Jian Shen
YOU?
Author Swipe
View article: The Role of Nonrenewable Energy Efficiency, Renewable Energy Adoption, and Environmental Technologies in Mitigating Greenhouse Gas Emissions: A Comparative Analysis of the United States and China
The Role of Nonrenewable Energy Efficiency, Renewable Energy Adoption, and Environmental Technologies in Mitigating Greenhouse Gas Emissions: A Comparative Analysis of the United States and China Open
The United States and China are leading global contributors to greenhouse gas emissions. An important question arises: does enhancing the efficiency of nonrenewable energy sources or increasing the adoption of renewable energy in these cou…
View article: Wireless temperature calibration for medical centrifuge
Wireless temperature calibration for medical centrifuge Open
Based on the complexity and metrological requirements of temperature calibration within the rotor of a medical low-temperature centrifuge, a wireless temperature calibration device for medical centrifuges has been designed and developed. T…
View article: A Study on Characteristics Evaluation of Inernal Resistance of VRFB for ESS
A Study on Characteristics Evaluation of Inernal Resistance of VRFB for ESS Open
일반적으로, VRFB(vanadium redox-flow battery)는 20년 이상 반영구적으로 사용할 수 있고, 인체 유해성, 인화성, 화학반응성에 따른 위험도가 리튬이온배터리보다 낮아 안전성이 매우 뛰어나므로, 차세대의 ESS로 주목받고 있다. 하지만, VRFB는 배전계통에 연계되어 운용될 경우, 계통으로부터 위해요인들이 유입되어 VRFB 스택이 열화되고 내부 임피던스가 증가되어 출력성능과 수명이 저하될 가능성이 있다…
View article: Multi-objective Optimization Method of Manufacturing Carbon Emissions Based on Firefly Algorithm
Multi-objective Optimization Method of Manufacturing Carbon Emissions Based on Firefly Algorithm Open
The carbon emission optimization goal is easy to achieve local optima, which affects the optimization effect. Therefore, a multi-objective optimization method for manufacturing carbon emissions based on the firefly algorithm was designed. …
View article: ID-Based Ring Signature against Continual Side Channel Attack
ID-Based Ring Signature against Continual Side Channel Attack Open
The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility and complete a…
View article: Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks
Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks Open
Hierarchical and identity-based encryption (HIBE) is very valuable and widely used in many occasions. In the Internet of Things based on cloud services, efficient HIBE is likely to be applied to cloud service scenarios for the limited comp…
View article: SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs Open
Peer reviewed
View article: An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing
An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing Open
The advancement of 5G communication technology and Internet of Things (IoT) technology has promoted the rapid development of Mobile Edge Computing (MEC). In mobile edge, all IoT devices adopt wireless communication technology. Therefore, i…
View article: Effects of Five Shucking Methods on Efficiency and Quality of Oyster
Effects of Five Shucking Methods on Efficiency and Quality of Oyster Open
In order to explore the impact of different shucking methods on the efficiency and quality of oysters, five methods such as boiling, steaming, microwave, ultra-high pressure, and electric shock were used to open the oysters. The opening ra…
View article: Analysis on visual screening result of children aged 0-6 years old by using the SureSight automatic screening refractor in Binhu District, Wuxi City
Analysis on visual screening result of children aged 0-6 years old by using the SureSight automatic screening refractor in Binhu District, Wuxi City Open
AIM: To provide a scientific basis for the development of children's eye health measures in Binhu District of Wuxi City by understanding the visual development status of children aged 0-6 years old in the region.METHODS: A total of 3 695 c…
View article: PUF‐Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home
PUF‐Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home Open
Various IoT‐based applications such as smart home, intelligent medical, and VANETs have been put into practical utilization. The smart home is one of the most concerned environments, allowing users to access and control smart devices via t…
View article: Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems Open
Intelligent transportation systems (ITS) have always been an important application of Internet of Things (IoT). Today, big data and cloud computing have further promoted the construction and development of ITS. At the same time, the develo…
View article: A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare
A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare Open
With the development of the Internet of Things and the demand for telemedicine, the smart healthcare system has attracted much attention in recent years. As a platform for medical data interaction, the smart healthcare system is demanded t…
View article: An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities
An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities Open
Internet of Things devices are responsible for collecting and transmitting data in smart cities, assisting smart cities to release greater potential. As Internet of Things devices are increasingly connected to smart cities, security and pr…
View article: Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs
Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs Open
With the advanced development of the intelligent transportation system, vehicular ad hoc networks have been observed as an excellent technology for the development of intelligent traffic management in smart cities. Recently, researchers an…
View article: A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids Open
Internet of Things (IoT) has been introduced into smart grids, which has achieved great improvement. The statistics of power consumption is one of the important functions but could lead to the leakage of user daily behaviour. Researchers h…
View article: Privacy protection key distribution protocol for edge computing
Privacy protection key distribution protocol for edge computing Open
Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed. The proposed protocols are based on the concept of constrained pseudo-random function…
View article: An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System
An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System Open
In traditional transportation, each driver usually relies on their experience to determine an appropriate route, which may shorten the driving time and transport cost. However, this may also lead to a waste of time in traffic jams or due t…
View article: Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices Open
The renewable energy plays an increasingly important role in many fields such as lighting, automobile, and electric power. In order to make full use of the renewable energy, various smart Internet of Thing (IoT) devices are deployed. Howev…
View article: Faults analysis of lightning stroke-caused flashover in 220 kV double-circuit transmission lines on the same tower
Faults analysis of lightning stroke-caused flashover in 220 kV double-circuit transmission lines on the same tower Open
In this paper, four-phase simultaneous lightning stroke-caused faults have been analysed, which occurred in double-circuit transmission lines on the same tower. According to the fault patrol circumstance, lightning information data, fault …
View article: CODE for a data-driven model
CODE for a data-driven model Open
The archived code is to illustrate the framework of the data-driven model proposed in the article "A machine-learning-based model for water quality in coastal waters, taking dissolved oxygen and hypoxia in Chesapeake Bay as an example" sub…
View article: Application of Big Data Computing Model Based on Semantic Data Analysis Technology
Application of Big Data Computing Model Based on Semantic Data Analysis Technology Open
Big data computing model refers to various high-level abstract models extracted and established from the diverse big data computing problems and requirements according to big data‘s different data characteristics and computational characte…
View article: A Novel Structure-Based Data Sharing Scheme in Cloud Computing
A Novel Structure-Based Data Sharing Scheme in Cloud Computing Open
Cloud computing is a unlimited computing resource and storing resource, which provides a lot of convenient services, for example, Internet and education, intelligent transportation system. With the rapid development of cloud computing, mor…
View article: Stereo storage structure assisted one-way anonymous auditing protocol in e-health system
Stereo storage structure assisted one-way anonymous auditing protocol in e-health system Open
The Journal of Surveillance, Security and Safety is an international, peer-reviewed, open access journal which provides a forum for the publication of papers addressing the variety of theoretical, methodological, epistemological, empirical…
View article: DATA_CODE
DATA_CODE Open
This item includes data and code used in the manuscript titled A general phytoplankton-transport relationship in coastal aquatic systems by Qubin Qin and Jian Shen.Software needed: Most data were analyzed using MATLAB (version R2018b), and…