default search action
Zhengbing Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Waldemar Wójcik, Zhengbing Hu, Yuriy Ushenko, Andrzej Smolarz, Iryna Soltys, Oleksander Dubolazov, Oleksander Ushenko, Olexandra Litvinenko, Ivan Mikirin, Ivan Gordey, Oleksandr Pavlyukovich, Sergii Pavlov, Natalia Pavlyukovich, Saltanat Amirgaliyeva, Aliya Kalizhanova, Zhalau Aitkulov:
Optical Sensor System for 3D Jones Matrix Reconstruction of Optical Anisotropy Maps of Self-Assembled Polycrystalline Soft Matter Films. Sensors 24(5): 1589 (2024) - 2023
- [c31]Feng Guo, Donghui Niu, Guoling Zhang, Na Hou, Zhengbing Hu:
Analysis and Forecast of Subway Construction Cost Based on Bayesian Network. IDAACS 2023: 519-524 - [c30]Feng Guo, Guoling Zhang, Junying Hao, Donghui Niu, Zhengbing Hu:
Analysis of Extracting Core Cost of Subway Project by Linear Discrimination Method Based on Principal Component Analysis. IDAACS 2023: 525-530 - [c29]Xi Xinwen, Iryna Davydova, Olena Marina, Serhii Marin, Zhengbing Hu:
Analysis of project activities of libraries of the People's Republic of China. SCIA 2023: 184-195 - [e4]Sergiy Gnatyuk, Zhengbing Hu, Roman Odarchenko, Jamil Al-Azzeh, Maksym Zaliskyi:
2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), Kyiv, Ukraine, November 30, 2022. CEUR Workshop Proceedings 3530, CEUR-WS.org 2023 [contents] - [i6]Serhiy Balovsyak, Oleksandr Derevyanchuk, Hanna Kravchenko, Yuriy Ushenko, Zhengbing Hu:
Clustering Students According to their Academic Achievement Using Fuzzy Logic. CoRR abs/2312.10047 (2023) - 2022
- [c28]Zhengbing Hu, Mark Last, Tzung-Pei Hong, Oleksii K. Tyshchenko, Esha Kashyap:
A Noise Resistant Credibilistic Fuzzy Clustering Algorithm on a Unit Hypersphere with Illustrations Using Expression Data. ISDMCI 2022: 564-590 - 2021
- [c27]Yongjun Peng, Rui Guo, Zheng Dai, Xuehui Yang, Anping Wan, Zhengbing Hu:
Fault Diagnosis of Communication Equipment Gear based on Deep Learning. IDAACS 2021: 797-801 - 2020
- [c26]Oleksandr Lemeshko, Maryna Yevdokymenko, Zhengbing Hu, Oleksandra Yeremenko:
Inter-domain routing method under normalized quality of service based on hierarchical coordination. CMIS 2020: 394-408 - [e3]Solomiia Fedushko, Sergiy Gnatyuk, Andriy Peleshchyshyn, Zhengbing Hu, Roman Odarchenko, Igor Korobiichuk:
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Lviv, Ukraine, November 29, 2019. CEUR Workshop Proceedings 2588, CEUR-WS.org 2020 [contents] - [e2]Sergiy Gnatyuk, Solomiia Fedushko, Zhengbing Hu, Roman Odarchenko, Yuriy Syerov, Andriy Peleshchyshyn, Igor Korobiichuk:
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019. CEUR Workshop Proceedings 2654, CEUR-WS.org 2020 [contents]
2010 – 2019
- 2019
- [j24]Zhengbing Hu, Vadym E. Mukhin, Yaroslav Kornaga, Oksana Herasymenko, Yevgenii Mostoviy:
The Analytical Model for Distributed Computer System Parameters Control Based on Multi-factoring Estimations. J. Netw. Syst. Manag. 27(2): 351-365 (2019) - [c25]Serhii Bulba, Nina Kuchuk, Anna Semenova, Zhengbing Hu:
Transaction Planning Methods in Hyperconverged Architecture Systems. CMiGIN 2019: 35-46 - [c24]Pylyp Prystavka, Olha Cholyshkina, Zhengbing Hu:
Increasing the Image Sharpness with Linear Operator for Social Internet-Services. CMiGIN 2019: 173-182 - [c23]Andrii Gizun, Vladyslav Hriha, Maria Roshchuk, Yaroslav Yevchenkoand, Zhengbing Hu:
Method of Informational and Psychological Influence Evaluation in Social Networks Based on Fuzzy Logic. COAPSN 2019: 1-11 - [c22]Zhengbing Hu, Viacheslav Liskin, Sergiy Syrota, Olha Cholyshkina, Nurgul A. Seilova:
Ontology-Based Model of Information Technology for E-Learning Systems. COAPSN 2019: 230-241 - [c21]Zhengbing Hu, Volodymyr Buriachok, Volodymyr Sokolov:
Implementation of Social Engineering Attack at Institution of Higher Education. CybHyg 2019: 155-164 - [c20]Zhengbing Hu, Sergiy Gnatyuk, Tetyana Okhrimenko, Vasyl Kinzeryavyy, Maksim Iavich, Khalicha Yubuzova:
High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits. ICTERI Workshops 2019: 810-821 - [c19]Zhengbing Hu, Yevhen Vasiliu, Oleksii Smirnov, Viktoriia Sydorenko, Yuliia Polishchuk:
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems. IDAACS 2019: 399-405 - 2018
- [j23]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Olena O. Boiko:
A neuro-fuzzy Kohonen network for data stream possibilistic clustering and its online self-learning procedure. Appl. Soft Comput. 68: 710-718 (2018) - [j22]Zhengbing Hu, Sergey V. Petoukhov, Elena S. Petukhova:
On symmetries, resonances and photonic crystals in morphogenesis. Biosyst. 173: 165-173 (2018) - [j21]Jamil Al-Azzeh, Abdelwadood Mesleh, Zhengbing Hu, Roman Odarchenko, Sergiy Gnatyuk, Anastasiia Abakumova:
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks. Int. J. Commun. Networks Inf. Secur. 10(3) (2018) - [c18]Zhengbing Hu, Oleksii K. Tyshchenko:
A Hybrid Neuro-Fuzzy Element: A New Structural Node for Evolving Neuro-Fuzzy Systems. DSMP 2018: 402-406 - 2017
- [c17]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko:
A hybrid growing ENFN-based neuro-fuzzy system and its rapid deep learning. CSIT (1) 2017: 514-519 - [c16]Zhengbing Hu, Vadym E. Mukhin, Yaroslav Kornaga, Artem Volokyta, Oksana Herasymenko:
The scheduler for distributed computer systems based on the network centric approach to resources control. IDAACS 2017: 518-523 - [i5]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Viktoriia O. Samitova:
Fuzzy Clustering Data Given in the Ordinal Scale. CoRR abs/1701.03571 (2017) - [i4]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Viktoriia O. Samitova:
Fuzzy Clustering Data Given on the Ordinal Scale Based on Membership and Likelihood Functions Sharing. CoRR abs/1702.01200 (2017) - 2016
- [c15]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko:
A cascade deep neuro-fuzzy system for high-dimensional online possibilistic fuzzy clustering. CSIT 2016: 119-122 - [c14]Zhengbing Hu, Vitaly Deibuk:
New design of reversible/quantum devices for ternary arithmetic. DSMP 2016: 80-84 - [c13]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko:
A deep cascade neuro-fuzzy system for high-dimensional online fuzzy clustering. DSMP 2016: 318-322 - [c12]Zhengbing Hu, Vladimir Jotsov, Su Jun, Orest Kochan, Mykola Mykyichukk, Roman V. Kochan, Taras Sasiuk:
Data science applications to improve accuracy of thermocouples. IEEE Conf. on Intelligent Systems 2016: 180-188 - [i3]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Olena O. Boiko:
An Evolving Cascade System Based on A Set Of Neo Fuzzy Nodes. CoRR abs/1610.06484 (2016) - [i2]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Olena O. Boiko:
Adaptive Forecasting of Non-Stationary Nonlinear Time Series Based on the Evolving Weighted Neuro-Neo-Fuzzy-ANARX-Model. CoRR abs/1610.06486 (2016) - [i1]Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Olena O. Boiko:
An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering. CoRR abs/1610.06490 (2016) - 2015
- [j20]Zhiwei Ye, Mingwei Wang, Zhengbing Hu, Wei Liu:
An Adaptive Image Enhancement Technique by Combining Cuckoo Search and Particle Swarm Optimization Algorithm. Comput. Intell. Neurosci. 2015: 825398:1-825398:12 (2015) - [c11]Vasyl Yatskiv, Taras Tsavolyk, Zhengbing Hu:
Multiple error detection and correction based on modular arithmetic correcting codes. IDAACS 2015: 850-854 - 2013
- [c10]Vasyl Yatskiv, Nataliya Yatskiv, Su Jun, Anatoly Sachenko, Zhengbing Hu:
The use of modified correction code based on residue number system in WSN. IDAACS 2013: 513-516 - 2012
- [j19]Wenbin Hu, Zhengbing Hu, Lei Shi, Peng Luo, Wei Song:
Combinatorial Optimization and Strategy for Ship Stowage and Loading Schedule of Container Terminal. J. Comput. 7(8): 2078-2092 (2012) - [j18]Chuiwei Lu, Zhengbing Hu:
A Fuzzy Search Algorithm for Structured P2P Network Based on Multi-dimensional Semantic Matrix. J. Networks 7(2): 377-384 (2012) - [j17]Zhiwei Ye, Zhengbing Hu, Xudong Lai, Hongwei Chen:
Image Segmentation Using Thresholding and Swarm Intelligence. J. Softw. 7(5): 1074-1082 (2012) - 2011
- [j16]Wenbin Hu, Zhengbing Hu, Yuheng Cheng, Hai Zhang, Wei Song:
Modeling and Simulation on Dynamic Allocation and Scheduling of Multi-resource problem. J. Comput. 6(7): 1369-1377 (2011) - [j15]Zhengbing Hu, Huaiqing Lin, Yonghong Zhou:
A Fuzzy Reputation Management System with Punishment Mechanism for P2P Network. J. Networks 6(2): 190-197 (2011) - [j14]Huaiqing Lin, Zhengbing Hu, Yonghong Zhou:
An Efficient Secure Multicast Communication for P2P Network. J. Networks 6(3): 408-415 (2011) - [j13]Matthew He, Zhengbing Hu:
Foreword. J. Supercomput. 58(1): 1-3 (2011) - 2010
- [j12]Yongjun Peng, Zhengbing Hu, Xi Guo:
Research on the Evolution Law and Response Capability Based on Resource Allocation Model of Unconventional Emergency. J. Comput. 5(12): 1899-1906 (2010) - [j11]Zhitang Li, Jun Hu, Zhengbing Hu, Bingbing Wang, Liang Tang, Xin Yi:
Measuring the botnet using the second character of bots. J. Networks 5(1): 98-105 (2010) - [j10]Wenbin Hu, Zhengbing Hu, Fu-qiang Yang, Cunlian Fan, Lei Wang, Xin-long Tan:
Control Strategy of Scheduling Invalidation of Data Broadcasting. J. Networks 5(1): 106-111 (2010) - [j9]Feng Liu, Zhitang Li, Zhengbing Hu, Lijuan Zhou, Bin Liu, Junfeng Yu:
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic. J. Networks 5(5): 577-585 (2010) - [j8]Gengsheng Zheng, Zhengbing Hu:
A Clustering Protocol Using Multiple Chain Strategy in WSNs. J. Networks 5(5): 586-593 (2010) - [j7]Wei Song, Wenbin Hu, Zhengbing Hu, Xi Zeng:
Reliable Resource Search in Scale Free Peer-to-Peer Network. J. Networks 5(11): 1365-1372 (2010) - [j6]Gengsheng Zheng, Zhengbing Hu:
Tree Routing Protocol with Location-based Uniformly Clustering Strategy in WSNs. J. Networks 5(11): 1373-1380 (2010) - [j5]Shibin Su, Zhengbing Hu:
Conflict Analysis between Information Sharing and Webpage Propriety in Webpage of EC: Evident from China. J. Softw. 5(11): 1300-1305 (2010) - [c9]Hong Lu, Zhengbing Hu:
Study on the Virtual Learning Environment Construction Based on Virtools. DBTA 2010: 1-5 - [c8]Li-shuang Wei, Wei Song, Wenbin Hu, Zhengbing Hu:
Using Network Coding Make P2P Content Sharing Scalable. DBTA 2010: 1-4 - [e1]Zhengbing Hu, Ping Ma:
Second International Workshop on Database Technology and Applications, DBTA 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings. IEEE 2010, ISBN 978-1-4244-6977-2 [contents]
2000 – 2009
- 2009
- [j4]Zhengbing Hu, Kai Du:
Towards High Availability and Performance Database Clusters for Archived Stream. J. Comput. 4(12): 1332-1339 (2009) - [j3]Tao Sheng, Jingli Zhou, Zhengbing Hu:
Error Resilient Video Transmission over Wireless Networks Based on Wyner-Ziv Coding of Motion Regions. J. Networks 4(9): 905-912 (2009) - [j2]Zhengbing Hu, Kai Du:
A Novel Approach to Improve Availability of Massive Database Systems (MDS). J. Softw. 4(10): 1145-1151 (2009) - [c7]Zhengbing Hu, Rabah Moh'd, Al Shboul:
The Application of Ant Colony Optimization Technique (ACOT) for Employees Selection and Training. DBTA 2009: 497-502 - [c6]Junqi Wu, Zhengbing Hu, Yang Zongkai, Liu Yumei:
Design of Collaborative Learning in Cyber-Schools. DBTA 2009: 703-706 - 2008
- [j1]Kai Du, Zhengbing Hu, Huaimin Wang, Yingwen Chen, Shuqiang Yang, Zhijian Yuan:
Reliability Design for Large Scale Data Warehouses. J. Comput. 3(10): 78-85 (2008) - [c5]Zhengbing Hu, Zhitang Li, Junqi Wu:
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. e-Forensics 2008: 45 - [c4]Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm. ISECS 2008: 114-117 - [c3]Zhengbing Hu, Zhitang Li, Junqi Wu:
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. WKDD 2008: 10-16 - [c2]Zhengbing Hu, Zhou Ji, Ping Ma:
A Novel Anomaly Detection Algorithm Based on Real-Valued Negative Selection System. WKDD 2008: 499-502 - 2007
- [c1]Zhengbing Hu, Xiaomin Han:
A QoS Provisioning MAC Protocol for IEEE 802.11 WLANs. ICESS 2007: 718-727
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint