• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 16
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 40
  • 25
  • 9
  • 8
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Mikroprocesorem řízená testovací jednotka / Microprocessor controlled testing unit

Mejzlík, Vladimír January 2010 (has links)
This project deals with the design of an autonomous microprocessor controlled testing unit for automatic controlling the output of the tested device, depending on the excitation of its inputs. There are possible realizations of testing unit hardware functional blocks described. Possible options are objectively analyzed in accord with the project specification and with regard to the mutual compatibility of individual blocks, availability, price and desired functionality. The most appropriate selected solution is implemented using the specific circuit elements. The output of the project is realized functional testing unit and elaborated product documentation. There was control software for the microprocessor of the unit written. The software implements an interpreter for the test algorithm execution, carries out the test evaluation and stores a record of the test process to the file. There was also the utility for a PC, which allows uploading tests to the testing unit via USB created.
22

Analýza síťových útoků pomocí honeypotů / Network Attack Analysis Using Honeypots

Galetka, Josef January 2010 (has links)
This text deals with computer network security using honeypot technology, as a tool of intentional trap for attackers. It closely describes basic thoughts, together with advantages and disadvantages of this concept. The main aim is a low interaction honeypot Honeyd, its functionality and possible extensional features. As a practical part of the text there is a description of principles of implementation Honeyd service scripts, which are represented as a simulation of behavior of computer worm Conficker. Further it describes creation of automated script used for analysis and processing of gathered data, captured during actual deployment of Honeyd in Internet network.
23

Diferenciace míst spotřeby z hlediska jejich estetiky / Aesthetic differentiation of consumption spaces

Musilová, Marta January 2016 (has links)
(in English): A consumer freedom has gained importance hitherto assigned to labour and therefore has become a constituent of one's identity. The degree of such freedom is determined by the access to economical, spatial or symbolical resources. The symbolical resources are embodied in the feeling of inappropriateness which is built upon aesthetic correspondence that can be perceived as the correspondence between one's habitus and the aesthetic of the environment. In my thesis I elaborate on the meaning which is assigned to aesthetics when judging consumption spaces. I focus on consumption spaces situated in Prague's Nusle district which are soon to be gentrified. Therefore, the old consumption spaces might be pushed away in order to be replaced by the new ones, suitable for gentrifiers. I constrain consumption spaces to bars, restaurants and pubs, since they are particularly important in the Czech culture due to their function as a social bonding element and a resource of social capital. In my research I employ a visual methodological approach, particularly shooting script and grounded theory. Building upon that, I present the central category of "atmosphere" which comprises two components - social atmosphere, bundled with the liveliness of space and interpersonal ties, and aesthetic atmosphere,...
24

Systém pro testování odolnosti komunikační jednotky LAN dálkového sběru dat / System for testing the robustness of communication unit LAN of remote data acquisition

Mlýnek, Petr January 2008 (has links)
Remote data collection systems are widely used. One of the area is also data collection in energetics, where the energy consumption can be collected daily and presented to users on-line. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the electrometers. The data transmission over the Internet can be subject of various attacks, which is the disadvantage. The understanding of attack method is the most important thing. The protection against the hackers is not complicated, but requires lot of attention. This master's thesis is focused on testing security of the communication unit LAN of remote data acquisition against attacks from the Internet. The next aim of this thesis is to describe algorithm of particular attack, needed recourses for their realization and method of their measurement and evaluation. Communication unit and component composition for attacks simulation is described in the first part of this thesis. The next part is focused on scanning for hosts and ports. The main part of this thesis is focused on the denial of service attacks and man in the middle attacks. In the end of my thesis is described selection of cryptographic system for remote data acquisition and is showed possibility of authentication mirroring. Problems of physical security are described too. The result of this thesis is script implementing all attacks, which are described.
25

Simulační úlohy v NS2 ověřující znalosti protokolů BGP a multicastu / Simulation scenarios in NS2 demonstrating knowledge of BGP and multicast

Sobotka, David January 2010 (has links)
Network simulation can be beneficial not only in solving problems while applying new standards or recommendations, but also primarily an aid in understanding and verifying knowledge of behaviour of communications protocols. The aim of the thesis is to create illustrative tasks in the simulation environment, Network Simulator 2 (NS-2), which are designed to verify the behavior of BGP and multicast. Created tasks are above all devoted to BGP, which is the cornerstone of routing information of all IP networks conglomerate, the Internet. The first two tasks designed for BGP use the implementation of ns-BGP and the remaining are based on the implementation of BGP++. The tasks verify both the function of basic attributes of the protocol, influencing the decision making process when routing information (AS_PATH, MED, LOCAL_PREF, WEIGHT), and furthermore the methods or parameters affecting the efficiency of the process of routing and a reduction of excessive network traffic (BGP confederation, routing, aggregation, MRAI). The last task regards multicast, more specifically the type of DM, which is a group of the so-called Dense Mode. The task illustrates how to join/leave groups and spread messages of types GRAFT and PRUNE under a constant data stream.
26

Video telefon / Video doorphone

Horyna, Miroslav January 2015 (has links)
This thesis deals with door video phone on the platform Raspberry Pi. There is described the platform Raspberry Pi, Raspberry Pi Camera module, operating systems for Raspberry Pi and described installing and configuring the software. Next is described the concept and description of programs created for door video phone and design of additional modules.
27

Video telefon / Video doorphone

Horyna, Miroslav January 2015 (has links)
This thesis deals with door video phone on the platform Raspberry Pi. There is described the platform Raspberry Pi, Raspberry Pi Camera module, operating systems for Raspberry Pi and described installing and configuring the software. Next is described the concept and description of programs created for door video phone and design of additional modules.
28

Analýza realitního trhu pomocí informací na Internetu / Analysis of real estate market using information on Internet

Bulín, Martin January 2017 (has links)
This thesis was created as a helping tool to estimate the price of properties by comparative method, which needs a database of properties. This database is created by a program. The main aim of this thesis is to create an application in Python language, which will search through contents of websites of a chosen real estate portal in Czech Republic. The next aim of this thesis is to create program which will search for real estate according to chosen criteria. The purpose of these criteria is to compare and estimate the price of properties. In the theoretical part of this thesis I will describe data mining and architecture of data mining. In the practical part I will design an aplication and in the end I will implement it. This aplication will go through websites and obtain data about real estate offices, their advertisements and photos of advertisements. For easier work with the output file that contains the advertisements, I created an application for searching individual advertisements based on users specification. This program allows to quickly search for the requested data from the output file. These data are subject to further work, it is possible to analyse them and create interesting statistics and maps.
29

”I´M ON PrEP” : En kvalitativ intervjustudie om mäns tankar kring Pre-Expositions Profylax

Olsson, Ulrica January 2021 (has links)
No description available.
30

Script pro zpracování obrazu / Script Language for Image Processing

Zuzaňák, Jiří Unknown Date (has links)
This thesis deals with design of scripting language, especially specified for effective image processing. Introduction of this thesis is focused on studying and also appropriation of methodology of compilers and interpreters design, include their following application in design of the scripting language and as well its interpreter. Another point of my work is showing the methods of design and implementation of the interpreter including automated methods used in the design of the implemented program. Next part deals with description of structure and implementation of the designed program, intended for generating compiler of any language which is described in input of this program. The conclusion of this work is more detailing description of the scripting language design; its implementation is based on the methods mentioned before.

Page generated in 0.044 seconds