Spelling suggestions: "subject:"python"" "subject:"jython""
271 |
Návrh datového skladu / Design of Data WarehouseSzkuta, David January 2018 (has links)
This diploma thesis deals with the design of a data warehouse that stores events created in the mobile app. The goal was to design an alternative to the current solution. The thesis explains concepts, mainly data warehouse terminology, which are used in subsequent chapters. An analysis of the current solution is conducted, and as well as research of available data warehouse and ETL services. Based on the results of the analysis, a suitable new solution is chosen, implemented, and tested.
|
272 |
Systém pro alokaci a konfiguraci hardwarových zdrojů / System for Allocation and Configuration of Hardware ResourcesSlováček, Jan January 2018 (has links)
This master's thesis is about analysis, design and implementation of a system for shared resources reservation and its remote control. Subjects of sharing are test and development prototypes. For remote control are used I/O devices ET-7042 and SITOP PSU8600. The reader is introduced to target environment, REST application interfaces and communication standards Modbus and Profinet. The knowledge gathered is used in design and implementation of the system. The main goal of thesis is to make development and testing in lab more effective.
|
273 |
Detekce phishingu ve webových stránkách / Phishing Detection in Web PagesBeňo, Marek January 2019 (has links)
This work deals with the design of a phishing attack detection and classification tool. The work describes techniques and forms of phishing attacks and availible tools and techniques for phishing detection. Based on the analysis of existing tools a solution for file classification is proposed. Implemented tool handles input parsing and creation of input model. Model is based on hybrid analysis of input file and URL. Using the YARA tool, YARA rules are applied which are then used in creation of input classification. Analysis of input model and definition of classification rules is enabled by implemented YARA module. Implemented solution makes it possible to define YARA rules for phishing classification based on the structural properties of a phishing file and features of source URL.
|
274 |
Gnu Health Monitoring module / Gnu Health Monitoring moduleVeselá, Barbora January 2019 (has links)
This thesis focuses on the development of a GNU Health Module for electrocardiogram monitoring and the development of an application providing a fundamental electrocardiogram analysis. The theoretical part contains a brief introduction to hospital information systems including electronic patient record and healthcare data standards information, followed by a description of the GNU Health application and the implementation of the electrocardiogram analysis, written in the Python programming language. The practical part deals with the development of the GNU Health Monitoring module and the external application for signal analysis. The results, disscussion and the conclusion follow.
|
275 |
Srovnání heuristických a konvenčních statistických metod v data miningu / Comparison of Heuristic and Conventional Statistical Methods in Data MiningBitara, Matúš January 2019 (has links)
The thesis deals with the comparison of conventional and heuristic methods in data mining used for binary classification. In the theoretical part, four different models are described. Model classification is demonstrated on simple examples. In the practical part, models are compared on real data. This part also consists of data cleaning, outliers removal, two different transformations and dimension reduction. In the last part methods used to quality testing of models are described.
|
276 |
Aplikace pro monitorování sítí / Application for Monitoring of IP NetworksŠmalec, Ondřej January 2019 (has links)
Diplomová práce popisuje vytvoření aplikace pro monitorování síťových zařízení. Výsledky jsou zobrazené jako grafické uživatelské rozhraní společně s vykreslenou topologií. Aplikace je z velké části napsána v jazyce Python. Pro získávání informací z topologie jsou využity protokoly SNMP a SSH. Hlavní cíl je vytvořit aplikaci, která monitoruje síťová zařízení a vykresluje tuhle topologii do grafického uživatelského rozhraní. Tato aplikace reaguje dynamicky na změny v monitorovací topologii.
|
277 |
Softwarový kontrolér Wi-Fi přístupových bodů se systémem OpenWrt / Software Controller for OpenWrt Based Wi-Fi Access PointsJašíček, Petr January 2019 (has links)
The aim of this thesis was to create a web application used for centralized management and configuration of wireless networks on access points running on OpenWrt distribution. The reader is acquainted with common principles of wireless networks including description of existing solutions for their centralized management. After that the thesis introduces the reader to OpenWrt distribution and to a method of its configuration using UCI model. The reader is then introduced to the main technologies used in this thesis. Author further describes architecture, user interface and implementation of the web application. The created web application is platform agnostic and provides easy way to manage and configure access points with OpenWrt distribution.
|
278 |
Analýza zdrojů nevyžádané elektronické pošty / Analysis of email spam sourcesCaha, Tomáš January 2019 (has links)
The first part of this thesis deals with an approach of designing and developing of application for IP geolocation using various geolocation databases. Methods of geographical location of network devices and amount of available data provided by chosen commercial and freely accessible geolocation databases are presented. The data are summarized with focus on methods of obtaining information about IP addresses from various databases. In the paper there are also presented ways used to develop the Python application and its parts, which can be easily reused in other programs. The command line program was created to demonstrate that all parts of the developed application work properly. The whole application is freely accesible under the conditions of the MIT license, published on GitHub (https://github.com/tomas-net/ip2geotools/) and in the Python package index PyPi. The second part of this thesis deals with the description of cyberthreats and the use of developed application to mass geolocation of IP addresses that are listed in chosen freely accessible lists as sources of email spam or cyberattacks. Geographical analysis of cyberattacks sources shows countries of origin. Results of analysis are presented in graphs and maps.
|
279 |
RaspberryPI kamerový checker / RaspberryPI camera checkerBubeník, Martin January 2019 (has links)
The diploma thesis deals with the industrial inspection of correctly made connectors based on computer recognition, and the detection and recognition application is implemented in Python on the Raspberry Pi platform.The work uses empirically known OpenCV library for recognition. The work also deals with the selection of suitable hardware devices, which are a camera with a lens and an illuminator, from which is created one compact device together with the Raspberry Pi microcomputer. The compact device is further mounted on the designed mechanical structure under which is created inspection zone. Finally, Raspberry Pi has a web-based user interface to check the inspection and the interface to write the data to the database.
|
280 |
Implementace nástroje pro analýzu lokálních struktur DNA / Implementation of local DNA structures analysis toolKaura, Patrik January 2019 (has links)
This diploma thesis is focused on the description and implementation of the API wrapper application, which works on top of computational core ibp bioinformatics. The first half of the thesis is focused on the summary of basic knowledge in the field of DNA research, as well as the specification of the problem and description of selected technologies. The other half deals with the actual implementation, distribution, and evaluation of application applicability on specific DNA sequences.
|
Page generated in 0.0194 seconds