Přístupnostní navigace
E-application
Search Search Close
Branch Details
FEKTAbbreviation: PPA-TLIAcad. year: 2016/2017
Programme: Electrical Engineering and Communication
Length of Study: 4 years
Accredited from: 25.7.2007Accredited until: 31.12.2020
Profile
The aim of the studies is to prepare top-class scientific personalities that will be able to provide solution to challenging problems of science and technology in the field of information technologies in telecommunications. Another aim is to teach graduates the methods of scientific work, to make their knowledge of higher mathematics and physics more profound, and to furnish students with theoretical, experimental and practical knowledge from the field of teleinformatics.
Key learning outcomes
Graduates of doctoral studies in the field of teleinformatics are fit to work as scientific and research workers in the development, design and operation departments of research and development institutes, and telecommunications companies, where they can make full creative use of their knowledge and skills. The graduate is capable of solving independently sophisticated problems of science and technology in the field of teleinformatics. In view of the scope of his theoretical education the graduate is capable of adapting to practice requirements in both fundamental and applied research.
Occupational profiles of graduates with examples
This field of study focuses on the science education of doctoral students with profound theoretical foundations in converging communication and in formation technologies. The main part of the study includes course in theoretical informatics and telecommunication technology. In the area of teleinformatics the student has much knowledge of communication and information technologies, data transmissions and their security, inclusive of using and designing the related software. He is well versed in operating systems, computer languages, database systems, distributed applications and the like. He can cope with the algorithmization of tasks on a high level and can propose new technological solutions of telecommunication devices, information systems and support services.
Guarantor
prof. Ing. Zdeněk Smékal, CSc.
Issued topics of Doctoral Study Program
The thesis is focused on definition and analysis of textural features in images of sedimentary grains acquired by electron microscope device. The main goal of the work is to objectivize and to automatize the estimation of exoscopic parameters of given grains with the purpose to statistically classify the grains into different classes based on a geomorphological processes which contributed to form a given analysed grain structure.
Tutor: Říha Kamil, doc. Ing., Ph.D.
The study topic is focused on data-mining of the freely accessible information available on social networks, such as Facebook or Twitter. This information will be used for modification of IP communication by analysing the behaviour of Internet users. An example use is for prevention of cyber-criminality.
Tutor: Komosný Dan, prof. Ing., Ph.D.
Anonymous networks (darknets) are networks accessible by non-standard communication protocols and applications, such as Tor (The onion router), I2P (Invisible Internet Project), and Freenet. The purpose of such networks is to provide anonymity for the users and their data. The study topic will focus on analysis of the security threads in darknets. Methods for prevention of such attacks will be proposed.
The particle filter is a computationally feasible technique for sequential Bayesian estimation in arbitrary nonlinear/non-Gaussian scenarios. The box particle filter is a recent variant of the particle filter with significantly reduced complexity. The goal of this thesis is to develop a distributed version of the box particle filter, and to investigate the application of box particle techniques to belief propagation message passing and/or to Bayesian filters based on random finite sets, such as the PHD filter or the multi-Bernoulli filter.
Current wireless networks have to already face a significant increase of specific type of data traffic generated by automated devices and systems without human interaction. This type of mobile data will be even more dominant in future generations of mobile networks such as 5G networks. For this reason, it is necessary to conduct a thorough analysis of all the specifics and requirements in order to efficiently operate these Machine-to-Machine (M2M) services in mobile networks. Therefore, it is highly needed to propose a methodology for the optimal parameters setting in mobile network to provide a required quality of service on the one hand and to avoid the overprovisioning on the other. At the same time, also the energy efficiency of these connections and overall quality of service assurance have to be taken into account.
Tutor: Hošek Jiří, doc. Ing., Ph.D.
The need to complete the missing segment of an audio signal is an interesting task with the practical use (restoration of recordings, dropouts in VoIP calls, etc.). Current methods are capable of high quality interpolation of signals that are stationary in the vicinity of the missing section and have harmonic character. The study would focus on improving these methods by advanced signal processing approaches. Psyhcoacoustic viewpoint of the problem should be covered as well.
Tutor: Rajmic Pavel, prof. Mgr., Ph.D.
The work is focused on the design of A/D and D/A converters working in the current mode. The aim is to design a suitable structure of number-current and current-number converters without internal current-voltage and voltage-current conversions with respect to enhancing the bandwidth in comparison with converters working in the voltage mode. Part of the work is also the design and analysis of current-mode antialiasing filters. The design will start from unconventional circuit element structures such as current conveyors (CCI, CCII, CCIII) with simple or floating output, current feedback amplifiers (CFA) or transconductance amplifiers (OTA, BOTA, DBTA). Requirements to be met by the candidate: the knowledge of circuit theory and simulation programs (MicroCap, PSpice).
Tutor: Lattenberg Ivo, doc. Ing., Ph.D.
Nowadays, the classic operating systems are used on dedicated devices that usually have restricted resources and only a limited set of functions is required. The study topic is focused on the optimization of the use of OS Linux on such devices, for example Raspberry Pi.
Massive development and utilization of wireless technologies require new ways how to use the frequency spectrum. Along with this, there is a growing need for higher bandwidth with wider radio channel. Following this, several radio technologies working in ultra-high frequencies (i.e. millimetre wave band) have been introduced recently. This part of the spectrum brings many benefits, especially in the form of high transmission speeds, but also a large number of challenges and open issues. Therefore, this doctoral thesis will deal with design and analysis of advanced communications featuring millimetre waves, which are expected to be deployed in the future Internet of Things (IoT) or smart wearables applications. The main task of the doctoral candidate will be therefore to analyse the current situation in this research area and then propose an optimal solution of wireless communication module with high potential for application in envisioned services as Augmented Reality or eHealth.
With the increasing amount of mobile data traffic, the need for highly efficient algorithms to manage radio resources in the next generation of mobile networks is even more evident. Moreover, the ability to self-organize network parameters is the important element of future cellular networks, mainly because the significant complexity of these networks. A complex structure of the future cellular networks (containing e.g. femto cells or communications simultaneously utilizing more radio access technologies) imposes new challenges in management of the networks. With the growing network size and complexity increases also the amount of resources that are needed to maintaining the network. Following that, the main task of the doctoral thesis is to survey state of the art and consequently design new algorithms for radio resources management in 4G mobile networks. The proposed algorithms will be verified and evaluated by selected simulation tools and also directly in the experimental LTE network.
The aim is to analyse the aspects of protection in a frame of distributed systems and their algorithms with an emphasis on a potential safety risk. The design and optimization of new protection techniques for these systems is expected on the basis of obtained observation. Optimization involves the proposals of both mechanisms to improve the distributed systems and the procedures to either minimize or prevent the negatives effects affecting the functions of such is expected to propose the mathematical tools to describe the novel mechanisms. It is supposed to simulate or experimentally verify the functionality of the proposed solutions.
Tutor: Škorpil Vladislav, doc. Ing., CSc.
The work is focused on the feature analysis of current-mode electronic frequency filters. The aim is to design algoritmizable methods that lead to finding features of filters generally defined by the schematic. It will be necessary to evaluate the available feature ranges, e.g. quality, pass-band current transfer, dynamic range within a defined supply voltage, sensitivity, etc. In the case of finding the quality range, the point is to find the extremes of a multi-variable non-linear function. Mathematical tools (e.g. Maple or MathCAD) will first be used for this purpose; afterwards the algorithm itself will be designed. Requirements to be met by the candidate: algorithm thinking, the knowledge of computer programming and circuit theory.
The thesis is focused on research of new fully-differential and single-ended analogue structures with minimum transistor number. The goal is to design solutions (frequency filters, oscillators, etc.) with high-frequency operational frequencies in band over 100 MHz. The workability of designed solutions will be confirmed by simulations and/or by experimental measurements.
Tutor: Jeřábek Jan, doc. Ing., Ph.D.
OS Linux is used for implementing a great number of network services in the Internet, such as large-scale data repositories. The student will analyse the access to these services. Using the data obtained, modifications will be proposed to optimize the running of the network services in OS Linux.
The theme is focused on the research of novel methods for analysis of incomplete spatial information captured in digital images. These source data can be represented by temporal or spatial sequences eventually by a single image whereas the analysis should result from a given scene geometry.
Peer-to-peer networks are commonly used for data transfer between a large number of the Internet users. These networks have a number of issues to be solved, such as implementation of the security measures on all the nodes and optimization of the logical topology. Example peer-to-peer networks are BitTorrent, Bitcoin and Skype.
The study topic deals with open-source network operating systems. An analysis of the threads and attacks on operating systems will be done. The student will propose methods for prevention of such attacks.
The thesis is focused on possibilities of simulation and emulation of general mem-systems (memresistors especially, then memcapacitors and meminductors) in SPICE simulators, useful for various type of application. Models and emulator of several types should be analyzed (numeric, analytical, behavioral, of fractional order) a when considering both the analog and digital techniques. During synthesis, it is advised to use the methods of automated design and verification. Attention should be also focused on experimental verification of particular solutions, especially in area of analog signal processing.
First step for analysis of images (especially for biomedical use) image segmentation. The objective of this thesis is to develop a method based on machine learning, with with the help of the machine training will learn how to segment an image according to the given template. With the help of massively parallel hardware more advanced approaches can be explored when compared to possibilities of conventional processors.
Tutor: Burget Radim, doc. Ing., Ph.D.
Apriori known signal characteristics can be used to accelerate the measurements of MRI scans. The study would focus on the use of these properties and their inherited techniques.
The aim is to analyse the up-to-date development and trends in the area of cyber security management / information management. The research will be focused especially on ISO/IEC 27 000 standards, COBIT®, ITIL® and other relevant frameworks. The practical part of research will be focused on implementation of surveyed standards, methodologies, libraries and other frameworks in Microsoft Server environment, in order to prevent cyber attacks. Based on the findings is expected proposal of innovative management methods in the area of cyber / information security. Research requires knowledge of information/cyber security management, networking, cryptography, and last but not least, the experience with the management and administration of MS Server 2012.
The rapid development of advanced wireless technologies opens the door for new services and applications. One of the fastest-growing areas is called Wearables including applications like smart watches, glasses with augmented reality, sports supplements, etc. Wearables are closely connected with to their user and provide him with previously unthinkable features and services. As communication channel, the wearables mostly utilize modern wireless or mobile technologies. Since it is a relatively new industry, but rapidly growing, there are numbers of problems as ensuring the required level of quality of service (QoS), secure sharing of sensitive data or satisfying user requirements. Following this, the thesis will deal with the proposal and subsequent practical verification of effective communication platform, which will take into account all the above requirements. The proposed platform and associated communication algorithms will be tested and evaluated by selected simulation tools and also directly under experimental conditions.
Telematic systems are particularly common in transport. Research into telematic systems based on the Internet protocol will be focused on the design of sophisticated, i.e. well-considered, formally well-developed and complicated methods that use IP systems in various areas. Surveillance and protection systems, systems of paying the fare, information systems and interactive applications, etc. are supposed in particular. Localization by GPS, vehicle diagnostics, and vehicle monitoring on ortho-maps in real situations are in the focus. Sophisticated telematic systems will be software simulated, optimized and subsequently hardware realized in the form of functional specimens. Communication between two cars without a driver intervention, collision avoidance, information transmission about traffic from the places cars left are expected. A highly accurate navigation system based on Galileo system (GNSS) for controlling functional blocks of cars are considered.
This topic is focused on design of two-ports, filtering circuits especially and oscillators for instance, with possibility to externally and electronically change significant parameters of the circuit and in the case of filter also change of type of frequency response. Design with fractional-order element sis also expected. Available active elements are supposed to be used as it is or in modified variants. Simulations not only with simple models but also with transistor-level structures are expected. When verified by experimental measurement, behavioural modelling is preferred.
The vulnerability of the IEEE 802.11, attacks on the security methods and the methods for its effectiveness. Wireless network security issues expected standards IEEE 802.11. A detailed introduction to these standards, describe the various types of wireless security, including their properties and the subsequent theoretical analysis. The implementation of the attacks on the various methods of modern security algorithms, emphasis will be placed on the identification of weaknesses of 802.11 protocols. On the basis of the findings will be designed and tested security more effective. Attention will be paid to the security quality of service QoS in 802.11 networks. The network will be subject to examination by appropriate programs and simulators (Opnet Modeler, NS2). Will also be examined according to modern services (IP phones, the transmission of video, voice, multimedia) to delay and to be performed, including an overall analysis to the QoS optimization.
The aim is to analyse the up-to-date development and trends in the area of converged networks, mainly the problems of protection against cybernetic attacks. The areas of 5G mobile, SDN and consequential transmission technologies are seemed to be among the advanced possibilities. The design of innovative or new protection methods is supposed to be on the basis of obtained observation. Research requires a summary of networks area, practice with MATALB or SCILAB programs, or knowledge of at least one of VHDL, C or Java languages, system FPGA, evolutionary algorithms, etc.