National Repository of Grey Literature 49 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
I am here it is not
Daneková, Petra ; Hosnedlová, Klára (referee) ; Kohoutková, Karolína (advisor)
I have chosen the concept of mimicry, camouflage and disappearance because the subject of fusion and invisibility interests me. To vanish in the nature or in the city just with the help of body and clothes. For the purpose of this thesis I have created an outfit that will prove effectiveness of camouflage for the ordinary people watched by cameras everyday. By using this outfit I should find out whether digital devices are sophisticated enough to recognize a person even in the case that he has more legs or arms and his face is covered only with the eyes visible. In my thesis I am using several kinds of digital devices by which I am trying to figure out the effectiveness of created outfit. For comparation and better capture of person I have created two types of outfit. One of them is monochromatic while the second one, and more essential one, is printed with glitch. I am testing these two outfits both in exterior and interior. The outcome of the thesis are photographs and videos of person dressed in created outfits.
Comparison of technologies for vehicle passage detection
Mareková, Martina ; Frolka, Jakub (referee) ; Krajsa, Ondřej (advisor)
System for vehicle detection and speed measurement system is an important part in traffic control as well as in providing data for intelligent and automated traffic signs. These technologies are divided into two types: intrusive and non-intrusive methods. Traditional traffic control is based on inductive loops. This method is intrusive and therefore requires intervention under the road and higher maintenance requirements. We can avoid this problem with non-intrusive methods, including video analysis, microwave radars, geomagnetic radars, weighing sensors and laser sensors, but these are more expensive alternatives. By implementing radars we performed measurements on road sections, on the basis of which the output data from microwave, weigh-in-motion sensors and induction loops were displayed. We receive processed and unprocessed output data of measurements from each sensors. For processing of those data is created software solution for graph rendering and direct measurement of the sensor accuracy in comparison with competing technology. The results of the measurements showed that the efficiency of the individually implemented sensors is sufficient for use in traffic control. As well we can consider the implementation of microwave radars and cameras for video analysis as a replacement for the conventional method of induction loops.
HTTP Application Anomaly Detection
Rádsetoulal, Vlastimil ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
The goal of this work is to introduce anomaly detection principles and review its possibilities, as one of the intrusion detection methods in HTTP traffic. This work contains theoretical background crucial for performing an anomaly detection on HTTP traffic, and for utilising neural networks in achieving this goal. The work proposes tailored design of an anomaly detection model for concrete web server implementation, describes its implementation and evaluates the results. The result of this work is successful initial experiment, of modeling normal behavior of HTTP traffic and creation of the mechanism, capable of detection of anomalies within future traffic.
Browser Fingerprinting Detection
Saloň, Marek ; Burget, Radek (referee) ; Polčák, Libor (advisor)
The main goal of this thesis is to design and implement a mechanism that provides protection against stateless tracking with browser fingerprint. Implemented tool has a form of module that takes part of JavaScript Restrictor extension. The module allows to specify heuristics used for evaluation of visited sites that may contain browser fingerprint extraction. If suspicious activity is detected, all subsequent HTTP requests from that site are blocked to prevent the extracted fingerprint from being sent to the server. The implementation and defined heuristics were tested. The resulting module represents an effective tool against stateless tracking. The main limitation of the implementation is possible corruption of sites by blocking HTTP requests.
BitTorrent Seedbox Detection
Grnáč, Martin ; Jeřábek, Kamil (referee) ; Polčák, Libor (advisor)
Bachelor's thesis is focused on issues with monitoring and detection of seedboxes in BitTorrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architecture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this knowledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools.
Detection of Boxes in Image
Soroka, Matej ; Zlámal, Adam (referee) ; Herout, Adam (advisor)
The aim of this work is to experiment and evaluate algorithms with different approaches to computer vision in order to automatically detect boxes-blocks in the image. To this end, neural network-based approaches were used in the solution. Experiments were performed with classification using our own data set, classification using our own convolutional neural network, detection using a window, YOLO detector and in the final iteration the use of U-net network for detection of boxes in the image.
Static methods for detection DDoS attacks
Miško, Lukáš ; Dvořák, Jan (referee) ; Blažek, Petr (advisor)
This thesis contains a theoretical basic for solution to issue of network anomalies with use of static methods and it also contains software as a solution for detection of network attacks. The main point of thesis is detection of DoS (Denial of Service) attacks. In thesis is located an analysis of DoS attacks rate categorization. Further in thesis is located analysis of protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), their possible use to attacks SYN flood and UDP flood. Here are analysed three static methods and their detailed description. There is also a analysis of collected data and their comparison in the thesis. Thesis contains description and the results testing of software which is used to detect attacks in network, at the end.
Measurement of the properties of cells grown in hydrogel
Belák, Daniel ; Janoušek, Oto (referee) ; Čmiel, Vratislav (advisor)
Main subject of this work is to present the possibilities of cultivation of cells in cultivation medium – hydrogel. Topic of the following part is introduction to the problematics of processing of the pictures made by light field microscopy and fluorescence microscopy. It studies the influence of parametres used in the process of stacking the pictures to reach the highest depth of field as possible. Last part is dedicated to measurement of the properties of cell cultures, its statistical processing and analysis.
Deep Learning for Object Detection
Paníček, Andrej ; Herout, Adam (referee) ; Teuer, Lukáš (advisor)
This work deals with the object detection using deep neural networks. As part of the solution, I modified, implemented and trained the well-known model of cascade neural networks MTCNN so that it could perform the detection of traffic signs. The training data was generated from GTSRB and GTSDB data sets. MTCNN showed solid performance on the evaluation data, where the detection accuracy reached 97.8 %.
Detection of Blueborne Revealed Vulnerability
Janček, Matej ; Malinka, Kamil (referee) ; Hujňák, Ondřej (advisor)
Táto práca sa zaoberá tvorbou automatickej metódy na detekciu Blueborne zraniteľností v Android zariadeniach. V riešení bola použitá metóda, ktorej základné fungovanie je z vyvolania pretečenia pamäti na zariadení. Následne výsledný nástroj vyhodnotí či sa to podarilo a, či zariadenie je zraniteľné. Nástroj bol testovaný na viacerých zariadeniach, ktoré majú rôzne verzie systému. Testovanie tejto metódy detekcie potvrdilo funkčnosť nástroja.

National Repository of Grey Literature : 49 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.