Marek R. Ogiela

Orcid: 0000-0002-8298-8627

Affiliations:
  • AGH University of Science and Technology, Krakow, Poland


According to our database1, Marek R. Ogiela authored at least 297 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024

Personal CAPTCHA-based authentication protocol.
Comput. Secur., February, 2024

Information Hiding in QR Codes using Segment Manipulation.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

AI-Based Cybersecurity Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

Towards User-Oriented Steganography.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Linguistic methods in healthcare application and COVID-19 variants classification.
Neural Comput. Appl., July, 2023

Cognitive CAPTCHA Password Reminder.
Sensors, March, 2023

Steganography in IoT: Information Hiding with Joystick and Touch Sensors.
Sensors, March, 2023

Context-Aware Approaches in Cognitive Cloud and Cybersecurity.
Proceedings of the Advances in Networked-based Information Systems, 2023

Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

User-Oriented Solutions in Cybersecurity and Cloud-to-Things Applications.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

User-Oriented Cybersecurity Systems.
Proceedings of the Advanced Information Networking and Applications, 2023

AI Cognitive - Based Systems Supporting Learning Processes.
Proceedings of the Artificial Intelligence in Education. Posters and Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practitioners, Doctoral Consortium and Blue Sky, 2023

2022
Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor.
Sensors, 2022

Predictive intelligence in secure data processing, management, and forecasting.
Inf. Process. Manag., 2022

Privacy preserving IoT-based crowd-sensing network with comparable homomorphic encryption and its application in combating COVID19.
Internet Things, 2022

Subliminal Channels in Visual Cryptography.
Cryptogr., 2022

Human-AI Protocols for Cloud Data Management.
Proceedings of the Advances in Network-Based Information Systems, 2022

CAPTCHA-based Login Scheme in Security Education.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

DNA-based Secret Sharing and Hiding in Dispersed Computing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

An extension of imagechain concept that allows multiple images per block.
Proceedings of the IEEE INFOCOM 2022, 2022

Personalized Security Solutions in Dispersed Computing.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2022

Visual Authentication Codes Generated Using Predictive Intelligence.
Proceedings of the Advances in Internet, Data & Web Technologies, 2022

Personalized Cryptography Algorithms - A Comparison Between Classic and Cognitive Methods.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Steganographic Approaches for Carrier Related Information Hiding.
Proceedings of the Complex, Intelligent and Software Intensive Systems - Proceedings of the 16th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2022), June 29, 2022

Application of Hybrid Intelligence for Security Purposes.
Proceedings of the Advanced Information Networking and Applications, 2022

Personalized Cryptography in Cybersecurity Systems.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2022

2021
Guest Editorial: Special Section on Cognitive Big Data Science Over Intelligent IoT Networking Systems in Industrial Informatics.
IEEE Trans. Ind. Informatics, 2021

Federated Compressed Learning Edge Computing Framework with Ensuring Data Privacy for PM2.5 Prediction in Smart City Sensing Applications.
Sensors, 2021

Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.
Sensors, 2021

Imagechain - Application of Blockchain Technology for Images.
Sensors, 2021

Blockchain-Based Address Alias System.
J. Theor. Appl. Electron. Commer. Res., 2021

Eigenfaces-Based Steganography.
Entropy, 2021

Human oriented solutions for intelligent analysis, multimedia and communication systems.
Concurr. Comput. Pract. Exp., 2021

New cognitive sharing algorithms for cloud service management.
Concurr. Comput. Pract. Exp., 2021

Differential privacy distributed learning under chaotic quantum particle swarm optimization.
Computing, 2021

Personalized Cryptographic Protocols - Obfuscation Technique Based on the Qualities of the Individual.
Proceedings of the Advances in Networked-Based Information Systems, 2021

Cognitive Systems in Computing Education.
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.2, Virtual Event, Germany, June 26, 2021

Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Information Hiding using Bucket Steganography.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Cognitive Approach for Creation of Visual Security Codes.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2021

Predictive Intelligence Approaches for Security Technologies.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Visual Paths in Creation of User-Oriented Security Protocols.
Proceedings of the Advanced Information Networking and Applications, 2021

Comparison of Personal Security Protocols.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Intelligent Data Management and Security in Cloud Computing.
Sensors, 2020

RMoCap: an R language package for processing and kinematic analyzing motion capture data.
Multim. Syst., 2020

Transformative computing approaches for advanced management solutions and cognitive processing.
Inf. Process. Manag., 2020

Lightweight and efficient approach for multi-secret steganography.
Int. J. Embed. Syst., 2020

Distributed Steganography in PDF Files - Secrets Hidden in Modified Pages.
Entropy, 2020

New public auditing protocol based on homomorphic tags for secure cloud storage.
Concurr. Comput. Pract. Exp., 2020

Cognitive security paradigm for cloud computing applications.
Concurr. Comput. Pract. Exp., 2020

Advanced approaches for information processing in multimedia, decision-making, and security systems.
Concurr. Comput. Pract. Exp., 2020

Eye Movements as a Key in Cognitive Authentication Protocols.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Eye Movement Patterns as a Cryptographic Lock.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020

Eye Tracking Solutions in Cognitive CAPTCHA Authentication.
Proceedings of the ICCAE 2020: 12th International Conference on Computer and Automation Engineering, 2020

Cognitive Approaches for Sensor Data Analysis in Transformative Computing.
Proceedings of the Advances in Internet, 2020

Eye Tracking Technology in Personal Authentication Protocols.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Multiply information coding and hiding using fuzzy vault.
Soft Comput., 2019

Cognitive solutions for security and cryptography.
Cogn. Syst. Res., 2019

ECG-Based Advanced Personal Identification Study With Adjusted (Q<sub>i</sub> * S<sub>i</sub>).
IEEE Access, 2019

Application of Perceptual Features for User Authentication in Distributed Systems.
Proceedings of the Advances in Networked-based Information Systems, 2019

Nature-Inspired Protocols for Cloud Computing and Security Systems.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

Computer System Prototype for Qualitative and Quantitative Evaluation of Selected Movement Activities.
Proceedings of the 3rd International Conference on Virtual and Augmented Reality Simulations, 2019

Head Motion Classification for Single-Accelerometer Virtual Reality Hardware.
Proceedings of the 5th International Conference on Frontiers of Signal Processing, 2019

Visual Cognitive CAPTCHA Based on Expert Knowledge.
Proceedings of the 2019 11th International Conference on Computer and Automation Engineering, 2019

Cognitive CAPTCHA Based on Perceptual Abilities.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Authentication Protocols Using Multi-level Cognitive CAPTCHA.
Proceedings of the Advances in Internet, 2019

Cognitive Personal Security Systems.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Application of Cognitive Protocols in Transformative Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Multi-level Authentication Protocols Using Scientific Expertise Approach.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Towards cognitive service management and semantic information sharing in the Cloud.
Multim. Tools Appl., 2018

Averaging of motion capture recordings for movements' templates generation.
Multim. Tools Appl., 2018

Cognitive cryptography techniques for intelligent information management.
Int. J. Inf. Manag., 2018

Application of knowledge-based cognitive CAPTCHA in Cloud of Things security.
Concurr. Comput. Pract. Exp., 2018

Bio-inspired and cognitive approaches in cryptography and security applications.
Concurr. Comput. Pract. Exp., 2018

Intelligent approaches for security technologies.
Concurr. Comput. Pract. Exp., 2018

Cognitive and Biometric Approaches to Secure Services Management in Cloud-Based Technologies.
IEEE Cloud Comput., 2018

Cognitive systems and operations research in big data and cloud computing.
Ann. Oper. Res., 2018

Human actions recognition from motion capture recordings using signal resampling and pattern recognition methods.
Ann. Oper. Res., 2018

Expert Knowledge-Based Authentication Protocols for Cloud Computing Applications.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

Cognitive Informatics Approaches for Data Sharing and Management in Cloud Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

How Repetitive are Karate Kicks Performed by Skilled Practitioners?
Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, 2018

Behavioral Security in Cloud and Fog Computing.
Proceedings of the Advances in Internet, 2018

Signal Processing Methods in Human Motion Path Analysis: A Use Case for Karate Kata.
Proceedings of the 2nd European Conference on Electrical Engineering and Computer Science, 2018

Supporting Rehabilitation Process with Novel Motion Capture Analysis Method.
Proceedings of the 2nd European Conference on Electrical Engineering and Computer Science, 2018

Classification of Karate Kicks with Hidden Markov Models Classifier and Angle-Based Features.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

What Can Be Learned from Bigrams Analysis of Messages in Social Network?
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

Comparison of Selected Homomorphic Encryption Techniques.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Cognitive Cryptography in Advanced Data Security.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Security of Distributed Ledger Solutions Based on Blockchain Technologies.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Cognitive Codes for Authentication and Management in Cloud Computing Infrastructures.
Proceedings of the Advances on P2P, 2018

2017
Insider Threats and Cryptographic Techniques in Secure Information Management.
IEEE Syst. J., 2017

Human Actions Analysis: Templates Generation, Matching and Visualization Applied to Motion Capture of Highly-Skilled Karate Athletes.
Sensors, 2017

Optimization and Security Issues for Next Generation Networks - Editorial.
J. Comput. Syst. Sci., 2017

Impact of ubiquitous computing technologies for modern information management.
Int. J. Inf. Manag., 2017

New paradigms for information and services management in grid and pervasive computing.
Future Gener. Comput. Syst., 2017

Clustering of trending topics in microblogging posts: A graph-based approach.
Future Gener. Comput. Syst., 2017

Advanced human motion analysis and visualization: Comparison of mawashi-geri kick of two elite karate athletes.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

The open online repository of karate motion capture data: A tool for scientists and sport educators.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Averaging Three-Dimensional Time-Varying Sequences of Rotations: Application to Preprocessing of Motion Capture Data.
Proceedings of the Image Analysis - 20th Scandinavian Conference, 2017

Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Behavioral Keys in Cryptography and Security Systems.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2017

Biometric Traits in Multi-secret Digital Steganography.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2017, 2017

Personal Data in Cyber Systems Security.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Application of Cognitive Cryptography in Fog and Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Cognitive Keys in Personalized Cryptography.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Embedding Strategies in Multi-secret Steganography.
Proceedings of the Advances on P2P, 2017

2016
Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016

Heuristic approach for computer-aided lesion detection in mammograms.
Soft Comput., 2016

Human actions recognition on multimedia hardware using angle-based and coordinate-based features and multivariate continuous hidden Markov model classifier.
Multim. Tools Appl., 2016

Digital images authentication scheme based on bimodal biometric watermarking in an independent domain.
J. Vis. Commun. Image Represent., 2016

The adaptation of GDL motion recognition system to sport and rehabilitation techniques analysis.
J. Medical Syst., 2016

Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

Knowledge Management Approaches for Data Understanding.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Data Understanding Techniques for Management Application and Cryptography.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Efficiency of Strategic Data Sharing and Management Protocols.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Initial proposition of kinematics model for selected karate actions analysis.
Proceedings of the Ninth International Conference on Machine Vision, 2016

Data-driven approach to human motion modeling with Lua and gesture description language.
Proceedings of the Ninth International Conference on Machine Vision, 2016

Clusters of Trends Detection in Microblogging: Simple Natural Language Processing vs Hashtags - Which is More Informative?
Proceedings of the 10th International Conference on Complex, 2016

Comparison of Biometric and Linguistic Secret Sharing Protocols.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Concealing Additional Secrets Using Sharing Approach in Steganography.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016

Bio-Inspired Cryptographic Techniques in Information Management Applications.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

On Using Cognitive Models in Cryptography.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Novel Approach to Geocaching Event Prognosis Using Spatiotemporal Data.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Application of Personalized Cryptography in Cloud Environment.
Proceedings of the Advances on P2P, 2016

2015
Natural User Interfaces in Medical Image Analysis - Cognitive Analysis of Brain and Carotid Artery Images
Advances in Computer Vision and Pattern Recognition, Springer, ISBN: 978-3-319-07800-7, 2015

Application of Assistive Computer Vision Methods to Oyama Karate Techniques Recognition.
Symmetry, 2015

Intelligent technologies and applications for big data analytics.
Softw. Pract. Exp., 2015

False and multi-secret steganography in digital images.
Soft Comput., 2015

Biometric watermarks based on face recognition methods for authentication of digital images.
Secur. Commun. Networks, 2015

Secure ubiquitous computing.
Pervasive Mob. Comput., 2015

Innovations in security and knowledge management.
Int. J. Inf. Manag., 2015

Full body movements recognition - unsupervised learning approach with heuristic R-GDL method.
Digit. Signal Process., 2015

Personalized Cryptography in Data Sharing and Management.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Effectiveness Comparison of Kinect and Kinect 2 for Recognition of Oyama Karate Techniques.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Application of Neural Network for Human Actions Recognition.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

On Using Palm and Finger Movements as a Gesture-Based Biometrics.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Comparison of Cognitive Information Systems Supporting Management Tasks.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Biometric Methods for Advanced Strategic Data Sharing Protocols.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Qualitative Evaluation of Full Body Movements with Gesture Description Language.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

The Touchless Person Authentication Using Gesture-Types Emulation of Handwritten Signature Templates.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Semantic Data Analysis Algorithms Supporting Decision-Making Processes.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Fuzzy Vault Schemes in Multi-secret Digital Steganography.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Human Actions Modelling and Recognition in Low-Dimensional Feature Space.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock.
Proceedings of the 10th International Conference on P2P, 2015

Bio-inspired Algorithms in Data Management Processes.
Proceedings of the 10th International Conference on P2P, 2015

Learning from Annotated Video: An Initial Study Based on Oyama Karate Tournament Recordings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Protocol for irreversible off-line transactions in anonymous electronic currency exchange.
Soft Comput., 2014

Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014

Rule-based approach to recognizing human body poses and gestures in real time.
Multim. Syst., 2014

Advanced technologies for homeland defense and security.
J. Netw. Comput. Appl., 2014

Cognitive systems and bio-inspired computing in homeland security.
J. Netw. Comput. Appl., 2014

Towards Cognitive Cryptography.
J. Internet Serv. Inf. Secur., 2014

Application of centerline detection and deformable contours algorithms to segmenting the carotid lumen.
J. Electronic Imaging, 2014

Cognitive systems for intelligent business information management in cognitive economy.
Int. J. Inf. Manag., 2014

Innovative Internet services and bio-inspired technologies in information management.
Int. J. Inf. Manag., 2014

Advance in Safe and Useful Social Network Services with Context-Sensitive Data in Cyber-Physical System.
Int. J. Distributed Sens. Networks, 2014

Improved Cryptographic protocol for digital coin exchange.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014

Cognitive information systems in secure information management and personalized cryptography.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014

Security and Privacy in Distributed Information Management.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Data Mining and Semantic Inference in Cognitive Systems.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Cryptographic Techniques in Advanced Information Management.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Cognitive Management Systems.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Unsupervised Learning of GDL Classifier.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Advanced Techniques for Computer Sharing and Management of Strategic Data.
Proceedings of the Information and Communication Technology, 2014

Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Crypto-Biometric Models for Information Secrecy.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Intelligent Bio-inspired Approach for Secrecy Management in the Cloud.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Computer-Aided Enterprise Management.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Secure Information Management Using Linguistic Threshold Approach.
Advanced Information and Knowledge Processing, Springer, ISBN: 978-1-4471-5015-2, 2014

2013
Cognitive analysis system for description and recognition of pathological changes in coronary arteries structure.
Math. Comput. Model., 2013

Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Math. Comput. Model., 2013

Automatic segmentation of the carotid artery bifurcation region with a region-growing approach.
J. Electronic Imaging, 2013

Mobile and internet services in ubiquitous and pervasive computing environments.
Inf. Sci., 2013

Modern cognitive and ubiquitous computing.
Neurocomputing, 2013

Application of neural networks in detection of abnormal brain perfusion regions.
Neurocomputing, 2013

Cognitive and secure computing in Information Management.
Int. J. Inf. Manag., 2013

Security of Cognitive Information Systems.
Proceedings of the Information Technology Convergence, 2013

UBMLRSS-Cognitive Financial Information Systems.
Proceedings of the Information Technology Convergence, 2013

Real-Time Recognition of Selected Karate Techniques Using GDL Approach.
Proceedings of the Image Processing and Communications Challenges 5, 2013

Cognitive Information Systems in Ubiquitous Computing.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Dependence of Kinect sensors number and position on gestures recognition with Gesture Description Language semantic classifier.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Information Splitting Using Crypto-biometrics Approach.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Matrix-Based Hierarchical Graph Matching in Off-Line Handwritten Signatures Recognition.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

Intelligent UBMSS Systems for Strategic Information Management.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Recent Advances in Pattern Classification.
Proceedings of the Computational Intelligence Paradigms in Advanced Pattern Classification, 2012

Advances in Cognitive Information Systems.
Cognitive Systems Monographs 17, Springer, ISBN: 978-3-642-25246-4, 2012

Security issues on digital watermarking algorithms.
Ann. UMCS Informatica, 2012

Defending against insider threats and internal data leakage.
Secur. Commun. Networks, 2012

Strategic Information Splitting Using Biometric Patterns.
J. Internet Serv. Inf. Secur., 2012

Personal Identification Based on Cognitive Analysis of Selected Medical Visualization.
J. Internet Serv. Inf. Secur., 2012

Framework for cognitive analysis of dynamic perfusion computed tomography with visualization of large volumetric data.
J. Electronic Imaging, 2012

DNA-like linguistic secret sharing for strategic information systems.
Int. J. Inf. Manag., 2012

Towards context, cognitive, and secure computing.
Comput. Math. Appl., 2012

Linguistic protocols for secure information management and sharing.
Comput. Math. Appl., 2012

Visualization of perfusion abnormalities with GPU-based volume rendering.
Comput. Graph., 2012

Data Analysis Systems and Cognitive Modelling Processes.
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012

Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological Changes.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Cognitive Analysis Systems for 3D Image Data Interpretation.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Neural Network Approach for Identification of Selected Brain Perfusion Abnormalities.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Secure Information Sharing Using Personal Biometric Characteristics.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Visual Image Biometric Identification in Secure Urban Computing.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Semantic Description and Recognition of Human Body Poses and Movement Sequences with Gesture Description Language.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Medical Visualizations in Secure Bio Computing.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Segmentation and Visualization of Tubular Structures in Computed Tomography Angiography.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification.
J. Univers. Comput. Sci., 2011

Intelligent image content semantic description for cardiac 3D visualisations.
Eng. Appl. Artif. Intell., 2011

A system for detecting and describing pathological changes using dynamic perfusion computer tomography brain maps.
Comput. Biol. Medicine, 2011

Towards New Classes of Intelligent Cognitive Information Systems for Semantic Pattern Classification.
Comput. Informatics, 2011

Computer-aided Intelligent Diagnostics of Dynamic Perfusion CT Maps.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

Image Based Crypto-biometric Key Generation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Secure Information Management Protocol Based on Linguistic Sharing Techniques.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Intelligent Image Content Description and Analysis for 3D Visualizations of Coronary Vessels.
Proceedings of the Intelligent Information and Database Systems, 2011

Intelligent Information System for Interpretation of Dynamic Perfusion Brain Maps.
Proceedings of the Intelligent Information and Database Systems, 2011

Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Automatic Detection and Lesion Description in Cerebral Blood Flow and Cerebral Blood Volume Perfusion Maps.
J. Signal Process. Syst., 2010

Discretization as the enabling technique for the Naïve Bayes and semi-Naïve Bayes-based classification.
Knowl. Eng. Rev., 2010

The use of mathematical linguistic methods in creating secret sharing threshold algorithms.
Comput. Math. Appl., 2010

Pattern Recognition Methods in Analisys of Selected Neurodengerative Lesions.
Bio Algorithms Med Syst., 2010

Ubiquitous Computing in Creation of Cognitive Systems for Medical Images Interpretation.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Cognitive Informatics in Medical Image Semantic Content Understanding.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Grammar Encoding in DNA-Like Secret Sharing Infrastructure.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Augmented Reality Interface for Visualization of Volumetric Medical Data.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Cognitive Informatics for New Classes of Economic and Financial Information Systems.
Proceedings of the Advances in Software Engineering, 2010

Towards New Classes of Cognitive Vision Systems.
Proceedings of the CISIS 2010, 2010

Cognitive approach to bio-inspired medical image understanding.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Cognitive Techniques in Visual Data Interpretation
Studies in Computational Intelligence 228, Springer, ISBN: 978-3-642-02692-8, 2009

Effective Filtration Techniques for Gallbladder Ultrasound Images with Variable Contrast.
J. Signal Process. Syst., 2009

Mathematical Linguistics in Cognitive Medical Image Interpretation Systems.
J. Math. Imaging Vis., 2009

New approach to gallbladder ultrasonic images analysis and lesions recognition.
Comput. Medical Imaging Graph., 2009

Notes on a Linguistic Description as the Basis for Automatic Image Understanding.
Int. J. Appl. Math. Comput. Sci., 2009

Image Content Analysis for Cardiac 3D Visualizations.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

UBIAS - Type Cognitive Systems for Medical Pattern Interpretation.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

UBIAS Systems supporting interpretation of radiological images.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Security of Linguistic Threshold Schemes in Multimedia Systems.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Secret Sharing Protocol for Linguistic Threshold Schemes.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Automatic Information Processing and Understanding in Cognitive Business Systems.
Proceedings of the ICEIS 2009, 2009

Secure Information Splitting Using Grammar Schemes.
Proceedings of the New Challenges in Computational Collective Intelligence [selected papers from the 1st International Conference on Collective Intelligence, 2009

Shadow Generation Protocol in Linguistic Threshold Schemes.
Proceedings of the Security Technology, 2009

2008
Modern Computational Intelligence Methods for the Interpretation of Medical Images.
Studies in Computational Intelligence 84, Springer, ISBN: 978-3-540-75399-5, 2008

The automatic understanding approach to systems analysis and design.
Int. J. Inf. Manag., 2008

Cognitive techniques in medical information systems.
Comput. Biol. Medicine, 2008

Cognitive Modeling in Medical Pattern Semantic Understanding.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Medical pattern understanding based on cognitive linguistic formalisms and computational intelligence methods.
Proceedings of the International Joint Conference on Neural Networks, 2008

Comparative Analysis of the Impact of Discretization on the Classification with Naïve Bayes and Semi-Naïve Bayes Classifiers.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Linguistic Approach to Cryptographic Data Sharing.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Cognitive Approach to Medical Pattern Recognition, Structure Modelling and Image Understanding.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

AI-Cognitive Description in Visual Medical Pattern Mining and Retrieval.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Graph-Based Semantic Description in Medical Knowledge Representation and 3D Coronary Vessels Recognition.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Automatic Segmentation of Neoplastic Hepatic Disease Symptoms in CT Images.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Automatic Segmentation of Single and Multiple Neoplastic Hepatic Lesions in CT Images.
Proceedings of the Nature Inspired Problem-Solving Methods in Knowledge Engineering, 2007

Cognitive Computing in Analysis of 2D/3D Medical Images.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Graph-based semantic description and information extraction in analysis of 3D coronary vessels visualizations.
Proceedings of the Advances in Intelligent and Distributed Computing, 2007

Why Automatic Understanding?
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support Systems.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

Cognitive Informatics in Automatic Pattern Understanding.
Proceedings of the Six IEEE International Conference on Cognitive Informatics, 2007

2006
Image languages in intelligent radiological palm diagnostics.
Pattern Recognit., 2006

Graph image language techniques supporting radiological, hand image interpretations.
Comput. Vis. Image Underst., 2006

Automatic Image Understanding a New Paradigm for Intelligent Medical Image Analysis.
Bio Algorithms Med Syst., 2006

Picture grammars in 3D modeling of medical structures.
Bio Algorithms Med Syst., 2006

Application of graph grammars for syntactic description of coronary arteries spatial structures.
Bio Algorithms Med Syst., 2006

Cognitive Approach to Visual Data Interpretation in Medical Information and Recognition Systems.
Proceedings of the Advances in Machine Vision, 2006

Graph-Based Structural Data Mining in Cognitive Pattern Interpretation.
Proceedings of the Grammatical Inference: Algorithms and Applications, 2006

Cognitive Analysis Techniques in Business Planning and Decision Support Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Cognitive Analysis in Diagnostic DSS-Type IT Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

2005
Nonlinear processing and semantic content analysis in medical imaging-a cognitive approach.
IEEE Trans. Instrum. Meas., 2005

Picture Languages in Medical Pattern Knowledge Representation and Understanding.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

New Proposition for Intelligent Systems Design: Artificial Understanding of the Images as the Next Step of Advanced Data Analysis after Automatic Classification and Pattern Recognition.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Intelligent Semantic Information Retrieval in Medical Pattern Cognitive Analysis.
Proceedings of the Computational Science and Its Applications, 2005

2004
Medical Image Understanding Technology - Artificial Intelligence and Soft-Computing for Image Understanding
Studies in Fuzziness and Soft Computing 156, Springer, ISBN: 978-3-642-53578-9, 2004

Picture Languages in Intelligent Retrieval of Visual Data Semantic Information.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004

Picture Languages in Cognitive Approach to Medical Visualization Understanding.
Proceedings of the Intelligent Information Processing and Web Mining, 2004

Cognitive Reasoning in Intelligent Medical Information Systems - Visual Data Perception Algorithms in Medical Decision support Systems.
Proceedings of the ICEIS 2004, 2004

The New Concept in Computer Vision: Automatic Understanding of the Images.
Proceedings of the Artificial Intelligence and Soft Computing, 2004

2003
Artificial intelligence structural imaging techniques in visual pattern analysis and medical data understanding.
Pattern Recognit., 2003

Cognitive Vision Systems in Medical Applications.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

Visual signal processing and image understanding in biomedical systems.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Content-Based Reasoning in Intelligent Medical Information Systems.
Proceedings of the ICEIS 2003, 2003

Artificial Intelligence Techniques in Retrieval of Visual Data Semantic Information.
Proceedings of the Web Intelligence, 2003

2002
Syntactic reasoning and pattern recognition for analysis of coronary artery images.
Artif. Intell. Medicine, 2002

2001
Image Understanding Methods in Biomedical Informatics and Digital Imaging.
J. Biomed. Informatics, 2001

Knowledge discovery approach to automated cardiac SPECT diagnosis.
Artif. Intell. Medicine, 2001

Semantic-Oriented Syntactic Algorithms For Content Recognition And Understanding Of Images In Medical Databases.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

Automatic understanding of selected diseases on the basis of structural analysis of medical images.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Application of syntactic methods of pattern recognition for data mining and knowledge discovery in medicine.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000

1998
Languages of shape feature description and syntactic methods for recognition of morphological changes in organs in analysis of selected x-ray images.
Proceedings of the Medical Imaging 1998: Image Processing, 1998


  Loading...