Prof. Miroslav Voznak
at VSB Technical Univ of Ostrava
SPIE Involvement:
Author
Publications (24)

PROCEEDINGS ARTICLE | May 12, 2016
Proc. SPIE. 9850, Machine Intelligence and Bio-inspired Computation: Theory and Applications X
KEYWORDS: Databases, Feature extraction, Telecommunications, Neural networks, Speech recognition, Stochastic processes, Computer security, Vestigial sideband modulation, Network security, Neurons

PROCEEDINGS ARTICLE | May 12, 2016
Proc. SPIE. 9848, Modeling and Simulation for Defense Systems and Applications XI
KEYWORDS: Unmanned aerial vehicles, Networks, Computer simulations, Telecommunications, Modeling and simulation, Wireless communications, Neodymium, Defense systems, Mobile communications, Current controlled current source

PROCEEDINGS ARTICLE | May 12, 2016
Proc. SPIE. 9850, Machine Intelligence and Bio-inspired Computation: Theory and Applications X
KEYWORDS: Statistical analysis, Databases, Video, Control systems, Telecommunications, Televisions, Adaptive control, Excel, Information security, Vestigial sideband modulation

PROCEEDINGS ARTICLE | May 12, 2016
Proc. SPIE. 9850, Machine Intelligence and Bio-inspired Computation: Theory and Applications X
KEYWORDS: Biometrics, Databases, Forensic science, Signal processing, Neural networks, Genetics, Speaker recognition, Systems modeling, Vestigial sideband modulation, Neurons

PROCEEDINGS ARTICLE | May 23, 2015
Proc. SPIE. 9456, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement XIV
KEYWORDS: Cell phones, Databases, Receivers, Oxygen, RF communications, Information security, Computer security, Global system for mobile communications, Mobile communications, Network security

PROCEEDINGS ARTICLE | May 23, 2015
Proc. SPIE. 9456, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement XIV
KEYWORDS: Safety, LabVIEW, Visualization, Sensors, Sensor networks, Information security, Computer security, Global Positioning System, Network security, Transportation security

Showing 5 of 24 publications
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Back to Top