National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Effectiveness of Sonographic Examinations in Prevention and Treatment of Developmental Hip Dysplasia
Zídka, Michal ; Džupa, Valér (advisor) ; Kokavec, Milan (referee) ; Šponer, Pavel (referee)
Purpose: The aim of the study is to demonstrate the success of early detection and the efficacy of early hip dysplasia treatment within neonatal hip screening in the Czech Republic. Measures are proposed to optimize follow-up and maintain long-term sustainability of the newborn care. Materials and Methods: 316 children with various degrees of hip involvement were detected by "triple sieve" orthopedic screening system. Diagnosis and treatment were monitored by clinical and sonographic examinations (according to Graf). The risk factors, their influence on the treatment course, the effectiveness of outpatient treatment using abduction devices, timing and duration of treatment and participation in follow-up were evaluated. Furthermore, data analysis on national hip arthroplasty register was performed in patients treated for sequels of hip dysplasia. These data were correlated (in order to assess their efficacy) with methods of dysplasia detection at the time these patients were born. Results: Conservative treatment was successful in 98.7 % of 316 treated children. Only 31 % of children had a positive clinical finding. Positive family history showed no significance either for detection or treatment course. The breech position correlated significantly with the incidence of hip dysplasia - OR = 2.80 (99%...
Web security
Zídka, Michal ; Pícka, Marek (advisor) ; Martínek, Tomáš (referee)
Bachelor thesis introduces the basic terms related to work on the website. Describes the various threats. Defines the term hacker and describes three techniques of a server attack-denial of access and attacks phishing, pharming and MITM. It shows a view on the security of the client (user) and technologies that are used to protect the server. There is also a part with an example of phishing attacks, which are created by the author and simulated on fictional website. Author is testing the phishing attacks on reality-based simulation by himself.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.