National Repository of Grey Literature 43 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Preparation of Microbial Metabolites from Waste Materials
Zichová, Miroslava ; Márová, Ivana (referee) ; Stloukal, Radek (referee) ; Rosenberg, Michal (advisor)
In this thesis the use of waste materials for the microbial production of important metabolites is reported. The first part is focused on the use of waste paper (a lignocellulosic material) as a non-traditional source for the production of bioethanol. The second part is focused on the immobilization of cellulolytic enzymes, which are used for the hydrolysis of lignocellulosic materials. First, the waste paper (cardboard) was pre-treated using a blender and a vibratory mill. The pre-treated cardboard was used for the production of ethanol by the method of simultaneous saccharification and fermentation. This method was optimized with free cells of Saccharomyces cerevisiae. Then strains suitable for the immobilization were selected. Strains of S. cerevisiae and Pichia kudriavzevii were immobilized by encapsulation into the polyvinyl alcohol carrier and tested again for the ethanol production by simultaneous saccharification and fermentation. In the second part of the work a carrier from waste polyethylene terephthalate bottles was prepared and used for the immobilization of the cellulolytic complex. The basic characteristics were determined, such as optimal pH and optimal temperature, storage, operational and thermal stability, enzyme kinetics and the mode of action of the enzyme. Compared to two other commercial carriers this carrier showed to be suitable for the immobilization of the cellulolytic complex.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
The analysis of TOR’s hidden service
Mesík, Vladimír ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This work deals with problems concerning anonymity in the internet age, the principle of onion routing, Tor network, Tor’s Hidden Service protocol. Analyzing security, anonymity and the possibility of Hidden Services deanonymisation, revealing the actual IP address of hidden service server. It describes selected types of attacks against Tor network in order to deanonymisation of nodes and hidden services. The practical part describes the process of installing and configuring hidden services under Linux. The final part of the practical part is operational and running .onion hidden service with anonymous service for file storing and sharing. Part of the work is the development of two laboratory tasks aimed at the server configuration and its security.
Security camera system CCTV
Mlčoch, Vladimír ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Nowadays the cameras are an important part of security systems. They are everywhere and affect our lives every day. The task of my bachelor thesis was to learn about this camera system, describe its parts and function as a whole. Understanding the theoretical basics of this issue is crucial for solution of bachelor thesis and the laboratory task. In the first part I focuse on the history and description of older systems and the gradual evolution to the modern ones. The second part analyzes the different components of a CCTV system and try to understand their functionality. In the third part i create laboratory task that aims to teach students about the modern technologies and options used in digital camera systems CCTV.
Analysis of the Tax Impact of the Švarc System
Rosenberg, Milan ; Belza, Jaroslav (referee) ; Kopřiva, Jan (advisor)
The bachelor`s thesis focuses on the tax impact of the švarc system. It deals primarily with differences in the taxation and the insurance deductions between employees and the self-employed. The result of this thesis will be a proposal according to which the švarc system should be legalized due to the proximity of the taxation of employees and the self-employed.
High-speed Networks in Household
Rosenberg, Michal ; Mačák, Jaromír (referee) ; Škorpil, Vladislav (advisor)
The master thesis discusses about the relation between high-speed networks and intelligent system installation features and possibilities of this mutual interaction. Furthermore principles of KNX bus tunneling through IP networks are theoretically analyzed (KNXnet/IP). Practical use of implements KNXnet/IP shows real elements on the test panel. The control is realized by KNX@Home in the Ubuntu environment. Simulation of the real state tunneling KNX bus represent model in Opnet Modeler, which shows how the delays may change due to network load.
High-speed data transmission in mobile and wireless networks
Rosenberg, Martin ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
The goal of the master’s thesis was to propose two laboratory exercises, integrating newly purchased devices HTC Desire and Nokia N900. Designed tasks bring new technologies and services to education process. The first task examines the configuration of branch exchange Asterisk PBX and analyzes SIP protocol. Part of exercise is concentrated on high-speed data transmission in mobile and wireless networks, regarding to usability of VoIP technology. The second exercise introduces to vulnerability of VoIP technology. It contains simulations of attacks on branch exchange Asterisk, DoS attack and discusses methods to secure VoiP communication. The part of this exercise examines usage of HTC Desire phone, instead of ordinary Wi-Fi access point.
Objective Exercise of a New Transmission Equipment
Rosenberg, Michal ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
The aim of my project is designing of the example of the new transmission equipment PCM30U - 3UST for education of the subject Access and transport networks in form of the three new laboratory tasks. The tasks are focused on the configuration of a more universal familiarity with transmission facilities-PCM30U-3UST. Students learn to operate with the equipment so that they will be able to manage its interface and practical usage of its insertable cards. Further they gain theoretical knowledge of the E1, that they verify it through the analyzer PUMA 4300E. This work is also acquainted them with the theoretical principles of signal transduction through the framework of the E1 and contains a brief manual of the transmission equipment PCM30U-3UST and analyzer PUMA 4300. Laboratory tasks are processed including detailed workflow, which includes graphic illustration of linkage and developed model protocols.
The analysis of modern cloud solutions
Kis, Matej ; Burda, Karel (referee) ; Rosenberg, Martin (advisor)
This thesis describes existing cloud storage systems. Description of the prerequisites of developing cloud and distributed systems are presented. Current storage systems such as Dropbox, iCloud and Google drive are described. Description is mainly focused on the resources of both protocols and derive a conclusion for the use in the cloud storage systems. The practical part of this work is focused on creating two labs, what will be implemented in the teaching syllabus of Projecting, Administration and Security of Computer Networks subject. The first of the labs is focused on the implementation of own cloud services. In the last lab students attention will concentrate on interception of communication secured with SSL protocol.
Using of the attack "Pass the hash attack" for the compromising of high privileged accounts.
Jakab, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
The master thesis deals with the attack "‘pass the hash"’ on high privileged accounts. Within the theoretical part is discussed creating hashes and its use. Next is a descrip- tion of the authentication in Windows operating system. There are also pointed out weaknesses in the design of authentication mechanisms. The last part deals with the individual attack and security options for mitigating the impacts. In the practical part are tested available tools for retrieving hashes from the files of the operating systems and tools which allow the attack itself. The output of this section is selection of the appropriate tools to demonstrate the attack in a proposed real environ- ment. The last topic is about designing the experimental environment, demostration of the attack with the possibility of getting through the network. The last steps deal with mitigating the impact of the attack.

National Repository of Grey Literature : 43 records found   previous11 - 20nextend  jump to record:
See also: similar author names
4 Rosenberg, Martin
4 Rosenberg, Michal
4 Rosenberg, Milan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.