Business process discovery explained

Business process discovery (BPD) related to business process management and process mining is a set of techniques that manually or automatically construct a representation of an organisations' current business processes and their major process variations. These techniques use data recorded in the existing organisational methods of work, documentations, and technology systems that run business processes within an organisation. The type of data required for process discovery is called an event log. Any record of data that contains the case id (a unique identifier that is helpful in grouping activities belonging to the same case), activity name (description of the activity taking place), and timestamp. Such a record qualifies for an event log and can be used to discover the underlying process model. The event log can contain additional information related to the process, such as the resources executing the activity, the type or nature of the events, or any other relevant details. Process discovery aims to obtain a process model that describes the event log as closely as possible. The process model acts as a graphical representation of the process (Petri nets, BPMN, activity diagrams, state diagrams, etc.). The event logs used for discovery could contain noise, irregular information, and inconsistent/incorrect timestamps. Process discovery is challenging due to such noisy event logs and because the event log contains only a part of the actual process hidden behind the system. The discovery algorithms should solely depend on a small percentage of data provided by the event logs to develop the closest possible model to the actual behaviour.

Process discovery techniques

Various algorithms have been developed over the years for the discovering the process model using an event log:

Application

Business Process Discovery complements and builds upon the work in many other fields.

Resources are allocated based on the process category with resources first dedicated to red processes, then yellow processes and finally green processes. In the event that resources become limited, resources are first withheld from Green Processes, then Yellow Processes. Resources are only withheld from Red Processes if failure to achieve outcomes/goals is acceptable.

The purpose and example

A small example may illustrate the Business Process Discovery technology that is required today. Automated Business Process Discovery tools capture the required data, and transform it into a structured dataset for the actual diagnosis; A major challenge is the grouping of repetitive actions from the users into meaningful events. Next, these Business process discovery tools propose probabilistic process models. Probabilistic behavior is essential for the analysis and the diagnosis of the processes. The following shows an example where a probabilistic repair-process is recovered from user actions. The "as-is" process model shows exactly where the pain is in this business. Five percent faulty repairs is a bad sign, but worse, the repetitive fixes that are needed to complete those repairs are cumbersome.

A deeper analysis of the "as-is" process data may reveal which are the faulty parts that are responsible for the overall behavior in this example. It may lead to the discovery of subgroups of repairs that actually need management focus for improvement.

In this case, it would become obvious that the faulty parts are also responsible for the repetitive fixes. Similar applications have been documented, such as a Healthcare Insurance Provider case where in 4 months the ROI of Business Process Analysis was earned from precisely comprehending its claims handling process and discovering the faulty parts.

History

Process models

The process discovery techniques applied to the event logs provide a graphical representation of a process. The result of a process discovery algorithm is generally a process model and statistics of the cases that are part of the event log. The representation and accuracy of the discovered model depend both on the technique used for the discovery and the type of visualization that is chosen.

See also

Further reading

Notes and References

  1. van der Aalst. W.. Weijters. T.. Maruster. L.. September 2004. Workflow mining: discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering. 16. 9. 1128–1142. 10.1109/TKDE.2004.47. 5282914. 1558-2191.
  2. Book: A.J.M.M., Weijters. Process mining with the HeuristicsMiner algorithm. 2006. Technische Universiteit Eindhoven. 1028695309.
  3. de Medeiros. A. K. A.. Weijters. A. J. M. M.. van der Aalst. W. M. P.. 2007-04-01. Genetic process mining: an experimental evaluation. Data Mining and Knowledge Discovery. en. 14. 2. 245–304. 10.1007/s10618-006-0061-7. 17840407. 1573-756X. free.
  4. Book: Carmona. Josep. Cortadella. Jordi. Kishinevsky. Michael. Business Process Management . A Region-Based Algorithm for Discovering Petri Nets from Event Logs . 2008. Dumas. Marlon. Reichert. Manfred. Shan. Ming-Chien. https://link.springer.com/chapter/10.1007/978-3-540-85758-7_26. Lecture Notes in Computer Science. 5240. en. Berlin, Heidelberg. Springer. 358–373. 10.1007/978-3-540-85758-7_26. 2117/130975. 978-3-540-85758-7. free.
  5. Book: Leemans. Sander J. J.. Fahland. Dirk. van der Aalst. Wil M. P.. Application and Theory of Petri Nets and Concurrency . Discovering Block-Structured Process Models from Event Logs - A Constructive Approach . 2013. Colom. José-Manuel. Desel. Jörg. https://link.springer.com/chapter/10.1007/978-3-642-38697-8_17. Lecture Notes in Computer Science. 7927. en. Berlin, Heidelberg. Springer. 311–329. 10.1007/978-3-642-38697-8_17. 978-3-642-38697-8.
  6. http://www.processmining.org Process Mining
  7. van der Aalst. Wil M.P.. 2019. A practitioner's guide to process mining: Limitations of the directly-follows graph. Procedia Computer Science. 164. 321–328. 10.1016/j.procs.2019.12.189. 1877-0509. free.
  8. Decomposing Petri Nets for Process Mining: A Generic Approach. Distributed and Parallel Databases. 2013. 10.1007/s10619-013-7127-5. Van Der Aalst. Wil M. P.. 31. 4. 471–507. 3364469.
  9. Kalenkova. Anna A.. van der Aalst. Wil M. P.. Lomazova. Irina A.. Rubin. Vladimir A.. 2015-10-20. Process mining using BPMN: relating event logs and process models. Software & Systems Modeling. 16. 4. 1019–1048. 10.1007/s10270-015-0502-0. 5459379. 1619-1366.