Yun Wang

ORCID: 0009-0009-7969-6891
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Advanced Optical Network Technologies
  • Mobile Ad Hoc Networks
  • Distributed and Parallel Computing Systems
  • Advanced Photonic Communication Systems
  • Optical Network Technologies
  • Distributed systems and fault tolerance
  • Energy Efficient Wireless Sensor Networks
  • Advanced Data Storage Technologies
  • Peer-to-Peer Network Technologies
  • Service-Oriented Architecture and Web Services
  • Real-Time Systems Scheduling
  • Software-Defined Networks and 5G
  • Advanced Computational Techniques and Applications
  • Caching and Content Delivery
  • Opportunistic and Delay-Tolerant Networks
  • Hemophilia Treatment and Research
  • Cooperative Communication and Network Coding
  • Advanced Decision-Making Techniques
  • Parallel Computing and Optimization Techniques
  • IoT and Edge/Fog Computing
  • Lignin and Wood Chemistry
  • Advancements in PLL and VCO Technologies
  • Security in Wireless Sensor Networks
  • Nanoplatforms for cancer theranostics

Shanghai Jiao Tong University
2013-2025

Shanghai Ninth People's Hospital
2018-2022

National Clinical Research
2022

Songjiang District Central Hospital
2022

Shanghai First People's Hospital
2022

Xi'an Jiaotong University
2022

Ruijin Hospital
2018-2021

Shanghai Institute of Hematology
2018-2021

Southeast University
2008-2020

Shandong Agricultural University
2020

In the context of fixed-priority scheduling, feasibility a task set with non-preemptive scheduling does not imply preemptive and vice versa. We use notion preemption threshold, first introduced by Express Logic, in their ThreadX real-time operating system, to develop model that subsumes both fixed priority scheduling. Preemption threshold allows only disable tasks up specified priority. Tasks having priorities higher than are still allowed preempt. With this new model, we show schedulability...

10.1109/rtcsa.1999.811269 article EN 2003-01-20

Nowadays, GPUs significantly boost rendering performance. However, the high memory requirements limit their use, especially on low-end mobile platforms. Compression techniques have been widely adopted to reduce consumption but face two primary issues when applied GPUs: 1) low repetition ratio caused by small raw data sizes and concurrency, 2) locality unpredictable behaviors. These limitations result in a compression compressors are devices. This paper introduces gCom , fine-grained...

10.1145/3711819 article EN ACM Transactions on Architecture and Code Optimization 2025-01-08

In order to study the mechanism of biomass tar formation and elimination in a two-stage downdraft gasifier, nascent rice straw pyrolysis evolution properties under homogeneous/heterogeneous decomposition conditions have been investigated constructed lab-scale reactor by varying factors as temperature, concentration reforming agents CO2/H2O/O2, char bed heights. The was produced first stage then decomposed second with different or beds. stage, results showed that yields increased increasing...

10.1021/ef2007276 article EN Energy & Fuels 2011-10-13

Abstract STUDY QUESTION Does the quality of a single transferred blastocyst affect singleton birthweight in frozen-embryo transfer (FET) cycles? SUMMARY ANSWER The poor-quality was associated with lower mean and gestation-adjusted (Z-scores) when compared an excellent-quality during FET cycles. WHAT IS KNOWN ALREADY Embryo is strong predictor IVF success rates. However, very few studies have examined effect embryo on birthweight. DESIGN, SIZE, DURATION This retrospective study involved live...

10.1093/humrep/dez287 article EN Human Reproduction 2020-02-01

The localization of invisible and impalpable small pulmonary nodules has become an important concern during surgery, since current widely used techniques for have a number limitations, such as invasive features hookwires microcoils, rapid diffusion after injection indocyanine green (ICG). Lanthanide-based metal-organic frameworks (MOFs) been proven potential fluorescent agents because their prominent luminescent characteristics, including large Stokes shifts, high quantum yields, long decay...

10.1186/s12951-022-01263-6 article EN cc-by Journal of Nanobiotechnology 2022-02-02

Co-delivery of two or more chemotherapeutic agents via nanocarriers can provide an effective approach to maximize synergistic additive effects. In this work, we developed novel nanodiamond (ND) based nanoparticle co-loading doxorubicin (DOX) and malaridine (MAL) for treatment MCF-7/ADR cells by virtue the good biocompatibility, high drug loading capacity pH-responsive release properties NDs. The combination index (CI) was smallest, 0.17, DOX MAL against cells, when their ratio 5 : 1, showing...

10.1039/c7tb00449d article EN Journal of Materials Chemistry B 2017-01-01

Most preventable deaths after trauma are related to hemorrhage and occur early injury. Timely hemostatic treatment is essential minimize blood loss improve survival. Among the various methods, most economical effective use a agent. A powdered agent can be used for wounds of any shape or depth with high compactness excellent accumulation effect. Herein, we chose natural, hydrophilic polymer poly(γ-glutamic acid) (γ-PGA) form composite microspheres sodium alginate (SA), which show good...

10.1021/acsabm.1c00671 article EN ACS Applied Bio Materials 2021-07-30

The formation and destruction of pyrolysis tar during the thermal cracking fuel-rich oxidation have been investigated in a constructed test rig. Temperatures 700–1100 °C equivalence ratios (ERs) 0–0.403 were considered, yields gravimetric tar, gas, water, soot taken into account. In inert conditions, was greatly enhanced with temperature increasing. CO CH4 increased almost linearly, H2 exponentially from 700 to 1100 °C; meanwhile, oxygen-containing compounds or substituted 1-ring aromatics...

10.1021/ef200297s article EN Energy & Fuels 2011-05-03

In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad Hoc Networks (MANETs). Specifically, consider four node mobility models: (1) two-dimensional i.i.d. mobility, (2) hybrid random walk, (3) one-dimensional (4) walk. Two time-scales are investigated paper: (i) fast where is at the same time-scale as data transmissions (ii) slow assumed to occur much slower than transmissions. Given constraint <formula formulatype="inline"...

10.1109/tmc.2013.16 article EN IEEE Transactions on Mobile Computing 2013-02-01

Energy consumption imposes a significant cost for data centers in providing cloud services. Many studies explore the opportunities to save power by energy-efficient task scheduling based on technique of dynamic voltage and frequency scaling (DVFS). However, most them assume that energy budgets and/or deadline constraints are known advance. But these information can hardly be acquired general computing environments, such as computing, job rejections caused restricted intolerable guarantee...

10.1109/icpads.2015.79 article EN 2015-12-01

The energy consumption in heterogeneous computing systems (HCS) has attracted a great deal of attention both scientific and commercial fields due to operating environmental concerns. Based on the technique dynamic voltage frequency scaling (DVFS), many studies have investigated developed efficient task scheduling algorithms for reduction. However, most them provide only one refined each perform slack reclamation. Moreover, total energy-saving is accumulated by individual local minimum with...

10.1109/pccc.2016.7820647 article EN 2016-12-01

Patients with major depressive disorders (MDD) exhibit social dysfunction, as illustrated by the lower acceptance rate of unfair proposals in Ultimatum Game (UG) among patients MDD compared a control group. However, underlying mechanisms remain largely unknown. In this study, we explored whether had altered perceptions fairness or perception-behavior linkages group, using multilevel moderated mediation framework. Sixty-eight unmedicated and 55 members group were recruited. Using generalized...

10.1037/abn0000747 article EN Journal of Psychopathology and Clinical Science 2022-02-28

Accurate photovoltaic (PV) power forecasting is critical for integrating renewable energy sources into the grid, optimizing real-time management, and ensuring reliability amidst increasing demand. However, existing models often struggle with effectively capturing complex relationships between target variables covariates, as well interactions temporal dynamics multivariate data, leading to suboptimal accuracy. To address these challenges, we propose a novel model architecture that leverages...

10.48550/arxiv.2412.02302 preprint EN arXiv (Cornell University) 2024-12-03

Intrusion detection in a Wireless Sensor Network (WSN) is of significant importance many applications to detect malicious or unexpected intruder(s). The intruder can be an enemy battlefield, unusual environmental change chemical industry etc. With uniform distribution, the probability same for any point WSN. However, some may require different degrees at locations deployment area. Gaussian distributed WSNs (i.e., normal distribution) provide differentiated capabilities and are widely...

10.1109/mobhoc.2009.5336982 article EN 2009-10-01

Object tracking is one of the fundamental applications in Wireless Sensor Networks (WSNs). To detect and track appearance movement malicious object(s), a number sensors are usually deployed randomly area interest specially for hostile application scenarios. Following random deployment strategy, resulting WSNs conform to Poisson or Gaussian distribution, depending on specific approach. It significant importance investigate compare performance distributed object tracking, since sensor plays an...

10.1109/iwisa.2010.5473254 article EN 2010-05-01

10.1016/j.jpdc.2014.05.005 article EN Journal of Parallel and Distributed Computing 2014-06-02

Multi-Authority Attribute-Based Encryption is a promising cryptographic technique for realizing fine-grained access control on the encrypted data in cloud computing. However, existing multi-authority based attribute encryption schemes computing generally do not take into account with weight. In this paper, concept of weight introduced scheme. Multi-authority weighted scheme proposed. The authorities assign different weights to attributes according their importance. analysis shows that...

10.1109/icnc.2014.6975982 article EN 2014-08-01

In the application of target tracking based on dynamic convey tree-based collaboration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. this paper, we refine slot allocation to tree design an energy efficient MAC protocol called D-TDMA, which avoids allocates contiguous active slots as far possible during aggregation from leaf root node. As result, consumption switching sleeping state is saved. Simulation results show that...

10.1109/greencom-cpscom.2010.38 article EN 2010-12-01

In this paper, the assignment performance problem in process of allocation resources has not been considered present most cloud computing data center, paper proposes a new strategy, on basis cost model parallel task performance, using improved Fuzzy Clustering Algorithm (CBFCM - C Cost based Algorithm) to classify set service level user, and jobs submitted by guest were analyzed four different scheduling algorithms, generated resource scheme. The experimental results show that job strategy...

10.1109/icicta.2015.258 article EN 2015-06-01
Coming Soon ...