311 |
Container Hosts as Virtual Machines : A performance studyAspernäs, Andreas, Nensén, Mattias January 2016 (has links)
Virtualization is a technique used to abstract the operating system from the hardware. The primary gains of virtualization is increased server consolidation, leading to greater hardware utilization and infrastructure manageability. Another technology that can be used to achieve similar goals is containerization. Containerization is an operating-system level virtualization technique which allows applications to run in partial isolation on the same hardware. Containerized applications share the same Linux kernel but run in packaged containers which includes just enough binaries and libraries for the application to function. In recent years it has become more common to see hardware virtualization beneath the container host operating systems. An upcoming technology to further this development is VMware’s vSphere Integrated Containers which aims to integrate management of Linux Containers with the vSphere (a hardware virtualization platform by VMware) management interface. With these technologies as background we set out to measure the impact of hardware virtualization on Linux Container performance by running a suite of macro-benchmarks on a LAMP-application stack. We perform the macro-benchmarks on three different operating systems (CentOS, CoreOS and Photon OS) in order to see if the choice of container host affects the performance. Our results show a decrease in performance when comparing a hardware virtualized container host to a container hosts running directly on the hardware. However, the impact on containerized application performance can vary depending on the actual application, the choice of operating system and even the type of operation performed. It is therefore important to consider these three items before implementing container hosts as virtual machines.
|
312 |
Gradient Boosting Machine and Artificial Neural Networks in R and H2O / Gradient Boosting Machine and Artificial Neural Networks in R and H2OSabo, Juraj January 2016 (has links)
Artificial neural networks are fascinating machine learning algorithms. They used to be considered unreliable and computationally very expensive. Now it is known that modern neural networks can be quite useful, but their computational expensiveness unfortunately remains. Statistical boosting is considered to be one of the most important machine learning ideas. It is based on an ensemble of weak models that together create a powerful learning system. The goal of this thesis is the comparison of these machine learning models on three use cases. The first use case deals with modeling the probability of burglary in the city of Chicago. The second use case is the typical example of customer churn prediction in telecommunication industry and the last use case is related to the problematic of the computer vision. The second goal of this thesis is to introduce an open-source machine learning platform called H2O. It includes, among other things, an interface for R and it is designed to run in standalone mode or on Hadoop. The thesis also includes the introduction into an open-source software library Apache Hadoop that allows for distributed processing of big data. Concretely into its open-source distribution Hortonworks Data Platform.
|
313 |
Nástroj pro funkční testování / Software tool for factory acceptance testDostál, Adam January 2018 (has links)
This work is focused on the implementation of functional tests within the software project in the field of energy in the company Unicorn. The theoretical part describes in general the project methodology of software development and the methodology Rational Unified Process (RUP). In addition, the test methods are included, and the quality management model FURPS+. The last section introduces functional tests, including a description of those that are used to test the developed application. The practical part consists of description of the energy project Nemo Link, developed application Nemo Link Dispatch System (NDS), individial application modules, test enviroment, used tools and designed test methodology. Based on this methodology, individual selected tests are performed and evaluated.
|
314 |
Zpracování velkých dat z rozsáhlých IoT sítí / Big Data Processing from Large IoT NetworksBenkő, Krisztián January 2019 (has links)
The goal of this diploma thesis is to design and develop a system for collecting, processing and storing data from large IoT networks. The developed system introduces a complex solution able to process data from various IoT networks using Apache Hadoop ecosystem. The data are real-time processed and stored in a NoSQL database, but the data are also stored in the file system for a potential later processing. The system is optimized and tested using data from IQRF network. The data stored in the NoSQL database are visualized and the system periodically generates derived predictions. Users are connected to this system via an information system, which is able to automatically generate notifications when monitored values are out of range.
|
315 |
Automatická konfigurace virtuální infrastruktury / Automatic configuration of virtual infrastructureKadlíček, Jan January 2020 (has links)
This master thesis focuses on the issue of automation of virtual infrastructure and available tools such as Ansible, Terraform and Puppet. The individual tools are compared here in sequence for installations or configuration creation. The result of this semester thesis is the selection of a suitable tool for automation of virtual infrastructure.
|
316 |
Infrastruktura veřejných klíčů / Infrastructure of public keysBědajánek, Ondřej January 2008 (has links)
The subject of my thesis dscribes function and principles of the public key infrastructure as well as certificate authority. Under the operation system Linux was created self signed certificate authority. Web interface was devoloped in PHP for the purpose of the generation, distribution and rejection certificates. Configuration files for OpenVPN are included in the thesis and wireless security is achived by OpenVPN.
|
317 |
Webová aplikace pro výuku simulací v ns2 / Web Application for NS2 TrainingPavlosek, Václav January 2009 (has links)
There is information to my master's thesis which is called “Web application for NS2 training”. This application works after installation and its source codes are saved on applied CD. It is said about implement Network Simulator 2. It helps to realize simulation of nets and then author inserts information about them into web application. Registered web's visitor has possibility to insert project into application. The project contents information about simulation created in NS2. Web application can also visible detail of possible project which is approved of administrator. Then the visitor can sort projects, search entered expression or connect his contribution to discussion forum. Administrator can approve users projects in his part of application. It makes available for the others. He can also delete them from database. Theory about technologies which are used for implementation of this application. It is talked about web Apache server, database MySQL server and programmable PHP language. There is also mentioned information about security of web application included possible attacks on applications and their database. It is presented proposal of database which creates core of application. This proposal is depended on application requirements. Next chapters give to reader whole image about functionality of application. There are mentioned samples of final graphical image of application. This document also provides the shows of source codes for creating database tables.
|
318 |
Elektronický systém řízení hudebního nástroje / Control system of mouth-organTrukhina, Irina January 2014 (has links)
The master’s thesis describes development of control system for automatic mouth-organ. The process of development is divided into three parts: a concept of control system, design of hardware parts and development of software parts. Controlled device, system requirements and general design of the hardware and software components are described in the concept of control system. The detailed hardware design includes next processes: electronic component selection, printed circuit board design, assembly and debugging. The result of this chapter is electronic system, which function correctly. The aim of the last chapter is to specify and explain development of software parts of control system. Installation of required software and important aspects of control software and user interface development are described in this chapter. The goal of the thesis is to create a control system, which will function correctly and reliably.
|
319 |
Detekce slow-rate DDoS útoků / Detection of slow-rate DDoS attacksSikora, Marek January 2017 (has links)
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Then created system is tested in the laboratory network. Presented results of the testing show that the system is able to detect attacks Slow GET, Slow POST, Slow Read and Apache Range Header and then protect Web servers from affecting provided services.
|
320 |
"One to the Head, Two to the Heart": The Failure of Psychological Warfare Doctrine and Understanding in The Vietnam WarRable, Kyle K. 11 May 2021 (has links)
No description available.
|
Page generated in 0.0142 seconds