242:: The first step in process mining. The main goal of process discovery is to transform the event log into a process model. An event log can come from any data storage system that records the activities in an organisation along with the timestamps for those activities. Such an event log is required to contain a case id (a unique identifier to recognise the case to which activity belongs), activity description (a textual description of the activity executed), and timestamp of the activity execution. The result of process discovery is generally a process model which is representative of the event log. Such a process model can be discovered, for example, using techniques such as
150:
state-of-the-art in process mining, promote the use of process mining techniques and tools and stimulate new applications, play a role in standardization efforts for logging event data (e.g., XES), organize tutorials, special sessions, workshops, competitions, panels, and develop material (papers, books, online courses, movies, etc.) to inform and guide people new to the field. The IEEE Task Force on
Process Mining established the International Process Mining Conference (ICPM) series, lead the development of the IEEE XES standard for storing and exchanging event data, and wrote the Process Mining Manifesto which was translated into 16 languages.
284:: Helps in comparing an event log with an existing process model to analyse the discrepancies between them. Such a process model can be constructed manually or with the help of a discovery algorithm. For example, a process model may indicate that purchase orders of more than 1 million euros require two checks. Another example is the checking of the so-called "four-eyes" principle. Conformance checking may be used to detect deviations (compliance checking), or evaluate the discovery algorithms, or enrich an existing process model. An example is the extension of a process model with performance data, i.e., some
274:) based on an event log. Recently, process mining research has started targeting other perspectives (e.g., data, resources, time, etc.). One example is the technique described in (Aalst, Reijers, & Song, 2005), which can be used to construct a social network. Nowadays, techniques such as "streaming process mining" are being developed to work with continuous online data that has to be processed on the spot.
804:, Beer, H., & Dongen, B. van (2005). Process Mining and Verification of Properties: An Approach based on Temporal Logic. In R. Meersman & Z. T. et al. (Eds.), On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005 (Vol. 3760, pp. 130–147). Springer-Verlag, Berlin.
321:
to check conformance, but rather to improve the performance of the existing model with respect to certain process performance measures. An example is the extension of a process model with performance data, i.e., some prior process model dynamically annotated with performance data. It is also possible
961:
Grigori, D., Casati, F., Dayal, U., & Shan, M. (2001). Improving
Business Process Quality through Exception Understanding, Prediction, and Prevention. In P. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of 27th international conference on Very
977:
zur
Muehlen, M., & Rosemann, M. (2000). Workflow-based Process Monitoring and Controlling – Technical and Organizational Issues. In R. Sprague (Ed.), Proceedings of the 33rd Hawaii international conference on system science (HICSS-33) (pp. 1–10). IEEE Computer Society Press, Los Alamitos,
331:
Process mining software helps organizations analyze and visualize their business processes based on data extracted from various sources, such as transaction logs or event data. This software can identify patterns, bottlenecks, and inefficiencies within a process, enabling organizations to improve
149:
was established in
October 2009 as part of the IEEE Computational Intelligence Society. This is a vendor-neutral organization aims to promote the research, development, education and understanding of process mining, make end-users, developers, consultants, and researchers aware of the
218:
on process mining. By the year 2018, nearly 30+ commercially available process mining tools were in the picture. The year 2019 earmarked the first process mining conference. Today we have over 35 vendors offering tools and techniques for process discovery and conformance checking.
222:
Process mining should be viewed as a bridge between data science and process science. Process mining focuses on transforming event log into a meaningful representation of the process which can lead to the formation of several data science and machine learning related problems.
141:
problems. After discovering a process model and aligning the event log, it is possible to create basic supervised and unsupervised learning problems. For example, to predict the remaining processing time of a running case or to identify the root causes of compliance problems.
66:
Process mining techniques are often used when no formal description of the process can be obtained by other approaches, or when the quality of existing documentation is questionable. For example, application of process mining methodology to the audit trails of a
124:
techniques. For example, process discovery techniques in the field of process mining try to discover end-to-end process models that are able to describe sequential, choice relation, concurrent and loop behavior. Conformance checking techniques are closer to
817:(2006a). Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. In C. Bussler et al. (Ed.), BPM 2005 Workshops (Workshop on Business Process Intelligence) (Vol. 3812, pp. 163–176). Springer-Verlag, Berlin.
955:. A Practitioner's Guide to Process Mining: Limitations of the Directly-Follows Graph. In International Conference on Enterprise Information Systems (Centeris 2019), volume 164 of Procedia Computer Science, pages 321-328. Elsevier, 2019.
296:
process model and analyses every choice in the process model. The event log is consulted for each option to see which information is typically available the moment the choice is made. Conformance checking has various techniques such as
1002:
Garcia, Cleiton dos Santos; Meincheim, Alex; et al. (2019). Process mining techniques and applications – A systematic mapping study». Expert
Systems with Applications. 133: 260–295. ISSN 0957-4174. doi:10.1016/j.eswa.2019.05.003
34:
that contain case id, a unique identifier for a particular process instance; an activity, a description of the event that is occurring; a timestamp; and sometimes other information such as resources, costs, and so on.
305:" that are used depending on the system needs.Then classical data mining techniques are used to see which data elements influence the choice. As a result, a decision tree is generated for each choice in the process.
190:" for conformance checking purposes. Apart from the mainstream techniques of process discovery and conformance checking, process mining branched out into multiple areas leading to the discovery and development of "
206:", a governing body was formed in the year 2009 that began to overlook the norms and standards related to process mining. Further techniques were developed for conformance checking which led to the publishing of "
985:(2006b). Decision Mining in ProM. In S. Dustdar, J. Faideiro, & A. Sheth (Eds.), International Conference on Business Process Management (BPM 2006) (Vol. 4102, pp. 420–425). Springer-Verlag, Berlin.
949:(2005). The ProM framework: A New Era in Process Mining Tool Support. In G. Ciardo & P. Darondeau (Eds.), Application and Theory of Petri Nets 2005 (Vol. 3536, pp. 444–454). Springer-Verlag, Berlin.
988:
Sayal, M., Casati, F., Dayal, U., & Shan, M. (2002). Business
Process Cockpit. In Proceedings of 28th international conference on very large data bases (VLDB’02) (pp. 880–883). Morgan Kaufmann.
968:
Ingvaldsen, J.E., & J.A. Gulla. (2006). Model Based
Business Process Mining. Journal of Information Systems Management, Vol. 23, No. 1, Special Issue on Business Intelligence, Auerbach Publications
569:
Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven
Business Process Management in Healthcare Settings [Leading Edge]. Technology and Society Magazine, IEEE, 32(4), 14-16.
942:
Jans, M., van der Werf, J.M., Lybaert, N., Vanhoof, K. (2011) A business process mining application for internal transaction fraud mitigation, Expert
Systems with Applications, 38 (10), 13351–13359
191:
85:
model(s) to understand whether the observations conform to a prescriptive or descriptive model. It is required that the event logs data be linked to a case ID, activities, and timestamps.
992:
933:, Dongen, B. van, Herbst, J., Maruster, L., Schimm, G., & Weijters, A. (2003). Workflow Mining: A Survey of Issues and Approaches. Data and Knowledge Engineering, 47 (2), 237–267.
971:
Kirchmer, M., Laengle, S., & Masias, V. (2013). Transparency-Driven
Business Process Management in Healthcare Settings . Technology and Society Magazine, IEEE, 32(4), 14-16.
761:
Agrawal, R., Gunopulos, D., & Leymann, F. (1998). Mining Process Models from Workflow Logs. In Sixth international conference on extending database technology (pp. 469–483).
752:, Weijters, A., & Maruster, L. (2004). Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering, 16 (9), 1128–1142.
770:
Cook, J., & Wolf, A. (1998). Discovering Models of Software Processes from Event-Based Data. ACM Transactions on Software Engineering and Methodology, 7 (3), 215–249.
997:
Ross-Talbot S, The importance and potential of descriptions to our industry. Keynote at The 10th International Federated Conference on Distributed Computing Techniques
779:
Datta, A. (1998). Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches. Information Systems Research, 9 (3), 275–301.
199:
863:
974:
zur Muehlen, M. (2004). Workflow-based Process Controlling: Foundation, Design and Application of workflow-driven Process Information Systems. Logos, Berlin.
958:
Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., & Shan, M. (2004). Business Process Intelligence. Computers in Industry, 53 (3), 321–343.
372:
also provided a list of products of best process mining tools for 2024 and released the updated 2024 Gartner® Magic Quadrant™ for Process Mining Platforms:
317:
model. The model is extended with additional performance information such as processing times, cycle times, waiting times, costs, etc., so that the goal is
590:
579:
1008:
van der Aalst, W.M.P. and Berti A. Discovering Object-Centric Petri Nets. Fundamenta Informaticae, 175(1-4):1-40, 2020. doi:10.3233/FI-2020-1946
202:" in the year 2005 and 2006 respectively. In the year 2007, the first-ever commercial process mining company "Futura Pi" was established. The "
965:
IDS Scheer. (2002). ARIS Process Performance Manager (ARIS PPM): Measure, Analyze and Optimize Your Business Process Performance (whitepaper).
991:
Huser V, Starren JB, EHR Data Pre-processing Facilitating Process Mining: an Application to Chronic Kidney Disease. AMIA Annu Symp Proc 2009
905:
Carmona, J., van Dongen, B.F., Solti, A., Weidlich, M. (2018). Conformance Checking: Relating Processes and Models. Springer Verlag, Berlin (
79:
in a hospital can result in models describing processes of organizations. Event log analysis can also be used to compare event logs with
939:, Reijers, H., & Song, M. (2005). Discovering Social Networks from Event Logs. Computer Supported Cooperative work, 14 (6), 549–593.
247:
175:
792:(2003). Rediscovering Workflow Models from Event-Based Data using Little Thumb. Integrated Computer-Aided Engineering, 10 (2), 151–162.
393:
162:. Thus began a new field of research that emerged under the umbrella of techniques related to data science and process science at the
22:
is a family of techniques used to analyze event data in order to understand and improve operational processes. Part of the fields of
551:
924:
910:
899:
888:
672:
591:
Symeon Christodoulou, Raimar Scherer (2016). eWork and eBusiness in Architecture, Engineering and Construction: ECPPM 2016
322:
to extend process models with additional information such as decision rules and organisational information (e.g., roles).
259:
163:
568:
828:
919:(2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Verlag, Berlin (
580:
Luis M. Camarinha-Matos, Frederick Benaben, Willy Picard (2015). Risks and Resilience of Collaborative Networks
538:
521:
302:
93:
894:
Reinkemeyer, L. (2020). Process Mining in Action: Principles, Use Cases and Outlook. Springer Verlag, Berlin (
656:
IEEE Standard for eXtensible Event Stream (XES) for Achieving Interoperability in Event Logs and Event Streams
195:
97:
146:
89:
72:
1004:
335:
In March 2023 The Analytics Insight Magazine identified top 5 process mining software companies for 2023:
158:
The term "process mining" was first coined in a research proposal written by the Dutch computer scientist
1023:
is the annual international process mining conference organized by the IEEE Task Force on Process Mining.
411:
166:
in 1999. In the early days, process mining techniques were often convoluted with the techniques used for
101:
27:
210:" in the year 2010. In 2011, the first-ever process mining book was published. Further along in 2014, a
1009:
416:
271:
237:
105:
68:
76:
1058:
178:" was introduced in the research papers. Further along the link more powerful algorithms such as
174:
was developed. The very next year, in 2001, a much similar algorithm based on heuristics called "
138:
121:
254:. Many established techniques exist for automatically constructing process models (for example,
207:
849:
170:. In the year 2000, the very first practically applicable algorithm for process discovery, "
421:
279:
183:
8:
1042:
167:
129:
than to traditional learning approaches. However, process mining can be used to generate
31:
456:
298:
187:
182:
were developed for process discovery. As the field of process mining began to evolve,
982:
952:
946:
936:
930:
920:
916:
906:
895:
884:
880:
814:
801:
789:
749:
668:
501:
481:
159:
81:
332:
their operational efficiency, reduce costs, and enhance their customer experience.
998:
660:
461:
451:
431:
288:
process model is used to project the potential bottlenecks. Another example is the
263:
130:
113:
100:) illustrate the interest in supporting diagnosis functionality in the context of
664:
505:
485:
441:
251:
243:
179:
171:
654:
1052:
267:
721:
436:
186:
became an integral part of it. The year 2004 earmarked the development of "
126:
23:
883:(2016). Process Mining: Data Science in Action. Springer Verlag, Berlin (
446:
356:
134:
117:
864:"Key Takeaways: 2024 Gartner Magic Quadrant for Process Mining Tools"
255:
1032:
426:
215:
112:
information systems). Process mining is different from mainstream
376:
369:
339:
1026:
962:
Large Data Bases (VLDB’01) (pp. 159–168). Morgan Kaufmann.
945:
Dongen, B. van, Medeiros, A., Verbeek, H., Weijters, A., &
387:
344:
1038:
1020:
628:
362:
695:
211:
38:
There are three main classes of process mining techniques:
292:
described in (Rozinat & Aalst, 2006b), which takes an
602:
381:
350:
231:
There are three categories of process mining techniques.
203:
1029:
at Eindhoven University of Technology, the Netherlands.
629:"International Process Mining Conference (ICPM) series"
702:. IEEE Task Force on Process Mining. 11 November 2016
552:"Gartner Top 10 Strategic Technology Trends for 2020"
153:
829:"Top 5 Process Mining Software Companies for 2023"
1050:
607:Home page of the task force on process mining
522:"Automated Business Process Discovery (ABPD)"
500:
480:
88:Contemporary management trends such as BAM (
326:
728:. IEEE Task Force on Process Mining. 2011
850:"Best Process Mining Tools Reviews 2024"
745:
743:
1021:International Process Mining Conference
826:
633:Home page of the ICPM conference series
30:, process mining is generally built on
1051:
507:Process Mining: Data Science in Action
487:Process Mining: Data Science in Action
16:Data mining technique using event logs
740:
208:Alignment-based conformance checking
635:. IEEE Task Force on Process Mining
609:. IEEE Task Force on Process Mining
603:"IEEE Task Force on Process Mining"
56:utomated business process discovery
13:
874:
246:(a didactically driven approach),
14:
1070:
1014:
154:History and place in data science
856:
842:
820:
807:
795:
782:
773:
764:
755:
714:
696:"eXtensible Event Stream (XES)"
688:
647:
621:
595:
584:
573:
562:
544:
514:
494:
474:
303:streaming conformance checking
94:business operations management
1:
1035:at Ghent University, Belgium.
700:eXtensible Event Stream (XES)
467:
353:Signavio Process Intelligence
226:
98:business process intelligence
71:, the transaction logs of an
665:10.1109/IEEESTD.2016.7740858
390:Business Automation Platform
147:Task Force on Process Mining
90:business activity monitoring
73:enterprise resource planning
7:
412:Business Process Management
405:
106:workflow management systems
102:business process management
61:
10:
1075:
722:"Process Mining Manifesto"
659:. ieee. 11 November 2016.
77:electronic patient records
69:workflow management system
50:. In the past, terms like
726:Process Mining Manifesto
313:: Used when there is an
1039:Process mining research
1033:Process mining research
1027:Process mining research
831:. The Analytics Insight
327:Process mining software
139:artificial intelligence
122:artificial intelligence
827:Zaveria (2023-03-26).
214:course was offered by
204:IEEE task force on PM
200:organizational mining
788:Weijters, A., &
528:. Gartner, Inc. 2015
422:Conformance Checking
310:Performance analysis
280:Conformance checking
192:performance analysis
184:conformance checking
164:Eindhoven University
44:conformance checking
1043:University of Padua
981:Rozinat, A., &
813:Rozinat, A., &
427:Workflow Management
359:ARIS Process Mining
168:workflow management
48:process enhancement
539:Gartner Definition
502:van der Aalst, Wil
482:van der Aalst, Wil
457:Data visualization
299:token-based replay
188:Token-based replay
104:technology (e.g.,
58:(ABPD) were used.
28:process management
983:Aalst, W. van der
953:Aalst, W. van der
947:Aalst, W. van der
937:Aalst, W. van der
931:Aalst, W. van der
925:978-3-642-19344-6
917:Aalst, W. van der
911:978-3-319-99413-0
900:978-3-030-40171-9
889:978-3-662-49850-7
881:Aalst, W. van der
815:Aalst, W. van der
802:Aalst, W. van der
790:Aalst, W. van der
750:Aalst, W. van der
674:978-1-5044-2421-9
417:Process Discovery
264:activity diagrams
238:Process discovery
160:Wil van der Aalst
40:process discovery
1066:
868:
867:
860:
854:
853:
846:
840:
839:
837:
836:
824:
818:
811:
805:
799:
793:
786:
780:
777:
771:
768:
762:
759:
753:
747:
738:
737:
735:
733:
718:
712:
711:
709:
707:
692:
686:
685:
683:
681:
651:
645:
644:
642:
640:
625:
619:
618:
616:
614:
599:
593:
588:
582:
577:
571:
566:
560:
559:
548:
542:
537:
535:
533:
518:
512:
511:
498:
492:
491:
478:
462:Process analysis
452:Intention mining
432:Machine Learning
131:machine learning
114:machine learning
1074:
1073:
1069:
1068:
1067:
1065:
1064:
1063:
1049:
1048:
1017:
877:
875:Further reading
872:
871:
862:
861:
857:
848:
847:
843:
834:
832:
825:
821:
812:
808:
800:
796:
787:
783:
778:
774:
769:
765:
760:
756:
748:
741:
731:
729:
720:
719:
715:
705:
703:
694:
693:
689:
679:
677:
675:
653:
652:
648:
638:
636:
627:
626:
622:
612:
610:
601:
600:
596:
589:
585:
578:
574:
567:
563:
550:
549:
545:
531:
529:
520:
519:
515:
499:
495:
479:
475:
470:
442:Sequence mining
408:
329:
252:inductive miner
248:heuristic miner
244:alpha algorithm
229:
196:decision mining
180:inductive miner
176:Heuristic miner
156:
75:system, or the
64:
52:workflow mining
17:
12:
11:
5:
1072:
1062:
1061:
1059:Process mining
1047:
1046:
1036:
1030:
1024:
1016:
1015:External links
1013:
1012:
1011:
1006:
1000:
995:
989:
986:
979:
975:
972:
969:
966:
963:
959:
956:
950:
943:
940:
934:
928:
914:
903:
892:
876:
873:
870:
869:
866:. 13 May 2024.
855:
841:
819:
806:
794:
781:
772:
763:
754:
739:
713:
687:
673:
646:
620:
594:
583:
572:
561:
543:
513:
493:
472:
471:
469:
466:
465:
464:
459:
454:
449:
444:
439:
434:
429:
424:
419:
414:
407:
404:
403:
402:
399:
398:Scout Platform
396:
391:
385:
384:Process Mining
379:
367:
366:
360:
354:
348:
347:Process Mining
342:
328:
325:
324:
323:
306:
290:decision miner
275:
268:State diagrams
228:
225:
155:
152:
63:
60:
20:Process mining
15:
9:
6:
4:
3:
2:
1071:
1060:
1057:
1056:
1054:
1044:
1040:
1037:
1034:
1031:
1028:
1025:
1022:
1019:
1018:
1010:
1007:
1005:
1001:
999:
996:
994:
990:
987:
984:
980:
976:
973:
970:
967:
964:
960:
957:
954:
951:
948:
944:
941:
938:
935:
932:
929:
926:
922:
918:
915:
912:
908:
904:
901:
897:
893:
890:
886:
882:
879:
878:
865:
859:
851:
845:
830:
823:
816:
810:
803:
798:
791:
785:
776:
767:
758:
751:
746:
744:
727:
723:
717:
701:
697:
691:
676:
670:
666:
662:
658:
657:
650:
634:
630:
624:
608:
604:
598:
592:
587:
581:
576:
570:
565:
557:
553:
547:
540:
527:
523:
517:
509:
508:
503:
497:
489:
488:
483:
477:
473:
463:
460:
458:
455:
453:
450:
448:
445:
443:
440:
438:
435:
433:
430:
428:
425:
423:
420:
418:
415:
413:
410:
409:
400:
397:
395:
392:
389:
386:
383:
380:
378:
375:
374:
373:
371:
364:
361:
358:
355:
352:
349:
346:
343:
341:
338:
337:
336:
333:
320:
316:
312:
311:
307:
304:
300:
295:
291:
287:
283:
282:
281:
276:
273:
269:
265:
261:
260:BPMN diagrams
257:
253:
249:
245:
241:
240:
239:
234:
233:
232:
224:
220:
217:
213:
209:
205:
201:
197:
193:
189:
185:
181:
177:
173:
169:
165:
161:
151:
148:
143:
140:
136:
132:
128:
123:
119:
115:
111:
110:process-aware
107:
103:
99:
95:
91:
86:
84:
83:
78:
74:
70:
59:
57:
53:
49:
45:
41:
36:
33:
29:
25:
21:
858:
844:
833:. Retrieved
822:
809:
797:
784:
775:
766:
757:
730:. Retrieved
725:
716:
704:. Retrieved
699:
690:
678:. Retrieved
655:
649:
637:. Retrieved
632:
623:
611:. Retrieved
606:
597:
586:
575:
564:
555:
546:
530:. Retrieved
525:
516:
506:
496:
486:
476:
437:Data Science
368:
334:
330:
318:
314:
309:
308:
293:
289:
285:
278:
277:
236:
235:
230:
221:
172:Alpha miner"
157:
144:
127:optimization
109:
96:), and BPI (
87:
80:
65:
55:
51:
47:
43:
39:
37:
24:data science
19:
18:
978:California.
526:Gartner.com
447:Data mining
357:Software AG
135:data mining
118:data mining
852:. Gartner.
835:2023-05-05
732:10 January
706:10 January
680:10 January
639:10 January
613:10 January
468:References
256:Petri nets
227:Categories
108:and other
532:6 January
145:The IEEE
1053:Category
1045:, Italy.
504:(2011).
484:(2016).
406:See also
394:Apromore
365:Timeline
315:a priori
294:a priori
286:a priori
216:Coursera
92:), BOM (
62:Overview
556:Gartner
377:Celonis
370:Gartner
340:Celonis
198:" and "
923:
909:
898:
887:
671:
388:UiPath
345:UiPath
270:, and
137:, and
120:, and
46:, and
363:ABBYY
250:, or
82:prior
54:and a
993:link
921:ISBN
907:ISBN
896:ISBN
885:ISBN
734:2021
708:2021
682:2021
669:ISBN
641:2021
615:2021
534:2015
401:ARIS
301:", "
272:EPCs
212:MOOC
194:", "
32:logs
26:and
1041:at
661:doi
382:IBM
351:SAP
319:not
1055::
927:).
913:).
902:).
891:).
742:^
724:.
698:.
667:.
631:.
605:.
554:.
524:.
266:,
262:,
258:,
133:,
116:,
42:,
838:.
736:.
710:.
684:.
663::
643:.
617:.
558:.
541:.
536:.
510:.
490:.
297:"
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.