Skip main navigation
We use cookies to give you a better experience, if that’s ok you can close this message and carry on browsing. For more info read our cookies policy.
We use cookies to give you a better experience. Carry on browsing if you're happy with this, or read our cookies policy for more information.

Skip to 0 minutes and 10 secondsHi and welcome back. In this lecture, I will show you the heuristics miner in ProM. So the heuristics miner is an improvement of the alpha miner and still tries to bridge the gap between the event log and the process model discovery. So how does the heuristics miner improve on the alpha miner? Well, it takes frequencies into account. Therefore, it can filter out infrequent behavior. And it is able to detect short loops and skipping of activities. However, it still does not guarantee sound processed models.

Skip to 0 minutes and 40 secondsSo on the input data, it constructs internally distal matrices and discovers the pattern that is shown on the top and this pattern has certain issues such as soundness, and it's not able to replay all the behavior that we put in. So now, let's replicate this result in ProM, and after that, apply the heuristics miner of some real data. So with ProM open, let's load the partial event log that we used in example. And let's run the heuristics miner on this. Mine for heuristics net using heuristics miner. And when we apply this, we get several settings. For instance, this one is the frequency threshold, so now we only see things that we've observed at least five times.

Skip to 1 minute and 30 secondsAnd the dependency measure needs to be at least 90%. And those are some of the metrics that you can change. When we do this, we get this as a heuristics net. We can convert this to a petri net. And then we get exactly the result as we've seen in the lecture before. So we have a parallel split between activity D. And here is the unsung part where both branches can be enabled. So let's see how the heuristics miner does on real data. So let's delete this. And let's import the BPI challenge 2012 event log. Now, we can again run the heuristics miner.

Skip to 2 minutes and 19 secondsLet's keep the settings as they are by default. And then we get a slightly bigger process model. So in the heuristics net, you also see frequencies being added. And when you click an activity, you see its relation from the input. So it has only one activity as input. A submitted. And it has four possible output activities. And here, you can see in which pattern they occur. This gives you a bit more information on the different combinations of behavior that are observed. But let's convert it to a petri net, and see what the behavior is that this heuristics net describes.

Skip to 3 minutes and 5 secondsSo what this shows is that it's a rather big and complex process model with a lot of silent transitions moving the tokens around. So let's zoom in a little bit and then you see a lot of behavior, a lot of silent transitions, moving tokens around. But it's not easy to see what the actual behavior is. So let's try and filter this event log again before we apply the heuristics miner for a second run. So let's filter the log using the simple heuristics. And now, we can continue this. The only thing we actually want to do is only keep the activities that are part of the A and the O processes. So we keep shift, we click.

Skip to 3 minutes and 56 secondsWe now only take those events that relate to activities in the A or O subprocesses. So let's give it a meaningful name.

Skip to 4 minutes and 15 secondsSo I did some simple filtering. And if we now, again, apply the heuristics miner, heuristics miner using the same default settings, and then convert it to a petri net-- we get, although it's a smaller model, we still have a lot of silent transitions moving tokens around. And it's hard to see where they take a token from and where they put it back. So in the couple of next lectures, I will again show you other process discovery algorithms on the same data and I'll show you that there is actually a far simpler process model that can be discovered that still describes most of the behavior correctly. So the heuristics miner can produce a process possible.

Skip to 4 minutes and 59 secondsIt is able to filter some behavior away. But it still shows you a rather complex process model.

Skip to 5 minutes and 10 secondsSo now that you've seen the heuristics miner being applied on real life data, you've seen that although it produces reasonable models, it also has some issues regarding soundness, mainly. So in the next lecture, I will show you another process discovery algorithm that's able to better cope with real data and is also able to produce sound process models. So I hope to see you again in the next lecture.

Heuristics miner in ProM

In this lecture we show how to apply the Heuristics miner in ProM, as well as some basic settings and how to read heuristic nets.

We use the ‘Artificial - Loan Process - Partial.xes.gz’ event log in this video.

Share this video:

This video is from the free online course:

Introduction to Process Mining with ProM

Eindhoven University of Technology

Get a taste of this course

Find out what this course is like by previewing some of the course steps before you join:

  • Introduction

    Introduction to process mining: recognizing event data, what is process mining and what can process mining analyse.

  • Installing ProM lite
    Installing ProM lite

    In this step we show how to find and install the free and open source process mining tool ProM lite.

  • Using ProM lite
    Using ProM lite

    In this lecture we show the basic concepts and usage of ProM (lite): the resource, action and visualization perspectives.

  • Event logs
    Event logs

    In this lecture we explain what an event log is and how it is structured. We also explain the most common attributes found in an XES event log.

  • Event logs in ProM
    Event logs in ProM

    In this lecture we show you how you can load an event log in ProM and how you can get initial insights in the contents.

  • Converting a CSV file to an event log
    Converting a CSV file to an event log

    Most data is not recorded in event log format. In this video we explain how a CSV file can be converted to an event log.

  • Exploring event logs with the dotted chart
    Exploring event logs with the dotted chart

    After loading an event log into ProM it is important to apply the dotted chart to get initial process insights before process models are discovered.

  • Filtering event logs
    Filtering event logs

    Before good quality process models can be discovered the event log data needs to be filtered to contain only completed cases for instance.

Contact FutureLearn for Support