Jian Zhang

ORCID: 0009-0005-5137-1068
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Computational Techniques and Applications
  • Cloud Computing and Resource Management
  • Service-Oriented Architecture and Web Services
  • Web Data Mining and Analysis
  • Mobile and Web Applications
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • Technology Adoption and User Behaviour
  • Distributed and Parallel Computing Systems
  • Data Quality and Management
  • IoT and Edge/Fog Computing
  • Advanced Decision-Making Techniques
  • Advanced Database Systems and Queries
  • Cloud Data Security Solutions
  • Advanced Data Storage Technologies
  • Web Applications and Data Management
  • Web visibility and informetrics
  • Educational Technology and Assessment
  • Disaster Response and Management
  • Digital Rights Management and Security
  • Big Data and Digital Economy
  • Information Systems Education and Curriculum Development
  • Engineering and Test Systems
  • Technology and Data Analysis

China Resources (China)
2023

State Grid Corporation of China (China)
2023

State Grid Hebei Electric Power Company
2023

Harbin Electric Corporation (China)
2022

Nanjing University of Information Science and Technology
2018

Beijing University of Technology
2018

Tianjin University of Technology
2018

Shenzhen Polytechnic
2016-2017

Xi'an Jiaotong University
2017

Hebei Agricultural University
2016

With object storage systems being increasingly recognized as a preferred way to expose one's infrastructure the web, past few years have witnessed an explosion in acceptance of these systems. Unfortunately, proliferation available solutions and complexity each individual one, coupled with lack dedicated workload, makes it very challenging for one evaluate tune performance different To help address this problem, we present Cloud Object Storage Benchmark (COSBench). It is benchmark tool that...

10.1145/2479871.2479900 article EN 2013-04-21

Medical data sharing is crucial to enhance diagnostic efficiency and improve the quality of medical analysis. However, related endeavors face obstacles due insufficient collaboration among institutions, traditional cloud-based platforms lead concerns regarding security privacy. To overcome these challenges, paper introduces MSNET, a novel framework that seamlessly combines blockchain edge computing. Data traceability access control are ensured by employing as layer. The stores only summaries...

10.1109/tetc.2023.3344655 article EN IEEE Transactions on Emerging Topics in Computing 2023-12-25

An electronic dictionary system (EDS) is developed with object-oriented database techniques based on ObjectStore. The EDS composed of two parts: the Database Building Program (DBP), and Querying (DQP). DBP reads in a encoded SGML tags, builds collection trees which holds entries, several lists contain items various lexical categories. With text exchangeability introduced by SGML, able to accommodate dictionaries different languages structures, after easy modification configuration file. tree...

10.1145/202660.202661 article EN ACM SIGMOD Record 1995-03-01

Cloud Computing System (CCS) aims to power the next generation data centers and enables application service providers lease center capabilities for deploying applications depending on user Quality of Service (QoS) requirements. Huge investments complex managements are shifted from users providers. To improve efficiency simplify management, in this paper, intelligent cloud computing system (ICCS) is presented discussed. Data warehouse introduced record inside outside CCS analysis mining, Some...

10.1109/wism.2010.38 article EN 2010-10-01

This paper describes the development of and initial experiences with WebUPMS (a web-based undergraduate Project management system), a thesis project system developed in Department Computer Science (DCS) at Xi'an Institute Post Telecommunications (XIPT). The was to facilitate existing DCS traditional manual administering mode, make all operations, such as projects submitting by staff, assessing assigned assessors choosing students, process controlling, final papers marks submitting, be...

10.1109/isitae.2007.4409304 article EN 2007-01-01

With the extensive application of cloud computing technology developing, security is paramount importance in Cloud Computing. In environment, surveys have been provided on several intrusion detection techniques for detecting intrusions. We will summarize some literature various attack taxonomy, which might cause threats environment. Such as attacks virtual machines, machine monitor, and tenant network. Besides, we review massive existing solutions proposed literature, such misuse techniques,...

10.1109/dsc.2018.00145 article EN 2018-06-01

For graduate programs, usually, the curricula are developed based on generic learning outcomes of matching undergraduate programs. However, most programs have diversified students from various backgrounds with degrees an assortment majors. Even for coming same majors, they might come different countries differing outcomes. It is even more challenging where there no corresponding The program curriculum should be customized special student groups. This paper will describe redesign our...

10.1109/fie.2016.7757506 article EN 2021 IEEE Frontiers in Education Conference (FIE) 2016-10-01

This paper proposes an asymmetric key based authentication framework, QRToken, for easy - to use login websites, SSH servers, etc., QRToken client side locally stored RSA private encrypt identification information as well other parameters, and prese nt a QR code in the form of small two dimensional picture that encodes encrypted information. User takes with cell phone camera sends it cryptographic response server complete process. We believe simple act scanning brings ease management...

10.1109/cscloud.2015.24 article EN 2015-11-01

10.1016/j.egypro.2011.10.952 article EN Energy Procedia 2011-01-01

Cloud computing has become one of the most dominant features in area nowadays. The hardware datacenter can be get virtualized and create multiple Virtual Machine (VM) instances on a single Physical (PM) environment. It is necessary to migrate VMs from over utilized hosts ensure quality service. Meanwhile loading underutilized need integrated into physical machine which usage reasonable range system will deactivate that order saving power consumption. key points VM migration include issues...

10.1109/icalip.2016.7846628 article EN 2016-07-01

This paper provides a Web application design method, page file-oriented with relevant concept and the corresponding definitions for variety of development, technology software engineering. We provide file flow chart which describes relationships parameters passing between every site. It standard technical specification site designing development. also gives mathematical definition that can be further realizing package or plug-in to support visual development testing.

10.1109/itme.2016.0151 article EN 2016-12-01

With the fast development of Web 2.0, users can obtain everything that they want from Web. and their access behaviours are recorded by log. Based on mining frequent sequence, we deeply understand interests. In turn, it improve efficiency network management. this paper, firstly present methods for log pre-processing extract features. Secondly, employ PrefixSpan algorithm to achieve goal sequences mining. order process massive data in today, also combined proposed with Spark. Finally,...

10.22323/1.299.0061 article EN cc-by-nc-nd 2017-07-17

The need for workers in the information technology and computing industry is on rise. Code.org estimates that by 2020, there will be more 1 million computer jobs available than science graduates to fill them. Efforts, organizations such as Computer Science Teachers Association (CSTA) code.org, attract students appear working. While it appears teach, qualified teachers teach them? CSTA report "Bugs System: Teacher Certification U.S." asserts "certification/licensure processes U.S. are deeply...

10.1145/2538862.2544244 article EN 2014-02-18

With the explosive growth of web information, acquiring target information quickly, precisely and effectively in a large number network is restricted by many factors.In response to it, this paper analyzed key technician part search engine-web crawler technology proposed model based on vertical system with discussion implementation corresponding strategy.Firstly, it builds structure analyzes different function models.Next, discusses some crucial problems including options deleting duplicated...

10.14257/ijfgcn.2016.9.4.14 article EN International Journal of Future Generation Communication and Networking 2016-04-30

With the development of computer technology and increase distributed computing need, cloud gradually becomes research hotspot in IT domain. As an important application technology, desktop has been used many domains due to its unique characteristic, especially dominance security flexibility. Based on analyzing characteristic cloud, makes some confidential information system, describes architecture framework, running mode operation detail.

10.4028/www.scientific.net/amm.373-375.1710 article EN Applied Mechanics and Materials 2013-08-01

This paper studies a resource scheduling method and system for cloud edge collaboration, including: determining the location coverage of MEC servers; Real time monitoring customers' access to each within service scope server. When bandwidth customer in region reaches set threshold, we need rent server region, cache resources leased During reservation period renting servers, servers ECS are used together provide access. In process running, this can make decisions real according actual...

10.1109/icapc61546.2023.00062 article EN 2023-12-27
Coming Soon ...