Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms



Similar documents
ProM Framework Tutorial

BUsiness process mining, or process mining in a short

Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems

A Generic Import Framework For Process Event Logs

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery

Master Thesis September 2010 ALGORITHMS FOR PROCESS CONFORMANCE AND PROCESS REFINEMENT

Process Mining Framework for Software Processes

Generation of a Set of Event Logs with Noise

Process Mining. Luigi Pontieri Istituto di Calcolo e Reti ad Alte Prestazioni ICAR-CNR Via Bucci 41c, Rende (CS) pontieri@icar.cnr.

A Generic Import Framework For Process Event Logs

Mercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement

Process Aware Host-based Intrusion Detection Model

The ProM framework: A new era in process mining tool support

Process Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.

Decision Mining in Business Processes

Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1

Business Process Mining: An Industrial Application

ProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.

CHAPTER 1 INTRODUCTION

SQL Server Instance-Level Benchmarks with DVDStore

Relational XES: Data Management for Process Mining

Analysis of Service Level Agreements using Process Mining techniques

Trace Clustering in Process Mining

Towards an Evaluation Framework for Process Mining Algorithms

SOFTWARE PROCESS MINING

Process Mining Tools: A Comparative Analysis

Beyond the Simple SAS Merge. Vanessa L. Cox, MS 1,2, and Kimberly A. Wildes, DrPH, MA, LPC, NCC 3. Cancer Center, Houston, TX.

ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010

Process Mining A Comparative Study

Oracle Role Manager. An Oracle White Paper Updated June 2009

Data Science. Research Theme: Process Mining

Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

SecSy: A Security-oriented Tool for Synthesizing Process Event Logs

Capacity Management PinkVERIFY

Authentication Levels. White Paper April 23, 2014

Implementing Heuristic Miner for Different Types of Event Logs

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Checklist For Business Recovery

Process Mining. Data science in action

Using Process Mining to Bridge the Gap between BI and BPM

Canonical. Plugin for Joomla! This manual documents version 3.11.x of the Joomla! extension.

CMDB Essential to Service Management Strategy. All rights reserved 2007

Analyzing a TCP/IP-Protocol with Process Mining Techniques

An Ontology-based Framework for Enriching Event-log Data

Application of Process Mining in Healthcare A Case Study in a Dutch Hospital

Linux Kernel. Security Report

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya

The Art of Workload Selection

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...

Improving Cognos Upgrades Methodology to Lower Costs & Improve Upgrade Management

Nirikshan: Process Mining Software Repositories to Identify Inefficiencies, Imperfections, and Enhance Existing Process Capabilities

Monitoring MSDynamix CRM 2011

Managing Custom Data Standards in SAS Clinical Data Integration

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

Translating Message Sequence Charts to other Process Languages using Process Mining

RECORDS MANAGEMENT & RETENTION. Convercent All Rights Reserved.

Using Event Logs to Derive Role Engineering Artifacts

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA.

Process Mining and the ProM Framework: An Exploratory Survey - Extended report

2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.

Data mining analysis of defect data in Software Development Process

Social Network Analysis for Business Process Discovery

WhatsUp Gold vs. Orion

Computer programs (both source and executable) Documentation (both technical and user) Data (contained within the program or external to it)

Load Testing Basics: These are the basic ideas in setting up a load test By: Bob Wescott

Mining Process Models with Non-Free-Choice Constructs

What s New in BridgeTrak 8.0?

CHAPTER 1 INTRODUCTION

Running a Workflow on a PowerCenter Grid

Verona: On-Time, On-Scope, On-Quality

Effective and Efficient SAM execution to manage software Spend and Compliance

Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical University, INDIA. Dept. of Computer Science, Rashtriya Sanskrit Vidyapeetha, INDIA

A Test Suite for Basic CWE Effectiveness. Paul E. Black.

Service Portfolio Management PinkVERIFY

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study

AllPackages. 6/20/2011 H.M.W. Verbeek

Business Process Discovery

PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks

Process Modelling from Insurance Event Log

Windows Password Change Scenarios

This document contains important information about installation, fixed limitations, and known limitations for B2B Data Exchange.

MS SQL Express installation and usage with PHMI projects

How To Manage It Asset Management On Peoplesoft.Com

Activity Mining for Discovering Software Process Models

CMTRAC. Application Overview APPLICATION DATASHEET

Transcription:

Mining: Using CPN Tools to Create Test Logs for Mining Algorithms Ana Karla Alves de Medeiros and Christian W. Günther

2 Outline Introduction Mining The need for synthetic logs MXML format Using the Logging Extensions Conclusion

3 Mining - The general idea Information System Logs

4 Mining - The general idea Basic Performance Metrics Auditing, Security Logs Organizational Performance Characteristics Social Network

5 Mining -...what is it good for? How is a specific process really executed? Discover discrepancies process model reality Discover typical patterns in real-life operation Results can be used to: Align organization and processes in a better way Improve efficiency, effectivity and quality Redesign processes based on solid information

6 Mining - Practice vs. Development Mined PAIS Logs Mining Algorithm

7 Mining - Practice vs. Development Comparison Mined PAIS Logs Mining Algorithm

8 ed informally Flexible process model Not available Mining - Practice vs. Development PAIS Comparison Incomplete Corrupt Noise Logs Mined Mining Algorithm Problems during execution Logging mechanism flawed Aborted Instances Manual workarounds

9 ed informally Flexible process model Not available Mining - Practice vs. Development Not suitable for testing mining algorithms! PAIS Comparison Incomplete Corrupt Noise Logs Mined Mining Algorithm Problems during execution Logging mechanism flawed Aborted Instances Manual workarounds

10 Mining - Practice vs. Development CPN Mined Simulation in CPN Tools Logs Mining Algorithm

11 Mining - Practice vs. Development CPN Simulation in CPN Tools Comparison Complete Perfect Noise-free Logs Mined Mining Algorithm

Entirely controlled environment: Perfect testbed for Mining Algorithms! Mining - Practice vs. Development 12 CPN Simulation in CPN Tools Comparison Complete Perfect Noise-free Logs Mined Mining Algorithm

13 Logging a CPN Simulation Example process model: Fine handling

14 The MXML Format - WF-Log,, Proc. Instance <WorkflowLog> <> <Instance> <AuditTrailEntry/> <AuditTrailEntry/> <AuditTrailEntry/> </Instance> <Instance/> <Instance/> </> </WorkflowLog>

15 The MXML Format - The Structure of an Audit Trail Entry <AuditTrailEntry> <WorkflowElement/> Task A </Wf.M.E.> <EventType> complete </EventType> <TimeStamp> 2005-10-26T12:37:33... </TimeStamp> <Originator> John Doe </Originator> <Data> <Attribute name= x > 1 </Attribute> <Attribute name= y > whatever </Attribute> </Data> </AuditTrailEntry>

16 MXML Logging Extensions for CPN Tools Define 2 global constants Import ML file containing logging functions Call function createcasefile to initialize new process instance Call function addate to create new audit trail entry

17 HOWTO create an MXML log from a CPN : If not already done: model the process in CPN Tools

18 MXML Logging Extensions - Control Variables Three declarations are necessary: FILE: path and file prefix FILE_EXTENSION: custom log file suffix import ML file containing logging functions declarations

19 MXML Logging Extensions - Case File Creation function createcasefile one parameter caseid of type Integer creates new file for recording a Instance File: <FILE> <caseid> <FILE_EXTENSION> Example Use: Case Generator extra transition at start of process creates a defined number of tokens (=cases) initializes log by calling createcasefile()

20 MXML Logging Extensions - Case File Creation Example application: Case Generator Actual process starts here!

21 MXML Logging Extensions - Audit Trail Entries function addate Parameter list (all MXML fields): caseid (Integer): which file to append to workflowelement (String): task name EventType (String): complete, schedule, abort,... TimeStamp (String): when has the event occurred? Originator (String): executing resource Data (List of Strings): [name1, value1, name2,...] Appends audit trail entry to case file with caseid

22 MXML Logging Extensions - Audit Trail Entries (convenience) function calculatetimestamp Takes no parameters Creates MXML-compliant timestamp from current logical model time

23 MXML Logging Extensions - Audit Trail Entries Usage of addate:

24 Aggregating Simulation Logs Combines all case files and writes clean MXML 4) Run plugin and save MXML 1) Select CPN plugin 2) Select directory with logs 3) Provide file suffix

25 Heuristics Miner Multi-Phase Miner Social Network Miner Alpha algorithm

26 Conclusion Extending a model with Logging is straightforward Combined with the ease of modeling in CPN Tools, rapid creation of test logs Intended Usage: Synthesis of test logs for benchmarking mining algorithms Creation of a test log repository Testing mining algorithms on advanced models...could we mine your models?