Persons

Ing. Radek Mařík, CSc.

All publications

A Robotic Reporter Still Lacks Creativity, but It Can Already Replace Human Journalists in Several Areas

  • Authors: Macková, V., Ing. Radek Mařík, CSc.,
  • Publication: West Bohemian Review of Social Sciences & Humanities. 2023, 15(1-2), 23-37. ISSN 2336-6346.
  • Year: 2023
  • DOI: 10.24132/actaff.2023.15.1-2.3
  • Link: https://doi.org/10.24132/actaff.2023.15.1-2.3
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Automated journalism is experiencing rapid advancements, prompting concerns among certain journalists who fear potential job displacement by robotic reporters. Conversely, there is a cohort of journalists embracing this progress, viewing the involvement of robotic reporters as a time-efficient measure and an avenue to engage in more creative forms of journalism. This article aims to explore topics in Czech Republic news that lend themselves to automation based on perplexity. Currently, the robotic reporter can generate articles in few domains (e.g., stock market news, fuel prices news, and traffic accident reports), while further exploration is underway for other areas. However, generating e.g. cultural news through automation remains challenging due to its less recurrent nature, as evidenced by perplexity measurements reflecting text complexity. Perplexity method can be used to determine which journalistic area is suitable for automated text. In this article, we focus on the Czech environment and the possibilities of automation and the reaction of selected Czech journalists who encounter automated texts in newsrooms. While automated journalism demonstrates superiority over human journalists in certain aspects, it still falls short in terms of creativity, an aspect where artificial intelligence remains unable to replace humans. Nevertheless, the robotic reporter can serve as an invaluable assistant to editors and reporters in their work. Consequently, the newsroom landscape is evolving, accommodating the integration of automated content editors.

Active Learning Efficiency Benchmark for Coreference Resolution Including Advanced Uncertainty Representations

  • Authors: Sahan, M., prof. Ing. Václav Šmídl, Ph.D., Watanabe, T., Ing. Radek Mařík, CSc.,
  • Publication: 2023 2nd International Conference on Frontiers of Communications, Information System and Data Science. Los Alamitos: IEEE Computer Society, 2023. p. 40-47. ISBN 979-8-3503-8147-4.
  • Year: 2023
  • DOI: 10.1109/CISDS61173.2023.00016
  • Link: https://doi.org/10.1109/CISDS61173.2023.00016
  • Department: Department of Telecommunications Engineering, Artificial Intelligence Center
  • Annotation:
    Active learning is a powerful technique that accelerates model learning by iteratively expanding training data based on the model’s feedback. This approach has proven particularly relevant in natural language processing and other machine learning domains. While active learning has been extensively studied for conventional classification tasks, its application to more specialized tasks like neural coreference resolution has the potential for improvement. In our research, we present a significant advancement by applying active learning to the neural coreference problem, and setting a benchmark of 39% reduction in required annotations for training data. Simultaneously, it preserves performance compared to the original model trained on the full data. We compare various uncertainty sampling techniques along with Bayesian modifications of coreference resolution models, conducting a comprehensive analysis of annotation efforts. The results demonstrate that the best-performing techniques seek to maximize label annotation in previously chosen documents, showcasing their effectiveness and preserving performance.

Batch Active Learning for Text Classification and Sentiment Analysis

  • Authors: Sahan, M., prof. Ing. Václav Šmídl, Ph.D., Ing. Radek Mařík, CSc.,
  • Publication: CCRIS '22: Proceedings of the 2022 3rd International Conference on Control, Robotics and Intelligent System. New York: Association for Computing Machinery, 2022. p. 111-116. ISBN 978-1-4503-9685-1.
  • Year: 2022
  • DOI: 10.1145/3562007.3562028
  • Link: https://doi.org/10.1145/3562007.3562028
  • Department: Department of Telecommunications Engineering, Artificial Intelligence Center
  • Annotation:
    Supervised learning of classifiers for text classification and sentiment analysis relies on the availability of labels that may be either difficult or expensive to obtain. A standard procedure is to add labels to the training dataset sequentially by querying an annotator until the model reaches a satisfactory performance. Active learning is a process that optimizes unlabeled data records selection for which the knowledge of the label would bring the highest discriminability of the dataset. Batch active learning is a generalization of a single instance active learning by selecting a batch of documents for labeling. This task is much more demanding because plenty of different factors come into consideration (i. e. batch size, batch evaluation, etc.). In this paper, we provide a large scale study by decomposing the existing algorithms into building blocks and systematically comparing meaningful combinations of these blocks with a subsequent evaluation on different text datasets. While each block is known (warm start weights initialization, Dropout MC, entropy sampling, etc.), many of their combinations like Bayesian strategies with agglomerative clustering are first proposed in our paper with excellent performance. Particularly, our extension of the warm start method to batch active learning is among the top performing strategies on all datasets. We studied the effect of this proposal comparing the outcomes of varying distinct factors of an active learning algorithm. Some of these factors include initialization of the algorithm, uncertainty representation, acquisition function, and batch selection strategy. Further, various combinations of these are tested on selected NLP problems with documents encoded using RoBERTa embeddings. Datasets cover context integrity (Gibberish Wackerow), fake news detection (Kaggle Fake News Detection), categorization of short texts by emotional context (Twitter Sentiment140), and sentiment classification (Amazon Reviews). Ultimately, we show that each of the active learning factors has advantages for certain datasets or experimental settings.

Modelling the Dynamics of Ancient Egyptian State During the Old Kingdom Period: Hidden Markov Models and Social Network Analysis

  • Authors: Bárta, M., Dulíková, V., Ing. Radek Mařík, CSc., Cibuľa, M.
  • Publication: Zeitschrift für Ägyptische Sprache und Altertumskunde. 2022, 149(1), 1-16. ISSN 0044-216X.
  • Year: 2022
  • DOI: 10.1515/zaes-2020-0017
  • Link: https://doi.org/10.1515/zaes-2020-0017
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The present study aims to outline new, more adjusted approaches of research addressing social complexity of past societies. In doing so, we use varied evidence to detect major 'leap events' in the history of ancient Egypt which were reflected by the state administration and its fluctuating complexity. The archaeological and inscriptional evidence shows that crucial changes in history had a non-linear, punctuated character. To reveal their true character, newly developed mathematical models have been applied. The analyses of early complex civilisations have made a noticeable progress recently. The current scholarship pays significant attention to a processual approach, description of the dynamics and its interpretation against the specific background formed by varied datasets originating from disciplines such as archaeology, history, art history, philology or environmental sciences to name but a few of the most relevant ones. Within this context, Old Kingdom Egypt evidence is reassessed using specific methods of analysis and interpretation. The ancient Egyptian Old Kingdom (2592-2120 BC), one of the earliest territorial states on this planet, is still frequently considered to be a homogenous continuum of isolated historical events manifested in various forms of architecture, art or religion. Some recent studies applied to its study put emphasis on a non-linear, 'punctuated approach' which appears to provide some new important perspectives on this traditional problem. The application of modern mathematical methods based on Hidden Markov Models and Social Network Analysis significantly changes this view. These methods have the potential to detail a vivid, heterogenous process of historical progress as a punctuated equilibria model, as a non-linear system with changing dynamics of its development in time. In this process, human agency, the rise and fluctuation of complexity and particular strategies of different social groups played significant roles and can be detected with the help of impartial approaches. The emerging picture can be used not only to describe the evolution of a past society but also for comparative purposes when studying the dynamics of past or present societies.

Active Learning for Text Classification and Fake News Detection

  • DOI: 10.1109/ISCSIC54682.2021.00027
  • Link: https://doi.org/10.1109/ISCSIC54682.2021.00027
  • Department: Department of Telecommunications Engineering, Artificial Intelligence Center
  • Annotation:
    Supervised classification of texts relies on the availability of reliable class labels for the training data. However, the process of collecting data labels can be complex and costly. A standard procedure is to add labels sequentially by querying an annotator until reaching satisfactory performance. Active learning is a process of selecting unlabeled data records for which the knowledge of the label would bring the highest discriminability of the dataset. In this paper, we provide a comparative study of various active learning strategies for different embeddings of the text on various datasets. We focus on Bayesian active learning methods that are used due to their ability to represent the uncertainty of the classification procedure. We compare three types of uncertainty representation: i) SGLD, ii) Dropout, and iii) deep ensembles. The latter two methods in cold- and warm-start versions. The texts were embedded using Fast Text, LASER, and RoBERTa encoding techniques. The methods are tested on two types of datasets, text categorization (Kaggle News Category and Twitter Sentiment140 dataset) and fake news detection (Kaggle Fake News and Fake News Detection datasets). We show that the conventional dropout Monte Carlo approach provides good results for the majority of the tasks. The ensemble methods provide more accurate representation of uncertainty that allows to keep the pace of learning of a complicated problem for the growing number of requests, outperforming the dropout in the long run. However, for the majority of the datasets the active strategy using Dropout MC and Deep Ensembles achieved almost perfect performance even for a very low number of requests. The best results were obtained for the most recent embeddings RoBERTa

Manifold Learning Projection Quality Quantitative Evaluation

  • Authors: Belov, V., Ing. Radek Mařík, CSc.,
  • Publication: CIIS 2021: 2021 The 4th International Conference on Computational Intelligence and Intelligent Systems. New York: Association for Computing Machinery, 2021. ISBN 978-1-4503-8593-0.
  • Year: 2021
  • DOI: 10.1145/3507623.3507637
  • Link: https://doi.org/10.1145/3507623.3507637
  • Department: Department of Telecommunications Engineering
  • Annotation:
    A large number dimensions may cause a variety of problems in real-world applications: some dimensions might be redundant and can worsen the quality of the workflow output, and, in the vast majority of exercises with datasets, data are distributed along a highly nonlinear manifold whose structure is unknown. This paper focuses on analyzing the outputs of nonlinear dimensionality reduction, or Manifold Learning, techniques. We introduce three meaningful measures that are capable of providing context behind projections onto lower-dimensional spaces. The measures will enable us to compare techniques with each other and assist in choosing suitable hyperparameters. Moreover, we propose to view projections from the standpoint of simplicial complex distortion. In connection to that, we establish the process of a dimension-agnostic graph-based data tessellation technique that builds a simplicial skeleton of high-dimensional data. Alongside our new tessellation technique, we evaluate the proposed quality measures on the Delaunay-tessellation-based simplicial approximations of manifolds.

Tensor Decomposition-Based Training Method for High-Order Hidden Markov Models

  • Authors: Cibuľa, M., Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 21st Conference Information Technologies – Applications and Theory (ITAT 2021). Aachen: CEUR Workshop Proceedings, 2021. p. 39-45. vol. 2962. ISSN 1613-0073.
  • Year: 2021
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Hidden Markov models (HMMs) are one of the most widely used unsupervised-learning algorithms for modeling discrete sequential data. Traditionally, most of the applications of HMMs have utilized only models of order 1 because higher-order models are computationally hard to train. We reformulate HMMs using tensor decomposition to efficiently build higher-order models with the use of stochastic gradient descent. Based on this, we propose a new modified version of a training algorithm for HMMs, especially suitable for high-order HMMs. Further, we show its capabilities and convergence on synthetic data.

Tessellation-based Kernel Density Estimation

  • Authors: Belov, V., Ing. Radek Mařík, CSc.,
  • Publication: ACAI 2021: Proceedings of the 2021 International Conference on Algorithms, Computing and Artificial Intelligence. New York: Association for Computing Machinery, 2021. ISBN 978-1-4503-8505-3.
  • Year: 2021
  • DOI: 10.1145/3508546.3508582
  • Link: https://doi.org/10.1145/3508546.3508582
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Kernel density estimation is a complex task that plays an essential role in a variety of applications. In this paper, we introduce an approach to the task that converts the problem of bandwidth evaluation in the Parzen-window-like framework into the non-parametric evaluation of a fine-grained density estimate which can then be scaled by means of the Scale-Space theory to achieve the desired level of smoothness. The detailed estimate is realized through the Delaunay space tessellation method and properties of its output simplices. Additionally, in the experimental part of the paper, we showcase the new method and demonstrate its outputs at various scales, reaching results that perceivably outperform its counterparts.

Uncovering Old Kingdom society arrangement: Detection of powerful dignitaries using complex network analysis

  • Authors: Dulíková, V., Ing. Radek Mařík, CSc.,
  • Publication: Handbook of Digital Egyptology: Texts. Alcalá de Henares: Editorial Universidad de Alcalá, 2021. p. 69-102. ISBN 978-84-18979-09-5.
  • Year: 2021
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The sophisticated administration in the age of the pyramid builders offers a remarkable time span for research and a unique opportunity to analyse the dynamics of a complex society in a diachronic perspective. Contrary to traditional approaches relying on statistics and logic, we will present an overview of our achievements in society development reconstruction covering structural aspects using complex network analysis (CNA). Our research is based on diachronic occurrences of titles held by officials of various social status. The presence of a social stratification structure can be demonstrated by specialized bipartite (people – titles) network visualizations. Results aimed at reconstructing the structure of Old Kingdom top-level society and at the detection of powerful dignitaries using CNA and particularly community detection methods are also discussed. The approaches are exemplified by selected case studies on influential persons from the Fifth and Sixth dynasties.

Cyber-Egyptology : An Overview of Tools : Cybernetics, Artificial Intelligence, Complex Networks

  • Authors: Ing. Radek Mařík, CSc., Dulíková, V.
  • Publication: Addressing the dynamics of change in ancient Egypt: Complex network analysis. Praha: Charles University, Faculty of Arts, 2020. p. 29-70. vol. 1. ISBN 978-80-7308-986-3.
  • Year: 2020
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Egyptology is becoming a strategic scientific discipline in that it is instructive for contemporary civilization and makes it possible to avoid critical mistakes in its development. However, classical Egyptology tools need to be supplemented by modern procedures that are more efficient in terms of the speed of the production of results and the processing of much more extensive data volumes, delivering more accurate and reliable evaluation of the findings. Since the time of Plato, cybernetics has been providing methods by which models based on observations of the environment or sensor data are created to reflect the properties of systems and environments, and actions that change the environment are generated. Many of these practices, which include elements of learning and deduction techniques, are developed within the field of artificial intelligence. Methods that specialize in analyzing relationships that can be modeled by graph theory are now widely developed within the framework of complex network analysis. To emphasize the increasing rate of application of these scientific methods to cover new challenges in processing ancient Egyptian data, the concept of cyber-Egyptology has been introduced recently. Cyber-Egyptology deals with the interpretation of ancient Egyptian data and Egyptologists' observations using techniques based on the principles of cybernetics, artificial intelligence, and complex network analysis that might be modified to cope with a limited amount of complex structures containing uncertainties and missing entries. We offer an overview of a selected set of such methods and their application to Old Kingdom data.

From a BPMN Black Box to a Smalldb State Machine

  • Authors: Kufner, J., Ing. Radek Mařík, CSc.,
  • Publication: IEEE Access. 2019, 7(1), 56276-56296. ISSN 2169-3536.
  • Year: 2019
  • DOI: 10.1109/ACCESS.2019.2912567
  • Link: https://doi.org/10.1109/ACCESS.2019.2912567
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The state of a state machine is a path between two actions; however, it is the rest of the world who walks the path. The development of a web application, especially of an information system, starts with use cases, i.e., model scenarios of how users interact with the application and its entities. The goal of this paper is to turn the use cases into a useful specification and automatically convert them into a model layer of a web application, in our case using finite automata. BPMN (Business Process Model and Notation) provides a graphical syntax to capture the use cases, which is based on the theoretical background of Petri Nets. However, because BPMN does not capture the state of the modeled entities, it is impractical to use it as a specification of a persistent storage and model layers of the web application. To overcome this problem, we propose a new STS algorithm to infer a finite automaton that implements a chosen participant in a BPMN diagram that represents a given entity of the web application.

Joint Positioning of Flying Base Stations and Association of Users: Evolutionary-Based Approach

  • DOI: 10.1109/ACCESS.2019.2892564
  • Link: https://doi.org/10.1109/ACCESS.2019.2892564
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Time-varying requirements of users on communication push mobile operators to increase density of base stations. However, the dense deployment of conventional static base stations (SBSs) is not always economical, for example, when periods of peak load are short and infrequent. In such cases, several Fying base stations (FlyBSs) mounted on unmanned aerial vehicles can be seen as a convenient substitution for the dense deployment of SBSs. This paper focuses on maximization of user satisfaction with provided data rates. To this end, we propose an algorithm that associates users with the most suitable SBS/FlyBS and finds optimal positions of all FlyBSs. Furthermore, we investigate the performance of two proposed approaches for the joint association and positioning based on the genetic algorithm (GA) and particle swarm optimization (PSO). It is shown that both solutions improve the satisfaction of users with provided data rates in comparison with a competitive approach. We also demonstrate trade-offs between the GA and the PSO. While the PSO is of lower complexity than the GA, the GA requires a slightly lower number of active FlyBSs to serve the users.

Multitree-like Graph Layering Crossing Optimization

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications. Porto: SciTePress - Science and Technology Publications, 2019. p. 233-240. ISBN 978-989-758-354-4.
  • Year: 2019
  • DOI: 10.5220/0007345302330240
  • Link: https://doi.org/10.5220/0007345302330240
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We improve a method of multitree-like graph visualization using a spanning tree-driven layout technique with constraints specified by layers and the ordering of groups of nodes within layers. We propose a new method of how the order of subtrees selected by the driving spanning tree can be derived from the actual edge crossings. Such a subtree order leads to additional decreasing of total edge crossings from 1% to 50%. This depends on the shape of the processed graph, ranging from a pure tree to a general acyclic graph. Our achievements are demonstrated using several datasets containing up to millions of people, species, or services. The proposed subtree ordering method of layered graphs that are similar to acyclic multitrees retains the generating of acceptable layouts in almost linear time.

Overlapping Communities in Bipartite Graphs

  • Authors: Ing. Radek Mařík, CSc., Zikmund, T.
  • Publication: Complex Networks and Their Applications VII. Springer, Cham, 2019. p. 207-218. vol. 1. ISSN 1860-9503. ISBN 978-3-030-05410-6.
  • Year: 2019
  • DOI: 10.1007/978-3-030-05411-3_17
  • Link: https://doi.org/10.1007/978-3-030-05411-3_17
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Community detection in bipartite networks with overlapping communities carries difficult problems when it comes to complex network analysis. In this paper, we propose a new model for generating such graphs. We combine several approaches based on stochastic block models using edge probabilities following the Poisson distribution. The proposed model can be reduced into their original model versions, such as a model for a bipartite graph with non-overlapping communities only. We present results of the generator. Its performance is evaluated using several known community detection techniques. The evaluation criterion assesses both a community’s identification and their overlaps.

Restful State Machines and SQL Database

  • Authors: Kufner, J., Ing. Radek Mařík, CSc.,
  • Publication: IEEE Access. 2019, 7 144603-144617. ISSN 2169-3536.
  • Year: 2019
  • DOI: 10.1109/ACCESS.2019.2944807
  • Link: https://doi.org/10.1109/ACCESS.2019.2944807
  • Department: Department of Telecommunications Engineering
  • Annotation:
    State machines and a relational database may look like completely unrelated tools, yet they form an interesting couple. By supporting them with well-established architectural patterns and principles, we built a model layer of a web application which utilizes the formal aspects of the state machines to aid the development of the application while standing on traditional technologies. The layered approach fits well with existing frameworks and the Command-Query Separation pattern provides a horizontal separation and compatibility with various conceptually distinct storages, while the overall architecture respects RESTful principles and the features of the underlying SQL database. The integration of the explicitly specified state machines as first-class citizens provides a reliable connection between the well-separated formal model and the implementation; it enables us to use visual comprehensible formal models in a practical and effective way, and it opens new possibilities of using formal methods in application development and business process modeling.

Feature Space Decomposition using Information Theory

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of 2018 International Conference on Algorithms, Computing and Artificial Intelligence (ACAI’18). Sanya, China. New York: Association for Computing Machinery, 2018. ISBN 978-1-4503-6625-0.
  • Year: 2018
  • DOI: 10.1145/3302425.3302478
  • Link: https://doi.org/10.1145/3302425.3302478
  • Department: Department of Telecommunications Engineering
  • Annotation:
    This article discusses the decomposition of an object space described by a large number of binary and ordinal features. It is assumed that no class labels are known and assigned to objects. The proposed method is a combination of clustering and community detection methods and allows for the construction of overlapping clusters. Subsets of relevant features are detected using redundant informa- tion. Feature dependency measures are based on information theory tools. Achieved results are demonstrated on data sets characterizing officials in the Old Kingdom of ancient Egypt.

Layered Graph Force-driven Vertex Positioning

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2018). Lisboa: SCITEPRESS – Science and Technology Publications, Lda, 2018. p. 301-308. vol. 3: IVAPP. ISBN 978-989-758-289-9.
  • Year: 2018
  • DOI: 10.5220/0006624703010308
  • Link: https://doi.org/10.5220/0006624703010308
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We propose a new method of node positioning for huge layered graphs specified by layers and fixed ordering of nodes within layers. We assume that the assignments of nodes to the layers and the order of nodes within the layers are provided by other suitable methods capable of processing multitree like networks. The node positioning method is based on the force-driven approach with barrier-like repulsive forces that avoids the quadratic complexity of traditional methods. We demonstrate achievements on several datasets containing up to millions of people or species. The proposed layout method of layered graphs that are close to acyclic multitrees creates aesthetically acceptable layouts in linear time.

Non-stationary Events Detection Based on Extrema Value Theory

  • DOI: 10.1109/ICSAI.2018.8599319
  • Link: https://doi.org/10.1109/ICSAI.2018.8599319
  • Department: Department of Telecommunications Engineering
  • Annotation:
    A detection of anomaly events in a non-stationary time series resembling vibration aspects is often based on the signal envelope. Both commonly used approaches, i.e. the Hilbert transform and the empirical mode decomposition, lead to high processing power requirements. As anomalies are assumed to be rare, we propose simplified methods based on extreme value theory that enable trend corrections and anomaly event occurrence detection. Both methods are based on the upper and lower envelope approximations that are constructed using maxima and minima limits of the signal.

On multitree-like graph layering

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Complex Networks & Their Applications VI. Cham: Springer International Publishing AG, 2018. p. 595-606. ISBN 9783319721491.
  • Year: 2018
  • DOI: 10.1007/978-3-319-72150-7_48
  • Link: https://doi.org/10.1007/978-3-319-72150-7_48
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We leverage a method of multitree graph visualization using a spanning tree-driven layout technique with constraints specified by layers and the ordering of groups of nodes within layers. We propose a new method of how the driving spanning tree can be selected using graph blocks and the simplex method. We demonstrate achievements using several datasets containing up to 10 6 people or species. The proposed layout method of layered graphs that are similar to acyclic multitrees creates aesthetically acceptable layouts in linear time.

Threshold selection based on extreme value theory

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Recent Technological and Scientific Advances. Springer, Cham, 2018. p. 529-537. ISSN 2194-5357. ISBN 978-3-319-65959-6.
  • Year: 2018
  • DOI: 10.1007/978-3-319-65960-2_65
  • Link: https://doi.org/10.1007/978-3-319-65960-2_65
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Almost every practical technique dealing with a detection of events in signals uses a technique of thresholding. The quality of the method performance often depends heavily on the threshold selection. In this paper, assuming that the signal values are bounded, we propose a simple practical method of threshold determination based on signal maxima sampling. We also present the relation between the ad hoc version of the method and the extreme value theory. In fact, it is shown that the method follows the extreme value theory conclusions if their asymptotic assumptions are satisfied by the given practical problem. The experimental results confirm the performance of the method we have applied in projects to different signal domains for many years. © 2018, Springer International Publishing AG.

Thresholding Using Extreme Value Theory Threshold Models

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 2018 18th International Conference on Mechatronics - Mechatronika (ME) 2018. Brno: Brno University of Technology, Faculty of Mechanical Engineering, 2018. p. 434-441. ISBN 978-80-214-5544-3.
  • Year: 2018
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Automated techniques of anomaly and outlier detection usually rely on thresholding. The quality of the method performance often depends heavily on the threshold selection. In this paper, assuming that the signal values are bounded, we propose a simple, practical method of threshold determination based on signal maxima sampling. It can be shown that only modeling block maxima is a wasteful approach to extreme value determination if other data on extremes are available. In our contribution, we reformulate the method of threshold selection based on blocks into a method using so-called threshold models. Threshold models rely on extracting the peak values from signal values which exceed a certain threshold. The experimental results confirm the performance of the method.

A Multilayer Approach to Commercial Computer Networks Testing

  • Authors: Shchurov, A., Ing. Radek Mařík, CSc.,
  • Publication: IEEE Access. 2017, 5 11083-11099. ISSN 2169-3536.
  • Year: 2017
  • DOI: 10.1109/ACCESS.2017.2714098
  • Link: https://doi.org/10.1109/ACCESS.2017.2714098
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Deployment of commercial computer networks sets high requirements for procedures, tools, and approaches for comprehensive testing of these networks. However, in spite of the great efforts of many researchers, the process of test design/generation still tends to be unstructured and bound to the personal experience and/or intuition of individual engineers. To address the problem, this paper introduces an approach of automated generation of abstract test cases based on the concept of multilayer networks. Test cases of that kind cover network infrastructures, including individual components and component-to-component interactions on all coexisting architectural layers, and provide information for subsequent analysis to ensure that the used formal model is consistent with respect to test requirements.

Complex network analysis in Old Kingdom society: a nepotism case

  • Authors: Dulíková, V., Ing. Radek Mařík, CSc.,
  • Publication: Abusir and Saqqara in the year 2015. Praha: Univerzita Karlova v Praze. Filozofická fakulta, 2017. p. 63-83. ISBN 978-80-7308-758-6.
  • Year: 2017
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The paper proposes a brand-new approach to processing, explanation, and interpretation of ancient Egyptian raw data set covering the period of the Old Kingdom (2700-2180 BC), taking into account the identification and analysis of social processes. At that time the gradual transformation of Egyptian society from a kingdom to a state took place. Methods of complex networks, referenced also as social network analysis, have been used for quantification of a number of historical aspects, there are only scattered publications dealing with late history of Egypt. Regrettably, nobody has applied SNA to the Old Kingdom context yet.

Efficient Genealogical Graph Layout

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016). Cham: Springer International Publishing, 2017. p. 567-578. ISSN 1860-949X. ISBN 978-3-319-50901-3.
  • Year: 2017
  • DOI: 10.1007/978-3-319-50901-3_45
  • Link: https://doi.org/10.1007/978-3-319-50901-3_45
  • Department: Department of Telecommunications Engineering
  • Annotation:
    While a visual unconstrained tree structure planar layout design is easy to implement, a visualization of a tree with constraints on node ranks and their ordering within ranks leads to a difficult combinatorial problem. A genealogical graph, such as family tree, can be taken as an example of such a case. Classical ancestor trees, descendant trees, Hourglass charts, and their visual variants such as node-link diagrams or fan charts are suitable for assessment of peoples relationships when one is focused on a particular person and his/her direct ancestors and descendants. Such tree-based representations miss a broader context of relationships and do not allow the quick assessment of several interlinked families together.We propose a new undirected tree-driven layout technique for layered multitree graph visualizations producing constraints on node layers and ordering of groups of nodes within layers. The computed constraints can be mapped, at least partially, into the DOT language property directives used by the Graphviz toolbox. We demonstrate achievements on several datasets containing up to 39000 people.

Invisible History: Hidden Markov Model of Old Kingdom Administration Development and its Trends

  • Authors: Dulíková, V., Ing. Radek Mařík, CSc., Bárta, M., Cibuľa, M.
  • Publication: EDAL · Egyptian & Egyptological Documents, Archives, Libraries. 2017, 1(1), 226-237. ISSN 2038-2286.
  • Year: 2017
  • Department: Department of Telecommunications Engineering
  • Annotation:
    By focusing on the development of the administration and its changes and turning points during the Old Kingdom period, this contribution proposes a dynamic model of bureaucratic evolution at that time punctuated by several ground-breaking changes which can be viewed as adaptations to the social dynamics. Endeavouring to find a way and method of visualizing this major observation, we focus on the stratified vizieral titulary, since it was directly related to the society’s development and reflected all major shifts and modifications. The Hidden Markov Model method has been adjusted in a way that enables its robust application to a limited volume of input data. As a consequence, its results make it possible to quantify the development of the administration structure in ancient Egypt. The numerical results are interpreted and compared to the state-of-art knowledge in Egyptology. In particular, several landmarks matching the perspective of the ‘punctuated equilibrium’ theory are discussed.

Linear Watershed Algorithm for 1D Real Signals

  • DOI: 10.1109/ICSAI.2017.8248450
  • Link: https://doi.org/10.1109/ICSAI.2017.8248450
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The watershed transformation is widely used, a powerful tool for the segmentation of 2D and 3D images. In this paper we propose a fast linear one sweep algorithm generating all possible extreme weighted connected components in 1D real value signal.We also show how such a post-order list of connected components can be converted into a component tree in linear time. Furthermore, we demonstrate how some features of the connected components can be computed again in linear time.

Multi-attribute Sequence Interpretation using HMM

  • Authors: Ing. Radek Mařík, CSc., Cibuľa, M.
  • Publication: Systems and Informatics (ICSAI), 2017 4th International Conference on. Tianjin: IEEE, 2017. p. 1529-1534. ISBN 978-1-5386-1106-7.
  • Year: 2017
  • DOI: 10.1109/ICSAI.2017.8248527
  • Link: https://doi.org/10.1109/ICSAI.2017.8248527
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Pattern and anomaly detection in time series or sequences is an active field of research. Most of the work in the field is dedicated to multivariate sequences of real numbers or they only focus on pattern recognition in simple sequences. This work introduces hidden Markov models and applies new methods which are suitable for the processing of binary or categorical multivariate sequences in which individual elements are considered to be expressions of the same system. Subsequently, proposed methods are applied in the analysis of the dataset of viziers and their titles from the fourth to the sixth dynasties of ancient Egypt.

Social networks in Ancient Egypt

  • Authors: Dulíková, V., Ing. Radek Mařík, CSc.,
  • Publication: Přírodovědecký časopis Vesmír. 2017, 96(12), 696-697. ISSN 1214-4029.
  • Year: 2017
  • Department: Department of Telecommunications Engineering
  • Annotation:
    By focusing on methods of systematic data collection and the complex network analysis, the paper proposes a new research approach to processing and interpretation of "raw data" from the Old Kingdom period by using semi-automatic methods.

A Simple Taxonomy of Multilayer Networks

  • Authors: Shchurov, A., Ing. Radek Mařík, CSc.,
  • Publication: International Journal of Computer Trends and Technology (IJCTT). 2016, 31(1), 20-24. ISSN 2231-2803.
  • Year: 2016
  • DOI: 10.14445/22312803/IJCTT-V31P105
  • Link: https://doi.org/10.14445/22312803/IJCTT-V31P105
  • Department: Department of Telecommunications Engineering
  • Annotation:
    One of the major goals of multilayer networks is providing proper and suitable representations of complex systems with many interdependent components, which, in turn, might interact through many different channels. However, the terminology referring to systems with multiple different relations has not yet reached a consensus. This work introduces a simple taxonomy of multilayer networks. Four different dimensions characterize the basic metrics of structural properties. Based on the taxonomy, an appropriate formal definition is presented.

A Trusted Model of Complex Computer Networks

  • Authors: Shchurov, A., Ing. Radek Mařík, CSc.,
  • Publication: Journal of ICT Standardization. 2016, 3(3), 201-230. ISSN 2245-800X.
  • Year: 2016
  • DOI: 10.13052/jicts2245-800X.332
  • Link: https://doi.org/10.13052/jicts2245-800X.332
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Formal methods based on abstract models are becoming more and more important in the domain of complex computer networks. On the other hand, processes of design documentation transformation into the formal models are still bound to the skills and ingenuity of individual engineers. Moreover, the human factor involved in data transformation represents a major bottleneck due to the tendency of computer networks to be more and more complex. To address this problem, this work introduces a formal model based on the concept of multilayer networks for applying a system methodology to network analysis and an appropriate presentation format of architecture descriptions as a possible part of detailed design documentation that could allow automated generation of trusted formal multilayer models based on this documentation.

On Design of Data Consistency Verification

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 2016 17th International Conference on Mechatronics - Mechatronika (ME) 2016. Prague: Czech Technical University in Prague, Faculty of Electrical Engineering, 2016. pp. 509-516. ISBN 978-80-01-05883-1.
  • Year: 2016
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We pose a problem with the aim to design a complete set of data consistency checking rules. The context domain is assumed to be a set of entities characterized by property values and a set of relations among entities. The source data, called observations, are assumed to be fused into a network of entities, further referred to as the network model. Using the bounded model checker Alloy, we focus on a practical design of a set of all consistency rules that are sufficient to ensure that the result network model is consistent.

On Large Genealogical Graph Layouts

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: ITAT 2016: Information Technologies - Applications and Theory: Conference on Theory and Practice of Information Technologies. Luxemburg: CreateSpace Independent Publishing Platform, 2016. p. 218-225. ISSN 1613-0073.
  • Year: 2016
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Classical ancestor trees, descendant trees, Hourglass charts, and their visual variants such as node-link diagrams or fan charts are suitable for assessment of people’s relationships when one is focused on a particular person (the so-called main person) and his/her direct ancestors and descendants. Such tree-based representations miss a broader context of relationships and do not allow quick assessment of several interlinked families together. We propose utilization of directed acyclic graph visualizations with constraints specified by layers and ordering of groups of nodes within layers. The computed constraints can be mapped, at least partially, into the DOT language property directives used by the Graphviz toolbox. We demonstrate achievements on datasets containing 1600 people (a private family tree collection) and 3000 people (an Egyptology database of officials from 4th, 5th, and 6th dynasty).

Proton Radiography with the Pixel Detector Timepix

  • Authors: Olšanský, V., Granja, C., Krist, P., Ing. Radek Mařík, CSc., Bíla, J., Chvátil, D.
  • Publication: Acta Polytechnica. 2016, 4 56-61. ISSN 2336-5382.
  • Year: 2016
  • DOI: 10.14311/AP.2016.4.0056
  • Link: https://doi.org/10.14311/AP.2016.4.0056
  • Department: Department of Telecommunications Engineering
  • Annotation:
    This article presents the processing of radiographic data acquired using the position-sensitive hybrid semiconductor pixel detector Timepix. Measurements were made on thin samples at the medical ion-synchrotron HIT [1] in Heidelberg (Germany) with a 221 MeV proton beam. The charge is energy by the particles crossing the sample is registered for generation of image contrast. Experimental data from the detector were processed for derivation of the energy loss of each proton using calibration matrices. The interaction point of the protons on the detector were determined with subpixel resolution by model fitting of the individual signals in the pixeled matrix. Three methods were used for calculation of these coordinates: Hough transformation, 2D Gaussian fitting and estimate the 2D mean. Parameters of calculation accuracy and calculation time are compared for each method. The final image was created by method with best parameters.

Tree-based Genealogical Graph Layout

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Graph Drawing and Network Visualization. Cham: Springer, 2016. pp. 613-616. ISSN 1611-3349. ISBN 978-3-319-50106-2.
  • Year: 2016
  • DOI: 10.1007/978-3-319-50106-2
  • Link: https://doi.org/10.1007/978-3-319-50106-2
  • Department: Department of Telecommunications Engineering
  • Annotation:
    While a visual unconstrained tree structure planar layout design is easy to implement, a visualization of a tree with constraints on node ranks and their ordering within ranks leads to a difficult combinatorial problem. A genealogical graph can be taken as an example of such a case. We propose a new method of tree-driven graph node layout.

A Formal Approach to Network/Distributed Systems Complex Testing

  • Authors: Shchurov, A., Ing. Radek Mařík, CSc., Khlevnoy, V.
  • Publication: International Journal of Computer Trends and Technology (IJCTT). 2015, 22(2), 76-80. ISSN 2231-2803.
  • Year: 2015
  • DOI: 10.14445/22312803/IJCTT-V22P115
  • Link: https://doi.org/10.14445/22312803/IJCTT-V22P115
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Deployment of network/distributed systems sets high requirements for procedures, tools and approaches for the complex testing of these systems. This work provides a survey of testing activities with regard to these systems based on standards and actual practices for both software-based and distribution (network) aspects. On the basis of this survey, we determine formal testing procedures/processes which cover these aspects, but which are not contrary to both aspects. The next step, based on the analysis of the implementation phase of System Development Life Cycle, determines a formal model for these processes.

A Presentation Format of Architecture Description Based on The Concept of Multilayer Networks

  • Authors: Shchurov, A., Ing. Radek Mařík, CSc.,
  • Publication: ITU Kaleidoscope Academic Conference: Trust in the Information Society, Proceedings of the 2015. Geneva: International Telecommunication Union, 2015. pp. 227-232. ISBN 978-92-61-15821-7.
  • Year: 2015
  • DOI: 10.1109/Kaleidoscope.2015.7383623
  • Link: https://doi.org/10.1109/Kaleidoscope.2015.7383623
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Formal methods based on abstract models are becoming more and more important in the domain of complex computer networks. On the other hand, processes of design documentation transformation into the formal models are still bound to the skills and ingenuity of individual engineers. Moreover, the human factor involved in data transformation represents a major bottleneck due to the tendency of computer networks to be more and more complex. To address this problem, this work introduces a possible appropriate presentation format of architecture descriptions as a part of detailed design documentation that could allow automated development of trusted formal models for analysis and verifying of complex computer networks.

Mathematical Formalization of Society Complexity

  • Authors: Ing. Radek Mařík, CSc., Dulíková, V.
  • Publication: Povaha změny: Bezpečnost, rizika a stav dnešní civilizace. Praha: Vyšehrad, 2015. p. 98-129. první. ISBN 978-80-7429-641-3.
  • Year: 2015
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We cannot make a clear statement to which extent we have approached the state, which in terms of evaluation of the history of mankind is already dangerously close to a period when a process known as collapse of complex society is launched. The contribution provides an overview of dynamic models and evaluation of nepotism.

Revealing Viber Communication Patterns to Assess Protocol Vulnerability

  • Department: Department of Telecommunications Engineering
  • Annotation:
    Viber is a proprietary communication protocol growing in popularity, on mobile devices especially. It represents a trend of replacing traditional protocols with proprietary messaging applications, employing cloud infrastructure support. It also constitutes a challenge to the networking community due to its unknown properties and opaque and highly distributed nature. We present observations-based analysis of the protocol function, topology, communication patterns and vulnerabilities, derived from traffic captures by simple data mining.

A Formal Approach to Distributed System Tests Design

  • Authors: Shchurov, A., Ing. Radek Mařík, CSc.,
  • Publication: International Journal of computer and Information technology. 2014, 3(4), 696-705. ISSN 2279-0764.
  • Year: 2014
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Deployment of distributed systems sets high requirements for procedures and tools for the complex testing of these systems. This work introduces a formal four - layered model for test generation mission o n the basis of the component based approach and the concept of layered networks . Based on this model, we de scribe the test generation stratégy that covers every interaction from the end user requirements on all co existing architectural layers , and checks the internal consistency of the system technical specifications with respect to the end user requirements. The next step introduce s the Prolog based approach to representing this model and the requirements coverage stratégy.

Self-generating Programs - Cascade of the Blocks

  • Authors: Kufner, J., Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of Information and Communication Technology. Heidelberg: Springer, 2014. pp. 199-212. ISSN 0302-9743. ISBN 978-3-642-55031-7.
  • Year: 2014
  • DOI: 10.1007/978-3-642-55032-4_20
  • Link: https://doi.org/10.1007/978-3-642-55032-4_20
  • Department: Department of Cybernetics
  • Annotation:
    When building complex applications the only way not to get lost is to split the application into simpler components. Current programming languages, including object oriented ones, offer very good utilities to create such components. However, when the components are created, they need to be connected together. Unluckily, these languages are not a very suitable tool for that. To help with composition of the components we introduce cascade – a dynamic acyclic structure built from blocks, inspired by the Function Block approach. The cascade generates itself on-the-fly during its evaluation to match requirements specified by input data and automatically orders an execution of the individual blocks. Thus the structure of a given cascade does not need to be predefined entirely during its composing/implementation and fixed during its execution as it is usually assumed by the most approaches. It also provides a real-time and fully automatic visualization of all blocks and their connections to ease debugging and an inspection of the application.

State Machine Abstraction Layer

  • Authors: Kufner, J., Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of Information and Communication Technology. Heidelberg: Springer, 2014. p. 213-227. ISSN 0302-9743. ISBN 978-3-642-55031-7.
  • Year: 2014
  • DOI: 10.1007/978-3-642-55032-4_21
  • Link: https://doi.org/10.1007/978-3-642-55032-4_21
  • Department: Department of Cybernetics
  • Annotation:
    Smalldb uses a non-deterministic parametric finite automaton combined with Kripke structures to describe lifetime of an entity, usually stored in a traditional SQL database. It allows to formally prove some interesting properties of resulting application, like access control of users, and provides primary source of metadata for various parts of the application, for example automatically generated user interface and documentation.

Structure Composition Discovery using Alloy

  • Authors: Ing. Radek Mařík, CSc.,
  • Publication: Proceedings of the 14th conference ITAT 2014. Praha: Institute of Computer Science AS CR, 2014, ISSN 1613-0073. ISBN 978-80-87136-18-8. Available from: http://ceur-ws.org/Vol-1214/z2.pdf
  • Year: 2014
  • Department: Department of Telecommunications Engineering
  • Annotation:
    A method for structure discovery is described. We assume that an unknown composite structure is sampled and observed as a set of small relational structure fractions. Each fraction is described by a set of atoms and their relations. We propose a technique that allows fusing these fractions into large components or the structure itself. The method is demonstrated using an example taken from the genealogy domain. Our approach of the solution is based on SAT. We show that the composition can be effectively performed using the Alloy tool, which is a bounded model checker. The search through the possible solutions is guided by the unique identities of observations.

Web Application Relations Mapping

  • Authors: Ing. Radek Mařík, CSc., Kouba, Z., Pantůček, M.
  • Publication: Database and Expert Systems Applications - part II. Heidelberg: Springer, 2014, pp. 155-163. ISSN 0302-9743. ISBN 978-3-319-10084-5.
  • Year: 2014
  • Department: Department of Telecommunications Engineering
  • Annotation:
    Web applications are developed and modified often so fast that architects, developers, and managers lose their control over quality of such software products. Reverse engineering techniques focused on different aspects of software implementation might help in keeping comprehension to implementation of web applications at appropriate level required for fulfilling change request. We focus our effort on a reconstruction of implicit associations among GUI data items and back-end database entities. Our approach is based on an association analysis and mining using a synchronized log of GUI events and related counterparts of SQL statements. Recovered dependecies between GUI and back-end databased can be utilized advantageously in an automated design of web application data flow testing.

Color grading of randomly textured ceramic tiles using color histograms

  • Authors: Boukouvalas, C, Kittler, J, Ing. Radek Mařík, CSc., Petrou, M
  • Publication: IEEE Transactions on Industrial Electronics. 1999, 46(1), 219-226. ISSN 0278-0046.
  • Year: 1999
  • DOI: 10.1109/41.744415
  • Link: https://doi.org/10.1109/41.744415
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We present a method designed to solve the problem of automatic color shade grading for industrial inspection of randomly textured multicolored ceramic tiles. Our grading method is based on the comparison of color histograms and we present results of correctly grading several series of ceramic tiles, the differences of which were at the threshold of human perception.

ASSIST: automatic system for surface inspection and sorting of tiles

  • Authors: Boukouvalas, C, De Natale, F, De Toni, G, Kittler, J, Ing. Radek Mařík, CSc.,
  • Publication: Journal of Materials Processing Technology. 1998, 82(1-3), 179-188. ISSN 0924-0136.
  • Year: 1998
  • DOI: 10.1016/S0924-0136(98)00044-2
  • Link: https://doi.org/10.1016/S0924-0136(98)00044-2
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The ceramic tile manufacturing process is now completely automated, with the exception of the final stage of production concerned with visual inspection. In this paper, the authors describe an integrated system developed for the detection of defects on color ceramic tiles and for the color grading of defect-free tiles. The results suggest that the performance is adequate for providing a basis for a viable commercial visual inspection system. (C) 1998 Elsevier Science S.A, All rights reserved.

Automatic color grading of ceramic tiles using machine vision

  • Authors: Boukouvalas, C, Kittler, J, Ing. Radek Mařík, CSc., Petrou, M
  • Publication: IEEE Transactions on Industrial Electronics. 1997, 44(1), 132-135. ISSN 0278-0046.
  • Year: 1997
  • DOI: 10.1109/41.557508
  • Link: https://doi.org/10.1109/41.557508
  • Department: Department of Telecommunications Engineering
  • Annotation:
    We present a method designed to solve the problem of automatic color grading for industrial inspection of plain and patterned ceramic tiles, We discuss problems me mere confronted with, like the temporal and spatial variation of the illumination, and the ways we dealt with them. Then, we present results of correctly grading a series of ceramic tiles, the differences of which were at the threshold of human perception.

Iterative morphology for fault detection in stochastic textures

  • Authors: Mirmehdi, M, Ing. Radek Mařík, CSc., Petrou, M, Kittler, J
  • Publication: Electronics Letters. 1996, 32(5), 443-444. ISSN 0013-5194.
  • Year: 1996
  • DOI: 10.1049/el:19960287
  • Link: https://doi.org/10.1049/el:19960287
  • Department: Department of Telecommunications Engineering
  • Annotation:
    The detection of abnormalities in stochastic textures is a challenging task in comparison to locating faults in replicated texture images. The authors demonstrate a technique based in the spatial and feature domains and detect abnormal formulations across the surface of randomly-textured images. The technique is based on colour clustering followed by structural processing with morphological operators.

AUTOMATIC GRADING OF TEXTURED CERAMIC TILES

  • Authors: BOUKOUVALAS, C, KITTLER, J, Ing. Radek Mařík, CSc., PETROU, M
  • Publication: MACHINE VISION APPLICATIONS IN INDUSTRIAL INSPECTION III. Prague: SPIE - The International Society for Optical Engineering, 1995. p. 248-256. vol. 2423. ISBN 0-8194-1770-X.
  • Year: 1995

Responsible person Ing. Mgr. Radovan Suk