowledge. Process mining techniques and tools provide the means for discovering process, control, data, organizational, and social structures from event logs. In this paper we provide an overview of process mining techniques/tools and the...
متن کاملApplying graph grammars for the generation of process models and their logs
This work is dedicated to one of the most urgent problems in the field of process mining. Process mining is a technique that offers plenty of methods for the discovery and analysis of business processes based on event logs. However, there is a lack of real process models and event logs, which can be used to verify the methods developed to achieve process mining goals. Hence, there is a need in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005