National Repository of Grey Literature 24 records found  beginprevious21 - 24  jump to record: Search took 0.00 seconds. 
Optimization of geotechnical survey and monitoring for design and realization of underground constructions
Černý, Vít ; Pruška, Jan (referee) ; Aldorf,, Josef (referee) ; Horák, Vladislav (advisor)
The presented thesis focuses primarily on issues of geotechnical survey and geotechnical monitoring for underground line constructions. It deals with the current practice of geotechnical survey and monitoring. Based on the knowledge gained from specific buildings in the Czech Republic (Královopolské tunnels, tram tunnel Žabovřeská) and based on the author's practical local and foreign experience submits suggestions regarding their mutual optimization in order to improve outputs and reduce financial costs.
Multicast Data Tunneling
Stodůlka, Stanislav ; Skořepa, Michal (referee) ; Šimek, Milan (advisor)
This document contains introducion of terms in routing multicast data and their tunneling in network. As well developing aplication in Java to test sending unicast and multicast data through network. Aplication are based on client/server. Document describe Linux daemon mrouted and alternativ daemons with similar function of routing multicast data.
Optimization method based on TRUST for image registration
Pernicová, Lenka ; Mézl, Martin (referee) ; Harabiš, Vratislav (advisor)
The aim of the thesis is optimization for a medical images registration. The basis is to acquaint with the images registration and to peruse component global optimization methods, especially an optimization method TRUST. After theoretic knowledge it is possible to proceed to a suggestion of an optimization method based on the TRUST method and to realize in the program setting MATLAB. Created algorithms has been tested on test data and compared with other optimization methods as Simulated annealing.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.

National Repository of Grey Literature : 24 records found   beginprevious21 - 24  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.