IEEE CIS Task Force on Process Mining

Trace: slide12


|

XES Webinar

Slide 12: XES and Process Mining

From the previous, it is clear that the data scientist will be using a lot of [TAB]computational intelligence ‘under the hood’ when doing [TAB]process mining.

For example, process models can be discovered using [TAB]fuzzy algorithms, event logs can be [TAB]replayed on such fuzzy models, [TAB]genetic algorithms can be used, and the traces in the event log can be [TAB] clustered prior to discovering a model.

On top of this, many of these cutting edge algorithms are now available in tools like [TAB]RapidMiner, which allows the RapidMiner use to [TAB]import event logs into RapidMiner, [TAB]analyze the log using a dotted chart, [TAB]discover a process model from it using an ILP-based miner, and [TAB]replay it on a process model to check performance and conformance.[TAB]

As such, computational intelligence is a natural habitat for the process mining field. As a result, the XES standards proposal also finds its place in computational intelligence.