<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Methods to Support Real-time Process Monitoring</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zsuzsanna Nagy</string-name>
          <email>nagy.zsuzsanna@mik.uni-pannon.hu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ágnes Werner-Stark</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Pannonia</institution>
          ,
          <addr-line>Egyetem st. 10, Veszprém, 8200</addr-line>
          ,
          <country country="HU">Hungary</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The industrial sector has a keen interest in solutions that monitor ongoing process executions and swiftly detect deviations from desired behaviours, thereby facilitating timely corrective interventions. Visualizing complex process data offers an intuitive and comprehensive perspective, enabling stakeholders to quickly identify deviations and their root causes. Through conformance checking techniques, deviations are automatically detected and their severity is estimated. In this work, two visualization methods for process data are proposed: one for original event data and another for the outputs from an alignment-based multi-perspective online conformance checking technique, termed alignment data. The innovative aspect of these methods is their ability to support both fixed and duration timeline-based visualizations for event and alignment data. They also adeptly handle overlapping objects while making it possible for the users to select the perspective from which they want to examine the data. When tested on a real-life manufacturing process, our methods identified timing anomalies and consistent product quality-affecting deviations, emphasizing the crucial role they play in better process oversight. Process mining, visualization, visual analytics, conformance checking, multi-perspective Proceedings ITTAP'2023: 3rd International Workshop on Information Technologies: Theoretical and Applied Problems, November 22-24, Proceedings</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Process mining is a family of techniques that help to extract knowledge from process data in order
to discover, monitor and improve business processes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Conformance checking, a subset of process
mining, evaluates how well the observed process executions align with a predefined process model, by
identifying deviations and measuring their severity. Currently, the de facto standard technique for
conformance checking is the calculation of alignments [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which provide a path for each process
instance through the process model. The goal is to find the optimal alignments, which minimize the
total cost of the deviations. An alignment is basically a sequence of (alignment) moves, where a move
consists of a pair of an event from the process instance and a transition from the process model.
      </p>
      <p>
        The basic alignment-based conformance checking technique is limited to working offline, focusing
only on completed cases, and considering just the control-flow perspective (i.e., the ordering of events).
For effective real-time process monitoring, the technique should also accommodate ongoing cases,
enabling the detection of deviations before a process instance concludes and allowing for timely
corrective interventions. Furthermore, since deviations can arise from various perspectives (e.g., time,
resource, or other data), it is essential for the technique to account for these as well. For these reasons,
in this paper, we focus on the alignment-based multi-perspective online conformance checking
(MOCC) technique and its outputs, which were introduced in one of our previous works [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The outputs
are called multi-perspective prefix-alignments, but for simplicity, we will refer to them as alignment
data in most of the remaining part of this work.
      </p>
      <p>Visualization is crucial for process monitoring, because it provides an intuitive and comprehensive
representation of complex process data, enabling stakeholders to quickly identify deviations and their</p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>
        ceur-ws.org
root causes. Incorporating temporal information into visualizations is essential, as it offers context,
sequence, and duration to events, fostering a deeper understanding of dynamics, dependencies, and
progression over time. There are various process mining software tools available, yet the existing
visualization techniques for event data do not properly represent temporal information. Events with the
same timestamp, known as overlapping events, are particularly problematic and often not handled
effectively. Additionally, events are typically represented either as time points or time intervals, with
no methods capturing both simultaneously. While a few visualization methods exist for the outputs of
conformance checking, none incorporate temporal information. Consequently, visualizing deviations
highlighted by conformance checking algorithms remains an open challenge [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. A detailed overview
of existing solutions is provided in the next section.
      </p>
      <p>
        The visualization methods for process analytics can be divided into three main categories according
to the input data and the information to be visualized: process model visualization, event data
visualization and linked visualization [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This paper aims to develop a visualization method for the
original observed event data obtained from an event stream, as well as a method for visualizing outputs
of the MOCC technique, the alignment data. This alignment data is calculated from event data and the
associated process model. The former falls under the event data visualization category, while the latter
fits into the linked visualization category.
      </p>
      <p>Both of the proposed visualization methods were designed to encompass the beneficial aspects of
existing methods while addressing their limitations. The innovative aspect of them is their ability to
support both fixed and duration timeline-based visualizations for event and alignment data.
Additionally, they adeptly handle overlapping objects while making it possible for the users to select
the perspective from which they want to examine the data.</p>
      <p>The proposed visualization methods were implemented within a test environment. Their utility and
performance were evaluated using simulated event streams from a real-life process. The experiment
revealed that our methods effectively identified timing anomalies, primarily linked to machine
downtimes, as well as other issues potentially stemming from data quality problems or malfunctioning
equipment. These findings underscore the urgent need for timely interventions.</p>
      <p>The remainder of this paper is structured as follows: Section 2 discusses related works, while Section
3 introduces the basic concepts necessary for understanding the proposed visualization methods.
Section 4 provides a detailed description of these methods. Finally, Section 5 evaluates these methods
and presents the results of the experiments. Finally, the paper is concluded.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>In this section, existing process mining software tools are reviewed, followed by an analysis of the
visualization methods used by them for event data and the outputs of conformance checking algorithms,
including alignments.
2.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Process mining tools</title>
      <p>
        There are various process mining software tools available. In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a comparison was made of the
performance and features of four most popular tools: ProM, Disco, Celonis, and My-Invenio. Reference
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] lists 27 available tools, but detailed examination was done only on the previously mentioned four
tools, with the addition of Apromore. The most extensive analysis can be found in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], where 17 tools
were evaluated in depth. Additionally, a website has been developed that hosts a continually updated
list of existing process mining software tools, offering a platform for comparative analysis.
      </p>
      <p>
        According to the findings in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the examined tools are limited in their capability to handle
timestamps; they can manage event data with either one or two timestamps, but not both. In terms of
process discovery, certain tools can display process execution variants (also termed trace variants) and
provide a detailed view of a specific case. While these are valuable for visualizing the range of observed
process executions, they do not offer contextual information. For example, they do not illustrate the
number of ongoing cases, the activities being performed at any given time, the resources involved, or
their locations. When it comes to conformance checking, some tools can present an aggregated view of
deviations overlayed on the process model. Additionally, they can list deviations (both undesired and
missing activities) as well as non-compliant activity sequences. However, this representation is often
limited to textual or tabular formats.
      </p>
    </sec>
    <sec id="sec-4">
      <title>2.1.1. Tools built on PM4Py</title>
      <p>
        A primary limitation of the tools examined in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is that, with the exceptions of Apromore and ProM,
they are not open-source. This restricts the possibility of introducing new features. Consequently, many
advanced and recent process mining algorithms are not incorporated into these tools. In contrast,
PM4Py [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] offers an open-source process mining library for Python, which boasts easy extensibility.
Numerous process mining applications have been developed using this library as a foundation.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], an approach was introduced that identifies bottlenecks in business processes by analysing
event logs and presenting the results visually. This method can represent activity durations and trace
durations over time as dot charts. However, a limitation of this solution is its emphasis on summarized
values at the expense of insights into individual traces, even though it values temporal information.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], a process mining toolkit named PMTK is introduced that is able to show the trace variants
(i.e., the distinct process execution patterns) and visualize events over time using a dotted chart,
similarly to ProM [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. However, it cannot perform conformance checking.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], a modular software system named Smyrida is introduced, which can also show the trace
variants and their frequency, but cannot show them on a timeline. It can perform conformance checking,
but the alignments are shown only in tables.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], an interactive process discovery tool named Cortado is introduced. While it can perform
conformance checking and visualize alignments, it has a limitation in displaying alignment moves.
Specifically, when an alignment is projected onto a trace (or variant), the model moves are not
displayed, and vice versa. When projected onto the process model, the log moves are not displayed.
Additionally, while it projects statistical measures like service time and waiting time lengths (e.g.,
minimum, maximum, mean, etc.) onto variants and the model, there is no provision to compare these
with expected values.
2.2.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Visualization methods for event data</title>
      <p>
        When visualizing event sequences for online representation, we focus exclusively on timeline-based
visualizations. Such visualizations graphically portray sequences of events, aligning them on a temporal
axis to convey the order of events within event sequences [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        For event sequence data, timeline-based visualizations can be categorized based on their way of
representation of time: fixed timeline-based (like dotted charts [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]), duration timeline-based (including
Gantt charts, bar charts, and their variants [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]), and a hybrid of both (as demonstrated in our previous
work [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]). Typically, individual events are represented based on their timestamp(s) and another chosen
attribute, often the case-id or resource. These events manifest as graphical objects (like circles or
rectangles) and are color-coded based on the activity.
      </p>
      <p>Existing visualization techniques, however, struggle with a significant challenge: the handling of
overlapping events. When multiple events share identical temporal data, one will cover the others in
the visualization. Furthermore, in fixed timeline-based visualizations, when an activity execution spans
multiple events (for example, a start event followed by a completion event), these events are not linked.
This omission fails to convey the activity's execution duration.
2.3.</p>
    </sec>
    <sec id="sec-6">
      <title>Visualization methods for alignment data</title>
      <p>When it comes to visualizing the outputs of conformance checking techniques, including alignment
data, no timeline-based methods currently exist. Consequently, our discussion encompasses all existing
methods.</p>
      <p>
        Reference [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] offers a thorough examination of how conformance checking results are visualized
by various process mining tools. Addressing the “Why?” aspect, the study delved into the structuring
of visualizations within the tool interfaces, categorizing them into four primary groups:
1. Quantify conformance,
2. Break-down and compare conformance,
3. Localize and show deviations,
4. Explain and diagnose deviations.
      </p>
      <p>Our primary focus is on the “Localize and show deviations” category, which features methods that
present alignments for specific process variants. These methods predominantly use color-coded
flowcharts and chevron diagrams (sequences of coloured arrowheads) to depict alignments of all
activities within a trace.</p>
      <p>Visualization methods based on chevron diagrams are available for both control-flow alignments
[19] and multi-perspective alignments [20]. Both techniques employ coloured chevron diagrams to
portray alignment moves in sequence, with arrow colours signifying move types. In multi-perspective
alignments, there is a variation where arrowheads are coloured according to activity, and move types
are depicted as coloured bars above the arrows.</p>
      <p>Although these methods provide significant insights, they are primarily suited for offline contexts
due to the absence of temporal information representation. Nonetheless, the color-coding schemes for
different alignment move types remain relevant for online contexts.</p>
    </sec>
    <sec id="sec-7">
      <title>3. Background and preliminaries</title>
      <p>In this section, fundamental concepts tied to the input data (event and alignment data) are explained
to enhance understanding of the proposed visualization techniques.
3.1.</p>
    </sec>
    <sec id="sec-8">
      <title>Event data</title>
      <p>Every process mining algorithm takes event data as its input. This event data, a subset of broader
process data, captures the observed behaviour of executed processes. In offline settings, this data
typically comes in the form of an event log, while in online settings (which is our case), it is presented
as an event stream. Each event must possess a case identifier and a recorded activity. The case identifier
specifies the context of the executed activity. Additionally, events can have other attributes providing
more details about the activity, such as the person or machine performing the activity (i.e., resource) or
the time of execution (i.e., timestamp).</p>
      <p>The execution of an activity, often termed an “activity instance”, may consist of multiple events.
Each of these events describes different lifecycle transitions of the activity. A comprehensive list of
possible transitions can be found in [21]. The most common transition types are “start” and “complete”,
denoting the beginning and the end of an activity instance's execution, respectively. If the same activity
can occur multiple times within the same context, the event should also include an activity instance
identifier. The sequence of events executed within the same context is termed a “trace”.</p>
      <p>In this paper, it is assumed that an event stream is composed of observable units from which process
information can be extracted. Event streams are categorized into two types based on the number of
events each observable unit corresponds to: the single event stream and the composite event stream. In
a single event stream, each observable unit contains information about a single event of an activity
instance. Conversely, in a composite event stream, each observable unit encompasses details of all the
events within an activity instance, yet only includes the timestamps for the start and complete events.
Table 1 summarizes the attributes for which values are present within observable units for each type of
event stream. Observable units may also encompass additional attributes. The sequence of attribute
values within an observable unit is flexible, but it must remain consistent throughout.
3.2.</p>
    </sec>
    <sec id="sec-9">
      <title>Alignment data</title>
      <p>The outputs of alignment-based conformance checking algorithms are (prefix-)alignments, that are
derived from event data and a predefined process model. They serve to contextualize traces within the
process model by mapping them to an execution sequence of that model. Specifically, an alignment
consists of two rows:
1. The first row represents a trace (a sequence of events).</p>
      <p>2. The second row corresponds to a firing sequence from the process model.</p>
      <p>Each row essentially depicts a sequence of moves, either in the log (for traces) or the process model.
The key distinction between alignments and prefix-alignments lies in the assumed state of the process
execution. For alignments, the process execution is deemed complete, indicating that the trace has
reached its end. In contrast, prefix-alignments operate under the assumption that the process execution
is ongoing. This means the trace is incomplete, representing just a prefix of the potential full sequence.</p>
      <p>In alignments that consider only the control-flow perspective (i.e., the sequence in which activities
occur), there are three types of moves:
 Synchronous Move: This indicates an activity that aligns correctly with the model.
 Log Move: This points to an activity that is present in the log but not aligns with the model,
signifying an inserted activity.
 Model Move: This can represent either a skipped activity (if the activity is observable) or an
unobservable activity.</p>
      <p>When other perspectives come into play, synchronous moves are further categorized into:
 Correct Synchronous Move: This signifies an activity that not only aligns with the model, but
also has the correct attribute values, a perfect alignment.
 Incorrect Synchronous Move: This indicates an activity that aligns with the model, but has
attribute values that deviate from the expected values.</p>
      <p>In this paper, it is assumed that the alignment data consists of multi-perspective alignment moves.
Whether an alignment move is part of a prefix-alignment or complete alignment, in terms of
visualization, it does not matter. An alignment move contains the original event data, if it is not a model
move. For model moves, the necessary missing attribute values are obtained from adjacent alignment
moves. For incorrect synchronous moves, the name of the corrected attributes and the corrected values
are stored separately from the original values.</p>
    </sec>
    <sec id="sec-10">
      <title>4. Proposed techniques</title>
      <p>We developed our visualization techniques based on Tamara Munzner’s visual analytics framework,
which examines three key aspects: “What?”, “Why?”, and “How?” in relation to visualization [22].</p>
      <p>The “What?” aspect pertains to the data available for visualization. Our data sources include the
event data extracted from an event data stream, as well as the outputs of the MOCC technique. The
latter (i.e., alignment data) is derived from both the event data and the predefined process model.</p>
      <p>The “Why?” aspect defines the main purpose of a visualization, as well as any potential secondary
purposes. In this context, the primary objective of both visualizations is to assist in monitoring process
executions. The event data visualization offers a comprehensive view of the real process, while the
alignment data visualization highlights and exhibits any deviations from the expected process. When
used jointly, they facilitate the rapid detection of deviations and the identification of their root causes,
enabling users to take corrective measures.</p>
      <p>The “How?” aspect defines the design choices to visualize the data. Based on insights from the
literature review, we aimed to make design decisions that encompass the beneficial aspects of existing
methods while addressing their limitations.</p>
      <p>In this section, the specifics of the proposed visualization methods are introduced. Shared
characteristics will be discussed first, followed by comprehensive explanations of each method, which
are supported by clear examples to enhance understanding.
4.1.</p>
    </sec>
    <sec id="sec-11">
      <title>Common properties</title>
      <p>Several methods have emerged to display overlapping events over time [23]. Given the potential for
multiple overlapping events, two existing techniques stand out as suitable: vertically listing events in
parallel (akin to a Gantt chart) with an option of either overlaying them partially or not. Although
overlays might condense the chart's size, they could hinder clarity. Consequently, we opted against
overlapping visual elements. Thus, both the event data and the alignment data are presented using a
Gantt chart-inspired mixed (both fixed and duration) timeline-based visualization.</p>
      <p>On the y-axis, a custom attribute is used. If the resource is provided, it becomes the default attribute;
if not, the case identifier is used. Importantly, users can select any attribute that is present in every
event. Depending on the space required to visualize the objects without overlap, a single attribute value
might be represented across multiple rows.</p>
      <p>Visualized objects, such as events and alignment moves, are denoted by small vertical lines (“|”).
Events and alignment moves pertaining to the same activity instance are connected with bars. Notably,
a single event stream's observed unit is regarded as a single event, while a composite event stream's
observed unit is depicted as two distinct events (start and complete).</p>
      <p>For increased interactivity, users can filter displayed events and alignment moves based on one
selected attribute and its selected values, which is ideal for analysing the performance of specific
resources, for instance. Hovering over objects reveals relevant information via tooltips and connects
related objects by their case identifier in observed order. These interactive features grant users deeper
insights without overwhelming the main display.</p>
      <p>Distinctive features between the two visualization methods lie primarily in colour choices and tooltip
content. These distinctions are elaborated upon in the following subsections. As examples, a trace from
a manufacturing process consisting of eight sequential operations (labelled “ts1o”, “ts2o”, etc.) is
referenced. In this process, errors (labelled “terr”) can manifest at any stage. A more in-depth
description of this process can be found in Section 5.2.
4.2.</p>
    </sec>
    <sec id="sec-12">
      <title>Visualization of event data</title>
      <p>In the visualization of event data, the objects representing the events and their connections are
coloured based on the value of the activity attribute. The colours are assigned to the values from a
predefined categorical colour scale in the order new values are observed.</p>
      <p>When the mouse is hovered over the object representing an event, the tooltip displays all original
information from the observed unit, organized as pairs of attribute names and values on distinct lines.
The timestamp is prioritized, appearing on the first line, but only showcasing the time value, since
events from the same date are displayed. For observed units from a composite event stream, the tooltip
of the start event object shows the start timestamp, while the complete event object shows the complete
timestamp of the activity instance.</p>
      <p>In Figure 1, a visualization of event data for a single case is presented, with the custom attribute set
as “nest”. The cursor hovers over the event labelled “ts8o”, representing operations at station 8. Even
before conducting conformance checking, several deviations from the expected behaviour are evident.
The sequence of events is incorrect (for instance, “ts1o” is succeeded by “ts4o” instead of “ts2o”), and
the duration of the activity “ts4o” is unusually extended. Moreover, since the product was identified as
faulty before reaching station 5, it should have been discarded by station 7. However, it proceeded to
station 8.</p>
    </sec>
    <sec id="sec-13">
      <title>Visualization of alignment data</title>
      <p>In the visualization of alignment data, specifically multi-perspective prefix-alignment moves,
objects representing alignment moves and their connections are coloured based on the value of the
alignment move type attribute. This attribute, generated by the MOCC technique, is stored as a numeric
value for simplicity. Colours are mapped to these numeric values using a predefined categorical colour
scale. The numerical values, alignment move types, and corresponding colours are as follows:
1. Correct synchronous move: green;
2. Incorrect synchronous move: orange;
3. Log move: red;
4. Model move: purple.</p>
      <p>When the mouse is hovered over the object representing an alignment move, the tooltip displays all
original information from the observed unit, similarly to the event data visualization. If there are
corrected values suggested by the process model, they are displayed next to the original values and the
whole row is highlighted in red.</p>
      <p>All alignment moves are displayed using the original recorded value from the associated observed
event, even if deemed incorrect by the process model. The exceptions are process moves, which lack
corresponding observed events. In such cases, the recorded values for these moves can be represented
by a time value provided by the model. If the model does not specify temporal information for an
activity, this time value is set to the (complete) timestamp of the previous alignment move, or if
unavailable, the (start) timestamp of the next alignment move. Given that alignments are only computed
with at least one observed event for a case, this approach ensures a time value is consistently available
for process moves. Similarly, if the model does not provide a value for the attribute displayed on the
yaxis, the aforementioned approach is applied.</p>
      <p>In Figure 2, an example of the visualization of multi-perspective prefix-alignment moves for a trace
of a single case is presented, where the custom attribute is “nest”. The cursor is hovered over the
alignment move with activity called “ts8o”. This alignment move is a log move, because according to
the model, the product should have been discarded at station 7. Notably, the numbers indicating the row
and column position of the tray (where the final product is placed) are zero. This could imply that either
the product was not positioned on the tray or there was an error in detecting or recording these numbers.
The more significant issue is that the temporal information for “ts2o” and “ts3o” is incorrect, as can
also be observed in Figure 1. They were observed after the product reached the last station, instead of
after “ts1o”. This is why there are two model moves after “ts1o” and two log moves at the end of the
alignment.</p>
    </sec>
    <sec id="sec-14">
      <title>5. Results</title>
      <p>The proposed visualization methods were implemented within a test environment to evaluate their
utility using simulated event streams of a real-life process. In this section, the implementation is first
described, followed by an introduction to the process model and event data that are utilized. The results
are discussed in the final subsection.
5.1.</p>
    </sec>
    <sec id="sec-15">
      <title>Implementation</title>
      <p>
        To test the proposed visualization methods, we created a test environment in form of a web
application. The backend consists of a server and a middleware and the frontend of a client. The server
and the middleware were implemented in Python. The middleware uses a modified version of the
newest version of PM4Py library [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and Flask framework along with Flask-SocketIO library. The
PM4Py library was modified based on our previous implementation of the MOCC technique [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], to be
able to calculate optimal multi-perspective prefix-alignments. The client was implemented using web
technologies (HTML, CSS and JavaScript). The D3 (or D3.js) JavaScript library is used to create and
update the visualizations and the Socket.IO JavaScript library is used for the communication between
the middleware and the client. The server communicates with the middleware using serialized JSON
messages over TCP sockets to transmit data. The middleware sends data in form of JSON messages to
the client in real-time using WebSockets facilitated by Flask-SocketIO.
      </p>
      <p>The main task of the server is to simulate an event stream based on the given event log and settings.
The settings contain the path to the event log (in csv format) and to the process model (in pnml format),
the type of the event stream (single event stream or composite event stream), the number of the column
that contains the attribute value for each required attributes of the selected event stream type, the value
type for each attribute, and the format of the timestamps.</p>
      <p>The middleware observes the event data provided by the server, then processes it and preforms
analysis on it. Finally, it send the outputs to the connected clients. When a new client connects, the
middleware sends all the necessary information for the visualization and all the cached data that needs
to be visualized.</p>
      <p>The visualizations are generated and displayed on the client side, based on the data provided by the
middleware and the settings given by the user. The two visualizations are displayed on a single page,
allowing the user to examine both simultaneously. The user can zoom in, zoom out, reset the zoom,
scroll a little left or scroll a little right in both visualizations concurrently.
5.2.</p>
    </sec>
    <sec id="sec-16">
      <title>The process model and the event data of the examined process</title>
      <p>
        The implemented visualization methods were tested on real-life datasets from manufacturing
processes, where one case describes the assembly process of a single product. The process is represented
in Figure 3 as a data Petri net (DPN). The original figure, along with the guard expressions for the
transitions of the DPN, is available in our previous work [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Blue and red transitions correspond to
observable activities. In contrast, black transitions do not have any corresponding observable activities.
Each variable represents an attribute of the event associated with a given activity. The arrows indicate
the variable writing operation. A transition can only fire if all the variable values (both current and new)
satisfy the criteria established by its guard expression, presented in the form of a logical formula.
      </p>
      <p>The manufacturing process under discussion is an automated assembly process comprising 8
sequential station operations, labelled “ts1o”, “ts2o”, and so forth. Errors, denoted as “terr”, can arise
at any point during the process. When an error surfaces, a three-digit error code is logged, pinpointing
both the station and the specific problem type as identified by the machine. For example, the error code
“701” signifies a type 1 error at station 7. Once a product is deemed faulty by the machine, no additional
operations are conducted on it. The quality indicator bit, abbreviated as “qib”, captures whether station
operations were successful (denoted by “1”) or unsuccessful (denoted by “0”).</p>
      <p>Products are assembled concurrently on rotary tables. The main rotary table, denoted as “M”, utilizes
8 nests (or product holders), while the smaller rotary table at station 7, labelled “S”, has 4 nests. At the
final station, products that meet quality standards and faulty products with error codes above 700 are
segregated onto separate trays. All other defective products are discarded into a box at station 7. The
respective row and column positions where a product is placed on a tray are recorded under the
attributes “tray_row” and “tray_column”.</p>
      <p>In the original event logs, one full trace is stored in every line. There is a start timestamp and duration
value (in milliseconds) recorded for every station operation. Since, the values of the attributes only
recorded after the execution of the station operations are finished, the log was transformed to be able to
be used in form of a composite event stream.</p>
      <p>In the original event logs, each line contains a complete trace. For every station operation, a start
timestamp and a duration value, measured in milliseconds, are recorded. Because attribute values are
logged only after the completion of station operations, the logs were transformed into a composite event
stream format. Table 2 displays the attributes found in the resulting files, accompanied by the value
type and, where relevant, the value range or format. The order in which they appear in the table is the
same as in the files.</p>
      <p>For testing purposes, two types of event logs were generated: one containing only traces with
deviations and another capturing the traces from a single day of production. The first set of traces helps
to demonstrate how different deviations are represented in the visualizations. On the other hand, the
second set provides valuable insight into how the visualizations appear when applied in a real-life
scenario.
5.3.</p>
    </sec>
    <sec id="sec-17">
      <title>Visualization results and interpretation</title>
      <p>In this subsection, the results of the visualization techniques used for the process model (as shown
in Figure 3) and the accompanying two event logs are presented and interpreted.</p>
      <p>A portion of the visualization for event data from single day production traces is illustrated in Figure
4, with “station” as the custom attribute. Ideally, there should not be any overlapping events because
the machine can only operate on one product at a time at each station. This suggests that issues might
arise from how the durations of the operations are measured or recorded. For some stations, like stations
5 and 6, the time values are mostly accurate, with only occasional overlapping due to brief machine
downtimes. However, at other stations, such as stations 2-4, overlaps are more frequent. Notably, every
seventh event at station 3 and every second event at station 4 overlap with their preceding events.
Another timing anomaly typically emerges after machine downtimes. For instance, a particularly
extended event is observed at station 8, spanning from around 8:44:30 to 8:45:15, which is roughly
equivalent to six regularly-timed events. Conversely, at stations 4-7, an unusually short event is noted
at each station immediately after the downtime.</p>
      <p>Apart from causing timing anomalies, downtimes seem to increase the number of faulty products as
well. In Figure 4, a process execution interrupted by a brief downtime is highlighted, leading to a faulty
product at the end. However, this is not the sole instance. Two additional errors are observed: one at
station 4 around 8:44 and another at station 8 around 8:45, resulting in two more defective products.</p>
      <p>A portion of the visualization for alignment data from single day production traces is illustrated in
Figure 5 and Figure 6, using “station” as the custom attribute. It is evident that the majority of traces
fully align with the model, with only a few deviations from expected behaviour. Although these
deviations are infrequent, their consistent appearance can lead to significant challenges over time.
Notably, most of these deviations occur at the final station, station 8. In Figure 5, an example of the
most common deviation type is highlighted. A final product is either not placed on the tray or the
“tray_row” and “tray_column” values are not recorded. The process model selected a value of one for
both attributes, as the sole criterion defined within the model is that these values cannot be zero. In
Figure 6, an example of the second most common deviation type is highlighted. A semi-finished
product, declared defective at station 2, was not discarded at station 7 but instead reached the final
station. With both “tray_row” and “tray_column” values at 0, this mirrors the situation in Figure 5,
suggesting the product either was not placed on the tray or the values were not recorded.</p>
      <p>When we applied the methods to solely deviating traces, our observations mirrored those previously
discussed:
 One or several downtimes during a process execution resulted in events that were either too
short or too long, leading to the product becoming faulty, or at the very least, being declared
faulty by the machine.
 Semi-finished products that were declared faulty were carried to station 8 instead of being
discarded at station 7.</p>
      <p>Regardless of the underlying reasons, it is crucial to address the identified issues to ensure that all
products, especially the good ones, are handled appropriately. Although the root causes of these
deviations cannot be definitively determined based solely on the visualizations, they do help narrow
down possible explanations. For instance, assembly line operators could easily verify in real life
whether products are actually placed on the tray. If they are, then the issue might merely be a data
quality problem. If not, the machine may be malfunctioning and would require repair.</p>
    </sec>
    <sec id="sec-18">
      <title>Performance evaluation</title>
      <p>In this subsection, the performance of the visualization methods when applied to the event log with
a single day of production is evaluated.</p>
      <p>The responsiveness of the visualization methods primarily depends on the number of events or
alignment steps displayed. The number of alignment steps is either equal to or exceeds the number of
events, based on the total number of model moves. In the examined process instances, model moves
were infrequent. Thus, for this discussion, both numbers are considered to be equivalent.</p>
      <p>When using a single event stream as input, the number of events matches the number of observed
units. In contrast, with a composite event stream, the number of events is approximately double the
number of observed units. This is because an observed unit is represented by two separate events in the
visualization when the start and complete timestamps differ. In the studied process instances, typically
only error occurrences (i.e., “terr” events) possessed single timestamp values. While there are
occasional timing anomalies causing station operations to also have single timestamp values, as
discussed in the previous section, these instances are infrequent. Consequently, for the purpose of the
discussion, it is assumed that the number of events is roughly double the number of observed units.</p>
      <p>The optimal number of events appears to be around 1,000. In the processes that were examined, this
corresponds to approximately 20 minutes of event data. With this threshold, both zooming and scrolling
operate smoothly. Moreover, when the special attribute or the filtering attribute is modified, the changes
take effect almost instantly, typically within a second. Notably, the tooltip display function and the
single case connecting function remain unaffected by the number of events. Determining the upper limit
of events that the methods can handle is challenging. At a setting of 20,000 events (which is equivalent
to about 7 hours of event data in our examined processes) the methods still operate, but zooming and
scrolling become noticeably sluggish. Additionally, any modifications to the special or filtering
attributes may require approximately a minute for the visualizations to refresh.</p>
      <p>It is important to note that the examined process has a brief lead time, ideally around 1-2 minutes,
and operates with 8 parallel process executions. As a result, in different processes, the same number of
events might span a more extended time period. Nonetheless, the primary objective of these
visualization methods is to facilitate real-time process monitoring. Hence, the ability to closely examine
just the most recent 20 minutes can be deemed adequate.</p>
    </sec>
    <sec id="sec-19">
      <title>6. Conclusion</title>
      <p>In this study, we have introduced two visualization methods. The first is tailored to the original
process data, while the second is specifically designed for alignment data, with a particular focus on
outputs from an alignment-based MOCC technique, specifically the multi-perspective prefix-alignment
moves. Both of these methods position a user-selected attribute on the y-axis and timestamps on the
xaxis while ensuring that visualized objects, representing event or alignment data, are displayed without
overlap. When tested on real-life manufacturing data, our approaches effectively identified timing
anomalies, mainly associated with machine downtimes, as well as consistent deviations that affected
product quality. These findings emphasize the need for improved process monitoring and prompt
corrective actions.</p>
      <p>In our future work, we plan to enhance these visualization methods by boosting their performance
and incorporating more interactive features for users. It would be advantageous to enable offline usage
on a more extensive set of historical event data. Moreover, expanding the colouring options beyond just
the activity attribute could be useful. For example, colouring objects based on the outcome of the
process instances might offer additional insights to users.</p>
    </sec>
    <sec id="sec-20">
      <title>7. Acknowledgements</title>
      <p>Supported by the ÚNKP-22-3 New National Excellence Program of the Ministry for Culture and
Innovation from the source of the National Research, Development and Innovation Fund.
8. References
[19] A. Adriansyah, B. F. van Dongen, W. M. van der Aalst, Conformance checking using cost-based
fitness analysis, in: 2011 IEEE 15th International Enterprise Distributed Object Computing
Conference, IEEE, 2011, pp. 55-64. doi:10.1109/EDOC.2011.12.
[20] F. Mannhardt, M. De Leoni, H. A. Reijers, The multi-perspective process explorer, in: F. Daniel,
S. Zugal (Eds.), Proceedings of the Demo Session of the 13th International Conference on Business
Process Management, volume 1418 of CEUR Workshop Proceedings, CEUR-WS.org, Aachen
Germany, 2015, pp. 130-134.
[21] B. F. Hompes, J. C. Buijs, W. van der Aalst, A generic framework for context-aware process
performance analysis, in: C. Debruyne, H. Panetto, R. Meersman, T. Dillon, E. Kühn, D.
O'Sullivan, C. A. Ardagna (Eds.) On the Move to Meaningful Internet Systems: OTM 2016
Conferences: Confederated International Conferences: CoopIS, C&amp;TC, and ODBASE 2016,
Rhodes, Greece, October 24-28, 2016, Proceedings, volume 10033 of Lecture Notes in Computer
Science, Springer, Cham, 2016, pp. 300-317. doi:10.1007/978-3-319-48472-3_17.
[22] T. Munzner, Visualization analysis and design, 1st. ed., CRC press, Taylor &amp; Francis Group, New</p>
      <p>York, 2014.
[23] Y. Han, A. Rozga, N. Dimitrova, G. D. Abowd, J. Stasko, Visual analysis of proximal temporal
relationships of social and communicative behaviors, Computer Graphics Forum 34.3 (2015),
5160. doi:10.1111/cgf.12617.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          , Process Mining:
          <article-title>Data science in action</article-title>
          , 2nd. ed., Springer, Berlin, Heidelberg,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -49851-4.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Solti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          , Conformance checking:
          <source>Relating Processes and Model</source>
          , 1st. ed., Springer, Cham,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -99414-7.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Nagy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Werner-Stark</surname>
          </string-name>
          ,
          <article-title>An alignment-based multi-perspective online conformance checking technique</article-title>
          ,
          <source>Acta Polytech. Hung</source>
          <volume>19</volume>
          (
          <year>2022</year>
          ),
          <fpage>105</fpage>
          -
          <lpage>127</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Carmona</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. van Dongen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weidlich</surname>
          </string-name>
          .
          <article-title>Conformance checking: foundations, milestones and challenges</article-title>
          , in: W. van der Aalst, J. Carmona (Eds.),
          <source>Process Mining Handbook</source>
          , 1st. ed., Springer, Cham,
          <year>2022</year>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>190</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -08848-
          <issue>3</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Assy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Souchet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bouffard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Anesini</surname>
          </string-name>
          ,
          <article-title>Visualization Libraries for Process Analytics</article-title>
          , in: M.
          <string-name>
            <surname>Hassani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Koschmider</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Comuzzi</surname>
            ,
            <given-names>F. M.</given-names>
          </string-name>
          <string-name>
            <surname>Maggi</surname>
          </string-name>
          , L. Pufahl (Eds.),
          <source>Proceedings of the ICPM Doctoral Consortium and Demo Track</source>
          <year>2022</year>
          , volume
          <volume>3299</volume>
          <source>of CEUR Workshop Proceedings</source>
          , CEUR-WS.org, Aachen Germany,
          <year>2022</year>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>U.</given-names>
            <surname>Celik</surname>
          </string-name>
          , E. Akçetin,
          <article-title>Process mining tools comparison</article-title>
          .
          <source>AJIT-e 9</source>
          .34 (
          <year>2018</year>
          ),
          <fpage>97</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .5824/
          <fpage>1309</fpage>
          -
          <lpage>1581</lpage>
          .
          <year>2018</year>
          .
          <volume>4</volume>
          .007.x.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Drakoulogkonas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Apostolou</surname>
          </string-name>
          ,
          <article-title>On the selection of process mining tools</article-title>
          ,
          <source>Electronics</source>
          <volume>10</volume>
          .4 (
          <issue>2021</issue>
          ),
          <volume>451</volume>
          . doi:
          <volume>10</volume>
          .3390/electronics10040451.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Viner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stierle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matzner</surname>
          </string-name>
          ,
          <article-title>A process mining software comparison</article-title>
          , arXiv preprint arXiv:
          <year>2007</year>
          .
          <volume>14038</volume>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .48550/arXiv.
          <year>2007</year>
          .
          <volume>14038</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Berti</surname>
          </string-name>
          , S. van Zelst,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schuster</surname>
          </string-name>
          ,
          <article-title>PM4Py: A process mining library for Python</article-title>
          ,
          <source>Software Impacts</source>
          <volume>17</volume>
          (
          <year>2023</year>
          ),
          <volume>100556</volume>
          . doi:0.1016/j.simpa.
          <year>2023</year>
          .
          <volume>100556</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kaouni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Theodoropoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bousdekis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Voulodimos</surname>
          </string-name>
          , G. Miaoulis,
          <article-title>Visual Analytics in Process Mining for Supporting Business Process Improvement</article-title>
          , in: C.
          <string-name>
            <surname>Frasson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Kabassi</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Voulodimos (Eds.),
          <source>Proceedings of the 1st International Conference on Novelties in Intelligent Digital Systems</source>
          , volume
          <volume>338</volume>
          <source>of Frontiers in Artificial Intelligence and Applications</source>
          , IOS Press, Amsterdam Netherlands,
          <year>2021</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Berti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schuster</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          ,
          <article-title>The process mining toolkit (PMTK): Enabling advanced process mining in an integrated fashion</article-title>
          , in: M.
          <string-name>
            <surname>Jans</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Janssenswillen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kalenkova</surname>
            ,
            <given-names>F. M.</given-names>
          </string-name>
          <string-name>
            <surname>Maggi</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the ICPM Doctoral Consortium and Demo Track</source>
          <year>2021</year>
          , volume
          <volume>3098</volume>
          <source>of CEUR Workshop Proceedings</source>
          , CEUR-WS.org, Aachen Germany,
          <year>2021</year>
          , pp.
          <fpage>43</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Song</surname>
          </string-name>
          , W. van der Aalst,
          <article-title>Supporting process mining by showing events at a glance</article-title>
          ,
          <source>in: Proceedings of the 17th Annual Workshop on Information Technologies and Systems (WITS)</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>139</fpage>
          -
          <lpage>145</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>I.</given-names>
            <surname>Merkoureas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kaouni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Theodoropoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bousdekis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Voulodimos</surname>
          </string-name>
          , G. Miaoulis,
          <article-title>Smyrida: A web application for process mining and interactive visualization</article-title>
          ,
          <source>SoftwareX</source>
          <volume>22</volume>
          (
          <year>2023</year>
          ),
          <volume>101327</volume>
          . doi:
          <volume>10</volume>
          .1016/j.softx.
          <year>2023</year>
          .
          <volume>101327</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Schuster</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. J. van Zelst</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Cortado: A dedicated process mining tool for interactive process discovery</article-title>
          ,
          <source>SoftwareX</source>
          <volume>22</volume>
          (
          <year>2023</year>
          ),
          <volume>101373</volume>
          . doi:
          <volume>10</volume>
          .1016/j.softx.
          <year>2023</year>
          .
          <volume>101373</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yeshchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <article-title>A survey of approaches for event sequence analysis and visualization using the esevis framework</article-title>
          ,
          <source>arXiv preprint arXiv:2202.07941</source>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .48550/arXiv.2202.07941.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P. T.</given-names>
            <surname>Hornix</surname>
          </string-name>
          ,
          <article-title>Performance analysis of business processes through process mining</article-title>
          ,
          <source>Master's thesis</source>
          , Eindhoven University of Technology, Eindhoven, Netherlands,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Nagy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Werner-Stark</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dulai</surname>
          </string-name>
          ,
          <article-title>Using process mining in real-time to reduce the number of faulty products</article-title>
          , in: T. Welzer,
          <string-name>
            <given-names>J.</given-names>
            <surname>Eder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Podgorelec</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K.</surname>
          </string-name>
          Latifić (Eds.),
          <source>Advances in Databases and Information Systems: 23rd European Conference, ADBIS</source>
          <year>2019</year>
          , Bled, Slovenia, September 8-
          <issue>11</issue>
          ,
          <year>2019</year>
          , Proceedings, volume
          <volume>11695</volume>
          of Lecture Notes in Computer Science, Springer, Cham,
          <year>2019</year>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -28730-
          <issue>6</issue>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Rehse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pufahl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Grohs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Klein</surname>
          </string-name>
          ,
          <article-title>Process mining meets visual analytics: the case of conformance checking</article-title>
          ,
          <source>arXiv preprint arXiv:2209.09712</source>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .48550/arXiv.2209.09712.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>