National Repository of Grey Literature 38 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Measurement of ultrasound speed using transmission tomography
Pop, Tomáš ; Kolář, Radim (referee) ; Jiřík, Radovan (advisor)
The study deals with the image reconstructions using the ultrasound propagation speed measuring and it extends the project of the ultrasound transmission tomography organised in cooperation with the research centre Forschungszentrum Karlsruhe (Germany). There were data processed which had been gained with the 3D ultrasound transmission tomography system (3D USCT). The ultrasound propagation speed was measured using the detection of ultrasound ray travelling time from a transmitter to a receiver. There were three new algorithms developed for the detection of an ultrasound impulse and the software generating suitable testing data. The developed algorithms were consequently tried with these data and, then, included into the existing software. All software was developed within the Matlab programming environment.
Named Entity Recognition and Its Application to Phishing Detection
Pop, Tomáš ; Skopal, Tomáš (advisor) ; Vomlelová, Marta (referee)
This thesis focuses on named entity recognition applied to email phishing detection. Named entity recognition is a classification task that aims to extract information from a text into a predefined set of categories (named entities), such as organizations, person names, or locations. The thesis describes various named entity recognition approaches, ranging from simple utilizations of neural networks to the current state-of-the-art archi- tectures. The most prevalent libraries and their models in named entity recognition are compared against each other from the computational and predictive performance per- spective on the publicly available Enron email dataset. Moreover, differences in terms of named entities between positive (including phishing) and negative emails are measured on a proprietary dataset. Ultimately, the proprietary dataset is used for an experiment where a phishing email classification workflow is enriched with named entities to conclude whether named entities are helpful for the classifier to improve predictive performance. According to the experiment outcomes, a noticeable dissimilarity was measured regarding named entities in positive and negative emails. However, in the phishing email classifica- tion experiment with the provided dataset, it was concluded that named entities do not offer...
Scripting in Audacity Audio Editor
Šípoš, Peter ; Pop, Tomáš (advisor) ; Jančík, Pavel (referee)
Audacity is popular and widely used audio editor available for all the main platforms including Windows, Mac as well as various Linux distributions. Audacity functionality can be controlled via sophisticated user interface, but the editor suffers from a lack of support for an automated execution of scripts and therefore, using audacity e.g., to perform the same action on multiple files can be tedious. The thesis aims at extending Audacity editor to allow using scripts in the audio editing workflow. The first part of the thesis overviews Audacity's architecture, and discuss, how Audacity can be extended and what alternative applications are available. Then, the thesis describes the most important decisions that were taken, including the choice of scripting language, managing errors and designing user interface. Finally, the extension functionality is shown on several examples reflecting a typical use-cases.
Bus monitoring and control environment
Zábušek, Gabriel ; Obdržálek, David (advisor) ; Pop, Tomáš (referee)
This text is intended as an accompaniment to software and hardware environment for monitoring and controlling digital buses named Bus-Spy. The thesis analyses the problems of bus control, bus monitoring and existing solutions. It offers a solution in form of a very modular hardware/software environment which is capable of complete monitoring and controlling the i2c (Inter Integrated Circuit) bus and the CAN (Controller Area Network) bus in their basic form. It also explains the software and hardware design of the environment and describes the implementation. The thesis should mainly serve low level and system developers, firmware engineers or anyone involved with digital bus related communication.
Cryptography and Its Application in Secure Data-File Transfer
Pop, Tomáš ; Spoustová, Johanka (advisor) ; Spousta, Miroslav (referee)
In the present work we study applied cryptography. . . The goal of this work is not to study algorithms from the mathematical or statistical view, instead we are trying to look at cryptography from a poin of view of the "end consumer or "programmmer. It should help the reader to find an appropriate algorithm for his program. The application on the end of the work is written to as readable as possible.
Dynamic reconfiguration in SOFA 2 component system
Babka, David ; Bureš, Tomáš (advisor) ; Pop, Tomáš (referee)
SOFA 2 is a component system employing hierarchically composed components in distributed environment. It contains concepts, which allow for specifying dynamic reconfigurations of component architectures at runtime, which is essential for virtually any real-life application. The dynamic reconfigurations comprise creating/disposing components and creating/disposing connections between components. In contrast to majority of component systems, SOFA 2 is able to specify possible architectural reconfigurations in the application architecture at design time. This allows SOFA 2 runtime to follow the dynamic behavior of the application and reflect the behavior in architectural reconfigurations. The goal of this thesis is to reify these concepts of dynamic reconfigurations in the implementation of SOFA 2 and demonstrate their usage on a demo application.
The Progress run-time architecture
Pop, Tomáš ; Bureš, Tomáš (advisor) ; Děcký, Martin (referee)
This thesis is a part of a bigger research vision called Progress which aims at providing component based techniques for the development of realtime embedded systems. Progress introduces the concept of a virtual node in order to increase the effectiveness of constructed systems and improve hardware abstraction. The thesis starts research of the runtime structures of the Progress component model. The thesis aims at identifying necessary questions about the runtime internal structure of virtual nodes and about the supporting mechanisms needed to run virtual nodes on destination hardware. A part of this thesis is also a sample implementation of the virtual node runtime environment covering local and Ethernet communication, event driven and timer driven tasks, and multiple computational nodes.
Identification of Battery-Hungry Parts of Android Application Code
Jankovič, Ivan ; Pop, Tomáš (advisor) ; Libič, Peter (referee)
In just forty years, the number of mobile devices has exceeded the number of humans on Earth. With the growing computational capacity, the power demands of these devices are growing rapidly as well. Due to technological and spatial constraints, the capacity of mobile power sources has become one of the most important bottlenecks of further development. Moreover, since the power efficiency is a relatively new requirement, there are only a few tools addressing it, and the existing ones have certain drawbacks. The goal of this thesis is to design and implement a tool helping developers of Android mobile applications to identify the battery-hungry parts of application code. The proposed solution is based on a novel approach - examination of power use estimations derived from the device's state together with the information about the code that is currently being executed. The prototype implementation has been tested on two Android applications with the conclusion that the proposed approach can provide useful information to the developer, but in practice, it encounters technical limitations reducing its accuracy, and thus it can not be used as a fully automated tool for identification of battery-hungry parts of Android application code.
System for Computer Network Management
Lacina, Martin ; Ježek, Pavel (advisor) ; Pop, Tomáš (referee)
Title: System for Computer Network Management Author: Martin Lacina Department: Department of Software Engineering Supervisor: Mgr. Pavel Ježek, Department of Distributed and Dependable Systems Abstract: The goal of this thesis is creation of scalable modular application for small computer network administrators, which should facilitate the implementation of their daily activities. The first section focuses on detailed analysis of the structure of developed application, design of interfaces provided to extension modules and their interfaces. Next follows an analysis of functions, which are provided by basic application to extension modules and which core modules will be responsible for them. The second part contains information about structure of created implementation and basic summary of its individual components. The result of this work is a complete implementation of basic application and basic set of extension modules.
Wave editor
Šebesta, Michal ; Kofroň, Jan (advisor) ; Pop, Tomáš (referee)
The goal of the work is to develop an application for working with a sound. The aplication doesn't try to compete with a long time developed commercial application. It tries to point out what is the most important for sound editing. Therefore the application mainly contains the most important and the most comfortable elements. These elements are e.g. loading sound files, recording with microphone, editing functions, multitracking and various effects. Setting of shortcuts and design is comfortable for users, too.

National Repository of Grey Literature : 38 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.