| |
|
Traffic Simulation Using Traffic Controllers
Dressler, David ; Trchalík, Roman (referee) ; Kreslíková, Jitka (advisor)
The aim of this master's thesis is to design an extension of the existing simulation system for designing traffic intersections. The required extension will allow the use of the Siemens sX traffic controllers. The introduction to the topic of traffic engineering, traffic controllers configuration and the dynamic traffic control is discussed first. The next part is dedicated to describing the implementation of the existing simulation system. The following chapter describes the use of the sX traffic controllers and also describes the design of the required extension of the existing simulation system, for a purpose of enabling the use of sX traffic controllers. This is followed by a chapter describing the implementation of this extension. The last chapter is devoted to testing the whole system in terms of functionality and performance. Finally, other possibilities for the future development are outlined.
|
|
Specifications Database of Security Protocols
Papež, Zdeněk ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis is about the security protocols which are necessary for safe communication in the Internet. There are various kinds of security protocols in use but this work covers only selection of most important of them. I have tried to gather all available information and work them out into uniform database which can be used for further processing. In my opinion, main aid of this work is precise description of knowledge baseand prediction base of each protocol. Also all possible conditions and states are described. The end of part of this work sums up all concerned protocols into a user-friendly table which is used in web-side database accessible from the Internet.
|
|
Chess Server
Bárczi, Viktor ; Trchalík, Roman (referee) ; Jirák, Ota (advisor)
This work deals with the creating, and solving the problem of a chess server. It is about creating a chess server wherewith people can play chess through the Internet or a local network and also on a PC. In the real world the construction of the informational system resembles chess games between two players. According to the basic rules of chess the control of the right movements, the analysis of special movements like taking a figure and also rooking, projection and the analysis of checks and mates on the king are solved. During the game statistics of the movements are kept and after the end of the game the performance of the players are calculated by the virtue of record and statistics are kept about the gained ELO (rating) points.
|
|
Ansible for Windows
Klíč, Jiří ; Očenášek, Pavel (referee) ; Trchalík, Roman (advisor)
The main purpose of this bachelor thesis is dealing with possibilities of automation of the computer management and acquisition of data about computers. This thesis focuses on automation of Windows-based computers managed by Linux operating system. The automation is performed by text user interface. It presents to the reader the used tool named Ansible and its components and usages. Here are discussed both methods of collecting of required data and their meaning and interpretation. Some data which are collected in this work are static, the rest of them use to change their values by time. There are also discussed possibilities how to manage the software equipment of the computer.
|
|
Anomaly Detection in Generated Incident Ticket Volumes
Šurina, Timotej ; Rychlý, Marek (referee) ; Trchalík, Roman (advisor)
Táto bakalárska práca sa zaoberá problematikou detekcie anomálií v časových radoch. Predstavuje metódy STL decomposition, ARIMA, Exponential Smoothing a LSTM Networks. Cieľom je pomocou týchto metód vytvoriť algoritmus, ktorý dokáže analyzovať trend v množstve generovaných záznamov o incidentoch a detekovať anomálie z trendu. Riešenie bolo vytvorené na základe dátovej sady poskytnutej firmou AT&T Global Network Services Czech Republic s.r.o. a implementované v programovacom jazyku Python.
|
|
Analysis of Selected Security Protocols
Říha, Tomáš ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis deals with the SRI Constraint Solver tool used for analysis of security protocols. The tool is shortly characterised, and its syntax is shown on an implementation of the Needham-Schroeder Public Key protocol. The practical part shows some examples of analysed protocols. Every protocol is specified; it's run in the tool, published attack and found attack in case of its presence. At the end of the thesis, a method of analysis of each protocol and a comparison of achieved results with published are described.
|
|
Risk Management Support Tool
Škutová, Sára ; Trchalík, Roman (referee) ; Kreslíková, Jitka (advisor)
This master thesis deals with risk management in projects. The goal was to study the knowledge areas of project management, especially planning, identification and qualitative analysis of risk management. Based on the information from the required area, a tool was designed to help visualize the risks on the project while supporting their identification and analysis. The designed tool was programmed with the combination of Java Spring Boot server and React client. At the end of this thesis you can find result of the testing and possible future expansion of the application.
|
| |
|
Application for Tracking Devices for Windows Phone OS
Pupák, Juraj ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This application deals with recording of position about phone devices with help of system GPS. The application is implemented for platform Windows Phone 7.5. The Application allows to create profiles, which are evaluated with recorded positions. The evaluation is made through 2 points with Haversine formula. The theoretical part of thesis deals with technologies and GPS system, the practical part deals with design and implementation.
|