{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T06:47:32Z","timestamp":1773298052020,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902222"],"award-info":[{"award-number":["61902222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Development Fund of Shandong Province of China","award":["ZR2017MF027"],"award-info":[{"award-number":["ZR2017MF027"]}]},{"name":"Taishan Scholars Program of Shandong Province","award":["ts2090936"],"award-info":[{"award-number":["ts2090936"]}]},{"name":"Taishan Scholars Program of Shandong Province","award":["tsqn201909109"],"award-info":[{"award-number":["tsqn201909109"]}]},{"DOI":"10.13039\/501100013139","name":"Education Ministry Humanities and Social Science Project of China","doi-asserted-by":"publisher","award":["18YJAZH017"],"award-info":[{"award-number":["18YJAZH017"]}],"id":[{"id":"10.13039\/501100013139","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Support Plan of Youth Innovation Team of Shandong Higher School","award":["2019KJN024"],"award-info":[{"award-number":["2019KJN024"]}]},{"name":"SDUST Research Fund","award":["2015TDJH102"],"award-info":[{"award-number":["2015TDJH102"]}]},{"name":"Philosophy and Social Science Planning Project of Qingdao","award":["QDSKL1801141"],"award-info":[{"award-number":["QDSKL1801141"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2983114","type":"journal-article","created":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T22:31:36Z","timestamp":1585089096000},"page":"60918-60928","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Approach for Business Process Similarity Measure Based on Role Relation Network Mining"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6421-8223","authenticated-orcid":false,"given":"Qingtian","family":"Zeng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5695-6736","authenticated-orcid":false,"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9529-2242","authenticated-orcid":false,"given":"Changhong","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5999-2126","authenticated-orcid":false,"given":"Cong","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0947-2704","authenticated-orcid":false,"given":"Hua","family":"Duan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2007.93"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.07.002"},{"key":"ref31","first-page":"649","article-title":"A review on role identification methods in social networks","volume":"40","author":"zhang","year":"2017","journal-title":"Chin J Comput"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-008-0141-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03848-8_5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9005-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.12.015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45563-0_12"},{"key":"ref11","first-page":"343","article-title":"Similarity measurement for process models based on transition-labeled graph edit distance","volume":"22","author":"wang","year":"2016","journal-title":"Comput Integr Manuf Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2016.0256"},{"key":"ref13","first-page":"1793","article-title":"Business process similarity computing method based on process model structure and log behavior","volume":"24","author":"zhou","year":"2018","journal-title":"Comput Integr Manuf Syst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885819"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDP7127"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920677"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964312"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2677859"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911657"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LISS.2016.7854453"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3092694"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSIE.2009.992"},{"key":"ref3","first-page":"127","article-title":"The process model matching contest 2015","volume":"248","author":"antunes","year":"2015","journal-title":"ser GI-Edition - Lecture Notes in Informatics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194017500073"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2003.09.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.09.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2016.7507383"},{"key":"ref7","first-page":"1832","article-title":"Process model storage mechanism based on Petri net edit distance","volume":"19","author":"li","year":"2013","journal-title":"Comput Integr Manuf Syst"},{"key":"ref2","first-page":"2632","article-title":"Application of Process mining in process optimization","volume":"20","author":"weidong","year":"2014","journal-title":"Comput Integr Manuf Syst"},{"key":"ref9","first-page":"832","article-title":"A similarity measure for process models based on task occurrence relations","volume":"54","author":"song","year":"2017","journal-title":"J Comput Res Develop"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44895-0_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2598287"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911750"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2743113"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.12.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868924"},{"key":"ref26","first-page":"1916","article-title":"Process roles identification based on workflow logs mining","volume":"12","author":"zhao","year":"2006","journal-title":"Comput Integr Manuf Syst"},{"key":"ref25","first-page":"114","article-title":"An optimized role identification method","volume":"26","author":"fang","year":"2009","journal-title":"Applied Soft Computing"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09045985.pdf?arnumber=9045985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:16Z","timestamp":1642003036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9045985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2983114","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}