National Repository of Grey Literature 115 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Decentralized communication tool with anonymity guarantee
Legéň, Michal ; Burget, Radim (referee) ; Malý, Jan (advisor)
Anonymity on the internet is becoming a actuall issue nowadays. There are several tools, that can be used to monitor user's activity and it can lead to lose privacy of users. The aim of this master's thesis is to describe different ways of working anonymous systems, especially the method called Onion Routing. The introduction of this work is devoted to the description of this method together with asymmetric cryptosystem RSA. The second part belongs to basics of socket programming and to the implementation of anonymous system in programming language C++. The final part is focussed on analysis of system in terms of security and time complexity. The conditions of anonymity and decentralization are accomplished. There is no presence of central server in the system and the management is handled by signalling messages.
Centralised web-based personal data management system
Mazur, Kornel ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
This diploma thesis deals with a central user identification and personal data management on the Internet. The first part analyzes questions of a identification process and discusses the requirements for implementation, security and user-friendliness. Subsequently, the process is designed with respect to the defined requirements. A detailed overview of possible attacks to the system and means of protection against them is also included in the thesis. The described methods are as follows: Phishing, Man in the middle, hardware modification and acoustic keypress emissions. A practical design of a identification system is discussed in the second part of the thesis. It consists of two parts: a library implementable to individual Internet services requiring a user identification and a server centrally identificating the users and storing their personal data and passwords. An implementation in Joomla content management system is also described.
Invisible watermarking method for images
Trbušek, Pavel ; Říha, Kamil (referee) ; Malý, Jan (advisor)
Bachelor´s thesis deals with embedding of invisible watermark into image. The methods used for reach the main objective of this thesis are given in the first part. I mention three methods: Discrete Cosine Transform method, Discrete Wavelet Transform method and Set Partitioning in Hierarchical Trees method. In the second part I describe implementation of Discrete Wavelet Transform method and Set Partitioning in Hierarchical Trees method in MATLAB setting. The last part deals with the test of the watermark endurance to geometrical attacks. I summarize the results of the watermark endurance test are very satisfactory even by the disruption of the image quality.
Web applications with respect to accessibility
Kříž, Tomáš ; Malý, Jan (referee) ; Morávek, Patrik (advisor)
This master’s thesis deals with problems of the web applications with respect to accessibility. At first it describes accessibility of the web pages. There are mentioned main reasons and initiatives for making accessible web pages. The first chapter is also aims to handicapped users. The handicapped users are separated to groups according to their handicap and impacts on accessibility of the web pages. The second chapter presents methodics of the accessible website, Czech and foreign rules and lawful orders. The foreign (WCAG, Section 508) and the Czech (Blind Friendly Web and Pravidla pro tvorbu přístupného webu) representatives of the rules are introduced in the next part of this chapter. The idea of the accessible web application – electronic shop - is presented in the third chapter. There are subscribed the conception of electronic shop, advantages and disadvantages and main functions. In the next part of this chapter there are mentioned the primary rules of the writing the source code of the web pages which are used during the creating of the accessible web application of the electronic shop. Closely there are introduced scripting language PHP, database system MySQL and Cascading Styles Sheets (CSS). The part of the master’s thesis is a mentioned accessible web application of the electronic shop. The presentation is placed on http://www.xandy.cz/tmp/ and presents the accessible web system with the respect to accessibility. Creation and description of this web application is mentioned in the last fourth chapter.
Intel Integrated Performance Primitives and their use in application development
Machač, Jiří ; Přinosil, Jiří (referee) ; Malý, Jan (advisor)
The aim of the presented work is to demonstrate and evaluate the contribution of computing system SIMD especially units MMX, SSE, SSE2, SSE3, SSSE3 and SSE4 from Intel company, by creation of demostrating applications with using Intel Integrated Performance Primitives library. At first, possibilities of SIMD programming using intrinsic function, vektorization and libraries Intel Integrated Performance Primitives are presented, as next are descibed options of evaluation of particular algorithms. Finally procedure of programing by using Intel Integrated Performance Primitives library are ilustrated.
Infrastructure of public keys
Bědajánek, Ondřej ; Malý, Jan (referee) ; Pust, Radim (advisor)
The subject of my thesis dscribes function and principles of the public key infrastructure as well as certificate authority. Under the operation system Linux was created self signed certificate authority. Web interface was devoloped in PHP for the purpose of the generation, distribution and rejection certificates. Configuration files for OpenVPN are included in the thesis and wireless security is achived by OpenVPN.
Use of a programmable logic controller in teaching process
Malý, Jan ; Knobloch, Jan (referee) ; Červinka, Dalibor (advisor)
Bachelor thesis is divided into four parts. First part concentrates on programming languages used for programming a PLC. These are divided into graphical and text languages. Graphical languages consist of ladder diagram and function block diagram. Text languages are Structured text and instruction list. Each of these languages are described in subchapters. Second part deals with description of three laboratory tasks. The last part contains pictures a information about laboratory task’s made equipment.
MPKT communication protocol extension on .NET platform
Görlich, Tomáš ; Malý, Jan (referee) ; Jeřábek, Jan (advisor)
This thesis is focused on extension of MPKT 2008 communication protocol. It has been made analysis of this protocol version and proposals to improve and extend this version with other options have been raised. It has been created a new version of the protocol on the basis of the proposals. Then the .NET platform has been presented and its architecture has been described. The C# language available on the .NET platform has been chosen to implement the new protocol version and its facilities for network communication and threading have been described. It has been said an assessment of the application of this programming language in practical lessons. A proposal to update tutorial texts has been made.
Use of a programmable logic controller in teaching process
Malý, Jan ; Ctibor, Jiří (referee) ; Červinka, Dalibor (advisor)
Bachelor thesis is divided into four parts. First part concentrates on programming languages used for programming a PLC. These are divided into graphical and text languages. Graphical languages consist of ladder diagram and function block diagram. Text languages are Structured text and instruction list. Each of these languages are described in subchapters. Second part deals with description of three laboratory tasks. The last part contains pictures a information about laboratory task’s made equipment.
Systems for checing electronic texts
Zouhar, Petr ; Malý, Jan (referee) ; Pfeifer, Václav (advisor)
The work deals with the possibility of control of electronic texts. Whether it is a source codes or standard text documents. The first chapter is devoted to a brief explanation of the term plagiarism and its characters. Sequentially we describe the methods and metrics used to detect plagiarist. Then we pay attention to detect plagiarism in the free text and source codes. We describe the way of preprocessing of a file and choice of basic units, which represent the document in the comparing. Source codes have a exact syntax. Therefore we attend to the syntax and semantic analysis in the chapter, which describes the check of source codes. The second half of the work is focused on the practical part, particularly on programs intended to control the source codes. The programs are divided to the freely available and the commercial. This is followed by their brief description and if it is a free trial possible we mention the results from this comparing. So we created a corpus of source codes. At the end of the work we focus on design of a program, which compares two source codes on the basis of statistical similarities.

National Repository of Grey Literature : 115 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.