Abstract
System inference, i.e., the building of system structure from system behavior, is widely recognized as a critical challenging issue. In System Theory, structure and behavior are at the extreme sides of the hierarchy that defines knowledge about the system. System inference is known as climbing the hierarchy from less to more knowledge. In addition, it is possible only under justifying conditions. In this paper, a new system inference method is proposed. The proposed method extends the process mining technique to extract knowledge from data and to represent complex systems. The modularity, frequency and timing aspects can be extracted from the data. They are integrated together to construct the Fuzzy Discrete Event System Specification (Fuzzy-DEVS) model. The proposed approach consists of three stages: (1) extraction of event logs from data by using the System Entity Structure method; (2) discovery of a transition system, using process discovery techniques; (3) integration of fuzzy methods to automatically generate a Fuzzy-DEVS model from the transition system. The last stage is implemented as a plugin in the Process Mining Framework (ProM) environment. A case study is presented in which Fuzzy-DEVS model is inferred from real life data, and the SimStudio tool is used for its simulation.
Introduction
Systems in different areas are becoming more and more complex. Indeed, they consist of multiple and heterogeneous components and intricate interactions among these components. System Theory provides a fundamental framework to understand dynamical systems [1]. In such a framework, a system is characterized by its structure and its behavior. All the knowledge about the system can be organized in a 4-level hierarchy proposed by Klir [2]. This hierarchy is depicted by Fig. 1. It is organized as follows: the source level identifies a portion of the real world we are going to observe and measure; the data level corresponds to the set of measurements made on the system from its observation; the generative level uses formulas or equations to constitute a knowledge; the structure level describes the component systems that are interconnected together to form the entire system.

System problems and hierarchy of knowledge.
The system structure is defined by the top levels of the hierarchy and the system behavior by the bottom levels. Actually, the more one goes down the hierarchy, the less knowledge is acquired, and conversely. Moving between those levels of system knowledge can be interpreted in three basic ways: in system analysis, we know the system structure (existing or hypothetical) and we try to generate its data; in system design, the system does not exist yet and we are investigating the alternative structures for a completely new system; in system inference, the system exists and we are trying to generate its structure from known evidence of its behavior. This has been called “climbing the hill” by Zeigler [3]. Note that a slight but very significant difference between system design and system inference is the system existence or not, prior to the study.
System inference is recognized as a very challenging problem. Process mining [4], as a relatively young area, provides techniques to infer from knowledge given at data level, corresponding knowledge at the structure level. However, process mining requires data be organized in event logs. Event logs are recorded by Extensible Event Stream (XES) standard (in Section 3.3, XES will be explained). Therefore, not every data can be accepted. Moreover, timing aspects are not usually taken into account. Also, there is a lack of modularity, making the design of hierarchical models difficult to realize. Therefore, process mining shows limitations in inferring complex systems.
A new method is proposed to overcome these limitations, which is rooted in the system-theoretic power of the DEVS formalism [3]. DEVS not only has a general framework for Modeling and Simulation (M&S) of complex systems, but also has formal temporal and hierarchical coupling features. It provides a universal way to represent dynamic systems regardless of the application area. Fuzzy-DEVS [5] adds to DEVS capabilities to take frequency of events and imprecise knowledge into account by applying fuzzy sets theory [6]. Another candidate of the formalism for providing similar advantages is Stochastic DEVS model [7], yet Fuzzy-DEVS is more convenient than Stochastic DEVS for the following reasons: the concept of possibility used in Fuzzy-DEVS emphasizes the likelihood of an event in the system in a more objective manner than the concept of probability used in Stochastic DEVS; the concept of possibility allows users to focus only on the mainstream behavior of the business process; Fuzzy-DEVS can provide more semantics by integrating subjective data and linguistics.
This paper proposes a new model-based system inference method based on the construction of a Fuzzy-DEVS model from real event data. This method, called D2FD (Data to Fuzzy-DEVS), makes use of the Two Phase Approach [4] known in process mining. In the earlier stages of D2FD, we propose a structured method to extract event logs from the raw event data using the System Entity Structure (SES) framework. In the final stages, we propose a method to automatically generate a Fuzzy-DEVS model from the event logs using Dependency Method to handle frequency, and Adapted Fuzzy Time Controller AFTC to handle timing aspects. Possibility Measures and the weighted average method are then used, and the resulting model is simulated with the SimStudio package (a Java implementation of DEVS). The simulation results are used to improve the business process behind the data collected.
The paper is organized as follows: related works are presented in Section 2. Background information, i.e. Fuzzy-DEVS, SES, and event logs, are introduced in Section 3. Section 4 presents the D2FD method. Its implementation in the ProM and the use of the simulation tool SimStudio are presented in Section 5. Section 6 shows a case study and Section 7 gives conclusion and perspectives.
It has been shown that process mining can audit relevant information from event logs [8]. A conceptual approach is proposed in [9] to extract event data from databases. Both studies provide general and abstract methods without results from real case study.
In process mining [4], the resulting process model is usually a Petri net model [10]. Two techniques exist to discover the Petri net model: the α-algorithm and the Two Phase Approach. The α-algorithm is able to discover concurrency but is unable to take frequencies into account. The Two Phase Approach (it will be explained in section 4.2) first transforms an event log into a low-level transition system [11] and then synthesizes a Petri net from the transition system. A major drawback of this approach is that the discovered Petri net cannot represent the timing aspects.
Fuzzy approaches such as fuzzy reasoning, fuzzy modeling and fuzzy inference systems have been used to address the issue of incomplete knowledge in complex systems modeling. Giambiasi et al. [12] propose logic gates with fuzzy delays for modeling and simulation. Zeigler et al. [13] propose to integrate genetic algorithm and fuzzy inference system with DEVS. This genetic algorithm can be extended by a multilevel resolution search strategy in order to solve different degrees of abstracted problems [14]. Dahmani and Hamri [15] use if-then rule to fuzzy controller and specify the duration of state in the DEVS model. Bisgambiglia et al. [16] use fuzzy inference systems (FIS) with DEVS formalism in order to perform the control or the learning on systems described incompletely or with linguistic data. Santucci and Capocchi [17] propose an approach based on the use of Fuzzy Control Language allowing facilitating the modeling and simulation of DEVS. The limitation of these studies is that the model is not constructed from real data.
Background
Fuzzy-DEVS formalism
The Fuzzy-DEVS formalism [5] extends the DEVS formalism with fuzzy set logic. It is able to analysis and describe complex system when the structure of a system is only partially unknown. A fuzzy DEVS model X: the set of input values. Y: the set of output values. S: the set of states.
Here, the DEVS concepts of internal transition, external transition, output function and time advance function, are integrated with fuzzy set logic. Fuzzy internal transition and fuzzy external transition provide state transitions with fuzzy relation which represents the possibility of each state transition. Fuzzy output function also provides the output function with fuzzy relation to represent possibilities of output event. Fuzzy time advance function is extended to a fuzzy set
System entity structure
The System Entity Structure [18] approach defines an ontological framework to represent M&S knowledge in a hierarchical manner. Figure 2 shows the basic elements of the SES. Entities represent things that exist in the real world. They can be assigned with variables, which provide values within given ranges and types. Aspects represent ways of decomposing entities into more detailed parts. Multi-aspects are aspects for which the components are all of one kind. Specializations represent categories in specific forms that an entity can assume.

Basic SES representation.
The event logs are based on the XES standard [4]. An XES document (i.e., XML file) contains one log which is related to one specific process. A log can contain any number of traces. Each trace describes a sequential list of events corresponding to a particular case. The log, its traces, and its events may have any number of attributes. Attributes are defined by the type of data value they represent. An extension defines a set of attributes for a specific perspective. The concept extension defines an attribute which stores commonly understood names of type elements. Similarly, the time extension stores the time information.
D2FD method
The D2FD method we propose to climb the hierarchy of system knowledge, from data to structure, has three major stages, as presented in Fig. 3: (1) from event data to event logs; (2) from event logs to transition system; (3) from transition system to Fuzzy-DEVS model. Here, a toy case of an e-shopping company is used to support the presentation of the D2FD method. Later a real-world case will be shown.

General structure of the D2FD method.
In Fig. 3, the world cloud is related to the source level of Fig. 1. It contains people, machines, organizations and so on. The focus of this paper is on the output side of the world, i.e., event data. Events can be of various types, and they can be recorded in various ways. Besides the twelve guidelines given in [9], we propose four more guidelines for a proper handling of event data: event data must be recorded in csv or excel files, and these documents are related to each other; activity names should be simple, precise and clear. Similar name can have similar meaning; as suggested by Fig. 5, event data correspond to activities that are structured into attributes (i.e., properties that define the event, among which start time and finish time are mandatory), case (each event refers to a case), and instance (a specific sequence of case); events are ranked, firstly by instance, and secondly increasingly by start time.
In the e-shopping toy case we consider, there is a start document containing company requests and an end document containing customer orders. In Table 1, the e-shopping products (Pro field) indicate instances (X is the name of the product). One product has several orders (O field), each of which being a case at a different time (the ST field indicates the start time, and the ET field indicates the end time). Attributes are the e-shopping shops (Shop field), the product departments (PD field) and the product subthemes (PS field). In Table 2, the customers (CM field) are the instances (Y is the name of the customer). One customer can place several orders (O field), each being a case at a different time (the ET and ST fields have the same meaning than previously). Attributes are the e-shopping shops (Shop field), and the product departments (PD field).
Start document of toy case
Start document of toy case
End document of toy case
The stage of D2FD method corresponding to observing event logs from event data is composed of five steps: (1) goals definition, (2) relationships identification, (3) activities identification, (4) process instance selection, and (5) mapping to XES file. These steps are explained hereafter.
Prior to any other activity in the method is the definition of study goals. Goals are investigated from interview. They include the problem to be addressed or the performance to evaluate.
In the toy case, two goals are observed: how does the e-shopping company work? and how does the customer choose products?
Relationships identification
Raw data are not often well organized, and there is more than one way to build event logs that can store them. Identifying underlying relationships can help researchers find analysis results. SES is used to achieve this identification.
Santucci et al. [19] propose an extension of SES in order to integrate the concepts of abstraction hierarchy into DEVS. Cheon et al. [20] propose a method and an example to generate an experimental frame by using SES from the source data. Although most of researches propose to use SES to construct DEVS models, they do not use SES to discover the mechanisms of internal transition and external transition. To our knowledge, there is no method proposed in the literature to build Fuzzy-DEVS model from real data, using SES.
We propose that each document generates one SES structure as well as one Fuzzy-DEVS atomic model. Each attribute in a document defines a level in the corresponding SES structure.
In the toy case, two SES structures are constructed as shown in Fig. 4. The start document has three attributes, and the end document has two attributes. A, C, D, E, F, G, H, I, and J are different activities, which represent the elements in Tables 1 and 2. In Table 1, D and C are the aspects of A, while E, F, and G are the aspects of D, and H and I are the aspects of C. Respectively, in Table 2, J and C are the aspects of A.

Two generated SES structure from the toy case.
In addition, we propose a rule to find modularity between documents, by distinguishing public and private activity. The rule is shown as follows: (1) if some activities have a strong relationship with the activities in other documents, we identify these activities as public activities and their children activities as private activities; (2) Activities without relationship with any other ones, are identified as public.
In the toy case of Fig. 4, activity C exists in both SES structures. Therefore, the children of C, i.e., H and I, are private activities (written in red). A, C, D, E, F, G, and J are public activities.
Process instance selection
The process instance [21] is the object that one follows throughout the business process. In a document-based business process, the process instance to be selected is related to at least one document. In some cases, all relevant knowledge resides in a single document (e.g., the start document). In other cases, the knowledge is spread among various documents.
Based on the tree structure of SES, there are different levels of activities. The problem exists when the activities can be either public activity or private activity. In Fig. 4, D and C are possible to become private activities as A is similar in both structures. We propose to select one level (or we can say one attribute) which involves the key and interesting activities.
In the toy case, both the start document and the end document are involved in the process instance selection. The key activities are the leaves of the SES structures build (i.e., {E, F, G, H, I} at one side, and {J, C} at the other side).
Mapping to XES file
In Fig. 5, a mapping from event data to event logs is proposed to convert instance to trace, case to event id, time to time extension, and activities to concept extension.

Mapping between event data, SES and XES.
The Two Phase Approach in process mining [4] provides a discovery technique, which first transforms an event log into a low-level transition system and then synthesizes a Petri net from transition system. The D2FD approach reuses the first stage of the Two Phase Approach (i.e., the production of a transition system).
In the toy case, the set L of event logs extracted, using traces in the company documents is the following: L = [(E, F, G, H)10, (E, G, F, H)15, (E, I, H)3], where numbers in exponent indicate the times of the corresponding traces. Every position in a trace corresponds to a state in the resulting transition system. For example, when the current state is between F and G, the partial trace σpast= {E, F} describes the past of the corresponding case, and the partial trace σ future = {G, H} describes the future of the corresponding case. The final transition system of the toy case is the upper level of Fig. 6.

Toy case from transition system to Fuzzy-DEVS atomic model.
A transition system [11] is the process model from which the D2FD method builds a Fuzzy-DEVS model, as depicted by Fig. 3. In a previous work [22], we proposed a region-based approach integrated with some mathematical rules to transform the transition system into functions of the Fuzzy-DEVS model. The four functions in Fuzzy-DEVS (namely, the internal, external, output and time advance functions) are mapped onto fuzzy sets. Dependency Method is used for producing the fuzzy internal transition, fuzzy external transition and fuzzy output function; AFTC is used for obtaining fuzzy time advance function. To execute the Fuzzy-DEVS model, Possibility Measures and the final output of AFTC are applied. The final output of AFTC is inferred by the weighted average method from defuzzification methods.
In this paper, we propose an improved region-based approach. Let TS = (ST, A, T) be a transition system and R ⊆ ST be a subset of states. Pa is a period time for each activity a ∈ A. R is a region if for each activity a ∈ A one of the following conditions holds: All transition All transition All transition For all the transitions a1 ∈ T1, a2 ∈ T2, …, an ∈ Tn enter R, Pa1 ≈ Pa2 ≈ … ≈ Pan.
Let pa be the private activity and ua be the public activity. According to Fuzzy-DEVS formalism in section 3.3, the transformation follows the rules:
Where the state of Fuzzy-DEVS atomic model s ∈ S.
Where the input value x ∈ X and the output value y ∈ Y.
Where s0 is the initial state, TF is the result coming from AFTC,
Where s1 ∈ R1 and s2 ∈ R2, μint is the result coming from Dependency Method in Section 4.2.1.
Where the elapsed time e: 0 ≤ e
Figure 6 shows how the transition system (upper level of the figure) of the toy case results in its corresponding Fuzzy-DEVS atomic model (lower level of the figure). As we know, {A, C, D, E, F, G, J} are public activities and {H, I} are private activities. The state sets are split into regions, based on improved region-based approach, and states are converted according to Equation (1). Public activities can be input events or output events, as suggested by Equation (2). Each state contains a unique time life function, as defined by Equation (3). Internal transitions are converted in Equation (4), and output function is defined in on Equation (5). For example, after G expired, S2 transits to S4 and sends event F to port 1. External transitions are converted according to Equation (6). For example, as activity H is private, transition from S1 to S4 is an external transition, triggered by the receipt of C on port 2.
Dependency Method in the heuristic mining [4] is proposed in order to get frequency of events directly from event data. This method helps to generalize internal transition, external transition and output function into fuzzy sets. The first step is to calculate the frequency of every transition from event logs. Then we use Equation (8) to calculate the possibility of every transition.
Possibility Measures [23] can be recognized as one point of view on a fuzzy set. The notion of a fuzzy set corresponds to the need to model an imprecision in knowledge, a gradual transition between close categories, hence the use of membership function. Zadeh [6], Dubois and Prade [23] propose a junction between fuzzy set and possibility theory to represent imprecise possibilities. Possibility Measures is defined as:
The sets A and B in the Possibility Measures can be disjoint. It shows that when concerning about the disjunctions of the events, we choose the maximum value of the event as the possibility.
In Equation (8), “μ” and “F” respectively defines the possibility and the frequency of a transition from one state to another state respectively. “⟶” means internal or external transition between two states, while “i” and “j” are state numbers.
In the toy case, we can calculate frequencies as follows: F(s0⟶s1) = 28, F(s1⟶s2) = 15, F(s1⟶s3) = 10, F(s1⟶s4) = 3, F(s2⟶s4) = 15, F(s3⟶s4) = 10, F(s4⟶s5) = 28. Based on Equation (8) we can calculate the possibility: μint (s0⟶s1) = 0.97, μint (s1⟶s2) = 0.94, μint (s1⟶s3) = 0.91, μext (s1⟶s4) = 0.75, μint (s2⟶s4) = 0.94, μint (s3⟶s4) = 0.91, μext (s4⟶s5) = 0.97.
Compared with possibility, probability measures based on the occurrence of events can be defined as:
The sets A and B in the probability measures are disjoint. It shows that the probability of an event is the percentage of the possibility from all the events, and the sum of the probability of all the events is equal to 1. Compared to probability, possibility is more flexible.
The possibility of the output function is designed to be equal to the possibility of the internal transition. In Fig. 6, state s1 has two internal transitions with the corresponding possibility of 0.94 and 0.91. According to Equation (8), the internal transition s1⟶s2 is selected. For the result of the toy case, when disregarding the external events from the customer model, the process is s0⟶s1⟶s2⟶s4 with the corresponding output function {E, G}. This result evaluates the first goal of the toy case (as expressed in Section 4.1.1). When considering external events from the customer model, the process may be s0⟶s1⟶s4 with no output function. This result evaluates the second goal of toy case.
AFTC is developed from fuzzy discrete event controller system (FDECS) [24]. The structure of AFTC is shown in Fig. 7. From the event logs, every event has a start and an end time. Hence, a multi-set of durations can be derived. The remaining time is calculated from the start of the event to the end of the case. The reason of choosing remaining time as the control to activate the specific fuzzy rule in the AFTC is that the remaining lifetime can be used to get sample measurements for predictions.

The structure of AFTC.
The inputs of time duration and remaining time are converted into linguistic variables through fuzzifier. The fuzzifier compares the inputs crisp values with certain levels and generates linguistic values of each input variable for inference kernel connected with knowledge base. The knowledge base includes two parts: membership function, which defines the relations between linguistic variables and time variables; rule base, which characterizes the control of remaining time with a set of linguistic control rules. The inference kernel allows human decision to integrate with fuzzy concepts, membership function and inference rules. The defuzzifier converts the fuzzy sets into crisp value. There are two defuzzifiers in this system: time duration and time speed. Five fuzzy time are defuzzified into five crisp time. Five fuzzy speeds are defuzzified into one crisp speed. The defuzzifier is based on the weighted average method as illustrated in Equation (10). Speed control interprets the crisp speed value and activates one of the crisp time values.
The structure in Fig. 7 is designed for two input variables. Time duration is calculated by subtraction of finish time and start time. Remaining time is calculated by subtraction of finish time of last event and current event. In Table 1 of the toy case, the time duration of X1 is ET1 minus ST1 in the first case. The remaining time of X1 is ET2 minus ET1. We propose the membership functions for the time duration and remaining time as shown in Tables 3 and 4. The possibility is calculated accordingly.
Membership functions of input fuzzy time duration
Membership functions of input fuzzy remaining time
The inference kernel divides the input fuzzy values into two groups. Fuzzy time sets are classified as
Illustration of rules applied for time selection
ProM is used to implement the D2FD method. ProM is an open-source framework for collecting tools and applications of process mining [4]. Plugins can be defined to extend it.
A new plugin called “Convert to Fuzzy-DEVS using Regions” is designed to extend ProM. This plugin is synchronized on the server of the process mining group [25]. In this plugin, two objects are loaded in the input. One is the event log based on XES standard and the other one is the transition system. The output side is the Fuzzy-DEVS model.
The simulation engine we used to simulate the Fuzzy-DEVS atomic model is SimStudio [26]. The SimStudio environment is based on a DEVS metamodel that offers a Model abstract class, from which derive an Atomic Model abstract class and a Coupled Model abstract class. The models of user must derive from these sub-classes and override the abstract methods. These models are then executed by predefined engines (simulators for atomic models, and coordinators for coupled models, with a root coordinator as the central manager of the simulation time).
We use only atomic models in SimStudio, as the standard DEVS simulation protocol (as implemented in SimStudio) differs from the one of Fuzzy-DEVS when it comes to coupled models.
Case study
The case study is conducted on real event data collected from an employee insurance agency in the Northlands [27]. From the description, the agency is interested in insight and recommendations of event data and two main goals can be captured: (1) how the channels are being used; and (2) when are customers moving from one contact channel to the next.
The two interesting documents are “Question.csv” and “Werkmap-message.csv”. From “Question.csv”, we construct the SES structure shown in Fig. 8. From “Werkmap-message.csv”, we build the SES structure shown in Fig. 9. All the words in the figures are translated from Dutch language to English language. In Fig. 8, WN represents the Netherlands agency and it has several departments as aspects. The branch of “Internet Helpdesk” is analyzed as the most interesting part. All the activities of events inside “Internet Helpdesk” are listed as aspects without children activities and they are all public activities. In Fig. 9, all the events are related to “Internet Helpdesk”. If we look at four activities (“Workbook: general”, “Workbook: application”, “Workbook: taken”, “Workbook: disturbance”) which have similar activities in Fig. 8, their children activities, which are the variables “Channel” between 1 and 2, are identified as private activities.

The SES structure from “Question.csv”.

The SES structure from “Werkmap-message.csv”.
The next step is to select process instance. “Question.csv” and “Werkmap-message.csv” are selected as start and end document. The interesting level in Fig. 8 is the affair aspect and the interesting level in Fig. 9 relates to channel variables. Moreover, we add “Werkmap” from the department of “WW” and delete “Register and login”, “CV”, “Extra services” which are useless. So the final selected activities in Fig. 8 are: “Registration general”, “Registration disturbance”, “Other general”, “Other disturbance”, “Application benefits: general”, “Application benefits: disturbance”, “Workbook: general”, “Workbook: application”, “Workbook: taken”, “Workbook: disturbance”, “Workbook”. The final selected activities in Fig. 9 are: “Channel 1”, “Channel 2”.
When selecting the final activities, the plugin “Convert CSV to XES” is applied to convert into event logs. The process of mapping is depicted in Fig. 10. “Customer ID” is converted to trace. “ContactTimeStart” is converted to start timestamp and “ContactTimeEnd” is converted to end timestamp. The interesting level is found in the attributes of the file called “QuestionSubtheme” and it is transformed into the name of concept in event logs. At last, we get two XES files, i.e., “Question.xes” and “Werkmap.xes”. These two XES files are analyzed one by one through the plugin “Mine Transition System” to construct two corresponding transition system models. Then through the designed plugin “Convert to Fuzzy-DEVS using Regions”, two corresponding Fuzzy-DEVS atomic model are generated.

Mapping between CSV file and XES file.
Figure 11 presents the first Fuzzy-DEVS atomic model generated from “Question.xes”. Figure 12 shows the corresponding scheme, according to simulation results. Similarly, the second Fuzzy-DEVS atomic model is generated from “Werkmap.xes” and presented in Fig. 13. The first model is like a generator which is consistently sending outputs. The second model is like a processor which is waiting for events. As a result, we consider having one port, called “wm”, to connect the two models.

Fuzzy-DEVS atomic model generated from Question file.

Represented scheme from Fig. 11.
In Fig. 12, as all the activities are the public activities in SES structure, all the transitions are converted into the internal transitions defined as the combination of “wm”, “!” and the output event, represented as classical arrow. Behind the graphical notation, the possibility is added. The state represented by the circle. Every state has a unique identity number. The initial state is converted into the state with label of 1. The output event of the initial state is “[]”. The business process starts from the initial state and continues the transitions automatically until it reaches the desired state.
In Fig. 13, all the transitions are converted into the external transitions defined as the combination of “wm”, “?” and input event, represented as diamond arrow. The initial state is labeled as 1. Every external transition is related to a possibility at the end of the graphical notation. As all the activities are private activities, all the transition are external transition and all the states are set by the infinite time. Here we only get “Werkmap message” (Workbook message in English) instead of four public activities. It is extracted from the parents of variables in “Werkmap.xes”. A major issue is the incompleteness of information in “Werkmap.xes”. The participation of business people is required to get more precise information.

Fuzzy-DEVS atomic model generated from Werkmap file.
Each state of Fig. 11 with a leaving internal transition is given a time life function. This time life function is calculated by AFTC. Figure 14 presents one part of the results of the time duration. The initial state is set as the time of 0. This state will immediately go to the next state. In the second state “[Uitkering aanvragen: Verstoring]”, time duration and remaining time are identified as inputs. According to the membership function in Tables 3 and 4, we get the possibility of VS, S, M, B, VB, VL, L, A, H, VL. We use the weighted average method in Equation (10) to get the speed “very fast” from remaining time. Then we put this speed in the illustration of rules in Table 5. The final time T1 = 1122.3 seconds. The same calculation happens to the following states.

Part of results from AFTC.
The SimStudio simulation results are shown in Fig. 15. The numbers displayed relate to the time (converted here into minutes). Every state has several internal transitions. The execution of these internal transition is based Possibility Measures. The initial state is set as 1 minute. The output event “[]” is sent to the port “wm” as the time series of 1. Then the internal transition “[] & [Werkmap]” is triggered with the maximum possibility 0.9995915. According to the final time of the state, which is 2397.69 seconds (i.e., almost 39 minutes), the output event “[Werkmap]” is sent to the port “wm” at time 40. Later, the internal transition “[Werkmap] & [Uitkering aanvragen: Verstoring]” is triggered. The output event “[Uitkering aanvragen: Verstoring]” is sent to the port “wm” at the time series of 58.

Part of simulation results from Question document by SimStudio.
This paper presents the D2FD method, an integrated approach to the discovery of discrete event simulation model from real data. This method provides a solution for system inference in System Theory and enhances process discovery in process mining. TheSES framework is used to build a modular and hierarchical abstraction from the data collected, in order to structure the event log that will be extracted. Process mining is then used to generate a transition system, and an improved region-based approach is used to generate a Fuzzy-DEVS model from this transition system. The Dependency Method is used to extract the frequency of events from event logs, and the AFTC is used to extract the timing aspects. These methods expand rough approximations into fuzzy environment and solve issue of imprecise. The D2FD method is implemented on ProM which is practical, visible, automatic and available [25]. The resulting model is simulated by using SimStudio. The D2FD method makes it possible to extract simulation knowledge from the traces of a complex system, and to reveal an optimal business process.
However, this method still needs improvements. Two perspectives to this work are envisioned. First, we anticipate constructing structured and meaningful (therefore coupled) model for business simulation. Coupling mechanisms are needed. Their corresponding simulation protocol can be implemented in the simulation environment. The automated discovery of Fuzzy-DEVS coupled models means an enrichment of the D2FD method, so that the coupling knowledge is carried in the ontology. Secondly, the validation of the discovered model remains a challenge. It needs the participation of domain experts. For example, interviews held between process mining users and companies can help to check whether part of the process model or business process need to be improved.
