• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 16
  • 4
  • Tagged with
  • 232
  • 204
  • 42
  • 36
  • 32
  • 31
  • 27
  • 22
  • 18
  • 17
  • 17
  • 15
  • 15
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Sdílená tabule / Shared Board

Řezník, Jaroslav January 2008 (has links)
The aim of the "Shared Board" project is to design and implement an application that will allow a real-time collaboration on workgroup projects in a network environment. The communication can be accomplished using Instant Messaging or multimedia whiteboard with a possibility of drawing, attaching interactive objects and combined with voice and video communication. The term project part solves utilization of interactive whiteboards, design of communication protocol and grafical user interface. Implementation is solved as masters thesis part.
122

Aplikační knihovna pro podporu návrhu komunikačních protokolů / Library of Functions for the Support of Communication Protocols Design

Tomášek, Karel Unknown Date (has links)
Security protocols are used for establishing secure communication over insecure network. This document gives a brief introduction into description and formal specification in the area of security protocols design. It also includes description of the aplication library, its functions and methods how to use it.
123

Autentizace a autorizace uživatele v počítačových sítích nové generace / User Authentication and Autorization for New Generation Networks

Přibyl, Radek Unknown Date (has links)
This document describes methods of user authentication and authorisation via a trusted server. There is analysis of the system Kerberos, which is used as an inspiration for desing of a new authentication scheme. There are analysed programming layers and interfaces for specific applications ensuring user authentication and authorisation. The document contains a design and detailed description of a new authentication scheme. This scheme is implemented into the communication between email client and imap server.
124

Web server pro vestavěné aplikace / Web Server for Embedded Applications

Pirkl, Tomáš January 2007 (has links)
This work discuses Embedded Ethernet systems. Embedded Webserver Platform is designed. This design embrace microkontroler, Ethernet driver, and external SRAM. It includes implementation on PCB with MMC interface and software implementation of MMC driver and FAT file system. Reference model ISO/OSI, reference model TCP/IP, Ethernet and UDP, TCP, IP, HTTP protocol is presented.
125

Mezinárodněprávní ochrana klimatu / The climate protection under international law

Prokš, Marek January 2011 (has links)
The climate protection under international law Key words: international climatic law, United Nations Framework Convention on Climate Change, Kyoto Protocol Abstract The purpose of the thesis is to analyze the system of climate protection in international law. In the thesis, there is described the history of the part of international law concerning climate changes, the contemporary international climatic law itself, and some of the most serious problems concerning the topic. The reason for my research is to introduce the basic system of international climatic law, as well as to show how modern international law is created. The thesis is divided into five chapters. The first chapter describes the international climatic law as a part of the international environmental law, shows the forms of treaties used in the international environmental law and presents the reasons why the form of framework convention was used in the case of international climatic law. The second chapter analyzes the history and evolution of international climatic law. From the first political declaration to the most recent international conventions, the most important milestones of the development of the international climatic law are shown. The third chapter presents the United Nations Framework Convention on Climate Change itself as the...
126

Analýza schém podpory obnovitelných zdrojů energií v EU: Může být EKOlogické i EKOnomické? / Analysis of the renewable energy support schemes in the EU: Can be an ECOlogical also an ECOnomical?

Andoková, Senta January 2015 (has links)
The study compares FIT (Feed-in tariff) and RPS (Renewable Portfolio Standard) as the two most commonly used support schemes for renewable energy sources (RES) in the EU. It examines a relationship of an Environmental Kuznets Curve (EKC) and by a practical experiment for public lighting in Prague the study proposes an ecological functioning of electricity grids in the EU with CO2 emissions reduction effect. The main contribution lies in the recency and originality of the econometric analysis and practical experiment. FIT and RPS analysis demonstrates that both schemes affect demand for electricity and increase its price. The econometric model was tested for 28 EU countries for 1990-2013. The results say that the EU is currently located on the downslope of the inverted U-shaped EKC with a turning point, after which the dependence begins to grow. Nevertheless, for the most of observations the turning point is too far to be a source of concern. Practical experiment has shown that installation of energy saving devices for electricity grids in the EU can bring satisfactory results in reducing CO2 emissions independently of state aid. More efficient use of existing energy sources, however, should rather serve as a complement to conventional support, phasing out with the development of RES technologies....
127

Ochrana ozónové vrstvy Země z pohledu práva / Protection of the Earth ozone layer from the legal point of view

Bergerová, Lenka January 2011 (has links)
Resumé: Protection of the ozone layer of the Earth from the perspective of law This thesis is dealing with protection of the ozone layer. I chose this topic because I consider ozone layer as a very important folder of the environment and its weakening is of global nature and for its protection it was necessary to involve as many countries as possible. This work is focused mainly on the development of ozone layer protection at the international level and on current legislativ. It also includes the European Union's approach to this problem. In the beginning of my thesis I'm trying to explain what is ozone, which substances deplete the ozone layer and which principles and tools are used for its protection. Chapter two is dedicated to the development of ozone layer protection. It includes the beginnings of the international cooperation which began to take shape in the middle of the 70s when was published the first scientific work, which pointed to damage of ozone layer by halogenated hydrocarbons. International cooperation resulted to the adoption of the Vienna Convention for the Protection of the Ozone Layer and later to its implementation protocol - Montreal protocol, in September of 1987. The Montreal Protocol was considered an exceptional success of diplomacy in the sphere of environmental protection but in...
128

Ochrana klimatického systému Země z pohledu práva / Protection of the Earth's climate system from the legal point of view

Polanská, Eva January 2011 (has links)
Protection of the Earth's climate system from the legal point of view This thesis aims to provide a broad view of legal protection of the Earth's climate within its six chapters. The first three chapters explain drivers of climate change law. Protection of the climate system has stemmed not only from science, but also to a large extent from the political situation and the performance of the world economy. Therefore, after introduction the second chapter examines the scientific basis of climate change and its evolution in time. The third chapter outlines the history of international negotiations which led to the conclusion of the three most important international instruments regulating climate change - the Framework Convention on Climate Change, the Kyoto Protocol, and the EU ETS Directive. The fourth chapter discusses economic approaches to internalization of global warming costs. The core of the thesis analyzes the legal framework addressing climate change. The analysis is devoted to the backbone of international instruments laid down in the Framework Convention on Climate Change and the Kyoto Protocol, and to one of the most significant regional instruments - European emission allowances trading. Therefore, the fourth chapter on the Framework Convention on Climate Change examines the Convention...
129

Správa sítí na bázi protokolu IP / Management of data networks based on IP protocol

Patala, Petr January 2012 (has links)
The objective of this master’s thesis is monitoring and management of computer networks via SNMP protocol and its practical application. The main part describes working with SNMPc program in an experimental network through implementation of its parts into the network and configuration of SNMP agents on routers, switch and end station. This thesis includes the results of traffic testing, disconnected links, effects of traffic load on QoS parameters, making longterm statistics, baselines and alarms. The thesis also includes parametres obtained with SNMP protocol from network nodes and end station.
130

Metody návrhu bezpečnostních protokolů / Methods of the Security Protocols Design

Míchal, Luboš Unknown Date (has links)
The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This thesis deals with the design of such protocols and their properties. The first part deals with properties and requirements of designed protocol as well as with the most common attacks on protocols. In the second part, the method of trace formula is described in more detail. This method is used for analytic design of security protocols. Later, the library of automated functions was created upon the principles of the method. The library support both the handling of protocol properties and protocol design. The thesis concludes with some examples of generated protocols.

Page generated in 0.0255 seconds