Process mining with token carried data

Process mining is to discover, monitor and improve real processes by extracting the knowledge from logs which are available in today's information systems. The existing process mining algorithms are based on the event logs where only the executions of tasks are recorded. In order to reduce the pre-processing efforts and strengthen the mining ability of the existing process mining algorithms, we have proposed a novel perspective to employ the data carried by tokens recorded in token log which tracks the changes of process resources for process mining in this study. The feasibility of the token logs is proved and the results of pairwise t-tests show that there is no big difference between the efforts that are taken by the same workflow system to generate the token log and the event log. Besides, a process mining algorithm (?) based on the new log is proposed in this paper. With algorithm ?, the mining efficiency as well as the mining capability is improved compared to the traditional event-log-based mining algorithms. We have also developed three plug-ins on top of the existing workflow engine, process modeling and mining platforms (YAWL, PIPE and ProM) for proving the feasibility of token log and realizing the token log generation and algorithm ?.

[1]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[2]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[3]  A. Odlyzko,et al.  Internet growth: is there a Moore's law for data traffic? , 2000 .

[4]  Wil M. P. van der Aalst,et al.  Process mining: a research agenda , 2004, Comput. Ind..

[5]  Jianmin Wang,et al.  Mining process models with non-free-choice constructs , 2007, Data Mining and Knowledge Discovery.

[6]  Qiang Hu,et al.  Service net algebra based on logic Petri nets , 2014, Inf. Sci..

[7]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[8]  Florin Gorunescu,et al.  Data Mining - Concepts, Models and Techniques , 2011, Intelligent Systems Reference Library.

[9]  Moe Thandar Wynn,et al.  Soundness-preserving reduction rules for reset workflow nets , 2009, Inf. Sci..

[10]  Jianmin Wang,et al.  Mining process models with prime invisible tasks , 2010, Data Knowl. Eng..

[11]  Wil M. P. van der Aalst,et al.  Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..

[12]  MuDer Jeng,et al.  A Maximally Permissive Deadlock Prevention Policy for FMS Based on Petri Net Siphon Control and the Theory of Regions , 2008, IEEE Transactions on Automation Science and Engineering.

[13]  Kees M. van Hee,et al.  Workflow Management: Models, Methods, and Systems , 2002, Cooperative information systems.

[14]  Wil M. P. van der Aalst,et al.  Decomposing Process Mining Problems Using Passages , 2012, Petri Nets.

[15]  Ricardo Seguel,et al.  Process Mining Manifesto , 2011, Business Process Management Workshops.

[16]  MengChu Zhou,et al.  A Survey and Comparison of Petri Net-Based Deadlock Prevention Policies for Flexible Manufacturing Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[17]  Hui Huang,et al.  Creating Process-Agents incrementally by mining process asset library , 2013, Inf. Sci..

[18]  Boudewijn F. van Dongen,et al.  Process Discovery using Integer Linear Programming , 2009, Fundam. Informaticae.

[19]  LiGuo Huang,et al.  Discovering process models from event multiset , 2012, Expert Syst. Appl..

[20]  Qingtian Zeng,et al.  Classification and evaluation of timed running schemas for workflow based on process mining , 2009, J. Syst. Softw..

[21]  Wolfgang Reisig Petri Nets: An Introduction , 1985, EATCS Monographs on Theoretical Computer Science.

[22]  Jianmin Wang,et al.  A novel approach for process mining based on event types , 2007, IEEE International Conference on Services Computing (SCC 2007).

[23]  Hélène Kirchner,et al.  Secure interoperation design in multi-domains environments based on colored Petri nets , 2013, Inf. Sci..

[24]  Wil M. P. van der Aalst,et al.  Decision Mining in ProM , 2006, Business Process Management.

[25]  Alexander L. Wolf,et al.  Discovering models of software processes from event-based data , 1998, TSEM.

[26]  Dimitris Karagiannis,et al.  Integrating machine learning and workflow management to support acquisition and adaptation of workflow models , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).

[27]  Rabih Bashroush,et al.  A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning , 2014, EUSPN/ICTH.

[28]  Qingtian Zeng,et al.  Conflict detection and resolution for workflows constrained by resources and non-determined durations , 2008, J. Syst. Softw..

[29]  Josep Carmona,et al.  New Region-Based Algorithms for Deriving Bounded Petri Nets , 2010, IEEE Transactions on Computers.

[30]  Wil M. P. van der Aalst,et al.  Process Discovery: Capturing the Invisible , 2010, IEEE Comput. Intell. Mag..