National Repository of Grey Literature 43 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Risk Analysis of Self-Driven Vehicles
Weigel, Filip ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
The goal of this thesis was to design and implement system for risk analysis in self-driving cars. This thesis focused on design and implementation of system for risk analysis in models. One of the requirements for the system was to be flexible and robust. Design of the risk analysis was presented at theoretical level and then implemented in models of ABS and ESP systems in UPPAAL environment. The system was then tested via multiple experiments. The experiments were beneficial and the system for risk analysis correctly evaluated failure scenarios with adequate response to the rising level of risk. Experiment outputs were then presented at graphs with comment to each failure scenario.
Server monitoring component
Boček, Jaromír ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
This Bachelor thesis deals with the development of a universal server monitoring component for collecting data from various servers. This component meets the requirements for easy installation, setup and activation of the specified server. The monitored unit releases information that the monitored server is active and completely functioning, in particular, information on CPU utilization, state of disk utilization, and state of all logged users. The presented multiplatform concept puts emphasis on the most common platforms, such as Linux and Windows. In addition, transfer of acquired data through the Internet obstacles in the form of firewall configurations and other security technologies has been solved within this work.
Design of Multi-functional Component for Minibus
Kárych, Tomáš ; Křenek, Ladislav (referee) ; Sládek, Josef (advisor)
This work deals with the issue of ventilation by the rear window of the fifth door in minibuses converted into motorhomes. The goal is to design a component that extends the eye of the window lock of the fifth door and allows regulation of the ventilation gap while maintaining the functionality of the locking system. Furthermore, implementation of a multifunctional tool that will help in unexpected situations and will serve as an advertising and gift item. The solution must meet the criteria of manufacturability, functionality, aesthetics and feasibility in relation to the market size. The final product consists of a component, a multifunctional tool and a case that meets the initial goals and solved the problems that arose during the design. An aesthetically pleasing design was created with regard to small-scale production, sustainability and usability of the customer target group. The work discusses the process of an unconventional combination of products and a comprehensive solution to a very specific problem with a large number of smaller goals.
Voice recognition and text conversions using Speech Recognition JS API
NOVÁK, Martin
The point of the bachelor's thesis is to process the issue of voice recognition and voice input using the JavaScript interface SpeechRecognition. This interface is part of the Web Speech API, which allows you to integrate voice data into web applications and contains two components - text-to-speech (SpeechSynthesis) and asynchronous speech recognition (SpeechRecognition). JS API technology allows you to recognize the voice coming into the input, then convert it to text, which can then be used in many ways, such as simply typing as a dictaphone, or invoking other functions using a word command. A very positive and especially current feature is the fact that it is a so-called blind friendly technique, ie technology designed for visually impaired users of web applications in this case. In the theoretical part, the author will focus on the introduction of basic web technologies related to the issue with a focus on JavaScript and especially on the SpeechRecognition API itself and its implementation and incorporation using the aforementioned JavaScript. In the practical part, a web application will be created, which will demonstrate the possibilities, features and advan- tages or disadvantages that this voice recognition technology currently brings.
Risk Analysis of Self-Driven Vehicles
Weigel, Filip ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
The goal of this thesis was to design and implement system for risk analysis in self-driving cars. This thesis focused on design and implementation of system for risk analysis in models. One of the requirements for the system was to be flexible and robust. Design of the risk analysis was presented at theoretical level and then implemented in models of ABS and ESP systems in UPPAAL environment. The system was then tested via multiple experiments. The experiments were beneficial and the system for risk analysis correctly evaluated failure scenarios with adequate response to the rising level of risk. Experiment outputs were then presented at graphs with comment to each failure scenario.
SwiftUI User Interface Component for Structured User Inputs
Strýček, Šimon ; Rozman, Jaroslav (referee) ; Hrubý, Martin (advisor)
This thesis deals with the design and implementation of user interface control for the linear selection of values at a given range. The component design considers an intuitive way of selecting numerical values with an emphasis on the high accuracy of its selection. The component itself is designed for selecting single-dimensional and two-dimensional values. The implementation is made for the iOS platform using the SwiftUI framework, made by Apple. The result is in the form of a Swift Package library with a robust interface.
Security and Trust in the DEECo Component Model
Štumpf, Ondřej ; Bureš, Tomáš (advisor) ; Kruliš, Martin (referee)
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.
Variability of Execution Environments for Component-based Systems
Malohlava, Michal ; Bureš, Tomáš (advisor) ; Racek, Stanislav (referee) ; Duchien, Laurence (referee)
Reuse is considered as one of the most crucial software engineering concerns. It allows for delivering software systems faster with less effort. Therefore, the thesis explores limits of reuse in the context of component systems. It analyzes in depth contemporary component systems, finds their commonalities and variation points, and introduces a meta-component system -- a software product line which allows for producing a tailored component system based on a set of requirements. The thesis addresses the meta-component system definition and focuses on its crucial aspects which play the key role in component systems preparation- (1) a configurable execution environment and (2) generation of implementation artifacts. To address the first aspect, the thesis proposes a model-driven method for creating configurable execution environments. Motivated by creating execution environments, the thesis contributes to (2) by introducing a notion of domain-specific languages interoperability in the context of the code generation. Furthermore, the thesis elaborates the proposed notion resulting into a family of interoperable domain-specific languages which is parametrized by a general purpose language.
Security and Trust in the DEECo Component Model
Štumpf, Ondřej
DEECo represents an example of a Cyber-Physical System (CPS) consisting of potentially vast number of components able to share data with each other. So far, access to data was not restricted, thus enabling components to exploit sensitive data owned by other components. The goal of this work is to analyze security threats in distributed environments such as DEECo and propose a security solution which would provide both physical security of component data and introduce an access control mechanism. However, while confidentiality may be critical to certain applications, data integrity is crucial to almost every one. This work therefore also proposes a trust model, which prevents components operating with defective or malicious data. Both proposed models are realized in jDEECo, a Java implementation of DEECo.
Webový systém pro generování pojistných předpisů v makléřské společnosti
Kubišta, Jakub
The thesis describes the creation of a system for generating insurance invoices sent through billing to individual clients of company Allrisk, a.s. The theoretical part of the document introduces the current concept of the company’s information system and a related existing application. This part of the thesis includes the reasons for creation, used principles and technology selection for the mentioned application. The practical part is about the application design and implementation. The thesis also includes discussion about testing, evaluation of results, management of anticipated risks and potential extensions.

National Repository of Grey Literature : 43 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.