Jiri Novotný

Learn More
These days the problem of cyber security is of utmost importance. Massive cyber attacks targeting government and mission critical servers can swiftly become an issue of national security. Various approaches for cyber defence and cyber security used to date have been based on software solutions without hardware acceleration. With the increasing number of(More)
A mathematical model of ion and water transport across the airway epithelium is presented. The model consists of 12 state variables representing ion concentrations, volumes, and membrane potentials. All osmotically significant membrane transport processes for which there is conclusive experimental evidence are included: passive apical sodium and chloride(More)
This paper presents an RFID outdoor localization system that is able to localize hundreds of active transponders in the area of one square kilometer using three RFID receiving stations. The RFID outdoor locator is designed for the tracking of casualties during mass disasters. Active transponders are included in triage tags that are fastened to all(More)
Evaluating Optical Music Recognition (OMR) is notoriously difficult and automated end-to-end OMR evaluation metrics are not available to guide development. In " Towards a Standard Testbed for Optical Music Recognition: Definitions, Metrics, and Page Images " , Byrd and Simon-sen recently stress that a benchmarking standard is needed in the OMR community,(More)
Music has been always an integral part of human culture. In our computer age, it is not surprising that there is a growing interest to store music in a digitized form. Optical music recognition (OMR) refers to a discipline that investigates music score recognition systems. This is similar to well-known optical character recognition systems, except OMR(More)
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of several anomaly detection techniques by means of collective trust modeling within a group of collaborative detection agents, each featuring a specific detection algorithm. The(More)