Arkadiusz Banasik

Orcid: 0000-0002-4267-2783

According to our database1, Arkadiusz Banasik authored at least 12 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Countries' Air Quality and Pollution Data Analysis Approach.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

2022
Recognizing the Fictitious Business Entity on Logistic Regression Base.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

2021
Generating and Numbering Permutations With the Use of Chaotic Maps.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

The Applications of Z-numbers in the Delphi Method.
Proceedings of the Information and Software Technologies - 27th International Conference, 2021

2020
Delphi Method Supported by Forecasting Software.
Inf., 2020

2019
Fuzzy Method with Z-numbers for Choosing Target Group of Users for UX Applications.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Fuzzy Delphi Method with Z-Numbers.
Proceedings of the Information and Software Technologies - 25th International Conference, 2019

2017
Fuzzy-multiple approach in choosing the optimal term for implementing the innovative project.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

2011
Application of quantum cryptography protocols in authentication process.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Biometric logical access control enhanced by use of steganography over secured transmission channel.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Fuzzy evaluation of biometric authentication systems.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

2008
The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008


  Loading...