National Repository of Grey Literature 4,580 records found  beginprevious2888 - 2897nextend  jump to record: Search took 0.01 seconds. 
Security Analysis of WiFi Networks
Butela, Michal ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This document provides overview of commonly used standards and mechanisms for securing the wireless network based on Wi-Fi protocol. It is covering all important security areas including confidentiality, integrity and authentication. We can find here also detailed analysis and description of functionality of listed mechanisms. Description of possible attacks against listed security mechanisms. There is a measurement of influence of encryption to transfer speed in the another section. It's followed by attacks against particular security mechanisms. And finally, description of deployment of central authentication system.
Analysis and Design of e-Learning Information System
Štacha, Jan ; Eysselt, Miloš (referee) ; Kreslíková, Jitka (advisor)
This thesis is focused on IBM Rational Unified Process methodology, which represents complex and robust aproach to software development and software lifecycle. This methodology is well described and every step of software lifecycle is predictible. Thats the reason why is becoming used in many software development organizations. The main goal of this thesis is deep description of this methodology and creation common outputs of inception and elaboration phase of e-learning information system. IBM Rational Unified Process is called use-case driven aproach, thats the reason why is emphasized descripton of all use-cases.
Scene Analysis Based on the 2D Images
Hejtmánek, Martin ; Drahanský, Martin (referee) ; Orság, Filip (advisor)
This thesis deals with an object surface analysis in a simple scene represented by two-dimensional raster image. It summarizes the most common methods used within this branch of information technology and explains both their advantages and drawbacks. It introduces the design of an surface profile analysis algorithm based on the lighting analysis using knowledge and experiences from previous work. It contains a detailed description of the implemented algorithm and discusses the experimental results. It also brings up options for the possible enhancement of the projected algorithm.
Rule-Driven Protocol Analyzer
Jurnečka, Peter ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
The master Thesis deals with an overview of issues necessary for design of custom network analyzer. Describes the existing solutions, provides the theoretical background needed for design of custom analyzer and describes the structure of implemented system. A separate part of the work is devoted to the specification of Metamodel used to modeling of communication protocols and compiler of models modeled with the Metamodel.
Program Similarity Recognition Based on Behaviour Analysis
Otočka, Dávid ; Vojnar, Tomáš (referee) ; Peringer, Petr (advisor)
The goal of this master thesis was to design an algorithm that will be able to measure the difference between two programs based on their behavioral description. For the algorithm needs, the Levenshtein distance method between two strings and NCD method, were used. Both methods have their implementation approach and test result described. This term also discusses various methods of program analysis in virtual machine environment, as well as explanation of some basic concepts regarding malware analysis.
Human Resources Management Support System in Projects
Novotný, Jakub ; Burget, Radek (referee) ; Kreslíková, Jitka (advisor)
This thesis suggests implementation of human resources management system to manage project portfolio in small organizations. Main gist is implementation and demonstration of the system, that is able to assign human resources to planned projects. The thesis also provides basic theory of projects and human resources management in projects. Based on this theory the system is analysed, designed and implemented.
Analysis of Business Process Diagrams
Ludvík, Martin ; Květoňová, Šárka (referee) ; Weiss, Petr (advisor)
The aim of Analysis of Business Process Diagrams is to create procedure that is able to find typical patterns in business process diagrams. Besides, it is necessary to design and implement application, which will be able to find and mark selected workflow patterns. This analysis is based on XML document, in which a business process diagram is stored. Important thing is to keep the ability to extend the number of patterns, which can be find out in a diagram. Also, it is important to solve some special situations, i.e. overlapping of patterns.
Modelling and Analysis of Campus Network at the BUT
Kojecký, Vladimír ; Veselý, Vladimír (referee) ; Grégr, Matěj (advisor)
This thesis deals with the design and implementation of tools for creating a computer network simulation model. Network analysis is based on configuration files from connected network devices. According to the requirements of the simulation it is necessary in the configuration file to focus on data relating to the monitored elements and their properties, or which may be of some influence. The output is then passed on simulation environment to form the desired network model by the observed data, which is already possible to perform simulations.
Design of CISCO network analysis by VePAL TX300 Analyzer
Ťápal, Tomáš ; Vychodil, Petr (referee) ; Škorpil, Vladislav (advisor)
This bachelor´s work consists of describing the network Cisco, possibilities of network analysis with analyzer VePAL TX300 and Sunset MTT, creation of manual for the analyzer VePAL TX300 and draft three laboratory exercises. The first exercise analyzes transmission parameters of the network Cisco. The second exercise compares parameters of two different types of routers. The third exercise analysis VoIP and IPTV services, especially qualitative parameters.
Design Patterns for Web Applications
Dudek, Jan ; Rychlý, Marek (referee) ; Zendulka, Jaroslav (advisor)
With the coming of the web a brand new type of client-server applications based on standard web technologies has started to appear. These technologies are available on an overwhelming majority of client stations and don't need any additional software to be installed. As a result web applications have gained popularity among both users and developers and are currently deployed not only on the Internet, but also on company intranets. Considering present expansions of such applications it is important to summarize tested and approved approaches usable in their design. And it is this particular work that describes the chosen design patterns applicable in web applications development and demonstrates their usage on both concrete existent systems and a custom sample application.

National Repository of Grey Literature : 4,580 records found   beginprevious2888 - 2897nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.