Page 40 - 2023-Vol19-Issue2
P. 40

36 |                                                               Andreswari, Millenia, Rizky, Haniyah & Mufti

to very small details of log activity [11],[12],[13]. Process      itive observation threshold. This is because these parameters
mining plays a role in modeling and analyzing processes            have the ability to filter data with very small trace frequencies
by finding, monitoring, and improving the actual process           so that they are not processed in the mining process [3].
by extracting knowledge from available event logs. Process
mining can define the model process as well as the relationship        Another study ”Analysis and Implementation of Process
between the actual process and the data. There are three stages    Mining Using Fuzzy Mining (Case Study: Data BPI Chal-
of the mining process, namely discovery, conformance, and          lenge 2014)” which showed that the use of a threshold in the
enhancement [14].                                                  simplification process resulted in good conformance with a
                                                                   low preserve threshold, a high utilization ratio. high, and
    Discovery plays a role in analyzing event log data by creat-   the edge cutoff and node cutoff are low. Based on the test,
ing an initial process model without using a priori information.   the process model with the best conformance is a preserve
Conformance checking is used to check whether the model            threshold of 0.05, utility ratio of 0.85, edge cutoff of 0.05, and
created matches the actual event. Enhancement extends or           node cutoff of 0.05 [10].
augments the process model with real-life information. The
enhancement process can be carried out in two forms, namely            Based on the results of previous studies, it is known that
repair or extension. Repair is done by modifying the model         the review of process mining results only focuses on measure-
to better reflect reality, while the extension is done by adding   ment parameters and does not provide process models regard-
a new perspective based on the available event logs and the        ing incidents that occur. For this reason, this study provides a
resulting process model [5].                                       process model from the parameters that have been determined
                                                                   in previous studies to find out the problems that occur in the
    The discovery process is done with Disco tools while           Rabobank Group ICT incident from all aspects of the event
conformance with ProM. Disco is also used to sort out unused       log that affect changes in the workload of the service desk/IT
data, remove noise, and filter out invalid information to the      operations. In addition, additional tools, namely Disco, are
endpoint [15]. ProM is used to implement the algorithm on the      used to generate valid data up to the endpoint by filtering and
model generated by Disco [16]. The algorithm used in process       reducing the noise before entering ProM. In addition, process
mining for the analysis of Rabobank Group ICT incidents is         modeling in ProM with Heuristic Miner is carried out with
the Fuzzy Miner Algorithm and the Heuristic Miner. Event           interactive Data-aware Heuristic Miner (iDHM) with the best
log data on Rabobank Group ICT incidents is complex real-          parameter settings for event logs automatically (Mannhardt
life company data that requires a special approach to handling     et al., 2017). This setting will be compared with the results
it. Fuzzy Miner and Heuristic Miner algorithms can be used         of manual trials conducted [3] with a Filter Log using Simple
in process mining to be able to handle complex event logs so       Heuristics on ProM.
that they can be observed properly [17],[18]. Disco and ProM
are tools that can be used in data processing with statistical                          II. METHODS
capabilities, filtering functions, and process map generators
on Disco as well as innovative process mining capabilities on         The decline in the number of product marketing is a serious
ProM [19],[20],[21].                                               problem and an obstacle to increasing the number of software
                                                                   releases at Rabobank Group ICT. This affects the business
    This study aims to provide an analysis of the Rabobank         development of Rabobank Group ICT. For this reason, it is
Group ICT incident based on the 2014 BPI Challenge event           necessary to analyze to overcome the incident that occurred.
log with process mining using the Fuzzy Miner Algorithm and        The Service Desk Agent (SDA) records the activities that
Heuristic Miner through the Disco and ProM tools to predict        occur in the form of an event log to be analyzed and given
the workload for the service desk so that improvements can be      solutions to overcome the incidents that occur. Process Min-
made to the implementation of software releases as Rabobank        ing is one way that can be used. The complex data makes
Group ICT business development efforts.                            the Fuzzy Miner and Heuristic Miner algorithms chosen to
                                                                   provide a process model for incidents that occur. Thus, im-
    In a previous study ”Analysis and Implementation of Pro-       provements can be made to the IT service desk/operations to
cess Mining with Heuristic Miner Algorithm Case study:             help Rabobank Group ICT return to a steady state.
Event logs of Rabobank Group ICT Netherlands” an inci-
dent analysis was carried out on the event log of Rabobank             The process mining system was built by creating an initial
Group ICT with the Heuristic Miner algorithm using Filter          process model at Disco and implementing the Fuzzy Miner
Log using Simple Heuristics on ProM. Based on the test re-         algorithm with Mine for a Fuzzy Model and the Heuristic
sults, it is known that the ideal process model is obtained by     Miner algorithm with interactive Data-aware Heuristic Miner
setting the positive observation threshold parameter of 1000,      (iDHM) on ProM on the Rabobank Group ICT incident log
relative to the best 0.05, and the dependency threshold value      activity. The output built is a process model that can be used
of 0.9. The parameter that has the greatest influence is the pos-  for evaluation by Rabobank Group ICT (Fig. 1).
   35   36   37   38   39   40   41   42   43   44   45