National Repository of Grey Literature 50 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Education to Spirituality
Novotný, Miroslav ; Syřiště, Ivo (referee) ; Prokop, Jiří (referee)
The aim of this work is to create a pedagogical concept of the education for spirituality. I try to map the various views of human spirituality. The spirituality is one of the important philosophy topics, so I dedicated this view most. Next is the psychology, within witch I strive to grab this term in a scientific way. I also notice the changes in the perception of the term spirituality, namely in the relation to the religion, as well as to the usage of this term, which is equivalent to the previously frequently used term inwardness. Marginally I also mention some theories related to the spirituality in the field of biology, quantum physics and brain research. After the initiation of some way outs, from which can be created the conceptual apparatus, I come to my own definition of the spirituality, I concretize the education to the spirituality including the initiation of goals, methods and means of this education. The part of this work is also a small study, in which I try to find out, what is the degree of the respondents spirituality, what forms and methods do the respondents evolve their spirituality and I am looking for the contexts between the respondents characteristics by practicing the various technics and the spirituality rate. Research questionnaire method is conceived quite broadly, to...
Trust Management Systems in P2P Networks
Novotný, Miroslav
of dissertation thesis Title: Trust management systems in P2P networks Author: Miroslav Novotný Department / Institute: Faculty of Mathematics and Physics Supervisor of the doctoral thesis: RNDr. Filip Zavoral Ph.D. The architecture of certain class of services, such as distributed computing, distributed storages or content delivering networks shifts from the traditional client- server model to more scalable and robust peer to peer networks. Providing proper protection to such complex, open and anonymous systems is very complicated. Malicious peers can cooperate and develop sophisticated strategies to bypass existing security mechanisms. Recently, many trust management systems for P2P networks have been proposed. However, their effectiveness is usually tested only against simple malicious strategies. Moreover, a complex comparison of resistance of a particular method is missing. In this thesis, we (1) propose a new trust management system called BubbleTrust and (2) develop a simulation framework for testing trust management systems against various malicious strategies. Our simulation framework defines several criteria which determine the success of each malicious strategy in the network with a given system. We present results of four trust management systems that represent main contemporary...
Web server attack analyzer
Mižišin, Michal ; Novotný, Miroslav (advisor) ; Mareš, Martin (referee)
In this work I will focus on the most common forms of attacks on web applications. My focus will point on so called Injection flaws (attacks where data given by user are interpreted and executed), XSS (Cross Site Scripting) and CSRF (Cross Site Request Forgery), that have for web application in case of compromisation fatal consequences. I will describe these attacks, their history, concrete examples of successful execution. I will propose also possible kinds of protection and possibilities of detection.
Web server attack analyzer
Mižišin, Michal ; Novotný, Miroslav (advisor) ; Čermák, Miroslav (referee)
Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are characterized possibilities of further development in area of better results of false positives. Implemented detection of all proposed attacks did slow down server response time by 10% and was able to detect more than 99% SQL injection, Path traversal and SSI injection attacks contained in web application security scanners.
The Application of the Project Management to the Approval Process of a New Product
Zavadilová, Veronika ; Novotný, Miroslav (referee) ; Smolíková, Lenka (advisor)
The master thesis deals with the application of the methodology of project management in a business case in the company Meopta - optika, s.r.o. following the product life cycle. After the company’s analysis, it evaluates the real project management solution focusing on the critical sides of project. The last chapter specifies solutions for effective project management and risk elimination.
Reputation-based Adaptation for Structured P2P Networks
Ladecký, Martin ; Novotný, Miroslav (advisor) ; Malohlava, Michal (referee)
The goal of this thesis is to implement reputation based trust management into the routing protocol of peer-to-peer network. This implementation is compared with current standard peer-to-peer security implementations - mostly no security at all and reputation based management without implementation in the routing mechanism. The objective is to improve routing performance and efficiency of secure algorithms.
Education to spirituality
Novotný, Miroslav ; Strouhal, Martin (referee) ; Pelikán, Jiří (referee)
The aim of this work is to create a pedagogical concept of the education for spirituality. I try to map the various views of human spirituality. The spirituality is one of the important philosophy topics, so I dedicated this view most. Next is the psychology, within witch I strive to grab this term in a scientific way. I also notice the changes in the perception of the term spirituality, namely in the relation to the religion, as well as to the usage of this term, which is equivalent to the previously frequently used term inwardness. Marginally I also mention some theories related to the spirituality in the field of biology, quantum physics and brain research. After the initiation of some way outs, from which can be created the conceptual apparatus, I come to my own definition of the spirituality, I concretize the education to the spirituality including the initiation of goals, methods and means of this education. The part of this work is also a small study, in which I try to find out, what is the degree of the respondents spirituality, what forms and methods do the respondents evolve their spirituality and I am looking for the contexts between the respondents characteristics by practicing the various technics and the spirituality rate. I suppose that this work could serve as a guide for teachers who would...
Trust Management Systems in P2P Networks
Novotný, Miroslav ; Zavoral, Filip (advisor) ; Janeček, Jan (referee) ; Fujita, Satoshi (referee)
The architecture of certain class of services, such as distributed computing, distributed storages or content delivering networks shifts from the traditional client-server model to more scalable and robust peer to peer networks. Providing proper protection to such complex, open and anonymous systems is very complicated. Malicious peers can cooperate and develop sophisticated strategies to bypass existing security mechanisms. Recently, many trust management systems for P2P networks have been proposed. However, their effectiveness is usually tested only against simple malicious strategies. Moreover, a complex comparison of resistance of a particular method is missing. In this thesis, we (1) propose a new trust management system called BubbleTrust and (2) develop a simulation framework for testing trust management systems against various malicious strategies. Our simulation framework defines several criteria which determine the success of each malicious strategy in the network with a given system. We present results of four trust management systems that represent main contemporary approaches and BubbleTrust.
The Quality of life for drug dependent clients before and after the institutional treatment in Prague
Brachtlová, Veronika ; Šťastná, Lenka (advisor) ; Novotný, Miroslav (referee)
BACKGROUND: Quality of life is defined by WHO as an individual perception of one's own position in life, taking into account cultural aspects of the society and a system of values in which the individual lives, as well as his/her goals, standard of living and interests. Because quality of life measure is strongly a subjective measure, it can only be assessed by the individual himself/herself. AIMS: The aim of this thesis was to compare of the quality of life of drug users before and after institutional treatment. SAMPLE AND METHODS: WHOQOL- BREF questionnaire was employed to collect the data. A research sample consisted of all clients (both men and women) in the institutional treatment at the department of treatment of dependencies at the Clinic of Addictology, The clients filled the questionnaire in before treatment entry or within the first week after treatment entry, and at the release from the treatment. RESULTS: None of the clients was very satisfied with his/her quality of life before treatment. After treatment, the quality of life was perceived as positive rather by women. After treatment, 44% of women found their quality of life good, whereas it was assessed as very good by 13% of women. The overall perception of the quality of life in the male population has not changed much. Regarding the...
Implementation of alternative metric in AODV protocol
Dajčár, Matej ; Novotný, Miroslav (advisor) ; Peterka, Jiří (referee)
There is a lot of alternative routing protocols used in wireless communications. One of these protocols is Ad Hoc On-Demand Distance Vector routing protocol (AODV). This protocol is used in the mobile ad-hoc networks which are self-configuring networks consisting of the independent mobile devices where each one of these devices acts as a router and forwards traffic from other devices. AODV protocol uses hop count as a routing metric, but in the many cases this metric is not optimal in the wireless networks. The goal of this thesis is to propose the alternative criteria which can be used to select best routes. An integral part of this thesis is the experimental implementations of suggested metrics which will be simulated and evaluated in the selected simulation tool. The conclusion of the thesis analyses results obtained from the simulations of the individual suggested versions.

National Repository of Grey Literature : 50 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.