{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:33:35Z","timestamp":1770068015269,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1587\/transinf.2021edp7029","type":"journal-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T22:42:02Z","timestamp":1633041722000},"page":"1651-1660","source":"Crossref","is-referenced-by-count":6,"title":["Mining Emergency Event Logs to Support Resource Allocation"],"prefix":"10.1587","volume":"E104.D","author":[{"given":"Huiling","family":"LI","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology"}]},{"given":"Cong","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology"}]},{"given":"Qingtian","family":"ZENG","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology"}]},{"given":"Hua","family":"HE","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology"}]},{"given":"Chongguang","family":"REN","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology"}]},{"given":"Lei","family":"WANG","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology"}]},{"given":"Feng","family":"CHENG","sequence":"additional","affiliation":[{"name":"School of Mathematics, Southwest Jiaotong University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] C. Liu, H. Li, Q. Zeng, T. Lu, and C. Li, \u201cCross-organization emergency response process mining: An approach based on petri nets,\u201d Mathematical Problems in Engineering, pp.1-12, 2020. 10.1155\/2020\/8836007","DOI":"10.1155\/2020\/8836007"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] W. Van der Aalst, T. Weijters, and L. Maruster, \u201cWorkflow mining: Discovering process models from event logs,\u201d IEEE transactions on knowledge and data engineering, vol.16, no.9, pp.1128-1142, 2004. 10.1109\/tkde.2004.47","DOI":"10.1109\/TKDE.2004.47"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S.J.J. Leemans, D. Fahland, and W.M. van der Aalst, \u201cDiscovering block-structured process models from event logs-a constructive approach,\u201d International conference on applications and theory of Petri nets and concurrency, pp.311-329, Springer, 2013. 10.1007\/978-3-642-38697-8_17","DOI":"10.1007\/978-3-642-38697-8_17"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] Q. Li, Y. Deng, C. Liu, Q. Zeng, and Y. Lu, \u201cModeling and analysis of subway fire emergency response: An empirical study,\u201d Safety science, vol.84, pp.171-180, 2016. 10.1016\/j.ssci.2015.12.003","DOI":"10.1016\/j.ssci.2015.12.003"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] F. Lu, Q. Zeng, Y. Bao, and H. Duan, \u201cHierarchy modeling and formal verification of emergency treatment processes,\u201d IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.44, no.2, pp.220-234, 2013. 10.1109\/tsmc.2013.2242465","DOI":"10.1109\/TSMC.2013.2242465"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] H. Duan, C. Liu, Q. Zeng, and M. Zhou, \u201cRefinement-based hierarchical modeling and correctness verification of cross-organization collaborative emergency response processes,\u201d IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.50, no.8, pp.2548-2559, 2020. 10.1109\/tsmc.2018.2838053","DOI":"10.1109\/TSMC.2018.2838053"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] Q. Zeng, C. Liu, H. Duan, and M. Zhou, \u201cResource conflict checking and resolution controller design for cross-organization emergency response processes,\u201d IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.50, no.10, pp.3685-3700, 2019. 10.1109\/tsmc.2019.2906335","DOI":"10.1109\/TSMC.2019.2906335"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] H. Duan, C. Liu, Q. Zeng, and M. Zhou, \u201cA package reduction approach to modeling and analysis of cross-organization emergency response processes with privacy protected,\u201d IEEE Access, vol.6, pp.55573-55585, 2018. 10.1109\/access.2018.2868924","DOI":"10.1109\/ACCESS.2018.2868924"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] S.-S. Wang, Y. Wang, and J. Sun, \u201cAn optimized emergency resources allocation algorithm for large-scale public emergency,\u201d 2007 International Conference on Machine Learning and Cybernetics, pp.119-123, IEEE, 2007. 10.1109\/icmlc.2007.4370126","DOI":"10.1109\/ICMLC.2007.4370126"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] Y. Huang and Y. Fan, \u201cModeling uncertainties in emergency service resource allocation,\u201d Journal of infrastructure Systems, vol.17, no.1, pp.35-41, 2011. 10.1061\/(asce)is.1943-555x.0000040","DOI":"10.1061\/(ASCE)IS.1943-555X.0000040"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] R. Kondaveti and A. Ganz, \u201cDecision support system for resource allocation in disaster management,\u201d 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp.3425-3428, IEEE, 2009. 10.1109\/iembs.2009.5332498","DOI":"10.1109\/IEMBS.2009.5332498"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] A.Y. Chen and F. Pena-Mora, \u201cDecentralized approach considering spatial attributes for equipment utilization in civil engineering disaster response,\u201d Journal of computing in civil engineering, vol.25, no.6, pp.457-470, 2011. 10.1061\/(asce)cp.1943-5487.0000100","DOI":"10.1061\/(ASCE)CP.1943-5487.0000100"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] S. Wang, Y. Wang, and J. Sun, \u201cCompromised resources allocation model for emergency response,\u201d Third International Conference on Natural Computation (ICNC 2007), pp.446-450, IEEE, 2007. 10.1109\/icnc.2007.310","DOI":"10.1109\/ICNC.2007.310"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] J. Zhou and G. Reniers, \u201cPetri-net based modeling and queuing analysis for resource-oriented cooperation of emergency response actions,\u201d Process Safety and Environmental Protection, vol.102, pp.567-576, 2016. 10.1016\/j.psep.2016.05.013","DOI":"10.1016\/j.psep.2016.05.013"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] Y. Gao, C. Liu, Q. Zeng, and H. Duan, \u201cTwo effective strategies to support cross-organization emergency resource allocation optimization,\u201d Mobile Information Systems, vol.2021, 2021. 10.1155\/2021\/7965935","DOI":"10.1155\/2021\/7965935"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] J. Zhou and G. Reniers, \u201cSimulation analysis of the use of emergency resources during the emergency response to a major fire,\u201d Journal of Loss Prevention in the Process Industries, vol.44, pp.1-11, 2016. 10.1016\/j.jlp.2016.08.007","DOI":"10.1016\/j.jlp.2016.08.007"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] W. Van der Aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes, Springer Publishing Company, Incorporated, 2011.","DOI":"10.1007\/978-3-642-19345-3"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] C.W. G\u00fcnther and W.M.P. Van Der Aalst, \u201cFuzzy mining-adaptive process simplification based on multi-perspective metrics,\u201d International conference on business process management, vol.4714, pp.328-343, Springer, 2007. 10.1007\/978-3-540-75183-0_24","DOI":"10.1007\/978-3-540-75183-0_24"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] T. Liu, Y. Cheng, and Z. Ni, \u201cMining event logs to support workflow resource allocation,\u201d Knowledge-Based Systems, vol.35, pp.320-331, 2012. 10.1016\/j.knosys.2012.05.010","DOI":"10.1016\/j.knosys.2012.05.010"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] Z. He, Q. Wu, L. Wen, and G. Fu, \u201cA process mining approach to improve emergency rescue processes of fatal gas explosion accidents in chinese coal mines,\u201d Safety science, vol.111, pp.154-166, 2019. 10.1016\/j.ssci.2018.07.006","DOI":"10.1016\/j.ssci.2018.07.006"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] F. Dai, Q. Mo, Z. Qiang, B. Huang, W. Kou, and H. Yang, \u201cA choreography analysis approach for microservice composition in cyber-physical-social systems,\u201d IEEE Access, vol.8, pp.53215-53222, 2020. 10.1109\/access.2020.2980891","DOI":"10.1109\/ACCESS.2020.2980891"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] J. Cheng, C. Liu, M. Zhou, Q. Zeng, and A. Yl\u00e4-J\u00e4\u00e4ski, \u201cAutomatic composition of semantic web services based on fuzzy predicate Petri nets,\u201d IEEE Transactions on Automation Science and Engineering, vol.12, no.2, pp.680-689, 2014. 10.1109\/tase.2013.2293879","DOI":"10.1109\/TASE.2013.2293879"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] C. Liu, \u201cAutomatic discovery of behavioral models from software execution data,\u201d IEEE Transactions on Automation Science and Engineering, vol.15, no.4, pp.1-12, 2018. 10.1109\/tase.2018.2844725","DOI":"10.1109\/TASE.2018.2844725"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] T. Lu, C. Liu, H. Duan, and Q. Zeng, \u201cMining component-based software behavioral models using dynamic analysis,\u201d IEEE Access, vol.8, pp.68883-68894, 2020. 10.1109\/access.2020.2987108","DOI":"10.1109\/ACCESS.2020.2987108"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] C. Liu, \u201cDiscovery and quality evaluation of software component behavioral models,\u201d IEEE Transactions on Automation Science and Engineering, pp.1-12, 2020. 10.1109\/tase.2020.3008897","DOI":"10.1109\/TASE.2020.3008897"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] C. Liu, Q. Zeng, L. Cheng, H. Duan, M. Zhou, and J. Cheng, \u201cPrivacy-preserving behavioral correctness verification of cross-organizational workflow with task synchronization patterns,\u201d IEEE Transactions on Automation Science and Engineering, vol.18, no.3, pp.1037-1048, 2021. 10.1109\/tase.2020.2993376","DOI":"10.1109\/TASE.2020.2993376"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] C. Liu, H. Duan, Q. Zeng, M. Zhou, F. Lu, and J. Cheng, \u201cTowards comprehensive support for privacy preservation cross-organization business process mining,\u201d IEEE Transactions on Services Computing, vol.12, no.4, pp.639-653, 2019. 10.1109\/tsc.2016.2617331","DOI":"10.1109\/TSC.2016.2617331"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] C. Liu, Q. Zeng, H. Duan, M. Zhou, F. Lu, and J. Cheng, \u201cE-net modeling and analysis of emergency response processes constrained by resources and uncertain durations,\u201d IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.45, no.1, pp.84-96, 2014. 10.1109\/tsmc.2014.2330555","DOI":"10.1109\/TSMC.2014.2330555"},{"key":"29","unstructured":"[29] W. Reisig, Petri Nets: An Introduction, Springer Science &amp; Business Media, 2012."},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] Q. Zeng, S.X. Sun, H. Duan, C. Liu, and H. Wang, \u201cCross-organizational collaborative workflow mining from a multi-source log,\u201d Decision support systems, vol.54, no.3, pp.1280-1301, 2013. 10.1016\/j.dss.2012.12.001","DOI":"10.1016\/j.dss.2012.12.001"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] Q. Zeng, C. Liu, and H. Duan, \u201cResource conflict detection and removal strategy for nondeterministic emergency response processes using petri nets,\u201d Enterprise Information Systems, vol.10, no.7, pp.729-750, 2016. 10.1080\/17517575.2014.986215","DOI":"10.1080\/17517575.2014.986215"},{"key":"32","doi-asserted-by":"publisher","unstructured":"[32] Q. Zeng, H. Wang, D. Xu, H. Duan, and Y. Han, \u201cConflict detection and resolution for workflows constrained by resources and non-determined durations,\u201d Journal of Systems and Software, vol.81, no.9, pp.1491-1504, 2008. 10.1016\/j.jss.2007.09.004","DOI":"10.1016\/j.jss.2007.09.004"},{"key":"33","doi-asserted-by":"publisher","unstructured":"[33] C. Liu, Q. Zeng, L. Cheng, H. Duan, and J. Cheng, \u201cMeasuring similarity for data-aware business processes,\u201d IEEE Trans. Autom. Sci. Eng., 2021. DOI: 10.1109\/TASE.2021.3049772 10.1109\/TASE.2021.3049772","DOI":"10.1109\/TASE.2021.3049772"},{"key":"34","unstructured":"[34] C. Liu, \u201cFormal modeling and discovery of multi-instance business processes: A cloud resource management case study,\u201d IEEE\/CAA Journal of Automatica Sinica, online, pp.1-10, 2021."},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] C. Liu, \u201cQuantitative evaluation of software component behavior discovery approach,\u201d IEICE Trans. Inf. Syst., vol.E104-D, no.1, pp.117-120, 2021.","DOI":"10.1587\/transinf.2020MPL0001"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] C. Liu, Y. Pei, L. Cheng, Q. Zeng, and H. Duan, \u201cSampling business process event logs using graph-based ranking model,\u201d Concurrency and Computation: Practice and Experience, vol.33, no.5, pp.1-14, 2021.","DOI":"10.1002\/cpe.5974"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/10\/E104.D_2021EDP7029\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T07:30:35Z","timestamp":1633159835000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/10\/E104.D_2021EDP7029\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":36,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edp7029","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]},"article-number":"2021EDP7029"}}