111 |
Návrh minimálního protokolového stacku Bluetooth / The Design of Minimal Bluetooth StackGazda, Martin January 2011 (has links)
This master's thesis main aim is to design minimal Bluetooth stack for embedded applications running on an education platform FITkit. This paper contains a theoretical foundation for that work and implementation description. The main section includes Bluetooth protocol stack design and main opportunities which such a design raises.
|
112 |
Využití protokolu RTP pro distribuci procesních dat v reálném čase / RTP Protocol for Real-Time Data DistributionŠkarecký, Tomáš January 2010 (has links)
This paper explores the potential of process data distribution in real time using the RTP protocol. Firstly, there is an evaluation of existing protocols that are used for this purpose. Secondly, there is a description of the trio of protocols RTP, RTCP, and RTSP, explained their functions and explored possibilities for their expansion. On the basis of this acquired knowledge, problems which may occur with the distribution of process data by means of RTP are identified and their possible solutions are proposed. To demonstrate the data distribution via RTP, the application, that collects GPS position from the PDA and then provides clients with them, has been designed and implemented. Clients can display these data on the map.
|
113 |
Analýza vybraných platebních protokolů / Analysis of Selected Payment ProtocolsKučerová, Petra January 2010 (has links)
The aim of the master's thesis "Analysis of Selected Payment Protocols" is overview of used payment. The first part is concentrated on data security, the second is dedicated to payment protocols, their characteristics, used technology and security elements. The third part is dedicated to verification and simulation tools. Comparison of particular payment protocols and of particular verification tools is part of this work too. Experimental part of the thesis is focused on formalization and verification of the payment protocol Visa 3-D Secure, of the protocol NetBill and on formalization of two subprotocols of SET.
|
114 |
Metody návrhu bezpečnostních protokolů / Methods of the Security Protocols DesignHranáč, Jakub January 2010 (has links)
This project describes several methods suggested for security protocol design. The method named ' A Simple Logic for Authentication Protocol Design' is described in more detail and implemented including custom made addition defining the ownership of messages and rights to re-send those messages.
|
115 |
Rádiová přístupová síť mobilní sítě / Radio Access Network of a Cellular NetworkDuda, Michal January 2016 (has links)
The aim of the work is the radio access network of mobile networks second, third and fourth generation. The main objective is a description of the radio access network of the second, third and fourth generation, their elements, interfaces and signaling procedures. The next part describes the emergency services and the architecture of the fourth generation mobile networks. The practical part is then devoted to identify actions needed to prepare radio access network to testing emergency services, identify actions needed to conversion of transport protocol fixed part of the radio access network from IPv4 to IPv6 and describe the intervention to radio access network to change the active segment of the core network.
|
116 |
Monitorovací a kontrolní systém pro domácnost / Monitoring and control systemTaťák, Martin January 2016 (has links)
This thesis discusses the topic of internet of things and its protocols and compatible devices in the field of home automation. Also defines the requirements for the system which designs in the form of concept and afterward makes practical realization.
|
117 |
Bezpečnost protokolů bezkontaktních čipových karet / Security of Contactless Smart Card ProtocolsHenzl, Martin January 2016 (has links)
Tato práce analyzuje hrozby pro protokoly využívající bezkontaktní čipové karty a představuje metodu pro poloautomatické hledání zranitelností v takových protokolech pomocí model checkingu. Návrh a implementace bezpečných aplikací jsou obtížné úkoly, i když je použit bezpečný hardware. Specifikace na vysoké úrovni abstrakce může vést k různým implementacím. Je důležité používat čipovou kartu správně, nevhodná implementace protokolu může přinést zranitelnosti, i když je protokol sám o sobě bezpečný. Cílem této práce je poskytnout metodu, která může být využita vývojáři protokolů k vytvoření modelu libovolné čipové karty, se zaměřením na bezkontaktní čipové karty, k vytvoření modelu protokolu a k použití model checkingu pro nalezení útoků v tomto modelu. Útok může být následně proveden a pokud není úspěšný, model je upraven pro další běh model checkingu. Pro formální verifikaci byla použita platforma AVANTSSAR, modely jsou psány v jazyce ASLan++. Jsou poskytnuty příklady pro demonstraci použitelnosti navrhované metody. Tato metoda byla použita k nalezení slabiny bezkontaktní čipové karty Mifare DESFire. Tato práce se dále zabývá hrozbami, které není možné pokrýt navrhovanou metodou, jako jsou útoky relay.
|
118 |
Laboratorní scénáře umožňující srovnání protokolů přenosu webových stránek / Laboratory scenarios for comparison of protocols allowing transmission of web pagesMoučka, Martin January 2017 (has links)
This diploma thesis focuses on theoretical and practical comparison of webpage transport protocols such as HTTP/HTTPS (Hypertext Transfer Protocol) v1.1, SPDY, HTTP/2 and QUIC using UDP (User Datagram Protocol), TCP (Transmission Control Protocol) and SCTP (Stream Control Transmission Protocol) as transport protocols. This work also contains design and manual for practical laboratory tasks on which can students verify theoretical assumptions. These tasks compares protocols in different conditions such as packet loss, latency and jitter.
|
119 |
Die effektiewe regulering van kinderarbeid (Afrikaans)Kinnear, Lichel 28 May 2013 (has links)
Every year millions of children worldwide are forced into the labour pool. More than half of these children are involved in some of the worst forms of child labour, which include slavery, work under hazardous conditions and illegal activities such as drug trafficking and prostitution. Children involved in child labour are usually deprived of access to basics such as proper nutrition, adequate shelter, education, basic hygiene and healthcare, and recreation. Due to the increase in poverty across the world, the vulnerability of children in child labour, and their need for income to survive in a poverty-stricken environment, these children simply cannot escape from the exploitative practices and worst forms of labour. Despite the dangers associated with child labour, not all forms of work done by children are hazardous to them. The income earned by children in this way contributes substantially to their own survival and that of their families. Work can also help children acquire certain skills, which can contribute to their development. This dissertation investigates, in the light of the current socio-economic circumstances of South Africa, the possibility to allow children to work for their survival and simultaneously to protect them through regulatory measures from exploitative labour practices and the worst forms of child labour. The dissertation starts with a general overview of child labour, including the historical development of the regulation of child labour, problems encountered in defining child labour, advantages and disadvantages of child labour as well as the various current perspectives and approaches to child labour. Special attention is given to the importance of education and the current problems experienced in the education system (which needs to be adjusted for child labourers) as well as the situation regarding girls in the labour market. An exploration of the international legal framework applicable to child labour is coupled with a description of the current international conventions as well as international initiatives, which mainly seek to eliminate child labour. Emphasis is placed on the most important conventions that have a direct impact on child labour: The United Nations Convention on the Rights of the Child, the International Labour Organisation's conventions and the African Charter on the Rights and Welfare of the Child. Subsequently, the dissertation canvasses the approach to child labour in South Africa with an overview of the nature and extent of child labour in South Africa and an exploration of the nexus between international law and South African national law. The author expounds in detail on the current South African national legal framework applicable to children and child labour, as well as the variety of South-African programmes that seek to effectively regulate child labour. By way of comparison, the author investigates the approach to child labour in India, exploring the socio-economic and political circumstances as well as the extent of child labour in India, as also the federal law and child labour programmes that regulate child labour in India. India’s approach to child labour is compared with that of South Africa to gauge how the two differ and what South-Africa can adopt from India. The dissertation critically evaluates the South African approach to child labour and offers proposals to address the challenges in limiting, if not eradicating, the worst forms of child labour and its exploitative practices in South Africa. The author reviews and evaluates the measures and programmes implemented in India, with a view to improve the position of children involved in child labour in South Africa. The author closes by critically analysing the hypothesis posed at the outset of this study: that a judicious acceptance of child labour (excluding its worst forms), when considered in the context of its proper and effective regulation through legislation and enforcement, is the best approach to combat the perils associated with child labour in South Africa. / Dissertation (LLM)--University of Pretoria, 2012. / Private Law / unrestricted
|
120 |
Komparace vybraných podacích deníků z let 1890-1950 / A Comparison of Selected Submission Diaries over 1890-1950Kantorová, Alexandra January 2021 (has links)
This master's thesis, "A comparison of selected submission diaries from 1890 ̶1950," provides a detailed and complex analysis of selected submission diaries. The objective of this study is to compare selected submission diaries in various types of institutions. Furthermore, it examines how the given submission diaries changed over time within these institutions, who recorded this information, and what information was considered important in certain periods. The research is based on a study of archives from the following selected years: 1898, 1908, 1928, 1938 and 1948. In order to achieve the aim of this thesis, it was necessary to visit the National Archives in Prague, State Regional Archives in Prague, Prague City Archives, State County Archives in Beroun, Charles University Archives and National Museum archives. The study comprises a detailed internal and external analysis of the individual books. Interest is taken not only in changes on the surface, such as bent page corners, but the key concerns also include, for example, observations on the usage of official stamps in the individual books. Keywords Submission diary, submission protocol, book, institution, archive, essential registration needs
|
Page generated in 0.0438 seconds