RM Ipr Book Imc Chandarki
RM Ipr Book Imc Chandarki
RM Ipr Book Imc Chandarki
by
I M CHANDARKI
Sinhgad Institutes
Solapur
2021
SPSPM SINHGAD PUBLICATIONS
N B Navale Sinhgad College of Engineering and Center for Research and
Technology Development, Solapur(MS)INDIA, 2020–2021
1
RESEARCH METHODOLOGY AND IPR
2021
1 Introduction 1
1.1 Defining Research . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Management Research . . . . . . . . . . . . . . . . . . . 1
1.1.2 Reporting type of research . . . . . . . . . . . . . . . . . 2
1.1.3 Descriptive Research . . . . . . . . . . . . . . . . . . . . 2
1.1.4 Explanatory Research . . . . . . . . . . . . . . . . . . . 2
1.1.5 Predictive Research . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scientific Enquiry . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.1 Process of Scientific Enquiry . . . . . . . . . . . . . . . . 3
1.3 Hypothesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4 Scientific Method . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4.1 Formal Science and Empirical Science . . . . . . . . . . . 5
1.4.2 Logical Calculus . . . . . . . . . . . . . . . . . . . . . . . 5
1.4.3 Logic of Scientific Methods . . . . . . . . . . . . . . . . . 6
1.4.4 Deductive Logic . . . . . . . . . . . . . . . . . . . . . . . 6
1.4.5 Inductive Logic . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 Types of research . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5.1 Descriptive versus analytical: . . . . . . . . . . . . . . . 7
1.5.2 Applied versus fundamental: . . . . . . . . . . . . . . . 8
1.5.3 Quantitative versus qualitative: . . . . . . . . . . . . . . 8
1.5.4 Conceptual versus empirical: . . . . . . . . . . . . . . . . 9
1.5.5 Other types of research: . . . . . . . . . . . . . . . . . . 9
1.6 Research Process and steps . . . . . . . . . . . . . . . . . . . . . 10
1.6.1 Research planning (design): . . . . . . . . . . . . . . . . 11
1.6.2 Reporting results: . . . . . . . . . . . . . . . . . . . . . . 12
1.7 Research process/Steps: . . . . . . . . . . . . . . . . . . . . . . 13
1.8 Research Proposals . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.1 Types of Research Proposals . . . . . . . . . . . . . . . 15
i
1.8.2 Research Proposals contents . . . . . . . . . . . . . . . . 16
1.8.3 Literature Review . . . . . . . . . . . . . . . . . . . . . 17
1.8.4 Research Proposals sponsor agent’s requirements . . . . 18
1.9 Some Implicit Considerations . . . . . . . . . . . . . . . . . . . 18
1.9.1 Ethical Aspects . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.2 Training Aspects . . . . . . . . . . . . . . . . . . . . . . 19
1.9.3 Cooperation . . . . . . . . . . . . . . . . . . . . . . . . 19
1.9.4 Legal aspects . . . . . . . . . . . . . . . . . . . . . . . . 20
2 Research Design 21
2.1 Research Design: Meaning . . . . . . . . . . . . . . . . . . . . . 21
2.2 Research Design: Need . . . . . . . . . . . . . . . . . . . . . . . 21
2.3 Concepts related Research Design . . . . . . . . . . . . . . . . 22
2.3.1 Dependent and independent variables: . . . . . . . . . . 22
2.3.2 Extraneous variables: . . . . . . . . . . . . . . . . . . . . 22
2.3.3 Confounded relationship: . . . . . . . . . . . . . . . . . 23
2.3.4 Research hypothesis: . . . . . . . . . . . . . . . . . . . . 23
2.3.5 Experimental and non-experimental hypothesis testing
research: . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.3.6 Experimental and control groups: . . . . . . . . . . . . . 24
2.3.7 Treatments: . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3.8 Experiment: . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.9 Experimental unit(s): . . . . . . . . . . . . . . . . . . . . 25
2.4 categories Literature Survey and Review . . . . . . . . . . . . . 25
2.5 Dimensions and issues of Research Design . . . . . . . . . . . . 26
2.6 Research Design Process – Selection of type of research . . . . . 27
2.6.1 Exploratory research design: . . . . . . . . . . . . . . . 27
2.6.2 Descriptive and diagnostic research design: . . . . . . . . 27
2.6.3 Hypothesis-Testing research design: . . . . . . . . . . . 28
2.7 Measurement and measurement techniques . . . . . . . . . . . 28
2.7.1 Techniques of Measurements . . . . . . . . . . . . . . . . 29
2.7.2 Errors of Measurement . . . . . . . . . . . . . . . . . . . 29
2.8 Selection of Sample . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.9 Selection of Data Collection Procedures . . . . . . . . . . . . . 31
2.9.1 Secondary Data . . . . . . . . . . . . . . . . . . . . . . . 31
2.9.2 Primary data . . . . . . . . . . . . . . . . . . . . . . . . 31
2.10 Selection of Methods of Analysis . . . . . . . . . . . . . . . . . . 32
ii
2.11 Errors in Research . . . . . . . . . . . . . . . . . . . . . . . . . 32
3 Research Problem 34
3.0.1 Generation of Hypotheses . . . . . . . . . . . . . . . . . 34
3.0.2 Formulation of The Problem . . . . . . . . . . . . . . . . 35
3.1 Problem Solving . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.2 Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.2.1 simple and complex . . . . . . . . . . . . . . . . . . . . . 38
3.2.2 well-defined and ill-defined . . . . . . . . . . . . . . . . . 38
3.2.3 Tame and Wicked . . . . . . . . . . . . . . . . . . . . . . 39
3.3 Process and Approaches . . . . . . . . . . . . . . . . . . . . . . 39
3.3.1 Logical . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.3.2 Soft System . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.3.3 Creative . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.4 Creative problem solving process . . . . . . . . . . . . . . . . . 42
3.5 Development of Creativity . . . . . . . . . . . . . . . . . . . . . 42
3.6 Group Problem Solving Techniques for Idea Generation . . . . 43
3.7 Brain storming . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.8 Delphi Method . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
iii
4.6 International Scenario: International cooperation on Intellectual
Property . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.7 Procedure for grants of patents . . . . . . . . . . . . . . . . . . 55
4.8 Patenting under PCT . . . . . . . . . . . . . . . . . . . . . . . 57
4.8.1 Broad Provisions of the Patent Cooperation Treaty . . . 58
4.8.2 Foreign Patent Protection . . . . . . . . . . . . . . . . . 58
4.8.3 Broad Provisions of the Patent Cooperation Treaty . . 60
5 Patent Rights 61
5.1 Scope of Patent Rights . . . . . . . . . . . . . . . . . . . . . . . 61
5.2 Licensing and transfer of technology . . . . . . . . . . . . . . . . 62
5.2.1 What is Technology Transfer? . . . . . . . . . . . . . . . 62
5.2.2 Why Transfer Technology? . . . . . . . . . . . . . . . . . 62
5.2.3 How Do You Transfer Technology? . . . . . . . . . . . . 64
5.2.4 Private technology transfer . . . . . . . . . . . . . . . . . 67
5.2.5 Technology Transfer from Government to Industry . . . 69
5.2.6 University-industry technology transfer . . . . . . . . . . 70
5.3 Patent information and databases . . . . . . . . . . . . . . . . . 71
5.3.1 Patent Searching Process The need for a search: . . . . . 72
5.3.2 obviousness . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.3.3 Searching tools: . . . . . . . . . . . . . . . . . . . . . . . 73
5.4 Geographical Indications . . . . . . . . . . . . . . . . . . . . . 74
5.4.1 What rights does a geographical indication provide? . . . 74
5.4.2 For what type of products can geographical indications
be used? . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
iv
6.4.3 American Investors Protection Act of 1999[AIPA]: . . . . 80
6.4.4 Introduction of International Patent protection: . . . . . 80
6.5 Administration of Patent System . . . . . . . . . . . . . . . . . 81
6.5.1 Brief history . . . . . . . . . . . . . . . . . . . . . . . . . 82
6.5.2 Legal and administrative . . . . . . . . . . . . . . . . . . 83
6.6 IPR of Biological Systems . . . . . . . . . . . . . . . . . . . . . 85
6.6.1 Importance of traditional knowledge . . . . . . . . . . . 85
6.6.2 India and traditional knowledge . . . . . . . . . . . . . . 85
6.6.3 Biopiracy . . . . . . . . . . . . . . . . . . . . . . . . . . 87
6.7 Patent, Copyright, and Trade Secret Protection in Computer
Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
v
Chapter 1
Introduction
1
not be scientific but would be useful in decision-making. However, more often,
a hired outside specialist (management scientist or consultant), in collabora-
tion with the manager, carries out the research. Research in such cases is more
scientific and also gives practically useful results. The manager tends to check
on the objectives, methods, and the terms of research to make it more useful
to the firm, and within this framework the scientist makes a scientific enquiry
to derive valid results. In either of these cases, the research process follows the
same general steps.
2
1.2 Scientific Enquiry
It is a mental activity both speculative( based on conjecture rather than knowl-
edge.) and critical in which critical (analytical) activity dominates.
Science is at once a body of knowledge and the process of generating that knowl-
edge. Science as a process is one of enquiry. It is different from common sense
enquiry in that it is controlled (Ackoff, 1962).
Science is “. . . trained and organised common sense” (Huxley, 1953). Further,
scientific enquiry has goals of improving the method of conducting the enquiry
itself, of answering questions, and of solving problems.
Science, in the main, aims at developing more and more true patterns of re-
ality gradually. It starts with simple and partial models representing different
aspects of reality—first its components, then the relationships among them. It
then adds on more and more territories and features.
Another major objective of science is to sharpen and improve its own method-
ology and techniques for gaining knowledge of reality and of predicting it. This
is referred to as metascience by Bunge (1967).
3
necessary. There is, however, a dominance of analytical activity in scientific en-
quiry and method. Analysis is concerned with the language in which thinking
is expressed, and can be done in three ways, namely, through the method of
redefinition, the method of explication, and the method of illustration in use
(Caws, 1965)
1.3 Hypothesis
It is the declarative sentence or proposition in which at least one empirical
generalization follows and states the existence of the size, form or distribution
of some variables. The relation between a fact and its cause is expressed as
hypothesis, which must be capable of being experimentally verified and must
have a definite practical consequence.
Based on enquiry or insight or a limited observation of phenomena, a scientist
may make a proposition. A proposition is the meaning of a declarative sentence
used for the assertion of some relationship between concepts.
If a series of observations are made on objects O, in order to determine whether
or not the objects in this class exhibit property P, and if in each case of O and
so on, that is, O1, O2, O3, and so on, the property P is observed, the scientist
moves from a declarative statement with respect to each observation of O to a
universal statement about class P, like all Os are P. Such a jump is known as
generalisation.
Hypothesis is any declarative sentence in which at least one empirical gener-
alisation follows but whose contradiction does not take the form of a protocol
sentence. Hypothesis is a proposition that typically states the existence, size,
form, or distribution of some variable (Emory 1976). In this form, a proposi-
tion can be tested and becomes a hypothesis. If a declarative sentence whose
consequences, when tested empirically, result in reality not leading to them
it becomes necessary to reject it. What is scientific is, therefore, relative to
the status of knowledge at the time of making the hypothesis. Hypotheses are
rejected not because they are false but because they are irrelevant. Usually,
generalisations that are not confirmed are called hypotheses. They are only
tentative, need to be confirmed, and are only just ‘working hypotheses’. Gen-
eralisations emerge but hypotheses have to be invented (Caws, 1965). In any
case, a hypothesis that is confirmed indicates confidence in the repeatability of
observations.
4
1.4 Scientific Method
Scientific method is one that uses hypothetico-deductive method for developing
laws and theories, evoking hypotheses inductively and testing them deductively.
5
1.4.3 Logic of Scientific Methods
A satisfactory scientific explanation is one that logically classifies the relation-
ships between facts and not one that is merely psychologically acceptable. Logic
has two values, like simple switches, connoting either a Yes or a No. In a logical
system, deriving logical truth from one sentence to another is called inference.
In logical inference there is a need to start with a true sentence. The relation-
ship, which can be inferred in such a process, is called implication.
If the inferences in a logical system are certainties, they are called demonstra-
tive, and if they are probable, they are called non-demonstrative. Demonstra-
tive inferences are deductive—drawing particular conclusions (true inferences)
from general principles. The set of sentences deriving conclusions (last sen-
tences) from other sentences is called an argument. The set of sentences, rea-
sons, or premises must be true for the conclusion to be true, then the argument
is valid. Propositions are true or false; reasoning or argument is valid or in-
valid. Deductive logic is the study of validity and not of truth. The following
examples illustrate this.
If the inferences in a logical system are certainties, they are called demonstra-
tive, and if they are probable, they are called non-demonstrative. Demonstra-
tive inferences are deductive—drawing particular conclusions (true inferences)
from general principles. The set of sentences deriving conclusions (last sen-
tences) from other sentences is called an argument. The set of sentences, rea-
sons, or premises must be true for the conclusion to be true, then the argument
is valid. Propositions are true or false; reasoning or argument is valid or invalid.
Deductive logic is the study of validity and not of truth.
6
1.4.5 Inductive Logic
There is one logic exercise we do nearly every day, though we’re scarcely aware
of it. We take tiny things we’ve seen or read and draw general principles from
them—an act known as inductive reasoning.
This form of reasoning plays an important role in writing, too. But there’s a
big gap between a strong inductive argument and a weak one.
Francis Bacon introduced the use of inductive logic. In induction, empirical ev-
idence or fact is the starting point. Inference is drawn from the evidence in the
form of conclusions, which explain the evidence or facts. An inductive conclu-
sion may be one of the many possible explanations of the fact and is, therefore,
only tentative. It may also explain facts other than those observed as evidence.
Therefore, it is usual to refer to the relation between evidence and inductive
conclusion as supporting, that is, the evidence supports the conclusion. When
contradictory new evidence is observed, the conclusion has to be abandoned.
7
them to make a critical evaluation of the subject.
8
motivate human beings to behave in a certain manner, besides contributing to
an understanding of what makes individuals like or dislike a particular thing.
However, it is worth noting that
conducting qualitative research in practice is considerably a difficult task. Hence,
while undertaking such research, seeking guidance from experienced expert re-
searchers isimportant.
9
simulation research, besides being diagnostic or clinical in nature. Under such
research, in-depth approaches or case study method may be employed to analyse
the basic causal relations. These studies usually undertake a detailed in-depth
analysis of the causes of certain events of interest, and use very small samples
and sharp data collection methods. The research may also be explanatory
in nature. Formalized research studies consist of substantial structure and
specific hypotheses to be verified. As regards to historical research, sources like
historical documents, remains, etc. Are utilized to study past events or ideas.
It also includes philosophy of persons and groups of the past or any remote
point of time.
Research has also been classified into decision-oriented and conclusion-oriented
categories. The decision-oriented research is always carried out as per the need
of a decision maker and hence,the researcher has no freedom to conduct the
research according to his/her own desires. On the other hand, in the case of
Conclusion-oriented research, the researcher is free to choose the problem, re-
design the enquiry as it progresses and even change conceptualization as he/she
wishes. An operation research is a kind of decision- oriented research, where in
scientific method is used in providing the departments, a quantitative basis for
decision-making with respect to the activities under their purview.
In problem identification
(a) the problem faced in practice by a manager or organisation is translated
into a research problem or examined for application of standard methods of
10
solution available, or
(b) inadequate treatment of a problem is improved, or (c) new problem ideas
are creatively generated.
Theoretical framework: Variables required for solving the problem are identi-
fied, partly from literature and partly by the researcher for defining the problem.
The problem is related to the existing research—theories, constructs, and hy-
pothesis in a theoretical framework that will ensure step-by-step progress of
knowledge (as in pure research) or a strong basis for the current problem solv-
ing (as in applied research).
Tentative hypothes/models development: The problem definitions/propositions
are converted into hypotheses or models, which are in testable form to ascertain
whether they can be verified statistically or are feasible for solution procedures.
(Hypothesis and theoretical framework are termed research problem formula-
tion.)
11
Figure 1.1: Research Process
Execution of research study: Data is collected as per the sampling plan using
the instrument developed as per the specification in the design phase.
Data preparation and analysis: The raw data collected in the earlier step is
converted into data usable for research by carrying out coding, transformation,
and performing descriptive analysis, as required. This converted data is used
for verifying hypothesis, deriving significant relationships, or testing models, as
required, and inferences are drawn from the study and results are analysed.
12
1.7 Research process/Steps:
Research process consists of a series of steps or actions required for effectively
conducting research. The following are the steps that provide useful procedural
guidelines regarding the conduct of research:
(1) Formulating the research problem;
(2) Extensive literature survey;
(3) Developing hypothesis;
(4) Preparing the research design;
(5) Determining sample design;
(6) Collecting data;
(7) Execution of the project;
(8) Analysis of data;
(9) Hypothesis testing;
(10) Generalization and interpretation,and
(11) Preparation of the reporter presentation of the results.
In other words, it involves the formal write-up of conclusions.
13
Figure 1.2: Research Proposal in Research flow
next step of the process is research planning, comprising research design (the
technical planning of the details of the research process) and the managerial
portion of planning to obtain resources, in terms of outside help, equipment,
scientific manpower, time and funds. Every research requires resources, the
allocation of which must be planned in advance. (iii) After obtaining approval
of research proposal and resources, research activities can be initiated and ex-
ecuted as per the design and within the framework of control by the funding
agency. The form and content of the research proposals vary depending upon
the researcher and his organisation, the client’s organisations, and the support-
ing agency. The research proposal serves as a means of communication between
the researcher and the research supporter, and must necessarily be drawn up
with care and clarity.
In this section, the purpose, content, types, and format of research propos-
als will be presented. Needless to say, the details for a typical proposal will
be presented with qualifications wherever necessary and illustrations will be
provided.
14
6. Whether help of other organisations will be needed
7. Duration, facilities, and funds required to carry out the research
8. Credentials of the proposers
A research proposal is critical, for it makes the researcher think of the possible
roadblocks on the way and alternate bypasses to be taken in such cases. Another
very important use of a research proposal is that it helps the decision maker and
the researcher to arrive at agreements on the problem with regard to objectives,
information required, and the methods of analysis.
15
External Research Proposals
This item states the purpose of the investigation. It could be to test a hypothe-
sis, as in a causal study, or answer a research question, as in descriptive areas, or
obtain a solution to a problem. This should emerge naturally from the problem
statement and constitute achievable goals of the research. The remaining items
of the proposal should be consistent with the research objective, for example,
data obtained, its analysis, and conclusions.
Research Design
This is the technical portion of the proposal indicating the phases/steps of the
research action to be taken. Such tasks as sample size determination, sample
selection, data sources, and method of data collection are stated. Also, the
design of the instrument, procedures for data collection, giving possible reasons
for rejecting alternate approaches, whenever they do exist, are also given. For
example, in a causal study, why a descriptive field study was used instead of
experimentation will be elucidated.
16
Time Frame
Time table of the major phases of the research should be included in this, for ex-
ample, literature review, pilot study, finalisation of questionnaire, (main study)
data collection, data preparation, report generation where the project is large
and complex, a summary CPM/PERT network showing the interrelationship of
the phases, and project duration may have to be provided, particularly when the
sponsoring organisation demands it. There are a few items required only by in-
dustry or sponsoring agents but not required in academic research like master’s
thesis/doctoral thesis. These are generally the credentials of the researcher, the
budget, details of project management, and an executive summary.
Budget
In all cases of internal and external proposals, except very short ones, a maxi-
mum estimated cost of the research in some form of budget is a must.
17
sary of special terms specific to a research area, and instrument details also
have to be provided.
18
should undergo any harm, physical or psychological, while (and after) partic-
ipating in an experiment. If there are risks involved, they should be clearly
explained to the subject and a written consent should be obtained. Secret ob-
servation of an individual (if involved in the experiment or study) should not
result in anyway in jeopardising the professional career of the individual or tar-
nishing his/her personal image
Confidentiality: Any information obtained from the individual, group, or or-
ganisation should be kept strictly confidential and be merged in the aggregated
disclosed information. If such individual information is necessary to be dis-
closed in the research, it should be disclosed only with the written consent of
the individual unit. Personal data should be revealed only with prior written
consent.
Anonymity: Any sensitive information disclosed in a research study should
not lead to the identity of the individual/group/organisation. Anonymity of
these units should be strictly maintained.
1.9.3 Cooperation
Any research project involves the participation, in some way, of co-investigators,
managers, and other employees and administration of an organisation, and the
project assistants. Cooperation of all these people is vital to the success of
19
a research study. Openness about the research study, data needed, assured
confidentiality, and sincerity are essential to secure this cooperation. One of
the most important factors to secure cooperation is to minimise the manager’s
work in the project and make it easy and clear. At each stage, human relations is
a dominant factor. A sine qua non for securing cooperation is to make a written
request for their participation and obtain consent as a regular procedure.
20
Chapter 2
Research Design
21
to detail in your research design the rationale and justification for each decision
that shapes your answers to the ‘how’ of the research journey. In presenting
your rationale and justification you need to support them critically from the
literature reviewed. You also need to assure yourself and others that the path
you have proposed will yield valid and reliable results.
22
instance, assume that a researcher wants to test the hypothesis that there is a
relationship between children‘s school performance and their self-confidence, in
which case the latter is an independent variable and the former, a dependent
variable. In this context, intelligence may also influence the school performance.
However, since it is not directly related to the purpose of the study under taken
by the researcher, it would be known as an extraneous variable. The influence
caused by the extraneous variable(s) on the dependent variable is technically
called the experimental error‘. Therefore, a research study should always be
framed in such a manner that the influence of extraneous variables on the de-
pendent variable/s is completely controlled, and the influence of independent
variable/s is clearly evident.Control, One of the most important features of a
good research design is to minimize the effect of extraneous variable(s). Tech-
nically, the term control‘ is used when a researcher designs the study in such
a manner that it minimizes the effects of extraneous variables. The term con-
trol‘ is used in experimental research to reflect the restrain in experimental
conditions.
23
imental design or non- experimental design. The research in which the inde-
pendent variable is manipulated is known as experimental hypothesis-testing
research‘,where as the research in which the independent Variable is not ma-
nipulated is termed as non-experimental hypothesis- testing research‘.
For example, assume that a researcher wants to examine whether family income
influences the school attendance of a group of students, by calculating the co-
efficient of correlation between the two variables. Such an example is known
as a non-experimental hypothesis- testing research, because the independent
variable - family income is not manipulated here. Again assume that the re-
searcher randomly selects 150 students from a group of students who pay their
school fees regularly and then classifies them into two sub-groups by randomly
including 75 in Group A, whose parents have regular earning, and 75 in Group
B, whose parents do not have regular earning. Assume that at the end of the
study, the researcher conducts a test on each group in order to examine the
effects of regular earnings of the parents on the school attendance of the stu-
dent. Such a study is an example of experimental hypothesis-testing research,
because in this particular study the independent variable regular earnings of
the parents have been manipulated.
2.3.7 Treatments:
Treatments refer to the different conditions to which the experimental and
control groups are subject to. In the example considered, the two treatments are
the parents with regular earnings and those with no regular earnings. Likewise,
if a research study attempts to examine through an experiment the comparative
effect of three different types of fertilizers on the yield of rice crop,then the three
types of fertilizers would be treated as the three treatments.
24
2.3.8 Experiment:
Experiment refers to the process of verifying the truth of a statistical hypoth-
esis relating to a given research problem. For instance, an experiment may be
conducted to examine the yield of a certain new variety of rice crop developed.
Further, Experiments may be categorized in to two types,namely, absolute ex-
periment and comparative experiment‘. If a researcher wishes to determine the
impact of a chemical fertilizer on the yield of a particular variety of rice crop,
then it is known as absolute experiment. Meanwhile, if the researcher wishes
to determine the impact of chemical fertilizer as compared to the impact of
bio-fertilizer, then the experiment is known as a comparative experiment.
25
location/ source of literature, (iii) study of literature, and (iv) organisation of
literature.
26
experiments.
27
narration of facts and characteristics related to an individual, group or situa-
tion, are instances of descriptive research studies. Generally, most of the social
research design falls under this category. As a research design, both the de-
scriptive and diagnostic studies share common requirements, hence they are
grouped together. However, the procedure to be used and the research design
need to plan carefully. The research design must also make appropriate provi-
sion for protection against bias and thus maximize reliability, with due regard
to the completion of the research study in an economical manner. The research
design in such studies should be rigid and not flexible. Besides, it must also
focus attention on the following:
28
These are very relevant in management research too.
29
error is associated with each replication of measurement and the term reliability
refers to variable errors. It is defined as the extent to which a measurement is
free of variable errors.
Therefore, unless a pre-evaluated and reliable instrument is used for data col-
lection, the validity and reliability of a measurement technique or instrument
designed by the researcher must be established.
30
Determination of sample size, which is the number of elements in the sam-
ple, using statistical methods but often moderated by judgment based on
other considerations like availability, cost, and accessibility;
Implementation of the sampling plan by ensuring the various controls re-
quired in the field to attain the sampling objectives and by contacting the
sample members
31
(a) questionnaire mail surveys,
(b) interviews of several kinds,
(c) observation of phenomena/subjects, and
(d) special techniques like video/audio recording/projective methods.
In general a researcher may use a pure strategy (one single type research) or
a combination of a few types as in mixed design. For example, cross-sectional
research may be repeated at many points of time in a longitudinal study. An
exploration may be used before a descriptive study or a field study or an ex-
periment.
Variable selection error: These errors are Type I and Type II, that is, omitting
32
a relevant variable and including an irrelevant variable, respectively, for the
purposes of formulation of problems or development of hypotheses.
Surrogate information errors: The respondents introduce this error while an-
swering the researchers’ questions. The information required is different from
the information sought for.
Measurement errors: The difference between the researcher’s requirement of
the information and what the instruments provide is measurement error.
Experimental errors: These are errors due to extraneous variables in an ex-
periment and the actual impact of the independent variables on the dependent
variables is different from the impact attributable in the experiment to the in-
dependent variables.
Errors of subject selection: This error is due to two reasons:
(a) the population required is different from population actually selected,
(b) The population specified is different from populations listed in a frame. It
is also called frame error.
Sampling error: Sampling error is the difference between a truly representa-
tive sample and a probability sample.
Selection error: This indicates errors due to the difference between a truly
representative sample and a non-probability sample. It largely constitutes bias
errors.
Non-Response error: Errors introduced by the lack of response of certain re-
spondents in a sample.
33
Chapter 3
Research Problem
34
well grounded in the cultural setting of the decision-making system. Analogy
with problems in other disciplines is a useful method for generating hypotheses.
Before generating hypothesis, it is necessary to identify the relevant variables
related to the problem. A list of variables generally used in hypothesis genera-
tion is given below:
1. Independent variable (resultant variable): A manipulated variable in an ex-
periment (treatment).
2. Explanatory (causal) variable: Independent variable that influences the de-
pendent variable.
3. Dependent variable (criterion variable): The effect in an experiment.
4. Extraneous variable (non-observable): Independent variable other than the
one manipulated in an experiment, (independent variables that are not related
to the purpose of the study), which affects the result. Unless controlled, they
become sources of errors.
5. Moderating variable: Values that are not variable, which directly influence
the dependent variable but modify or moderate the influence on one or more
independent variables on the dependent variables.
6. Mediating variable: Values that affect the relationship between independent
and dependent variable but is not causal with respect to dependent variables.
7. Discrete variable: Values that the variable can take are non-continuous (for
example, integer variable).
8. Continuous variable: Values that the variable can take are continuous.
9. Dummy variable: Used in algebraic manipulations, but is a variable in a
technical sense only.
35
searcher to offer the best course of action to the executive.
The typical variables considered in problem formulation in the modeling con-
text are the following:
1. Exogenous variables Variables that reside outside the system in which the
problem resides, for example, demand in an inventory control model.
2. Endogenous variables Variables of the system under consideration.
3. Controllable variables Variables that can be controlled by the manager, for
example, the order quantity in a purchasing system or a batch in production.
4. Uncontrollable variables Variables that cannot be controlled by the manager
of the system, for example, due dates stipulated by the customer for order de-
livery.
5. Discrete variables Variables that assume only discrete values, for example,
the number of jobs completed in a period.
6. Continuous variables Variables that assume continuous values, for example,
price of a commodity or the total cost of a policy.
In addition, there are system parameters to be considered. Parameters are gen-
erally the cost factors like holding costs, repair costs, cost of a work package,
and so on. These are estimated and the influence of the errors in their estima-
tion on the model performance is an important aspect of model management
and is termed as sensitivity analysis.
36
makers’ preferences to certain aspects of the system and of the accomplishment
of different performance objectives. Here the logical approach dominates.
In complex management problems where several organisational entities inter-
act, and have interest in solving a common/shared problem, their viewpoints
will generally be different. There will be multiple pressures on the problem
solver. Further, in management problems related to broader issues of policies
and strategies, long range concerns and questions of consensus and conflicting
viewpoints dominate. A system viewpoint is imperative. One of the emerging
approaches for such situations is the soft system methodology, which is a qual-
itative system approach.
37
efforts. In any management problem, it will be necessary to clearly understand
new viewpoints of the problem because the perceptions of individuals or groups
related to the problem may be different and the individuals or groups may have
different mechanisms for solving the problem. This leads to the concept of own-
ership of the problem. Thirdly, if the reasons for the problem are not known,
then an investigation or enquiry will be needed to gain understanding of the
problem, in other words, a research approach will be needed.
3.2 Types
Problems can be classified in several ways. Hicks (1991) classifies them as
(i) simple and complex;
(ii) well-defined and ill-defined; and
(iii) tame and wicked.
38
tives. For example, when a firm has failed to convert a technology idea into a
suitable product, it becomes necessary to look at it from the point of manu-
facturing, R&D, consumer requirements, marketing, and technical manpower.
One may have to redefine the problem to arrive at a correct definition of the
right problem.
39
ferred to (Bell 1999, Krick 1962). However, the real differences lie in the modus
operandi at each stage of the process and what kind of approach is used. Hicks
(1991) classified these approaches as:
(1) logical approaches, (2) soft system methodology, and
(3) creativity approaches. While, in general, any of the approaches can be useful
at any stage of a problem solving situation, due to certain inherent strengths of a
particular approach, it is specially useful at certain stages . Logical approaches
are very powerful in formulating and solving problems when the system is not
dominated by human behaviour (for example, inventory systems and financial
systems).
3.3.1 Logical
This approach involves abstraction in which a problem is expressed mathe-
matically, diagrammatically, or descriptively. Such an expression will only be
an approximation to reality. Through a process of deductive reasoning one
proceeds to define relationships. Breaking the problem into parts or sub prob-
lems can facilitate such an inferential process. Sometimes it is easier to solve
a problem backwards from the final solution desired. This is possible when
the objective is clear, but starting from the existing situation is not clear or
easy. Each backward step leads to what is required at the beginning of the
step in order to accomplish the condition. This process is continued until the
present condition is reached. One of the greatest advantages in using a logical
approach is its ability to check whether an already established standardised
solution method is useful in solving the problem. A classical example is a stan-
dardised OR technique like Linear Programming (LP), Dynamic Programming
(DP), and inventory modeling.
40
can be used before the mathematical model is finally developed (see Chapter 4).
Making a meticulous observation of the system all complex details are obtained
in a qualitative and descriptive manner. Attitudes, reactions, and opinions of
various parties (individual and organisational units) involved in the problem
are gathered. In addition, factual or quantitative data and reactions to the
interactions of existing problem solutions are also obtained. In the main, each
of the human activity systems, connected with the problem situation is briefly
described as a separate module. This will help in giving a good insight into the
problem situation. For each of these systems a separate model is developed. A
simple overview of the SSM is given in (Hicks, 1991, pp.227). In this method,
a clear identification is made among the client, the problem solver, and the
problem owner (Checkland et al, 1990) and their roles are listed in a pictorial
diagram (Rich picture). This is developed without imposing a structure on it.
Its purpose is to convey a meaning to the problem solver and to provide ease
of communication with others. From Fig. 3.3, a root definition (a descrip-
tive statement of the activity system that is being modelled) is obtained. It
is desirable to generate alternate root definitions so that a choice can be made
after evaluation. Checkland suggests that a good root definition should include
ownership, actions, customers, environmental situations, global view, and the
transformation process.
3.3.3 Creative
In research, as in any other undertaking, one can learn its tools and techniques.
One can become proficient in them and become a competent technician. But in
order to enable one to make original contributions to one’s field of research, one
has to give oneself to it in a special way, that of creativity. This requires absence
of mental regimentation, a strong motivation, and freedom of self-expression.
Creative ability exists in every individual and exercise of experiments in creative
work is probably the best way to develop it. This section deals with creative
thinking, factors of creativity, and general approaches for its development in
the context of the problem-solving process. Some autocatalytic procedures on
creativity, suggested by researchers, are also discussed.
41
3.4 Creative problem solving process
Hutchinson (1949) presents four stages of a creative process as Preparation,
Incubation,Illumination and Verification:
1. Preparation: The stage in which the problem is investigated in all directions
with intense effort, which is given up in the later part of investigation.
2. Incubation: The stage, during which the individual is frustrated, exhausted,
and is not constantly thinking about the problem, and is relaxed.
3. Illumination: The stage during which the idea occurs along with psychologi-
cal factors like emotional release. Vividness of ideas and a feeling of insurgence
immediately precede it and accompany its appearance.
4. Verification: The stage in which the validity of the idea is tested and evalu-
ated. The idea is reduced to an exact form.
Hutchinson, after studying 250 most famous thinkers, differentiates between
systematic thinking and insight (creative insight). According to him systematic
thinking has the objective, problem, and method clearly defined. The method
is slow and deliberate, logical and associative thinking is maximised, trial and
error is minimised, and little emotion is felt during the process of thinking. It is
widely used during formulation of plans where only a small number of variables
and hypotheses are involved.
Insight is associated with baffling problems. An unpredicted feeling of frustra-
tion sets in, in the initial periods. In the final stages, effortless integration and
feelings of exultation take place.
42
Principle of deferred judgment: All problems that are implicit in a problem
situation should be considered. Problem sensitivity has to be developed. To do
this, evaluation should not take place while enumerating all problems.
Principle of extended effort in idea production: Generally, in problem solving
one gets an idea, sees it as a possible solution, and settles for it without further
ado. The creative problem solver on the contrary persists with getting more
ideas and different problem formulations until exhaustion results. It is found
empirically that later portions of effort bring more productive ideas than the
initial portions.
43
ideas
A total lack of knowledge in a particular field may also be very helpful in cre-
ating a new idea rather than in winning an argument in conventional committee
interactions. These methods are very popular among design teams. However,
students of research can gainfully employ them.
44
3.8 Delphi Method
The Delphi method is a survey technique for achieving consensus among isolated
anonymous participants with a controlled feedback of opinions. This method is
the application of expert opinion to problem solution, problem identification,
or the temporal location of a problem. The central principle underlined in the
Delphi method is that a structured and interactive questionnaire, a kind of re-
mote conferencing procedure, can serve as an effective means to draw an expert
opinion in relation to certain kinds of problems or predictions.
There are many purposes for the technique but the ones that are of definite
interest to students of research are:
To determine and develop a range of possible alternatives.
To explore and expose underlying assumptions or information leading to dif-
ferent judgment.
The Delphi method has become an important tool in applied research in many
areas of physical sciences, social sciences, business administration, and engi-
neering; and is extensively used in technological forecasting. Delphi’s main
features, which are anonymity, interaction, controlled feedback, and statistical
responses, are intended to minimise the biasing effects of dominant individuals
or irrelevant communications and of group pressures towards conformity. The
Delphi method utilises a series of three or four polling, with questionnaires, the
first of which is generally open ended. The objective of Delphi is to get signif-
icant and substantial group consensus on priorities among items or divergent
opinions. It would appear that any use of Delphi for problem generation would
involve a single poll rather than multiple ones since consensus and validation
are not of prime importance at that stage.
45
Chapter 4
1. Trademarks
2. Copyrights
3. Patents
4. Trade secrets
46
4.1 Trademarks and Service Marks:
A trademark or service mark is a word, name, symbol, or device used to indi-
cate the source, quality and ownership of a product or service. A trademark is
used in the marketing is recognizable sign, design or expression which identifies
products or service of a particular source from those of others. The trademark
owner can be an individual, business organization, or any legal entity. A trade-
mark may be located on a package, a label, a voucher or on the product itself.
For the sake of corporate identity trademarks are also being.
In addition to words, trademarks can also consist of slogans, design, or sounds.
Trademark provides guarantee of quality and consistency of the product or ser-
vice they identify. Companies expend a great deal of time, effort and money/
in establishing consumer recognition of and confidence in their marks.
General Logos:
(c) BIPM Logo (d) Chocolate add with Logo and Slogan
47
4.1.1 Federal Registration of trademarks:
Interstate use of trademarks is governed by federal law, namely, the United
States Trademark Act (also called the Lanham Act), found at 15 U.S.C 1051et
seq. In the United States, trademarks are generally protected from their date of
first public use. Registration of a mark is not required to secure protection for
a mark, although it offers numerous advantages, such as allowing the registrant
to bring an action in federal court for infringement of the mark.
Applications for federal registration of trademarks are made with the PTO.
Registration is a fairly lengthy process, generally taking anywhere from twelve
to twenty-four months or even longer. The filing fee is $335 per mark (Present
$225 per class) per class of goods or services covered by the mark.
A trademark registration is valid for 10 years and may be renewed for addi-
tional ten-year periods there after as long as the mark is in used in interstate
commerce. To maintain a mark the registrant is required to file an affidavit
with the PTO between the fifth and sixth year after registration and every ten
years to verify the mark is in continued use. Marks not in use are then available
to others.
A properly selected, registered and protected mark can be of great value to a
company or individual desiring to establish and expand market share and better
way to maintain a strong position in the marketplace.
4.2 Copyrights:
Copyright is a form of protection provided by U.S. law (17 U.S.C 101 etseq) to
the authors of ”original works of authorship” fixed in any tangible medium of
expression. The manner and medium of fixation are virtually unlimited. Cre-
ative expression may be captured in words, numbers, notes, sounds, pictures,
or any other graphic or symbolic media. The subject matter of copyright is ex-
tremely broad, including literary, dramatic, musical, artistic, audiovisual, and
architectural works. Copyright protection is available to both published and
unpublished works.
Copyright protection is available for more than merely serious works of fiction
or art. Marketing materials, advertising copy and cartoons are also protectable.
Copyright is available for original working protectable by copyright, such as ti-
tles, names, short phrases, or lists of ingredients. Similarly, ideas methods and
processes are not protectable by copyright, although the expression of those
48
ideas is.
Copyright protection exists automatically from the time a work is created in
fixed form. The owner of a copyright has the right to reproduce the work,
prepare derivative works based on the original work (such as a sequel to the
original), distribute copies of the work, and to perform and display the work.
Violations of such rights are protectable by infringement actions. Nevertheless,
some uses of copyrighted works are considered —fair use and do not constitute
infringement, such as use of an insignificant portion of a work for noncommer-
cial purposes or parody of a copyrighted work.
Definition:
4.3 Patents:
A patent for an invention is the grant of a property right to the inventor, issued
by the United States Patent and Trademark Office. Generally, the term of a
new patent is 20 years from the date on which the application for the patent
was filed in the United States or, in special cases, from the date an earlier re-
lated application was filed, subject to the payment of maintenance fees. U.S.
49
patent grants are effective only within the United States, U.S. territories, and
U.S. possessions. Under certain circumstances, patent term extensions or ad-
justments may be available.
The right conferred by the patent grant is, in the language of the statute and of
the grant itself, —the right to exclude others from making, using, offering for
sale, or selling the invention in the United States or importing heinventionin-
totheUnitedStates.Whatisgrantedisnottherighttomake,use,offer for sale, sell or
import, but the right to exclude others from making, using, offering for sale,
selling or importing the
invention. Once a patent is issued, the patentee must enforce the patent with-
out aid of the USPTO.
1. Utility patents may be granted to anyone who invents or discovers any new
and useful process, machine, article of manufacture,or composition of matter,or
any new and useful improvement there of;
2. Design patents may be granted to anyone who invents a new, original, and
ornamental design for an article of manufacture;and
3. Plant patents may be granted to anyone who invents or discovers and asex-
ually reproduces any distinct and new variety of plant.
50
exploit the invention. After the patent expires, any member of the public is free
to use, manufacture, or sell the invention. Thus, patent law strikes a balance
between the need to protect inventors and the need to allow public access to
important discoveries.
51
ing employee to sign agreements promising not to compete with the employer
after leaving the job. Such covenants are strictly scrutinized by courts, but
generally, if they are reasonable in regard to time, scope and subject matter,
they are enforceable.
Patent Practice
52
Many patent attorneys possess both a law degree and an advanced degree in
engineering, physics, chemistry, or the like. To represent patent applicants be-
fore the PTO, an attorney must be registered to practice with the PTO. An
attorney must pass the Patent Bar, which requires the attorney to demonstrate
background in science or engineering. The examination is very difficult it is a
multiple choice questions, and the pass rate tends to hover around one-third.
A list of attorneys and agents registered to practice before the PTO is available
from the Government Printing Office located in Washington, DC, Alternatively,
the PTO web site (http://www.uspto.gov/web/ofices/dcom/olia/oed/roster/)
provides an index to the more than 18000 attorneys and agents who are licensed
to practice before the PTO.
1. 1. Provisional application
2. Utility application
3. Design application
4. Plant application
5. Continuation application
53
6. PCT (Patent Cooperation Treaty)Application
7. Divisional application
Preparing the application
Title
Background
Summary of invention
Claims
54
Ownership Rights
Ownership transfer
55
—importingtheinventionintotheUnitedStates. Whatisgrant Edisontotheright-
tomake,use,offerforsale, sell or import, but the right to exclude others from mak-
ing, using, offering for sale, selling or importing the invention. Once a patent
is issued, the patentee must enforce the patent without aid of the USPTO.
56
Convention. Also, claiming the right of priority is available under the PCT to
applications filed in any member country of the Paris Convention. The PCT
came into affect in 1978 to cure one of the major drawbacks of the Paris Con-
vention. Under the Paris Convention, filing several separate patent applications
in various different countries involves considerable duplication with multiple fil-
ings and searches in each of the countries, and in the languages of each of those
countries which can be rather expensive. Under the Paris Convention, the sev-
eral global patents that are granted based upon your first filed home country
patent application typically have different claims resulting from the varying and
separate examination procedures in different countries. Additionally, annuity
fees must also be paid in the currency of each country in which your patent
application was filed under the Paris Convention. Therefore, one of the major
goals of the Patent Cooperation Treaty is to reduce the costs in time and money
involved in obtaining worldwide patent protection under the Paris Convention,
depending on the number of countries in which patent protection is sought. An-
other factor was to provide additional time beyond the 12 month period of the
Paris Convention in which an inventor, or the inventor’s employer, could decide
whether significant sums of money should be spent to obtain foreign patent
protection on a particular invention. The period has been increased to up to 30
or 31 months, and sometimes more. Keep in mind, however, that none of the
treaties that I’ve mentioned so far provide that single “world patent” that would
be enforceable in every country. That result may be achieved someday, but not
now. Every so often, various countries of the world try to get together to har-
monize their patent statutes, but each country recommends that all the other
countries adopt their procedures. On that issue, the most recent harmonization
efforts came to naught. One of the major drawbacks is the provision that is
standard in many countries that the first inventor to file a patent application
will ultimately be granted the patent, and not necessarily the first inventor. In
the United States, however, those involved in harmonization discussions were
adamant about retaining the provision in the U.S. patent law that patent rights
are granted to the first to invent, and not the one who has engaged the services
of a speedier patent attorney.
57
4.8.1 Broad Provisions of the Patent Cooperation Treaty
The first economic simplification provided by the PCT is that the form and
content of an international patent application filed under the PCT is the same
for all signatory countries. Thus, an application that complies with the PCT
rules also meets the requirements of your home country Patent Office, and all
other signatory national Patent Offices. Once your original patent application
has been prepared by your patent attorney and reviewed by you as the inventor
and filed, the procedure for filing a PCT application comprises identifying your
home country patent application in a document filled out by your patent
58
the prior art patents are reviewed to determine the degree to which they are
relevant to your invention. No response to the search report is required. In the
second phase of procedure under the PCT, a preliminary examination is con-
ducted at the inventor’s or patent attorney’s request. During this examination,
the prior art uncovered by the search is applied to the claimed invention. The
patent examiner will then provide your patent attorney with an International
Preliminary Examination Report directed to the patentability of the claims in
the patent application. Under the applicant is then allowed a total of approx-
imately 30 months from the initial filing date of the home patent application
(the priority date) before the applicant must decide whether or not to proceed
with filing national applications to obtain patent protection in some or all of the
individual member countries of the PCT that were designated in the originally
filed PCT application document. The inventor and the inventor’s attorney have
the right to amend the PCT application if the results of the search and exam-
ination indicate that such alterations are desirable to obtain allowance of the
PCT application. For U.S. applicants, these amendments can be made in the
English language.
Also note that in many countries, a request for preliminary examination is no
longer required to obtain the full 30 (or 31) months to file national applications.
However, requesting examination provides advantages in expediting and reduc-
ing the cost of national patent prosecution. Timing is important at all stages
of the PCT procedure. If no demand for examination is made under Chapter
II of the PCT, the time in which the several national applications must be filed
may be limited to 19 months from the original filing or priority date. Therefore,
requesting such examination extends the time at which the decision has to be
made in which country applications should be filed from 19 months to approx-
imately 30 or 31 months. Thus, one of the major advantages of the PCT over
the Paris Convention is that you have approximately 2½ years from the original
filing date of
59
Cooperation Treaty can be looked at as providing an extension of time to make
that important decision regarding the filing of foreign patent applications.
At the end of the 30- or 31-month period, assuming a Chapter II examination
has been requested, the applicant must designate those national countries in
which it desires to obtain patent protection based upon the PCT application.
Note that the European Patent Convention, discussed in Section 17.6, provides
that most of Western Europe at this point is considered as one nation. After the
PCT search and examination procedure is completed, the search report, copies
of the prior art and the application are sent to the national Patent Offices of each
of the countries designated by the applicant to initiate the process of separate
examinations for patentability in each designated country. At this point, the
patent application must be translated into the appropriate national language,
and a patent agent engaged in each country to prosecute your application before
the designated national Patent Office. Since this is an additional expense, the
applicant under the PCT has been given substantial time to determine in which
countries it is economically viable to proceed with obtaining patent protection.
The national Patent Offices which receive your patent application are not bound
by the preliminary examination report, and in most cases the national patent
examiners conduct their own search. Each national Patent Office is responsible
for issuing its own patents in accordance with its own laws and regulations.
60
Chapter 5
Patent Rights
The first Patent Act, passed by the US Congress, was called —An Act to
promote the progress of useful Arts and dates back to April 1790. Samuel
Hopkins was the first inventor who was granted the patent for his new method
of producing potassium carbonate (July 31,1790).
61
5.2 Licensing and transfer of technology
Licensing: Agreement whereby an owner of a technological intellectual property
(the licensor) allows another party (the licensee) to use, modify, and/or resell
that property in exchange for a compensation (consideration).
The most common types of licensing agreements include technology (patents),
trademarks (merchandise), copyright and trade secrets
62
a growing number of cases, however, the organization that creates a technol-
ogy does not bring it to the market. There are several potential reasons for this:
If the inventing organization is a private company, it may not have the resources
needed to bring the technology to market, such as a distribution network, sales
organization, or simply the money and equipment for manufacturing the prod-
uct (these resources are called complementary assets). Even if the company has
those resources, the technology may not be viewed as a strategic product for
that firm, especially if the technology was created as a byproduct of a research
project with a different objective.
63
Companies look to transfer technologies to other organizations as a potential
source of revenue, to create a new industry standard, or to partner with a firm
that has the resources or complementary assets needed to commercialize the
technology.
64
to use in commerce. . . to identify and distinguish his or her goods, including
a unique product, from those manufactured or sold by others, and to indicate
the source of the goods, even if that source is unknown.” A copyright seeks to
promote literary and artistic creativity by protecting, for a limited time, what
the U.S. Constitution broadly calls writings of authors. The general rule in the
United States for a work created on or after January 1, 1978, whether or not it
is published, is that copyright lasts for the author’s life-time plus 50 years after
the author’s death. The copyright in a work made for hire or in an anonymous
work lasts for 75 years from publication or 100 years from creation, whichever
is shorter.
A trade secret is information that an inventor chooses not to disclose and to
which the inventor also controls access, thus providing enduring protection.
Trade secrets remain in force only if the holder takes reasonable precautions to
prevent them from being revealed to people outside the firm, except through a
legal mechanism such as a license. Trade secrets are governed by state rather
than federal law.
The second step in technology transfer is finding a suitable recipient for that
technology—one that can use the technology and has something of value to
offer in return. Firms are now studying more systematically the process of li-
censing and technology transfer. There are five information activities needed
to support technology transfer:
65
These information needs are often supported by service companies, such as li-
censing consultants, and by electronic media, including databases and online
networks. Some new online networks use the Internet to help firms in these in-
formation activities. The information-transfer process is one of the most critical
steps in technology transfer. New licensing practices are designed to address
this process. For example, many licenses now bundle both the basic technology
and the equipment needed to utilize that technology in a single agreement. A
license may also include a ”know-how” agreement, which exchanges relevant
trade secrets (with appropriate protections) to the licensee to help in exploit-
ing technology. In some industries, such as petroleum exploration, firms even
practice wet licensing, whereby employees of the licenser are loaned out to the
licensee to teach how a technology should be properly used.
The major barrier to the increase in technology transfer among firms is organi-
zational behavior. In the past, cultural blocks such as the ”not invented here”
syndrome prevented firms from even showing interest in technology transfer.
New concepts along the lines of knowledge management are changing behaviors
and beliefs, leading firms to realize the enormous gains to be made through
the active pursuit of licensing. Once the organization has at least started to
establish ownership of the technology, there are several possible legal and/or
contractual mechanisms for transferring technology from one organization to
another:
66
cific project, coordinating research tasks across the partner firms and with
sharing of research results.
R&D corporation or research joint venture—the establishment of a sepa-
rate organization, jointly owned by two or more companies, which conducts
research on behalf of its owners. A notable example is Bellcore, which orig-
inally was established by the seven Regional Bell Holding Companies of
the United States and which would conduct research and set standards for
the local telephone system.
research consortium—any organization with multiple members formed to
conduct joint research in a broad area, often in its own facilities and using
personnel on loan from member firms and/or direct hires. The Microelec-
tronics and Computer Technology Corporation (MCC) and Semiconductor
Manufacturing Technology (SEMATECH) are examples of such organiza-
tions.
The choice of which mechanism to use in a particular technology transaction
depends on many factors, including the stage of development for that technol-
ogy, what the company receiving the technology is willing or able to pay, what
technology or other assets it might be able to offer in place of money, the likely
benefits of establishing a longer-lasting partnership between the organizations
instead of a onetime transfer; and the exact legal status of ownership over that
technology. For example, if a small firm simply wants to sell its technology
to a large firm in exchange for money, it will probably choose to license the
technology. If the small firm also wants access to the large firm’s complemen-
tary assets, such as its production facilities and distribution network, it will try
to negotiate a more substantial and permanent relationship, such as an R&D
contract or a cooperative R&D agreement.
67
approximately 18 percent per year, and domestic technology licensing was ris-
ing at 10 percent per year.
Another growing mode of private technology transfer is the formation of re-
search joint ventures (RJVs) between companies in the United States. For
years, such joint ventures were rare, mostly due to fears among companies that
joint ventures would provoke antitrust litigation from the government. Passage
of the National Cooperative Research Act (NCRA) in 1984 and the National
Cooperative Research and Production Act in 1993 relaxed antitrust regulation
of such partnerships, leading to a substantial increase in RJVs.
Studies of the filings of RJVs registered with the Department of Justice under
the NCRA shows some interesting trends:
68
telecommunications. These reasons indicate that RJVs will continue to increase
in significance as a tool for technology transfer.
69
Technology transfer may or may not result in commercial products. A
survey of 229 technology transfer projects at 29 federal laboratories, con-
ducted by the Georgia Institute of Technology, found that 22 percent of
the projects resulted in new commercial products, while 38 percent con-
tributed to products under development. Interestingly, in 13 percent of
the projects, new product development or product improvement was never
a goal.
Laboratories’ views on technology transfer can affect success. Now that
most of the legal barriers to technology transfer have apparently been elim-
inated by congressional legislation, the true barriers are generated by the
culture of the laboratories and the attitudes of researchers and laboratory
administrators. For example, in several cases firms have complained that
laboratory researchers were not used to meeting the strict timetables on
project completion that private sector researchers must observe.
Technology transfer, especially in joint research, can aid the government
laboratory as well. A report by the GAO examining ten CRADA projects
found that the laboratories can also benefit from technology transfer, for
example, through enhanced expertise for researchers, development of tech-
nologies that also support the laboratory’s mission, acquisition of sophis-
ticated equipment and infrastructure, and increased laboratory revenues
from industrial sources.
70
Commercial institutions pay royalties for the right to put inventions and discov-
eries from universities to commercial use in products such as computer-imaging
technology, medical diagnostic testing, and treatment of disease. Institutions
of higher education, in turn, can use the revenue to increase investments in
research and development. This technology transfer also leads to sponsored re-
search agreements between firms and universities, often to undertake additional
research needed to commercialize technologies. Universities now receive approx-
imately 7 percent of all research funding from industry, compared to about 3
percent in the 1970s. Institutions of higher education also reported spinning off
nearly 350 companies and receiving 3,450 U.S. patents for new technologies and
inventions. Since fiscal year 1998 when the question was first asked, 178 U.S.
survey respondents have reported a total of 2,230 new products introduced to
the market place.
For industry, universities offer the best way to acquire basic technological re-
search as those activities are curtailed within firms. Universities also house
experts in very focused fields of study that are likely to have benefits to a
small number of firms. Finally, joint industry-university research is viewed as
an important recruiting tool in today’s competition for scientific talent, since
industry-funded projects are often carried out by graduate students who later
go to work for their former sponsors.
Technology transfer is a valuable mechanism by which industry can acceler-
ate its innovation activities and gain competitive advantage through coopera-
tion. Technology transfer can also boost overall economic growth and regional
economic development. While further study is needed to estimate the exact
benefits gained from technology transfer and ways to achieve those benefits, it
is clear that this is an activity that is becoming a central feature of the U.S.
research and development system.
71
patents specifically for research determination has not been available, making
it complicated for researcher to use this data for measuring any kind of research
activities in terms of patents in India. To facilitate this, we constructed a com-
prehensive patent data base which incorporates the information presented in
the electronic gazette. This database includes information such as technology
class, applicant, inventor, country of origin etc., of the patent submitted. We
present the methodology for the creation of this database; its basic features
along with its accuracy and reliability in this research paper. Patent based
database has been developed and can be used for various innovation researches
and activities.
5.3.2 obviousness
A novelty search can usually be completed for less than$1,000.
If an invention is intended for immediate commercial use or sale, an ad-
ditional search, call an infringement search or investigation, is often con-
ducted concurrently with the novelty search.
This novelty search is thus more expensive
Searching Methods:
The PTO provides public search facilities for patent searching.
Searching is free and the PTO allows searchers to review issued patents,
complete with drawings.
Searching can be done either in the main public search room or in the
examiners‘ search areas where examiners will assist in searching. (The
patent search room contains copies of all U.S. issued patents from 1790 to
present as well as many foreign patents).
72
The PTO employs a classification system that provides for the storage and
retrieval of patent documents
The patent examiners in the course of examining patent applications, the
system is also used by searchers, and classification files are divided in to
subclasses.
Most classes have approximately three hundred subclasses
Advanced data availability that goes beyond a simple patent number, in-
cluding current patent assignees and patent transfer histories, legal status
and remaining life, Patent cloud‘s exclusive and insightful Patent Quality
and Value Rankings , and more.
2) An AI-Powered Patent Search Tool with Great Searchability
Besides performing patent search by number, inventor, company or date,
our Search Editor empowers you to search by current assignee, assignment
history, status data and more.
Immediately get the most relevant prior art for your prior art search needs
with Semantic Search.
Get corrected and correlated corporate tree data with a Corporate Affili-
ation Search to ensure comprehensive results in a due-diligence search.
Extend your search results and avoid missing keywords with Keyword
Expansion, and conveniently obtain equivalent results with Smart Search when
navigating a patent document. 3) A Powerful and Interactive Patent Analytics
Dashboard
73
Uncover the unlimited potential of Patent cloud‘s proprietary Patent Ma-
trix for your patent landscape analysis, with an interactive pivot table for
insights gained from correlating patent data with your self-defined tags.
Interact with the intuitive Statistical Charts to conveniently navigate and
manipulate data fields and scopes to conduct further analysis and gain real
actionable insights.
74
5.4.2 For what type of products can geographical indications be
used?
Geographical indications are typically used for agricultural products, foodstuffs,
wine and spirit drinks, handicrafts, and industrial products. How are geograph-
ical indications protected?
75
Chapter 6
76
Disputes frequently arise between owners of registered mark and owners of do-
main names whose domain names similar or identical to the registered marks.
A civil suit can be instituted under the recent Anti-cyber squatting con-
sumer protection Act,or
An arbitration proceeding can be instituted through ICANN‘s disputes
resolutions process
77
Cyber squatters and the dilution doctrine: Federal trademark dilution Act
(15 U.S.C 1125 (C)
Cyber squatters and Anticyber squatting consumer protection Act (15
U.S.C § 1125 (d) [ACPA: Anti cyber squatting consumer Protection Act]
To prevail in a civil action under ACPA, a plaintiff must prove three thing:
78
responded by adopting stronger encryption technology. Similarly, in 2000, Mr.
King suspended online publication of a serial novel because too many indi-
viduals were downloading the work without paying it. It late 1997 President
Clinton signed into law the No Electronic Theft [NET] Act [amending 18 U.S.C
§2319] to enhance criminal penalties for copyright infringement, even if the in-
fringer does not profit from the transaction. The act also extends the statutes
of limitations for criminal copyright infringement from three to five years, and
allows law enforcement officers to use federal copyright law against online copy-
right violation, thereby extending the same copyright protection to the Internet
that is provided to other media. In September 1999, the Clinton administration
relaxed government restrictions on the export of encryption products and simul-
taneously introduced new legislation to give law enforcement agencies greater
authority to combat the use of computers by terrorists and criminals and to
create a new code cracking unit within the FBI [Foreign Bureau of Investiga-
tion].
79
protection was often counterproductive or ineffective in that the PTO often
took two years to issue a patent, roughly the same time it took for the software
program to become absolute.
80
The patent Law Treaty
81
over a wide range of time periods, geographic areas, and technological sectors
(Griliches, 1990). Nevertheless, all patents are not equal, and it is important to
understand the operation of patent systems throughout their history in order
to make effective use of these data. This article begins with a brief history of
patents, followed by a discussion of the legal and administrative processes for
obtaining a patent in the three major patent offices, the United States, Euro-
pean, and Japanese. Then the evidence on patent effectiveness in encouraging
innovation is surveyed. The final section discusses the use of patent data in
economic analysis.
82
In 1883 the Paris Convention for the Protection of Industrial Property ensured
national treatment of patent applicants from any country that was a party to it.
Its most important provision gave applicants who were nationals or residents
of one member state the right to file an application in their own country and
then, as long as an application was filed in another country that was a member
of the treaty within a specified time (now 12 months) to have the date of filing
in the home country count as the effective filing date in that other country
(the ‘priority date’). This is an important feature of the patent system, and
enables worldwide priority to be obtained for an invention originating in any
one country, in addition to ensuring that in principle all inventors are treated
equally by the system, regardless of the country from which they come.
83
sequent litigation this opportunity is rarely taken up. In Europe and Japan,
robust patent opposition systems with limited time frames operate, and these
systems are often used by rival firms as an alternative to more expensive lit-
igation (Hall et al., 2003). In Europe this avenue of challenge is particularly
attractive because it is the last opportunity to attack a patent at the European-
wide level rather than in individual national courts. Patents are valuable only
if they can be enforced and this fact has a number of implications for their use.
First, the ability of the courts to reach the ‘correct’ verdict with respect to in-
fringement and validity will matter; in situations or jurisdictions where there is
a great deal of uncertainty about the outcome, and even if both parties agree as
to the merits of the case, it may be worth pursuing the issue further or in some
cases, reaching a private financial settlement to avoid a random outcome in the
courts. Second, the costs of litigation will matter: parties with deep pockets
can threaten those with less access to resources, or where the opportunity cost
of paying attention to a patent suit is high. On the other hand smaller parties
with less to lose can also hold up firms with large sunk
investments that they might lose. Finally, the threat of litigation may discour-
age firms from even entering certain areas, thus providing a disincentive rather
than an incentive for R&D. Lerner (1995) documented this phenomenon for
biotechnology. The degree to which these kinds of threats matter depends to
a great extent on the costs and extent of litigation, both of which tend to be
higher in the United States than in many other countries.
Research on patent litigation is difficult because of the data collection prob-
lem (it frequently requires accessing the records of courts in several different
jurisdictions) but in recent years there have been series of studies of US patent
litigation (Moore, 2000; Lanjouw and Schankerman, 2001; Bessen and Meurer,
2005) and at least one of the German system (Cremers, 2004). All of these
studies document the fact that litigated patents tend to be the more valuable.
The US studies also show that only about five per cent of such suits go to trial,
with the remainder being settled before going to trial. They also show that
whether patent litigation has increased depends on whether it is measured in
aggregate or per patent. That is, the increase in patent litigation has roughly
paralleled the increase in patenting, at least in the United States.
84
6.6 IPR of Biological Systems
Over last few years many controversies have raised on biological patents. Patent-
ing of biological extracts from plants, animals and organisms which is previously
recognized by indigenous people, is referred as Biopiracy. One among the main
purposes of IPR protection is to move a fraction of wet lab investigations to
industries. These IPR’s deny the right to local population in using these in-
novations. For example, Myriad Genetics, Inc. (Diagnostic Company) has the
patent for BRCA2 gene and many others. In 2009, a case was filed against it
by scientists and doctors that patent on genes prohibited patients from think-
ing in a different way over their examination reports. In 2013, Association for
Molecular Pathology challenged the patent rights of Myriad Genetics. A case
appeared in US District Court gave the decision that every challenged assert is
not patentable. A DNA or genes of organisms cannot be patented because it is
a natural product, but cDNA is patentable because it is modified by researchers
and is not an original product of nature.
85
medicine. The ancient scriptures of the Ayurveda are full of instances where
herbs with medicinal properties were used not only for treatment but also for
increasing physical and mental efficiency.26 Nearly 76 species of vertebrates
have been found to be useful in tribal medicine.30 Jeevani is a poly herbal drug
in a granular form shows restorative, immuno enhancing, anti-stress and anti
fatigue properties. The members of the Kani tribe chew fruits of the plant,
Arogyappacha but since fruits are available in limited numbers, the TBGRI
team scientifically validated all parts of the plant including the roots and leaves
for possible leads. Eventually they found leaves with the necessary chemical
and pharmacological properties.31 The knowledge was shared by three Kani
tribal members to the Indian scientists who isolated 12 active compounds from
arogyapaacha, developed the drug “Jevaani”, and filed two patent applications
on the drug. Plat his, tribal leaders have customary rights to share or transfer
and practice certain traditional and medicinal knowledge.
The technology was then licensed to the Arya Vaidya Pharmacy, Ltd., an In-
dian pharmaceutical manufacturer pursuing the commercialization of Ayurvedic
herbal formulations. India possesses one of the largest livestock populations
in the world, which is more than 484.9million with the top position in cattle
(178million), buffalo (98.7million), goat (125.46million) and sheep (64.27mil-
lion), poultry (505million), and pig (16million). Further, the country has 16.49
percent of the world cattle population and 56.78 percent of the world buffalo
population. Out of the total livestock in the country, around 38.2 percent are
cattle, 20.2 percent are buffaloes, 12.7 percent are sheep, 25.6 percent are goats
and 2.8 percent are pigs. All other animals account for less than 0.50 percent
of the total livestock population. There are unique traits of the farm animals
inhabiting Indian sub-continent which hold considerable potential application
or utilization through biotechnologies.32 Under the Central Herd Registration
Scheme of the Department of Animal Husbandry & Dairying, animals belong-
ing to Hariana, Gir, Kankrej and Ongole breeds of cattle and Murrah, Surti,
Mehsana and Jaffrabadi breeds of buffalo are registered depending on the con-
formation to breed characteristics and prescribed milk being misappropriated
by others. Until now, the enforcement of IPR in livestock sector is not so rigid
in India which reduces the effectiveness of IPR laws and regulations. It also
generates a bias towards research outputs primarily marketed in industrialized
countries with functional rule of law.
86
6.6.3 Biopiracy
Bioprospectors, depend on the knowledge of indigenous and local communi-
ties that have preserved these resources for ages and understand them best for
commercialization of valuable genetic resources. This process of “appropriating
biodiversity and the knowledge “involved is termed biopiracy.33 The term can
also be used for breach of contract related to access and use of TK. Bioprospec-
tors are those scientists which discover and commercialize new products based
on biological resources.
In 2000, the Council of Scientific and Industrial Research (CSIR), India, found
that almost 80 per cent of the medicinal plants were granted by United States
Patents Office,34 and in that year only 7 medicinal plants of Indian origin were
patented. Then again after three years almost 15.000 patents were granted
at USPTO, EPO etc. In 2005, this number increased to 35,000,which clearly
demonstrated the interest of the developed world in the TK of the develop-
ing countries.35 With reference to Yoga, the study conducted by Traditional
Knowledge Digital Library (TKDL) team on the international patent databases
in February 2004 found 249 patents were granted on Yoga and by May 2005 its
number drastically increased to over 2300patents, 2315 trademarks and nearly
150copyrights.The reason for this misappropriation at international patent of-
fice’s is that the traditional medicinal knowledge exists only in local languages,
such as Sanskrit, Urdu, Arabic, Persian, and Tamil which cannot be understood
by patent examiner.
A few examples of bio-piracy of traditional knowledge are:
Turmeric (Curcuma longa):
Curcuma longa, a type of turmeric commonly called Haldi, is an Indian herb
which is used for treatment of sprains, inflammatory conditions and wounds.
The orange colored root is native to the subcontinent and South East Asia, and
for thousands of years has been a one of the major components of Ayurvedic
medicine. In 1995, two US scientists from the University of Mississippi were
granted US patent 5,401,504 on the use of turmeric. The scientists claimed that
turmeric could heal wounds and claiming this to be novel(Bhattacharya,2014).36
The CSIR challenged this patent on grounds of prior art, supporting their claim
by documentary evidence of traditional knowledge which includes ancient San-
skrit text and a paper published in 1953 in the Journal of Indian Medical
Association. USPTO revoked this patent in 1997 after enquiring that there
was no novelty and the innovation has been used in India for centuries.
87
Neem (Azadirachtaindica):
It is derived from the persian name AzadDarakth, meaning “the free tree”. In
India it has been widely used for several decades and is mentioned in Indian
texts written 2000years ago. The remarkable properties of this compound have
been used by Indian small farmers and industries in medicine and agriculture
in form of insect and pest repellant, toiletries and cosmetics etc.
In 1994, European Patent Office (EPO) granted a patent to the US Corpora-
tion W.R. Grace Company and US Department of Agriculture for a method
for controlling fungi on plant by the aid of hydropholic extracted Neem oil). In
May 2000, a coalition of groups successfully overturned the patent held by the
United States of America (US) company, WR Grace and the US Department
of Agriculture over the Indian neem tree. Basmati rice (Oryza sativa linn): It
is largely produced in many parts of India and some parts of Pakistan. It is
evident that basmati is grown in subcontinent for centuries and farmers have
developed numerous varieties of rice to meet various ecological conditions, cook-
ing need and taste. Texas based Rice Tec received a US patent 5,663,484 on
basmati rice in 1997. This patent permitted the company to develop and sell
a ‘new’ variety, which it claims to have progressed under the name of basmati,
in the US and abroad. But it was retracted due to the efforts of Indian Agri-
cultural and Research Institute (IARI).
Nap hal (Wheat):
EPO granted a patent to MONSANTO, Seed Corporation. Research Founda-
tion for Science Technology and Ecology (RFSTE) along with Greenpeace and
Bharat Krishak Samaj (BKS) filed a petition at the EPO, Munich, challenging
the patent rights given to MONSANTO on Indian Landrace of wheat, Nap Hal.
The patent was revoked in October 2004.
Amla (Phyllanthusemblica):
It is widely grown and used in India and is a main ingredient of triphala which
is a traditional ayurvedic formulation used for thousands of years. USPTO has
granted 5 patents and one of the patents is claims an invention using extracts
of am lain a hair coloring preparation. Four further patents involving Alma
have been filed in the Japanese Patent Office.
Karela (bitter gourd):
Jamun (blackberry), Gumar and Brinjal, for instance, are commonly known
in India for their anti diabetic characteristics. Their uses are so common in
India that there is no novelty involved while using them for curbing diabetes.
88
A patent was, however, obtained in the U.S. by three NRIs for their utilization
as a cure for diabetes.
89
Question Bank
90
14. Explain the meaning of the following in context of Research design (a). Ex-
traneous variables (b). Confounded Relationship (c). Research Hypothesis
(d). Experimental and Control Group (e). Treatments
15. Explain the meaning and significance of research design and also write
features of a good design.
16. Discuss clearly about different research Designs.
17. Explain clearly the basic principle importance of experimental designs.
18. . What is Interpretation? Why it is the necessity in Research? Explain
the techniques of Interpretation.
19. (a). What Precautions should take in Interpretation? (b). Discuss the
Significance of Report Writing?
20. (a). Explain the Different Steps involved in Report Writing? Explain (b).
Describe the Layout of Research Report.
21. (a). Explain different types of Reports? (b). Explain the Mechanism
Involved in Writing a Research Report
22. (a). Explain basic Intellectual Property laws. Write the rationalization
for protection of IP? (b). Write short notes on importance of intellectual
Properties.
23. Discuss various types of Intellectual Property
24. Write short notes on (a). US patent trade office (b). Library of congress.
25. Write briefly about International Organizations, Agencies and Treaties
26. (a). Briefly explain the functions and purpose of the trademarks (b). Ex-
plain the Laws and Treaties governing trademarks.
27. Explain the following (a). Trademarks (b). Service Marks (c). Certifica-
tion Marks (d). Collective Marks
28. Write about the various steps in acquisition of trademarks rights
29. Discuss briefly about various categories of marks
30. Write Short notes on (a). Common Law Rights (b). Federal Registration
(c). State Trademark Registrations
91
31. Explain various protect able matter in detail
32. Write different matters which are considered as Exclusions from Trademark
protection
33. Explain Patent Laws? Write Rights under Federal Laws
34. Explain briefly about Patentability.
35. Explain about Design Patent methods.
36. Explain about Plant Patent methods.
37. (a). Explain clearly significance of double Patenting (b). Write about
Orphan Drug act.
38. Explain clearly about resources of Patent search and also explain Patent
search methods.
39. Discuss clearly about Patent application process.
40. Write about proceeding Patent application
41. Write about post issuance actions of Patents.
42. What is Intellectual Property Rights (IPR)?
43. What are the different types of IPR, explain who is benefitted from each
type of IPR and how?
44. What is Trademark?
45. Explain the different types of trademarks with examples. Differentiate
between Trademark and design.
46. What is the process of registering a trademark?
47. What is the role of IPR in electronics industry? Explain in terms of circuit
boards and integrated chips, how IPR can be used to protect them.
48. What is trade secret? Give any famous example of trade secret. Why are
trade secrets so significant and what is the negative aspect of trade secret?
Explain in brief the historical perspective of trade secret.
92
49. Hypothetically, you are setting a new cold drink manufacturing company
with new and innovative machineries and recipes. You plan to use your
knowledge of IPR to safeguard your new company from old bigshot com-
panies as well as new budding companies. Describe in details, what all
rights you will register and how you will benefit out of it.
50. What is a Geographical Indication (GI) and what is its function? Name
the legislation for its protection in India and briefly outline the procedure
of registration. What are the rights of a Registered Proprietor of a GI?
Explain how Registered GIs benefit local populations.
51. Define Industrial Design and discuss the need to protect it as an intellectual
property. Explain the grounds for registration of designs and the rights of
a design holder? Discuss infringement of Industrial Designs.
52. Describe Copyright and the works protected under copyright act. Briefly
explain the process of obtaining copyright. Differentiate between Copy-
right infringement and Trademark infringement.
53. . Comment on the Patent Act 1970 and its amendment. Explain in brief
the Patent filing procedure. What are the differences between Product
Patents and Process Patents?
93