An accurate numerical Laplace inversion algorithm is presented. In comparison with original multi-step inversion method, some improvements are made. The concrete Turbo Pascal routines are introduced.
An accurate numerical Laplace inversion algorithm is presented. In comparison with original multi-step inversion method, some improvements are made. The concrete Turbo Pascal routines are introduced.
Manufacturers of radiant barriers express the performance of their products in terms of the total hemispherical emittance. The purpose of a radiant barrier is to decrease the radiation heat transfer across the attic a...
详细信息
标准号:
ASTM C1340/C1340M-2010
Manufacturers of radiant barriers express the performance of their products in terms of the total hemispherical emittance. The purpose of a radiant barrier is to decrease the radiation heat transfer across the attic air space, and hence, to decrease the heat loss or gain through the ceiling below the attic. The amount of decrease in heat flow will depend upon a number of factors, such as weather conditions, amount of mass or reflective insulation in the attic, solar absorptance of the roof, geometry of the attic and roof, and amount and type of attic ventilation. Because of the infinite combinations of these factors, it is not practical to publish data for each possible case. The calculation of heat loss or gain of a system containing radiant barriers is mathematically complex, and because of the iterative nature of the method, it is best handled by computers. computers are now widely available to most producers and consumers of radiant barriers to permit the use of this practice. The user of this practice may wish to modify the data input to represent accurately the structure. The computer program also may be modified to meet individual needs. Also, additional calculations may be desired, for example, to sum the hourly heat flows in some fashion to obtain estimates of seasonal or annual energy usages. This might be done using the hourly data as inputs to a whole-house model, and by choosing house balance points to use as cutoff points in the summations. 1.1 This practice covers the estimation of heat gain or loss through ceilings under attics containing radiant barriers by use of a computer program. The computer program included as an adjunct to this practice provides a calculational procedure for estimating the heat loss or gain through the ceiling under an attic containing a truss or rafter mounted radiant barrier. The program also is applicable to the estimation of heat loss or gain through ceilings under an attic without a radiant barrier. This procedure utiliz
1.1 This practice covers the calculations of all the permeation parameters related to Test Method F739, ISO 6529, and Practice D6978 standards by use of a computer program, referred to as “Permeation Calcul...
详细信息
标准号:
ASTM F2815-2010
1.1 This practice covers the calculations of all the permeation parameters related to Test Method F739, ISO 6529, and Practice D6978 standards by use of a computer program, referred to as “Permeation Calculator” (DHHS (NIOSH) Publication No. 2007 – 143c). , 1.2 The practice is applicable to both open loop and closed loop permeation tests. The closed loop test includes continuous sampling and discrete sampling. The discrete sampling includes tests when sample volume is replaced and also when sample volume is not replaced. For an open loop permeation test, the computer program also allows permeation data files with variable sampling flow rate. Refer to Test Method F739 for more details about the different types of the permeation testing systems. 1.3 This practice is applicable to the most typical permeation behavior, that is, Type A, where the permeation rate stabilizes at a “steady-state” value. It does not apply to the other types of permeation behaviors. Refer to Test Method F739 for more details about the various permeation behaviors. 1.4 This practice is not applicable to Test Method F1383 because the permeation behavior is different under conditions of intermittent contact than under conditions of continuous contact. 1.5 This practice does not address the procedure of permeation testing. Refer to Test Method F739, ISO 6529, or Practice D6978 for the procedures in detail if needed.
Manufacturers of thermal insulation express the performance of their products in charts and tables showing heat gain or loss per unit surface area or unit length of pipe. This data is presented for typical insulation ...
详细信息
标准号:
ASTM C680-2008
Manufacturers of thermal insulation express the performance of their products in charts and tables showing heat gain or loss per unit surface area or unit length of pipe. This data is presented for typical insulation thicknesses, operating temperatures, surface orientations (facing up, down, horizontal, vertical), and in the case of pipes, different pipe sizes. The exterior surface temperature of the insulation is often shown to provide information on personnel protection or surface condensation. However, additional information on effects of wind velocity, jacket emittance, ambient conditions and other influential parameters may also be required to properly select an insulation system. Due to the large number of combinations of size, temperature, humidity, thickness, jacket properties, surface emittance, orientation, and ambient conditions, it is not practical to publish data for each possible case, Refs (31,32). Users of thermal insulation faced with the problem of designing large thermal insulation systems encounter substantial engineering cost to obtain the required information. This cost can be substantially reduced by the use of accurate engineering data tables, or available computer analysis tools, or both. The use of this practice by both manufacturers and users of thermal insulation will provide standardized engineering data of sufficient accuracy for predicting thermal insulation system performance. However, it is important to note that the accuracy of results is extremely dependent on the accuracy of the input data. Certain applications may need specific data to produce meaningful results. The use of analysis procedures described in this practice can also apply to designed or existing systems. In the rectangular coordinate system, Practice C 680 can be applied to heat flows normal to flat, horizontal or vertical surfaces for all types of enclosures, such as boilers, furnaces, refrigerated chambers and building envelopes. In the cylindrical coordinate syste
This diploma thesis deals with video games as a problematic part of software law that is constantly growing in importance. It focuses on legal difficulties that were a byproduct of their growing economic potential. It...
详细信息
This diploma thesis deals with video games as a problematic part of software law that is constantly growing in importance. It focuses on legal difficulties that were a byproduct of their growing economic potential. It further explains relevant aspects of copyright law in this matter and, to a limited degree, also related problematic from different branches of law, namely criminal law, administrative law and civil law. During the writing, I was focusing on distinctive aspects of video games as specific kind of software, and their distinctions from different kinds of works, especially from "classic" computer programs. An introduction to the problematics, an establishment of aims of this work and a brief summary of video games from the forties to the present times can be found in the first chapter. Basic terminology that is used in this work is in chapter two. The thesis further continues with legal concepts such as author, work and computer program. It proceeds with thoughts on a possible subsumption of video game under a certain kind of work as it is defined in the copyright act and considers establishing an individual category for video games. Chapter five defines content of copyrights, their division on personal and property law with a focus on the specification of different kinds of property law....
Tato bakalářská práce se bude zabývat právní problematikou fenoménu otevřených dat a open source softwaru. Praktickým výstupem je vytvoření aplikace, která b...
详细信息
Tato bakalářská práce se bude zabývat právní problematikou fenoménu otevřených dat a open source softwaru. Praktickým výstupem je vytvoření aplikace, která bude ditribuována pod open source licencí a bude využívat otevřená data. V teoretické části práce jsou nejdříve popsány právní aspekty které vznikají při vytváření programu a zároveň je zde přiblížena současná evropská a česká legislativa. Dále je zde popsán pojem Free a open source softwaru, druhy autorství, práva autora či zvláštní práva pořizovatele databáze. V další pasáži jsou probrány licence a následně je zmíněna veřejná licence pod kterou bude distribuována aplikace. Následuje kapitola pojednávající o konkrétních problémech související s autorskoprávní ochranou. Druhá část teoretické práce řeší otevřená data. Nejdříve je objasněn tento pojem a poté je uvedena unijní a česká legislativa, která se pojí s otevřenými daty. Pak je pozornost upřena na formáty otevřenosti otevřených dat a způsoby poskytování. A nakonec jsou uvedeny konkrétní problémy, které mohou vznikat při užívání otevřených dat. V další části bakalářské práce je řešen praktický výstup, android aplikaci, která splňuje definici free and open source softwaru. Nejdříve je zde provedena analýza dat. Po analýze následuje vybrání vhodné datové sady a poté jsou rozebrány podmínky užití datových sad. V dalších kapitolách už je více řešena technická stránka věci. Je popsána volba platformy, jazyka a vývojového prostředí, je zmíněna veřejná licence, jež bude použita pro distribuci a také zde bude rozebrána platforma, kde bude aplikace distribuována. Kapitola funkcionality aplikace popíše zamýšlenou funkcionalitu a rozvržení aplikace. Poslední kapitola popisuje samotné řešení aplikace. Je zde popsán princip klíčových částí pro aplikaci jako například vytváření tabulek, graf či implementace kvízu.
The topic of this Masters degree thesis is Copyright aspects in creation of webpages. The reason for this topic was especially in general economic significance of webpages in this age, which is very often without appr...
详细信息
The topic of this Masters degree thesis is Copyright aspects in creation of webpages. The reason for this topic was especially in general economic significance of webpages in this age, which is very often without appropriate consequences in contractual practice of its creation. The author realizes that problematic of the webpages creation brings whole range of legal issues so he has to focus on creation of the one part of webpages to make beneficial academic and legal practice outcomes. Authors decision was to deal with content management system, which is in his opinion the most important part of the majority of current webpages. It was necessary to lay down an elementary terminology in the beginning of the thesis in order to comprehend all legal issues in essential technical context. Another reason is that some legal conclusions required also non-legal (technical) knowledge. Following chapter of the thesis analyzes legal nature of webpages in respect of technical context. The fourth chapter is core of the thesis and deals with analysis of content management systems legal nature as computer program and with its creation in copyright perspective. First of all this chapter provides analysis of the requirements that the computer programs have to fulfill in order to obtain the copyright protection. Moreover...
Limitations to copyright protection of computer programs The topic of this work is the limitations to copyright protection of computer programs. The first chapter explains the basic terms of computer science, which sh...
详细信息
Limitations to copyright protection of computer programs The topic of this work is the limitations to copyright protection of computer programs. The first chapter explains the basic terms of computer science, which shall help the reader to orientate in this issue. These are terms as computer program, software, source code and machine code and graphical user interface. The chapter draws attention to lack of the legal definition of a computer program in Czech law, the difference between software and computer program is explained and the individual categories of software are introduced herein. After this introductory chapter, the second chapter provides an overview of the basic sources of software law. First it presents the international agreements by which the Czech Republic is bound as the Berne Convention, the TRIPS agreement, the WCT agreement and Convention on Cybercrime. It also focuses on the regional area of the EU and analyzes the Information Directive and the Software Directive. Subsequently, the text deals in detail with the conditions of copyright protection in the Czech Republic and its specifics. Thus, the work provides a theoretical basis for the following chapters, which present more complex issues in this area. The third chapter deals with the general limitations to copyright, which...
Diplomová práce: Autorskoprávní ochrana počítačových programů Petr Kučera 2015 Resumé The goal of this thesis is to give readers insight into the copyright protection of computer pro...
详细信息
Diplomová práce: Autorskoprávní ochrana počítačových programů Petr Kučera 2015 Resumé The goal of this thesis is to give readers insight into the copyright protection of computer programs as enshrined within Czech legal system especially under the Act no. 121/2000 Sb. taking into account the European and the international law. The text is divided into six chapters, which gradually present the reader to the topic. Firstly, this thesis approaches and explains the basic technical terms used further in the text. After this introductory chapter, the thesis deals with the cornerstone of copyright protection of computer programs which is the computer program itself as the object of the copyright and the nature of its copyright protection. This chapter among other things aims to familiarize the reader with the issue, which elements of the computer program are subject to the copyright protection and which are not. The next chapter is devoted to the authorship of a computer program. Firstly the theoretical concepts are presented and then follows the analysis of the process of development of a computer program. The analysis looks into activities pursued during this process and analyses their nature in terms of the copyright protection. The goal of this analysis is to distinguish possible authors of the computer...
暂无评论