National Repository of Grey Literature 58 records found  beginprevious49 - 58  jump to record: Search took 0.00 seconds. 
Interactive Comparison of Train Connections
Uhlíř, Jan ; Holkovič, Martin (referee) ; Hynek, Jiří (advisor)
This bachelor's thesis is concerned by question of interactive comparison of train connections with graphic timetable. The first step was to analyze existing applications. Subsequently, an analysis of the available technologies for creating custom diagrams and database systems was performed. The product of this thesis is a web application which purpose is a graphic representation of traffic on the track in the form of an interactive graphic element. The displayed data can be filtered according to user's configuration.
Analysis and Visualization of e-Mail Marketing Campaigns
Urbanczyk, Martin ; Holkovič, Martin (referee) ; Hynek, Jiří (advisor)
The goal of this thesis is evaluating Posílátko.cz application and making extensions on the basis of thorough analysis and comparison of other similar products. This extensions are going to lead into increased user awareness of campagins state, so user can react accordingly. Extensions are going to be founded mostly on statistics data. Next I am going to implement campaign summary documents, where people can find all the data without logging into the application. So user can take this documents and present it easily on corporate consultations. 
Application for Simulation of PROFINET Controller
Mazurek, Tomáš ; Holkovič, Martin (referee) ; Kreslíková, Jitka (advisor)
This bachelor's thesis deals with development of an application simulating the Profinet controller. The main function of such controller is to establish an application relation with a device, which is communicating via the Profinet technology. Through the application relation then takes place the entire exchange of information. The goal of the controller simulation, run on a desktop computer, is to facilitate the testing of input/output devices connected to the system via Ethernet interface. The resulting application allows to monitor and modify the communication much easier than the real control system.
Use Machine Learning to Predict Future Market Prices
Klhůfek, Michal ; Trchalík, Roman (referee) ; Holkovič, Martin (advisor)
This thesis discusses a market prediction system based on the data obtained from the historic tranzaction. The main goal was to use the techniques of technical analysis to create a more accurate estimation of market behavior in the future. The data obtained from the current state of the market are compared with the historical market values using the algorithms for the classification of data from the field of learning. Based on individual algorithms, the software was designed to try to match the two sets of data as closely as possible. Testing took place on a dataset that represented the past market enthusiasm, and how much the overall system is performing.
Building Trading System Based on Time Range Breakout
Šťastný, Filip ; Hynek, Jiří (referee) ; Holkovič, Martin (advisor)
This thesis is focused on creation of automatical trading system for Forex exchange market. System is based on time range breakout principal and highly customizable by parameters. The thesis explains basic principals of trading on Forex, a designing of the strategy, an implementation of the strategy in Easy language, optimalizations and backtesting using Multicharts platform.
SDN Routing According to Transmitted Content
Gavryliuk, Olga ; Franková, Barbora (referee) ; Holkovič, Martin (advisor)
This works main point of focus is routing in software defined networks, which allow routing based on transfered packets. For accomplishing this task it was necessary to create a detection mechanism, that finds the connection within the OS which needs priority handling. New connections are sent via a routing aplication which is running on the SDN controller POX. The controller divides applications based on two criteria: The application requiring the largest bandwidth and the application requiring the fastest route. For this purpose four algorithms for routing data based on application preferences were designed and implemented. The applications were implemented in the Python language and they were tested in the simulation tool Mininet.
Use of Heuristics for Password Recovery with GPU Acceleration
Gazdík, Peter ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis discusses various techniques to enhance the password recovery process with GPU acceleration. The first part introduces a Markov model and simple regular expressions. These techniques dramatically reduce the password space to be searched. This is based on observations of users and their use of letters in passwords. We propose the design of a parallel algorithm that combines both techniques. Last part of the thesis contains the results of experiments to prove benefits of Markov model.
Password Recovery of RAR, BZIP, and GZIP Archives Using GPU
Mikuš, Dávid ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP, BZIP formats. For password recovery multi platform Wrathion tool is used, the tool can obtain a password from an encrypted file by using its modules and password generators. The module provides parsing of input file and storing data, which are later used for password validation. To accelerate calculations, graphics card and OpenCL framework is used. The core of thesis is the implementation of Wrathion's modules for password recovery of the formats denoted above and measuring the speed and comparision with competeting tools.
Identity Detection in TCP/IP Architecture
Holkovič, Martin ; Matoušek, Petr (referee) ; Polčák, Libor (advisor)
This work deals with detection of users within computer networks on different layers of the TCP/IP architecture. These identities are identified by protocols running on the appropriate layers of the given architecture. PPPoE and SLAAC protocols were chosen as protocols that are used for network layer address assignments. The second type of protocol is the application protocol SMTP. We analysed communication using the chosen protocols in order to create metadata about the corresponding communication. The results of the analysis are finite state machines. Based on these finite state machines, software for legal interception was designed and implemented. Implemented software was tested on samples of data, in a specialized laboratory, and in a production network.
SDN Controlled According to User Identity
Holkovič, Martin ; Ryšavý, Ondřej (referee) ; Polčák, Libor (advisor)
The aim of this work is to connect dynamic identity management system developed under the project Sec6Net with a control of SDN network. The controller Pyretic is used for network control, which allows application development by using the match-action rules. Interface between the identity management system and controller Pyretic is designed and implemented in both systems. To prove the concept, selected use cases related to security, routing and accounting are created. The use cases are implemented as applications for Pyretic controller. All programs were tested in networking laboratory according to the possibilities. The main contribution of this work is to simplify and improve the management of computer networks while providing new capabilities to administrators of these networks and ultimately their users.

National Repository of Grey Literature : 58 records found   beginprevious49 - 58  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.