Contact FutureLearn for Support
Skip main navigation
We use cookies to give you a better experience, if that’s ok you can close this message and carry on browsing. For more info read our cookies policy.
We use cookies to give you a better experience. Carry on browsing if you're happy with this, or read our cookies policy for more information.

Skip to 0 minutes and 10 secondsHi, and welcome to the closing of week two. And in this lecture, I would like to briefly summarize what we have discussed this week. So in this week we focused in particular process mining algorithms and how you can evaluate their results. Now, we were mainly focusing on the discovery part of process mining, so how you get from event data to a process model describing the behavior that's in this data. So first, we explained how our process model can be described. And therefore, we introduced a petri net notation. So given this example, a token flows through the process. And whenever a transition fires, it consumes a token for each incoming arrow and for those as well on each outgoing arrow.

Skip to 0 minutes and 59 secondsAnd this process model is now animated. And you see how the token moves through the process. At certain points, you can make a choice. And when the token in the final place, the process has ended. Some of you might already know the BPMN notation. So the process model on the top describes the same behavior as the petri net on the bottom. But in this course, I know most process mining techniques however use Petri net notation. But you can see the similarities between BPMN notation. In another lecture, we explained when the process model is sound, or in other words bug free. So there are three properties that if all are satisfied. The process is sound.

Skip to 1 minute and 40 secondsSo the process model should have the option to complete. When it completes, it should be properly completed, and there should be no dead transitions. When all this is satisfied, the process model is sound and therefore contains no bugs. Then in the second half of this week we showed you how you can relate process models and behavior. So for clarity, we abbreviated the activity names to letters of the alphabet, and then, for instance, this process allows for particular traces or sequences of activities. And a multiple activity sequence is possible that can be generated by this petri net, mainly because of the choice between e and f and the parallelism between b, c, and d.

Skip to 2 minutes and 24 secondsWhat we just did was simulate the process model. We looked and played the process model and saw what possible activity sequences were possible. Discovery, and what is actually the main point of process mining is actually doing it the other way around. Given only the observations, what process model describes this behavior? And in the next week, we will focus on replay. So when we have both the process model and the data, you can put them all together, and you can see where the deviations are. However, this week we mainly focused on process discovery. You can also compare the quality of a process model that you discovered with the data that you used to discover it.

Skip to 3 minutes and 8 secondsAnd there are actually four quality dimensions, and actually opposite forces. Whenever you try to optimize for one, you usually reduce the quality at least one of the other directions. The first quality dimension is replay fitness replay fitness. Replay fitness is actually the main quality force. And replay fitness evaluates how well the observed data can be replayed by the process model. The other quality dimension that's important is precision. You also don't want your process model to allow for any behavior, because then it's too wide or too lose of a description of what you have seen. The third quality dimension is generalization. The event log usually contains only a snapshot of all possible behavior.

Skip to 3 minutes and 48 secondsAnd although you don't want your process model to be imprecise, you do want to have some generalization or interpretation of what you have seen. Finally, you and I should be able to read the process model. So the process model should be sufficiently simple. The trick of many process discovery algorithms, but also you as a process miner is to balance these forces. And usually, as I mentioned before, you cannot really optimize all four at once. You have to pick your priorities right. So given this example data and the processing on the bottom, we can see that we can replay all the traces in this process model. It generalizes.

Skip to 4 minutes and 29 secondsSo it has not seen all possible combinations and all possible behavior of this process model. But given these example traces, it makes correct assumptions on parallelism and choice behavior. And finally, it is rather simple to read. However, it's not perfectly precise. So this process model allows for more behavior than you have seen in your log. And this is actually the trade off between precision and generalization. We also introduced the process model checklist. One of the first things you have to check is is the process model sound? Then you can check the four quality dimensions to see how well the process model and the data fit together. In this course, we also discussed several process mining algorithms.

Skip to 5 minutes and 14 secondsAnd the alpha miner was actually the first discovery algorithm that we discussed. However, the alpha miner is the most simple algorithm and has some issues. For instance, it can produce unsound models. And it cannot really handle noisy behavior in the data. The next algorithm that is able to handle noisy behavior was the heuristics miner. But it gave this result on the example data. Hence it is also not sound and has a not very good replay fitness. Inductive miner, however, guarantees to discover sound process models. And all the data that we put in actually discovers the process model that we expect to find.

Skip to 5 minutes and 53 secondsThen we also showed a lot of process discovery algorithm to fuzzy miner, which merely shows a process graph and where soundness is also given. But at the same time, the model is of a different nature that a petri net. So comparing all these algorithms, I hope you know what the pros and cons are of each and that allows you to select a process discovery algorithm for your data. In the next week, we will focus on performance and enhancement techniques and detail this further. So we're still in the process mining activity phase, but also already cover evaluation and interpretation of the data. So I hope to see you in the next week, and good luck with the quiz.

Week 2 closing

In this step we provide a closing overview of Week 2.

This will allow you to recap what you have learned this week, before attempting the test in the next step.

Share this video:

This video is from the free online course:

Introduction to Process Mining with ProM

Eindhoven University of Technology

Course highlights Get a taste of this course before you join:

  • Introduction

    Introduction to process mining: recognizing event data, what is process mining and what can process mining analyse.

  • Installing ProM lite
    Installing ProM lite

    In this step we show how to find and install the free and open source process mining tool ProM lite.

  • Using ProM lite
    Using ProM lite

    In this lecture we show the basic concepts and usage of ProM (lite): the resource, action and visualization perspectives.

  • Event logs
    Event logs

    In this lecture we explain what an event log is and how it is structured. We also explain the most common attributes found in an XES event log.

  • Event logs in ProM
    Event logs in ProM

    In this lecture we show you how you can load an event log in ProM and how you can get initial insights in the contents.

  • Converting a CSV file to an event log
    Converting a CSV file to an event log

    Most data is not recorded in event log format. In this video we explain how a CSV file can be converted to an event log.

  • Exploring event logs with the dotted chart
    Exploring event logs with the dotted chart

    After loading an event log into ProM it is important to apply the dotted chart to get initial process insights before process models are discovered.

  • Filtering event logs
    Filtering event logs

    Before good quality process models can be discovered the event log data needs to be filtered to contain only completed cases for instance.