Next Article in Journal
Modeling and Control of IPMC-Based Artificial Eukaryotic Flagellum Swimming Robot: Distributed Actuation
Next Article in Special Issue
Process Mining the Performance of a Real-Time Healthcare 4.0 Systems Using Conditional Survival Models
Previous Article in Journal
Bounded-Error Parameter Estimation Using Integro-Differential Equations for Hindmarsh–Rose Model
Previous Article in Special Issue
Detecting and Responding to Concept Drift in Business Processes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Preprocessing Method and API for Mining Processes from Cloud-Based Application Event Logs

School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON K1N 6N5, Canada
*
Author to whom correspondence should be addressed.
Algorithms 2022, 15(6), 180; https://doi.org/10.3390/a15060180
Submission received: 13 April 2022 / Revised: 21 May 2022 / Accepted: 23 May 2022 / Published: 25 May 2022
(This article belongs to the Special Issue Process Mining and Its Applications)

Abstract

:
Process mining (PM) exploits event logs to obtain meaningful information about the processes that produced them. As the number of applications developed on cloud infrastructures is increasing, it becomes important to study and discover their underlying processes. However, many current PM technologies face challenges in dealing with complex and large event logs from cloud applications, especially when they have little structure (e.g., clickstreams). By using Design Science Research, this paper introduces a new method, called cloud pattern API-process mining (CPA-PM), which enables the discovery and analysis of cloud-based application processes using PM in a way that addresses many of these challenges. CPA-PM exploits a new application programming interface, with an R implementation, for creating repeatable scripts that preprocess event logs collected from such applications. Applying CPA-PM to a case with real and evolving event logs related to the trial process of a software-as-a-service cloud application led to useful analyses and insights, with reusable scripts. CPA-PM helps producing executable scripts for filtering event logs from clickstream and cloud-based applications, where the scripts can be used in pipelines while minimizing the need for error-prone and time-consuming manual filtering.

1. Introduction

Organizations use information systems to support an increasing number of business processes, whereby a process is a set of related activities that happen over time in order to achieve a goal [1]. Many such systems record what happens in running processes as event logs that contain information such as process instances, activities, timestamps, and resources. Event logs form a large amount of data ready to be exploited through process mining (PM), which aims to discover processes to improve process understanding, compliance, and quality aspects based on evidence [2]. PM is often needed because concrete processes are often more complex than their idealized process definitions or models. In this context, PM provides evidence-based process descriptions that cover all the process variations that are used by the organization, many of which being often ignored by the idealized process models.
The interest in information systems exploiting cloud computing is also rapidly growing in the industry and research communities [3]. The number of applications developed in a cloud environment is increasing because of benefits that a cloud infrastructure offers, especially regarding scalability, availability, and maintainability [4].
Clickstream data is used to represent the electronic record of a user’s behavior on Web-based information systems and cloud applications [5]. This data shows the path a user takes while navigating the website or application. This path reflects the different choices that the user takes while navigating. Given that clickstream event logs might include a record of every page visited by the user, they usually form large amounts of behavioral data. Such logs provide opportunities for a detailed look at the decision-making process of users. When applying process mining techniques on such data, process maps can be generated that represent the user actions on web/cloud applications. These process maps give detailed information about users’ navigation habits. It is important to visualize and understand user actions while interacting with a cloud application so that the latter be engineered to better satisfy user needs and ensure that users come back to the application. In order to reduce the complexity of raw event logs, Suriadi et al. [6] introduced several pattern-based approaches to improve the process models discovery by preprocessing the event log datasets for the purpose of applying process mining techniques.
Unfortunately, the complexity of clickstream data and other event logs from cloud-based applications is typically too difficult to handle by process mining tools, out of the box. A research challenge here includes how to reduce, in a repeatable way, log complexity caused by numerous cloud event attributes, action orderings (e.g., clicks and refreshes), and low-level events. Our research objective is to develop and assess a method to preprocess event logs collected from cloud-based applications to discover user actions and processes. A secondary objective is to examine how process mining can be applied on clickstream data collected from software-as-a-service (SaaS) applications and discover users’ behavioral characteristics. A suitable method should provide high automation (e.g., by being scriptable), high abstraction, high scalability, and low effort to accommodate changes frequently occurring in cloud-based logging infrastructures. The focus here is also on advanced preprocessing of event logs, where the preprocessed logs can then be fed to many existing process mining tools for visualization and analysis.
This research was conducted following design science research in information systems [7]. This methodology consists of five iterative steps, (1) awareness of problem, (2) suggestion, (3) development, (4) evaluation, and (5) conclusion, that are illustrated throughout the different sections in this paper.
The main research contribution of this paper is a cloud pattern API-process mining (CPA-PM) method, accompanied by a scriptable application programming interface (API) with an R implementation, to preprocess little-structured, cloud-based event logs and enable simpler and repeatable process discovery.
In this paper, Section 2 presents the related work, including important challenges, while Section 3 highlights the research materials and methods. Section 4 introduces the CPA-PM method and Section 5 presents its API. Section 6 shows the application of the method to a SaaS application case study, while Section 7 discusses analysis results and threats to validity. Finally, Section 8 concludes the paper.

2. Related Work and Challenges

Important motivations for applying process mining techniques on a dataset include discovering and generating understandable process models (or maps). When analyzing processes with many different cases, much noise, and a high diversity of behaviors, which are typical of cloud-based applications, the generated models are often confusing and difficult to understand. Bose and van der Aalst [8] call such process models spaghetti models and explored the iterative use of pattern abstraction to produce simpler and hierarchical models that eliminate irrelevant paths and reduce complexity. Sani et al. [9] introduced another filtering method that identifies noise and infrequent behavior in processes as outliers. This filtering approach is based on identifying whether an event is likely to happen depending on a sequence of previous events, which was defined as the conditional probability between sequence of events in processes.
A recent survey on user behavior analysis from clickstream data highlights different approaches based on clustering, classification, and association, but no PM approaches specifically [10]. Our own systematic literature review [11] however assessed 27 peer-reviewed papers related to the application of PM technologies to cloud processes as well as clickstream datasets, including applications to customer journey process modeling [12]. This review shows that the area of cross-organizational process mining (initially explored by van der Aalst [13,14]), common in a cloud-based context, is still challenging. There are also common PM-related challenges arising from the evolution or drifting over time of the systems and processes being monitored, as well as of the concepts they manipulate [15]. The review also highlights specific challenges faced when preprocessing event logs collected from cloud-based applications, including clickstream data. In particular [11]:
  • Cloud-based logs are generated from different monitoring systems, often from different organizations, leading to ID/case alignment issues especially in the presence of privacy constraints.
  • Cloud-based logs often contain hundreds of attributes that are sparsely populated, which require analysts to select/merge attributes at preprocessing time.
  • Cloud-based processes typically evolve more rapidly than conventional processes, especially in a DevOps context with daily deployments. Different types of events with attributes can then start/stop appearing in the logs at a very high rate.
  • For real-time processing, the granularity of cloud-based logs is often much finer (hundreds of clicks/events per second) than in conventional processes, which adds to the processing complexity.
  • Given that users are usually free to click anywhere on a Web application, and that the proportion of incomplete process instances is high in cloud-based applications, the readability of mined process models is low (and spaghetti-like).
  • Dealing with noisy cloud-based logs, where too many events are tracked, adds to the complexity of models.
  • Many cloud-based events have generic names and must be split according to some of their attributes into different events.
  • The monitoring and trace management tools in cloud environments frequently evolve, which in turn results in changes in the nature of the collected logs.
  • Events whose ordering or even presence is not important (for instance, click-refresh-click-refresh) often pollute cloud-based logs and should often be aggregated (e.g., to click-click-refresh or even just click-refresh) in order to simplify the resulting processes.
In the process mining literature, simplification of event logs is often done with a combination of abstraction [16], event/trace filtering (e.g., based on frequencies or attributes) [17], and trace clustering (e.g., K-means clustering) [18]. Although filtering techniques alone work well with structured processes, they have problems discovering less structured ones, especially in a cloud-based context [16].
Preprocessing is required to reduce and simplify event logs [19,20]. Preprocessing such logs before applying process mining techniques usually takes up between 40% and 80% of the total effort for most people [21]. Preprocessing is so important that the IEEE Task Force on Process Mining is currently surveying the community regarding challenges and solutions for improving event data preparation for process mining (see https://bit.ly/TFPM-survey2001, accessed on 13 April 2022). Preprocessing is even more needed in a cloud application context. Generic technologies such as Extract, Transform, and Load (ETL) certainly have a role to play [22], especially regarding challenge #1 (see Figure 1), but they are insufficient for the other challenges. There are several process mining tools that support different types of filtering for the event logs, though such tools do not provide much flexibility in terms of the filtering that the analyst can do. The filtering techniques are also decided based on the type of the data and the analysis that has to be done.
There is also a need to automate this preprocessing, ideally by using repeatable scripts exploiting a domain-specific API that focuses on solving some of the PM-related challenges for cloud and clickstream applications. Scripting filters helps minimize repetitive and often error-prone manual labor. Yet, scripting is not even mentioned in a recent review of event log preprocessing for process mining [19].

3. Materials and Methods

Our research method follows Hevner’s design science research (DSR) in information systems (IS) [7], both in terms of research relevance and research rigor. The design science paradigm is based on iterative problem solving. It aims to create innovations that define the ideas, practices, and products through the analysis, design, and implementation where the use of IS can be effectively and efficiently accomplished. In this paradigm, an artifact should be produced by taking into consideration the existing knowledge in the discipline and should be produced creatively to solve real-world problems. Artefacts are usually constructs, models, methods, and instantiations. We have instantiated DSR’s five steps to our research context.
(1) Awareness of problem: In this phase, the researcher defines the specific research problem and justifies the value of this research and the proposed solution. We performed a systematic literature review about the challenges in the area of process mining for cloud-based applications [11], whose conclusions are summarized in Section 2. Input from key informants of a SaaS application provider obtained through meetings was also taken into consideration. This also led to our main research question: What is a suitable method by which to discover and analyze cloud-based application processes?
(2) Suggestion: In this phase, from the defined problem and knowledge of what is possible and feasible, we defined the objectives for the solution. A tentative solution was developed that was presented to a SaaS company that provided event logs from their systems. In this phase, a new method (our main artifact) and its different steps were defined, and the solution was illustrated with a manual example. This new method is the topic of Section 4.
(3) Development: In this phase, the researcher creates an artifact, which is the solution to the defined problem. The artefact developed here is a method that exploits an API (with an implementation). The development went through several iterations by exploring available features in existing tools (mainly Disco, several ProM plug-ins, and data processing libraries) with open-source datasets and real event logs from the case study. The existing functions relevant to the preprocessing of cloud-based application logs can hence be replicated outside these tools (in the API, in order to support automation in one place, independently of the PM tools used for visualization and analysis) and supplemented by new useful functions in the API. An implementation of the API was done in the R programming language (https://www.r-project.org/about.html, accessed on 13 April 2022). R was selected as this is a common data manipulation and analysis language, and it was also already used extensively by the SaaS company. This API is presented in Section 5.
(4) Evaluation: In this step, the researcher observes and measures how well the artifacts support a solution to the problem. Additionally, the researcher communicates the problem and its importance. The evaluation method that was used here is an application case study, combined to a comparative analysis and a performance evaluation. A dataset provided by a SaaS company was used to evaluate the developed method for preprocessing event logs before importing the event logs to the PM tools. After preprocessing the event logs by using the proposed method, the Disco and ProM PM tools were both used to build the process maps and visualize how processes are executed in reality. Several iterations are performed on the dataset in order to answer the questions about the business processes. Here, we used two iterations based on two versions of the event log (taken at different times) to assess the complexity of adapting scripts in the context where the structure of logs changes. The case study is presented in Section 6, whereas Section 7 presents the comparative analysis and a performance evaluation.
(5) Conclusion: This phase is the last step in the research process. Here, the results of the research are finalized, indicating the end of a research cycle. This step concludes the research projects and presents the results. A paper [11] and a thesis [23] were already produced, and this paper (accompanied with code and examples on GitHub) concludes this research.

4. Cloud Pattern API-Process Mining Method

Cloud pattern API-process mining, as the main artifact of this research paper, is a method for preprocessing event logs (including clickstream data) collected from cloud-based applications, that tackles challenges #2 to #9 from the previous section. Through an API, currently implemented in R, CPA-PM enables scripting for log manipulation and for replacing patterns before applying process mining techniques on the event logs. The CPA-PM method consists of three main steps (see Figure 2) that enable preprocessing cloud-based application event logs, which usually include a large number of columns (i.e., event attributes) that need to be taken into consideration when aggregating rows in the dataset.
The input for this method is an event log dataset (in CSV), and the output is a cleaned log (CSV) that can be imported by process mining tools for building simpler process maps and enable further analysis. The single input CSV file can itself be a result of a prior extraction and processing from multiple data sources where, for example, conventional technologies (ETL) and their tools can be used. The steps of the CPA-PM method might go through several iterations to get answers for analysis questions.
Note that CPA-PM and its API offer tools to automate the simplification of event logs, but they do not guarantee that the resulting logs will preserve the right information to support understanding. This remains the responsibility of the analyst.

4.1. Clean-Up Step

In this step, initial cleaning of the dataset is done. Seven sub-steps are included here, and the last two sub-steps (1.6 and 1.7) can be interleaved.
Step 1.1:
Read the CSV log file, which must include the three main columns that are needed to apply process mining (case ID, event, and timestamp). It may also include other columns, for example resources and other properties.
Step 1.2:
Clean column identifiers, e.g., by removing white spaces and dots from the column’s names and ensuring their unicity. This returns a dataframe dataset with clean names that consist only of lowercase letters, numbers, and underscores.
Step 1.3:
Ensure the time format of the timestamps reflects the granularity needed. For example, if the timestamp must include detailed information about the minutes, seconds, and milliseconds for when the event occurred, this may require merging separate date and time columns, or changing the encoding of the date/time information.
Step 1.4:
Ensure that the cells in a given column comply with their expected column type and transform or cast the column, if necessary, to the required data type.
Step 1.5:
Select only the columns needed for the analysis questions. For clickstream data, the analyst should select (a) the case identifier, event, and timestamp columns minimally required by PM techniques; (b) the resource columns relevant to the analysis questions; and (c) the attribute columns that refine events. Consider also excluding columns that are empty or that threaten re-identification.
Step 1.6:
Filter the event log. Filtering is a popular preprocessing technique the goal of which is to reduce the complexity or to focus on a specific part of the process during the analysis. This technique is usually performed multiple times, iteratively.
Step 1.7:
Remove incomplete cases. An incomplete case is a truncated case/trace that is missing the start and/or the end event(s) in a process instance.

4.2. Dataset Restructuring Step

Restructuring for the event log is performed in such a way that process mining algorithms can be applied depending on the understanding or analysis questions that should be answered. These different techniques, some of which implement several known event abstraction approaches [24], can be applied during this step.
  • Enriching the event log dataset: Event logs can be enriched with additional attributes, e.g., by adding external additional data collected or by combining two different datasets. This is, however, often done before the generation of the original CSV file (e.g., by using ETL). Another way is by deriving or computing additional or derived events and data attributes based on the existing attributes in the data, resulting in new columns calculated from other columns. Such additions depend on the required analysis, e.g., for calculating the time difference between the occurrence of two events to reason about durations.
  • Aggregating events: Aggregating events into coarser-grained or more abstract events (e.g., along “is-a” or “part-of” relationships between events) can help reduce complexity and improve the structure of clickstream datasets, leading to better and simpler processes.
  • Aggregating rows: This technique includes aggregating several rows into one row, to reduce complexity and (unnecessary) repetition of the same event. For example, let us consider that event A is repeated multiple times in a given case, but needs to be considered only once. Options here include keeping only the first occurrence of event A, keeping only its last occurrence, or merging all the A rows into one by applying maximum, minimum, average, and other such functions on the columns’ attributes for the repeated event A. This will be illustrated in more detail in the API functions and their implementations.

4.3. Event Pattern Substitution Step

In this step, complex event patterns are substituted with a new event to reduce the complexity of the resulting process maps. If several event patterns are repeated and are known to occur together, then they can be substituted by a single, more abstract event. Defining, selecting, and substituting patterns in this step is done by domain knowledge experts. Several common patterns are defined as rewrite rules at this stage and can be used on the cloud-based application event log dataset. These and other patterns can be defined by the analyst depending on the analysis context.
For example, consider a common event in a cloud application case: a page refresh. A pattern could consist of a non-empty sequence of refresh events (refresh+). As whether the page is refreshed once or many times without any other events in between, that sequence refresh+ could be replaced by only a refresh event. This would simplify many traces, and make them equivalent along the way, which would help simplify the resulting process model generated through process mining, without negatively affecting its usefulness. More complex patterns involving sequences of interleaving click and refresh events (click-{click |refresh}*-refresh) could similarly be simplified by substituting them to a single click-refresh pair. In all these situations, the analyst would still need to decide, depending on the context, how to aggregate the timestamp of these events, for example by selecting the first timestamp for the click and the last one for refresh, the first one for both, the last one for both, or some average. The API presented in the next section provides aggregation functions that support this flexibility, not just for timestamps but also for all other attributes of the events.

5. CPA-PM Application Programming Interface (API)

This section presents the API functions, mainly described in terms of addition, removal, or modification of rows, columns, and traces. As the purpose here is to simplify and shorten event logs, the API offers mainly removal and modification functions. Please note that in the following, an event log table with a heading row is also called a dataframe. Most of the functions (except writeCSV) return a new dataframe.
  • readCSV (String file): reads the CSV file into a dataframe that it creates.
  • writeCSV (table DataSet, String file): writes the dataframe to a file.
  • cleanHeaders (table DataSet): cleans the dataset’s headers of the columns from spaces (replaced with _) and other special characters (removed). This function only keeps lower case letters, numbers, and underscores (_), and it ensures that the resulting names are unique.
  • selectColumns (table DataSet, string columnName, …): selects/keeps the list of columns needed for analysis from the dataset. Only the list of selected columns (attributes) are included in the dataset.
  • deleteColumns (table DataSet, string columnName, …): drops the listed columns from the dataset.
  • filter (table DataSet, condition Conditions): keeps records/rows based on the conditions specified. Only the rows where the condition is true are kept in the DataSet. Comparison and composite functions are supported with ==, >, <, >=, <=, &, |, and !.
  • removeEventsLowFrequency (table DataSet, String eventName, integer freq): removes the events from the dataset that have a frequency below the value freq (count integer) when grouping by eventName.
  • deleteTraceLengthLessThan (table DataSet, String groupID, integer num): removes the traces where the number of events is less than a specified value. groupID is the name of the variable to group traces by, and num is the minimum number of events.
  • deleteTruncatedTracesStart (table DataSet, String groupID, String eventColumn, String value): removes the traces/traces that do not start with the required event value. groupID is the name of the variable to group traces by, and eventColumn is the name of the event column. value is the value of the eventColumn that specifies the required start event name.
  • deleteTruncatedTracesEnd (table DataSet, String groupID, String eventColumn, String value): similar to the previous one, but removes the traces/cases that do not end with the required event.
  • deleteTracesWithTimeLess (table DataSet, String groupID, String timestampColumn, integer t): removes the traces/cases that ran for a total duration less than t. timestampColumn is the name of the timestamp column, and t is the value of the minimum total duration for each trace/case, in seconds.
  • concatenateColumns (table DataSet, String newColumn, String col1, String col2, …): concatenates two or more columns (col1, col2, …) in a dataframe into a newColumn that is added to the dataframe.
  • arrangeRows (table DataSet, String columnName, …): sorts the rows by columnName, in increasing order. columnName is a list of unquoted names.
  • eventIsRepeated (table DataSet, String groupIDCol, String eventCol, String newCol): creates a new column newCol that indicates whether the event has been repeated or not. The event is represented by the eventCol parameter. The new column will only include values 0 (when not repeated) or 1 (when repeated).
  • deleteAllEvents (table DataSet, String event, String eventName): deletes all records/rows with an eventName value in the event column.
  • keepFirstEvent (table DataSet, groupID, String eventAttribute, String eventName): keeps the first occurrence of an event (i.e., the first occurrence of several repeated events). groupID represents the column for grouping the records, eventAttribute the event attribute column, and eventName the event name whose first occurrence in each group we want to keep.
  • keepLastEvent (table DataSet, groupID, String eventAttribute, String eventName): similar to the previous one, but keeps the last occurrence of an event (i.e., the last occurrence of several repeated events).
  • mergeRows (table DataSet, list groupByVariables, list columnArguments): aggregates several rows into one row. groupByVariables represent the variables to group the dataframe by, and columnArguments represents the new column arguments based on aggregation functions. Each column of the aggregated rows requires one predefined aggregation operator from: mean, median, min, max, sum, first, last, n (count), of logical operators. String concatenation is supported too. Those aggregation operators are defined by the analyst.
As mergeRows() is the most complex function of this API, we are illustrating its application on a simple sequence of events extracted from a real event log. This function works by splitting the data into groups, applying some analysis to each group of data, and then combing the results. It works by aggregating several rows for each column. For instance, the first three rows of Table 1 target the same activity of the same case identifier. The analyst may decide to keep only one such event (as in the patterns described earlier). The issue here is to decide how to aggregate the information in the various columns.
When aggregating the rows grouping by case_id and activity attributes, the analyst may decide to keep the timestamp and weekday of the first event; produce lists of unique activity, city, client, and device values for their respective columns; calculate the sum of the merged elements in the num_items column, and keep all the values of the product_category column (without uniqueness). The invocation of this API in R on the log named EventLogs is as follows, with the result shown in Table 2.
mergeRows (EventLogs, .(case_id, activity), summarise,
  timestamp = first(timestamp),
  activity = paste(unique(activity), collapse = ’,’),
  city = paste(unique(city), collapse=’,’),
  weekday = first(weekday),
  client = paste(unique(client), collapse=’,’),
  num_items = sum(num_items),
  product_category = paste((product_cateogry), collapse=’,’),
device = paste(unique(device), collapse=’,’)) -> EventLogs
This API contains basic functions to load/save CSV files and filter rows and columns, but also advanced ones that support the various steps of CPA-PM more directly and efficiently. For example, deleteTruncatedTracesStart() and deleteTruncatedTracesEnd() are essentially used to support Step 1.7 of the CPA-PM method (Section 4.1). These functions exclude from the event log the incomplete traces (i.e., all the events for one case) that either started too early or finished too late (or did not finish) according to the time frame where the log was produced, see Figure 3.
This API addresses challenges #2 to #9 from the literature review. It is currently implemented in R, but a Python version is also being considered. More detail about the API and its usage is available in [23], and its R implementation is available online at https://github.com/NajaElgharib/CPA_PM (accessed on 13 April 2022).

6. SaaS Application Case Study

The CPA-PM method is applied to a real clickstream event log dataset in order to assess the effect of the CPA-PM method on the preprocessing of datasets collected from a SaaS application on the process mining results. The logs’ events include user actions from when users start the trial version of the application until they either become real clients or give up along the way. CPA-PM is then applied to a second dataset extracted from the same log management tool for the same process taken several months later to understand and assess the impact on the initial script of the evolution of the processes and of the log monitoring infrastructure after a long time in a SaaS company.

6.1. Case Study Overview

The aim of the case study is to apply the CPA-PM method steps to preprocess the raw event log dataset in order to discover better structured process maps than without using preprocessing. The dataset was provided and anonymized by a SaaS company, but it still cannot be shared publicly for confidentiality reasons. The dataset was collected from a cloud-based data visualization application that allow users to create interactive dashboards. The logs’ events include user actions from when users start the trial version of the application until they become real clients, or give up along the way.

6.2. Dataset

Data extraction is the first step in such PM project, which is then followed by data preprocessing. Data extraction involves getting the event log from the (possibly many) log management tools used by the SaaS company. The starting point in this case study is the event log dataset related to the trial version, provided as one CSV file after anonymization, and renaming of some of the events (to preserve the confidentiality).
The dataset includes three months (August 2018 to October 2018) of events, with 1,602,438 different records/rows and a very large number (152) of variables/columns. The dataset includes records from 4462 different cities. From the case study, only 24 different variables are needed based on the process-oriented questions that we want to answer. These questions pertain, for example, to the situations under which the users stop using the trial version before becoming (paying) customers.

6.3. Case Study Planning

The main columns in the dataset that are required before applying PM techniques are the case identifier, the timestamp, and the activity.
  • Case ID: The Company ID attribute is chosen as the case ID, as it refers to cross-site identifier used to differentiate users. The Company ID does not change from the starting point of the process (user sign up for trial version) until the last activity within the time frame that is included in the dataset, even if the user uses the trial version of the application sporadically over several days.
  • Timestamp: Each event occurs at a particular moment. The timestamp used here is in this format: YYYY-MM-DD hh:mm:ss.
  • Activity: From the event log dataset, the event attribute was selected as the activity. The event attribute represents the clicks and actions done by users while using the online application. Table 3 displays some event names (among 93) from the dataset, with their descriptions.
  • Other attributes: In addition to the main three attributes that are needed for PM analysis, the dataset includes additional columns that represent other attributes and properties that exist when an activity/action occurs. Here, those attributes include data source, data source number, help guide name, template name, account type, number of users, device type, browser, city, weekday, number of dashboards, dashboard type, and others. These attributes are considered as other necessary properties that will be used in the analysis.
  • Process mined from the original event log: The initial process map generated by using the Disco tool [25] for the original event log, shown in Figure 4, is much too complex and unreadable for any analysis purpose. With high numbers of variants with respect to the cases, such spaghetti process maps are generated but are not helpful during analysis. Preprocessing and restructuring of the dataset are required.

6.4. Data Preparation and Preprocessing

CPA-PM is illustrated on the SaaS application dataset, starting with the Clean-up step. The following six points correspond to Steps 1.1 to 1.6 in Section 4.1.
  • The first step involved importing the dataset (a CSV file) to RStudio, the R environment we used to execute the R functions from the CPA-PM API. The following step is executed in order to read the CSV dataset file:
    • EventLogs <-readCSV (file="full_DS.csv",header=TRUE,sep=",").
    The EventLogs dataframe is created in RStudio. Then the dataset was explored to compute the total number of unique events that exist. The EventLogs dataset includes 93 unique events executed by users during the three-month period.
  • After importing the CSV file, the cleanHeaders() function was applied to make sure there is consistency with the column headers names:
    • cleanHeaders (EventLogs)-> EventLogs.
  • In this step, the time format was checked and it was already appropriate.
  • We ensured that the attributes needed for the analysis were available in the SaaS application dataset, with the right type.
  • In this step, the selectColumns() function was called to select the list of columns needed for the analysis, which are here. Here is a list of the columns that were selected for the analysis:
    • selectColumns (EventLogs, company_id, event, time, client, template, guide_name, guide_type, number_of_graphs, number_of_graphs_on_dashboard, graph_origin, source, kpi_count, template_name, account_type,graphs_owned, data_format, data_sources_owned, dashboard_template_name, connector_backend, x_city, weekday) -> EventLogs.
  • Then, some initial filtering was done. This filtering includes cleaning the dataset from some of the attributes that are not needed:
    • Remove the empty case identifiers:
      EventLogs %>% filter (company_id != "") -> EventLogs
    • Remove the records where the client attribute value is Phone App, since for this analysis we are not interested in including the phone app users:
      EventLogs %>% filter (client != "Phone App") -> EventLogs
    • Remove the records where the event is View Dashboard, because this is an event with a very high frequency and many variants as it is clicked many times by users, and it will not add useful information to the analysis:
      EventLogs %>% filter (event != "View Dashboard") -> EventLogs
    • Other records with very low frequency (10 and less) and not needed in the analysis were removed:
      removeEventsLowFrequency (EventLogs, company_id, 10) -> EventLogs
    • Sort the events in the dataset according to company_id and time variables:
      arrangeRows (EventLogs, company_id, time) -> EventLogs.
    After doing the initial cleaning of the dataset EventLogs, the resulting dataset was imported to Disco to start the analysis. Company_id was selected as the case identifier, event as the activity variable, and time as the timestamp variable. According to Disco, the resulting EventLogs dataset includes 960,919 events over time (a 40% reduction from the initial dataset), 52,084 cases, 85 activities, and 13,848 different variants.
  • The removal of incomplete cases (Step 1.7 in Section 4.1) is an important data preparation step that needs to be done before starting the PM analysis. For example, truncated cases may appear to be faster than they really are and distort case durations. Removing incomplete cases can also help simplify the process map, because incomplete cases inflate the process map layout by adding spurious end or start points to the process map. In this case study, we removed all the traces that did not start with the Trial Sign Up Completed event:
    • deleteTruncatedTracesStart (EventLogs, company_id, event, "Trial Sign Up Completed") -> EventLogs.
    After applying this function, the dataset got simpler, with 816,125 different records and 15,190 unique cases. Note that deleting cases truncated at the end with the API’s deleteTruncatedTracesEnd() function is not performed here because we want to analyze the reasons why users abandon trials before buying the application, and so these incomplete process instances must be preserved.
Another type of filter based on very short traces (Step 1.5 in Section 4.1) can be considered. For example, there are 520 cases that have only one event “Trial Sign Up Completed”, and 149 cases with only two events; “Trial Sign Up Completed” and “Help Guide Start”. The cases (traces) with very few events per trace (1 to 2 events) are not interesting for the analysis because they do not provide much information about the processes (the users simply started the trial version of the cloud application but did not really use it). These traces should be removed from the dataset. In this case study, the traces that included only one or two events were deleted:
deleteTraceLengthLessThan (EventLogs, company_id, 2) -> EventLogs.
Simple loops involving one event (e.g., the “Help Guide Start” activity) were also not deemed interesting, and they were filtered out to further simply the logs:
eventIsRepeated (EventLogs, company_id, event, isRepeated) -> EventLogs
EventLogs %>% filter (isRepeated! = "1") -> EventLogs
More complex simplifications involving pattern-based substitutions and the merging of rows were also used (see [23]). These were all captured in an R script, available online.

6.5. Process Discovery, Mining, and Analysis

After preprocessing the event logs by using the CPA-PM method, the resulting dataset was imported to two PM tools, namely Disco and ProM, for process discovery (the specific type of process mining of interest in this case study) and analysis. The preprocessing steps can go through several iterations before getting to the final answers to the analysis questions. Even after importing the dataset to PM tools, a process model is generated (e.g., Figure 5), and the analyst can iterate again through filtering, aggregations, and pattern substitutions before importing the resulting dataset again to PM tools (see Figure 2).
Different variants of our R script were produced to answer different stakeholder questions, such as “what are the steps followed by trial users who give up before registering (non-converters)?”, “what is the main process for converters?”, and “how different are the processes when non-converters give up within 5 min from when they use the application for between 1 to 14 days?”. Figure 5 shows one of these answers about converters in the form of a Disco process model, whereas Figure 6 shows the process used by non-converters.
These two models are interesting because in the original log, 76% of the cases had a duration shorter than 5 min, so they are quite representative. In addition, there are more reasons (alternatives) why people do not convert and 24 times more cases than for converters. The most frequent path for non-converters is <Trial Sign Up Complete, Help Guide Start, Help Guide Exit>, which suggest that non-converters quickly abandon without really exploring the service. Other such models can be found in [23].

6.6. A Second Dataset

Another dataset was provided by the SaaS company for analysis. The purpose here is to re-apply the functions for preprocessing the dataset (essentially captured in a reusable script) and check how much change the original script is required in order to adapt it to new, more recent datasets. This addresses challenges #3 and #8 from Section 2.
The new dataset was collected for the period from January 2019 to August 2019, and it includes 21 different variables/attributes, 2,144,210 records/rows, and 34,315 different traces. Additionally, the new dataset includes 142 unique events, which is more than the number of events in the first dataset. That could mean that the process activities have changed over time, or that new types of events were collected while using the application. The aim here is to evaluate how well the analyst can execute the original script on this dataset in order to adjust for processes and logging environments that change over time. The initial preprocessing script was hence applied again.
Although scripts can be used many times, especially in a short time period, at some point, as processes and technologies evolve in an enterprise, the scripts may need to evolve as well. Indeed, the script developed for the initial dataset, which was used as is on other datasets from 2018, could not be reused as is here because of the new types of events that were observed in logs from 2019. Step 1.5 of the CPA-PM method was hence re-applied to handle these new events (i.e., to decide whether to keep them or not). This took a few minutes of manual effort, mainly to understand the nature of the new events. The rest of the script did not have to be modified, and its execution led to similar reductions in log and process complexity as previously observed for the first dataset. Overall, modifications to the script took a few minutes, suggesting high reusability and good tolerance to the evolution of logs over long periods of time.

7. Discussion

This section analyzes the proposed CPA-PM method for helping analysts better preprocess event logs. Additionally, a scalability analysis for the method is performed. Threats to validity are also discussed.

7.1. CPA-PM Method Analysis

Often, real-life cloud-based processes are so complex that the resulting process maps are too complicated to interpret and use for discovery and analysis purposes. These spaghetti processes are not incorrect per se. The problem however is that such process maps are too large and unstructured to derive any useful insights or information that can be used to answer analysis questions that may lead to process or application improvement. At this level, what is needed is to simplify such complicated process maps, or their source event logs. Clickstream datasets can contain millions of events capturing user clicks anywhere on application pages, as well as page refreshes.
The CPA-PM method proposed here can help in cleaning such datasets in a suitable way in order to build more meaningful process maps automatically and repeatedly for different datasets using the same logging infrastructure. After applying the steps of the CPA-PM method, the resulting process maps are less complex and more understandable in terms of displaying the main events that were executed in the process. Many traces and events can be deleted or aggregated without affecting the answers to analysis questions. This method also focuses on reducing variations in one same process. Finally, the API invocations used to support the CPA-PM steps for a particular event log can be collected as a script that can be run each time a new version of the event log becomes available, hence helping automate the analysis while reducing manual labor. This preprocessing method is applied on the dataset before importing the reduced dataset to process mining tools. In this paper, Disco was used to display process maps.
Analysts can also discover along the way that a better logging mechanism should be used in their cloud system. For example, not all user activities may be logged properly in the log management tools. After applying process mining techniques and building process maps, analysts may discover that some activities that should be present are actually not displayed in the process maps because they are not properly logged.
Note however that the logs may also be simplified too much, and that important information may be removed along the way. CPA-PM does not compute similarity metrics or information loss (as in [20]); such features could be added in the future.
In terms of scope, the CPA-PM method is a data preprocessing technique with API functions that can address many difficulties in simplifying event logs generated from cloud-based applications. We believe the API can also be used regardless of the type of application; it is not bound to cloud-based applications, but its utility has not yet been investigated in other contexts. Additionally, CPA-PM can be applied to logs generated at different moments in time, and the scripts do not need to be modified if the logs share the same structure. Given that CPA-PM comes with an API implementation, the analyst has the flexibility to implement the scripts by using the available functions in any order that can best answer the research questions. In addition, CPA-PM allows the analyst to run multiple iterations for the data clean-up, dataset restructuring, and event pattern substitution steps.

7.2. Closely Related Work

Suriadi et al. [6] introduced several pattern-based approaches to improve understanding by preprocessing the event log datasets for the purpose of applying process mining techniques. Some of their patterns can be used before applying the CPA-PM method. For example, their unanchored event pattern refers to formatting the timestamps to what is expected in a PM tool. They also have patterns (e.g., pattern scattered case) that enable proper merging of logs from multiple sources, which is useful as CPA-PM assumes this work to have been done, resulting in one global log. What is interesting, however, is that CPA-PM can be used to implement, in scripts, some of their patterns. For instance, the scattered event pattern and the collateral events pattern help the analyst identify the sequence of events to merge into one event, taking into account (or not) the other attributes in the log. This is exactly where many of the API functions (especially mergeRows()) can be used.
Zerbino et al. [26] recently provided a review of 145 papers related to process mining in business management, where they identify 11 research gaps at the PM application level. As CPA-PM is mainly a preprocessing method, its managerial impact is in the continuous production of clean and meaningful process models, which is a technical prerequisite to addressing many gaps identified by Zerbino et al. For example, many of our API functions (e.g., mergeRows() and concatenateColumns()) and patterns that exploit them aim to support abstractions that result in models better supporting tactical and strategic decision making, and not simply operational decision making. Different scripts can also be used to produce different models from the same logs, enabling the selection of the right content and the right level of abstraction for supporting understanding and decision making for a specific question or problem.
Extracting valuable knowledge from raw event log data is very difficult. Before applying any process mining techniques by using any of the available tools, appropriate data preprocessing and cleaning is required. Bose et al. [27] discussed several data quality issues with event logs and identified four categories of process characteristics data issues: (1) missing data, (2) incorrect data, (3) imprecise data, and (4) irrelevant data. Data quality issues will negatively impact the quality of the process mining results. Our API implementation includes several methods at the data clean-up step, such as deleteTruncatedTracesStart(), deleteTruncatedTracesEnd(), and deleteTracesWithTimeLess(). There are however situations reported in Bose et al. [27] that are not handled by our method, such as the fixing of incorrect or imprecise timestamps.
In most situations, preprocessing event logs before applying process mining analysis is an initial step that must be done. Vidgof et al. [28] remarked that filtering raw event logs, which are usually complex and noisy, is necessary before importing data into a process mining tool, especially for generating meaningful analyses [17]. Augusto et al. [17] observed that in spite of the existing set of advanced algorithms for process discovery, when applied on real-life and raw event logs, they will usually generate spaghetti process models with low fitness and precision (as in Figure 4).
Vidgof et al. [28] focused their process mining research on the importance of event log filtering, trace clustering, and the simplification of event logs. Unstructured processes require more advanced filtering techniques than the simple filtering approaches provided by several process mining tools [18]. CPA-PM’s API implementation includes several functions for advanced data preprocessing, for example mergeRows() that takes into consideration the values of the other attributes.
Conforti et al. [29] discussed the challenges encountered when discovering process models from event logs with noise and introduced an automated technique to filter out infrequent cases in event logs. The filtering technique constructs an abstraction of the process model recorded in the event log dataset. Conforti et al. [29] focused on filtering out the infrequent process behaviors by first detecting those infrequent behaviors and second removing the associated process cases. Our API implementation includes the removeEventsLowFrequency() method to remove events for low frequency and the deleteTraceLengthLessThan() method to delete the traces with a number of events less than a specific number.
There are other types of filtering not handled by CPA-PM, such as goal-oriented filtering where cases that do not meet a specified goal are removed from the log [30]. However, CPA-PM can still be used in combination with these more advanced and specific filtering techniques, as they focus on complementary aspects. Should these techniques also provide callable APIs, then they could also be invoked in the scripts presented in this paper.

7.3. Scalability Analysis

As the number of records in event logs increases, the resulting process maps often become more complex. More preprocessing iterations and effort are hence usually required. It is important to test the scalability of the CPA-PM method and scripts when the size of event logs increases. A scalability analysis was performed on subsets of real datasets that vary in size (by doubling the initial one 9 times). The same script with the same API function invocations was run on each of the datasets. The script was run three times on each dataset, and the average execution times are reported in Figure 7.
In term of environment, the scalability analysis was performed with RStudio running on a laptop with Windows 10 (64-bit), 16 GB RAM, and an Intel® Core™ i5-8250U processor. No other application was running in parallel.
As expected, the higher the number of events in the log, the higher the average runtime. This might cause issues in some contexts where this part of the analysis is time sensitive. What is interesting in Figure 7, however, is that the increase in average duration is less than linear with respect to the number of events in the log, likely because the initial filtering steps are efficiently removing many of the records up front.
In some situations, the dataset might include more attributes (i.e., more columns), which would require more computations when merging the rows and hence result in longer run times. The impact of such additional attributes was not assessed explicitly here. However, in situations where more pattern iterations are executed, the number of rows would be reduced, which might in turn shorten the average runtime.
Still, in general, having to wait 10–12 min to preprocess automatically a million events, in a repeatable way, is still much better than doing so manually, as the latter approach would take much longer and be more prone to errors.

7.4. Threats to Validity

Several potential threats to the validity of this research are discussed here.
Construct validity aims to assess the extent to which the tests performed actually measure what our method claims to be doing. An important threat here is that the chosen case study may not reflect all the different analysis questions that process maps can answer. The data quality may have been an issue in answering some further questions about the processes in the case study. Additionally, there was only one case study in this paper and the data was provided only by one source. Another threat is that only two process mining tools were used to build the process maps. To mitigate some of these threats, a second dataset was provided to the method and the script could be used again. The limitation remains that the new dataset was provided by the same stakeholder and from the same system, just at a different time and for a different period.
Internal validity aims to estimate and evaluate the degree to which conclusions about the analysis of the proposed method can be made based on the case study and the data provided. The first threat here is that bias might have been introduced by having to perform the evaluation and analyze the results of the case study. This threat was partially mitigated by having two people evaluate the results of the case study. Also, this could be further mitigated by having the stakeholders apply the method on other datasets and having them evaluate it themselves.
External validity aims to estimate whether results of the evaluation can be generalized to other cases. Although there is no reason to believe the proposed method and API cannot be used on other datasets (even outside the context of cloud-based applications), there is currently no evidence they can. To mitigate this threat in the future, we can apply the method and API functions on datasets provided by different stakeholders and for different types of processes.

8. Conclusions

This paper contributes a data preprocessing method (CPA-PM) for event logs generated by cloud-based information systems, with an emphasis on clickstream data. To properly apply process mining on such logs, advanced and iterative preprocessing must be done in order simplify the resulting mined processes without losing valuable information. It is also important that the preprocessing steps be repeatable. CPA-PM includes different steps needed to clean and restructure cloud-based event logs and address relevant challenges in that area (especially #2 to #9 in Section 2), including a large number of events and attributes, spurious and repetitive events, and unstructured orderings of events. As an additional contribution, the method is supported by a new API with an implementation in R, which enable the scripting and reuse of preprocessing steps. CPA-PM goes beyond what is usually found in ETL tools and in the preprocessing capabilities of process mining tools.
There are many opportunities to extend this research work, some of which is identified in the previous section. We also plan to extend the CPA-PM method to include more functions for preprocessing event logs, provide a Python implementation, and integrate the API to an existing PM tool. We are currently exploring an integration with the free PM4PY tool, but as this API is really for preprocessing logs, any PM tool can benefit from our approach, including commercial solutions such as Celonis [31], Signavio [32], UiPath Process Mining [33], and Apromore [34]. Additionally, more case studies can be done to apply the method on event logs that represent user actions while navigating the different parts of an application, or different application domains. The integration of similarity and information loss metrics, together with support for multiple, different logging systems in cloud environments, would also be beneficial. The usability of the API also deserves further attention in the future

Author Contributions

Conceptualization, N.M.E.-G. and D.A.; methodology, N.M.E.-G. and D.A.; software, N.M.E.-G.; validation, N.M.E.-G. and D.A.; formal analysis, N.M.E.-G.; investigation, N.M.E.-G. and D.A.; resources, N.M.E.-G.; data curation, N.M.E.-G.; writing—original draft preparation, N.M.E.-G. and D.A.; writing—review and editing, N.M.E.-G. and D.A.; visualization, N.M.E.-G.; supervision, D.A.; project administration, N.M.E.-G. and D.A.; funding acquisition, D.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the University of Ottawa and the Ontario Graduate Scholarship.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The R implementation of the API and an example are freely available online at: https://github.com/NajaElgharib/CPA_PM, accessed on 13 April 2022.

Acknowledgments

The authors thank Alireza Pourshahid and Tomasz Ogrodzinski for their help in providing event logs and assessing the resulting process models.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
APIApplication Programming Interface
CPA-PMCloud Pattern API – Process Mining
CSVComma-Separated Values
DSRDesign Science Research
ETLExtract, Transform, and Load
PMProcess Mining
SaaSCloud Pattern API – Process Mining

References

  1. Amyot, D.; Akhigbe, O.; Baslyman, M.; Ghanavati, S.; Ghasemi, M.; Hassine, J.; Lessard, L.; Mussbacher, G.; Shen, K.; Yu, E. Combining Goal modelling with Business Process modelling: Two Decades of Experience with the User Requirements Notation Standard. Enterp. Model. Inf. Syst. Archit. 2022, 17, 1–38. [Google Scholar] [CrossRef]
  2. van der Aalst, W.M.P. Process Mining: Discovery, Conformance and Enhancement of Business Processes; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar] [CrossRef]
  3. Senyo, P.K.; Addae, E.; Boateng, R. Cloud computing research: A review of research themes, frameworks, methods and future research directions. Int. J. Inf. Manag. 2018, 38, 128–139. [Google Scholar] [CrossRef] [Green Version]
  4. Avram, M. Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective. Procedia Technol. 2014, 12, 529–534. [Google Scholar] [CrossRef] [Green Version]
  5. Almalki, S.; Assery, N.; Roy, K. An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis. Appl. Sci. 2021, 11, 6083. [Google Scholar] [CrossRef]
  6. Suriadi, S.; Andrews, R.; ter Hofstede, A.; Wynn, M. Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs. Inf. Syst. 2017, 64, 132–150. [Google Scholar] [CrossRef]
  7. Hevner, A.; Chatterjee, S. Design Science Research in Information Systems. In Design Research in Information Systems: Theory and Practice; Springer: Boston, MA, USA, 2010; pp. 9–22. [Google Scholar] [CrossRef]
  8. Jagadeesh Chandra Bose, R.P.; van der Aalst, W.M.P. Abstractions in Process Mining: A Taxonomy of Patterns. In Proceedings of the Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, 8–10 September 2009; Dayal, U., Eder, J., Koehler, J., Reijers, H.A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 159–175. [Google Scholar] [CrossRef]
  9. Sani, M.F.; van Zelst, S.J.; van der Aalst, W.M.P. Improving Process Discovery Results by Filtering Outliers Using Conditional Behavioural Probabilities. In Proceedings of the Business Process Management Workshops, BPM 2017 International Workshops, Barcelona, Spain, 10–11 September 2017; Revised Papers. Teniente, E., Weidlich, M., Eds.; Springer: Cham, Switzerland, 2018; pp. 216–229. [Google Scholar] [CrossRef]
  10. Padigela, P.K.; Suguna, R. A Survey on Analysis of User Behavior on Digital Market by Mining Clickstream Data. In Proceedings of the Third International Conference on Computational Intelligence and Informatics, Hyderabad, India, 28–29 December 2018; Raju, K.S., Govardhan, A., Rani, B.P., Sridevi, R., Murty, M.R., Eds.; Springer: Singapore, 2020; pp. 535–545. [Google Scholar] [CrossRef]
  11. El-Gharib, N.M.; Amyot, D. Process Mining for Cloud-Based Applications: A Systematic Literature Review. In Proceedings of the 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW), Jeju, Korea, 23–27 September 2019; pp. 34–43. [Google Scholar] [CrossRef]
  12. Terragni, A.; Hassani, M. Analyzing Customer Journey with Process Mining: From Discovery to Recommendations. In Proceedings of the 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 6–8 August 2018; pp. 224–229. [Google Scholar] [CrossRef]
  13. van der Aalst, W.M.P. Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process Mining. In Proceedings of the on the Move to Meaningful Internet Systems, OTM 2010, Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Greece, 25–29 October 2010; Proceedings, Part I. Meersman, R., Dillon, T., Herrero, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 8–25. [Google Scholar] [CrossRef] [Green Version]
  14. van der Aalst, W.M.P. Intra- and Inter-Organizational Process Mining: Discovering Processes within and between Organizations. In Proceedings of the Practice of Enterprise Modeling 4th IFIP WG 8.1 Working Conference, PoEM 2011, Oslo, Norway, 2–3 November 2011; Johannesson, P., Krogstie, J., Opdahl, A.L., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 1–11. [Google Scholar] [CrossRef] [Green Version]
  15. Sato, D.M.V.; De Freitas, S.C.; Barddal, J.P.; Scalabrin, E.E. A Survey on Concept Drift in Process Mining. ACM Comput. Surv. 2021, 54, 1–38. [Google Scholar] [CrossRef]
  16. Dumas, M.; La Rosa, M.; Mendling, J.; Reijers, H.A. Fundamentals of Business Process Management, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar] [CrossRef]
  17. Augusto, A.; Conforti, R.; Dumas, M.; Rosa, M.L.; Maggi, F.M.; Marrella, A.; Mecella, M.; Soo, A. Automated Discovery of Process Models from Event Logs: Review and Benchmark. IEEE Trans. Knowl. Data Eng. 2019, 31, 686–705. [Google Scholar] [CrossRef] [Green Version]
  18. De Weerdt, J.; vanden Broucke, S.; Vanthienen, J.; Baesens, B. Active Trace Clustering for Improved Process Discovery. IEEE Trans. Knowl. Data Eng. 2013, 25, 2708–2720. [Google Scholar] [CrossRef]
  19. Marin-Castro, H.M.; Tello-Leal, E. Event Log Preprocessing for Process Mining: A Review. Appl. Sci. 2021, 11, 556. [Google Scholar] [CrossRef]
  20. Sani, M.F. Preprocessing event data in process mining. In Proceedings of the CAiSE (Doctoral Consortium), CEUR-WS, Grenoble, France, 8–12 June 2020; Volume 2613, pp. 1–10. [Google Scholar]
  21. Wynn, M.T.; Lebherz, J.; van der Aalst, W.M.P.; Accorsi, R.; Di Ciccio, C.; Jayarathna, L.; Verbeek, H.M.W. Rethinking the Input for Process Mining: Insights from the XES Survey and Workshop. In Proceedings of the Process Mining Workshops, ICPM 2021 International Workshops, Eindhoven, The Netherlands, 31 October–4 November 2021; Revised Selected Papers. Munoz-Gama, J., Lu, X., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 3–16. [Google Scholar] [CrossRef]
  22. González López De Murillas, E.; Reijers, H.A.; Aalst, W.M. Connecting Databases with Process Mining: A Meta Model and Toolset. Softw. Syst. Model. 2019, 18, 1209–1247. [Google Scholar] [CrossRef] [Green Version]
  23. El-Gharib, N.M. Using Process Mining Technology to Understand User Behavior in SaaS Applications. Ph.D. Thesis, University of Ottawa, Ottawa, ON, Canada, 2019. [Google Scholar] [CrossRef]
  24. van Zelst, S.J.; Mannhardt, F.; de Leoni, M.; Koschmider, A. Event abstraction in process mining: Literature review and taxonomy. Granul. Comput. 2021, 6, 719–736. [Google Scholar] [CrossRef]
  25. Günther, C.W.; Rozinat, A. Disco: Discover Your Processes. In Proceedings of the BPM Demos 2012, CEUR-WS, Tallinn, Estonia, 3–6 September 2012; Volume 940, pp. 40–44. [Google Scholar]
  26. Zerbino, P.; Stefanini, A.; Aloini, D. Process Science in Action: A Literature Review on Process Mining in Business Management. Technol. Forecast. Soc. Chang. 2021, 172, 121021. [Google Scholar] [CrossRef]
  27. Bose, R.J.C.; Mans, R.S.; van der Aalst, W.M. Wanna improve process mining results? In Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Singapore, 16–19 April 2013; pp. 127–134. [Google Scholar] [CrossRef]
  28. Vidgof, M.; Djurica, D.; Bala, S.; Mendling, J. Cherry-Picking from Spaghetti: Multi-range Filtering of Event Logs. In Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 21st International Conference, BPMDS 2020, 25th International Conference, EMMSAD 2020, Held at CAiSE 2020, Grenoble, France, 8–9 June 2020; Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J., Eds.; Springer: Cham, Switzerland, 2020; pp. 135–149. [Google Scholar] [CrossRef]
  29. Conforti, R.; Rosa, M.L.; Hofstede, A.H.t. Filtering Out Infrequent Behavior from Business Process Event Logs. IEEE Trans. Knowl. Data Eng. 2017, 29, 300–314. [Google Scholar] [CrossRef] [Green Version]
  30. Ghasemi, M.; Amyot, D. Goal-oriented Process Enhancement and Discovery. In Proceedings of the Business Process Management-17th International Conference, BPM 2019, Vienna, Austria, 1–6 September 2019; Hildebrandt, T., van Dongen, B.F., Röglinger, M., Mendling, J., Eds.; Springer: Cham, Switzerland, 2019; pp. 102–118. [Google Scholar] [CrossRef]
  31. Celonis SE. Process Mining and Execution Management Software|Celonis. 2022. Available online: https://www.celonis.com (accessed on 20 May 2022).
  32. SAP. SAP Signavio Process Intelligence for Process Mining. 2022. Available online: https://www.signavio.com/process-mining (accessed on 20 May 2022).
  33. UiPath. UiPath Process Mining. 2022. Available online: https://www.uipath.com/product/process-mining (accessed on 20 May 2022).
  34. Apromore. The Finest Process Mining Experience. 2022. Available online: https://apromore.com (accessed on 20 May 2022).
Figure 1. Relationship between ETL and a desirable API for preprocessing.
Figure 1. Relationship between ETL and a desirable API for preprocessing.
Algorithms 15 00180 g001
Figure 2. Overview of the CPA-PM method and its three main iterative steps.
Figure 2. Overview of the CPA-PM method and its three main iterative steps.
Algorithms 15 00180 g002
Figure 3. Example of incomplete traces with missing start events (Trace 1) of end events (Trace 6). The trace removed by each function is shown with an X.
Figure 3. Example of incomplete traces with missing start events (Trace 1) of end events (Trace 6). The trace removed by each function is shown with an X.
Algorithms 15 00180 g003
Figure 4. Initial (and unreadable) process map for the original event log, produced by using Disco.
Figure 4. Initial (and unreadable) process map for the original event log, produced by using Disco.
Algorithms 15 00180 g004
Figure 5. Process map for users who converted to customers within 5 min, generated with Disco from an event log with 96 cases and 30 variants.
Figure 5. Process map for users who converted to customers within 5 min, generated with Disco from an event log with 96 cases and 30 variants.
Algorithms 15 00180 g005
Figure 6. Process map for users who did not convert to customers within 5 min, generated with Disco from an event log with 2301 cases.
Figure 6. Process map for users who did not convert to customers within 5 min, generated with Disco from an event log with 2301 cases.
Algorithms 15 00180 g006
Figure 7. Script execution performance (the X axis uses a logarithmic scale).
Figure 7. Script execution performance (the X axis uses a logarithmic scale).
Algorithms 15 00180 g007
Table 1. Simple event log example, with targeted events to be merged highlighted in gray.
Table 1. Simple event log example, with targeted events to be merged highlighted in gray.
Case_idTimestampActivityCityWeekdayClientNum_ ItemsProduct_ CategoryDevice
1212018-08-01 00:04:22Main home pageOttawaMondayPhone App3BAndroid
1212018-08-01 00:04:23Main home pageOttawaMondayN/A4BAndroid
1212018-08-01 00:04:25Main home pageOttawaMondayN/A6DAndroid
1212018-08-01 00:04:27Home page for productOttawaMondayPhone App4AAndroid
1212018-08-01 00:04:48General website searchOttawaMondayPhone App4N/AAndroid
Table 2. Event log after merging the first three rows of Table 1 into one row, in gray.
Table 2. Event log after merging the first three rows of Table 1 into one row, in gray.
Case_idTimestampActivityCityWeekdayClientNum_ ItemsProduct_ CategoryDevice
1212018-08-01 00:04:22Main home pageOttawaMondayPhone App13B,B,DAndroid
1212018-08-01 00:04:27Home page for productOttawaMondayPhone App4AAndroid
1212018-08-01 00:04:48General website searchOttawaMondayPhone App4N/AAndroid
Table 3. Some event names with their descriptions.
Table 3. Some event names with their descriptions.
Event NameDescription
Add graph from libraryUser adds a graph from the library that provides several ones
Add new graph buttonUser adds a new button to the graph
Add templateUser adds a template to build a graph
Build graph from libraryUser builds a new graph from existing ones in the library
Connect to data sourceUser connects to a data source to import data into a graph
Create dashboardUser creates a dashboard
Create data sourceUser creates a new data source to import their own datasets
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

El-Gharib, N.M.; Amyot, D. Data Preprocessing Method and API for Mining Processes from Cloud-Based Application Event Logs. Algorithms 2022, 15, 180. https://doi.org/10.3390/a15060180

AMA Style

El-Gharib NM, Amyot D. Data Preprocessing Method and API for Mining Processes from Cloud-Based Application Event Logs. Algorithms. 2022; 15(6):180. https://doi.org/10.3390/a15060180

Chicago/Turabian Style

El-Gharib, Najah Mary, and Daniel Amyot. 2022. "Data Preprocessing Method and API for Mining Processes from Cloud-Based Application Event Logs" Algorithms 15, no. 6: 180. https://doi.org/10.3390/a15060180

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop