National Repository of Grey Literature 36 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Microsoft Windows Registry Analysis
Hula, Miroslav ; Drozd, Michal (referee) ; Chmelař, Petr (advisor)
Understanding and working with Microsoft Windows registry is an important ability from the perspective of security. This ability is used by malicious software as well as by software, which repaires the damage caused by activity of malicious software. However, applications accessing and working with the registry are platform dependent, which may not always be convenient and it can lead to other problems if the platform is not secure. Therefore, the aim of this work is to create a platform independent application for accessing and working with registry, which makes possible to analyse the effect of malware on registry.
Sound to MIDI conversion
Pleva, Pavel ; Frýza, Tomáš (referee) ; Fedra, Zbyněk (advisor)
This thesis deal with possibilities of conversion simple musical signal to MIDI format. It contains brief introduction into chosen parts of MIDI standard which are important for this theme. Further there are examined characteristic attributes of sound which are needed to detect from musical signal to be written in SMF or which affects detection of useful attributes. There is given an account of algorithm for conversion implemented in Matlab.
MySQL and MS SQL Database Synchronization
Šimanovský, Filip ; Grégr, Matěj (referee) ; Trchalík, Roman (advisor)
This thesis describes the synchronization of MySQL and MS SQL databases . It explores and describes differences between these two database servers and further designs and implements alghorithms for their safety and economicaly favourable synchronization . Designed methods are implemented in a console application afterwards . Two case studies are used as an illustrative of its work . The result of this thesis is a manual on how to successfully convert MySQL database to MS SQL database (and vice versa ) and the convert application itself .
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Intranet Design to Support Internal Business Processes
Francová, Nela ; Petráš, Dušan (referee) ; Kříž, Jiří (advisor)
This bachelor thesis deals the database design of intranet solution to support business processes in a selected company. In the first part the thesis deals with the explanation of basic terms and methodologies. Then it describes analysis of the current situation in the company. Based on this analysis and also on requirements of company management I proposed the database design of intranet to streamline business operations.
Analysis of the keys to the maps of thematic atlases
Hamáčková, Martina ; Bartoněk, Dalibor (referee) ; Plánka, Ladislav (advisor)
This diploma thesis is occupied with analysis of the keys to the maps of Landscape Atlas of the Czech Republic and the Landscape Atlas of the Slovak Republic with emphasis on their mutual comparison. This thesis based on the published general theoretical principles of cartographic production. The theoretical part concludes with a chapter that engages in the key in detail, its types, procedures, etc. Then come critical analysis and classification keys to the maps of Landscape Atlas of the CR and subsequent comparison with Landscape Atlas of the SR using objective cartographic criteria. There is observed mainly the overall clarity, completeness, graphical representation and last but not least the overall look of the keys.
Software defined radio for LoRaWAN technology
Pospíšil, Ondřej ; Pokorný, Jiří (referee) ; Fujdiak, Radek (advisor)
This master's thesis deals with the description of LPWAN technologies focused on LoRaWAN technology in the theoretical part. The next part deals with description and analyzing of LoRaWAN protocol. In theoretical part also security elements of the LoRaWAN protocol are discussed and LoRaWAN 1.0.2 and 1.1.x versions are compared. The thesis also deals with LoRaWAN tapping and its decryption, both on the physical layer and the MAC protocol layer LoRaWAN. The thesis shows how to use software-defined radio to listen to LoRaWAN communication. Lastly, a replay attack and fake message over the fake session are performed
Design of operator workplace of machining center
Kříž, Jan ; Pavlík, Jan (referee) ; Novotný, Tomáš (advisor)
The presented work contains the parameters and rules relevant for the design of the inter- face between the machining center and it's operator. All of information were obtained by search in scientific literature and technical standards and subsequently were sorted according to the elements to which they relate. The work contains the actual anthropometric dimensions, description of the interface elements with references to standards which relate to them. The study also shows an example of an optimized keyboard layout for machine tools and methods applicable to design the spatial layout of the workplace. In conclusion there is evaluate the state of currently available literature and technical standards.
Quantum key distribution test polygon
Širjov, Jakub ; Horváth, Tomáš (referee) ; Látal, Michal (advisor)
The aim of this masters thesis is to explain quantum key distribution (QKD) and principle of signal transmission in the quantum channel. Further this thesis complains commercial distributors of QKD technologies and their individual appliances. Practical part of the thesis is separated to 3 parts. First part handles transmission of quantum keys in QKDNetsim simulator. Second part takes care of design and creation of a test polygon that allows for testing of many optical network configurations with quantum signal and normal data traffic being transmitted in a single fiber. Multiple simulations of use of various filter types to supress the signal noise in the program VPIphotonics and tested by QKDNetsim are shown in the last part of this thesis.
Application for digital signature and timestamping
Remiaš, Miroslav ; Burda, Karel (referee) ; Lambertová, Petra (advisor)
In general, the Internet represents an unsecured medium of data transfer. Besides the rising popularity of the Internet, the matters of safety are getting to the foreground of importance. Anybody would be able to gain access to the computer network or to other valuable information if no algorithm of verifying the genuineness of identity were used. It is necessary to secure not only the access to the documents but also the content itself, which could be modified during the transfer through an unsecured medium. Last but not least, without the discretion provided by cryptography, the information may become literally public. To provide security and protection for the communicating participants the problems mentioned above are solved with the help of cryptographic techniques. The verification of the identity and the integrity of messages, the credibility of document’s ownership and safe data transfer through an unsecured medium are all the aspects, which the field of communication security on the Internet, thus the public key infrastructure, deals with. The electronic signature, as a part of the security area, is one of many advertised themes nowadays in Czech Republic. The aim of this master’s thesis is to acquaint the reader with the necessary technological procedures of digital signature, such as cryptographic techniques, public key infrastructure and timestamp. The practical part of this thesis consists of a suggested implementation of a web application in the programming language ASP.NET, which forms a certification authority with an opportunity of claiming a timestamp to authorize timestamps. After the problematic of cryptography was explained in the first chapter, the term of electronic signature has been introduced in the second chapter. Very important information, as far as the electronic signature of documents is concerned, is the time of the document’s creation and the subsequent signature verification by an appropriate authority. So the following part of the thesis is dedicated to the timestamp and to the authority of its verification. The fourth section deals with the large scale of public key infrastructure. The fifth part focuses on the description of the support for the whole problem mentioned so far using Microsoft’s programming language ASP.NET. The final sixth chapter represents the practical part of the thesis, namely the web application itself, where the individual modules of the application with its functions are described.

National Repository of Grey Literature : 36 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.