Junhua Chen

ORCID: 0000-0002-7688-6851
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Face and Expression Recognition
  • Face recognition and analysis
  • Biometric Identification and Security
  • Mathematical Analysis and Transform Methods
  • Advanced Neural Network Applications
  • Blockchain Technology Applications and Security
  • Quantum Mechanics and Applications
  • Energy Efficient Wireless Sensor Networks
  • Quantum Mechanics and Non-Hermitian Physics
  • Service-Oriented Architecture and Web Services
  • Image and Signal Denoising Methods
  • AI in cancer detection
  • Radiomics and Machine Learning in Medical Imaging
  • Tensor decomposition and applications
  • Occupational Health and Safety Research
  • Sparse and Compressive Sensing Techniques
  • Cloud Computing and Resource Management
  • Manufacturing Process and Optimization
  • Software-Defined Networks and 5G
  • Security in Wireless Sensor Networks
  • Age of Information Optimization
  • Digital Transformation in Industry
  • Fire Detection and Safety Systems
  • Quantum and Classical Electrodynamics

Chongqing University of Posts and Telecommunications
2014-2025

Shanghai University
2024-2025

Central University of Finance and Economics
2022

University of Science and Technology of China
2002-2015

Beijing Seismological Bureau
2000

Safety helmet wearing plays a major role in protecting the safety of workers industry and construction, so real-time detection technology is very necessary. This paper proposes an improved YOLOv4 algorithm to achieve efficient detection. The adopts lightweight network PP-LCNet as backbone uses deepwise separable convolution decrease model parameters. Besides, coordinate attention mechanism module embedded three output feature layers enhance information, fusion structure designed fuse target...

10.3390/s23031256 article EN cc-by Sensors 2023-01-21

Abstract Background This study aims to develop a novel predictive model for determining human papillomavirus (HPV) presence in oropharyngeal cancer using computed tomography (CT). Current image‐based HPV prediction methods are hindered by high computational demands or suboptimal performance. Methods To address these issues, we propose methodology that employs Siamese Neural Network architecture, integrating multi‐modality off‐the‐shelf features—handcrafted features and 3D deep features—to...

10.1002/acm2.70061 article EN cc-by Journal of Applied Clinical Medical Physics 2025-03-02

10.1016/j.imavis.2020.104093 article EN Image and Vision Computing 2020-12-13

Abstract Aiming at the problems of large communication cost consistency process, low efficiency view switching and random selection master node in Practical Byzantine Fault Tolerance (PBFT), an Improved (IPBFT) is proposed. Firstly, This paper proposes a credit model voting mechanism, that generated by with nodes reputation values, which ensures reliability reduces possibility abnormal acts as node. Secondly, process optimized to decrease frequency time between nodes. Finally, protocol...

10.1088/1742-6596/1486/3/032023 article EN Journal of Physics Conference Series 2020-04-01

10.1016/j.cviu.2022.103526 article EN Computer Vision and Image Understanding 2022-08-01

This study aims to explore the changes of Chinese coronavirus disease-2019 (COVID-19) policy topics in eclipse, outbreak, and convalescent stage COVID-19 based on 4982 textual policies. By using co-occurrence clustering network method, we find that strict prevention control epidemic is only topic policies eclipse stage. In outbreak stage, still most important topic. The resuming work “essential” enterprises stabilizing market prices are support guarantee for fighting against COVID-19. as has...

10.3390/su14042411 article EN Sustainability 2022-02-20

The traditional centralized logistics resources allocation method can no longer adapt to the new business model of decentralized e-commerce, requiring transaction security for all parties involved in process. Utilizing blockchain and smart contract technologies build network foundation edge computing technology assist resource-constrained transport nodes implementing complex computation, this paper proposes a distributed chain (DLRAChain) concept designs DLRAChain that supports independent...

10.1142/s0218126623501219 article EN Journal of Circuits Systems and Computers 2022-10-07

In the Industry 4.0 era, with continuous integration of industrial field systems and upper-layer facilities, interconnection between wireless sensor networks (IWSNs) Internet is becoming increasingly pivotal. However, when deployed in real scenarios, IWSNs are often connected to legacy control systems, through some wired network protocols via gateways. Complex protocol translation required these gateways, semantic interoperability lacking Internet. To fill this gap, our study focuses on...

10.3390/s22207762 article EN cc-by Sensors 2022-10-13

Abstract Background and Purpose The immunohistochemical test (IHC) for Human Epidermal Growth Factor Receptor 2 (HER2) hormone receptors (HR) provides prognostic information guides treatment patients with invasive breast cancer. objective of this paper is to establish a non‐invasive system identifying HER2 HR in cancer using dynamic contrast‐enhanced magnetic resonance imaging (DCE‐MRI). Methods In light the absence high‐performance algorithms external validation previously published...

10.1002/mp.17266 article EN Medical Physics 2024-06-24

10.1109/ccdc62350.2024.10587734 article EN 2022 34th Chinese Control and Decision Conference (CCDC) 2024-05-25

We find that the coherent state projection operator representation of symplectic transformation constitutes a loyal group group. The result successively applying squeezing operators on number can be easily derived.

10.1088/0253-6102/38/2/147 article EN Communications in Theoretical Physics 2002-08-15

Abstract Face recognition has become very challenging in unconstrained conditions due to strong intra‐personal variations, such as large pose changes. normalisation can help resolve these problems and effectively improve the face performance by converting non‐frontal faces frontal ones. However, there are other complex facial variations addition pose, illumination expression, which will also influence performance. The authors propose a well‐designed generative adversarial network‐based...

10.1049/cvi2.12025 article EN cc-by IET Computer Vision 2021-04-09

Since traditional satellite positioning technology usually has low accuracy in complex environments, such as indoor environments and dense buildings, wireless can be used a complement to meet the on special scenes. UWB (Ultra Wideband) kind of high-precision technology. However, construction cost system represented by is very expensive. In order requirements reduce cost, we propose an architecture multi-level IoT (Internet Things) this paper. The uses different technologies according...

10.1109/iwcmc.2019.8766539 article EN 2019-06-01

Fourier and fractional-Fourier transformations are widely used in theoretical physics. In this paper we make quantum perspectives generalization for the fractional transformation (FrFT). By virtue of mechanical representation method integration within normal ordered product (IWOP) operators, find key point composing FrFT, reveal structure FrFT. Following procedure, a full family generalized discovered with usual FrFT as one special case. The eigen-functions arbitrary GFrT derived explicitly.

10.48550/arxiv.1307.6271 preprint EN other-oa arXiv (Cornell University) 2013-01-01

Based on the Radon transform and fractional Fourier we introduce transformation (FRT). We identify kernel for FRT. The FRT of Wigner operator is derived, which naturally reduces to projector eigenvector rotated quadrature in usual case.

10.1088/0253-6102/39/2/147 article EN Communications in Theoretical Physics 2003-02-15

Agile Product Line Engineering (APLE), a relatively new approach combining the two successful methods of Software Development (ASD) and Lines (SPLs), makes product lines more responsive to ever-changing customer needs or market changes. However, SPLs often fail keep up with demand due high coordination costs, slow development processes, long release cycles in case frequent changes business requirements; agile software projects, lack unified specification for describing requirements leads...

10.3390/electronics12112421 article EN Electronics 2023-05-26

Edge-edge collaboration is the main mode for edge computing (EC) in time-sensitive networking (TSN). This distributed mode, which work implemented collaboratively by nodes (ECNs) without involvement of cloud servers, poses challenges to management. However, most existing methods ECN only focus on scheduling resources rather than management process design and rarely consider transparency, security, fair distribution guarantee mechanism benefits. To address this issue, we propose a...

10.1016/j.jksuci.2023.101902 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-12-30

In this paper, we present a joint multi-patch and multi-task convolutional neural networks (JMM-CNNs) framework to learn more descriptive robust face representation for recognition. the proposed JMM-CNNs, set of CNNs feature fusion network are constructed fuse global local facial features, then learning algorithm, including recognition task pose estimation task, is operated on fused obtain pose-invariant task. To further enhance insensitiveness learned representation, also introduce...

10.1587/transinf.2020edp7059 article EN IEICE Transactions on Information and Systems 2020-09-30

For classical Hamiltonian with general form we find a new convenient way to obtain its normal coordinates, namely, let H be quantised and then employ the invariant eigen-operator (IEO) method (Fan et al. 2004 Phys. Lett. A 321 75) derive them. The matrix equation, which relies on M L, for obtaining coordinates of is derived.

10.1088/1674-1056/19/9/090312 article EN Chinese Physics B 2010-09-01

Edge computing is a creative paradigm that enhances the capacity of edge device close to data source. As key technology computing, task offloading, which can improve response speed and stability network system, has attracted much attention been applied in many scenarios. However, few studies have considered application offloading time-sensitive networking (TSN), promising potential guarantee delivery with bounded latency low jitter. To this end, we establish stream transmission model for TSN...

10.1155/2022/1750192 article EN cc-by Mobile Information Systems 2022-12-30
Coming Soon ...