Hi, and welcome to the course ‘Process mining with ProM’. In this course we will teach you how to install and use the free and open source process mining tool ProM Lite. At the end of this course you will be able to recognize event data, convert it into an event log, and analyze the underlying process using the process mining tool ProM.
Coming up this week
This week we start with explaining what process mining is, and where you can find event data (hint: everywhere!).
Next we explain how to install ProM Lite, so please have a computer ready. We also have a full video on the basic usage of ProM (or: “what do all the buttons do?”).
We also provide plenty of pointers for further information.
Event logs
With this course comes a collection of open and free to use event logs. This collection contains both artificial (e.g. generated) data, but also real data from real systems. This data we use throughout the course in the videos, quizzes, test, and finally in the peer assignment. However, we do not use all provided data sets, so some are for you to explore on your own!
In this week we will also discuss what event data, stored in an event log, looks like, and also how you can load and inspect an event log in ProM Lite.
Of course, data is not stored in nice event logs, and usually has to be converted. We show you how you can use ProM Lite to convert a CSV file to an event log. After the raw data is in ProM Lite, we can explore its contents. Additionally, we usually also need to filter the data to gain better insights.
So, at the end of this week you will already know how to get and inspect the event data in ProM Lite. Next week we will show you how you can discover process models from this data, which describe the behavior stored in the data.
We hope you enjoy following this week as much as we did making it!
Eric Verbeek – Lead educator