UMSTUNIVERSITY UNIVERSITYUNIVERSITY UNIVERSITYUNIVERSITY UNIVERSITYMaster of Science in Information Systems Master of Science in Information Systems Master of Science in Information Systems Master of Science in Information Systems Master of Science in Information Systems Master of Science in Information Systems Master of Science in Information Systems Master of Science in Information SystemsBatch(03)Batch(03)Business Analysis Business Analysis Business AnalysisBusiness AnalysisBusiness Analysis Business Analysis Business Analysis Information Information Information Information system systemPROM (Process Mining PROM (Process Mining PROM (Process Mining PROM (Process Mining PROM (Process Mining PROM (Process Mining )Prepared by: Prepared by: Prepared by: Prepared by: Prepared by:Israa Abdulla Moh Israa Abdulla Moh Israa Abdulla Moh Israa Abdulla Moh AbdullaIsraa Abdulla Moh AbdullaIsraa Abdulla Moh Israa Abdulla Moh AbdullaIsraa Abdulla Moh Israa Abdulla Moh Israa Abdulla Moh AbdullaIsraa AbdullaMohNowadays, most organizations use information systems to support the execution of their business processes, it’s helpful because they gather information about what is actually happening according to an event log of a organization.ProMis open source toolset aims largely the academic and research group. The plugins added on demand enables to solve complex process exploration. ProM imports event logs compliant with the MXML or XES formats and can load process model definitions in different standards. Some of the main features of ProM are: discovering the control-flow perspective of a process, social network analysis, analyzing the resource and performance perspective of a process, discovering events based on decision rules and conformance checking with a variety of algorithms. ProM provides several export formats such as CSV and PNG.Running Example”The running example is about a process to repair telephones in a company. The company can fix 3 different types of phones (“T1”, “T2” and “T3″). The process starts by registering a telephone device sent by a customer. After registration, the telephone is sent to the Problem Detection (PD) department. There it is analyzed and its defect is categorized. In total, there are 10 different categories of defects that the phones fixed by this company can have. Once the problem is identified, the telephone is sent to the Repair department and a letter is sent to the customer to inform him/her about the problem. The Repair (R) department has two teams. One of the teams can fix simple defects and the other team can repair complex defects. However, some of the defect categories can be repaired by both teams. Once a repair employee finishes working on a phone, this device is sent to the Quality Assurance (QA) department. There it is analyzed by an employee to check if the defect was indeed fixed or not. If the defect is not repaired, the telephone is again sent to the Repair department. If the telephone is indeed repaired, the case is archived and the telephone is sent to the customer. To save on throughput time, the company only tries to fix a defect alimited number of times. If the defect is not fixed, the case is archived anyway and a brand new device is sent to the customer. ”Implementation1- The workspace page of ProM62- imported the file as an event log3- click on the then click on the to show How many cases, tasks, resources are in the log?This log has 1104 running cases, 1000 completed cases and that only 1000 cases end with the task “Archive Repair ” also there are 3 people in each of the teams in the Repair department.To inspect the individual cases clicking to inspect the log and find out more information.4- pre-processing the completed cases by select ”action view” , actions that take a log as input are coloured green means all inputs are available and actions that require additional inputs are coloured yellow mean some but not all inputs are available5- ProM6 supports various actions to mine the control-flow perspective of process models. In this example used the “?-algorithm” plug-in, This takes an “Event Log” as input, and it produces a “Petri net” and a “Marking” as output.6- The result from step 5 was mind model, All cases start with the task “Register” and end with the task “Archive Repair”.7- Select the to visualization ? then change to ”Pattern Abstraction”8- “Find Patterns” In order to find frequent paths not involving loops, extract the cases where a Restart Repair was required after a “Repair (Complex)” was performed.9- ” Find Abstractions” and Selecting the cases where a particular path is executed10- The conformance checker reveals, the green label indicates the frequency of synchronous move, the pink reflects the move in the model.a-b- statistics view11- The social network miner provides an organizational perspective of processes with an option of mining for a handover-of-work social network, from the diagram below tester2 handovers tasks to the system, Solver c1, solver c2, solver c3, solver s1, solver s2 and solver s2.? log on top of a fuzzy mined model allows for searching bottlenecks and discover what hinders the actual process from running smoothly. The time spent in inspecting repaired phones and informing user takes much time.? the plugin for analysis of performance from an event log is named as Replaying log on pertrinet for performance analysis.