National Repository of Grey Literature 261 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Novel Applications of Ant Algorithms
Korgo, Jakub ; Drábek, Vladimír (referee) ; Bidlo, Michal (advisor)
Ant algorithms have been used for a variety of combinatorial optimization problems. One of these problems, where ant algorithms haven't been used, is the design of transition rules for cellular automata (CA). Which is a problem that this master's thesis is focused on. This work begins with an introduction into ant algorithms and a overview of its applications, followed by an introduction into CA. In the next part the author proposes a way how to encode rules of CA into a graph which is used in ant algorithms. The last part of this thesis contains an application of encoded graph on elitist ant system and MAX-MIN ant system. This is followed by experimental results of creating transition rules for CA problems by these algorithms.
Applications of Ant Algorithms
Kaščák, Imrich ; Vašíček, Zdeněk (referee) ; Bidlo, Michal (advisor)
The presented thesis focuses on the basic optimization algorithm of Ant Colony Optimization (ACO) - Ant System (AS) and its extension, Ant Colony System (ACS) on Traveling Salesman Problem (TSP). The essence of these algorithms is to find the optimal solution (the shortest path) in a specified instance containing several locations. The thesis demonstrates verification of behaviour of both algorithms, experimental study of impact of adjustable parameters of ant algorithms on result. Furthermore, the thesis is focused on examining the idea of optimizing detection of image edges by introducing a modification into an existing solution. Modified solution experiments are performed and compared to the original.
FM Transmitter on Rasberry Pi
Kohoutek, Jan ; Bidlo, Michal (referee) ; Vašíček, Zdeněk (advisor)
Aim of this bachelor thesis is to desing and implement player, which will be able to play its own files in FM band. The player consists of transmitter based on Rapsberry Pi and mobile application that allows wireless control of this player. Technical report is divided into three main parts. The initial part describes technologies for transmission of audio signal in FM band. Followed by description of suggested solution and its implementation. Concluding part describes the designed prototype and assesment of its parameters.
Traveling Salesman Problem - Serial Methods
Štys, Jiří ; Bidlo, Michal (referee) ; Kašpárek, Tomáš (advisor)
This bachelor's thesis describes some algorithm which solves traveling salesman problem by the help of serial methods. This thesis deals with efficiency analysis and scalability of this problem.
Localization of Objects in Wireless Sensor Network Environment
Vícha, Tomáš ; Bidlo, Michal (referee) ; Šimek, Václav (advisor)
This thesis deals with the use of spatial awareness methods within technologies designed for creation of short-range wireless sensor networks. The thesis analyzes several techniques that can be used to estimate position of objects within the sensor network. For a practical solution, a method based on measuring the time differences of the sent messages was chosen. A circuit implementation of a network node based on the DW1000 chip, which works on ultra-wideband transmission technology, was implemented. A sensor network with the appropriate user application for its operation and display of localization results was also implemented.
Evolutionary Design Using Rewriting Systems
Nétková, Barbora ; Hyrš, Martin (referee) ; Bidlo, Michal (advisor)
This master’s thesis proposes a method for the evolutionary design of rewriting systems. In particular, genetic algorithm will be applied to design rewriting rules for a specific variant of Lindenmayer system. The evolved rules of such grammar will be applied to generate growing sorting networks. Some distinct approaches to the rewriting process and construction of the sorting networks will be investigated. It will be shown that the evolution is able to successfully design rewriting rules for the proposed variants of rewriting processes. The results obtained exhibit abilities to successfully create partially growing sorting networks, which was evolved to grow for fewer inputs and in subsequent iterations grows up to 36 inputs.
Access System Controller Supporting More Types of Identification
Havlíček, Lukáš ; Bidlo, Michal (referee) ; Vašíček, Zdeněk (advisor)
This thesis deals with design and implementation of access system control unit supporting more types of identification. Designed system supports identification using access cards MIFARE and detection of Bluetooth Low Energy devices. Device is realised using the ESP32 development board. The display of passage history and system configuration is solved using a web interface, which is provided by a web server running on this device.
Emergent Behavior of Cellular Automata
Říha, Michal ; Jaroš, Jiří (referee) ; Bidlo, Michal (advisor)
This work deals with the simulation of an emergent behavior in cellular automata. In particular, density task, synchronization task and chessboard generation problem are investigated. It uses evolutionary algorithm to solve this problem.
Portable Stimulus Scenarios Specification for RISC-V Processor Modules
Bardonek, Petr ; Bidlo, Michal (referee) ; Zachariášová, Marcela (advisor)
The thesis is focused on the design and implementation of the portable stimulus verification scenarios for selected Berkelium processor modules based on RISC-V architecture from Codasip. The aim of this work is to use new standard for Portable Stimulus developed by Accellera organization to design and implement portable stimulus scenarios using the Questa InFact tool from Mentor. The proposed portable stimulus scenarios are then linked to the already existing verification environments of the UVM methodology and then they are used for verification of the Berkelium processor modules based on RISC-V architecture. The last part of the thesis is the evaluation of portability of the implemented scenarios to the individual levels of the Berkelium processor based on RISC-V architecture (IP blocks, subsystems, system level), in which it tries to use the proposed scenarios across all verificated levels.

National Repository of Grey Literature : 261 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.