2015 International Conference on Information, Communication Technology and System Decomposition Using Refined Process Structure Tree (RPST) and Control Flow Complexity Metrics Authors Indra Gita Anugrah 1) , Riyanarto Sarno 2) , Ratih Nur Esti Anggraini 3) 1, 2, 3) Department of Informatics, Faculty of Information Technology Institut Teknologi Sepuluh Nopember Surabaya e-mail : indra14@mhs.if.its.ac.id 1) , riyanarto@if.its.ac.id 2) , ratih_nea@if.its.ac.id 3) Abstract — Process mining is a technique that aims to gain knowledge of the event log. The amount of data in the event log is very influential in the Process mining, because it contains millions of activities that shape the behavior of a company. The three main capabilities possessed by mining process is a discovery, conformance, and enhancement. This paper, we present an approach to decompose business processes using Refine Process Structure Tree (RPST). By breaking down a whole into sub models Business Processes (fragments) to the smallest part (atomic) can facilitate the analysis process and can easily be rebuilt. To measure the level of complexity in the model fragment and atomic models we use complexity Control flow metrics. Control flow complexity metrics have two main approaches that are count based measurement and execution path based measurement path. Count based measurement used to describe a static character, while an execution path based measurement used to describe the dynamic character of each model fragment or atomic models (bond fragment). Keywords — Process mining; decompose business process; refined process structure tree; control flow complexity metrcs. I. INTRODUCTION Nowadays a variety of approaches to address the challenges involved in Business Process Management (BPM) is mostly done. By using the event log we could see the events in a business process. Event log contains records of events derived from the activities of a company from the implementation of an information system. Event logs can be used to look at the ability of the mining process. The first discovery is the formation of the actual model business processes by utilizing the data from the event logs. The second is the process of comparing the conformance of existing models in the event log with other business process model. Conformance checking can be used to check that there are real events in the event log. While the third enhancement is a process improvement models by studying the logs event data that has been generated by the system, where conformance checking measures the similarity between the model and reality [2]. Rapid data growth is causing problems in the mining process. Existing process mining techniques have problems in reading behavior on a large event log. One approach is by using the technique of decomposition, the decomposition process is a method used to break up a business model of the overall process into sub model called fragment. Decomposition approach can generally be made by combining the discovery process with the conformance checking process [4]. An idea to build reusable business process fragment with the decomposition of the overall business process models that have a complex structure fragment into a model that aims to be easy to understand, easy to maintain and quick process reuse. Fragments can be reused in accordance with the requirements of business processes as desired. Several approaches to decompose one business process using business process linear and not linear business process. In the linear process of decomposition is easily done using the activity element [8]. An atomic activity which has its own business goal is considered as business fragment. Furthermore, activities of succession that satisfy a specific business need can be regrouped and considered as business process fragments [9]. This paper will discuss the decomposition of a business process model into multiple models fragments consisting of the very small (atomic) called bond fragments using RPST were then analyzed using flow control complexity metrics to obtain fragments or variants most suitable bond fragment. In the second section will discuss the literature study, in section 3 will discuss the methods used and study cases, then section 4 is the conclusion of research and section 5 is the future work. II. LITERATURE REVIEW A. Petri Nets Petri net is a graphical tool as a formal description of a flow of activities in complex systems (using a logical representation of the block diagram or trees). Petri net represents a natural interaction logic between the parts or activity in a system. A situation that can be modeled with Petri Net is synchronization, sequentiality, concurrency and conflict. Classical Petri Net is a graph that connected with two types of nodes, called places and transitions. Each node is connected with arcs. Places represented by circles and transitions to a square [1]. 2015 International Conference on Information, Communication Technology and System (ICTS) 978-1-5090-0096-8/15/$31.00 © 2015 IEEE 203