National Repository of Grey Literature 1,783 records found  1 - 10nextend  jump to record: Search took 0.05 seconds. 
Functional safety of pressure transmitters of BD SENSORS company
Šimoník, Martin ; Hlinka,, Jiří (referee) ; Fuchs,, Pavel (advisor)
This master thesis examines the functional safety of the pressure sensor XMP i which is produced by BD SENSORS Company. The aim of this thesis is the demonstration of compliance of the pressure sensor XMP I with functional safety integrity level SIL3 requirements. The thesis is divided into three parts. The first part deals with the concept of functional safety, defines the basic concepts of functional safety, compares the approaches of functional safety according to selected standards and provides a general procedure for the functional safety determination. The second part deal with technical systems reliability defines reliability indicators and describes selected types of reliability analysis used in practice, especially the FMEA/FMECA analysis. Third part deals with the reliability analysis of the sensor XMP i and with evaluation of results.
Design Better Content Development Process for SCAP Standards
Beňas, Petr ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Cílem této práce je nastudovat a zjednodušeně popsat standardy SCAP používané pro standardizované předávání informací o zranitelnostech a dalších dat souvisejících s informační bezpečností, se zaměřením na formáty XCCDF a OVAL. V textu jsou zkoumány existující přístupy a nástroje sloužící k tvorbě obsahu těchto standardů. Na základě získaných poznatků je navržen nový nástroj s cílem řešit nedostatky existujících přístupů. Text práce také popisuje implementaci a testování navrženého nástroje.
Methods of steganography
Obdržálková, Karolína ; Blažek, Petr (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis deals with steganography, its types and methods. Steganography is generally described in this work. A significant part of this thesis is devoted to the development of steganography and also describes how is steganography used for malware and copyright protection. The next part describes the types of steganography according to the type of carrier, their methods and properties of steganographic methods. Based on theoretical knowledge, an application with a graphical user interface was created to hide and reveal secret information using steganographic method LSB. This application is described in the final part together with the evaluation of security of hidden information.
Fast Processing of Application-Layer Protocols
Bárta, Stanislav ; Martínek, Tomáš (referee) ; Polčák, Libor (advisor)
This master's thesis describes the design and implementation of system for processing application protocols in high-speed networks using the concept of Software Defined Monitoring. The proposed solution benefits from hardware accelerated network card performing pre-processing of network traffic based on the feedback from monitoring applications. The proposed system performs pre-processing and filtering of network traffic which is handed afterwards passed to application modules. Application modules process application protocols and generate metadata that describe network traffic. Pre-processing consists of parsing of network protocols up to the transport layer, TCP reassembling and forwarding packet flow only to modules that are looking for a given network traffic. The proposed system closely links intercept related information internal interception function (IRI-IIF) and content of communication internal interception function (CC-IIF) to minimize the performing of duplicate operations and increase the efficiency of the system.
Additional Options of the ECCAIRS capabilities at national level
Durchan, Vladimír ; Hodaň, Viktor (referee) ; Chlebek, Jiří (advisor)
The focus of this diploma thesis is a development of a proposal for the modification of the reporting mandatory and voluntary occurrances on the national basis. In the first part of this thesis is describtion database system ECCAIRS and also describtion of the legislation which relates to the reporting of occurrances, specifically Regulation (EU) No 376/2014 of the European Parliament and of the Council. Second part of this diploma thesis is about the description of the proposed solutions to improve reporting system of occurrances. Second part also includes creation of the form for reporting occurrances.
Configurable Telemetric and Monitoring System
Voborník, Petr ; Trchalík, Roman (referee) ; Ryšavý, Ondřej (advisor)
A goal of this thesis is design and implementation of modular system for telemetry and security purposes. System consists of modules for processing incoming data, web administration and presenation interface and set of web services. For implementation is used C# language along with .NET Framework and ASP.NET.
Analysis and risk assessment of implementation of energy saving via renovation of school facilities
Šafářová, Tereza ; Bednářová, Bronislava (referee) ; Vymazal, Tomáš (advisor)
The thesis is focused on analysis and risk assessment during the reconstruction of the school building. The work will be used appropriate methods to a specific reconstruction of school, especially checklist and risk catalog. They will be determined by the ris ks that caused the failure to comply with the schedule of works and thus limit the operation of school and the surrounding area. These risks will be set out measures that should determine how these scenarios could have been avoided.
Hardware cryptographic modules for LAN security
Loutocký, Tomáš ; Lambertová, Petra (referee) ; Zeman, Václav (advisor)
The thesis deal with the problems of virtual private network (VPN). The first part of the thesis is focused on the description of the basic terms of computer security which are useful for better understanding the other parts. There is a description of VPN technology and its separation of VPN by various aspects in the second part of the thesis. The next chapter is dedicated to the description of realization of VPN by using IPSec. There is shown how to secure laboratory network by using of the products of the Safenet Company in the practical part of the thesis. There are also stated the modular techniques how to use products in the network in practical part. Some of the modular techniques describe security weaknesses of the products which are possible to exploit in the laboratory network and they also describe the ways how to protect them against misusage.
Rationalisation of manipulation shop
Vičar, Miroslav ; Neužil, Karel (referee) ; Hlavenka, Bohumil (advisor)
The aim of this thesis is to reach a distinctive rationalization of the production and assembling plant of Cargo Van Brno company. In the project of new lay-out of the production area were all restrictions given by management of the company and by owner of the property strictly met. Technological changes of the process plan and investments suggestions are determined by the company's strategic plan.
Proposal of projection to backuping and restoration IS/IT
Hladíková, Lucie ; Gardavský, Vítězslav (referee) ; Dydowicz, Petr (advisor)
Purposes work was propose safer progress backup and data recovery in comparison with current. With this object was chosen several technology, which this criterion answer.

National Repository of Grey Literature : 1,783 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.