National Repository of Grey Literature 29 records found  beginprevious20 - 29  jump to record: Search took 0.02 seconds. 
Use of Dog in Occupational Therapy
Fílová, Zuzana ; Machová, Kristýna (advisor) ; Chaloupková, Helena (referee)
Main topics of the bachelor´s thesis are possible ways of the dog´s use in occupational therapy. Occupational therapy, as a therapeutic method, its history, definition and main goals are described in the thesis. The following part is depicting animal assisted therapies, their application and functioning principles. Various studies show that animal assisted therapies have a whole range of positive effects on clients´ physical and mental health as well as they can help clients with social integration. All these areas simultaneously belong to occupational therapy practice and comply with main goals of occupational therapy. Thus use of dogs in occupational therapy has been well justified. Possible ways of dog´s use in occupational therapy in area of mental health are listed in the thesis, such as the effect of the presence of the dog on the psychological well-being of patients and the use of dog to relieve the feeling of inferiority among mentally ill patients. The dog also seems to be very appropriate and effective incentive element for communication and cooperation with the therapeutist and social interaction. The dog can also motivate people to physical activity. Possible ways of dog´s use in occupational therapy in area of physical health are also listed in the thesis. This work describes the effect of the dog to cope with pain in hospitalized patients. Very important is the use of the dog as a compensatory tool. In this thesis is mentioned that the animal assisted therapies and the use of the dog in occupational therapy needs further research supported by adequate evidence. Integral parts of the thesis are several designs of canistherapeutical units, which show particular use of the dog in occupational therapy. These canistherapeutical units were designed in collaboration with occupational therapists.
ACP Protocol in Payment Systems
Kunc, Jaroslav ; Burda, Karel (referee) ; Strašil, Ivo (advisor)
Bachelor's thesis focuses on the protocol for the cryptographic systems in payment systems developed for ÚTKO. The thesis analyses now used protocols for electronic payment systems. The thesis describes the basic principle of AAA protocols (Authentication, Authorization and Accounting) and the basic principle of ACP protocol. The thesis includes a discussion of the objectives of the new system for payment transactions and discussion about anonymity of this transactions. The next object of this thesis is to develop scenarios inclusive protocol ACP in electronic payment systems and evaluate this scenarios.
ACP Protocol in Payment Systems
Kunc, Jaroslav ; Burda, Karel (referee) ; Strašil, Ivo (advisor)
Bachelor's thesis focuses on the protocol for the cryptographic systems in payment systems developed for ÚTKO. The thesis analyses now used protocols for electronic payment systems. The thesis describes the basic principle of AAA protocols (Authentication, Authorization and Accounting) and the basic principle of ACP protocol. The thesis includes a discussion of the objectives of the new system for payment transactions and discussion about anonymity of this transactions. The next object of this thesis is to develop scenarios inclusive protocol ACP in electronic payment systems and evaluate this scenarios.
Definition of principal material directions in the abdominal aortic aneurysms
Bartoňová, Petra ; Slažanský, Martin (referee) ; Polzer, Stanislav (advisor)
This bachelor thesis deals with definitions of principal material directions in idealized geometrical models. The theoretical part is particularly focused on general information of vascular system and abdominal aortic aneurysms in the field of anatomy, histology and surgery, afterwards it is concentrated on the biomechanical point of view. Consequently, the created algorithm is described and used to compare different definitions of principal directions considering the maximum principal stress. In conclusion, the results of FEM analyses are evaluated with respect to further study of this issue.
Authenticing Active Devices in Identity-Based Networking Services
Lomnický, Marek ; Lampa, Petr (referee) ; Matoušek, Petr (advisor)
Main goal of this thesis is to study and test network access based on IBNS technology giving possibility to design flexible security policy based on user's identity and rights that is transparent to physical network components.
Secure network based on CISCO systems
Wagner, Zdeněk ; Beran, Jan (referee) ; Macho, Tomáš (advisor)
This work deals with the matter of Virtual Private Network (VPN) utilizing both contemporary and older protocols and the possibilities of their use. Among the most interesting parts there are those presenting various ways of use of the VPN technology, IPSec protocol, IOS SSLVPN and RSA server with HW token ensuring the two-factor user authentication.
Test implementation of the ACP protocol
Ležák, Petr ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
In general this master’s thesis deals with access control methods and their individual modules and in particular with authentication of supplicants. There are listed authentication methods useful in the implementation of the ACP protocol. ACP protocol is also discussed including possibilities and uses. ACP message format is described in detail with AVP format and types. The transaction mechanism is also mentioned here. The main part of the thesis is focused on software design for protocol testing. Possibilities of the testing are discussed and test scenarios are suggested. Consequently, requirements for test software are listed and its implementation is designed. Furthermore, there is technical documentation of the program. The main ideas used in the program are explained in it. The purpose of each part of the program is written including links between them. Finally, there is a manual for the program. It also contains an illustrative example describing how to make and test a simple scenario of the authentication.
CISCO security laboratory exercise
Švec, Martin ; Hajný, Jan (referee) ; Pelka, Tomáš (advisor)
The main purpose of this diploma thesis is to become familiar with the principles and technical solutions regarding security components of Cisco company and configure assigned system according to valid rules of security. In introduction are explained the reasons for networks security solutions. This work also analyses different kinds of security weaknesses which include deficiencies of networks protocols and also the attacks from hackers. The principle of firewall is described and also its particular types. This work is focused on explanation and classification of PIX firewall, which has dominant role in the field of network security. The other equipments of Cisco, which are improving the level of security, are also mentioned. The practical part of this diploma thesis is composed of networks connections and configuration of system consisting of router, PIX firewall and switch. It also includes the detailed procedure and description of configuration of network equipments. The focus is put on minimalization of threats and elimination of DoS attacks.
Establishment of the Linux internet gateway using advanced filtering
Matocha, Tomáš ; Pust, Radim (referee) ; Jelínek, Mojmír (advisor)
The thesis Establishment of the Linux internet gateway using advanced filtering focuses on~the installation of~the Linux operating system on~the older computers, that functions as a gateway to connect clients in the internal network to the Internet. The thesis describes creation an advanced filter with using iptables. Shows some types of security against attacks from the Internet. The other chapters are discussed, advanced traffic control mechanism (such as a TC and a qdisc). The system queue, it is highly beneficial where it is necessary to hierarchically divide traffic between users. It describes types of queue and assembled configurations for clients in the internal network. Next chapter describes the DNS server caching-only type and application denyhosts, which increases the overall security system. Have your own DNS server is certified, especially if we want to reduce the data traffic. Last chapter describes the RADIUS server and its implementation using Apache and MySQL database. Furthermore, the configuration options are described and the examples of the particular configurations are provided. Finally, it presented a system for authentication through the RADIUS server. The thesis seeks to provide a~complex view of security and filtering.
Solution of the authentification and authorization for wireless local networks
Čížek, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis is about available priciples and methods of authentication and authorization in wireless local area networks. First part is about available methods of authentication with short description each of them and usage analysis for small and middle-sized wireless networks. There is a project of authentication and authorization for school wireless network of three access points in the second part of the thesis, including description of Mikrotik RouterOS configuration and FreeRadius configuration. In the end of the thesis there is a project tests and usage analysis.

National Repository of Grey Literature : 29 records found   beginprevious20 - 29  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.