National Repository of Grey Literature 147 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Narrative structures in Indiana Jones film series
Jeřábek, Jan Lucián ; Novotný, David Jan (advisor) ; Štoll, Martin (referee)
The diploma thesis focuses on identifying narrative structures which can be observed throughout the Indiana Jones film series from the first episode (1981) to the fourth episode (2008). It analyses the film reviews and focuses on the way in which their authors have reflected the narrative structures. The thesis also aims on the analysis of the relationship between the positive or negative nature of the reviews and the overall success of each of the films of the series. Beyond that, the thesis deals with the presence of the myths in the film series Indiana Jones and evaluates to what extent it is being reflected in each of the reviews and in the reception of the audience. The qualitative content analysis of the reviews published in journals that specialise in the coverage of film news has proven the existence of a specific narrative structure that is present throughout the Indiana Jones film series. The analysis and subsequent comparison of the reviews has shown that the film critique consensually agrees that the specific narrative structure was respect in each of the films of the series. The analysis of the reviews has also proven the existence of a direct relationship between the nature of the reviews and the overall success of the films of the series.
Integrating Real-Environment 4G and 5G Mobile Data Patterns into Network Simulations for Delay Analysis
Kolackova, Aneta ; Jerabek, Jan ; Hosek, Jiri
This article presents a simulation testbed for analyzinga mobile transport network using open-source networkingtools and protocols. The topology was designed according to the5G transport network architecture, with Segment Routing forIPv6 (SRv6) technology and The Fast Data Project Vector PacketProcessor (FD.io VPP) utilized for packet processing. The Trextraffic generator was used to simulate data transmission, andthe Docker platform enabled centralized access and managementof the topology. Real data patterns collected from one cell sitewas inserted into the created topology to create output forfuture research. The created testbed provides a valuable toolfor analyzing the mobile transport network’s performance andfuture optimizing based on needs of network slices.
Network Toolkit for exploiting Internet Protocol version 6 Security Vulnerabilities
Anh Phan, Viet ; Jeřábek, Jan
This work has developed a network toolkit inPython to automatically carry out several network attacks andsecurity vulnerability testing when operating IPv6. Specifically,the program can be used to launch specified practical typesof attacks according to the user’s direction such as DoS(Denial of Service), dumping servers, spoofing or bypassing thefirewall. The essence of these attacks is based on the inherentvulnerabilities of Extension headers, and protocols such asICMPv6 (Internet Control Message Protocol), DHCPv6 (DynamicHost Configuration) Protocol, which are the most importantprotocols in the IPv6 network operation. In addition, the analysisand illustrations have been presented, which can help networkanalysts to have a clearer understanding of the potential dangersthat could arise from implementation of IPv6. From there,they can propose appropriate solutions to eliminate or mitigatedamage when attacks occur.
Semi-automatic workstation for measuring the properties of electronic circuits
Rozboud, Jakub ; Jeřábek, Jan (referee) ; Dvořák, Jan (advisor)
The bachelor thesis is devoted to the selection of a solution and subsequent implementation of a semi-automated measuring station for measuring active elements in the FGIC44 circuit. The thesis includes a basic analysis of the construction and wiring of the FGIC44 circuit. Remote control and automation of the instruments was implemented using the Keysight VEE Pro development environment. Microsoft excel was used to record and process the measured data. Four supplied chips were measured using the built measurement workstation and the results are included in the appendices of this paper.
Creating IPv6 packets with Scapy for use in the Trex traffic generator
Hamran, David ; Jeřábek, Jan (referee) ; Koláčková, Aneta (advisor)
The bachelor work is devoted to the creation of packets in the Scapy for use in networks capable of Segment Routing over IPv6. The work contains five main parts describing Internet Protocol version 6, Segment Routing over IPv6, Scapy, script for easier work with packets and the program for generating network traffic Trex.
Piracy in the Horn of Africa Region
Jeřábek, Jan Lucián ; Makariusová, Radana (advisor) ; Tesař, Jakub (referee)
The diploma thesis is a case study, which focuses on the identification of the key aspects influencing the presence of maritime piracy in the Horn of Africa region and the birth of Somali piracy. In accordance with the research questions, the thesis analyses the main factors that are influencing the birth of maritime piracy and the piracy itself the most. In the historical context, the thesis focuses on the causes for the piracy in the Horn of Africa region, as well as on the similarities between the historical and modern maritime piracy. The thesis also contains a detailed description of all measures taken against the Somali pirates. Based on the evaluation of the engagement of different international actors in the fight against the Somali pirates, the thesis analyses their role in association with the suppression of maritime piracy in the Horn of Africa region, including the legal enforceability, both in the historical context, and the international law, more precisely the national law, possibly international agreements. The analysis conducted in the boundaries of a case study has undoubtedly proven the advantage of an international cooperation while dealing with global issues, even if there are, seemingly insuperable, structural limitations. The thesis concludes that the international...
Generation of IPv6 and ICMPv6 packets and their impact on the operation of network devices
Phan, Viet Anh ; Martinásek, Zdeněk (referee) ; Jeřábek, Jan (advisor)
Tato diplomová práce se zabývá problematikou fungování IPv6 (Internet Protocol verze 6), ICMPv6 (Internet Control Message Protocol verze 6), DHCPv6 (Dynamic Host Configuration Protocol verze 6), NAT64 (Network Address Translation 64) a DNS64 (Domain Name System 64) protokoly. Výzkumný proces je realizován nastavením síťových laboratorních scénářů, ve kterých si stanice vyměňují informace prostřednictvím protokolů IPv6. Ke zpracování a generování požadovaných typů paketů IPv6 za specifických okolností se používají nástroje, jako je vlastní program, aplikace Ostinato a stroj Kali Linux. Výsledky experimentu jsou analyzovány s cílem poskytnout správcům sítí nebo specialistům úplnější pochopení funkce protokolů IPv6 a také možných zranitelností.
Security testing of selected communication protocols and related vulnerabilities
Kuklovský, Adam ; Langhammer, Lukáš (referee) ; Jeřábek, Jan (advisor)
This master’s thesis extensively addresses the functionality and characteristics of the IPv6 protocol and its control protocol ICMPv6. Furthermore, the thesis discusses methods of penetration testing and technologies used in creating the testing environment. A key output of this work is a network scanning tool that has been compared with the popular Wireshark program. The conclusion describes the structure of the proposed tool and suggests possibilities for its future development and improvement.
Application explaining the principles of IP addressing
Bukovinský, Denis ; Jeřábek, Jan (referee) ; Langhammer, Lukáš (advisor)
This master's thesis presents the design and development of an application for teaching IP addressing in computer networks. The application includes a network simulator and an editor, allowing students to work with a predefined network topology, assign addresses to subnets, and customize the network as needed. It verifies the correctness of address assignments and detects address conflicts. The thesis covers theoretical background, implementation details, and testing of the application. The developed tool provides a valuable resource for students, facilitating their understanding and practice of IP addressing concepts in network education.
Design of a rescue button for emergency calls in cars
Jarabý, Šimon ; Jeřábek, Jan (referee) ; Dvořák, Jan (advisor)
This bachelor’s thesis focuses on the design and implementation of a prototype device, which aims to retrofit vehicles manufactured before 2018 with an emergency call sys- tem. The device will operate on similar principles as the eCall service introduced by the European Union. The first part of the work contains a basic acquaintance with the used technologies and procedures in the proposed devices. Since this is a device intended for cars, we perform this retrofit by connecting the device to the OBD-II (On Board Diagnostics) diagnostic connector. For this reason, in the theoretical part we get acquainted with the diagnostic connector OBD-II as well as with the CAN bus, com- munication protocols or the method of accident evaluation. The practical part with the subsequent design of equipment and selection of individual components. We will need to send location and communication from the devices via the 3G network, which is why we choose the Global Positioning System (GPS) and Global System for Mobile Commu- nications (GSM) modules. We will also evaluate the accident using an accelerometer so that we can determine the severity of the accident. The last part of the work describes the practical construction and implemented equipment.

National Repository of Grey Literature : 147 records found   1 - 10nextend  jump to record:
See also: similar author names
15 JEŘÁBEK, Jakub
8 JEŘÁBEK, Jiří
14 Jerabek, Jan
15 Jeřábek, Jakub
2 Jeřábek, Jakub,
14 Jeřábek, Jan
4 Jeřábek, Jan Lucián
3 Jeřábek, Jaroslav
8 Jeřábek, Jiří
1 Jeřábek, Josef
Interested in being notified about new results for this query?
Subscribe to the RSS feed.