default search action
Roman Jasek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Martin Burdík, Tomás Kuzela, Dusan Fojtu, Petr Elisek, Josef Hrncirík, Roman Jasek, Marek Ingr:
Optical Tweezers Apparatus Based on a Cost-Effective IR Laser - Hardware and Software Description. Sensors 24(2): 643 (2024) - 2023
- [c25]Pavel Wanecki, Roman Jasek, Irena Drofova:
The Contribution of the European NIS2 Directive to the Design of the Cyber Security Model. IDT 2023: 149-154 - 2021
- [j12]Iaroslav Iaremko, Roman Senkerik, Roman Jasek, Petr Lukastik:
An effective data reduction model for machine emergency state detection from big data tree topology structures. Int. J. Appl. Math. Comput. Sci. 31(4): 601-611 (2021) - 2020
- [c24]Zuzana Koudelkova, Roman Jasek, Martina Zabcikova:
Communication Tool for Disabled People Based on Surface Electromyography. ICMHI 2020: 86-89
2010 – 2019
- 2019
- [j11]Lukas Kralik, Roman Jasek, Petr Zacek, Roman Senkerik:
Agile approach in multi-criterial decision making. Int. J. Manuf. Technol. Manag. 33(3/4): 256-267 (2019) - [c23]Zuzana Koudelkova, Roman Jasek, Martina Zabcikova:
The Possibility of Using Diagnostic Methods EEG and sEMG in Rehabilitation. ICCAI 2019: 240-243 - 2018
- [c22]Mohamad Kadi, Said Krayem, Roman Jasek, Petr Zacek, Bronislav Chramcov:
Multi-agent Systems Interacting (Addressing Scopes, Control Resources). CSOC (3) 2018: 233-245 - [c21]Ammar Alhaj Ali, Roman Jasek, Said Krayem, Bronislav Chramcov, Petr Zacek:
Improved Adaptive Fault Tolerance Model for Increasing Reliability in Cloud Computing Using Event-B. CSOC (3) 2018: 246-258 - [c20]Petr Zacek, David Malaník, Petra Holbikova, Roman Jasek, Lukas Kralik:
Using the SHA-3 to Derive Encryption Keys Based on Key-File. EECS 2018: 348-351 - 2017
- [c19]Roman Jasek, Said Krayem, Petr Zacek:
Big Data Process Advancement. CSOC (2) 2017: 379-396 - [c18]Ammar Alhaj Ali, Roman Jasek, Said Krayem, Petr Zacek:
Proving the Effectiveness of Negotiation Protocols KQML in Multi-agent Systems Using Event-B. CSOC (2) 2017: 397-406 - 2016
- [j10]Lukas Kralik, Roman Senkerik, Roman Jasek:
Model for comprehensive approach to security management. Int. J. Syst. Assur. Eng. Manag. 7(2): 129-137 (2016) - 2015
- [j9]Jan Vávra, Martin Hromada, Roman Jasek:
Specification of the Current State Vulnerabilities Related to Industrial Control Systems. Int. J. Online Eng. 11(5): 64-68 (2015) - [c17]Roman Zak, Jaromir Svejda, Roman Jasek, Roman Senkerik:
The Architecture of Software Interface for BCI System. CSOC (2) 2015: 307-316 - [c16]Petr Zacek, Roman Jasek, David Malaník:
Using the Deterministic Chaos in Variable Mode of Operation of Block Ciphers. CSOC (1) 2015: 347-354 - [c15]Jaromir Svejda, Roman Zak, Roman Senkerik, Roman Jasek:
Using Brain - Computer Interface For Control Robot Movement. ECMS 2015: 475-480 - [c14]Lukas Kralik, Roman Senkerik, Roman Jasek:
Proposal Of Evaluation Criteria For Free And Open Source Tools For Modelling And Support Of IT Service Management According To ITIL. ECMS 2015: 537-542 - [c13]Roman Senkerik, Michal Pluhacek, Ivan Zelinka, Donald Davendra, Zuzana Komínková Oplatková, Roman Jasek:
On the Tuning of Complex Dynamics Embedded into Differential Evolution. ICAISC (1) 2015: 389-399 - 2014
- [j8]Michal Gerza, Frantisek Schauer, Roman Jasek:
Security of ISES Measureserver® Module for Remote Experiments against Malign Attacks. Int. J. Online Eng. 10(3): 4-10 (2014) - [c12]Jaromir Svejda, Roman Zak, Roman Jasek, Roman Senkerik:
On the Simulation of the Brain Activity: A Brief Survey. CSOC 2014: 105-115 - [c11]Peter Janku, Roman Dosek, Roman Jasek:
Obstacle Detection for Robotic Systems Using Combination of Ultrasonic Sonars and Infrared Sensors. CSOC 2014: 321-330 - [c10]Michal Bliznák, Tomás Dulík, Roman Jasek:
Performance Analysis of Built-in Parallel Reduction's Implementation in OpenMP C/C++ Language Extension. CSOC 2014: 607-617 - [c9]Roman Zak, Jaromir Svejda, Roman Senkerik, Roman Jasek:
Analysis Of EEG Signal For Using In Biometrical Classification. ECMS 2014: 377-381 - [c8]Martin Kolarík, Roman Jasek, Zuzana Komínková Oplatková:
Maximizing Vector Distances for Purpose of Searching - A Study of Differential Evolution Suitability. IBICA 2014: 419-428 - 2013
- [j7]Michal Krbecek, Frantisek Schauer, Roman Jasek:
Security Aspects of Remote e-Laboratories. Int. J. Online Eng. 9(3): 34-39 (2013) - [j6]Ivan Zelinka, Mohammed Chadli, Donald Davendra, Roman Senkerik, Roman Jasek:
An investigation on evolutionary reconstruction of continuous chaotic systems. Math. Comput. Model. 57(1-2): 2-15 (2013) - [j5]Donald Davendra, Ivan Zelinka, Magdalena Bialic-Davendra, Roman Senkerik, Roman Jasek:
Discrete Self-Organising Migrating Algorithm for flow-shop scheduling with no-wait makespan. Math. Comput. Model. 57(1-2): 100-110 (2013) - [c7]Roman Jasek, Anna Szmit, Maciej Szmit:
Usage of Modern Exponential-Smoothing Models in Network Traffic Modelling. NOSTRADAMUS 2013: 435-444 - [c6]Roman Senkerik, Michal Pluhacek, Ivan Zelinka, Zuzana Komínková Oplatková, Radek Vala, Roman Jasek:
Performance of Chaos Driven Differential Evolution on Shifted Benchmark Functions Set. SOCO-CISIS-ICEUTE 2013: 41-50 - [p4]Roman Senkerik, Zuzana Oplatková, Ivan Zelinka, Donald Davendra, Roman Jasek:
Application of Evolutionary Techniques for Optimization of Chaos Control - Introduction of Three Approaches. Handbook of Optimization 2013: 801-820 - [p3]Zuzana Oplatková, Jiri Holoska, Michal Procházka, Roman Senkerik, Roman Jasek:
Optimization of Artificial Neural Network Structure in the Case of Steganalysis. Handbook of Optimization 2013: 821-843 - 2012
- [j4]Donald Davendra, Ivan Zelinka, Magdalena Bialic-Davendra, Roman Senkerik, Roman Jasek:
Clustered enhanced differential evolution for the blocking flow shop scheduling problem. Central Eur. J. Oper. Res. 20(4): 679-717 (2012) - [j3]Roman Senkerik, Donald Davendra, Ivan Zelinka, Zuzana Oplatková, Roman Jasek:
Performance Comparison of differential Evolution and SOMA on Chaos Control Optimization Problems. Int. J. Bifurc. Chaos 22(8) (2012) - [j2]Ivan Zelinka, Donald Davendra, Roman Jasek, Roman Senkerik:
Investigation on Visualization, Analysis, and Control of Complex Networks Dynamics. Int. J. Energy Optim. Eng. 1(3): 48-73 (2012) - [c5]Martin Pospisilik, Lukas Kouril, Milan Adamek, Ivan Zelinka, Roman Jasek:
Custom Winding Ratio Analysis of Evolutionary Optimized Audio Transformer. NOSTRADAMUS 2012: 179-190 - [c4]Radek Vala, David Malaník, Roman Jasek:
Usability of Software Intrusion-Detection System in Web Applications. CISIS/ICEUTE/SOCO Special Sessions 2012: 159-166 - [p2]Roman Senkerik, Zuzana Oplatková, Ivan Zelinka, Roman Jasek:
Application of Analytic Programming for Evolutionary Synthesis of Control Law - Introduction of Two Approaches. Advances in Intelligent Modelling and Simulation 2012: 253-268 - 2011
- [j1]Ivan Zelinka, Donald Davendra, Roman Senkerik, Roman Jasek:
Do Evolutionary Algorithm Dynamics Create Complex Network Structures? Complex Syst. 20(2) (2011) - [c3]Zuzana Oplatková, Jiri Holoska, Ivan Zelinka, Roman Senkerik, Roman Jasek:
Steganalysis Of PQ Algorithm By Means Of Neural Networks. ECMS 2011: 446-451 - [c2]Roman Senkerik, Zuzana Oplatková, Ivan Zelinka, Roman Jasek:
Evolutionary Synthesis Of Control Law For Higher Periodic Orbits Of Chaotic Logistic Equation. ECMS 2011: 452-458 - 2010
- [c1]Ivan Zelinka, Donald Davendra, Václav Snásel, Roman Jasek, Roman Senkerik, Zuzana Oplatková:
Preliminary investigation on relations between complex networks and evolutionary algorithms dynamics. CISIM 2010: 148-153 - [p1]Ivan Zelinka, Roman Jasek:
Evolutionary Decryption of Chaotically Encrypted Information. Evolutionary Algorithms and Chaotic Systems 2010: 329-343
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint