2024
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024
Personal CAPTCHA-based authentication protocol.
Comput. Secur., February, 2024
Information Hiding in QR Codes using Segment Manipulation.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
Polymorphic Keys in Multi-secret Cryptography.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024
AI-Based Cybersecurity Systems.
Proceedings of the Advanced Information Networking and Applications, 2024
Towards User-Oriented Steganography.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Linguistic methods in healthcare application and COVID-19 variants classification.
Neural Comput. Appl., July, 2023
Cognitive CAPTCHA Password Reminder.
Sensors, March, 2023
Steganography in IoT: Information Hiding with Joystick and Touch Sensors.
Sensors, March, 2023
Context-Aware Approaches in Cognitive Cloud and Cybersecurity.
Proceedings of the Advances in Networked-based Information Systems, 2023
Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023
User-Oriented Solutions in Cybersecurity and Cloud-to-Things Applications.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023
User-Oriented Cybersecurity Systems.
Proceedings of the Advanced Information Networking and Applications, 2023
AI Cognitive - Based Systems Supporting Learning Processes.
Proceedings of the Artificial Intelligence in Education. Posters and Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practitioners, Doctoral Consortium and Blue Sky, 2023
2022
Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor.
Sensors, 2022
Predictive intelligence in secure data processing, management, and forecasting.
Inf. Process. Manag., 2022
Privacy preserving IoT-based crowd-sensing network with comparable homomorphic encryption and its application in combating COVID19.
Internet Things, 2022
Subliminal Channels in Visual Cryptography.
Cryptogr., 2022
Human-AI Protocols for Cloud Data Management.
Proceedings of the Advances in Network-Based Information Systems, 2022
CAPTCHA-based Login Scheme in Security Education.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
DNA-based Secret Sharing and Hiding in Dispersed Computing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
An extension of imagechain concept that allows multiple images per block.
Proceedings of the IEEE INFOCOM 2022, 2022
Personalized Security Solutions in Dispersed Computing.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2022
Visual Authentication Codes Generated Using Predictive Intelligence.
Proceedings of the Advances in Internet, Data & Web Technologies, 2022
Personalized Cryptography Algorithms - A Comparison Between Classic and Cognitive Methods.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Steganographic Approaches for Carrier Related Information Hiding.
Proceedings of the Complex, Intelligent and Software Intensive Systems - Proceedings of the 16th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2022), June 29, 2022
Application of Hybrid Intelligence for Security Purposes.
Proceedings of the Advanced Information Networking and Applications, 2022
Personalized Cryptography in Cybersecurity Systems.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2022
2021
Guest Editorial: Special Section on Cognitive Big Data Science Over Intelligent IoT Networking Systems in Industrial Informatics.
IEEE Trans. Ind. Informatics, 2021
Federated Compressed Learning Edge Computing Framework with Ensuring Data Privacy for PM2.5 Prediction in Smart City Sensing Applications.
Sensors, 2021
Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.
Sensors, 2021
Imagechain - Application of Blockchain Technology for Images.
Sensors, 2021
Blockchain-Based Address Alias System.
J. Theor. Appl. Electron. Commer. Res., 2021
Eigenfaces-Based Steganography.
Entropy, 2021
Human oriented solutions for intelligent analysis, multimedia and communication systems.
Concurr. Comput. Pract. Exp., 2021
New cognitive sharing algorithms for cloud service management.
Concurr. Comput. Pract. Exp., 2021
Differential privacy distributed learning under chaotic quantum particle swarm optimization.
Computing, 2021
Personalized Cryptographic Protocols - Obfuscation Technique Based on the Qualities of the Individual.
Proceedings of the Advances in Networked-Based Information Systems, 2021
Cognitive Systems in Computing Education.
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.2, Virtual Event, Germany, June 26, 2021
Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Information Hiding using Bucket Steganography.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Cognitive Approach for Creation of Visual Security Codes.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2021
Predictive Intelligence Approaches for Security Technologies.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Visual Paths in Creation of User-Oriented Security Protocols.
Proceedings of the Advanced Information Networking and Applications, 2021
Comparison of Personal Security Protocols.
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Intelligent Data Management and Security in Cloud Computing.
Sensors, 2020
RMoCap: an R language package for processing and kinematic analyzing motion capture data.
Multim. Syst., 2020
Transformative computing approaches for advanced management solutions and cognitive processing.
Inf. Process. Manag., 2020
Lightweight and efficient approach for multi-secret steganography.
Int. J. Embed. Syst., 2020
Distributed Steganography in PDF Files - Secrets Hidden in Modified Pages.
Entropy, 2020
New public auditing protocol based on homomorphic tags for secure cloud storage.
Concurr. Comput. Pract. Exp., 2020
Cognitive security paradigm for cloud computing applications.
Concurr. Comput. Pract. Exp., 2020
Advanced approaches for information processing in multimedia, decision-making, and security systems.
Concurr. Comput. Pract. Exp., 2020
Eye Movements as a Key in Cognitive Authentication Protocols.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020
Eye Movement Patterns as a Cryptographic Lock.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020
Eye Tracking Solutions in Cognitive CAPTCHA Authentication.
Proceedings of the ICCAE 2020: 12th International Conference on Computer and Automation Engineering, 2020
Cognitive Approaches for Sensor Data Analysis in Transformative Computing.
Proceedings of the Advances in Internet, 2020
Eye Tracking Technology in Personal Authentication Protocols.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Multiply information coding and hiding using fuzzy vault.
Soft Comput., 2019
Cognitive solutions for security and cryptography.
Cogn. Syst. Res., 2019
ECG-Based Advanced Personal Identification Study With Adjusted (Q<sub>i</sub> * S<sub>i</sub>).
IEEE Access, 2019
Application of Perceptual Features for User Authentication in Distributed Systems.
Proceedings of the Advances in Networked-based Information Systems, 2019
Nature-Inspired Protocols for Cloud Computing and Security Systems.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019
Computer System Prototype for Qualitative and Quantitative Evaluation of Selected Movement Activities.
Proceedings of the 3rd International Conference on Virtual and Augmented Reality Simulations, 2019
Head Motion Classification for Single-Accelerometer Virtual Reality Hardware.
Proceedings of the 5th International Conference on Frontiers of Signal Processing, 2019
Visual Cognitive CAPTCHA Based on Expert Knowledge.
Proceedings of the 2019 11th International Conference on Computer and Automation Engineering, 2019
Cognitive CAPTCHA Based on Perceptual Abilities.
Proceedings of the Fuzzy Systems and Data Mining V, 2019
Authentication Protocols Using Multi-level Cognitive CAPTCHA.
Proceedings of the Advances in Internet, 2019
Cognitive Personal Security Systems.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Application of Cognitive Protocols in Transformative Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Multi-level Authentication Protocols Using Scientific Expertise Approach.
Proceedings of the Advanced Information Networking and Applications, 2019
2018
Towards cognitive service management and semantic information sharing in the Cloud.
Multim. Tools Appl., 2018
Averaging of motion capture recordings for movements' templates generation.
Multim. Tools Appl., 2018
Cognitive cryptography techniques for intelligent information management.
Int. J. Inf. Manag., 2018
Application of knowledge-based cognitive CAPTCHA in Cloud of Things security.
Concurr. Comput. Pract. Exp., 2018
Bio-inspired and cognitive approaches in cryptography and security applications.
Concurr. Comput. Pract. Exp., 2018
Intelligent approaches for security technologies.
Concurr. Comput. Pract. Exp., 2018
Cognitive and Biometric Approaches to Secure Services Management in Cloud-Based Technologies.
IEEE Cloud Comput., 2018
Cognitive systems and operations research in big data and cloud computing.
Ann. Oper. Res., 2018
Human actions recognition from motion capture recordings using signal resampling and pattern recognition methods.
Ann. Oper. Res., 2018
Expert Knowledge-Based Authentication Protocols for Cloud Computing Applications.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
Cognitive Informatics Approaches for Data Sharing and Management in Cloud Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
How Repetitive are Karate Kicks Performed by Skilled Practitioners?
Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, 2018
Behavioral Security in Cloud and Fog Computing.
Proceedings of the Advances in Internet, 2018
Signal Processing Methods in Human Motion Path Analysis: A Use Case for Karate Kata.
Proceedings of the 2nd European Conference on Electrical Engineering and Computer Science, 2018
Supporting Rehabilitation Process with Novel Motion Capture Analysis Method.
Proceedings of the 2nd European Conference on Electrical Engineering and Computer Science, 2018
Classification of Karate Kicks with Hidden Markov Models Classifier and Angle-Based Features.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018
What Can Be Learned from Bigrams Analysis of Messages in Social Network?
Proceedings of the 11th International Congress on Image and Signal Processing, 2018
Comparison of Selected Homomorphic Encryption Techniques.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Cognitive Cryptography in Advanced Data Security.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Security of Distributed Ledger Solutions Based on Blockchain Technologies.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Cognitive Codes for Authentication and Management in Cloud Computing Infrastructures.
Proceedings of the Advances on P2P, 2018
2017
Insider Threats and Cryptographic Techniques in Secure Information Management.
IEEE Syst. J., 2017
Human Actions Analysis: Templates Generation, Matching and Visualization Applied to Motion Capture of Highly-Skilled Karate Athletes.
Sensors, 2017
Optimization and Security Issues for Next Generation Networks - Editorial.
J. Comput. Syst. Sci., 2017
Impact of ubiquitous computing technologies for modern information management.
Int. J. Inf. Manag., 2017
New paradigms for information and services management in grid and pervasive computing.
Future Gener. Comput. Syst., 2017
Clustering of trending topics in microblogging posts: A graph-based approach.
Future Gener. Comput. Syst., 2017
Advanced human motion analysis and visualization: Comparison of mawashi-geri kick of two elite karate athletes.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
The open online repository of karate motion capture data: A tool for scientists and sport educators.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Averaging Three-Dimensional Time-Varying Sequences of Rotations: Application to Preprocessing of Motion Capture Data.
Proceedings of the Image Analysis - 20th Scandinavian Conference, 2017
Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
Behavioral Keys in Cryptography and Security Systems.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2017
Biometric Traits in Multi-secret Digital Steganography.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2017, 2017
Personal Data in Cyber Systems Security.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Application of Cognitive Cryptography in Fog and Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Cognitive Keys in Personalized Cryptography.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Embedding Strategies in Multi-secret Steganography.
Proceedings of the Advances on P2P, 2017
2016
Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016
Heuristic approach for computer-aided lesion detection in mammograms.
Soft Comput., 2016
Human actions recognition on multimedia hardware using angle-based and coordinate-based features and multivariate continuous hidden Markov model classifier.
Multim. Tools Appl., 2016
Digital images authentication scheme based on bimodal biometric watermarking in an independent domain.
J. Vis. Commun. Image Represent., 2016
The adaptation of GDL motion recognition system to sport and rehabilitation techniques analysis.
J. Medical Syst., 2016
Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016
Knowledge Management Approaches for Data Understanding.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Data Understanding Techniques for Management Application and Cryptography.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Efficiency of Strategic Data Sharing and Management Protocols.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Initial proposition of kinematics model for selected karate actions analysis.
Proceedings of the Ninth International Conference on Machine Vision, 2016
Data-driven approach to human motion modeling with Lua and gesture description language.
Proceedings of the Ninth International Conference on Machine Vision, 2016
Clusters of Trends Detection in Microblogging: Simple Natural Language Processing vs Hashtags - Which is More Informative?
Proceedings of the 10th International Conference on Complex, 2016
Comparison of Biometric and Linguistic Secret Sharing Protocols.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Concealing Additional Secrets Using Sharing Approach in Steganography.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016
Bio-Inspired Cryptographic Techniques in Information Management Applications.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
On Using Cognitive Models in Cryptography.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
A Novel Approach to Geocaching Event Prognosis Using Spatiotemporal Data.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Application of Personalized Cryptography in Cloud Environment.
Proceedings of the Advances on P2P, 2016
2015
Natural User Interfaces in Medical Image Analysis - Cognitive Analysis of Brain and Carotid Artery Images
Advances in Computer Vision and Pattern Recognition, Springer, ISBN: 978-3-319-07800-7, 2015
Application of Assistive Computer Vision Methods to Oyama Karate Techniques Recognition.
Symmetry, 2015
Intelligent technologies and applications for big data analytics.
Softw. Pract. Exp., 2015
False and multi-secret steganography in digital images.
Soft Comput., 2015
Biometric watermarks based on face recognition methods for authentication of digital images.
Secur. Commun. Networks, 2015
Secure ubiquitous computing.
Pervasive Mob. Comput., 2015
Innovations in security and knowledge management.
Int. J. Inf. Manag., 2015
Full body movements recognition - unsupervised learning approach with heuristic R-GDL method.
Digit. Signal Process., 2015
Personalized Cryptography in Data Sharing and Management.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Effectiveness Comparison of Kinect and Kinect 2 for Recognition of Oyama Karate Techniques.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Application of Neural Network for Human Actions Recognition.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
On Using Palm and Finger Movements as a Gesture-Based Biometrics.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Comparison of Cognitive Information Systems Supporting Management Tasks.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Biometric Methods for Advanced Strategic Data Sharing Protocols.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Qualitative Evaluation of Full Body Movements with Gesture Description Language.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
The Touchless Person Authentication Using Gesture-Types Emulation of Handwritten Signature Templates.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Semantic Data Analysis Algorithms Supporting Decision-Making Processes.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Fuzzy Vault Schemes in Multi-secret Digital Steganography.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Human Actions Modelling and Recognition in Low-Dimensional Feature Space.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock.
Proceedings of the 10th International Conference on P2P, 2015
Bio-inspired Algorithms in Data Management Processes.
Proceedings of the 10th International Conference on P2P, 2015
Learning from Annotated Video: An Initial Study Based on Oyama Karate Tournament Recordings.
Proceedings of the 10th International Conference on P2P, 2015
2014
Protocol for irreversible off-line transactions in anonymous electronic currency exchange.
Soft Comput., 2014
Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014
Rule-based approach to recognizing human body poses and gestures in real time.
Multim. Syst., 2014
Advanced technologies for homeland defense and security.
J. Netw. Comput. Appl., 2014
Cognitive systems and bio-inspired computing in homeland security.
J. Netw. Comput. Appl., 2014
Towards Cognitive Cryptography.
J. Internet Serv. Inf. Secur., 2014
Application of centerline detection and deformable contours algorithms to segmenting the carotid lumen.
J. Electronic Imaging, 2014
Cognitive systems for intelligent business information management in cognitive economy.
Int. J. Inf. Manag., 2014
Innovative Internet services and bio-inspired technologies in information management.
Int. J. Inf. Manag., 2014
Advance in Safe and Useful Social Network Services with Context-Sensitive Data in Cyber-Physical System.
Int. J. Distributed Sens. Networks, 2014
Improved Cryptographic protocol for digital coin exchange.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014
Cognitive information systems in secure information management and personalized cryptography.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014
Security and Privacy in Distributed Information Management.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Data Mining and Semantic Inference in Cognitive Systems.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Cryptographic Techniques in Advanced Information Management.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Cognitive Management Systems.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Unsupervised Learning of GDL Classifier.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Advanced Techniques for Computer Sharing and Management of Strategic Data.
Proceedings of the Information and Communication Technology, 2014
Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Crypto-Biometric Models for Information Secrecy.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Intelligent Bio-inspired Approach for Secrecy Management in the Cloud.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Computer-Aided Enterprise Management.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Secure Information Management Using Linguistic Threshold Approach.
Advanced Information and Knowledge Processing, Springer, ISBN: 978-1-4471-5015-2, 2014
2013
Cognitive analysis system for description and recognition of pathological changes in coronary arteries structure.
Math. Comput. Model., 2013
Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Math. Comput. Model., 2013
Automatic segmentation of the carotid artery bifurcation region with a region-growing approach.
J. Electronic Imaging, 2013
Mobile and internet services in ubiquitous and pervasive computing environments.
Inf. Sci., 2013
Modern cognitive and ubiquitous computing.
Neurocomputing, 2013
Application of neural networks in detection of abnormal brain perfusion regions.
Neurocomputing, 2013
Cognitive and secure computing in Information Management.
Int. J. Inf. Manag., 2013
Security of Cognitive Information Systems.
Proceedings of the Information Technology Convergence, 2013
UBMLRSS-Cognitive Financial Information Systems.
Proceedings of the Information Technology Convergence, 2013
Real-Time Recognition of Selected Karate Techniques Using GDL Approach.
Proceedings of the Image Processing and Communications Challenges 5, 2013
Cognitive Information Systems in Ubiquitous Computing.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Dependence of Kinect sensors number and position on gestures recognition with Gesture Description Language semantic classifier.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
Information Splitting Using Crypto-biometrics Approach.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Matrix-Based Hierarchical Graph Matching in Off-Line Handwritten Signatures Recognition.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013
Intelligent UBMSS Systems for Strategic Information Management.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Recent Advances in Pattern Classification.
Proceedings of the Computational Intelligence Paradigms in Advanced Pattern Classification, 2012
Advances in Cognitive Information Systems.
Cognitive Systems Monographs 17, Springer, ISBN: 978-3-642-25246-4, 2012
Security issues on digital watermarking algorithms.
Ann. UMCS Informatica, 2012
Defending against insider threats and internal data leakage.
Secur. Commun. Networks, 2012
Strategic Information Splitting Using Biometric Patterns.
J. Internet Serv. Inf. Secur., 2012
Personal Identification Based on Cognitive Analysis of Selected Medical Visualization.
J. Internet Serv. Inf. Secur., 2012
Framework for cognitive analysis of dynamic perfusion computed tomography with visualization of large volumetric data.
J. Electronic Imaging, 2012
DNA-like linguistic secret sharing for strategic information systems.
Int. J. Inf. Manag., 2012
Towards context, cognitive, and secure computing.
Comput. Math. Appl., 2012
Linguistic protocols for secure information management and sharing.
Comput. Math. Appl., 2012
Visualization of perfusion abnormalities with GPU-based volume rendering.
Comput. Graph., 2012
Data Analysis Systems and Cognitive Modelling Processes.
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012
Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological Changes.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Cognitive Analysis Systems for 3D Image Data Interpretation.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Neural Network Approach for Identification of Selected Brain Perfusion Abnormalities.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Secure Information Sharing Using Personal Biometric Characteristics.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012
Visual Image Biometric Identification in Secure Urban Computing.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012
Semantic Description and Recognition of Human Body Poses and Movement Sequences with Gesture Description Language.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012
Medical Visualizations in Secure Bio Computing.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Segmentation and Visualization of Tubular Structures in Computed Tomography Angiography.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification.
J. Univers. Comput. Sci., 2011
Intelligent image content semantic description for cardiac 3D visualisations.
Eng. Appl. Artif. Intell., 2011
A system for detecting and describing pathological changes using dynamic perfusion computer tomography brain maps.
Comput. Biol. Medicine, 2011
Towards New Classes of Intelligent Cognitive Information Systems for Semantic Pattern Classification.
Comput. Informatics, 2011
Computer-aided Intelligent Diagnostics of Dynamic Perfusion CT Maps.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
Image Based Crypto-biometric Key Generation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Secure Information Management Protocol Based on Linguistic Sharing Techniques.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Intelligent Image Content Description and Analysis for 3D Visualizations of Coronary Vessels.
Proceedings of the Intelligent Information and Database Systems, 2011
Intelligent Information System for Interpretation of Dynamic Perfusion Brain Maps.
Proceedings of the Intelligent Information and Database Systems, 2011
Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
Automatic Detection and Lesion Description in Cerebral Blood Flow and Cerebral Blood Volume Perfusion Maps.
J. Signal Process. Syst., 2010
Discretization as the enabling technique for the Naïve Bayes and semi-Naïve Bayes-based classification.
Knowl. Eng. Rev., 2010
The use of mathematical linguistic methods in creating secret sharing threshold algorithms.
Comput. Math. Appl., 2010
Pattern Recognition Methods in Analisys of Selected Neurodengerative Lesions.
Bio Algorithms Med Syst., 2010
Ubiquitous Computing in Creation of Cognitive Systems for Medical Images Interpretation.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010
Cognitive Informatics in Medical Image Semantic Content Understanding.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Grammar Encoding in DNA-Like Secret Sharing Infrastructure.
Proceedings of the Advances in Computer Science and Information Technology, 2010
Augmented Reality Interface for Visualization of Volumetric Medical Data.
Proceedings of the Image Processing and Communications Challenges 2, 2010
Cognitive Informatics for New Classes of Economic and Financial Information Systems.
Proceedings of the Advances in Software Engineering, 2010
Towards New Classes of Cognitive Vision Systems.
Proceedings of the CISIS 2010, 2010
Cognitive approach to bio-inspired medical image understanding.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010
2009
Cognitive Techniques in Visual Data Interpretation
Studies in Computational Intelligence 228, Springer, ISBN: 978-3-642-02692-8, 2009
Effective Filtration Techniques for Gallbladder Ultrasound Images with Variable Contrast.
J. Signal Process. Syst., 2009
Mathematical Linguistics in Cognitive Medical Image Interpretation Systems.
J. Math. Imaging Vis., 2009
New approach to gallbladder ultrasonic images analysis and lesions recognition.
Comput. Medical Imaging Graph., 2009
Notes on a Linguistic Description as the Basis for Automatic Image Understanding.
Int. J. Appl. Math. Comput. Sci., 2009
Image Content Analysis for Cardiac 3D Visualizations.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009
UBIAS - Type Cognitive Systems for Medical Pattern Interpretation.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009
UBIAS Systems supporting interpretation of radiological images.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009
Security of Linguistic Threshold Schemes in Multimedia Systems.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009
Secret Sharing Protocol for Linguistic Threshold Schemes.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Automatic Information Processing and Understanding in Cognitive Business Systems.
Proceedings of the ICEIS 2009, 2009
Secure Information Splitting Using Grammar Schemes.
Proceedings of the New Challenges in Computational Collective Intelligence [selected papers from the 1st International Conference on Collective Intelligence, 2009
Shadow Generation Protocol in Linguistic Threshold Schemes.
Proceedings of the Security Technology, 2009
2008
Modern Computational Intelligence Methods for the Interpretation of Medical Images.
Studies in Computational Intelligence 84, Springer, ISBN: 978-3-540-75399-5, 2008
The automatic understanding approach to systems analysis and design.
Int. J. Inf. Manag., 2008
Cognitive techniques in medical information systems.
Comput. Biol. Medicine, 2008
Cognitive Modeling in Medical Pattern Semantic Understanding.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Medical pattern understanding based on cognitive linguistic formalisms and computational intelligence methods.
Proceedings of the International Joint Conference on Neural Networks, 2008
Comparative Analysis of the Impact of Discretization on the Classification with Naïve Bayes and Semi-Naïve Bayes Classifiers.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008
Linguistic Approach to Cryptographic Data Sharing.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Cognitive Approach to Medical Pattern Recognition, Structure Modelling and Image Understanding.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008
AI-Cognitive Description in Visual Medical Pattern Mining and Retrieval.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
2007
Graph-Based Semantic Description in Medical Knowledge Representation and 3D Coronary Vessels Recognition.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Automatic Segmentation of Neoplastic Hepatic Disease Symptoms in CT Images.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007
Automatic Segmentation of Single and Multiple Neoplastic Hepatic Lesions in CT Images.
Proceedings of the Nature Inspired Problem-Solving Methods in Knowledge Engineering, 2007
Cognitive Computing in Analysis of 2D/3D Medical Images.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Graph-based semantic description and information extraction in analysis of 3D coronary vessels visualizations.
Proceedings of the Advances in Intelligent and Distributed Computing, 2007
Why Automatic Understanding?
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007
A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support Systems.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007
Cognitive Informatics in Automatic Pattern Understanding.
Proceedings of the Six IEEE International Conference on Cognitive Informatics, 2007
2006
Image languages in intelligent radiological palm diagnostics.
Pattern Recognit., 2006
Graph image language techniques supporting radiological, hand image interpretations.
Comput. Vis. Image Underst., 2006
Automatic Image Understanding a New Paradigm for Intelligent Medical Image Analysis.
Bio Algorithms Med Syst., 2006
Picture grammars in 3D modeling of medical structures.
Bio Algorithms Med Syst., 2006
Application of graph grammars for syntactic description of coronary arteries spatial structures.
Bio Algorithms Med Syst., 2006
Cognitive Approach to Visual Data Interpretation in Medical Information and Recognition Systems.
Proceedings of the Advances in Machine Vision, 2006
Graph-Based Structural Data Mining in Cognitive Pattern Interpretation.
Proceedings of the Grammatical Inference: Algorithms and Applications, 2006
Cognitive Analysis Techniques in Business Planning and Decision Support Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2006
Cognitive Analysis in Diagnostic DSS-Type IT Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2006
2005
Nonlinear processing and semantic content analysis in medical imaging-a cognitive approach.
IEEE Trans. Instrum. Meas., 2005
Picture Languages in Medical Pattern Knowledge Representation and Understanding.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005
New Proposition for Intelligent Systems Design: Artificial Understanding of the Images as the Next Step of Advanced Data Analysis after Automatic Classification and Pattern Recognition.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005
Intelligent Semantic Information Retrieval in Medical Pattern Cognitive Analysis.
Proceedings of the Computational Science and Its Applications, 2005
2004
Medical Image Understanding Technology - Artificial Intelligence and Soft-Computing for Image Understanding
Studies in Fuzziness and Soft Computing 156, Springer, ISBN: 978-3-642-53578-9, 2004
Picture Languages in Intelligent Retrieval of Visual Data Semantic Information.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004
Picture Languages in Cognitive Approach to Medical Visualization Understanding.
Proceedings of the Intelligent Information Processing and Web Mining, 2004
Cognitive Reasoning in Intelligent Medical Information Systems - Visual Data Perception Algorithms in Medical Decision support Systems.
Proceedings of the ICEIS 2004, 2004
The New Concept in Computer Vision: Automatic Understanding of the Images.
Proceedings of the Artificial Intelligence and Soft Computing, 2004
2003
Artificial intelligence structural imaging techniques in visual pattern analysis and medical data understanding.
Pattern Recognit., 2003
Cognitive Vision Systems in Medical Applications.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003
Visual signal processing and image understanding in biomedical systems.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Content-Based Reasoning in Intelligent Medical Information Systems.
Proceedings of the ICEIS 2003, 2003
Artificial Intelligence Techniques in Retrieval of Visual Data Semantic Information.
Proceedings of the Web Intelligence, 2003
2002
Syntactic reasoning and pattern recognition for analysis of coronary artery images.
Artif. Intell. Medicine, 2002
2001
Image Understanding Methods in Biomedical Informatics and Digital Imaging.
J. Biomed. Informatics, 2001
Knowledge discovery approach to automated cardiac SPECT diagnosis.
Artif. Intell. Medicine, 2001
Semantic-Oriented Syntactic Algorithms For Content Recognition And Understanding Of Images In Medical Databases.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001
Automatic understanding of selected diseases on the basis of structural analysis of medical images.
Proceedings of the IEEE International Conference on Acoustics, 2001
2000
Application of syntactic methods of pattern recognition for data mining and knowledge discovery in medicine.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000
1998
Languages of shape feature description and syntactic methods for recognition of morphological changes in organs in analysis of selected x-ray images.
Proceedings of the Medical Imaging 1998: Image Processing, 1998