Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Definitions  





2 Types  





3 References  














Inductive miner







Add links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Inductive miner belongs to a class of algorithms used in process discovery.[1] Various algorithms proposed previously give process models of slightly different type from the same input. The quality of the output model depends on the soundness of the model. A number of techniques such as alpha miner, genetic miner, work on the basis of converting an event log into a workflow model, however, they do not produce models that are sound all the time. Inductive miner relies on building a directly follows graph from event log and using this graph to detect various process relations.[2]

Definitions[edit]

A directly follows graph is a directed graph that connects an activity A to another activity B if and only if activity B occurs chronologically right after activity A for any given case in the respective event log. A directly follows graph is represented mathematically by:

[2]

Where

(activities in the log)

(directly follows relation)

The inductive miner technique relies on the detection of various cuts on the directly follows graph created using the event log. The core idea behind inductive miner lies in the unique methodology of discovering various divisions of the arcs in the directly follows graph, and using the smaller components after division to represent the execution sequence of the activities.The inductive miner algorithm uses the directly follows graph to detect one of the following cuts.[2]

is an exclusive OR cut iff:

XOR cut - inductive miner
XOR cut - inductive miner

is a sequence cut iff:

Sequence cut - inductive miner
Sequence cut - inductive miner

is a parallel cut iff:

-

-

Parallel cut - inductive miner
Parallel cut - inductive miner

is a redo loop cut iff:

-

-

-

-

-

Loop cut - inductive miner
Loop cut - inductive miner

Types[edit]

  1. Inductive miner with fall through: The complex event log sometimes would make it impossible to detect any cuts using the above techniques. In that case, there are additional fall throughs that can be applied to obtain better representation of process tree instead of a flower model.[3][4]
  2. Inductive miner frequency-based: The less frequent relations in the event log sometimes creates problems in detecting any type of cuts. In that case, the directly follows relations below a certain threshold are removed from the directly follows graph and the resultant graph is used for detecting the cuts.[5]
  3. Inductive miner for big data: This includes an improvement on the existing inductive miner to handle big data sets.[citation needed]

References[edit]

  1. ^ Wil van der Aalst (March 2010). "Process Discovery Capturing the Invisible". IEEE Computational Intelligence Magazine. 5: 28–41. doi:10.1109/MCI.2009.935307. S2CID 14520822.
  • ^ a b c Leemans, Sander J. J.; Fahland, Dirk; van der Aalst, Wil M. P. (2013). Colom, José-Manuel; Desel, Jörg (eds.). "Discovering Block-Structured Process Models from Event Logs - A Constructive Approach". Application and Theory of Petri Nets and Concurrency. Lecture Notes in Computer Science. 7927. Berlin, Heidelberg: Springer: 311–329. doi:10.1007/978-3-642-38697-8_17. ISBN 978-3-642-38697-8.
  • ^ Ghawi, Raji (2016). "Process Discovery using Inductive Miner and Decomposition". arXiv:1610.07989 [cs.AI].
  • ^ Leemans, S. J. J. (2017-05-09). Robust process mining with guarantees - SIKS Dissertation Series No. 2017-12 (PDF). TU/e - Eindhoven University of Technology. ISBN 978-90-386-4257-4.
  • ^ Leemans, Sander J. J.; Fahland, Dirk; van der Aalst, Wil M. P. (2014). Lohmann, Niels; Song, Minseok; Wohed, Petia (eds.). "Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour". Business Process Management Workshops. Lecture Notes in Business Information Processing. 171. Cham: Springer International Publishing: 66–78. doi:10.1007/978-3-319-06257-0_6. ISBN 978-3-319-06257-0.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Inductive_miner&oldid=1172220910"

    Categories: 
    Process mining
    Data mining algorithms
    Hidden categories: 
    All articles with unsourced statements
    Articles with unsourced statements from January 2022
     



    This page was last edited on 25 August 2023, at 18:25 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki