National Repository of Grey Literature 116 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Systems for checing electronic texts
Zouhar, Petr ; Malý, Jan (referee) ; Pfeifer, Václav (advisor)
The work deals with the possibility of control of electronic texts. Whether it is a source codes or standard text documents. The first chapter is devoted to a brief explanation of the term plagiarism and its characters. Sequentially we describe the methods and metrics used to detect plagiarist. Then we pay attention to detect plagiarism in the free text and source codes. We describe the way of preprocessing of a file and choice of basic units, which represent the document in the comparing. Source codes have a exact syntax. Therefore we attend to the syntax and semantic analysis in the chapter, which describes the check of source codes. The second half of the work is focused on the practical part, particularly on programs intended to control the source codes. The programs are divided to the freely available and the commercial. This is followed by their brief description and if it is a free trial possible we mention the results from this comparing. So we created a corpus of source codes. At the end of the work we focus on design of a program, which compares two source codes on the basis of statistical similarities.
Voice Sample database design for speech recognition purposes
Grobelný, Petr ; Malý, Jan (referee) ; Pfeifer, Václav (advisor)
Práce se zabývá rozpoznáváním řeči a tvorbou řečové databáze, která bude sloužit jako trénovací a testovací data pro systém rozpoznávání řeči. Daný korpus je navrhnut jako databáze čtené řeči. V teoretické části je čtenář seznámen s pojmem rozpoznávání řeči a je hlouběji uveden do problematiky. Praktická část se skládá z podrobného postupu vytvoření databáze čtené řeči. Samotná databáze je prezentována na přiloženém médiu. V závěru práce je přiložena potřebná dokumentace celé databáze.
Design of exercises for data mining - Classification and prediction
Martiník, Jan ; Malý, Jan (referee) ; Burget, Radim (advisor)
My master's thesis on the topic of "Design of exercises for data mining - Classification and prediction" deals with the most frequently used methods classification and prediction. There are association rules, Bayesian classification, genetic algorithms, the nearest method neighbor, neural network and decision trees on the classification. There are linear and non-linear prediction on the prediction. This work also contains a summary of detail the issue of decision trees and a detailed algorithm for creating the decision tree, including development of individual diagrams. The proposed algorithm for creating the decision tree is tested through two tests of data dowloaded from Internet. The results are mutually compared and described differences between the two implementations. The work is written in a way that would provide the reader with a notion of the individual methods and techniques for data mining, their advantages, disadvantages and some of the issues that directly relate to this topic.
Realization of attack on SHA-1 hash function
Dziura, Michal ; Hajný, Jan (referee) ; Malý, Jan (advisor)
The bachelor thesis is concerned with hash functions, SHA-1 function and its implementation in Java. The thesis describes weaknesses of this function and implements the implementation of the selected attack leading to the revelation of source text or attack based on targeted falsifying hash. This work also describes characteristics of hash functions, constructions and their use. The last part deals with a description of the attack on the hash function SHA-1 with the complexity of the 2^69.
Comparison of discrete wavelet transform implementations in C and Java
Talavašek, Kamil ; Vlach, Jan (referee) ; Malý, Jan (advisor)
This thesis deals with discrete wavelet transform of a two dimensional discrete signal using the CDF9/7 wavelet. It contains theoretical principles of discrete wavelet transformation, a description of the convolution and Lifting calculation principle, characteristics of the CDF9/7 wavelet, the possibilities of processing a two dimensional input signal and boundary handling. Both principles (convolution, Lifting) of the calculation of two dimensional discrete wavelet transformation have been implemented within the thesis using the CDF9/7 wavelet in the C++ and Java programming languages. Four applications have been created that way which have been described in detail and then compared with one another especially in light of the calculation speed of discrete wavelet transformation. Finally an analysis of the acquired results and an evaluation of the whole thesis has been performed.
Modern computer viruses
Malina, Lukáš ; Malý, Jan (referee) ; Pust, Radim (advisor)
Bachelor’s thesis “Modern computer’s viruses” is composed from two mainly object (analysis computer’s viruses and suggestion of security middle computer network), separated for three parts: Analysis computer’s viruses, Personal suggestion of security personal computer end-user (computer terminal) and Personal suggestion of security middle computer network. Methods of transmission and infection, specific properties of viruses and impact upon personal computers are examined in the first part. Resolution of personal suggestion of security personal computer with help of antivirus software, personal firewall and antispam software is inducted in the second part. Futher, results of testing some free AV software and other security software are summarized with possible progress of configuration and recommendation for correct running this software. Complex suggestion of security middle computer network is adduced in the third part, where is inducted structure of security network. Configuration progression and recommendation for maximum security is indicated on particular used components. Structure is adapted for active network Cisco components, which are most used around these days. Completely suggestion of security network is directed on hardware firewall Cisco PIX, where is unfolded potential possibility of options. Futher, the third part contain some important tips and recommendation for completely working network, including setting security preference, security passwords and data encryption. Also, there is described various techniques monitoring and supervision working security network using complex monitoring software MARS (Cisco security monitoring, analyzing and response system) from Cisco company.
OpenSSL-based client-server system
Kohout, Jaroslav ; Janovič, Filip (referee) ; Malý, Jan (advisor)
Aim of this diploma thesis is study of possibilities of OpenSSL extension in PHP environment and its implementation in securing client-server system example. This system will be use to store confidential data. Whole system will be exemplar of securing against scale of attacks leads to gain private data.
Sophisticated methods for electronic text checking
Flégl, Jan ; Malý, Jan (referee) ; Pfeifer, Václav (advisor)
The work is about plagiarism of source codes and text documents. We’d like to describe common known methods, learn something about commercial programs and make our own plagiarism detection software. At the beginning of introduction to the theoretical part we will define the plagiarism. We will also learn something about the history of plagiarsm and its situation in the Czech Republic. We will find out something about syntactic analysis, tools we can use to detect plagiarisms and how to discover it. We will see the function of the metrics on easy exercises. We will clear up the function of graphic method with line comparing. We will define advantages and disadvantages of all methods. At the end of the theoretical part we will find out something about commercial programs. In practical part we will make our own program which compares two source codes by using statistical access methods. We will check its function and ability to detect plagiarism by corpus of source codes which we will create.
The Three Aisled Storage Building
Malý, Jan ; Sýkora, Karel (referee) ; Buchta, Stanislav (advisor)
The subject of this bachelor´s thesis is the design and assessment of steel structure three-aisled storage building. The width of the side aisles is 12 meters and the width of the main aisles is 24 meters. The length of storage building is 60 meters. The height of the building is 14.65 meters. In the main aisles traversed, by two bridge cranes, each with a capacity of 5 tons. The supporting structure consists of main truss, the distance is 6 meters. Storage building is designed for the area of Zlín.

National Repository of Grey Literature : 116 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.