National Repository of Grey Literature 395 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Financial Protocol Simulator
Vymlátil, Martin ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
This paper deals with the creation of a simulator for financial protocols ISO8583 and SPDH.The simulator was designed and implemented in C++ language based on the analysis of the financial protocols. The simulator was tested on pre-prepared authorization messages and was also tested against the real POS terminal. Possible extensions for the simulator were discussed at the end of this thesis.
VoIP in Jabber Client
Kulička, Vojtěch ; Veselý, Vladimír (referee) ; Mlích, Jozef (advisor)
Práce se zabývá možnostmi implementace VoIP do existujícího XMPP programu se sdílenou tabulí. Analyzuje možnosti využití současných technologií pro podporu VoIP.  Cílem je nahrazení stávajících komunikačních knihoven klienta za telepathy. Dále také přidání VoIP.
Stress state aspects of quasi-brittle fracture
Sobek, Jakub ; Němeček,, Jiří (referee) ; Keršner, Zbyněk (referee) ; Klusák,, Jan (referee) ; Veselý, Václav (advisor)
The presented dissertation thesis is focused, as the title suggests, on the analysis of stress state aspects of quasi-brittle fracture. That means the fracture of composite materials with cement matrix (such as concrete, mortar, plaster, etc.), ceramics and other composites. Used methods are based on the theory of multi-parameter linear elastic fracture mechanics, which highlights the importance of considering of several initial terms of Williams power series, approximating the stress and displacement fields in a cracked body, within conducted fracture analyses. Determination of values of coefficients of terms of this series, recalculated into the shape functions serving in most of the conducted stress state analyses, is performed via the so called over-deterministic method. Another tool for the problem solving is nonlinear fracture mechanics, represented primarily by the cohesive crack model, namely the crack band model implemented in the used ATENA software. For the backward reconstruction of stress field in the cracked bodies the application ReFraPro is used. The analytical part deals with various aspects of wedge-splitting test – from the boundary conditions, though various possibilities of nodal selection (required as input variables for the over-deterministic method) up to the advanced (automated) analysis of numerical model. Special chapter includes atypical test specimens designed for adjusting of various levels of constraint of stress and deformation at the propagating crack tip. The study of this geometry and also the subsequent detail analysis reveals important information for real experiments. Backward reconstruction of stress field presents analysis on suitable possibilities of nodal selections as inputs into the procedure of approximation of the crack tip fields and answers the question of the necessity of application of the multi-parameter linear elastic fracture mechanics for certain fracture analyses of specimens from quasi-brittle materials. The th
Webmail Traffic Reconstruction
Slivka, Miroslav ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Webmail applications are very popular these days. Besides typical usage, thanks to ciphered communication, they can be used for malicious activity like confidential data loss. This thesis discusses webmail events detection based on common webmail signatures in captured network traffic. Also there will be discussed SSL/TLS interception and decryption for further data analysis. The modules in this thesis are designed and implemented for Netfox.Framework forensics analysis tool. The Netfox project is developed at FIT BUT under security research project SEC6NET.
Overcomplete Mathematical Models with Applications
Tonner, Jaromír ; Witkovský,, Viktor (referee) ; Martišek, Dalibor (referee) ; Rajmic, Pavel (referee) ; Veselý, Vítězslav (advisor)
Chen, Donoho a Saunders (1998) studují problematiku hledání řídké reprezentace vektorů (signálů) s použitím speciálních přeurčených systémů vektorů vyplňujících prostor signálu. Takovéto systémy (někdy jsou také nazývány frejmy) jsou typicky vytvořeny buď rozšířením existující báze, nebo sloučením různých bazí. Narozdíl od vektorů, které tvoří konečně rozměrné prostory, může být problém formulován i obecněji v rámci nekonečně rozměrných separabilních Hilbertových prostorů (Veselý, 2002b; Christensen, 2003). Tento funkcionální přístup nám umožňuje nacházet v těchto prostorech přesnější reprezentace objektů, které, na rozdíl od vektorů, nejsou diskrétní. V této disertační práci se zabývám hledáním řídkých representací v přeurčených modelech časových řad náhodných veličin s konečnými druhými momenty. Numerická studie zachycuje výhody a omezení tohoto přístupu aplikovaného na zobecněné lineární modely a na vícerozměrné ARMA modely. Analýzou mnoha numerických simulací i modelů reálných procesů můžeme říci, že tyto metody spolehlivě identifikují parametry blízké nule, a tak nám umožňují redukovat původně špatně podmíněný přeparametrizovaný model. Tímto významně redukují počet odhadovaných parametrů. V konečném důsledku se tak nemusíme starat o řády modelů, jejichž zjišťování je většinou předběžným krokem standardních technik. Pro kratší časové řady (100 a méně vzorků) řídké odhady dávají lepší predikce v porovnání s těmi, které jsou založené na standardních metodách (např. maximální věrohodnosti v MATLABu - MATLAB System Identification Toolbox (IDENT)). Pro delší časové řady (500 a více) obě techniky dávají v podstatě stejně přesné predikce. Na druhou stranu řešení těchto problémů je náročnější, a to i časově, nicméně výpočetní doba je stále přijatelná.
Deanonymization Heuristics for Cryptocurrencies
Anton, Matyáš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
The cryptocurrencies are growing more and more popular, both due to their independency on institutions and the feeling of anonymity they provide. This is, however, also accompanied by an increasing number of their abuse for criminal activities. This thesis explores the principles of current cryptocurrencies as well as techniques used for increasing anonymity of their usage. Based on the findings, it proposes a solution attemping to deanonymise activity in select cryptocurrencies.
Modelling and Reliability Analysis of Campus Network at the BUT
Kraus, Zdeněk ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis informs about technologies and architecture of computer network at BUT.  It describes chosen technologies and some of theirs variants.  Further, it contains simulation model design of a network switch device.  That is followed by the model implementation with detailed description of model parts. Then, the model is tested on a set of simulation scenarios and it is evaluated in comparison with theoretical basis and real devices.  In conclusion, thesis suggests future model development and improvements.
Tools for threading and their use
Veselý, Václav ; Polzer, Aleš (referee) ; Sliwková, Petra (advisor)
The bachelor’s thesis Tools for threading and their use deals with issues connected to tools, the materials used and their usage in the field of mechanical engineering. Individual parts of the thesis cover types of tools for threading, methods of threading and materials suitable for tap making. Further, the range of monolithic milling taps in the producers’ supply is also analysed.
Network Forensic Analytical Web-Based Platform
Ambrož, Tomáš ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
At present a big part of communication passes through computer network. Amount of the communication increases every year. That is why the claims on computing power raise. The procedure of the communication processing for forensic purposes is worth paralleling to increase the computing power. Research group NES@FIT created an instrument Netfox Detective in one of its projects. From this instrument it is planned to create a distributed system for the processing of intercepted communication for the purpose of forensic analysis. Interface is one of the parts, with its help the distributed system will be operated. In my theses I will concern with the creation of the web interface for the instrument Netfox Detective which is a desktop application presently. Web interface, after little modifications, will be used for paralleled version of application. Web interface will mediate the same informations as the desktop version. To obtain information for forensic analysis it will use framework Netfox Framework identically as the desktop version. Advantage of web interface compared to the desktop version is that a user who approaches web interface will need a device with web browser. It means that a user can work with any operation system.
Metadata Analysis of Cracking Password Task
Pokorný, Šimon ; Hranický, Radek (referee) ; Veselý, Vladimír (advisor)
This thesis deals with the design and implementation of the analytical web dashboard for remote administration of the Fitcrack system. This system is used for distributed password recovery. Web administration is a single-page application which is divided into a server and client part. These parts communicate with each other. There is a lot of information across the system that logged into a database for later analysis or displayed in real-time for the user. The best form to show data is a graphical element of various types (arrow, graph, table, square) and different colors showing what is happening.

National Repository of Grey Literature : 395 records found   1 - 10nextend  jump to record:
See also: similar author names
20 VESELÝ, Vojtěch
1 Veselý, Viktor
2 Veselý, Vladan
15 Veselý, Vladimír
2 Veselý, Vladislav
1 Veselý, Vlastimil
20 Veselý, Vojtěch
1 Veselý, Vratislav
26 Veselý, Václav
5 Veselý, Vít
2 Veselý, Vítek
2 Veselý, Vítězslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.