National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Pre-processing of acquired data for system identification purposes
Horáková, Eva ; Chlápek, Petr (referee) ; Máša, Vítězslav (advisor)
The present bachelor’s thesis follows a methodology of data processing for the experimental system identification. Summarizes basic principles of experimental identification and describes a general methodology of experimental data processing. Next part of thesis attends to describing a building of compact data file, that contains selected variables including calculation of other important variables. Measurements to obtain experimental data was realized on real technology, which is a unit of biomass and phytomass combustion, power of unit is 1 MW. The work also includes selection and evaluation of appropriate intervals for an identification of this unit and their graphic presentation.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Perception of new media as a threat on an example of Black Mirror series
Ivanovová, Karolína ; Reifová, Irena (advisor) ; Švelch, Jaroslav (referee)
Thesis Perception of new media as a threat on an example of Black Mirror series deals with the Black Mirror series viewers' stand on new media threats. The aim is to detect if the series affected their opinions or behavior with new media in any way. This aim will be persuaded by using the method of semi-structured interviews. The topic of new media and their negative impacts on individuals and society is in sociology represented increasingly. Black Mirror series literally aiming to set up a black mirror for our lives with ever-evolving technologies adds a value that can affect the respondents' emotions and opinions on this topic. The theoretical part describes the transitions of society in modern day - concept of network society and risk society and explains the terms threat and risk. Furthermore, the thesis focuses on current new media threats. The second, practical, part describes the specific methodological procedures used in this thesis and thus the methods of thematic analysis and methods of qualitative interviews. This will be followed by a description of the research steps, a description of the results and the results interpretation.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Pre-processing of acquired data for system identification purposes
Horáková, Eva ; Chlápek, Petr (referee) ; Máša, Vítězslav (advisor)
The present bachelor’s thesis follows a methodology of data processing for the experimental system identification. Summarizes basic principles of experimental identification and describes a general methodology of experimental data processing. Next part of thesis attends to describing a building of compact data file, that contains selected variables including calculation of other important variables. Measurements to obtain experimental data was realized on real technology, which is a unit of biomass and phytomass combustion, power of unit is 1 MW. The work also includes selection and evaluation of appropriate intervals for an identification of this unit and their graphic presentation.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.