National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Welding of sub-parts of Kaplan turbine
Keprt, Michal ; Daněk, Ladislav (referee) ; Kubíček, Jaroslav (advisor)
Aim of this work is description of design and manufacturing by welding technology of adjustable runner blades circle of Kaplan turbine. For designing and its subsequent strength control using the finite element method were performed with using static analysis in the program SolidWorks ® 2013. Material of adjustable runner blades circle's parts was designed S 355 J2 G3, which is able to withstand a given load. In the design of technology of welding there was elected MAG-welding method, with the active gas mixture Ar +18% CO2. Additive material for welding will be OK Autrod 12.51, like it‘s marked by ESAB s.r.o. For each weld is necessary to create the welding edge, which is made on computer controlled machining machines. In the production we require strict adherence to the prescribed workflow and compliance with WPS protocol. After welding and machining of adjustable runner blades circle we will make weld test, visual examination, dye penetrant and ultrasonic examination.
Attacks on Standard 802.11
Burian, Vojtěch ; Horváth, Tomáš (referee) ; Novotný, Bohumil (advisor)
Thesis is concerned about standard 802.11 especially wireless network security in historical and in current way. First part is focused on WEP secured wireless network problematics. Consequently, in different point of view we are focused on network security which was developed recently, for example WPA and WPA2 security. It will be marked the basic functioning and brief overview of standard 802.11, introduction to the known attacks on wireless network security and also indicate the main mistakes. Many older devices have only WEP security. Therefore, in this thesis is designed better and more coherent system of security of the WEP protocol. As well modern methods of security WPA and WPA2 are included. Second part is focused on the simulation of attack on security networks. In this part the problematic with beaking security WEP, WPA and WPA2 is discussed.
Welding of sub-parts of Kaplan turbine
Keprt, Michal ; Daněk, Ladislav (referee) ; Kubíček, Jaroslav (advisor)
Aim of this work is description of design and manufacturing by welding technology of adjustable runner blades circle of Kaplan turbine. For designing and its subsequent strength control using the finite element method were performed with using static analysis in the program SolidWorks ® 2013. Material of adjustable runner blades circle's parts was designed S 355 J2 G3, which is able to withstand a given load. In the design of technology of welding there was elected MAG-welding method, with the active gas mixture Ar +18% CO2. Additive material for welding will be OK Autrod 12.51, like it‘s marked by ESAB s.r.o. For each weld is necessary to create the welding edge, which is made on computer controlled machining machines. In the production we require strict adherence to the prescribed workflow and compliance with WPS protocol. After welding and machining of adjustable runner blades circle we will make weld test, visual examination, dye penetrant and ultrasonic examination.
Attacks on Standard 802.11
Burian, Vojtěch ; Horváth, Tomáš (referee) ; Novotný, Bohumil (advisor)
Thesis is concerned about standard 802.11 especially wireless network security in historical and in current way. First part is focused on WEP secured wireless network problematics. Consequently, in different point of view we are focused on network security which was developed recently, for example WPA and WPA2 security. It will be marked the basic functioning and brief overview of standard 802.11, introduction to the known attacks on wireless network security and also indicate the main mistakes. Many older devices have only WEP security. Therefore, in this thesis is designed better and more coherent system of security of the WEP protocol. As well modern methods of security WPA and WPA2 are included. Second part is focused on the simulation of attack on security networks. In this part the problematic with beaking security WEP, WPA and WPA2 is discussed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.