National Repository of Grey Literature 132 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
To experience
Strohnerová, Tereza ; Stibitz, Bibiana (referee) ; Mléčka, Jan (advisor)
Space for the birth of new life, providing women and their families with continuous care in an intimate and safe environment. This could be the first birthing center in the Czech Republic. A concept of care, tested over the years and through studies abroad, offering women the option to choose it as one of the birthplace options. In the thesis, a birthing center in the countryside is created using a model situation. It will be located in a calm and family-oriented environment, in connection with the Krnov maternity hospital.
Perception of patient privacy
HOFREITEROVÁ, Anna
The bachelor's thesis dealt with the issue of patient privacy in hospital facilities. The aim of this work was to find out how patients hospitalized in the inpatient ward perceive privacy, how nurses perceived patient privacy and in what ways nurses ensured the privacy of patients in the inpatient ward. Three research questions were set to investigate how patients hospitalized in an inpatient ward perceive privacy. Furthermore, they focused on the nurses' view of the perception of patient privacy and the ways in which nurses ensure the privacy of patients hospitalized in the inpatient ward. In the theoretical part, the work defines basic terms related to patient privacy, such as the duty of confidentiality, providing information with the patient's consent, providing information without the patient's consent, patients' rights, medical documentation, human needs and ensuring the privacy of patients during selected nursing procedures. In order to achieve the goal, the qualitative research method, the interview method and the semi-structured interview technique were used for patients hospitalized in the internal inpatient ward and for the nurses caring for these patients, as well as for patients hospitalized in the surgical inpatient ward and for the nurses caring for these patients. The research sample consisted of 6 patients and 5 nurses. The results of the obtained data led to the finding that the nurses had adequate knowledge regarding the issue of dealing with sensitive patient information. Nurses had adequate knowledge of procedures to protect patient privacy, although not all nurses used these procedures in practice. The research investigation further revealed that patients hospitalized in inpatient wards often did not think about their own privacy in the hospital environment, and the issue of privacy was a problematic and difficult topic for them to talk about. If the management of the investigated hospital is interested in the results of the investigation, they will be provided with them.
Need of intimacy of patients women 65+
NOVÁKOVÁ, Pavlína
The aim of this bachelor's thesis was to determine the status of the needs for intimacy and privacy of elderly women aged 65+ in a nursing home. Elderly women lose part of their privacy by entering such a facility. According to their degree of dependence on care, their intimate zone is violated during nursing care. I used the method of non-standardized interviews and direct covert participant observation to find out how the elderly women feel and cope in such situations. I collected data from 10 female clients and 4 members of the nursing staff of the Stachy-Kusov Nursing Home. The group of female clients was deliberately selected to represent seniors of different levels of self-care, mobility and care dependency. All nursing professions were represented among the staff. In the interviews, I explored how the clients felt in situations where they had to surrender some of their privacy and intimacy, how they coped with these feelings, and asked about their willingness and ability to communicate these topics. I investigated how nursing staff perceived these facts, their ability to empathize and communicate non-verbally with the elderly women in their care. From the data obtained, I drew conclusions regarding the saturation of the seniors' need for intimacy. It shows that individual approach with kindness and consideration is important to improve the feelings of care recipients. It is always necessary to act in the interest of preserving the dignity of the clients, to leave them the right to make decisions for themselves, not to reduce their capacity for self-care and to offer the possibility of relaxation through positive experiences or activities. In my research, the insufficient number of direct care workers to meet the individual needs of clients and the related lack of time that can be devoted to each client proved to be the limiting factor.
Facial Recognition in Video and its Applications in Law Enforcement
Fabián, Jan ; Šťastná, Dagmar (referee) ; Šedrlová, Magdalena (advisor)
This bachelor thesis aims to describe the facial recognition technology and its use in practice. In recent years, facial recognition technology became a heavily discussed topic, whether in connection with the deployment of this technology in China or due to its general potential for law enforcement. Facial recognition technology is a perfect example of a two-sided coin, as it brings many new possibilities of crime prevention etc. but also has the risk of being used to invade personal privacy. This thesis is based on a literature survey of some of the available resources dealing with this topic. It focuses on the history of this technology, methods used by facial recognition and mentions some examples of the use of video-based facial recognition in practice along with the social risks of the application of this technology.
Security and Privacy in IoT
Utěkal, Josef ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor's thesis deals with the topic of security and privacy in the field of Internet of Things (IoT), for which resource constrained devices are typical. It is very important to find a suitable operating system that, in addition to low computational requirements, would also offer the desired functionality for these constrained IoT devices, such as real-time capabilities. OS RIOT seems to be the one for IoT. It enables you to run applications written in C language on any supported hardware -- in this bachelor's thesis specifically on Arduino Uno and Arduino Due. The thesis also describes several cryptographic libraries that are supported by OS RIOT. The aim is to implement selected cryptographic libraries and measure their computational and memory requirements on both Arduino devices. This is preceded by a theoretical and practical familiarization with OS RIOT, which is realized by creating the first project, and measuring the computational complexity of each cryptographic function of the WolfSSL library on the Raspberry Pi 4 Model B.
The Grid
Gajdošík, Andreas ; Magid, Václav (referee) ; Krekovič, Slavomír (advisor)
Work aims at consequences of fully developed infrastructure of web 2.0 and its wide social acceptance, which with cheap computing power leads to massive data interpretation. In relation to that this work uses public Facebook's data about user activity at right wing oriented Facebook pages which gathers and statisticaly analyzes. Result is then showed at web page which is designed to look close to the look of extreme right wing webs. Positive first sight impression of right wing sympathizers is then eroded with not so good empirical statistics. Under 100 users are commenting quite often so this right wing craziness looks like a small movement in the end. Therefore Grid stands somewhere between amateur sociol research and artistic intervention into public media space.
Comparison of Security and Privacy Web Extensions
Petráňová, Jana ; Bednář, Martin (referee) ; Polčák, Libor (advisor)
This work concerns the introduction and comparison of available filter lists and security and privacy web extensions. Furthermore, it describes the dangers the user is facing while browsing the internet and outlines the risks said web extensions are meant to protect the user from. This work involves the design and implementation of a testing environment created with the purpose of comparing said web extensions. The aim of this work is to compare security and privacy web extensions currently available on the market and to to shed light on the risks of internet browsing to an everyday user with the intend to recommend optimal web extensions based on their needs.
The Students themselves - Student Center Poříčí
Šťastná, Jitka ; Hrubý, Jan (referee) ; Marek, Jiří (advisor)
diferent student dwelling, privacy, own space (room) // social space, living spaces, terrace
Cryptographic Protection of Digital Identity
Dzurenda, Petr ; Švenda,, Petr (referee) ; Castella-Roca, Jordi (referee) ; Hajný, Jan (advisor)
Dizertační práce se zabývá kryptografickými schématy zvyšující ochranu soukromí uživatelů v systémech řízení přístupu a sběru dat. V současnosti jsou systémy fyzického řízení přístupu na bázi čipových karet využívány téměř dennodenně většinou z nás, například v zaměstnání, ve veřejné dopravě a v hotelech. Tyto systémy však stále neposkytují dostatečnou kryptografickou ochranu a tedy bezpečnost. Uživatelské identifikátory a klíče lze snadno odposlechnout a padělat. Funkce, které by zajišťovaly ochranu soukromí uživatele, téměř vždy chybí. Proto je zde reálné riziko možného sledovaní lidí, jejich pohybu a chovaní. Poskytovatelé služeb nebo případní útočníci, kteří odposlouchávají komunikaci, mohou vytvářet profily uživatelů, ví, co dělají, kde se pohybují a o co se zajímají. Za účelem zlepšení tohoto stavu jsme navrhli čtyři nová kryptografická schémata založená na efektivních důkazech s nulovou znalostí a kryptografii eliptických křivek. Konkrétně dizertační práce prezentuje tři nová autentizační schémata pro využití v systémech řízení přístupu a jedno nové schéma pro využití v systémech sběru dat. První schéma využívá distribuovaný autentizační přístup vyžadující spolupráci více RFID prvků v autentizačním procesu. Tato vlastnost je výhodná zvláště v případech řízení přístupu do nebezpečných prostor, kdy pro povolení přístupu uživatele je nezbytné, aby byl uživatel vybaven ochrannými pomůckami (se zabudovanými RFID prvky). Další dvě schémata jsou založena na atributovém způsobu ověření, tj. schémata umožňují anonymně prokázat vlastnictví atributů uživatele, jako je věk, občanství a pohlaví. Zatím co jedno schéma implementuje efektivní revokační a identifikační mechanismy, druhé schéma poskytuje nejrychlejší verifikaci držení uživatelských atributů ze všech současných řešení. Poslední, čtvrté schéma reprezentuje schéma krátkého skupinového podpisu pro scénář sběru dat. Schémata sběru dat se používají pro bezpečný a spolehlivý přenos dat ze vzdálených uzlů do řídící jednotky. S rostoucím významem chytrých měřičů v energetice, inteligentních zařízení v domácnostech a rozličných senzorových sítí, se potřeba bezpečných systémů sběru dat stává velmi naléhavou. Tato schémata musí podporovat nejen standardní bezpečnostní funkce, jako je důvěrnost a autentičnost přenášených dat, ale také funkce nové, jako je silná ochrana soukromí a identity uživatele či identifikace škodlivých uživatelů. Navržená schémata jsou prokazatelně bezpečná a nabízí celou řadu funkcí rozšiřující ochranu soukromí a identity uživatele, jmenovitě se pak jedná o zajištění anonymity, nesledovatelnosti a nespojitelnosti jednotlivých relací uživatele. Kromě úplné kryptografické specifikace a bezpečnostní analýzy navržených schémat, obsahuje tato práce také výsledky měření implementací jednotlivých schémat na v současnosti nejpoužívanějších zařízeních v oblasti řízení přístupu a sběru dat.
Student Housing
Golík, Pavel ; Todorov, Petr (referee) ; Pelčák, Petr (advisor)
The architectural study built block the northern corner of town in close proximity to the center of Brno. The main thrust of the solution is particularly easy throughput area, pedestrian safety and ease of orientation in space. The architectural study of student housing is the first step change in the given locality by regulatory plan. The intention was to broken and fragmented forms of buildings to bring the urban elements, the wide streets, passages, squares and courtyards, which will evaluate and develop the character and vitality of the place. Architectural building block concept takes into account noise pollution site and responds to a bad indication, due to the north. New built-in design and layouts are designed so as to reduce the noise levels of interior space and create a resting zone in courtyard.

National Repository of Grey Literature : 132 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.