Xiaojun Ren

ORCID: 0000-0003-0842-0061
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Business Process Modeling and Analysis
  • Petri Nets in System Modeling
  • Smart Parking Systems Research
  • Advanced Graph Theory Research
  • Integrated Energy Systems Optimization
  • Power Systems and Renewable Energy
  • Smart Grid Energy Management
  • Service-Oriented Architecture and Web Services
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Energy Harvesting in Wireless Networks
  • Microgrid Control and Optimization
  • Energy Load and Power Forecasting
  • Energy Efficient Wireless Sensor Networks
  • Optimal Power Flow Distribution
  • Photochromic and Fluorescence Chemistry
  • Mobile Ad Hoc Networks
  • Wind Energy Research and Development
  • Advanced Technologies in Various Fields
  • Fire Detection and Safety Systems
  • Computational Geometry and Mesh Generation
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • E-commerce and Technology Innovations

Weifang University of Science and Technology
2020-2024

Weifang University
2021-2024

Harbin Electric Corporation (China)
2024

Haier Group (China)
2023

Guangzhou Design Institute
2023

China Guodian Corporation (China)
2022

Guizhou University
2022

Guizhou Electric Power Design and Research Institute
2022

Shandong University of Science and Technology
2010-2014

Shandong University
2014

Abstract Boosted by mobile communication technologies, Human Activity Recognition (HAR) based on smartphones has attracted more and attentions of researchers. One the main challenges is classification time accuracy in processing long-time dependent sequence samples with noisy or missed data. In this paper, a 1-D Convolution Neural Network (CNN)-based bi-directional Long Short-Term Memory (LSTM) parallel model attention mechanism (ConvBLSTM-PMwA) proposed. The original features sensors are...

10.1038/s41598-022-11880-8 article EN cc-by Scientific Reports 2022-05-12

Although the data trading platform has accelerated flow of data, current still many problems. According to characteristics blockchain technology, from aspects attack behavior in and security application technology power transactions, this paper studies blockchain. Moreover, article focuses on privacy protection ciphertext strategy CP-ABE scheme, protects information access by designing appropriate key structures structure forms. In addition, system efficiency is improved computing...

10.3233/jifs-189318 article EN Journal of Intelligent & Fuzzy Systems 2020-09-18

Smoke and fire detection technology is a key for automatically realizing forest monitoring warning. One of the most popular algorithms object tasks YOLOv5. However, it suffers from some challenges, such as high computational load limited performance. This paper proposes high-performance lightweight network model detecting smoke based on YOLOv5 to overcome these problems. C3Ghost Ghost modules are introduced into Backbone Neck achieve purpose reducing parameters improving feature’s expressing...

10.1371/journal.pone.0291359 article EN cc-by PLoS ONE 2023-09-08

Summary Regarding the recent information technology improvement, fog computing (FC) emergence increases ability of computational equipment and supplies modern solutions for traditional industrial applications. In environment, Internet Things (IoT) applications are completed by nodes that intermediate in fog, physical servers data centers cloud. From other side, because resource constraints, dynamic nature, heterogeneity, volatility management problems must be considered as one challenging...

10.1002/dac.4652 article EN International Journal of Communication Systems 2020-10-21

Providing clean water for energy generation is of particular importance. Due to limited resources, hydropower facing problems in today’s world societies. this issue, the purpose study investigate optimal management resources and its impact on generation. The innovation research use a new version Developed Wildebeest Herd Optimization (DWHO) forecast This proposed algorithm solves optimization increases accuracy results obtained reservoir operation generate power. showed that developed has...

10.1016/j.egyr.2021.02.007 article EN cc-by-nc-nd Energy Reports 2021-02-11

Summary Internet of Things (IoT) is utilized as an emerging sample for defining the future technology in which physical items like sensors, radio‐frequency identification tags, mobile phones, actuators, and so on, can have interaction together cooperation with their neighbors obtaining joint objectives. The performance deployed tasks applications on network considered one critical goals this model, achieved by task allocation mechanism. Task IoT complicated due to intricate connection among...

10.1002/cpe.5967 article EN Concurrency and Computation Practice and Experience 2020-09-30

Process mining is an emerging technology used to extract, detect, and improve actual processes by extracting knowledge from event logs generated information systems. In the production process, we can obtain optimal process based on practical experience. Indirect dependencies may exist among different structures in model discovered log of executions that perform better. However, existing algorithms cannot effectively mine indirect structures. To compensate for this deficiency, algorithm named...

10.1109/tsmc.2021.3126473 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2021-11-19

A graph is a particular representation of static network and labeling can be think as automatic routing data in topology. visual the form help us to look deep insight. The science (e.g., Python Package: computer programming language) uses theory concepts study analyze networks. Analyzing these equivalent finding set edges E′ for G such that every vertex incident with at least one edge E′. Then called an edge-covering G. spanning tree connected example edge-covering. finite simple (ad,...

10.61336/jcm2023-3 article EN Corrosion & materials. 2024-09-07

Abstract In the process of collaborative scheduling grid energy-consuming side, voltage value is low, and utilization rate resources side poor. Therefore, a method for based on carbon verification data mining algorithm proposed. Based structure management system, related lookup formula set to determine task power energy side. Under algorithm, topology constructed, target parameters are processed, coordinated realized. The experimental results show that this can effectively improve each node,...

10.1088/1742-6596/2728/1/012017 article EN Journal of Physics Conference Series 2024-03-01

In graph theory, the labeling is assignment of labels (represented by integers) to edges and/or vertices a graph. For <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mrow><mml:mi>G</mml:mi><mml:mo>=</mml:mo><mml:mfenced open="(" close=")" separators="|"><mml:mrow><mml:mi>V</mml:mi><mml:mo>,</mml:mo><mml:mi>E</mml:mi></mml:mrow></mml:mfenced></mml:mrow></mml:math>, with vertex set id="M2"><mml:mi>V</mml:mi></mml:math> and edge id="M3"><mml:mi>E</mml:mi></mml:math>,...

10.1155/2020/4565829 article EN Mathematical Problems in Engineering 2020-04-09

Abstract Secure comparison protocol is an important branch of secure multi-party computation(SMPC), which compares the size input data without disclosing any information between participants. The development cloud computing provides application platform for SMPC, but it also brings new challenges. In with clients need to process their own and submit processed a server, then performs computation. this process, not only maintain honest state at all times, sensitive on server side may be...

10.21203/rs.3.rs-2056175/v1 preprint EN cc-by Research Square (Research Square) 2022-09-16

On demand migration of tenants’ data is a critical technology for elastic load balancing in SaaS application. However, different tenants have required resource with various SLA requirements. Moreover, previously reported techniques are not tenant aware. To study the data, we mainly focus on problem when to migrate which muti-tenant shared DB server and build new framework that aims monitor minimize cost. We establish estimation model decide then create cost guide choice possible tenants....

10.19026/rjaset.7.546 article EN cc-by Research Journal of Applied Sciences Engineering and Technology 2014-03-29

Wind power systems are volatile and uncertain. In this paper, the wind system was studied for optimal configuration to improve stability reliability of system. This article proposed a energy storage optimization model based on OOB-GWO-SVR. Through simulation analysis actual data farm, paper verified accuracy effectiveness model, compared it with other commonly used algorithms. By experimental analysis, capacity 110 kWh, which had higher prediction capability than empirical formulas genetic...

10.1109/easct59475.2023.10392681 article EN 2023-10-20

Under the background of "double carbon" policy, access renewable energy in power system has increased significantly, and impact its uncertainty on operation cannot be ignored. In order to improve islanded microgrid's ability cope with energy. Firstly, index matching degree flexible supply demand (MDFSD) is established based flexibility margin theory, which able reflect respond load within a certain period time. Then, optimal model microgrid established, taking cost MDSDF as objective...

10.1109/ei256261.2022.10116117 article EN 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2) 2022-11-11
Coming Soon ...