Abstract
The paper presents a novel approach for discovering Petri nets (PN) that include silent transitions from logs of event sequences. We propose a repairing method that extends existing discovery techniques that do not deal with silent transitions; such techniques may yield substructures that involve deadlocks. Such substructures, called inconsistent (IS), are detected through a structural pattern. IS are rewritten by adding new transitions labelled with event symbols already assigned to transitions in IS; the rewritten model has no deadlocks. Afterwards, the PN with duplicated event labels is transformed into an equivalent model with silent transitions. The algorithms derived from the technique, which have polynomial-time complexity, have been implemented and tested on examples of diverse structures.
Similar content being viewed by others
Change history
02 March 2022
The original version of this paper was updated to fix the numbering of the section headings.
References
Alvarez-Pérez Y, López-Mellado E (2020) Identifying petri nets with silent transitions by event traces classification. IFAC 15th international workshop on discrete event systems, Rio de Janeiro, Brazil. November 2020. IFAC-PapersOnLine
Gansner ER, North SC (2000) An open graph visualization system and its applications to software engineering. Software: Practice and Experience. 30(11):1203–1233. https://graphviz.org
Cabasino MP, Giua A, Seatzu C (2007) Identification of petri nets from knowledge of their languages. Discrete Event Dyn Syst 17(4):447–474, December
Cabasino M, Darondeau P, Fanti M, Seatzu C (2015) Model identification and synthesis ofdiscrete-event systems, chapter 10. In: Zhou M, Li H, Weijnen M (eds) Contemporary Issues in Systems Science and Engineering. IEEE/Wiley Press Book Series
Dingle NJ, Knottenbelt WJ, Suto T (2009) PIPE2: a tool for the performance evaluation of generalised stochastic petri nets. ACM SIGMETRICS Perform Eval Rev 36(4):34–39
Dotoli M, Fanti MP, Mangini AM, Ukovich W (2011) Identification of the unobservable behaviour of industrial automation systems by petri nets. Control Eng Pract 19(9):958–966
Estrada-Vargas A, Lopez-Mellado E, Lesage J-J (2010) A Comparative Analysis of Recent Identification Approaches for Discrete-Event Systems. Math Probl Eng 2010:1–21
Estrada-Vargas A, Lopez-Mellado E, Lesage J-J (2017) A Black-Box Identification Method for Automated Discrete-Event Systems. IEEE Trans Autom Sci Eng 14(3):1321–1336
García-Uribe C, López-Mellado E (October 2020) An event clustering method for discovering switch silent transitions in a class of petri nets. 34th annual European simulation and modelling conference. ESM'2020. Toulouse France
Guo Q, Wen L, Wang J, Yan Z, Yu P (2015) Mining invisible tasks in non-free-choice constructs. Business process management: 13th Int. Conference, 9253, pp.109–125
Pomares-Angelino R, López-Mellado E (November 11–13, 2020) Automated Modelling of Deadlock-free Petri Nets Using Duplicated Transition Labels. 17th Int. Conf. on Electrical Engineering, Computing Science and Automatic Control (CCE), Mexico City, Mexico. pp. 1–7, doi: https://doi.org/10.1109/CCE50788.2020.9299169
Tapia-Flores T, López-Mellado E (Nov. 2016) Inferring the Repetitive Behaviour from Event Logs for Process Mining Discovery. International Conference on Mining Intelligence and Knowledge Exploration, Mexico City, Mexico, pp. 164–173; (LNCS, vol. 10089)
Tapia-Flores T, Rodríguez-Pérez E, López-Mellado E (2016) Discovering process models from incomplete event logs using conjoint occurrence classes. ATAED@Petri Nets/ACSD, pp. 31–46
Tapia-Flores T, López-Mellado E, Estrada-Vargas AP, Lesage JJ (2018) Discovering Petri Net Models of Discrete Event Processes by Computing T-invariants. IEEE Trans Autom Sci Eng. 05/2018 15:992–1003
Van der Aalst W (2011) Process mining: discovery, conformance and enhancement of business processes. Springer, Berlin
Van der Aalst W, Weijters T, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9):1128–1142
Wen L, Wang J, van der Aalst W, Huang B, Sun J (2010) Mining process models with prime invisible tasks. Data Knowl Eng 69(10):999–1021
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Román Pomares-Angelino is supported by CONACYT, México. PhD Grant 901440
Appendix
Appendix
This appendix contains additional tests of the proposed method. The tests were performed using the scheme described in the paper using artificial logs. Besides, we include the discovered models by the algorithm Alpha# for comparison.
1.1 Example A.1
The purpose of this example is to show the outcomes of all the steps of the repairing technique. Consider the net in Fig. 20, which has silent transitions (in black); the artificial log generated by PIPE from this net is the following:
From such a log, the following data has been computed from CoMiner algorithm where the discovered dependencies are: [t3,t23 + t24 + t27][t23,t31 + t25][t1,t15][t1,t12][t13,t14][t14,t37][t15,t16 + t17] [t37,t13 + t18][t17,t18][t24,t29 + t35][t29,t30][t30,t36 + t33][t33,t34][t0,t4 + t8][t4,t6 + t10][t6,t7 + t11][t7,t5][t3 + t25,t27][t23 + t27,t31][t31 + t24,t35][t35 + t30 + t34,t36][t2 + t8,t9][t9 + t4,t10][t10 + t6,t11][t11 + t5,t39][t12 + t37,t13][t15 + t16,t17]
Then, the PN in Fig. 21 built with these dependencies; this PN has deadlocks.
After the creation of the net, the dependencies that form IS are given below.
Based on these IS the PN is repaired using duplicated labels. It is shown in Fig. 22, where tr’ indicates that tr is duplicated.
Now, the dependencies of the Petri net transformed with duplicated labels are:
The last step, where the PN with duplicated labels is transformed into a PN with silent transitions, yields a set of repaired dependencies given below. Then the PN is shown in Fig. 23, where epk designates silent transitions.
Now, in Fig. 24 we include the WFN obtained using the algorithm Alpha#. This model is the same that obtained by our method. In both cases the PN used for generation of the artificial log is rediscovered.
1.2 Example A.2
The processed log is λA2 = {xabcdefgy, xabcefgy, xabcdefbcdefgy, xABCDy, xabCDy, xABCfgy, xAy}. The model discovered including silent transitions is shown in Fig. 25. It has nine silent transitions; five Skip transitions, two Redo transitions, and one Switch transition.
The PN used for generating the log is rediscovered. The processing time of the repairing algorithm in this test is 2.7866 ms.
The WFN found by the algorithm Alpha# is shown in Fig. 26. Notice that the model is not the same; it has twelve silent transitions and transition p has no input place whilst transition n has no output place.
Rights and permissions
About this article
Cite this article
Pomares-Angelino, R., López-Mellado, E. Discovering petri nets including silent transitions. A repairing approach based on structural patterns. Discrete Event Dyn Syst 32, 291–315 (2022). https://doi.org/10.1007/s10626-021-00358-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10626-021-00358-w