The pH of any polyprotic weak and strong acid (or base) can be calculated employing the logarithmic concentration diagram. The aim of this text is to introduce a joint approach of algebraic, as used in textbook, and g...
详细信息
The pH of any polyprotic weak and strong acid (or base) can be calculated employing the logarithmic concentration diagram. The aim of this text is to introduce a joint approach of algebraic, as used in textbook, and graphical method. The logarithmic diagrams provide an easy insight into the acid- base systems. The mathematical complexities are overtaken using a Computer Algebra System program, which is also exploited to draw the diagrams. Examples of the use of the program are given together with the code employed.
Software piracy is the greatest threats to soft-are industry, which will bring serious damages to the interests of software developers or providers. As a prevention technique, software watermarking is a new research a...
详细信息
ISBN:
(纸本)9780769534329
Software piracy is the greatest threats to soft-are industry, which will bring serious damages to the interests of software developers or providers. As a prevention technique, software watermarking is a new research area that aims at providing copyright protection for commercial software. This article proposes a hash function based dynamic software watermarking algorithm. By constructing appropriate hash function, watermark piece is embedded into it. Given the satisfied parameters, hash function will calculate out the corresponding watermark. To strengthen the logical relation with the program itself some of the program's constants are replaced by specific level hash function, tampering of watermark will lead to the application's undefined behavior. Distinguishing from other watermarking techniques, this kind of watermark is not hidden inside the program code or its runtime state, but is calculated out dynamically. Analysis shows that this algorithm will be able to withstand a variety form of transformation attacks.
A program code widely applied at RHIC and LHC for calculations of geometrical properties of nucleus-nucleus interactions is adapted for NICA/MPD and CBM energies. A parameterization of pp elastic scattering amplitude ...
详细信息
A program code widely applied at RHIC and LHC for calculations of geometrical properties of nucleus-nucleus interactions is adapted for NICA/MPD and CBM energies. A parameterization of pp elastic scattering amplitude earlier proposed by the authors and valid at root s >= 3 GeV is used for a setting of the nucleon-nucleon collision profile. An approach well known in physics of low and intermediate energies is used for a determination of nuclear parameters. The code is enlarged by a possibility to account for the Gribov inelastic screening.
Testability analysis method for software and hardware products, which represented by system level as a composition of control and operational automata is offered. Methodology of bottlenecks selection for assertions im...
详细信息
暂无评论