National Repository of Grey Literature 255 records found  beginprevious223 - 232nextend  jump to record: Search took 0.01 seconds. 
Project of comprehensive security objects
Michálek, Libor ; Burda, Karel (referee) ; Herman, Ivo (advisor)
In my thesis I go about principles and methods of security systems, then I go about analysis of avalaible types of security systems (EPS, EZS and CCTV). I have written about their possibile use in design security building. I have described levels of project documentation and its different parts including process service of production a project documentation for security system. I used all knowledges in the end of my thesis, when I designed and integrated security system for a special building.
Software for data hiding in image files
Morkus, Filip ; Říha, Kamil (referee) ; Burda, Karel (advisor)
In my master's thesis I start fromthedescriptionofthebasics and thebeginningsofsteganography, itsmethods and purposes. Detaileddescriptionof BMP fileswithhidden data follows. A filestructureisanalysedintothesmallestdetails to avoiddamagingfilewhilehiding. At thesametime to make profit oftheinformationincluded in a fileheader in the most effectiveway. Anotheraimwas to explain a principalofsteganographicalmethoditself, usedforhiding data into BMP file. Based on these findings, a programmeconceptwasdesigned and consequentlythatprogrammewas made. Itcarriesoutthehiding and revealing data intothe image files. Directionsfor use are made to thisprogramme and thereisalso a demo ofthefeaturesdescribingeach step. At the end ofmymaster's thesis anattentionispaid to thoseinfluencesthatcanbelimitingforthismethod. Exceeding these limitswouldlead to breakingthesteganographicalmethod, whichmeansrevealingthehidden data.
Support software for projection of burglar alarm systems
Fikejs, Jan ; Pust, Radim (referee) ; Burda, Karel (advisor)
This graduation thesis deals with a software design of burglar alarm. The software has been developed in compliance with the applicable standards and regulations governing burglar alarm designs and on the basis of practical experience with designing and implementing electronic security systems. The software is written in C# and uses .NET platform. On the ground of that, this software can be run on any computer with the Windows operation system. Any ground plan picture file can be used as the underlying project map on which all the object security system can be built. It makes it possible to produce both wire and wireless electronic security systems. The software includes an editable database of components and conductors used in the electronic security alarms. The database components can be created, edited and deleted through the software. The database has been saved in format XML. The software also includes a folder of picture files containing photographs of the components and schematic symbols used in the software. You use a mouse to drag and drop individual components into the ground plan picture, where they are well arranged in a tree structure. The components can be interconnected by a conductor, which enables creation of a precise design of the electronic security system of the object. The software output includes drawings, bills of material and pricing. As for the space components, you can graphically display their range and thus visually confirm the design. The software includes automatic design verification. There, you can verify whether the right components have been used and whether the designed conductor lengths are acceptable, whether they correspond with the system load, and whether the voltage drops on the conductors do not exceed the permitted limit. The software has been developed for all electronic security system designers and for engineers attending to these problems.
Software support of education in classical cryptoanalysis
Fojtová, Lucie ; Hajný, Jan (referee) ; Burda, Karel (advisor)
Number of today's modern cipher systems are based on the classical symmetric cipher systems, such as the transposition principle in the DES cipher. Successful analysis and deciphering of these ciphers is therefore underlined by solid knowledge of the elementary cryptanalysis methods. This implies the importance of classical cryptanalysis education -- for better a understanding of the field, using visual means is of utmost importance. The aim of the thesis is to summarize selected cipher methods of the classical cryptanalysis, namely the mono-- and polyalphabetical substitution and transposition route cipher. Along with the theoretical part, ciphering/deciphering software is introduced to be used for educational purposes, particularly a website and a standalone application providing tools for ciphering, analysis and code breaking of the classical cipher based code.
Module of electronic security central with Ethernet communicator
Strašil, Ivo ; Pust, Radim (referee) ; Burda, Karel (advisor)
This diploma thesis deals with a design of a burglar alarm control panel, equipped with an Ethernet interface. The thesis contains a discusson of present solutions of control panels and of present usage of Ethernet communication. An idea of sensors, directly connected to LAN, was discarded on basis of a component price survey. Finally, a new concept of the panel has been chosen. This concept allows a free definition of internal logic using a C-like scripting and provides a possibility to create a network of these panels in a LAN network, using a software-only supervising main control panel. A new control panel following this concept was designed and succesfully tested.
Communication protocol for built-in facilities
Dolák, Petr ; Burda, Karel (referee) ; Herman, Ivo (advisor)
Questions connected with communication technologies are really serious problem worldwide and this Bachelor’s thesis deals with this topic. Concretely is aim of this thesis Communication protocols. They are one of the basic keys in any data transfer, becausse they creates the basic environment for communication between users. First part of this thesis specifies nowadays used communication technologies, however range of Bachelor’s thesis do not give enough space for discussion all used technologies. The main aim of this part is to discuss used technologies on first three levels OSI model. It has been given to made a three layer solution and it has two possible results. In the second and third part has been this two results discussed, by realizing two differnet communication protocols. The first one deals with three lower levels of OSI model, and it is connected to non-error transfer and working with data. It means uploading and downloading them. Protocol build on higer levels of OSI model delas with good communication, however is more specified for services used by in-built units. The last part of this thesis includes diagrams and simulations performed in SDL language.
Smartcard authentication
Juras, Stanislav ; Burda, Karel (referee) ; Hajný, Jan (advisor)
The master’s thesis outlines the problem of authentication. It describes authentication factors like ownership, knowledge and inherent. There are described properties of each of that. Authentication based on ownership focuses on authenticators - the smartcards. The thesis also describes different types of smartcards (contact, contactless and hybrid smartcards) and refers to their basic properties. Emphasis is placed on the description of contact and contactless smartcard, specifically focusing on .NET smartcards. It describes their internal components such as memory (RAM, ROM, EEPROM), crypto processor etc. Smartcards are also examined in terms of support for cryptographic primitives. The thesis also introduces the cryptographic methods and principles describing symmetric and asymmetric ciphers. Symmetric ciphers are divided in to stream and block ciphers. There is description of asymmetric cipher, digital signature etc. This work also touches on the fundamental principles required for safe programming. Part of this work is also practical implementation (programs). Practical part aims to implement the communication between the user and AC (Access Control) AASR system. The first suite of applications provides encrypted communication between the PC and smartcards. These applications should create on smartcard services that will be able to perform operations on the client side, which are necessary to authenticate in the AASR system. The paper also presents algorithms for working with big numbers - addition, subtraction, multiplication, and Montgomery's algorithm for multiplication. The second application implements the functionality of AC components (Access Control). This functionality is for example – authenticate received token, digital signature authentication, generating random numbers, logging etc.
Module of electronic security central with GSM communicator
Dokulil, Zdeněk ; Pust, Radim (referee) ; Burda, Karel (advisor)
The aim of this diploma thesis is to design and manufacture a small modular burglar alarm control panel with an emphasis on GSM communication functions. The first part of the thesis discusses history of control panels from the first attempts to present technologies. Also a classification of wired and wireless systems is defined. The second part contains an general proposal of the GSM-enabled panel design and description of the circuit. SIM 300C module has been chosen as a GSM terminal device. The final part contains description of key parts of the firmware and a detailed manual for end users. The proposed design has been realized and succesfully tested.
Algorithms for adaptive frequency hopping spread spectrum systems
Zunt, Tomáš ; Burda, Karel (referee) ; Pust, Radim (advisor)
This master's thesis deal the system, which use the Frequency Hopping (FH). Is explained principle those techniques and her benefits and disadvantages. Follows description techniques Adaptive Frequency Hopping (AFH) that used the Bluetooth. Follows description other method for setup hopset such as Dynamic Frequency Hopping (DFH), which used standards 802.22. 22. Is an emerging standard for Wireless Regional Area Networks (WRAN) operating on a license-exempt and non-interference basis in the spectrum allocated to TV broadcast services (between 47–910 MHz). Other method introduces the Adaptive Frequency Rolling (AFR), a particular instance of frequency hopping (FH) that enables the collocated WPANs to cooperate and avoid the self-interference. The AFR uses as input solely the observed packet error rate (PER) and it does not require any exchange of information among the collocated WPANs. The effect of the FR over a longer time interval is that the WPANs use the complete set of disposable channels in an implicit time-division and cooperative manner. Last method described in this Thesis is Dynamic Adaptive Frequency Hopping (DAFH). The basic strategy applied in DAFH is a binary search for a hopset that offers smaller PER. The set of admissible hopsets depends on the total number of available channels and the maximal level of binary divisions. Practical part of the master's thesis describes proposal model AFH, with usage of Matlab Simulink programme. In thesis are described function each blocks a their setting. Simulation parameters can change in simple graphic interface. The model is able to simulate influence of static and dynamic interference in transmission band of two communicating devices.
Software support for cryptography system training based on discrete logarithm
Kříž, Jiří ; Zeman, Václav (referee) ; Burda, Karel (advisor)
Current needs of human communication came to status, when most of transferred messages are considered as private and transition over non-secured communication lines in open form is not possible. That originated a lot of different methods for securing of messages and transfers in ciphered form. Two mainstreams were established, symmetric cryptography and asymmetric cryptography. Second of mentioned groups is based on usage of two information – keys, when one of then is broadly known and is public and second, well protected and private. Using a public key it is possible to establish a cryptogram of message, but for deciphering it is necessary to know private key. Asymmetric methods are based on mathematical problems, for which there is not an effective computing algorithm. This thesis are focused for asymmetric cryptosystems based on discrete logarithm problem, where ciphering of message using public key is very easy and quick, but deciphering without knowledge of private key is extremely time consuming process. Work describes a mathematical base of discrete logarithm problem, its’ properties and methods developed for solving of this problem. Descriptions of particular cryptosystems are given, i.e. ElGamal cryptosystem, Diffie-Hellman protocol and DSA. Second part of thesis is focused for web application developed as study support of discrete logarithm problem and of cryptosystems using this problem. It describes functional and graphical interface, work with it and options given to user working with application. Mentions also lessons for user which should help with understanding of described problems and practicing.

National Repository of Grey Literature : 255 records found   beginprevious223 - 232nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.