Intellectual property term paper
Prepare and submit a term paper on Protecting Intellectual Property Rights in Software. Your paper should be a minimum of 1250 words in length.
The software market loses billions of dollars every year because of illegal copying. This has particularly been witnessed in Qatar where a report shows that the country has lost millions of dollars to pirates in the software industry (Banerjee 2003, p.98). The duplication is usually done in two different ways namely software duplication and reverse engineering. Through these two methods, pirates have found it easy to duplicate the original works of others and use the pirated software to enrich themselves at the expense of the original producers (Banerjee 2003, p.98). In fact, presently most software shops in Qatar are full of illegally acquired software. However, as earlier stated, this is a global problem that needs joint effort through legislation of policies to protect the intellectual property rights in the software industry.
However, there exist three different methods through which intellectual property rights in the software industry can be protected. These include patents, copyrights, and trademarks. All these methods protect software rights in different ways. A patent is one of the most common intellectual property rights protections. A patent is basically used to protect an ‘idea’, such as, how to produce given software. In this regard, Arai (2012, p.2) reveals that a patent can be used to protect software when it has an innovative idea aimed at enhancing productivity and efficiency. This is extremely important because it prevents the use of someone’s innovative ideas by malicious and unscrupulous pirates.
A patent usually provides this protection by granting exclusive monopoly the right to produce, sell, and utilize the invention for twenty years (Banerjee 2003, p.99). The report indicates that the exclusive monopoly for the production, use, and sale of the software is usually perceived as a reward for the effort and time spent in coming up with the new invention.
Write 1 page thesis on the topic dew point compared to observed atmospheric conditions. The dew point is the temperature at which dew will begin to drop out of the air. As an air mass cools it is able to hold less and less water. When the first moisture begins to drop out as dew, that temperature is the dew point.
When it is foggy or cloudy, the air has more moisture in it than in a clear or cloudless day. It is closer to being saturated with moisture at that temperature than otherwise. Therefore, to become completely saturated, the temperature would have to be decreased less. Thus, the dew point spread is lower. The closer the dew point is to actual temperature, the closer to saturation the air is. That makes sense.
When dew point spread is low, that means the air is nearly saturated with water vapor. You would not need to decrease the ambient temperature by much to put it into saturation. As such, when it is humid outside, the air is much closer to saturation than otherwise, and the dew point spread is low. That is the relationship you see when it is cloudy or foggy. The air has enough moisture at those temperatures to be visible, and it would not have to get much colder for it to drop from the air.
Graphenes thermal properties
write an article on Understanding Graphenes Thermal Properties. It needs to be at least 3000 words.
The ability of a material to conduct heat is usually based on the atomic structure of the material and the thermal properties’ knowledge. The material’s thermal properties may change when their system is put on the nanometer scale. The divergence of the thermal conductivity in two-dimensional crystals means that the crystal’s anharmonicity is not considered sufficient for the restoration of the thermal equilibrium. Hence, there is a need for one to consider either limiting the size of the system or introducing disorder to have the finite value of the thermal conductivity.
Availability of the few layers of graphene of high quality has led to the experimentation on the evolution of the thermal properties of the system’s dimensionality from 3D to 2D. The initial measurements of the thermal properties of graphene showed a thermal conductivity that is above the bulk limit of graphite
Keywords: graphene, phonon, thermal conductivity, scattering, the dispersion relation
Graphene, a recently 2-D developed allotrope of the nanocarbon, is known as a single atomic layer of graphite. The strongest bonds result from the in-plane covalent hexagonallysp2 between the carbon atoms, which are significantly more potent than the sp3diamond bonding. The planes of graphene on the graphite crystal are due to weak van der Waal forces between them. . The anisotropic nature of the crystals can be used to determine the thermal attributes of graphene.
The elimination of heat loss in electronic devices has been a problem encountered by various electronic industry researchers. Therefore, the industry has put more effort and resources in searching for better materials that dissipate less heat to improve the innovations of the next generations of integrated circuits (ICs) designs and 3-D electronic devices. Thermal properties issues have been encountered both in the photonic and optoelectronic devices.
Metals usually contain electrons that are delocalized which enable them to carry a charge from one point to another. Contrary, graphene electrons are arranged in a pi-bond model which allows interconnectivity with the neighboring atoms as they travel from one atom to another.
Renewable energy Homework
write an article on Renewable Energy. It needs to be at least 1750 words.
The source of solar energy is practically unlimited, and it is accessible and able to be used in many parts of the world. However, to plan and design proper energy conversion systems, solar energy experts must be equipped with appropriate knowledge of harvesting the energy. Trieb (2005), among others, did research on the aspect of solar irradiation, which is electromagnetic radiation from the sun’s rays. They found that outside the earth’s atmosphere, the solar irradiance on a surface perpendicular to the sun’s rays at a mean distance between the world and the sun practically remains unchanged throughout the year. According to Bailey et al. (1997), its value is now accepted to be 1.367W/m2. “This figure is estimated to be about 1,000W/m2 on the earth’s surface when the sky is clear”.
When the sun’s surface temperature is almost 6000K, the sun’s electromagnetic irradiance is spread over wavelengths ranging from 0.3 to 3µm. About 50% of solar irradiance is infrared, 40% is visible light, and 10% is ultraviolet radiation. However, it is challenging to evaluate solar irradiance at the earth’s surface due to its interface with the atmosphere, which contains aerosols, clouds, trace gases, and water vapor that are temporal and vary geographically.
Solar irradiance is typically reduced by almost 90% atmospheric conditions on cloudy days and about 40% on clear, dry days. According to Solomon et al. (2007), solar irradiance on the earth’s surface is 198W/m2 on average.
The two primary components of solar irradiance striking the earth’s surface are: beam solar irradiance, which comes unswervingly from the sun’s disk, and diffuse irradiance, emanating from the whole of the sky other than the sun’s disk. The sum of these two components makes the global solar irradiance.
Some of the factors that determine the magnitude of solar energy used are metrological conditions, demands for energy services, and land availability. The assessment methodologies and the technical potential do vary geographically. As described by Krewitt et al. (2009). The solar electricity technical potential for photovoltaic (PV) cells and the concentrating solar power (CSP) plant depends on the future development of technology improvements, land use exclusion, and solar irradiance availability.
Module vulnerabilities Assignment
Provide a 7 pages analysis while answering the following question: Trusted Platform Module Vulnerabilities. Prepare this assignment according to the guidelines found in the APA Style Guide
An abstract is required. In A hijacker’s guide to communication interfaces of the trusted platform module, Winter & Dietriech (2013) use already provided information as a methodology to study TPM. They use publicly available open-source Linux kernel contributions information to analyze the existing TPM interface. To access the internal registers of the I2C TIS TPM, the authors use the IC device address and the TPM specific internal register address. However, the problem is that in the current world, there is no approved and publicly available TCG standard that can be used for TPMs with I2C. This is an aspect that limits the findings of this article (Winter & Dietriech, 2013).
Varadharajan & Tupakula (2014) employ the attacker model as the methodology to study the vulnerabilities of TPM. The model uses the TPM attestation between the tenant virtual machine Attestation Provider (AP) and the customer Attestation Requestor (AR) before performing the transactions. To make it workable in the process of attestation, all hardware and software aspects in the trusted platform are measured using hash values when booting and measurements are stored securely in the prevention of modification. However, the problem with this attestation technique is it has the possibility of reducing the trust in the property attestation process and cause a scenario where AR cannot ascertain AP truly satisfies the properties that are presented to it. This shows the vulnerability of TPM (Varadharajan & Tupakula, 2014)
Parno (2012) uses techniques from secure multiparty computation, a protocol for verifiable computing to provide computational integrity for work done by an untrusted party. The protocol provides asymptotically optimal performance and needs a one-time preprocessing stage. In the methodology, O(|C|) is time, where C is the smallest known Boolean circuit computing F