<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Proactive Insights Engine: Process Mining meets Machine Learning and Artificial Intelligence</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Fabian</forename><surname>Veit</surname></persName>
							<email>f.veit@celonis.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Celonis SE</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jerome</forename><surname>Geyer-Klingeberg</surname></persName>
							<email>j.geyerklingeberg@celonis.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Celonis SE</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Julian</forename><surname>Madrzak</surname></persName>
							<email>j.madrzak@celonis.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Celonis SE</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Manuel</forename><surname>Haug</surname></persName>
							<email>m.haug@celonis.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Celonis SE</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Thomson</surname></persName>
							<email>j.thomson@celonis.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Celonis SE</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Proactive Insights Engine: Process Mining meets Machine Learning and Artificial Intelligence</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E073515E2534C2D4B7AD744B4542D790</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:41+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>process mining</term>
					<term>process intelligence</term>
					<term>machine learning</term>
					<term>artificial intelligence</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This demo presents the features of the Proactive Insights (PI) engine, which uses machine learning and artificial intelligence capabilities to automatically identify weaknesses in business processes, to reveal their root causes, and to give intelligent advice on how to improve process inefficiencies. We demonstrate the four PI elements covering Conformance, Machine Learning, Social, and Companion. The new insights are especially valuable for process managers and academics interested in BPM and process mining.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">From Process Discovery to Process Intelligence</head><p>Process mining is a technique used to reconstruct, analyze, and improve business processes using recorded event data from transactional IT systems <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3]</ref>. Mining process data commonly starts with process discovery <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>, i.e. the analysis of the process model reproduced from event logs. During process discovery, users investigate the actual process model and drill-down the process data to identify undesired patterns and sources of inefficiencies <ref type="bibr" target="#b1">[2]</ref>. The insights of the discovery phase are the starting point for process improvements through reductions in throughput times, manual rework or increasing efficiency and customer satisfaction <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>.</p><p>A disadvantage of this explorative mining approach is that it requires the user to gain process knowledge by deeply investigating the process data, while having an ex ante hypothesis on where to shine the light. To enhance user-driven process mining, we created the Proactive Insights Engine (PI). It combines process mining with machine learning and artificial intelligence in order to achieve highly smart and fully automated insights into business processes. PI automatically analyzes business processes, uncovers hidden problems, and reveals prescriptive recommendations on how to improve them in real-time. This new technology understands workflows and draws conclusions from them. It conducts research on root causes of process violations and provides recommendations for action. Therefore, PI enlarges previous process mining solutions by going from an explorative process discovery to an intelligent and fully automated process analysis. PI consists of the following four components: PI Conformance compares the actual 'as-is' process with the documented 'to-be' process. It automatically identifies the highest priority issues and their root causes, which allows users to take immediate action. Therefore, PI Conformance extends the many existing applications for conformance checking, as it automatically reveals a list of process violations, drills them down to their root causes, and makes intelligent suggestions for how to fix them. The software develops these recommendations based on the process data, and continuously improves these recommendations as more data is being processed.</p><p>PI Machine Learning integrates advanced statistical analyses and machine learning algorithms natively into Celonis. The application fully supports R-scripting language. This allows the user to run advanced prediction techniques directly in Celonis. Historic process data and the findings of process discovery serve as an input to create predictions of the future. For example, users can proactively monitor process performance by evaluating how ongoing cases will flow through the process until their completion PI Social adds the social aspect of processes to Celonis. PI Social maps process data to different teams and organizations to show how they interact with each other. It identifies critical roles within the process, workload imbalances, and other team inefficiencies. The visualization of the network of social process interactions uncovers issues in organizational structures and the interactions among people involved in the process.</p><p>PI Companion integrates Celonis into business management systems. It acts as a 'process advisor' and identifies recommendations at the time when critical business decisions are made. This allows process analysis while the process is being executed, rather than analyzing processes after their completion. The new add-on interacts with SAP systems and supports decisions by using relevant data from historical transactions. For example, users can check which vendor had the fastest delivery record in the last month or analyze customers' payment behavior for well-grounded decisions on payment terms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Case study</head><p>For the case study, we apply the new PI features on a demo data set for the Purchaseto-Pay (P2P) process. The demo data covers 279,000 purchase order items.</p><p>After loading the predesigned to-be process model, the conformance checker scans the actual process, shows conformance history, key statistics about conformance, and a list of violations sorted by their frequency. Figure <ref type="figure" target="#fig_0">1</ref> illustrates that 57% of the cases are compliant with the target process model. PI detects 15 process violations. From the KPIs shown in the middle of Figure <ref type="figure" target="#fig_0">1</ref>, we can see that the average throughput time of non-compliant cases is 31.1, which is higher than the 29 days that compliant cases need to go through the process. Further user-specific KPIs can be added using the integrated formula editor. Moreover, the list at the bottom of Figure <ref type="figure" target="#fig_0">1</ref> reveals that in 14% of the cases, the price of a purchase order is changed, which is a frequent source of manual rework. In 7% of the cases, the process starts with the scan of the invoice and not with the creation of a purchase order item/requisition item as defined in the uploaded 'to-be' process model. This process deviation is often caused by maverick buying violating corporate compliance. Acceptable violations can be added to a whitelist. More information about each violation can be retrieved by clicking on the items in the list. Figure <ref type="figure" target="#fig_1">2</ref> refers to a violation, where the procurement process starts with the scan of the invoice. PI automatically displays possible root causes for this violation. For example, in 6,000 cases when the process starts with the scan of an invoice, the vendors Unisono AG, IDES Consumer Products, and six other vendors are involved in the transaction.</p><p>PI Machine Learning enables users to execute R-statements and to access R-libraries in Celonis. R-statements can be executed on the process data, for example, to calculate the 95% of the throughput time for each vendor. Results are displayed in Celonis and can be re-used for filtering the process data or as input for further analyses.</p><p>In the social overview in Figure <ref type="figure" target="#fig_2">3</ref>, information about the people working in the process and their collaboration is displayed. By clicking on a specific user, PI Social shows several performance measures, e.g., the number events per day for the Team 2 (35 users) is 226 and their throughput time is 718.8 hours.    • Prof. Wil van der Aalst (TU Eindhoven). https://youtu.be/prynsvWJMng • Romana Engler (Siemens AG). https://youtu.be/HQqHRJfNcag • Bastian Nominacher (Celonis SE). https://youtu.be/wwh58wObNJo A full screencast demonstrating Celonis and the new PI features is available as download <ref type="bibr" target="#b3">[4]</ref>. A free demo license including PI features is offered for academic users via the Celonis Academic Cloud <ref type="bibr" target="#b4">[5]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. PI Conformance reveals conformance trends over time, KPIs of compliant vs. non-compliant cases, and a list of most frequent violations.</figDesc><graphic coords="3,127.94,313.34,277.43,129.24" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig.2. Detailed information about a process violation through maverick buying, including the conformance trend over time (upper right), process KPIs (in the middle), and a list of root causes for this violation (at the bottom).</figDesc><graphic coords="4,134.56,146.98,325.68,191.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Performance analysis of the process participants using PI Social.</figDesc><graphic coords="4,134.56,395.77,325.63,175.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Process analysis executed directly in the business application using PI Companion in the side panel of the SAP Business Client.</figDesc><graphic coords="5,137.03,146.98,320.17,180.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>3</head><label></label><figDesc>Maturity, screencast, and demo license PI is available in Celonis Process Mining since December 2016. The new functionalities have already been applied by hundreds of users, including Fortune 1000 leaders like Siemens, SAP, or Vodafone. Customers and industry experts confirm the power of Celonis PI as the next generation of process mining:</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Process Mining Manifesto</title>
		<author>
			<persName><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Management Workshops</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="169" to="194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wil</surname></persName>
		</author>
		<title level="m">Process Mining -Data Science in Action</title>
				<meeting>ess Mining -Data Science in Action<address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>2 nd edn</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Process Mining: A Research Agenda</title>
		<author>
			<persName><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J M</forename><surname>Weijters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers in Industry</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="231" to="244" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">Markus</forename><surname>Kohlbacher</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Process Management Journal</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="135" to="152" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Celonis</surname></persName>
		</author>
		<ptr target="https://goo.gl/FKyZYQ" />
		<title level="m">PI Webinar</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Celonis</surname></persName>
		</author>
		<ptr target="https://academiccloud.celonis.com" />
		<title level="m">Academic Cloud</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
