scispace - formally typeset
Z

Zhihan Lv

Researcher at Qingdao University

Publications -  460
Citations -  14707

Zhihan Lv is an academic researcher from Qingdao University. The author has contributed to research in topics: Computer science & Medicine. The author has an hindex of 54, co-authored 313 publications receiving 8997 citations. Previous affiliations of Zhihan Lv include Chinese Academy of Sciences & Warsaw University of Technology.

Papers
More filters
Journal ArticleDOI

Ensemble Learning-Based Atrial Fibrillation Detection From Single Lead ECG Wave for Wireless Body Sensor Network

TL;DR: In this article , an ensemble learning algorithm is proposed for automatic atrial fibrillation (AF) detection from single lead ECG recordings collected by wearable devices, which includes two modules: denoised 1-D time series (ECG), time-frequency spectrum and Poincare plot.
Journal ArticleDOI

Complexity Problems Handled by Big Data Technology

TL;DR: When the data of panorama and whole life cycle is big enough and the system component structure and the static data and dynamic data of each individual are recorded, the big data can integrally depict the complicated system and the emerging phenomena.
Journal ArticleDOI

Digital Twins-Based Automated Pilot for Energy-Efficiency Assessment of Intelligent Transportation Infrastructure

TL;DR: In this paper , a DEA model of transportation infrastructure efficiency evaluation under Digital Twins technology is established, and the traffic flow data of a certain road section in Zhenjiang City (J11 City) is simulated and predicted by using the Long Short-term Memory (LSTM) traffic flow prediction model.
Journal ArticleDOI

Numerical Investigation on the Dynamic Characteristics of an Adjustable Power Turbine Used in Environmental Control System

TL;DR: It is analyzed quantitatively that adjusting the adjustable nozzle ring can keep the output power stable, widen the flight envelope, and improve the stability of the environmental control system.
Journal ArticleDOI

A seamless anonymous authentication protocol for mobile edge computing infrastructure

TL;DR: In this article , the authors proposed an authentication protocol for the MEC environment, which stipulates secure and efficient communication for all of the intended entities, while during its execution user anonymity remains intact. And the security properties of the protocol that it offers resistance against impersonation, session key computation and forward and backward secrecy attacks.