On March 5, 2012, Lexmark International announced it had acquired the company for a cash price of approximately $148 million. The company is now part of Lexmark's Perceptive Software division.Brainware is an American software company that markets data capture and extraction products. The company spun out of Dulles-based SER Solutions Inc. in February 2006 when SER was acquired by The Gores Group LLC. From February 2006 to March 2012, Brainware’s majority owner was San Francisco-based private equity firm Vista Equity Partners.Brainware is headquartered in Ashburn, Virginia, USA, with sales, support, professional services and R&D offices in London, UK, Kirchzarten, Germany and Neuchâtel, Switzerland. The company has partnerships with most major enterprise software providers, including Oracle, SAP and Microsoft, and claims its software integrates with most available enterprise content management platforms. Brainware has also partnered with a number of hardware providers, notably Hewlett-Packard, Fujitsu and OPEX.Brainware claims its software "can relieve a company of 60 percent to 80 percent of the work of manually keying in information from unstructured documents," and services large companies such as NEC, Mayo Clinic, Bechtel, Royal Dutch Shell and Rabobank.In a 2011 comparison report, Real Story Group classifies Brainware as a "Capture Solutions" vendor, competing directly with Kofax and ReadSoft.Brainware and its customers have been profiled in publications including Profit Online, Business Finance, imageSource, Managing Automation, Industryweek, Treasury & Risk and others. The company's enterprise search technology has been profiled by InfoWorld. Wikipedia.
Bera M.B.,Haldia Institute of Technology |
Das N.C.,Brainware |
Lahiri A.,Jadavpur University
Journal of Thermal Stresses | Year: 2015
Two-temperature generalized thermoelasticity theory has been applied to determine the conductive and thermodynamic temperature as well as the deformation and stresses in an annular disk. The basic equations have been written in the form of a vector-matrix differential equation in the Laplace transform domain and solved for the field variables in closed form. Finally, the time variation and space variation of temperatures, deformation and stresses have been estimated by numerical methods and presented in several graphs and the analysis of the results have been made. © 2015 Copyright Taylor & Francis Group, LLC.
Banerjee C.,Brainware |
Sharma I.,Career Point Technology Campus
International Conference on Computing, Communication and Automation, ICCCA 2015 | Year: 2015
Achievement of consensus in multi-agent system is a topic of much research lately. Most of the consensus achievement algorithms are iteration based and are not able to address additional objectives and constraints. We propose an algorithm that is simple, distributed and able to achieve consensus after considering multiple objectives. In a group of decision making agents, to find a consensus, we calculate the median of the group. Ultimately the median is pulled to a lower or higher value depending on the summation of constraint based parameters or weights of the agents. Analysis showed the efficacy of the algorithm. © 2015 IEEE.
Banerjee C.,Brainware |
Deepthi N.,SRM University
Proceedings of 2015 International Conference on Robotics, Automation, Control and Embedded Systems, RACE 2015 | Year: 2015
In area coverage problems with multiple agents, team formation turns out quite beneficial. In this paper we propose a team formation algorithm using coalition game theory. We also implement elements from weighted graph games and weighted synergy graphs for making the approach simpler in representation and application. © 2015 Hindustan University.
Banerjee C.,Brainware |
Saxena S.,SRM University
11th IEEE India Conference: Emerging Trends and Innovation in Technology, INDICON 2014 | Year: 2015
Peer- to- peer networks are used extensively today. Due to this wide use P2P networks is a target of malicious attacks. The most mentionable of them is the Sybil attack. Existing approaches for detection and mitigation of Sybil nodes are either computationally costly or are dependent on belief models found in social networks. It has been found that these belief models are themselves vulnerable to other attacks. In this paper, we propose a new type of indirect validation where we have a two stage validation in place to check that if a suspected node is Sybil or not. We crosscheck belief data from local monitor nodes and community detection data from randomly selected global monitor nodes, and then validate a suspected node. The proposed approach is found to be with less computation overheads and less vulnerable to malicious attacks. © 2014 IEEE.
Healthcare financial management : journal of the Healthcare Financial Management Association | Year: 2011
Intelligent data capture is an application that can provide electronic access to data contained in any type of document, including clinical records and financial documents, thereby reducing or eliminating the need for manual data entry. Before implementing this technology, however, healthcare leaders should: Evaluate technology in the context of a business case to ensure a measurable ROI. Communicate with employees throughout the process so they are prepared for and embrace the inevitable changes that will come with automation. Implement the solution in phases, focusing on those document types that can deliver for a safer, less disruptive approach. Achieve maximum benefit to the organization by reengineering business processes to fully leverage technology rather than simply automating existing manual processes.