Z
Zhihan Lv
Researcher at Qingdao University
Publications - 460
Citations - 14707
Zhihan Lv is an academic researcher from Qingdao University. The author has contributed to research in topics: Computer science & Medicine. The author has an hindex of 54, co-authored 313 publications receiving 8997 citations. Previous affiliations of Zhihan Lv include Chinese Academy of Sciences & Warsaw University of Technology.
Papers
More filters
Journal ArticleDOI
Ensemble Learning-Based Atrial Fibrillation Detection From Single Lead ECG Wave for Wireless Body Sensor Network
TL;DR: In this article , an ensemble learning algorithm is proposed for automatic atrial fibrillation (AF) detection from single lead ECG recordings collected by wearable devices, which includes two modules: denoised 1-D time series (ECG), time-frequency spectrum and Poincare plot.
Journal ArticleDOI
Complexity Problems Handled by Big Data Technology
TL;DR: When the data of panorama and whole life cycle is big enough and the system component structure and the static data and dynamic data of each individual are recorded, the big data can integrally depict the complicated system and the emerging phenomena.
Journal ArticleDOI
Digital Twins-Based Automated Pilot for Energy-Efficiency Assessment of Intelligent Transportation Infrastructure
TL;DR: In this paper , a DEA model of transportation infrastructure efficiency evaluation under Digital Twins technology is established, and the traffic flow data of a certain road section in Zhenjiang City (J11 City) is simulated and predicted by using the Long Short-term Memory (LSTM) traffic flow prediction model.
Journal ArticleDOI
Numerical Investigation on the Dynamic Characteristics of an Adjustable Power Turbine Used in Environmental Control System
TL;DR: It is analyzed quantitatively that adjusting the adjustable nozzle ring can keep the output power stable, widen the flight envelope, and improve the stability of the environmental control system.
Journal ArticleDOI
A seamless anonymous authentication protocol for mobile edge computing infrastructure
Khalid Mahmood,Muhammad Faizan Ayub,Syed Zohaib Hassan,Zahid Ghaffar,Zhihan Lv,Shehzad Ashraf Chaudhry +5 more
TL;DR: In this article , the authors proposed an authentication protocol for the MEC environment, which stipulates secure and efficient communication for all of the intended entities, while during its execution user anonymity remains intact. And the security properties of the protocol that it offers resistance against impersonation, session key computation and forward and backward secrecy attacks.