Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling the wireless sensor networks using the error control scheme., , and . IDAACS-SWS, page 122-126. IEEE, (2016)Method of Operative Search of Solder Joints During Printed Circuit Boards Development., , , , , , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 1030-1041. CEUR-WS.org, (2019)Decision tree based targeting model of customer interaction with business page., , , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 1001-1012. CEUR-WS.org, (2020)Conceptual Model of IoT-based Laboratory for Study the Electrical Engineering and Electronics., , , , , and . CMIS, volume 2864 of CEUR Workshop Proceedings, page 344-355. CEUR-WS.org, (2021)Influence of intersymbolical interference and mutual modulation noise on digital signals with frequency coding., , , and . IDAACS (1), page 509-512. IEEE, (2011)Hierachical Model of Behavior On-line Testing for Distributed Information Systems., , , , , , and . IDAACS, page 724-729. IEEE, (2019)Choosing the Method of Finding Similar Images in the Reverse Search System., , , and . COLINS, volume 2136 of CEUR Workshop Proceedings, page 99-107. CEUR-WS.org, (2018)Intelligent Method for Forming the Consumer Basket., , , , , and . ICIST, volume 1665 of Communications in Computer and Information Science, page 221-231. Springer, (2022)Matrix Hyper-Basis Function Neural Network and Its Online Learning., , , and . IDAACS, page 1-4. IEEE, (2023)Malware Detection Tool Based on Emulator State Analysis., , , and . IDAACS, page 135-140. IEEE, (2023)