Zhengbing Hu

According to our database1, Zhengbing Hu authored at least 58 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Clustering Students According to their Academic Achievement Using Fuzzy Logic.
CoRR, 2023

Analysis of project activities of libraries of the People's Republic of China.
Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), 2023

Analysis of Extracting Core Cost of Subway Project by Linear Discrimination Method Based on Principal Component Analysis.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Analysis and Forecast of Subway Construction Cost Based on Bayesian Network.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

2021
Fault Diagnosis of Communication Equipment Gear based on Deep Learning.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2020
Inter-domain routing method under normalized quality of service based on hierarchical coordination.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

2019
The Analytical Model for Distributed Computer System Parameters Control Based on Multi-factoring Estimations.
J. Netw. Syst. Manag., 2019

Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits.
Proceedings of the 15th International Conference on ICT in Education, 2019

Implementation of Social Engineering Attack at Institution of Higher Education.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Ontology-Based Model of Information Technology for E-Learning Systems.
Proceedings of the 1st International Workshop on Control, 2019

Method of Informational and Psychological Influence Evaluation in Social Networks Based on Fuzzy Logic.
Proceedings of the 1st International Workshop on Control, 2019

Increasing the Image Sharpness with Linear Operator for Social Internet-Services.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Transaction Planning Methods in Hyperconverged Architecture Systems.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

2018
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks.
Int. J. Commun. Networks Inf. Secur., 2018

On symmetries, resonances and photonic crystals in morphogenesis.
Biosyst., 2018

A neuro-fuzzy Kohonen network for data stream possibilistic clustering and its online self-learning procedure.
Appl. Soft Comput., 2018

A Hybrid Neuro-Fuzzy Element: A New Structural Node for Evolving Neuro-Fuzzy Systems.
Proceedings of the Second International Conference on Data Stream Mining & Processing, 2018

2017
Fuzzy Clustering Data Given on the Ordinal Scale Based on Membership and Likelihood Functions Sharing.
CoRR, 2017

Fuzzy Clustering Data Given in the Ordinal Scale.
CoRR, 2017

A hybrid growing ENFN-based neuro-fuzzy system and its rapid deep learning.
Proceedings of the 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, September 5-8, 2017, 2017

2016
An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering.
CoRR, 2016

Adaptive Forecasting of Non-Stationary Nonlinear Time Series Based on the Evolving Weighted Neuro-Neo-Fuzzy-ANARX-Model.
CoRR, 2016

An Evolving Cascade System Based on A Set Of Neo Fuzzy Nodes.
CoRR, 2016

Data science applications to improve accuracy of thermocouples.
Proceedings of the 8th IEEE International Conference on Intelligent Systems, 2016

New design of reversible/quantum devices for ternary arithmetic.
Proceedings of the First International Conference on Data Stream Mining & Processing, 2016

A deep cascade neuro-fuzzy system for high-dimensional online fuzzy clustering.
Proceedings of the First International Conference on Data Stream Mining & Processing, 2016

A cascade deep neuro-fuzzy system for high-dimensional online possibilistic fuzzy clustering.
Proceedings of the XIth International Scientific and Technical Conference Computer Sciences and Information Technologies, 2016

2015
An Adaptive Image Enhancement Technique by Combining Cuckoo Search and Particle Swarm Optimization Algorithm.
Comput. Intell. Neurosci., 2015

Multiple error detection and correction based on modular arithmetic correcting codes.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2013
The use of modified correction code based on residue number system in WSN.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

2012
Image Segmentation Using Thresholding and Swarm Intelligence.
J. Softw., 2012

A Fuzzy Search Algorithm for Structured P2P Network Based on Multi-dimensional Semantic Matrix.
J. Networks, 2012

Combinatorial Optimization and Strategy for Ship Stowage and Loading Schedule of Container Terminal.
J. Comput., 2012

2011
Foreword.
J. Supercomput., 2011

An Efficient Secure Multicast Communication for P2P Network.
J. Networks, 2011

A Fuzzy Reputation Management System with Punishment Mechanism for P2P Network.
J. Networks, 2011

Modeling and Simulation on Dynamic Allocation and Scheduling of Multi-resource problem.
J. Comput., 2011

2010
Conflict Analysis between Information Sharing and Webpage Propriety in Webpage of EC: Evident from China.
J. Softw., 2010

Tree Routing Protocol with Location-based Uniformly Clustering Strategy in WSNs.
J. Networks, 2010

A Clustering Protocol Using Multiple Chain Strategy in WSNs.
J. Networks, 2010

Reliable Resource Search in Scale Free Peer-to-Peer Network.
J. Networks, 2010

Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic.
J. Networks, 2010

Measuring the botnet using the second character of bots.
J. Networks, 2010

Control Strategy of Scheduling Invalidation of Data Broadcasting.
J. Networks, 2010

Research on the Evolution Law and Response Capability Based on Resource Allocation Model of Unconventional Emergency.
J. Comput., 2010

Using Network Coding Make P2P Content Sharing Scalable.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Study on the Virtual Learning Environment Construction Based on Virtools.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

2009
A Novel Approach to Improve Availability of Massive Database Systems (MDS).
J. Softw., 2009

Error Resilient Video Transmission over Wireless Networks Based on Wyner-Ziv Coding of Motion Regions.
J. Networks, 2009

Towards High Availability and Performance Database Clusters for Archived Stream.
J. Comput., 2009

Design of Collaborative Learning in Cyber-Schools.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

The Application of Ant Colony Optimization Technique (ACOT) for Employees Selection and Training.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

2008
Reliability Design for Large Scale Data Warehouses.
J. Comput., 2008

A Novel Anomaly Detection Algorithm Based on Real-Valued Negative Selection System.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A P2P E-commerce Related Network Security Issue: P2P Worm.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
A QoS Provisioning MAC Protocol for IEEE 802.11 WLANs.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007


  Loading...