Hua Duan

ORCID: 0000-0002-0947-2704
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Petri Nets in System Modeling
  • Semantic Web and Ontologies
  • Topic Modeling
  • Recommender Systems and Techniques
  • Advanced Graph Neural Networks
  • Data Quality and Management
  • Advanced Text Analysis Techniques
  • Software System Performance and Reliability
  • Face and Expression Recognition
  • Sentiment Analysis and Opinion Mining
  • Advanced Algorithms and Applications
  • Traffic Prediction and Management Techniques
  • Text and Document Classification Technologies
  • Advanced Image and Video Retrieval Techniques
  • Human Mobility and Location-Based Analysis
  • Manufacturing Process and Optimization
  • Intelligent Tutoring Systems and Adaptive Learning
  • Advanced Sensor and Control Systems
  • Online Learning and Analytics
  • Graph Theory and Algorithms
  • Software Engineering Techniques and Practices
  • Energy Efficient Wireless Sensor Networks
  • Data Management and Algorithms

Beijing Obstetrics and Gynecology Hospital
2025

Capital Medical University
2025

Shandong University of Science and Technology
2015-2024

Hubei University of Technology
2023-2024

Shandong University of Technology
2020

Dongfeng Motor Group (China)
2015

China Aerospace Science and Industry Corporation (China)
2015

Shanghai Jiao Tong University
2007-2008

Zen-Noh (Japan)
2004-2006

Compared with traditional Internet of Vehicles (IoV) in highways or suburban areas, maintaining network connectivity and stability is an important challenge for IoV urban scene, which has complex road conditions. Most existing studies focus on probability whole analysis. They analyze end-to-end under a certain node distribution model, reveal the relationship between density. their results are not applicable to scene. This work presents concept backbone net called IoVB-net short, realize...

10.1109/tvt.2020.2970553 article EN IEEE Transactions on Vehicular Technology 2020-01-30

More and more business requirements are crossing organizational boundaries. There comes the cross-organization process management, its modeling is a complicated task. Mining aims to discover model from set of distributed event logs. Unfortunately, traditional mining approaches totally neglect privacy-preservation issue, which means privacy both log model. In this paper, framework proposed handle issues. It includes three steps: (1) each organization discovers private public models logs; (2)...

10.1109/tsc.2016.2617331 article EN IEEE Transactions on Services Computing 2016-10-13

Time and resource management optimization are two important challenges for an emergency response process, by which all individuals groups manage hazards in effort to avoid or ameliorate the impact of disasters. Compared with a traditional business process has its own features. To our best knowledge, there is no formal method model analyze processes taking uncertain activity execution duration, quantity, preparation duration into account. This paper presents such based on E-Net that Petri...

10.1109/tsmc.2014.2330555 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2014-07-10

Recently, cross-department business processes are becoming more and complex. Different kinds of coordination patterns exist among different departments, which make modeling analysis work difficult. To our best knowledge, there is no formal method to give systematic verification for the when considering departments. This paper proposes such a based on Petri nets. The WF-net model extended with resource message factors, RM_WF_Net short, first introduced. Then, tasks proposed its relations...

10.1109/tsmc.2014.2334276 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2014-07-17

Accurately estimated data transmission ability is important in operating a vehicular ad-hoc network (VANET), which has limited bandwidth and highly dynamic typology. The mobility behavior of traditional wireless networks different from VANET's, existing results on the former are not applicable to VANET directly. Most studies capacity estimation focus asymptotic descriptions. In them, messages sent received by vehicle nodes composed packets, can move along roads only. this paper, modeling...

10.1109/tits.2019.2921074 article EN publisher-specific-oa IEEE Transactions on Intelligent Transportation Systems 2019-06-18

Wireless cellular traffic prediction is a critical issue for researchers and practitioners in the 5G/B5G field. However, it very challenging since wireless usually show high nonlinearities complex patterns. Most existing methods, lacking abilities of modeling dynamic spatial-temporal correlations data, thus cannot yield satisfactory results. To improve accuracy network prediction, more cross-domain data was considered, cross-service regional fusion transfer learning strategy...

10.1109/access.2020.3025210 article EN cc-by IEEE Access 2020-01-01

Endometriosis is a common gynecological disorder, with rising incidence rates and decreasing age of onset, significantly affecting patients' quality life overall health. Urinary tract endometriosis (UTE) rare invasive form that often leads to urinary obstruction can even result in renal failure. The clinical significance diagnosing treating UTE increasingly recognized. However, there currently lack systematic bibliometric analysis provide an overview this field. purpose study comprehensively...

10.21037/tau-24-546 article EN Translational Andrology and Urology 2025-01-01

When an emergency occurs, one of the important challenges is how to form effective and timely response. An disposal plan usually organized as a series response processes manipulated by command center several subordinate organizations. Moreover, these organizations are geographically dispersed need collaborate with each other. In this case, designing verifying such cross-organizational collaborative complicated time-consuming. To address problem, we propose hierarchical modeling correctness...

10.1109/tsmc.2018.2838053 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2018-06-04

A group of geographically dispersed and logically collaborated emergency organizations are involved when occurs. Two challenging issues a reasonable resource allocation mechanism an efficient conflict checking resolution control to ensure the conflict-free execution global cross-organization response processes. To address them, this paper proposes approach support management including both intraorganization private public management. The former has been fully discussed in our previous work...

10.1109/tsmc.2019.2906335 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2019-05-02

Workflow management technology has become a key means to improve enterprise productivity. More and more workflow systems are crossing organizational boundaries may involve multiple interacting organizations. This article focuses on type of loosely coupled architecture with collaborative tasks, i.e., each business partner owns its private process is able operate independently, all involved organizations need be synchronized at certain point complete public tasks. Because organization's...

10.1109/tase.2020.2993376 article EN IEEE Transactions on Automation Science and Engineering 2020-06-04

Business process similarity measures are of vital importance for repository management applications, such as query, recommendation, and clustering. Most existing approaches measure by relying on control-flow structures only. This article investigates the role data in measure. To incorporate data-flow information into business control flow, it proposes a data-aware workflow net (DWF-net) extending classical with reading writing semantics. Then, we introduce three types measures, i.e., item...

10.1109/tase.2021.3049772 article EN IEEE Transactions on Automation Science and Engineering 2021-01-26

Correctness of an emergency response process specification is critical to mission success. Therefore, errors in the should be detected and corrected at build-time. In this paper, we propose a resource conflict detection approach removal strategy for processes constrained by resources time. kind process, there are two timing functions representing minimum maximum execution time each activity, respectively, many activities require executed. Based on RT_ERP_Net, earliest start activity ideal...

10.1080/17517575.2014.986215 article EN Enterprise Information Systems 2015-01-07

Conceptual modeling, which includes both control-flow and data-flow has posed great challenges for conventional business process management systems. To support systematic modeling analysis, in this paper, we propose a novel effective Petri net-based approach. We first introduce new type of net, called WFIO-net, the firing rule is formally defined by extending classical net with read write semantics, to model information. Then, discuss about three possible errors over i.e., missing, redundant...

10.1109/access.2020.2976124 article EN cc-by IEEE Access 2020-01-01

Summary Modern information systems are continuously collecting and storing large volumes of business process event logs. The analysis logs can provide valuable insights for re‐engineering enhancement. Process discovery, as one the most challenging log techniques, aims to discover a model from an log. Many discovery approaches have been proposed in past two decades, however, them suffer efficiency problem when dealing with large‐scale Motivated by PageRank , we propose LogRank graph‐based...

10.1002/cpe.5974 article EN Concurrency and Computation Practice and Experience 2020-10-02

Discovering valuable learning path patterns from learner online data can provide follow-up learners with effective reference and improve their experience effects. In this paper, a personalized recommendation method based on weak concept mining is proposed. Firstly, according to the degree of mastery historical learners, maps different types are generated by clustering association rule algorithms. A set paths then automatically through topological sorting algorithm. Secondly, long short-term...

10.1155/2022/2944268 article EN Mobile Information Systems 2022-05-14

Compared with two-dimensional wireless sensor networks (2DWSNs), three-dimensional (3DWSNs) have higher node energy consumption and weaker load balancing. To alleviate these problems, we propose a new multi-hop routing clustering protocol for wide range of 3DWSNs. In terms clustering, nodes will run cluster head (CH) by timing broadcast based on their remaining average distance from surrounding nodes. Two identity are added between the CH member nodes, transfer responsible transferring CH,...

10.1109/access.2020.2982691 article EN cc-by IEEE Access 2020-01-01

Today's information systems of enterprises are incredibly complex and typically composed a large number participants. Running logs valuable source about the actual execution distributed systems. In this paper, top-down process mining approach is proposed to construct structural model for workflow from its multi-source heterogeneous collected environment. The discovered top-level represented by an extended Petri net with abstract transitions while obtained bottom-level models using classical...

10.1109/access.2020.2984057 article EN cc-by IEEE Access 2020-01-01

Visual Simultaneous Localization and Mapping (VSLAM) estimates the robot’s pose in three-dimensional space by analyzing depth variations of inter-frame feature points. Inter-frame point mismatches can lead to tracking failure, impacting accuracy mobile self-localization mapping. This paper proposes a method for removing image features dynamic scenes visual SLAM. First, Grid-based Motion Statistics (GMS) was introduced fast coarse screening mismatched features. Second, an Adaptive Error...

10.3390/s24031007 article EN cc-by Sensors 2024-02-04

This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433.

10.3233/jifs-232189 article EN Journal of Intelligent & Fuzzy Systems 2024-02-16
Coming Soon ...