From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Method of Operative Search of Solder Joints During Printed Circuit Boards Development., , , , , , , , , и . CMIS, том 2353 из CEUR Workshop Proceedings, стр. 1030-1041. CEUR-WS.org, (2019)Distributed Sensor Network for Security Systems.. Int. J. Comput., 8 (2): 157-164 (2009)Optimization Methods on the Wavelet Transformation Base for Technical Diagnostic Information Systems., , , , , , , и . IDAACS, стр. 767-773. IEEE, (2021)Formation of the Interval Stego Key for the Digital Watermark Used in Integrity Monitoring of FPGA-based Systems., , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 267-276. CEUR-WS.org, (2020)The monitoring system of DoS/DDoS attacks in the global network., , , и . IDAACS (2), стр. 791-794. IEEE, (2011)978-1-4577-1426-9.Structural statistic method identifying facial images by contour characteristic points., , , , , и . IDAACS, стр. 293-297. IEEE, (2015)Canny-based method of Image Contour Segmentation., , и . Int. J. Comput., (2016)Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection., , , , , , и . IDAACS-SWS, стр. 16-20. IEEE, (2018)Analysis of Objects Classification Approaches Using Vectors of Inflection Points., , , , , , , и . ISDMCI, том 1020 из Advances in Intelligent Systems and Computing, стр. 148-157. Springer, (2019)Assessment of probabilistic parameters of alarm security detectors taking uncertain noise into account., , , , и . IDAACS (2), стр. 717-721. IEEE, (2011)978-1-4577-1426-9.