CHAPTER 1 INTRODUCTION
|
|
|
- Peter Hamilton
- 10 years ago
- Views:
Transcription
1 CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities, be it from a mobile call, ATM access and swiping a credit card. Similarly in every business transaction we are leaving our digital trace with various business enterprises which use Enterprise Application Software (EAS) for their business activities. In the EAS Business environment, for every transaction, data is captured and stored in the respective event logs automatically. The size of these data repositories has grown in incredible volumes and has become unimaginably huge. All the modern business enterprises are heading together to find the ways and means to manage this situation. It also triggered many challenges to the scientific community particularly to the researchers in the field of business intelligence and solution providers for enterprise data storage to handle this data explosion. One dimension of solutions is to provide enhanced infrastructure for data storage. Global business giants like IBM and HP have come up with solutions for big data storage - IBM-DS3500 and HP 3PPAR Store Serv respectively. The necessity to handle big digital data has given birth to new dimension in storage infrastructure and platform called cloud computing. Both IBM and HP also focus on the next technology trend called cloud infrastructure not only for storage provision but also for storage management. Merely providing a storage solution or storage management is not wise enough, instead converting this challenge of obese data into an opportunity for business understanding, business re-engineering and optimizing the business operations by providing insight, identify bottleneck, anticipate problems, record policy violations, recommend countermeasures, streamline processes and enhance the existing process standards, is a real challenge of the day. The real challenge in digital data is to trace the foot prints of the process and then convert it into visual models. These models can further be enhanced, which leads to process 1
2 evolution. Machine learning and data mining are the only solutions to handle this challenge properly. The main goal of process mining is to use the enterprise event logs to extract process related information. For example, by modeling a business process and analyzing it, management may get ideas on how to improve the quality and reduce the time of the activity in a process which in turn leads to improvement in operational efficiency. 1.2 Review of Literature Process mining is relatively a young research field which use the event data to extract process related information, e.g., to automatically discover a process model by observing events recorded by the enterprise system over time. The main goal of digging deeper knowledge about the enterprise data has twin advantages. The first and foremost advantage is to provide scientific knowledge that is used to develop standard operating procedures SOP by removal of non-value adding task from the process flow which is in practice. The resulting advantage is to have a firm base to develop a practical application system, which professionally support and control the business processes. This thesis presents the verification, conformance checking and process enhancement of an insurance motor claim process. Since the work presented in this thesis builds on prior work in different areas of process mining, the related research work are explained in detail below. Laura Maruster (Laura Maruster, 2006) has shown the application of a discovery method to data from different domains: simulated workflow data, real data resulted from the registration of some enterprize-specific information system and hospital data. The discovery method is rather able to capture the general process model than the process model containing exceptional paths. The discovery method provided reasons to question an existing process design or can reveal new insights into the considered process. The usefulness of the discovered process model is especially manifesting in combination with the designed model. A.J.M.M. Weijters and W.M.P van der Aalst (A.J.M.M. Weijters & W.M.P van der Aalst, 2003) propose a technique for process mining. This technique used workflow logs to discover the workflow process as it is actually being executed. The proposed process mining 2
3 technique deals with noise and can also be used to validate workflow processes by uncovering and measuring the discrepancies between prescriptive models and actual process executions. Henricus Marinus Wilhelmus Verbeek (Verbeek, 2008) present the workflow process definition verification tool Woflan and its supporting concepts. Woflan maps a workflow process definition onto a workflow net which is a Petri net with some additional requirements and can verify, before the workflow process definition is taken into production, the soundness property and four inheritance relations for the resulting for the resulting WF-net. Verbeek concludes that Woflan was the best tool to check this inheritance relation and soundness property of any work-flow net. Anne Rozinat (Rozinat, 2009) proposes an incremental approach to check the conformance of a process model and an event log. At first, the fitness between the log and the model was ensured and then the appropriateness of the model was analyzed with respect to the log. One metric (f) has been defined to address fitness and two metrics each to approach the structural appropriateness and behavioral appropriateness is then established. Together they allow for the quantification of conformance, whereas fitness should be ensured before appropriateness is analyzed. To verify her ideas a Conformance Checker has been implemented within the ProM framework. W.M.P van der Aalst (W.M.P van der Aalst, 2005), discusses the application of process mining to business alignment. The first assumption was that events are actually logged by some information system and the second fundamental assumption was that people are not completely controlled by the system, i.e., process mining does not give any insight if all decisions are made by the system and users cannot deviate from the default path. Although the degree of freedom is limited by some systems (e.g., traditional production workflow systems) the trend is towards more flexible systems. In a technical sense, the work of Havelund et al. [2004] is highly related. Havelund et al. propose three ways to evaluate LTL formulas: (1) Automata-based, (2) Using rewriting (based on Maude) and (3) Using dynamic programming. More recent work of Van der Aalst and Pesic [2006] shows that LTL formulas can not only be used for the verification of properties on process logs, but also for the execution of 3
4 business processes. In their approach, a process is specified by giving desired and undesired properties, in terms of LTL formulas. The system then lets its users perform any task, as long as the undesired properties are not violated, while at the same time it makes sure that a case is only completed if all desirable properties are fulfilled. In 1996, Sadiq and Orlowska were among the first ones to point out that modeling a business process (or workflow) can lead to problems like livelock and deadlock. In their paper, they present a way to overcome syntactical errors, but they ignore the semantical errors, i.e. they focus on the syntax to show that no deadlocks and livelocks occur. Agrawal et al. (1998) introduced the idea of applying process mining in the context of workflow management. This work is based on workflow graphs, which are inspired by workflow products such as IBM MQ Series workflow (formerly known as Flowmark) and InConcert. In his paper, two problems are defined. The first problem is to find a workflow graph generating events appearing in a given workflow log. A concrete algorithm was given for tackling the first problem. The approach was quite different from other approaches. Pinter et al. extended the work of Agrawal, by assuming that each event in the log refers either to the start or to the completion of an activity. This information is used to derive explicit parallel relations between activities. In (1998), Datta considers the problem of process mining as a tool for Business Process Redesign or BPR. In BPR, the starting point is typically assumed to be a set off process models that describe the current process. These models are then analyzed and better process models are constructed. The question that Datta addresses is how to get this initial set of models. Herbst (2000) also address the issue of process mining in the context of workflow management using an inductive approach. The work presented is limited to sequential models. Schimm [2003] has developed a mining tool suitable for discovering hierarchically structured workflow processes. This required all splits and joins to be balanced. However, in contrast to other approaches, he tries to generate a complete and minimal model, i.e. the model can reproduce the log and there is no smaller model that can do so. Greco et al. (2006) presented a process mining algorithm tailored towards discovering process models that describe the process at different levels of abstraction. Of the two step 4
5 approach they have presented, the first step is implemented as the Disjunctive Workflow Miner plug-in in the process mining framework ProM. The approach by Weijters et al (2003) provides an extension to the first step in the alpha-algorithm, i.e. a heuristic approach is presented for determining causal and parallel dependencies between events. These dependencies then serve as an input for the alphaalgorithm, thus making it applicable in situations where the process log contains noise, i.e. exceptional behavior that we do not want to appear in a process model. Again, the work of Weiters et al (2003) was implemented in the ProM framework. 1.3 Objectives And Scope The core objective of this research work is to convert the data handling challenge into an opportunity for business improvement. To do so the thesis employs machine learning techniques to obtain insights of the business processes. This approach is referred as process discovery. The objective of using machine learning technique is that human learning is a long process and slow. The most distinctive feature about human learning is that there is no copy process. When one machine has made to learn, they ve all learned it in principle. Furthermore the volume of data to be handled is very huge. The first objective of the thesis is to convert the real world process into visual process models, which brings clarity and convenience for better understanding of the business process without ambiguity by using standard notations, which are tangible and structured. These models can further be tuned and enhanced to improve the efficiency of the existing process to its next possible dimension. Every insurance business activity leaves the foot prints of the process in its event logs. Event log has many cases and every case has many events, with a corresponding time stamps. The main goal of process mining is to use event logs to extract process related information. Data mining concepts have huge scope in business industry because it is capable to handle rich data sources. Till recent years many industries suffered to handle obese databases. Data mining yields predictive models with which business industry can handle the situations such as database segmentation to identify target customers, process optimization, new product development, and marketing strategies. 5
6 1.4 Methodology The research approach used in this thesis is the inductive method. The inductive method is based on the observation in the real world and it involves the process of learning from examples. It aims to convert the real world process into a model and tries to induct a general rule from a set of observed instances. In the inductive method, observations from the real world are the authority. The task of constructing class definition is called induction or concept learning. The process of applying the inductive method is called inductive inference or inductive learning. Inductive learning as a heuristic search through a space of symbolic description generated by an application of various inference rules, to the initial observational statements. Inductive learning is a process of acquiring knowledge by drawing inductive inference from the environment. Inductive learning programs could provide both an improvement of the current technique and a basis for developing alternative knowledge acquisition methods. The basic methods of inference are inductive and deductive. The deductive inference uses the generalization or rules to learn about the specific example or activity hence it is referred to as top-down approach. The inductive method uses the specific examples or activities to formulate the generalization hence referred to as bottom-up approach. There are two basic modes in which inductive programs can be utilized: as inductive tools for acquisition of knowledge from specific facts or examples, or as parts of machine learning In this thesis inductive inference method is employed. This thesis uses machine learning approach to discover models from data. The discovered model can be formally analyzed. The model generator uses the machine learning approach called learning from instruction which takes input from the trace table and generates the visual model of the process. The model is generated in such a way that there should be at least one transition between any two activities. The model generator is able to generate different possible models for the same process and while generating the alternative model it is very important to take into account the sequence sensitive activities. The order should not be altered otherwise the objective and the purpose of the process will be affected. In this thesis, time and quality are been taken as the key parameters for further analysis. 6
7 1.5 Contribution of this thesis The contribution of this thesis for business optimization using machine learning technique is remarkable. Business optimization is the need of the hour in the present competitive global business scenario. The thesis has converted the challenges of handling big digital data into an opportunity for the business enterprises for better understanding of their business flow. The thesis also paves the way to detect the redundant activities, identify and remove the non value added task in the flow of the business process. It also made a sincere attempt to reduce the time and cost in the operation of the process and improve the quality of service to the customer. In the present business climate environment the customer retention is the most challenging task. The thesis uses the machine learning technique to convert the raw data into a process flow model and then by using process mining tool the activities of the process are analyzed and enhanced. 7
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Model Discovery from Motor Claim Process Using Process Mining Technique
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan
Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement
Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy
Business Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo [email protected] January 30, 2009 1 / 41 Business Process Concepts Process
Process Mining and Monitoring Processes and Services: Workshop Report
Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]
Feature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
Towards an Evaluation Framework for Process Mining Algorithms
Towards an Evaluation Framework for Process Mining Algorithms A. Rozinat, A.K. Alves de Medeiros, C.W. Günther, A.J.M.M. Weijters, and W.M.P. van der Aalst Eindhoven University of Technology P.O. Box 513,
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering
Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.
Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven
Configuring IBM WebSphere Monitor for Process Mining
Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,
Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer
Process mining challenges in hospital information systems
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1135 1140 ISBN 978-83-60810-51-4 Process mining challenges in hospital information systems Payam Homayounfar Wrocław
The Research on the Usage of Business Process Mining in the Implementation of BPR
2007 IFIP International Conference on Network and Parallel Computing - Workshops The Research on Usage of Business Process Mining in Implementation of BPR XIE Yi wu 1, LI Xiao wan 1, Chen Yan 2 (1.School
From Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
Dotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
Application of Process Mining in Healthcare A Case Study in a Dutch Hospital
Application of Process Mining in Healthcare A Case Study in a Dutch Hospital R.S. Mans 1, M.H. Schonenberg 1, M. Song 1, W.M.P. van der Aalst 1, and P.J.M. Bakker 2 1 Department of Information Systems
ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:[email protected] R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.
ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:[email protected] R. P. Jagadeesh Chandra Bose mailto:[email protected] August 2010 1 Introduction This document shows how to use ProM 6 to
EMiT: A process mining tool
EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. [email protected]
Process Mining Framework for Software Processes
Process Mining Framework for Software Processes Vladimir Rubin 1,2, Christian W. Günther 1, Wil M.P. van der Aalst 1, Ekkart Kindler 2, Boudewijn F. van Dongen 1, and Wilhelm Schäfer 2 1 Eindhoven University
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
ProM Framework Tutorial
ProM Framework Tutorial Authors: Ana Karla Alves de Medeiros ([email protected]) A.J.M.M. (Ton) Weijters ([email protected]) Technische Universiteit Eindhoven Eindhoven, The Netherlands February
Analysis of Service Level Agreements using Process Mining techniques
Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from
Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach
Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Santiago Aguirre, Carlos Parra, and Jorge Alvarado Industrial Engineering Department, Pontificia
Discovering User Communities in Large Event Logs
Discovering User Communities in Large Event Logs Diogo R. Ferreira, Cláudia Alves IST Technical University of Lisbon, Portugal {diogo.ferreira,claudia.alves}@ist.utl.pt Abstract. The organizational perspective
The ProM framework: A new era in process mining tool support
The ProM framework: A new era in process mining tool support B.F. van Dongen, A.K.A. de Medeiros, H.M.W. Verbeek, A.J.M.M. Weijters, and W.M.P. van der Aalst Department of Technology Management, Eindhoven
Business Process Measurement in small enterprises after the installation of an ERP software.
Business Process Measurement in small enterprises after the installation of an ERP software. Stefano Siccardi and Claudia Sebastiani CQ Creativiquadrati snc, via Tadino 60, Milano, Italy http://www.creativiquadrati.it
Implementing Heuristic Miner for Different Types of Event Logs
Implementing Heuristic Miner for Different Types of Event Logs Angelina Prima Kurniati 1, GunturPrabawa Kusuma 2, GedeAgungAry Wisudiawan 3 1,3 School of Compuing, Telkom University, Indonesia. 2 School
Decision Mining in Business Processes
Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl
Business Process Management: A personal view
Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business
Process Mining A Comparative Study
International Journal of Advanced Research in Computer Communication Engineering Process Mining A Comparative Study Asst. Prof. Esmita.P. Gupta M.E. Student, Department of Information Technology, VIT,
ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010
ProM 6 Exercises J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl August 2010 The exercises provided in this section are meant to become more familiar with ProM
Process Mining Tools: A Comparative Analysis
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Process Mining Tools: A Comparative Analysis Irina-Maria Ailenei in partial fulfillment of the requirements for the degree
Trace Clustering in Process Mining
Trace Clustering in Process Mining M. Song, C.W. Günther, and W.M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song,c.w.gunther,w.m.p.v.d.aalst}@tue.nl
Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical University, INDIA. Dept. of Computer Science, Rashtriya Sanskrit Vidyapeetha, INDIA
ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) Analysis of Workflow and Process Mining in Dyeing Processing System 1 Saravanan. M.S, 2 Dr Rama Sree.R.J 1 Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical
BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
B. Majeed British Telecom, Computational Intelligence Group, Ipswich, UK
The current issue and full text archive of this journal is available at wwwemeraldinsightcom/1463-7154htm A review of business process mining: state-of-the-art and future trends A Tiwari and CJ Turner
Investigating Clinical Care Pathways Correlated with Outcomes
Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
Using Process Mining to Bridge the Gap between BI and BPM
Using Process Mining to Bridge the Gap between BI and BPM Wil van der alst Eindhoven University of Technology, The Netherlands Process mining techniques enable process-centric analytics through automated
Structural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
FileNet s BPM life-cycle support
FileNet s BPM life-cycle support Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven, The Netherlands
Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT
Master in Computing Llenguatges i Sistemes Informàtics Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT Student: Advisor/Director: Jorge Muñoz-Gama Josep Carmona Vargas
Chapter 12 Analyzing Spaghetti Processes
Chapter 12 Analyzing Spaghetti Processes prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data
AdTheorent s. The Intelligent Solution for Real-time Predictive Technology in Mobile Advertising. The Intelligent Impression TM
AdTheorent s Real-Time Learning Machine (RTLM) The Intelligent Solution for Real-time Predictive Technology in Mobile Advertising Worldwide mobile advertising revenue is forecast to reach $11.4 billion
Supporting the BPM life-cycle with FileNet
Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven,
Process Mining: Making Knowledge Discovery Process Centric
Process Mining: Making Knowledge Discovery Process Centric Wil van der alst Department of Mathematics and Computer Science Eindhoven University of Technology PO Box 513, 5600 MB, Eindhoven, The Netherlands
Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg
Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Impressum ( 5 TMG) Herausgeber: Otto-von-Guericke-Universität Magdeburg
PLG: a Framework for the Generation of Business Process Models and their Execution Logs
PLG: a Framework for the Generation of Business Process Models and their Execution Logs Andrea Burattin and Alessandro Sperduti Department of Pure and Applied Mathematics University of Padua, Italy {burattin,sperduti}@math.unipd.it
USING PROCESS MINING FOR ITIL ASSESSMENT: A CASE STUDY WITH INCIDENT MANAGEMENT
USING PROCESS MINING FOR ITIL ASSESSMENT: A CASE STUDY WITH INCIDENT MANAGEMENT Diogo R. Ferreira 1,2, Miguel Mira da Silva 1,3 1 IST Technical University of Lisbon, Portugal 2 Organizational Engineering
SOFTWARE PROCESS MINING
SOFTWARE PROCESS MINING DR. VLADIMIR RUBIN LEAD IT ARCHITECT & CONSULTANT @ DR. RUBIN IT CONSULTING LEAD RESEARCH FELLOW @ PAIS LAB / HSE ANNOTATION Nowadays, in the era of social, mobile and cloud computing,
Generation of a Set of Event Logs with Noise
Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,
Business Process Mining: From Theory to Practice
Abstract Business Process Mining: From Theory to Practice C.J. Turner, A. Tiwari, R. A. Olaiya and Y, Xu Purpose - This paper presents a comparison of a number of business process mining tools currently
Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data
Master of Business Information Systems, Department of Mathematics and Computer Science Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master Thesis Author: ing. Y.P.J.M.
Modeling and Analysis of Incoming Raw Materials Business Process: A Process Mining Approach
Modeling and Analysis of Incoming Raw Materials Business Process: A Process Mining Approach Mahendrawathi Er*, Hanim Maria Astuti, Dita Pramitasari Information Systems Department, Faculty of Information
Process Mining and the ProM Framework: An Exploratory Survey - Extended report
Process Mining and the ProM Framework: An Exploratory Survey - Extended report Jan Claes and Geert Poels Department of Management Information Science and Operations Management, Faculty of Economics and
An Outlook on Semantic Business Process Mining and Monitoring
An Outlook on Semantic Business Process Mining and Monitoring A.K. Alves de Medeiros 1,C.Pedrinaci 2, W.M.P. van der Aalst 1, J. Domingue 2,M.Song 1,A.Rozinat 1,B.Norton 2, and L. Cabral 2 1 Eindhoven
Business Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
Policy Modeling and Compliance Verification in Enterprise Software Systems: a Survey
Policy Modeling and Compliance Verification in Enterprise Software Systems: a Survey George Chatzikonstantinou, Kostas Kontogiannis National Technical University of Athens September 24, 2012 MESOCA 12,
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Process Mining Data Science in Action
Process Mining Data Science in Action Wil van der Aalst Scientific director of the DSC/e Dutch Data Science Summit, Eindhoven, 4-5-2014. Process Mining Data Science in Action https://www.coursera.org/course/procmin
BPIC 2014: Insights from the Analysis of Rabobank Service Desk Processes
BPIC 2014: Insights from the Analysis of Rabobank Service Desk Processes Bruna Christina P. Brandão, Guilherme Neves Lopes, Pedro Henrique P. Richetti Department of Applied Informatics - Federal University
Process Aware Host-based Intrusion Detection Model
Process Aware Host-based Intrusion Detection Model Hanieh Jalali 1, Ahmad Baraani 1 1 University of Isfahan, Computer Department, Isfahan, Iran {jalali, ahmadb}@eng.ui.ac.ir 117 Abstract: Nowadays, many
A Scala DSL for Rete-based Runtime Verification
A Scala DSL for Rete-based Runtime Verification Klaus Havelund Jet Propulsion Laboratory California Institute of Technology, California, USA Abstract. Runtime verification (RV) consists in part of checking
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms
CPN Tools 4: A Process Modeling Tool Combining Declarative and Imperative Paradigms Michael Westergaard 1,2 and Tijs Slaats 3,4 1 Department of Mathematics and Computer Science, Eindhoven University of
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Process Mining and Fraud Detection
Process Mining and Fraud Detection A case study on the theoretical and practical value of using process mining for the detection of fraudulent behavior in the procurement process Masters of Science Thesis
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
Eventifier: Extracting Process Execution Logs from Operational Databases
Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,
WebSphere Business Modeler
Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration
Oracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining Liqiang Geng 1, Scott Buffett 1, Bruce Hamilton 1, Xin Wang 2, Larry Korba 1, Hongyu Liu 1, and Yunli Wang 1 1 IIT,
EDIminer: A Toolset for Process Mining from EDI Messages
EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Visionet IT Modernization Empowering Change
Visionet IT Modernization A Visionet Systems White Paper September 2009 Visionet Systems Inc. 3 Cedar Brook Dr. Cranbury, NJ 08512 Tel: 609 360-0501 Table of Contents 1 Executive Summary... 4 2 Introduction...
XpoLog Center Suite Data Sheet
XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such
Software Development Engineer Management Protection & Access Group
Software Development Engineer Management Protection & Access Group Location: Herzliya & Haifa The Management & Security Division is involved in developing a cloud service which provides client management
Translating Message Sequence Charts to other Process Languages using Process Mining
Translating Message Sequence Charts to other Process Languages using Process Mining Kristian Bisgaard Lassen 1, Boudewijn F. van Dongen 2, and Wil M.P. van der Aalst 2 1 Department of Computer Science,
Malay A. Dalal Madhav Erraguntla Perakath Benjamin. Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A.
AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Malay A. Dalal Madhav Erraguntla Perakath Benjamin Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A. ABSTRACT
