Author of the publication

Advanced technologies for homeland defense and security.

, , , and . J. Network and Computer Applications, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pattern Recognition Methods in Analisys of Selected Neurodengerative Lesions., , and . Bio-Algorithms and Med-Systems, 6 (12-S): 153-154 (2010)Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation., and . IMIS, page 182-185. IEEE Computer Society, (2011)Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks., and . IMIS, page 166-170. IEEE, (2015)Secure ubiquitous computing., , , and . Pervasive and Mobile Computing, (2015)Recent Advances in Pattern Classification., and . Computational Intelligence Paradigms in Advanced Pattern Classification, volume 386 of Studies in Computational Intelligence, Springer, (2012)Automatic understanding of selected diseases on the basis of structural analysis of medical images., and . ICASSP, page 2009-2012. IEEE, (2001)On Using Cognitive Models in Cryptography., and . AINA, page 1055-1058. IEEE Computer Society, (2016)Computer-Aided Enterprise Management., and . 3PGCIC, page 282-285. IEEE Computer Society, (2014)Visualization of perfusion abnormalities with GPU-based volume rendering., and . Computers & Graphics, 36 (3): 163-169 (2012)Syntactic reasoning and pattern recognition for analysis of coronary artery images., and . Artificial Intelligence in Medicine, 26 (1-2): 145-159 (2002)