National Repository of Grey Literature 254 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Home security system
Čada, Jan ; Burda, Karel (referee) ; Lattenberg, Ivo (advisor)
This master thesis deals with the design and implementation of a security system for a family house. It consists of a central control panel, a control keyboard and detectors connected using cables. The first part of the thesis discusses the electronic security and fire alarm systems, describing the individual elements of these systems and their different types. Magnetic contacts, fire detectors, sirens and a mains power supply with UPS function are selected from the current offer based on a comparison of parameters. In the next section, a block diagram of the whole system is designed. Raspberry Pi Pico development board with an RP2040 microcontroller is selected along with a GSM module SIM800L for SMS alarm notification and an Ethernet module with a Wiznet W5500 chip for the possibility of implementing a web interface. Schematics of the individual modules of the system are designed - for the central control panel, input module with PCF8574 circuit and two PCBs of the control keyboard module, which is equipped with a button keyboard with backlight, character LCD display type 1602 and proximity sensor VL53L0X for automatic lighting when person comes closer than a defined distance. PCBs are designed according to the schematics. Their manufacturing is then ordered, all components are mounted and the PCBs are placed in a 3D printed enclosure in the case of the control keyboard, and on the mounting plate of the metal cabinet in the case of the central control panel, according to the designed mounting plan. For the selected piezo sirens, covers are designed and 3D printed in the design of the selected Paradox NV5 motion sensors. In addition to the central control panel and the control keyboard, door and window contacts, fire detectors and sirens are installed in the house. The next part is dealing with the development of the control software for the central control panel and control keyboard in MicroPython language and the design of a custom communication protocol on the RS-485 bus for communication between the central control panel and control keyboard. Both control programs are based on the state machine principle, and their state diagrams are presented in the thesis. Part of the text is also focused on the development of the central control panel web interface and integration of the desinged system into the Home Assistant open-source automation system. The last part describes the activation and testing of the system in real conditions of a family house.
Cyber Escape Room
Kubík, Hynek ; Burda, Karel (referee) ; Fujdiak, Radek (advisor)
This thesis explores the synergetic potential of escape games and cybersecurity education. It begins with an overview of the principles of cyber security and their importance, followed by a detailed analysis of the typologies of escape games and current trends both in the Czech Republic and internationally. Different educational frameworks and models in cybersecurity are explored, along with an analysis of tools such as Cyber Threat Defender and CyberCIEGE. The study also includes survey analysis and suggests methodologies for creating educational materials and escape games focused on cybersecurity. The findings show the effectiveness of using escape games as a dynamic tool to enhance cybersecurity education.In the practical part, this thesis focuses on designing methodologies and scenarios for escape games along with subsequent testing and optimization of the scenarios
Software support of education in cryptography area based on elliptic curves
Szturc, Jakub ; Sobotka, Jiří (referee) ; Burda, Karel (advisor)
The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic cryptographic and mathematical concepts. A key element of this work is the second part which are described in detail the mechanisms of counting two points on elliptic curve and counting point to themselves over the various fields. On this mechanism is based almost the entire issue. In the third section provides the best-known algorithms and protocols for key exchange, encryption and digital signature. The goal of this paper is to devise software to support teaching. This material is created as a web presentation, which described the theoretical foundations and the main characteristics of cryptosystems based on elliptical curves. The whole issue is supported by practical examples of calculations examples, there are also examples for independent work. Additionally, java applets are prepared that allow an interactive opportunity to try the basic parameters of curves, or verify the calculations.
Lab exercise of electronic burglar alarm system with communication over Ethernet network
Harth, Petr ; Pust, Radim (referee) ; Burda, Karel (advisor)
This bachelor thesis deals with electronic burglar alarm systems that communicate over Ethernet network. On this basis, the lab exercise is designed for an integrated security system Xtralis 3000 to ensure access control and camera surveillance. The concept of lab exercise is justified, and prepared documentation for it. Subsequently, a brief analysis of the Xtralis 3000 system security is also made. The first part describes the development of electronic burglar alarm systems. The history as well as current state of the art of electronic burglar alarm systems are outlined. Also camera surveillance systems and access systems, which are nowadays combined with electronic burglar alarm systems, are briefly mentioned. The thesis goes on by describing the current trend of integrating various security systems into one system that communicates over Ethernet network. In the second part of this thesis the integrated security system Xtralis 3000 is being analyzed. First of all its general characteristics are described and then it goes on by explaining the distribution of the three subsystems, namely the access system S3000, the camera surveillance system V3000 and management software M3000. Subsequently, these systems are being described along with their features. After that, selected network protocols, which integrated security system Xtralis 3000 uses to communicate between its components, are being briefly discussed. In the third part a brief analysis of security integrated security system Xtralis 3000 is carried out. This system is divided into six parts in terms of threats of attacks. The fourth section it is devoted to the concept of lab exercise, which includes introductory balance sheet, the debate over the assigned elements, content and structure of the lab exercise. In the fifth part, is the thesis offers documentation to the lab exercise of integrated security system Xtralis 3000 communicating over Ethernet network, according to which students may perform this lab exercise. And finally, in the sixth part are the instructions for teachers, which describe how to introduce the lab exercise in teaching, with the associated problems and their solutions.
A guide to designing optimal method of backup for big volumes of data
Bartoňová, Veronika ; Vychodil, Petr (referee) ; Burda, Karel (advisor)
This diploma thesis deals with backup for big volumes of data. Data backup is a overlooked area of information technology and the data can be lost by trivial user error or breakdown on any components. In this thesis is discussed theory of backup - archive bit and his behavior based on various type of backup (full, incremental, differential or combination thereof), duration and frequency of backups or the point of ultimate recovery. In addition there are mentioned rotation schemes Round-Robin, GFS and Tower of Hanoi, where are described their principles and graphic diagram of rotation. In chapter Strategy of backup describes the backup strategy via choosing the right choice, taking into technical and economic parameters. Impact analysis, which is explained also in this chapter, describes the important moments in data recovery. For select the optimal strategy is necessary to consider not only the whole capacity of the backup data, but also the size of the backup window for data storage or storage location. In chapter Media storage you can acquainted with all backup media and their technical parameters that are available on the market and can be used for data backup. In section Guide methodology of large volumes of data backup is designed a backup plan with the necessary inputs for the actual implementation of the backup. The design methodology puts emphasis on regular backups and check their location. On practical demonstration is shown that the rotation scheme Tower of Hanoi are among the smallest need for backup media. A part of this thesis is also design of methodology for backup small amounts of data.
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
Data transmition security with Reed-Müller codes
Hrouza, Ondřej ; Burda, Karel (referee) ; Němec, Karel (advisor)
The aim of this work is to propose a Reed-Muller code that secure data transfer to t = 4 independent errors, the information rate R ? 0,5 and for this code to produce a detailed proposal for implementation of the codec. In order to implement this proposal, it is necessary to familiarize themselves with the basic properties Reed-Muller codes. To understand the function of codec Reed-Muller code is in this thesis analyzed the process of encoding and decoding, which is based on a method of using the majority logic. For the design of codec, which consists of encoder and decoder, are used programmable logic circuits FPGA. These circuits are programmed in VHDL language, when for the design source codes is used Xilinx ISE 10.1. In thesis is examined in detail the structure and function of the encoder and decoder chosen Reed-Muller code and there are presented parts of the proposed source codes. Verify the functional ability of the codec is achieved by simulation in program ModelSim SE 5.7f. The simulation results together with the another proposal realization are output of this work.
Authentication of web service users
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
In this bachelor thesis are presented methods for Single Sign-On from perspective of client application. It takes a closer look at protocols OpenID and OAuth and explains the main differencies. Next part of the thesis is focused on registration of application and communication between server and client application. This is realized by OAuth protocol. In the practical part is described a created web application and used methods are explained.
Low-level data reading from computer data storages
Šalko, Jaroslav ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The following work is topically focusing on data restore of selected memory devices. It could be divided into two theoretical parts and one practical. The first part consist explanation of these memory media’s structure, the mechanism of their storage and also how operating system approaches these data. This relates also to a file system, which is among with its most commonly used types described there as well. In the second theoretical part the study focuses on the storage damage problematics. Various types of damage are shown and I examine how we could approach them. The work concentrates on possibilities which owners of the damaged storage media have with an emphasis on specialized companies. Therefore the study contains brief information of four selected domestic companies which are offering data restore on the Czech market. The complete list of services, which these companies offer to their customers, is shown in the chart found by the end of chapter. The second option in order of solving media damage problems are freeware programmes. On the basis of an internet poll dealing with the topic „best programmes for data restore“, I have chosen three programmes to be examined. The examination consisted of uploading certain files on the media storage which was formated by high level method afterwards. Through these three programmes I tried to restore the lost data. The results are included in a chart found by the end of each sub-chapter. The practical part of my work deals with linux program for data restore DDrescue. My effort consists of developing and creating an user friendly interface with intuitive manipulation of this helpful tool. My goal is thus spreading this program into the public and providing them simple tool for efficient low-level data restore.

National Repository of Grey Literature : 254 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.