National Repository of Grey Literature 10 records found  Search took 0.00 seconds. 
Steal me your €motion
Rygálová, Monika ; Országhová, MA Kristína (referee) ; Sterec, Pavel (advisor)
The text deals with ways and methods of creating my diploma thesis called Steal me your €motion. The diploma thesis deals with the relationship between machine learning and emotionality. To what extent is artificial intelligence able to undergo emotional relationships and experiences defined by the physicality and experience of the human body. The topic of the work is the creation of a (fictional) inhuman entity that longs to learn from people as many bodily acts as possible that will help it infiltrate the human community. In addition to reflecting the current level of scientific knowledge, I bring an element of fiction and fiction.
Detection and mitigation of cyber attacks at local area networks
Racka, Jan ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
The bachelor thesis is focused on the detection and mitigation of flood attacks in local area networks. The thesis can be divided into two parts. In the theoretical part, first flooding attacks are described. Then, the problem of attack detection is discussed in depth, including the implemented detection methods. Subsequently, the classification of detection tools by location is discussed and examples of detection tools are given. The last theoretical section is devoted to network mapping methods and topology detection tools. In the practical part, the design of the IDS and the test network is discussed. The network consists of three end devices namely: the IDS, the victim and the attacker. A Mikrotik router is used to ensure connectivity between all the devices. The IDS has been implemented in Python and is composed of individual modules that extend its functionality. The most important module is the detection module, which contains detection methods against SYN Flood, UDP Flood, ICMP Flood attacks and one universal comprehensive method against all flood attacks. The ARP Scan module allowed the IDS to map the network and use ARP queries to detect the presence of endpoint devices in the network. The learning module made it easier to set up rules for each detection method by monitoring network traffic over a period of time. It then determines appropriate rule values from the detected data. The SSH module provided IDS with the ability to proactively respond to attacks and disconnect the attacker from the rest of the network. ARP Scans also use the SSH module to discover information about guests. The IDS has been tested in both virtual and real environments. The results show that the developed detection methods work and the IDS can stop the attack in a reasonable time. ARP Scanning was also tested and was able to detect new guests on average in the first pass. The effect of IDS on communication was also monitored and found to be minimal.
MCUXpresso Web application security
Mittaš, Tomáš ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
This thesis deals with testing of the security of web application MCUXpresso Web SDK Builder using ethical hacking techniques and tools. At the beginning, the history of ethical hacking and structure of web applications are briefly mentioned. The thesis then analyses the application itself from the user’s point of view, its parts before logging in and after logging in and the operation of this application. The following is a list of the most common vulnerabilities and weaknesses found in web applications to understand any vulnerabilities found. Furthemore, the thesis deals with the techniques and tools of web application security and compares them. The penultimate chapter deals with the use of Analysis and vulnerability scanning technique on the application MCUXpresso Web SDK Builder. Finally, an application security test plan is designed, while part of this plan is automated.
MCUXpresso Web application security
Mittaš, Tomáš ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
This thesis deals with testing of the security of web application MCUXpresso Web SDK Builder using ethical hacking techniques and tools. At the beginning, the history of ethical hacking and structure of web applications are briefly mentioned. The thesis then analyses the application itself from the user’s point of view, its parts before logging in and after logging in and the operation of this application. The following is a list of the most common vulnerabilities and weaknesses found in web applications to understand any vulnerabilities found. Furthemore, the thesis deals with the techniques and tools of web application security and compares them. The penultimate chapter deals with the use of Analysis and vulnerability scanning technique on the application MCUXpresso Web SDK Builder. Finally, an application security test plan is designed, while part of this plan is automated.
Sex assessment of skull using exocranial meshes from CT scans
Musilová, Barbora ; Brůžek, Jaroslav (advisor) ; Friedl, Lukáš (referee)
Sex estimation is a challenging problem in both forensic anthropology and bioarchaeology. Sexual dimorphism is most noticeably displayed by the pelvis; however in instances when it is not preserved, sex is estimated by skull. There is a multitude of approaches that use the skull, however, their population specificity and variable sexual dimorphism oscillation reduces their effectiveness (Bruzek and Murail, 2006). We base our contribution on the study by Abdel Fatah et al. (2014) that estimates sex based on exocranial and endocranial surfaces with a high success rate of 97%. Our approach uses anonymized CT scans of skulls from recent french population, from which the exocranial surface was segmented. On these surfaces, CPD-DCA (Dupej et al., 2014) was performed. We analyzed both form and shape (form after size normalization) of these surfaces in 104 skulls (53 males, 51 females) aged 18 to 92 years. The mean age was 58 years in females and 52.46 years in males. Classification was performed using support vector machines (SVM) with a radial kernel. Leave-one-out crossvalidation was also applied. The highest success rate (87.5 %) was achieved with the first 27 principal components of form. Classification of shape was less accurate by only 2 %. Even though our success rate was lower than that of Abdel...
Steal me your €motion
Rygálová, Monika ; Országhová, MA Kristína (referee) ; Sterec, Pavel (advisor)
The text deals with ways and methods of creating my diploma thesis called Steal me your €motion. The diploma thesis deals with the relationship between machine learning and emotionality. To what extent is artificial intelligence able to undergo emotional relationships and experiences defined by the physicality and experience of the human body. The topic of the work is the creation of a (fictional) inhuman entity that longs to learn from people as many bodily acts as possible that will help it infiltrate the human community. In addition to reflecting the current level of scientific knowledge, I bring an element of fiction and fiction.
Detection and mitigation of cyber attacks at local area networks
Racka, Jan ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
The bachelor thesis is focused on the detection and mitigation of flood attacks in local area networks. The thesis can be divided into two parts. In the theoretical part, first flooding attacks are described. Then, the problem of attack detection is discussed in depth, including the implemented detection methods. Subsequently, the classification of detection tools by location is discussed and examples of detection tools are given. The last theoretical section is devoted to network mapping methods and topology detection tools. In the practical part, the design of the IDS and the test network is discussed. The network consists of three end devices namely: the IDS, the victim and the attacker. A Mikrotik router is used to ensure connectivity between all the devices. The IDS has been implemented in Python and is composed of individual modules that extend its functionality. The most important module is the detection module, which contains detection methods against SYN Flood, UDP Flood, ICMP Flood attacks and one universal comprehensive method against all flood attacks. The ARP Scan module allowed the IDS to map the network and use ARP queries to detect the presence of endpoint devices in the network. The learning module made it easier to set up rules for each detection method by monitoring network traffic over a period of time. It then determines appropriate rule values from the detected data. The SSH module provided IDS with the ability to proactively respond to attacks and disconnect the attacker from the rest of the network. ARP Scans also use the SSH module to discover information about guests. The IDS has been tested in both virtual and real environments. The results show that the developed detection methods work and the IDS can stop the attack in a reasonable time. ARP Scanning was also tested and was able to detect new guests on average in the first pass. The effect of IDS on communication was also monitored and found to be minimal.
Sex assessment of skull using exocranial meshes from CT scans
Musilová, Barbora ; Brůžek, Jaroslav (advisor) ; Friedl, Lukáš (referee)
Sex estimation is a challenging problem in both forensic anthropology and bioarchaeology. Sexual dimorphism is most noticeably displayed by the pelvis; however in instances when it is not preserved, sex is estimated by skull. There is a multitude of approaches that use the skull, however, their population specificity and variable sexual dimorphism oscillation reduces their effectiveness (Bruzek and Murail, 2006). We base our contribution on the study by Abdel Fatah et al. (2014) that estimates sex based on exocranial and endocranial surfaces with a high success rate of 97%. Our approach uses anonymized CT scans of skulls from recent french population, from which the exocranial surface was segmented. On these surfaces, CPD-DCA (Dupej et al., 2014) was performed. We analyzed both form and shape (form after size normalization) of these surfaces in 104 skulls (53 males, 51 females) aged 18 to 92 years. The mean age was 58 years in females and 52.46 years in males. Classification was performed using support vector machines (SVM) with a radial kernel. Leave-one-out crossvalidation was also applied. The highest success rate (87.5 %) was achieved with the first 27 principal components of form. Classification of shape was less accurate by only 2 %. Even though our success rate was lower than that of Abdel...
Accuracy of the facade of the historic building - methods, possibilities, conditions
DVOŘÁKOVÁ, Jitka
This thesis deals with methods of surveying the facade of the historic building. The introductory section is a brief history of measurement and guidelines, as well as various methods are described from oldest to youngest, including their accuracy in targeting the facade. In more detail, a method for scanning and photogrammetry, which is currently the youngest methods used in surveying facades. In conclusion, the evaluation methods in terms of accuracy and usability. The aim is to describe and evaluace different methods of surveying from history to the present, including the necessary instruments and their accuracy.
Progression in Relationship of Parents to Child in the Prenatal Period
DVOŘÁKOVÁ, Kateřina
This work is engaged in a possibility to communicate and make relations of both parents to unborn baby. Main aim of this work is to point out the possibilities to form a positive relation of mother and father to baby in prenatal period. The result is that expectant parents who want to contact the baby can do much more than only caress a belly or speak to it.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.