Page 30 -
P. 30

12                                                     1  Introduction

            to the handling of requests for compensation. Each line presents one event. Note
            that events are already grouped per case. Case 1 has five associated events. The first
            event of Case 1 is the execution of activity register request by Pete on December
            30th, 2010. Table 1.1 also shows a unique id for this event: 35654423. This is merely
            used for the identification of the event, e.g., to distinguish it from event 35654483
            that also corresponds to the execution of activity register request (first event of sec-
            ond case). Table 1.1 shows a date and a timestamp for each event. In some event
            logs, this information is more coarse-grained and only a date or partial ordering of
            events is given. In other logs, there may be more elaborate timing information also
            showing when the activity was started, when it was completed, and sometimes even
            when it was offered to the resource. The times shown in Table 1.1 should be inter-
            preted as completion times. In this particular event log, activities are considered to
            be atomic and the table does not reveal the duration of activities. In the table, each
            event is associated to a resource. In some event logs, this information will be miss-
            ing. In other logs, more detailed information about resources may be stored, e.g., the
            role a resource has or elaborate authorization data. The table also shows the costs as-
            sociated to events. This is an example of a data attribute. There may be many other
            data attributes. For example, in this particular example it would be interesting to
            record the outcome of the different types of examinations and checks. Another data
            element that could be useful for analysis is the amount of compensation requested.
            This could be an attribute of the whole case or stored as an attribute of the register
            request event.
              Table 1.1 illustrates the typical information present in an event log. Depending
            on the process mining technique used and the questions at hand, only part of this in-
            formation is used. The minimal requirements for process mining are that any event
            can be related to both a case and an activity and that events within a case are or-
            dered. Hence, the “case id” and “activity” columns in Table 1.1 represent the bare
            minimum for process mining. By projecting the information in these two columns,
            we obtain the more compact representation shown in Table 1.2. In this table, each
            case is represented by a sequence of activities also referred to as trace. For clarity,
            the activity names have been transformed into single-letter labels, e.g., a denotes
            activity register request.
              Process mining algorithms for process discovery can transform the information
            showninTable 1.2 into process models. For instance, the basic α-algorithm [103]
            discovers the Petri net described earlier when providing it with the input data in
            Table 1.2. Figure 1.5 shows the resulting model with the compact labels just intro-
            duced. It is easy to check that all six traces in Table 1.2 are possible in the model.
            Let us replay the trace of the first case— a,b,d,e,h —to show that the trace “fits”
            (i.e., conforms to) the model. In the initial marking shown in Fig. 1.5, a is indeed
            enabled because of the token in start. After firing a places c1 and c2 are marked,
            i.e., both places contain a token. b is enabled at this marking and its execution re-
            sults in the marking with tokens in c2 and c3. Now we have executed  a,b  and
            the sequence  d,e,h  remains. The next event d is indeed enabled and its execution
            results in the marking enabling e (tokens in places c3 and c4). Firing e results in the
            marking with one token in c5. This marking enables the final event h in the trace.
   25   26   27   28   29   30   31   32   33   34   35