National Repository of Grey Literature 44 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Online trading using automated trading systems
Polák, Tomáš ; Palovský, Radomír (advisor) ; Sova, Martin (referee)
This work deals with the online automated trading systems in the Forex. In the theoretical section are explained basic concepts necessary for understanding of the international currency market and the basic tools used by professionals to analyze the behavior of prices. In the practical part, author construct two profitable automated systems based on different approaches according to generally accepted standards and prove that it is possible on the basis of simple-blade business model to program a robot to safely and regularly evaluates the financial resources. The results will be compared with the performance of a standard open source AOS.
Elliptic curve cryptography in comparison with other representatives of asymmetric cryptography
Stašek, Filip ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The aim of this thesis is to explain theoretical and mathematical point of view the principle of elliptic curve cryptography, which at present appears as the most petential representative of asymmetric cryptography. The introduction describes basic mathematical assumptions and knowledge which are used in cryptography and in other parts of the thesis we build on them. I visualize elliptic curve cryptosystem, describe the mathematical principle of operation and then show algorithm, which is based cryptosystem. Thesis will continue comparing this cryptosystem with key members of the asymmetric cryptography. These are algorithms RSA and ElGamal. Comparison of these cryptosystems effect mainly from the theoretical point of view and with the help of complexity theory compare time-consuming and subsequently safety aforementioned cryptosystems . Finally, I point to the indisputable benefits of elliptic curve cryptography consisting in the greater security and speed.
Cryptographic hash function
Čejka, Petr ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The goal of this thesis is to create overview about cryptographic hash fiction. In the first part is explained what general hash function is with its use. Follows specification of cryptographic hash function with a description of the most common construction. The next chapter is focused on application of cryptographic hash function in practice with emphasis to digital signature. After this chapter is attention paid to security. At the end are presented the most popular and the most important representatives of cryptographic hash function.
Analysis of High Efficiency Video Coding
Svoboda, Jaroslav ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
Standard MPEG-H part 2/H.265 alias High Efficiency Video Coding (HEVC) is patterned on MPEG-4 part 10/H.264. Although it is A new standard developed to be more efficient, its implementation is sequential and therefore there are no guarantees that the output video file will achieve the quality it possibly can within this standard. To determine how this hypothesis is fulfilled, this thesis uses the methods PSNR and SSIM which compare input and output. Another consideration is computational complexity or, in other words, the power demand, which was tested by comparing the battery life of two cell phones. Test results confirmed higher compression effectivity and higher computational complexity of standard MPEG-H part 2/H.265 as well.
Web application security
Matušek, Václav ; Palovský, Radomír (advisor) ; Pinkas, Otakar (referee)
The Bachelor thesis deals with the security of web applications. The main aim is to create complex view of most frequent attacks in practice and also to describe possibilities in prevention of the attacks. The prevention is described for both, user's and developer's side. Thesis contains also information about their origin and reminds the attacks from the past. It includes review of the standards and Czech legislation, which affect the security or define proper way how to develop the application. Important output of this thesis is also list of rules, which helps the developer to design secure application.
Security policyes of SELinux for selected application in Gnome environment
Sládek, Michael ; Palovský, Radomír (advisor) ; Vadinský, Ondřej (referee)
The goal of this work is creation of SELinux security policy for selected application. To achieve this goal is this work divided to several parts. The first part is presentation of basic security principles, on which SELinux is based and then presentation of structure of the SELinux itself. The second part is analysis of the degree of support of SELinux in some selected, user favorite, distributions of Linux. In the last part is, on the specific application, presented process of creation of SELinux security policy. Specifically, remaking of document browser Evince into secure browser of untrusted documents. The contribution of this work is to create a working policy for application Evince for GNOME user environment and mapping the extent of SELinux support in selected Linux distributions.
Building and use of small computer networks
Pecka, Jiří ; Pinkas, Otakar (advisor) ; Palovský, Radomír (referee)
The thesis deals with a new design for the home network according to the given requirements of its users. The main aim is to describe how the network can be expanded to include other elements to allow users to access the Internet, data storage and other services via wireless networks in selected locations. The thesis it divided into three parts. The first part describes the previous state of the network and users' requirements for improvements. The second part describes the network and device settings. The third part is devoted to the network testing, including evaluation of the signal strength of access points in all areas of the selected sites and attack simulation on the access point.
Building and use of small computer networks
Šilhavý, Dominik ; Pinkas, Otakar (advisor) ; Palovský, Radomír (referee)
This bachelor's thesis describes present network of Vyšší odborná škola obalové techniky a SŠ in Štětí. This school consists of five segments, which are interconnected by different technologies. In these segments it is possible to connect both with cable or wireless. The goal is to perform detail analysis of the network, thanks to which I will be able to expose narrow spots and suggest solutions which could lead to elimination of these problems. I reach it by collecting information about functionality and plans of the network, thanks to which I can perform analysis and then suggest changes leading to increased efficiency. This thesis contains description of the network including plans, network addresses, devices, security and monitoring. My contribution is performing all the measurement and based on that I can suggest changes in hardware or software leading to improvement of the current network.
Setup and securing of the network used by hotel guests
Prajer, Richard ; Palovský, Radomír (advisor) ; Pinkas, Otakar (referee)
The aim of this Bachelor Thesis is to secure access to the Internet in a small European hotel chain. Given the circumstances, specified in the text, following question emerged: How to delegate the responsibility of the guest's conduct on the Internet away from the hotels. Considering other possibilities I chose the individual users authentication as the best solution available. Captive portal was selected as the best authentication method regarding the hotel environment. Further the text is devoted to the tailoring of the system to the specific needs of this particular use: Both from a technical view as well as with regard to user-friendliness. The structure of the work follows the logic of the implementation process of the new system: from the theoretical introduction, which summarizes the requirements on system and it's possible executions, to the practical part. There I link the variety of tools, programs and configurations to the new system for providing the Internet connection. In conclusion, the weaknesses of the system are discussed.
TPM - Trusted Platform Module
Eichenmann, Filip ; Pavlíček, Luboš (advisor) ; Palovský, Radomír (referee)
The thesis begins with description of the TPM architecture and explanation of related terms. Basic functions of the chip are then described. The principles for implementation and deployment of TPM are introduced in the following part. These principles are reffered to as best practices. Then the possibilities of practical use of the chip are suggested. One chapter is specifically focused on the criticism of the chip and explains several arguments against its use. Software, which supports TPM, is discussed and compared in the next chapter. It is divided into three parts -- direct OS support, preinstalled tools and commercial solutions. Last chapter focuses on one company and its IT structure. Several possible solutions based on TPM are introduced for this particular situation. Every solution is described in more detail with suggested steps for deployment. The conclusion summarizes the results of the work and its benefits.

National Repository of Grey Literature : 44 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.