List of Theses Defences in the Year 2009

Mgr. Ondřej Daněk

Title: Applications of Graph Cut Optimization in Fluorescence Microscopy
Supervisor: doc. RNDr. Michal Kozubek, Ph.D., FI MU
Opponents: RNDr. Pavel Matula, Ph.D., FI MU
Mgr. Jiří Zelinka, Dr., PřF MU
Date of the defence: 29th May 2009

Summary of the thesis:

Cell, the basic building block of all living organisms, is a very complex system. The main component of a cell is its nucleus containing the genome which stores the entire information required for the construction and function of the organism. Better understanding of the roles of particular genes and proteins during the cell cycle and the ability to detect cell abnormalities are essential for early diagnosis and subsequent treatment of severe diseases such as cancer or leukemia. Hence, investigation on the spatial structure and mutual interactions of the genetic material in the cell nucleus is one of the most challenging tasks for modern molecular and cell biology.
The research in this field is performed mainly by the means of fluorescence microscopy. Modern confocal microscopes are fully automated devices capable of producing huge amounts of image data. Therefore, there is a natural demand for reliable, fast and accurate image processing methods. Even though many sophisticated methods are available, some crucial tasks are still problematic, such as the boundary extraction of cell nuclei in cell clusters and tissues.
The thesis was defended.

Mgr. Jaromír Plhák

Title: Dialogue Based Processing of Graphics
Supervisor: doc. RNDr. Ivan Kopeček, CSc., FI MU
Opponents: doc. Ing. Jan Černocký, Dr., FIT VUT v Brně
prof. Ing. Václav Matoušek, CSc., ZČU Plzeň
Date of the defence: 29th May 2009

Summary of the thesis:

The accessibility of computer graphics is one of the most important issues that assistive technology for the visually impaired meets. Up to now, most of the works in this area have been connected with tactile devices or oriented to using sound to help the user to investigate graphics. The proposed objectives of the thesis are based on the approach, that enables the user to obtain the desired information in freely choosing combinations of verbal and non-verbal form, having simultaneously full control in the way in which he or she investigate the picture.
In this context, interesting problems are connected with the annotation of pictures. The manual annotation is time consuming while the automatic annotation is still not usable due to its high error rate. It seems to be reasonable to investigate semi-automatic methods supported by graphical ontology to improve the efficiency of the image annotation. The concept of the vector graphics indicates that its annotation can be handled even more efficiently by integrating a knowledge database consisting of additional pieces of information about the annotated objects. In this area, I will focus especially on semi-automatic annotation supported by a graphical ontology and a knowledge database in relation to the problems related to the sonification.
The system for image sonification is the complementary part to the annotation system that explores the graphical data verbally using a dialogue system for the communication with the user. In this connection, the thesis will also analyse the principles for efficient exploration of colors in the image by presenting them by non-verbal sounds. The previous research indicates that the semantic color model can be exploited in this area.
Developing dialogue communication for combining both verbal and non-verbal image information is another important objective of the thesis. It seems to be reasonable to expect that the grammar evolution approach and mixed-initiative dialogue strategy implementation will enhance the efficiency of the dialog strategies.
The thesis was defended.

Mgr. Matěj Štefaník

Title: Klastrování textových dokumentů s využitím ontologií
Supervisor: prof. RNDr. Jiří Hřebíček, CSc.
Opponents: doc. PhDr. Karel Pala, CSc., FI MU
prof. RNDr. Jaroslav Pokorný, CSc., MFF UK v Praze
Date of the defence: 29th May 2009

Summary of the thesis:

The paper presents current state in field of text document clustering and introduces new method that can solve the clustering problem. This method is called KCF (Knowledge comes first) and it is a combination of methods SearchPoint and OBSA.
The thesis was defended.

Mgr. Václav Lorenc

Title: New Approaches to Design and Development of Secure SmartCard Applications
Supervisor: doc. RNDr. Václav Matyáš, M.Sc., Ph.D.
Opponents: doc. Ing. Petr Hanáček, Dr. (FIT VUT v Brně)
dr. Geraint Price (University of London)
Date of the defence: 14th January 2009

Summary of the thesis:

The "New Approaches to Design and Development of Secure SmartCard Applications" thesis proposal deals with the security issues of applets intended for deployment in smartcards.
Currently, methods of producing secure code are known and followed in many occasions. For a specific subset of smartcards, the Java Card platform, many of these were involved to enable programmers to use well typed programming language with possible bytecode verification. As a benefit of underlying smartcard platform, the bytecode and confidential data are protected by hardware itself.
However, not only software-specific issues represent a threat for Java Card. With involvement of indirect attacks and covert channels analysis, attackers have possibilities to discover what was meant to remain hidden, getting the very detailed insight into the code and data on the card. This gives them interesting ways of possible code modifications and misuse.
The thesis proposal discusses some possible countermeasures to bytecode reverse engineering; state automata principles are considered as a way that can both prevent side-channel analysis up to certain extent and provide provable mechanism for handling communication between the card and the host PC and corresponding processing routines.
Possible approaches are mentioned and partially identified; the thesis proposes that threat of insecure code and side-channel prevention should be studied simultaneously as interconnected disciplines of the Java Card engineering process. New methodology based on state automata principles for creating and verification Java Card applets is the objective of the upcoming research.
The thesis was defended.

Mgr. Pavel Minařík

Title: Network Traffic Processing and Visualization
Supervisor: RNDr. Zdenko Staníček, Ph.D.
Opponents: doc. RNDr. Václav Matyáš, M.Sc., Ph.D. (FI MU)
prof. Ing. Václav Přenosil, CSc. (FI MU)
Date of the defence: 14th January 2009

Summary of the thesis:

The work titled “Network Traffic Processing and Visualization” offers an alternative perspective of network traffic analysis and visualization domain. In contrast to the common approaches oriented to statistically significant indicators the proposed approach focuses on processing and analysing of details. The presented methods are usable in the encrypted traffic whose amount is growing continuously. The work also deals with advanced methods of NetFlow data processing (L3 traffic statistics). Achieved results including the proposed visualization method are illustrated on the real security incident example.
The thesis was defended.

Mgr. Andriy Stetsko

Title: Intrusion detection for wireless sensor networks
Supervisor: doc. RNDr. Václav Matyáš, M.Sc., Ph.D.
Opponents: doc. RNDr. Luděk Matyska, CSc. (FI MU)
prof. Javier Lopez (University of Malaga)
Date of the defence: 14th January 2009

Summary of the thesis:

In the section 1 there is an introduction to wireless sensor networks (WSNs), which are highly distributed networks composed of a large number of tiny low-cost devices, denoted as sensor nodes, and a few general-purpose computing devices referred to as base stations.
A wireless medium exposes data to an adversary, which may eavesdrop or even alter the ongoing communication. Attacker model and taxonomy of attacks are available in the section 2. Cryptographic techniques used to secure conventional networks are not always applicable because WSNs are infrastructure-less and resource-constrained. Moreover, cryptographic techniques are not always useful because they do not take into account node compromise, which allows the adversary to extract cryptographic material, to become a “legal” network participant and to launch insider attacks. Therefore, there is a need to introduce a second line of defense – an intrusion detection system (IDS).
In the section 3 there is an analysis of the state-of-the-art in IDSs for WSNs: how they are classified, the components they can involve, what kind of detection techniques they use, the placement of the detection agents, and how the different attacks are detected.
Several open questions related to IDS development are introduced in the section 4: localization of attacks -- most of the proposed schemes detect an intrusion, but do not localize its source; software attacks -- any vulnerability in any component might be exploited to compromise all sensor nodes; placement problem -- there is a need to choose a proper IDS placement strategy in order to minimize energy consumption and maximize IDS effectiveness; usage of cryptography -- we should carefully consider what key distribution scheme to employ since it might have an impact on an IDS effectiveness; WSN economical model -- should help to find an optimal IDS for a particular WSN.
Finally, in the section 5 there is the intent of the dissertation thesis.
The thesis was defended.