scispace - formally typeset
Z

Zhihan Lv

Researcher at Qingdao University

Publications -  460
Citations -  14707

Zhihan Lv is an academic researcher from Qingdao University. The author has contributed to research in topics: Computer science & Medicine. The author has an hindex of 54, co-authored 313 publications receiving 8997 citations. Previous affiliations of Zhihan Lv include Chinese Academy of Sciences & Warsaw University of Technology.

Papers
More filters
Proceedings ArticleDOI

3D seabed modeling and visualization on ubiquitous context

Zhihan Lv, +1 more
TL;DR: The 3D seabed platform in this poster is based on a 'section-drilling' model that can accomplish the modeling, visualization and analysis of the integrated data of the seabing on either website or smartphone.
Proceedings ArticleDOI

XEarth: A 3D GIS platform for managing massive city information

TL;DR: A 3D Shenzhen city web platform based on THE AUTHORS-BVRGIS is presented and the system design has considered some existing Geographic human-computer interaction (GeoHCI) research results.
Journal ArticleDOI

Diversified Technologies in Internet of Vehicles Under Intelligent Edge Computing

TL;DR: The IoV model of task offloading and migration built by intelligent edge computing can significantly improve the load sharing rate, offloading efficiency, packet loss ratio, and transmission delay when the IoV is processing tasks and uploading data.
Journal ArticleDOI

RFID Reader Anticollision Based on Distributed Parallel Particle Swarm Optimization

TL;DR: An improved RFID reader anticollision model is constructed by modifying the measure index, introducing a constraint function, and simultaneously considering collisions among readers and between readers and tags.
Journal ArticleDOI

A real-time and ubiquitous network attack detection based on deep belief network and support vector machine

TL;DR: The proposed network attack detection method combining a flow calculation and deep learning algorithm is suitable for the real-time detection of high-speed network intrusions.