Determination of structural parameters of multilayer perceptron designed to estimate parameters of technical systems Z Hu, IA Tereykovskiy, LO Tereykovska, VV Pogorelov International Journal of Intelligent Systems and Applications 9 (10), 57, 2017 | 97 | 2017 |
Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior Z Hu, R Odarchenko, S Gnatyuk, M Zaliskyi, A Chaplits, S Bondar, ... International Journal of Computer Network and Information Security 9 (6), 1, 2020 | 92 | 2020 |
High-speed and secure PRNG for cryptographic applications Z Hu, S Gnatyuk, T Okhrimenko, S Tynymbayev, M Iavich International Journal of Computer Network and Information Security 12 (3), 1-10, 2020 | 77 | 2020 |
A multidimensional extended neo-fuzzy neuron for facial expression recognition Z Hu, YV Bodyanskiy, NY Kulishova, OK Tyshchenko International Journal of Intelligent Systems and Applications (IJISA) 9 (9 …, 2017 | 74 | 2017 |
Method for optimization of information security systems behavior under conditions of influences Z Hu, Y Khokhlachova, V Sydorenko, I Opirskyy International Journal of Intelligent Systems and Applications 9 (12), 46, 2017 | 64 | 2017 |
Increasing the data transmission robustness in WSN using the modified error correction codes on residue number system A Sachenko, H Zhengbing, V Yatskiv Elektronika ir elektrotechnika 21 (1), 76-81, 2015 | 62 | 2015 |
Procedure for processing biometric parameters based on wavelet transformations Z Hu, I Tereikovskyi, D Chernyshev, L Tereikovska, O Tereikovskyi, ... International Journal of Modern Education and Computer Science 15 (2), 11, 2021 | 58 | 2021 |
Artificial neural network training criterion formulation using error continuous domain Z Hu, M Ivashchenko, L Lyushenko, D Klyushnyk Int. j. mod. educ. comput. sci 13, 13-22, 2021 | 55 | 2021 |
Video shots’ matching via various length of multidimensional time sequences Z Hu, SV Mashtalir, OK Tyshchenko, MI Stolbovyi International Journal of Intelligent Systems and Applications 9 (11), 10, 2017 | 50 | 2017 |
Anomaly detection system in secure cloud computing environment Z Hu, S Gnatyuk, O Koval, V Gnatyuk, S Bondarovets International Journal of Computer Network and Information Security 9 (4), 10, 2017 | 45 | 2017 |
Blind payment protocol for payment channel networks Z Hu, I Dychka, M Onai, Y Zhykin International Journal of Computer Network and Information Security 9 (6), 22, 2019 | 44 | 2019 |
An adaptive image enhancement technique by combining cuckoo search and particle swarm optimization algorithm Z Ye, M Wang, Z Hu, W Liu Computational intelligence and neuroscience 2015 (1), 825398, 2015 | 41 | 2015 |
Fuzzy clustering data arrays with omitted observations Z Hu, YV Bodyanskiy, OK Tyshchenko, VM Tkachov International Journal of Intelligent Systems and Applications (IJISA) 9 (6 …, 2017 | 40 | 2017 |
Analysis of self-similar traffic models in computer networks JS Al-Azzeh, M Al Hadidi, R Odarchenko, S Gnatyuk, Z Shevchuk, Z Hu International Review on Modelling and Simulations 10 (5), 328-336, 2017 | 39 | 2017 |
The use of modified correction code based on residue number system in WSN V Yatskiv, N Yatskiv, S Jun, A Sachenko, H Zhengbing 2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013 | 37 | 2013 |
Fuzzy clustering data given in the ordinal scale Z Hu, YV Bodyanskiy, OK Tyshchenko, VO Samitova arXiv preprint arXiv:1701.03571, 2017 | 36 | 2017 |
Possibilistic fuzzy clustering for categorical data arrays based on frequency prototypes and dissimilarity measures Z Hu, YV Bodyanskiy, OK Tyshchenko, VO Samitova International Journal of Intelligent Systems and Applications 9 (5), 55, 2017 | 34 | 2017 |
Graphical data steganographic protection method based on bits correspondence scheme Z Hu, I Dychka, Y Sulema, Y Radchenko International Journal of Intelligent Systems and Applications 9 (8), 34, 2017 | 33 | 2017 |
Development and operation analysis of spectrum monitoring subsystem 2.4–2.5 GHz range Z Hu, V Buriachok, I Bogachuk, V Sokolov, D Ageyev Data-Centric Business and Applications: ICT Systems-Theory, Radio …, 2020 | 32 | 2020 |
Method of searching birationally equivalent Edwards curves over binary fields Z Hu, S Gnatyuk, M Kovtun, N Seilova Advances in Computer Science for Engineering and Education 13, 309-319, 2019 | 32 | 2019 |