Juan Fang

ORCID: 0000-0002-4542-8727
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Parallel Computing and Optimization Techniques
  • Interconnection Networks and Systems
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • IoT and Edge/Fog Computing
  • Distributed and Parallel Computing Systems
  • Embedded Systems Design Techniques
  • Caching and Content Delivery
  • PAPR reduction in OFDM
  • Blockchain Technology Applications and Security
  • Power Line Communications and Noise
  • Age of Information Optimization
  • Advanced Memory and Neural Computing
  • Advanced Computational Techniques and Applications
  • Wireless Communication Networks Research
  • Meteorological Phenomena and Simulations
  • Inflammasome and immune disorders
  • IoT Networks and Protocols
  • Wireless Networks and Protocols
  • Power Systems and Technologies
  • Medicinal Plants and Bioactive Compounds
  • Advanced Algorithms and Applications
  • Cooperative Communication and Network Coding
  • Radiation Effects in Electronics
  • Neural Networks and Applications

Beijing University of Technology
2016-2025

Beijing Technology and Business University
2025

Ministry of Education and Child Care
2025

Shanghai Electric (China)
2024

Bern University of Applied Sciences
2024

Anhui Normal University
2024

Jilin University
2022-2023

Nanjing University
2006-2022

Intel (United States)
1997-2021

Central South University
2021

Many industrial automation systems rely on time-synchronized (and timely) communication among sensing, computing, and actuating devices. Advances in Ethernet enabled by time-sensitive networking (TSN) standards, being developed the IEEE 802.1 TSN Task Group, are significantly improving time synchronization as well worst case latencies. Next-generation expected to leverage advances distributed coordinated computing wireless communications enable greater levels of automation, efficiency,...

10.1109/jproc.2019.2903414 article EN Proceedings of the IEEE 2019-03-21

Recently vision transformer models have become prominent for a multitude of tasks. These models, however, are usually opaque with weak feature interpretability, making their predictions inaccessible to the users. While there has been surge interest in development post-hoc solutions that explain model decisions, these methods can not be broadly applied different architectures, as rules interpretability change accordingly based on heterogeneity data and structures. Moreover, is no method...

10.1016/j.patcog.2023.109666 article EN cc-by Pattern Recognition 2023-05-12

In today's era of Internet Things (IoT), efficient and real-time processing massive data generated by IoT device has become the primary issue for traditional cloud computing network architectures. As a supplement computing, edge enhances performance service completion offloading services to servers closer terminal execution, while reducing power consumption load in cloud. this article, we propose following solutions resolve different requests device: an “edge-cloud” heterogeneous...

10.1109/jiot.2020.3007751 article EN IEEE Internet of Things Journal 2020-07-07

Breast cancer is one of the most prevalent cancers among women, with early detection playing a critical role in improving survival rates. This study introduces novel transformer-based explainable model for breast lesion segmentation (TEBLS), aimed at enhancing accuracy and interpretability medical imaging. TEBLS integrates multi-scale information fusion approach hierarchical vision transformer, capturing both local global features by leveraging self-attention mechanism. addresses limitations...

10.3390/app15031295 article EN cc-by Applied Sciences 2025-01-27

10.1007/s11227-025-07224-8 article EN cc-by-nc-nd The Journal of Supercomputing 2025-04-10

While programs contain a large number of paths, very small fraction these paths are typically exercised during program execution. Thus, optimization algorithms should be designed to trade off the performance less frequently executed in favor more paths. However, traditional formulations code optimizations incapable performing such trade-off. The authors present path profile guided partial redundancy elimination algorithm that uses speculation enable removal along at expense introducing...

10.1109/iccl.1998.674173 article EN 2002-11-27

With the rapidly development of mobile cloud computing (MCC), Internet Things (IoT), and artificial intelligence (AI), user equipment (UEs) are facing explosive growth. In order to effectively solve problem that UEs may face with insufficient capacity when dealing computationally intensive delay sensitive applications, we take Mobile Edge Computing (MEC) IoT as starting point study computation offloading strategy UEs. First, model application generated by a directed acyclic graph (DAG)...

10.3390/mi12020204 article EN cc-by Micromachines 2021-02-17

The rapid advancement of mobile edge computing (MEC) networks has enabled the augmentation computational power devices (MDs) by offloading computationally intensive tasks to resource-rich nodes. This paper discusses decision-making process for task and resource allocation among multiple connected a base station. primary objective is minimize time taken complete while simultaneously reducing energy consumption on device under time-varying wireless fading channel. formulated as an...

10.1109/tnsm.2023.3319294 article EN cc-by-nc-nd IEEE Transactions on Network and Service Management 2023-09-26

Abstract Modern processors employ data prefetchers to alleviate the impact of long memory access latency. However, current are designed for specific patterns, which perform poorly on mixed applications with multiple patterns. To address these issues, RL-CoPref, a reinforcement learning (RL)-based coordinated prefetching controller prefetchers, is proposed in this paper. RL-CoPref takes diverse program context information as input, learns maximize cumulative rewards, and evaluates prefetch...

10.1007/s11227-024-05938-9 article EN cc-by The Journal of Supercomputing 2024-02-27

In order to accurately obtain potential features and improve the recommendation performance of collaborative filtering algorithm, this paper puts forward a algorithm based on deep neural network fusion (CF-DNNF). CF-DNNF makes best implicit attributes data, where text other are extracted from data through long short-term memory (LSTM) network, respectively, so as feature matrix that contains user item attribute information. Deep belief (DBN) uses outputs probability. Besides, initially...

10.1504/ijsnet.2020.110460 article EN International Journal of Sensor Networks 2020-01-01

We present a path profile guided partial dead code elimination algorithm that uses predication to enable sinking for the removal of deadness along frequently executed paths at expense adding additional instructions infrequently paths. Our approach optimization is particularly suitable VLIW architectures since it directs efforts optimizer towards aggressively enabling generation fast schedules by reducing their critical lengths. The paper presents cost-benefit data flow analysis profiling...

10.5555/522659.825652 article EN International Conference on Parallel Architectures and Compilation Techniques 1997-11-11

As the very large-scale integrated circuit designs enter deep sub-micron era, many-core processors are regarded as promising architectures to keep up with Moore's law. To provide effective communications between on-chip components, network-on-chip was proposed a new paradigm that exhibits better scalability than traditional buses. There have been previous researches on application mappings reduce power consumption, network latency and area overhead. However, some of algorithms such...

10.1007/s11227-015-1504-y article EN cc-by The Journal of Supercomputing 2015-08-20

Orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems suffer from the large out-of-band emission (OOBE) that may interfere with other users. Since most existing OFDM OOBE suppression schemes are derived on base of an original system without any scheme, we first propose a generalized framework is capable describing these no matter whether one or more applied. Then, according to place where implemented in our framework, they classified into three groups, namely...

10.1186/1687-6180-2014-74 article EN cc-by EURASIP Journal on Advances in Signal Processing 2014-05-19

The IEEE 802.11 specification for Wireless Local Area Networks (WLANs) supports 20 MHz channels utilizing bandwidths up to 160 MHz. However, the support of devices simultaneously transmitting over different, non-overlapping channels, is not specifically addressed. Recently, there has been interest in developing a Carrier Grade Wi-Fi which led requirement solutions with efficient frequency resource utilization that are currently supported. In this paper we propose Medium Access Control (MAC)...

10.1109/icc.2014.6883924 article EN 2014-06-01

Mobile edge computing is an emerging paradigm that supplies computation, storage, and networking resources between end devices traditional cloud data centers. With increased investment of resources, users demand a higher quality-of-service (QoS). However, it nontrivial to maintain service performance under the erratic activities end-users. In this paper, we focus on placement problem continuous provisioning scenario in mobile for multiple users. We propose novel dynamic framework based deep...

10.3390/network2010008 article EN cc-by Network 2022-02-24

In this paper, we propose a permission-based malware detection framework for Android platform. The proposed uses PCA(Principal Component Analysis) algorithm features selection after permissions extracted, and applies SVM(support vector machine) methods to classify the collected data as benign or malicious in process of detection. simulation experimental results suggest that is effective detecting unknown malware, compared with traditional antivirus software, it can detect effectively...

10.1049/cp.2014.0605 article EN 2014-01-01

Abstract Multiple CPUs and GPUs are integrated on the same chip to share memory, access requests between cores interfering with each other. Memory from GPU seriously interfere CPU memory performance. Requests multiple intertwined when accessing its performance is greatly affected. The difference in latency increases average of accesses. In order solve problems encountered shared heterogeneous multi-core systems, we propose a step-by-step scheduling strategy, which improve system strategy...

10.1007/s11227-019-03135-7 article EN cc-by The Journal of Supercomputing 2020-01-10
Coming Soon ...