451 research outputs found
Information System for ESN Section
Bakalářská práce se zaměřuje především na vytvoření informačního systému pro podporu hlavních procesů Medzinárodního studentského klubu Vysokého učení technického v Brně a jiných sekcí Erasmus Student Network. Práce obsahuje teoretickou část, popis současného stavu, jeho souhrn a návrh informačního systému.Bachelor thesis mainly focuses on designing an information system which supports main processes of International Students Club of Brno University of Technology and other sections of Erasmus Student Network. Thesis contains theoretical part, analysis of current state and proposal of information system.
Assessment of crisis readiness to move a patient from the airport with suspected Ebola
The aim of this article is to verify the readiness of patient transport from the airport
with symptoms for Ebola disease by the rescue services of the Integrated Rescue
System of the Czech Republic. Detection of possible risks and causes of risks during
patient transport. In one part of the article, the part is devoted to the current legislation
regulating the cooperation of IRS, economic measures for crisis situations, functions of
state material reserves management, material security of selected IRS components and
the work of BIOHAZARD TEAM. The main part of the article describes the course of
the extraordinary event. There is a chapter devoted to the analysis and evaluation of risks
during transport. It also deals with the issues of transport, risks and problems that may
be encountered by the intervening members of the IRS units. In conclusion, the proposed
measures to help minimize risks in the transport of infected patient
Females prefer extra-pair males that are older and better hunters
Age of male is an important cue in mate selection, including extra-pair copulations; different phenotypic and behavioural traits are known to be age related. Paternity studies show that older males predominate as fathers of extra-pair young. It remains unclear if females actively choose older males because they possess high quality traits or because older males are more successful in coercing fertile females. We experimentally provided mounted males of different age (yearling vs. adult) of great grey shrike Lanius excubitor with nuptial gifts of different quality (vole vs. cricket) and observed reactions of females and their social partners. Females strongly preferred older males with energy-rich nuptial gifts. The reactions of females’ social partner to the extra-pair male did not differ significantly amongst experimental groups. However, males responded to the reaction of their mates and male aggressive behaviour increased when their mate showed an interest in an intruder
Comparison of the intrusion detection system rules in relation with the SCADA systems
Increased interconnectivity, interoperability and complexity of communication in Supervisory Control and Data Acquisition (further only SCADA) systems, resulted in increasing efficiency of industrial processes. However, the recently isolated SCADA systems are considered as the targets of considerable number of cyber-attacks. Because of this, the SCADA cyber-security is under constant pressure. In this article we examine suitability of current state signature based Intrusion Detection System (further only IDS) in SCADA systems. Therefore, we deeply evaluate the Snort and the Quickdraw rules based on signatures in order to specify their relations to SCADA cyber security. We report the results of the study comprising more than two hundred rules. © Springer International Publishing Switzerland 2016
Comparative Analysis of Fatal Work Injuries and Fatal Traffic Accidents in the Czech Republic and Slovakia in 2017 and its Use in Risk Prevention
Zajištění bezpečnosti a ochrany zdraví při práci (BOZP)
je upraveno řadou právních předpisů, které se poměrně často
aktualizují, a je nezbytné sledovat jejich vývoj. Základním
kamenem pro správné a funkční zajištění BOZP je analýza rizik
na konkrétním pracovišti (činnosti). Cílem tohoto článku je
komparační analýza nejaktuálnějších smrtelných pracovních úrazů
a smrtelných dopravních nehod, které se staly na území ČR a SR
v roce 2017. Tato analýza může pomoci zaměstnavateli případně
odborně způsobilé osobě v prevenci rizik (OZO) správně odhadnou
riziko řízení motorového vozidla. Analýza rizik byla vyhotovena
pomocí FMEA analýzy.Health and safety at work (OSH) is governed by a number of
laws that are relatively frequently updated and it is necessary to
monitor their progression. A cornerstone for right and functional
occupational health and safety is risk analysis at a particular
workplace (activity). The aim of this article is a comparative
analysis of the most recent fatal injuries and fatal traffi c accidents
that occurred in the Czech Republic and Slovakia in 2017. This
analysis can help an employer or a competent person in risk
prevention (OZO) to correctly assess the risk of driving. Risk
analysis was conducted using FMEA analysis
Fuzzy logic as support for security and safety solution in soft targets
Security and safety situations in objects, which are categorized as soft targets, is difficult. The current solving is based on several different type of solving. Soft targets are specific objects, and it requires special software solution. The proposal is based on fuzzy logic. Fuzzy logic could apply more expert's knowledges and it could help owners and managers with adequate responses in critical situation, and also definition of adequate preventive actions. System solving could help effectivity of proposed measures. The decision making is based on this fuzzy logic support and aim is explained in paper.European Regional Development Fund under the project CEBIA-Tech Instrumentation [CZ.1.05/2.1.00/19.0376]; Internal Grant Agency of Tomas Bata University [IGA/FAI (CEBIA)/2016/12]; Ministry of the Interior of the Czech Republic [VI20152019049
Phase-shift Fault Analysis of Grain v1
This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the attacker is ableto desynchronize the linear and nonlinear registers of the cipherduring the keystream generation phase by either forcing one ofthe registers to clock one more time, while the other register is notclocked, or by preventing one of the registers from clocking, whilethe other register is clocked. Using this technique, we are able toobtain the full inner state of the cipher in reasonable time (under12 hours on a single PC) by using 150 bits of unfaulted keystream,600 bits of faulted keystreams and by correctly guessing 28 bitsof the linear register
- …