• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » What is Process Mining?

By Abhishek Ghosh December 10, 2019 10:57 am Updated on December 10, 2019

What is Process Mining?

Advertisement

Process Mining is a process management technique that enables business processes to be reconstructed and evaluated on the basis of digital traces in IT systems. Process Mining is a discipline of business data analytics designed to improve processes in a company’s operations. The individual steps of the process stored in the systems are combined and the process is visualized in its entirety. Process Mining makes it possible to model the implicit and otherwise hidden process knowledge contained in data, making it tangible and transportable. The technique is often used when other approaches fail to formalize the processes or when the quality of existing process records is questionable. Contemporary management trends such as Business Activity Monitoring (BAM), Business Operations Management (BOM), and Business Process Intelligence (BPI), for example, show that there is a great deal of interest in further developing the opportunities for analysis in this area.

Process Mining

 

Fields of application

 

In principle, process mining can be used wherever individual steps of a process are stored in an IT system so that the coherence and chronology of the steps can be traced. This traceability is ensured by a process or process log. This is especially true for workflows that are stored and managed in workflow management systems. A workflow is a formally described business process that can be coordinated and controlled by a workflow management system. User interfaces allow users to interact with the system and store and edit individual steps in a workflow. The totality of the stored steps ultimately results in a process that can be lifted and reconstructed using process mining. So z. For example, the transactions from ERP systems, the history of tickets in a ticketing system, or clinical pathways of hospital patients are presented. Key application areas of process mining are process harmonization across various organizational units and companies, process optimization in terms of throughput times, process costs, process stability and ensuring compliance requirements. Further application possibilities for process mining can be found, for example, in knowledge management or in assistance systems. An application case of process mining would also be, for example, too long ordering processes in purchasing due to too long release times of the departments.

 

Technology

 

Process mining can be seen as a link between data mining and business process management. However, unlike data mining, process mining focuses on leveraging implicit process knowledge already contained in the data.
The starting point for process mining is a collection of data in which individual process steps are stored. The quality of this data is very important for process mining. A set of statistical models is now applied to this data, with the aid of which the standard course of the process (core process) is determined. This core process then serves as the basis for the rest of the process and enables deviations from the standard process to be determined.

Advertisement

---

 

Classes of Process Mining

 

The Task Force on Process Mining of the Institute of Electrical and Electronic Engineers IEEE, headquartered in New York, defines three different classes of process mining:

  1. Discovery : Existing process flow logs are used to reconstruct the processes contained therein without first having information or models of existing processes. Process Mining is used here for the pure enhancement of existing processes. This type of process mining application is currently the best known.
  2. Conformance : In this type of process mining, a model already exists via a process flow. Existing data will now be tested for conformance to the existing model based on the model and existing process-log process logs.
  3. Enhancement : Here, too, the process logs and a model of the existing process are already available. In contrast to the conformance type, however, not only theory and practice are to be checked for their conformity, but the existing model must be adapted and expanded if necessary. Ideally, this approach leads to a new, better model of the desired process.

This Article Has Been Shared 533 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Process Mining?

  • Install Apache Zeppelin On Ubuntu 16.04

    Zeppelin Can Be Pre-Built Package Or Can Be Build From Source. Here Is How To Install Apache Zeppelin On Ubuntu 16.04 Building From Source.

  • Theoretical Foundations of Big Data : Part 1

    This article Theoretical Foundations of Big Data aims to provide an overview of theoretical models of the data analysis and administration.

  • How To Install RabbitMQ on Ubuntu 16.04 LTS

    RabbitMQ is a Message Broker for the Messaging Protocols. Here Are the Steps on How To Install RabbitMQ on Ubuntu 16.04 LTS Server Over SSH.

  • How MySQL Used in Big Data Analysis

    How MySQL Used in Big Data Analysis? MySQL used with Hadoop, where output being stored on the MySQL server. MySQL itself can be used as a big data store.

  • How Install Apache Cassandra on Ubuntu (Single Cloud Server Instance)

    Here Are the Steps on How Install Apache Cassandra on Ubuntu Single Cloud Server Instance. Cassandra is a distributed wide column store NoSQL DBS.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (20K Followers)
  • Twitter (4.9k Followers)
  • Facebook (5.8k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.2k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Domain-Driven Design (DDD)? January 23, 2021
  • Top 10 Anti Hacking Software for Microsoft Windows January 22, 2021
  • What is Software Modernization? January 21, 2021
  • Cloud Computing : Cybersecurity Tips for Small Business Owners January 20, 2021
  • Arduino : Independently Blink Multiple LED January 18, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "What is Process Mining?," in The Customize Windows, December 10, 2019, January 24, 2021, https://thecustomizewindows.com/2019/12/what-is-process-mining/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy