Royalty Rate of Business Method Patents for Large Scale Software Applications

Author(s):  
S. Kaneda ◽  
T. Senbo ◽  
K. Fujimoto
Author(s):  
Michael Edmund O'Callaghan ◽  
Jim Buckley ◽  
Brian Fitzgerald ◽  
Kevin Johnson ◽  
John Laffey ◽  
...  

Abstract Background: Contact tracing remains a critical part of controlling the spread of COVID-19. Many countries have developed novel software applications (Apps) in an effort to augment traditional contact tracing methods. Aim: To conduct a national survey of the Irish population to examine barriers and levers to the use of a contact tracing App.Methods: Adult participants were invited to respond via an online survey weblink sent via email and messaging Apps and posted on our university website and on popular social media platforms. Results: A total of 8,088 responses were received, with all 26 counties of the Republic of Ireland represented. 54% of respondents said they would definitely download a contact tracing App, while 30% said they would probably download a contact tracing App. 95% of respondents identified at least one reason for them to download the App, with the most common reasons being the potential for the App to help family members and friends and a sense of responsibility to the wider community. 59% identified at least one reason not to download the App, with the most common reasons being fear that technology companies or the government might use the App technology for greater surveillance after the pandemic.Conclusion: Irish citizens surveyed express high levels of willingness to download a public health-backed App to augment contact tracing. Concerns raised regarding privacy and data security will be critical if the App is to achieve the large-scale adoption and ongoing use required for its effective operation.


2013 ◽  
Vol 8-9 ◽  
pp. 545-552 ◽  
Author(s):  
Septimiu Crisan ◽  
Ioan Gavril Tarnovan

Multi-touch systems are redefining the natural user interface paradigm and their applications can be found ranging from mobile phones, tablets and screens to the control of industrial facilities. While the concepts of multiple touch sensing are not new, there are still large unexplored areas regarding optimization of the user experience for various industrial or medical applications. Along with the ability to detect and process simultaneous touches and gestures, large scale multi-touch devices offer collaborative work along with user-selective content management systems features rarely used in dedicated medical visualization or sensing multi-touch software applications. Based on previous research concerning multi-touch systems and their potential usefulness in the medical field, this paper describes the optimization process of a multi-touch sensing device for biomedical applications. Three important layers of a multi-touch device were chosen as candidates for optimization: sensing, data manipulation and visualization. The results were applied to a prototype optical touch system developed for multi-user/multi-touch environments and several hardware and software modifications were designed and implemented. Since the goal of this research was to explore ways to enhance the user experience in multi-touch applications the conclusions derived from this paper can be extended to other domains where concurrent visualization and processing of information are vital components.


Author(s):  
Muthu Ramachandran ◽  
Zaigham Mahmood ◽  
Pethuru Raj

Connected Government suggests provisioning of a government's services to its citizens using the Web and communications technologies employing the latest software development paradigms and related methodologies. This also requires appropriate integration of, and interaction between, software applications and e-services developed by various government departments as well as the other influencing sectors of the society such as commerce. This is especially so as the connected government (c-government) applications require open, flexible, interoperable, collaborative, and integrated architecture to provide services for the emerging technologies such as mobile, cloud, and big data. This, in turn, suggests a robust and standard mechanism to develop such applications and services. In this context, Service-Oriented Architecture (SOA) is an attractive approach to adopt. SOA has already been proven successful in providing such a framework for delivering software applications as services with flexibility and multi-platform and multi-channel integration that are necessarily required for c-government application offerings. This chapter provides a discussion of the SOA paradigm and the associated citizen and administrative requirements. The chapter also presents a service-oriented architectural framework based on a set of evaluated application characteristics that support newer technologies. A number of service-component models have also been proposed that provide required customisation, reuse, flexibility, and extensibility. In the context of the proposed overall service-oriented architecture, a large-scale sub-system that the authors term “e-Taxservice” has been used as a case study. The study has a service design that has been validated against a set of key service quality attributes.


Author(s):  
K. V. Ramana ◽  
K. Anantha Lakshmi ◽  
D. Anusha

An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the design of secure e-tendering systems. Key issues are the privacy protection and verifiability. A new e-tendering architecture, based on Identity Based Encryption from bilinear pairings is proposed which may be suitable for secure large scale operations. A Encryption is a scheme that provides private and authenticated delivery of message between tenderer and tenderee. This is done in a more efficient manner than a straight forward composition of an encryption followed by signature scheme. An Identity based Cryptosystem is one in which the public key may be as String (E-mail Address, PAN No., etc). We propose Identity based encryption for secure e-tendering system that satisfies all the requirements an ideal atomic system requires. The elegant design makes it efficient both in computation and in communication. Secure e-Tendering System is carrying out of the tendering process using electronic means, such as the internet and specialist e-tendering software applications with a secured scheme.


Mathematics ◽  
2021 ◽  
Vol 9 (14) ◽  
pp. 1685
Author(s):  
Julian Miller ◽  
Lukas Trümper ◽  
Christian Terboven ◽  
Matthias S. Müller

With the quickly evolving hardware landscape of high-performance computing (HPC) and its increasing specialization, the implementation of efficient software applications becomes more challenging. This is especially prevalent for domain scientists and may hinder the advances in large-scale simulation software. One idea to overcome these challenges is through software abstraction. We present a parallel algorithm model that allows for global optimization of their synchronization and dataflow and optimal mapping to complex and heterogeneous architectures. The presented model strictly separates the structure of an algorithm from its executed functions. It utilizes a hierarchical decomposition of parallel design patterns as well-established building blocks for algorithmic structures and captures them in an abstract pattern tree (APT). A data-centric flow graph is constructed based on the APT, which acts as an intermediate representation for rich and automated structural transformations. We demonstrate the applicability of this model to three representative algorithms and show runtime speedups between 1.83 and 2.45 on a typical heterogeneous CPU/GPU architecture.


1999 ◽  
Vol 173 ◽  
pp. 243-248
Author(s):  
D. Kubáček ◽  
A. Galád ◽  
A. Pravda

AbstractUnusual short-period comet 29P/Schwassmann-Wachmann 1 inspired many observers to explain its unpredictable outbursts. In this paper large scale structures and features from the inner part of the coma in time periods around outbursts are studied. CCD images were taken at Whipple Observatory, Mt. Hopkins, in 1989 and at Astronomical Observatory, Modra, from 1995 to 1998. Photographic plates of the comet were taken at Harvard College Observatory, Oak Ridge, from 1974 to 1982. The latter were digitized at first to apply the same techniques of image processing for optimizing the visibility of features in the coma during outbursts. Outbursts and coma structures show various shapes.


1994 ◽  
Vol 144 ◽  
pp. 29-33
Author(s):  
P. Ambrož

AbstractThe large-scale coronal structures observed during the sporadically visible solar eclipses were compared with the numerically extrapolated field-line structures of coronal magnetic field. A characteristic relationship between the observed structures of coronal plasma and the magnetic field line configurations was determined. The long-term evolution of large scale coronal structures inferred from photospheric magnetic observations in the course of 11- and 22-year solar cycles is described.Some known parameters, such as the source surface radius, or coronal rotation rate are discussed and actually interpreted. A relation between the large-scale photospheric magnetic field evolution and the coronal structure rearrangement is demonstrated.


Sign in / Sign up

Export Citation Format

Share Document