• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 50
  • 5
  • 4
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 65
  • 30
  • 10
  • 9
  • 9
  • 9
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Mechanické zajištění hydraulických zdvihacích systémů pro jevištní techniku / Mechanical securing of hydraulic lifting systems for stage technology

Drha, Vojtěch January 2018 (has links)
The aim of this thesis is to design a mechanical position securing of hydraulic elevating systems for stage technology. The first part includes an overview of present state of elevating systems and their securing solutions. The second part determines technical parameters and design of a chosen solution together with control and design calculations. Final part analyses suggested solution in terms of security.
32

Akcelerace šifrování přenosu síťových dat / Acceleration of Network Traffic Encryption

Koranda, Karel January 2013 (has links)
This thesis deals with the design of hardware unit used for acceleration of the process of securing network traffic within Lawful Interception System developed as a part of Sec6Net project. First aim of the thesis is the analysis of available security mechanisms commonly used for securing network traffic. Based on this analysis, SSH protocol is chosen as the most suitable mechanism for the target system. Next, the thesis aims at introduction of possible variations of acceleration unit for SSH protocol. In addition, the thesis presents a detailed design description and implementation of the unit variation based on AES-GCM algorithm, which provides confidentiality, integrity and authentication of transmitted data. The implemented acceleration unit reaches maximum throughput of 2,4 Gbps.
33

En undersökning om möjligheterna att använda återanvändningsbara pallband till enhetslaster omlastade till träpallar. / An investigation of the possibility to use reusable pallet strapping for unit loads reloaded to wooden pallets.

Björk, Tomas January 2007 (has links)
<p>En undersökning om möjligheterna att använda återandvändningsbara pallband och de ekonomiska förutsättningarna för detta. En genomsökning av vad som finns på marknaden. Beräkning av de krafter som enhetslasten kan utsätta pallbanden för. Utveckling av egna förslag till återanvändningsbart pallband med snabbspänne och bandning på tre sidor. En översikt av de positiva och negativa effekter som blir vid ett byte från dagens bandning med PP-band till ett återanvändningsbart pallband</p> / <p>An investigation of the possibility to use reusable strapping and the economic conditions for this. Going trough what exist on the market. Calculation of the forces that the unit load can expose the strapping for. Developing of own suggestions for reusable strapping with quick buckle and strapping on three sides. A short look at the positive and negative effects that comes from a change from today’s strapping with PP-strap to a reusable strapping.</p>
34

Finanční zajištění / Financial collateral

Podpěra, Dan January 2011 (has links)
Title Financial Security ANNOTATION The diploma work presented deals with financial security, i.e. with one of the methods of securing an obligation, as set out under the provision of Section 323a et seq. of Act No. 513/1991 Coll., The Commercial Code, as amended. In the work as a whole, I deal in detail, on the one hand, with description of the above- mentioned legal institution, financial security, in the form ascribed to it presently by the valid and effective legal regulations in the Czech Republic. Thus, I deal with the concept of financial security in our system of law, origin of the legal institution and its inclusion in the system of law of the Czech Republic, while defining the fundamental notions being necessary to study this part of the commercial law of the Czech Republic. Further, I address explanatory and interpretation problems of financial security, both in the light of the European Union's legal regulations, which are, if simplifying, a template for our legal regulations concerning financial security, and from the point of view of our reputable law specialists, who dealt with financial security in specialised publications, in particular in their commentaries on the Commercial Code, and in articles published in professional periodicals. Also I devote a significant part of this work to the...
35

Problémy institutu vazby / The issue of the concept of criminal custody

Špryňar, Michal January 2014 (has links)
1 Abstract: The issue of the concept of criminal custody The subject matter of this diploma thesis is "The issue of the concept of criminal custody". Custody being an institute of the procedure criminal law is a very problematic securing instrument that limits rights of a convicted person. Custody is often the subject of disputes which is reflected on the case decisions of the Constitutional Court of the Czech Republic and on the decisions of international courts. The diploma thesis is divided in five chapters. Starting with a short introduction into the issues of custody, in the first chapter we describe its historical development in the Czech Republic and we concentrate mainly on statutory and amendatory acts after year 1989. The second chapter discusses the term and idea of custody, its purpose, main features and custody principles. The third chapter focuses on substantive enactment of custody, specifically on conditions for custody and their definitions. This chapter also includes examples of judicature of the Supreme Court of the Czech Republic. Custody substitutions are also treated in this chapter as well this chapter include the new preliminary precautions. The forth chapter discusses formal legal custody right and explains the way the substantive custody rights, explained in the previous chapter,...
36

Stěhování Národního muzea jako logistický problém / Moving and Logistics Technologies as an Opportunity for a Management of Museum Collections

Srovnal, Jan January 2009 (has links)
This thesis deals with identification and analysis of weak points of current management of National museum's collections and aimes to apply selected logistic technologies and to propose efficient logistic network operating in actual situation of Central depository Terezín II. The issue is handled in connection with moving of the museum collection, which represents not only unique project in the history of modern museum praxis but also an appropriate opportunity for reengineering and improving of existing procedures connected with legal mission of the most important and largest museum institution in the Czech Republic.
37

En undersökning om möjligheterna att använda återanvändningsbara pallband till enhetslaster omlastade till träpallar. / An investigation of the possibility to use reusable pallet strapping for unit loads reloaded to wooden pallets.

Björk, Tomas January 2007 (has links)
En undersökning om möjligheterna att använda återandvändningsbara pallband och de ekonomiska förutsättningarna för detta. En genomsökning av vad som finns på marknaden. Beräkning av de krafter som enhetslasten kan utsätta pallbanden för. Utveckling av egna förslag till återanvändningsbart pallband med snabbspänne och bandning på tre sidor. En översikt av de positiva och negativa effekter som blir vid ett byte från dagens bandning med PP-band till ett återanvändningsbart pallband / An investigation of the possibility to use reusable strapping and the economic conditions for this. Going trough what exist on the market. Calculation of the forces that the unit load can expose the strapping for. Developing of own suggestions for reusable strapping with quick buckle and strapping on three sides. A short look at the positive and negative effects that comes from a change from today’s strapping with PP-strap to a reusable strapping.
38

Zajišťování veřejného pořádku v České republice a Státu Izrael / Securing of public order in the Czech Republic and the State of Israel

Pavlátová, Michaela January 2018 (has links)
Topic of this thesis is securing public order in the State of Israel and comparing it with securing public order in the Czech Republic. In view of the current security situation in Europe and its development, the Czech Republic is also currently facing new challenges in the area of securing public order. The State of Israel is a country that has been facing threats of destruction from its enemies from the day of Israel's creation. Ensuring security and the sole existence of the State has become a major priority for Israel, and thus studying Israel's ways to secure public order is, in my view, useful and in certain aspects also inspiring. This thesis presents a detailed view of Israel's methods of securing public order. It also reflects the social and historical context which is an integral part of the Israeli public order legislation and which is essential for correct understanding of the Israeli approach to provide security to its inhabitants. I compare the most important aspects of securing public order in the State of Israel with the ways of securing public order in the Czech Republic. This thesis is divided into six chapters. The first two chapters are dealing with the Czech concept of the public order and the Czech methods of securing public order. The third chapter analyzes the term "public...
39

Zajišťování bezpečnosti a mimořádné stavy v ústavním pořádku ČR / Safety securing and states of crisis in the constitutional law of the CR

Baumruková, Lucie January 2017 (has links)
This thesis discusses the issue of securing safety of the state with emphasis on the institute of so called states of crisis in the constitutional law of the Czech Republic. The first part deals with states of crisis in general, outlines the basic theory of states of crisis as institutes of law, historical and international context of regulation, as well as on a generally security oriented context. The second section is dedicated to individual states of crisis, namely the state of danger, state of emergency, state of threat to the state and state of war. The thesis contain the basic description of the state of emergency, its sources of law, the method of its declaration all of the states of crises and discusses institutes common for all, or most of the individual states of crisis. Last section of this thesis focuses on further methods of safety ensuring, in particular with connotation to Article 43 of the Constitution of the Czech Republic. For example the regulation of the dispatch of armed forces beyond the territory of the Czech Republic and the residence of foreign armed forces in the territory of the Czech Republic or the regulation of crossing and flying across the territory of the Czech Republic. The conclusion indicates that the current legislation regulating states of crisis is not...
40

Security management process in distributed, large scale high performance systems

Kraus, K. (Klemens) 25 November 2014 (has links)
Abstract In recent years the number of attacks on critical infrastructure has not only increased substantially but such attacks have also shown higher sophistication. With the increasing interconnection of information systems it is common that critical systems communicate and share information outside an organization’s networks for many different scenarios. In the academic world as well as in existing security implementations, focus is placed on individual aspects of the security process - for example, network security, legal and regulatory compliance and privacy - without considering the process on the whole. This work focuses on solving this security gap of critical infrastructure by providing solutions for emerging attack vectors. Using design science research methods, a model was developed that seeks to combine these individual security aspects to form a complete security management process (SMP). This SMP introduces, among others theories of security topics, recommended best practices and a security organization structure. An instantiation of the SMP model was implemented for a large-scale critical infrastructure. This work introduces the system developed, its architecture, personnel hierarchy and security relevant workflows. Due to employed surveillance networks, specialized requirements for bandwidth utilization while preserving data security were present. Thus algorithms for solving these requirements are introduced as sub-constructs. Other focus points are the managerial aspects of sensors deployed in surveillance networks and the automatic processing of the sensor data to perform data fusion. Algorithms for both tasks were developed for the specific system but could be generalized for other instantiations. Verification was performed by empirical studies of the instantiation in two separate steps. First the instantiation of the SMP was analyzed as a whole. One of the main quality factors of the instantiation is incident response time, especially in complex scenarios. Consequently measurements of response times when handling incidents compared to the traditional system were performed in different scenarios. System usability was then verified by user acceptance tests of operators and administrators. Both studies indicate significant improvements compared to traditional security systems. Secondly, the sub-constructs communication optimizations and the data fusion algorithm were verified showing substantial improvements in their corresponding areas. / Tiivistelmä Viime vuosina kriittisiin infrastruktuureihin on kohdistunut merkittävästi aiempaa enemmän erilaisia hyökkäyksiä. Tietojärjestelmien välisten yhteyksien lisääntymisen myötä myös kriittiset järjestelmät kommunikoivat nykyään keskenään ja jakavat tietoa organisaation sisäisten verkkojen ulkopuolellekin. Akateemisessa tutkimuksessa ja turvajärjestelmien toteutuksissa on huomio kohdistettu turvallisuutta koskevien prosessien yksittäisiin piirteisiin, kuten esimerkiksi verkkojen turvallisuuteen, lakien ja sääntöjen noudattamiseen ja yksityisyyteen, miettimättä prosesseja kokonaisuutena. Väitöstutkimuksen tavoitteena on ollut ratkaista tämä kriittisten infrastruktuurien turvallisuusongelma tarjoamalla ratkaisuja, jotka paljastavat mahdollisia hyökkäysreittejä. Väitöstutkimuksessa kehitettiin suunnittelutieteellisen tutkimuksen avulla lähestymistapa, joka yhdistää yksittäiset turvallisuusnäkökohdat ja muodostaa näin turvallisuuden kokonaishallinnan prosessin mallin. Malli hyödyntää erilaisia turvallisuusteorioita, suositeltuja hyviä käytäntöjä ja turvallisen organisaation rakennemalleja. Mallista kehitettiin esimerkkitoteutus laajamittaista kriittistä infrastruktuuria varten. Tämä väitöskirja esittelee kehitetyn järjestelmän, sen arkkitehtuurin, henkilökuntahierarkian ja turvallisuuden kannalta relevantit työnkulkukaaviot. Työssä huomioitiin laajan valvontaverkoston edellyttämät erityisvaatimukset tilanteessa, jossa tietoturvallisuuden säilyttäminen oli tärkeää. Myös näiden erityisvaatimuksiin liittyvien mallin osien ratkaisualgoritmit esitetään. Muita työn tuotoksia ovat hallinnolliset näkökulmat, jotka on huomioitava, kun valvonnalle tärkeitä sensoreita hallinnoidaan ja sensorien tuottamaa dataa yhdistellään. Algoritmit luotiin esimerkkiympäristöön, mutta niitä on mahdollista soveltaa muihinkin toteutuksiin. Toteutuksen oikeellisuuden todentamisessa käytettiin empiirisiä ympäristöjä kahdessa eri vaiheessa. Ensiksi turvallisuusprosessin kokonaishallinnan malli analysoitiin kokonaisuutena. Merkittävä laatutekijä oli havaintotapahtuman vasteaika erityisesti monimutkaisissa skenaarioissa. Siksi työssä esitellään eri skenaarioiden avulla tapahtumanhallinnan vasteaikojen mittauksia suhteessa perinteisiin järjestelmiin. Tämän jälkeen järjestelmän käytettävyys todennettiin operaattorien ja hallintohenkilöstön kanssa tehtyjen hyväksymistestien avulla. Testit osoittivat huomattavaa parannusta verrattuna perinteisiin turvajärjestelmiin. Toiseksi verifiointiin mallin osien kommunikaation optimointi ja algoritmien toimivuus erikseen ja niissäkin ilmeni huomattavia parannuksia perinteisiin järjestelmiin verrattuna.

Page generated in 0.0869 seconds