National Repository of Grey Literature 31,419 records found  beginprevious31410 - 31419  jump to record: Search took 0.74 seconds. 

Essential tools for developing web applications
Ševčík, Petr ; Pinkas, Otakar (advisor) ; Chudán, David (referee)
This bachelor thesis is devoted to problems of creating web applications using XML files for data storing. The main mission of thesis is to demonstrate XML language usage in these applications and to introduce a reader with another important languages for development of these applications. This thesis is trying to offer a complex view of this problem. Because success of application largely relies on the fact how easily the applacation can be found by potential users of the web, the thesis describes how can be web sites indexed by search engines. There are two main parts of this bachelor thesis: teoretical and practical. The first chapter describes HTML language with accent on his features that can be used for cooperation with web applications. The second chapter is devoted to XML markup language. Third chapter is about Dublin Core metadata standard which can be used with web applications to ease searching of electronical sources. The fourth chapter describes indexing of web pages by search engines and the following fifth chapter describes advanced searching with search engine Google, that can be used for detection if search engine optimization was successfull and if web page is findable. The sixth chapter dedicated to practical part of this thesis. This part describes developed web application programmed in PHP language. This application works with XML file via DOM and SimpleXML interfaces. Interfaces are compared to each other. This chapter also offer some guides describing how to implement some usefull functions in web application.

Formulation of the requisition for services related to Internet communication
Langr, Lukáš ; Gála, Libor (advisor) ; Kafka, Daniel (referee)
In this work, I would like to focus on the issue related to the formulation of requirements for the delivery of services related to Internet communications, specifically to its most common form - websites. The goal of my work is to introduce the aspects of the implementation of the web pages (from basic business presentations to complex web applications such as e-shop or community site) to creators of the requisition, who are prepared to enter the world of the Internet. Provide them with an overview across the typical features of web applications to be able to formulate their own requirements for a successful website. The knowledge will serve them in the choice of supplier of the solution and also in the first stage of the subsequent implementation. The opening part of my work will be dedicated to description of the basic services related to Internet communications, such as internet service providing or applications hosting on dedicated servers. In the next chapter is already focusing on the specification of the requisition for the delivery of services related to the development and maintenance of websites. This includes the definition of those services, clarification of the types of websites and applications. While we are formulating any kind of requisition, it is important to follow certain procedures and forms. For this reason, I dedicated one of the chapters to specifications of the structure of a typical requisition document related to web applications. In the finals chapters, I will focus on the requisition for websites from different perspectives, such as the graphic appearance, functionality, accessibility and usability, security and ultimately the running web applications and internet marketing.

Wireless network management of the smaller internet service provider
Hopian, Martin ; Pavlíček, Luboš (advisor)
This Bachelor thesis discusses IT issues of the small WISP. It focuses mainly to the scope of IT services providing. Because of the complication of the network management, providers utilize different types of systems, that provide high level of network management and also saves work-time needed. After the initial observation of the issue I will describe one of the most widespread de facto standard of the IT management -- ITIL (IT Infrastructure Library). This thesis is addressed to only one part of the ITIL library - Service Support. This part provides collection of recommendations how to deal with support of single IT processes and how to support them by the used systems. Next I will describe two Czech Made complex systems that are widely used in the wireless network administration segment. After all I would like to evaluate them in respect to the ITIL utilization.

Complex valuation of Jihlavan a.s.
Skoumal, David ; Synek, Miloslav (advisor) ; Průša, Petr (referee)
Dissertation is concerned with practical usage of financial and economical analysis and other analysis and ratings used in business administration. Uses also bankruptcy and financial site models.

Decision Trees and Knowledge Extraction
Vitinger, Jiří ; Mrázová, Iveta (advisor) ; Jiroutek, Pavel (referee)
The goal of data mining is to extract knowledge, dependencies and rules from data sets. Many complex methods were developed to solve it. This thesis presents some of the most important methods, which include the decision trees with algorithms ID3, C4.5 and CART, neural networks like multilayer neural networks with the backpropagation algorithm, RBF networks, Kohonens maps and some modifications of LVQ method. There are also described some clustering methods like hierarchical clustering, QT clustering, kmeans method and its fuzzy modification. The work also includes data pre-processing techniques, which are very important in order to obtain better results of data mining process. Experimental part of the work compares the presented methods by means of the results of many tests on real-world data sets. The results can be used as a guide to choose an appropriate method and its parameters for some given data set. In this work there is presented author's implementation of the decision trees C4.5 and CART in C#. In the application it is possible to watch details of algorithms work. The application provides an API enabling an implementation of new algorithms.

Approximate solution of Unconstrained influence diagrams
Fried, Vojtěch ; Vomlelová, Marta (advisor) ; Studený, Milan (referee)
We give an introduction to the theory of probabilistic graphical models and describe several types of them (Bayesian Networks - BN, Influence Diagrams - ID, Unconstrained Influence Diagrams - UID). Unconstrained Influence Diagrams support the possibility for the user to choose the ordering of decisions based on observations. This increases the expressive power of UIDs compared to IDs but makes it harder to find an optimal solution. It is often impossible to find an optimal solution because of exponential complexity increase compared to IDs. Therefore we design and investigate several approximate methods to solve UIDs. The result of these methods is an ordinary ID created from the former UID by adding edges. The optimal solution of the ID should be as close to the original UID as possible. Heuristical methods represent one type of the methods investigated. Heuristical methods use a simplification of the optimal algorithm. During the run of the algorithm heuristics are used to cut off the branches that are not perspective for further calculation. Another type of methods is to create the ID directly. We evaluate our methods experimentally based on randomly generated UIDs of three types and compare their performance namely to the optimal solution and to equally complex random methods.

Topological analysis of computer network threats
Řeháková, Jaroslava Antea ; Trčka, Martin (referee) ; Jirovský, Václav (advisor)
To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this project, we describe a tool that implements a topological approach to network vulnerability analysis. Out TAU Model includes modeling of network security conditions and attack techniques with use of preconditions/postconditions dependencies. An important part of TAU Model is The Graph of Dependencies that is used for creating exploit sequences leading to specifics attack goals. This representation enables highly scalable methods of vulnerability analysis, such as discovering security flaws of given network configuration. An important subject of this project is discussion about complexity and stopping of TAU Model computation. We also mention future extension possibilities and technical challenges.

Venticular activation patterns in conduction abnormalities and during different pacing modes (aktivační sekvence při poruchách komorového vedení a různých typech komorové stimulace)
Peichl, Petr ; Kautzner, Josef (advisor) ; Lukl, Jan (referee) ; Kittnar, Otomar (referee)
Academic dissertation: Ventricular activation patterns in conduction abnormalities and during different pacing modes Petr Peichl, MD, Department of Cardiology, IKEM, Vídeňská 1958/9, Prague, Czech Republic 5 Congestive heart failure (CHF) is a progressive disease caused by left ventricular dysfunction with high morbidity and mortality rates. Ventricular dysfunction is often linked to ventricular dilatation, which in turn may cause ventricular conduction delays and further worsening of the cardiac function. Recent decade gave rise to cardiac resynchronization therapy (CRT), a therapeutic modality based on premise that preexcitation of late activating10 regions by cardiac pacing may restore the left ventricular synchronous contraction. The goals of the publications included in the dissertation were: (1) to analyze the ventricular activation patterns in patients eligible for CRT with respect to the underlying heart disease and/or QRS morphology on the surface electrocardiogram(ECG), (2) to quantify changes in ventricular activation patterns during different pacing modes and (3) to compare15 the hemodynamic performance of different pacing modes during exercise. 1. Patients with CHF and wide QRS complex represent a broad spectrum of underlying conduction disturbances with variable inter- and intraventricular...

Industry Hall in the Complex Moravostav - Project Planning of Construction
Kondratenko, Bohdan ; Klempa, Lukáš (referee) ; Motyčka, Vít (advisor)
This work deals with the planning of industrial hall with administrative placement execution in the complex Moravostav, Modřice. The hall is founded on bored piles. This building is made of reinforced concrete structure with prefabricated deals. The facade is consisted of sheeting panels, roof deck is made from steel trapezoidal sheets. The thesis describes the procedures and other necessary connection with construction to accelerate the actual implementation of the construction site. The aim of this work is to develop selected parts of building technology project within the scope of the annex to the master‘s thesis.

Interdoménové a intradoménové interakce u motorové podjednotky EcoR124I: Výpočetní studie
SINHA, Dhiraj
EcoR124I is a Type I restrictionmodification (RM) enzyme and as such forms multifunctional pentameric complexes with DNA cleavage and ATP-dependent DNA translocation activities located on the motor subunit HsdR. When non-methylated invading DNA is recognized by the complex, two HsdR endonuclease/motor subunits start to translocate dsDNA without strand separation activity up to thousands base pairs towards the stationary enzyme while consuming ~1 molecule of ATP per base pair advanced. Whenever translocation is stalled the HsdR subunits cleave the dsDNA nonspecifically far from recognition site. The X-ray crystal structure of HsdR of EcoR124I bound to ATP gave a first insight of structural/functional correlation in the HsdR subunit. The four domains within the subunit were found to be in a square planer arrangement. Computational modeling including molecular dynamics in combination with crystallography, point mutations, in vivo and in vitro assays reveals how interactions between these four domains contribute to ATP-dependent DNA translocation, DNA cleavage or inter-domain communication between the translocase and endonuclease activities.