National Repository of Grey Literature 26 records found  previous11 - 20next  jump to record: Search took 0.01 seconds. 
System for Verifying the Minimum Resources Required to Run an Application
Žák, Jiří ; Doležal, Jan (referee) ; Smrž, Pavel (advisor)
The main goal of this bachelor thesis is to create a system for the verifying minimum resources required to run an application. The theoretical part deals with the topic of computer performance evaluation metrics and the principle of operation of the Linux operating system. The practical part describes how the design and implementation of the entire system, which uses BPF (Berkeley Packet Filter) technology, was created.The end of the work is completed by testing and evaluation of the whole work. The system was successfully deployed in the partner company BringAuto. It turned out, that the operating system is powerful enough to run applications.
Multiplatform application for Mikrotik network devices management
Bárdossy, Adrián ; Frolka, Jakub (referee) ; Krajsa, Ondřej (advisor)
Diploma thesis contains the description of the application developement for management of network entities based on mikrotik devices. In the intro, there is the description of used libraries, also description of API. In the next part of thesis there is programmed part of application backend. This part contains description of individual directories of project, which was written in pycharm. Every directory is described by one file together with UML diagram and table of methods in specific class. In the next part of thesis, there is the description of graphical part of the application and its example on one section of programmed buttons. It contains also output in form of pictures from the application. In the last section, there is tutorial for modules instalation, which are needed to run the application and contains manual testing of application.
Detection of objects and tracking the route of movement of traffic participants for the needs of intelligent transport nodes
Vymazal, Tomáš ; Kiac, Martin (referee) ; Burget, Radim (advisor)
The master‘s thesis is focused on the object detection. The aim of this thesis is to desine an experiment to assess the detection models YOLOv5, YOLOR, Scaled-YOLOv4 and EfficientDet and to compare their properties (detection speed, memory requirements, accuracy and certainty of detection). For this purpose a custom data set is created to investigate these parameters. The study shows that the YOLOv5 network is performd as the best solution. Deep SORT is used for object tracking which is important for the subsequent extraction of training data from video footage for object movement prediction. The added value is the design of the prediction algorithm which is based on a polynomial regression model.
System for Verifying the Minimum Resources Required to Run an Application
Žák, Jiří ; Doležal, Jan (referee) ; Smrž, Pavel (advisor)
The main goal of this bachelor thesis is to create a system for the verifying minimum resources required to run an application. The theoretical part deals with the topic of computer performance evaluation metrics and the principle of operation of the Linux operating system. The practical part describes how the design and implementation of the entire system, which uses BPF (Berkeley Packet Filter) technology, was created. The end of the work is completed by testing and evaluation of the whole work. The system was successfully deployed in the partner company BringAuto. It turned out, that the operating system is powerful enough to run applications.
System for Verifying the Minimum Resources Required to Run an Application
Žák, Jiří ; Doležal, Jan (referee) ; Smrž, Pavel (advisor)
The main goal of this bachelor thesis is to create a system for the verifying minimum resources required to run an application. The theoretical part deals with the topic of computer performance evaluation metrics and the principle of operation of the Linux operating system. The practical part describes how the design and implementation of the entire system, which uses BPF (Berkeley Packet Filter) technology, was created.The end of the work is completed by testing and evaluation of the whole work. The system was successfully deployed in the partner company BringAuto. It turned out, that the operating system is powerful enough to run applications.
Detection of modern Slow DoS attacks
Jurek, Michael ; Jonák, Martin (referee) ; Sikora, Marek (advisor)
S rozvojem propojených zařízení v síti internet se počet útoků zvětšuje. Útočníci můžou zneužít takového zranitelného zařízení a vytvořit (D)DoS útok proti své oběti. Tyto útoky se stávají čím dál tím víc sofistikovanější. Proto byla vytvořena nová kategorie DoS útoků s názvem Pomalé DoS útoky, u kterých se útočník snaží napodobit chování standardního uživatele. Útočník se snaží využít všech možností, které mu transportní či aplikační protokol umožňují jako např. náhodné zahazování paketů, neodesílání nebo pozdržování zpráv. Na druhou stranu tvorba vlastních aplikačních výplní těchto protokolů může způsobit stav odepření služby na cíleném aplikačním serveru. Tato práce navrhuje klasifikaci síťových toků a volbu parametrů, které můžou pomoci s detekcí pomalých DoS útoků. Mezi vybranými pomalými DoS útoky jsou Slow Read, Slow Drop a Slow Next. Pro každý útok je popsán proces komunikace z pohledu transportní a aplikační vrstvy. Dále jsou vybrány důležité parametry popisující tyto útoky a v neposlední řadě jsou diskutovány metody a nástroje umožňující tvorbu takových útoků. Tato práce se zabývá možnostmi a nástroji tvorby spojení pro útok a diskutuje základní komunikační koncepty tvorby paralelních spojení. Dále je navržen vlastní generátor pomalých DoS útoků s velkým množstvím parametrů, pomocí nichž může útočník definovat vlastní pomalé DoS útoky. Následující část popisuje testovací prostředí pro testování generovaných útoků, scénáře a nástroje zachycování síťového provozu pro tvorbu vlastního datového souboru, jež je dále použit pro detekci pomalých DoS útoků pomocí metod strojového účení s učitelem. Konrétně jsou použity rozhodovací stromy a náhodné lesy k výběrů důležitých paramterů či sloupců použitelných pro detekci pomalých DoS útoků.
Electronic control system of mouth-organ
Pokorný, Tomáš ; Benešl, Tomáš (referee) ; Bradáč, Zdeněk (advisor)
This paper is a documentation for automatic electronic system, that controls mouthorgan with keys. This paper describes design and realization of complete system. This paper consists of six parts regarding literature review, theoretical analysis, hardware design, realization, and software development.
Ordering of Jobs for Pickling Lines
Plšek, Michal ; Tinka, Jan (referee) ; Kanich, Ondřej (advisor)
This work resolves the scheduling problem of multiple hoists transporting products between chemicals baths of pickling line. Harmonograms of products are calculated by modified Shifting bottleneck heuristic, which prevents product conflicts inside baths. Genetic algorithm NSGA-II is used for solution-space search. Web application built over the optimization process allows user to manage/edit products, hoists, baths, configuration parameters and optimization results. Applying proposed heuristic to smaller optimization tasks boosts production effectivity up to 30-45 % (comparing to naive harmonograms). The result of this work is application on the basis of which full-fledged C++ application might be programmed. Then it might be used for solving larger-scale problems.
Electronic control system of mouth-organ
Pokorný, Tomáš ; Benešl, Tomáš (referee) ; Bradáč, Zdeněk (advisor)
This paper is a documentation for automatic electronic system, that controls mouthorgan with keys. This paper describes design and realization of complete system. This paper consists of four parts regarding theoretical analysis, hardware, software and finally realization.
GPON network security incident reporting software
Kupka, Ondřej ; Holík, Martin (referee) ; Horváth, Tomáš (advisor)
This thesis focuses on development of software for security incident reporting from GPON networks. The theoretical part introduces the principles of GPON and provides an introduction to security incidents. The practical part is focused on the selection of suitable open-source systems and the design of an application in Python for the creation of alerts. The output of the work is the deployment of TheHive, Cortex and MISP systems and the creation of an application enabling the creation of various types of alerts based on prepared template. The thesis is finalized by a detailed description of deployment, custom configuration and testing.

National Repository of Grey Literature : 26 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.