Přístupnostní navigace
E-application
Search Search Close
Branch Details
FEKTAbbreviation: PKA-TLIAcad. year: 2016/2017
Programme: Electrical Engineering and Communication
Length of Study: 4 years
Accredited from: 25.7.2007Accredited until: 31.12.2020
Profile
The aim of the studies is to prepare top-class scientific personalities that will be able to provide solution to challenging problems of science and technology in the field of information technologies in telecommunications. Another aim is to teach graduates the methods of scientific work, to make their knowledge of higher mathematics and physics more profound, and to furnish students with theoretical, experimental and practical knowledge from the field of teleinformatics.
Key learning outcomes
Graduates of doctoral studies in the field of teleinformatics are fit to work as scientific and research workers in the development, design and operation departments of research and development institutes, and telecommunications companies, where they can make full creative use of their knowledge and skills. The graduate is capable of solving independently sophisticated problems of science and technology in the field of teleinformatics. In view of the scope of his theoretical education the graduate is capable of adapting to practice requirements in both fundamental and applied research.
Occupational profiles of graduates with examples
This field of study focuses on the science education of doctoral students with profound theoretical foundations in converging communication and in formation technologies. The main part of the study includes course in theoretical informatics and telecommunication technology. In the area of teleinformatics the student has much knowledge of communication and information technologies, data transmissions and their security, inclusive of using and designing the related software. He is well versed in operating systems, computer languages, database systems, distributed applications and the like. He can cope with the algorithmization of tasks on a high level and can propose new technological solutions of telecommunication devices, information systems and support services.
Guarantor
prof. Ing. Zdeněk Smékal, CSc.
Issued topics of Doctoral Study Program
The thesis is focused on definition and analysis of textural features in images of sedimentary grains acquired by electron microscope device. The main goal of the work is to objectivize and to automatize the estimation of exoscopic parameters of given grains with the purpose to statistically classify the grains into different classes based on a geomorphological processes which contributed to form a given analysed grain structure.
Tutor: Říha Kamil, doc. Ing., Ph.D.
The particle filter is a computationally feasible technique for sequential Bayesian estimation in arbitrary nonlinear/non-Gaussian scenarios. The box particle filter is a recent variant of the particle filter with significantly reduced complexity. The goal of this thesis is to develop a distributed version of the box particle filter, and to investigate the application of box particle techniques to belief propagation message passing and/or to Bayesian filters based on random finite sets, such as the PHD filter or the multi-Bernoulli filter.
The need to complete the missing segment of an audio signal is an interesting task with the practical use (restoration of recordings, dropouts in VoIP calls, etc.). Current methods are capable of high quality interpolation of signals that are stationary in the vicinity of the missing section and have harmonic character. The study would focus on improving these methods by advanced signal processing approaches. Psyhcoacoustic viewpoint of the problem should be covered as well.
Tutor: Rajmic Pavel, prof. Mgr., Ph.D.
The work is focused on the design of A/D and D/A converters working in the current mode. The aim is to design a suitable structure of number-current and current-number converters without internal current-voltage and voltage-current conversions with respect to enhancing the bandwidth in comparison with converters working in the voltage mode. Part of the work is also the design and analysis of current-mode antialiasing filters. The design will start from unconventional circuit element structures such as current conveyors (CCI, CCII, CCIII) with simple or floating output, current feedback amplifiers (CFA) or transconductance amplifiers (OTA, BOTA, DBTA). Requirements to be met by the candidate: the knowledge of circuit theory and simulation programs (MicroCap, PSpice).
Tutor: Lattenberg Ivo, doc. Ing., Ph.D.
The aim is to analyse the aspects of protection in a frame of distributed systems and their algorithms with an emphasis on a potential safety risk. The design and optimization of new protection techniques for these systems is expected on the basis of obtained observation. Optimization involves the proposals of both mechanisms to improve the distributed systems and the procedures to either minimize or prevent the negatives effects affecting the functions of such is expected to propose the mathematical tools to describe the novel mechanisms. It is supposed to simulate or experimentally verify the functionality of the proposed solutions.
Tutor: Škorpil Vladislav, doc. Ing., CSc.
The work is focused on the feature analysis of current-mode electronic frequency filters. The aim is to design algoritmizable methods that lead to finding features of filters generally defined by the schematic. It will be necessary to evaluate the available feature ranges, e.g. quality, pass-band current transfer, dynamic range within a defined supply voltage, sensitivity, etc. In the case of finding the quality range, the point is to find the extremes of a multi-variable non-linear function. Mathematical tools (e.g. Maple or MathCAD) will first be used for this purpose; afterwards the algorithm itself will be designed. Requirements to be met by the candidate: algorithm thinking, the knowledge of computer programming and circuit theory.
The theme is focused on the research of novel methods for analysis of incomplete spatial information captured in digital images. These source data can be represented by temporal or spatial sequences eventually by a single image whereas the analysis should result from a given scene geometry.
Apriori known signal characteristics can be used to accelerate the measurements of MRI scans. The study would focus on the use of these properties and their inherited techniques.
The aim is to analyse the up-to-date development and trends in the area of cyber security management / information management. The research will be focused especially on ISO/IEC 27 000 standards, COBIT®, ITIL® and other relevant frameworks. The practical part of research will be focused on implementation of surveyed standards, methodologies, libraries and other frameworks in Microsoft Server environment, in order to prevent cyber attacks. Based on the findings is expected proposal of innovative management methods in the area of cyber / information security. Research requires knowledge of information/cyber security management, networking, cryptography, and last but not least, the experience with the management and administration of MS Server 2012.
Telematic systems are particularly common in transport. Research into telematic systems based on the Internet protocol will be focused on the design of sophisticated, i.e. well-considered, formally well-developed and complicated methods that use IP systems in various areas. Surveillance and protection systems, systems of paying the fare, information systems and interactive applications, etc. are supposed in particular. Localization by GPS, vehicle diagnostics, and vehicle monitoring on ortho-maps in real situations are in the focus. Sophisticated telematic systems will be software simulated, optimized and subsequently hardware realized in the form of functional specimens. Communication between two cars without a driver intervention, collision avoidance, information transmission about traffic from the places cars left are expected. A highly accurate navigation system based on Galileo system (GNSS) for controlling functional blocks of cars are considered.
The vulnerability of the IEEE 802.11, attacks on the security methods and the methods for its effectiveness. Wireless network security issues expected standards IEEE 802.11. A detailed introduction to these standards, describe the various types of wireless security, including their properties and the subsequent theoretical analysis. The implementation of the attacks on the various methods of modern security algorithms, emphasis will be placed on the identification of weaknesses of 802.11 protocols. On the basis of the findings will be designed and tested security more effective. Attention will be paid to the security quality of service QoS in 802.11 networks. The network will be subject to examination by appropriate programs and simulators (Opnet Modeler, NS2). Will also be examined according to modern services (IP phones, the transmission of video, voice, multimedia) to delay and to be performed, including an overall analysis to the QoS optimization.
The aim is to analyse the up-to-date development and trends in the area of converged networks, mainly the problems of protection against cybernetic attacks. The areas of 5G mobile, SDN and consequential transmission technologies are seemed to be among the advanced possibilities. The design of innovative or new protection methods is supposed to be on the basis of obtained observation. Research requires a summary of networks area, practice with MATALB or SCILAB programs, or knowledge of at least one of VHDL, C or Java languages, system FPGA, evolutionary algorithms, etc.