National Repository of Grey Literature 454 records found  previous11 - 20nextend  jump to record: Search took 0.02 seconds. 
Sign language detection methods - review
Petr, Luboš ; Venglář, Vojtěch (referee) ; Krejsa, Jiří (advisor)
The Aim of this work is to describe various methods of sign language detection. The output of individual methods is a functional translation of sign language into text in real time. In addition to glove and kinect detection, this work deals with the possibilities of sign language detection from image recording, which is the most prospective method of detection in the future. The thesis is also focused on sign classification using neural networks.
Detection of Dynamic Network Applications
Oroš, Petr ; Kaštil, Jan (referee) ; Tobola, Jiří (advisor)
This work deals with the detection of dynamic network applications. It describes a general method for detection of any application layer protocol and automatically searches for the detection rules. The practical part deals with general detection protocol to the automatically generated designs. A special section is devoted detect bittorrent protocol.
DNS Amplification Attack Detection Using Passive DNS Analysis
Míšaný, Daniel ; Bartoš, Václav (referee) ; Kováčik, Michal (advisor)
This thesis is focused on the analysis and detection of DNS Amplification attack which is type of the DoS attack. Introduction of this thesis is focused on fundamental theories involving computer networks, DNS and DoS attacks. The main part of the work deals with the analysis of DNS Amplification attack, design and implementation of detection tool in C++ programming language. The conclusion is devoted to analyzing the results of the detection tool.
Detection of similarity in program codes
Maťašová, Kristýna ; Vítek, Martin (referee) ; Kašpar, Jakub (advisor)
The Bachelor introduces the concept of plagiarism and possible kinds of plagiarism. It focuses on the problem of detecting the similarity of source codes, especially with graphical interfaces in the MATLAB environment. It also describes already existing detectors. The practical part of thesis is focused on finding appropriate flags for detection of similarity in source codes and introduces the metric of detected flags. It also describes the internal logic of created detector of similarity and discusses the results of its testing.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Detection of Red-Light Violation
Šorf, Milan ; Bartl, Vojtěch (referee) ; Špaňhel, Jakub (advisor)
This thesis is focused on automatic detection of red-light violation using static camera. Theoretical part of the thesis describes the principle of detection and introduces various methods of detecting traffic lights and cars as well as their reliability metrics. The thesis also illustrates implementation of the application for evaluation of these methods.
Reconstruction of Damaged Parts of Fingerprint Image
Halva, Vladislav ; Drahanský, Martin (referee) ; Kanich, Ondřej (advisor)
This bachelor thesis deals with the reconstruction of damaged fingerprint areas. The main goal is the design and implementation of an algorithm for the reconstruction of these regions. The designed algorithm consists of three main parts. The first part is fingerprint feature extraction and their derivation in damaged areas. The second part is a localization of damaged areas, which is based mainly on the structure of papillary lines. The last part is the damaged areas reconstruction itself. Gabor filter is used in this part of the process. The algorithm is implemented in C++ using the OpenCV library. An analysis of the reconstruction success rate is done afterwards. It is at first evaluated using the difference of quality between the input and processed fingerprint image, estimated by NIST NFIQ 2.0 and one other alternative tool for fingerprint image quality evaluation. The next step is a manual evaluation of the reconstruction success rate in various types of damaged areas.
Detection of rainwater infiltration using EIS method
Lipinský, Vít ; Maleňák,, Jaroslav (referee) ; Pařílková, Jana (advisor)
The master‘s thesis deals with the detection of rainwater infiltration in soils using the method of electrical impedance spectrometry. Its aim is to assess the suitability of this method and equipment for measuring the role of water infiltration in soils.
Thick-film sensors for heavy metals detection
Gajdoš, Libor ; Majzlíková, Petra (referee) ; Prášek, Jan (advisor)
This project describes the possibilities of heavy metals detections in solutions using differential pulse voltammetry with tree-electrode electrochemical thick-film sensors. In the theoretical part, the thick-film technology is described as well as thick-film pastes’ types and compositions, followed by introduction to electrochemistry and electro-analytical methods of measurement. This project also describes the three measured heavy metals – cadmium, lead and copper. In the practical part, heavy metals’ ions detection in solutions using carbon working electrode and determination of the detection limit and sensitivity are described and discussed. Finally the evaluation of obtained results and results comparison to hygienic limits are included.
DNS Service Attacks Simulation
Navrátil, Tomáš ; Kekely, Lukáš (referee) ; Kováčik, Michal (advisor)
The theme of this bachelor‘s thesis is the simulation and detection of cybernetic attacks on the DNS service. The goal was to simulate chosen attacks, analyze their behavior and create a tool capable of detecting these attacks in network traffic and replicating them for research purposes. The tool was able to successfully detect DNS attacks in normal network conditions. These results are discussed further at the conclusion of this paper, along with possible uses this application might have to other developers, and ways the program could be improved or extended in the future.

National Repository of Grey Literature : 454 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.