Search Results - "Císař, P."
-
1
Automated multiple fish tracking in three-Dimension using a Structured Light Sensor
Published in Computers and electronics in agriculture (01-02-2016)“…•Structured Light (SL) emission sensor was used to monitor multiple fish activities.•Introduced tracking system is able to track multiple fish in…”
Get full text
Journal Article -
2
Bioconcentration and behavioral effects of four benzodiazepines and their environmentally relevant mixture in wild fish
Published in The Science of the total environment (01-02-2020)“…[Display omitted] •Bioconcentration and behavioral effects of four benzodiazepines in fish were examined.•Temazepam showed the highest bioconcentration…”
Get full text
Journal Article -
3
Behaviour and cardiac response to stress in signal crayfish exposed to environmental concentrations of tramadol
Published in Aquatic toxicology (01-08-2019)“…•Tramadol alters crayfish stress reaction at environmentally relevant concentration.•Shift in cardiac activity during stress was observed in tramadol-exposed…”
Get full text
Journal Article -
4
Disposition study of a new potential antineoplastic agent dimefluron in rats using high-performance liquid chromatography with ultraviolet and mass spectrometric detection
Published in Journal of pharmaceutical and biomedical analysis (29-04-2005)“…The disposition of a new potential antineoplastic drug dimefluron after an oral administration to rats was investigated. Dimefluron,…”
Get full text
Journal Article Conference Proceeding -
5
Use of chiral liquid chromatography for the evaluation of stereospecificity in the carbonyl reduction of potential benzo[ c]fluorene antineoplastics benfluron and dimefluron in various species
Published in Journal of pharmaceutical and biomedical analysis (29-04-2005)“…Benfluron (B) [5-(2-dimethylaminoethoxy)-7 H-benzo[ c]fluorene-7-one hydrochloride] is a potential antineoplastic agent. In the organism, B undergoes a rapid…”
Get full text
Journal Article Conference Proceeding -
6
ETHICAL HACKING OF WIRELESS NETWORKS IN KALI LINUX ENVIRONMENT
Published in Annals of Faculty Engineering Hunedoara (01-08-2018)“…The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches…”
Get full text
Journal Article -
7
Corrigendum to “Disposition study of a new potential antineoplastic agent dimefluron in rats using high-performance liquid chromatography with ultraviolet and mass spectrometric detection” [J. Pharm. Biomed. Anal. 37 (2005) 1059–1071]
Published in Journal of pharmaceutical and biomedical analysis (01-10-2005)Get full text
Journal Article -
8
Comparison of different stationary phases for bioanalytical studies of biologically active compounds
Published in Journal of separation science (01-09-2006)“…In this study, the chromatographic behaviour of four mixtures of compounds was tested on columns possessing various surface properties. Cocaine, dimefluron,…”
Get full text
Journal Article -
9
Determination of low contents of fenpiverine bromide by extraction spectrophotometry
Published in Mikrochimica acta (1966) (25-08-2003)Get full text
Journal Article -
10
Fitting univariate distributions to computer network traffic data using GUI
Published in 2012 IEEE 13th International Symposium on Computational Intelligence and Informatics (CINTI) (01-11-2012)“…The available literature is not completely certain what type(s) of probability distribution best models computer network traffic. The statistical analysis…”
Get full text
Conference Proceeding -
11
The influence of thresholding method on 1D signal denoising using wavelet theory
Published in 2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics (01-09-2012)“…This paper examines the influence of thresholding method on 1D signal denoising using wavelet theory. The analysis is realized in Matlab environment. The cases…”
Get full text
Conference Proceeding -
12
Intrusion detection-one of the security methods
Published in 2008 6th International Symposium on Intelligent Systems and Informatics (01-09-2008)“…Intrusion detection is an area of computer security that involves the detection of unwanted manipulations to computers and computer networks. An intrusion…”
Get full text
Conference Proceeding -
13
Physical therapy of Dupuytren's contracture
Published in Fysiatricky a reumatologicky vestnik (01-06-1981)Get more information
Journal Article -
14
Methodological frameworks of digital forensics
Published in 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics (01-09-2011)“…Digital forensics is essential for the successful opposition of computer crime. It is associated with many challenges, including rapid changes in computer and…”
Get full text
Conference Proceeding -
15
Statistics of network local maxima in function of intrusion detection
Published in The 33rd International Convention MIPRO (01-05-2010)“…Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions…”
Get full text
Conference Proceeding -
16
Delphi application for face detection using the sobel operator
Published in 2012 IEEE 13th International Symposium on Computational Intelligence and Informatics (CINTI) (01-11-2012)“…The subject of this work is a face detection. Face detection is the process of determining the positions and sizes of human faces in photos using computer…”
Get full text
Conference Proceeding -
17
Software visualization: The educational tool to enhance student learning
Published in The 33rd International Convention MIPRO (01-05-2010)“…Object oriented programming is currently very much in focus and object-oriented languages (such as C++ and Java) are used as the first language to teach…”
Get full text
Conference Proceeding -
18
EWMA Statistic in Adaptive Threshold Algorithm
Published in 2007 11th International Conference on Intelligent Engineering Systems (01-06-2007)“…Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise the security of computer and…”
Get full text
Conference Proceeding -
19
Computer adaptive tests: A comparative study
Published in 2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics (01-09-2012)“…Computer based tests are becoming increasingly important and are thus implemented in all fields of education. The clear advantage of computer adaptive testing…”
Get full text
Conference Proceeding -
20
True/false questions analysis using computerized Certainty-Based Marking tests
Published in 2009 7th International Symposium on Intelligent Systems and Informatics (01-09-2009)“…Writing effective and efficient exams is a crucial component of the teaching and learning process. Exams are a common approach to assess student learning and…”
Get full text
Conference Proceeding