Conformance checking

Conformance checking

Conformance checking is a process mining technique that takes an existing process model and compares it with an event log of the same process.[1] Conformance checking can be used to check if reality, as recorded in the log, conforms to the model and vice versa. For instance, there may be a process model indicating that purchase orders of more than one million Euro require two checks. Analysis of the event log will show whether this rule is followed or not. Another example is the checking of the socalled “four-eyes” principle stating that particular activities should not be executed by one and the same person. By scanning the event log using a model specifying these requirements, one can discover potential cases of fraud. Hence, conformance checking may be used to detect, locate and explain deviations, and to measure the severity of these deviations.

Contents

Overview

Unlike process discovery, conformance checking takes both a model and event log as a starting point. While conducting a conformance check the behavior of a process model and the behavior recorded in an event log are compared to find commonalities and discrepancies. Such analysis may result in global conformance measures (e.g., 85% of the cases in the event log can be replayed by the model) and local diagnostics (e.g., activity x was executed 15 times although this was not allowed according to the model). The interpretation of non-conformance depends on the purpose of the model. If the model is intended to be descriptive, then discrepancies between model and log indicate that the model needs to be improved to capture reality better. If the model is normative, then such discrepancies may be interpreted in two ways. Some of the discrepancies found may expose undesirable deviations, i.e., conformance checking signals the need for a better control of the process. Other discrepancies may reveal desirable deviations. For instance, workers may deviate to serve the customers better or to handle circumstances not foreseen by the process model.

Techniques and Metrics

Most conformance checking techniques are based on the principle of Replay, i.e., the event log is replayed on the process model. For example, while replaying an event log on a Petri net, one can count the number of missing and remaining tokens. Alternatively, one can try to optimize the mapping of traces onto models by introducing costs associated to skipping, ingnoring, or swapping events in the log and/or model.

Typical conformance metrics are:

  • Fitness. A model with good fitness allows for the behavior seen in the event log. A model has a perfect fitness if all traces in the log can be replayed by the model from beginning to end. There are various ways of defining fitness. It can be defined at the case level, e.g., the fraction of traces in the log that can be fully replayed. It can also be defined at the event level, e.g., the fraction of events in the log that are indeed possible according to the model.
  • Simplicity. The simplicity dimension refers to Occam’s Razor. In the context of process mining this means that the simplest process model that can explain the behavior seen in the log, is the best model. The complexity of the model could be defined by the number of nodes and arcs in the underlying graph. Also more sophisticated metrics can be used, e.g., metrics that take the structuredness or entropy of the model into account.
  • Fitness and simplicity alone are not adequate as metrics. The process model may be overfitting or underfitting.

References

  1. ^ Process Mining Webpage (www.processmining.org)

Further reading

  • Aalst, W. van der (2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Verlag, Berlin (ISBN 978-3-642-19344-6).
  • A. Rozinat and Aalst, W. van der (2008). Conformance Checking of Processes Based on Monitoring Real Behavior. Information Systems, 33(1):64–95.
  • A. Adriansyah, B.F. van Dongen, and Aalst, W. van der (2010). Towards Robust Conformance Checking. In J. Su and M. zur Muehlen, editors, BPM 2010 Workshops, Proceedings of the Sixth Workshop on Business Process Intelligence (BPI2010), Lecture Notes in Business Information Processing. Springer-Verlag, Berlin.
  • J. Munoz-Gama and J.Carmona (2010). A Fresh Look at Precision in Process Conformance, IN BPM 2010, Lecture Notes in Computer Science, Volume 6336, 211-226.

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Process mining — techniques allow for the analysis of business processes based on event logs. They are often used when no formal description of the process can be obtained by other means, or when the quality of an existing documentation is questionable. For… …   Wikipedia

  • Apache C++ Standard Library — Infobox Software name = Apache C++ Standard Library caption = developer = Apache Software Foundation latest release version = 4.2.1 latest release date = release date|2008|5|1 latest preview version = latest preview date = operating system =… …   Wikipedia

  • Static code analysis — is the analysis of computer software that is performed without actually executing programs built from that software (analysis performed on executing programs is known as dynamic analysis). In most cases the analysis is performed on some version… …   Wikipedia

  • Static program analysis — This article is about certain software quality assessment methods. For the statistical method, see Static analysis. Static program analysis (also Static code analysis or SCA) is the analysis of computer software that is performed without actually …   Wikipedia

  • Business Process Execution Language — As defined in the abstract of the Web Services Business Process Execution Language OASIS Standard WS BPEL 2.0, WS BPEL (or BPEL for short) is a language for specifying business process behavior based on Web Services. Processes in WS BPEL export… …   Wikipedia

  • MPEG-4 — is a method of defining compression of audio and visual (AV) digital data. It was introduced in late 1998 and designated a standard for a group of audio and video coding formats and related technology agreed upon by the ISO/IEC Moving Picture… …   Wikipedia

  • DeviceNet — is a network system used in the automation industry to interconnect control devices for data exchange. It uses Controller Area Network as the backbone technology and defines an application layer to cover a range of device profiles. Typical… …   Wikipedia

  • ISO 9000 — is a family of standards for quality management systems. ISO 9000 is maintained by ISO, the International Organization for Standardization and is administered by accreditation and certification bodies. Some of the requirements in ISO 9001 (which… …   Wikipedia

  • Google Chrome — This article is about the web browser. For the operating system, see Google Chrome OS. Google Chrome …   Wikipedia

  • National Conference on Weights and Measures — The National Conference on Weights and Measures (NCWM) is a not for profit corporation dedicated to developing and regulating the United States technical standards for weights and measures. The organization s official mission is to advance a… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”