2,075 research outputs found

    Rule-restricted Automaton-grammar transducers: Power and Linguistic Applications

    Get PDF
    This paper introduces the notion of a new transducer as a two-component system, which consists of a nite automaton and a context-free grammar. In essence, while the automaton reads its input string, the grammar produces its output string, and their cooperation is controlled by a set, which restricts the usage of their rules. From a theoretical viewpoint, the present paper discusses the power of this system working in an ordinary way as well as in a leftmost way. In addition, the paper introduces an appearance checking, which allows us to check whether some symbols are present in the rewritten string, and studies its e ect on the power. It achieves the following three main results. First, the system generates and accepts languages de ned by matrix grammars and partially blind multi-counter automata, respectively. Second, if we place a leftmost restriction on derivation in the context-free grammar, both accepting and generating power of the system is equal to generative power of context-free grammars. Third, the system with appearance checking can accept and generate all recursively enumerable languages. From more pragmatical viewpoint, this paper describes several linguistic applications. A special attention is paid to the Japanese-Czech translation

    MCMAS-SLK: A Model Checker for the Verification of Strategy Logic Specifications

    Get PDF
    We introduce MCMAS-SLK, a BDD-based model checker for the verification of systems against specifications expressed in a novel, epistemic variant of strategy logic. We give syntax and semantics of the specification language and introduce a labelling algorithm for epistemic and strategy logic modalities. We provide details of the checker which can also be used for synthesising agents' strategies so that a specification is satisfied by the system. We evaluate the efficiency of the implementation by discussing the results obtained for the dining cryptographers protocol and a variant of the cake-cutting problem

    GPU Image Processing Library

    Get PDF
    Tato práce se zabývá architekturou grafických karet Nvidia a s ní související programátorské rozhranní CUDA, které je využito při tvorbě knihovny akcelerující algoritmy zpracování obrazu. Velký důraz je kladen na testování výkonnostního zisku oproti optimalizované a používané knihovně OpenCV.This work is concerned with architecture of recent Nvidia graphics cards and application programming interface CUDA. That is used to create accelerated image processing library. It place emphasis on testing performance gain compassion with high optimized and used OpenCv library.

    Drying-Plant for smoked meat products

    Get PDF
    Tato práce je věnována základním požadavkům technologie sušení a zrání masných výrobků ve zracích komorách. Bude zmíněno základní rozdělení salámů a z toho plynoucí parametry pro zrací komory a jak ovlivňuje hygiena a sanitace celkovou produktivitu. Podrobně bude popsána technologie sušení. Stručně bude popsána fermentace a zrání jako takové.The thesis deals with essential requirements to dry and cure meat products using drying chambers. It covers the basic salami classification, the relevant parameters applicable to the drying chambers as well as the hygiene and sanitation and their influence on productivity. The drying technology is particularly emphasized. Brief information is provided regarding the fermentation and curing processes.

    Design and management Startegy of E-commerce

    Get PDF
    Tato bakalářská práce se zabývá možnostmi realizace a vylepšení elektronického obchodu a vytvářením modelu strategického řízení elektronického obchodu, který mohou využít jak začínající firmy, tak společnosti které elektronický obchod již využívají, ale plánují jej nadále rozvíjet.This bachelor’s thesis deals with possibilities of realization and improvement of e-commerce and with creation of management strategy of e-commerce which can be used by starting companies as well as companies which already have e-shop but are planning to develop it.

    Patented solutions of professional laundry machinery

    Get PDF
    Práce se zabývá problematikou právní ochrany technických řešení na národní i mezinárodní úrovni a zaměřuje se na postup vytváření patentových rešerší. Výstupem je přehled již chráněných řešení v oblasti snižování energetické náročnosti profesní prádelny. Součástí práce je i stručné seznámení s procesem profesní údržby prádla.The subject of the thesis is national and international legal protection of technical solutions of professional laundry machinery with a view to a patent review creation procedure. The output is the review of already legally protected solutions relating to the reduction of industrial laundry energy consumption. The part of thesis is also a brief summary relating to the professional laundry care process.

    Graph-based Network Traffic Analysis for Incident Investigation

    Get PDF
    In this presentation, we introduce a new approach to analyzing network traffic data using associations. In the beginning, we discuss the benefits and issues of currently used analysis tools. Next, we propose a new data representation model and utilization of a graph database to store such data. In the main part of the presentation, we introduce the Granef toolkit and its use for incident investigation

    Trace-Share: Towards Provable Network Traffic Measurement and Analysis

    Get PDF
    Research in network traffic measurement and analysis is a long-lasting field with growing interest from both scientists and the industry. However, even after so many years, results replication, criticism, and review are still rare. The aim of our research is to overcome the mentioned controversy with focus on the whole issue covering all areas of data anonymization, authenticity, recency, publicity, and their usage for research provability. We believe that these challenges can be solved by utilization of semi-labeled datasets composed of real-world network traffic and annotated units with interest-related packet traces only
    corecore