• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 26
  • 25
  • 7
  • 6
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 79
  • 79
  • 32
  • 22
  • 13
  • 11
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

国際連合における拒否権の意義と限界 : 成立からスエズ危機までの拒否権行使に関する批判的検討 / コクサイ レンゴウ ニオケル キョヒケン ノ イギ ト ゲンカイ : セイリツ カラ スエズ キキ マデノ キョヒケン コウシ ニカンスル ヒハンテキ ケントウ

瀬岡 直, Nao Seoka 19 September 2013 (has links)
博士(法学) / Doctor of Laws / 同志社大学 / Doshisha University
72

Zabezpečovací systém pro rodinný dům / Security system for family house

Sohr, Martin January 2011 (has links)
This thesis deals with complete theoretical design of security system for a family house, from the selection of technologies, security principles and selection of elements, theoretical suggestions of their placement to practical realization. I this thesis, securing of entry points, such as doors and windows, is done by magnetic contact sensors. Windows are secured also against breaking of glass. Inner space is secured using motion sensors. Further, the function principle of optical latches as secondary securing element of inner space is explained. The designed security system implements a central control unit, which is able to provide status information on all security elements to the host system. IQRF wireless communication operationg in licence-free is used for communication among elements of the security system. GSM SIM9000 module is used for communication with the security system.
73

System for People Detection and Localization Using Thermal Imaging Cameras / System for People Detection and Localization Using Thermal Imaging Cameras

Charvát, Michal January 2020 (has links)
V dnešním světě je neustále se zvyšující poptávka po spolehlivých automatizovaných mechanismech pro detekci a lokalizaci osob pro různé účely -- od analýzy pohybu návštěvníků v muzeích přes ovládání chytrých domovů až po hlídání nebezpečných oblastí, jimiž jsou například nástupiště vlakových stanic. Představujeme metodu detekce a lokalizace osob s pomocí nízkonákladových termálních kamer FLIR Lepton 3.5 a malých počítačů Raspberry Pi 3B+. Tento projekt, navazující na předchozí bakalářský projekt "Detekce lidí v místnosti za použití nízkonákladové termální kamery", nově podporuje modelování komplexních scén s polygonálními okraji a více termálními kamerami. V této práci představujeme vylepšenou knihovnu řízení a snímání pro kameru Lepton 3.5, novou techniku detekce lidí používající nejmodernější YOLO (You Only Look Once) detektor objektů v reálném čase, založený na hlubokých neuronových sítích, dále novou automaticky konfigurovatelnou termální jednotku, chráněnou schránkou z 3D tiskárny pro bezpečnou manipulaci, a v neposlední řadě také podrobný návod instalace detekčního systému do nového prostředí a další podpůrné nástroje a vylepšení. Výsledky nového systému demonstrujeme příkladem analýzy pohybu osob v Národním muzeu v Praze.
74

Bytová zabezpečovací ústředna / Home Security System

Herold, Radek January 2010 (has links)
In the opening part of this thesis, the reader is briefly introduced into safety technique devices. There are basic types of security sensors discussed together with the most common methods of their connection with the security central. Further text focuses on elaborating the main topic of this thesis - the design of home security central equipped with a WiFi interface.
75

Komplexní zabezpečení objektů / Project of comprehensive security objects

Michálek, Libor January 2011 (has links)
In my thesis I go about principles and methods of security systems, then I go about analysis of avalaible types of security systems (EPS, EZS and CCTV). I have written about their possibile use in design security building. I have described levels of project documentation and its different parts including process service of production a project documentation for security system. I used all knowledges in the end of my thesis, when I designed and integrated security system for a special building.
76

Návrh zabezpečovacího systému areálu společnosti / A Proposal for a Security System of the Company Premises

Černý, Jan January 2014 (has links)
The content of this thesis is the complex security system proposal, specifically of PZTS system and CCTV system. The thesis is divided into three parts. The first part is analysis of the current state, the second is theoretical part and the third part is a practical part. The first part deals with the analysis of the current state of physical security and technical protection of the premises. The theoretical part deals with theoretical solutions for security system proposal. The practical part is focused on separate PZTS and CCTV systems proposal, that will meet all the requirements and standards of the customer.
77

Internet of Things and Cybersecurity in a Smart Home

Kiran Vokkarne (17367391) 10 November 2023 (has links)
<p dir="ltr">With the ability to connect to networks and send and receive data, Internet of Things (IoT) devices involve associated security risks and threats, for a given environment. These threats are even more of a concern in a Smart Home network, where there is a lack of a dedicated security IT team, unlike a corporate environment. While efficient user interface(UI) and ease of use is at the front and center of IoT devices within Smart Home which enables its wider adoption, often security and privacy have been an afterthought and haven’t kept pace when needed. Therefore, a unsafe possibility exists where malicious actors could exploit vulnerable devices in a domestic home environment.</p><p dir="ltr">This thesis involves a detailed study of the cybersecurity for a Smart Home and also examines the various types of cyberthreats encountered, such as DDoS, Man-In-Middle, Ransomware, etc. that IoT devices face. Given, IoT devices are commonplace in most home automation scenarios, its crucially important to detect intrusions and unauthorized access. Privacy issues are also involved making this an even more pertinent topic. Towards this, various state of the art industry standard tools, such as Nmap, Nessus, Metasploit, etc. were used to gather data on a Smart Home environment to analyze their impacts to detect security vulnerabilities and risks to a Smart Home. Results from the research indicated various vulnerabilities, such as open ports, password vulnerabilities, SSL certificate anomalies and others that exist in many cases, and how precautions when taken in timely manner can help alleviate and bring down those risks.</p><p dir="ltr">Also, an IoT monitoring dashboard was developed based on open-source tools, which helps visualize threats and emphasize the importance of monitoring. The IoT dashboard showed how to raise alerts and alarms based on specific threat conditions or events. In addition, currently available cybersecurity regulations, standards, and guidelines were also examined that can help safeguard against threats to commonly used IoT devices in a Smart Home. It is hoped that the research carried out in this dissertation can help maintain safe and secure Smart Homes and provide direction for future work in the area of Smart Home Cybersecurity.</p>
78

Poverty reduction strategies in South Africa

Mbuli, Bhekizizwe Ntuthuko 31 March 2008 (has links)
Between 45-57% of South Africans are estimated to be engulfed by poverty. In an attempt to identify policy instruments that could help change this status quo, the various strategies that have been implemented in countries (e.g. China, Vietnam and Uganda) that are known to have been relatively successful in reducing poverty are reviewed. In the process, this dissertation discusses the literature regarding poverty, with a particular emphasis on the definition, measurement and determinants thereof. Furthermore, South Africa's anti-poverty strategies are discussed. It turns out that these have met limited success. This is largely due to insufficient pro-poor economic growth, weak implementation/administration at the municipal level, slow asset redistribution, high income/wealth inequality, low job generation rate by SMME's, high HIV/AIDS infection rate, public corruption and inadequate monitoring of poverty. Therefore, if meaningful progress towards poverty reduction is to be achieved, the government needs to deal with the foregoing constraints accordingly. / Economics / M.Comm. (Economics)
79

Poverty reduction strategies in South Africa

Mbuli, Bhekizizwe Ntuthuko 31 March 2008 (has links)
Between 45-57% of South Africans are estimated to be engulfed by poverty. In an attempt to identify policy instruments that could help change this status quo, the various strategies that have been implemented in countries (e.g. China, Vietnam and Uganda) that are known to have been relatively successful in reducing poverty are reviewed. In the process, this dissertation discusses the literature regarding poverty, with a particular emphasis on the definition, measurement and determinants thereof. Furthermore, South Africa's anti-poverty strategies are discussed. It turns out that these have met limited success. This is largely due to insufficient pro-poor economic growth, weak implementation/administration at the municipal level, slow asset redistribution, high income/wealth inequality, low job generation rate by SMME's, high HIV/AIDS infection rate, public corruption and inadequate monitoring of poverty. Therefore, if meaningful progress towards poverty reduction is to be achieved, the government needs to deal with the foregoing constraints accordingly. / Economics / M.Comm. (Economics)

Page generated in 0.0584 seconds