241 |
Platební karty v České republice / Payment cards in the Czech republicŠvirk, Jan January 2014 (has links)
This master thesis "Payment cards in the Czech republic" deals with payment cards, which are currently the most widely used payment instrument. Theoretical part is focused on the formation and development of the first ancestors of payment cards, various kinds of payment cards, there is historical development, basic characteristic, division, possibilities of their current use and future of payment cards. Also there are introduced different types of the payment cards according to different criteria, according to their mode of operation and safety. In the first part practical part of the work is an analysis of the current situation and developments in the payment cards market in the Czech Republic. Subsequently, there is analysis of the payment cards, current accounts and related services at selected bank in the Czech republic mBank S.A., Fio banka a.s., Equabank a.s., Zuno bank a.s. and Air bank a.s. When the objective of the thesis is to find out whether these banks target the same segments of clients. There is a comparation of payment card payment from the perspective of the monthly cost of using payment card from four basic segments of one bank, while there is a comparison of services related to payment card and in the end for every client is chosen the best alternative of payment card and the current account from the perspective of the average monthly cost.
|
242 |
Simulating ADS-B attacks in air traffic management : By the help of an ATM simulator / Simulering av ADS-B attacker inom flygledningLindahl, Gustav, Blåberg, Anton January 2020 (has links)
In Air Traffic Management (ATM) training, simulations of real air traffic control (ATC) scenarios are a key part of practical teaching. On the internet one may find multiple different ATM simulators available to the public with open source code. Today most aircraft transmit data about position, altitude, and speed into the atmosphere that essentially are unencrypted data points, available to the public. This means that potential attackers could project "fake" ADS-B data and spoof existing data to the air traffic controllers (ATCO) if the right equipment is used. We see this as a security flaw and we want to prepare ATCO for cyberattacks by modifying an ATM simulator with cyberattacks. First, openScope was chosen as the ATM simulator to be modified. Subsequently, three types of attacks were chosen for the simulator to be equipped with, based on ADS-B weaknesses from existing literature: aircraft that do not respond to commands, aircraft with altering positional data, and aircraft with incorrect speed and altitude data. The recorded parameters were the written command lines and corresponding aircraft type it was applied to. Using this modified simulator, ATCO can now be evaluated against cyberattacks. / Inom utbildningen till att bli flygledare finns olika simuleringar av verkliga scenarion och det är en viktig del av lärandet. Idag finns det många olika flygledningssimulatorer som finns tillgängliga för allmänheten med öppen källkod på internet. Idag sänder de flesta flygplan information om position, höjd och hastighet ut i atmosfären som i själva verket är okrypterade datapunkter och är tillgängliga för vem som helst som har rätt teknik tillgänglig. Det är även möjligt att både skicka och ändra denna data. Vi ser detta som en stor säkerhetsbrist och vill förbereda flygledare för olika former av cyberattacker genom att modifiera en tillgänglig simulator. Först valdes simulatorn openScope till att modifieras. Härnäst valdes tre olika former av attacker: flygplan som inte ger svar på kommandon, flygplan som spontant byter position och flygplan som visar felaktig höjd och hastighet. För att analysera användaren valdes det att spara använderans kommandon och attacksorten av flygplanet i fråga. Med hjälp av denna simulator kan flygledare nu utvärderas på deras hantering av cyberattacker.
|
243 |
Systémy platebních karet / Payment card systemsFlégl, Jan January 2011 (has links)
The work is about payment card systems. We’d like to describe infrastructure of credit cards, ATMs, POS terminals , focusing on the EMV standard. In theoretical part we will be introduced with the history and development of credit cards, ATMs and POS terminals. Then we focus on a detailed description of payments terminals and possibilities of payment via the Internet. The most extensive theoretical part deals width EMV standard. In practical part we will make our own program, which authenticates the user based on his credit card and it will allow the user to login in the system. Source codes of this application can be found on enclosed CD.
|
244 |
Systém řízení akvária s WWW serverem / Microcontroller based aquarium control system with WWW serverVečeřa, Jaroslav January 2013 (has links)
This thesis is focused on design and commissioning of appliance for operating and status display in the aquarium. The first part of the thesis deals with the possibilities of solving particular problems of the system and defines the requirements which the system has to fulfil. The next section of the thesis describes design of hardware part of the system and its software.
|
245 |
ATM versus Gigabit Ethernet im TCP/IP-LAN. Design und Implementierung eines Hochgeschwindigkeitsnetzwerkes für TCP/IPMüller, Jean-Alexander 20 October 2017 (has links)
Für die Implementierung von Hochgeschwindigkeits-LANs bieten sich gegenwärtig zwei Technologien an. Dies ist zunächst der verbindungsorientiert arbeitende Asynchronus Transfer Mode (ATM), welcher u.a. garantierte Bandbreiten ermöglicht und auch für WAN-Anwendungen einsetzbar ist. Ein Nachteil von ATM ist die Inkompatiblität zu den verbreitetsten LAN- Technologien, Ethernet und Token Ring. Für die Kopplung mit solchen LANs müssen spezielle Server herangezogen werden. Im Gegensatz dazu steht Gigabit Ethernet (GE) als Weiterentwicklung des Ethernet-Standards (IEEE 802.3). GE arbeitet verbindungslos und ist kompatibel zur Ethernet-Familie und anderen IEEE 802 konformen Technologien. Mit der Verfügbarkeit der IEEE-Standards 802.1p, 802.1x, 802.1Q und 802.1D sowie proprietären Mechanismen können mit Gigabit Ethernet LANs aufgebaut werden, die ATM-ähnliche Eigenschaften besitzen. Durch den Einsatz des TCP/IP Protokolls, welches traditionell in Netzen zur wissenschaftlichen Datenverarbeitung Verwendung findet, bleiben Eigenschaften, vor allem von ATM, verborgen. Dies betrifft insbesondere die dynamische Anforderung von Bandbreitengarantien (QoS).
|
246 |
ATM suppresses c-Myc overexpression in the mammary epithelium in response to estrogen / ATMは乳腺上皮細胞においてエストロゲンに応答したc-Mycの過剰発現を抑制するNajnin, Rifat Ara 23 March 2023 (has links)
付記する学位プログラム名: 充実した健康長寿社会を築く総合医療開発リーダー育成プログラム / 京都大学 / 新制・課程博士 / 博士(医学) / 甲第24520号 / 医博第4962号 / 新制||医||1065(附属図書館) / 京都大学大学院医学研究科医学専攻 / (主査)教授 生田 宏一, 教授 万代 昌紀, 教授 松田 文彦 / 学位規則第4条第1項該当 / Doctor of Medical Science / Kyoto University / DFAM
|
247 |
ピリミジン合成酵素阻害による核内poly(A)⁺ RNA代謝への影響解析三宅, 俊太郎 23 March 2023 (has links)
京都大学 / 新制・課程博士 / 博士(生命科学) / 甲第24753号 / 生博第494号 / 新制||生||66(附属図書館) / 京都大学大学院生命科学研究科統合生命科学専攻 / (主査)教授 片山 高嶺, 教授 高田 穣, 教授 原田 浩 / 学位規則第4条第1項該当 / Doctor of Philosophy in Life Sciences / Kyoto University / DFAM
|
248 |
Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic ApproachSchlake, Farimehr 01 May 2012 (has links)
The main aspiration behind the contributions of this research work is the achievement of simultaneuos delay-efficiency, autonomy, and security through innovative protocol design to address complex real-life problems. To achieve this, we take a holistic approach. We apply theoretical mathematical modeling implementing implications of social-economic behavioral characteristics to propose a cross-layer network security protocol. We further complement this approach by a layer-specific focus with implementations at two lower OSI layers.
For the cross-layer design, we suggest the use of game and mechanism design theories. We design a network-wide consumer-centric and delay-efficient security protocol, DSIC-S. It induces a Dominant Strategy Incentive Compatible equilibrium among all rational and selfish nodes. We prove it is network-wide socially desirable and Pareto optimal. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. Furthermore, we design a valuation system to integrate the caused delay in selection of security algorithms at each node without consumer's knowledge of the actual delays. We achieve this by incorporating the consumer's valuation system, in the calculation of the credit transfers through the Vickrey-Clarke-Groves (VCG) payments with Clarke's pivotal rule. As the utmost significant contribution of this work, we solve the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory through the proposed design. We design an incentive model and incorporate the valuations in the incentives. The simulations validate the theoretical results. They prove the significance of this model and among others show the correlation of the credit transfers to actual delays and security valuations.
In the layer-specific approach for the network-layer, we implement the DSIC-S protocol to extend current IPsec and IKEv2 protocols. IPsec-O and IKEv2-O inherit the strong properties of DSIC-S through the proposed extensions.
Furthermore, we propose yet another layer-specific protocol, the SME_Q, for the datalink layer based on ATM. We develop an extensive simulation software, SMEQSIM, to simulate ATM security negotiations. We simulate the proposed protocol in a comprehensive real-life ATM network and prove the significance of this research work. / Ph. D.
|
249 |
Safety Evaluation of Active Traffic Management Strategies on Freeways by Short-Term Crash Prediction ModelsHasan, Md Tarek 01 January 2023 (has links) (PDF)
Traditional crash frequency prediction models cannot capture the temporal effects of traffic characteristics due to the high level of data aggregation. Also, this approach is less suitable to address the crash risk for active traffic management strategies that typically operate for short-time intervals. Hence, this research proposes short-term crash prediction models for traffic management strategies such as Variable Speed Limit (VSL)/Variable Advisory Speed (VAS), and Part-time Shoulder Use (PTSU). By using high-resolution traffic detectors and VSL/VAS operational data, short-term Safety Performance Functions (SPFs) are estimated at weekday hourly and peak period aggregation levels. The results indicate that the short-term SPFs could capture various crash contributing factors and safety aspects of VSL/VAS more effectively than the traditional highly aggregated Average Annual Daily Traffic (AADT)-based approach. The study also investigates the safety effectiveness of VSL/VAS for different types and severity levels of traffic crashes. The results specify that the VSL/VAS system is effective in reducing rear-end crashes in the Multivariate Poisson Lognormal (MVPLN) crash type model as well as Property Damage Only (PDO) and C (non-incapacitating) crashes in the MVPLN crash severity model. Recommendations include deploying the VSL/VAS system combined with other traffic management strategies, strong enforcement policies, and drivers' compliance to increase the effectiveness of this strategy. Further, this research estimates the Random Parameters Negative Binomial-Lindley (RPNB-L) model for PTSU sections and provides valuable insights on potential crash contributing factors related to PTSU operation, design elements, and high-risk areas. Last, the study proposes a novel integrated crash prediction approach for freeway sections with combined traffic management strategies. By incorporating historical safety conditions from SPFs, real-time crash prediction performance could be improved as a part of proactive traffic management systems. The findings could assist transportation agencies, policymakers, and practitioners in taking appropriate countermeasures for preventing and reducing crash occurrence by incorporating safety aspects while implementing traffic management strategies on freeways.
|
250 |
TRUE UNMANNED TELEMETRY COLLECTION USING OC-12 NETWORK DATA FORWARDINGBullers, Bill 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / The cost of telemetry collection is significantly reduced by unmanned store and forward systems
made possible using 622MHz OC-12 networks. Networks are readily available to telemetry system
architects. The in-band control of remote unmanned collection platforms is handled through a Java
browser interface. Data from many telemetry channels are collected and temporarily stored on a
digital disk system designed around the OC-12 network. The I/O, storage, and network components
are configured, set, and initialized remotely. Recordings are started and stopped on command and
can be made round-the-clock. Files of stored, time stamped data are delivered at the rate of OC-12 to
a distribution center.
|
Page generated in 0.0155 seconds