- Business Process Modeling and Analysis
- Service-Oriented Architecture and Web Services
- Petri Nets in System Modeling
- Semantic Web and Ontologies
- Topic Modeling
- Recommender Systems and Techniques
- Advanced Graph Neural Networks
- Data Quality and Management
- Advanced Text Analysis Techniques
- Software System Performance and Reliability
- Face and Expression Recognition
- Sentiment Analysis and Opinion Mining
- Advanced Algorithms and Applications
- Traffic Prediction and Management Techniques
- Text and Document Classification Technologies
- Advanced Image and Video Retrieval Techniques
- Human Mobility and Location-Based Analysis
- Manufacturing Process and Optimization
- Intelligent Tutoring Systems and Adaptive Learning
- Advanced Sensor and Control Systems
- Online Learning and Analytics
- Graph Theory and Algorithms
- Software Engineering Techniques and Practices
- Energy Efficient Wireless Sensor Networks
- Data Management and Algorithms
Beijing Obstetrics and Gynecology Hospital
2025
Capital Medical University
2025
Shandong University of Science and Technology
2015-2024
Hubei University of Technology
2023-2024
Shandong University of Technology
2020
Dongfeng Motor Group (China)
2015
China Aerospace Science and Industry Corporation (China)
2015
Shanghai Jiao Tong University
2007-2008
Zen-Noh (Japan)
2004-2006
Compared with traditional Internet of Vehicles (IoV) in highways or suburban areas, maintaining network connectivity and stability is an important challenge for IoV urban scene, which has complex road conditions. Most existing studies focus on probability whole analysis. They analyze end-to-end under a certain node distribution model, reveal the relationship between density. their results are not applicable to scene. This work presents concept backbone net called IoVB-net short, realize...
More and more business requirements are crossing organizational boundaries. There comes the cross-organization process management, its modeling is a complicated task. Mining aims to discover model from set of distributed event logs. Unfortunately, traditional mining approaches totally neglect privacy-preservation issue, which means privacy both log model. In this paper, framework proposed handle issues. It includes three steps: (1) each organization discovers private public models logs; (2)...
Time and resource management optimization are two important challenges for an emergency response process, by which all individuals groups manage hazards in effort to avoid or ameliorate the impact of disasters. Compared with a traditional business process has its own features. To our best knowledge, there is no formal method model analyze processes taking uncertain activity execution duration, quantity, preparation duration into account. This paper presents such based on E-Net that Petri...
Recently, cross-department business processes are becoming more and complex. Different kinds of coordination patterns exist among different departments, which make modeling analysis work difficult. To our best knowledge, there is no formal method to give systematic verification for the when considering departments. This paper proposes such a based on Petri nets. The WF-net model extended with resource message factors, RM_WF_Net short, first introduced. Then, tasks proposed its relations...
Accurately estimated data transmission ability is important in operating a vehicular ad-hoc network (VANET), which has limited bandwidth and highly dynamic typology. The mobility behavior of traditional wireless networks different from VANET's, existing results on the former are not applicable to VANET directly. Most studies capacity estimation focus asymptotic descriptions. In them, messages sent received by vehicle nodes composed packets, can move along roads only. this paper, modeling...
Wireless cellular traffic prediction is a critical issue for researchers and practitioners in the 5G/B5G field. However, it very challenging since wireless usually show high nonlinearities complex patterns. Most existing methods, lacking abilities of modeling dynamic spatial-temporal correlations data, thus cannot yield satisfactory results. To improve accuracy network prediction, more cross-domain data was considered, cross-service regional fusion transfer learning strategy...
Endometriosis is a common gynecological disorder, with rising incidence rates and decreasing age of onset, significantly affecting patients' quality life overall health. Urinary tract endometriosis (UTE) rare invasive form that often leads to urinary obstruction can even result in renal failure. The clinical significance diagnosing treating UTE increasingly recognized. However, there currently lack systematic bibliometric analysis provide an overview this field. purpose study comprehensively...
When an emergency occurs, one of the important challenges is how to form effective and timely response. An disposal plan usually organized as a series response processes manipulated by command center several subordinate organizations. Moreover, these organizations are geographically dispersed need collaborate with each other. In this case, designing verifying such cross-organizational collaborative complicated time-consuming. To address problem, we propose hierarchical modeling correctness...
A group of geographically dispersed and logically collaborated emergency organizations are involved when occurs. Two challenging issues a reasonable resource allocation mechanism an efficient conflict checking resolution control to ensure the conflict-free execution global cross-organization response processes. To address them, this paper proposes approach support management including both intraorganization private public management. The former has been fully discussed in our previous work...
Workflow management technology has become a key means to improve enterprise productivity. More and more workflow systems are crossing organizational boundaries may involve multiple interacting organizations. This article focuses on type of loosely coupled architecture with collaborative tasks, i.e., each business partner owns its private process is able operate independently, all involved organizations need be synchronized at certain point complete public tasks. Because organization's...
Business process similarity measures are of vital importance for repository management applications, such as query, recommendation, and clustering. Most existing approaches measure by relying on control-flow structures only. This article investigates the role data in measure. To incorporate data-flow information into business control flow, it proposes a data-aware workflow net (DWF-net) extending classical with reading writing semantics. Then, we introduce three types measures, i.e., item...
Correctness of an emergency response process specification is critical to mission success. Therefore, errors in the should be detected and corrected at build-time. In this paper, we propose a resource conflict detection approach removal strategy for processes constrained by resources time. kind process, there are two timing functions representing minimum maximum execution time each activity, respectively, many activities require executed. Based on RT_ERP_Net, earliest start activity ideal...
Conceptual modeling, which includes both control-flow and data-flow has posed great challenges for conventional business process management systems. To support systematic modeling analysis, in this paper, we propose a novel effective Petri net-based approach. We first introduce new type of net, called WFIO-net, the firing rule is formally defined by extending classical net with read write semantics, to model information. Then, discuss about three possible errors over i.e., missing, redundant...
Summary Modern information systems are continuously collecting and storing large volumes of business process event logs. The analysis logs can provide valuable insights for re‐engineering enhancement. Process discovery, as one the most challenging log techniques, aims to discover a model from an log. Many discovery approaches have been proposed in past two decades, however, them suffer efficiency problem when dealing with large‐scale Motivated by PageRank , we propose LogRank graph‐based...
Discovering valuable learning path patterns from learner online data can provide follow-up learners with effective reference and improve their experience effects. In this paper, a personalized recommendation method based on weak concept mining is proposed. Firstly, according to the degree of mastery historical learners, maps different types are generated by clustering association rule algorithms. A set paths then automatically through topological sorting algorithm. Secondly, long short-term...
Compared with two-dimensional wireless sensor networks (2DWSNs), three-dimensional (3DWSNs) have higher node energy consumption and weaker load balancing. To alleviate these problems, we propose a new multi-hop routing clustering protocol for wide range of 3DWSNs. In terms clustering, nodes will run cluster head (CH) by timing broadcast based on their remaining average distance from surrounding nodes. Two identity are added between the CH member nodes, transfer responsible transferring CH,...
Today's information systems of enterprises are incredibly complex and typically composed a large number participants. Running logs valuable source about the actual execution distributed systems. In this paper, top-down process mining approach is proposed to construct structural model for workflow from its multi-source heterogeneous collected environment. The discovered top-level represented by an extended Petri net with abstract transitions while obtained bottom-level models using classical...
Visual Simultaneous Localization and Mapping (VSLAM) estimates the robot’s pose in three-dimensional space by analyzing depth variations of inter-frame feature points. Inter-frame point mismatches can lead to tracking failure, impacting accuracy mobile self-localization mapping. This paper proposes a method for removing image features dynamic scenes visual SLAM. First, Grid-based Motion Statistics (GMS) was introduced fast coarse screening mismatched features. Second, an Adaptive Error...
This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433.