National Repository of Grey Literature 49 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Analysis of Software Resource Consumption
Míchal, Ondřej ; Fiedor, Jan (referee) ; Pavela, Jiří (advisor)
Spotřeba softwarových zdrojů je široce a aktivně zkoumanou oblastí. Z mnoha zdrojů v softwaru, které lze profilovat, byla spotřeba energie dlouho jediným zdrojem, který neměl mnoho obecných, a přesto komplexních, profilerů. V době mobilních zařízení a výkonných výpočetních jednotek je poptávka po takových profilerech neustále rostoucí. V této práci zkoumáme metody pro přesné měření spotřeby energie softwaru. Na jejich základě vytváříme open-source profiler a implementujeme komplexní vizualizér profilovaných dat. S vytvořeným profilerem pak provádíme řadu experimentů, abychom předvedli jeho schopnosti a demonstrovali užitečnost měření spotřeby energie softwaru.
Privacy protection and profiling
Miková, Timea ; Kasl, František (referee) ; Míšek, Jakub (advisor)
The bachelor thesis deals mainly with the issue of the right to privacy and data protection in the context of social network sites and ongoing user profiling. The theoretical part specifies the legislative of these concepts and then focuses on social network sites and their privacy violations. The thesis also specifies the social network site TikTok, ongoing user profiling, personal data collecting and ways how to stop it. The practical part of this thesis is a website which serves as an educational portal in the context of privacy protection on social network sites.
Profiling of Embedded Applications
Koleček, František ; Mrázek, Vojtěch (referee) ; Strnadel, Josef (advisor)
This thesis is about profiling of embedded applications. The thesis is focused primarily on the ARM Cortex-M platform. The theoretical part of this thesis contains explanation of basic principles and terms associated with profiling and development of embedded applications. The thesis also summarizes existing profiling methods and tools associated with this topic. The goal of the practical part of this thesis is to use the chosen means to profile various parameters and evaluate the results. I decided to implement a library containing profiling tools, which allow for execution time measurement and stack usage measurement. Results obtained using this library were analyzed by calculating the measurement uncertainty.
The Dilemmas of Surveillance Profiling: The Case of the United States
Petrosyan, Davit ; Střítecký, Vít (advisor) ; Tesař, Jakub (referee)
1 Introduction to the Thesis and the Importance of the Topic The sorting and the categorization of individuals and groups by their capacity and inclination to risky behavior or level of dangerousness has been and remains an essential function of security apparatus of the state and a vital component in state security. Practices of this kind became even more important in the age of international terror. The western world and specifically the United States has been the primary target of international terror suffering numerous terrorist attacks including the 9/11 attacks that became thedefining moment of how security functions in themodern world. While what we call "western world" is dominantly defined by liberal democratic political order, many of its societies and specifically the US is also defined by atechnology-enabled environment that scholarship characterizes as "surveillance society" (Gandy 1989, Lyon 2001, Lyon & Bauman 2012). Withintechnology-enabled environments the technologization of security was inevitable (Ceyhan 2008), and the 9/11 generated even more intense and enhanced efforts ofspeeding this process up (Lyon 2004, Ball and Webster 2003). In the post 9/11 US war on terror, specifically surveillance technologies became central to security policies (Ceyhan 2006) as universal security enablers...
Dual Securitization of Public Space in Relation to Sport Mega Events
Svitková, Katarína ; Hynek, Nikola (advisor) ; Ditrych, Ondřej (referee)
The objective of this study is to examine security measures in cities hosting sports mega events. Using International political sociology as a theoretical background, I argue that city spaces undergo what I refer to as dual securitization. I identify four principal characteristics of security measures which have become globally standardized and which I consider illiberal: exceptionalism, surveillance, militarization and urban restrictions. In the case studies, I explore how these measures were justified and employed during the Olympic Games or the FIFA World Cup in Beijing, South Africa, London and Rio de Janeiro. Despite some differences which are due to local realities, I argue that the approaches of the principal stakeholders in the four cities are very much alike. Regardless of the type of political regime or the degree of socio-economic development, exceptionality of mega events serves as an impetus for wide-scale and profound surveillance and militarization of contemporary cities. In the process, securing public spaces and urbanites comes at the expense of individual liberties.
Profiling translation of conceptual schemas to XML schemas
Berka, Lukáš ; Nečaský, Martin (advisor) ; Holubová, Irena (referee)
In the present work we analyze the algorithm that was introduced in [4]. The algorithm performs a translation of a conceptual schema to an XML schema expressed in the XML Schema language. We look for limitations of the algorithm and try to discover parameters that can be potentially used to influence its behavior. We propose solutions to the most serious limitations. Also, we introduce a concept of a translation profiling. The concept is based on a configuration that contains a set of parameters. We modify the algorithm to use the user requirements specified in the configuration. Thanks to the improvements, the new algorithm works with the concept of XML Namespaces, uses XML Schema designs and also, focuses on an elimination of redundancy. The elimination of redundancy in an output of the algorithm is an important part of this work and we create a formal model that helps us to solve this task.
Profiling of the Terrorists in Europe between 2004 - 2017
Rygl, Kryštof ; Střítecký, Vít (advisor) ; Aslan, Emil (referee)
Anotation Diploma Thesis Terrorist profiling in Europe between 2004 and 2017 Bc. Kryštof Rygl Terrorism has never been so brutal and unexpected as it is now in the era of Islamic terrorism. This era initiated by series of attacks in the United States in 2001. Behind these attacks, as well as three years later during the bombings in Madrid in Spain, has been Al- Qaeda, the terrorist organization, headed by Osama bin Laden. Al-Qaeda maintained its importance on organizing of terrorist attacks until 2014 when the Islamic State, replaced Al- Qaeda's significance and dominated until 2017. Many academics have been devoted to research of Islamic terrorism and a wide range of studies have been written to explain this phenomenon from the perspective of ideology, possible causes, motivation of attackers, how to carry out attacks, the influence of socio-economic factors and many other factors causing, enhancing or suppressing the phenomenon. The aim of this work is to link the topics of the research that has been done, so far, by selecting several relevant categories that can influence the terrorist's profile or the nature of the attack. Based on the completion of these categories by the relevant data for each terrorist attack that was committed during the reference period between 2004 and 2017, a general profile of...
Module for Pronunciation Training and Foreign Language Learning
Kudláč, Vladan ; Herout, Adam (referee) ; Szőke, Igor (advisor)
Cílem této práce je vylepšit implementaci modulu pro mobilní aplikace pro výuku výslovnosti, najít místa vhodná pro optimalizaci a provést optimalizaci s cílem zvýšit přesnost, snížit čas zpracování a snížit paměťovou náročnost zpracování.
IP Flow Filtration and Profiling
Sedlák, Michal ; Tisovčík, Peter (referee) ; Kučera, Jan (advisor)
This thesis addresses the problem of filtering and profiling IP flows, primarily data of IPFIXsystems. Within the work, a general filtering component is designed and implemented, whichaims to be sufficiently efficient and flexible for use in other projects related to IP flows. Thiscomponent is then adapted to work with data in the IPFIX protocol format and integratedinto the existing modular collector IPFIXcol2 in the form of plugins adding the support forfiltering of passing IPFIX data and their sorting into profiles.
Network Communication Analysis for Mobile Application Profiling
Meluš, Matej ; Matoušek, Petr (referee) ; Burgetová, Ivana (advisor)
Goal of this thesis was to create profiles of mobile applications based on their network communication, which is stored in created data sets. For this purpose, a tool that can extract profiles from data sets was created. Profiles contain JA3 fingerprints, IP addresses and hostnames, that are associated with specific application based on number of occurrences in data sets. Unmodified profiles describe importance of individual identifiers used by application in network communication. Modified profiles can be used to identify application in network traffic.

National Repository of Grey Literature : 49 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.