Petr Zacek
Tomas Bata University in Zlín
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Petr Zacek.
computer science on-line conference | 2015
Petr Zacek; Roman Jasek; David Malanik
This paper describes creating the new variable mode of operation for block cipher, and it also discusses possibilities of using the deterministic chaos in this mode of operation. It discusses the use of deterministic chaos to make the mode of operation variable and pseudo-random. Main idea of this article is to design the mode of operation dependent on all parts of encryption process as plaintext, cipher text and previous used key, and to create the function controlled by deterministic chaos, where the chaotic system has role of pseudo-random number generator, which manages the rules how these parts are used. The logistic map as the simple deterministic chaos system is used for showing the example of the application.
INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM 2015) | 2016
Petr Zacek; Roman Jasek; David Malanik
This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.
computer science on-line conference | 2018
Mohamad Kadi; Said Krayem; Roman Jasek; Petr Zacek; Bronislav Chramcov
Multi-agent systems consist of agents and their environment. the agents in a multi-agent system could equally well be robots, humans or human teams. And may contain combined human-agent.
computer science on-line conference | 2018
Ammar Alhaj Ali; Roman Jasek; Said Krayem; Bronislav Chramcov; Petr Zacek
Cloud computing provide services to many users at the same time by providing virtual resources via internet, General example of cloud services is Google apps, provided by Google. In most of cloud applications, processing is done on remote cloud computing nodes. So, there are more chances of errors, due to the undetermined latency and lose control over remote nodes, so it is very important apply the techniques for fault tolerance in cloud computing.
Archive | 2018
Lukas Kralik; Roman Jasek; Petr Zacek
This paper responds to requirement to improve the orientation between offered SW, as ITIL tools. There are really a lot of offered tools and very often this fact may leads to the poor implementation of ITIL. Main objective of this paper is to provide an overview how users’ preferences change in a short time and primarily the comparison between expert evaluation and evaluation with utilization of simple multi-criterial decision making methods. Simultaneously, the research described in this paper will serve for further work on creating a methodology for evaluation of ITIL tools.
2018 22nd International Conference Electronics | 2018
Stanislav Kovar; Jan Valouch; Milan Adamek; Petr Zacek
The paper focuses on shielding effectiveness calculations of grid protections for camera objectives and their comparison. Security cameras represent the fundamental elements of physical guarding and help to improve a feeling of safety. Unfortunately, cameras are electronic device susceptible to electromagnetic field effects; therefore, the demand for protection is rising in recent years. The most cost-effectiveness solution is shielding enclosure which may be problematic to realise in this case just because of the lens. As an ideal solution to this problem seems to be shielding grid including different shapes of networks. The paper should provide information which type of shielding grid is the most effective.
computer science on-line conference | 2017
Ammar Alhaj Ali; Roman Jasek; Said Krayem; Petr Zacek
Multi-Agents Systems (MAS) provide a good basis to build complex systems and in MAS a negotiation is a key form of interaction that enables agents to arrive at a final agreement. We present an event-B based approach to reasoning about a negotiation protocols in multi-agent systems (MAS), Key features of Event-B are the use of set theory as a modeling notation and it is a formal method that can be used in the development of reactive distributed systems and we propose using the Rodin modeling tool for Event-B that integrates modeling and proving.
computer science on-line conference | 2017
Roman Jasek; Said Krayem; Petr Zacek
Information in this era is thriving to be maintained on a verity of sources. Data is available in different patterns and forms. Combining and processing all different types of datasets in a heterogeneity database is near to impossible, specifically, if the information is moving and changing on many different sources on a continuous basis. Information is represented in different modules and nowadays processing data from various sources can lead to critical risk assessment results. Big Data is a concept introduced to cover the use of different techniques serving the desired goals by processing the given information. Processing huge amount of data is a big challenge for a single machine to perform, in this paper we will discuss this idea and demonstrate a module of clustered machines to work as a single entity towards achieving the desired tasks while working on parallel cohesively.
future technologies conference | 2016
Petr Zacek; Roman Jasek; David Malanik
This article summarizes the actual results of our research in designing new group of polymorphous modes of operation for block ciphers. We have designed general scheme of block cipher polymorphous mode of operation based on pseudorandom number generator (PRNG) and function F. We have also designed the first polymorphous mode based on this scheme PM-DC-LM using the chaotic pseudo-random number generator (CPRNG), which is derived from deterministic chaos — Logistic maps. We have done some basic tests as a comparison with other commonly used block cipher modes of operation. We have also improved the first version of CPRNG and compared it by counting the entropies.
MATEC Web of Conferences | 2018
Ammar Alhaj Ali; Pavel Varacha; Said Krayem; Petr Zacek; Andrzej Urbanek