Zenghui Wang

Zenghui Wang
  • PhD
  • Professor (Full) at University of South Africa

About

235
Publications
122,779
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,138
Citations
Current institution
University of South Africa
Current position
  • Professor (Full)

Publications

Publications (235)
Article
This research presents a novel approach to multilayer perceptron's (MLP) hyper-parameter optimization in solving learner migration problems in Limpopo, South Africa. While acknowledging the presence of various hyper-parameter optimization techniques, their applicability, strengths, and limitations differ. Our approach utilizes meta-heuristics, offe...
Article
Full-text available
Extension of the feeders and high power demand have resulted in more substantial power dissipation and reduced voltage decline. Therefore, minimizing power loss and enhancing the voltage profile are imperative for efficient energy distribution. This research introduces a novel approach called the Hybrid Archimedes Optimization Algorithm (HAOA), whi...
Conference Paper
Since the effusion of Industry 4.0 (I40) and smart manufacturing, predictive maintenance (PdM) has become critical to prevent severe system breakdowns and costly production downtime in various industries. Several state-of-the-art Artificial Intelligence (AI) approaches, such as machine learning models (ML), empower the PdM design concept to produce...
Article
The South African Education Management Information Systems (EMIS) hosts longitudinal data on school inventory, learners, and educators. One of the most prevailing and yet ignored phases in machine learning is Feature Selection (FS). Neglecting this phase can adversely impact the outcome of the machine-learning exercise. This study seeks to explore...
Article
The South African Education Management Information Systems (EMIS) hosts longitudinal data on school inventory, learners, and educators. One of the most prevailing and yet ignored phases in machine learning is Feature Selection (FS). Neglecting this phase can adversely impact the outcome of the machine-learning exercise. This study seeks to explore...
Article
The detection of human emotions from speech signals remains a challenging frontier in audio processing and human-computer interaction domains. This study introduces a novel approach to Speech Emotion Recognition (SER) using a Dendritic Layer combined with a Capsule Network (DendCaps). A Convolutional Neural Network (NN) and a Long Short-Time Neural...
Article
The effectiveness of deep learning networks in detecting small objects is limited, thereby posing challenges in addressing practical object detection tasks. In this research, we propose a small object detection model that operates at multiple scales. The model incorporates a multi-level bidirectional pyramid structure, which integrates deep and sha...
Article
Full-text available
Credit risk prediction is a crucial task for financial institutions. The technological advancements in machine learning, coupled with the availability of data and computing power, has given rise to more credit risk prediction models in financial institutions. In this paper, we propose a stacked classifier approach coupled with a filter-based featur...
Article
Full-text available
Intrusion detection systems play a critical role in the mitigation of cyber-attacks on the Internet of Things (IoT) environment. Due to the integration of many devices within the IoT environment, a huge amount of data is generated. The generated data sets in most cases consist of irrelevant and redundant features that affect the performance of the...
Chapter
The capabilities of artificial intelligence (AI) and deep Learning are increasing rapidly with the increasing computing power and specialized microprocessors. A very interesting architecture, generative adversarial networks (GANs), is at the forefront of innovation. Some examples of what GAN networks are used for are text-to-image translation, imag...
Article
Full-text available
The electrical power system (EPS) has been heavily stressed due to high load demand. It operates close to the total capacity limits, resulting in voltage instability that can lead to voltage collapse. In this regard, incorporating flexible alternating current transmission system (FACTS) devices and renewable energy sources (RESs) to obtain the opti...
Article
Full-text available
This study compares the performance of stream clustering algorithms (DenStream, CluStream, ClusTree) on Massive Online Analysis (MOA) using synthetic and real-world datasets. The algorithms are compared in the presence on noise level [0%, 10%, 30%] on the synthetic data. DenStream epsilon parameter was tune to 0.01 and 0.03 to improve its performan...
Chapter
Parameter specification remains a difficult task in data stream clustering as density-based algorithms hyperparameters tuning to their optimal values are often difficult to determine. This paper investigates the sensitivity of parameter tuning on DenStream, a data stream clustering algorithm. The effects on different noise levels are evaluated for...
Conference Paper
System identification is a very critical process in a control system aiming to determine the system dynamics of practical processes before devising an adequate control approach. Several metaheuristic approaches have been used for the parametric estimation of nonlinear systems, ranging from classical to new-generation metaheuristics. Nevertheless, t...
Chapter
The bat algorithm (BA) is a population-based optimization that mimics the echolocation of microbats when looking for prey and avoiding obstacles. BA is a unique algorithm that gives fast convergence and optimum solutions to a problem. Reactive power dispatch (RPD) plays a vital role in the control and operation of the power system and is part of th...
Chapter
Weak bus identification in power system networks is crucial for planning and operation since most generators operate close to their operating limits, resulting in generator failures. This work aims to identify the critical/weak node and reduce the system’s actual power losses. The line stability index (\({L}_{mn}\)) and fast voltage stability index...
Article
Full-text available
Identifying the weak buses in power system networks is crucial for planning and operation since most generators operate close to their operating limits, resulting in generator failures. This work aims to identify the critical/weak node and reduce the system’s power loss. The line stability index () and fast voltage stability index (FVSI) were used...
Article
Full-text available
The distillation process plays an essential role in the petrochemical industry. However, the high-purity distillation column has complicated dynamic characteristics such as strong coupling and large time delay. To control the distillation column accurately, we proposed an extended generalized predictive control (EGPC) method inspired by the princip...
Article
The voltage control problem due to bidirectional power flows is more apparent when heterogeneous distributed generation systems (DGS) are integrated into the grid. In this paper, a novel method of voltage control in distributed generation systems based on a reinforcement learning technique is proposed. DGS incorporating renewable energy resources a...
Article
Full-text available
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the nation’s meteorological and hydrological information is at ever-increasing risk, which calls for a prompt and in depth analysis of the network behavior and traffic to detect network attacks. Network attacks are becoming more diverse, with a large number of rare an...
Conference Paper
Full-text available
Fractional order PID tuning has surfaced as a substitute controller for PIDs offering better regulatory system operation with an additional increase in estimation parameters. Over the years, the three main representative metaheuristics global optimisation techniques (Genetic algorithm, differential evolution and particle swarm optimisation) have be...
Article
Full-text available
Electricity has become one of the most essential components of establishing a quality standard of living in any country. Consequently, considerable work has been focused on designing a sophisticated load frequency control (LFC) system. However, in light of limited resources and real-world challenges, computationally based control algorithms that ar...
Chapter
Wind power is the most promising renewable energy for its rich resources, low cost, and cleanliness. However, the intermittency of wind power would put the safety of the power system at risk. An effective method to solve this problem is making the power generation scheduling through wind power forecast. Due to the volatility and complex temporal de...
Conference Paper
This research presents a new key information extraction algorithm from shopping receipts. Specifically, we train semantic, visual and structural features through three deep learning methods, respectively, and formulate rule features according to the characteristics of shopping receipts. Then we propose a multi-class text classification algorithm ba...
Article
Full-text available
In this article, we present the recognition of nonintrusive disaggregated appliance signals through a reduced dataset computer vision deep learning approach. Deep learning data requirements are costly in terms of acquisition time, storage memory requirements, computation time, and dynamic memory usage. We develop our recognition strategy on Siamese...
Article
Full-text available
In the real applications, we found that it is difficult to achieve good control performance through manually tuning proportional–integral (PI) parameters of phase locked loop (PLL) and speed-loop of Luenberger observer (LO) for the PMSM sensorless control system. Therefore, this paper is to use the particle swarm optimization (PSO) algorithm to opt...
Article
This paper reports a method to derive a novel class of 3D generalized thermostatted oscillators from a simple damped harmonic oscillator. Its detailed procedure is obtained through a mathematical derivation. Then, we propose an example system to show the effectiveness of the method. Furthermore, the numerical analysis is performed to investigate it...
Article
There is an ever-increasing risk of illegal access-induced Network Intrusion (NI), which calls for prompt detection of illegal network behavior through profound Network Traffic (NT) analyses. However, current intrusion detection methods are limited in accuracy due to insufficient data standardization. This paper puts forward a deoxyribonucleic acid...
Article
Full-text available
Memristors are usually introduced into neuron models as neural synapses to investigate firing activities. In this paper, a novel generic memristor with smooth cosine memductance is proposed, and its dynamic characteristic concerning multistability, which is completely different from any known memristors, is analyzed and validated by numerical and P...
Conference Paper
Full-text available
Face recognition is the problem of identifying or recognizing individuals in an image. This paper investigates a possible method to bring a solution to this problem. The method proposes an amalgamation of Principal Component Analysis (PCA), K-Means clustering, and Convolutional Neural Network (CNN) for a face recognition system. It is trained and e...
Article
Full-text available
Loss of selection pressure in the presence of many objectives is one of the pertinent problems in evolutionary optimization. Therefore, it is difficult for evolutionary algorithms to find the best-fitting candidate solutions for the final Pareto optimal front representing a multi-objective optimization problem, particularly when the solution space...
Article
Full-text available
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and availability of the information system is essential. Intrusion detection systems (IDSs) have been widely used to monitor and secure networks. The two major limitations facing existing intrusion detection systems are high rates of false-positive alerts and lo...
Article
The chaotic system with complicated dynamical behaviors has high potential in practical applications. This paper reports a simple smooth 3D dynamical system that is derived from the Nosé-Hoover oscillator and has rich dynamical behaviors, such as fold-Hopf bifurcation, saddle-node bifurcation, transient chaos, and conservative chaos (hidden attract...
Article
Full-text available
The prediction of host human miRNA binding to the SARS-COV-2-CoV-2 RNA sequence is of particular interest. This biological process could lead to virus repression, serve as biomarkers for diagnosis, or as potential treatments for this disease. One source of concern is attempting to uncover the viral regions in which this binding could occur, as well...
Article
The object detector based on deep learning has received extensive attention, but the high computational cost has become an obstacle to its large-scale application. It is a great challenge for object detection to further reduce the hardware requirements on the premise of ensuring high detection accuracy. We propose a one-stage lightweight object det...
Article
Full-text available
Multiobjective evolutionary algorithm based on decomposition (MOEA/D) has attracted a lot of attention since it can handle multiobjective problems (MOP) with a complicated Pareto front. The procedure involves decomposing a MOP into single subproblems, which are eventually optimized simultaneously based on the MOP neighborhood information. However,...
Article
Full-text available
Distributed generation (DG) plays a vital role in electrical power networks. However, power loss reduction, voltage profile improvement, friendly environment, and reliability are all benefits of DG units. In this research work, a worthwhile methodology is recommended for optimal allocation of traditional (gas turbine) and renewable energy sources t...
Article
Full-text available
Abstract This paper proposes a new hybridised approach comprising the flower pollination algorithm and pathfinder algorithm (FPAPFA), in order to address optimisation problems and for load frequency control system. Although the FPA is a popular algorithm that has been widely used in diverse applications, its implementation is met with the tendency...
Conference Paper
Full-text available
In this paper, the suitability of audio features for application in speech-music discrimination was evaluated to select a feature set that produces high mean accuracy in the classification algorithm, while also reducing the total feature space. The first four standardized moments of twelve audio features were evaluated namely the mean, variance, sk...
Article
Wireless Sensor Networks (WSNs) create various security threats such as application variance in different sectors along with the model of cryptographic primitive and necessity. Although modernistic evolution, the skillful utilization of Elliptic Curve Cryptography (ECC) for WSNs is a very progressive investigation topic and approaches to reduce the...
Article
Full-text available
It is important to control the ship course in complicated ocean environment. In this paper, a Grey Wolf Optimization (GWO) based Active Disturbance Rejection Control (ADRC) tuning method is proposed in the application of the ship course. Here, GWO is used to tune the parameters of ADRC. To validate the performance of the proposed method, some simul...
Article
Full-text available
The recent advances of e-commerce and e-payment systems have sparked an increase in financial fraud cases such as credit card fraud. It is therefore crucial to implement mechanisms that can detect the credit card fraud. Features of credit card frauds play important role when machine learning is used for credit card fraud detection, and they must be...
Article
Full-text available
The industrial manufacturing sector is undergoing a tremendous revolution moving from traditional production processes to intelligent techniques. Under this revolution, known as Industry 4.0 (I40), a robot is no longer static equipment but an active workforce to the factory production alongside human operators. Safety becomes crucial for humans and...
Article
Full-text available
The high-purity distillation column system is strongly nonlinear and coupled, which makes it difficult to control. Active Disturbance Rejection Control (ADRC) has been widely used in distillation systems, but it has limitations in controlling distillation systems with large time delays since ADRC employs ESO and feedback control law to estimate the...
Article
Full-text available
The thermostatted system is a conservative system different from Hamiltonian systems, and has attracted much attention because of its rich and different nonlinear dynamics. We report and analyze the multiple equilibria and curve axes of the cluster-shaped conservative flows generated from a generalized thermostatted system. It is found that the clu...
Article
Inspired by the structure of the single-clew-shaped conservative chaotic flows generated from the Nosé–Hoover oscillator, the possible local dynamic behaviors of the thermostatted oscillator are discovered near the axis of the clew-shaped chaotic flows. Based on the formalism of the port-controlled Hamiltonian system, we propose a variant of the No...
Article
Full-text available
αBB is an elegant deterministic branch and bound global optimisation that guarantees global optimum convergence with minimal parameter tuning. However, the method suffers from a slow convergence speed calling for computational improvements in several areas. The current paper proposes hybridising the branch and bound process with particle swarm opti...
Article
Full-text available
The advance in technologies such as e-commerce and financial technology (FinTech) applications have sparked an increase in the number of online card transactions that occur on a daily basis. As a result, there has been a spike in credit card fraud that affects card issuing companies, merchants, and banks. It is therefore essential to develop mechan...
Article
Full-text available
The Industrial Internet of things (IIoT), the implementation of IoT in the industrial sector, requires a deterministic, real-time, and low-latency communication response for its time-critical applications. A delayed response in such applications could be life-threatening or result in significant losses for manufacturing plants. Although several mea...
Article
Full-text available
Compared with dissipative chaos, conservative chaos is more suitable for information encryption since it does not have attractors, therefore, it is important to construct different complicated conservative chaotic systems. This paper reports an effective approach to construct a class of 4D conservative systems based on the formalism of a generalize...
Article
The high-speed anti-ship missile might encounter a challenge in the terminal phase if there are mixed targets, including false and true ones. There is only a quite short time to take action after the onboard radar can distinguish which targets are true or false. In this study, a tunable acceleration feedback gain is used to realize a unique integra...
Preprint
Full-text available
The industrial manufacturing sector is currently undergoing a tremendous revolution moving from traditional production processes to intelligent techniques. Under this revolution, known as Industry 4.0 (I40), a robot is no longer a static equipment but an active workforce to the factory production alongside human operators. Safety becomes crucial fo...
Article
Full-text available
As the world’s population grows and energy demand increases, it is necessary to increase the scale of the electrical system, which is more complicated. Consequently, adopting automatic generation control (AGC) scheme to meet the demand becomes inevitable. In this article, the fusion of flower pollinated algorithm (FPA) and pathfinder algorithm (PFA...
Article
Full-text available
In this paper, a modified Sprott-C chaotic system is proposed based on Kolmogrov model, which shows rich dynamic behaviors, especially, the system divergence is related to the variables. To quantitatively evaluate the influence of variable divergence on phase space volume, the ultimate bound and equilibrium point of the system are analyzed and two...
Article
The influence of non-coding RNAs, such as lncRNAs (long non-coding RNAs) and miRNAs (microRNAs), is undeniable in several diseases, for example, in the formation of neoplasms and cancer scenarios. However, there are challenges due to the scarcity of validated datasets and the imbalance in the data. We found that the research of associations between...
Article
Full-text available
In this paper, a new type of non-volatile locally active memristor with bi-stability is proposed by injecting appropriate voltage pulses to realize a switching mechanism between two stable states. It is found that the memristive parameters of the new memristor can affect the local activity, which has been rarely reported, and this phenomenon is exp...
Article
Full-text available
The relationship between smart devices and human beings is one of the research hotspots of the Fourth Industrial Revolution (4IR). In this regard, we explored the practical relationship between the 3D electric field components measured by the smart 3D atmospheric electric field apparatus (AEFA) and the thunderstorm activity from the perspective of...
Article
Full-text available
Chaotic systems have high potential for engineering applications due to their extremely complex dynamics. In the paper, a five-dimensional (5D) Kolmogorov-like hyperchaotic system is proposed. First, the hyperchaotic property is uncovered, and numerical analysis shows that the system displays the coexistence of different kinds of attractors. This s...
Article
Full-text available
The discriminative correlation filter-based tracking algorithms cannot correctly track the target if the target is occluded or out of view and reappears in the field of vision, and they cannot ensure the tracking model is updated correctly if the tracking information is not correct. In this paper, a robust correlation tracking algorithm is proposed...
Article
One challenge in miRNA-genes-diseases interaction studies is that it is challenging to find labeled data that indicate a positive or negative relationship between miRNA and genes. The use of one-class classification methods shows a promising path for validating them. We have applied two one-class classification methods, Isolation Forest and One-cla...
Article
Full-text available
Pseudo-random number generator (PRNG) has been widely used in digital image encryption and secure communication. This paper reports a novel PRNG based on a generalized Sprott-A system that is conservative. To validate whether the system can produce high quality chaotic signals, we numerically investigate its conservative chaotic dynamics and the co...
Thesis
Full-text available
Medical data generated from hospitals are an increasing source of information for automatic medical diagnosis. These data contain latent patterns and correlations that can result in better diagnosis when appropriately processed. Most applications of machine learning (ML) to these patient records have focused on utilizing the ML algorithms directly,...
Preprint
Full-text available
In this paper, a new type of non-volatile locally active memristor with bi-stability is proposed by injecting appropriate voltage pulses to realize a switching mechanism between two stable states. It is found that the memristive parameters of the new memristor can affect the local activity, which has been rarely reported, and this phenomenon is exp...
Article
Full-text available
The prevailing competitive manufacturing industry calls for continuous customer satisfaction for business sustainability. With the emergence of the Industry 4.0 paradigm, product customization, which gives customers the means to personalized products to meet their needs, has become a strategy to increase companies’ value. High-tech manufacturing fi...
Article
Full-text available
The mains signal is a complex fusion of various electrical equipment load signals in a building. In the non-intrusive load monitoring recognition, our main aim is to be able to extract as much load features as possible from the complex aggregate mains signal in a simpler way through a computer vision-based approach as opposed to the powers series s...
Article
In recent years, Convolutional Neural Network (CNN) has been widely applied in speech/image/video recognition and classification. Although the results achieved are so impressive, CNN architecture is becoming more and more complex since CNN includes more layers to achieve better performance. In this paper, we developed a new CNN structure with sever...
Article
Full-text available
Lung cancer is the second most common form of cancer in both men and women. It is responsible for at least 25% of all cancer-related deaths in the United States alone. Accurate and early diagnosis of this form of cancer can increase the rate of survival. Computed tomography (CT) imaging is one of the most accurate techniques for diagnosing the dise...
Article
Full-text available
The near-space hypersonic aerodynamic glider has strong maneuverability in wide flight envelope. The glide is generally achieved in a smooth manner with no or weak altitude oscillations in the altitude. The maximum lift-to-drag ratio glide is a typical trajectory that can approximate the maximum glide range, which is a crucial indicator for a glide...
Conference Paper
Automatic Voltage Regulator (AVR) system is one of the major devices broadly used in many industrial applications for regulating the voltage of the synchronous generator within its nominal values. Consequently, providing a suitable controller for the AVR system becomes a necessity to prevent instability and error in the system’s output response. St...
Conference Paper
Full-text available
This paper presents the optimization of the fractional order proportional-integral-derivative (FOPID) controller with the hybrid particle swarm and grey wolf optimization (HPSGWO) algorithm in order to control the Automatic Voltage Regulator (AVR) system. To overcome the problem of premature convergence and enhance the efficiency of the proposed HP...
Article
Full-text available
Algorithms are used to optimize both single and multi-objective system limits. This research aimed to detect the optimal location and size of the DGs, which can significantly minimize power loss and improve the stability of the voltage. The research uses binary particle swarm optimization and shuffled frog leap (BPSO-SLFA) algorithms for simulation...
Article
This paper introduces novel concepts for accelerating learning in an off-policy reinforcement learning algorithm for Partially Observable Markov Decision Processes (POMDP) by leveraging multiple agents frame work. Reinforcement learning (RL) algorithm is considerably a slow but elegant approach to learning in an unknown environment. Although the ac...
Article
Full-text available
In a smart home, the nonintrusive load monitoring recognition scheme normally achieves high appliance recognition performance in the case where the appliance signals have widely varying power levels and signature characteristics. However, it becomes more difficult to recognize appliances with equal or very close power specifications, often with alm...
Chapter
Non-intrusive-load-monitoring (NILM) is normally based on power series analysis. In the load classification stage we use an image based deep convolutional neural network (DCNN) which is modelled on the biological visual cortex thereby achieving extremely high levels of object recognition and classification. However, the downsize to the DCNN is the...

Network

Cited By