Business Process Intelligence
Study Guide Business Process Intelligence
The lecture content will be distributed via RWTHmoodle. The lectures are planned to be held in presence, however, this may change depending on the corona restrictions. Moreover, students are encouraged to also register for the Coursera online course Process Mining: Data science in Action which is covering 50% of the material and provides also software and datasets. The video lectures are also available via the Video AG. Note, however, that the lecture content has been changed significantly. Check RWTHmoodle for the latest information and only use email@example.com to contact the lecturers.
- Prof. Wil van der Aalst (Vorlesungen)
- Bianka Bakullari M. Sc.
- Harry Beyel M. Sc.
- Nina Graves M. Sc.
- Benedikt Knopp M. Sc.
- Christopher Schwanen M. Sc.
Course Contents and Motivation
This course starts with an overview of approaches and technologies that use event data to support decision making and business process (re)design. Subsequently, the course focuses on process mining as a bridge between data mining and business process modeling. Business Process Intelligence and process mining enable engineers to understand, diagnose, improve, and streamline operational processes for a wide variety of organizations and systems as hospitals, banks, high-tech systems, governments, electronic shops, transportation systems, trading systems.
Process mining is part of the larger data science discipline. Data science aims to answer questions as:
- What really happened? (discovery)
- Why did it happen? (root cause analysis)
- What will happen? (prediction)
- What is the best that can happen? (recommendation)
Process mining is an enabling technology to answer such questions about operational processes in different domains. There is a huge demand for engineers having the skills and tools to turn event data into real value.
The course is at an introductory level with various practical assignments.
The course covers the three main types of process mining.
- The first type of process mining is discovery. A discovery technique takes an event log and produces a process model without using any a-priori information. An example is the alpha-algorithm that takes an event log and produces a Petri net explaining the behavior recorded in the log.
- The second type of process mining is conformance. Here, an existing process model is compared with an event log of the same process. Conformance checking can be used to check if reality, as recorded in the log, conforms to the model and vice versa.
- The third type of process mining is enhancement. Here, the idea is to extend or improve an existing process model using information about the actual process recorded in some event log. Whereas conformance checking measures the alignment between model and reality, this third type of process mining aims at changing or extending the a-priori model. An example is the extension of a process model with performance information, e.g., showing bottlenecks.
Process mining techniques can be used in an offline, but also online setting. The latter is known as operational support. An example is the detection of non-conformance at the moment the deviation actually takes place. Another example is time prediction for running cases, i.e., given a partially executed case the remaining processing time is estimated based on historic information of similar cases.
Process mining provides not only a bridge between data mining and business process management; it also helps to address the classical divide between "business" and "IT". Evidence-based business process management based on process mining helps to create a common ground for business process improvement and information systems development.
In recent years, process mining has become the primary data-driven BPM (Business Process Management) approach. Process mining is also increasingly applied in other domains (auditing, production, etc.). The availability of data nowadays strengthens the necessity for appropriate data mining approaches that can deal with event data. Process mining is where “Data Science” and “Process Science” meet. Currently, there are about 40 software vendors offering process mining tools. In this course, students have the opportunity to obtain hands-on experience in process mining by using the open source tool ProM and the commercial tool Celonis. These tools are used to illustrate different concepts and applications.
The course uses many examples using real-life event logs to illustrate the concepts and algorithms. After taking this course, one is able to run process mining projects and have a good understanding of the Business Process Intelligence (BPI) field. Moreover, students will be able to directly apply process mining techniques in all kinds of practical settings, including internships and master projects.
After taking this course, students should:
- have a good understanding of Business Process Intelligence techniques (in particular process mining),
- understand the role of Big Data and Data Science in today’s society,
- be able to relate process mining techniques to other analysis techniques such as simulation, business intelligence, data mining, machine learning, and verification,
- understand the relation between process mining and data mining techniques like classification, clustering, and association rules,
- be able to apply basic process discovery techniques such as the alpha algorithm to learn a process model from an event log (both manually and using tools),
- understand how more advanced process discovery techniques like region-based mining, genetic mining, and heuristic mining work
- be able to apply basic conformance checking techniques (such as token-based replay) to compare event logs and process models (both manually and using tools),
- be able to extend a process model with information extracted from the event log (e.g., show bottlenecks),
- have a good understanding of the data needed to start a process mining project,
- be able to characterize the questions that can be answered based on such event data,
- explain how process mining can also be used for operational support (prediction and recommendation), and
- be able to execute process mining projects in a structured manner using the L* life-cycle model.
Frequently Asked Questions
The course is not part of my study plan. How can I enrol?
Information about curriculum change can be found here. The information is for mechanical engineers, but it is similar for other study programs. To be added to the Moodle, please, send an email with your RWTH address to firstname.lastname@example.org explaining shortly the situation.
I want to take the course via free enrollment, but cannot do it myself.
Please, send an email with your matriculation number to email@example.com explaining shortly the situation.