Jian Wang

ORCID: 0000-0003-2779-1431
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Business Process Modeling and Analysis
  • Advanced Malware Detection Techniques
  • Service-Oriented Architecture and Web Services
  • Collaboration in agile enterprises
  • Network Security and Intrusion Detection
  • Digital and Cyber Forensics
  • Advanced Algorithms and Applications
  • Power Systems and Technologies
  • Corporate Taxation and Avoidance
  • Cell Image Analysis Techniques
  • Advanced Sensor and Control Systems
  • Advanced Data Compression Techniques
  • Cloud Computing and Remote Desktop Technologies
  • Fault Detection and Control Systems
  • Smart Grid and Power Systems
  • IoT-based Smart Home Systems
  • Non-Destructive Testing Techniques
  • Industrial Technology and Control Systems
  • Rough Sets and Fuzzy Logic
  • Industrial Vision Systems and Defect Detection
  • Anomaly Detection Techniques and Applications
  • Information Technology Governance and Strategy
  • Machine Fault Diagnosis Techniques
  • Reliability and Maintenance Optimization
  • Image and Signal Denoising Methods

Air Force Engineering University
2008-2024

Tongji University
2003-2020

Chinese University of Hong Kong
2013

Beijing Normal University
2011

Neijiang Normal University
2004

Surface quality is the most important index to improve overall of strip steel. In order implement fault location on hot-rolling line with surface defects steel, a tracing model based information fusion historical production cases and process data proposed. For cases, determines defect cause labels through text similarity calculation, fuzzy semantic inference used obtain probability distribution causes this basis; for data, uses L1 regularization method feature selection, XGBoost integration...

10.1109/access.2020.3024582 article EN cc-by IEEE Access 2020-01-01

Business process is the major factor of sustaining and improving enterprise's core competence. Along with development information technology marketing globalization, business shows characteristics temporariness dynamic, which requires agile changing. Traditional management (BPM) can not adapt this trend, therefore it reflects as rigidity. This article proposes knowledge-based flexible BPM, combines knowledge BPM. A BPM system architecture also established, supports whole lifecycle from...

10.1109/tencon.2006.343929 article EN 2006-01-01

The increasing volume and types of malwares bring a great threat to network security. malware binary detection with deep convolutional neural networks (CNNs) has been proved be an effective method. However, the existing classification methods based on CNNs are unsatisfactory this day because their poor extraction ability, insufficient accuracy classification, high cost time. To solve these problems, novel approach, namely, multiscale feature fusion (MFFCs), was proposed achieve visualization...

10.1155/2021/1070586 article EN cc-by Computational Intelligence and Neuroscience 2021-01-01

With the development of automated malware toolkits, cybersecurity faces evolving threats. Although visualization-based analysis has proven to be an effective method, existing approaches struggle with challenging samples due alterations in texture features binary images during visualization preprocessing stage, resulting poor performance. Furthermore, enhance classification accuracy, methods sacrifice prediction time by designing deeper neural network architectures. This paper proposes PAFE,...

10.1016/j.heliyon.2024.e35965 article EN cc-by-nc-nd Heliyon 2024-08-01

Diagnosis of engine fault is critical in reducing operating and maintenance costs which were paid more attention by many researchers. Due to the potential advantages be gained from proactive maintenance, monitoring machines health, assessing survival probability unit. Numerous methods have been developed based on intelligent systems. This paper concerns with prediction oil wear particle using regression relevance vector machine(RVM). It attempts overcome problems support machine (SVM) such...

10.1109/imsna.2013.6743445 article EN 2013-12-01

For enhancing the trustworthiness of business processes, a process definition method is given and kind dynamic semantics appointed to this definition. The expressed as finite state automata. According semantics, algorithms are proposed analyze processes.

10.1109/icebeg.2011.5886798 article EN 2011-05-01

The author analyses known details of a recent transfer pricing case involving an adjustment imposed with regard to business restructuring. Current OECD guidance and Chinese regulations are also considered. Suggestions provided for drafting restructuring regulations.

10.59403/26js0xp article EN International Transfer Pricing Journal 2013-08-22

Abstract This paper presents a method for predicting the remining useful life (RUL) of equipment by using multi-sensor monitoring data equipment. Firstly, performance degradation is evaluated based on maximum information coefficient. Then model built Wiener process with non-linear drift. The likelihood used to estimate parameters model, and probability density distribution RUL considering random failure threshold deduced. Finally, are updated improved particle filter, remaining predicted.

10.1088/1742-6596/1213/5/052005 article EN Journal of Physics Conference Series 2019-06-01

The evolution of network gives an impetus to development new manufacturing pattern such as Agile Manufacture. So the networking enterprise modeling system is also asked. Firstly we discuss current research on this field. Then a Networking Enterprise Modeling Infrastructure brought forward in paper. In infrastructure, which has no limit certain model architecture and adopts peer-to-peer mode, each distributed seen peer, but not client or server. It can join into group freely communicate with...

10.1109/wcica.2002.1022197 article EN 2003-06-25

Workflow and workflow management system (WFMS) are studied in this paper. modeling WFMS architecture considered as the two important aspects of application. Moreover paper put forward a model based on enterprise process modeling. The its application also discussed detail.

10.1109/wcica.2002.1022170 article EN 2003-06-25
Coming Soon ...