261 research outputs found

    On grounded L-graphs and their relatives

    Get PDF
    We consider the graph class Grounded-L corresponding to graphs that admit an intersection representation by L-shaped curves, where additionally the topmost points of each curve are assumed to belong to a common horizontal line. We prove that Grounded-L graphs admit an equivalent characterisation in terms of vertex ordering with forbidden patterns. We also compare this class to related intersection classes, such as the grounded segment graphs, the monotone L-graphs (a.k.a. max point-tolerance graphs), or the outer-1-string graphs. We give constructions showing that these classes are all distinct and satisfy only trivial or previously known inclusions.Comment: 16 pages, 6 figure

    IN THE NAME OF THE VICTIM: VICTIM PERSPECTIVE IN CRIMINAL PROCEEDINGS WITH FOCUS ON POST – SENTENCE LEVEL

    Get PDF
    The probation service was introduced into the Criminal Justice System of the Czech Republic in 2001. From the beginning, in terms of content and organization, its work was based on the principles of restorative justice. The practice of probation officers is directed in this regard at the resolution of the problem; it does not engage only the offender but also the victim and the local community, who may participate in the process of resolving the consequences of the crime. The conditions for the realization of the process of mediation are set in the special legislative framework that provides for mediation between the victims and the perpetrators under the jurisdiction of all courts in the Czech Republic, and this procedure is free for all participants. There is a regional centre in every region of the Czech Republic (the country is divided into 13 regions), as well as in the metropolitan area of its capital, Prague. Mediation between the perpetrator and the victim has become one of the most important activities and most effective methods in the work of Czech probation officers when it comes to restorative justice.Probacijska služba u kazneno-pravnom sustavu u Češkoj Republici uvedena je 2001. godine. Od samog početka, u sadržajnom i organizacijskom smislu postavljena su pitanja o tome kako djelovanje službe postaviti na restorativnim osnovama. Praksa probacijskih službenika usmjerena je u tom smislu da se u razrješavanju problema ne angažira samo počinitelja kaznenog djela, nego i žrtvu, ali i lokalnu zajednicu koja treba sudjelovati u postupku razrješavanja posljedica kaznenog djela. Uvjeti za ostvarenje procesa medijacije postavljeni su posebnim zakonodavnim okvirom koji osigurava medijaciju između žrtve i počinitelja na područjima svih sudova u Češkoj Republici, a taj je postupak za sve sudionike besplatan. U svakoj regiji u Češkoj Republici postoji jedan regionalni centar (Češka Republika je podijeljena u 13 regija), a jedan je za područje glavnog grada Praga. Medijacija između počinitelja i žrtve kaznenog djela postala je jedna od najvažnijih aktivnosti i učinkovitih sredstava u radu čeških probacijskih službenika kada je riječ o restorativnoj pravdi

    On grounded L-graphs and their relatives

    Get PDF
    We consider the graph class Grounded-L corresponding to graphs that admit an intersection representation by L-shaped curves, where additionally the topmost points of each curve are assumed to belong to a common horizontal line. We prove that Grounded-L graphs admit an equivalent characterisation in terms of vertex ordering with forbidden patterns. We also compare this class to related intersection classes, such as the grounded segment graphs, the monotone L-graphs (a.k.a. max point-tolerance graphs), or the outer-1-string graphs. We give constructions showing that these classes are all distinct and satisfy only trivial or previously known inclusions

    Fears in Adolescence

    Get PDF
    Fear is a natural and useful companion of human beings throughout their whole lifespan. The study tries to map the fears of 15-year old adolescents. It is based on data collected as part of the ELSPAC project (European Longitudinal Study of Pregnancy and Childhood). On the basis of the "Cake of Fear" method, subjective responses about the contents of fears were collected. These contents were categorized into 19 general categories, which cover a wide range of the topic. With the number of fears ranging from 0 to 22, respondents reported 5.3 on average. The category Fear of losing someone, fear for somebody/something occupies first position, with fears related to death and concerns about friends and family being most prominent. Generalised fears are ranked second, noticeably represented with fears of failure and the future. The third largest category is the category of school-related fears. Differences in the incidence of fears are discussed regarding gender and developmental stage

    Security of wireless computer networks

    Get PDF
    Diplomová práce se zaobírá problematikou bezdrátových lokálních sítí (WLAN) z hlediska bezpečnosti a funkčního principu zabezpečovacích mechanismů. Přechod do problematiky zabývající se bezpečností je provázen metodami bezdrátového přenosu dat, působícími na úrovni fyzické vrstvy (FHSS, DSSS, OFDM, MIMO), za čímž následuje přehled jednotlivých standardů 802.11. Dále je věnována část problematice sdíleného média (CSMA/CA), rušícím vlivům a opravným mechanismům (RTS/CTS). V rámci bezpečnosti jsou hlouběji popsány principy autentizace spolu s používanými metodami zabezpečení (WEP, WPA, WPA2). První část bezpečnosti probírá problematiku dnes již nevyhovujícího zabezpečení v podobě protokolu WEP, kde je poukázáno na nedokonalou implementaci a rizika z ní vyplývající. Následující část popisuje zabezpečení v podobě WPA, které odstraňuje implementační nedostatky předchozího zabezpečení WEP. Součástí je popis používaných mechanismů autentizace (PSK, 802.1x), potřebná správa dočasných klíčů (PTK, GTK), dále integrita dat (MIC) a šifrování využívající protokol TKIP. Poslední část, možného zabezpečení WLAN, je zaměřena na plnou podporu standardu 802.11i, která je označována jako WPA2 (někdy RSN). V této části je popsán základní bezpečnostní prvek CCMP zajišťující šifrování, který je založen na režimech blokové šifry AES. Praktická část diplomové práce je zaměřena na ověření bezpečnosti současných bezdrátových sítí. Při ověřování je využito dostupných HW prostředků a programových nástrojů z oblasti Open Source Software (OSS). Ověřením je poukázáno na možná bezpečnostní rizika plynoucí z použité metody zabezpečení a je uvedeno několik doporučení, jak snížit bezpečnostní rizika použité metody na minimum.The master's thesis deals with the issue of Wireless Local Area Network (WLAN) from the viewpoint of the security and functional principle of security mechanisms. The transition to the issue concerning the security is accompanied by the methods of wireless data transmission operating on the level of physical layer (FHSS, DSSS, OFDM, MIMO), which is followed by the summary of individual 802.11 standards. The next part deals with the issue of shared transmission medium (CSMA/CA), influence of interference and correcting mechanisms (RTS/CTS). Within the security, the principles of the authentication along with the commonly used methods of security (WEP, WPA, WPA2) are described in detail. The first part concerning security deals with the security in the form of the WEP protocol, which is considered insufficient nowadays and points out the imperfect implementation and the consequent risks. The following part describes the security in the form of WPA which eliminates the implementation weaknesses of the previous WEP security protocol. The description of commonly used mechanisms of authentication (PSK, 802.1x), required temporary key management (PTK, GTK), data integrity (MIC) and encryption which uses TKIP protocol are also included. The last part, possible WLAN security, is aimed at the full support of 802.11i standard, which is called WPA2 (sometimes RSN). That part describes the basic encryption security element CCMP, which is based on the AES block cipher modes. The practical part of the thesis deals with the security verification of current wireless networks. In the process of verification the accessible HW means and programming tools of Open Source Software (OSS) are used. By means of verification it has been pointed out that there are possible security risks resulting from the security method which has been used. Also several recommendations how to reduce the security risks of the used method to minimum are mentioned.
    corecore