National Repository of Grey Literature 70 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Analysis of user behavior due to the storing of digital footprints without knowledge of the user
Pappová, Michaela ; Souček, Martin (advisor) ; Ivánek, Jiří (referee)
Digital footprint designates data left behind a user movement in the digital environment or with the interaction with it. We distinguish active and passive digital footprint, together creating the digital identity of a user. The biggest benefit of the digital footprint for a user is the personalization of internet content. It also creates the reputation of a user on the internet. Other parties can utilize a digital footprint for purposes of marketing, science, HR research, and criminology. Digitial footprint can be actively affected and limited by users and different strategies for managing it exists. The aim of this thesis is to analyze user behavior of students in digital environment and their knowledge of digital footprint. It's focused on the relation between users knowledge about digital footprint existence and his real behavior. To fulfill the main purpose of the thesis researched questions are stated and the strategies of user behavior and managing their data are investigated afterwards. The knowledge of students and their real behavior with an accent on their motivation and reasons are determined in semi structured interviews. The relation between knowledge and real behavior has been found, as well as a strong influence of this relation on a user behavior strategy online.
Comparing Groups of Public-Key Ciphers
Lukáš, Martin ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
In this thesis, I introduce several groups of public-key algorithms, the groups being factori-zation problem, discrete logarithm problem, and other problems. I choose one representa-tive algorithm from each group and describe it in-depth, also mentioning certain aspects used in real world implementations and most important attacks. other problems. The objec-tives of this thesis are to compare these groups as well as algorithms in them according to their operational speed, key lengths and resistance against quantum cryptanalysis.
Lightweight Cryptography
Šalda, Jakub ; Palovský, Radomír (advisor) ; Ivánek, Jiří (referee)
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze and compare selected lightweight symmetric ciphers. Lightweight is about trade-off between low-cost, security and performace. There are many lightweight ciphers designes, therefore I chose nad explored some of those from the point of view of their features, hardware implementation, performance and security. Analyzed ciphers are in total of fifteen and include E0, A5/1, GRAIN, Trivium, LED, SKINNY, RECTANGLE, SPARX, mCrypton, PRESENT, SIMON and SPECK, XTEA, SEA, LBlock and CLEFIA. I have come to the conclusion that the stream cipher GRAIN is very fast and safe. Block ciphers LED and SKINNY are well secured and SIMON and PRESENT hardware-efficient. With the increased use of constrained devices, it is also necessary to keep up with security, so lightweight cryptography could have a great future ahead.
Usage of Data Mining in Information Studies: Analysis of User's Behavior of a Library
Janíková, Anna ; Ivánek, Jiří (advisor) ; Souček, Jiří (referee) ; Zbiejczuk Suchá, Ladislava (referee)
This thesis deals with usage of data mining on data of a library. It specializes in data of users and their behavior registered by library management system Clavius. For this purpose the data of University Library of Silesian University in Opava were used. Firstly the data mining therm is explained and it's use in libraries is thoroughly described. Secondly the ways of usage of the Clavius data are discussed then the text follows data mining usage for management of the library in particular. Finally the results of data mining concerning user's behavior is described in the rear of this thesis. Powered by TCPDF (www.tcpdf.org)
Conceptual Structures As a Tool for Knowledge Representation
Ferbarová, Gabriela ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
(in English): Conceptual graphs are a formal knowledge representation language introduced by John F. Sowa, an American specialist on Artificial Intelligence, at the end of the seventies. They are the synthesis of heuristic and formalistic approach to Artificial Intelligence and knowledge procession. They provide meaning and knowledge in form, which is logically precise, human- readable and untestable, and it is applicable in the computing domain in general. Conceptual graphs can be expressed through a first-order logic, which makes them a quality tool for intelligent reasoning. Their notation CGIF was standardised by norm ISO/IEC 24707:2007 as one of the three dialects of Common logic, which frames the set of logic based on logic. Conceptual graphs are also mappable to knowledge representation languages standardised for the Semantic Web; OWL and RDF (S). This work introduces the conceptual graph theory in the context of scientific fields like linguistics, logic and artificial intelligence. It represents the formalism proposed by John F. Sowa and some extensions that have emerged over the past decades, along with the need for improvements to the representational properties of graphs. Finally, the work provides an illustrative overview of the implementation and use of conceptual graphs in practice....
Research Data Analysis Based on the Collection of Dissertation Theses of Charles University in Prague with Regard to Long-term Digital Preservation
Pavlásková, Eliška ; Krbec, Pavel (advisor) ; Ivánek, Jiří (referee) ; Bartošek, Miroslav (referee)
This dissertation thesis focuses on research data and their use in academics from the point of view of long-term preservation. It maps usage of research data at Charles University in Prague, analyses them and lays the foundation for further research. The first part of the text focuses on the theory of long term preservation and describes the most relevant concepts regarding users, storage and structure of research data. The second part is devoted directly to research data. It consists of definition of research data, the short explanation of their importance and sources, and the model of their lifecycle. The pivotal part of the thesis is the description and the results of the research itself. The research was conducted during the year 2015 and was based on a sample of dissertation theses from the collections of Charles University in Prague. Collected data were analysed by the methods of content analysis and grounded theory. Results are presented in two main parts - content analysis results with regard to differences among science, social science and humanities, and qualitative analysis results. Powered by TCPDF (www.tcpdf.org)
Intelligent information retrieval and its trends
Pačísková, Jana ; Papík, Richard (advisor) ; Ivánek, Jiří (referee)
This thesis is focused on information retrieval in the context of its historical development, it presents trends in integration of intelligent features in it, and thus the emergence of intelligent information retrieval. Individual intelligent elements are described in a separate chapter, following chapter then introduces their use, including specific examples. Thesis also traces research on the topic of intelligent information retrieval in selected institutions both in the Czech republic and abroad; results of this survey for Czech republic are presented in the enclosed search.
Data mining of the database of Consulting centre for metabolism disorders
Senft, Martin ; Ivánek, Jiří (advisor) ; Musil, Vladimír (referee)
This thesis applies the data mining method of decision rules on data from Consulting centre for Metabolism disorders from University hospital Pilsen. As a tool is used the system LISp-Miner, developed at University of Economics, Prague. Decision rules found are evaluated by a specialist. The main parts of this thesis are followings: an overview on main data mining methods and results evalutation methods, description of the data mining method application on data and description and evaluation of results.
Evolution of Artificial Intelligence Research Paradigms
Hostičková, Iva ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
(in English): The purpose of this thesis is to describe developments of research in the field of artificial intelligence, from the point of view reflecting changes in current paradigms, and to analyze contemporary tendencies. This thesis systemically places the paradigm term into contexts of theoretical sciences and it explains in what way the term is being used. Further, the thesis describes artificial intelligence and several selected components. The thesis researches the basic paradigms of artificial intelligence - the symbolic and connectionistic paradigm, and is also researching new approaches and analyzing their beginnings and important development periods. The thesis analyzes reasons that were behind these developments. In addition to questions related to technical developments, financial support of selected research played an important role. The closing part of the thesis also analyzes reasons of current artificial intelligence expansion, worries connected to this expansion, and current research trends.
Application of cryptography in information systems
Mika, Pavel ; Ivánek, Jiří (advisor) ; Dvořák, Jan (referee)
(in English): This thesis describes and compares the most popular algorithms used in information systems. Specifically, there are: Vernam cipher, DES, 3DES, AES, and Blowfish (symmetric cryptography) and Diffie-Hellman key exchange, RSA, ElGamal, McEliece and systems based on elliptic curves (asymmetric cryptography). The thesis deals with the areas of information security, in particular the various security mechanisms (confidentiality, availability, integrity, authentication, authorization and non-repudiation), which are secured by using cryptography. There is also mentioned the theme of standardization, where the responsible institutions and some standards are presented. Described algorithms are compared using several criteria (time, throughput, memory needed for implementation, avalanche effect and key lengths) in the final chapter. Data used for comparison are taken from other studies and scientific materials.

National Repository of Grey Literature : 70 records found   previous11 - 20nextend  jump to record:
See also: similar author names
2 Ivánek, Jindřich
Interested in being notified about new results for this query?
Subscribe to the RSS feed.