Zhihui Du

ORCID: 0000-0002-8435-1611
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Pulsars and Gravitational Waves Research
  • Gamma-ray bursts and supernovae
  • Geophysics and Gravity Measurements
  • Distributed and Parallel Computing Systems
  • Astrophysical Phenomena and Observations
  • Cloud Computing and Resource Management
  • Cosmology and Gravitation Theories
  • Astrophysics and Cosmic Phenomena
  • Parallel Computing and Optimization Techniques
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Geophysics and Sensor Technology
  • Graph Theory and Algorithms
  • Radio Astronomy Observations and Technology
  • High-pressure geophysics and materials
  • Seismic Waves and Analysis
  • IoT and Edge/Fog Computing
  • Algorithms and Data Compression
  • Scientific Computing and Data Management
  • Advanced Frequency and Time Standards
  • Data Management and Algorithms
  • Statistical and numerical algorithms
  • Atomic and Subatomic Physics Research
  • Advanced Database Systems and Queries

State Key Laboratory of Food Science and Technology
2024

Jiangnan University
2024

Tsinghua University
2013-2024

China Building Materials Academy
2024

Hainan University
2024

New Jersey Institute of Technology
2020-2024

Qingdao University
2024

University of International Business and Economics
2023

John Wiley & Sons (United Kingdom)
2023

University of Oxford
2023

Advanced Virgo is the project to upgrade interferometric detector of gravitational waves, with aim increasing number observable galaxies (and thus detection rate) by three orders magnitude. The now in an advanced construction phase and assembly integration will be completed end 2015. part a network, alongside two LIGO detectors US GEO HF Germany, goal contributing early waves opening new window observation on universe. In this paper we describe main features outline status construction.

10.1088/0264-9381/32/2/024001 article EN Classical and Quantum Gravity 2014-12-18

This paper presents the Summed Parallel Infinite Impulse Response (SPIIR) pipeline used for public alerts during third advanced LIGO and Virgo observation run (O3 run). The SPIIR uses infinite impulse response (IIR) filters to perform extremely low-latency matched filtering this process is further accelerated with graphics processing units (GPUs). It first online select candidates from multiple detectors using a coherent statistic based on maximum network likelihood ratio principle. Here we...

10.1103/physrevd.105.024023 article EN Physical review. D/Physical review. D. 2022-01-06

Service-oriented architecture and cloud computing are becoming a dominant paradigm, as all major companies supporting this paradigm more organizations adopting paradigm. Robotics service-oriented robotics start to joint new in the past five years now ready participate large scale. This paper reports our research on design, implementation, evaluation of Robot Service (RaaS) unit. To fully qualify RaaS unit, we have kept design comply with common service standards, development platforms,...

10.1109/sose.2010.44 article EN 2010-06-01

With the wide deployment of cloud computing in many business enterprises as well science and engineering domains, high quality security services are increasingly critical for processing workflow applications with sensitive intermediate data. Unfortunately, most existing worklfow scheduling approaches disregard requirements data produced by workflows, overlook performance impact encryption time on start subsequent tasks. Furthermore, idle slots resources, resulting from dependencies among...

10.1109/tpds.2017.2678507 article EN publisher-specific-oa IEEE Transactions on Parallel and Distributed Systems 2017-03-06

A honeypot is a type of security facility deliberately created to be probed, attacked and compromised. It often used for protecting production systems by detecting deflecting unauthorized accesses. also useful investigating the behaviour attackers, in particular, unknown attacks. For past 17 years much effort has been invested research development based techniques tools they have evolved become an increasingly powerful means defending against creations blackhat community. In this paper,...

10.1109/jsyst.2017.2762161 article EN IEEE Systems Journal 2017-11-07

Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss information, denial access, information leakage, collusion, technical failures, data security breaches are difficult to predict anticipate in advance. These types nonstationarity one the main issues design reliable IoT infrastructure capable mitigating their consequences. It is not sufficient propose solutions for given scenario, but mechanisms adapt...

10.1109/jiot.2020.2981276 article EN IEEE Internet of Things Journal 2020-03-16

The Advanced Virgo interferometer is the upgraded version of detector having goal to extend by a factor 10 observation horizon in universe and consequently increase detection rate three orders magnitude. Its installation progress expected be completed late 2015. In this proceeding we will present scheme main challenging technical features give an outline status foreseen time schedule which bring its full operation.

10.1088/1742-6596/610/1/012014 article EN Journal of Physics Conference Series 2015-05-11

Honeypots are designed to trap the attacker with purpose of investigating its malicious behavior. Owing increasing variety and sophistication cyber attacks, how capture high-quality attack data has become a challenge in context honeypot area. All-round honeypots, which mean significant improvement sensibility, countermeasure stealth, necessary tackle problem. In this paper, we propose novel architecture termed HoneyDOC support all-round design implementation. Our clearly identifies three...

10.1109/jsac.2019.2894307 article EN IEEE Journal on Selected Areas in Communications 2019-02-05

Difucosyllactose (DFL) is a significant and plentiful oligosaccharide found in human breast milk. In this study, an artificial metabolic pathway of DFL was designed, focusing on the de novo biosynthesis GDP-fucose from only glycerol. This achieved by engineering

10.1021/acs.jafc.4c01691 article EN Journal of Agricultural and Food Chemistry 2024-04-10

Service-oriented architecture and cloud computing have become the prevalent paradigm. In this paradigm, resources can be accessed like other utility services available in today's society. meantime, robotics applications are joining trend. More more robot shifting from manufacture to non-manufacture service industries. However, for on-demand supply of large-scale heterogeneous robots, It is still a problem not yet been studied, including fundamental management efficiency issues using these...

10.1109/isads.2011.36 article EN 2011-03-01

The tight formation of unmanned aerial vehicles (UAVs) provides numerous advantages in practical applications, increasing not only their range but also efficiency during missions. However, the wingman aerodynamics are affected by tail vortices generated leading aircraft a formation, resulting unpredictable interference. In this study, mathematical model wake vortex was developed, and aerodynamic characteristics were simulated using Xflow software. A robust control method for formations...

10.3390/drones8040165 article EN cc-by Drones 2024-04-21

3-Fucosyllactose (3-FL), an important fucosylated human milk oligosaccharide in breast milk, offers numerous health benefits to infants. Previously, we metabolically engineered

10.1021/acs.jafc.4c02950 article EN Journal of Agricultural and Food Chemistry 2024-06-15

We consider a new tree mining problem that aims to discover restrictedly embedded subtree patterns from set of rooted labeled unordered trees. study the properties canonical form trees, and develop Apriori-based techniques generate all candidate subtrees level by through two efficient rightmost expansion operations: 1) pairwise joining 2) leg attachment. Next, we show detection can be achieved calculating restricted edit distance between data tree. These are then integrated into an...

10.1109/tcyb.2014.2345579 article EN IEEE Transactions on Cybernetics 2014-08-14

Serving as cache disks, flash-based solid-state drives (SSDs) can significantly boost the performance of read-intensive applications. However, frequent data updating, necessary condition for classical replacement algorithms (e.g., LRU, MQ, LIRS, and ARC) to achieve a high hit rate, makes SSDs wear out quickly. To address this problem, we propose new approach—write-efficient caching (WEC)—to greatly improve write durability SSD cache. WEC is conducive reducing total number writes issued while...

10.1109/tc.2015.2401029 article EN IEEE Transactions on Computers 2015-02-06

Robot autonomous exploration is a challenging and valuable research field that has attracted widespread interest in recent years. However, existing methods often encounter problems such as incomplete exploration, repeated paths, low efficiency when facing large-scale scenes. Considering many indoor outdoor scenes usually have prior topological map, road navigation maps, satellite network computer-aided design (CAD) etc., this paper incorporated information into the framework proposed an...

10.3390/drones8040124 article EN cc-by Drones 2024-03-27
Coming Soon ...