- Solar and Space Plasma Dynamics
- Geophysics and Gravity Measurements
- Ionosphere and magnetosphere dynamics
- Education, Psychology, and Social Research
- Stellar, planetary, and galactic studies
- Astro and Planetary Science
- Atmospheric Ozone and Climate
- History and Developments in Astronomy
- Digital and Cyber Forensics
- Astronomical Observations and Instrumentation
- Impact of Light on Environment and Health
- Advanced Malware Detection Techniques
- Spam and Phishing Detection
- Network Security and Intrusion Detection
- Agriculture Sustainability and Environmental Impact
- Calibration and Measurement Techniques
- Rough Sets and Fuzzy Logic
- Experimental and Theoretical Physics Studies
- Anomaly Detection Techniques and Applications
- Military Defense Systems Analysis
- Electromagnetic Fields and Biological Effects
- Solar Radiation and Photovoltaics
- Data Mining Algorithms and Applications
- Acute Lymphoblastic Leukemia research
- European Law and Migration
University of Pavol Jozef Šafárik
2019-2024
Institute of Computer Science
2023
Czech Academy of Sciences, Institute of Computer Science
2021
Slovak University of Technology in Bratislava
2020
University of Sheffield
2019
Observatory Úpice
1992-2012
Astronomical Institute of the Slovak Academy of Sciences
1986
Mining Institute
1969
We discuss a remarkable brightening in polar plume, as inferred from unique coordinated observations of the white-light corona during total eclipse Sun 2006 March 29. The plume (also known ray, with distinctions that we discuss) was observed at positional angle 9°; velocity which propagated about 65 km s−1, is close to values derived by modeling mass/energy transfer plumes/rays well those acquired images Extreme-ultraviolet Imaging Telescope on European Space Agency/NASA Solar and...
An inherent part of everyday life and work on a computer is ownership use an email address. The main aim this paper to analyze existing approaches classification malicious emails. We have implemented system, which able distinguish between legitimate Subsequently, emails are classified into three subcategories: spam, scam, phishing. prepared labeled dataset. extracted several features from contained in the Within we four supervised machine learning methods (Random Forest, Decision Tree,...
The dataset consists of records from the NTFS file system and event logs. In this study, we used images devices capture flags competitions focused on digital forensic Windows operating systems user activities. We created timelines security incident disk using Plaso tool, which then processed transformed attributes into binary values to simplify application data analysis machine learning methods. are divided 12 different files, they saved in CSV format.
A project of a new milk drying unit processing 4800 kg/h fresh into powder with expected steam consumption 1000 (equivalent to ca. 2.6 GJ/h) was assessed. In this paper, investment profitability analyzed combining mathematical modeling, market analysis, and parametric sensitivity study. Aspen Plus used as the simulation environment determine values key process variables—major streams, mass flows, energy consumption. Co-digestion cattle manure in an adjacent biogas plant considered provide...
Security incident handling and response are essen-tial parts of every organization's information cyber security. consists several phases, among which digital forensic analysis has an irreplaceable place. Due to particular evidence being recorded at a specific time, timelines play essential role in analyzing this evidence. One the vital tasks investigator is finding relevant records timeline. This operation performed manually most cases. paper focuses on possibilities automatically...
Настоящее исследование посвящено разработке алгоритма визуализации и определения характеристик выбоин неровностей непосредственно из зашумленных сигналов, полученных с помощью акселерометра.Для решения поставленной задачи используется разработанный фильтр на основе интегрального вейвлет-преобразования последующим разложением сигналов шкалы, которые были сопоставлены друг другом отфильтрованы использованием пространственного фильтра.Результатом исследования служат обнаруженные дорожные...
Total solar eclipses observed on the long baseline allow to obtain pictures of white-light corona with temporal distance. New mathematical methods coronal picture processing visualization very faint structures and enable compare their position in high accuracy. We can detect moving these by comparing obtained different places during same total eclipse. Some techniques results are described this paper.