Roman Jasek

Roman Jasek
Tomas Bata University in Zlín · Department of Informatics and Artificial Intelligence

Professor in Systems Engineering and Informatics

About

138
Publications
14,747
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
499
Citations
Citations since 2017
39 Research Items
193 Citations
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050

Publications

Publications (138)
Article
Full-text available
Whether due to unpleasant events, injuries or illnesses, people lose the mobility of their hands. In extreme cases, amputation of the hand or hands can also occur. This paper deals with designing and fabricating an affordable transradial prosthesis using 3D printing and measuring finger positioning accuracy during a long-term test. The prosthesis’...
Chapter
Accurate segmentation of brain tumors from the magnetic resonance image (MRI) is an essential step for radionics analysis as well as finding the tumor extension is so necessary to plan the best treatment to improve the survival rate. Manually extracting sub-regions of the brain tumor from MRI is a tedious process and time-consuming, as the complex...
Chapter
This research proposes an approach to improve the performance of effort estimation based on the balancing of each group for categorical variables. The proposed model is based on function point analysis, Industry Sector, and deep learning. The Pytorch library is used to build the deep learning model with the dataset ISBSG (release 2020). The accurac...
Article
Nowadays, lie detection based on electroencephalography (EEG) is a popular area of research. Current lie detectors can be controlled voluntarily and have several disadvantages. EEG-based lie detectors have become popular over polygraphs because human intentions cannot control them, are not based on subjective interpretation, and can therefore detec...
Article
This paper proposes an automated tomato fruit detection and counting process without a need for any human intervention. First of all, wide images of whole tomato plant rows were extracted from a 360-degree video taken in a greenhouse. These images were utilized to create a new object detection dataset. The original tomato detection methodology uses...
Conference Paper
Full-text available
Background: There are many studies on the effect of data clustering on the effort estimation process. Most of them are on partitioning and density-based clustering, and some use hierarchical clustering but fewer details on the linkage methods. Aim: we concentrate on the aspect of the agglomerative hierarchical clustering algorithm's effectiveness o...
Article
Full-text available
At present, the modern form of hydroponic vegetable growing in the greenhouse cannot be processed without the use of a wide range of advanced technologies, such as a climate computer. Nevertheless, there is still a high need for human labor. This fact is a strong impetus for more intensive involvement of innovative technologies in the field of Agri...
Chapter
Background: There are many studies on the effect of data clustering on the effort estimation process. Most of them are on partitioning and density-based clustering, and some use hierarchical clustering but fewer details on the linkage methods. Aim: we concentrate on the aspect of the agglomerative hierarchical clustering algorithm’s effectiveness o...
Chapter
Full-text available
Accuracy of effort estimation is one of the necessary conditions for efficiently managing software development projects. Since the information available in the early stages of software development is insufficient, software sizing metrics are considered critical factors for effort estimation. However, there is no consistent method for converting sof...
Article
Brain-Computer Interface (BCI) provides direct communication between the brain and an external device. BCI systems have become a trendy field of research in recent years. These systems can be used in a variety of applications to help both disabled and healthy people. Concerning significant BCI progress, we may assume that these systems are not very...
Chapter
Malware is an unwanted software that performs actions in computers or computer networks, which users might disagree with. One of the worst types of malware is ransomware that affects the victim’s data by modifying, deleting, or blocking the access to them. Frequent malware attacks on organizations led to a change in malware detection from external...
Chapter
Steel is one of the most widely building materials of modern times. Automatic detection of manufacturing defects in steel surfaces is a very important step for product quality control in the steel manufacturing industry. Traditional inspection systems require high maintenance costs and allow little flexibility. In this paper, we propose using the d...
Chapter
Early detection and diagnosis of plant leaf diseases is a major necessity in a growing agricultural economy, plant leaf diseases detection is considered crucial at a very early stage as it allows adopting predictive mechanisms that helps avoiding losses to the agri-based economy. Tomato is one of the most important crops that is produced in large q...
Article
This study shows the possibilities of how to replace tedious human labor—scouting of yellow sticky traps (YST) for whiteflies—using artificial cognitive vision, specifically the deep convolutional network (CNN), as a part of the more complex system—BERABOT. The used CNN is the Faster R-CNN trained by deep transfer learning to substitute human scout...
Chapter
2020 was declared as the International Year of Plant Health, plant disease is a nightmare of any farmer, as it threatens their business and food security. The wide deployment and penetration of smartphones accompanied by computer vision models development created an economical and easy opportunity for using image classification in agriculture. Conv...
Chapter
Cyber physical systems (CPS) are being increasingly deployed in different critical infrastructures such as transportation, healthcare, power, water, and other networks, these deployments witnessed a growing complexity of components by increased use of advanced technologies like sensors, actuators, communication networks and multicore processors: th...
Chapter
Data replication in a distributed database system is a crucial topic for enhancing data availability and improving the system faults tolerance, in the distributed database we think that clients use a single database yet, in fact, a set of databases are stored on multiple servers is used. Replication often plays an important role in database managem...
Chapter
Non-compliant behaviour prediction is an essential feature of open systems; this non-compliance may be due to accident, necessity, or malice. Therefore, to achieve a sustainable operation in a system we need to handle non-compliance using error detection and correction based on type and severity. In this paper, we will present Event-B as a formal m...
Chapter
In this paper, a novel lightweight version of the Successful-History based Adaptive Differential Evolution (SHADE) is presented as the first step towards a simple, user-friendly, metaheuristic algorithm for global optimization. This simplified algorithm is called liteSHADE and is compared to the original SHADE on the CEC2015 benchmark set in three...
Conference Paper
Full-text available
The primary purpose of this paper is to show the possibility of using diagnostic methods in rehabilitation. The article described two types of methods - electroencephalography (EEG) and surface electromyography (sEMG). The first section of this article describes both technologies and devices, which were selected. The second section defines the expe...
Article
Full-text available
ABSTRAKT Brain-Computer Interface (BCI) je rozhraní, které propojuje mozek a počítač. V tomto článku jsou vysvětleny základní principy ovládání periferních systémů, jako jsou např. protéza, invalidní vozík, domácí pomůcky apod. Ovládání systémů probíhá pomocí snímání mozkové aktivity čtrnácti svodovým EEG systémem přes technologické rozhraní BCI je...
Chapter
Multi-agent systems consist of agents and their environment. the agents in a multi-agent system could equally well be robots, humans or human teams. And may contain combined human-agent.
Chapter
Cloud computing provide services to many users at the same time by providing virtual resources via internet, General example of cloud services is Google apps, provided by Google. In most of cloud applications, processing is done on remote cloud computing nodes. So, there are more chances of errors, due to the undetermined latency and lose control o...
Article
Full-text available
The primary purpose of this article is to show which brain waves are activated while driving an automobile. The first part of this article deals with the theoretical information about brain waves and electroencephalogram (EEG). The activity of the brain is measured by EEG technology, which is represented by Emotiv System devices. The following sect...
Article
Full-text available
The primary purpose of this article is to show and analyse the brain waves, which are activated during different activities. At the first part of the paper, we describe the theoretical information about Brain-Computer Interface and the types of this technology. The article mainly focuses on the non-invasive Brain-Computer Interface, which is used i...
Article
Full-text available
Nowadays, a wide set of systems and application, especially in high performance computing, depends on distributed environments to process and analyses huge amounts of data. As we know, the amount of data increases enormously, and the goal to provide and develop efficient, scalable and reliable storage solutions has become one of the major issue for...
Article
Full-text available
The danger of terrorism is a result of the increased risk of critical infrastructure. We will focus on enumerating each area then listing of possible real uses in security and protection and finally we will focus in the list of used 3D sensors (in practice focused mainly on the use of laser scanning of space, camera sensing and subsequent transfer...
Chapter
This paper responds to requirement to improve the orientation between offered SW, as ITIL tools. There are really a lot of offered tools and very often this fact may leads to the poor implementation of ITIL. Main objective of this paper is to provide an overview how users’ preferences change in a short time and primarily the comparison between expe...
Conference Paper
Multi-Agents Systems (MAS) provide a good basis to build complex systems and in MAS a negotiation is a key form of interaction that enables agents to arrive at a final agreement. We present an event-B based approach to reasoning about a negotiation protocols in multi-agent systems (MAS), Key features of Event-B are the use of set theory as a modeli...
Conference Paper
Information in this era is thriving to be maintained on a verity of sources. Data is available in different patterns and forms. Combining and processing all different types of datasets in a heterogeneity database is near to impossible, specifically, if the information is moving and changing on many different sources on a continuous basis. Informati...
Chapter
The basic idea of BCI (Brain Computer Interface) is to connect brain waves with an output device through some interface. Human brain activity can be measured by many technologies. In our research, we use EEG (Electroencephalography) technology. This chapter will deal with processing of EEG signal and its utilization in practical applications using...
Article
Full-text available
Recently, the interest in development of service robots highly increases. The annual turnover in this area is estimated to a number close to 17 milliard Euro in the past years. The annual turnover could rise to 0.1 billion Euro by 2020 by IFR considering 30 % growth every year. Investments are expected to flow into all areas related to service robo...
Conference Paper
Full-text available
This article summarizes the actual results of our research in designing new group of polymorphous modes of operation for block ciphers. We have designed general scheme of block cipher polymorphous mode of operation based on pseudorandom number generator (PRNG) and function F. We have also designed the first polymorphous mode based on this scheme PM...
Conference Paper
The main aim of this paper is to provide basic knowledge background for further work. The basis is classification of available methods for multi-criterial evaluation. This classification will serve as a support of project (Comparison of methods of multi-criteria evaluation with user ratings of ITIL tools). In first part of this paper are described...
Conference Paper
The paper deals with the applications of modeling and simulation tools in the optimization of business processes, especially in solving an optimization of signal flow in security company. As a modeling tool was selected Simul8 software that is used to process modeling based on discrete event simulation and which enables the creation of a visual mod...
Conference Paper
The biometric identification by face is among one of the most widely used methods of biometric identification. Due to it provides a faster and more accurate identification; it was implemented into area of security 3D face reader by Broadway manufacturer was used to measure. It is equipped with the 3D camera system, which uses the method of structur...
Conference Paper
Biometric identification systems build features, which describe people, using various data. Usually it is not known which of features could be chosen, and a dedicated process called a feature selection is applied to resolve this uncertainty. The relevant features, that are selected with this process, then describe the people in the system as well a...
Conference Paper
This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how t...
Conference Paper
This research deals with the comparison of the two modern approaches for evolutionary algorithms, which are the adaptivity and complex chaotic dynamics. This paper aims on the investigations on the chaos-driven Differential Evolution (DE) concept. This paper is aimed at the embedding of discrete dissipative chaotic systems in the form of chaotic ps...
Conference Paper
This article briefly mentions some selected options of current concept for identifying cyber attacks from the perspective of the new cyberspace of real system. In the cyberspace, there is defined n-dimensional abstract system containing elements of the spatial arrangement of partial system elements such as micro-environment of cyber systems surroun...
Conference Paper
Brain Computer Interface (BCI) technology is intended to control external system by brain activity. One of main part of such system is software interface, which carries about clear communication between brain and either computer or additional devices connected to computer. This paper is organized as follows. Firstly, current knowledge about human b...
Conference Paper
This paper responds to requirement to improve the orientation between offered SW, as ITIL tools. There are really a lot of amount thus offered tools and very often leads to poor implementation of ITIL on the basis of incorrectly chosen tools. Main objective of this paper is to provide an overview about possibilities of choosing a suitable tool. Sim...
Article
This paper demonstrates new approach to security management in companies. Currently, many companies manage individual security fields separately. New approach is based on integration of all individual security fields into one security management system. Proposed model in this paper is based on the project “Possibilities of ITIL implementation in Co...
Article
Full-text available
This paper compares two different implementations of the Self-Organizing Migrating Algorithm (SOMA), which is a highly effective tool of an evolutionary optimization that is aimed at the same set of problems as Genetic Algorithms. One implementation of algorithm was created in the C# framework and the second implementation in Java framework. Both i...
Article
The contemporary trend of increasing connectivity, interoperability and efficiency of technologies, which are used in organizations, also affected Industrial Control System (further only ICS). The recently isolated system is becoming more dependent on interconnection with external technologies. This leads to a formation of new vulnerabilities, whic...
Conference Paper
The aim of this paper is to compare the performance of Polymorphous Mode - Deterministic Chaos - Logistic Maps (further only PM-DC-LM) with some of the most commonly used block cipher modes of operation. Among the most notable of these are the Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and...
Conference Paper
Full-text available
The aim of this paper is to compare the performance of Polymorphous Mode-Deterministic Chaos-Logistic Maps (further only PM-DC-LM) with some of the most commonly used block cipher modes of operation. Among the most notable of these are the Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Cou...
Conference Paper
This contribution presents different approach to security management in companies. Current approach focuses on separately managed individual security fields compared to the proposed new approach. This approach is based on integrated security system management. The main objective of this paper, which is based on project “Possibilities of ITIL1 imple...
Article
This research deals with the hybridization of the two soft-computing fields, which are chaos theory and evolutionary computation. This paper aims on the experimental investigations on the chaos-driven evolutionary algorithm Differential Evolution (DE) concept. This research represents the continuation of the satisfactory results obtained by means o...
Article
The basic idea of Brain - Computer Interface (BCI) is the connection of brain waves with an output device through some interface. Aim of this article is to clarify the potential utilization of complex EEG signal in BCI system. For this purpose, real application of BCI technology was designed and tested. This paper describes this real application in...
Article
This paper responds to requirement to improve the orientation between offered SW, such as ITIL tools. Nowadays there are enormous amount of offered tools. This situation very often leads to poor implementation of ITIL on the basis of primary unappropriate choice. This paper is-focused on the model and proposal of evaluation criteria for free and op...
Conference Paper
This paper describes creating the new variable mode of operation for block cipher, and it also discusses possibilities of using the deterministic chaos in this mode of operation. It discusses the use of deterministic chaos to make the mode of operation variable and pseudo-random. Main idea of this article is to design the mode of operation dependen...
Article
This paper presents using of JSBSim library for flight dynamics modelling of a mini-UAV (Unmanned Aerial Vehicle). The first part of the paper is about general information of UAVs and about the fundamentals of airplane flight mechanics, forces, moments, and the main components of typical aircraft. The main section briefly describes a flight dynamic...
Article
This paper presents using of FlightGear application for flight simulation of a mini-UAV (Unmanned Aerial Vehicle). The first part of the paper is about general information of UAVs and about the fundamentals of airplane flight mechanics. The main section summarizes the information about FlightGear application and describes a way of using the applica...
Article
This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The con...
Article
The paper presents the reader into the issue of ITIL ® and provides it as a basic overview of the concepts, terminology and philosophyof IT Service management. All this information is contained in 5 key ITIL ® publications on around 1400 pages. The aim therefore is a brief summary of the issue, which also serves as an introduction to the following...
Conference Paper
Since the release of the latest version of ITIL® v3 - 2011 edition, several years have passed. Nevertheless the question of differences between versions and editions remains up-to-date. The main reason is the large diversity of business environment and culture (company size, use of ICT, company strategy and policy etc.). Therefore article discusses...
Conference Paper
This paper studies how redundant data affect maximizing of weighted distances of vectors in a set of vectors. To maximize distances differential evolution is used, because the problem does not have analytical solution and is complex. This paper at first describes suppressing of redundant data mathematically and then it checks this theoretical resul...
Article
Full-text available
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstrate the necessity to abandon them in favor of more...
Chapter
The basic idea of Brain Computer Interface (BCI) is the connection of brain waves with an output device through some interface. Aim of this article is to clarify the potential utilization of complex EEG signal in BCI system. For this purpose, the architecture of the software interface was designed and tested. The main task of the interface is to tr...
Conference Paper
Aim of this article is to clarify the potential use of EEG signal in modern information age. The basic principle of Brain Computer Interface (BCI) lies in the connection of brain waves with output device through some interface. BCI technology represents a communication interface between brain and computer. To sense electric signal from the brain, i...
Article
This paper focuses on the security of the remote laboratories, formed by remote experiments, against malign attacks. Surprisingly, in spite of the fact the remote laboratories have been existing for at least three decades, virtually no attention has been devoted to this vital subject. Specifically, the paper deals with the issues related to diverse...
Chapter
An obstacle detection became one of the most important tasks in a robotic system development. DistanceDetector is a device which can detect large obstacles by utilizing a combination of ultrasonic sonars and infrared sensors. This paper deals with the DistanceDetector description and reveals its hardware and firmware structure, used technologies an...
Chapter
This work represents the brief introduction into the issue of development of complex cost function for evolutionary optimization of control of discrete chaotic systems. This work introduces briefly the evolutionary approach representing tuning of parameters for an existing control method. The main part of this work is focused on the process of deve...
Chapter
This article represents the brief introduction into the issues of simulation of brain activity. Firstly, there is shown a physiological description of the human brain, which summarizes current knowledge and also points out its complexity. These facts were obtained through the technologies, which are intended for observing electrical activity of the...
Chapter
This research deals with the extended investigations on the concept of a chaos-driven evolutionary algorithm Differential Evolution (DE). This paper is aimed at the embedding of set of six discrete dissipative chaotic systems in the form of chaos pseudo random number generator for DE. Repeated simulations were performed on the set of two shifted be...
Article
Aim of this article is to clarify the potential utilization of complex EEG signal in modern information age. Brain Computer Interface (BCI) represents the connection of brain waves with output device through some interface. It was investigated whether the correlation analysis of the EEG signal may be used for finding appropriate classification para...
Article
In this paper, Differential Evolution (DE) is used for the evolutionary optimization of control of chaotic Lozi map system. The novality of the approach is that the identical selected discrete dissipative chaotic system is used as the chaotic pseudo random number generator to drive the mutation and crossover process in the DE. The optimization was...
Chapter
This paper explores suitability of using of differential evolution for maximizing of weighted distances of vectors in a set of vectors. Increase in vector distances simplifies searching for the best matching vector what is a common task in many areas (for instance in biometric identification of people). Maximizing of weighted distances itself is co...
Chapter
Parallel reduction algorithms are frequent in high performance computing areas, thus, modern parallel programming toolkits and languages often offer support for these algorithms. This article discusses important implementation aspects of built-in support for parallel reduction found in well-known OpenMP C/C++ language extension. It shows that the i...
Data
Full-text available
There is one-table with comparation of fit (MAE/M) of all investigated models of network traffic form our articles.
Article
The paper is focussed on remote, sometimes denoted by e-laboratories and their security. In the introduction the basic features, working principles and state of the art of this new ICT teaching tool are described. The main topic of the paper is a new and emerging issue of the safety and security of e-laboratories, whose safety measures are often in...
Chapter
Full-text available
The article is a try to discussion of a few specific IT security-related terms, with explanation what do they means, from where they were presumably borrowed and suggestion how they should be used (or why should not be used at all).
Article
This paper discusses the possibility of using evolutionary algorithms for the reconstruction of chaotic systems. The main aim of this work is to show that evolutionary algorithms are capable of the reconstruction of chaotic systems without any partial knowledge of internal structure, i.e. based only on measured data and a predefined set of basic ma...
Article
This paper introduces a novel discrete Self Organising Migrating Algorithm for the task of flowshop scheduling with no-wait makespan. The new algorithm is tested with the small and medium Taillard benchmark problems and the obtained results are competitive with the best performing heuristics in literature.
Article
The article summarized current state of our works regarding usage of exponential smoothing Holt-Winters’ based models for analysis, modelling and forecasting Time Series with data of computer network traffic. Especially we use two models proposed by J. W. Taylor to deal with double and triple seasonal cycles for modelling network traffic in two loc...
Chapter
This research introduces a method of steganalysis by means of neural networks and its structure optimization. The main aim is to explain the approach of revealing a hidden content in jpeg files by feed forward neural network with Levenberg-Marquardt training algorithm. This work is also concerned to description of data mining techniques for structu...
Article
This article is focused on the security solution based on intrusion detection idea, which should be independent of the web server type or configuration and do not rely on the other network hardware components. Discussed intrusion detection system solution is connected directly with the web application and is based on the real-time request analysis....
Article
This research deals with a novel approach to classification. This paper deals with a synthesis of a complex structure, which serves as a classifier. This structure is similar to classical artificial neural net and therefore a comparison with them is performed. The proposed method for classifier structure synthesis utilizes Analytic Programming (AP)...
Article
This research deals with the optimization of control of Hénon Map, which is a discrete chaotic system. This work introduces and compares evolutionary approach representing tuning of parameters for an existing control method either with the standard cost function using the numerical desired state as the one of the input or blackbox type cost functio...
Article
Mobile technologies have transformed rapidly with their rate of adoption increasing for several years. Smartphones, tablets, and other small form-factor devices are integrated in educational institutions, medical and commercial facilities with further military, governmental as well as industrial deployment expected in future. However, the complexit...
Article
Full-text available
The Czech Republic (CR) has been ranked the 1st among the countries of the European Union (EU) countries in the growth rate of broadband access. The Internet penetration rate has increased by 48 percent between 2005 and 2011. This high growth rate is driven by the entry of new operators and the proliferation of Community Wireless Networks (CWNs). T...
Chapter
This paper is intended to present a trend analysis resulting from different secondary to primary windings ratio of evolutionary optimized audio transformer. Evolutionary optimization of audio transformers is a perspective approach to the wideband audio transformers design by employing methods of artificial intelligence algorithms. This novel approa...
Article
One of the new emerging application strategies for optimization is the hybridization of existing metaheuristics. The research combines the unique paradigms of solution space sampling of SOMA and memory retention capabilities of Scatter Search for the task of capacitated vehicle routing problem. The new hybrid heuristic is tested on the Taillard set...
Article
This paper introduces an overview of possible use of evolutionary techniques on catastrophic events detection. Catastrophic events here means Thom's catastrophes that are part of chaotic dynamics and can be used to model bifurcations, that appears in the nonlinear behavior of various dynamical systems. Participation summarize yet obtained results a...
Article
This research deals with a synthesis of control law for selected discrete chaotic system - logistic equation by means of analytic programming. The novelty of the approach is that a tool for symbolic regression - analytic programming - is used for the purpose of stabilization of higher periodic orbits - oscillations between several values of chaotic...