• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • Tagged with
  • 28
  • 24
  • 14
  • 12
  • 8
  • 8
  • 8
  • 8
  • 7
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Bezdrátový přístupový systém / Wireless access system

Sekyra, Jaroslav January 2008 (has links)
This diploma thesis describes practical realization of entrance terminal, which enables transmission of data thanks to radio module ZigBee PAN4551 and Ethernet module Rabbit RCM3200. This entrance system uses Mifare RFID cards, with whose user will identify at the entrance terminal of the guarded object. Data are sent to server station by radio module ZigBee or Ethernet module Rabbit during demand of entrance. The database of all entrance rights of all users is stored on this server. Data system works up received data and sends them back to the terminal. One part of these data is the information about enabling of user entrance. The database system makes a list of passing through users. In the first part of this work whole conception of entrance terminal is suggested. Then basic demands of each block are described in details as well as their placement in guarded object. Next chapters describe basic function of terminal, electrical scheme, and system of power supplies for the access system. Also individual hardware components are chosen and described. In the on of the last chapter there is flow-process diagram of main loops for individual variants of terminal and interrupts functions from timer, serial link and external input from radio network MC13193 drawn. In the last chapter there is a show of server data application “AccessServer” and his basic description.
2

CHORVATSKO Nová kandidátská země EU

Žahourková, Hana January 2007 (has links)
Diplomová práce se zaměřuje na popis Chorvatska z pohledu kandidátského státu Evropské unie. Je zde popsán politický a ekonomický vývoj Chorvatska od rozpadu Jugoslávie do současnosti, dále proces rozšiřování EU z pohledu Unie samotné a hodnocení přístupového procesu Chorvatska, nominální a reálná konvergence Chorvatska k EU (hodnocení plnění Maastrichtských kritérií) a konkurenceschopnost Chorvatska.
3

Zrcadlové srovnání českých a německých statistik vzájemného obchodu / The mirror comparison of Czech and German statistics of mutual trade

Heczková, Markéta January 2012 (has links)
The final thesis is aimed at mirror comparison of mutual trade between the Czech Republic and Germany. On the basis of the comparison of Czech and German methodologies of foreign trade and consequential analysis of their mirror comparison focused especially on effect of the Czech Republic's accession to the EU (access effect) were individual abnormalities affecting mirror comparison identified and described. There were several solutions put forward so that already detected abnormalities could be effectively dissolved, moreover their figure in mirror comparison could be eliminated and data acquired from the comparison would reach as high level of credibility as possible. The Single flow and Qualified single flow systems are described and discussed in relation to mirror comparison because they are possible and already existing plans for simplification of Intrastat.
4

Proces přistoupení Chorvatska k EU / The accession process of Croatia to the European Union

Lošťák, Jan January 2011 (has links)
The presented master thesis focuses on the topical issue of Croatian Accession to the European Union that took a place on July 1, 2013. Croatia became the twenty-eighth member in the time of adverse economic situation in the old continent, especially in the monetary union -- Eurozone, which problems spread all over the Union. The aim of this thesis is to describe the course of the process and evaluate and analyze possible impacts and benefits for both parties. The thesis is divided into three main chapters. The first chapter informs about political background of the state and economical development. The second chapter describes the process itself and its aspects, whereas in the third chapter the author evaluates possible impacts and benefits of the accession.
5

Přístupový systém s rozhraním Ethernet / Access system with Ethernet interface

Knotek, Martin January 2008 (has links)
The access system with the Ethernet interface is presented in this diploma thesis. Access control system is based on the RFID technology. Each identification unit reads the users card number and sends the request to the server other the network. Server checks the card number and sends the answer. The doors are opened. The first part of this diploma thesis deals with the theoretical description of the access control systems. All used technologies are described in this first part of this work. The second part of this thesis describes hardware design of the RFID identification unit with the Ethernet interface and microcontroller Rabbit. The last part presents designed communication protocol. This protocol supports AES secure communication standard. The control program of the identification unit and to the software design of the database and the server application is made and described in this work too.
6

Multimediální služby v bezdrátových sítích / Multimedia services in wireless networks

Bučina, Peter January 2012 (has links)
The main topic of my diploma thesis is dedicated to the issue of wireless networks mostly aimed at IEEE 802.11 standard. Theoretical part of the thesis is divided into three main chapters. It deals with basic overview of standards, architecture, utilization of radio spectrum and modulating techniques in signal processing. Further, it describes basic security measures and quality of service requirements in WLAN networks. The thesis is complemented by two separate laboratory assignments focused on procedure related to the chosen problematic. The first assignment handles common steps to break ciphered protocols WEP and WPA in WLAN’s. Linux software called Back Track 5 was used to provide complete package of tools for WLAN security tests. The second one is aimed at practical options on video streaming in converged wireless networks and also at remote access of mobile users to wireless IP camera video stream.
7

Přístupový systém VUT / Access System BUT

Bezděk, Václav January 2008 (has links)
This master's thesis deals with design and implementation of program unit Access System for BUT Information System Apollo. The goal of this work is to analyze Oracle technology and chosen database schemes of access system. After that use results of analysis to design and to implement of application which provide functionality to creating access to the identification cards readers and support inspection of passing through identification cards readers. Project is creating in Borland Delphi 7.
8

Docházkový a přístupový systém a jeho využití v podnikové praxi / Usage of Attendance and Access control system in company

Šimek, Jan January 2014 (has links)
The thesis deals with the problems of attendance and access systems and their importance in the company. The main aim is to clarify the present topic both to IT consultants and the public in an attempt to show the role of its own system, its implementation and operation in corporate practice. The work is divided into two main parts. The first part describes the historical development of monitoring attendance both from the point of view of the paper version and its successive software solution, as well as in respect of the hardware. Next, we give the legislative requirements and restrictions for monitoring and recording of the attendance of employees, the main source being the Labour Code itself and the Office for Personal Data Protection. After that, updated current attendance and access systems are introduced. The second part contains the actual procedure of selection and deployment of a particular attendance system, its configuration and operation. The process is described in detail in the thesis supplement. Emphasis is placed above all on clarity and easy understanding of the present topic, its impacts and benefit of its use. The main contribution of this work is the unification of views on the present subject matter, a comprehensive view of the system and its important role as an independent system co-operating with other software and hardware resources in the company.
9

Přístupový systém založený na protokolu ACP / Access Control System Based on ACP Protocol

Jedlička, Zdeněk January 2012 (has links)
Work is focused on the possibility of implementation of ACP into applications for mobile devices using the Android operating system ogether with the implementation of this Protocol in the hardware device. Communication is based on standard TCP / IP and UDP protocol.
10

Statická analýza počítačových sítí / Static Analysis of Computer Networks

Hozza, Tomáš January 2012 (has links)
Some problems in configurations of network devices are difficult to identify. Access control lists present an important part of many configurations. Conflicts among rules of an access control list can cause holes in security policy or quality of service. In this paper we focus on identifying and classifying conflicts among rules of an access control list. Discovering all possible types of conflicts is not a trivial task. We present optimized algorithm for complete access control list analysis using tries, based on existing research by Baboescu and Varghese. The tool for detecting conflicts among access control list rules of one given Cisco, HP or Juniper device using tries based algorithm has been implemented. Bit vectors in tries use WAH compression method to reduce memory consumption. Implemented tool was tested for correctness and performance. The hypothesis that this solution would make the analysis of access lists significantly faster has been proven.

Page generated in 0.0275 seconds