=Paper=
{{Paper
|id=Vol-3730/paper13
|storemode=property
|title=Process Mining Representation using Communication Structured Acyclic Nets (CSA-nets)
|pdfUrl=https://ceur-ws.org/Vol-3730/paper13.pdf
|volume=Vol-3730
|authors=Nadiyah Almutairi,Tuwailaa Alshammari,Mohammed Alahmadi
|dblpUrl=https://dblp.org/rec/conf/apn/AlmutairiAA24
}}
==Process Mining Representation using Communication Structured Acyclic Nets (CSA-nets)==
Process Mining representation using Communication Structured Acyclic Nets (CSA-nets) Dr. Nadiyah Almutairi1,2 , Tuwailaa Alshammari1 and Mohammed Alahmadi1,3 1 School of Computing, Newcastle University, Science Square, Newcastle upon Tyne, NE4 5TG, United Kingdom 2 Department of Science and Technology, University of Hafr Albatin, Hafr Al-Batin 39524, Kingdom of Saudi Arabia 3 Department of Software Engineering, University of Jeddah, Jeddah 21493, Kingdom of Saudi Arabia Abstract Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets SON which are a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems (CESs). It consists of sets of Acyclic Nets ANs that communicate with each other through a set of buffer places. It supports the analysis and visualisation of activities of CESs. In this work, we use SONs formalism to represent processes that have been decomposed using approaches in [1], we used SONs to compose the subnets and use its robust representation to analyse and visualise the same model, however, without any existing cycles. Our approach provides a mechanism for composing a SON model by using the decomposed subnets. We argue that the resulting model exhibits similar behaviour to the original model. Keywords structured occurrence net, structured acyclic nets, communication structured acyclic net, labeled Petri nets, model decomposition 1. Introduction Process mining is a technique that combines data mining and process analysis to extract valuable insights from event logs generated by information systems. Its aim is to discover, monitor, and improve real processes by extracting knowledge related to these processes from event logs recorded during the execution of business operations. Process mining utilises various techniques, including process discovery, which involves deriving process models from event logs; conformance checking, which compares the actual processes to predefined models; and process enhancement, which improves processes based on insights gained from event logs [2]. Petri nets are one of the popular models for representing processes in process mining. Petri nets can effectively capture concurrency, conflict, and synchronisation aspects of process flows between processes or activities. Specifically, different techniques and algorithms can be used to generate Petri nets from event logs such as the α-algorithm, state-based regions, and language- based regions. SON s is generalised in [3] as Communication Structure Acyclic Nets ( CSA -nets) which are a Petri net-based formalism used to represent the behaviour of Complex Evolving Systems (CESs). CSA-nets consist of sets of acyclic nets that communicate with each other through a set of buffer places. These buffer places allow both asynchronous and synchronous communication PNSE’24, International Workshop on Petri Nets and Software Engineering, 2024 © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) 217 CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 between acyclic nets, and so can represent the concurrent behaviour of the system as well as synchronisation behaviour. They are suitable tools for modelling and visualising the behaviour of event-based systems. In this paper, we focus on the outcome of the Petri net decomposition approach presented in [1]. Essentially, we propose constructing a CSA-net model from the decomposed fragments of a process model. That is accomplished by identifying each decomposite subnet as an individual acyclic net and subsequently applying the proposed rules to establish communication via buffer places. The remainder of this paper is organised as follows: Section 2 summarise some of the existing knowledge and related work. Basic properties of acyclic nets are introduced in the preliminaries Section 3. Section 4 introduces CSA-nets and some of the definitions, while Section 5 discusses the steps taken to compose SON models from decomposed process model. Section 6 concludes our study summarising our findings. 2. Related work Various algorithms utilise Petri nets as representations for process mining. Region-based process discovery techniques and α-algorithm are examples of such techniques. Basically, α-algorithm can be used to construct a Petri net process model to describe behaviour from an event log, which consists of a set of traces (sequence of events). This is known as process discovery problem. Also, measuring the differences between the observed behaviour (captured by the traces in the event log) and the modelled behaviour (firing sequence of a Peti net) for a given event log and Petri net is known as conformance checking problem. In the context of process mining, these two problems are formulated using Petri nets. For instance, [4] developed a region- based algorithm for discovering Petri nets from event logs, addressing the challenge of deriving accurate process models in process mining. Their approach focuses on constructing a bounded Petri net that encompasses the behaviour observed in event logs, prioritising the generation of models with minimal behaviour while still capturing the essence of the logged events. This method is notable for its ability to produce nets that accurately reflect the observed processes, enhancing the precision of process discovery. The effectiveness of their algorithm is demonstrated through implementation in a tool and validation on various examples, highlighting its potential in improving the reliability and accuracy of process mining outcomes. Where in [5] , methods for identifying workflow models are developed, starting with a "workflow log" that records the actual execution of the workflow process. Additionally, a new algorithm is introduced to extract a process model from the log and represent it through a Petri net. The authors demonstrate the capability of the α-algorithm to effectively mine workflows described by a so-called SWF-net. An important study in [1], presented a generic approach of decomposing Petri nets for process mining has been introduced to address the challenges of complexity and scalability in analysing large process models or event logs. In another words, a decomposition approach for process mining problems was proposed, in particular, process discovery and conformance checking. Basically, a process model is decomposed into smaller subnets and the conformance is preformed to each subnet locally to reduce the computation time. Generally, a large body of work exists in the literature about Petri nets decomposition and 218 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 composition. For instance, the authors in [6] present a method for increasing productivity in system development through the use of Petri nets class input-output-place-transition (IOPT) for modelling. They introduce a technique for partitioning Petri net models into concurrent sub-models for distributed implementation, extending the model’s capabilities with directed synchronous communication channels. This approach aims to propose a net-splitting operation that allows centralised models to be transformed into distributed models suitable for heterogeneous platforms. The operation includes specific rules for handling structural complexities and ensures behavioural consistency through node duplication. The approach has been validated through case studies demonstrating its applicability in co-design techniques. Moreover, [7] presents a compositional approach for a new extension of ordinary Petri nets called open Petri nets where the places are distinguished as open (input or output) to represent the interaction with the environment. In their approach, two independent open nets which they agree on a common subnet can be glued together to compose a new net. More precisely, a composition operation pushout is introduced over open nets such that the common part of the component nets is fused in the composed net. Their approach enables the systematic construction and analysis of large and complex systems by composing smaller nets and understanding their interactions. However, only the semantics of deterministic processes are considered. An extended version of the compositional approach in [7] was introduced in [8]. Hence, non-deterministic processes semantic is investigated in the compositional approach. Ranked open nets were defined (an extension of open nets introduced in [7]) where the maximum number of allowed input and output connections are specified. The composition operation is extended as well to non-deterministic processes. Modal I/O-Petri Nets (MIOPNs) is introduced in [9] for asynchronous composition via communication channels. More precisely, the interfaces are defined by labelled Petri nets which distinguished input and output labels. In their composition approach, individuals components are connected by channels for asynchronous communication. That is components with shared input and output actions are connected together with a new place called communication channel. Generally, the paper investigates how MIOPNs can be utilised to model asynchronous interactions between components via compositional methodology. Despite the fact that there exists an extensive literature on the approaches of net composition and decomposition, yet difficulties dealing with large event log still an issue. Hence, [1] proposes innovative methods for process discovery decomposition and conformance checking decomposi- tion. In process discovery problem , the approach involves dividing the set of activities into partly overlapping activity sets, discovering model fragments for each activity set, and then combining these to form a complete process model. We utilised this approach to represent acyclic nets from the decomposed sets (nets) identified. 3. Preliminaries 3.1. Acyclic Petri Nets This section provides basic concepts related to acyclic Petri nets and event logs. Acyclic nets can represent alternative ways of interpreting what has happened, and so may exhibit (backward and forward) non-determinism. 219 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 An acyclic net is a triple acnet = (P, T, F), where P and T are disjoint finite sets of places and transitions respectively, and F ⊆ (P × T ) ∪ (T × P) is a flow relation such that: (i) P is nonempty and F is acyclic; and (ii) for every t ∈ T , there is p ∈ P such that pFt. Graphically, places are represented by circles, transitions by boxes, and arcs between the nodes represent the flow relation If needed, we denote P by Pacnet , etc. For all x ∈ P ∪ T , • x = preacnet (x) ≜ {z | zFx} and x• = postacnet (x) ≜ {z | xFz} (and similarly for sets of nodes • X = x∈X • x and X • = x∈X x• ). ⋃︁ ⋃︁ init = {p ∈ P | • p = ∅} , Pfin = {p ∈ P | p• = ∅}are the initial places and final Moreover, Pacnet acnet places respectively. Given an acyclic net, its execution proceeds by the occurrence (or firing) of sets of transitions. Let acnet = (P, T, F) be an acyclic net. • markings(acnet) ≜ {M |⊆ P} are the markings (shown by placing tokens within the circles), init ≜ Pinit is the default initial marking, and M fin ≜ Pfin is the final marking. and Macnet acnet acnet acnet • steps(acnet) ≜ {U ⊆ T | U ̸= ∅ ∧ ∀t ̸= u ∈ U : •t ∩ • u = ∅} are the steps. • enabledacnet (M) ≜ {U ∈ steps(acnet) | •U ⊆ M} are the steps enabled at a marking M, and a step U enabled at M can be executed yielding a new marking M ′ ≜ (M ∪U • ) \ •U. This is denoted by M[U⟩acnet M ′ . Let M0 , . . . , Mk (k ≥ 0) be markings and U1 , . . . ,Uk be steps of an acyclic net acnet such that Mi−1 [Ui ⟩acnet Mi , for every 1 ≤ i ≤ k. • σ = U1 . . .Uk is a step sequence from M0 to Mk denote by M0 [σ ⟩acnet Mk , and M0 [⟩acnet Mk denotes that Mk is reachable from M0 . init , then σ ∈ sseq(acnet) is a step sequence, and M is a reachable mark- • If M0 = Macnet k ing of acnet. Also, if σ cannot be extended further, it is a maximal step sequence in maxsseq(acnet). A labeled acyclic Perti net ( [1] ), acnet = (P, T, F, l) is an acyclic Petri net (P, T, F) with labeling function T ↛ UA where UA is some universe of activity labels. Let σv = {a1 , a2 , . . . an } ∈ UA ∗ be a sequence of activities. M0 [σv Mk iff there is a step sequence σ ∈ sseq(acnet) such that M0 [σ ⟩acnet Mk and l(σ ) = σv . Also, dom(l) ⊆ T is the domain of l and the range of l denoted by rng(l) is the set of the corresponding observable activities. For each transition t ∈ T , t is called invisible if it is without a label, t ∈ / dom(l), however, it is visible when l(t) ∈ dom(l). Note that occurrence of visible transition t corresponds to observable activity l(t) [1]. Example 1. Figure 1 shows a labelled acyclic Petri net (generated using ProM, a pro- cess mining framework after modifying the event log used in [1]). The set of places are P = {start, p1 , . . . , p9 , end}, and the transitions are T = {t1 ,t2 , . . . ,t11 }. t1 is enabled at the initial marking Minit = {start}, so {start}[t1 ⟩. Hence, t1 can be fired and produce new mark- ing M ′ = {p1 , p2 } denoted by {start}[t1 ⟩{p1 , p2 }. One of the maximal step sequences is σ = {t1 ,t3 ,t4 ,t5 ,t10 }. The labelling function is dom(l) = {t1 ,t3 ,t4 ,t5 ,t8 ,t9 ,t10 } (visible tran- sitions). with l(t1 ) = a, l(t3 ) = b, l(t4 ) = c, l(t5 ) = d, l(t8 ) = f , l(t9 ) = g, l(t10 ) = h such that: a = "register request" b = "examine file" c = "check ticket" d = "decide" f = "send acceptance letter" g = " pay compensation" h = "send reject letter". 220 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 p3 t10 end h p1 t2 t5 p4 t7 p6 p9 b d f t11 start t3 p7 t8 p10 a g t1 p2 p5 t9 c t4 Figure 1: A labelled acyclic net Whereas, the invisible transitions are t2 ,t7 ,t11 which are unlabelled transitions (silent action). Finally, for the sequence of activities σv = {a, b, c, d, f , g}, then {start}[σv {end} because there is a step sequence σ = {t1 ,t3 ,t4 ,t5 ,t7 ,t8 ,t9 ,t11 } where l(σ ) = σv Note that a labelled acyclic Petri net acnet with maximal step sequences (starting from the initial marking and ending in final marking) is called system net and denoted by SN = (acnet, Minit , Mfin ). Event log are the key concept in the context of process mining. Basically, any event log, denoted by L, consists of multiset of sequence of events called traces. A trace captures the evolution (from start to end) of a case, which is a process instance, according to the executed activities. Note that it is possible for different cases to have the same traces. Hence, one can say that an event log is multiset of traces [1]. As indicated earlier, conformance checking and process discovery are related process mining problems. Conformance checking approaches examine to what extend an event log L and a system acyclic net SN = (acnet, Minit , Mfin ) fit together. Basically, it quantifies the consistency between observed behaviour stored in L and the modelled behaviour represented by SN. There are different techniques of conformance checking and exploring them here is out of the scope of this paper. Performing conformance checking may take long time as a lot of different traces need to be conformed with a process model which might include an exponential number of traces. For example, when an event log contains millions of events, the entire event log must be checked in order to do conformance checking, which is in fact time consuming. To reduce time required for conformance checking, Petri net and event log are decomposed into smaller fragments. Basically, after generating a Petri net process model based on the activities in the event log, decomposing the process model into smaller subnets and performing conformance checking for each subnet locally reduces the computation time needed for the conformance checking [1]. There are some work in the literature regarding decomposing process mining problems [1, 10, 11, 12, 13]. More precisely, if there is a system net SN = (acnet, Minit , Mfin ), then it is decomposed into set of subnets SN = {SN 1 , SN 2 , . . . , SN n } such that SN i = (acneti , Minit i , M i ) where acneti = fin i i i i (P , T , F , l )[1]. 221 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 The decomposition approach in [1] is valid if all the resulted subnets satisfy the original labelling function. It means that each place belongs to only one subnet and each invisible transition also belongs to only one subnet. Hence, only visible transitions can appear in different subnets. However, if there are different visible transitions with the same label, then they must belong to one subnet. Finally, each edge appears only in one subnet. Example 2. Figure 3.1 shows the decomposition of the net in Figure 1 based on the de- composition approach in [1]. Basically, the net in Figure 1 is decomposed into six subnets, SN = {SN 1 , SN 2 , . . . , SN 6 }. Their approach of the decomposition produces a maximal partition- ing of the overall process model. That means each subnet is as small as possible. Also, note that only the visible transitions with unique labels appear in multiple subnets. Hence, their decom- position approach is not only about the partitioning the edges, but it considered the transitions labels. p3 p1 t2 start t1 b d a t1 t3 t5 a SN1 SN2 p2 c p5 t1 t4 c d a SN3 t4 SN4 t5 t10 end h t10 h t8 p9 t5 p4 t7 p6 t8 f d f t11 p7 t9 t9 p10 SN5 g g SN6 Figure 2: The decomposition for the net in Figure 1 based on the decomposition approach defined in [1]. 4. Communication Structured Acyclic Nets (csa-nets) Communication Structured Acyclic Nets (CSA-nets) are derived from Structured Occurrence Nets (SON) which are a Petri net-based formalism and introduced in [14, 15] and elaborated in [16]. CSA -nets comprise of multiple acyclic nets that are linked through unique elements referred to 222 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 as buffer places. Buffer places are capable of modelling both asynchronous and synchronous communication. SON can be used as a framework for visualising and analysing behaviour of Complex Evolving Systems (CESs). For example, in [17], SON were used to support the analysis of evidence related to the activities of complex systems, including cybercrime and major accidents. The goal was to indicate those responsible for cybercrime or identify the causes of accident. Also, SON were used in [18] as a framework for modelling cybercrime investigation. Other work on SON are related to events extraction [19, 20]. A recently designed and implemented tool SONCraft [21] (based on the WORKCraft plat- form [22, 23] which is a flexible common underpinning for graph based models) provides an extensive and powerful support for dealing with models of complex evolving systems based on SON, including visualisation and verification. Generalising SON as CSA-nets, [24] verifies its behavioural properties using SAT solver. Moreover, improving its visualisation aspects was discussed in [25, 26, 27]. Equipping CSA-nets with probabilities was introduced in [28]. Figure 3 depicts a simple CSA-net, which comprises two acyclic nets: acnet1 and acnet2 . Asynchronous communication between the two acyclic nets is represented by arrows, as seen between the transitions c and a in different acyclic nets linked through a single buffer place q1 . Thus, transition a will never be executed before c in any execution sequence. A synchronous communication is represented by arrows pointing in both directions, using buffer places q2 and q3 , as observed between transitions b and d. Thus, these two transitions have to be executed simultaneously. Definition 1 (CSA-net). A communication structured acyclic net (or CSA-net) is a tuple csan = (acnet1 , . . . , acnetn , Q,W ) (n > 1) such that: 1. acnet1 , . . . , acnetn are acyclic nets with disjoint sets of nodes (i.e., places and transitions). We also denote: Pcsan = Pacnet1 ∪ · · · ∪ Pacnetn Tcsan = Tacnet1 ∪ · · · ∪ Tacnetn Fcsan = Facnet1 ∪ · · · ∪ Facnetn . 2. Q is a finite set of buffer places disjoint from Pcsan ∪ Tcsan . 3. W ⊆ (Q × Tcsan ) ∪ (Tcsan × Q) is a set of arcs. 4. For every buffer place q: (i) there is at least one transition t such that tW q; and (ii) if tW q and qWu then transitions t and u belong to different component acyclic nets. ♢ That is, in addition to requiring the disjointness of the component acyclic nets and the buffer places, it is also required that buffer places pass tokens between different acyclic nets. To indicate relationships between different nodes, for all x ∈ Pcsan ∪ Tcsan ∪ Qcsan and X ⊆ Pcsan ∪ Tcsan ∪ Qcsan , we denote the directly preceding and directly following nodes as follows: precsan (x) ≜ {z | (z, x) ∈ Fcsan ∪Wcsan } preacnet (X) ≜ {precsan (z) | z ∈ X} ⋃︁ postcsan (x) ≜ {z | (x, z) ∈ Fcsan ∪Wcsan } postcsan (X) ≜ {postcsan (z) | z ∈ X} . ⋃︁ 223 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 acnet1 p2 p1 a b p4 p3 c d q1 q2 q3 e f p5 p6 p7 acnet2 Figure 3: Communication structured acyclic net csan. 4.1. Step sequence semantics Definition 2 (step and marking [3]). Let csan be a CSA-net. 1. markings(csan) ≜ 2Pcsan ∪Qcsan are the markings. init ≜ Pinit is the default initial marking. 2. Mcsan csan 3. steps(csan) ≜ {U ∈ 2Tcsan \ {∅} | ∀t ̸= u ∈ U : precsan (t) ∩ precsan (u) = ∅} are the steps. ♢ The initial marking of a CSA-net is the union of the initial markings of all the component init = M init ∪ M init · · · ∪ M init acyclic nets. More precisely, Mcsan acnet1 acnet2 acnetn with an assumption that the init buffer places are always excluded from the initial marking Mcsan . Definition 3 (enabled and executed step [3]). Let M be a marking of csan. 1. enabledcsan (M) ≜ {U ∈ steps(csan) | precsan (U) ⊆ M ∪ (postcsan (U) ∩ Q)} are the steps enabled at M. 2. A step U enabled at M can be executed yielding a new marking M ′ ≜ (M ∪ postcsan (U)) \ precsan (U). This is denoted by M[U⟩csan M ′ . ♢ Definition 4 ( step sequence [3]). Let M0 , . . . , Mk (k ≥ 0) be markings and U1 , . . . ,Uk be steps of a CSA-net csan such that Mi−1 [Ui ⟩csan Mi , for every 1 ≤ i ≤ k. 1. σ = U1 . . .Uk is a step sequence from M0 to Mk , it is denoted by M0 [σ ⟩csan Mk . Moreover, M0 [⟩csan Mk denotes that Mk is reachable from M0 . init [σ ⟩ 2. sseq(csan) ≜ {σ | Macnet csan M} are the step sequences 3. maxsseq(csan) ≜ {σ ∈ sseq(csan) | ¬∃U : σU ∈ sseq(csan)} are the maximal step se- quences. 4. reachable(csan) ≜ {M | Mcsan init [⟩ csan M} are the reachable markings. 5. finreachable(csan) ≜ {M | ∃σ ∈ maxsseq(csan) : Mcsan init [σ ⟩ csan M} are the final reachable markings. 224 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 ♢ If k = 0 then the corresponding step sequence σ is the empty sequence denoted by λ . 5. Composing a csa-net model from a decomposed process model Composing a CSA-net model from the decomposed subnets is based on the technique of Petri net model decomposition with distributed execution. This technique can tackle the difficulties involved in the analysis and modelling of large-scale systems. That is because complex systems can be decomposed into interconnected subsystems that can be analysed and executed indepen- dently. [29] suggested establishing communication between decomposed sub-models. Basically, they proposed an approach of composing a system model using the decomposed components. Net Splitting operation was defined as a new Petri net operation. Using this operation, a Petri net is split into several subnets. Then, directed synchronous communication channels are added to represent the communication between the resulted components. Also, a Petri net model is partitioned into disjoint sub-models using Split operation. These sub-models are associated with component with independent execution. Then, the whole system model is composed by modelling of communication channels among these components [30]. In the same vein, we would like to reuse the decomposed subnets to compose a CSA-net model. Next we introduce our approach of constructing a CSA-net model which is based on the result of decomposing a system net defined in [1]. Basically, composing a CSA-net model requires identify the overlapped visible transitions between the subnets and link them using asynchronous communication and buffer places. Recall that the decomposition approach in [1] allows only visible transitions to be shared between the subnets. These overlapped visible transitions are always the last and first nodes of any two subnets. Basically, for two subnets SN i and SN j where i < j and their sets of transitions are T i and T j respectively, if t ∈ T i ∩ T j then it is the first node of SN j and the last node of SN i . Hence, for any two subnets SN i , SN j , let IntersectTran be the set of these overlapped visible transitions. Also, let T i = {t1i , . . . ,tmi } be the set of transitions of the subnet SN i . Similarly, let T j = {t1j , . . . ,trj } be the set of transitions of the subnet SN j . Then, tmi = t1j ∈ IntersectTran. Then, to compose a CSA-net model from the decomposed subnets, an asynchronous communication between the subnets using their overlapped visible transitions is added. In this case, a buffer place q is added such that (tmi , q) , (q, (t • 1j )• ) ∈ W . Adding asynchrounous communication and the buffer place q represents the global causality between the subnets SN i and SN j . The steps of composing a CSA-net model from the decomposed subnets are as follows: Let SN be a system net and the set {SN 1 , . . . , SN n } be its maximal decomposed subnets. Then its composed CSA-net model can be constructed as follows: 1. for each subnet SN i , an initial marking is added where 1 < i ⩽ n. Let the set of all new initial markings be SN(Minit ) 2. for each subnet SN i , a final marking is added where 1 ⩽ i < n. Let the set of all new added final markings be SN(Mfin ) 225 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 3. for each two subnets SN i , SN j where 1 ⩽ i < j ⩽ n and T i = {t1i , . . . ,tmi }, T j = {t1j , . . . ,trj } are their set of transitions respectively. Let IntersecTran = T i ∩ T j be the set of their overlapped visible transitions. Then, a buffer place q is added such that (tmi , q), (q, (t • 1j )• ) ∈ W where tmi = t1j ∈ IntersecTran. Finally, t1j ∈ T j is removed from T j . In order to composing a CSA-net model from the decomposed subnets, we assume that each subnet SN i is an acyclic net acnet. SN1 start t1 a q1 SN3 p2 c t4 Figure 4: Composing two subnets SN1 and SN3 in Figure 2. Example 3. Figure 4 shows an example of our approach. Subnets SN 1 and SN 3 in Figure 2 both have visible transition t1 , l(t1 ) = a. The presence of t1 in SN 3 captured the local causality between t1 and other transitions of SN 3 . This local causality can be represented globally at the level of subnets. In this case, the buffer place q1 and asynchronous communication are added between SN 1 and SN 3 such that (t1 , q1 ) and (q1 ,t4 ). This asynchronous communication replaces the local causality between t1 and t4 in SN 3 . Hence, t1 is removed from SN 3 , however its impact is implicitly captured by the occurrence of t1 in SN 1 and captured by buffer place q1 and its arcs. As in CSA-net each acyclic net is independent and it has its own initial and final places, therefore initial and final markings are added for each subnet. In particular, for subnet SN 1 only final marking is added, however, subnet SN 3 initial marking and final marking are added, which are the gray shaded nodes as depicted in Figure 4 ♢ Therefore, we would like to redefine Definition 1 to be based on the decomposition approach defined in [1]. Definition 5 (CCSA-net). Let SN be a system net , and its maximal decomposition is the set of the subnets {SN1 , . . . , SNn } as defined in [1]. A composed communication structured acyclic net (or CCSA-net) is a tuple ccsan = (SN 1 , . . . , SN n , Q,W ) (n > 1) such that: 226 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 1. SN1 , . . . , SNn are subnets. We also denote: Pcsan = P1 ∪ · · · ∪ Pn ∪ SN(Minit ) ∪ SN(Mfin ) Tcsan = T 1 ∪ · · · ∪ T n Fcsan = F 1 ∪ · · · ∪ F n . 2. Q is a finite set of buffer places defined as in Definition 1. 3. for each two subnets SNi , SN j where 1 ⩽ i < j ⩽ n and T i = {t1i , . . . ,tmi }, T j = {t1j , . . . ,trj } are their set of transitions respectively. Let IntersecTran = T i ∩ T j be the set of their overlapped transitions which carry the same label. Then, a buffer place q is created such that (tmi , q), (q,t1j ) where tmi , t1j ∈ IntersecTran and they carry the same label. 4. W ⊆ (Q × Tcsan ) ∪ (Tcsan × Q) is a set of arcs. ♢ Example 4. Figure 5 shows the result of the CSA-net model composition. Basically, all the decomposed subnets in Figure 2 are reused with additional buffer places between the subnets connecting them using their overlapped visible transitions. For instance, in Figure 2 the subnets SN1 and SN2 both include transition t1 with a label. Note that t1 is only transition in SN 1 , so it is the last node. However, it is first node in SN 2 . So, buffer place q2 is added such that (t1 , q2 ) ∪ (q2 ,t2 ) ∪ (q2 ,t3 ) ∈ W . The rest of the subnets are treated similarly. Worth noticing that in the composed CSA-net model in Figure 5 the initial markings with auxiliary transitions are added for the subnets SNi where 1 < i ≤ 6 (which are the gray shaded nodes). Similarly, final markings are added for the subnets SNi where 1 ≤ i < 6. ♢ Worth to notice that the decomposed subnets in Figure 2 have no initial nor final markings. However, initial and final markings are added when composing them together in the composed CSA -net in Figure 5. Hence, they become system nets. More precisely, the new added initial markings are for the subnets SN i where 1 < i ≤ 6. Also, the new added final markings are for the subnets SN i where 1 ≤ i < 6. The initial and final markings for SN 1 and SN 6 are those of the original net in Figure 1 respectively. Hence, even though the subnets SN 2 , ..., SN 6 become system nets, non of their visible transitions are fireable, their visible transitions are fireable when the transitions of SN 1 are fired. In fact, by removing all the added initial and final markings, we obtain the decomposed subnets in Figure 2. More important, adding the initial and final markings does not change the original behaviour. Regarding the behaviour preservation of the original net, we would like to point that the composed csan in Definition 5 and the original acyclic net have closely related behaviour. This is formulated in the next result. Theorem 5.1. Let acnet = (P, T, F, l) be a labelled acyclic net and ccsan be as in Definition 5. Then, for every maximal step sequence σ in ccsan, σ ∈ maxsseq(ccsan) there is a maximal step sequence σ ′ in acnet, σ ′ ∈ maxsseq(acnet) such that σ ∩ T = σ ′ . Our compositional approach and the compositional proposed in [7, 8] are different in several aspects. In [7, 8], identifying a common subnet between two independent nets is required to compose them into a new net. As the open places were classified into open and output, they were 227 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 SN1 start t1 a SN2 q2 q1 SN3 t2 p3 t5 p2 t4 d c p1 b t3 q3 SN4 p5 t5 d q4 q5 SN5 t10 h p4 p6 t8 f t7 p7 t9 g q7 q6 SN6 p10 end p9 t11 Figure 5: Composing csa-net model from the decomposed subnets in Figure 2. used as interfaces between the net and the environment whereas in our compositional approach the transitions are the interfaces. Also, in our case, there is no need to define the common subnets 228 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 between the components to be able to construct the compositional model. Instead, we connect the subnets which shared the same visible transitions via buffer places. Hence, there is no need to define a composition operation as we utilise the buffer places to connect the subnets and compose the CSA-net which is similar to the composition in [9]. Finally, the proposed compositional technique is introduced in the context of process mining. Composing a CSA-net using the decomposed subnets allows us to construct a CSA-net from a database(i.e., an event log in this case), which has not been addressed so far. CSA-net in all the previous work [31, 18, 19, 24, 26, 25, 32] was created manually. Our approach provides a mechanism of constructing a CSA-net from an event log after decomposing the associated process model. We believe that CSA-net is a suitable modelling representation for the context of process mining. Due to the structure of CSA-net where each component is independent, employing it for process mining would reduce the time computation for process mining related problems, specially conformance checking and process discovery. In fact, performing conformance checking for a set of small subnets is more efficient compared for a large model [1]. The motivation for process mining originates from the presence of event data. Although event records can accumulate to terabytes in size, performance becomes an increasingly important factor to consider. In order to effectively ensure satisfactory response times , distributed the analysis across a network of computers is the most feasible strategy [12, 10]. Moreover, utilisation CSA-net for the purpose of process mining would not only be useful in terms of performance, but also provide localised diagnostics and improve the visualisation. 6. Conclusion In this work, we proposed a method to construct CSA-net from decomposed subnets. We argue that CSA-net is a suitable representation for process mining analysis. That is because CSA-net allows individually and locally diagnosis for each acyclic net. Hence, conformance checking can be performed efficiently using CSA-net representation. In future, we plan to implement our approach as a SONCraft plug-in. Furthermore, an experiment will be conducted for conformance checking problem after constructing a CSA-net process model and compare the results with some results exist in the literature. Related formal proofs will be discussed as well. References [1] W. M. P. van der Aalst, Decomposing petri nets for process mining: A generic approach, Distributed Parallel Databases 31 (2013) 471–507. URL: https://doi.org/10.1007/s10619- 013-7127-5. doi:10.1007/S10619-013-7127-5. [2] W. M. Van Der Aalst, B. F. Van Dongen, Discovering petri nets from event logs, in: Transactions on Petri nets and other models of concurrency vii, Springer, 2013, pp. 372– 422. [3] M. Alahmadi, S. Alharbi, T. Alharbi, N. Almutairi, T. Alshammari, A. Bhattacharyya, M. Koutny, B. Li, B. Randell, Structured Acyclic Nets, Technical Report, School of Com- puting, University of Newcastle upon Tyne, 2023. 229 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 [4] J. Carmona, J. Cortadella, M. Kishinevsky, A region-based algorithm for discovering petri nets from event logs, in: Business Process Management: 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedings 6, Springer, 2008, pp. 358–373. [5] W. van der Aalst, T. Weijters, L. Maruster, Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering 16 (2004) 1128– 1142. doi:10.1109/TKDE.2004.47. [6] A. K. H. da Costa, Petri net model decomposition - a model based approach supporting distributed execution, Ph.D. thesis, Universidade NOVA de Lisboa (Portugal), 2010. [7] P. Baldan, A. Corradini, H. Ehrig, R. Heckel, Compositional semantics for open petri nets based on deterministic processes, Mathematical Structures in Computer Science 15 (2005) 1–35. [8] P. Baldan, A. Corradini, H. Ehrig, B. König, Open petri nets: Non-deterministic processes and compositionality, in: H. Ehrig, R. Heckel, G. Rozenberg, G. Taentzer (Eds.), Graph Transformations, 4th International Conference, ICGT 2008, Leicester, United Kingdom, September 7-13, 2008. Proceedings, volume 5214 of Lecture Notes in Computer Sci- ence, Springer, 2008, pp. 257–273. URL: https://doi.org/10.1007/978-3-540-87405-8_18. doi:10.1007/978-3-540-87405-8\_18. [9] S. Haddad, R. Hennicker, M. H. Møller, Specification of asynchronous component systems with modal i/o-petri nets, in: M. Abadi, A. Lluch-Lafuente (Eds.), Trustworthy Global Computing - 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers, volume 8358 of Lecture Notes in Computer Sci- ence, Springer, 2013, pp. 219–234. URL: https://doi.org/10.1007/978-3-319-05119-2_13. doi:10.1007/978-3-319-05119-2\_13. [10] W. M. P. van der Aalst, Decomposing process mining problems using passages, in: S. Haddad, L. Pomello (Eds.), Application and Theory of Petri Nets - 33rd International Conference, PETRI NETS 2012, Hamburg, Germany, June 25-29, 2012. Proceedings, volume 7347 of Lecture Notes in Computer Science, Springer, 2012, pp. 72–91. URL: https://doi.org/10.1007/978-3-642-31131-4_5. doi:10.1007/978-3-642-31131-4\_5. [11] W. M. P. van der Aalst, Distributed process discovery and conformance checking, in: J. de Lara, A. Zisman (Eds.), Fundamental Approaches to Software Engineering - 15th International Conference, FASE 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, volume 7212 of Lecture Notes in Computer Science, Springer, 2012, pp. 1–25. URL: https://doi.org/10.1007/978-3-642-28872-2_1. doi:10.1007/978-3-642-28872- 2\_1. [12] C. Bratosin, N. Sidorova, W. M. P. van der Aalst, Distributed genetic process mining, in: Pro- ceedings of the IEEE Congress on Evolutionary Computation, CEC 2010, Barcelona, Spain, 18-23 July 2010, IEEE, 2010, pp. 1–8. URL: https://doi.org/10.1109/CEC.2010.5586250. doi:10.1109/CEC.2010.5586250. [13] J. Carmona, J. Cortadella, M. Kishinevsky, Divide-and-conquer strategies for process min- ing, in: U. Dayal, J. Eder, J. Koehler, H. A. Reijers (Eds.), Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, September 8-10, 2009. Proceed- ings, volume 5701 of Lecture Notes in Computer Science, Springer, 2009, pp. 327–343. 230 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 URL: https://doi.org/10.1007/978-3-642-03848-8_22. doi:10.1007/978-3-642-03848- 8\_22. [14] B. Randell, Occurrence nets then and now: The path to structured occurrence nets, in: L. M. Kristensen, L. Petrucci (Eds.), Applications and Theory of Petri Nets - 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011. Proceedings, volume 6709 of Lecture Notes in Computer Science, Springer, 2011, pp. 1–16. [15] B. Randell, M. Koutny, Failures: Their definition, modelling and analysis, in: C. B. Jones, Z. Liu, J. Woodcock (Eds.), Theoretical Aspects of Computing - ICTAC 2007, 4th International Colloquium, Macau, China, September 26-28, 2007, Proceedings, volume 4711 of Lecture Notes in Computer Science, Springer, 2007, pp. 260–274. URL: https: //doi.org/10.1007/978-3-540-75292-9_18. doi:10.1007/978-3-540-75292-9\_18. [16] M. Koutny, B. Randell, Structured occurrence nets: A formalism for aiding system failure prevention and analysis techniques, Fundam. Informaticae 97 (2009) 41–91. [17] B. Randell, M. Koutny, Structured Occurrence Nets: Incomplete, contradictory and uncertain failure evidence, Technical Report 1170, School of Computing Science, University of Newcastle upon Tyne, 2009. [18] T. Alharbi, M. Koutny, Domain name system (DNS) tunneling detection using structured occurrence nets (sons), in: D. Moldt, E. Kindler, M. Wimmer (Eds.), Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE 2019), volume 2424 of CEUR Workshop Proceedings, CEUR-WS.org, 2019, pp. 93–108. [19] T. Alshammari, Towards Automatic Extraction of Events for SON Modelling, CEUR Workshop Proceedings 3170 (2022) 188–201. [20] T. Alshammari, Integrating nlp and structured occurrence nets for crime modelling: A pattern-based approach, in: M. Köhler-Bussmeier, D. Moldt, H. Rölke (Eds.), Petri Nets and Software Engineering 2023 co-located with the 44rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2023), Lisbon, Portugal, June 27th, 2023, volume 3430 of CEUR Workshop Proceedings, CEUR-WS.org, 2023. URL: https://ceur-ws.org/Vol-3430/poster2.pdf. [21] B. Li, B. Randell, A. Bhattacharyya, T. Alharbi, M. Koutny, Soncraft: A tool for con- struction, simulation, and analysis of structured occurrence nets, in: 18th International Conference on Application of Concurrency to System Design, ACSD 2018, Bratislava, Slovakia, June 25-29, 2018, IEEE Computer Society, 2018, pp. 70–74. [22] Workcraft, https://workcraft.org/, 2018. [23] I. Poliakov, V. Khomenko, A. Yakovlev, Workcraft - A framework for interpreted graph models, in: G. Franceschinis, K. Wolf (Eds.), Applications and Theory of Petri Nets, 30th International Conference, PETRI NETS 2009, Paris, France, June 22-26, 2009. Proceedings, volume 5606 of Lecture Notes in Computer Science, Springer, 2009, pp. 333–342. [24] N. Almutairi, M. Koutny, Verification of communication structured acyclic nets using SAT, in: M. Köhler-Bussmeier, E. Kindler, H. Rölke (Eds.), Proceedings of the International Workshop on Petri Nets and Software Engineering 2021 co-located with the 42nd Interna- tional Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2021), Paris, France, June 25th, 2021 (due to COVID-19: virtual conference), volume 2907 of CEUR Workshop Proceedings, CEUR-WS.org, 2021, pp. 175–194. 231 Dr. Nadiyah Almutairi et al. CEUR Workshop Proceedings 217–232 [25] M. Alahmadi, Master channel places for communication structured acyclic nets, in: M. Köhler-Bussmeier, E. Kindler, H. Rölke (Eds.), Proceedings of the International Work- shop on Petri Nets and Software Engineering 2021 co-located with the 42nd Interna- tional Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2021), Paris, France, June 25th, 2021 (due to COVID-19: virtual conference), vol- ume 2907 of CEUR Workshop Proceedings, CEUR-WS.org, 2021, pp. 233–240. URL: https://ceur-ws.org/Vol-2907/paper13.pdf. [26] M. Alahmadi, Parametrisation of csa-nets, in: M. Köhler-Bussmeier, D. Moldt, H. Rölke (Eds.), Petri Nets and Software Engineering 2022 co-located with the 43rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2022), Bergen, Norway, June 20th, 2022, volume 3170 of CEUR Workshop Proceedings, CEUR-WS.org, 2022, pp. 215–216. URL: https://ceur-ws.org/Vol-3170/poster3.pdf. [27] M. Alahmadi, Parameterised csa-nets, in: M. Köhler-Bussmeier, D. Moldt, H. Rölke (Eds.), Petri Nets and Software Engineering 2023 co-located with the 44rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2023), Lisbon, Portugal, June 27th, 2023, volume 3430 of CEUR Workshop Proceedings, CEUR-WS.org, 2023, pp. 167–182. URL: https://ceur-ws.org/Vol-3430/paper10.pdf. [28] N. Almutairi, Probabilistic communication structured acyclic nets, in: M. Köhler-Bussmeier, D. Moldt, H. Rölke (Eds.), Petri Nets and Software Engineering 2022 co-located with the 43rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2022), Bergen, Norway, June 20th, 2022, volume 3170 of CEUR Workshop Proceedings, CEUR-WS.org, 2022, pp. 168–187. [29] A. K. H. da Costa, Petri net model decomposition-a model based approach supporting distributed execution, Ph.D. thesis, Universidade NOVA de Lisboa (Portugal), 2010. [30] A. Costa, L. Gomes, Partitioning of petri net models amenable for distributed execution, in: 2006 IEEE Conference on Emerging Technologies and Factory Automation, 2006, pp. 1129–1132. doi:10.1109/ETFA.2006.355253. [31] B. Li, Visualisation and Analysis of Complex Behaviours using Structured Occurrence Nets, Ph.D. thesis, School of Computing, Newcastle University, 2017. [32] S. Alharbi, Hierarchical simulation of timed behaviours of structured occurrence nets, in: M. Köhler-Bussmeier, D. Moldt, H. Rölke (Eds.), Petri Nets and Software Engineering 2023 co-located with the 44rd International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2023), Lisbon, Portugal, June 27th, 2023, volume 3430 of CEUR Workshop Proceedings, CEUR-WS.org, 2023, pp. 143–165. URL: https://ceur-ws.org/Vol-3430/paper9.pdf. 232