Wenbing Zhao

Wenbing Zhao
Cleveland State University · Department of Electrical and Computer Engineering

Ph.D. in Electrical and Computer Engineering

About

258
Publications
53,845
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,175
Citations
Introduction
I am doing research in two drastically different fields: (1) dependable distributed systems, and (2) smart and connected healthcare. My Ph.D. research was in the area of dependable systems and I have been working in the field for more than 16 years. Recently, I become more and more interested in doing applied research, especially in the area of smart and connected healthcare. More details can be found at my research page: http://academic.csuohio.edu/zhao_w/research.htm.
Additional affiliations
August 2016 - present
Cleveland State University
Position
  • Professor
August 2010 - August 2016
Cleveland State University
Position
  • Professor (Associate)
January 2004 - August 2010
Cleveland State University
Position
  • Professor (Assistant)
Education
June 1996 - July 2002
University of California, Santa Barbara
Field of study
  • Electrical and Computer Engineering
September 1990 - June 1995
Peking University
Field of study
  • Physics
September 1986 - July 1990
Peking University
Field of study
  • Physics

Publications

Publications (258)
Article
Lost productivity from lower back injuries in workplaces costs billions of U.S. dollars per year. A significant fraction of such workplace injuries are the result of workers not following best practices. In this paper, we present the design, implementation, and evaluation of a novel computer-vision-based system that aims to increase the workers’ co...
Article
Full-text available
In this article, we report the design and implementation of a Kinect-based system for providing automated realtime assessment, feedback and guidance to user who are practicing rehabilitation exercises at home without the supervision of physical therapists. The foundation for the system is a rule-based framework that can be used to assess in realtim...
Conference Paper
In this paper, we formulate the consensus problem and its solutions as seen in public blockchains and contrast them to those of the traditional distributed consensus. The Proof of Work (PoW) algorithm introduced in Bitcoin provides the first elegant and practical solution for reaching distributed consensus in a large-scale untrusted environment. Du...
Article
The rapid development of computer and sensing technologies enables e-coaching systems for individuals with various physical health and mental health challenges. In this article, we review recent research efforts on using virtual avatar-based computer technologies to improve social and communication skills of children with autism spectrum disorder (...
Article
In this article, we provide a concise but systematic review on blockchain-enabled cyber-physical systems (CPS). We dissect various blockchain-enabled CPS as reported in the literature in terms of their operations and the features of blockchain that have been used. We identify key common CPS operations that can be enabled by blockchain, and classify...
Article
With the rapid development of communication technologies, the quality of our daily life has been improved with the applications of smart communications and networking, such as intelligent transportation and mobile service computing. However, high user demands for quality of service (QoS) are forcing intelligent transportation to continuously improv...
Article
Full-text available
In this paper, we present the design and implementation of an avatar-based interactive system that facilitates rehabilitation for people who have received total knee replacement surgeries. The system empowers patients to carry out exercises prescribed by a clinician at the home settings more effectively. Our system helps improve accountability for...
Chapter
Nowadays many large cities often suffer from road congestion. Then, it is necessary to improve the working efficiency of urban road network with the help of computational intelligence technologies, within the Internet of vehicles (IoV) environment. We are committed to designing traffic flow prediction methods through the use of machine learning mod...
Chapter
Distributed consensus is the most fundamental issue in distributed computing. In blockchain, the consensus is established probabilistically by converting the consensus problem into a stochastic process similar to winning a lottery. This chapter first introduces a set of requirements for blockchain consensus algorithms. In blockchain, the need for a...
Chapter
The horizon on distributed consensus research has completely changed since Lamport published the now well‐known Paxos algorithm. This chapter introduces the original Paxos algorithm and its derivative algorithms. It also incorporates recent work on Paxos‐based fault tolerant systems. An immediate application of the Paxos algorithm is to enable stat...
Chapter
Early generations of algorithms for reaching Byzantine agreement and Byzantine fault tolerance are very expensive in that they incur prohibitively high runtime overhead. The Oral Message Algorithms solve the Byzantine consensus problem. The practical Byzantine fault tolerance (PBFT) algorithm tolerates Byzantine faults with certain restrictions and...
Chapter
The blockchain technology has attained huge interest in the last several years. This chapter first introduces the insight on the value of the blockchain technology in terms of different levels of benefits it can bring to applications. Second, it reviews the existing proposals on various blockchain applications for cyber‐physical systems. Third, the...
Chapter
Recovery‐oriented computing was pioneered by a joint research project of Stanford University and the University of California, Berkerly in early and mid 2000. An important step in failure recovery is to reconstruct the state of the recovering component or process so that it is consistent with other parts of the system and ready to provide services...
Chapter
Different from checkpointing/logging and recovery‐oriented computing, which focus on the recovery of an application should a fault occur, the replication technique offers another way of achieving high availability of a distributed service by masking various hardware and software faults. This chapter introduces the basic approaches for service and d...
Chapter
Checkpointing and logging are the most essential techniques to achieve dependability in distributed systems. This chapter defines the system model used in the checkpointing and logging algorithms. A tradeoff is that the distributed systems that choose to use checkpoint‐based protocols must be willing to tolerate loss of execution unless a checkpoin...
Chapter
This chapter focuses on several group communication systems that are elegantly designed and are representatives of the respective approaches. A group communication system must define two protocols, one for normal operation when all nodes in the current membership can communicate with each other in a timely fashion, and the other for membership chan...
Chapter
This chapter provides an overview of cryptocurrency and the blockchain technology. A cryptocurrency that is powered by decentralized computer technology has long been a dream for some pioneers such as Nick Szabo. In January 2009, Bitcoin was launched as the first ever practical cryptocurrency in human history. The chapter first introduces the histo...
Conference Paper
Proof of Stake (PoS) has been talked about extensively as an alternative way of reaching consensus in blockchain systems. However, there are few publications on how PoS can be used to create new blocks in detail. The undisputed lead proponent for PoS is Ethereum. However, virtually all discussions regarding PoS for Ethereum are centered on selectin...
Article
Full-text available
With the rapid development of Internet of Things (IoT) technologies, the detection and analysis of malware have become a matter of concern in the industrial application of Cyber-Physical System (CPS) that provides various services using the IoT paradigm. Currently, many advanced machine learning methods such as deep learning are popular in the rese...
Article
Full-text available
Blockchain is a disruptive technology for building consensus and trust in a peer-to-peer network without centralized control. It was first used in bitcoin, the very first cryptocurrency released at the beginning of 2009, to implement a secure ledger of transactions. This secure ledger ensures that once a transaction is placed in the ledger, it cann...
Article
Full-text available
In the last decade, we have seen rapid development of electronic technologies that are transforming our daily lives [...]
Article
As the application of the Industrial Internet of Things (IIoT) becomes more widespread, the IIoT is being combined with social networks. Nodes in the network can be users, machines, which can communicate with each other and make ratings. These ratings can be modeled as directed weighted edges and form directed weighted networks (DWNs). The edge wei...
Article
Full-text available
The second IEEE International Conference on Knowledge Innovation and Invention 2019 (IEEE ICKII 2019) was held in Seoul, South Korea, 12–15 July 2019. This special issue “Intelligent Electronic Devices” selects 13 excellent papers form 260 papers presented in IEEE ICKII 2019 conference about the topics of Intelligent Electronic Devices. The main go...
Article
Full-text available
The detection of recorded epileptic seizure activity in electroencephalogram (EEG) segments is crucial for the classification of seizures. Manual recognition is a time-consuming and laborious process that places a heavy burden on neurologists, and hence, the automatic identification of epilepsy has become an important issue. Traditional EEG recogni...
Article
Full-text available
Magnetic resonance (MR) images are often contaminated by Gaussian noise, an electronic noise caused by the random thermal motion of electronic components, which reduces the quality and reliability of the images. This paper puts forward a hybrid denoising algorithm for MR images based on two sparsely represented morphological components and one resi...
Article
This Special Issue on “Selected papers from IEEE ICKII 2019” selected 13 excellent papers from 260 papers presented in IEEE ICKII 2019 on topics in energies. The fields include: energy fundamentals, energy sources and energy carriers, energy exploration, intermediate and final energy use, energy conversion systems, and energy research and developme...
Article
Full-text available
Alzheimer’s disease (AD), which most commonly occurs in the elder, is a chronic neurodegenerative disease with no agreed drugs or treatment protocols at present. Amnestic mild cognitive impairment (aMCI), earlier than AD onset and later than subjective cognitive decline (SCD) onset, has a serious probability of converting into AD. The SCD, which ca...
Article
Recently, the extraction of valid information from big data has witnessed a growing interest. Nowadays, in social networks, large parts of websites collect user profiles to provide some valuable information through personalized recommendation. Among the available recommendation algorithms, collaborative filtering (CF) is one of the most popular alg...
Article
Full-text available
More recently, extreme learning machine (ELM) has emerged as a novel computing paradigm that enables the neural network (NN) based learning to be achieved with fast training speed and good generalization performance. However, the single hidden layer NN using ELM may be not effective in addressing some large-scale problems with more computational ef...
Chapter
In this chapter, we describe a system that provides continuous localization and behavioral analysis of a person’s motion pattern over an indoor living space using multiple Kinect sensors. The skeleton data from all sensors is transferred to the host computer via TCP sockets into a program where the data is integrated into a single world coordinate...
Article
Full-text available
The past decade has witnessed the rapid advancements of geological data analysis techniques, which facilitates the development of modern agricultural systems. However, there remains some technical challenges that should be addressed to fully exploit the potential of those geological big data, while gathering massive amounts of data in this applicat...
Chapter
In this paper, we report our work on baseball pitch type recognition based on broadcast videos using two-stream inflated 3D convolutional neural network (I3D). To improve the state-of-the-art of research, we developed our own high-quality dataset, trained and tuned the I3D model extensively, primarily combating the problem of overfitting while stil...
Chapter
In this paper, we report our work on developing a new dataset for baseball pitch type recognition based on youtube videos of the US Major League Baseball games. The core innovation is a largely automated procedure to extract relevant clips from the full game, and automatically label the clips by aligning the infographic information included in the...
Chapter
With the rapid development of CPS technology, the identification and detection of malware has become a matter of concern in the industrial application of CPS. Currently, advanced machine learning methods such as deep learning are popular in the research of malware identification and detection, and some progress has been made so far. However, there...
Article
Full-text available
Kernel adaptive filtering (KAF) is an effective nonlinear learning algorithm, which has been widely used in time series prediction. The traditional KAF is based on the stochastic gradient descent (SGD) method, which has slow convergence speed and low filtering accuracy. Hence, a kernel conjugate gradient (KCG) algorithm has been proposed with low c...
Article
IoT (Internet of Things) involves a wide range of fields, and its application scenarios are complex and diverse. Failure of security defense in any link of IoT may lead to huge information leakage and immeasurable losses. IoT security problem is affecting and restricting its application prospect, and has become one of the hotspots in the field of I...
Article
Full-text available
Electronic Engineering and Design Innovations are both academic and practical engineering fields that involve systematic technological materialization through scientific principles and engineering designs [...]
Conference Paper
Full-text available
Neural network system, a portion of artificial intelligence, is increasingly becoming prevalent nowadays. This paper presents a pedagogical study applied in a neural network field. The application of neural network models to function approximation is one of the latest developments in electrical engineering including robotics motion planning and nav...
Article
Electroporation is an important pathway to transport material such as drugs, genes and ions into biological cells. Here we perform simulations to predict the pore density and transmembrane potential due to high-intensity, ultra-short duration electrical pulses. Explicit account is taken of the strain energy. Our continuum model results demonstrate...
Article
In recent years, more and more wearable senors have been employed in smart health applications. Wearable sensors not only can be used to collect valuable health-related data of their users, they can be also used in conjunction with other infrastructure-bound sensors, such as Microsoft Kinect sensor, to facilitate privacy-aware fine-grained activity...
Article
The aim of this article is to show that the absolute measurement difference between the Kinect-based system and the marker-based system for the sit-to-stand exercise is less important provided that the difference is caused by systematic errors in the Kinect measurement. Three healthy individuals participated in this study. Marker trajectories and K...
Article
Full-text available
In the past several years, we have seen dramatic advancements in many sectors enabled by the use of computing and networking technologies. This development has resulted in many emerging, highly multi-disciplinary research areas typically termed as smart- technologies, including smart-healthcare, smart-home, smart-grid, as well as smart vehicles and...
Chapter
Microsoft Kinect is one of the most popular inexpensive gadgets released in recent years. Kinect is equipped with a color camera, a depth camera, and a microphone array. The device allows users to interact with a computer via a natural user interface in terms of gestures or voice commands. The authors believe that the research and development on us...
Chapter
In this chapter, the authors present the justification and a feasibility study of applying the Byzantine fault tolerance (BFT) technology to electric power grid health monitoring. They propose a set of BFT mechanisms needed to handle the PMU data reporting and control commands issuing to the IEDs. They report an empirical study to assess the feasib...
Chapter
In this chapter, the authors present an overview of recent works on enhancing the trustworthiness of web services coordination for business activities and transactions. The approach is based on what they call application-aware Byzantine fault tolerance. They argue that it is impractical to apply general-purpose Byzantine fault tolerance algorithms...
Chapter
In this chapter, the authors present their work on a validation study of using Microsoft Kinect to monitor rehabilitation exercises. Differing from other validation efforts, the authors focus on a system-level assessment instead of the joint-level comparison with reference motion capture systems. They assess the feasibility of using Kinect by exami...
Chapter
The use of good random numbers is crucial to the security of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious issue arises (i.e., how do we preserve the integrity of the systems while ensuring strong replica consistency?). Despite the fact that there exists a large body of work on how...
Chapter
The authors believe that the research and development of intrusion tolerant systems will gain more momentum as more and more services are offered online. The expectation of such services is high, considering their essential roles in everyday operations of businesses and individuals as well. The impact of service unavailability and security breaches...
Chapter
In this chapter, the authors point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications but also intend to eliminate malicious intrusions to prot...
Article
Full-text available
One of the current and biggest problems in the system of emergency care for the drug overdose epidemic is the failure of information delivery on nearby treatment facilities. Even though some initiatives have tried to solve this issue, they either failed in delivering the information or in providing good usability. This paper presents the design and...
Article
More recently, wind speed forecasting as an effective computing technique currently plays an important role in advancing industry informatics, while dealing with those issues of control and operation for renewable power systems. However, it is facing some increasing difficulties to handle the large-scale dataset generated in these forecasting appli...
Article
Full-text available
Currently, there is a growing demand for the use of communication network bandwidth for the Internet of Things (IoT) within the cyber-physical-social system (CPSS), while needing progressively more powerful technologies for using scarce spectrum resources. Then, cognitive radio networks (CRNs) as one of those important solutions mentioned above, ar...
Article
Full-text available
In this paper, we propose a new model of memristive multidirectional associative memory neural networks, which concludes the time-varying delays in leakage terms via sampled-data control. We use the input delay method to turn the sampling system into a continuous time-delaying system. Then we analyze the exponential stability and asymptotic stabili...