National Repository of Grey Literature 117 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Database System for Silver Piston SMC Competition
Lenhart, Vojtěch ; Šeda, Miloš (referee) ; Dobrovský, Ladislav (advisor)
This master's thesis focuses on the design and implementation of a database system for the SMC Silver Piston competition. The work includes an introduction to the competition, an analysis of the existing database and technical aspects of development, including security measures. It analyzes the needs and requirements of the competition and proposes a suitable solution for managing competition tasks, scoring and user account management. The application implementation involves creating a database structure, implementing security measures and developing a user interface with responsive design for various devices. The result is a complex database system that meets the requirements of the SMC Silver Piston competition and provides a user-friendly environment for managing the competition. The achieved results are evaluated and possibilities for further development and improvement of the system are mentioned.
Multi-Platform Tool for Generation of Technical Documentation from XML
Uhrecký, Michal ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
The aim of this thesis is to design and develop a technical documentation generator that processes general XML input. The work thoroughly examines the structure of XML documents and defines the criteria that quality technical documentation should meet. Furthermore, it focuses on the generation of documentation, emphasizing the possibilities for user annotation of XML data.
Identity Management in Information Systems
Tran, Thanh Quang ; Bartík, Vladimír (referee) ; Burget, Radek (advisor)
This thesis deals with the issue of identity management on the web and the implementation of an information system that solves this issue. The proposed information system utilizes Keycloak for identity management and delegating the authentication process centrally to a third party. Thanks to Keycloak, external identity sources can be integrated using widely used protocols such as SAML 2.0 and OpenID Connect. The information system itself is built on a microservices architecture, where individual microservices are implemented in the Python programming language. The web client of the information system is implemented in the Vue.js web framework with the Vuetify extension, which is used for easy creation of the web user interface.
Administrativní rozhraní pro Q řazení
Kováčik, Jakub ; Beran, Vítězslav (referee) ; Herout, Adam (advisor)
This thesis focuses on the development of an administrative interface in the form of a web application that allows the creation and management of card decks for Q-methodology, while enabling efficient research management. Q-methodology is a research approach used in the social sciences to analyse the subjective perspectives of participants. The application allows the management of multiple versions of card decks and the implementation of repeated research cycles with the ability to send email notifications to participants, supporting a dynamic and iterative approach to research. The application allows the sharing of card decks and research, which greatly supports collaboration and knowledge sharing between users.
Web application integrating artificial intelligence techniques into the correlation rule creation process
Šibor, Martin ; Caha, Tomáš (referee) ; Safonov, Yehor (advisor)
Currently, as digitalization becomes an integral part of all areas of our lives, the complexity and sophistication of cyber threats are constantly increasing. A key element in the fight against these cyber threats is security monitoring. An important tool for security monitoring are SIEM systems, which allow for early detection and response to potential attacks based on correlation rules. The main contribution of this work is the design and implementation of a web application that integrates artificial intelligence techniques into the process of creating and managing correlation rules for security monitoring systems, with the aim of streamlining the process of creating, modifying, and understanding correlation rules. The work first provides a theoretical introduction to the field of natural language processing and modern neural networks, particularly the transformer architecture, which is the basis of generative artificial intelligence models (e.g., ChatGPT, Gemini). It then introduces the principles of security monitoring, log management systems, the concept of correlation rule generalization, and, last but not least, the challenges associated with managing and maintaining correlation rules, which the integration of artificial intelligence into these processes significantly reduces. The practical part of the work describes the design and implementation of a web application that utilizes the gpt-4 and gpt-3.5-turbo models from OpenAI and the Gemini Ultra 1.0 model from Google for creating new correlation rules, modifying existing rules, and explaining and interpreting them for easier understanding and faster deployment. The application is designed with user-friendliness and efficiency in mind. The results of the work show that the integration of artificial intelligence into the correlation rule creation process brings significant efficiency improvements. The web application allows users to easily create and modify correlation rules. The application also allows users to better understand correlation rules, enabling them to respond to potential threats more quickly.
Web Application for Evaluation of Security Testing Tools
Moravec, Vojtěch ; Lieskovan, Tomáš (referee) ; Ilgner, Petr (advisor)
The bachelor thesis focuses on the design, development, and implementation of an intentionally vulnerable environment in the form of a web application. The resulting web application encompasses vulnerabilities across categories outlined in the OWASP Top 10 project, specifically following its 2021 version. Through this application, it is possible to assess and compare automated tools for penetration testing, as well as tools for static code security analysis. The thesis is divided into five chapters. In the introduction, the OWASP Foundation, which oversees the OWASP project, is described. The analysis of selected intentionally vulnerable web applications is then presented. Subsequent chapters delve into the design of the custom intentionally vulnerable web application, detailing the technologies used in its development and outlining all vulnerabilities present in the application. In the conclusion of the thesis, testing of the resulting vulnerable application is conducted using the aforementioned tools, and a summary of the achieved results is provided. Apart from the aforementioned testing and comparison of automated tools in the fields of penetration testing and static analysis, the application can also be utilized for educational purposes. This is primarily facilitated by the attached fixes and explanations, which accompany each vulnerability within the application.
Position tracking using GPS coordinates
Mishustina, Ekaterina ; Podivínský, Jakub (referee) ; Sadovský, Petr (advisor)
This bachelor’s thesis is devoted to determining the location using GPS. The GPS module receives the GPS signal and forwards it to the development board, where it is subsequently stored in a data structure and forwarded to the server. The server processes data about the location of the device and reflects it on the map it generates. To gain access to view the data, the user must pass authorization and correctly enter the name and password. The theoretical part of the work is devoted to electronic data transmission, data transmission standards and protocols, GPS and also describes the basic properties and functions of the hardware used for the design and implementation of the device.
Web application for waste containers placement planning
Vidlička, Adam ; Roupec, Jan (referee) ; Dobrovský, Ladislav (advisor)
The aim of this master's thesis is to create a web application that will serve as a tool for creation and management of municipal waste collection infrastructure. Computational functions developed at the Institute of Process Engineering will be utilized for more optimal creation of the waste collection infrastructure. The theoretical part of the thesis deals with the zoom in on waste management in the Czech Republic, the motivation behind developing the web application, and the technologies used during its development. The practical part of the thesis describes the creation of the basic concept of the web application and provides subsequent descriptions of its individual components.
Web application of attribute-based authentication system
Klampár, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This bachelor thesis deals with the creation of web applications for the issuer and verifier entities of an Attribute-Based Credentials system Adopsio. The web applications were implemented using the microframework Flask, the Vue.js framework, and the PostgreSQL database. The issuer application allows the creation of new digital certificates containing signed attributes. The second application is the verifier entity, for which a graphical user interface is created to manage the authentication script.
Web Tool for Creation, Management, and Use of a Database of Sports Poses
Křivánek, Tomáš ; Tesařová, Alena (referee) ; Herout, Adam (advisor)
This paper is focused on two searching methods and how they can be used in any searching and in any  web application. Two most important qualities of any search are speed and accuracy. One of the best methods in terms of speed is so-called live search. This method provides results immediately when the user starts typing their search expression. That is why in many cases, the user does not even have to finish their expression, because when seeing the result, the user can immediately access it. Search accuracy is often achieved by using keywords or some part of text. Another common way to organize and fetch documents are tags: a short string which identifies a post or a photo. Multiple tags are then used similarly to plain keywords. This work proposes to use tags as a new searching logical language, where presence and/or absence of tags can be required. For this purpose I created a simple logical language "Queries", because they can be used very similarly to database queries. In my case, the language and the user interface is made very simple so that a normal user can specify the query himself. This search tool is showcased in a web application focused around yoga poses. Both methods are used there -- the user can search in the yoga poses database by name or by the queries language.

National Repository of Grey Literature : 117 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.