National Repository of Grey Literature 49 records found  beginprevious40 - 49  jump to record: Search took 0.00 seconds. 
Bar Code Implemamtation to Production Process of Small Factory
Tihon, Karel ; Špinka, Jiří (referee) ; Starý, Jiří (advisor)
Target of my diploma thesis is barcode study and implementation to SMT assembly processes. This thesis contains two main parts. The first one is devoted to basic types of barcodes, reading technologies and industrial process mapping in PCB assembly. The second part is devoted to theoretical proposal and physical realization of system for materials flow monitoring. Barcode is contained in this system. Practical part of this thesis is tested in a company realizing contract manufacturing in PCB assembly - SMT and THT.
Comparison of technogies for creation of information systems
Hubený, Lukáš ; Macho, Tomáš (referee) ; Holek, Radovan (advisor)
The topic of this master thesis is a comparison of the technologies for information systems creation. There are compared four fundamental technologies: Php, ASP.NET, JSP and Perl. The comparison of these technologies have two main stages: The first stage is mostly theoretical and demonstrate theoretical advantages and drawbacks of these platforms. The second stage demonstrates on some short examples advantages of platforms during information systems programming. Co-operation with database systems is compared too.
Application for monitoring and controlling the security of large LAN and WAN computer networks
Maloušek, Zdeněk ; Polívka, Michal (referee) ; Novotný, Vít (advisor)
Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is often stored only in electronic devices and that is why the security of the data is so important. The objective of my thesis is to describe network security problems and their solutions. First chapter deals with the network security, security checks and attacks. It describes procedures used in practise. First part deals with traffic scanning and filtering at various layers of the TCP/IP model. Second part presents the types of proxy and its pros and cons. Network Address Translation (NAT) is a favourite technique of managing IP addresses of inside and outside network which helps to improve the security and lower the costs paid for IP addresses. NAT description, IPSec, VPN and basic attacks are described in this section. The second chapter of the thesis presents set of Perl scripts for network security checking. The purpose of the project is not to check the whole network security. It is designed for contemporary needs of IBM Global Services Delivery Centrum Brno. The first script checks running applications on target object. The aim is to detect services that are not necessary to run or that are not updated. The second one checks the security of the Cisco device configuration. There is a list of rules that has to be kept. The third script inspects the Nokia firewall configuration which is on the border of IBM network. If some of the rule is broken, it shows the command that has to be proceeded at the particular device. The output of the first and the second script is an HTML file. The third script uses the command line for the final report. The last part of this chapter gives advice to configure Cisco devices. It is a list of security recommendations that can be used by configuring e.g. routers. The appendix presents two laboratory exercises. The aim is to give students an opportunity to learn something about programs and technologies which are used in practise by IT experts to check the weaknesses of their networks.
Server monitoring component
Boček, Jaromír ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
This Bachelor thesis deals with the development of a universal server monitoring component for collecting data from various servers. This component meets the requirements for easy installation, setup and activation of the specified server. The monitored unit releases information that the monitored server is active and completely functioning, in particular, information on CPU utilization, state of disk utilization, and state of all logged users. The presented multiplatform concept puts emphasis on the most common platforms, such as Linux and Windows. In addition, transfer of acquired data through the Internet obstacles in the form of firewall configurations and other security technologies has been solved within this work.
Regular expressions in programming languages
Benešová, Patricie ; Pavlíčková, Jarmila (advisor) ; Fortinová, Jana (referee)
The target of this thesis is to describe the usage of regular expressions in flavors of PCRE library and programming languages such as Java, Perl and Javascript and in Unix systems in languages AWK and GAWK and the grep program. The first part of this thesis deals with a general description of metacharactes, lookaround or Unicode properties used in regular expressions. The second part of this thesis is divided according to listed flavors. For every programming language or library there are specified supported options. Furthermore, there are examples of usage of regular expressions in the code of a given language. A separate chapter provides information about the Java flavor and an educational application in Java. The application can be used for trying out options described in this thesis and therefore it is set up especially for students. In the end, there is a comparison of all of the listed flavors and chosen syntax.
Automatization of the digitization workflow of the National Library of Technology
Řihák, Jakub ; Kosek, Jiří (advisor) ; Římanová, Radka (referee)
This diploma thesis is focused on the automatization of digitization workflow in the National Library of Technology, Prague, Czech Republic. This thesis examines possibilities of digitization processes automatization by means of scripts written in Perl programming language and Apache Ant build tool. The advantages and disadvantages of both solutions are analyzed as well as their suitability for automatization of digitization workflow. Based on the comparison of both solutions, the scripts in Perl programming language are selected as the most suitable solution for automatization of digitization workflow. The question whether Ant build tool could be used for the purpose of automatization of digitization workflow is also answered in this thesis. The Ant build tool could be used for the above-mentioned purpose. However, once the activities in the given process divert from the general scope of tasks provided by the Ant build tool, the complexity of the whole solution increases rapidly. This complexity is given by the necessity to use predefined tasks -- sets of functions which have to be combined to create a functional automatization script. Even though Ant is an extendable tool, it is necessary to understand the Java programming language in order to create a new Ant task successfully. On the other hand, the Perl programming language allows easier customization of the script for the purposes of automatization of digitization workflow. Also, the modularity of the Perl programming language makes it easier to create those scripts and modify, correct or develop them even further.
Kooperativní práce na dokumentech v aplikaci TeXonWeb
Telenský, Václav
The diploma thesis deals with design and implementation of cooperative work on documents in the application TEXonWeb. The diploma theses includes the analysis of competitive solutions and key technologies for implementation. The cooperative work on documents is a functionality which allows users to cooperate simply on one document in real-time. Text of the thesis describes the process of implementation using the technology which is described in the initial analysis. The diploma theses also includes some ideas for next possible development.
Aplikace pro vyhledávání a ukládání proxy serverů
Záklasník, Martin
This Bachelor thesis describes the types of anonymous access to web pages and solves how to effectively defend against them. The work is divided into four main parts. The first part describes the company which the application is created for. The second part deals with the theory of how the anonymity on the Internet works, what is it and what the proxy types exists. The third section solves the methodology for the proxy detection. The fourth part deals where you can get proxy servers and the fifth part solves the application itself to catch proxy servers.

National Repository of Grey Literature : 49 records found   beginprevious40 - 49  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.