Přístupnostní navigace
E-application
Search Search Close
Branch Details
Original title in Czech: Výpočetní technika a informatikaFITAbbreviation: DVI4Acad. year: 2019/2020
Programme: Computer Science and Engineering
Length of Study: 4 years
Accredited from: 1.1.2007Accredited until: 31.12.2024
Profile
The goal of the doctoral study programme is to provide outstanding graduates from the MSc study programme with a specialised university education of the highest level in certain fields of information technology, including especially the areas of information systems, computer-based systems and computer networks, computer graphics and multimedia, and intelligent systems. The education obtained within this study programme also comprises a training and attestation for scientific work.
Guarantor
prof. RNDr. Milan Češka, CSc.
Issued topics of Doctoral Study Program
Tutor: Zemčík Pavel, prof. Dr. Ing., dr. h. c.
.
Tutor: Kolář Dušan, doc. Dr. Ing.
Tutor: Sekanina Lukáš, prof. Ing., Ph.D.
The project is concerned with advanced methods of computational photography. The aim is to research new computational photography methods, which comprises software solutions potentially supported by new optics and/or hardware. Our interest is on HDR image and video processing, color-to-grayscale conversions, spectral imaging, and others.
Tutor: Čadík Martin, doc. Ing., Ph.D.
Tutor: Zbořil František, doc. Ing., Ph.D.
Ukazuje se, že metody syntézy číslicových obvodů využívající evolučních algoritmů, zejména kartézského genetického programování pracujícího přímo nad reprezentací na úrovni hradel, jsou schopny produkovat implementace, které jsou v řadě případů mnohem efektivnější (typicky kompaktnější) nežli implementace získané pomocí současných syntézních technik využívajících interní reprezentace (např. AIG) a iterativní aplikace deterministických přepisovacích pravidel. Typickým cílem optimalizace je redukovat počet hradel optimalizovaného obvodu. V praxi se však vyskytuje požadavek optimalizovat obvod z hlediska více kriterií (např. zpoždění, plocha na čipu). V případě využití systému pro účely resyntézy je multikriteriální optimalizace nutností z důvodu zachování zpoždění obvodu, jehož část je předmětem optimalizace. Cílem disertační práce je navázat na předchozí výzkum a zabývat se možnostmi multikriteriální optimalizace číslicových obvodů s ohledem na dobrou škálovatelnost. Dále se předpokládá využití alternativních reprezentací jako je např. majority uzel, které lépe odrážejí principy nových technologií.Výzkum spadá do témat řešených výzkumnou skupinou Evolvable Hardware.
Tutor: Vašíček Zdeněk, doc. Ing., Ph.D.
The project is concerned with advanced rendering and global illumination methods. The aim is to research new photorealistic (physically accurate) as well as non-photorealistic (NPR) simulations of interaction of light with the 3D scene. Cooperation and research visits with leading research labs are possible (Adobe, USA, MPII Saarbrücken, Německo, Disney Curych, Švýcarsko, INRIA Bordeaux, Francie).
Tutor: Hanáček Petr, doc. Dr. Ing.
The aim of the thesis is to design and implement an application for more accurate diagnosis and prognosis of disease progression. Specifically, it will be:
Tutor: Drahanský Martin, prof. Ing., Ph.D.
Tutor: Ryšavý Ondřej, doc. Ing., Ph.D.
Tutor: Janoušek Vladimír, doc. Ing., Ph.D.
The aim of the thesis is to create artificial intelligence for the MindSphere environment of Siemens, namely:
Tutor: Rogalewicz Adam, doc. Mgr., Ph.D.
Tutor: Vojnar Tomáš, prof. Ing., Ph.D.
Considerable part of the BUT Speech@FIT group activities is linked to speech data mining in security, intelligence and defense applications. The topic of this dissertation if research in the areas of:
Tutor: Černocký Jan, prof. Dr. Ing.
Tutor: Jaroš Jiří, doc. Ing., Ph.D.
Tutor: Smrž Pavel, doc. RNDr., Ph.D.
Tutor: Herout Adam, prof. Ing., Ph.D.
The aim of the thesis is to create 3D face model from 2D photos of diverse origins, namely:
Modern operating systems (OS) must meet many requirements not only in terms of flexibility and efficiency of their execution on recent computing platforms, but also in terms of dependability of their kernels and services they provide to the application layer. The aim of the project is:
The project can be oriented into various directions, such as low-power applications / OS or application / OS designed to run in an embedded or a multi-core environment. During the project, a "conventional" OS such as Unix, Linux, Android, Windows, iOS or a specialized OS such as QNX, uC/OS-I (II, III), FreeRTOS, MQX can be utilized.
Tutor: Strnadel Josef, Ing., Ph.D.
Tutor: Růžička Richard, doc. Ing., Ph.D., MBA
Communication networks of critical infrastructure includes smart grid networks whose blackout can have enormous effect on industry or life of people. A major task of cyber security is to detect attacks against control communication of critical infrastructure in order to provide its robustness and reliability. The research topic will be focused on automated monitoring of smart grid ICS (Industrial Control System) communication, providing of ICS visibility, and advanced processing of monitoring data in order to prevent cyber threats. Various techniques commonly used in IT networks will be applied in OT (Operation Technology) environment. The goal of the research is to describe typical patterns of cyber attacks against critical infrastructure and propose methods and procedures how to identify and detect such attacks. The result will be evaluted on data from project partners. The topic will be a part of National Competence Centre for Cybersecurity.
Tutor: Matoušek Petr, doc. Ing., Ph.D., M.A.
Tutor: Kořenek Jan, doc. Ing., Ph.D.
The topic focuses embedded image, video and/or signal processing. Its main goal is to research capabilities of "smart" and "small" units that have such features that allow for their applications requiring smyll, hidden, distributed, low power, mechanically or climatically stressed systems suitable of processing of some signal input. Exploitation of such systems is perspective and wide and also client/server and/or cloud systems. The units themselves can be based on CPU/DSP/GPU, programmable hardware, or their combination. Smart cameras can be considered as well. Applications of interest include:
A possibility exists in collaboration on grant projects, especially the newly submitted TAČR, H2020, ECSEL ones (potentially employment or scholarship possible).
Tutor: Kreslíková Jitka, doc. RNDr., CSc.
The aim of the thesis is to analyze photographs and video sequences from mobile devices, consisting of:
Tutor: Meduna Alexandr, prof. RNDr., CSc.
The aim of this work is to generate various damages into synthetic fingerprints and analysis of their quality. The work will consist of:
Tutor: Beran Vítězslav, doc. Ing., Ph.D.
Tutor: Fučík Otto, doc. Dr. Ing.
The project deals with image and video quality assessment metrics (IQM). The aim is to explore new ways how to incorporate human visual system properties into IQM. In particular, we will consider perception of HDR images, and utilization of additional knowledge (in form of metadata, 3D information, etc.) about the tested scenes using machine learning (e.g. neural networks).
The project is concerned with advanced methods of image processing. The aim is to research new methods using machine learning, in particular deep convolutional neural networks.
Tutor: Burget Radek, doc. Ing., Ph.D.
The aim of this dissertation is to design and implement software for evaluation of measured data of cylindrical cavities. Based on the measured data, the application creates a computer model of the cavity in which it will look for damaged or otherwise problematic sites. The system will be able to predict the development of this site in the future under the same conditions of use of a device containing a measured cylindrical cavity (e.g. a barrel of military weapons). The device is available + can be fitted with other sensors as required. Research can be divided into the following stages:
Tutor: Hruška Tomáš, prof. Ing., CSc.
Current deep machine learning methods are based on continuous vector representations that are created by the neural networks (NN) themselves during the training. Although empirically, the results of NNs are often excellent, ourknowledge and understanding of such representations is insufficient. The task for this dissertation is to study neural representations for speech and text units of different scopes (from phonemes and letters to whole spoken and written documents) and representations acquired both for isolated tasks and multi-task setups:
Tutor: Burget Lukáš, doc. Ing., Ph.D.
The topic concerns algorithms of computer graphics and image synthesis. Its main goal is to research new algorithms so that their features and application possibilities are better understood so that they are improved or newly created. The programming work is expected in C, C++, C#, assembly language, or other languages. If suitable, they can be efficiently implemented e.g. in CPU, such as x86/64, ARM, Xeon PHI, GPU, etc. or other cores in CUDA, OpenCl, VHDL, etc. Algorithms of interest include:
After mutual agreement, individually selected algorithms can be considered as well as soon as they do belong to the general topic.
Collaboration on grant projects, such as TACR, H2020, ECSEL possible (employment or scholarship).
Tutor: Zbořil František, doc. Ing., CSc.
The topic concerns algorithms of image, video, and/or signal processing. Its main goal is to research and in-depth analyze existing algorithms and discover new ones so that they have desirable features and so that they are possible to efficiently implement. Such efficient implementation can be but does not necessarily have to be part of the work but it is important to prepare the algorithms so that they can be efficiently implemented e.g. in CPU, in CPU with acceleration through SSE instructions, in embeded systems, in embedded systems with FPGA, in Intel Xeon PHI, in extremely low power systems, or in other environments. The programming work is expected in C, C++, C#, assembly language, CUDA, OpenCl, VHDL, or other languages. The application possibilities of the algorithms are also important and the application can be but does not have to be part of the work. The algorithms/applications of interest include:
Safety, security, privacy and environmental protection are of paramount importance to respective unmanned aircraft systems (UAS) regulatory agencies. The widespread acceptance of UAS operations depends on their ability to demonstrate compliance with domestic, regional and international regulations and policies.The present research/thesis aims to identify the technical, management and regulatory challenges facing by the UAS operation. Based on the gap analysis, the research/thesis wil try to give one big-data driven UAS Traffic Management (UTM) solution. The design of UTM will also consider the interaction and integration with the current and future Air Traffic Management(ATM) system.To make this research/thesis possible, we may introduce the resources from world-leading organizations, for example, ICAO and JARUS, and also their leaders and experts.
Tutor: Chudý Peter, doc. Ing., Ph.D., MBA
The aim of the thesis is reconstruction of damaged CD/DVD/BR/HDD surfaces, consisting of:
Industrial Control Systems (ICS) are deployed for monitoring and control of industrial processes and devices in various industrial domains: energy, machinery, transportation, etc. In the past, ICS communication was transmitted over dedicated serial lines while today's networks are transported over IPv4/IPv6 and connected with Internet. Convergence of ICS communication and IP rises security concerns and the need for security monitoring of ICS communication which includes (i) visibility of ICS transmission, and (ii) monitoring data analyses. Data analyses focuses on anomaly detection, e.g., attacks on ICS communication, malfunctioning ICS devices, etc. Unlike Internet communication, monitoring and security incident detection is still not deployed in ICS networks. The topic focuses on processing of monitoring data, enhancing ICS network visibility and application of anomaly detection methods. The research will be provided in cooperation with partners of IoT Monitoring and Forensics (IRONSTONE) research project.
Internet of Thing is a communication platform that interconnects different types of home devices (home IoT networks) or industrial devices (industrial IoT networks). These devices usually lack sufficient protection against network attacks. Unfortunately, these attacks can cause serious demages. Besides intentional attacks, also malfuctioning or failures can cause serious demages. Thus IoT monitoring becomes a new domain of network monitoring and management. It includes monitoring of device behaviour, monitoring data acquisition, device settings, etc. Security monitoring focuses on detection of attack and anomalies in communication. Traditional methods used in security monitoring have limited scope of usage because IoT communication differs from common communication patterns on Internet. Thus, it is necessary to extend these method or propose a new approach how to analyze IoT monitoring metadata.The goal of this disertation is to analyze different method of IoT security monitoring and define how to protect these network against common threats. This advanced monitoring system should be implemented into existing SIEM systems. This topic is a part of international research IoT Monitoring and Forensics (IRONSTONE) by TACR.
The advent of autonomous mobility leverages the importance of vehicle's safe collision avoidance and an elimination of the need for human monitoring. The aim of the thesis is to research an integrated opto-radio-electronic system capable of issuing alert due to nearby traffic and a real-time estimation of the collision objects' trajectories. With the increase of the Unmanned Aircraft Systems' (UAS) popularity, a reliable detection and collision avoidance becomes a necessity for autonomous UAS operation beyond visual line of sight conditions.
Multi-core solutions represent a trend in recent computational architectures and applications, primarily due to the power and thermal limitations of technology scaling. From an application perspective, it is necessary to leverage parallelism and to limit synchronization using appropriate scheduling mechanisms over available cores to meet application-specific constraints related e.g. to power consumption, quality of services they deliver, performance, dependability or timeliness of their reactions. The aim of the project is:
The project can be oriented into various directions such as multi-core system design optimization, autonomously adaptive / reconfigurable systems, task / communication scheduling or operating system architectures for multi-core systems. During the project, "conventional" multi-core platforms such as ARM Cortex-A9, Intel/AMD or specialized ones such as Xilinx Zynq 7000, Altera SoC FPGA or Microsemi Smartfusion2 can be utilized to check the proposed method in practice.
Recent systems are becoming more and more demanding not only from the viewpoints of flexibility and efficiency of their operation on modern computing platforms, but also from the viewpoint of their activities and the services they provide and how they are managed.The aim of the project is:
Each network communication includes specific patterns that affected by a source operating system or a source application, by frequency of sending data, behavior of an user or communicating process. Using selected attributes of the communication, e.g., packet frequency, protocol distribution, header values, or destination address distribution, we can create a communication device profile or a user profile. Device or user profiling is used in multi-level authentication systems, detection of a known device, or anomaly detection. Profiling systems can be deployed in Internet services, in IoT (Internet of Things) environment, or industrial networks. The topic focuses on development and application of technique for data extraction and processing in order to create device or user profiles. Classical methods include device fingerprinting based on device feature extraction, advanced methods use machine learning approach, e.g., clustering. The research is a part of the IGA project ICT tools, methods and technologies for smart cities and will be directed at application domains of project partners.
Modern systems must meet many requirements not only in terms of flexibility and efficiency of their execution on recent computing platforms, but also in terms of security. The aim of the project is: