Spelling suggestions: "subject:"kdd""
11 |
Nestabilní obrazy / Unstable PaintingsPražan, Jan January 2012 (has links)
My diploma thesis depends on form of traditional hanging picture. The theme of "unstable images" I tried to complete in three cycles Špalky, Kaktusy and Čaje. I filled them with two narrative paintings Kardinálové and one solo piece Acaccia hand. I'm trying to find a shape of the subject matter that would fill the picture significance of such a character that display that object could become replaceable.
|
12 |
Sběr sémanticky obohacených clickstreamů / The gatheringof semantically enriched clickstreamsBača, Roman January 2009 (has links)
The aim of this thesis is to bring near to the readers the area of webmining and familiarize them with tools, which deal with data mining on the web. The main emphasis is placed on the analytical software program called Piwik. This analytical tool is compared with others nowadays available analytical tools. This thesis also aims to create a compact documentation of the software Piwik. The largest part of this documentation is devoted to the newly programmed plugin. The principle of information retrieval, based on user behavior on the web, is described from the common viewpoint and leads to more factual form of description of information retrieval using this new plugin.
|
13 |
Využití technologií automatické identifikace při řízení firmy / The automatic identification technologies usage for company managementŠvecová, Martina Bc. January 2007 (has links)
Cílem práce je ukázat jakým způsobem lze využít moderní technologie automatické identifikace v procesech řízení firmy. Průmyslové použití čárových kódů v České republice lze vysledovat zhruba od 90 let 20. století, kdy se začaly běžně používat především z důvodu příchodu obchodních řetězců a z toho vyplývajícího zautomatizování identifikace prodávaného zboží. Tato práce je zaměřena nejen na dnes již běžné technologie čárových kódů, ale také na nově nastupující radiofrekvenční identifikaci a řízení pomocí hlasu.
|
14 |
Aplikace logistiky ve Vědecké knihovně Olomouc / Logistics applications in Research library in OlomoucVymazalová, Jana January 2011 (has links)
This master's thesis investigates the of logistics of Research library in Olomouc and offers improvements. I introduce the Czech library system and then concentrate on the Olomouc library's history and the operations of individual departments. I found that the depositories could be improved in aspects such storage and overall building condition. The library uses barcodes for loan administration. To introduce the options of improvements of the library, I describe new technologies that are in use abroad such as RFID tags or shelf stacker in the storage rooms. I believe that the efficacy of library operations would improve should they be concentrated in one building and offer further enhancements to the daily running of the library.
|
15 |
Přístupy ke konsolidaci programové a datové základnyStankay, Michal January 2008 (has links)
In this diploma thesis, I conduct a research into approaches to consolidating data base and source code base of the Techno.cz webserver, which is the subject of the consolidation. By consolidation I mean bringing the server into the state where documentation is produced according to given requirements, data base is changed in order to improve data structure and consistency and source code base is reorganised in order to unify source code upon one platform, improve file system organization and remove problematic characteristics of the source code in general. The goals of this thesis are to create and describe general process of consolidation, sequence and contents of its steps; to describe contents of consolidation in given areas: documentation, data base and source code base; to describe actual steps made to achieve the final state of the server. My approach to accomplishing these goals is the study of relevant literature and usage of my practical experience in the field of web development. My contribution to the topic is the creation of the general consolidation process that has a potential to be reused by similar projects. Another contribution may be the description of handling the risks and problems that emerged during the consolidation process. This topic may find itself as a valuable source of knowledge for fellow developers facing similar issues. The thesis is divided into eight chapters. After the introduction chapter 2 follows. Chapter 2 describes parameters of the Techno.cz webserver. Chapter 3 discusses software engineering methodologies in order to create suitable consolidation process. Chapter 4, 5, 6 discuss particular fields of consolidation: documentation, data base and source code. In chapter 7 I am trying to assess suitability of created processes and approaches for usage in future development. In the conclusion I summarize the thesis according to required structure.
|
16 |
Protichybové systémy s prokládáním / Antierror systems with interleavingPacher, Jakub January 2010 (has links)
This work involves in anti-error coding systems with interleaving. At first is given summary of high-frequency use error correction codes. Below there are described two basic techniques of interleaving and their confrontation. The next text is focusing on survey and characteristics of codes which conform to submission. After selection of optimal system is verified its function in MATLAB environment. Final step is creation of functional application in C++ environment. This application serves to transmission of error correction BMP pictures.
|
17 |
Návrh CNC řídicího systému / Design of CNC control systemSobotka, Ondřej January 2014 (has links)
The thesis describesthedesign of a controlsystemfor CNC applicationswhich do not requiresynchronizedmotionofseveral axis atonce. Thegoaliscompatibilitywith G-codethatallowsyou to controlthedevicewith a Cartesiancoordinatesystem. Withthe use ofthenormal PC to run thesystem and communicate via serial line.
|
18 |
Rozšířený binární Golayův kód / Extended binary Golay codeUchytilová, Vendula January 2011 (has links)
This work deals with three different constructions of the extended binary Golay code G24. The first construction is based on a projective plane of order four. In terms of it Steiner system (5, 8, 24) is built. Linear span of its blocks forms a linear binary [24, 12, 8] code C. Every binary [24, 12, 8] code is isomorphic to C which is known as extended binary Golay code G24. The second construction uses so-called Miracle Octad Generator (MOG). All MOG-words of weight eight form Steiner system (5, 8, 24). The third construction uses impartial combinatorial game Mogul. In terms of its P-positions one can create a linear binary [24, 12, 8] code. The fact that is is also a lexikographic code is useful for parametres estimate. 1
|
19 |
Zhodnocení bezpečnosti přepravy nebezpečných věcí po silnici / Evaluation of the safety of the transport of dangerous goods by roadNĚMEC, Tomáš January 2016 (has links)
The theoretical part approaches the topics connected with the transport of dangerous goods and associated topics, for example, from the development of legislation relating to the transport of dangerous goods from the time of the Austrian empire and the First Czechoslovak Republic through the current legislation, e. g. domestic and international validity, and also an important document - the agreement of the ADR, on which the legal rules are based. The next part of the thesis is concerns hazardous substances, including the description of their classification and identification. The following section, which deals with the characteristics of the transport of dangerous goods, including training of persons carrying dangerous goods, the obligations of the participants with transportation from the point of view of safety. An important part of the transport of dangerous goods is also documentation. The three basic documents are: transport document, safety data sheet and the written instructions for the driver. The theoretical part of the thesis deals with the following: the requirements regarding the properties on gear road vehicles that transport dangerous goods; the activities of the occupants of the vehicle, if an accident occurs or the emergency situation and the related release of hazardous substances; traffic restrictions, such as restrictions on the transit of vehicles carrying dangerous goods in road tunnels. Conclusion of the theoretical part deals with the principles of the behavior of the population in case of accidents with leakage of hazardous substances and related improvised protection of individuals. These principles build on the models of situations with leaks of hazardous substances that are listed as part of the results. The aim of this thesis is to determine compliance with the legislation on the transport of dangerous goods by road. For setting the goals there are two research questions, namely: How much are traffic regulations being broken? Which regulation of the transport of dangerous goods by road is being broken most often? To determine the answers to the research questions we chose a survey using the questionnaire survey focused predominantly on the driver transporting dangerous goods by road. In the thesis, respectively, the research included a total of 100 valid questionnaires. In the questionnaire survey all of the respondents were randomly chosen, however, some of them refused to answer some questions. The survey revealed that infringement in the field of transport occurs in a fairly small range. The selected eighteen provisions in the legislation, which were violated in varying degrees, were most often replied by the drivers that they never met with the violation of the regulation (together marked 825 times, expressed in % 45,83 % of the total), exceptionally (together marked 782 times, expressed in % 43,44 % of the total), regularly (together indicated by 181 times, expressed in % 10,06 % of the total) or always (together identified 12 times, expressed in percent of the 0.67% of the total). The questionnaire survey also revealed that violations of regulation of the smoking ban is most often. Out of 100 respondents, 30 answered that they met with a violation of this regulation regularly (26) or always (4). Among the other most frequently infringed legal regulations in the field of transport include the rules in securing the cargo to the loading area, where 19 respondents out of 100 answered that they met with a violation of this regulation regularly or always. The rules concerning the manipulation with dangerous goods during the course of loading and unloading, it was noted that 19 of the respondents met with a violation of this regulation regularly (17) or always (2). There are also the results of modeling accidents in the program of the Terrorist Expert TerEx.
|
20 |
Simulace přenosu DVB-T v prostředí MATLAB / Simulation of DVB-T transmission chain in the MATLAB environmentObruča, Martin January 2009 (has links)
This thesis deals with Matlab application developed for simulation of the DVB-T channel coder and decoder. The first part of this thesis includes description of terrestrial digital video broadcasting system and comparison with analogue television. Channel coding and OFDM modulation, used in the DVB-T standard, is described in detail. Application developed in the Matlab environment is described in the second part. The application simulates data transfer of the DVB-T system. Results of the simulated transmission, using developed application are presented in the last part. Namely dependence of the BER on the S/N ratio, using various coder settings, was examined. Maximal possible data rate was determined for these various setting. All obtained values are graphically represented.
|
Page generated in 0.0709 seconds