National Repository of Grey Literature 24 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Physical Simulation in Virtual Reality
Grünseisen, Vojtěch ; Navrátil, Jan (referee) ; Pečiva, Jan (advisor)
This work describes using of SDL, OSG and ODE as tools in game development and how they can be integrated to work together. Theory about collision detection and its role in physics engine is also described. Used libraries are described as well. With this engine a game scene is created and driven. This scene contains bodies connected by ODE Joints. Scene content and application controls are meant to resemble first person shooter game style.
Multicast Data Tunneling
Stodůlka, Stanislav ; Skořepa, Michal (referee) ; Šimek, Milan (advisor)
This document contains introducion of terms in routing multicast data and their tunneling in network. As well developing aplication in Java to test sending unicast and multicast data through network. Aplication are based on client/server. Document describe Linux daemon mrouted and alternativ daemons with similar function of routing multicast data.
Obfuscation of Anomalies and Security Incidents in DNS Traffic
Štěrba, Ondřej ; Kováčik, Michal (referee) ; Homoliak, Ivan (advisor)
The work analyze current detection methods of anomalies and security incidents in DNS traffic, and than design new obfuscation techniques which are capable of evading anomaly detection. Network attacks, exploiting the DNS protocol for tunneling of other network traffic, were selected for implementation part of the work. Control of botnet is considered as malicious application of tunneling through the DNS protocol. The main result of the work is to emphasize the necessity of discovering new detection principles of anomalies and security incidents in DNS traffic.
Effective Network Anomaly Detection Using DNS Data
Fomiczew, Jiří ; Žádník, Martin (referee) ; Kováčik, Michal (advisor)
This thesis describes the design and implementation of system for effective detection of network anomaly using DNS data. Effective detection is accomplished by combination and cooperation of detectors and detection techniques. Flow data in NetFlow and IPFIX formats are used as input for detection. Also packets in pcap format can be used. Main focus is put on detection of DNS tunneling. Thesis also describes Domain Name System (DNS) and anomalies associated with DNS.
Optimization method based on TRUST for image registration
Pernicová, Lenka ; Mézl, Martin (referee) ; Harabiš, Vratislav (advisor)
The aim of the thesis is optimization for a medical images registration. The basis is to acquaint with the images registration and to peruse component global optimization methods, especially an optimization method TRUST. After theoretic knowledge it is possible to proceed to a suggestion of an optimization method based on the TRUST method and to realize in the program setting MATLAB. Created algorithms has been tested on test data and compared with other optimization methods as Simulated annealing.
Design of new laboratory exercises for GNS3 network simulator
Bureš, František ; Červenka, Vladimír (referee) ; Jeřábek, Jan (advisor)
The goal was to create three laboratory tasks with process and help in GNS3 environment. All laboratory tasks should be used for extending practise experiences from Cisco course CCNP and illustration of GNS3 function. Whole thesis is focused on using IPv6 and coexistence with IPv4. Teoretical parts are dedicated for preparation on laboratory tasks and their main goal is explaining and use of commands in specific problematics. In GNS3 environment, there is explained instalation and basic settings. Laboratory tasks on theme MP-BGP, IPv6 tunnels and IPsec VPN with use of VTI are divided into specific parts. The parts consist of the described procedures with topology, detailed instructions and the entire configuration in Annex.
Tunneled Data Extraction into Separate Flows
Nahálka, Roman ; Hranický, Radek (referee) ; Holkovič, Martin (advisor)
The goal of this work is to design and implement an application for extraction of tunneled data into seperate flows. The app will be removing all layers of encapsulation, that the file contains.The use of the app lays in better analysis and diagnostics of network communication. Thanks to removing the tunnels from the network flow, it will only contain data we can use. In the theoretical part, the work focuses on network architecture TCP/IP, the tunneling protocols and ways of capturing communication on the network. The practical part describes the way of retrieving test data, it also contains a design of the target application, as well as implementation of this design and testing of the final application.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
Optimization of geotechnical survey and monitoring for design and realization of underground constructions
Černý, Vít ; Pruška, Jan (referee) ; Aldorf,, Josef (referee) ; Horák, Vladislav (advisor)
The presented thesis focuses primarily on issues of geotechnical survey and geotechnical monitoring for underground line constructions. It deals with the current practice of geotechnical survey and monitoring. Based on the knowledge gained from specific buildings in the Czech Republic (Královopolské tunnels, tram tunnel Žabovřeská) and based on the author's practical local and foreign experience submits suggestions regarding their mutual optimization in order to improve outputs and reduce financial costs.
Physics Simulation for Pinball Game
Čermák, Jakub ; Polok, Lukáš (referee) ; Zachariáš, Michal (advisor)
The objective of this work is to create a library for physical simulation and using the library to create a game of pinball, on which you can test functionality of the library. Problems that appeared during the creation of the library, are described in this paper along with their solutions. In particular, tunneling, detection and results of collisions. Subsequent optimization solutions to these problems for our specific library. Of no smaller importance are principles which reduce the requirements of the final simulation. Among the most important ones are the correct choice of limits, detection of rolling and sleep of slowly moving dynamic objects.

National Repository of Grey Literature : 24 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.