Contact FutureLearn for Support
Skip main navigation
We use cookies to give you a better experience, if that’s ok you can close this message and carry on browsing. For more info read our cookies policy.
We use cookies to give you a better experience. Carry on browsing if you're happy with this, or read our cookies policy for more information.

Skip to 0 minutes and 10 secondsHi and welcome to the closing lecture of week one. In the beginning of week one, we've seen that event data is everywhere. Whenever you use your bank card, whenever you send or receive an email or telephone call, event data is recorded. Usually, nowadays also smart TVs record how they are used. As your smartphone, of course, also keeps track on how it's used, and what apps are used, when and where. In more detailed, we've discussed the public transport system, using public transport cards, and checking in and out, et cetera. This also creates a lot of event data that can be analyzed. And of course, visiting websites, even future learn. They also track a lot of event data that can be analyzed.

Skip to 0 minutes and 54 secondsAnd all this can be used to improve the products. So, let's look at a bit more detail as public transport process and what events it creates. For instance, when you buy your public transport card, it can be recorded when you buy it, where you buy it, and what card numbers attached to this. And also for instance how much you put on there. And then, whenever you check in or out, or whatever your top up, another event is created. But also, contains where you did this and went. And using this we can reconstruct a process. So, in the public transport example, an event log consists of all the events related to a particular card.

Skip to 1 minute and 42 secondsAnd in this example, card 1337 contain several events. But also the card itself catch some properties. For instance, that it is prepaid. And then, each event contains some information. As we've seen before, the activity name, when and where it happened, et cetera, et cetera. And this together forms an event log. But also, we have other events and also other traces on this example card, for which we record events. And all this together forms an event log. So, one of the key ingredients for an event log? Well, we have a case notion and a case identifier. And the case could have a description and other attributes. So, in the public transport example, a public transport card was our case.

Skip to 2 minutes and 32 secondsWhat happens to this card, where is it used, and when. And then each event contains the event name, what the activity that was executed, the timestamp when it was executed, but also the state. So, and event is an atomic observation. So, if I start and stop a particular activity, and, for instance buying the card could be recorded when I start buying it and when I stop, this would result in two events. The start and the completion of buying public transport card. Each having their own timestamp and maybe even resource. And, so in any event log, we have to case notion and event notion. I've also shown you that this can be stored in the XES event log format.

Skip to 3 minutes and 19 secondsAnd then, each case results in the trace of events. For a trace, we mainly have the ID, or the name, of the trace. And this is stored in the concept semicolon name attribute. For each event, we also have several attributes. Also the name or activity that is observed. And this is also stored in the concept semicolon name attribute. Then the timestamp when it occurred, but also the resource is recorded. That's recording who executed activity. And finally, in the life cycle semicolon transition attribute, it's recorded what type of action was performed. So, was it the start or the completion transition of a particular activity. However, usually we don't find data in ready-made event log format.

Skip to 4 minutes and 7 secondsSo, usually it's in a tabular format, like this. And then we have to be able to detect which columns relate to which concepts in the event log. So, in this example, for instance, the case ID is the trace notion. Each row is an event and in the case it's stored for which card, or case, or trace, it's recorded. And the second column, the action column, that contains actually the event name, which activity was executed. In the third column, the timestamp of the event is recorded. And these are the three key elements of an event log. This is the minimal requirement you need to do process mining. However, you can include more information.

Skip to 4 minutes and 49 secondsSo, for instance, in this table, also the location and the card is recorded. You can include this in your events and may be used for further analysis. I've also shown you that we will use ProM lite as our process mining tool. So, by now you have installed and use it for a couple of times, and then the remainder of this course we will show you which plugins you can use further to do process mining. In ProM lite, can be seen as a Swiss Army knife. It has some plug-ins, and then ProM lite has particular selection of over 100 plug-ins is included, and each plugin provides a particular feature.

Skip to 5 minutes and 28 secondsAnd together this forms a complete suite of process mining analysis that you can do. I've also show you that ProM mainly evolves around three main views. You have the object view, where you can see whatever you have imported or created using plugins. The action view, where you can use objects to create other objects. And the visualization view, where you can look at the objects and inspect them. So, for instance, though the chart is a visualization of an event log object. And using these three views you can create new objects and perform a particular analysis. I've already mentioned it, we've also discussed a dotted chart, which is shown particular view of the event log.

Skip to 6 minutes and 16 secondsAnd, this also explains very nicely several ways in which you can filter the event log, which we also have discussed. So, you can decide to keep or remove certain traces, but you can also do this on the event level. So, which events, based on activity included, or the time frame, which activities or events do you want to keep or remove. And this together, allows you to focus your analysis on a particular type of case, or a particular type of event. In this week, we've also seen the process mining framework and its positioning relative to this software system. So, the software system is the public transport card, or your phone or a laptop. And the world interacts with the software system.

Skip to 6 minutes and 58 secondsYou and me are all the software system. The process model is used to model how this software systems should interact with the world. And while it's interacting, events logs are created. And that's the data that we use as input, and then we have to transform to event logs at some point. And process mining bridges the gap between this event data and the process models. So, using solely the event data, we can discover a process model. And we will discuss this in detail next week. Given a process model, either discovered or actually the one used to configure the system, we can do conformers checking. We can replay the data on top of this process model and indicate where deviation exist.

Skip to 7 minutes and 42 secondsFinally, we can also extend a given process model. For instance, by projecting performance information on top of it, or by showing where deviations or conformers deviations exist.

Skip to 7 minutes and 59 secondsDuring this course we look over several process mining activities. So, we will start with the extraction phase, then we discussed data preprocessing, which we already did in this week. And next week we will discuss several process mining techniques, discovery, for instance, the can help you in analyzing the process. We will also learn you the crucial part that's evaluating the results. How does the discover process model, for instance, relates to the observed data. And is the process model correct. And this loop has to be executed several times until you get results that you can summarize, and that can lead to process improvement. So, I hope to see you again in the next week.

Week 1 closing

In this video we recap the contents of Week 1.

Share this video:

This video is from the free online course:

Introduction to Process Mining with ProM

Eindhoven University of Technology

Course highlights Get a taste of this course before you join:

  • Introduction

    Introduction to process mining: recognizing event data, what is process mining and what can process mining analyse.

  • Installing ProM lite
    Installing ProM lite

    In this step we show how to find and install the free and open source process mining tool ProM lite.

  • Using ProM lite
    Using ProM lite

    In this lecture we show the basic concepts and usage of ProM (lite): the resource, action and visualization perspectives.

  • Event logs
    Event logs

    In this lecture we explain what an event log is and how it is structured. We also explain the most common attributes found in an XES event log.

  • Event logs in ProM
    Event logs in ProM

    In this lecture we show you how you can load an event log in ProM and how you can get initial insights in the contents.

  • Converting a CSV file to an event log
    Converting a CSV file to an event log

    Most data is not recorded in event log format. In this video we explain how a CSV file can be converted to an event log.

  • Exploring event logs with the dotted chart
    Exploring event logs with the dotted chart

    After loading an event log into ProM it is important to apply the dotted chart to get initial process insights before process models are discovered.

  • Filtering event logs
    Filtering event logs

    Before good quality process models can be discovered the event log data needs to be filtered to contain only completed cases for instance.