National Repository of Grey Literature 31 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Optimizing JShelter Performance
Zmitko, Martin ; Polčák, Libor (referee) ; Hranický, Radek (advisor)
This thesis aims to lessen the impact of JShelter on the browsing experience. The goal was accomplished by measuring the performance of JShelter and analyzing the hotspots that impacted browsing performance the most. Finally, optimizations based on analysis results while leaving the high provided level of protection uncompromised were proposed and implemented. JShelter's fingerprinting protections based on image and audio data processing were optimized by extending them with a more efficient implementation using WebAssembly, which, in some cases, was faster by up to 50 times. The performance while loading web pages was increased with changes in configuration loading and injection mechanisms, on average by 13.5 %.
Analysis of Software Resource Consumption
Míchal, Ondřej ; Fiedor, Jan (referee) ; Pavela, Jiří (advisor)
Spotřeba softwarových zdrojů je široce a aktivně zkoumanou oblastí. Z mnoha zdrojů v softwaru, které lze profilovat, byla spotřeba energie dlouho jediným zdrojem, který neměl mnoho obecných, a přesto komplexních, profilerů. V době mobilních zařízení a výkonných výpočetních jednotek je poptávka po takových profilerech neustále rostoucí. V této práci zkoumáme metody pro přesné měření spotřeby energie softwaru. Na jejich základě vytváříme open-source profiler a implementujeme komplexní vizualizér profilovaných dat. S vytvořeným profilerem pak provádíme řadu experimentů, abychom předvedli jeho schopnosti a demonstrovali užitečnost měření spotřeby energie softwaru.
Profiling of Embedded Applications
Koleček, František ; Mrázek, Vojtěch (referee) ; Strnadel, Josef (advisor)
This thesis is about profiling of embedded applications. The thesis is focused primarily on the ARM Cortex-M platform. The theoretical part of this thesis contains explanation of basic principles and terms associated with profiling and development of embedded applications. The thesis also summarizes existing profiling methods and tools associated with this topic. The goal of the practical part of this thesis is to use the chosen means to profile various parameters and evaluate the results. I decided to implement a library containing profiling tools, which allow for execution time measurement and stack usage measurement. Results obtained using this library were analyzed by calculating the measurement uncertainty.
The Dilemmas of Surveillance Profiling: The Case of the United States
Petrosyan, Davit ; Střítecký, Vít (advisor) ; Tesař, Jakub (referee)
1 Introduction to the Thesis and the Importance of the Topic The sorting and the categorization of individuals and groups by their capacity and inclination to risky behavior or level of dangerousness has been and remains an essential function of security apparatus of the state and a vital component in state security. Practices of this kind became even more important in the age of international terror. The western world and specifically the United States has been the primary target of international terror suffering numerous terrorist attacks including the 9/11 attacks that became thedefining moment of how security functions in themodern world. While what we call "western world" is dominantly defined by liberal democratic political order, many of its societies and specifically the US is also defined by atechnology-enabled environment that scholarship characterizes as "surveillance society" (Gandy 1989, Lyon 2001, Lyon & Bauman 2012). Withintechnology-enabled environments the technologization of security was inevitable (Ceyhan 2008), and the 9/11 generated even more intense and enhanced efforts ofspeeding this process up (Lyon 2004, Ball and Webster 2003). In the post 9/11 US war on terror, specifically surveillance technologies became central to security policies (Ceyhan 2006) as universal security enablers...
Profiling translation of conceptual schemas to XML schemas
Berka, Lukáš ; Nečaský, Martin (advisor) ; Holubová, Irena (referee)
In the present work we analyze the algorithm that was introduced in [4]. The algorithm performs a translation of a conceptual schema to an XML schema expressed in the XML Schema language. We look for limitations of the algorithm and try to discover parameters that can be potentially used to influence its behavior. We propose solutions to the most serious limitations. Also, we introduce a concept of a translation profiling. The concept is based on a configuration that contains a set of parameters. We modify the algorithm to use the user requirements specified in the configuration. Thanks to the improvements, the new algorithm works with the concept of XML Namespaces, uses XML Schema designs and also, focuses on an elimination of redundancy. The elimination of redundancy in an output of the algorithm is an important part of this work and we create a formal model that helps us to solve this task.
Profiling of the Terrorists in Europe between 2004 - 2017
Rygl, Kryštof ; Střítecký, Vít (advisor) ; Aslan, Emil (referee)
Anotation Diploma Thesis Terrorist profiling in Europe between 2004 and 2017 Bc. Kryštof Rygl Terrorism has never been so brutal and unexpected as it is now in the era of Islamic terrorism. This era initiated by series of attacks in the United States in 2001. Behind these attacks, as well as three years later during the bombings in Madrid in Spain, has been Al- Qaeda, the terrorist organization, headed by Osama bin Laden. Al-Qaeda maintained its importance on organizing of terrorist attacks until 2014 when the Islamic State, replaced Al- Qaeda's significance and dominated until 2017. Many academics have been devoted to research of Islamic terrorism and a wide range of studies have been written to explain this phenomenon from the perspective of ideology, possible causes, motivation of attackers, how to carry out attacks, the influence of socio-economic factors and many other factors causing, enhancing or suppressing the phenomenon. The aim of this work is to link the topics of the research that has been done, so far, by selecting several relevant categories that can influence the terrorist's profile or the nature of the attack. Based on the completion of these categories by the relevant data for each terrorist attack that was committed during the reference period between 2004 and 2017, a general profile of...
Module for Pronunciation Training and Foreign Language Learning
Kudláč, Vladan ; Herout, Adam (referee) ; Szőke, Igor (advisor)
Cílem této práce je vylepšit implementaci modulu pro mobilní aplikace pro výuku výslovnosti, najít místa vhodná pro optimalizaci a provést optimalizaci s cílem zvýšit přesnost, snížit čas zpracování a snížit paměťovou náročnost zpracování.
IP Flow Filtration and Profiling
Sedlák, Michal ; Tisovčík, Peter (referee) ; Kučera, Jan (advisor)
This thesis addresses the problem of filtering and profiling IP flows, primarily data of IPFIXsystems. Within the work, a general filtering component is designed and implemented, whichaims to be sufficiently efficient and flexible for use in other projects related to IP flows. Thiscomponent is then adapted to work with data in the IPFIX protocol format and integratedinto the existing modular collector IPFIXcol2 in the form of plugins adding the support forfiltering of passing IPFIX data and their sorting into profiles.
Profiling of the Terrorists in Europe between 2004 - 2017
Rygl, Kryštof ; Střítecký, Vít (advisor) ; Aslan, Emil (referee)
Anotation Diploma Thesis Terrorist profiling in Europe between 2004 and 2017 Bc. Kryštof Rygl Terrorism has never been so brutal and unexpected as it is now in the era of Islamic terrorism. This era initiated by series of attacks in the United States in 2001. Behind these attacks, as well as three years later during the bombings in Madrid in Spain, has been Al- Qaeda, the terrorist organization, headed by Osama bin Laden. Al-Qaeda maintained its importance on organizing of terrorist attacks until 2014 when the Islamic State, replaced Al- Qaeda's significance and dominated until 2017. Many academics have been devoted to research of Islamic terrorism and a wide range of studies have been written to explain this phenomenon from the perspective of ideology, possible causes, motivation of attackers, how to carry out attacks, the influence of socio-economic factors and many other factors causing, enhancing or suppressing the phenomenon. The aim of this work is to link the topics of the research that has been done, so far, by selecting several relevant categories that can influence the terrorist's profile or the nature of the attack. Based on the completion of these categories by the relevant data for each terrorist attack that was committed during the reference period between 2004 and 2017, a general profile of...
The Dilemmas of Surveillance Profiling: The Case of the United States
Petrosyan, Davit ; Střítecký, Vít (advisor) ; Tesař, Jakub (referee)
1 Introduction to the Thesis and the Importance of the Topic The sorting and the categorization of individuals and groups by their capacity and inclination to risky behavior or level of dangerousness has been and remains an essential function of security apparatus of the state and a vital component in state security. Practices of this kind became even more important in the age of international terror. The western world and specifically the United States has been the primary target of international terror suffering numerous terrorist attacks including the 9/11 attacks that became thedefining moment of how security functions in themodern world. While what we call "western world" is dominantly defined by liberal democratic political order, many of its societies and specifically the US is also defined by atechnology-enabled environment that scholarship characterizes as "surveillance society" (Gandy 1989, Lyon 2001, Lyon & Bauman 2012). Withintechnology-enabled environments the technologization of security was inevitable (Ceyhan 2008), and the 9/11 generated even more intense and enhanced efforts ofspeeding this process up (Lyon 2004, Ball and Webster 2003). In the post 9/11 US war on terror, specifically surveillance technologies became central to security policies (Ceyhan 2006) as universal security enablers...

National Repository of Grey Literature : 31 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.