Shenghui Zhao

ORCID: 0000-0002-6793-7709
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Context-Aware Activity Recognition Systems
  • Advanced Antenna and Metasurface Technologies
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Energy Efficient Wireless Sensor Networks
  • Antenna Design and Analysis
  • Indoor and Outdoor Localization Technologies
  • Physics of Superconductivity and Magnetism
  • Caching and Content Delivery
  • Distributed and Parallel Computing Systems
  • IoT-based Smart Home Systems
  • Metamaterials and Metasurfaces Applications
  • Service-Oriented Architecture and Web Services
  • Non-Invasive Vital Sign Monitoring
  • Speech and Audio Processing
  • Energy Harvesting in Wireless Networks
  • Access Control and Trust
  • Technology and Security Systems
  • Iron-based superconductors research
  • Anomaly Detection Techniques and Applications
  • Advanced MIMO Systems Optimization
  • Time Series Analysis and Forecasting
  • Microwave Engineering and Waveguides
  • Opportunistic and Delay-Tolerant Networks
  • Emotion and Mood Recognition

Chuzhou University
2015-2024

Shanxi Transportation Research Institute
2023

AviChina Industry & Technology (China)
2023

China University of Petroleum, East China
2022-2023

Beijing Institute of Technology
2002-2022

Nankai University
2018-2021

Nantong University
2019-2020

China Three Gorges University
2015

Southeast University
2007-2009

Chinese Academy of Sciences
2000

Activity recognition plays an essential role in bridging the gap between low-level sensor data and high-level applications ambient-assisted living systems. With aim to obtain satisfactory rate adapt various application scenarios, a variety of sensors have been exploited, among which, smartphone-embedded inertial are widely applied due its convenience, low cost, intrusiveness. In this paper, we explore power triaxial accelerometer gyroscope built-in smartphone recognizing human physical...

10.1109/jsen.2016.2545708 article EN IEEE Sensors Journal 2016-03-23

Data collection is one of the paramount concerns in wireless sensor networks. Many data algorithms have been proposed for collecting particular monitoring regions. However, efficiency paths such can be improved. This paper proposes an energy-aware path construction (EAPC) algorithm, which selects appropriate set points, constructs a path, and collects from points burdened with data. EAPC intended to prolong network lifetime, it accounts cost its current point next forwarding load each node....

10.1109/jsen.2017.2773119 article EN IEEE Sensors Journal 2017-11-13

10.1016/j.simpat.2019.102023 article EN Simulation Modelling Practice and Theory 2019-11-12

Phase shifting profilometry (PSP) and Fourier transform (FTP) are two well-known fringe analysis methods for 3D sensing. PSP offers high accuracy but requires multiple images; FTP uses a single image is limited in its accuracy. In this paper, we propose novel Fourier-assisted phase (FAPS) method accurate dynamic Our key observation that the motion vulnerability of multi-shot can be overcome through single-shot FTP, while preserved. Moreover, to solve ambiguity complex scenes without...

10.1109/jstsp.2014.2378217 article EN IEEE Journal of Selected Topics in Signal Processing 2014-12-04

Among various calamities, conflagrations stand out as one of the most-prevalent and -menacing adversities, posing significant perils to public safety societal progress. Traditional fire-detection systems primarily rely on sensor-based detection techniques, which have inherent limitations in accurately promptly detecting fires, especially complex environments. In recent years, with advancement computer vision technology, video-oriented fire owing their non-contact sensing, adaptability...

10.3390/fire6080315 article EN cc-by Fire 2023-08-14

Among multiple fault-tolerant strategies, resubmission, and replication are fundamental widely recognized in distributed computing systems. In recent years, many algorithms based on or resubmission have been proposed. However, few of them consider these two techniques together, especially Cloud this article, we propose a Hybrid Fault-Tolerant Scheduling Algorithm (HFTSA) for independent tasks with deadlines by integrating the above virtualized During task scheduling process, HFTSA selects...

10.1109/tsc.2020.2992928 article EN IEEE Transactions on Services Computing 2020-05-07

The power of end-to-end deep learning techniques to automatically learn latent high-level features from raw signals has been demonstrated in numerous application fields, however, few studies systematically investigate how properly encode the time-series firings binary environment sensors that typically work an event-triggering scheme and have irregular sampling rates for in-home human activity recognition. To this end, we here propose two different methods process streaming sensor readings...

10.1109/jsen.2020.3035062 article EN IEEE Sensors Journal 2020-10-30

Pervasive computing greatly advances the automatic recognition and understanding of human activities effectively bridges gap between low-level sensor signals high-level human-centric applications. The inherent complexity behavior, however, inevitably poses a huge challenge to design robust activity recognizer, especially in classifying similar activities. In this study, we present hierarchical framework, named HierHAR, that infers on-going multi-stage process for better distinguishing...

10.1109/jsen.2020.3023860 article EN IEEE Sensors Journal 2020-09-14

Advances in wireless sensor networks and increasing Internet-of-Things devices give great opportunities for smart homecare of the elderly. Smart has been a promising issue received much attention recently. Irregularity detection is one most important issues assessing health condition However, researches focused on explicit irregularity detections which are usually based drastic changes data, such as falling. Existing mechanisms detecting implicit rely subjective assessment behaviors'...

10.1109/jiot.2020.2990556 article EN IEEE Internet of Things Journal 2020-04-28

Energy recharging has received much attention in recent years. Several mechanisms were proposed for achieving perpetual lifetime of a given Wireless Sensor Network (WSN). However, most them require mobile recharger to visit each sensor and then perform the task, which increases length path. Another common weakness these works is requirement stop at location sensor. As result, it impossible move with constant speed, leading inefficient movement. To improve efficiency, this paper takes...

10.3390/s17010013 article EN cc-by Sensors 2016-12-23

Data collection problems have received much attention in recent years. Many data algorithms that constructed a path and adopted one or more mobile sinks to collect along the paths been proposed wireless sensor networks (WSNs). However, efficiency of established still can be improved. This paper proposes cooperative algorithm (CDCA), which aims prolong network lifetime given WSNs. The CDCA initially partitions n nodes into k groups assigns each sink acting as local generated by sensors group....

10.3390/s18082627 article EN cc-by Sensors 2018-08-10

For the up-and-coming computing models like as cloud computing, service is standard package for meeting all kinds of consumers' requirements. Web Services are concrete implement service. When users request and consume Services, services' reputations will play a vital role in users' selection. A gradually adjusting reputation evaluation method proposed based on eliminating collusive behaviors consumers step by step, reputation-aware model selection designed. In order to adjust reputations,...

10.4304/jnw.6.7.950-957 article EN Journal of Networks 2011-07-01

Coverage is an important issue that has been widely discussed in wireless sensor networks (WSNs). However, it still a big challenge to achieve both purposes of full coverage and energy balance. This paper considers the area problem for WSN which each variable sensing radius. To prolong network lifetime, weighted Voronoi diagram (WVD) proposed as tool determining responsible region according remaining distributed manner. The mechanism, called radius adaptation (SRA), mainly consists three...

10.1109/tvt.2016.2522645 article EN IEEE Transactions on Vehicular Technology 2016-01-27

Behavior identification plays an important role in supporting homecare for the elderly living alone. In literature, plenty of algorithms have been designed to identify behaviors by learning features or extracting patterns from sensor data. However, most them adopted probabilistic models supervised based on labeled This paper proposes a behavior algorithm (BIA) using unsupervised unlabeled data alone smart home. presents observation elder with three features: Event Order, Time Length...

10.1109/jbhi.2019.2943391 article EN IEEE Journal of Biomedical and Health Informatics 2019-09-24

In wireless sensor networks, sensors typically aim to transmit their own readings the sink node. Constructing an efficient data collection tree is very important since it can determine lifetime of given WSNs. literature, may studies have investigated this issue and proposed algorithms for mobile visit each such that be directly WSN. However, visiting time consuming which results in long path pass through sensor. Consequently, period between consecutive two visits same long, leading situation...

10.1109/waina.2017.59 article EN 2017-03-01

The irregularity detection of daily behaviors for the elderly is an important issue in homecare. Plenty mechanisms have been developed to detect health condition based on explicit several biomedical parameters or some specific behaviors. However, few research works focus detecting implicit involving combination diverse behaviors, which can assess cognitive and physical wellbeing elders but cannot be directly identified sensor data. This paper proposes Implicit IRregularity Detection (IIRD)...

10.1109/jbhi.2019.2896976 article EN IEEE Journal of Biomedical and Health Informatics 2019-02-01

Abstract Purpose: We aim to develop a back-propagation artificial neural network (BP-ANN) improved by priori knowledge and compare its efficacy with other methods in early diabetic retinopathy (DR) detection. Methods: A total of 240 fundus images, composed 120 early-stage DR normal were obtained the same 45° field view camera, macula at center, as cohort for further training. All retinal images processed, features such blood vessel width tortuosity semi-automatically extracted. An BP-ANN was...

10.1088/1742-6596/1437/1/012019 article EN Journal of Physics Conference Series 2020-01-01

Conventional Gaussian mixture model (GMM) Speech Bandwidth Extension (BWE) methods often suffer from the overly smoothed problem. Thus, a method of BWE based on cluster process and GMM whose parameters are determined by expectation-Maximization (EM) is proposed. Firstly, used to low frequency high parameters, then for each established. Later on, transformed according learned mapping function corresponding GMM. Self-organization Feature Mapping (SOFM) Vector Quantization (VQ) applied as...

10.1109/csnt.2015.233 article EN 2015-04-01

The Ordovician-Silurian Wufeng and Longmaxi Shale in the Sichuan Basin were studied to understand genesis diagenetic evolution of carbonate minerals their effects on reservoir quality. results geochemical petrological analyses show that calcite grains have a negative Ce anomaly indicating they formed oxidizing environment seawater. high mineral contents margin basin indicate cores dolomite appear largely be detrital origin. rhombic rims concretions with δ13C -15.46‰ enrichment middle rare...

10.1016/j.petsci.2023.08.012 article EN cc-by-nc-nd Petroleum Science 2023-08-10

Activity recognition plays an important role in smart homes for aged-care. In this paper, we formulate the problem of activity and propose a new method based on spatial-temporal constraints to carry out recognition, which consists five phases: initialisation, segmentation, sensor data representation, exploration as well identification. Besides, analyse time complexity space our approach theory. To evaluate approach, carried experiments real dataset from Wireless Mobile Network Laboratory,...

10.1504/ijahuc.2020.106645 article EN International Journal of Ad Hoc and Ubiquitous Computing 2020-01-01
Coming Soon ...