National Repository of Grey Literature 24 records found  beginprevious21 - 24  jump to record: Search took 0.01 seconds. 
Optimization method based on TRUST for image registration
Pernicová, Lenka ; Mézl, Martin (referee) ; Harabiš, Vratislav (advisor)
The aim of the thesis is optimization for a medical images registration. The basis is to acquaint with the images registration and to peruse component global optimization methods, especially an optimization method TRUST. After theoretic knowledge it is possible to proceed to a suggestion of an optimization method based on the TRUST method and to realize in the program setting MATLAB. Created algorithms has been tested on test data and compared with other optimization methods as Simulated annealing.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
Scanning Tunneling Microscopy STM
Michele, Ondřej ; Škoda, David (referee) ; Průša, Stanislav (advisor)
The work deals with STM microscopy. The commercial Nanosurf easyScan2 STM microscope was activated and methodology of STM tip preparation by PtIr wire cutting and W wire etching was established.
The Evaluation of the Czech way during the economy transformation (general overview)
HOVORKOVÁ, Karolína
The Bachelor's thesis deals with the denationalization and the privatization process during the period of the economy transformation in the Czech republic in 1990's which was later termed as the Czech way. The thesis mainly focuses on the politician's and economist's opinions on the correctness and legality of its implementation. The thesis is divided into three parts except introduction and conclusion. The first part pursues political, economic and juridical bases, the Czech way's main targets and alternative ways. Next chapter is concerned with the Czech way itself, denationalization and privatization, mainly the voucher privatization. In this chapter we can find the best known affairs connected with the Czech way. In the third part we can find main mistakes involved in the Czech way. The Bachelor's thesis includes tables showing the economy transition by means of fundamental economic indicators or the number of emerging entrepreneurial subjects.

National Repository of Grey Literature : 24 records found   beginprevious21 - 24  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.