The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions. It explains testing methods of open addressing and factors that affect efficient...
The structure–function relationships for haloalkane dehalogenases, representing one of the best characterized families of enzymes involved in degradation of halogenated compounds is described. A substantial amount of mechanistic and structural information is currently available on haloalkane dehalogenases, providing good theoretical framework for their modification by protein engineering. Examples...
The topic “multicore systems” is today important because of increasing number of cores on a chip. Therefore increases the demand on power and energy consumption. For effective CPU utilization is very important to distribute load between the cores. The aim of this work is to approach the issue of multi-core systems and load balancing. Based on comparative analysis were pointed advantages and disadvantages...
The aim of this work is to provide set of selected tests on IDS model that would enlarge the functionality of intrusion detection systems. Designed model is using several IDS, which allows it to investigate larger bandwidth and capture more attacks. This system consists of central master node and devices on which the intrusion detection systems are. The tests were designed with the attribute of repeatability...
Cloud computing is a highly discussed topic in the world of IT. The rapid development of cloud computing and the growing interest of companies in it is evident everywhere in the world.
Information security is one of the priorities in the context of communication technologies. The work is focused on intrusion detection in high-speed computer networks. Request-transition diagrams method describing the time-dependent phenomena provides an effective method to announce passages preceding the existence of disturbance. Modified hybrid detection reduces the responsiveness of the system...
Biometrics deals with technology of measuring and analyzing biological data. In informatics, biometry refers to technologies that measure and analyze human body characteristics, such as a DNA, a fingerprint, a retina or iris, a voice patterns, a facial patterns and hand, for authentication purposes. This work points out the suggestion of a specialized processor focused on sound biometrics using Dynamic...
Nowadays, there are many methods for identifying people, but most common and probably the oldest one is identification based on face recognition. Even though for people this method is natural, for computers it is a very challenging and complex problem. This paper describes one the known approaches for face recognition, which uses principal component analysis to compare and recognize faces. Obviously,...
With the rapid spread of the Internet, information technologies (ITs) and inadequate basic security of computer systems, it is only a matter of time when the computer systems will be attacked after revealing its existing vulnerabilities and programme weak points. At present the presence of such a potential threat agitates a greater and greater interest in various possibilities for enhancing its security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.