Alpha Algorithm: Limitations

Similar documents
Alpha Algorithm: A Process Discovery Algorithm

NON-DETERMINISTIC FSA

CS311 Computational Structures Regular Languages and Regular Grammars. Lecture 6

Chapter 4 State-Space Planning

Nondeterministic Automata vs Deterministic Automata

12.4 Similarity in Right Triangles

Chapter 2 Finite Automata

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

Project 6: Minigoals Towards Simplifying and Rewriting Expressions

1 Nondeterministic Finite Automata

Regular expressions, Finite Automata, transition graphs are all the same!!

1 PYTHAGORAS THEOREM 1. Given a right angled triangle, the square of the hypotenuse is equal to the sum of the squares of the other two sides.

Automatic Synthesis of New Behaviors from a Library of Available Behaviors

Compiler Design. Spring Lexical Analysis. Sample Exercises and Solutions. Prof. Pedro C. Diniz

System Validation (IN4387) November 2, 2012, 14:00-17:00

The University of Nottingham SCHOOL OF COMPUTER SCIENCE A LEVEL 2 MODULE, SPRING SEMESTER MACHINES AND THEIR LANGUAGES ANSWERS

Petri Nets. Rebecca Albrecht. Seminar: Automata Theory Chair of Software Engeneering

Counting Paths Between Vertices. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs

Algorithm Design and Analysis

Nondeterministic Finite Automata

378 Relations Solutions for Chapter 16. Section 16.1 Exercises. 3. Let A = {0,1,2,3,4,5}. Write out the relation R that expresses on A.

Regular languages refresher

Finite State Automata and Determinisation

State Minimization for DFAs

Resources. Introduction: Binding. Resource Types. Resource Sharing. The type of a resource denotes its ability to perform different operations

Algorithm Design and Analysis

Learning Partially Observable Markov Models from First Passage Times

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Behavior Composition in the Presence of Failure

Compiler Design. Fall Lexical Analysis. Sample Exercises and Solutions. Prof. Pedro C. Diniz

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3

Test Generation from Timed Input Output Automata

Designing finite automata II

Bases for Vector Spaces

Abstraction of Nondeterministic Automata Rong Su

Spacetime and the Quantum World Questions Fall 2010

22: Union Find. CS 473u - Algorithms - Spring April 14, We want to maintain a collection of sets, under the operations of:

Model Reduction of Finite State Machines by Contraction

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true.

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

Homework 4. 0 ε 0. (00) ε 0 ε 0 (00) (11) CS 341: Foundations of Computer Science II Prof. Marvin Nakayama

First Midterm Examination

Minimal DFA. minimal DFA for L starting from any other

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

CSCI 340: Computational Models. Transition Graphs. Department of Computer Science

Technische Universität München Winter term 2009/10 I7 Prof. J. Esparza / J. Křetínský / M. Luttenberger 11. Februar Solution

CS 275 Automata and Formal Language Theory

Homework 3 Solutions

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.)

CS 573 Automata Theory and Formal Languages

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata

p-adic Egyptian Fractions

FABER Formal Languages, Automata and Models of Computation

Comparing the Pre-image and Image of a Dilation

Bayesian Networks: Approximate Inference

Convert the NFA into DFA

Graph States EPIT Mehdi Mhalla (Calgary, Canada) Simon Perdrix (Grenoble, France)

TIME AND STATE IN DISTRIBUTED SYSTEMS

STRUCTURE OF CONCURRENCY Ryszard Janicki. Department of Computing and Software McMaster University Hamilton, ON, L8S 4K1 Canada

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Unfoldings of Networks of Timed Automata

Formal Languages and Automata

Discrete Structures, Test 2 Monday, March 28, 2016 SOLUTIONS, VERSION α

Engr354: Digital Logic Circuits

Ling 3701H / Psych 3371H: Lecture Notes 9 Hierarchic Sequential Prediction

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Activities. 4.1 Pythagoras' Theorem 4.2 Spirals 4.3 Clinometers 4.4 Radar 4.5 Posting Parcels 4.6 Interlocking Pipes 4.7 Sine Rule Notes and Solutions

The Word Problem in Quandles

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Coalgebra, Lecture 15: Equations for Deterministic Automata

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

Solutions for HW9. Bipartite: put the red vertices in V 1 and the black in V 2. Not bipartite!

University of Sioux Falls. MAT204/205 Calculus I/II

CS375: Logic and Theory of Computing

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016

Grammar. Languages. Content 5/10/16. Automata and Languages. Regular Languages. Regular Languages

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont.

Lesson 2.1 Inductive Reasoning

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.

Nondeterminism and Nodeterministic Automata

Bisimulation, Games & Hennessy Milner logic

Regular Language. Nonregular Languages The Pumping Lemma. The pumping lemma. Regular Language. The pumping lemma. Infinitely long words 3/17/15

Linear Systems with Constant Coefficients

Lexical Analysis Finite Automate

Thoery of Automata CS402

Recursively Enumerable and Recursive. Languages

2.4 Theoretical Foundations

6.5 Improper integrals

Table of contents: Lecture N Summary... 3 What does automata mean?... 3 Introduction to languages... 3 Alphabets... 3 Strings...

THE PYTHAGOREAN THEOREM

Lecture Notes No. 10

Chapter 4 Regular Grammar and Regular Sets. (Solutions / Hints)

Lecture 9: LTL and Büchi Automata

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Logic Synthesis and Verification

Chapter 4: Techniques of Circuit Analysis. Chapter 4: Techniques of Circuit Analysis

Lecture 6: Coding theory

For a, b, c, d positive if a b and. ac bd. Reciprocal relations for a and b positive. If a > b then a ab > b. then

Transcription:

Proess Mining: Dt Siene in Ation Alph Algorithm: Limittions prof.dr.ir. Wil vn der Alst www.proessmining.org

Let L e n event log over T. α(l) is defined s follows. 1. T L = { t T σ L t σ}, 2. T I = { t T σ L t = first(σ) }, 3. T O = { t T σ L t = lst(σ) }, 4. X L = { (A,B) A T L A ø B T L B ø A B L 1,2 A 1 # L 2 1,2 B 1 # L 2 }, 5. Y L = { (A,B) X L (A,B ) XL A A B B (A,B) = (A,B ) }, 6. P L = { p (A,B) (A,B) Y L } {i L,o L }, 7. F L = { (,p (A,B) ) (A,B) Y L A } { (p (A,B),) (A,B) Y L B } { (i L,t) t T I } { (t,o L ) t T O }, nd 8. α(l) = (P L,T L,F L ).

Alph lgorithm exmine thoroughly strt register request 1 exmine sully 3 deide 5 py ompenstion end 2 hek tiket 4 reinitite request rejet request

Limittion of the α lgorithm: Impliit ples d e f p 1 g p 2 p 1 nd p 2 re impliit ples! PAGE 4

Limittion of the α lgorithm: Loops of length 1 > > > > # # desired model: PAGE 5

Limittion of the α lgorithm: Loops of length 2 > > >d > d d desired model: d PAGE 6

Limittion of the α lgorithm: Non-lol dependenies?? d?? e PAGE 7

Limittion of the α lgorithm: Non-lol dependenies p 1 d p 2 e p 1 nd p 2 re not disovered! PAGE 8

Two event logs: Sme disovered model d e PAGE 9

Diffiult onstruts for the Alph lgorithm PAGE 10

Question Consider the event log: Wht model will the Alph lgorithm rete? Give sound WF-net tht n produe the oserved ehvior nd nothing more? PAGE 11

Answer (1/2): Model generted y Alph lgorithm d e Model generted y Alph lgorithm lso llows for tre strting with nd ending with d!

Answer (2/2): A sound WF-net tht n produe the oserved ehvior nd nothing more d e e Note the duplited e trnsition! The Alph lgorithm will never rete WF-net with two trnsitions hving the sme lel.

Limittion of the α lgorithm: representtionl is strt p end There is no WF-net with unique visile lels tht exhiits this ehvior.

Another exmple strt p1 p1 end strt p1 p1 end There is no WF-net with unique visile lels tht exhiits this ehvior. strt p1 τ p1 end

OR-split/join model d strt end Let us tke n event log ontining ll possile full firing sequenes nd pply the Alph lgorithm. Wht will hppen?

Applying the Alph lgorithm using ProM???

Region-sed miner (with lel splitting)

Limittion of the α lgorithm: resulting model does not need to e sound WF-net d f e The disovered model is not sound (hs dedlok).

Chllenge: Noise nd Inompleteness To disover suitle proess model it is ssumed tht the event log ontins representtive smple of ehvior. Two relted phenomen: Noise: the event log ontins rre nd infrequent ehvior not representtive for the typil ehvior of the proess. Inompleteness: the event log ontins too few events to e le to disover some of the underlying ontrol-flow strutures.

Flower model d strt end e f g h

Wht is the est model? d,,d 99,,e 85 e d e

Wht is the est model? d,,d 99,,e 50,,e 85,,d 48 e d e

Wht is the est model? d,,d 99,,e 1,,e 85,,d 2 e d e

Alph lgorithm nnot del with noise (rre ehvior, i.e., outliers)

Proess models re like mps: we my not wnt to see ll pths nd only see the highwys

Relted to noise: Completeness exmine thoroughly 1 strt register request 1 2 exmine sully hek tiket 3 4 deide 5 reinitite request py ompenstion rejet request end strt 2 3... k end Infinitely mny possile tres, 7 possile sttes PAGE 27 k numer of sttes: 2 k +2 numer of different tres: k! 1 4 1 2 6 2 5 34 120 10 1026 3628800 20 1048578 2.432902e+18

Alph lgorithm depends on the diretly follows reltion 1 k numer of sttes: 2 k +2 numer of different tres: k! 2 1 4 1 strt 3... end 2 6 2 5 34 120 10 1026 3628800 20 1048578 2.432902e+18 k Only k(k-1) oservtions re needed to disover the onurrent prt. However, if one of these is missing, the result will e inorret.

nnot ssume ompleteness

Limittions (1/2) Impliit ples (ples tht re redundnt): hrmless nd e solved through preproessing. Loops of length 1: n e solved in multiple wys (hnge of lgorithm or pre/postproessing). Loops of length 2: idem. Non-lol dependenies: foundtionl prolem, not speifi for Alph lgorithm.

Limittions (2/2) Representtionl is (nnot disover trnsitions with duplite or invisile lels): other lgorithms my hve different is. Disovered model does not need to e sound: some lgorithms ensure this. Noise: foundtionl prolem, not speifi for Alph lgorithm. Inompleteness: lso foundtionl prolem.

How to mesure the qulity of disovered model? There my e onfliting requirements (simpliity versus ury). Confusion mtrix nd F1-sore hve the prolem tht we do not hve negtive exmples. Topis will e disussed lter. For the moment, we only mention the redisovery prolem s qulity riterion.

Redisovering proess models originl proess model simulte event log disover disovered proess model N N N=N? The redisovery prolem: Is the disovered model N "equivlent" to the originl model N?

Prt I: Preliminries Prt III: Beyond Proess Disovery Chpter 1 Introdution Chpter 2 Proess Modeling nd Anlysis Chpter 3 Dt Mining Chpter 7 Conformne Cheking Chpter 8 Mining Additionl Perspetives Chpter 9 Opertionl Support Prt II: From Event Logs to Proess Models Chpter 4 Getting the Dt Chpter 5 Proess Disovery: An Introdution Chpter 6 Advned Proess Disovery Tehniques Prt IV: Putting Proess Mining to Work Chpter 10 Tool Support Chpter 11 Anlyzing Lsgn Proesses Chpter 12 Anlyzing Spghetti Proesses Prt V: Refletion Chpter 13 Crtogrphy nd Nvigtion Chpter 14 Epilogue