Skip to main content

Process Discovery Algorithms Recommendation Approach

  • Conference paper
  • First Online:
Proceedings of 2nd International Conference on Smart Computing and Cyber Security (SMARTCYBER 2021)

Abstract

Process mining allows to visualize and understand any business process in any organization from every single process task to a global view based on actual event logs of executed tasks stored in today’s information systems. Process mining can be considered one of the most innovative and exciting digital tools that supports organizations on their initiative towards digital transformation as it allows to have a full understanding of the real behavior of processes, identify bottlenecks, and improve them. Many process discovery algorithms of process mining have been proposed today. However, users and businesses still cannot choose or decide the appropriate mining algorithm for their business processes. Nevertheless, existing evaluation and recommendation frameworks have several important drawbacks. Therefore, this paper proposes an approach for recommending the most suitable process discovery technique to a given process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Reinkemeyer L (ed) (2020) Process mining in action: principles, use cases and outlook. Springer International Publishing, Cham (2020)

    Google Scholar 

  2. van der Aalst W (2016) Process mining: Data science in action. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49851-4_1

  3. van der Aalst W (2011) Process mining: discovery, conformance, and enhancement of business processes, 1st edn. Springer, Berlin Heidelberg

    Book  Google Scholar 

  4. R'bigui H, Cho C (2019) Complex control-flow constructs detection from process related data. In: International conference on advanced communication technology, ICACT, 2019-February, pp 579–582, 8701986

    Google Scholar 

  5. van der Aalst WMP, Weijters AJMM, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9):1128–1142

    Article  Google Scholar 

  6. Leemans S, Fahland D, van der Aalst WMP (2014) Discovering block-structured process models from event logs containing infrequent behaviour. In: International conference on business process management, LNBIP, vol 171. Springer, Cham, pp 66–78

    Google Scholar 

  7. R’bigui H, Cho C (2019) Heuristic rule-based process discovery approach from events data. Int J Technol Policy Manag Spec Issue Knowl Manag Syst 19(4)

    Google Scholar 

  8. R’bigui H, Cho C (2017) Customer oder fulfillment process analysis with process mining: an industrial application in a heavy manufacturing company. In: Proceedings of the ACM international conference on computer science and artificial intelligence, pp 247–252, Jakarta, Indonesia, 05–07 Dec 2017

    Google Scholar 

  9. Vazquez Barreiros B, Chapela D, Mucientes M, Lama M, Berea D (2016) Process mining in IT service management: a case study. In: International workshop on algorithms & theories for the analysis of event data (Toruń, Poland), CEUR-WS.org, pp 16–30

    Google Scholar 

  10. R’bigui H, Cho C (2018) Purchasing process analysis with process mining of a heavy manufacturing industry. In: IEEE proceeding of the 9th International Conference on Information and Communication Technology, pp 495–498, Jeju Island, Korea, 17–19 Oct 2018

    Google Scholar 

  11. R’bigui H, Al-Absi MA, Cho C (2019) Detecting complex control-flow constructs for choosing process discovery techniques. Int J Innov Technol Explor Eng 9(1):1389–1393

    Google Scholar 

  12. Leemans SJJ, Fahland D, van der Aalst WMP (2013) Discovering block-structured process models from event logs—a constructive approach. Lecture notes in computer science 7927. Springer, Berlin, Heidelberg, pp 311–329

    Google Scholar 

  13. Bergenthum R, Desel J, Lorenz R, Mauser S (2007) Process mining based on regions of languages. Lecture notes in computer science 4714. Springer, Berlin, Heidelberg, pp 375–383

    Google Scholar 

  14. Li J, Liu D, Yang B (2007) Process mining: extending α-algorithm to mine duplicate tasks in process logs. Lecture notes in computer science 4537. Springer, Berlin, Heidelberg, pp 396–407

    Google Scholar 

  15. Van der Aalst WMP, de Medeiros AKA, Weijters AJMM (2005) Genetic process mining. Lecture notes in computer science 3536. Springer, Miami, pp 48–69

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiwoon Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

R’bigui, H., Al-Absi, M.A., Cho, C. (2022). Process Discovery Algorithms Recommendation Approach. In: Pattnaik, P.K., Sain, M., Al-Absi, A.A. (eds) Proceedings of 2nd International Conference on Smart Computing and Cyber Security. SMARTCYBER 2021. Lecture Notes in Networks and Systems, vol 395. Springer, Singapore. https://doi.org/10.1007/978-981-16-9480-6_6

Download citation

Publish with us

Policies and ethics