Skip to main content

Improving efficiency for discovering business processes containing invisible tasks in non-free choice

Abstract

Process discovery helps companies automatically discover their existing business processes based on the vast, stored event log. The process discovery algorithms have been developed rapidly to discover several types of relations, i.e., choice relations, non-free choice relations with invisible tasks. Invisible tasks in non-free choice, introduced by \(\alpha ^{\$ }\) method, is a type of relationship that combines the non-free choice and the invisible task. \(\alpha ^{\$ }\) proposed rules of ordering relations of two activities for determining invisible tasks in non-free choice. The event log records sequences of activities, so the rules of \(\alpha ^{\$ }\) check the combination of invisible task within non-free choice. The checking processes are time-consuming and result in high computing times of \(\alpha ^{\$ }\). This research proposes Graph-based Invisible Task (GIT) method to discover efficiently invisible tasks in non-free choice. GIT method develops sequences of business activities as graphs and determines rules to discover invisible tasks in non-free choice based on relationships of the graphs. The analysis of the graph relationships by rules of GIT is more efficient than the iterative process of checking combined activities by \(\alpha ^{\$ }\). This research measures the time efficiency of storing the event log and discovering a process model to evaluate GIT algorithm. Graph database gains highest storing computing time of batch event logs; however, this database obtains low storing computing time of streaming event logs. Furthermore, based on an event log with 99 traces, GIT algorithm discovers a process model 42 times faster than α++ and 43 times faster than α$. GIT algorithm can also handle 981 traces, while α++ and α$ has maximum traces at 99 traces. Discovering a process model by GIT algorithm has less time complexity than that by \(\alpha ^{\$ }\), wherein GIT obtains \(O(n^{3} )\) and \(\alpha ^{\$ }\) obtains \(O(n^{4} )\). Those results of the evaluation show a significant improvement of GIT method in term of time efficiency.

Introduction

The rapid development of information systems leads to a growing amount of information [1] that obtains massive stored data [2, 3]. In the presence of various types of data, events that are happened in the systems are stored in so-called event log [4]. Monitoring business processes from a massive event log brings a challenge related to Big Data. Process mining is a discipline of gathering the event log and processing the log into a process model for monitoring, including capturing anomalies [5, 6] or bottlenecks [7]. The technique of constructing a process model by process mining is called process discovery.

There are several types of relationships which are formed by process discovery algorithms. The sophisticated relationship is invisible tasks in non-free choice. This condition occurs when choice activities which involve invisible tasks are not a choice-free relation (their execution depends on previous activities). This research presents two business processes to give usage overview of invisible tasks in non-free choice.

A port implements two processes, i.e., handling imported goods and handling exported goods. In handling imported goods, several cranes lift containers on to the truck based on the types of containers. Cranes can put dry containers in the truck directly. On the other hand, there are previous tasks of moving reefer and uncontainer. For cranes to carry out appropriate activities, the process model must have makers for mapping container determination and tasks to put on the truck. Those markers are called non-free choice. Each non-free choice relationship connects an activity with another activity; however, dry containers did not have a specific task before lifting on the truck. Therefore, an invisible task is added to raise a non-free choice relationship for each type of containers. This condition is called invisible tasks in non-free choice (denoted as a black circle that relates to a non-free choice relationship in Fig. 1).

Fig. 1
figure 1

A process model of port container handling

Another example is shown in Fig. 2. An invisible task should be added before finish transaction activity, so a non-free choice that connects payment with e-facture to print tax invoice and a non-free choice that connects direct payment to finish transaction are depicted in a process model of purchasing medical equipment. A black circle with a non-free choice relationship is an implementation of invisible tasks in non-free choice.

Fig. 2
figure 2

A process model of purchasing medical equipment

The process discovery algorithms have been developed rapidly to discover several types of relations [8,9,10,11,12,13]; however, seldom algorithms concern with invisible tasks in non-free choice. \(\alpha ^{\$ }\) [14] is the development of \(\alpha\) algorithm that discovers a new issue, i.e., invisible tasks in non-free choice. \(\alpha ^{\$ }\) stores the dependencies of activities in the form of pairs of activities and collects traces of activities based on the event log and combines \(\alpha ^{{ + + }}\) rules and \(\alpha ^{\# }\) rules to construct invisible task in non-free choice. \(\alpha ^{\$ }\) has several rules for ordering relations. The rules check all pairs of activities because there is no information of relations of those activities. The checking process produces high computing time.

Graph-based process discovery algorithm was developed to minimize checking all pairs of activities for discovering a process model. This algorithm utilizes capabilities of a graph database to store activities and their relationships. Instead of observing pairs of activities, the graph-based process discovery algorithm observes their relationships directly. This method is effective because a relationship can be detected from other relationships. For example, the graph-based algorithm discovers parallel relationships based on occurrences of sequence relationships [15]. An invisible task is detected based on parallel relationships. Storing relationships can accelerate the computing time for discovery.

Existing graph-based process discovery algorithms have several drawbacks. First, they did not concern to discover invisible tasks in non-free choice. Secondly, those algorithms do not directly store event logs of the system in a graph database. Those algorithms need to convert the event log to graph database.

According to the difficulty of existing graph-based process discovery algorithms, the main contribution of this research is to propose GIT, the expansion of Graph-based Invisible Task, for discovering invisible tasks in non-free choice by extending rules of existing graph-based algorithms and integrating an Enterprise Resource Planning (ERP) system with a graph database to store the event logs directly in the graph database.

GIT algorithm is evaluated based on the quality of obtained process models and the scalability of algorithm. GIT algorithm is compared with \(\alpha ^{{^{\$ } }}\) and \(\alpha ^{{ + + }}\) algorithms based on fitness, precision, generalization, and simplicity [16] to measure the quality of the process models. Purchasing medical equipment processes are used to evaluate the quality of the model.

The time complexity and computing time are used to measure the scalability. There are several steps to measuring the computing time. First, a graph database that is used by GIT is compared with other databases, i.e., SQL and MongoDB, to stores streaming event logs and batch event logs. Secondly, the computing time of GIT algorithm is compared with the time of \(\alpha ^{{^{\$ } }}\) and \(\alpha ^{{ + + }}\) based on several event logs with different number of activities. The aim of using several event logs to gain the capacity of processes which can be handled by those algorithms.

Related works

Existing methods of process discovery

Nowadays, many methods of process discovery are developed. There are two well-know methods, i.e. \(\alpha\) [17] and Heuristic Miner [8].

\(\alpha\) algorithm forms all unique sequences of activities into a process model. This algorithm is expanded to other algorithms to handle several issues in discovering relationships of activities. \(\alpha ^{ + }\) [18] add rules of \(\alpha\) for handling looping activities. Furthermore, \(\alpha ^{{ + + }}\) [14] and \(\alpha ^{\# }\) [19] expands rules of \(\alpha ^{ + }\) with different purposes. \(\alpha ^{{ + + }}\) focuses to depict non-free choice; however, \(\alpha ^{\# }\) appends additional activities, called invisible prime tasks, in a process model to discover particular situations, i.e. skip, redo and switch. Thereafter, \(\alpha ^{{^{\$ } }}\) [4] introduces invisible tasks in non-free choice and combines \(\alpha ^{{ + + }}\) with \(\alpha ^{\# }\) to overcome that recent issue. \(\alpha\) and its expended algorithms do not consider noises, so those algorithms are suitable for noise-free event logs.

Heuristic Miner [8] is process discovery algorithm that modifies \(\alpha\) by adding a threshold to filter activities which will be formed in a process model. There are two aims of adding a threshold. First, the action can simplify an obtained process model based on logs containing huge activities and relationships. Activities which have appearance times less than the threshold will be abandoned, so the obtained process model only discover frequently executed activities. Secondly, the disposal of activities with occurrences less than the threshold can eliminates noises because noises raise rarely. Fodina [11] improves Heuristic Miner to create robust heuristic process discovery algorithm. In addition, Fodina also develops rules to handle invisible prime tasks.

\(\alpha\) algorithm, as a pioneer process discovery algorithm, inspires the formation of new methods. HMM-Parallel Tasks [20] and CHMM-Invisible Tasks [21] modifies rules of \(\alpha\) in the form of Hidden Markov Models. There are also graph-based \(\alpha\) algorithm, such as Graph-based Parallel [15] and Graph-based Invisible Task [22]. Other algorithms are developed, such as Inductive Miner [9] and RPST [10]. Table 1 describes the existing algorithms which can discover types of relations depicted by the columns. The tick signs explain that the algorithms can discover the related relations depicted by the columns.

Table 1 Algorithms of process discovery

According to Table 1, existing graph-based process discovery algorithms had not concern in invisible task in non-free choice. GIT algorithm as proposed algorithm of this research handles this type of relation.

Event log

An event log consists of several cases, which identify the executed processes. Each case has several attributes, such as identification of case (CaseId), name of activities (Activity), the execution time of the activities (Timestamp), and actors who carried out activities (Resource) [23]. For example, an event log \(\varepsilon\) = { {C1, \({\text{A}}\), 2018-08-05-15:54, Admin}, {C1, \({\text{B}}\), 2018-08-05-16:54, Customer}, {C1, \({\text{D}}\), 2018-08-05-16:54, Customer}, {C2, \({\text{A}}\), 2018-08-06-15:54, Admin}, {C2, \({\text{B}}\), 2018-08-06-16:54, Customer}, {C2, \({\text{D}}\), 2018-08-06-16:54, Customer}, {C3, \({\text{A}}\), 2018-08-07-15:54, Admin}, {C3, \({\text{C}}\), 2018-08-07-16:54, Customer}, {C3, \({\text{D}}\), 2018-08-07-16:54, Customer}. The event log \(\varepsilon\) has three cases with id C1, C2, and C3. Both C1 and C2 have the same sequence of activities, which is \({\text{A}} \to {\text{B}} \to {\text{D}}\) and C3 has \({\text{A}} \to {\text{C}} \to {\text{D}}\).

An event log contains several traces, which are unique sequences of activities. The event log \(\varepsilon\) has \(\left( {{\text{A}} \to {\text{B}} \to {\text{D}}} \right)_{2}\) and \(\left( {{\text{A}} \to {\text{C}} \to {\text{D}}} \right)_{1}\), where 2 and 1 identify the occurrence numbers. There are two traces of \(\varepsilon\), i.e., \(\left( {{\text{A}} \to {\text{B}} \to {\text{D}}} \right)\) and \(\left( {{\text{A}} \to {\text{C}} \to {\text{D}}} \right).\)

Control-flow patterns

The process model consists of two types of relations, namely sequence relations and parallel relations. Sequence relations are used to describe processes that run straight in sequence or sequentially, whereas the parallel relations are used to describe a branched process. There are three types of control-flow patterns [24] to represent parallel relations, namely AND, OR, and XOR [20, 25]. Table 2 shows examples of relations and differences between control-flow patterns in graph models.

Table 2 Control-flow patterns in process model

Methodology

This research proposes an event log storage algorithm into a graph-database for direct process discovery without exporting event logs from the ERP database and transforming .csv file into .mxml or .xes. The storage algorithm will make the discovery process more efficient than previous methods. Figure 3 shows a comparison of the previous method with the proposed method. The first one shows the steps of process discovery proposed by Aalst [17, 26]. The event log needs to be extracted from the database in the form of .csv. Then, the .csv file needs to be converted into .mxml or .xes by using Disco Tool. .Mxml file is supported by ProM 5, and .xes file is supported by ProM 6. Then, the .mxml or .xes file is imported to ProM Tool to conduct process discovery. The second one shows process discovery steps using graph-database Neo4J proposed by Darmawan et al. [27]. The event log needs to be extracted from the database in the form of .csv. Then, the .csv file is imported to Neo4J to conduct process discovery. The last one shows the steps for discovering the process model of the proposed method. By integrating Neo4J and ERP using Laravel, the event log stored in the database ERP is directly processed to execute process discovery.

Fig. 3
figure 3

The comparison process discovery methods. a The pioneer of process discovery method by Aalst et al. [17, 26], b the process discovery using graph-database [27], and c GIT process discovery model

The integration stage

The integration stage is connecting the ERP system with Neo4J, a graph database platform, in storing an event log of the system directly in the form of a graph database. The used ERP system in this research is built by Laravel. This research uses ClientBuilderfrom the GraphAwareLibrary to start the integration and ClientBuilder to make a connection between the system and the graph database.

Process discovery

  1. a.

    The algorithm of logging stage

    The logging stage in a graph-database starts when the user logs into the ERP system until the user logs out. The recording is done using the algorithm in Table 3. First, the algorithm checks the log that has been saved in Neo4J. If the last log is found in the graph-database, the login activity is entered in the last case + 1. However, if the last log is not found, then the login activity is recorded as the first case. The Neo4J connection is made using the GraphAwarelibrary by connecting ClientBuilder from the GraphAware. At that moment, the current case will be included in the session to be used in later stages.

  2. b.

    Constructing sequence relation and invisible task

    Table 3 The algorithm of logging stage

    Table 4 is used to discover sequence relations of the event log. GIT stores all variations of activities as nodes in the graph database. Then, GIT creates the sequence relations of those nodes based on activities of the event log (called an event). A sequence relation is discovered between an event and its next event with the same case id.

    Table 4 The algorithm of GIT for discovering sequence relations

    Cypher queries in Table 5 are a part of the GIT method. Based on Table 5, the steps of detecting skip, switch and redo invisible tasks are same. GIT algorithm chooses relations of activities based on its rules and inserts invisible tasks in the middle of those relations. The algorithm is implemented before control-flow pattern discovery.

    Table 5 The algorithm of GIT for invisible prime task discovery

    The next step is the discovery of the control-flow patterns, i.e., AND, OR, and XOR, as can be seen in Table 6. Control-flow patterns, that is described in Table 6, are used to determine types of parallel relations. Parallel relations can be divided into three types, which are XOR, AND, and OR. XOR relations only allows one activity to be executed in a process. AND relations allow all activities to be executed. Lastly, OR relations are relations between XOR and AND, and it only allows parallel activities that are not categorized into XOR and AND relations. Each relation is divided into two forms, which are split and join. A split happens when there are multiple activities to be chosen. A join happens when multiple activities that can be chosen in split relations are closing into one or more activities.

    Table 6 The algorithm of GIT for discovering control-flow patterns

    The last step is the discovery of invisible tasks in non-free choice. Non-free-choice relation connects an activity in one choice relation with another activity in the next choice relation. This relation shows that the next activity of choice relation cannot be freely chosen and is influenced by the activity of the previous choice relation. Figure 2 is an example of non-free-choice relation and discovery by using GIT. As depicted in Fig. 2, a node Print Tax Invoice and an additional node, i.e., Invisible Task, cannot be freely chosen even though the relation between Make Payment to Invisible Task and Make Payment to Print Tax Invoice are XORSPLIT; instead, the choice of the node Print Tax Invoice can only be taken if the previous activity taken is a node Payment with E-Facture and choice of the Invisible Task can only be taken if the previous activity taken is a node Direct Payment. Non-free-choice relation is represented by NONFREECHOICE relation. Using the algorithm in Table 7, GIT algorithm finds some nodes with outgoing relation of XORJOIN, some nodes with ingoing relation of XORSPLIT, detect invisible task, and lastly match them against some nodes inside activity label which has the same name.

    Table 7 The algorithm of GIT for discovering invisible task in non-free choice

Results and discussion

Results

This research evaluates GIT algorithm based on two aspects, which are the quality of obtained model and the scalability. The quality is measured based on fitness [28], precision [29], generalization, simplicity. The fitness value is obtained by counting the number of cases described in the model divided by the total cases in the event log. The precision value is obtained by counting the number of traces discovered in the model divided by the number of traces present in the event log. Generalization and simplicity are measured based on equations in [16].

The scalability is measured according to computing time and maximum number of traces algorithm could handle. This research divides computing time as computing time of storing event logs and computing time of discovering process models. A graph database as the chosen database of GIT is compared with SQL and MongoDB to measure computing time of storing logs. The discovery computing time of GIT is compared with those times of other algorithms: \(\alpha ^{\$ }\) and \(\alpha ^{{ + + }}\).

There are four event logs which are used in the evaluation. The first event log is generated from a medical store that already implemented Enterprise Resource Planning (ERP) system. The reason of choosing this event log is the processes are executed in the ERP system which is integrated with graph-based platform, i.e., Neo4j by using integration methods (explained in “The integration stage” section). Thereupon, the event log is noise-free. GIT algorithm refers to rules of \(\alpha\) algorithm, so this algorithm is suitable with noise-free logs. The other event logs are obtained from BPI Challenge [30,31,32]. Those event logs are chosen to measure scalability because they consist of high number of traces and cases.

The result of GIT algorithm to discover processes in the first event log is shown in Fig. 4. The full name of activities presented in Fig. 4 is shown in Table 8. In Fig. 4, the non-free choice relations occur between activity Direct Payment and an invisible task and between activity Payment with E-facture and Print Tax Invoice. Thus, this research is verified to be able to detect invisible task in non-free choice.

Fig. 4
figure 4

The process model by GIT algorithm

Table 8 List of activity names initialized in Fig. 4

Figure 5 shows the comparison of results from the previous methods with the method proposed in this study. All fitness and simplicity values of all algorithms are 1.000. \(\alpha ^{{ + + }}\) obtains lowest precision value, at 0.8644. On the other hand, \(\alpha ^{{ + + }}\) gains highest generalization value, at 0.9682. Both of \(\alpha ^{\$ }\) and GIT has same values for precision and generalization, accounting for 1.000 and 0.9681, respectively.

Fig. 5
figure 5

Result comparison between the previous methods and the proposed method

In addition to comparing the quality of obtained results, the time complexity of the algorithms is measured. The time complexity of \(\alpha ^{\$ }\) is \(O(n^{4} )\) [33], while the time complexity of GIT is \(O(n^{3} ),~\) with the explanation steps as listed in Table 9.

Table 9 Comparison of algorithm complexity

Tables 10 and 11 show the result of storing computing time and discover computing time based on six event logs. Those event logs are three event logs from BPI Challenge, processes of a medical store, and chosen processes of the medical store.

Table 10 Result of storing computing time
Table 11 Result of discovering computing time

This research calculates storing computing time by two types of event logs, i.e., batch event logs and streaming event logs. MySQL obtains lower computing times in batch event logs with average 1.092 s and streaming event logs with 0.0068 s. On the other hand, graph database has highest storing computing time in batch event logs, at 6071.5 s and has low storing computing time, at 0.0730 s. Contrary to graph database, MongoDB has low storing computing time of batch logs but highest time of streaming event logs.

Based on Table 11, GIT can handle more numbers of event logs than \(\alpha ^{\$ }\) and \(\alpha ^{{ + + }}\). The highest number traces which can be discovered by GIT algorithm is 981. On the other hand, \(\alpha ^{\$ }\) and \(\alpha ^{{ + + }}\) can discovery processes with maximum number 99 traces.

Discussion

Quality of obtained process model

The quality result of obtained process models by GIT, \(\alpha ^{{ + + }}\) and \(\alpha ^{\$ }\) is presented in Fig. 5. \(\alpha ^{{ + + }}\) has the lowest precision because this algorithm cannot describe non-free choice relationships, so several traces generated by its process model are not stored in the event log. Those traces decrease the precision value of \(\alpha ^{{ + + }}\). GIT and \(\alpha ^{\$ }\) has high precision because those algorithms can depict invisible tasks in non-free choice. Generalization values of GIT and \(\alpha ^{\$ }\) are smaller than \(\alpha ^{{ + + }}\) because invisible tasks.

Scalability

This research measures the scalability based on storing processes and discovery processes. The results of Table 10 shows graph database can handle huge event logs; however, the consuming time is fantastic. In batch event logs, the storing computing time by graph database is 6000 times of MySQL and 59 times of MongoDB. The long storing computing time by graph database will resulting in a spike in overall GIT runtime. Optimizing storing computing time by graph database is an important thing that must be studied further in the future.

Table 11 shows the discovery computing time and also maximum traces algorithm could discover. GIT algorithm has highest number of traces that can be handled among other algorithms; however, the limit traces of GIT is only 981 traces. The main reason of GIT inability to discover more than 900 traces because GIT determine sequence relationships based on all cases, not all traces. In the future work, clustering cases to obtain traces is needed before discovery processes are executed.

Conclusion

This research proposes an algorithm called GIT algorithm, which utilizes a graph database to model invisible tasks in non-free choice efficiently. The capability of storing relations in a graph database can simplify the rules of process discovery because several relations of a process model can be constructed based on other discovered relations. GIT algorithm improves Graph-based Invisible Task by combining non-free choice rules with invisible task rules from Graph-based Invisible Task.

This research compares GIT algorithm to \(\alpha ^{\$ }\) and \(\alpha ^{{ + + }}\) based on the qualities of their models. The chosen quality measurements are fitness, precision, generalization and simplicity. The experiments show that GIT and \(\alpha ^{\$ }\) has highest values of fitness and precision, which are 1. This research calculates computing time and time complexity of GIT and \(\alpha ^{\$ }\) and computing time of graph database, MySQL, and MongoDB. Graph database gains highest storing computing time of batch event logs; however, this database obtains low storing computing time of streaming event logs. The complexity of \(\alpha ^{\$ }\) is \(O(n^{4} )\); meanwhile, the complexity of GIT is \(O(n^{3} )\). Based on 99 traces, GIT algorithm discovers a process model 42 times faster than \(\alpha ^{{ + + }}\) and 43 times faster than \(\alpha ^{\$ }\). GIT algorithm can also handle 981 traces, while \(\alpha ^{{ + + }}\) and \(\alpha ^{\$ }\) has maximum traces at 99 traces. It can be concluded that the process discovery of GIT algorithm is more efficient than that of \(\alpha ^{\$ }\) algorithm, and the graph database is suitable on the streaming event log.

The future work of this research is optimizing storing processes in the graph database and clustering processes as the input of discovery processes. Those subjects should be analyzed further to increase the scalability of GIT algorithm.

Availability of data and materials

The used raw dataset in this research is not publicly available. Readers can contact the corresponding author if they want to access the data.

Abbreviations

ERP:

Enterprise Resource Planning

GIT:

Graph-based Invisible Task in Non-Free Choice

References

  1. Mantzaris AV, Walker TG, Taylor CE, Ehling D. Adaptive network diagram constructions for representing big data event streams on monitoring dashboards. J Big Data. 2019. https://doi.org/10.1186/s40537-019-0187-2.

    Article  Google Scholar 

  2. Ismail A, Truong HL, Kastner W. Manufacturing process data analysis pipelines: a requirements analysis and survey. J Big Data. 2019;6:1–26. https://doi.org/10.1186/s40537-018-0162-3.

    Article  Google Scholar 

  3. Hasan MM, Popp J, Oláh J. Current landscape and influence of big data on finance. J Big Data. 2020. https://doi.org/10.1186/s40537-020-00291-z.

    Article  Google Scholar 

  4. Guo Q, Wen L, Wang J, Yan Z, Yu PS. Mining invisible tasks in non-free choice constructs. Cham: Springer; 2015. p. 109–10.

    Google Scholar 

  5. Sarno R, Sinaga F, Sungkono KR. Anomaly detection in business processes using process mining and fuzzy association rule learning. J Big Data. 2020;7:1–19.

    Article  Google Scholar 

  6. Al Jallad K, Aljnidi M, Desouki MS. Anomaly detection optimization using big data and deep learning to reduce false-positive. J Big Data. 2020;7:68. https://doi.org/10.1186/s40537-020-00346-1.

    Article  Google Scholar 

  7. Eboreime EA, Idika O, Omitiran K, Eboreime O, Ibisomi L. Primary healthcare planning, bottleneck analysis and performance improvement: an evaluation of processes and outcomes in a Nigerian context. Eval Program Plan. 2019;77:101712.

    Article  Google Scholar 

  8. Weijters AJMM, Van Der Aalst WMP. Process mining with the heuristics miner-algorithm. Tech Rep WP. Technische Universiteit Eindhoven. 2006;166:1–34.

  9. Leemans SJJ, Fahland D, van der Aalst WMP. Discovering block-structured process models from incomplete event logs. In: International conference on applications and theory of petri nets and concurrency. 2014;9698:91–110. https://doi.org/10.1007/978-3-319-07734-5_6.

  10. Yan Z, Sun B, Chen Y, Wen L, Hu L, Wang J, et al. Decomposed and parallel process discovery: a framework and application. Future Gener Comput Syst. 2019;98:392–405.

    Article  Google Scholar 

  11. vanden Broucke SKLM, De Weerdt J. Fodina: a robust and flexible heuristic process discovery technique. Decis Support Syst. 2017;100:109–18.

    Article  Google Scholar 

  12. Hermawan SR. A more efficient deterministic algorithm in process. Int J Innov Comput Inf Control. 2018;14:971–95.

    Google Scholar 

  13. Sarno R, Sungkono KR, Johanes R, Sunaryono D. Graph-based algorithms for discovering a process model containing invisible tasks. Int J Intell Eng Syst. 2019;12:85–94.

    Google Scholar 

  14. Guo Q, Wen L, Wang J, Yan Z, Yu PS. Mining invisible tasks in non-free-choice constructs. Lecture notes in computer science. Cham: Springer International Publishing; 2015. p. 109–25.

    Google Scholar 

  15. Waspada I, Sarno R, Sungkono KR. An improved method of parallel model detection for graph-based process model discovery. Int J Intell Eng Syst. 2020;13:127–38.

    Google Scholar 

  16. Sungkono KR, Sarno R. Constructing control-flow patterns containing invisible task and non-free choice based on declarative model. Int J Innov Comput Inf Control. 2018;14:1285–99.

    Google Scholar 

  17. van der Aalst WMP, Weijters T, Maruster L. Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng. 2004;16:1128–42.

    Article  Google Scholar 

  18. De Medeiros AKA, Van Dongen BF, van der Aalst WMP, Weijters AJMM. Process mining: extending the α-algorithm to mine short loops. Eindhoven University of Technology Eindhoven; 2004. p. 1–25.

  19. Wen L, Wang J, van der Aalst WMP, Huang B, Sun J. Mining process models with prime invisible tasks. Data Knowl Eng. 2010;69:999–1021.

    Article  Google Scholar 

  20. Sarno R, Sungkono KR. Hidden Markov model for process mining of parallel business processes. Int Rev Comput Softw. 2016;11:290–300.

    Google Scholar 

  21. Sarno R, Sungkono KR. Coupled hidden Markov model for process mining of invisible prime tasks. Int Rev Comput Softw. 2016;11:539–47.

    Google Scholar 

  22. Sarno R, Sungkono KR, Johanes R, Sunaryono D. Graph-based algorithms for discovering a process model containing invisible tasks. Intell Netw Syst Soc. 2019;12:85–94.

    Google Scholar 

  23. Sungkono KR, Sarno R. Patterns of fraud detection using coupled hidden Markov Model. In: 2017 3rd international conference on science in information technology (ICSITech), Bandung. IEEE; 2017. p. 235–40.

  24. Russell N, Hofstede AHM, Aalst WMP Van Der, Mulyar N. Workflow control-flow patterns: a revised view. BPM Center Report BPM-06-22. Netherlands; 2006. p. 6–22.

  25. Sarno R, Sungkono KR. Coupled hidden Markov model for process discovery of non-free choice and invisible prime tasks. In: 4th information systems international conference. Elsevier B.V.; 2017. p. 134–41.

  26. Van Der Aalst WMP. Process mining discovery, conformance and enhancement of business processes. Dordrecht: Springer; 2011.

    Book  Google Scholar 

  27. Darmawan H, Sarno R, Ahmadiyah AS, Sungkono KR, Wahyuni CS. Anomaly detection based on control-flow pattern of parallel business processes. TELKOMNIKA. 2018;16:2808–15.

    Article  Google Scholar 

  28. Buijs JCAM, Van Dongen BF, van Der Aalst WMP. On the role of fitness, precision, generalization and simplicity in process discovery. In: OTM conferences; 2012. p. 305–22.

  29. Buijs JCAM, Van Dongen BF, Van Der Aalst WMP. Quality dimensions in process discovery: the importance of fitness, precision, generalization and simplicity. Int J Coop Inf Syst. 2014;23:1–39.

    Article  Google Scholar 

  30. van Dongen B. BPI challenge 2012; 2012. https://doi.org/10.4121/uuid:3926db30-f712-4394-aebc-75976070e91f.

  31. van Dongen B. Real-life event logs—hospital log; 2011. https://doi.org/10.4121/uuid:d9769f3d-0ab0-4fb8-803b-0d1120ffcf54.

  32. van Dongen B. BPI challenge 2020: domestic declarations; 2020.

  33. Sarno R, Sungkono KR. A survey of graph-based algorithms for discovering business processes. Int J Adv Intell Inf. 2019;5:137–49.

    Google Scholar 

Download references

Acknowledgements

This research was funded by the Ministry of Research and Technology/National Research and Innovation Agency Republic of Indonesia (Ristek-BRIN) and the Indonesian Ministry of Education and Culture under Newton Institutional Links—Kerjasama Luar Negeri (KLN) Program, and under the World Class University Program managed by Institut Teknologi Bandung, also under Penelitian Terapan Unggulan Perguruan Tinggi (PTUPT) Program managed by Institut Teknologi Sepuluh Nopember (ITS).

Funding

This research was funded by the Indonesian Ministry of Education and Culture under the World Class University Program managed by Institut Teknologi Bandung, under Penelitian Terapan Unggulan Perguruan Tinggi (PTUPT) Program managed by Institut Teknologi Sepuluh Nopember (ITS) and under the Indonesian Ministry of Education and Culture under Riset Inovatif-Produktif (RISPRO) Invitation Program managed by Lembaga Pengelola Dana Pendidikan (LPDP).

Author information

Authors and Affiliations

Authors

Contributions

RS formulated rules of GIT algorithm and checked the manuscript. KRS analyzed the efficiency of GIT algorithm and was a major contributor in writing the manuscript. MT and HD implemented the rules of GIT algorithm and performed the evaluation of GIT algorithm, AF describes the flow of medical store processes. KT checks the analysis of evaluation. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Riyanarto Sarno.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarno, R., Sungkono, K.R., Taufiqulsa’di, M. et al. Improving efficiency for discovering business processes containing invisible tasks in non-free choice. J Big Data 8, 113 (2021). https://doi.org/10.1186/s40537-021-00487-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s40537-021-00487-x

Keywords