National Repository of Grey Literature 52 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Data Collecting Application in Wireless Sensor Network for Measuring Relative Humidity of Air
Procházka, Stanislav ; Macháň, Ladislav (referee) ; Jaroš, David (advisor)
The master work is focused on the design and implementation of two parts of the system for measuring temperature and relative humidity. The system for measuring temperature and relative humidity consists of a network of wireless sensors, a ISM/Wifi converter and application which will collect, analyze and archive data. The design and implementation of ISM/Wifi converter as well as the design and implementation of application are described in this work. ISM/Wifi converter will be able to communicate with the network of wireless sensors through ISM/Wifi protocol and end device (the device with Android operating system) by means of IEEE 802.11 protocol. The application will be able to evaluate, to save and to present user the received data very clearly.
Network Protocol Analyzer
Pšorn, Daniel ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
Object of this thesis is to find the way how to program network protocol analyzer on the highest level of ISO/OSI model. We need to use some of the methods for detection of application protocols. The software described in this thesis uses traditional application level traffic identification method and signature-mapping-based method. Basic platform is FreeBSD operating system. Programming language is C using libpcap library.
Module for a Lecture Browser for Correcting the Output of Speech Recognizer
Srb, Pavel ; Schwarz, Petr (referee) ; Fapšo, Michal (advisor)
The core of my work is a browser upgrade, which contains user based transcript-correction from speech recognizer, including creation of transcription storage and sharing server. Introduction of my work mentions motivation for multimodal usage in computer science sphere. Further in text is list of speech recognition reasearch categories from Faculty of Information Technology. The main attention is given to description of multimodal browser used for browser technology testing and presentation. In future, the multimodal browser is supposed to be used as a study-utility or common user multimodal player. Required features of this player, concepts, realization description and whole C++, wxWidgets, XML, HTTP based architecture is defined.
Web Interface for Multimedia Demo
Šerý, Radek ; Beran, Vítězslav (referee) ; Polok, Lukáš (advisor)
Nowadays, there are many multimedia applications, which are usually inaccessible. These applications are often generated in closed communities, such as on universities as diploma thesis. The objective of this work is to create a web interface which will allow access to these multimedia applications, whose authors decided to display the app on the website. Part of the solution will be SDK, enabling developers to make their applications accessible from web.
Network Game: Destroy the Submarine
Kovačič, Dušan ; Herout, Adam (referee) ; Szőke, Igor (advisor)
The goal of this bachelor's thesis Network game: Destroy the submarine is to analyze and implement network architecture and solve all the problems connected with it. In final version, the created program uses client-server network architecture. Both subjects are communicating with complex network protocol. For effective data the virtual connection over UDP protocol is established. Minor part of this study solves graphical problems and received data displaying. For this purpose, there are different frequenc ies used for data handlings and techniques that provide better game experience.
Simulated Fault-Injection in Network Communication
Rozsíval, Michal ; Rogalewicz, Adam (referee) ; Smrčka, Aleš (advisor)
The development of network applications takes place under ideal conditions, as opposed to deploying them in a real-world environment that contains vulnerabilities such as loss, latency, or cyber-attacks. Ensuring resilience against these vulnerabilities is thus crucial. This thesis introduces the NetLoiter, which aims to enable the simulation of the required vulnerabilities and thus allow developers to treat them correctly. The NetLoiter can be used in transparent (proxy server), hidden (captures communication directly from the system kernel), or hardware versions suitable for testing embedded systems. NetLoiter supports dynamic reconfiguration using a public interface that can be used to automate the testing process. NetLoiter has been successfully integrated and used in real projects.
Advanced proxy for penetration testing
Válka, Michal ; Vilém,, Šlesinger (referee) ; Sedlák, Petr (advisor)
This master’s thesis focuses on improving the open-source proxy tool for penetration testing of thick clients. The thesis is divided into three main chapters, the first of which is focused on the theoretical background on which the thesis is based. The second chapter describes the analysis of the current state and defines user requirements, which must be met. The third chapter deals with increasing the quality and expanding the functionality based on user requirements. At the same time, a testing methodology is created and a vulnerable application is developed as a teaching material for the methodology. The chapter concludes with a summary of the economic costs and benefits of the application for the penetration testing process.
Game strategy creation and debugging tool
Roztočil, Jan ; Forst, Libor (advisor) ; Klímek, Jakub (referee)
The aim of this thesis is to create an implementation of a strategic board game of Risk. A play against computer-controlled opponents will be supported, as well as multiplayer game of human players over the Internet. A design of a reusable communication protocol is also a part of the task. An interface for defining a new computer strategies will be provided within the implementation. The program will be oriented as a tool for develepment of those strategies, it will help to debug strategies within an actual game. The program will support MS~Windows and Linux operating systems.
Design and Creation of Proxy for Penetration Testing
Válka, Michal ; Bláha, Lukáš (referee) ; Dydowicz, Petr (advisor)
This bachelor’s thesis is aimed at design and development of proxy for penetration testing. The thesis is divided into three main parts and begins with a theoretical part, which is focused on fundamental technologies and principles on which the application is based. The second part is focused on comparison of currently available solutions. The third part contains the creation of the proxy itself. The last chapter contains a summary of this thesis and the benefits of the developed product for penetration testing.
IEC 61850 industrial communication simulator
Srp, Jakub ; Pospíšil, Ondřej (referee) ; Blažek, Petr (advisor)
This thesis is focused on IEC 61850 communication protocols SMV, GOOSE and MMS and their implementation in SCADA systems. There is a simulator, run on Raspberry Pi, that generates data according to IEC 61850 and transmits the data using protocols in question. The simulation consist of various virtual devices e.g. surge protection, undervoltage protection, circuit breaker, disconnector, HMI. The MMS protocol is used for station control. Simulation can be user-defined from textual configuration file.

National Repository of Grey Literature : 52 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.