Wykaz publikacji wybranego autora

Marek Ogiela, prof. dr hab.

profesor zwyczajny

Wydział Elektrotechniki, Automatyki, Informatyki i Inżynierii Biomedycznej
WEAIiIB-kair, Katedra Automatyki i Robotyki


  • 2018

    [dyscyplina 1] dziedzina nauk inżynieryjno-technicznych / informatyka techniczna i telekomunikacja

    [dyscyplina 2] dziedzina nauk ścisłych i przyrodniczych / informatyka (50%)


[poprzednia klasyfikacja] obszar nauk technicznych / dziedzina nauk technicznych / informatyka


Identyfikatory Autora Informacje o Autorze w systemach zewnętrznych

ORCID: 0000-0002-8298-8627 orcid iD

ResearcherID: A-7735-2013

Scopus: 6701358294

PBN: 5e70922c878c28a0473911a7

OPI Nauka Polska

System Informacyjny AGH (SkOs)




1
  • A novel approach to geocaching event prognosis using spatiotemporal data
2
3
  • Advanced human motion analysis and visualization: comparison of mawashi-geri kick of two elite karate athletes
4
  • Advanced techniques for computer sharing and management of strategic data
5
  • Advances in cognitive information systems
6
  • AI approaches in computer-aided diagnosis and recognition of neoplastic changes in MRI brain images
7
  • AI cognitive - based systems supporting learning processes
8
  • Algorithms of neuro and cognitive financial analysis
9
  • An efficient steganographic protocol for WebP files
10
  • An extension of imagechain concept that allows multiple images per block
11
  • Application of assistive computer vision methods to Oyama karate techniques recognition
12
13
  • Application of centerline detection and deformable contours algorithms to segmenting the carotid lumen
14
  • Application of cognitive information systems in medical image semantic analysis
15
  • Application of cognitive protocols in transformative computing
16
17
  • Application of Hidden Markov Models and Gesture Description Language classifiers to Oyama karate techniques recognition
18
  • Application of hybrid intelligence for security purposes
19
  • Application of knowledge-based cognitive CAPTCHA in Cloud of Things security
20
  • Application of neural network for human actions recognition
21
22
  • Application of perceptual features for user authentication in distributed systems
23
  • Application of personalized cryptography in cloud environment
24
  • Applying of security mechanisms to middle and high layers of OSI/ISO network model
25
  • Augmented reality approaches in intelligent health technologies and brain lesion detection