Aktuální informace FIT ke koronaviru najdete zde.

# Publikace

### A Design and Stand Tests of Real-time Vehicle Active Suspension

Autoři
Rok
2021
Publikováno
international scientific journal tran&MOTAUTO WORLD. 2021, 2021(4), 116-119. ISSN 2367-8399.
Typ
Článek
Pracoviště
Anotace
The paper deals with innovations in vehicle suspension technology developed in Josef Bozek´s Research Center of Combustion Engines and Automobiles at CTU in Prague, Czech Republic. A unique innovative suspension system that uses a linear electric motor as a controlled actuator has been designed. Many experiments on energy management in the system have been accomplished. In order to verify various control strategies and to test different ways of energy consumption optimization we designed and constructed a unique one-quarter-car test stand. To realize simulation and practical experiments at the test stand it is necessary to find a proper experimental road disturbance signal to excite the active suspension system. The disturbance signal is applied on one more linear motor that is placed under a wheel of the one-quarter-car test stand to excite the active suspension system. The paper deals with the way and results of experimental verification of vehicle active suspension behavior when robust control is applied and also with the energy management strategy that is used in the system. A modified H-infinity controller that enables to set energy management strategy is mentioned in the paper. At the close of the paper, some experiments taken on the one quarter-car model and their evaluation are discussed.

### A Design and Stand Tests of Real-timeVehicle Active Suspension

Autoři
Rok
2021
Publikováno
Proceedings of the VII International Scientific Congress "Innovations 21". Sofia: Scientific-technical union of mechanical engineering, 2021. p. 32-36. vol. 1. ISSN 2603-3763.
Typ
Stať ve sborníku
Pracoviště
Anotace
In the paper, energy recuperation and management in automotive suspension systems with linear electric motors controlled using a proposed H∞ controller to obtain a variable mechanical force for a car damper is presented. Vehicle suspensions in which forces are generated in response to feedback signals by active elements obviously offer increased design flexibility compared to the conventional suspensions using passive elements such as springs and dampers. The main advantage of the proposed solution using a linear AC motor is the possibility to generate desired forces acting between the unsprung and sprung masses of the car, providing good insulation of the car sprung mass from the road surface disturbances. In addition, under certain circumstances using linear motors as actuators enables to transform mechanical energy of the vertical car vibrations to electrical energy, accumulate it, and use it when needed. Energy flow control (management) enables to reduce or even eliminate the demands concerning the external power source.

### A characterization of Sturmian sequences by indistinguishable asymptotic pairs

Autoři
Starosta, Š.; Barbieri, S.; Labbé, S.
Rok
2021
Publikováno
European Journal of Combinatorics. 2021, 95 ISSN 0195-6698.
Typ
Článek
Pracoviště
Anotace
We give a new characterization of biinfinite Sturmian sequences in terms of indistinguishable asymptotic pairs. Two asymptotic sequences on a full -shift are indistinguishable if the sets of occurrences of every pattern in each sequence coincide up to a finitely supported permutation. This characterization can be seen as an extension to biinfinite sequences of Pirillo’s theorem which characterizes Christoffel words. Furthermore, we provide a full characterization of indistinguishable asymptotic pairs on arbitrary alphabets using substitutions and biinfinite characteristic Sturmian sequences. The proof is based on the well-known notion of derived sequences.

### Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques

Autoři
Rok
2021
Publikováno
Proceedings of the 7th International Conference on Information Systems Security and Privacy. Madeira: SciTePress, 2021. p. 376-383. ISSN 2184-4356. ISBN 978-989-758-491-6.
Typ
Stať ve sborníku
Pracoviště
Anotace
Active Directory is a prevalent technology used for managing identities in modern enterprises. As a variety of attacks exist against Active Directory environment, its security monitoring is crucial. This paper focuses on detection of one particular attack - Kerberoasting. The purpose of this attack is to gain access to service accounts’ credentials without the need for elevated access rights. The attack is nowadays typically detected using traditional ”signature-based” detection approaches. Those, however, often result in a high number of false alerts. In this paper, we adopt machine learning techniques, particularly several anomaly detection al- gorithms, for detection of Kerberoasting. The algorithms are evaluated on data from a real Active Directory environment and compared to the traditional detection approach, with a focus on reducing the number of false alerts.

### Application of Distance Metric Learning to Automated Malware Detection

Autoři
Rok
2021
Publikováno
IEEE Access. 2021, 2021(9), 96151-96165. ISSN 2169-3536.
Typ
Článek
Pracoviště
Anotace
Distance metric learning aims to find the most appropriate distance metric parameters to improve similarity-based models such as k -Nearest Neighbors or k -Means. In this paper, we apply distance metric learning to the problem of malware detection. We focus on two tasks: (1) to classify malware and benign files with a minimal error rate, (2) to detect as much malware as possible while maintaining a low false positive rate. We propose a malware detection system using Particle Swarm Optimization that finds the feature weights to optimize the similarity measure. We compare the performance of the approach with three state-of-the-art distance metric learning techniques. We find that metrics trained in this way lead to significant improvements in the k -Nearest Neighbors classification. We conducted and evaluated experiments with more than 150,000 Windows-based malware and benign samples. Features consisted of metadata contained in the headers of executable files in the portable executable file format. Our experimental results show that our malware detection system based on distance metric learning achieves a 1.09 % error rate at 0.74 % false positive rate (FPR) and outperforms all machine learning algorithms considered in the experiment. Considering the second task related to keeping minimal FPR, we achieved a 1.15 % error rate at only 0.13 % FPR.

### Automatic Detection and Decryption of AES by Monitoring S-box Access

Autoři
Kokeš, J.; Lórencz, R.; Matějka, J.
Rok
2021
Publikováno
Proceedings of the 7th International Conference on Information Systems Security and Privacy. Madeira: SciTePress, 2021. p. 172-180. ISSN 2184-4356. ISBN 978-989-758-491-6.
Typ
Stať ve sborníku
Pracoviště
Anotace
In this paper we propose an algorithm that can automatically detect the use of AES and automatically recover both the encryption key and the plaintext. It makes use of the fact that we can monitor accesses to the AES S-Box and deduce the desired data from these accesses; the approach is suitable to software-based AES implementations, both naíve and optimized. To demonstrate the feasibility of this approach we designed a tool which implements the algorithm for Microsoft Windows running on the Intel x86 architecture. The tool has been successfully tested against a set of applications using different cryptographic libraries and common user applications.

### Automorphisms of the cube n^d

Autoři
Valla, T.; Dvořák, P.
Rok
2021
Publikováno
Discrete Mathematics. 2021, 2021(344(3)), ISSN 0012-365X.
Typ
Článek
Pracoviště
Anotace
Consider a hypergraph n^d where the vertices are points of the d-dimensional cube [n]^d and the edges are all sets of n points such that they are in one line. We study the structure of the group of automorphisms of n^d, i.e., permutations of points of [n]^d preserving the edges. In this paper we provide a complete characterization. Moreover, we consider the Colored Cube Isomorphism problem of deciding whether for two colorings of the vertices of n^d there exists an automorphism of n^d preserving the colors. We show that this problem is GI-complete.

### Backward Pattern Matching on Elastic Degenerate Strings

Autoři
Procházka, P.; Holub, J.; Cvacho, O.; Krčál, L.
Rok
2021
Publikováno
Proceedings of 14th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2021). Lisboa: SCITEPRESS – Science and Technology Publications, Lda, 2021. p. 50-59. vol. 3. ISSN 2184-4305. ISBN 978-989-758-490-9.
Typ
Stať ve sborníku
Pracoviště
Anotace
Recently, the concept of Elastic Degenerate Strings (EDS) was introduced as a way of representing a sequenced population of the same species. Several on-line Elastic Degenerate String Matching (EDSM) algorithms were presented so far. Some of them provide practical implementation. We propose a new on-line EDSM algorithm BNDM-EDS. Our algorithm combines two traditional algorithms BNDM and the Shift-And that were adapted to the specifics needed by Elastic Degenerate Strings. BNDM-EDS is running in O (Nmd m w e) worst-case time. This implies O (Nm) time for small patterns, where m is the length of the searched pattern, N is the size of EDS, and w is the size of the computer word. The algorithm uses O (N + n) space, where n is the length of EDS. BNDM-EDS requires a simple preprocessing step with time and space O (m). Experimental results on real genomic data show superiority of BNDM-EDS over state-of-the-art algorithms.

### Binary intersection formalized

Autoři
Starosta, Š.; Holub, Š.
Rok
2021
Publikováno
Theoretical Computer Science. 2021, 866 14-24. ISSN 0304-3975.
Typ
Článek
Pracoviště
Anotace
We provide a reformulation and a formalization of the classical result by Juhani Karhumäki characterizing intersections of two languages of the form $\{x,y\}^* \cap \{u,v\}^*$. We use the terminology of morphisms which allows to formulate the result in a shorter and more transparent way, and we formalize the result in the proof assistant Isabelle/HOL.

### Can investment incentives potentially cause unemployment? An empirical analysis of the relationship between FDI and employment based on the OLI framework

Autoři
Evan, T.; Bolotov, I.
Rok
2021
Publikováno
Central European Business Review. 2021, ISSN 1805-4862.
Typ
Článek
Pracoviště
Anotace
Unemployment, particularly in depressed regions, is more often than not used by politicians as the main argument for investment incentives provided to MNCs. This paper applies Dunning’s OLI Framework to the relationship between FDI and employment with the assumption that political negotiation between MNCs and the host government might actually have zero effect or a negative effect on employment. Since the last letter of OLI, internalization, suggests that MNCs optimize all production factors available to them and “subsidies” provided to MNCs by governments decrease the relative price of capital, MNCs may try to use more labour-saving techniques. Two hypotheses are tested using the dynamic panel model (DPD) and Granger causality tests for 193 countries for the years 1985–2019 where the first is supported with no strong relationship discovered between the variables. The results of the paper should support debate on the efficiency of investment incentives.

### Comparison of OpTeX with other formats: LaTeX and ConTeXt

Autoři
Rok
2021
Publikováno
TUGboat, The Communication of the TeX Users Group. 2021, 2021(42:1), ISSN 0896-3207.
Typ
Článek
Pracoviště
Anotace
OpTEX [1] was introduced in an article [2] in the previous issue of TUGboat. It is a macro package that creates a format for LuaTEX. Its features are comparable with other formats like LaTEX or ConTEXt. One may ask why to use a new format, particularly when it requires a different markup syntax. I try to answer this question here. I present a comparison among the LaTEX, ConTEXt, and OpTEX formats, from various points of view.

### Data Structures to Represent a Set of k-long DNA Sequences

Autoři
Holub, J.; Chikhi, R.; Medvedev, P.
Rok
2021
Publikováno
ACM Computing Surveys. 2021, 54(1), 17:1-17:22. ISSN 0360-0300.
Typ
Článek
Pracoviště
Anotace
The analysis of biological sequencing data has been one of the biggest applications of string algorithms. The approaches used in many such applications are based on the analysis of k-mers, which are short fixed-length strings present in a dataset. While these approaches are rather diverse, storing and querying a k-mer set has emerged as a shared underlying component. A set of k-mers has unique features and applications that, over the past 10 years, have resulted in many specialized approaches for its representation. In this survey, we give a unified presentation and comparison of the data structures that have been proposed to store and query a k-mer set. We hope this survey will serve as a resource for researchers in the field as well as make the area more accessible to researchers outside the field.

### Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set

Autoři
Hynek, K.; Čejka, T.; Luxemburk, J.
Rok
2021
Publikováno
11th Annual Computing and Communication Workshop and Conference (CCWC2021). Piscataway (New Jersey): IEEE, 2021. p. 0115-0123. ISBN 978-0-7381-4394-1.
Typ
Stať ve sborníku
Pracoviště
Anotace
This paper presents a novel approach to detect brute-force attacks against web services in high-speed networks. The prevalence of brute-force attacks is so high that service providers, such as ISPs or web-hosting providers, cannot depend on their customers' host-based defenses. Moreover, the rising usage of encryption makes it more difficult to detect attacks on the network level. In our research, we created a dataset, which consists of 1.8 million extended IP flows from a backbone network combined with IP flows generated with three popular open-source brute-forcing tools. We identified a distinctive packet-level feature set and trained a machine-learning classifier with a false positive rate of 10^-4 and a true positive rate (the ratio of discovered attacks) of 0.938. The achieved results surpass the state-of-the-art solutions and show that the developed HTTPS brute-force detection algorithm is viable for production deployment.

### Economic Conditions for Innovation: Private vs. Public Sector

Autoři
Evan, T.; Holý, V.
Rok
2021
Publikováno
Socio-Economic Planning Sciences. 2021, 76 1-15. ISSN 0038-0121.
Typ
Článek
Pracoviště
Anotace
The Hicks induced innovation hypothesis states that a price increase of a production factor is a spur to the invention. We propose an alternative hypothesis restating that a spur to the invention requires not only an increase of one factor but also a decrease of at least one other factor to offset the companies’ cost. We illustrate the need for our alternative hypothesis in a historical example of the industrial revolution in the United Kingdom. Furthermore, we econometrically evaluate both hypotheses in a case study of research and development (R&D) in 29 OECD countries from 2003 to 2017. Specifically, we investigate the dependence of investments to R&D on the economic environment represented by average wages and oil prices using panel regression. We find that our alternative hypothesis is supported for R&D funded and/or performed by business enterprises while the original Hicks hypothesis holds for R&D funded by the government and R&D performed by universities. Our results reflect that the business sector is significantly influenced by market conditions, unlike the government and higher education sectors.

### Efficiency Near the Edge: Increasing the Energy Efficiency of FFTs on GPUs for Real-Time Edge Computing

Autoři
Adámek, K.; Novotný, J.; Thiyagalingam, J.; Armour, W.
Rok
2021
Publikováno
IEEE Access. 2021, 9 18167-18182. ISSN 2169-3536.
Typ
Článek
Pracoviště
Anotace
The Square Kilometer Array (SKA) is an international initiative for developing the world's largest radio telescope with a total collecting area of over a million square meters. The scale of the operation, combined with the remote location of the telescope, requires the use of energy-efficient computational algorithms. This, along with the extreme data rates that will be produced by the SKA and the requirement for a real-time observing capability, necessitates in-situ data processing in an edge style computing solution. More generally, energy efficiency in the modern computing landscape is becoming of paramount concern. Whether it be the power budget that can limit some of the world's largest supercomputers, or the limited power available to the smallest Internet-of-Things devices. In this article, we study the impact of hardware frequency scaling on the energy consumption and execution time of the Fast Fourier Transform (FFT) on NVIDIA GPUs using the cuFFT library. The FFT is used in many areas of science and it is one of the key algorithms used in radio astronomy data processing pipelines. Through the use of frequency scaling, we show that we can lower the power consumption of the NVIDIA A100 GPU when computing the FFT by up to 47% compared to the boost clock frequency, with less than a 10% increase in the execution time. Furthermore, using one common core clock frequency for all tested FFT lengths, we show on average a 43% reduction in power consumption compared to the boost core clock frequency with an increase in the execution time still below 10%. We demonstrate how these results can be used to lower the power consumption of existing data processing pipelines. These savings, when considered over years of operation, can yield significant financial savings, but can also lead to a significant reduction of greenhouse gas emissions.

### Emerging Technologies: Challenges and Opportunities for Logic Synthesis

Autoři
Fišer, P.; Bosio, A.; Cantan, M.; Marchand, C.; O'Connor, I.; Poittevin, A.; Traiola, M.
Rok
2021
Publikováno
Proceedings of 24th International Symposium on Design and Diagnostics of Electronic Circuits and Systems. Piscataway (New Jersey): IEEE, 2021. p. 93-98. ISBN 978-1-6654-3595-6.
Typ
Stať ve sborníku
Pracoviště
Anotace
In computer engineering, logic synthesis is a process by which an abstract specification of desired circuit behavior is turned into a design implementation in terms of logic gates. Historically, logic synthesis was tightly related to the physical implementation of the logic gates. Nowadays, pushed by the forecasted end of Moore's law, several emerging technologies (e.g., nanodevices, optical computing, quantum computing) are candidates to either replace or co-exist with the \textit{de facto} standard CMOS technology. The main consequence of the rising of those emerging technologies is that the logic synthesis has to face new issues and, at the same time, exploits new opportunities. The goal of this paper is thus to present three emerging technologies (Vertical Nanowire Field Effect Transistors, Ferroelectric Transistors, and Memristors), how to use them to implement logic gates, and the main challenges and issues for the logic synthesis.

### ESO-MAPF: Bridging Discrete Planning and Continuous Execution in Multi-Agent Pathfinding

Autoři
Surynek, P.; Chudý, J.
Rok
2021
Publikováno
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence. Menlo Park: AAAI Press, 2021. p. 16014-16016. ISBN 978-1-57735-866-4.
Typ
Stať ve sborníku
Pracoviště
Anotace
We present ESO-MAPF, a research and educational platform for experimenting with multi-agent path finding (MAPF). ESO-MAPF focuses on demonstrating the planning-acting chain in the MAPF domain. MAPF is the task of finding collision free paths for agents from their starting positions to given individual goals. The standard MAPF uses the abstraction where agents move in an undirected graph via traversing its edges in discrete steps. The discrete abstraction simplifies the planning phase however resulting discrete plans often need to be executed in the real continuous environment. ESO-MAPF shows how to bridge discrete planning and the acting phase in which the resulting plans are executed on physical robots. We simulate centralized plans on a group of OZOBOT Evo robots using their reflex functionalities and outputs on the surface of the screen that serves as the environment. Various problems arising along the planning-acting chain are illustrated to emphasize the educational point of view.

### Formalization of Basic Combinatorics on Words

Autoři
Starosta, Š.; Holub, Š.
Rok
2021
Publikováno
12th International Conference on Interactive Theorem Proving (ITP 2021). Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2021. p. 22:1-22:17. ISSN 1868-8969. ISBN 978-3-95977-188-7.
Typ
Stať ve sborníku
Pracoviště
Anotace
Combinatorics on Words is a rather young domain encompassing the study of words and formal languages. An archetypal example of a task in Combinatorics on Words is to solve the equation x ⋅ y = y ⋅ x, i.e., to describe words that commute. This contribution contains formalization of three important classical results in Isabelle/HOL. Namely i) the Periodicity Lemma (a.k.a. the theorem of Fine and Wilf), including a construction of a word proving its optimality; ii) the solution of the equation x^a ⋅ y^b = z^c with 2 ≤ a,b,c, known as the Lyndon-Schützenberger Equation; and iii) the Graph Lemma, which yields a generic upper bound on the rank of a solution of a system of equations. The formalization of those results is based on an evolving toolkit of several hundred auxiliary results which provide for smooth reasoning within more complex tasks.

### Formally verified speculation and deoptimization in a JIT compiler

Autoři
Vítek, J.; Barrière, A.; Blazy, S.; Flückiger, O.; Pichardie, D.
Rok
2021
Publikováno
Proceedings of the ACM on Programming Languages (PACMPL). 2021, 5(POPL), 1-26. ISSN 2475-1421.
Typ
Článek
Pracoviště
Anotace
Just-in-time compilers for dynamic languages routinely generate code under assumptions that may be invalidated at run-time, this allows for specialization of program code to the common case in order to avoid unnecessary overheads due to uncommon cases. This form of software speculation requires support for deoptimization when some of the assumptions fail to hold. This paper presents a model just-in-time compiler with an intermediate representation that explicits the synchronization points used for deoptimization and the assumptions made by the compiler's speculation. We also present several common compiler optimizations that can leverage speculation to generate improved code. The optimizations are proved correct with the help of a proof assistant. While our work stops short of proving native code generation, we demonstrate how one could use the verified optimization to obtain significant speed ups in an end-to-end setting. © 2021 Owner/Author.

### Graph isomorphism restricted by lists

Autoři
Knop, D.; Klavík, P.; Zeman, P.
Rok
2021
Publikováno
Theoretical Computer Science. 2021, 860 51-71. ISSN 0304-3975.
Typ
Článek
Pracoviště
Anotace
The complexity of graph isomorphism (GRAPHISO) is a famous problem in computer science. For graphs G and H, it asks whether they are the same up to a relabeling of vertices. In 1981, Lubiw proved that list restricted graph isomorphism (LISTISO ) is NP -complete: for each u∈V(G), we are given a list L(u)⊆V(H) of possible images of u. After 35 years, we revive the study of this problem and consider which results for GRAPHISO can be modified to solve LISTISO. We prove: 1) Under certain conditions, GI -completeness of a class of graphs implies NP -completeness of LISTISO. 2) Several combinatorial algorithms for GRAPHISO can be modified to solve LISTISO: for trees, planar graphs, interval graphs, circle graphs, permutation graphs, and bounded treewidth graphs. 3) LISTISO is NP -complete for cubic colored graphs with sizes of color classes bounded by 8 with all lists of size at most 3.

## Filtr

Za obsah stránky zodpovídá: doc. Ing. Štěpán Starosta, Ph.D.