Zhihui Hu

ORCID: 0000-0002-3002-8691
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Natural Language Processing Techniques
  • Advanced Computational Techniques and Applications
  • Advanced Graph Neural Networks
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Fault Detection and Control Systems
  • Text and Document Classification Technologies
  • Blind Source Separation Techniques
  • Advanced Clustering Algorithms Research
  • Chaos control and synchronization
  • Complex Network Analysis Techniques
  • Advanced Algorithms and Applications
  • Antenna Design and Analysis
  • Handwritten Text Recognition Techniques
  • Network Packet Processing and Optimization
  • Neural Networks and Applications
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Image and Video Retrieval Techniques
  • Machine Fault Diagnosis Techniques
  • Anomaly Detection Techniques and Applications
  • Image Retrieval and Classification Techniques
  • Face and Expression Recognition
  • Antenna Design and Optimization
  • Graph Theory and Algorithms

South China University of Technology
2008-2023

Chinese Academy of Medical Sciences & Peking Union Medical College
2023

Beijing Academy of Artificial Intelligence
2022

Digital Health Cooperative Research Centre
2022

Wuhan University of Technology
2015-2022

Leshan Normal University
2022

Nanjing University of Posts and Telecommunications
2021-2022

Shanghai Tunnel Engineering (China)
2022

Battery Park
2022

Digital China Health (China)
2022

This study investigates the finite-time consensus control problem for a class of mixed-order multi-agent systems (MASs) with both stochastic noises and nonlinear dynamics. The sub-systems MASs under consideration are heterogenous that described by series differential equations different orders. purpose addressed is to design protocol ensuring agents' states can achieve desired in finite time probability 1. By using so-called adding power integrator technique combination Lyapunov stability...

10.1080/21642583.2021.1914238 article EN cc-by Systems Science & Control Engineering 2021-01-01

We build a distance education application of Chinese handwriting system that allows students to do practice at anytime and anywhere. As an intelligent tutor, the can automatically check errors, such as stroke production sequence error relationship error. Then our should provide useful feedback student. In this paper, attributed relational graph matching is used locate errors. The pruning strategy applied reduce computational time. experiment results show proposal handle more cases than...

10.4304/jsw.4.2.101-107 article EN Journal of Software 2009-04-01

In the post-cloud era, edge computing is a new paradigm with data processed at of network, which can process close to end-user in real time and offload cloud task intelligently. Meanwhile, decentralization, tamper-proof anonymity blockchain technology provide trusted environment for computing. However, it does raise considerable concerns security, privacy, fault-tolerance so on. For example, identity authentication access control rely on third parties, heterogeneous devices different vendors...

10.3390/electronics10091000 article EN Electronics 2021-04-22

A new method to perform blind separation of chaotic signals is articulated in this paper, which takes advantage the underlying features phase space for identifying various sources. Without incorporating any prior information about source equations, proposed algorithm can not only separate mixed just a few iterations, but also outperforms fast independent component analysis (FastICA) when noise contamination considerable.

10.1088/1674-1056/23/1/010506 article EN Chinese Physics B 2014-01-01

Traditional centralized access control faces data security and privacy problems. The core server is the main target to attack. Single point of failure risk load bottleneck are difficult solve effectively. And third-party center cannot protect owners. distributed problem how effectively scalability diversified requirements IoT (Internet Things) applications. SCAC (Smart Contract-based Access Control) based on ABAC (Attributes Based RBAC (Role Control). It can be applied various types nodes in...

10.3390/electronics11010167 article EN Electronics 2022-01-05

In this paper, we focus on the prediction of atmospheric refractive index structure parameter (Cn2) in coastal area using routine meteorological parameters. Based micrometeorology, macrometeorology and Monin–Obukhov similarity theory, three modified models Cn2 are presented combination with long-term observation data parameters city, respectively. For different weather, applicable cases comparatively analysed their effects comprehensively evaluated. The results indicate that micrometeorology...

10.1080/09500340.2015.1037801 article EN Journal of Modern Optics 2015-05-22

Graph Convolutional Networks (GCNs) are powerful representation learning methods for non-Euclidean data. Compared with the Euclidean data, labeling data is more expensive. Meanwhile, most existing GCNs only utilize few labeled but ignore of unlabeled To address this issue, we design a novel end-to-end Iterative Feature Clustering (IFC-GCN) that enhances standard GCN an (IFC) module. The proposed IFC module constrains node features iteratively based on predicted pseudo labels and feature...

10.1145/3459637.3482469 article EN 2021-10-26

To develop an unsupervised anomaly detection method to identify suspicious error-prone treatment plans in radiotherapy.A total of 577 breast cancer patients were used this study. They labeled as either normal or abnormal by experienced clinicians. Multiple features each plan extracted and selected the learning algorithms. The training set consisted feature samples from 400 testing 158 19 plans. Using k-means clustering algorithm stage, 4 clusters formed. distance between cluster centers then...

10.21037/qims-22-825 article EN Quantitative Imaging in Medicine and Surgery 2023-03-27

To reduce effectively channel noise, parameter mismatch, and inter-user interference, a dual unscented Kalman filter (DUFK) algorithm with combining blind extraction different state space models for chaotic communication systems multiuser is proposed. The simulation results indicate that the has faster convergence speed can realize communications in multi-input multi-output channel.

10.7498/aps.60.070505 article EN cc-by Acta Physica Sinica 2011-01-01

Image segmentation is still a crucial problem in image processing. In this paper, we proposed novel multi-level method based on PSNR using artificial bee colony algorithm (ABCA). considered as an objective function of ABCA. The best thresholds (t <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> *,t xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> *,...,t xmlns:xlink="http://www.w3.org/1999/xlink">n-1</sub>...

10.1109/icmtma.2013.177 article EN 2013-01-01

Using the reflectance component of images directly as output Retinex enhancement lacks adjustability and removing illuminance completely from non-uniform image leads to lack coordination between gray scales visual effects is unsatisfactory. In this paper we propose an improved grayscales transformation approach. First, decompose be enhanced into component. Secondly, three-linearly transformed according actual needs. Thirdly, filtered. Finally, combine corrected enhancement. The experiment...

10.1109/ita.2013.22 article EN International Conference on Information Technology and Applications 2013-11-01

This article is committed to the problem of partitioning a directed acyclic graph into layers such that all edges same direction. At first we perform an experimental analysis some existing layering algorithm. Then propose network simplex algorithm based on linear programming layer graph. The goal minimize total sum edge span so layered has smaller area than other algorithms.

10.1109/iccis.2013.401 article EN International Conference on Computational and Information Sciences 2013-06-01

Network worm is a common computer virus. Because it has characteristics of spread rapidly, intelligent attack and bigger destructiveness etc., this an important issue how to detect the virus intrusion, early warning effective defense in network security future. In paper through analysis detection technology indexes, we propose algorithm based on statistical classification which using heavy-tailed abnormal features traffic "the first connection", implement algorithm's performance comparison...

10.1109/iscid.2015.215 article EN 2015-12-01

Based on the special transform of graphics, general mathematical geometric models different wire ropes with defined initial parameters are presented. On this basis, model IWRC6*36WS rope is set up by using Matlab and Pro/E. Abaqus/Explicit used to analyze elastic property under axial tension. The simulation analysis results show that nonlinear relationship between tension elongation obvious.

10.1109/cscwd.2016.7565955 article EN 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) 2016-05-01

IEEE1588 standard Precision Time Protocol (PTP) is proposed to solve the high precision time synchronization problems in application field. This technique will be ported LINUX + inhibits PTP program POWERPC platform, makes it with support of hardware timestamp 100 ns level timing accuracy. We tested and analyzed software that affects performance GPS clock system.

10.1109/iccis.2013.416 article EN International Conference on Computational and Information Sciences 2013-06-01

The parallel grooved multi-layer drum is regarded as the research object in this paper. parametric design system developed for to realize of 3D model. Based on load characteristics drum, model designed by generation imported into ANSYS Workbench simulate structure absence simplified conditions. Simulation results indicate that size drums thickness obtained traditional method oversized while there exits certain space optimize structure. In addition, provides a reference optimization and...

10.1109/cscwd.2015.7230988 article EN 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) 2015-05-01

This paper is to deal with the blind extraction problem of chaotic signals by using a linear mixing model. In this model, novel method describe distance function in high dimensional space proposed which relates kernel objective function. When adopting artificial bee colony algorithm (ABCA) as an alternative solve multi-modal optimization problem, its analysis under Markov chain model also presented. The simulation results show that article has low complexity, and converges local minimum...

10.7498/aps.65.230501 article EN cc-by Acta Physica Sinica 2016-01-01
Coming Soon ...