Readable Form

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 9411 Experts worldwide ranked by ideXlab platform

Manuel Trajtenberg - One of the best experts on this subject based on the ideXlab platform.

  • market value and patent citations a first look
    Development and Comp Systems, 2001
    Co-Authors: Bronwyn H. Hall, Adam B Jaffe, Manuel Trajtenberg
    Abstract:

    As patent data become more available in machine-Readable Form, an increasing number of researchers have begun to use measures based on patents and their citations as indicators of technological output and inFormation flow. This paper explores the economic meaning of these citation-based patent measures using the financial market valuation of the firms that own the patents. Using a new and comprehensive dataset containing over 4800 U. S. Manufacturing firms and their patenting activity for the past 30 years, we explore the contributions of R&D spending, patents, and citation-weighted patents to measures of Tobin's Q for the firms. We find that citation-weighted patent stocks are more highly correlated with market value than patent stocks themselves and that this fact is due mainly to the high valuation placed on firms that hold very highly cited patents. We also find that self-citations are worth about twice as much as ordinary citations, especially to smaller firms.

  • market value and patent citations a first look
    National Bureau of Economic Research, 2000
    Co-Authors: Bronwyn H. Hall, Manuel Trajtenberg, Adam B Jaffe
    Abstract:

    As patent data become more available in machine-Readable Form, an increasing number of researchers have begun to use measures based on patents and their citations as indicators of technological output and inFormation flow. This paper explores the economic meaning of these citation-based patent measures using the financial market valuation of the firms that own the patents. Using a new and comprehensive dataset containing over 4800 U. S. Manufacturing firms and their patenting activity for the past 30 years, we explore the contributions of R&D spending, patents, and citation-weighted patents to measures of Tobin's Q for the firms. We find that citation-weighted patent stocks are more highly correlated with market value than patent stocks themselves and that this fact is due mainly to the high valuation placed on firms that hold very highly cited patents.

Paul Mcnamee - One of the best experts on this subject based on the ideXlab platform.

David A Macpherson - One of the best experts on this subject based on the ideXlab platform.

  • Union Membership and Coverage Files from the Current Population Surveys: Note
    Industrial and Labor Relations Review, 1993
    Co-Authors: Barry T Hirsch, David A Macpherson
    Abstract:

    This note inForms readers about the availability of disaggregated annual unionization data compiled from the Current Population Surveys (CPS). Union membership, membership density, and contract coverage density are calculated for employed civilian wage and salary workers from the monthly CPS for January 1983 through December 1991. Workers are classified by demographic and labor market characteristics, industry, occupation, state, metropolitan area, and state-by-industry. The union membership and coverage files described in the note are available from the authors, without charge, in machine-Readable Form.

Adam B Jaffe - One of the best experts on this subject based on the ideXlab platform.

  • market value and patent citations a first look
    Development and Comp Systems, 2001
    Co-Authors: Bronwyn H. Hall, Adam B Jaffe, Manuel Trajtenberg
    Abstract:

    As patent data become more available in machine-Readable Form, an increasing number of researchers have begun to use measures based on patents and their citations as indicators of technological output and inFormation flow. This paper explores the economic meaning of these citation-based patent measures using the financial market valuation of the firms that own the patents. Using a new and comprehensive dataset containing over 4800 U. S. Manufacturing firms and their patenting activity for the past 30 years, we explore the contributions of R&D spending, patents, and citation-weighted patents to measures of Tobin's Q for the firms. We find that citation-weighted patent stocks are more highly correlated with market value than patent stocks themselves and that this fact is due mainly to the high valuation placed on firms that hold very highly cited patents. We also find that self-citations are worth about twice as much as ordinary citations, especially to smaller firms.

  • market value and patent citations a first look
    National Bureau of Economic Research, 2000
    Co-Authors: Bronwyn H. Hall, Manuel Trajtenberg, Adam B Jaffe
    Abstract:

    As patent data become more available in machine-Readable Form, an increasing number of researchers have begun to use measures based on patents and their citations as indicators of technological output and inFormation flow. This paper explores the economic meaning of these citation-based patent measures using the financial market valuation of the firms that own the patents. Using a new and comprehensive dataset containing over 4800 U. S. Manufacturing firms and their patenting activity for the past 30 years, we explore the contributions of R&D spending, patents, and citation-weighted patents to measures of Tobin's Q for the firms. We find that citation-weighted patent stocks are more highly correlated with market value than patent stocks themselves and that this fact is due mainly to the high valuation placed on firms that hold very highly cited patents.

Jawad Ahmad Dar - One of the best experts on this subject based on the ideXlab platform.

  • Modified Encryption Technique by Triple Substitution on Playfair Square Cipher Using 6 By 6 Matrix with Five Iteration Steps
    2015
    Co-Authors: Monika Arora, Anish Sandiliya, Jawad Ahmad Dar
    Abstract:

    An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures. The main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. This paper is a step toward developing an encryption system which can encrypt any text messages securely. Cryptography is an art and science of converting original message into no Readable Form. There are two techniques for converting data into no Readable Form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive inFormation can be shared through internet but this inFormation sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This Paper will present a perspective on combination of techniques like substitution and transposition with play fair square cipher to enhance

  • implementation of one time pad cipher with rail fence and simple columnar transposition cipher for achieving data security
    2014
    Co-Authors: Jawad Ahmad Dar, Sandeep Sharma
    Abstract:

    Cryptography is an art and science of converting original message into no Readable Form. There are two techniques for converting data into no Readable Form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive inFormation can be shared through internet but this inFormation sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This Paper will present a perspective on combination of techniques like Rail fence and colounar transposition with one time pad cipher. One Time Pad is an example of substitution method. In this paper I will presented how to improve security of One Time Pad Cipher to make it more secure and strong by Its implementation with Rail fence and columnar transposition cipher

  • humanizing the security of rail fence cipher using double transposition and substitution techniques
    2014
    Co-Authors: Jawad Ahmad Dar
    Abstract:

    Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. Achieving strong encryption, the hiding of data's meaning, also requires perceptive leaps that allow creative application of known or new methods. So cryptography is also an art. We can say now that Cryptography is the art of achieving security by encoding messages to make them non-Readable. Cryptography, as the most important aspect in the never ending evolving inFormation technology era, is being criticized in its aspect. InFormation outbreaks make users doubtful on relying on their own inFormation in current cryptosystems. Cryptography is used to maintain the secrecy and integrity of inFormation, whenever it is exposed to potential attacks. Cryptography comes from the Greek words for "secret writing". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two Techniques used for converting data into non-Readable Form. Rail Fence Cipher is an example of Transposition technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A double columnar transposition followed by a double substitution is applied on a Rail Fence cipher in order to make it a stronger and a more secure cipher.