National Repository of Grey Literature 37 records found  beginprevious28 - 37  jump to record: Search took 0.00 seconds. 
J2ME/J2SE Network Communication
Přerovský, Petr ; Herout, Adam (referee) ; Láník, Aleš (advisor)
The first part of this bachelor study is engaged in description of platform Java Micro Edition with the goal to punctuate its main features. The second part presents the possibilities of implementation of networking communication in surroundings of mobile phones and networking posibilities of platform Java 2 Standart Edition with target the multiplex and non-blocking server. The third part is focused on project and implementation of exemplary application with tests of resulting solutions together.
Network Interface for Keyword Spotting System
Skotnica, Martin ; Glembek, Ondřej (referee) ; Szőke, Igor (advisor)
A considerable part of the research in computer science is dedicated to speech recognition as the speech-controlled systems become useful in many applications. One of them is the keyword spotting which makes possible to find words in audio data. Such a detector is developed at BUT Faculty of Information Technology. The goal of this work is to propose a network interface to this keyword detector based on client/server architecture. Client connects to the server and sends audio data. Server runs keyword detector with this received data and sends the result of keyword spotting back to client. Finally client visualizes the result and interact with user.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Low level control and data acquisition in the wireless access point MikroTik
Jurčík, Michal ; Červenka, Vladimír (referee) ; Růčka, Lukáš (advisor)
Bachelor thesis is focused on using the ICMP protocol for transferring user-defined data content. The main objective of this thesis is to introduce of using sockets working with OpenWRT operating system, which transmitting ICMP messages. Bachelor thesis is divided into two parts. The first section contains a description of program functions, macros and settings. In the second part there is a description of communication between access points.
Design of Transtibial Posthesis With Use of Additive Manufacturing Technology.
Kopecký, Martin ; Náhlík, Luboš (referee) ; Koutný, Daniel (advisor)
The thesis deals with the design of a transtibial prosthesis by additive manufacturing technology. Based on walking biomechanics and the current situation of knowledge a prosthetic foot has been designed for a patient with low level of physical activity. Furthermore, the thesis describes the design of an individual socket for the patient. The socket has been designed by reverse engineer procedure based on the three-dimensional geometry of patient´s stump obtained by 3D scanning. Testing samples of the foot and the socket have been made for the check of functionality of both the devices and then subjected to mechanical tests in accordance to the methodology regulation ISO 10328. Finally, the thesis depicts the FDM technology used for the production of functional samples of the designed devices; assembly of modular transtibial prosthesis and its testing by the patient.
Design and realization of client application for cooperation with ONET Modeler
Polak, Martin ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
The bachelor thesis „Design and realization of client application for cooperation with OPNET Modeler“ is about trying to bring a client to easier and better communication with the server. Open new opportunities for effective work in the network. Goal of this work is to interconnect two communication stations, which will together communivate. OPNET communicates with an external program which redirects the data to the network layer. The work describes the individual steps in creating a model client. Part of the work is introduction to the OPNET Modeler simulation environment, whereupon it is tied together a detailed desciption of programming of an external application.
Network load generators
Kubík, Pavel ; Koutný, Martin (referee) ; Pelka, Tomáš (advisor)
The aim is to create, test and describe the network load generator for server-client connection type. It´s used language C++ under Linux. It was also used socket and multithreading programming. Load on the server is done by sending HTTP requests. The load generator have different adjustable parameters and displays the test statistics. In this work is described mechanisms wich are used, by the application, to load. Testing was done on one server with a different size of the target file.
Web applications for user authentication
Vybíral, Petr ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
Programming of processors in 32- or 64-bit operation systems
Rášo, Ondřej ; Kyselý, František (referee) ; Balík, Miroslav (advisor)
Main topic of this thesis is Win32 application programming interface and symbolic instructions programming language. It can be divided into four parts. First part sums the basics of 32-bit programming in symbolic instructions language in Windows. Second part describes the Win32 resources for computer intercommunication. Third part presents, describes and comments selected problems in symbolic instructions language.Last part covers a creation of an example application. This application and its parts will be the content of computer exercises in VUT Brno FEEC subject Počítače a jejich periferie.
Network protocols and sockets
BALEJ, Marek
My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

National Repository of Grey Literature : 37 records found   beginprevious28 - 37  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.