Business process measurement - data mining. enn@cc.ttu.ee

Size: px
Start display at page:

Download "Business process measurement - data mining. enn@cc.ttu.ee"

Transcription

1 Business process measurement - data mining. enn@cc.ttu.ee

2 Business process measurement Balanced scorecard Process mining - ProM

3 Äriprotsessi konteksti perspektiiv

4

5 Clear & measurable goals Effective solutions Measurable results Goal-oriented development of organization s IS

6 Financial OCE Customer Customer oyalty On-time Delivery Business Process Process Quality Process Cycle Time earning and Growth Employees Systems

7 Mission and vision of organization Strategic goals Main tasks Customer perspective : goals and measures Financial perspective : goals and measures Process perspective :goals and measures earning and growth perspective : goals and measures

8

9

10

11

12 Example Balanced Scorecard: egional irline Mission: Dedication to the highest quality of Customer Service delivered with a sense of warmth, friendliness, individual pride, and Company Spirit. Vision: Continue building on our unique position -- the only short haul, low-fare, high-frequency, point-to-point carrier in merica.

13

14 Chapter 17 Process Mining and Simulation Moe ynn nne ozinat il van der alst rthur ter Hofstede Colin Fidge a university 2009,

15 Overview Introduction Preliminaries Process mining (with ProM) Process simulation for operational decision support Tools:, ProM & CPN Tools Conclusions 15

16 Introduction Correctness, effectiveness and efficiency of business processes are vital to an organization Significant gap between what is prescribed and what actually happens Process owners have limited info about what is actually happening Model-based (static) analysis Validation Verification (correctness of a model) Performance analysis Process Mining post-execution analysis Process Simulation what-if analysis 16

17 Preliminaries 17

18 Preliminaries: Data ogging Keeping track of execution data ctivities that have been carried out Timestamps (Start and end times of activities) esources involved Data Purposes udit trails Disaster recovery Monitoring Data Mining Process Mining Process Simulation 18

19 Preliminaries: Process Mining Event logs (recorded actual behaviors) Covers a wide-range of techniques Provide insights into control flow dependencies data usage resource involvement performance related statistics etc. Identify problems that cannot be identified by inspecting a static model alone 19

20 Preliminaries: Process Simulation Develop a simulation model at design time Carry out experiments under different assumptions Used for process reengineering decisions Data input is time-consuming and error-prone equires careful interpretation bstraction of the actual behavior Different assumptions made Inaccurate or Incomplete data input Starts from an empty initial state 20

21 More on Process Mining 21

22 Process Mining Process discovery: "hat is ly happening?" Conformance checking: "Do we do what was agreed upon?" Performance analysis: "here are the bottlenecks?" Process prediction: "ill this case be late?" Process improvement: "How to redesign this process?" Etc. 22

23 Example: mining student data Process discovery: "hat is the curriculum?" Conformance checking: "Do students meet the prerequisites?" Performance analysis: "here are the bottlenecks?" Process prediction: "ill a student complete his studies (in time)?" Process improvement: "How to redesign the curriculum?" 23

24 Process mining: inking events to models business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes software system records events, e.g., messages, transactions, etc. process/ system model discovery conformance event logs 24

25 here to start? process control diagnosis process mining process enactment process design implementation/ configuration 25

26 Process Mining with ProM 26

27 ProM framework One of the leading approaches to Process Mining Covers a wide range of analysis approaches 250+ plug-ins Process Discovery Social Network Conformance Checking Conversion capabilities between different formalisms Petri nets, EPCs, BPMN, BPE, Mining XM (MXM) log format 27

28 Basic Performance nalysis 28

29 esource nalysis 29

30 T Checker 30

31 Performance analysis showing bottlenecks flow time from to B bottlenecks throughput time 31

32 Dotted chart analysis short cases time (relative) events case s long cases 32

33 ProM and logs workflow events and data attributes n extractor function available as a ProMImport plug-in ProM can analyze logs in MXM format Prom can transform models into Petri nets <Process id="payment_subprocess.ywl"> <ProcessInstance id="3f9dfc e7-b9f7-329b5c6f0ded"> <udittrailentry> <orkflowmodelelement>check_prepaid_shipments_10</orkflowmodelelement> <EventType>start</EventType> <Timestamp> T10:11: :00</Timestamp> <Originator>JohnsI</Originator> </udittrailentry> <udittrailentry> <Data><ttribute name="prepaidshipment">true</ttribute></data> <orkflowmodelelement>check_prepaid_shipments_10</orkflowmodelelement> <EventType>complete</EventType> <Timestamp> T10:11: :00</Timestamp> <Originator>JohnsI</Originator> </udittrailentry> </ProcessInstance> </Process> 33

34 Starting point: event logs logs or other event logs, audit trails, databases, message logs, etc. unified event log (MXM) 34

35 Process Simulation 35

36 Integrated Simulation pproach 36

37 inking process mining to simulation Gather process statistics using process mining techniques Calibrate simulation experiments with this data nalyze simulation logs in the same way as execution logs 37

38 Data sources for process characteristics Design (orkflow and Organizational Models) Control and data flow Organizational model Initial data values ole assignments Historical (Event logs) Data value range distributions Execution time distributions Case arrival rate esource availability patterns State (orkflow system) Progress state Data values for running cases Busy resources un time for cases 38

39 Tools:, ProM and CPN Tools 39

40 rchitecture II Create and execute process models Maintain organizational models Extractor functionalities for event logs, organizational models and current state of the workflow system ProM Translate and integrate all the components into a Petri nets model nalyze event logs and simulation logs CPN Tools un simulation experiments Incorporate current state of workflows Generate simulation logs 40

41 Tool: rchitecture 41

42 42

43 Tool: rchitecture Use existing models 43

44 Tool: rchitecture II Use existing models Derive parameters 44

45 Tool: rchitecture III Use existing models Derive parameters Consider current state 45

46 Tool: rchitecture IV Use existing models Derive parameters Consider current state Simulation logs in MXM 46

47 Simulation: Example Payment Start s: Supply dmin Officer payment shipment payment freight Issue Shipment Invoice s: Supply dmin Officer [else] Check Pre-paid shipments c: Finance Officer [pre-paid shipments] Check Invoice equirement s: Supply dmin Officer [Invoice required] Issue Shipment Payment Order c: Finance Officer Issue Shipment emittance dvice c: Finance Officer Produce Freight Invoice Update Shipment Payment Order c: Finance Officer pprove Shipment Payment Order c: Senior Finance Officer Complete Invoice equirement s: Supply dmin Officer s: Supply dmin Officer [s. order not approved] [s. order approved] customer notified of the payment, customer makes the payment Process Shipment Payment o: ccount Manager Process Freight Payment s: Supply dmin Officer [payment incorrect due to underpayment] [payment incorrect due to overcharge] [payment correct] issue Debit djustment o: ccount Manager Issue Credit djustment o: ccount Manager customer makes the payment account settled Finalise o: ccount Manager End s: Supply dmin Officer 47

48 Simulation: Example 13 staff members 5 `supply admin officers 3 `finance officers' 2 `senior finance officers' 3 `account managers Case arrival rate: 50 payments per week Throughput time: 5 working days on average 30% of shipments are pre-paid 50% of orders are approved first-time 20% of payments are underpaid 10% of payments are overpaid 70% of payments are correct 80% of orders require invoices 20% of orders do not require invoices ssumption: Payment process running in for some time. 48

49 Simulation: Scenario 4 weeks till the end of financial year backlog of 30 payments (some for more than a week) Goal: ll payments to be processed in 4 weeks time un simulation experiments to see if the backlog can be cleared using current resources evaluate the effect of avoiding underpayments Possible remedial action: llocate more resources 49

50 ProM screenshots 50

51 CPN Tools 51

52 Four Scenarios 1. n empty initial state ( empty ) 2. fter loading the current state file with the 30 applications currently in the system ( as is ) 3. fter loading the current state file but adding 13 extra resources ( to be ) 4. fter loading the current state file but changing the model so that underpayments are no longer possible ( to be B') 52

53 Evaluation 53

54 Simulation for operational decision support Combine the process execution log (`up to now') and the simulation log (which simulates the future `from now on') ook at the process execution in a unified manner Track both the history and the future of current cases 54

55 lpha algorithm α

56 Process log Minimal information in log: case id s and task id s. dditional information: event type, time, resources, and data. In this log there are three possible sequences: BCD case 1 : task case 2 : task case 3 : task case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D

57 >,,,# relations Direct succession: x>y iff for some case x is directly followed by y. Causality: x y iff x>y and not y>x. Parallel: x y iff x>y and y>x Choice: x#y iff not x>y and not y>x. case 1 : task case 2 : task case 3 : task case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D >B >C B>C B>D C>B C> D E>F B C B D C D E F B C C B

58 Basic idea (1) x y x y

59 Basic idea (2) y x z x y, x z, and y z

60 Basic idea (3) y x z x y, x z, and y#z

61 Basic idea (4) x z y x z, y z, and x y

62 Basic idea (5) x z y x z, y z, and x#y

63 It is not that simple: Basic alpha algorithm et be a workflow log over T. a() is defined as follows. 1. T = { t T $ s t s}, 2. T I = { t T $ s t = first(s) }, 3. T O = { t T $ s t = last(s) }, 4. X = { (,B) T B T " a " b B a b " a1,a2 a 1 # a 2 " b1,b2 B b 1 # b 2 }, 5. = { (,B) X " (,B ) X B B (,B) = (,B ) }, 6. P = { p (,B) (,B) } {i,o }, 7. F = { (a,p (,B) ) (,B) a } { (p (,B),b) (,B) b B } { (i,t) t T I } { (t,o ) t T O }, and 8. a() = (P,T,F ). The alpha algorithm has been proven to be correct for a large class of free-choice nets.

64 Example case 1 : task case 2 : task case 3 : task case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D E B C F D a()

65 DEMO lpha algorithm B get review 1 get review X C M time-out 1 D time-out X K invite additional reviewer get review 2 G H I invite reviewers E time-out 2 collect reviews decide accept J 48 cases 16 performers F get review 3 G time-out 3 reject

66 ogging system Nlog Nog can process diagnostic messages emitted from any.net language (such as C# or Visual Basic), augment them with contextual information (such as date/time, severity, thread, process, environment enviroment), format them according to your preference and send them to one or more targets such as file or database.

67 Supported targets Files - single file or multiple, with automatic file naming and archival Event og - local or remote Database - store your logs in databases supported by.net Network - using TCP, UDP, SOP, MSMQ protocols Command-line console - including color coding of messages - you can receive s whenever application errors occur SP.NET trace... and many more

68 Conclusions Introduction Concise assessment of ity needed for processes Preliminaries Data logging, Process Mining, Process Simulation Process mining with ProM Understanding process characteristics Process simulation Operational decision support Utilizing log info for simulation experiments Tools:, ProM & CPN Tools Payment example Conclusion 68

Workflow Simulation for Operational Decision Support

Workflow Simulation for Operational Decision Support Workflow Simulation for Operational Decision Support A. Rozinat 1, M. T. Wynn 2, W. M. P. van der Aalst 1,2, A. H. M. ter Hofstede 2, and C. J. Fidge 2 1 Information Systems Group, Eindhoven University

More information

Business Process Management

Business Process Management Business Process Management Elective in Software and Services Massimiliano de eoni DIS SPIENZ, Università di oma deleoni@dis.uniroma1.it www.dis.uniroma1.it/~deleoni a university 2009, www.yawlfoundation.org

More information

Using Process Mining to Bridge the Gap between BI and BPM

Using Process Mining to Bridge the Gap between BI and BPM Using Process Mining to Bridge the Gap between BI and BPM Wil van der alst Eindhoven University of Technology, The Netherlands Process mining techniques enable process-centric analytics through automated

More information

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT. Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2

More information

Model Discovery from Motor Claim Process Using Process Mining Technique

Model Discovery from Motor Claim Process Using Process Mining Technique International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,

More information

Data Science. Research Theme: Process Mining

Data Science. Research Theme: Process Mining Data Science Research Theme: Process Mining Process mining is a relatively young research discipline that sits between computational intelligence and data mining on the one hand and process modeling and

More information

Business Process Management with YAWL and its Support Environment

Business Process Management with YAWL and its Support Environment Business Process Management with and its Support Environment lessandro usso arusso@dis.uniroma1.it based on the slides available online at http://www.yawlfoundation.org/yawlbook/downloads.html http://fundamentals-of-bpm.org/supplementary-material/lectures/

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

ProM Framework Tutorial

ProM Framework Tutorial ProM Framework Tutorial Authors: Ana Karla Alves de Medeiros (a.k.medeiros@.tue.nl) A.J.M.M. (Ton) Weijters (a.j.m.m.weijters@tue.nl) Technische Universiteit Eindhoven Eindhoven, The Netherlands February

More information

Business Process Modeling

Business Process Modeling Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process

More information

Dotted Chart and Control-Flow Analysis for a Loan Application Process

Dotted Chart and Control-Flow Analysis for a Loan Application Process Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,

More information

Mining Process Models with Non-Free-Choice Constructs

Mining Process Models with Non-Free-Choice Constructs Mining Process Models with Non-Free-hoice onstructs Lijie Wen 1, Wil M.P. van der alst 2, Jianmin Wang 1, and Jiaguang Sun 1 1 School of Software, Tsinghua University, 100084, eijing, hina wenlj00@mails.tsinghua.edu.cn,{jimwang,sunjg}@tsinghua.edu.cn

More information

Process Mining Data Science in Action

Process Mining Data Science in Action Process Mining Data Science in Action Wil van der Aalst Scientific director of the DSC/e Dutch Data Science Summit, Eindhoven, 4-5-2014. Process Mining Data Science in Action https://www.coursera.org/course/procmin

More information

Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach

Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Santiago Aguirre, Carlos Parra, and Jorge Alvarado Industrial Engineering Department, Pontificia

More information

A Software Framework for Risk-Aware Business Process Management

A Software Framework for Risk-Aware Business Process Management A Software Framework for Risk-Aware Business Management Raffaele Conforti 1, Marcello La Rosa 1,2, Arthur H.M. ter Hofstede 1,4, Giancarlo Fortino 3, Massimiliano de Leoni 4, Wil M.P. van der Aalst 4,1,

More information

Chapter 12 Analyzing Spaghetti Processes

Chapter 12 Analyzing Spaghetti Processes Chapter 12 Analyzing Spaghetti Processes prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data

More information

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining or Data Analysis and Knowledge Discovery a.k.a. Data Mining II An insider s view Geoff Holmes: WEKA founder Process Mining

More information

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Feature. Applications of Business Process Analytics and Mining for Internal Control. World Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan

More information

Supporting the BPM lifecycle with FileNet

Supporting the BPM lifecycle with FileNet Supporting the BPM lifecycle with FileNet Mariska Netjes Hajo A. Reijers Wil. M.P. van der Aalst Outline Introduction Evaluation approach Evaluation of FileNet Conclusions Business Process Management Supporting

More information

Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1

Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer

More information

Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical University, INDIA. Dept. of Computer Science, Rashtriya Sanskrit Vidyapeetha, INDIA

Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical University, INDIA. Dept. of Computer Science, Rashtriya Sanskrit Vidyapeetha, INDIA ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) Analysis of Workflow and Process Mining in Dyeing Processing System 1 Saravanan. M.S, 2 Dr Rama Sree.R.J 1 Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical

More information

Process Mining: Making Knowledge Discovery Process Centric

Process Mining: Making Knowledge Discovery Process Centric Process Mining: Making Knowledge Discovery Process Centric Wil van der alst Department of Mathematics and Computer Science Eindhoven University of Technology PO Box 513, 5600 MB, Eindhoven, The Netherlands

More information

Data Science Betere processen en producten dankzij (Big) data. Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org

Data Science Betere processen en producten dankzij (Big) data. Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org Data Science Betere processen en producten dankzij (Big) data Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org Data Science Center Eindhoven http://www.tue.nl/dsce/ DSC/e: Competences

More information

Business Process Modeling Information Systems in Industry (372-1-4207 )

Business Process Modeling Information Systems in Industry (372-1-4207 ) Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline

More information

Decision Mining in Business Processes

Decision Mining in Business Processes Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl

More information

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy

More information

Summary and Outlook. Business Process Intelligence Course Lecture 8. prof.dr.ir. Wil van der Aalst. www.processmining.org

Summary and Outlook. Business Process Intelligence Course Lecture 8. prof.dr.ir. Wil van der Aalst. www.processmining.org Business Process Intelligence Course Lecture 8 Summary and Outlook prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and

More information

Overview of EAM Services. A Fully Integrated Global EAM Service Provider

Overview of EAM Services. A Fully Integrated Global EAM Service Provider A Fully Integrated Global EAM Service Provider Table of Contents Strategy & Process Services Overview... p. 3 Asset Reliability Services Overview... p. 4 Systems & Technology Services Overview... p. 7

More information

Eventifier: Extracting Process Execution Logs from Operational Databases

Eventifier: Extracting Process Execution Logs from Operational Databases Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,

More information

Process simulation. Enn Õunapuu enn.ounapuu@ttu.ee

Process simulation. Enn Õunapuu enn.ounapuu@ttu.ee Process simulation Enn Õunapuu enn.ounapuu@ttu.ee Content Problem How? Example Simulation Definition Modeling and simulation functionality allows for preexecution what-if modeling and simulation. Postexecution

More information

Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms

Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms Mining: Using CPN Tools to Create Test Logs for Mining Algorithms Ana Karla Alves de Medeiros and Christian W. Günther 2 Outline Introduction Mining The need for synthetic logs MXML format Using the Logging

More information

Process Mining Tools: A Comparative Analysis

Process Mining Tools: A Comparative Analysis EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Process Mining Tools: A Comparative Analysis Irina-Maria Ailenei in partial fulfillment of the requirements for the degree

More information

Analysis of Service Level Agreements using Process Mining techniques

Analysis of Service Level Agreements using Process Mining techniques Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from

More information

Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions

Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven

More information

ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010

ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010 ProM 6 Exercises J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl August 2010 The exercises provided in this section are meant to become more familiar with ProM

More information

The Infrastructure Audit Trail and Part 11

The Infrastructure Audit Trail and Part 11 The Infrastructure Audit Trail and Part 11 Pamela Campbell Senior Consultant, Validation DataCeutics, Inc. campbelp@dataceutics.com February 28, 2003 DataCeutics, Inc. 2003 Why am I Qualified to Make this

More information

Process Mining and Network Analysis

Process Mining and Network Analysis Towards Comprehensive Support for Organizational Mining Minseok Song and Wil M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song, w.m.p.v.d.aalst}@tue.nl

More information

Examination SUBJECT. Version:

Examination SUBJECT. Version: SUBJET Version: 1 Which of the following statements best describes Business nalysis? Business nalysis provides the reasoning for initiating a project. Business nalysis is the strategic part of the project

More information

Introduction to Workflow

Introduction to Workflow Introduction to Workflow SISTEMI INFORMATICI SUPPORTO ALLE DECISIONI AA 2006-2007 Libro di testo: Wil van der Aalst and Kees van Hee. Workflow Management: Models, Methods, and Systems. The MIT Press, paperback

More information

Workflow Solutions Data Collection, Data Review and Data Management

Workflow Solutions Data Collection, Data Review and Data Management Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow

More information

Test Suite Generation for Services

Test Suite Generation for Services Test Suite Generation for Services Kathrin Kaschner and Niels Lohmann WESOA 2008 Sydney 1 December 2008 http://service technology.org/wesoa2008 UNIVERSITÄT ROSTOCK Testing Services: What's new? classical

More information

MOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager

MOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager MOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager Course Overview This course provides students with the knowledge and skills to deploy and configure System Center 2012

More information

ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.

ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue. ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.nl August 2010 1 Introduction This document shows how to use ProM 6 to

More information

An Oracle White Paper September 2013. Advanced Java Diagnostics and Monitoring Without Performance Overhead

An Oracle White Paper September 2013. Advanced Java Diagnostics and Monitoring Without Performance Overhead An Oracle White Paper September 2013 Advanced Java Diagnostics and Monitoring Without Performance Overhead Introduction... 1 Non-Intrusive Profiling and Diagnostics... 2 JMX Console... 2 Java Flight Recorder...

More information

IT Service Continuity Management PinkVERIFY

IT Service Continuity Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg

Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Impressum ( 5 TMG) Herausgeber: Otto-von-Guericke-Universität Magdeburg

More information

Process Mining and Monitoring Processes and Services: Workshop Report

Process Mining and Monitoring Processes and Services: Workshop Report Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. w.m.p.v.d.aalst@tm.tue.nl

More information

Configuration Management - The Big Picture

Configuration Management - The Big Picture Configuration Management - The Big Picture Consists of: 1. Product s aligned to system development life cycle comprised of hardware and software configuration items described by specifications, design

More information

ITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1

ITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1 ITPS AG DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System Aplication overview SQL Informational Management System 1 Contents 1 Introduction 3 Modules 3 Aplication Inventory 4 Backup Control

More information

Process Mining The influence of big data (and the internet of things) on the supply chain

Process Mining The influence of big data (and the internet of things) on the supply chain September 16, 2015 Process Mining The influence of big data (and the internet of things) on the supply chain Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org http://www.engineersjournal.ie/factory-of-thefuture-will-see-merging-of-virtual-and-real-worlds/

More information

Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center

Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session

More information

Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems

Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems Stefanie Rinderle-Ma 1,2 and Wil M.P. van der Aalst 2 1 Department Databases and Information Systems, Faculty of Engineering

More information

Business Process Discovery

Business Process Discovery Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process

More information

MONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER

MONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER MONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER Andrew Bennett, TEAM Informatics, Inc. Why We Monitor During any software implementation there comes a time where a question is raised

More information

Chapter 4 Getting the Data

Chapter 4 Getting the Data Chapter 4 Getting the Data prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data Mining Part II:

More information

4 5 6 7 8 9 10 11 What is a character acte set? Definition Usage A character encoding or character set (sometimes referred to as code page) consists of a code that pairs a sequence of characters from a

More information

Magento module Documentation

Magento module Documentation Table of contents 1 General... 4 1.1 Languages... 4 2 Installation... 4 2.1 Search module... 4 2.2 Installation in Magento... 6 2.3 Installation as a local package... 7 2.4 Uninstalling the module... 8

More information

Supporting the Workflow Management System Development Process with YAWL

Supporting the Workflow Management System Development Process with YAWL Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,

More information

Hospital Pneumatic Tube System Buyer s Guide Evaluating material transport partners that fit your needs

Hospital Pneumatic Tube System Buyer s Guide Evaluating material transport partners that fit your needs Hospital Pneumatic Tube System Buyer s Guide Evaluating material transport partners that fit your needs Improving the Patient Experience With hospitals more focused on the patient experience than ever

More information

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java

More information

Supporting the BPM life-cycle with FileNet

Supporting the BPM life-cycle with FileNet Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven,

More information

Internal Control Deliverables. For. System Development Projects

Internal Control Deliverables. For. System Development Projects DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...

More information

FileNet s BPM life-cycle support

FileNet s BPM life-cycle support FileNet s BPM life-cycle support Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven, The Netherlands

More information

Process Mining. Data science in action

Process Mining. Data science in action Process Mining. Data science in action Julia Rudnitckaia Brno, University of Technology, Faculty of Information Technology, irudnickaia@fit.vutbr.cz 1 Abstract. At last decades people have to accumulate

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY

More information

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging

More information

Process Mining Using BPMN: Relating Event Logs and Process Models

Process Mining Using BPMN: Relating Event Logs and Process Models Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:

More information

The Fulfillment of AS 9100 Rev C Requirements by EnterpriseIQ

The Fulfillment of AS 9100 Rev C Requirements by EnterpriseIQ The Fulfillment of AS 9100 Rev C Requirements by EnterpriseIQ Manufacturers have worked to meet the stringent requirements of AS9100 for decades; the recent introduction of Revision C has further expanded

More information

Lower business risk and increase IT productivity with trusted, managed and secured file transfer

Lower business risk and increase IT productivity with trusted, managed and secured file transfer Lower business risk and increase IT productivity with trusted, managed and secured file transfer Today s dynamic business environments and economic uncertainty mean organizations must work smarter to remain

More information

Business Independent Model of Mobile Workforce Management

Business Independent Model of Mobile Workforce Management Business Independent Model of Mobile Workforce Management Volker Gruhn and Thomas Richter Chair of Applied Telematics / e-business, University of Leipzig Klostergasse 3, 04109 Leipzig, Germany {gruhn,richter}@ebus.informatik.uni-leipzig.de

More information

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop

Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering

More information

PLCS Reporter v2.8 for IBM Tivoli Storage Manager. Business intelligence for TSM

PLCS Reporter v2.8 for IBM Tivoli Storage Manager. Business intelligence for TSM PLCS Reporter v2.8 for IBM Tivoli Storage Manager Up to date accurate enterprise reporting, alerting and trending for TSM servers Business intelligence for TSM PLCS 1999-2012 Overview: PLCS Reporter Automated

More information

EDIminer: A Toolset for Process Mining from EDI Messages

EDIminer: A Toolset for Process Mining from EDI Messages EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Formal Modeling and Analysis by Simulation of Data Paths in Digital Document Printers

Formal Modeling and Analysis by Simulation of Data Paths in Digital Document Printers Formal Modeling and Analysis by Simulation of Data Paths in Digital Document Printers Venkatesh Kannan, Wil M.P. van der Aalst, and Marc Voorhoeve Department of Mathematics and Computer Science, Eindhoven

More information

Business Process Modeling and Analysis with Savvion BusinessManager

Business Process Modeling and Analysis with Savvion BusinessManager White Paper Business Process Modeling and Analysis with Savvion BusinessManager Mar 2008 5104 Old Ironsides Drive Suite 205 Santa Clara, California 95054 408-330-3402 888-544-5511 www.savvion.com White

More information

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0

More information

Business Process Modeling

Business Process Modeling Business Process Modeling Organization Who? What? Function When? Process Which? Data / Service / Product 1 BPMN Stands for Business Process Management Notation Graphical notation for specifying Business

More information

Understand Performance Monitoring

Understand Performance Monitoring Understand Performance Monitoring Lesson Overview In this lesson, you will learn: Performance monitoring methods Monitor specific system activities Create a Data Collector Set View diagnosis reports Task

More information

Process Mining: A Two-Step Approach using Transition Systems and Regions

Process Mining: A Two-Step Approach using Transition Systems and Regions Process Mining: Two-Step pproach using Transition Systems and Regions Wil M.P. van der alst 1, V. Rubin 2,1,.F. van ongen 1,. Kindler 2, and.w. Günther 1 1 indhoven University of Technology, indhoven,

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of

More information

Infasme Support. Incident Management Process. [Version 1.0]

Infasme Support. Incident Management Process. [Version 1.0] Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary

More information

Distribution Training Guide. D110 Sales Order Management: Basic

Distribution Training Guide. D110 Sales Order Management: Basic Distribution Training Guide D110 Sales Order Management: Basic Certification Course Prerequisites The combined D110 Sales Order Management certification course consists of a hands- on guide that will walk

More information

Generation of a Set of Event Logs with Noise

Generation of a Set of Event Logs with Noise Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,

More information

Configuring IBM WebSphere Monitor for Process Mining

Configuring IBM WebSphere Monitor for Process Mining Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,

More information

Baker s Dozen: 13 Ways Process Intelligence Drives Supply Chain Value

Baker s Dozen: 13 Ways Process Intelligence Drives Supply Chain Value Baker s Dozen: 13 Ways Process Intelligence Drives Supply Chain Value Anthony Aming Enterprise Business and Applications Architect / Baker Hughes Anthony Aming, Baker Hughes Dave Brooks, Software AG Dave

More information

Using WebLOAD to Monitor Your Production Environment

Using WebLOAD to Monitor Your Production Environment Using WebLOAD to Monitor Your Production Environment Your pre launch performance test scripts can be reused for post launch monitoring to verify application performance. This reuse can save time, money

More information

Translating Message Sequence Charts to other Process Languages using Process Mining

Translating Message Sequence Charts to other Process Languages using Process Mining Translating Message Sequence Charts to other Process Languages using Process Mining Kristian Bisgaard Lassen 1, Boudewijn F. van Dongen 2, and Wil M.P. van der Aalst 2 1 Department of Computer Science,

More information

ISUPPLIER PORTAL USER HANDBOOK

ISUPPLIER PORTAL USER HANDBOOK TTWEER PETROLEUM HRIN FIELD DEVELOPMENT COMPNY W.L.L ( TTWEER ) ISUPPLIER PORTL USER HNDOOK pplicable to the operations of Tatweer in: The Kingdom of ahrain IMPORTNT: Processes, applications and business

More information

4.0 Receiving Process

4.0 Receiving Process 4.0 Receiving Process Delivery of requested products or services marks a transition in the Purchase-to-Pay process from a purchasing activity to a payables activity. All purchases must be received to release

More information

Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data

Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master of Business Information Systems, Department of Mathematics and Computer Science Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master Thesis Author: ing. Y.P.J.M.

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

What is a life cycle model?

What is a life cycle model? What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each

More information

Responsibility charting (RACI)

Responsibility charting (RACI) esponsibility charting () What s? esponsibility harting s a technique for identifying functional areas, key activities, and decision points where ambiguities exist; differences can be brought into the

More information

Dr. Jana Koehler IBM Zurich Research Laboratory

Dr. Jana Koehler IBM Zurich Research Laboratory Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography

More information

Following the spirit of the current reform initiatives undertaken in. the United Nations system, a reform of the Education (ED) Sector of

Following the spirit of the current reform initiatives undertaken in. the United Nations system, a reform of the Education (ED) Sector of Overview on the Education Sector Reform Process Following the spirit of the current reform initiatives undertaken in the United Nations system, a reform of the Education (ED) Sector of UNESCO was initiated

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information