Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method for Predicting the Result of Applications Submitted to Scientific Tenders from the Criteria for their Assessment., , , and . MICSECS, volume 2893 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)RDS Program for Optimization Problem., and . CBI (2), page 74-76. IEEE, (2019)Development of Software Complex Personnel Assessment in RDS Environment., and . CBI (2), page 106-110. IEEE, (2019)Information hiding using matroid theory., and . Adv. Appl. Math., (2021)Songs in African Tonal Languages: Contrasting the Tonal System and the Melody., and . LMAC, volume 561 of Communications in Computer and Information Science, page 166-175. Springer, (2015)Private Life Safety Provision in Digital Age., and . J. Digit. Forensics Secur. Law, 12 (3): 77-86 (2017)Towards Model-Agnostic Federated Learning over Networks., , , and . EUSIPCO, page 1614-1618. IEEE, (2023)Simulation of nonlinear models of QPSK costas loop in MatLab Simulink., , , , , and . ICUMT, page 66-71. IEEE, (2014)Nonlinear Models of BPSK Costas Loop., , , , , , and . ICINCO (1), page 704-710. SciTePress, (2014)Hidden attractors in aircraft control systems with saturated inputs., , , , and . CoRR, (2017)