Martin Chovanec
Technical University of Košice
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Martin Chovanec.
international conference on emerging elearning technologies and applications | 2014
Martin Chovanec; Eva Chovancová; M. Dufala
Information security is one of the priorities in the context of communication technologies. The work is focused on intrusion detection in high-speed computer networks. Request-transition diagrams method describing the time-dependent phenomena provides an effective method to announce passages preceding the existence of disturbance. Modified hybrid detection reduces the responsiveness of the system and method provides real-time tracking. In a correct state of the system is used only one method of detection, which is provided in real-time. Definition of indefinite field brings extension to dual detection methods to ensure accuracy and recovery of erroneous detections. Distributed detection methods based on descriptive rules accelerate the detection process.
international symposium on applied machine intelligence and informatics | 2015
Eva Chovancová; Liberios Vokorokos; Martin Chovanec
Cloud computing is a highly discussed topic in the world of IT. The rapid development of cloud computing and the growing interest of companies in it is evident everywhere in the world. This paper handle about using services through the Internet by a small and medium businesses based on cloud computing. First part of paper is focused on cloud computing principles and evaluates its advantages and disadvantages. The second part is focused on designing an own cloud computing. The goal of this work is to create an own cloud computing system for small and medium companies. In the implementation is used VMware cloud platform to experimental verifying its functionality.
Acta Informatica Pragensia | 2013
Peter Fanfara; Martin Chovanec
In the current development of technologies, rapid growth of computer networks and distributed systems still exist a very probable risk of attack. There have been developed and implemented a number of solutions to help in detecting and/or preventing attacks and to improve the actual system security. The most common solution is to use Intrusion Detection System (IDS) in cooperation with the firewall. Neither the IDS nor firewall can respond in real time to a specific type of attack. This paper deals with the detection mechanism based on Honeypot technology and its use in the proposed architecture to improve security of computer systems. The essence of the work is to show how can sophisticated hybrid Honeypot influence the design of IDS architecture and thus increase its efficiency.
international conference on emerging elearning technologies and applications | 2012
Liberios Vokorokos; E. Danková; Martin Chovanec
Computer vision is a field of computer science which recently received increasingly to the fore. To accelerate computing in image processing can be used specialized processors that work on the principle of accelerators. Designed arithmetic-logic unit is a processor module, which executes image processing based on the selected instruction. The parallel design of arithmetic-logic unit can also accelerate image processing.
international conference on emerging elearning technologies and applications | 2016
Martin Chovanec; Eva Chovancová; Marcel Behún
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions. It explains testing methods of open addressing and factors that affect efficient functioning of hash tables. It creates user interface and its functional part. It compares the effectiveness of distribution of elements in the tables for various methods dealing with conflicts, methods of testing in case of open addressing tables and hash functions over selected set of the data. Based on user interface design, a program was created, that can be used as demonstration that works with spreadsheets or behavioral testing of individual functions with respect to concept of dealing with collisions over a set of data and following comparison of the effectiveness based on the number of collisions and length of clusters.
international conference on emerging elearning technologies and applications | 2015
Szilard Jager; Adrián Pekár; Martin Chovanec; Eva Chovancová
This paper deals with distributed simulations and the communication protocols used to reach interoperability between simulation applications. High-Level Architecture is one of the used protocols to interconnect different types of simulators. Application called RTI is responsible for manage communication between simulators. This paper describes how to connect distributed simulations using the HLA architecture and how to record data exchanged during the simulation.
Archive | 2006
Liberios Vokorokos; Martin Chovanec
international conference on intelligent engineering systems | 2017
Ján Hurtuk; Martin Chovanec; Norbert Adam
Computing and Informatics \/ Computers and Artificial Intelligence | 2017
Peter Drotár; Slavomír Šimoňák; Emília Pietriková; Martin Chovanec; Eva Chovancová; Norbert Adam; Csaba Szabó; Anton Baláž; Miroslav Biňas
signal processing systems | 2016
Adrián Pekár; Martin Chovanec