<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Why Am I Waiting? Analyzing Waiting Times in Business Processes from Event Logs (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Muhammad Awais Ali</string-name>
          <email>muhammad.awais.ali@ut.ee</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Tartu</institution>
          ,
          <addr-line>Tartu</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <abstract>
        <p>-Business analysts are in a continuous effort to the unimportant tasks suffer the most and hence, their improve the cycle time of a process by identifying waiting waiting time increases [11]. tpirmoecebssoetstlebnyecrkedsuacnindgaddealpatyins.gHstorwaetevgeire, sthtoeriemaprreovseevtehrealbsuosuinrceesss In this setting, the problem addressed in this thesis is twoof waiting times. Therefore, it is a challenge for a business fold. First, the thesis addresses the challenge of identifying analyst to categorize and quantify the sources of waiting time and the internal sources of waiting time from an event log of discover changes that may reduce or eliminate these delays. We a business process, and quantifying the share of waiting will empirically address this research problem by first identifying time attributable to each of these internal sources. Second, tqhueansotiufyrcinegs othfewsahiatirnegotfimweaiftrinogmtitmhee partotrciebsustaexbelecuttoioenaclhogosfatnhde it addresses the problem of recommending interventions to sources. Secondly, we will identify the interventions to reduce or reduce the waiting time. Accordingly, the research questions eliminate the waiting time in business processes. Our proposed of this study are: approach will be evaluated in two phases. In the first phase, it 1) What are the possible sources of waiting time in a will be evaluated using BPI challenges, and in the second phase, business process (e.g. batching, prioritization, etc.)? vwaeliwdailtlecoounrduacptparocaacshe. study with industrial partners to further 2) How to automatically detect the sources of waiting time Index Terms-Waiting Time, Process Mining, Event Logs. from an event log? 3) How to recommend interventions in view of minimizing I. INTRODUCTION AND PROBLEM DEFINITION the amount of waiting time? Reducing delays in business processes is a recurrent prob- A solution should fulfil the following requirements: lem in the field of business process management. To ad- R1: The recommended interventions should be accurate. dress this problem, analysts need to discover and quantify Accuracy can be measured in terms of the error between the the sources of waiting time in a process and then design predicted and the actual outcome after the intervention. interventions to mitigate them. The sources of waiting time R2: The proposed approach should recommend intervenare manifold [1], [2]. Some sources of waiting are external tions in an acceptable computation time. to the process (e.g. waiting for a response from a customer, The outcome of this research will be a set of techniques waiting for a delivery from a supplier) [3]. Others are due to that take event log of a business process as an input, produces factors internal to the process, including but not limited to: a diagnostic of the causes of waiting time and recommends 1) Resource Contention: Resource contention occurs actions to reduce or eliminate the waiting time in a business when there is more work to be done than the resources process as illustrated in Figure 1. available to accomplish it [4]. 2) Batch Processing: In batch processing [5]-[8], resources bundle several cases together so that they can be processed as a group. This will infuse waiting time since the resource will wait for a batch to be available for processing. Hence, this introduces waiting time due to batch creation. 3) Resource Unavailability: A particular resource in a business process that does not operate on weekends will eventually introduce the waiting time in a process due to resource unavailability [9], [10]. 4) Work Prioritization: There may be some tasks in a Fig. 1. Illustrative Example process that the resource may prioritize to improve the throughput of the process. However, the benefit II. METHODOLOGY decreases with an increase in prioritization, such as</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The proposed research will adopt Design Science Research
(DSR) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] for identifying the sources for the delay in a
Work funded by the European Research Council (PIX Project).
business process. We will follow an iterative approach
consisting of design, prototyping, and evaluation. We will start
by conducting a systematic literature review of sources of
delays and waiting waste in business processes, drawing for
example into the literature on Lean management [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Based on this review, we will develop a taxonomy of sources
of waiting time in business processes. This analysis will inform
the development of a framework for identifying sources of
waiting waste in a process based on execution data. We will
then develop techniques to quantify the share of waiting time
attributable to each of the sources identified in the taxonomy
and to recommend interventions to reduce or eliminate the
waiting time. The proposed framework evaluation will be in
two phases. In the first phase, we will evaluate our approach
using synthetic event logs as well as real-life event logs, such
as those released by the BPI challenge series.1 In this setting,
we will compare the findings of our proposed techniques
with those of the participants in these challenges. Based on
the insights gained from this first evaluation phase, we will
improve our proposed approach. We will then conduct a case
study in a real setting in order to further validate our approach
in a second phase.
      </p>
      <p>III. APPROACH</p>
      <p>Enterprise systems record events corresponding to an
execution of a task. These event records are extracted from the
database and represented as an event log. The goal of this
doctoral study is to develop techniques to identify the sources
of waiting times in business processes using event logs as an
input. A second goal is to develop techniques to recommend
actions (interventions) to reduce waiting waste by identifying
improvement opportunities in business processes.</p>
      <p>
        Figure 2 captures an initial architecture of the envisaged
solution. The presented architecture is a pipeline that starts
with a module that takes event log as input and identifies
waiting time in a business process. Here, we will leverage
existing techniques to discover sources of waiting times from
event logs, such as batching [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] or prioritisation [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This
module is complemented by a second module, which
quantifies the share of waiting time attributable to each of the
identified sources. We envisage that this step can be tackled
by determining the enabling time of each event in the log
using log replay techniques. We will further analyze the log
in order to discover, for each activity instance in the log, the
time when the corresponding resource became available to
perform that activity instance. With the help of these inputs,
we will separate the waiting time due to resource contention or
unavailability from the waiting time due to other sources. We
will then develop techniques to identify the volume of waiting
time attributable to batch processing, work prioritization, and
other sources of waiting time identified in the literature review.
The third module will be responsible for identifying possible
interventions to address each source of waste, with the help
of a domain expert. Finally, the fourth module will select a
combination of possible interventions to reduce the waiting
time in the process, taking into consideration constraints on
other performance measures, such as cost. The impact of
these interventions will be evaluated by means of data-driven
simulation techniques [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dinis-Carvalho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Moreira</surname>
          </string-name>
          , S. Braganc¸a, E. Costa,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alves</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sousa</surname>
          </string-name>
          , “Waste identification diagrams,
          <source>” Production Planning &amp; Control</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>235</fpage>
          -
          <lpage>247</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Suriadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ouyang</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M.</surname>
          </string-name>
          <article-title>van der Aalst, and</article-title>
          <string-name>
            <surname>A. H. ter Hofstede</surname>
          </string-name>
          , “
          <article-title>Event interval analysis: Why do processes take time?” Decision Support Systems</article-title>
          , vol.
          <volume>79</volume>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>98</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Andrews</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Wynn</surname>
          </string-name>
          , “
          <article-title>Shelf time analysis in ctp insurance claims processing,” in Trends and Applications in Knowledge Discovery</article-title>
          and
          <string-name>
            <given-names>Data</given-names>
            <surname>Mining</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-P.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. X.</given-names>
            <surname>Yu</surname>
          </string-name>
          , and Y.-S. Moon, Eds. Cham: Springer International Publishing,
          <year>2017</year>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          et al.,
          <source>Fundamentals of business process management</source>
          . Springer,
          <year>2013</year>
          , vol.
          <volume>1</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pufahl</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          , “
          <article-title>Detection of batch activities from event logs</article-title>
          ,
          <source>” Information Systems</source>
          , vol.
          <volume>95</volume>
          , p.
          <fpage>101642</fpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Solti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Depaire</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Caris</surname>
          </string-name>
          , “
          <article-title>Mining batch activation rules from event logs</article-title>
          ,
          <source>” IEEE Transactions on Services Computing</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Swennen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Depaire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Caris</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Vanhoof</surname>
          </string-name>
          , “
          <article-title>Batch processing: Definition and event log identification</article-title>
          .”
          <string-name>
            <surname>in</surname>
            <given-names>SIMPDA</given-names>
          </string-name>
          ,
          <year>2015</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.</given-names>
            <surname>Pufahl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Herzberg</surname>
          </string-name>
          , A. Meyer, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Weske</surname>
          </string-name>
          , “
          <article-title>Flexible batch configuration in business processes based on events</article-title>
          ,” in International Conference on Service-Oriented Computing. Springer,
          <year>2014</year>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Depaire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Caris</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Schepers</surname>
          </string-name>
          , “
          <article-title>Retrieving the resource availability calendars of a process from an event log</article-title>
          ,
          <source>” Information Systems</source>
          , vol.
          <volume>88</volume>
          , p.
          <fpage>101463</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>B.</given-names>
            <surname>Estrada-Torres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          <article-title>Garc´ıa-Ban˜uelos, I. Mahdy, and</article-title>
          <string-name>
            <given-names>M.</given-names>
            <surname>Yerokhin</surname>
          </string-name>
          , “
          <article-title>Discovering business process simulation models in the presence of multitasking and availability constraints,” Data Knowl</article-title>
          . Eng., vol.
          <volume>134</volume>
          , p.
          <fpage>101897</fpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Suriadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M.</surname>
          </string-name>
          <article-title>van der Aalst, and</article-title>
          <string-name>
            <surname>A. H. ter Hofstede</surname>
          </string-name>
          , “
          <article-title>Discovering work prioritisation patterns from event logs,” Decision Support Systems</article-title>
          , vol.
          <volume>100</volume>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>92</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Wieringa</surname>
          </string-name>
          ,
          <article-title>Design science methodology for information systems</article-title>
          and software engineering. Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Hicks</surname>
          </string-name>
          , “
          <article-title>Lean information management: Understanding and eliminating waste</article-title>
          ,”
          <source>International Journal of Information Management</source>
          , vol.
          <volume>27</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>233</fpage>
          -
          <lpage>249</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Wynn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. J.</given-names>
            <surname>Fidge</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. M. ter Hofstede</surname>
            , and
            <given-names>W. M. P. van der Aalst</given-names>
          </string-name>
          , “
          <article-title>Business process simulation for operational decision support,”</article-title>
          <source>in Proceedings of the Business Process Management Workshops</source>
          . Springer,
          <year>2007</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Gonza</surname>
          </string-name>
          <article-title>´lez-Rojas, “Automated discovery of business process simulation models from event logs,”</article-title>
          <string-name>
            <given-names>Decis. Support</given-names>
            <surname>Syst</surname>
          </string-name>
          ., vol.
          <volume>134</volume>
          , p.
          <fpage>113284</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>