567,990 research outputs found

    The Difficulties Which Oppose the Application of Texts of Robbery Crime Upon Computer Programs- الصعوبات التي تعترض تطبيق نصوص جريمة السرقة على برامج الحاسب الآلي

    Get PDF
    We started this article by an introduction regarding the importance of Computer, its parts, and the meaning of program and its sorts. In Chapter One we talked about the firmness of the utility of (money) on Computer programs, this chapter consists of three sections, in sec. 1 we talked about the attitudes of legislations regarding the firmness of the utility of (money) on Computer programs, these legislations are quite differed in their definition to robbery and its applications on the concept of money and things, we also detailed that computer has its own material and semantic identity. In sec. 2, we studied that opinion which do not regard computer programs to be money, we also disproved it. In sec. 3, we gave evidences that computer programs have money attribute, we also discussed the nature of computer programs, and the results which depend on mental imagination of this nature. In Ch. 2, we discussed to what extant computer programs can be submitted to embezzlement doing, in sec.1, we presented the meaning of embezzlement and the opinions on it, particularly the traditional and modern opinions. In sec. 2, we discussed the computer programs under the concept of embezzlement: How non-material things can be submitted to embezzlement, the legislations’ attitude from stealing electricity, the attitude of Jurisprudence and judgment of this matter, and if we can use the same attitude of electricity to be applied to computer programs. In sec. 3, we discussed the problems of computer programs embezzlement.

    Four Reasons and a Paradox: The Manifest Superiority of Copyright over Sui Generis Protection of Computer Software

    Get PDF
    The Manifesto Concerning the Legal Protection of Computer Programs offers an extensive and challenging critique of current intellectual property protection of software. The authors argue strongly that the law should focus on the value of the know-how embodied in programs and the importance of protecting it, rather than on the particular means which might be used to appropriate it. The authors seek to compel reconceptualization of the place of computer programs, and of software authors\u27 creativity, within the domain of intellectual property. However, their brief for change manifests several flaws. Paradoxically, it comes at once both too soon and too late. In addition, its expectation for the adoption of its proposed alternatives is too optimistic, while its perception of the ability of copyright law to afford appropriate protection for computer programs is too pessimistic. The Manifesto\u27s objectives and the moment chosen for their declaration are perplexing, if not quixotic. As the authors on several occasions acknowledge, the computer software industry is currently thriving. Moreover, copyright protection for computer programs has now become the worldwide norm. Not only the U.S., but the E.C. and all members of the General Agreement on Tariffs and Trade have determined to protect computer programs as literary works, within the meaning of the dominant international copyright convention. Even supposing that a specter of over- and underprotection haunts the software industry, the alternative intellectual property regimes the authors evoke are likely neither to achieve domestic enactment, nor to secure broad and effective international agreement. Finally, the Manifesto\u27s essential premise, that copyright law ill befits computer programs because the law does not protect works that behave, betrays too cramped an appreciation of the subject matter and scope of copyright protection. Copyright does, to some extent, protect behavior, whether of computer programs or of other works of authorship. The primary problem is to delineate how much behavior copyright will cover; but that problem haunts all of copyright. If the specter the Manifesto summons is not entirely spurious, neither is it purely computer-specific

    The Utility of Electroencephalography for User Input

    Get PDF
    The goal of this paper is to introduce the use of noninvasive brain-computer interfaces to prospective computer scientists. Electroencephalography is explained starting with how a user’s brain waves are measured and ending with how the data is parsed to software programs. To further expand on the ability to implement electroencephalography into software code, and example of a simple game is given. This game is an endless runner, meaning that it has no end and stops once the player’s game piece collides with an object. It is coded in the Python computer language

    Reverse Software Engineering of Concurrent Real Time Programs

    Get PDF
    This paper presents an algorithm for translating concurrent procedural language programs into nonprocedural, mathematical language programs, called specifications. The goal is to achieve reuse of old existing programs in developing new systems, through having them explained automatically and facilitating their modification. Mathematical languages are widely believed to be superior to procedural languages. Unlike procedural languages, mathematical languages do not have side effects and are oblivious to computer concepts. Thus mathematical languages free the user of having to think like a computer when developing or modifying a program. Its mathematical semantics make proving software correctness easier and improves software reliability. The specification can then be used to generate automatically highly efficient procedural language programs for computer system. The translation algorithm centers around the difference in the meaning of variables in procedural and mathematical languages. In a procedural language a variable may be assigned many values. In a mathematical language, however, a variable may be assigned only one value. The translation algorithm focuses on renaming variables in a procedural language program so that each variable is assigned only one value. This paper also presents a methodology for proving specification correctness. The idea is based on generating scenarios that define values of variable for an applicable situation and using this to prove the specification satisfy a given requirement. This is contrasted with use of temporal logic for proving correctness of concurrent programs

    Research in solar physics: Some techniques for analyzing data from the ultraviolet spectrometer and polarimeter

    Get PDF
    Useful information for certain aspects of the analysis of data obtained by the Ultraviolet Spectrometer and Polarimeter (UVSP) on the Solar Maximum Mission (SMM) are contained. The meaning of the UVSPCO-ordinate system and the SMM roll, pitch, and yaw are described and the process for overlaying UVSP images is explained. The various computer programs that calculate the line of sight component of the SMM spacecraft velocity from the spacecraft to the Sun is described. The spacecraft velocity is used to correct or interpret the signal observed in USVP dopplergrams. A method of using the spacecraft velocity to calibrate UVSP dopplergrams and magnetograms, i.e., determine the width of the observed emission line is applied. The UVSP polarization analysis procedures are described and the expressions for the statistical uncertainties in various quantities obtained from UVSP measurements are given

    El proceso de definir en matemáticas. Un caso : el triángulo

    Get PDF
    Departing from two protocols that show the difficulties presented to define the triangle in primary school pupils, and through a theoretical framework based on Orton (1990), Herskhovits (1990), Tall and Vinner (1981) and Van Hiele (1981) to establish the meaning that the definition has in Mathematics, we accomplish a summary of definitions of the concept of triangle in various original texts, as well as in material and computer programs. A short analysis of the definitions presented is accomplished and we offer certain theoretical evaluations to justify the answers given by the students
    corecore