National Repository of Grey Literature 1,341 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Presentations Making Blender add-on
Telmanik, Ronald ; Milet, Tomáš (referee) ; Chlubna, Tomáš (advisor)
Cieľom tejto práce je vytvoriť nástroj, ktorý umožní používateľom programu Blender vytvoriť prezentáciu vo forme snímkov. Tento proces je zvyčajne časovo náročný spôsobené najme komplexnosťou program Blender. Preto na uľahčenie tohto problém je vytvorené rozšírenie pre program Blender. Toto rozšírenie implementuje sadu nástrojov, ktoré uľahčia tvorbu a neskôr aj samotnú prezentáciu v reálnom čase. Finálny zdrojový kód rozšírenia je voľne dostupný na platforme GitHub.
Product quality control
Pitrun, Tomáš ; Janáková, Ilona (referee) ; Boštík, Ondřej (advisor)
The bachelor’s thesis deals with the industrial inspection of defects on injection molding based on computer recognition. Part of the work is a description of injection molding technology and defects that may occur with this technology. The detection application is implemented in Python on the Raspberry Pi platform. The OpenCV library is used to detect product defects. Part of the work is also the selection of suitable hardware resources, including the Raspberry Pi microcomputer, lighting camera module, lens, relay modules and supporting structure.
Design and implementation of VoIP protocols tester
Polášek, Jakub ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This paper deals with ways and means of testing SIP or IAX2 based equipment and protocols itselfs. I analyse terminology and methodology for benchmarking of proxy and registrar servers as it was described in documents RFC 7501 and RFC 7502 from organization IETF. In the practical part is described the tester realization programmed in PHP programming language witch will use described methodology. Aplication is available in web based interface.
System Log Analysis
Ščotka, Jan ; Peringer, Petr (referee) ; Smrčka, Aleš (advisor)
The goal of this master thesis is to make possible to perform system log analysis in more general way than well-known host-based instrusion detection systems (HIDS). The way how to achieve this goal is via proposed user-friendly regular expressions. This thesis deals with making regular expressions possible to use in the field of log analysis, and mainly by users unfamiliar with formal aspects of computer science.
A Tool for Post-Mortem Debugging
Kapičák, Peter ; Peringer, Petr (referee) ; Smrčka, Aleš (advisor)
The goal of this work is checking specific properties in trace which program should meet or which it shouldn't meet. Properties and their description are basis of this tool for post-mortem debbuging. Properties are transformed to deterministic finite automaton for checking in trace and their description is important for searching events in trace. Events are pass to automaton as input. Output of a tool is report if properties are meet or not. Solution provides check of properties regardless of log format and shows events that preceded violation of the properties.
Detection of attacks targeted at web applications
Jégrová, Eliška ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis is dealing with vulnerabilities of web applications. The aim of the work is to create tools for attack detection of certain attacks, specifically Same Origin Method Execution (SOME), XML Signature Wrapping attack, XPATH Injection, HTTP Response Smuggling and Server-Side Includes (SSI) injection. Another aim is to create logs that display detected attacks. In the first part, the theory is analyzed and vulnerabilities of chosen attacks are described including their misuse. In the next section there are web application implemented which contain vulnerabilities for successful execution of the attacks. Furthermore, in Python language detection methods are designed and developed for these attacks, which are accompanied by a log entry.
Quantum and Post-quantum Cryptography
Krivulčík, Andrej ; Ricci, Sara (referee) ; Hajný, Jan (advisor)
S pokrokom v rozvoji kvantových počítačov prichádza hrozba prelomenia algoritmov ktoré sa používajú pri bežnej komunikácii. S týmto vzniklo odvetvie pre post-kvantovú kryptografiu ktoré vyvíja algoritmy odolné voči kvantovým počítačom. Cieľom tejto diplomovej práce naštudovanie metód pre kombináciu a využitie kľúčov ustanovených pomocou kvantových a post-kvantových algoritmov takým spôsobom, keby pri došlo k prelomeniu jedného z daných algoritmov tak výsledný hybridný klúč bude stále bezpečný. Výsledný klúč je následne využitý pri šifrovaní súboru pomocou AES--256 ktorý je zaslaný medzi klientami.
Automatic Acquisition of Data from the Internet for Training of Recognizers
Jeřábek, Jan ; Glembek, Ondřej (referee) ; Szőke, Igor (advisor)
This paper describes the design and creation of an application to facilitate downloading of audio data from Internet for training recognizers. Focuses on selection of optimal data source and analyzes options for searching and downloading from selected medium. On this base appropriate selection of tools and libraries is described. Description of the implementation follows where key parts of application are described. In the conclusion are summarised the achieved results and proposal for futher development.
Dictionary for Mobile Devices with OS Android
Damborský, Tomáš ; Kouřil, Jan (referee) ; Smrž, Pavel (advisor)
This thesis deals with design and implementation of dictionary application for mobile device with an Android OS. The key feature of application is ability to perform fulltext search. This is achieved by using the SQLite database with Full Text Search extension. SQLite databases are generated from source lexical data in Lexical Markup Framework format.
Automatic Cryptocurrencies Trading
Vorobiev, Nikolaj ; Hrubý, Martin (referee) ; Rozman, Jaroslav (advisor)
This thesis focuses on the trading in the cryptocurrency market. The theoretical part of the thesis describes the principles of trading, technical analysis, trading systems and recurrent neural networks. After conducting a search of brokers, Binance is chosen as a trading broker and real-time data provider; CryptoDataDownload is chosen as a historical data provider. After getting acquainted with the technologies used, elements of information trading systems are designed, enabling communication with remote servers and with each other, for the purpose of trading, obtaining and concurrent processing of user's, historical or real-time data. The resulting systems should provide to the user manual, semi-automatic (according to the plan) or automatic (according to the decisions of recurrent neural network, learned on historical data) trading and ability to respond to a change in the market. Furthermore, the thesis moves to the practical level, including implementation and experiments on created systems. In the final part of the thesis, the results are evaluated and the possibilities for improvement and expansion are described.

National Repository of Grey Literature : 1,341 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.