National Repository of Grey Literature 46 records found  beginprevious37 - 46  jump to record: Search took 1.20 seconds. 
3D Pathfinding -- Searching Path in a Building
Macek, Ján ; Rozman, Jaroslav (referee) ; Samek, Jan (advisor)
The subject of this thesis is the description of the algorithms used for searching in the state space and the subsequent implementation of a searching path for the building. The first part of the thesis is devoted to methods for area description. The next chapter explains the methods of pathfinding in space. The third part of the paper describes the implementation of an application. In conclusion, are the results of testing and their assessment.
Model Checking Infinite-State Systems Using Language Inference
Rozehnal, Pavel ; Křena, Bohuslav (referee) ; Vojnar, Tomáš (advisor)
Regular model checking is a method for verifying infinite-state systems based on coding their configurations as words over a finite alphabet, sets of configurations as finite automata, and transitions as finite transducers. We implement regular model checking using inference of regular languages. The method builds upon the observations that for infinite-state systems whose behavior can be modeled using length-preserving transducers, there is a finite computation for obtaining all reachable configurations.   Our new approach to regular model checking via inference of regular languages is based on the Angluin's L* algorithm that is used for finding out an invariant which can answer our question whether the system satisfies some property.   We also provide an intro to the theory of finite automata, model checking, SAT solving and Anguin's L* and Bierman algorithm of learning finite automata.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Demonstration of State Space Search Methods
Tureček, Martin ; Drozdová, Martina (referee) ; Zbořil, František (advisor)
This bachelor's thesis describes the issue of state space search methods. Thesis was focused namely on the practical part. Its main goal was to create a demonstration application which should serve as an additional help for Fundamentals of Artificial Intelligence course. The resulting application satisfies this requirement thanks to an easy control, a possibility of steping through the alghoritm and an attractive graphic layout. The application is also implemented as a java applet, so its start should be possible from anywhere.
Composite Subband Adaptive Speech Enhancement
Hovorka, Jaroslav ; Vlček, Čestmír (referee) ; Křesálek,, Vojtěch (referee) ; Sysel, Petr (advisor)
The thesis deals with single channel and multiple channel algorithms for speech enhancement. The goal of this work is to perform the deep analysis of both single channel and multiple channel algorithms in sense of their behaviour in noisy environment of combat vehicles and platforms. Based on this analysis a new composite speech enhancement algorithm will be designed. This new approach is expected to increase quality of the processed speech in military communications systems. These systems are characterised by their operation under very noisy conditions where background noise is very high and signal-to-noise ratio extremely low. These noisy conditions are typical for the range of military and combat platforms and vehicles.
Performance tests of cryptographic algorithms
Pospíšil, Karel ; Martinásek, Zdeněk (referee) ; Sobotka, Jiří (advisor)
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for securing communications. The first part is devoted to symmetrical cryptographic algorithms, asymmetric cryptographic algorithms and hashing functions. The second part deals with the security classification and attacks that are used to attack cryptographic algorithms and hash function. The third part deals with the selected testing algorithm RC4 and MD5 hashed function for using CrypTool. The final section provides an evaluation and test results of algorithm RC4 and MD5 hashing function.
Equalization Methods in Digital Communication Systems
Deyneka, Alexander ; Šilhavý, Pavel (referee) ; Číž, Radim (advisor)
Tato práce je psaná v angličtině a je zaměřená na problematiku ekvalizace v digitálních komunikačních systémech. Teoretická část zahrnuje stručné pozorování různých způsobů návrhu ekvalizérů. Praktická část se zabývá implementací nejčastěji používaných ekvalizérů a s jejich adaptačními algoritmy. Cílem praktické části je porovnat jejich charakteristiky a odhalit činitele, které ovlivňují kvalitu ekvalizace. V rámci problematiky ekvalizace jsou prozkoumány tři typy ekvalizérů. Lineární ekvalizér, ekvalizér se zpětnou vazbou a ML (Maximum likelihood) ekvalizér. Každý ekvalizér byl testován na modelu, který simuloval reálnou přenosovou soustavu s komplexním zkreslením, která je složena z útlumu, mezisymbolové interference a aditivního šumu. Na základě implenentace byli určeny charakteristiky ekvalizérů a stanoveno že optimální výkon má ML ekvalizér. Adaptační algoritmy hrají významnou roli ve výkonnosti všech zmíněných ekvalizérů. V práci je nastudována skupina stochastických algoritmů jako algoritmus nejmenších čtverců(LMS), Normalizovaný LMS, Variable step-size LMS a algoritmus RLS jako zástupce deterministického přístupu. Bylo zjištěno, že RLS konverguje mnohem rychleji, než algoritmy založené na LMS. Byly nastudovány činitele, které ovlivnili výkon popisovaných algoritmů. Jedním z důležitých činitelů, který ovlivňuje rychlost konvergence a stabilitu algoritmů LMS je parametr velikosti kroku. Dalším velmi důležitým faktorem je výběr trénovací sekvence. Bylo zjištěno, že velkou nevýhodou algoritmů založených na LMS v porovnání s RLS algoritmy je, že kvalita ekvalizace je velmi závislá na spektrální výkonové hustotě a a trénovací sekvenci.
Multiagent system for traffic flow simulation and analysis
Koutný, Vladimír ; Hynčica, Ondřej (referee) ; Honzík, Petr (advisor)
This diploma thesis deals with an oriented graph processing applying a multi-agent system designated for traffic simulation. The thesis was written as a research study. Based on the study, a simulation environment was created able to respond to various stimuli. Meant as the agents, there are vehicles and their drivers that have various features, based on which they respond to the given stimuli. Communication is conducted via a so-called super-agent that monitors all action on the map and passes this information on particular agents. The agents are able to respond in advance to traffic jams (closures, accidents). In such situations, an algorithm designated for a new route finding is conducted. Besides the controlled ones, there can operate on the map also agents simulating common traffic.
Application of Voronoi Diagrams in Robot Motion Planning
Chaloupka, Luděk ; Dvořák, Jiří (referee) ; Šeda, Miloš (advisor)
This bachelor thesis is focused on the theme of robot motion planning. The motion of dimensionless (i.e. point) robot without any restriction of motion and on the stage with static obstacles (also point) forms the fundamental issue of the thesis. The thesis also contains the implementation of presented algorithm of given level of exercises and definition of appropriate method.
Aplikace metod strojového učení na dolování znalosti z dat
Kraus, Jan
The diploma thesis deals with the area of data mining applied to large collections of textual data. Specifically the thesis is focused on sentiment analysis based on the user's subjective verbal assessment in natural language. The first part of the diploma thesis introduces the reader to basic terms of machine learning and data mining applied particularly to large textual data collections. Following is the description of textual data preprocessing methods and principles of machine learning algorithms. In the practical part of this thesis there are experiments designed and subsequently executed using the SPSS Modeler tool. The experimental part is focused especially on identification of significant attributes and recongnition of relationships between them. The emphasis is put especially on thorough interpretation of the results obtained.

National Repository of Grey Literature : 46 records found   beginprevious37 - 46  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.