{"id":1989,"date":"2016-05-05T15:08:44","date_gmt":"2016-05-05T13:08:44","guid":{"rendered":"http:\/\/excel.fit.vutbr.cz\/2019\/?page_id=1989"},"modified":"2019-04-26T10:46:48","modified_gmt":"2019-04-26T08:46:48","slug":"vysledky","status":"publish","type":"page","link":"https:\/\/excel.fit.vutbr.cz\/2019\/vysledky\/","title":{"rendered":"V\u00fdsledky"},"content":{"rendered":"\r\n\t<link rel=\"stylesheet\" media=\"all\" type=\"text\/css\" href=\"\/submissions\/css\/results.css?v20170505\">\r\n\r\n\t<div class=\"well\">\r\n\t\t<ul>\r\n\t\t\t<li><a href=\"#oceneni-odbornym-panelem\">Ocen\u011bn\u00ed <strong>odborn\u00fdm panelem<\/strong><\/a><\/li>\r\n            <li><a href=\"#oceneni-partnery\">Ocen\u011bn\u00ed <strong>partnery<\/strong><\/a><\/li>\r\n            <li><a href=\"#oceneni-odbornou-verejnosti-cena-jiriho-kunovskeho\">Ocen\u011bn\u00ed <strong>odbornou ve\u0159ejnost\u00ed<\/strong> - cena Ji\u0159\u00edho Kunovsk\u00e9ho<\/a><\/li>\r\n\t\t<\/ul>\r\n\t<\/div>\r\n\t  \r\n\t<h2 id=\"oceneni-odbornym-panelem\">Ocen\u011bn\u00ed <strong>odborn\u00fdm panelem<\/strong><\/h2>\r\n\t<div class=\"row results\">\r\n\t\t<div class=\"thumbnail topic01 topic03\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za p\u0159\u00ednos v oblasti prevence kriminality na webu\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">5<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal5\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/005\/5_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Automatizovan\u00e1 anal\u00fdza a archivace dat z webu<\/h4>\r\n\t\t\t\t<h5>Tom\u00e1\u0161 Kocman<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/005\/5.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/005\/5_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal5\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">5<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Automatizovan\u00e1 anal\u00fdza a archivace dat z webu<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Tom\u00e1\u0161 Kocman<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Kyberkriminalita, Archivace webu, Dolov\u00e1n\u00ed dat<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <span class=\"label label-default\">Datab\u00e1ze a data-mining<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Archivace dat z webu je u\u017eite\u010dn\u00e1 pro ty p\u0159\u00edpady, ve kter\u00fdch si chceme udr\u017eovat m\u011bn\u00edc\u00ed se informace o n\u011bjak\u00e9m subjektu v \u010dase. Tato pr\u00e1ce umo\u017e\u0148uje automatizovat archivaci webov\u00fdch str\u00e1nek, ov\u0161em jen t\u011bch, kter\u00e9 spl\u0148uj\u00ed ur\u010dit\u00e1 pravidla \u2013 data na nich obsa\u017een\u00e1 vyhovuj\u00ed definovan\u00fdm regul\u00e1rn\u00edm v\u00fdraz\u016fm. V\u00fdsledkem pr\u00e1ce je platforma, kterou lze konfigurovat takov\u00fdm zp\u016fsobem, aby prohled\u00e1vala a archivovala webov\u00e9 str\u00e1nky podle r\u016fzn\u00fdch strategi\u00ed. M\u011bjme nap\u0159\u00edklad instituci jako muzeum nebo knihovnu, kter\u00e1 by cht\u011bla ukl\u00e1dat historii ur\u010dit\u00fdch dokument\u016f na webu. S platformou lze jednodu\u0161e automatizovan\u011b nav\u0161t\u00edvit v\u0161echny str\u00e1nky na dan\u00e9m webu a pokud tyto str\u00e1nky spl\u0148uj\u00ed definovan\u00e1 pravidla, platforma provede jejich z\u00e1lohu. V oblasti kyberkriminality nap\u0159\u00edklad vy\u0161et\u0159ovatel\u00e9 znaj\u00ed webov\u00e9 str\u00e1nky, pop\u0159\u00edpad\u011b f\u00f3rum, kde pachatel prov\u00e1d\u011bl trestnou \u010dinnost. Potom m\u016f\u017eou platformu vyu\u017e\u00edt k nalezen\u00ed d\u016fkazn\u00edho materi\u00e1lu \u2013 internetovou p\u0159ezd\u00edvku pachatele, obsah zpr\u00e1v a dal\u0161\u00ed pro soud cenn\u00e9 informace.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/005\/5_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/005\/5.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/005\/5_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic12 topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za vytvo\u0159en\u00ed u\u017eite\u010dn\u00e9ho diagnostick\u00e9ho n\u00e1stroje\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">15<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal15\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/015\/15_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Mobiln\u00ed aplikace pro rozpozn\u00e1n\u00ed leukokorie ze sn\u00edmku lidsk\u00e9ho obli\u010deje<\/h4>\r\n\t\t\t\t<h5>Pavel H\u0159eb\u00ed\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/015\/15.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/015\/15_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/xHnnN1x65S0\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal15\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">15<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Mobiln\u00ed aplikace pro rozpozn\u00e1n\u00ed leukokorie ze sn\u00edmku lidsk\u00e9ho obli\u010deje<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Pavel H\u0159eb\u00ed\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Mobiln\u00ed aplikace, Eye Check, Leukokorie, Zdrav\u00e9 o\u010di, iOS, Android, React Native, OpenCV, Dlib, REST<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">U\u017eivatelsk\u00e1 rozhran\u00ed<\/span> <span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>C\u00edlem t\u00e9to pr\u00e1ce je n\u00e1vrh a implementace multiplatformn\u00ed multijazy\u010dn\u00e9 mobiln\u00ed aplikace pro rozpozn\u00e1n\u00ed leukokorie ze sn\u00edmku lidsk\u00e9ho obli\u010deje pro platformy iOS a Android. Leukokorie je b\u011blav\u00fd svit zornice, kter\u00fd se p\u0159i pou\u017eit\u00ed blesku m\u016f\u017ee na fotografii objevit. V\u010dasnou detekc\u00ed tohoto symptomu lze zachr\u00e1nit zrak \u010dlov\u011bka. Samotn\u00e1 aplikace umo\u017e\u0148uje analyzovat fotografii u\u017eivatele a detekovat p\u0159\u00edtomnost leukokorie. C\u00edlem aplikace je tedy anal\u00fdza o\u010d\u00ed \u010dlov\u011bka, od \u010deho\u017e je tak\u00e9 odvozen n\u00e1zev mobiln\u00ed aplikace - Eye Check. K vytvo\u0159en\u00ed multiplatformn\u00ed aplikace byl pou\u017eit framework React Native. Pro detekci obli\u010deje a pr\u00e1ci s fotografi\u00ed byly pou\u017eity knihovny OpenCV a Dlib. Komunikace mezi klientem a serverem je \u0159e\u0161ena pomoc\u00ed architektury REST. V\u00fdsledkem je mobiln\u00ed aplikace, kter\u00e1 p\u0159i detekci leukokorie u\u017eivatele upozorn\u00ed, \u017ee by m\u011bl nav\u0161t\u00edvit sv\u00e9ho l\u00e9ka\u0159e.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/015\/15_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/015\/15.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/015\/15_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/xHnnN1x65S0\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic08\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za p\u0159\u00ednos v oblasti alternativn\u00edch s\u00ed\u0165ov\u00fdch architektur\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">30<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal30\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/030\/30_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>rlite: building scalable networks the recursive way<\/h4>\r\n\t\t\t\t<h5>Michal Koutensk\u00fd<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/030\/30.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/030\/30_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal30\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">30<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">rlite: building scalable networks the recursive way<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Michal Koutensk\u00fd<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>network architecture, RINA, rlite<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e9 s\u00edt\u011b<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>The purpose of this paper is twofold \u2014 first, to showcase my contributions to the rlite networking stack, and second, to inform readers about the existence of Recursive InterNetwork Architecture (RINA) and to serve as a quick and easy to read introduction to the architecture and its capabilities. It is well documented that the TCP\/IP network architecture suffers from numerous deficiencies and does not meet the demands of modern computing. A great number of these issues are structural and cannot be properly solved by making adjustments to existing protocols or introducing new protocols into the stack. RINA is a clean slate architecture whose aim is to be a more general, robust and dynamic basis for building computer networks. I have extended the rlite implementation with support for policies. With this framework in place, it is possible to have multiple behaviours of components (such as routing), and change between these during runtime. This additional flexibility and simple extensibility greatly benefits both production deployment scenarios as well as research efforts. As policies are crucial for RINA, supporting them is an important milestone for the implementation, and will hopefully foster adoption and accelerate development of RINA as a viable replacement for current Internet.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/030\/30_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/030\/30.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/030\/30_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic01 topic08\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za v\u011bdeck\u00fd p\u0159\u00ednos\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">55<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal55\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/055\/55_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Security Analysis of Immersive Virtual Reality and Its Implications<\/h4>\r\n\t\t\t\t<h5>Martin Vondr\u00e1\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"https:\/\/youtu.be\/xoEeyHyPCfY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal55\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">55<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Security Analysis of Immersive Virtual Reality and Its Implications<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Martin Vondr\u00e1\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Network Traffic Analysis, Reverse Engineering, Application Crippling, Penetration Testing, Hacking, Social Applications, Unity, Bigscreen, HTC Vive, Oculus Rift<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e9 s\u00edt\u011b<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Immersive virtual reality is a technology that finds more and more areas of application. It is used not only for entertainment but also for work and social interaction where user's privacy and confidentiality of the information has a high priority. Unfortunately, security measures taken by software vendors are often not sufficient. This paper shows results of extensive security analysis of a popular VR application Bigscreen which has more than 500,000 users. We have utilised techniques of network traffic analysis, penetration testing, reverse engineering, and even application crippling. We have found critical vulnerabilities directly exposing the privacy of the users and allowing the attacker to take full control of a victim's computer. Found security flaws allowed distribution of malware and creation of a botnet using a computer worm.  Our team has discovered a novel VR cyber attack Man-in-the-Room. We have also found a security vulnerability in the Unity engine. Our responsible disclosure has helped to mitigate the risks for more than half a million Bigscreen users and all affected Unity applications worldwide.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/055\/55_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"https:\/\/youtu.be\/xoEeyHyPCfY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic01\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za technicky zaj\u00edmav\u00e9 \u0159e\u0161en\u00ed\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">58<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal58\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/058\/58_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>LiSa -- Multiplatform Linux Sandbox for Analyzing IoT Malware<\/h4>\r\n\t\t\t\t<h5>Daniel Uh\u0159\u00ed\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/058\/58.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/058\/58_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal58\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">58<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">LiSa -- Multiplatform Linux Sandbox for Analyzing IoT Malware<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Daniel Uh\u0159\u00ed\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>IoT, Malware, Linux, Security, Dynamic Analysis, Network Analysis, SystemTap<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Weak security standards of IoT devices levereged Linux malware in past few years. Exposed telnet and ssh services with default passwords, outdated firmware or system vulnerabilities -- all of those are ways of letting attackers build botnets of thousands of compromised embedded devices. This paper emphasizes the importance of open source community in the field of malware analysis and presents design and implementation of multiplatform sandbox for automated malware analysis on Linux platform. Project LiSa (Linux Sandbox) is a modular system which outputs json data that can be further analyzed either manually or with pattern matching (e.g. with YARA) and serves as a tool to detect and classify Linux malware. LiSa was tested on recent IoT malware samples provided by Avast Software and it solved various problems of existing implementations.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/058\/58_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/058\/58.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/058\/58_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za kvalitn\u00ed zpracov\u00e1n\u00ed u\u017eite\u010dn\u00e9ho t\u00e9matu a \u0159adu experiment\u00e1ln\u00edch v\u00fdsledk\u016f\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">21<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal21\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/021\/21_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>4D-DCT Based Light Field Image Compression<\/h4>\r\n\t\t\t\t<h5>Drahom\u00edr Dlabaja<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/021\/21.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/021\/21_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal21\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">21<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">4D-DCT Based Light Field Image Compression<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Drahom\u00edr Dlabaja<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Light field, Lossy compression, JPEG, Transform coding, Plenoptic representation, Quality assessment<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>This paper proposes a light field image encoding solution based on four-dimensional discrete cosine transform and quantization. The solution is an extension to JPEG baseline compression. A light field image is interpreted and encoded as a four-dimensional volume to exploit both intra and inter view correlation. Solutions to 4D quantization and block traversal are introduced in this paper. The experiments compare the performance of the proposed solution against the compression of individual image views with JPEG and HEVC intra in terms of PSNR. Obtained results show that the proposed solution outperforms the reference encoders for light images with a low average disparity between views, therefore is suitable for images taken by lenslet based light field camera and images synthetically generated.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/021\/21_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/021\/21.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/021\/21_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic02\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za zda\u0159il\u00e9 zpracov\u00e1n\u00ed n\u00e1ro\u010dn\u00e9ho experiment\u00e1ln\u00edho t\u00e9matu se zna\u010dn\u00fdm v\u00fdzkumn\u00fdm potenci\u00e1lem\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">35<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal35\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/035\/35_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Bioinformatic Tool for Classification of Bacteria into Taxonomic Categories Based on the Sequence of 16S rRNA Gene<\/h4>\r\n\t\t\t\t<h5>Nikola Vale\u0161ov\u00e1<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/035\/35.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/035\/35_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal35\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">35<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Bioinformatic Tool for Classification of Bacteria into Taxonomic Categories Based on the Sequence of 16S rRNA Gene<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Nikola Vale\u0161ov\u00e1<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Machine learning, Metagenomics, Bacteria classification, Phylogenetic tree, 16S rRNA, DNA sequencing, scikit-learn<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bioinformatika<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>This work deals with the problem of automated classification and recognition of bacteria after obtaining their DNA by the sequencing process. In the scope of this paper, a~new classification method based on the 16S rRNA gene segment is designed and described. The presented principle is based on the tree structure of taxonomic categories and uses well-known machine learning algorithms to classify bacteria into one of the connected classes at a~given taxonomic level. A~part of this work is also dedicated to implementation of the described algorithm and evaluation of its prediction accuracy. The performance of various classifier types and their settings is examined and the setting with the best accuracy is determined. Accuracy of the implemented algorithm is also compared to an existing method based on BLAST local alignment algorithm available in the QIIME microbiome analysis toolkit.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/035\/35_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/035\/35.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/035\/35_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic08\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za zpracov\u00e1n\u00ed d\u016fle\u017eit\u00e9ho t\u00e9matu s p\u0159\u00ednosem v oblasti bezbe\u010dnosti\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">57<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal57\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/057\/57_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>TCP Reset Cookies \u2013 a heuristic method for TCP SYN Flood mitigation<\/h4>\r\n\t\t\t\t<h5>Patrik Goldschmidt<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/057\/57.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/057\/57_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/9HhdWlWkn2g\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal57\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">57<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">TCP Reset Cookies \u2013 a heuristic method for TCP SYN Flood mitigation<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Patrik Goldschmidt<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>TCP Reset Cookies, TCP SYN Flood, DDoS mitigation<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e9 s\u00edt\u011b<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>TCP SYN Flood is one of the most widespread DoS attack types used on computer networks nowadays. As a possible countermeasure, this paper proposes a long-forgotten network-based mitigation method TCP Reset Cookies. The method utilizes the TCP three-way-handshake mechanism to establish a security association with a client before forwarding its SYN data. Since the nature of the algorithm requires client validation, all SYN segments from spoofed IP addresses are effectively discarded. From the perspective of a legitimate client, the first connection causes up to 1-second delay, but all consecutive SYN traffic is delayed only by circa 30 microseconds. The document provides a detailed description and analysis of this approach, as well as implementation details with enhanced security tweaks. The project was conducted as a part of security research by CESNET. The discussed implementation is already integrated into a DDoS protection solution deployed in CESNET's backbone network and Czech internet exchange point at NIX.CZ.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/057\/57_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/057\/57.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/057\/57_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/9HhdWlWkn2g\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic06 topic08\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za prakticky vyu\u017eiteln\u00fd syst\u00e9m v oblasti akcelerace s\u00ed\u0165ov\u00fdch funkc\u00ed\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">7<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal7\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/007\/7_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Stateful Packet Processing In High-speed Network Devices Described In P4<\/h4>\r\n\t\t\t\t<h5>Pavel Kohout<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/007\/7.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/007\/7_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal7\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">7<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Stateful Packet Processing In High-speed Network Devices Described In P4<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Pavel Kohout<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>P4, Stateful packet processing, FPGA<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e1 architektura a vestav\u011bn\u00e9 syst\u00e9my<\/span> <span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e9 s\u00edt\u011b<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Research and development in area of network technologies allow to increase speed of network traffic up to 100 Gbps meanwhile requirements for its security and an easy administration stay the same. A process of collecting network traffic statistics is important part in the defense of a network infrastructures but its performing is difficult in a high-speed network environment. Nowadays, a P4 language becomes powerful tool for the network administrators thanks to the platform independence and its ability to describe whole packet processing pipeline. The aim of this work is to extend existing stateless solution developed at CESNET association target to FPGA platform by support of stateful processing at speed 100 Gbps. This paper describes the designed system architecture for stateful processing realization in P4 described device respecting requirements for its resources or rate. Performance testing has shown that device is capable of achieving the target throughput of 100 Gbps for limited number of used stateful memory requests in context of a table or an user action.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/007\/7_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/007\/7.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/007\/7_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic07\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za velmi kvalitn\u00ed p\u0159\u00edsp\u011bvek vyu\u017e\u00edvaj\u00edc\u00ed nejmodern\u011bj\u0161\u00ed grafick\u00e9 technologie\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">16<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal16\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/016\/16_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Hybrid Raytracing in DXR<\/h4>\r\n\t\t\t\t<h5>Tom\u00e1\u0161 Pol\u00e1\u0161ek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/016\/16.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/016\/16_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/vzfxXFn_1Qs\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal16\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">16<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Hybrid Raytracing in DXR<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Tom\u00e1\u0161 Pol\u00e1\u0161ek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Hybrid Ray Tracing, DirectX Ray Tracing, Hardware Accelerated Ray Tracing<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e1 grafika<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>The goal of this paper is to assess the usability of hardware accelerated ray tracing in near-future rendering engines. Specifically, the DirectX Ray Tracing API and Nvidia Turing GPU architecture are being examined.  The assessment is accomplished by designing and implementing a hybrid rendering engine with support for hardware accelerated ray tracing. This engine is then used in implementing frequently used graphical effects, such as shadows, reflections and Ambient Occlusion. Second part of the evaluation is made in terms of difficulty of integration into a regular game engine - complexity of implementation and performance of the resulting system.  There are two main contributions of this thesis, the first one being Hybrid Rendering engine called Quark, which uses hardware accelerated ray tracing to implement above-mentioned graphical effects. The hybrid-rendering approach uses rasterization to perform the bulk of the computation intensive operations, while allowing ray tracing to add additional information to the synthesized image. The second important contribution are the performance measurements of the final system, which include time spent on the ray tracing operations and number of rays cast for different input models.   Presented system shows one possible way of using the Nvidia Turing Ray Tracing cores in generating more realistic images. Preliminary measurements of the rendering system show great potential of this new technology, with results of 5 to 12 GigaRays per second on RTX 2080 Ti. The largest problem so far is the integration of this technology into rasterization-based engines. Data needs to be prepared for ray tracing and manually accessed from ray tracing shaders. The second problem is the build-time of acceleration structures, which is in order of milliseconds, even for smaller models with around 50 thousand triangles.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/016\/16_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/016\/16.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/016\/16_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/vzfxXFn_1Qs\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic11\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za v\u00fdznamn\u00fd teoretick\u00fd p\u0159\u00ednos v oblasti automat\u016f s potenci\u00e1lem zv\u00fd\u0161it efektivitu pr\u00e1ce se stromov\u00fdmi automaty\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">13<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal13\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/013\/13_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Efficient Algorithms for Tree Automata<\/h4>\r\n\t\t\t\t<h5>Ond\u0159ej Vale\u0161<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/013\/13.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/013\/13_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal13\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">13<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Efficient Algorithms for Tree Automata<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Ond\u0159ej Vale\u0161<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>finite automata, tree automata, language equivalence, language inclusion, bisimulation, antichains, bisimulation up-to congruence<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Testov\u00e1n\u00ed, anal\u00fdza a verifikace<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Tree automata and their languages find use in the field of formal verification and theorem proving but for many practical applications performance of existing algorithms for tree automata manipulation is unsatisfactory. In this work a novel algorithm for testing language equivalence and inclusion on tree automata is proposed and implemented as a module of the VATA library with a goal of creating algorithm that is comparatively faster than existing methods on at least a portion of real-world examples. First, existing approaches to equivalence and inclusion testing on both word and tree automata are examined. These existing approaches are then modified to create the bisimulation up-to congruence algorithm for tree automata. Efficiency of this new approach is compared with existing tree automata language equivalence and inclusion testing methods.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/013\/13_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/013\/13.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/013\/13_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic11\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za v\u00fdznamn\u00fd a prakticky vyu\u017eiteln\u00fd p\u0159\u00ednos ke statick\u00e9 anal\u00fdze v n\u00e1stroji Facebook Infer\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">59<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal59\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/059\/59_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Scalable Static Analysis Using Facebook Infer<\/h4>\r\n\t\t\t\t<h5>Dominik Harmim, Vladim\u00edr Marcin, Ond\u0159ej Pavela<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/059\/59.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/059\/59_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal59\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">59<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Scalable Static Analysis Using Facebook Infer<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Dominik Harmim, Vladim\u00edr Marcin, Ond\u0159ej Pavela<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Facebook Infer, Static Analysis, Abstract Interpretation, Atomicity Violation, Concurrent Programs, Performance, Worst-Case Cost, Deadlock<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Testov\u00e1n\u00ed, anal\u00fdza a verifikace<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Static analysis has nowadays become one of the most popular ways of catching bugs early in the modern software. However, reasonably precise static analyses do still often  have problems with scaling to larger codebases. And efficient static analysers, such as Coverity or Code Sonar, are often proprietary and difficult to openly evaluate or extend. Facebook Infer offers a static analysis framework that is open source, extendable, and promoting efficient modular and incremental analysis. In this work, we propose three inter-procedural analysers extending the capabilities of Facebook Infer: Looper (a resource bounds analyser), L2D2 (a low-level deadlock detector), and Atomer (an atomicity violation analyser). We evaluated our analysers on both smaller hand-crafted examples as well as publicly available benchmarks derived from real-life  low-level programs and obtained encouraging results. In particular, L2D2 attained  100 % detection rate and 11 % false positive rate on an extensive benchmark of hundreds of functions and millions of lines of code.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/059\/59_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/059\/59.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/059\/59_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za zaj\u00edmav\u00e9 experiment\u00e1ln\u00ed ov\u011b\u0159en\u00ed mo\u017enost\u00ed p\u0159ekladu p\u0159irozen\u00e9ho jazyka pomoc\u00ed neuronov\u00fdch s\u00edt\u00ed\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">54<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal54\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/054\/54_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Exploring contextual information in neural machine translation<\/h4>\r\n\t\t\t\t<h5>Josef Jon<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/054\/54.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/054\/54_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal54\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">54<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Exploring contextual information in neural machine translation<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Josef Jon<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>neural machine translation, context, transformer, document level translation<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>This works explores means of utilizing extra-sentential context in neural machine translation (NMT). Traditionally, NMT systems translate one source sentence to one target sentence without any notion of surrounding text. This is clearly insufficient and different from how humans translate text. For many high resource language pairs, NMT systems output is nowadays indistinguishable from human translations under certain (strict) conditions. One of the conditions is that evaluators see the sentences separately. When evaluating whole documents, even the best NMT systems still fall short of human translations. This motivates the research of employing document context in NMT, since there might not be much more space left to improve translations on sentence level, at least for high resource languages and domains. This work sumarizes recent state-of-the art approaches, implements them, evaluates them both in terms of general translation quality and on specific context related phenomena and analyzes their shortcomings. Additionaly, context phenomena test set for English to Czech translation was created to enable further comparison and analysis.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/054\/54_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/054\/54.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/054\/54_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za nadstandardn\u00ed mno\u017estv\u00ed vykonan\u00e9 pr\u00e1ce a velmi kvalitn\u00ed \u0159e\u0161en\u00ed\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">1<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal1\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/001\/1_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Insertion of 2D Graphics into a Scene Captured by a Stationary Camera<\/h4>\r\n\t\t\t\t<h5>Son Hai Nguyen<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/001\/1.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/001\/1_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/zNo-B2FJkUY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal1\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">1<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Insertion of 2D Graphics into a Scene Captured by a Stationary Camera<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Son Hai Nguyen<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Augmented Reality, Computer Vision, Image Processing<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Augmented reality visualizes additional information in real-world environment. Main goal is achieving natural looking of the inserted 2D graphics in a scene captured by a stationary camera with possibility of real time processing. Although several methods tackled foreground segmentation problem, many of them are not robust enough on diverse datasets. Modified background subtraction algorithm ViBe yields best visual results, but because of the nature of binary mask, edges of the segmented objects are coarse. In order to smooth edges, Global Sampling Matting is performed, this refinement greatly increased the perceptual quality of segmentation. Considering that the shadows are not classified by ViBe, artifacts were occurring after insertion of segmented objects on top of the graphics. This was solved by the proposed shadow segmentation, which was achieved by comparing the differences between brightness and gradients of the background model and the current frame. To remove plastic look of the inserted graphics, texture propagation has been proposed, that considers the local and mean brightness of the background. Segmentation algorithms and image matting algorithms are tested on various datasets. Resulted pipeline is demonstrated on a dataset of videos.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/001\/1_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/001\/1.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/001\/1_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/zNo-B2FJkUY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za funk\u010dn\u00ed komplexn\u00ed pr\u016fmyslov\u00e9 \u0159e\u0161en\u00ed v\u010detn\u011b integrace\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">4<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal4\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/004\/4_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Computer vision based pellet gauging<\/h4>\r\n\t\t\t\t<h5>Martin Krut\u00e1k<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/004\/4.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/004\/4_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal4\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">4<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Computer vision based pellet gauging<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Martin Krut\u00e1k<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Object gauging, Sub-pixel edge detection, Industrial image processing<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>In this paper, a method for dimensional gauging of pellets based on image processing with sub-pixel precision is introduced. The method is intended as a component of a quality control system for pellets. Object gauging from the image is on rise in demand in modern manufacturing processes. Very often, depending on the resulting precision, this is done physically in direct contact with the object itself. In case of soft objects that could be damaged in the process of gauging by standard methods (physical contact gauges) a non-contact method is needed. The method proposed in this paper uses means of sub-pixel edge detection in image combined with the interpolation-based edge methods. Resulting algorithm is fast with industry sufficient accuracy. Experimental results described in the paper show gauging accuracy of 25 micrometers for the side view and accuracy of 10 micrometers for the frontal view.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/004\/4_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/004\/4.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/004\/4_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic06\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za dota\u017eenou inovativn\u00ed aplikaci kombinuj\u00edc\u00ed SW a HW\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">20<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal20\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/020\/20_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Detekce p\u0159\u00edtomnosti osob v m\u00edstnosti<\/h4>\r\n\t\t\t\t<h5>David Pr\u016fdek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/020\/20.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/020\/20_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal20\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">20<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Detekce p\u0159\u00edtomnosti osob v m\u00edstnosti<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>David Pr\u016fdek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Detekce osob, IoT, Bluetooth, PIR, Home-Assistant, Dom\u00e1c\u00ed automatizace, ESP32, Vestav\u011bn\u00fd syst\u00e9m<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e1 architektura a vestav\u011bn\u00e9 syst\u00e9my<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>C\u00edlem t\u00e9to pr\u00e1ce je navrhnout a implementovat senzor detekce p\u0159\u00edtomnosti osob v m\u00edstnosti vhodn\u00fd pro pou\u017eit\u00ed v dom\u00e1c\u00ed automatizaci. Zam\u011b\u0159il jsem se na nalezen\u00ed takov\u00e9ho \u0159e\u0161en\u00ed, kter\u00e9 pro svou \u010dinnost vyu\u017e\u00edv\u00e1 b\u011b\u017en\u00e9 nositeln\u00e9 elektroniky. Senzor um\u00edst\u011bn\u00fd v m\u00edstnosti detekuje tato nositeln\u00e1 za\u0159\u00edzen\u00ed a na z\u00e1klad\u011b s\u00edly sign\u00e1lu ur\u010d\u00ed jeho pozici. Pro tento p\u0159\u00edpad u\u017eit\u00ed jsem pou\u017eil technologii Bluetooth LE, kter\u00e1 b\u00fdv\u00e1 sou\u010d\u00e1st\u00ed v\u011bt\u0161iny nositeln\u00e9 elektroniky a v posledn\u00ed dob\u011b se \u010dasto vyu\u017e\u00edv\u00e1 k navigaci ve vnit\u0159n\u00edch prostorech. Pou\u017eit\u00ed tohoto senzoru pro automatizaci je zaji\u0161t\u011bno pomoc\u00ed syst\u00e9mu Home-Assistant. Hlavn\u00edm p\u0159\u00ednosem t\u00e9to pr\u00e1ce je levn\u011b a jednodu\u0161e roz\u0161\u00ed\u0159it mo\u017enosti b\u011b\u017en\u00e9 dom\u00e1c\u00ed automatizace detekci osob v jednotliv\u00fdch m\u00edstnostech, nikoli pouze v \u0161irok\u00e9 oblasti, kterou nab\u00edzej\u00ed lokace pomoc\u00ed GPS nebo p\u0159ipojen\u00ed k Wi-Fi p\u0159\u00edstupov\u00e9ho bodu.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/020\/20_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/020\/20.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/020\/20_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za inovativn\u00ed pr\u00e1ci s daty a pe\u010dlivou anal\u00fdzu vedouc\u00ed ke zlep\u0161en\u00ed detektoru zna\u010dek\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">34<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal34\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/034\/34_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Detekce dopravn\u00edch zna\u010dek v obraze a videu pomoc\u00ed konvolu\u010dn\u00edch neuronov\u00fdch s\u00edt\u00ed<\/h4>\r\n\t\t\t\t<h5>Filip Ko\u010dica<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/034\/34.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/034\/34_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/ykY-CfiztYw\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal34\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">34<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Detekce dopravn\u00edch zna\u010dek v obraze a videu pomoc\u00ed konvolu\u010dn\u00edch neuronov\u00fdch s\u00edt\u00ed<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Filip Ko\u010dica<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Konvolu\u010dn\u00ed neuronov\u00e1 s\u00ed\u0165, YOLO, Detekce, Syntetick\u00e1, Dopravn\u00ed zna\u010dka<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Tato pr\u00e1ce \u0159e\u0161\u00ed problematiku detekce dopravn\u00edho zna\u010den\u00ed za pomoci modern\u00edch technik zpracov\u00e1n\u00ed obrazu. K \u0159e\u0161en\u00ed byla pou\u017eita speci\u00e1ln\u00ed architektura hlubok\u00e9 konvolu\u010dn\u00ed neuronov\u00e9 s\u00edt\u011b zvan\u00e1 YOLO, tedy You Only Look Once, kter\u00e1 \u0159e\u0161\u00ed detekci i klasifikaci objekt\u016f v jednom kroce, co\u017e cel\u00fd proces zna\u010dn\u011b urychluje. Pr\u00e1ce pojedn\u00e1v\u00e1 tak\u00e9 o porovn\u00e1n\u00ed \u00fasp\u011b\u0161nosti model\u016f tr\u00e9novan\u00fdch na re\u00e1ln\u00fdch a syntetick\u00fdch datov\u00fdch sad\u00e1ch. Poda\u0159ilo se dos\u00e1hnout \u00fasp\u011b\u0161nosti 63.4% mAP p\u0159i pou\u017eit\u00ed modelu tr\u00e9novan\u00e9ho na re\u00e1ln\u00fdch datech a \u00fasp\u011b\u0161nosti 82.3% mAP p\u0159i pou\u017eit\u00ed modelu tr\u00e9novan\u00e9ho na datech syntetick\u00fdch. Vyhodnocen\u00ed jednoho sn\u00edmku trv\u00e1 na pr\u016fm\u011brn\u011b v\u00fdkonn\u00e9m grafick\u00e9m \u010dipu ~40.4ms a na nadpr\u016fm\u011brn\u011b v\u00fdkonn\u00e9m \u010dipu ~3.9ms. P\u0159\u00ednosem t\u00e9to pr\u00e1ce je skute\u010dnost, \u017ee model neuronov\u00e9 s\u00edt\u011b tr\u00e9novan\u00fd na syntetick\u00fdch datech m\u016f\u017ee za ur\u010dit\u00fdch podm\u00ednek dosahovat podobn\u00fdch \u010di lep\u0161\u00edch v\u00fdsledk\u016f, ne\u017e model tr\u00e9novan\u00fd na re\u00e1ln\u00fdch datech. To m\u016f\u017ee usnadnit proces tvorby detektoru o nutnost anotovat velk\u00e9 mno\u017estv\u00ed obr\u00e1zk\u016f.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/034\/34_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/034\/34.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/034\/34_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/ykY-CfiztYw\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic07 topic12\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"za inovativn\u00ed a dota\u017eenou aplikaci, kter\u00e1 m\u00e1 ji\u017e nyn\u00ed re\u00e1ln\u00e9 u\u017eivatele\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">49<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal49\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/049\/49_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Application for Automatic Measuring of Objects in Augmented Reality<\/h4>\r\n\t\t\t\t<h5>Miroslav Kar\u00e1sek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/049\/49.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/049\/49_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/lp-MfrrmTR0\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal49\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">49<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Application for Automatic Measuring of Objects in Augmented Reality<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Miroslav Kar\u00e1sek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Augmented reality, Measurement, Android, ARCore, Point Cloud<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e1 grafika<\/span> <span class=\"label label-default\">U\u017eivatelsk\u00e1 rozhran\u00ed<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>This article describes the technology for automatic measurement of overall dimensions of a generic object using a commercially available mobile phone. The user only has to go around the measured object and scan it by the mobile phone\u2019s camera. The measurement uses computer vision algorithms for scene reconstruction in order to obtain the object\u2019s point cloud. This paper proposes algorithms for processing the point cloud and for estimating the dimensions of the object. It focuses on collecting and filtering points where the biggest challenge is to recognize and separate points belonging to the measured object from the rest. Proposed algorithms were tested on an implemented Android application using ARCore technology. The result of measurement on a cuboid object had the error about 1cm. An object with other shapes achieves measurement error from 3 to 5cm. The measurement error was independent on object size. This implies that the algorithm is more accurate for larger objects with the shape approaching cuboid.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/049\/49_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/049\/49.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/049\/49_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/lp-MfrrmTR0\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div><div class=\"clearfix\"><\/div>\r\n\t<\/div>\r\n\t\r\n\t\r\n\t\r\n\t\r\n\r\n\t<h2 id=\"oceneni-partnery\">Ocen\u011bn\u00ed <strong>partnery<\/strong><\/h2>\r\n\t<div class=\"row results\">\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">10<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal10\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/010\/10_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Detekce dopravn\u00edch zna\u010dek a semafor\u016f<\/h4>\r\n\t\t\t\t<h5>Tom\u00e1\u0161 Chocholat\u00fd<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/010\/10.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/010\/10_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/aGYro84K9pg\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/generalni-sponzor\/camea.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal10\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">10<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Detekce dopravn\u00edch zna\u010dek a semafor\u016f<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Tom\u00e1\u0161 Chocholat\u00fd<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Detekce dopravn\u00edch zna\u010dek, Konvolu\u010dn\u00ed neuronov\u00e9 s\u00edt\u011b, Dektekce objekt\u016f v obraze<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>\u010cl\u00e1nek se zab\u00fdv\u00e1 detekc\u00ed dopravn\u00edch zna\u010dek v~obraze. C\u00edlem t\u00e9to pr\u00e1ce je vytvo\u0159en\u00ed vhodn\u00e9ho detektoru pro detekci a rozpozn\u00e1n\u00ed dopravn\u00edho zna\u010den\u00ed v~re\u00e1ln\u00e9m provozu. Problematika detekce je \u0159e\u0161ena pomoc\u00ed konvolu\u010dn\u00edch neuronov\u00fdch s\u00edt\u00ed (CNN). Za \u00fa\u010delem tr\u00e9nov\u00e1n\u00ed neuronov\u00fdch s\u00edt\u00ed byly vytvo\u0159eny vhodn\u00e9 datov\u00e9 sady, kter\u00e9 se skl\u00e1daj\u00ed ze syntetick\u00e9ho i re\u00e1ln\u00e9ho datasetu. Pro zhodnocen\u00ed kvality detekce byl vytvo\u0159en program kvantitativn\u00edho vyhodnocov\u00e1n\u00ed.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/010\/10_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/010\/10.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/010\/10_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/aGYro84K9pg\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic11\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">52<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal52\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/052\/52_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Non-Parametric Modelling for Automatic Detection of Performance Changes<\/h4>\r\n\t\t\t\t<h5>\u0160imon Stupinsk\u00fd<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/052\/52.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/052\/52_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/generalni-sponzor\/honeywell.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal52\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">52<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Non-Parametric Modelling for Automatic Detection of Performance Changes<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>\u0160imon Stupinsk\u00fd<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Performance, Continuous integration, Non-parametric analysis, Regressogram, Moving average, Kernel regression, Automated changes detection, Difference analysis<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Testov\u00e1n\u00ed, anal\u00fdza a verifikace<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Current tools that manage project performance do not provide a satisfying evaluation of the overall performance history, which is often crucial when developing large applications. In our previous work, we introduced a tool-chain that collected set of performance data extrapolated these data into a performance model represented as a function of two depending variables and compared the result with the model of the previous version reporting possible performance changes. The solution was, however, dependent on precisely specifying and measuring those dependent variables. In this work, we propose a more flexible approach of computing performance models based on collected data and a subsequent check for performance changes that requires only one measured kind of variable. We evaluated our solution on different versions of vim, and we were able to detect a known issue in one of the versions as well as verify that between two stable versions there were no significant performance changes.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/052\/52_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/052\/52.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/052\/52_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic01\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">58<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal58\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/058\/58_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>LiSa -- Multiplatform Linux Sandbox for Analyzing IoT Malware<\/h4>\r\n\t\t\t\t<h5>Daniel Uh\u0159\u00ed\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/058\/58.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/058\/58_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/generalni-sponzor\/honeywell.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal58\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">58<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">LiSa -- Multiplatform Linux Sandbox for Analyzing IoT Malware<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Daniel Uh\u0159\u00ed\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>IoT, Malware, Linux, Security, Dynamic Analysis, Network Analysis, SystemTap<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Weak security standards of IoT devices levereged Linux malware in past few years. Exposed telnet and ssh services with default passwords, outdated firmware or system vulnerabilities -- all of those are ways of letting attackers build botnets of thousands of compromised embedded devices. This paper emphasizes the importance of open source community in the field of malware analysis and presents design and implementation of multiplatform sandbox for automated malware analysis on Linux platform. Project LiSa (Linux Sandbox) is a modular system which outputs json data that can be further analyzed either manually or with pattern matching (e.g. with YARA) and serves as a tool to detect and classify Linux malware. LiSa was tested on recent IoT malware samples provided by Avast Software and it solved various problems of existing implementations.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/058\/58_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/058\/58.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/058\/58_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic10 topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">48<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal48\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/048\/48_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>U\u010den\u00ed a adaptace neuronov\u00fdch s\u00edt\u00ed pro rozpozn\u00e1v\u00e1n\u00ed textu<\/h4>\r\n\t\t\t\t<h5>Jan Koh\u00fat<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/048\/48.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/048\/48_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/generalni-sponzor\/innovatrics.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal48\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">48<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">U\u010den\u00ed a adaptace neuronov\u00fdch s\u00edt\u00ed pro rozpozn\u00e1v\u00e1n\u00ed textu<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Jan Koh\u00fat<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>rozpozn\u00e1v\u00e1n\u00ed textu, rekurentn\u00ed neuronov\u00e9 s\u00edt\u011b, konvolu\u010dn\u00ed neuronov\u00e9 s\u00edt\u011b, adaptace, aktivn\u00ed u\u010den\u00ed, dataset IMPACT<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Robotika a um\u011bl\u00e1 inteligence<\/span> <span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>C\u00edlem t\u00e9to pr\u00e1ce je srovn\u00e1n\u00ed architektur neuronov\u00fdch s\u00edt\u00ed pro rozpozn\u00e1v\u00e1n\u00ed textu. D\u00e1le pak adaptace neuronov\u00fdch s\u00edt\u00ed na jin\u00e9 texty, ne\u017e na kter\u00fdch byly u\u010deny. Pro tyto experimenty vyu\u017e\u00edv\u00e1m rozs\u00e1hl\u00fd a rozmanit\u00fd dataset IMPACT o v\u00edce ne\u017e jednom milionu \u0159\u00e1dk\u016f. Pomoc\u00ed neuronov\u00fdch s\u00edt\u00ed prov\u00e1d\u00edm kontrolu vhodnosti \u0159\u00e1dk\u016f tzn. \u010ditelnost a spr\u00e1vnost v\u00fd\u0159ez\u016f \u0159\u00e1dk\u016f. Celkem srovn\u00e1v\u00e1m 6 \u010dist\u011b konvolu\u010dn\u00edch s\u00edt\u00ed a 9 rekurentn\u00edch s\u00edt\u00ed. Adaptace prov\u00e1d\u00edm na polsk\u00fdch historick\u00fdch textech s~t\u00edm, \u017ee tr\u00e9novac\u00ed data adaptovan\u00fdch s\u00edt\u00ed neobsahovaly texty ve slovansk\u00fdch jazyc\u00edch. Adaptace vyu\u017e\u00edvaj\u00ed p\u0159\u00edstupy aktivn\u00edho u\u010den\u00ed pro v\u00fdb\u011br nov\u00fdch adapta\u010dn\u00edch dat. \u010cist\u011b konvolu\u010dn\u00ed s\u00edt\u011b dosahuj\u00ed \u00fasp\u011b\u0161nosti 98.6 \\%, rekurentn\u00ed s\u00edt\u011b pak 99.5 \\%. \u00dasp\u011b\u0161nost s\u00edt\u00ed p\u0159ed adaptac\u00ed se pohybuje kolem 79\\%, po postupn\u00e9 adaptaci na 2500 \u0159\u00e1dc\u00edch stoupne \u00fasp\u011b\u0161nost na 97 \\%. P\u0159\u00edstupy aktivn\u00edho u\u010den\u00ed dosahuj\u00ed lep\u0161\u00ed \u00fasp\u011b\u0161nosti ne\u017e n\u00e1hodn\u00fd v\u00fdb\u011br. Pro zpracov\u00e1n\u00ed dataset\u016f je vhodn\u00e9 pou\u017e\u00edvat ji\u017e natr\u00e9novan\u00e9 neuronov\u00e9 s\u00edt\u011b tak, aby se odstranilo co mo\u017en\u00e1 nejv\u00edce chybn\u00fdch dat. Rekurentn\u00ed vrstvy znateln\u011b zvy\u0161uj\u00ed \u00fasp\u011b\u0161nost s\u00edt\u00ed. P\u0159i adaptaci je v\u00fdhodn\u00e9 vyu\u017e\u00edvat p\u0159\u00edstup\u016f aktivn\u00edho u\u010den\u00ed.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/048\/48_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/048\/48.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/048\/48_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic12\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">29<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal29\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/029\/29_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Interactive Form for Tax Returns<\/h4>\r\n\t\t\t\t<h5>David H\u00e9l<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/029\/29.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/029\/29_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/generalni-sponzor\/solitea.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal29\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">29<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Interactive Form for Tax Returns<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>David H\u00e9l<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Tax, Form, Web application<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">U\u017eivatelsk\u00e1 rozhran\u00ed<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>The goal of this project is to develop interactive forms for tax returns which are pretty easy to fill in for everyone without any experience in economy or the tax law. The main purpose is to create simple forms for different types of people (e. g., businessman, employee, or student). The official application for tax returns (EPO) provided by The Ministry of Finance of the Czech Republic is complex. It offers many options which are usually unimportant for common users. hence, it is often difficult to achieve the right result. This paper presents a new web application called \u201cP\u0159izn\u00e1n\u00ed\u201d which solves the problem by providing a set of simple yes\/no questions to the users. The questions are based on the experience of revenue officers and taxpayers who need to fill the forms every year. After the answering all these questions, the user can download a correctly filled form which can be send off to the revenue authority. At the current stage, the application provides the form for businessmen. It successfully generates the Personal Income Tax form\u2014the official document containing the information about personal income tax. The forms for different types of people are being developed.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/029\/29_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/029\/29.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/029\/29_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic02\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">35<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal35\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/035\/35_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Bioinformatic Tool for Classification of Bacteria into Taxonomic Categories Based on the Sequence of 16S rRNA Gene<\/h4>\r\n\t\t\t\t<h5>Nikola Vale\u0161ov\u00e1<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/035\/35.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/035\/35_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/hlavni-sponzor\/edhouse.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal35\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">35<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Bioinformatic Tool for Classification of Bacteria into Taxonomic Categories Based on the Sequence of 16S rRNA Gene<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Nikola Vale\u0161ov\u00e1<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Machine learning, Metagenomics, Bacteria classification, Phylogenetic tree, 16S rRNA, DNA sequencing, scikit-learn<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bioinformatika<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>This work deals with the problem of automated classification and recognition of bacteria after obtaining their DNA by the sequencing process. In the scope of this paper, a~new classification method based on the 16S rRNA gene segment is designed and described. The presented principle is based on the tree structure of taxonomic categories and uses well-known machine learning algorithms to classify bacteria into one of the connected classes at a~given taxonomic level. A~part of this work is also dedicated to implementation of the described algorithm and evaluation of its prediction accuracy. The performance of various classifier types and their settings is examined and the setting with the best accuracy is determined. Accuracy of the implemented algorithm is also compared to an existing method based on BLAST local alignment algorithm available in the QIIME microbiome analysis toolkit.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/035\/35_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/035\/35.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/035\/35_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic11\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">13<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal13\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/013\/13_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Efficient Algorithms for Tree Automata<\/h4>\r\n\t\t\t\t<h5>Ond\u0159ej Vale\u0161<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/013\/13.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/013\/13_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/hlavni-sponzor\/sap.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal13\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">13<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Efficient Algorithms for Tree Automata<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Ond\u0159ej Vale\u0161<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>finite automata, tree automata, language equivalence, language inclusion, bisimulation, antichains, bisimulation up-to congruence<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Testov\u00e1n\u00ed, anal\u00fdza a verifikace<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Tree automata and their languages find use in the field of formal verification and theorem proving but for many practical applications performance of existing algorithms for tree automata manipulation is unsatisfactory. In this work a novel algorithm for testing language equivalence and inclusion on tree automata is proposed and implemented as a module of the VATA library with a goal of creating algorithm that is comparatively faster than existing methods on at least a portion of real-world examples. First, existing approaches to equivalence and inclusion testing on both word and tree automata are examined. These existing approaches are then modified to create the bisimulation up-to congruence algorithm for tree automata. Efficiency of this new approach is compared with existing tree automata language equivalence and inclusion testing methods.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/013\/13_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/013\/13.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/013\/13_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic01 topic08\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">55<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal55\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/055\/55_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Security Analysis of Immersive Virtual Reality and Its Implications<\/h4>\r\n\t\t\t\t<h5>Martin Vondr\u00e1\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"https:\/\/youtu.be\/xoEeyHyPCfY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/hlavni-sponzor\/skoda.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal55\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">55<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Security Analysis of Immersive Virtual Reality and Its Implications<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Martin Vondr\u00e1\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Network Traffic Analysis, Reverse Engineering, Application Crippling, Penetration Testing, Hacking, Social Applications, Unity, Bigscreen, HTC Vive, Oculus Rift<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e9 s\u00edt\u011b<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Immersive virtual reality is a technology that finds more and more areas of application. It is used not only for entertainment but also for work and social interaction where user's privacy and confidentiality of the information has a high priority. Unfortunately, security measures taken by software vendors are often not sufficient. This paper shows results of extensive security analysis of a popular VR application Bigscreen which has more than 500,000 users. We have utilised techniques of network traffic analysis, penetration testing, reverse engineering, and even application crippling. We have found critical vulnerabilities directly exposing the privacy of the users and allowing the attacker to take full control of a victim's computer. Found security flaws allowed distribution of malware and creation of a botnet using a computer worm.  Our team has discovered a novel VR cyber attack Man-in-the-Room. We have also found a security vulnerability in the Unity engine. Our responsible disclosure has helped to mitigate the risks for more than half a million Bigscreen users and all affected Unity applications worldwide.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/055\/55_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"https:\/\/youtu.be\/xoEeyHyPCfY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">1<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal1\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/001\/1_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Insertion of 2D Graphics into a Scene Captured by a Stationary Camera<\/h4>\r\n\t\t\t\t<h5>Son Hai Nguyen<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/001\/1.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/001\/1_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/zNo-B2FJkUY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"sponsor-logo\"><img src=\"\/wp-content\/sponsors\/2019\/hlavni-sponzor\/thermo.png\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal1\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">1<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Insertion of 2D Graphics into a Scene Captured by a Stationary Camera<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Son Hai Nguyen<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Augmented Reality, Computer Vision, Image Processing<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Augmented reality visualizes additional information in real-world environment. Main goal is achieving natural looking of the inserted 2D graphics in a scene captured by a stationary camera with possibility of real time processing. Although several methods tackled foreground segmentation problem, many of them are not robust enough on diverse datasets. Modified background subtraction algorithm ViBe yields best visual results, but because of the nature of binary mask, edges of the segmented objects are coarse. In order to smooth edges, Global Sampling Matting is performed, this refinement greatly increased the perceptual quality of segmentation. Considering that the shadows are not classified by ViBe, artifacts were occurring after insertion of segmented objects on top of the graphics. This was solved by the proposed shadow segmentation, which was achieved by comparing the differences between brightness and gradients of the background model and the current frame. To remove plastic look of the inserted graphics, texture propagation has been proposed, that considers the local and mean brightness of the background. Segmentation algorithms and image matting algorithms are tested on various datasets. Resulted pipeline is demonstrated on a dataset of videos.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/001\/1_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/001\/1.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/001\/1_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/zNo-B2FJkUY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div><div class=\"clearfix\"><\/div>  \r\n\t<\/div>\r\n\t\r\n\t\r\n\r\n\t<h2 id=\"oceneni-odbornou-verejnosti-cena-jiriho-kunovskeho\">Ocen\u011bn\u00ed <strong>odbornou ve\u0159ejnost\u00ed<\/strong> - cena Ji\u0159\u00edho Kunovsk\u00e9ho<\/h2>\r\n        <div class=\"row results\">\r\n\t\t<div class=\"thumbnail topic01 topic08\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">55<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal55\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/055\/55_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Security Analysis of Immersive Virtual Reality and Its Implications<\/h4>\r\n\t\t\t\t<h5>Martin Vondr\u00e1\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"https:\/\/youtu.be\/xoEeyHyPCfY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal55\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">55<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Security Analysis of Immersive Virtual Reality and Its Implications<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Martin Vondr\u00e1\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Network Traffic Analysis, Reverse Engineering, Application Crippling, Penetration Testing, Hacking, Social Applications, Unity, Bigscreen, HTC Vive, Oculus Rift<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <span class=\"label label-default\">Po\u010d\u00edta\u010dov\u00e9 s\u00edt\u011b<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Immersive virtual reality is a technology that finds more and more areas of application. It is used not only for entertainment but also for work and social interaction where user's privacy and confidentiality of the information has a high priority. Unfortunately, security measures taken by software vendors are often not sufficient. This paper shows results of extensive security analysis of a popular VR application Bigscreen which has more than 500,000 users. We have utilised techniques of network traffic analysis, penetration testing, reverse engineering, and even application crippling. We have found critical vulnerabilities directly exposing the privacy of the users and allowing the attacker to take full control of a victim's computer. Found security flaws allowed distribution of malware and creation of a botnet using a computer worm.  Our team has discovered a novel VR cyber attack Man-in-the-Room. We have also found a security vulnerability in the Unity engine. Our responsible disclosure has helped to mitigate the risks for more than half a million Bigscreen users and all affected Unity applications worldwide.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/055\/55_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"https:\/\/youtu.be\/xoEeyHyPCfY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic01\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">58<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal58\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/058\/58_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>LiSa -- Multiplatform Linux Sandbox for Analyzing IoT Malware<\/h4>\r\n\t\t\t\t<h5>Daniel Uh\u0159\u00ed\u010dek<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/058\/58.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/058\/58_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal58\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">58<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">LiSa -- Multiplatform Linux Sandbox for Analyzing IoT Malware<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Daniel Uh\u0159\u00ed\u010dek<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>IoT, Malware, Linux, Security, Dynamic Analysis, Network Analysis, SystemTap<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bezpe\u010dnost<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Weak security standards of IoT devices levereged Linux malware in past few years. Exposed telnet and ssh services with default passwords, outdated firmware or system vulnerabilities -- all of those are ways of letting attackers build botnets of thousands of compromised embedded devices. This paper emphasizes the importance of open source community in the field of malware analysis and presents design and implementation of multiplatform sandbox for automated malware analysis on Linux platform. Project LiSa (Linux Sandbox) is a modular system which outputs json data that can be further analyzed either manually or with pattern matching (e.g. with YARA) and serves as a tool to detect and classify Linux malware. LiSa was tested on recent IoT malware samples provided by Avast Software and it solved various problems of existing implementations.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/058\/58_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/058\/58.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/058\/58_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic11\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">59<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal59\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/059\/59_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Scalable Static Analysis Using Facebook Infer<\/h4>\r\n\t\t\t\t<h5>Dominik Harmim, Vladim\u00edr Marcin, Ond\u0159ej Pavela<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/059\/59.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/059\/59_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal59\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">59<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Scalable Static Analysis Using Facebook Infer<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Dominik Harmim, Vladim\u00edr Marcin, Ond\u0159ej Pavela<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Facebook Infer, Static Analysis, Abstract Interpretation, Atomicity Violation, Concurrent Programs, Performance, Worst-Case Cost, Deadlock<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Testov\u00e1n\u00ed, anal\u00fdza a verifikace<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Static analysis has nowadays become one of the most popular ways of catching bugs early in the modern software. However, reasonably precise static analyses do still often  have problems with scaling to larger codebases. And efficient static analysers, such as Coverity or Code Sonar, are often proprietary and difficult to openly evaluate or extend. Facebook Infer offers a static analysis framework that is open source, extendable, and promoting efficient modular and incremental analysis. In this work, we propose three inter-procedural analysers extending the capabilities of Facebook Infer: Looper (a resource bounds analyser), L2D2 (a low-level deadlock detector), and Atomer (an atomicity violation analyser). We evaluated our analysers on both smaller hand-crafted examples as well as publicly available benchmarks derived from real-life  low-level programs and obtained encouraging results. In particular, L2D2 attained  100 % detection rate and 11 % false positive rate on an extensive benchmark of hundreds of functions and millions of lines of code.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/059\/59_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/059\/59.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/059\/59_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic14\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">1<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal1\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/001\/1_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Insertion of 2D Graphics into a Scene Captured by a Stationary Camera<\/h4>\r\n\t\t\t\t<h5>Son Hai Nguyen<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/001\/1.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/001\/1_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/zNo-B2FJkUY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"32\" height=\"32\" alt=\"Video\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal1\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">1<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Insertion of 2D Graphics into a Scene Captured by a Stationary Camera<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Son Hai Nguyen<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Augmented Reality, Computer Vision, Image Processing<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Zpracov\u00e1n\u00ed dat (obraz, zvuk, text apod.)<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>Augmented reality visualizes additional information in real-world environment. Main goal is achieving natural looking of the inserted 2D graphics in a scene captured by a stationary camera with possibility of real time processing. Although several methods tackled foreground segmentation problem, many of them are not robust enough on diverse datasets. Modified background subtraction algorithm ViBe yields best visual results, but because of the nature of binary mask, edges of the segmented objects are coarse. In order to smooth edges, Global Sampling Matting is performed, this refinement greatly increased the perceptual quality of segmentation. Considering that the shadows are not classified by ViBe, artifacts were occurring after insertion of segmented objects on top of the graphics. This was solved by the proposed shadow segmentation, which was achieved by comparing the differences between brightness and gradients of the background model and the current frame. To remove plastic look of the inserted graphics, texture propagation has been proposed, that considers the local and mean brightness of the background. Segmentation algorithms and image matting algorithms are tested on various datasets. Resulted pipeline is demonstrated on a dataset of videos.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/001\/1_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/001\/1.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/001\/1_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><a href=\"https:\/\/youtu.be\/zNo-B2FJkUY\"><img src=\"\/submissions\/images\/video-icon.png\" width=\"48\" height=\"48\" alt=\"Video\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"thumbnail topic02\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\">\r\n\t\t\t<div class=\"caption caption-image\">\r\n\t\t\t\t<span class=\"badge\">35<\/span><a href=\"#\" data-toggle=\"modal\" data-target=\"#modal35\" rel=\"noopener noreferrer\"><img class=\"thumbnail-icon\" src=\"\/submissions\/2019\/035\/35_nahled.png\" alt=\"\"><\/a>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"caption\">\r\n\t\t\t\t<h4>Bioinformatic Tool for Classification of Bacteria into Taxonomic Categories Based on the Sequence of 16S rRNA Gene<\/h4>\r\n\t\t\t\t<h5>Nikola Vale\u0161ov\u00e1<\/h5>\r\n\t\t\t\t<p class=\"download-menu\"><a href=\"\/submissions\/2019\/035\/35.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"32\" height=\"32\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/035\/35_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"32\" height=\"32\" alt=\"Plak\u00e1t\"><\/a><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"modal fade bs-example-modal-lg\" id=\"modal35\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\r\n\t\t\t<div class=\"modal-dialog modal-lg\">\r\n\t\t\t\t<div class=\"modal-content\">\r\n\t\t\t\t\t<div class=\"modal-header\">\r\n\t\t\t\t\t\t<span class=\"badge\">35<\/span>\r\n\t\t\t\t\t\t<p><button type=\"button\" class=\"close\" data-dismiss=\"modal\" aria-label=\"Close\"><span aria-hidden=\"true\">\u00d7<\/span><\/button><\/p>\r\n\t\t\t\t\t\t<h3 class=\"modal-title\">Bioinformatic Tool for Classification of Bacteria into Taxonomic Categories Based on the Sequence of 16S rRNA Gene<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-body\">\r\n\t\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-md-8\">\r\n\t\t\t\t\t\t\t\t<p><strong>Nikola Vale\u0161ov\u00e1<\/strong><\/p>\r\n\t\t\t\t\t\t\t\t<p><em>Machine learning, Metagenomics, Bacteria classification, Phylogenetic tree, 16S rRNA, DNA sequencing, scikit-learn<\/em><\/p>\r\n\t\t\t\t\t\t\t\t<p><span class=\"label label-default\">Bioinformatika<\/span> <\/p>\r\n\t\t\t\t\t\t\t\t<p>This work deals with the problem of automated classification and recognition of bacteria after obtaining their DNA by the sequencing process. In the scope of this paper, a~new classification method based on the 16S rRNA gene segment is designed and described. The presented principle is based on the tree structure of taxonomic categories and uses well-known machine learning algorithms to classify bacteria into one of the connected classes at a~given taxonomic level. A~part of this work is also dedicated to implementation of the described algorithm and evaluation of its prediction accuracy. The performance of various classifier types and their settings is examined and the setting with the best accuracy is determined. Accuracy of the implemented algorithm is also compared to an existing method based on BLAST local alignment algorithm available in the QIIME microbiome analysis toolkit.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\r\n\t\t\t\t\t\t\t\t<p><img class=\"img-responsive\" src=\"\/submissions\/2019\/035\/35_nahled.png\" alt=\"\"><\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"modal-footer\">\r\n\t\t\t\t\t\t<div class=\"pull-left\"><div class=\"btn-group\" role=\"group\"><a href=\"\/submissions\/2019\/035\/35.pdf\"><img src=\"\/submissions\/images\/paper-icon.png\" width=\"48\" height=\"48\" alt=\"\u010cl\u00e1nek\"><\/a><a href=\"\/submissions\/2019\/035\/35_poster.pdf\"><img src=\"\/submissions\/images\/poster-icon.png\" width=\"48\" height=\"48\" alt=\"Plak\u00e1t\"><\/a><\/div><\/div>\r\n\t\t\t\t\t\t<div class=\"pull-right\"><button type=\"button\" class=\"btn btn-primary\" data-dismiss=\"modal\">Zav\u0159\u00edt<\/button><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div><div class=\"clearfix\"><\/div>\r\n\t<\/div>\r\n<script>\t\t\t\t\t\t\t\r\njQuery(function() {\r\n  jQuery('[data-toggle=\"tooltip\"]').tooltip()\r\n})\t\r\n<\/script>\r\n\r\n\r\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":2982,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-1989","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/pages\/1989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/comments?post=1989"}],"version-history":[{"count":23,"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/pages\/1989\/revisions"}],"predecessor-version":[{"id":2980,"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/pages\/1989\/revisions\/2980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/media\/2982"}],"wp:attachment":[{"href":"https:\/\/excel.fit.vutbr.cz\/2019\/wp-json\/wp\/v2\/media?parent=1989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}