Qingtian Zeng

Qingtian Zeng
Shandong University of Science and Technology · Coolege of Information Science and Technology

Ph.D

About

145
Publications
17,022
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,401
Citations
Introduction
Skills and Expertise
Additional affiliations
October 2005 - September 2006
City University of Hong Kong
Position
  • Professor
October 2005 - March 2006
The University of Hong Kong
Position
  • SRA
September 2001 - April 2005
Chinese Academy of Sciences
Position
  • PhD Student

Publications

Publications (145)
Article
Full-text available
With the continuous development of the Internet of Vehicles(IoV), Vehicle Edge Computing(VEC) has become a key technology for computational resource scheduling, but more and more smart devices are connected to the internet, which makes it difficult for traditional Vehicle Edge Networks(VEN) to deal with tasks in time. In this paper, in order to cop...
Article
Full-text available
The immune ability of the elderly is not strong, and the functions of the body are in a stage of degeneration, the ability to clear PM2.5 is reduced, and the cardiopulmonary system is easily affected. Accurate prediction of PM2.5 can provide guidance for the travel of the elderly, thereby reducing the harm of PM2.5 to the elderly. In PM2.5 predicti...
Article
Business process time prediction aims to predict the time of the running process instance, including the elapsed time and the predicted remaining time. Existing time prediction methods rarely take the cycles of business process into consideration. However, cycles of business process are one of the main factors affecting the accuracy of time predict...
Article
Full-text available
Discovering valuable learning path patterns from learner online learning data can provide follow-up learners with effective learning path reference and improve their learning experience and learning effects. In this paper, a personalized learning path recommendation method based on weak concept mining is proposed. Firstly, according to the degree o...
Article
As a graphical knowledge representation and reasoning tool, fuzzy Petri net (FPN) is widely used in risk assessment, fault diagnosis and many other fields. It can express the complex causal relationships among events and make fuzzy reasoning about them. In practical applications, there may be synergy effects among events, i.e., the occurrence of ev...
Article
As an important task in business process management, remaining time prediction for business process instances has attracted extensive attentions. However, most of the traditional remaining time prediction approaches only take into account formal process models and cannot handle large-scale event logs in an effective manner. Although machine learnin...
Article
Business processes are critical for information systems to control workflows and deliver services. Although existing process discovery techniques can generate flat process models from business event logs, few of them have investigated the notion of hierarchy (i.e., subprocesses) yet. To fill the gap, this article first defines the concept of hierar...
Article
Domain terminologies are a basic resource for various natural language processing tasks. To automatically discover terminologies for a domain of interest, most traditional approaches mostly rely on a domain-specific corpus given in advance; thus, the performance of traditional approaches can only be guaranteed when collecting a high-quality domain-...
Article
Full-text available
Industrial parks are one of the main sources of air pollution; the ability to forecast PM2.5, the main pollutant in the industrial park, is of great significance to the health of the workers in the industrial park and environmental governance, which can improve the decision-making ability of environmental management. Most of the existing PM2.5 conc...
Article
Remaining time prediction of business processes plays an important role in resource scheduling and plan making. The structural features of single process instance and the concurrent running of multiple process instances are the main factors that affect the accuracy of the remaining time prediction. Existing prediction methods does not take full adv...
Article
Full-text available
With the gradual transformation of chemical industry park to digital and intelligent, various types of environmental data in the park are extremely rich. It has high application value to provide safe production environment by deeply mining environmental data law and providing data support for industrial safety and workers’ health in the park throug...
Article
Effective emergency resource allocation is essential to guarantee a successful emergency disposal, and it has become a research focus in the area of emergency management. Emergency event logs are accumulated in modern emergency management systems and can be analyzed to support effective resource allocation. This paper proposes a novel approach for...
Article
Owing the continuous enrichment of mobile application resources, mobile applications carry almost all user behaviors and preferences. The analysis of user behavior regarding mobile terminals has become an important research direction. The frequency with which users click on mobile applications reflects their preferences to a certain extent. In this...
Article
Cognitive model is playing very important role in predicting students’ performance and recommending learning resources. Thus, it has received a great deal of attention from researchers. However, most of the existing work design models from the aspect of students, ignoring the internal relation between problems and skills. To address this problem, w...
Article
Full-text available
Wireless cellular traffic prediction is a critical issue for researchers and practitioners in the 5G/B5G field. However, it is very challenging since the wireless cellular traffic usually shows high nonlinearities and complex patterns. Most existing wireless cellular traffic prediction methods lack the abilities of modeling the dynamic spatial–temp...
Article
Measuring text similarity is an important challenge for Chinese emergency response plans, which describe complex response processes involving four level responses and collaborative interactions among multiple departments and roles. Most existing studies focus on lexical semantic features and their results are not applicable to Chinese emergency res...
Article
Word embeddings have been successfully applied in many natural language processing tasks due to its their effectiveness. However, the state-of-the-art algorithms for learning word representations from large amounts of text documents ignore emotional information, which is a significant research problem that must be addressed. To solve the above prob...
Article
Business process similarity measures are of vital importance for process repository management applications, such as process query, process recommendation, and process clustering. Most existing approaches measure process similarity by relying on control-flow structures only. This article investigates the role of data in process similarity measure....
Article
Network embedding aims to learn the low-dimensional representations for the components in the network while maximally preserving the structure and inherent properties. Its efficiency has been proved in various real-world applications. However, most existing studies on attributed networks cannot explore both the multi-typed attributes and the semant...
Article
Full-text available
Research teams have been well recognized as the norm in modern scientific discovery. Rather than a loose collection of researchers, a well-performing research team is composed of a number of researchers, each of them playing a particular role (i.e., principal investigator, sub-investigator or research staff) for a short- or long-term effort. Role a...
Article
Full-text available
To support effective emergency disposal, organizations need to collaborate with each other to complete the emergency mission that cannot be handled by a single organization. In general, emergency disposal that involves multiple organizations is typically organized as a group of interactive processes, known as cross-organization emergency response p...
Article
Full-text available
Student performance prediction plays an important role in improving education quality. Noticing that students' exercise‐answering processes exhibit different characteristics according to their different performance levels, this paper aims to mine the performance‐related information from students' exercising logs and to explore the possibility of pr...
Chapter
Full-text available
Massive amounts of business process event logs are collected and stored by modern information systems. Numerous process discovery approaches have been proposed to extract descriptive process models from such event logs in the past decades. To improve process discovery efficiency, event log sampling techniques are proposed. A sample log is a delicat...
Article
Modern information systems are continuously collecting and storing large volumes of business process event logs. The analysis of event logs can provide valuable insights for business process re‐engineering and enhancement. Process discovery, as one of the most challenging event log analysis techniques, aims to discover a business process model from...
Article
Full-text available
Source code similarity detection has extensive applications in computer programming teaching and software intellectual property protection. In the teaching of computer programming courses, students may utilize some complex source code obfuscation techniques, e.g., opaque predicates, loop unrolling, and function inlining and outlining, to reduce the...
Article
Precise death risk prediction of ICU patients plays an important role in developing follow-up treatment options and reducing rescue cost. Previous work mainly relied on the vital signs of patients to predict the risk of death. In fact, patients’ treatment process also implies valuable information about patient’s condition. To use the treatment proc...
Article
Full-text available
Workflow management technology has become a key means to improve enterprise productivity. More and more workflow systems are crossing organizational boundaries and may involve multiple interacting organizations. This article focuses on a type of loosely coupled workflow architecture with collaborative tasks, i.e., each business partner owns its pri...
Article
Full-text available
A component-based software system is organized in terms of components, interfaces, and interactions among them. A component has one or more interfaces that each represents a clear function and interaction relationships with other components. Tremendous amounts of data are collected and recorded during the execution of software systems. This provide...
Article
Full-text available
An important issue in the mobile sink wireless sensor networks (MSWSNs) is sensor energy optimization. In order to alleviate the problem of unbalanced network load and high energy consumption in MSWSNs, we proposed a new data collection protocol in this paper: seamless clustering multi-hop routing protocol based on improved artificial bee colony al...
Chapter
This paper proposes a clustering routing protocol in wireless sensor networks, which combines non-uniform clustering and inter-cluster multi-hop routing denoted by Adaptive Unequal Clustering Routing Protocol (AUCR). In this protocol, the energy of the candidate cluster head is self-enhanced, and the surrounding node density and the average energy...
Chapter
Heterogeneous Integrated networks is an inevitable trend in the development of next-generation networks, in which a key issue that must be considered and addressed is how to enable any user to obtain QoS guaranteed services at any time and any place. In the heterogeneous integrated networks, we consider a heterogeneous network scenario with overlap...
Chapter
This paper mainly designs a vehicle positioning algorithm based on single base station, which can both consider the angle and distance between the vehicle and the base station. The known vehicle location environment is free of any occlusion. The propagation loss prediction model is used to measure the distance between the base station and the vehic...
Article
Full-text available
Today’s information systems of enterprises are incredibly complex and typically composed of a large number of participants. Running logs are a valuable source of information about the actual execution of the distributed information systems. In this paper, a top-down process mining approach is proposed to construct the structural model for a complex...
Article
Full-text available
Existing business process similarity measure methods mainly focus on the control-flow (e.g., the activity and process model). However, the active factors of business processes, i.e., the roles that execute activities and organizations to which activities belong, have yet received enough attention. Roles are the subject of activities, many changes o...
Article
Full-text available
Compared with two-dimensional wireless sensor networks (2DWSNs), three-dimensional wireless sensor networks (3DWSNs) have higher node energy consumption and weaker load balancing. To alleviate these problems, we propose a new multi-hop routing clustering protocol for a wide range of 3DWSNs. In terms of clustering, nodes will run for cluster head (C...
Article
Full-text available
Conceptual modeling, which includes both control-flow and data-flow modeling, has posed great challenges for conventional business process management systems. To support systematic data-flow modeling and analysis, in this paper, we propose a novel and effective Petri net-based approach. We first introduce a new type of Petri net, called WFIO-net, t...
Article
Compared with traditional Internet of Vehicles (IoV) in highways or suburban areas, maintaining network connectivity and stability is an important challenge for IoV in an urban scene, which has complex road conditions. Most existing studies focus on connectivity probability and whole network connectivity analysis. They analyze end-to-end connectivi...
Article
Full-text available
Textual descriptions of business process models are used as guidance for business executives. While it makes process models much easier to understand, missing procedural text is an important practical problem. In this paper, we propose a method of repairing missing procedural text based on business process model and text alignment. The proposed met...
Article
Full-text available
Emergency response plans are regarded as effective guidance for natural disasters and these plans describe emergency response processes in natural language. More specifically, they are textual process descriptions and describe not only how all departments perform their own response tasks, but also how different departments interact with each other....
Article
Full-text available
Wireless cellular traffic prediction is a critical issue for researchers and practitioners in the 5G/B5G field. However, it is very challenging since the wireless cellular traffic usually show high nonlinearities and complex patterns. Most existing wireless cellular traffic prediction methods, lacking abilities of modeling the dynamic spatial-tempo...
Article
Appropriate staffing of an emergency department (ED) is not only essential to the delivery of quality care to patients, but also critical to the profitability of the ED. Current practice of ED staffing is largely based on patient flow observation and the rule of thumb. This paper attempts to use stochastic timed Petri nets (STPN) to formally model...
Chapter
Most existing ordinal regression methods are adapted from traditional supervised learning algorithms (e.g., support vector machines and neural networks) which have shown to work well mostly on dense data. However, the use of existing ordinal regression methods on sparse data has received less scrutiny. This paper proposes to address the sparsity is...
Chapter
In this paper, we address the problem of research role discovery, especially for large research institutes where similar yet separated teams co-exist. The roles that researchers play in a research team, i.e., principal investigator, sub-investigator and research staff, typically exhibit an ordinal relationship. In order to better incorporate the or...
Chapter
This demo presents NativeHelper, a bilingual Chinese-English sentence search engine that aims to provide assistance for non-English academic writers. As opposed to most existing bilingual sentence search engines that rely heavily on parallel corpora, our system is built on monolingual sentence corpus and bilingual dictionaries which are more readil...
Article
With the development of computer science and technology, there is an urgent demand on integration of heterogeneous data focus on personalized information service. In this paper, we explore two aspects on the usage of the heterogeneous data stored in the form of XML, proposes a mapping-based sharing approach for heterogeneous data supporting user pe...
Article
In the October 2017 issue of the IEEE Transactions on Automation Science and Engineering [1] , there are several errors, reported and corrected as follows.
Article
Full-text available
Web services similarity measure is an important problem in service computing area, which is the technological foundation of service substitution, service discovery, service recommendation, etc. Most of existing works use static description of services to measure the similarity between two services. However, the interaction information of Web servic...
Article
A group of geographically dispersed and logically collaborated emergency organizations are involved when emergency occurs. Two challenging issues are a reasonable emergency resource allocation mechanism and an efficient resource conflict checking and resolution control mechanism to ensure the conflict-free execution of global cross-organization eme...
Article
The state-space explosion obstructs Petri nets for large-scale system analysis. Net unfolding techniques have drawn considerable attention to solve this problem. However, existing techniques are not suitable for deadlock detection of unbounded Petri nets. To address this issue, this paper presents a deadlock detection-oriented unfolding (D ² U) tec...
Article
This paper presented a joint resource allocation (RA) and admission control (AC) mechanism in software defined mobile networks (SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels....
Article
Learner community evolution analysis is an important technique in the area of social network analysis and education management. Accurately expressing the complex characteristics of individual social behavior is the core problem associated with analyzing learner community evolution. In this paper, we propose an approach to learner community evolutio...
Article
User similarity measure plays an important role in various location-based services including location prediction and recommendation. However, existing similarity computation methods fail to meet the distance metric axioms. In addition, existing works also suffer from some deficiency when identifying indoor stay regions and representing semantic inf...
Article
Full-text available
Process similarity measure plays an important role in business process management and is usually considered a versatile solution to fulfill the effective utilization of process models. Although many researches have worked on different notions of process similarity, most of them are not precise enough, as they simply compare processes with respect t...
Article
Full-text available
A large volume of research document are available online for us to access and analysis. It is very important to detect and mine the dynamics of the research topics from these large corpora. In this paper, we propose an improved method by introducing WordNet to LDA. This approach is to find latent topics of large corpora, and then we propose many me...
Article
Cross-department medical diagnosis processes typically involve several coordination patterns among different departments. In addition, medical task participants may come from different countries and use different languages, which makes diagnosis processes more difficult to be understood. In this paper, a multi-view and multi-language description ge...
Article
Full-text available
Emergency plans can be regarded as effective guidance of hazard emergency responses, and they include textual descriptions of emergency response processes in terms of natural language. In this paper, we propose an approach to automatically extract emergency response process models from Chinese emergency plans. First, the emergency plan is represent...
Conference Paper
Full-text available
The application of location-aware technology has increasingly accumulated a large amount of user spatiotemporal data, which gives us the opportunity to analyze users' interests and behavior patterns. This paper proposes a new method for constructing user's mobility profiles and measuring their similarity. First, a new method of using the categories...
Conference Paper
How to recommend appropriate papers to researchers based on their research interest has already attracted lots of attentions. A research interest model based on several historical behaviors is proposed. A reduction function is proposed to adjust the different influences of the behaviors, and then the user group with similar interests is created bas...