{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:44:59Z","timestamp":1760402699876,"version":"build-2065373602"},"reference-count":13,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>This Special Issue aimed to gather high-quality advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations of these techniques in the areas of modern telecommunications and cybersecurity [...]<\/jats:p>","DOI":"10.3390\/e24010108","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T17:42:25Z","timestamp":1641836545000},"page":"108","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Advances in Computer Recognition, Image Processing and Communications"],"prefix":"10.3390","volume":"24","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[{"name":"Faculty of Telecommunications, Computer Science and Electrical Engineering, Bydgoszcz University of Science and Technology, 85-796 Bydgoszcz, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3506-6611","authenticated-orcid":false,"given":"Robert","family":"Burduk","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Networks, Wroclaw University of Science and Technology, 50-370 Wroclaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5630-7461","authenticated-orcid":false,"given":"Agata","family":"Gie\u0142czyk","sequence":"additional","affiliation":[{"name":"Faculty of Telecommunications, Computer Science and Electrical Engineering, Bydgoszcz University of Science and Technology, 85-796 Bydgoszcz, Poland"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"Faculty of Telecommunications, Computer Science and Electrical Engineering, Bydgoszcz University of Science and Technology, 85-796 Bydgoszcz, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-8500","authenticated-orcid":false,"given":"Tomasz","family":"Marciniak","sequence":"additional","affiliation":[{"name":"Faculty of Telecommunications, Computer Science and Electrical Engineering, Bydgoszcz University of Science and Technology, 85-796 Bydgoszcz, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lutowski, Z., Bujnowski, S., Marciniak, B., Kloska, S., Marciniak, A., and Lech, P. (2021). A Novel Method of Vein Detection with the Use of Digital Image Correlation. Entropy, 23.","DOI":"10.3390\/e23040401"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Pawlicki, M., and Chora\u015b, R.S. (2021). Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks. Entropy, 23.","DOI":"10.3390\/e23101304"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Okarma, K., Chlewicki, W., Kopytek, M., Marciniak, B., and Lukin, V. (2021). Entropy-Based Combined Metric for Automatic Objective Quality Assessment of Stitched Panoramic Images. Entropy, 23.","DOI":"10.3390\/e23111525"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wang, L., Wang, P., Wu, L., Xu, L., Huang, P., and Kang, Z. (2021). Computer Vision Based Automatic Recognition of Pointer Instruments: Data Set Optimization and Reading. Entropy, 23.","DOI":"10.3390\/e23030272"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Havrylenko, Y., Kholodniak, Y., Halko, S., Vershkov, O., Bondarenko, L., Suprun, O., Miroshnyk, O., Shchur, T., \u015arutek, M., and Gackowska, M. (2021). Interpolation with Specified Error of a Point Series Belonging to a Monotone Curve. Entropy, 23.","DOI":"10.3390\/e23050493"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Havrylenko, Y., Kholodniak, Y., Halko, S., Vershkov, O., Miroshnyk, O., Suprun, O., Dereza, O., Shchur, T., and \u015arutek, M. (2021). Representation of a Monotone Curve by a Contour with Regular Change in Curvature. Entropy, 23.","DOI":"10.3390\/e23070923"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhang, X., Yang, Y., Li, Z., Ning, X., Qin, Y., and Cai, W. (2021). An improved encoder-decoder network based on strip pool method applied to segmentation of farmland vacancy field. Entropy, 23.","DOI":"10.3390\/e23040435"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zakrzewski, Z. (2021). Optical Channel Selection Avoiding DIPP in DSB-RFoF Fronthaul Interface. Entropy, 23.","DOI":"10.3390\/e23111554"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Szcze\u015bniak, I., Olszewski, I., and Wo\u017ana-Szcze\u015bniak, B. (2021). Towards an Efficient and Exact Algorithm for Dynamic Dedicated Path Protection. Entropy, 23.","DOI":"10.3390\/e23091116"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"\u015amigiel, S., Pa\u0142czy\u0144ski, K., and Ledzi\u0144ski, D. (2021). ECG Signal Classification Using Deep Learning Techniques Based on the PTB-XL Dataset. Entropy, 23.","DOI":"10.3390\/e23091121"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kiedrowski, P. (2021). Selection of the Optimal Smart Meter to Act as a Data Concentrator with the Use of Graph Theory. Entropy, 23.","DOI":"10.3390\/e23060658"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Bia\u0142czak, P., and Mazurczyk, W. (2021). Hfinger: Malware HTTP Request Fingerprinting. Entropy, 23.","DOI":"10.3390\/e23050507"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Komisarek, M., Pawlicki, M., Kozik, R., Ho\u0142ubowicz, W., and Chora\u015b, M. (2021). How to Effectively Collect and Process Network Data for Intrusion Detection?. Entropy, 23.","DOI":"10.3390\/e23111532"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/1\/108\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:01:52Z","timestamp":1760364112000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/1\/108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":13,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["e24010108"],"URL":"https:\/\/doi.org\/10.3390\/e24010108","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2022,1,10]]}}}