National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Optimization of Run Configurations of k-Wave Jobs
Sasák, Tomáš ; Jaroš, Marta (referee) ; Jaroš, Jiří (advisor)
This thesis focuses on scheduling, i.e. correct approximation of configurations used to run k-Wave simulations on supercomputers from the IT4Innovations infrastructure. Especially, for clusters Salomon and Anselm. A single work is composed of a set which contains many simulations. Every simulation is executed by some code from the k-Wave toolbox. To calculate the simulation, it is necesarry to select a suitable configuration, which means the amount of supercomputer resources (number of nodes, i.e. cores), and the duration of the rental. Creation of an ideal configuration is complicated and is even harder for an inexperienced user. The approximation is made based on the empiric data, obtained from multiple executions of different sets of simulations on given clusters. This data is stored and used by a set of approximators, which performs the actual approximation by methods of interpolation and regression. The text describes the implementation of the final scheduler. By experimenting, the most efficient methods for this problem has found out to be Akima spline, PCHIP interpolation and cubic spline. The main contribution of this work is creation of a tool which can find suitable configuration for k-Wave simulation without knowing the code or having lots of experience with its usage.
Ssh Attacks Detection on Netflow Layer
Marek, Marcel ; Barabas, Maroš (referee) ; Michlovský, Zbyněk (advisor)
This bachelor's thesis briefly describes the basic principles of SSH protocol, its architecture and used encryption. The thesis is mainly focused on datamining information from low-level network communication and usage of its results for attacks detection. It also describes dictionary attacks used on SSH service and with NetFlow shows further possibilities of increasing network security.
Optimization of Run Configurations of k-Wave Jobs
Sasák, Tomáš ; Jaroš, Marta (referee) ; Jaroš, Jiří (advisor)
This thesis focuses on scheduling, i.e. correct approximation of configurations used to run k-Wave simulations on supercomputers from the IT4Innovations infrastructure. Especially, for clusters Salomon and Anselm. A single work is composed of a set which contains many simulations. Every simulation is executed by some code from the k-Wave toolbox. To calculate the simulation, it is necesarry to select a suitable configuration, which means the amount of supercomputer resources (number of nodes, i.e. cores), and the duration of the rental. Creation of an ideal configuration is complicated and is even harder for an inexperienced user. The approximation is made based on the empiric data, obtained from multiple executions of different sets of simulations on given clusters. This data is stored and used by a set of approximators, which performs the actual approximation by methods of interpolation and regression. The text describes the implementation of the final scheduler. By experimenting, the most efficient methods for this problem has found out to be Akima spline, PCHIP interpolation and cubic spline. The main contribution of this work is creation of a tool which can find suitable configuration for k-Wave simulation without knowing the code or having lots of experience with its usage.
Ssh Attacks Detection on Netflow Layer
Marek, Marcel ; Barabas, Maroš (referee) ; Michlovský, Zbyněk (advisor)
This bachelor's thesis briefly describes the basic principles of SSH protocol, its architecture and used encryption. The thesis is mainly focused on datamining information from low-level network communication and usage of its results for attacks detection. It also describes dictionary attacks used on SSH service and with NetFlow shows further possibilities of increasing network security.
Self Service Business Intelligence - Available BI solution for small on-line sales business
Řehout, Michal ; Stanovská, Iva (advisor) ; Kosina, Pavel (referee)
The thesis analyzes and proposes stance on how to implement self-service Business Intelligence solution in a company involved in online marketing. Analysis is focused on data sources, information needs in the company and research of suitable product to be implemented. Goal of the thesis is, based on the performed analysis, to propose actions needed for a successful implementation, and to demonstrate opportunities, that such an implementation may provide to the company.
ITAT 2014. Information Technologies - Applications and Theory. Part II
Kůrková, Věra ; Bajer, Lukáš ; Peška, L. ; Vojtáš, P. ; Holeňa, Martin ; Nehéz, M.
ITAT 2014. Information Technologies - Applications and Theory. Part II. Prague : Institute of Computer Science AS CR, 2014. 145 p. ISBN 978-80-87136-19-5. This volume is the second part of the two-volume proceedings of the 14th conference Information Technologies – Applications and Theory (ITAT 2014), which was held in Jasná, Demänovská Dolina, Slovakia, on September 25–29, 2014. ITAT is a computer science conference with the primary goal of exchanging information on recent research results. Overall, 51 papers were submitted to all conference tracks. This volume presents papers from the workshops and an extended abstract of a poster. Three specialized workshops were held as a part of the conference: Data Mining and Preference Learning on Web, Computational Intelligence and Data Mining, and Algorithmic Aspects of Complex Networks Analysis.
ITAT 2014. Information Technologies - Applications and Theory. Part I
Kůrková, Věra ; Bajer, Lukáš
ITAT 2014. Information Technologies - Applications and Theory. Part I. Prague : Institute of Computer Science AS CR, 2014. 101 p. ISBN 978-80-87136-18-8. This volume is the first part of the two-volume proceedings of the 14th conference Information Technologies – Applications and Theory (ITAT 2014). The conference was held in Jasná, Demänovská Dolina, Slovakia, on September 25–29, 2014. ITAT is a computer science conference with the primary goal of exchanging information on recent research results between Czech and Slovak scientific communities, and it presents a platform for young researchers and PhD students to start new collaborations. This year, it was held in parallel with two collocated conferences Datakon and Znalosti with which it shared some invited plenary talks and a poster session. Overall, 51 papers were submitted to all conference tracks. This volume presents 16 papers of the main track, which were selected by the program committee based on at least two reviews by the program committee members. Papers from the three workshops and extended abstracts of posters are included in the second volume.
The methods of security and exaction of receivables
PRACHAŘOVÁ, Iveta
The title of this thesis is called The methods of security and exaction of receivables. This is a large and very complex area of business. Properly chosen method of security receivable can save a company a lot of time and money. The second objective is to describe how to exact the receivables.
Zlepšování učinnosti prevence v telemedicíně
Nálevka, Petr ; Svátek, Vojtěch (advisor) ; Berka, Petr (referee) ; Štěpánková, Olga (referee) ; Šárek, Milan (referee)
This thesis employs data-mining techniques and modern information and communication technology to develop methods which may improve efficiency of prevention oriented telemedical programs. In particular this thesis uses the ITAREPS program as a case study and demonstrates that an extension of the program based on the proposed methods may significantly improve the program's efficiency. ITAREPS itself is a state of the art telemedical program operating since 2006. It has been deployed in 8 different countries around the world, and solely in the Czech republic it helped prevent schizophrenic relapse in over 400 participating patients. Outcomes of this thesis are widely applicable not just to schizophrenic patients but also to other psychotic or non-psychotic diseases which follow a relapsing path and satisfy certain preconditions defined in this thesis. Two main areas of improvement are proposed. First, this thesis studies various temporal data-mining methods to improve relapse prediction efficiency based on diagnostic data history. Second, latest telecommunication technologies are used in order to improve quality of the gathered diagnostic data directly at the source.

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.