The search functionality is under construction.

Author Search Result

[Author] Qingtian ZENG(3hit)

1-3hit
  • Towards Comprehensive Support for Business Process Behavior Similarity Measure

    Cong LIU  Qingtian ZENG  Hua DUAN  Shangce GAO  Chanhong ZHOU  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2018/12/05
      Vol:
    E102-D No:3
      Page(s):
    588-597

    Business process similarity measure is required by many applications, such as business process query, improvement, redesign, and etc. Many process behavior similarity measures have been proposed in the past two decades. However, to the best of our knowledge, most existing work only focuses on the direct causality transition relations and totally neglect the concurrent and transitive transition relations that are proved to be equally important when measuring process behavior similarity. In this paper, we take the weakness of existing process behavior similarity measures as a starting point, and propose a comprehensive approach to measure the business process behavior similarity based on the so-called Extended Transition Relation set, ETR-set for short. Essentially, the ETR-set is an ex-tended transition relation set containing direct causal transition relations, minimum concurrent transition relations and transitive causal transition relations. Based on the ETR-set, a novel process behavior similarity measure is defined. By constructing a concurrent reachability graph, our approach finds an effective technique to obtain the ETR-set. Finally, we evaluate our proposed approach in terms of its property analysis as well as conducting a group of control experiments.

  • Mining Emergency Event Logs to Support Resource Allocation

    Huiling LI  Cong LIU  Qingtian ZENG  Hua HE  Chongguang REN  Lei WANG  Feng CHENG  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2021/06/28
      Vol:
    E104-D No:10
      Page(s):
    1651-1660

    Effective emergency resource allocation is essential to guarantee a successful emergency disposal, and it has become a research focus in the area of emergency management. Emergency event logs are accumulated in modern emergency management systems and can be analyzed to support effective resource allocation. This paper proposes a novel approach for efficient emergency resource allocation by mining emergency event logs. More specifically, an emergency event log with various attributes, e.g., emergency task name, emergency resource type (reusable and consumable ones), required resource amount, and timestamps, is first formalized. Then, a novel algorithm is presented to discover emergency response process models, represented as an extension of Petri net with resource and time elements, from emergency event logs. Next, based on the discovered emergency response process models, the minimum resource requirements for both reusable and consumable resources are obtained, and two resource allocation strategies, i.e., the Shortest Execution Time (SET) strategy and the Least Resource Consumption (LRC) strategy, are proposed to support efficient emergency resource allocation decision-making. Finally, a chlorine tank explosion emergency case study is used to demonstrate the applicability and effectiveness of the proposed resource allocation approach.

  • A Two-Layered Framework for the Discovery of Software Behavior: A Case Study

    Cong LIU  Jianpeng ZHANG  Guangming LI  Shangce GAO  Qingtian ZENG  

     
    PAPER-Software Engineering

      Pubricized:
    2017/08/23
      Vol:
    E101-D No:8
      Page(s):
    2005-2014

    During the execution of software, tremendous amounts of data can be recorded. By exploiting the execution data, one can discover behavioral models to describe the actual software execution. As a well-known open-source process mining toolkit, ProM integrates quantities of process mining techniques and enjoys a variety of applications in a broad range of areas. How to develop a better ProM software, both from user experience and software performance perspective, are of vital importance. To achieve this goal, we need to investigate the real execution behavior of ProM which can provide useful insights on its usage and how it responds to user operations. This paper aims to propose an effective approach to solve this problem. To this end, we first instrument existing ProM framework to capture execution logs without changing its architecture. Then a two-layered framework is introduced to support accurate ProM behavior discovery by characterizing both user interaction behavior and plug-in calling behavior separately. Next, detailed discovery techniques to obtain user interaction behavior model and plug-in calling behavior model are proposed. All proposed approaches have been implemented.