451 research outputs found

    Information System for ESN Section

    Get PDF
    Bakalářská práce se zaměřuje především na vytvoření informačního systému pro podporu hlavních procesů Medzinárodního studentského klubu Vysokého učení technického v Brně a jiných sekcí Erasmus Student Network. Práce obsahuje teoretickou část, popis současného stavu, jeho souhrn a návrh informačního systému.Bachelor thesis mainly focuses on designing an information system which supports main processes of International Students Club of Brno University of Technology and other sections of Erasmus Student Network. Thesis contains theoretical part, analysis of current state and proposal of information system.

    Assessment of crisis readiness to move a patient from the airport with suspected Ebola

    Get PDF
    The aim of this article is to verify the readiness of patient transport from the airport with symptoms for Ebola disease by the rescue services of the Integrated Rescue System of the Czech Republic. Detection of possible risks and causes of risks during patient transport. In one part of the article, the part is devoted to the current legislation regulating the cooperation of IRS, economic measures for crisis situations, functions of state material reserves management, material security of selected IRS components and the work of BIOHAZARD TEAM. The main part of the article describes the course of the extraordinary event. There is a chapter devoted to the analysis and evaluation of risks during transport. It also deals with the issues of transport, risks and problems that may be encountered by the intervening members of the IRS units. In conclusion, the proposed measures to help minimize risks in the transport of infected patient

    Females prefer extra-pair males that are older and better hunters

    Get PDF
    Age of male is an important cue in mate selection, including extra-pair copulations; different phenotypic and behavioural traits are known to be age related. Paternity studies show that older males predominate as fathers of extra-pair young. It remains unclear if females actively choose older males because they possess high quality traits or because older males are more successful in coercing fertile females. We experimentally provided mounted males of different age (yearling vs. adult) of great grey shrike Lanius excubitor with nuptial gifts of different quality (vole vs. cricket) and observed reactions of females and their social partners. Females strongly preferred older males with energy-rich nuptial gifts. The reactions of females’ social partner to the extra-pair male did not differ significantly amongst experimental groups. However, males responded to the reaction of their mates and male aggressive behaviour increased when their mate showed an interest in an intruder

    Comparison of the intrusion detection system rules in relation with the SCADA systems

    Get PDF
    Increased interconnectivity, interoperability and complexity of communication in Supervisory Control and Data Acquisition (further only SCADA) systems, resulted in increasing efficiency of industrial processes. However, the recently isolated SCADA systems are considered as the targets of considerable number of cyber-attacks. Because of this, the SCADA cyber-security is under constant pressure. In this article we examine suitability of current state signature based Intrusion Detection System (further only IDS) in SCADA systems. Therefore, we deeply evaluate the Snort and the Quickdraw rules based on signatures in order to specify their relations to SCADA cyber security. We report the results of the study comprising more than two hundred rules. © Springer International Publishing Switzerland 2016

    Comparative Analysis of Fatal Work Injuries and Fatal Traffic Accidents in the Czech Republic and Slovakia in 2017 and its Use in Risk Prevention

    Get PDF
    Zajištění bezpečnosti a ochrany zdraví při práci (BOZP) je upraveno řadou právních předpisů, které se poměrně často aktualizují, a je nezbytné sledovat jejich vývoj. Základním kamenem pro správné a funkční zajištění BOZP je analýza rizik na konkrétním pracovišti (činnosti). Cílem tohoto článku je komparační analýza nejaktuálnějších smrtelných pracovních úrazů a smrtelných dopravních nehod, které se staly na území ČR a SR v roce 2017. Tato analýza může pomoci zaměstnavateli případně odborně způsobilé osobě v prevenci rizik (OZO) správně odhadnou riziko řízení motorového vozidla. Analýza rizik byla vyhotovena pomocí FMEA analýzy.Health and safety at work (OSH) is governed by a number of laws that are relatively frequently updated and it is necessary to monitor their progression. A cornerstone for right and functional occupational health and safety is risk analysis at a particular workplace (activity). The aim of this article is a comparative analysis of the most recent fatal injuries and fatal traffi c accidents that occurred in the Czech Republic and Slovakia in 2017. This analysis can help an employer or a competent person in risk prevention (OZO) to correctly assess the risk of driving. Risk analysis was conducted using FMEA analysis

    Fuzzy logic as support for security and safety solution in soft targets

    Get PDF
    Security and safety situations in objects, which are categorized as soft targets, is difficult. The current solving is based on several different type of solving. Soft targets are specific objects, and it requires special software solution. The proposal is based on fuzzy logic. Fuzzy logic could apply more expert's knowledges and it could help owners and managers with adequate responses in critical situation, and also definition of adequate preventive actions. System solving could help effectivity of proposed measures. The decision making is based on this fuzzy logic support and aim is explained in paper.European Regional Development Fund under the project CEBIA-Tech Instrumentation [CZ.1.05/2.1.00/19.0376]; Internal Grant Agency of Tomas Bata University [IGA/FAI (CEBIA)/2016/12]; Ministry of the Interior of the Czech Republic [VI20152019049

    Phase-shift Fault Analysis of Grain v1

    Get PDF
    This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the attacker is ableto desynchronize the linear and nonlinear registers of the cipherduring the keystream generation phase by either forcing one ofthe registers to clock one more time, while the other register is notclocked, or by preventing one of the registers from clocking, whilethe other register is clocked. Using this technique, we are able toobtain the full inner state of the cipher in reasonable time (under12 hours on a single PC) by using 150 bits of unfaulted keystream,600 bits of faulted keystreams and by correctly guessing 28 bitsof the linear register
    corecore