Inductive miner explained

Inductive miner belongs to a class of algorithms used in process discovery.[1] Various algorithms proposed previously give process models of slightly different type from the same input. The quality of the output model depends on the soundness of the model. A number of techniques such as alpha miner, genetic miner, work on the basis of converting an event log into a workflow model, however, they do not produce models that are sound all the time. Inductive miner relies on building a directly follows graph from event log and using this graph to detect various process relations.[2]

__TOC__

Definitions

A directly follows graph is a directed graph that connects an activity A to another activity B if and only if activity B occurs chronologically right after activity A for any given case in the respective event log. A directly follows graph is represented mathematically by:

G(L)=(AL,L,

s
A
L,
e
A
L)

Where

AL=Nodes

(activities in the log)

L=edges

(directly follows relation)
s
A
L

=Startnode

e
A
L

=Endnode

The inductive miner technique relies on the detection of various cuts on the directly follows graph created using the event log. The core idea behind inductive miner lies in the unique methodology of discovering various divisions of the arcs in the directly follows graph, and using the smaller components after division to represent the execution sequence of the activities.The inductive miner algorithm uses the directly follows graph to detect one of the following cuts.

( x ,A1,...,An)

is an exclusive OR cut iff:

\foralli,j\in\{1,..,n\}(\foralla\inAi,b\inAj(ij\neg(aLb)))

(L,A1,..,An)

is a sequence cut iff:

\foralli,j\in\{1,..,n\}(\foralla\inAi,b\inAj(aLb\land\neg(bLa)) )

(\land,A1,..,An)

is a parallel cut iff:

-

\foralli\in\{1,..,n\}(Ai\cap

s
A
L

\emptyset\landAi\cap

e
A
L

\emptyset)

-

\foralli,j\in\{1,..,n\}(\foralla\inAi,b\inAj(ijaLb))

(\circlearrowleft,A1,..,An)

is a redo loop cut iff:

-

n\geq2

-

A1\supseteq

s
A
L

\cup

e
A
L

-

\foralli,j\in\{2,..,n\}(\foralla\inAi,b\inAj(ij\neg(aLb)))

-

\foralli\in\{2,..,n\}(\forallb\inAi(\existsa\in

e
A
L

(aLb))(\foralla\in

e
A
L

(aLb)))

-

\foralli\in\{2,..,n\}(\forallb\inAi(\existsa\in

s
A
L

(bLa))(\foralla\in

s
A
L

(bLa)))

Types

  1. Inductive miner with fall through: The complex event log sometimes would make it impossible to detect any cuts using the above techniques. In that case, there are additional fall throughs that can be applied to obtain better representation of process tree instead of a flower model.[3] [4]
  2. Inductive miner frequency-based: The less frequent relations in the event log sometimes creates problems in detecting any type of cuts. In that case, the directly follows relations below a certain threshold are removed from the directly follows graph and the resultant graph is used for detecting the cuts.[5]
  3. Inductive miner for big data: This includes an improvement on the existing inductive miner to handle big data sets.

References

  1. Process Discovery Capturing the Invisible. IEEE Computational Intelligence Magazine. Wil van der Aalst. March 2010. 5. 28–41. 10.1109/MCI.2009.935307. 14520822 .
  2. Leemans. Sander J. J.. Fahland. Dirk. van der Aalst. Wil M. P.. 2013. Colom. José-Manuel. Desel. Jörg. Discovering Block-Structured Process Models from Event Logs - A Constructive Approach. Application and Theory of Petri Nets and Concurrency. Lecture Notes in Computer Science. 7927. en. Berlin, Heidelberg. Springer. 311–329. 10.1007/978-3-642-38697-8_17. 978-3-642-38697-8.
  3. 1610.07989. Ghawi. Raji. Process Discovery using Inductive Miner and Decomposition. 2016. cs.AI.
  4. Book: Leemans, S. J. J.. 2017-05-09. Robust process mining with guarantees - SIKS Dissertation Series No. 2017-12. 978-90-386-4257-4. TU/e - Eindhoven University of Technology.
  5. Leemans. Sander J. J.. Fahland. Dirk. van der Aalst. Wil M. P.. 2014. Lohmann. Niels. Song. Minseok. Wohed. Petia. Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour. Business Process Management Workshops. Lecture Notes in Business Information Processing. 171. en. Cham. Springer International Publishing. 66–78. 10.1007/978-3-319-06257-0_6. 978-3-319-06257-0.