National Repository of Grey Literature 49 records found  beginprevious31 - 40next  jump to record: Search took 0.00 seconds. 
Benchmarking and Profiling of CloverETL Data Processing System
Botka, Roland ; Bartík, Vladimír (referee) ; Rychlý, Marek (advisor)
This thesis deals with the benchmarking and profiling of CloverETL Data Processing system. The aim of this thesis is to design a way of measuring performance and profiling in different runtime environments. The problem was solved by designing and implementing an application, which is based on measured data and its analysis, detects maximum system perpetuity and monitor performance changes in system performance. The advantage is the ability to compare environments on which the CloverETL System is running and application usage in automated testing in company. Created ETL Graphs have been tested during development and they are part of the result of this thesis.
Profiling of the Terrorists in Europe between 2004 - 2017
Rygl, Kryštof ; Střítecký, Vít (advisor) ; Aslan, Emil (referee)
Anotation Diploma Thesis Terrorist profiling in Europe between 2004 and 2017 Bc. Kryštof Rygl Terrorism has never been so brutal and unexpected as it is now in the era of Islamic terrorism. This era initiated by series of attacks in the United States in 2001. Behind these attacks, as well as three years later during the bombings in Madrid in Spain, has been Al- Qaeda, the terrorist organization, headed by Osama bin Laden. Al-Qaeda maintained its importance on organizing of terrorist attacks until 2014 when the Islamic State, replaced Al- Qaeda's significance and dominated until 2017. Many academics have been devoted to research of Islamic terrorism and a wide range of studies have been written to explain this phenomenon from the perspective of ideology, possible causes, motivation of attackers, how to carry out attacks, the influence of socio-economic factors and many other factors causing, enhancing or suppressing the phenomenon. The aim of this work is to link the topics of the research that has been done, so far, by selecting several relevant categories that can influence the terrorist's profile or the nature of the attack. Based on the completion of these categories by the relevant data for each terrorist attack that was committed during the reference period between 2004 and 2017, a general profile of...
Basic principles of behavioral analysis
ROUČKOVÁ, Veronika
This thesis is written as a recherche and the main theme is behavioural analysis. It is very young field of criminalistics, which investigates conditions and connections of crimes from the point of view of human behaviour: interaction of perpetrator and victim, signs and features of crime such as place, time, type of victim etc. On the basis of evidences the psychological profile of unknown perpetrator is set up. The profile can change during the time and it includes: presumable appearance and characteristics of perpetrator. Proces and methods of behavioural analysis are based on findings of many disciplines, common and also closely specialised such as: criminology, criminalistics, personality psychology, psychopathology, sociology, clinical psychology, social psychology and legal disciplines. At first the author describes history of the behavioural analysis what it proceeds from and how this field is used in practice. Than there are described particular steps of behaviroural analysis which are used by criminal profiler. In the next part the victimology field is introduced: venue, where the most evedences for revealing a perpetrator are; the ways of behaviour of perpetrators and the main points which psychological profile includes. The aim of this thesis is to introduce behavioural analysis, its progress and basics findings and possibilities of application during criminal scenes investigations.
The Dilemmas of Surveillance Profiling: The Case of the United States
Petrosyan, Davit ; Střítecký, Vít (advisor) ; Tesař, Jakub (referee)
1 Introduction to the Thesis and the Importance of the Topic The sorting and the categorization of individuals and groups by their capacity and inclination to risky behavior or level of dangerousness has been and remains an essential function of security apparatus of the state and a vital component in state security. Practices of this kind became even more important in the age of international terror. The western world and specifically the United States has been the primary target of international terror suffering numerous terrorist attacks including the 9/11 attacks that became thedefining moment of how security functions in themodern world. While what we call "western world" is dominantly defined by liberal democratic political order, many of its societies and specifically the US is also defined by atechnology-enabled environment that scholarship characterizes as "surveillance society" (Gandy 1989, Lyon 2001, Lyon & Bauman 2012). Withintechnology-enabled environments the technologization of security was inevitable (Ceyhan 2008), and the 9/11 generated even more intense and enhanced efforts ofspeeding this process up (Lyon 2004, Ball and Webster 2003). In the post 9/11 US war on terror, specifically surveillance technologies became central to security policies (Ceyhan 2006) as universal security enablers...
Library for Profiling and Visualization of Memory Consumption of C/C++ Programs
Podola, Radim ; Peringer, Petr (referee) ; Fiedor, Tomáš (advisor)
Performance is an important and, for some classes of programs, even critical aspect of user experience. The current approaches to performance profiling are, however, far from being satisfactory. The aim of this bachelor's thesis is to extend the current state-of-the-art of profiling and visualization solutions, with novel techniques which can be used for a more efficient search of performance bugs in C/C++ programs and their subsequent interpretation to the end user. Thesis briefly introduces existing tools dealing with similar problems and then proposes a novel solution to collection of profiling data and their illustrative interpretation. The resulting implementation is, moreover, integrated in the Perun --- Performance Control System --- platform for profile versioning. The functionality of the implementation is demonstrated on a series of non-trivial programs.
Library for Profiling of Data Structures of C/C++ Programs
Pavela, Jiří ; Rogalewicz, Adam (referee) ; Fiedor, Tomáš (advisor)
Performance bugs may greatly affect the quality of the system being developed and even cause irreversible damage in some critical sectors. Hence profiling - one of the currently most widespread technique of performance analysis - is usually applied to find the bugs. However, most of the current solutions commonly lack comprehensible graphical outputs and detailed analysis of algorithms in regard to their complexity. This thesis introduces a novel profiling tool which focuses on automatic estimation of complexity of dynamic data structures. The proposed approach collects statistical data out of program runs and uses regression analysis to find the most accurate model serving as an estimate of algorithmic complexity. The resulting prototype was subjected to a series of experiments that evaluate the accuracy of the results, demonstrate practical uses and illustrate the graphical output of the tool.
Offender profiling and the possibilities for its use in arson cases.
Linhartová, Barbora ; Boukalová, Hedvika (advisor) ; Gillernová, Ilona (referee)
The theme of the thesis is psychological offender profiling and the possibilities that it offers in the investigation of arson cases. First it introduces profiling as an investigation method, including its history, the sources on which it is based, what kind of information it contains and how it is created. Next it follows up the problematic issue of fires, their investigation and the classification of intentionally set fires. It also introduces some particular arsonist offender subtypes. Then it pursues the arson profiling and introduces the main profiling approaches. In the end, the author applies the acquired findings to analyze two arson cases according to the particular profiling approaches and then compares the provided leads to a possible offender.
Dual Securitization of Public Space in Relation to Sport Mega Events
Svitková, Katarína ; Hynek, Nikola (advisor) ; Ditrych, Ondřej (referee)
The objective of this study is to examine security measures in cities hosting sports mega events. Using International political sociology as a theoretical background, I argue that city spaces undergo what I refer to as dual securitization. I identify four principal characteristics of security measures which have become globally standardized and which I consider illiberal: exceptionalism, surveillance, militarization and urban restrictions. In the case studies, I explore how these measures were justified and employed during the Olympic Games or the FIFA World Cup in Beijing, South Africa, London and Rio de Janeiro. Despite some differences which are due to local realities, I argue that the approaches of the principal stakeholders in the four cities are very much alike. Regardless of the type of political regime or the degree of socio-economic development, exceptionality of mega events serves as an impetus for wide-scale and profound surveillance and militarization of contemporary cities. In the process, securing public spaces and urbanites comes at the expense of individual liberties.
Profiling translation of conceptual schemas to XML schemas
Berka, Lukáš ; Nečaský, Martin (advisor) ; Holubová, Irena (referee)
In the present work we analyze the algorithm that was introduced in [4]. The algorithm performs a translation of a conceptual schema to an XML schema expressed in the XML Schema language. We look for limitations of the algorithm and try to discover parameters that can be potentially used to influence its behavior. We propose solutions to the most serious limitations. Also, we introduce a concept of a translation profiling. The concept is based on a configuration that contains a set of parameters. We modify the algorithm to use the user requirements specified in the configuration. Thanks to the improvements, the new algorithm works with the concept of XML Namespaces, uses XML Schema designs and also, focuses on an elimination of redundancy. The elimination of redundancy in an output of the algorithm is an important part of this work and we create a formal model that helps us to solve this task.
Design and Implementation of a Profiler for ASIPs
Richtarik, Pavel ; Hynek, Jiří (referee) ; Zachariášová, Marcela (advisor)
The major objective of this work is to analyse possibilities of profiling application specific instruction-set processors, to explore some common profiling techniques and to use the collected information to design and implement a new profiling tool suitable for utilization in the processors development and optimization. This bachelor thesis presents requirements on the new profiler and describes its key parts from the design and the implementation perspective.

National Repository of Grey Literature : 49 records found   beginprevious31 - 40next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.