Xinhong Hei

ORCID: 0000-0002-6394-0492
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Metaheuristic Optimization Algorithms Research
  • Traffic Prediction and Management Techniques
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Multi-Objective Optimization Algorithms
  • Railway Engineering and Dynamics
  • Anomaly Detection Techniques and Applications
  • Machine Fault Diagnosis Techniques
  • Railway Systems and Energy Efficiency
  • Blockchain Technology Applications and Security
  • Model-Driven Software Engineering Techniques
  • Service-Oriented Architecture and Web Services
  • Software Reliability and Analysis Research
  • Advanced Software Engineering Methodologies
  • Formal Methods in Verification
  • Neural Networks and Applications
  • Petri Nets in System Modeling
  • EEG and Brain-Computer Interfaces
  • Mobile Agent-Based Network Management
  • Evolutionary Algorithms and Applications
  • Advanced Malware Detection Techniques
  • BIM and Construction Integration
  • Fault Detection and Control Systems
  • Video Surveillance and Tracking Methods

Xi'an University of Technology
2016-2025

Wuhan Municipal Engineering Design & Research Institute
2024

Harvard University
2024

Temple University
2024

American Academy of Otolaryngology — Head and Neck Surgery
2024

Xi’an University
2018-2023

Xi'an University of Science and Technology
2014-2022

University of Technology
2022

China Academy of Railway Sciences
2021

Xi'an Railway Survey and Design Institute
2020

SUMMARY In mesh networks architecture, it should be permitted to visit the mobile client points. Whereas in environment, main throughput flows usually communicate with conventional wired network. The so‐called gateway nodes can link directly traditional Ethernet, depending on these nodes, and obtain access data sources that are related Ethernet. wireless (WMNs), quantities of gateways limited. packet‐processing ability settled is Consequently, loads highly affect network performance. this...

10.1002/dac.2522 article EN International Journal of Communication Systems 2013-04-05

10.1016/j.engappai.2012.11.006 article EN Engineering Applications of Artificial Intelligence 2012-12-22

Conventionally, the transition probabilities in interacting multiple model (IMM) are often fixed based on prior information. However, this conservative setting may result inaccurate state estimations. To solve problem, a Bayesian-based online correction function is proposed paper, which can adaptively adjust probabilities. deal with response lag and short-term peak estimation error problem during respond to jump, jumping threshold defined, so that current information of models be fully...

10.1109/tsmc.2019.2922305 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2019-06-27

To develop a deep learning (DL) model for obstructive sleep apnea (OSA) detection and severity assessment provide new approach convenient, economical, accurate disease detection. Considering medical reliability acquisition simplicity, we used electrocardiogram (ECG) oxygen saturation (SpO In the hospital dataset, accuracy (Acc) values of per-segment per-recording were 91.38 96.08%, respectively. The Acc mild, moderate, severe OSA 90.20, 88.24, 92.16%, Bland‒Altman plots revealed consistency...

10.2147/nss.s492806 article EN cc-by-nc Nature and Science of Sleep 2025-01-01

A double-image encryption is proposed based on the discrete fractional random transform and logistic maps. First, an enlarged image composited from two original images scrambled in confusion process which consists of a number rounds. In each round, pixel positions are relocated by using cat maps generated Then decomposed into components. Second, one components directly separated phase masks other component used to derive ciphertext with stationary white noise distribution cascaded transforms...

10.1364/oe.22.010605 article EN cc-by Optics Express 2014-04-24

6 G and mobile Internet-of-Vehicles (IoV) technology require a secure, open, transparent system. Blockchain has the characteristics of decentralization, non-tampering, traceability, which can improve robustness, data privacy, security transparency overall Therefore, blockchain will be most promising to ensure privacy vehicle networks. In this article, we propose novel IoV block-streaming service awareness trusted verification in G. The edge node uploads microservices calling diagram network....

10.1109/tvt.2021.3063783 article EN IEEE Transactions on Vehicular Technology 2021-03-05

In an edge storage system, popular data can be stored on servers to enable low-latency retrieval for nearby users. Suffering from constrained capacities, must process users' requests collaboratively. For sourcing data, it is essential find out which in the system have requested data. this paper, we make first attempt study query (EDQ) problem and present EDIndex, a distributed Edge Data Indexing fast queries at edge. First, introduce new index structure named Counting Bloom Filter (CBF) tree...

10.1145/3539618.3591676 article EN Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2023-07-18

Obstructive sleep apnea (OSA) is a globally prevalent disease with complex diagnostic method. Severe OSA associated multi-system dysfunction. We aimed to develop an interpretable machine learning (ML) model for predicting the risk of severe and analyzing factors based on clinical characteristics questionnaires.This was retrospective study comprising 1656 subjects who presented underwent polysomnography (PSG) between 2018 2021. A total 23 variables were included, after univariate analysis, 15...

10.1186/s12911-023-02331-z article EN cc-by BMC Medical Informatics and Decision Making 2023-10-19

Brain Storm Optimization (BSO) algorithm is a swarm intelligence inspired by human being’s behavior of brainstorming. The performance BSO maintained the creating process ideas, but when it cannot find better solution for some successive iterations, result will be so inefficient that population might trapped into local optima. In this paper, we propose an improved with differential evolution strategy and new step size method. Firstly, incorporated operator ideas to allow jump out stagnation,...

10.1155/2015/923698 article EN Mathematical Problems in Engineering 2015-01-01

Accurate vocal cord leukoplakia classification is critical for the individualized treatment and early detection of laryngeal cancer. Numerous deep learning techniques have been proposed, but it unclear how to select one apply in tasks. This article introduces reliably evaluates existing models classification.We created white light narrow band imaging (NBI) image datasets which were classified into six classes: normal tissues (NT), inflammatory keratosis (IK), mild dysplasia (MiD), moderate...

10.1002/hed.27543 article EN Head & Neck 2023-10-14

In this article, a novel prediction index is constructed, hybrid filtering proposed, and remaining useful life (RUL) framework developed. the proposed framework, different models are built for operation states of rolling bearings. normal state, linear model built, Kalman filter (KF) implemented to determine failure start time (FST). degradation dimensionless CRRMS based on complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) wavelet threshold. Then, double exponential...

10.3390/act14020088 article EN cc-by Actuators 2025-02-11

Anomaly detection (AD) in multivariate time series data (MTS) collected by industrial sensors is a crucial undertaking for the damage estimation and monitoring of machinery like rocket engines, wind turbine blades, aircraft turbines. Due to complex structure systems varying working environments, MTS often contain significant amount noise. Current AD studies mostly depend on extracting features from obtain information associated with various states, they attempt detect abnormal states space...

10.3390/s25061849 article EN cc-by Sensors 2025-03-16
Coming Soon ...