National Repository of Grey Literature 25 records found  previous6 - 15next  jump to record: Search took 0.01 seconds. 
Using of RFID new eguipments
Štěpánek, Samo ; Vojáček, Zdeněk (referee) ; Lacko, Branislav (advisor)
Bachelor thesis focuses on RFID technology and its potential uses in healthcare. Thesis includes theoretical basis for processing the subject, analysis of the current use of RFID in healthcare in Czech Republic and the world, the requirements for the application of technology and proposal of RFID technology instrument for usage in healthcare.
Control of a servo-drive for a 3-axial rotary table
Trizna, Lukáš ; Klusáček, Ondřej (referee) ; Macho, Tomáš (advisor)
The aim of this master’s thesis Control of one servo-drive of three-axis rotary table is to develop a real-time motion control solution for the commercially available servo drives on the base of perspective solution available in the industry and the implementation of the chosen solution. The project includes the description of the current solution for the rotary table control, the description of suitable on the market available controllers, the rotary table control design for two selected controllers, the designed model on the base of identificated parameters of DC engine, the design of current, velocity and position regulators for the servo drive control, the servo drive control implementation by two selected controllers ESCON and EPOS2, the servo drive control function verification and the evaluation of achieved results.
Application Protocols Identification
Chomo, Tomáš ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
Digital forensic analysis applies methodical series of techniques  and procedures used to gather evidence, from computer device and present it in meaningful format. This thesis is dealing with identification of application protocols with help of machine learning and statistical methods. Further thesis explain attempts to improve detection skills with help of process called Feature Engineering. Feature Engineering is process of creating set of features that will help us to characterise network traffic. Paper contains testing of actual implementation of agent Netfox Detective which uses those two methods Paper is comparing those two methods and extends the implementation with effort to improve detection skills of a Netfox Detective agent. 
Mobile Application Identification Based on TLS Data
Borbély, Richard ; Matoušek, Petr (referee) ; Burgetová, Ivana (advisor)
This thesis deals with identification of mobile applications based on data from network protocol TLS. It conducts a research of values from the TLS handshake, specifically of JA3, JA3S and SNI values. The work represents an application that includes an algorithm performing a classification over TLS data. The results of the classification represent information based on which we can decide, if the identification of the apps was successful. This method allowed to identify 17 of the 18 given applications. The benefit of this work is the ability to identify mobile apps based on JA3, JA3S and SNI values and for example, it can be used in network administration.
Identification of probiotic bacteria in complex food matrices and dietary supplements
Cesnak, Filip ; Konečná, Jana (referee) ; Trachtová, Štěpánka (advisor)
Theoretical part of the thesis deals with the general characteristics of probiotic bacteria, their effect on human health and with technological demands imposed on them. Furthermore the thesis deals with actual methods of bacterial identification, especially on the base of polymerase chain reaction. Presence of the declared probiotic bacteria was analysed with the polymerase chain reaction (PCR) and the DNA was isolated from the sample of food additive with the use of magnetic particles.
Super resolution in the image to ensure improved monitoring of secured areas
Rosa, Martin ; Mezina, Anzhelika (referee) ; Burget, Radim (advisor)
The point of this bachelor thesis was to compare models of super-resolution with the application on resolving human faces. A brief review of the technologies of super-resolution was created and five models were trained and compared. The focus was on the area of super-resolution that could be helpful with identifying people from CCTV cameras. Used technologies were therefore chose based on their perceptual quality and ability to identify the person in the output image. This thesis has shown the effectivity of the compared models using objective and subjective metrics. The results were compared in a survey (106 respondents). Survey has shown the advantage of using wavelet-transform in the area of the super-resolution of human faces.
Identification of cadavers and skeleton findings
Miko, Michal ; Konrád, Zdeněk (advisor) ; Musil, Jan (referee)
Identification of cadavers and skeletal findings Abstract "Identification" is an act of declaration of identity. The identity (particularly in today's globalized society) deservedly draws attention not only in a normal social interaction, but is also enshrined legally. Its purpose is also important in the sad events of last identification of a person - the identification of the dead. Thesis sets as a goal in a clear and comprehensible form to offer a presentment to an extremely interesting and inspiring topic of identification of the dead human body, using multidisciplinary approach with focus to criminological practice. It provides a comprehensive overview of all the components of identifying corpses, demonstrates the process of identifying, from the finding of the dead body, through autopsy, up to some practice expertise to determine its identity. To achieve this, the method of literature review using books and journals, both domestic and foreign, with subsequent synthesis of acquired knowledge and information with their critical evaluations is used. Clarity, however, is not exchanged for cursoriness and perfunctoriness in the work and therefore some topics suitable for detailed analysis (analysis of DNA, thanatology, the procedure of finding dead bodies in the terrain) are evolved in such a degree to...
Validation of probotic bacteria presence in fermeted plant food products
Péčiová, Bianka ; Fialová, Lenka (referee) ; Smetana, Jan (advisor)
Probiotic bacteria are an essential part of human nourishment which provide many health benefits. We consume them not only in traditional dairy fermented foodstuff, but also in the ever-expanding fermented plant products. The theoretical part summarized general knowledge about probiotic microorganisms, individual species used in technology of processing plant and dairy fermented products, and their influence on human health. The following chapters are devoted to various methods of identification of probiotic bacteria with emphasis on molecular diagnostics, specifically by PCR method. The experimental part is focused on the identification of lactic acid bacteria in a plant fermented product – in a fermented cabbage using 2 methods of isolation bacterial DNA and subsequent analysis by PCR method.
Browser Fingerprinting Detection
Saloň, Marek ; Burget, Radek (referee) ; Polčák, Libor (advisor)
The main goal of this thesis is to design and implement a mechanism that provides protection against stateless tracking with browser fingerprint. Implemented tool has a form of module that takes part of JavaScript Restrictor extension. The module allows to specify heuristics used for evaluation of visited sites that may contain browser fingerprint extraction. If suspicious activity is detected, all subsequent HTTP requests from that site are blocked to prevent the extracted fingerprint from being sent to the server. The implementation and defined heuristics were tested. The resulting module represents an effective tool against stateless tracking. The main limitation of the implementation is possible corruption of sites by blocking HTTP requests.
Mobile Application Identification Based on TLS Data
Borbély, Richard ; Matoušek, Petr (referee) ; Burgetová, Ivana (advisor)
This thesis deals with identification of mobile applications based on data from network protocol TLS. It conducts a research of values from the TLS handshake, specifically of JA3, JA3S and SNI values. The work represents an application that includes an algorithm performing a classification over TLS data. The results of the classification represent information based on which we can decide, if the identification of the apps was successful. This method allowed to identify 17 of the 18 given applications. The benefit of this work is the ability to identify mobile apps based on JA3, JA3S and SNI values and for example, it can be used in network administration.

National Repository of Grey Literature : 25 records found   previous6 - 15next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.