• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 157
  • 6
  • 1
  • Tagged with
  • 164
  • 119
  • 34
  • 32
  • 25
  • 22
  • 21
  • 21
  • 19
  • 19
  • 19
  • 18
  • 17
  • 15
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Modely systému LTE / LTE system models

Navrátil, Petr January 2013 (has links)
Master’s thesis is focused on part of mobile network named LTE. Project is analyzes the LTE physical layer, which is divided into four basic parts: Physical channels and modulation, Multiplexing and channel coding, Physical layer procedures, Physical layer measurements. Every part is described by actual 3GPP standard [1]. To understand the problem is expected a reader basic knowledge of OFDM systems, which the LTE system uses. The next part of this master’s thesis is dedicated to mathematic model physical layer of system LTE, created by program Matlab. This model is designed to measure errors in data transmission.
132

Určení pozice útočníka při pokusu o neoprávněný přístup do operačního systému / Location of attacker attempting unauthorized access to operating system

Pokorný, Josef January 2013 (has links)
My master thesis estimates physical location of potential operating system attacker. It deals with basic methods of attack against operating system: spam and viruses, searching the Internet, port scanning and operating system detection. The thesis disserts about a port scanner Nmap, a port scanning detector Scanlogd and about a system log watch Swatch. The thesis deals with geolocation methods of potential operating system attacker. These geolocation methods are divided into an active and a passive types. The active methods measure delay in the Internet. The passive methods query the database. I mentioned a freely accessible Whois database and MaxMind databases. There is a program developed and practically tested. The program simulates an attacker beginning an attack by scanning ports of target machine. The program works with dataset of real IP addresses. The program also detects the attack against operating system. The real and evaluated location of an attacker is got and then shown in a map. At the end there is a review of results and data comparison with colleagues.
133

Vývojová deska s ARM Cortex M4 / ARM Cortex M4 Development board

Volek, Lukáš January 2013 (has links)
In this work I aimed at designing a universal system for testing either STM32F407/417 by STMicroelectronics and later various sensors and communication buses. The result then is a main board with many specific connectors for individual buses even with connectors making all I/O pins accessible at the same time. Thanks to advanced switching regulators the power supply is capable of accepting a wide range of sources like single Li-Ion cell, pair of alkaline cells, 12V Lead battery, common wall power adapters (both DC and AC up to 15 Vpp ), USB, laboratory power supplies with multiple outputs and finally POE (Power Over Ethernet). Supply voltages are supervised by voltage comparators with an optical signalisation. (It is possible to determine the sick branch without a measuring instrument and blowing components in the most cases.) Another important parameter was a robustness of the supply and communication lines. There is a number of TVSs, chokes, and big and low ESR capacitors A PC software is intended for a basic functionality demonstration only.
134

Vliv velikosti rámce na dělicí poměr v pasivních optických sítích XG-PON / Influence of the frame size on splitting ratio in the passive optical networks XG-PON

Kočí, Lukáš January 2015 (has links)
The diploma thesis deals with the theoretical definition of passive optical networks, furthermore the description of methods of channel bundling in passive optical networks and the coexistence and migration between standards. The main essence of this work is the XG-PON (10-Gigabit-capable Passive Optical Network) standard. This standard is generally defined along with a description of the physical layer. The transport layer is detailed analysis. There is a description of conditions, under which the Optical Network Unit pass through, when is activated. Additionally, this diploma thesis focuses on the processes of connecting Optical Network Units to the Passive Optical Networks and the timing relationships between Optical Network Units and Optical Line Terminal. The simulations demonstrate that as the number of simultaneous connections to Optical Network Unit increase, longer wait time for each additional connection becomes. This also solves the collision conditions, that might arise in communication and the equalization delay. Finally, the diploma thesis deals with the influence of a refractive index on timing relationships.
135

Podnikatelský záměr - změna právní formy společnosti / Business Plan - Change of Business Entity Form

Holíková, Lucie January 2009 (has links)
This thesis is focused on development of small company by elaboration of business plan for the future development of the company. The thesis will be used as a guide for succesfull conversion from sole proprietorship to corporation business. The company Zdeněk Kázmér works in area of wiring systems and locksmithery. Whole strategy was build on the concept of real situation of the company. It reacts on found deficiencies and opportunities of future development.
136

Inovace procesů zpracování osobních údajů u státní organizace / Innovation Processes Personal Data for the State Organization

Cahová, Veronika January 2009 (has links)
Master's thesis "Innovation processes personal data for the state organization," deals with the protection of personal data for processing, both in paper, as well as electronic form. The main topic is security policy, the assessment of security risks resulting proposals for the introduction of innovative processes aimed to prevent possible leakage and misuse of personal data.
137

Management informační bezpečnosti ve zdravotnickém zařízení / Information Security Management in Healthcare Organization

Mikulová, Aneta January 2011 (has links)
The topic of my thesis is "Information security management in healthcare organization." Medical facilities are generally the ones who should put emphasis on information security. For my thesis I chose aesthetic private clinic called Visage, I underwent safety analysis. The analysis showed that only a small part of the security process is documented in the clinic. This is particularly deficient in terms of business. There may be a leak of sensitive information on the health status of individual patients. It is necessary to better treat the handling of these data. The aim of this thesis is a security manual that will describe the personal, physical and IT security.
138

Návrh metodiky bezpečnosti informací v podniku provozující elektronický obchod / Draft of Information Security Methodology in Company Running Electronic Commerce

Mráčková, Kateřina January 2013 (has links)
The work deals with the analysis of security management in company selling goods trought the stone shop and the electronic commerce. The assets and threats affecting them were identified and an analysis of risks and selected measures was evaluated. The work is based on the theoretical background from series of standards ISO/IEC 27000 given in the first part of it.
139

Přechod na jinou právní formu podnikání z hlediska daně z příjmu / Transition to a Different Business Form in Terms of Income Tax

Houfková, Andrea January 2015 (has links)
This thesis deals with tax implications. It is focused on the evaluation of the options of transferring to another business form in terms of tax burden. By processing the overall tax burden in various business forms will be proposed an option, which would bet he best for husbands Houfek in terms of tax. There will be also taken into account tax optimization using international revenues that husbands could arrives in connection with business development.
140

Analýza nejvyššího a nejlepšího využití objektu v Hradci Králové na ulici Průmyslová / Analysis of the highest and best use of a building in Průmyslová street in Hradec Králové

Zatloukal, Lukáš January 2015 (has links)
The diploma thesis deals with the valuation method called Analysis of the Highest and Best Use (HABU). In the theoretical part are described and explained four basic hypotheses of which analysis consists of. These are legal permissibility, physical possibility, financial substantiation and maximum productivity. The practical part deals with specific variants, on which calculations are demonstrated as well as confirmation or refutation of hypotheses.

Page generated in 0.0305 seconds