<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://www.w3.org/2005/Atom">
<title>Fakulta aplikované informatiky</title>
<link href="http://hdl.handle.net/10563/1003176" rel="alternate"/>
<subtitle/>
<id>http://hdl.handle.net/10563/1003176</id>
<updated>2026-04-08T19:26:46Z</updated>
<dc:date>2026-04-08T19:26:46Z</dc:date>
<entry>
<title>Introduction to electromagnetic compatibility for electronic engineers</title>
<link href="http://hdl.handle.net/10563/1010427" rel="alternate"/>
<author>
<name>Pospíšilík, Martin</name>
</author>
<id>http://hdl.handle.net/10563/1010427</id>
<updated>2022-10-26T13:31:15Z</updated>
<published>2019-01-01T00:00:00Z</published>
<summary type="text">Introduction to electromagnetic compatibility for electronic engineers
Pospíšilík, Martin
</summary>
<dc:date>2019-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Logistic agent dispatch systems</title>
<link href="http://hdl.handle.net/10563/1006892" rel="alternate"/>
<author>
<name>Marecki, Franciszek</name>
</author>
<author>
<name>Bucki, Robert</name>
</author>
<author>
<name>Chramcov, Bronislav</name>
</author>
<author>
<name>Suchánek, Petr</name>
</author>
<id>http://hdl.handle.net/10563/1006892</id>
<updated>2021-05-25T10:58:15Z</updated>
<published>2015-01-01T00:00:00Z</published>
<summary type="text">Logistic agent dispatch systems
Marecki, Franciszek; Bucki, Robert; Chramcov, Bronislav; Suchánek, Petr
</summary>
<dc:date>2015-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Comparison of MCDM methods with users' evaluation</title>
<link href="http://hdl.handle.net/10563/1006650" rel="alternate"/>
<author>
<name>Králík, Lukáš</name>
</author>
<author>
<name>Šenkeřík, Roman</name>
</author>
<author>
<name>Jašek, Roman</name>
</author>
<id>http://hdl.handle.net/10563/1006650</id>
<updated>2025-10-16T07:25:21Z</updated>
<published>2016-01-01T00:00:00Z</published>
<summary type="text">Comparison of MCDM methods with users' evaluation
Králík, Lukáš; Šenkeřík, Roman; Jašek, Roman
This paper responds to requirement to improve the orientation between offered SW, as ITIL tools. There are really a lot of amount thus offered tools and very often leads to poor implementation of ITIL on the basis of incorrectly chosen tools. Main objective of this paper is to provide an overview about possibilities of choosing a suitable tool. Simultaneously, the research described in this paper will serve for further work on creating a methodology for evaluation of ITIL tools. © 2016 AISTI.
</summary>
<dc:date>2016-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Using information technologies in self-defense education</title>
<link href="http://hdl.handle.net/10563/1006651" rel="alternate"/>
<author>
<name>Lapková, Dora</name>
</author>
<author>
<name>Adámek, Milan</name>
</author>
<id>http://hdl.handle.net/10563/1006651</id>
<updated>2025-10-16T07:25:21Z</updated>
<published>2016-01-01T00:00:00Z</published>
<summary type="text">Using information technologies in self-defense education
Lapková, Dora; Adámek, Milan
This article is focused on possibilities of an implementation of information technologies in a learning of self-defense. The self-defense is a field which is more and more necessary in our life. During our research, we tried to find out if it is possible to connect information technologies with learning of self-defense for more effective results. We used VICON system for visualization of body motion and in the following steps we looked for differences between untrained and trained subjects. The result was a detection of significant differences and mistakes in self-defense techniques. In the future we will implement this finding to the training. © 2016 AISTI.
</summary>
<dc:date>2016-01-01T00:00:00Z</dc:date>
</entry>
</feed>
