National Repository of Grey Literature 116 records found  beginprevious76 - 85nextend  jump to record: Search took 0.01 seconds. 
Jacobians and Hessians in the Calculus of Variations
Pospíšil, Václav ; Černý, Robert (referee) ; Malý, Jan (advisor)
V této práci je studován distributivní jakobián, distributivní hesián a relaxace Jakobiánu a Hessiánu. Jsou zde uvedeny příklady zobrazení, pro něž "absolutně spojitá část" distributivního Jakobiánu nebo Hessiánu nesplývá s bodovým jakobiánem nebo Hessiánem. Dále je uvedena věta, umožňující určit singulární část jakobiánu pro některá zobrazení. V další části je zobecněna věta, umožňující určit za určitých podmínek relaxaci Jakobiánu, a věta, umožňující horní odhad relaxace Hessiánu pro některé funkce.
The Building For Industrial Production
Malý, Jan ; Sýkora, Karel (referee) ; Buchta, Stanislav (advisor)
The subject of this diploma´s thesis is the design and assessment of steel structure two-bay building for industrial production. The width of the side aisles is 15 meters and the width of the main aisles is 35 meters. The length of industrial building is 90 meters. The height of the building is 17.4 meters. Steel structure of main aisles consists of main truss, the distance is 6 meters. The main truss consists of truss girder and fixed column. In the main aisles traversed, by bridge crane with a capacity of 20 tons. Steel structure of side aisles consists frame construction. The building for industrial production is designed for the area of Blansko.
Effect of anaestetics on fish - review
MALÝ, Jan
Bachelor thesis "Effect of anaestetics on fish" has been written as a review. The aim was to elaborate and create the review about the effect of anaestetics on fish. There can be found effects of 12 widely used anaestecics in the European and world aquacultural regions. I have focused mainly on the four mostly used anaestetics in the Czech aquaculture, especially on the clove oil, MS-222, 2-phenoxyethanol and propiscin. To work properly out this bachelor thesis, I have used home and foreign sources found in the scientis database. My bachelor´s thesis is bringing a complete summary concerning the effect of anaestetics on fish and that is why it can be used for similar surveys (purpose) in the field of fish anaesthesia, other use of anaestecics in aquaculture and fish health protection in accordance with the Animal protection law Nr. 359/2012, which has replaced the former law Nr. 246/1992.
Realization of attack on SHA-1 hash function
Dziura, Michal ; Hajný, Jan (referee) ; Malý, Jan (advisor)
The bachelor thesis is concerned with hash functions, SHA-1 function and its implementation in Java. The thesis describes weaknesses of this function and implements the implementation of the selected attack leading to the revelation of source text or attack based on targeted falsifying hash. This work also describes characteristics of hash functions, constructions and their use. The last part deals with a description of the attack on the hash function SHA-1 with the complexity of the 2^69.
Image noise reduction method based on discrete wavelet transform
Holiš, Michal ; Přinosil, Jiří (referee) ; Malý, Jan (advisor)
This bachelor's thesis contains theoretical treatise on noises, which occur in digital visual data, their classification and possibilities of their removal. The next part is applied to theory of wavelets, wavelet transforms and their usage in working with one-dimensional, but mostly with two-dimensional signals. It is than mainly applied on visual data with a view to removing of failures contained in these data. The last part of the thesis is about implementation of demonstrational programme. This programme is created for removing of noise from the chosen visual data on the basis of user's chosen variables.
Sophisticated methods for electronic text checking
Flégl, Jan ; Malý, Jan (referee) ; Pfeifer, Václav (advisor)
The work is about plagiarism of source codes and text documents. We’d like to describe common known methods, learn something about commercial programs and make our own plagiarism detection software. At the beginning of introduction to the theoretical part we will define the plagiarism. We will also learn something about the history of plagiarsm and its situation in the Czech Republic. We will find out something about syntactic analysis, tools we can use to detect plagiarisms and how to discover it. We will see the function of the metrics on easy exercises. We will clear up the function of graphic method with line comparing. We will define advantages and disadvantages of all methods. At the end of the theoretical part we will find out something about commercial programs. In practical part we will make our own program which compares two source codes by using statistical access methods. We will check its function and ability to detect plagiarism by corpus of source codes which we will create.
Voice Sample database design for speech recognition purposes
Grobelný, Petr ; Malý, Jan (referee) ; Pfeifer, Václav (advisor)
Práce se zabývá rozpoznáváním řeči a tvorbou řečové databáze, která bude sloužit jako trénovací a testovací data pro systém rozpoznávání řeči. Daný korpus je navrhnut jako databáze čtené řeči. V teoretické části je čtenář seznámen s pojmem rozpoznávání řeči a je hlouběji uveden do problematiky. Praktická část se skládá z podrobného postupu vytvoření databáze čtené řeči. Samotná databáze je prezentována na přiloženém médiu. V závěru práce je přiložena potřebná dokumentace celé databáze.
Secure forms administration framework in PHP
Najbr, Ondřej ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
Nowadays in the 21st century which is full of information technology constantly increase web servers with a number of Web applications and services for clients. In the future it is expected huge expansion of the services realized by way of the Internet. The main objective of the thesis was to design and develop an Internet application which would create the user-defined forms, and subsequently would be safely managed by using the database. In the first part of the Bachelor's thesis I deal with the theoretical introduction to the issue of security and administration forms. In the second part I describe the server configuration, structure and implementation of the programme in practice. Bachelor's thesis contains a description of the activity of the programme and a description of the used security.
Management of apache aplication with web GUI
Hošek, Roman ; Malý, Jan (referee) ; Janovič, Filip (advisor)
This bachelor’s thesis deals with a design and implementation of a web application aimed at Apache server configuration. It analyses the question of configuration and its possible solutions. The PHP scripting language with the data storage in MySQL database was chosen for the final application. Linux distribution Debian serves as the host system. The thesis contains descriptions of applied components features and it is particularly focused on the question of virtual hosts. It also includes an installation and application manipulation guide . The vadmin system maintains an easy creation of virtual hosts adjustment just by the help of a web browser.
Implementation and testing of MD5 hash algorithm
Legéň, Michal ; Kacálek, Jan (referee) ; Malý, Jan (advisor)
Hash functions are one of basic structural components of modern cryptography. Their task is to create unique bit order for entry information called message digests. This way the inevitable integrity of information is secured because data transferring via different transfer media may be altered during the transfer. They provide a possibility of fast and effective encryption of passwords because of one-way as well. The aim of this bachelor’s thesis is to analyse one of the most well-known hash functions MD5, to implement it in programming language, to analyse its security risks and to try to use practical exhibitions to the benefit of an attacker. The bachelor’s thesis is presenting theoretical and practical part on Implementation and testing of MD5 hash algorithm. The introduction of the work is devoted to the basics of cryptography, to explanation of the concept of hash function and its basic attributes. The chapter 3 is focussed on the analysis of algorithm MD5 itself. The following part describes its implementation in programming language C++. The last two parts are about problems of security and weak sides of hash algorithm MD5. On the basic of existance of first order collisions, there is in practical demonstration presented creating two different programmes with the same message digest. The final part belongs to description of implementations of attacks on one-way algorithm MD5 and comparisons of their time possibilities during getting original information on the basis of their message digests.

National Repository of Grey Literature : 116 records found   beginprevious76 - 85nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.