TATA CONSULTANCY SERVICES LIMITED Patent applications |
Patent application number | Title | Published |
20160140359 | SYSTEM AND METHOD FOR DISTRIBUTED COMPUTATION USING HETEROGENEOUS COMPUTING NODES - This disclosure relates generally to the use of distributed system for computation, and more particularly, relates to a method and system for optimizing computation and communication resource while preserving security in the distributed device for computation. In one embodiment, a system and method of utilizing plurality of constrained edge devices for distributed computation is disclosed. The system enables integration of the edge devices like residential gateways and smart phone into a grid of distributed computation. The edged devices with constrained bandwidth, energy, computation capabilities and combination thereof are optimized dynamically based on condition of communication network. The system further enables scheduling and segregation of data, to be analyzed, between the edge devices. The system may further be configured to preserve privacy associated with the data while sharing the data between the plurality of devices during computation. | 05-19-2016 |
20160140171 | METHOD AND SYSTEM FOR EFFICIENT PERFORMANCE PREDICTION OF STRUCTURED QUERY FOR BIG DATA - Disclosed is a system for predicting an Elapsed Response Time (ERT) of a query to be executed in a production database. The system includes a database emulator module for creating an emulated database based on empty schema derived by extrapolating statistical information from the development environment. The system also includes an execution plan generation module for generating a query execution plan of the query. The system further includes a query classifying module for classifying each sub-query based on the operational parameters into at least one of a full table scan, a primary index scan, a fast index scan and a non-unique index scan. The system also includes a time determination module for executing each sub-query on the emulated database to determine an Input Output (IO) access time and an operator time. Moreover, the system includes an ERT prediction module for predicting the ERT of the query to be executed in the production database based on the IO access time, the operator time, and a network time. | 05-19-2016 |
20160128593 | SELECTION OF ELECTROENCEPHALOGRAPHY (EEG) CHANNELS VALID FOR DETERMINING COGNITIVE LOAD OF A SUBJECT - Disclosed is a method and system for selection of Electroencephalography (EEG) channels valid for determining cognitive load of subject. According to one embodiment, EEG signals are obtained from EEG channels associated with subject performing cognitive tasks are received. Time-frequency features of EEG signals are extracted for a frequency band comprise maximum energy value, minimum energy value, average energy value, maximum frequency value, minimum frequency value, and average frequency value. Weight of an EEG channel associated with time-frequency feature is derived using statistical learning technique. Binary values for EEG channels corresponding to time-frequency feature are assigned using weight of EEG channel associated with time-frequency feature. Intersections of binary values of EEG channels corresponding to maximum energy value and average energy value, minimum energy value and average energy value, maximum frequency value and average frequency value, and minimum frequency value and average frequency value are computed. Unions of intersections are computed, wherein the unions represent EEG channels valid to determine cognitive load of subject. | 05-12-2016 |
20160110931 | METHOD AND SYSTEM FOR PERFORMING CRASH ANALYSIS OF ONE OR MORE VEHICLES - A method and system for crash analysis of one or more vehicles involved in a crash is disclosed. The method may comprise capturing data samples such as a plurality of GPS samples and a plurality of acceleration samples. The method may further comprise generating a trajectory. Moreover, the method may comprise segmenting the trajectory into a macro level segment and further into a micro level segment. The method may further comprise computing at least one macro level score based on the plurality of acceleration samples and the GPS samples. Based on the at least one macro level score, the method may be configured to compute a crash responsibility score for ascertaining crash responsibility. | 04-21-2016 |
20160035039 | SYSTEM AND METHOD FOR RECOMMENDING SERVICES TO CUSTOMERS - The present subject matter discloses system and method for recommending one or more services to customers. At first, the customers and service providers gets registered with the system. Further, customer-activities and entity-activities of one or more entities present in a network of the customer may be monitored. Further, the customer-activities and entity-activities may be processed for determining a current-stage information and life-event associated with the customer. The current-stage information may include behavioral pattern, life-style, liabilities, location, purchasing capability, and assets of the customer. Based on the life-event, one or more future-actions may be determined by the system. Further, the system recommends at least one service of the plurality of services to the customer based on the current-stage information and the one or more future-actions. | 02-04-2016 |
20150379415 | SYSTEM AND METHOD FOR PROCESSING A TRANSACTION - Disclosed is a system and method for processing a transaction. The method comprises receiving an input data from a user. The input data is associated with the transaction. The method further comprises creating a decision tree or a decision table based upon the input data and pre-defined rules. The decision tree comprises a parent node and a child node. The parent node and the child node comprise a first question and a second question respectively presented to the user. The decision table comprises a plurality of criteria/conditions being presented to the user. For each criteria/condition, a conditional response is received from the user. The method further comprises processing the transaction by identifying a solution, stored in a database, based on the decision tree or the decision table. | 12-31-2015 |
20150363515 | A METHOD FOR EFFICIENT DESIGNING AND OPERATING COOLING INFRASTRUCTURE IN A DATA CENTER - A method and system is disclosed for maintaining Power Usage Effectiveness (PUE) of a new data center constant or within narrow range around efficient level during ramping up stage of the data center. The method comprises of capturing a plurality of design and operational parameters of the data center, computing an efficient design for the data center at full occupancy, and maintaining the Power Usage Effectiveness constant or within narrow range around efficient level at a current occupancy during a ramp up period of the data center. | 12-17-2015 |
20150356317 | SYSTEM AND METHOD FOR PROVIDING SENSITIVE INFORMATION ACCESS CONTROL - A system and method enabling information access control of the sensitive information, based on a trust computing platform is provided. The trustworthiness of the information seekers is computed and accordingly the information owner is capacitated to decide upon sharing the information completely or sharing with some perturbation. The objective is to provide the information owner with the ability to decide on sharing its private data with respect to a parameter so that the decision is less subjective. This invention allows minimum leakage of sensitive data and makes information owner aware of the risk of privacy breach when private data is shared. | 12-10-2015 |
20150324912 | QUADRATIC OPTIMUM TRADING POSITIONS FOR ASIAN OPTIONS - A trading position evaluation system for evaluating trading positions that are globally optimum in market measure includes a trading parameters determination module to determine at a trading time instance from amongst a plurality of trading time instances obtained from a trader, a plurality of trading parameters pertaining to a path-dependent Asian option based on ECC data and market data, retrieved from a database. The trading parameters are indicative of information relating to the path-dependent Asian option. Based on the trading parameters, a position evaluation module evaluates a trading position in the underlying asset at the trading time instance based on the plurality of trading parameters to minimize global variance of profit and loss to the trader. | 11-12-2015 |
20150294255 | PERFORMANCE ANALYSIS OF ORGANIZATIONAL PROGRAMS - The present subject matter relates to performance evaluation, and in particular, relates to a parameter-based performance analysis of an organizational program. The method comprises receiving program specification associated with the organizational program. Further, a set of performance parameters may be selected from among a plurality of performance parameters being provided to a user. The plurality of performance parameters pertain to an analysis category. Further, a parameter score for the organizational program, with regard to each of the set of performance parameters, may be determined, based on predefined scoring criteria of the organizational program pertaining to the corresponding performance parameter. Subsequently, an overall performance index may be ascertained by consolidating the parameter score corresponding to each of the set of performance parameters, based on a weight assigned to each performance parameter. The organizational program can be updated, based on at least one of the parameter score and the overall performance index. | 10-15-2015 |
20150269309 | Encoding and Decoding of RNA Data - Systems and methods to enable representation of sequence as well as structural information of an RNA molecule in the form of a single encoded string are described. The encoding steps are based on identifying one or more contiguous stretches of ribonucleotide bases having similar structural attributes and base-pairing patterns. In the encoded string, each of the identified contiguous structure stretches is represented by a single character that indicates the corresponding structural attribute. Appending these structural characters to the corresponding contiguous ribonucleotide character stretches, and subsequently eliminating redundant ribonucleotide characters based on standard base-pairing rules results in generating the final encoded string. Such concomitant representation of sequence and structural information of a given RNA molecule in a single encoded string enables efficient storage and easy dissemination of RNA data. | 09-24-2015 |
20150268955 | SYSTEM AND METHOD FOR EXTRACTING A BUSINESS RULE EMBEDDED IN AN APPLICATION SOURCE CODE - Disclosed is a method and system for extracting a business rule embedded in an application source code. The method comprises creating a call structure of one or more programs present in the application source code by performing a control flow analysis on the application source code. The method further comprises recognizing one or more parent programs and one or more child programs for a parent program. The method further comprises grouping the parent program and the one or more child programs into a group. Also, the method comprises identifying one or more conditional statements. The one or more conditional statements comprise the business rule. The one or more conditional statements are identified by comparing the plurality of conditional statements with pre-defined patterns identified from the application source code, and determining a conditional statement comparing a variable with a hard-coded value. The method further comprises mapping the one or more conditional statements with the business rule. | 09-24-2015 |
20150262295 | QUADRATIC OPTIMUM TRADING POSITIONS FOR PATH-INDEPENDENT - A trading position evaluation system for evaluating trading positions that are globally optimum in market measure includes a trading parameters determination module to determine at a trading time instance from amongst a plurality of trading time instances obtained from a trader, a plurality of trading parameters pertaining to a path-independent European Contingent Claim (ECC) based on ECC data and market data, retrieved from a database. The trading parameters are indicative of information relating to the path-independent ECC. Based on the trading parameters, a position evaluation module evaluates a trading position in the underlying asset at the trading time instance based on the plurality of trading parameters to minimize global variance of profit and loss to the trader. | 09-17-2015 |
20150262097 | SYSTEM AND METHOD FOR MODELLING AND SIMULATING A DECISION MAKING PROCESS OF AN ENTERPRISE - System and method for modelling and simulating a decision making process of an enterprise is disclosed. Data corresponding to a plurality of units in the enterprise is received. For each unit, a unit configuration may be determined. The unit configuration comprises goals of the unit, a set of internal properties of the unit, a set of functions of the unit, events to be handled by the unit, and a composition structure of one or more units to interact with other units of the plurality of units participating to perform a task. Further, a plurality of tuples is specified for the unit configuration. The plurality of tuples of the unit configuration is translated into an executable programming language. Subsequently, the unit configuration is simulated using the executable programming language to analyze decision making of the enterprise corresponding to the plurality of units for the unit configuration. | 09-17-2015 |
20150261959 | PRIVACY MEASUREMENT AND QUANTIFICATION - System(s) and method(s) to provide privacy measurement and privacy quantification of sensor data are disclosed. The sensor data is received from a sensor. The private content associated with the sensor data is used to calculate a privacy measuring factor by using entropy based information theoretic model. A compensation value with respect to distribution dissimilarity is determined. The compensation value compensates a statistical deviation in the privacy measuring factor. The compensation value and the privacy measuring factor are used to determine a privacy quantification factor. The privacy quantification factor is scaled with respect to a predefined finite scale to obtain at least one scaled privacy quantification factor to provide quantification of privacy of the sensor data. | 09-17-2015 |
20150254775 | LOCALLY OPTIMUM TRADING POSITIONS FOR PATH-DEPENDENT OPTIONS - A trading position evaluation system for evaluating trading positions that are locally optimum for a path-dependent European Contingent Claims (ECC) includes an option price determination module to determine a scaled option price and a shifted scaled option price of the path-dependent ECC based on ECC data and market data, retrieved from a database. The scaled option price and the shifted scaled option price are determined at a trading time instance, selected from amongst a plurality of trading time instances obtained from a trader, based on at least one discrete-monitoring time instance occurring before the trading time instance. Based on the scaled option price and the shifted scaled option price, a position evaluation module evaluates a trading position in an underlying asset of the path-dependent ECC at the trading time instance that minimizes local variance of profit and loss to the trader. | 09-10-2015 |
20150230048 | PORTABLE ELECTRONIC DEVICE AND METHOD OF RECORDING MOBILITY OF THE PORTABLE ELECTRONIC DEVICE - The present disclosure generally relates to recording movement of a portable electronic device, and more particularly, to a portable electronic device and methods for recording mobility of the portable electronic device. In one embodiment, a method for recording a mobility of a portable electronic device is disclosed, comprising detecting a movement of the portable electronic device using a first sensor; when the movement exceeds a threshold level, determining velocity, a position coordinate, and a time coordinate of the portable electronic device using a second sensor, wherein the threshold level indicates a pre-configured speed and a pre-configured time period associated with the movement; and recording one or more values corresponding to the determined velocity, the position coordinate, and the time coordinate, the one or more values representing mobility of the portable electronic device. | 08-13-2015 |
20150228128 | SYSTEM AND METHOD FOR GENERATING A DRIVING PROFILE OF A USER - The present disclosure generally relates to driving data monitoring, and more particularly to systems and methods for generating a driving profile of a user based on the driving data. In one embodiment, a method for generating a driving profile of a user is disclosed. The method comprises receiving one or more values corresponding to a plurality of variables. The plurality of variables are associated with driving of a vehicle. The method further comprises determining, based on the one or more values, one or more safety scores corresponding to the plurality of variables. The one or more safety scores are associated with a trip that is completed based on one or more conditions. The method further comprises determining a cumulative safety score for the trip based on the one or more safety scores and determining a driving level of the user to generate the driving profile of the user. | 08-13-2015 |
20150199359 | SYSTEM AND METHOD FOR IDENTIFYING RELATED ELEMENTS WITH RESPECT TO A QUERY IN A REPOSITORY - In one embodiment, a method is disclosed, comprising: receiving a query comprising at least one unrecognized element in a repository; mapping the query with a plurality of knowledge references to identify one or more words comprising one or more elements related to the unrecognized element of the query; identifying the relationship of the unrecognized element and the words, wherein the relationship is derived using a parent and sibling relationship; determining, by the one or more hardware processors, a number of occurrences of the one or more elements related to the unrecognized element; assigning, by the one or more hardware processors, a weight to an element from the one or more elements, wherein the one or more elements are related to the unrecognized element based upon the number of occurrences; and determining, by the one or more hardware processors, a relevance of the query using the weight assigned to the element. | 07-16-2015 |
20150193545 | SYSTEM AND METHOD OF DATA COMPRESSION - This disclosure relates to systems and methods for adaptively compressing data based on compression parameters. In one embodiment, a method for compressing a dataset is disclosed, including filtering a dataset based on occurrence of an event, and determining a quality of information index indicating a measure of quality of the dataset based on a quality of information estimation function. The method may include comparing the quality of information index with a list of indices stored in a lookup table to identify a target quality of information index and corresponding compression parameters, wherein the target quality of information index is indicative of a reference measure of quality of the dataset applicable for deriving statistical inferences based on analysis of the dataset. Also, the method may include inputting the compression parameters in a compression algorithm for compressing the dataset to achieve the target quality of information index for the analysis. | 07-09-2015 |
20150186836 | INVENTORY MANAGEMENT - The present subject matter relates to method(s) and system(s) to manage home inventory based on health of a user. The method comprises obtaining at least one health target for the user, wherein the at least one target is related to at least one health parameter. Further, querying a recipe recommender data to recommend at least one recipe based on the at least one health target. The method further comprises ascertaining the availability of one or more items to be used in the at least one recipe in a home inventory of the user, wherein the availability is ascertained based on an available stock and expiry date, and wherein the available stock of each item from among the one or more items is determined periodically, by using a core analytics engine, to manage the home inventory and health of the user. | 07-02-2015 |
20150178334 | SYSTEM AND METHOD FOR OPTIMIZING MEMORY UTILIZATION IN A DATABASE - The present disclosure generally relates to database management and, more particularly, to systems and methods for optimizing memory utilization of the database. In one embodiment, a method for optimizing memory utilization in a database is disclosed. The method comprises designating a first quantitative value of the plurality of quantitative values as a first epoch associated with a first tuple; determining a first difference between a second quantitative value of the plurality of quantitative values and the first epoch; storing the first difference as a second delta value associated with a second tuple when an absolute value of the first difference is less than a threshold; designating the second quantitative value as a second epoch associated with the second tuple when the absolute value of the first difference is greater than or equal to the threshold; and generating a master tuple. | 06-25-2015 |
20150150020 | SYSTEM AND METHOD FACILITATING PERFORMANCE PREDICTION OF MULTI-THREADED APPLICATION IN PRESENCE OF RESOURCE BOTTLENECKS - The present disclosure generally relates to a system and method for predicting performance of a multi-threaded application, and particularly, to a system and method for predicting performance of the multi-threaded application in the presence of resource bottlenecks. In one embodiment, a system for predicting performance of a multi-threaded software application is disclosed. The system may include one or more processors and a memory storing processor-executable instructions for configuring a processor to: represent one or more queuing networks corresponding to resources, the resources being employed to run the multi-threaded application; detect, based on the one or more queuing networks, a concurrency level associated with encountering of a first resource bottleneck; determine, based on the concurrency level, performance metrics associated with the multi-threaded application; and predict the performance of the multi-threaded application based on the performance metrics. | 05-28-2015 |
20150149766 | SYSTEM AND METHODS FOR FACILITATING AUTHENTICATION OF AN ELECTRONIC DEVICE ACCESSING PLURALITY OF MOBILE APPLICATIONS - Systems and methods for facilitating authentication of an electronic device accessing plurality of mobile applications are disclosed. The system may receive a device public key and authentication information of the electronic device. The system may validate the authentication information to initiate a device session with the electronic device and create an authentication token signed with a server signature. The system may enable the electronic device to access a first mobile application based on the authentication information validated. Further, the system may receive the authentication token signed with a device signature. The system may authorize the authentication token by verifying the device signature and the server signature on the authentication token with a device public key and a server public key respectively. The system may then enable the electronic device to access the second mobile application using the authentication token authorized. | 05-28-2015 |
20150142825 | CONVERTING PROCEDURAL TEXT TO AN ACTIONABLE KNOWLEDGE FORM - Disclosed is method and system for converting text used to perform an operation to reusable actionable knowledge form. Procedural knowledge available in run books is converted into reusable actionable knowledge form. The method comprises structuring the text by performing merging, grouping, editing, removing statements and marking statements present in structured text into action segments, predicates, and comments, by parsing technique and rule based reasoning. Predicate comprise conditions, action segment comprise actionable statements executed upon fulfilling conditions. Actionable statement is used to perform a task of the operation. Action segments are mapped with predicates to generate predicate-action pairs, standard operators relevant to each of conditions of predicate and actionable statements of action segment are selected, and score for standard operators is determined, and a standard operator having highest score is linked with conditions and actionable statements of the predicate-action pair, thereby converting predicate-action pair in reusable actionable knowledge form. | 05-21-2015 |
20150121332 | SOFTWARE PROJECT ESTIMATION - A system and a method related to software project estimation. The method receives a value corresponding to at least one decision parameter including a project type, a technology, a software development life cycle (SDLC) type and a stage of the software project from user. The received value is mapped with techniques associated with each of estimation parameters including a size parameter, an effort parameter, a cost parameter, and a schedule parameter in a decision matrix. Based on the mapping, one or more techniques for each estimation parameter are shortlisted, and a success rating factor for each shortlisted technique is evaluated based on historical data to identify a primary set of techniques. Compatibility of the primary set of techniques is then determined based on an interoperability factor to identify at least one secondary set of techniques providing optimum estimate of the software project. | 04-30-2015 |
20150120912 | AUTOMATED GENERATION AND DYNAMIC UPDATE OF RULES - The present subject matter relates to monitoring of an environment using data trend analysis. The method comprises obtaining at least one data trend pertaining to at least one data stream for a pre-defined period of time. The at least one data trend is indicative of a pattern followed by the at least one data stream. Further, at least one delta value pertaining to the at least one data stream may be computed, the at least one delta value being indicative of a deviation in the at least one data stream with respect to the at least one data trend at a specific time instance. Furthermore, at least one relationship between a plurality of data streams is identified based on the at least one data trend and identity metadata associated with each data stream. Based on the at least one delta value and the at least one relationship, at least one rule is generated. | 04-30-2015 |
20150113364 | SYSTEM AND METHOD FOR GENERATING AN AUDIO-ANIMATED DOCUMENT - The present disclosure relates to document generation, and more particularly to a system and method for generating an audio-animated document. In one embodiment, a method for generating an audio-animated document is disclosed, comprising: obtaining an extensible markup language (XML) file from a database, wherein the XML file comprises data corresponding to transactional activities over a time interval; identifying a set of phrases and one or more images from a resource library based on the XML file; generating a playback text using the set of phrases, the one or more images, the data, and a set of rules; providing one or more audio files corresponding to the playback text; and generating the audio-animated document based on the data, the one or more images, and the one or more audio files. | 04-23-2015 |
20150081620 | Component Based Approach to Building Data Integration Tools - A method facilitating interoperability across the integrating platforms is provided by composing purpose specific integrating tools using conceptual modeling framework and a set of primitive foundational components. The model driven architecture provides easy migration from one solution architecture to another. Also, the present invention discloses a method to migrate from one implementation to another using set of composed purpose specific integration tools. | 03-19-2015 |
20150073835 | SYSTEM AND METHOD FOR GENERATING AN INSURANCE QUOTE OF A PROPERTY IN REAL-TIME - The present subject matter described herein, in general, relates to insurance, and more particularly to a system and method for generating an insurance quote of a property in real-time. In one embodiment, a real-time insurance quote generation method is disclosed, comprising: obtaining a user selection, via a single action, of a property displayed on a map via a user interface of a device; determining an address of the property using at least geo co-ordinate details; collating data associated with the property from a plurality of data sources; assessing one or more risk factors associated with the property and underwriting the property based upon the data; computing, via a processor, an insurance quote for the property by using at least one of the data or the one or more risk factors; and providing the insurance quote. | 03-12-2015 |
20150072335 | SYSTEM AND METHOD FOR PROVIDING AUGMENTATION BASED LEARNING CONTENT - The present subject matter discloses a system and a method for providing augmented based learning content to a user. In one embodiment, based on a learning source accessed by the user, the system is enabled to extract topics for retrieving learning content from online or offline resources such as the Internet or a system database, respectively. Thus, the learning source may be augmented by retrieving the learning content from the online or offline sources. Further, information layers may be generated based on topics/subjects being read by the user. The generated information layers may be populated with the retrieved learning content. The system may be enabled for matching the learning content populated in the information layers with a profile of the user stored in a user profile database. Based on the matching, the learning content may be delivered to the user. The delivered learning content may be personalized to the user. | 03-12-2015 |
20150067646 | System and Method to Predict Elapsed Response Time for a Query during Application Development Stage - A system, method and computer program product to predict elapsed response time of a query during an application stage is disclosed. The query is executed over a database and is classified based on a mode of access of the database by the query. The database is emulated to obtain an emulated database. After classification, an access pattern of the database by the query along with one or more parameters is determined. By applying a classification specific technique over the access pattern and the one or more parameters, an input-access time of the query on the emulated database is then calculated to determine the elapsed response time of the query. | 03-05-2015 |
20150067480 | SYSTEM AND METHODS FOR DESIGNING ARTIFACTS ASSOCIATED WITH A WEBPAGE - The present disclosure generally relates to systems and methods for designing webpage and, more particularly, to systems and methods for designing artifacts associated with a webpage in a web development environment. In one embodiment, a system for designing artifacts associated with a webpage is provided. The system may identify a style pattern based on an HTML pattern of the webpage and one or more boundary conditions. The system may also determine one or more editing operations to be performed on the artifacts based on one or more style specifications. The system may further perform the one or more determined editing operations on the artifacts based a value associated with one or more of the artifacts, the style pattern, and the boundary conditions, and render design of the artifacts based on the performance of the editing operations. | 03-05-2015 |
20150067451 | System and Method for Optimizing Luby Transform (Lt) Codes To Facilitate Data Transmission Over Communication Network - A system(s), method(s) and computer program product to optimize Luby Transform codes to facilitate a transmission of data over a communication network are disclosed. Demands from various sinks are received and a demand vector is calculated. Various sources are employed with LT codes to encode the data. A Generalized LT code (GLT) is generated for an objective function determined for a given demand vector irrespective of the LT codes employed at the sources. Morphing rules are designed by optimizing a degree distribution of the data and mapping LT codes to the generalized LT codes. The GLT is optimized by using a linear transformation to obtain optimal morphing rules. The LT codes are retargeted by re-encoding an LT encoded data to further obtain an LT re-encoded data. The LT re-encoded data is then transmitted by a relay device to plurality of sinks. | 03-05-2015 |
20150067410 | HARDWARE FAILURE PREDICTION SYSTEM - The present subject matter discloses a method for predicting failure of hardware components. The method comprises obtaining a syslog file stored in a Hadoop Distributed File System (HDFS), where the syslog file includes at least one or more syslog messages. Further, the method comprises categorizing each of the one or more syslog messages into one or more groups based on a hardware component generating the syslog message. Further, a current dataset comprising one or more records based on the categorization is generated, where each of the one or more records include a syslog message from amongst the one or more syslog messages. The method further comprises analysing the current dataset for identifying at least one error pattern of syslog messages, based on a plurality of error patterns of reference syslog messages, for predicting failure of the hardware components. | 03-05-2015 |
20150052504 | METHOD AND SYSTEM FOR VERIFYING SLEEP WAKEUP PROTOCOL BY COMPUTING STATE TRANSITION PATHS - Disclosed are a method and a system for facilitating verification of program code implementing Sleep Wakeup protocol for a microcontroller. An input handling module is configured to receive metadata from user required for verification of the program code. Identification module is configured to identify abstract syntax tree (AST) nodes corresponding to each program point in the program code. A computation module is configured to compute an actual interrupt protection status (IPS), task lock status (TLS), path entities and shared variables for each program point in the program code. A path analysis module is configured to determine transition paths between program points specified in the metadata, and are computed in terms of the path entities. Also, review information is computed for each of the path entities comprised in the transition paths. Further, a report generation module is configured to generate a report comprising the review information facilitating the user to verify the program code. | 02-19-2015 |
20150051940 | SYSTEMS AND METHODS FOR SUPPLY CHAIN DESIGN AND ANALYSIS - Systems and methods for supply chain design and analysis to optimize costs associated with a supply chain are described. According to an embodiment, the supply chain management system comprises a data extraction module, an analysis module, and a presentation module coupled to a processor. The data extraction module obtains supply chain data from one or more data sources. The analysis module analyzes a plurality of parameters and at least one future state map to ascertain at least one business scenario. Further, the analysis module identifies flow constraints in the at least one business scenario based on a flow analysis. Further, the analysis module selects decision parameters from amongst the plurality of parameters based on the flow constraints and a simulation feedback. Further, the analysis module simulates at least one experimental design based on the decision parameters. Furthermore, the presentation module generates, a plurality of maps based on visual analytics. | 02-19-2015 |
20150048272 | NANOFLUIDS FOR HEAT TRANSFER APPLICATIONS - According to an implementation of the present subject matter, a method for producing stable nanofluids is described. The method includes mixing of a base fluid with a dispersant and a metal oxide powder to form a primary mixture. The base fluid is a heat transfer fluid and the metal oxide powder includes particles of size greater than 100 nm. The method further includes grinding the primary mixture to obtain a concentrated nanoparticle suspension where the dispersant is added to the primary mixture during the grinding after every pre-determined time period. | 02-19-2015 |
20150046393 | METHOD AND DEVICE FOR EXECUTING AN ENTERPRISE PROCESS - The present subject matter relates to execution of an enterprise process through an electronic device. In one embodiment, an enterprise process execution method is disclosed, comprising: replicating data from a centralized database in a local database; creating a first set of data fields based on a first set of rules, wherein the first set of data fields is populated with a first set of data values retrieved from the local database based on a second set of rules; dynamically creating a second set of data fields populated with a second set of data values, wherein each data field of the second set of data fields is dynamically created based on a data value of a previous data field; validating the second set of data fields; and synchronizing the local database storing a report including information associated with execution of an enterprise process with the centralized database. | 02-12-2015 |
20150032679 | SYSTEMS AND METHODS FOR SIGNAL DETECTION - Systems and methods for signal detection are described. The method comprises obtaining, by a data processing module, data from one or more data sources. The method further comprises standardizing the data, by the data processing module, based on at least one template to obtain standardized data. The standardized data have data properties depicting a format and a size of the data. Further, the method comprises determining, by an analysis module, one or more detection rules based on at least one of recommendation data and the data properties of the standardized data. The method further comprises detecting, by the analysis module, at least one present in the standardized data based on the one or more detection rules. | 01-29-2015 |
20150029950 | UPLINK TRANSMISSION SCHEDULING FOR WIRELESS COMMUNICATION NETWORKS - A method for uplink scheduling over a communication channel in a communication network including at least one UE and an eNodeB, is described. The method comprises determining whether the UE is associated with at least one of Guaranteed Bit Rate (GBR) bearers and non-Guaranteed Bit Rate (non-GBR) bearers. Based on the determining, for each of the GBR-bearers and the non-GBR-bearers, computing a demand for resources for establishing an uplink communication, wherein the demand is computed based physical layer characteristics and transport layer characteristics associated with the communication channel. The demand computed is communicated as a request message to the eNodeB. In response to the request message, receiving an allocation of the resources for uplink scheduling from the eNodeB. | 01-29-2015 |
20150016617 | MODIFIED MEL FILTER BANK STRUCTURE USING SPECTRAL CHARACTERISTICS FOR SOUND ANALYSIS - A system and method for detection of sound of interest amongst plurality of other dynamically varying sounds is disclosed. In one embodiment, a spectrum detector identifies dominant spectrum energy frequency by detecting the dominant spectrum energy band present in spectrum of sound energy. A modified mel filter bank is designed by revising spectral positioning of the first mel filter bank and the second mel filter bank according to the identified dominant frequency. A feature extractor extracts the features from first mel filter bank, second mel filter bank and the modified mel filter bank which are further classified in order to detect the sound of interest. | 01-15-2015 |
20150009857 | NETWORK RESOURCE OPTIMIZATION IN COMMUNICATION NETWORKS - System(s) and method(s) for network resource optimization in a service area of a communication network are described. The method includes dividing a service area into a plurality of sub-areas, where each of the plurality of sub-areas is serviced by at least one network resource from a pre-determined number of network resources. The method further includes determining a locally optimal deployment solution comprising at least one local allocation attribute for the at least one network resource in each of the plurality of sub-areas, to meet a plurality of objectives for network resource optimization. The method further includes obtaining a globally optimal deployment solution comprising at least one global allocation attribute for allocation of the pre-determined number of network resources in the service area, based on the locally optimal deployment solution to meet the plurality of objectives. | 01-08-2015 |
20140380264 | Computer Platform for Development and Deployment of Sensor-Driven Vehicle Telemetry Applications and Services - A computing platform for intelligent development, deployment and management of vehicle telemetry applications is disclosed herein. Further, the present disclosure provides a method and system that enables provision of Intelligent Transportation Service on the Cloud-based Platform that facilitates creation and deployment of vehicle telemetry applications configured for enabling traffic measurements, traffic shaping, vehicle surveillance and other vehicle related services. | 12-25-2014 |
20140379485 | Method and System for Gaze Detection and Advertisement Information Exchange - Disclosed is a method and system for displaying a content published on a broadcasting device to a user. The system comprises a plurality of sensors deployed around the user. The system further comprises an image capturing module to capture the content along with a first metadata. An activity capturing module is configured to capture one or more behavioral activity data along with a second metadata. In one aspect, the one or more behavioral activity data is indicative of interest of the user in the content and the second metadata is associated with the one or more behavioral activity data. An analytics engine is configured to analyze the first metadata and the second metadata to determine a subset of content of the content that may be relevant to the user. A display module is configured to display the subset of content on a display device for reference of the user. | 12-25-2014 |
20140379259 | METHOD AND SYSTEM FOR PROVIDING TOURIST ASSISTANCE AND GUIDED NAVIGATION BY METADATA TRANSMISSION - The application provides a method and system for providing tourist assistance and guided navigation of a tourist spot by transmitting metadata across a communication network. The application provides a method and system for utilizing a beyond audible frequency signal for metadata transmission across a communication network. The application provides a method and system for emitting an encoded metadata over the beyond audible frequency signal, receiving and parsing the said received encoded metadata, extracting and decoding barcode received along with encoded metadata and retrieving the tourist information by accessing a web link received along with encoded metadata for plurality of web based services. | 12-25-2014 |
20140375567 | EVALUATING ONSCREEN KEYBOARD - Disclosed are methods and systems for evaluating onscreen keyboards. The method comprises receiving a first set of parameters and a second set of parameter associated with a first onscreen keyboard and a second onscreen keyboard, respectively. The method further comprises determining a first cognitive score for the first onscreen keyboard using the first set of parameters. The method further comprises determining a second cognitive score for the second onscreen keyboard using the second set of parameters. The method further comprises validating the first cognitive score and the second cognitive score using an Electroencephalography (EEG) signal of the user. The EEG signal of the user is captured while the user is using the first onscreen keyboard and the second onscreen keyboard. | 12-25-2014 |
20140369561 | SYSTEM AND METHOD FOR ENHANCING HUMAN COUNTING BY FUSING RESULTS OF HUMAN DETECTION MODALITIES - The present invention discloses a method and a system for enhancing accuracy of human counting in at least one frame of a captured image in a real-time in a predefined area. The present invention detects human in one or more frames by using at least one human detection modality for obtaining the characteristic result of the captured image. The invention further calculates an activity probability associated with each human detection modality. The characteristic results and the activity probability are selectively integrated by using a fusion technique for enhancing the accuracy of the human count and for selecting the most accurate human detection modality. The human is then performed based on the selection of the most accurate human detection modality. | 12-18-2014 |
20140365396 | COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR FACILITATING A BOARD MEETING - The present disclosure generally relates to systems and methods for facilitating a meeting, and more particularly, to systems and methods for facilitating a board meeting using a portable device. In one embodiment, a method for facilitating a meeting is disclosed, comprising: providing a Graphical User Interface customized for a meeting member, wherein the Graphical User Interface is capable of displaying meeting details as one or more navigable images; enabling searching for the meeting details or one or more encrypted documents based on at least one of a search string or a voice command; receiving one or more annotations from one or more other meeting members relating to the meeting details or the one or more documents; and facilitating communication among at least two of the meeting members using at least one of: an email, an online chat, or sharing of a display of the portable device. | 12-11-2014 |
20140351790 | INTERNET OF THINGS (IOT) APPLICATION DEVELOPMENT - An application development system for development of Internet of Things (IoT) application includes a cataloging module to obtain an input from an application developer. The input comprises data related to the IoT application to be developed. The cataloging module further retrieves a plurality of reusable artefacts from a knowledge database based on the input. A recommendation module in the application development system recommends, to the application developer, artefacts from amongst the plurality of reusable artefacts, based at least on one of a feedback associated with each of the plurality of reusable artefacts, an expert analysis, and a combination of the expert analysis and the feedback. An association module in the application development system associates artefacts selected by the application developer with each other for development of the IoT application. | 11-27-2014 |
20140351184 | USER SPECIFIC PLAN GENERATION METHOD AND SYSTEM - The present invention envisages a personalized plan generation system and a method that satisfies maximum user preferences and constraints; besides including a number of enabling features like of plan repair or revision with dynamically changing situations or contextual information. Moreover, the system is able to perform a collaborative planning by opinion mining in social networks to achieve better optimization. Significantly, the explanation for the selection of plan steps or a change in plan altogether can be expressed in natural language. | 11-27-2014 |
20140351043 | System and Method to Build External Facing Information Platform to Generate Target List of Entities - Disclosed is a method and system to process data collected from different sources to generate target list of entities. The system comprises plurality of modules comprising integration module, data filtering module, privacy regulation module, analytical module and campaign execution module. Integration module integrates source databases to collect and store data in base data layer. Data filtering module pulls data and filter data to store informative data in data store. Privacy regulation module filters sensitive data to prepare informative data by applying privacy technique. Analytical module analyzes informative data and generates analytical score. Campaign execution module generates target list of entities by processing informative data with analytical score based on user's request. User accesses informative data and analytical score through user interface wherein sensitive data associated with entity is hidden. Campaign is executed for target list of entities wherein entities are contacted to offer services from user. | 11-27-2014 |
20140351003 | SYSTEM AND METHOD FOR COMPUTATION OF VALUE REALIZATION INDEX - System and Method for computing a value realization index for Information Technology (IT) services is disclosed. According to the system and the method, a data receiving module may be configured for receiving input data indicative of monetary value invested by a use on the IT services. Further, computational weights for qualities associated with the IT services may be received from the user. A data normalization module may be configured for normalizing the computational weights. A metric capturing module may be configured for capturing quality metrics for the qualities and the business metrics for the IT services. A metric mapping module may be configured for mapping the quality metrics with the business metrics using the normalized computational weights and domain benchmark values. A derivation module may be configured for deriving a business value. An index computation engine may be configured for computing the value realization index for the IT services. | 11-27-2014 |
20140348420 | METHOD AND SYSTEM FOR AUTOMATIC SELECTION OF ONE OR MORE IMAGE PROCESSING ALGORITHM - Disclosed is a method and system for automatic algorithm selection for image processing. The invention discloses the method and system for automatically selecting the correct algorithm(s) for a varying requirement of the image for processing. The selection of algorithm is completely automatic and guided by a plurality of machine learning approaches. The system here is configured to pre-process plurality of images for creating a training data. Next, the test image is extracted, pre-processed and matched for assessing the best possible match of algorithm for processing. | 11-27-2014 |
20140344774 | SOFTWARE PRODUCT CONSISTENCY ASSESSMENT - A consistency assessment system for assessment of consistency of a software product includes a mapping module to obtain a plurality of configuration elements associated with the software product being developed, where each of the plurality of configuration elements influence software product development. Each of the plurality of configuration elements pertains to one of a plurality of element categories influencing software product development. The mapping module further identifies based on one or more identifiers, association of at least one configuration element from among the plurality of configuration elements with at least one another configuration element from among the plurality of configuration elements. Upon identification, an assessing module determines a requirement consistency index (RCI) for assessment of consistency of the software product. The RCI indicates an overall consistency of the software product. | 11-20-2014 |
20140344651 | SYSTEM AND METHOD FOR VARYING MEMORY SIZE IN A DATA STREAM PROCESSING - The present disclosure relates to methods, systems, and computer-readable media for varying a memory size in a data stream processing while improving a connection degree sketch. Embodiments of the present disclosure may encode an input data by using an error coding technique to produce an encoded data, wherein the encoded data results in a modified memory size; generate a host connectivity using a set of parameters and applying a reverse sketching technique over the encoded data in order to obtain estimated encoded data; and decode the encoded data after the host connectivity is established using a decoding technique and obtaining an output data. The memory size of the output data may be proportional to the memory size of the input data. | 11-20-2014 |
20140344120 | PAY CODE CONFIGURATION - A method for pay code configuration comprises obtaining one or more pay code parameters and one or more eligibility parameters by a processor. The eligibility parameters indicate eligibility criteria for an employee to be eligible for remunerations corresponding to a particular pay code as a part of the employee's net pay. The pay code parameters are used for computing the remuneration corresponding to the particular pay code. An eligibility rule is generated by the processor based on the eligibility parameters for determining whether the employee is eligible for the remunerations corresponding to the particular pay code. Further, a pay code calculation formula is defined by the processor based on the one or more pay code parameters for calculating the remuneration. Furthermore, the eligibility rule and the pay code calculation formula are mapped to a payroll system of an organization by the processor for configuring the pay code. | 11-20-2014 |
20140344063 | Intelligent Communication and Advertising Mechanism - Disclosed is a system and method for exchanging information between a mobile device and a physical advertising medium, such as a billboard. The method and system enables a pluggable device, coupled with the mobile device, to detect the mobile device within its vicinity of the physical advertising medium. On detection of the mobile device, the pluggable device establishes a handshake communication channel with the mobile device by authorizing the mobile device. Upon authorizing the mobile device, the pluggable device initiates the advertisement information exchange between the physical advertising medium and the mobile device in a non-intrusive manner. In one aspect, the method and system further enables the mobile device to relay the advertisement information to other mobile devices or any other physical advertisement mediums within its vicinity. | 11-20-2014 |
20140344003 | System and Method for Accelerating Information Technology Organization's Process Definition and Facilitating Process Deployment - Disclosed are a method and a system for accelerating process definition journey and request received pertaining to a project. The method comprises receiving a request from an employee of the plurality of employees. The method further comprises generating automatically a process layout based upon the request. The process layout comprises processes capable of enabling the employee to complete the project by availing step by step guidance covering entire lifecycle of the project complied with CMMI DEV version 1.3 and CMMI SVC version 1.2. Further, the method comprises displaying the processes to the employee on the I/O interface, upon following the processes and its associated enablers thereby ensuring comprehensive and successful completion of the project within budget, schedule, and with quality facilitating process deployment for an Information Technology (IT) organization. | 11-20-2014 |
20140343916 | VIABLE SYSTEM OF GOVERNANCE FOR SERVICE PROVISIONING ENGAGEMENTS - Systems and methods for governing execution of a service provisioning engagement are described. In one implementation, the described methods are implemented in the systems, where the method includes determining a customized schema based on a viable systems model, where the customized schema is defined using a plurality of dimensions and a plurality of sub-dimensions, where the plurality of dimensions and the plurality of sub-dimensions is defined using a plurality of parameters. The method also includes determining a system dynamics model which defines relationship between the plurality of parameters of the customized schema. The method further includes setting targets for at least one parameter from amongst the plurality of parameters of the customized schema and simulating the at least one parameter interactively based on the system dynamics model. | 11-20-2014 |
20140341439 | Identification of People Using Multiple Skeleton Recording Devices - Method(s) and system(s) for identification of an unknown person are disclosed. The method includes receiving skeleton data comprises data of multiple skeleton joints of the unknown person from skeleton recording devices. The method further includes extracting G gait feature vectors from the skeleton data. Further, the method includes classifying each gait feature vector into one of N classes based on a training dataset for N known persons and computing a classification score for each class. The method also includes clustering the training dataset into M clusters based on M predefined characteristic attributes of the known persons, tagging each gait feature vector with one of the M clusters based on a distance between a respective gait feature vector and cluster centers of M clusters, and determining a clustering score for each M cluster. The method further includes identifying the unknown person based on clustering scores and classification scores. | 11-20-2014 |
20140325149 | METHOD AND SYSTEM FOR CONSOLIDATING A PLURALITY OF HETEROGENEOUS STORAGE SYSTEMS IN A DATA CENTER - A system and method for consolidating a plurality of heterogeneous storage systems in a data center comprising collecting data from a plurality of heterogeneous storage devices ( | 10-30-2014 |
20140324709 | PATENTABILITY DETERMINATION - The present subject matter discloses systems and methods for patentability determination of an inventive idea in an organization. In one implementation, the method for patentability determination in the organization comprises receiving high-level functionalities and granular-level functionalities of the inventive idea at a patentability determination system from an end user. Next, the end user provides importance-level inputs for each of the granular-level functionalities at the patentability determination system. The method further comprises receiving matching-level inputs for each of the granular-level functionalities against prior art documents at the patentability determination system from a plurality of evaluators. Based on the importance-level inputs and the matching-level inputs, an overall patentability index value of the granular-level functionalities is calculated. The overall patentability index value of the granular-level functionalities is then compared with a predetermined threshold to determine patentability of the inventive idea. | 10-30-2014 |
20140317687 | METHOD AND SYSTEM FOR TRUST MANAGEMENT IN DISTRIBUTED COMPUTING SYSTEMS - A method and system for determining trustworthiness of individual nodes in distributed computing systems by considering the various malicious behaviors of the individual nodes as trustworthiness parameters. The invention provides a method and system that explores the behavioral pattern of the malicious nodes and quantifies those patterns to realize the secure trust management modeling. The invention also provides a method and system to distinguish between malicious node, defective node and accuser node. | 10-23-2014 |
20140317601 | SYSTEM AND METHOD FOR CREATING VARIANTS IN A TEST DATABASE DURING VARIOUS TEST STAGES - System and methods for creating one or more variants of test data during various test stages are disclosed. The system and methods facilitate a user to create a primary variant for test data and to store the primary variant of the test data in a test data variant repository. Any changes performed in the test database by the user are identified by using a tracking mechanism to store one or more new variants along with a variant number with respect to the changes performed in the test database in response to the user's request. The primary variant and the new variants are accessed by the user to perform a comparative analysis and to modify the test data at any test stage. | 10-23-2014 |
20140316576 | System for Optimizing and Controlling Particle Size Distribution And For Scale-Up Of Nanoparticle Production In An Aerosol Flame Reactor - The present invention relates to a system for optimizing and controlling the particle size distribution and scale-up of production of nanoparticle in an aerosol flame reactor. The method provides nanoparticles with desired, optimized and controlled particle size and the specific surface area in aerosol reactors using a simulation tool with programmed instructions. The simulation tool couples flame dynamics model and particle population balance model. | 10-23-2014 |
20140308634 | METHOD AND SYSTEM FOR ACTUALIZING PROGRESSIVE LEARNING - Disclosed herein is a web-based learning apparatus and a method for progressive learning. The apparatus and a method enables identifying a learning flow pattern of the user for a particular topic by mapping the synchronicity of events with interest graphs in similarity sets. Further, the shift in user learning pattern and interest graph is recorded to enable the system derive an updated learning matrix of the user that is capable of presenting and recommending to the user of new expanded matrix comprising topics of his evolving interest. | 10-16-2014 |
20140307968 | METHOD AND APPARATUS FOR AUTOMATIC GENRE IDENTIFICATION AND CLASSIFICATION - An automated method for classifying a video frame into different genre based on the statistical analysis of different text rich video frames. The method of the present invention applies a statistical method to classify the genre based on the text in the video frame. | 10-16-2014 |
20140298456 | SECURING APPLICATIONS FOR COMPUTING DEVICES - Systems and methods for securing hybrid applications for computing devices are described. According to the present subject matter, the system(s) implement the described method(s) for building and execution of secure hybrid applications. During build of the hybrid application, the disclosed method may incorporate identifying of at least one non-native file of the hybrid application, generating a primary Unique Identifier (UI) associated with the at least one non-native file, and storing the generated primary UI as a part of the hybrid application to form a secure hybrid application. During execution of the secure hybrid application the disclosed method may incorporate identifying of at least one non-native file of the secure hybrid application, generating a secondary UI associated with the at least one non-native file, extracting primary UI stored in the secure hybrid application. The system/method may further implement determining whether the generated secondary UI is different from the extracted primary UI. | 10-02-2014 |
20140298380 | AUTOMATED STATUTORY WARNING SYSTEM TO DISPLAY DISCLAIMERS - Disclosed is a method and system for real time appending at least one electronic message in at least one video stream. The system includes a channel identification module, a signal processing module, a decision module and a message appending module. The channel identification module is configured to identify at least one channel broadcasting the at least one video stream comprising at least one video frame. The signal processing module is configured to perform signal processing analysis on the at least one video frame to detect a plurality of objects associated with at least one content. The decision module is configured to validate the presence of the at least one content by contextually correlating at least one object with at least one other object from the plurality of objects. The message appending module is then configured to append the at least one electronic message in the at least one video stream. | 10-02-2014 |
20140298294 | System and Method for Analyzing Software Application in View of Entry Points - The present disclosure provides a system and method for performing an analysis of a software application in a computing environment. A receiving module accepts source code of the software application as input data and obtains a list of the entry points. Intermediate representation from the input data is generated in order to construct informative structure for the software application. Uncalled functions in the software application are identified and are considered as entry points. The entry points are wrapped into one entry point and analyzed maintaining calling context of all the entry points. | 10-02-2014 |
20140298038 | GENERATION OF RANDOMIZED MESSAGES FOR CRYPTOGRAPHIC HASH FUNCTIONS - Method(s) and system(s) for generation of randomized messages for cryptographic hash functions are described herein. The method includes obtaining a random value based on a randomization criterion to randomize a message. Further, a last data block of the message is populated with a randomization parameter to obtain a randomized message. The randomization parameter populated in the last block is computed using the random value. | 10-02-2014 |
20140297841 | MONITORING SOLUTIONS FOR A COMPUTING-BASED INFRASTRUCTURE - Systems and methods for generating and implementing monitoring solutions for a computing-based infrastructure are described. In one implementation, at least one monitoring objective is obtained, wherein the monitoring objectives are based on service related requirements associated with one or more computing systems within the computing-based infrastructure. Once the monitoring objectives are obtained, a plurality of monitoring elements are received, wherein the monitoring elements include attributes associated with the one or more systems. Based on the monitoring objectives and the monitoring elements, a monitoring solution is generated. | 10-02-2014 |
20140297528 | METHOD AND SYSTEM FOR VALIDATING PERSONALIZED ACCOUNT IDENTIFIERS USING BIOMETRIC AUTHENTICATION AND SELF-LEARNING ALGORITHMS - A system and method for biometric authentication of a user using a personalised identification and associated biometric data therewith is disclosed. In one embodiment, a plurality of personalised identifiers and biometric data may be captured from a number of users and stored in a repository as stored records. The process of authentication may be divided into two phases. In the first phase, either a speech recognition or character recognition process may be applied in order to determine the text spoken or written by the user. Subsequently a few records may be fetched from the repository on the basis of text mapping. In the second phase, biometric authentication may be performed by comparing the biometric sample with the stored biometric data corresponding to the fetched records to uniquely identify a single user. Further a machine learning technique may be applied in order to periodically refine a plurality of models stored in the repository. | 10-02-2014 |
20140297352 | USER SEGMENTATION FOR COST-BASED DEPLOYMENT OF ENTERPRISE INFRASTRUCTURE - Described herein, is a method for user segmentation for cost-based deployment of enterprise infrastructure. According to an implementation, for each of the users, a user fingerprint (UFP) score set comprising rating scores that quantify levels of enterprise-level needs of the each user is determined. For each of deployment solutions of the enterprise, a deployment fingerprint (DFP) score set comprising rating scores that quantify levels of capabilities of the each deployment solution enabled to meet enterprise-level needs of the users is determined. The users are grouped into user segments based on the UFP score sets of the users. A definition of each of the user segments is determined. The definition is indicative of a user whose enterprise-level needs define characteristics of the corresponding user segment. A number of user segments is found based on a cost associated with the deployment solutions for the user segments. | 10-02-2014 |
20140295381 | RETIREMENT PLANNING GAME - Disclosed is method and system for educating at least one player about financial planning through a financial planning game. In one implementation, to start the game, the player inputs player-associated data, based upon a plurality of life-stages and scenario for each life-stage to be configured. The scenario further comprises incomes and expenses. At first life-stage, the player is prompted for investing disposable income in financial fund, where the disposable income is an amount left after deducting the expenses from the incomes. After investing the disposable income, the player is navigated through each life-stage and corresponding scenario presented to the player for which the player-response data is captured. The player-response data represents the player's strategy in deciding on the incomes to be spent over the expenses and the disposable income invested in the financial fund. Based on the player-response data, financial information is generated providing growth information pertaining to the financial fund. | 10-02-2014 |
20140294177 | IDENTITY BASED PUBLIC KEY CRYPTOSYSTEM - A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (φ(n)), where the private_IGTABLE includes a plurality of random numbers (x). Further, a public_IGTABLE based on the private_IGTABLE, a composite number (n), and a group generator element (g) is generated, where the public_IGTABLE includes a corresponding modular exponentiation under modulo n for each of the plurality of random numbers with g as base. Further, a public key of a user is computed based on the public_IGTABLE, an identity number (ID) corresponding to the user, and n. Further, a secret key of the user is generated based on the ID, a master private key, the φ(n), and the private_IGTABLE. Thereafter, the cryptographic parameters are provided to the user for performing encryption and decryption, where the cryptographic parameters include at least one of the ID, the public key, and the secret key. | 10-02-2014 |
20140290570 | COATING APPARATUS - Disclosed is a method for producing a coated substrate using a compact, easy to handle and automated coating apparatus that can prepare coated composite in a single batch process, with sufficient control over each portion of the coating apparatus. The coating apparatus may include a coating unit, a drying unit and a pressing unit sequentially arranged in a single line to produce the coated substrate. | 10-02-2014 |
20140289175 | System and Method for Determining an Expert of a Subject on a Web-based Platform - Disclosed is a system for determining an expert of one or more subjects on a web-based platform. The system comprises a mining module for mining activity data of at least one user of a plurality of users from the web-based platform. The mining module may further compare the activity data with one or more subjects. The mining module may further label the activity data to a subject of the one or more subjects. A scoring module may assign performance points to the at least one user associated to the activity data. The scoring module may further assign subject points to the subject. The scoring module may further generate an activity gauge for the at least one user based on the performance points assigned and the subject points. The scoring module may further classify the at least one user as the expert of the subject. | 09-25-2014 |
20140289159 | OPEN SOURCE SOFTWARE PRODUCTS ASSESSMENT - An assessment system for assessment of Open Source Software (OSS) products including a computation module configured to receive a rating, for product criterions of each OSS product from an assessor, based on product parameters of each of the OSS products. The product criterions are associated with one or more product categories. The computation module is further configured to compute a product weighted score for each product criterion based at least on the rating and then generates a product scorecard for each OSS product. Upon generation of the product scorecards, an assessing module is configured to identify an optimum OSS product amongst the OSS products based on the assessment of the product scorecard and a benchmark scorecard of an OSS product. | 09-25-2014 |
20140289108 | System, Method, Article of Manufacture of Mixed Reality Based, Biometrically Signed Reusable Physical Financial Instrument - The present invention relates to a reusable physical financial instrument and a system and a method for enabling the financial instrument to perform multiple financial transactions. The financial instrument is capable of creating mixed reality experience when it comes in vicinity of the payor or payee device or ATM. Through the created mixed reality experience, the payor and the payee inputs payor-side and payee-side transaction and biometric data which are stored onto smart chip of the instrument and/or on Cloud Storage using cloud computing interface. The stored payor-side and payee-side transaction data are cross-validated and their biometric data is further verified against golden copy at the respective financial institutions or at the Central Authority's repositories for performing the financial transaction. Upon completing the transaction, the payor-side and the payee-side data is erased, deleted or invalidated from the smart chip, thus making the financial instrument reusable for performing another transaction. | 09-25-2014 |
20140289007 | SCENARIO BASED CUSTOMER LIFETIME VALUE DETERMINATION - A method and system for determining customer lifetime value (CLV) for a business is described. The method may include receiving, from a user, inputs associated with a plurality of parameters. The plurality of parameters correspond to customer transactions. The method may further include determining, based on the received inputs, a CLV base model applicable for the business. The CLV base model is determined from amongst a plurality of pre-defined CLV base models. Further, the method may include identifying at least one market scenario from amongst a plurality of pre-configured market scenarios for the business. Each of the plurality of pre-configured market scenarios are based on a combination of the plurality of parameters. The method may also include computing a consolidated CLV for the business based on the determined CLV base model and the at least one identified CLV scenario model. | 09-25-2014 |
20140288766 | Real-Time Monitoring of Vehicle - A monitoring unit for vehicle monitoring comprising a receiving module configured to receive data from an OBD, wherein the data is associated with a plurality of jerks detected by a 3-axis accelerometer. The monitoring unit comprises an analytics module configured to compare an intensity of each jerk of the plurality of jerks to a predefined jerk threshold and capture high intensity jerks from the plurality of jerks. The high intensity jerks have intensity equal to or more than the predefined jerk threshold. The method further comprises determining an elapsed time for each of the high intensity jerks. The elapsed time for each of the high intensity jerks is compared to a predefined time threshold. Further it is determined whether an analysis on the high intensity jerks is to be performed at the vehicle or at a server located remotely. | 09-25-2014 |
20140287676 | SYSTEM AND METHOD FOR VISUAL MESSAGE COMMUNICATION - The present disclosure generally relates to broadcasting and telecommunication and, more particularly, to broadcasting of text and visual messages over a geographical area. In one embodiment, a visual information broadcaster is disclosed, comprising: a hardware processor; and a memory coupled to the processor, wherein the memory comprises a plurality of modules capable of being executed by the processor to perform operations, and wherein the plurality of modules comprises: a receiving module configured to receive a first input comprising a string of characters selected from a text, an image, or a combination thereof, a transforming module configured to transform the first input into a first image having at least two dimensions; an encoder module configured to convert the first image into a one-dimensional signal waveform; and a modulator module configured to modulate the one-dimensional signal waveform for transmission via a modulated one-dimensional signal waveform. | 09-25-2014 |
20140282848 | System and Method to Provide Management of Test Data at Various Lifecycle Stages - Disclosed is a method and system to provide management of test data, the management performed during at least one stage associated with lifecycle of the test data. The system comprises a processing engine, a categorization module, a privacy regulation module, a meta-data analyzer, and an output generation module. The processing engine configured to generate the test data in response to a test data request. The processing engine further comprises of the categorization module configured to categorize the test data request. The processing engine further comprises of the privacy regulation module configured to model at least one privacy regulation in accordance with a geographical location and an enterprise domain. The processing engine further comprises the meta-data analyzer configured to analyze an imported meta-data. The system further comprises of the output generation module configured to provide the test data so requested. | 09-18-2014 |
20140258210 | BUSINESS INTELLIGENCE REPORTS WITH NAVIGABLE REFERENCE INDICATORS - The present subject matter relates to generation of business intelligence reports with navigable reference indicators. The method comprises obtaining information from an information source for providing in a business intelligence report. Further, report parameters are obtained through a user interface, wherein the report parameters include at least notes and indicator parameters. The notes and indicator parameters indicate a plurality of navigable reference indicators to be included in the business intelligence report. The method further comprises mapping the notes and indicator parameters with the obtained information. Based on the mapping, the business intelligence report is generated with the plurality of navigable reference indicators. Further, the plurality of navigable reference indicators provides a forward and backward link between two or more sections of the business intelligence report. | 09-11-2014 |
20140245254 | IDENTIFYING QUALITY REQUIREMENTS OF A SOFTWARE PRODUCT - A method(s) and system(s) of identifying quality requirements for a software product to be developed is disclosed. The method includes receiving input data from a user. The input data is indicative of objectives to be met by the software product being developed. The method further includes mapping the input data with a pre-defined product quality requirement model (PQRM). The PQRM is retrieved from a database and includes a taxonomy tree configured to define a plurality of quality characteristics (QCs), a plurality of sub-QCs, a plurality of quality objectives (QOs), and a plurality of quality requirements (QRs) for the software product. Further, the method includes identifying at least one QR from the plurality of QRs applicable for the software product. The identification is based on the input data. The method also includes generating a product requirement report (PRR) for the software product based on the identification. | 08-28-2014 |
20140244645 | SYSTEM AND METHOD TO PROVIDE GROUPING OF WARNINGS GENERATED DURING STATIC ANALYSIS - The present disclosure generally relates to warnings generated based on static analysis and, more particularly, to grouping warnings generated based on static analysis. In one embodiment, a method for grouping a plurality of warnings generated based on a static analysis of an application program is provided. The method may include analyzing, by one or more processors using programmed instructions stored in a memory, the application program to generate the plurality of warnings; identifying, by the one or more processors, one or more similar warnings based on the plurality of warnings, the similar warnings having structurally and semantically similar expressions of interest (EOI); and generating, by the one or more processors, one or more groups of warnings based on the plurality of warnings, the one or more groups of warning including one or more of corresponding identified similar warnings. | 08-28-2014 |
20140244592 | SYSTEMS AND METHODS FOR DATA ARCHIVAL - The present subject matter discloses a system and a method for data archival. A data archiving system comprises a processor and a compression module coupled to the processor and configured to compress an original data file to generate, for each level of lossy compression, a compressed base file and a patch file. The base file is generated using a lossy compression technique. The patch file for a particular level of lossy compression is generated using information lost at the particular level of lossy compression. The data archiving system further comprises a data archiving module coupled to the processor. The data archiving system is configured to save a last base file and a plurality of patch files corresponding to each level of lossy compression, where the last base file is the base file corresponding to a last level of lossy compression. | 08-28-2014 |
20140244362 | SYSTEM AND METHOD TO PROVIDE PREDICTIVE ANALYSIS TOWARDS PERFORMANCE OF TARGET OBJECTS ASSOCIATED WITH ORGANIZATION - This disclosure relates to predictive performance analysis of target objects associated with an organization. In one embodiment, a performance predictive analysis method is disclosed, comprising: receiving one or more parameters and an associated intensity level to predict performance of a target object associated with an organization; determining a proportionality relation between the performance of the target object and the one or more parameters, by applying a logical regression technique over the one or more parameters; selecting a threshold value from a pre-defined truth table to convert the one or more parameters into one or more group-level model factors with the associated intensity level; determining an impact of the one or more parameters on the performance in terms of a band wise distribution; and identifying a probabilistic effect, based on the determined impact, of the proportionality relation between the performance of the target object and the one or more parameters. | 08-28-2014 |
20140244241 | AUTOMATED CLASSIFICATION OF BUSINESS RULES FROM TEXT - The present subject matter relates to an automated classification of business rules. In one embodiment, a method for automated classification of the business rules comprises identifying a business rule from a text document, wherein the business rule comprises one or more rule intents. Further, the method comprises comparing the one or more rule intents in the business rule with rule intents associated with a plurality of rule types in a rule repository. Furthermore, the method comprises classifying the business rule under at least one of the rule types based on the comparison. | 08-28-2014 |
20140239076 | RFID Tag Enabled Article and a Method Therefor - A radio-frequency identification (RFID) tag assembly enabled article and methods therefor are provided. The RFID tag assembly enabled article includes a RFID tag assembly connected to an article with a pair of conducting strips, wherein the pair of conducting strips is connected between each end of the RFID tag assembly, respectively, and the article to form an electrical association of said RFID tag assembly with the article. The RFID tag assembly further comprising an antenna formed from said electrical association of the RFID tag assembly with the article and a RFID microchip securely embedded within at least one layer of a substrate of the RFID tag assembly, wherein said RFID microchip coordinates with the article and the antenna to establish a stable impedance matching network. A support structure holds at least one end of the article. | 08-28-2014 |
20140237620 | SYSTEM AND METHOD FOR DATABASE PRIVACY PROTECTION - The invention relates to a system and a method for privacy preservation of sensitive attributes stored in a database. The invention reduces the complexity and enhances privacy preservation of the database by determining the distribution of sensitive data based on Kurtosis measurement. The invention further determines and compares the optimal value of k-sensitive attributes in k-anonymity data sanitization model with the optimal value of l sensitive attributes in l diversity data sanitization model using adversary information gain. The invention reduces the complexity of the method for preserving privacy by applying k anonymity only, when the distribution of the sensitive data is leptokurtic and optimal value of k is greater than the optimal value of l. | 08-21-2014 |
20140222323 | ROGUE VEHICLE DETECTION - The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric. | 08-07-2014 |
20140214848 | MEDIA SYSTEM FOR GENERATING PLAYLIST OF MULTIMEDIA FILES - Disclosed is a method and system for dynamically generating a playlist of multimedia files for a user based upon a mood of the user. The system comprises a mood detection module, a tag allocation module, and a playlist generation module. The mood detection module is configured to determine the mood of the user based upon the one or more emotion tags allocated to records of the user. The tag allocation module is configured to categorize the at least one multimedia file under one or more emotion tags based upon the weights assigned to the one or more emotion tags. The playlist generation module is configured to dynamically generate the playlist of multimedia files based upon the mood of the user and the categorization of the at least one multimedia file under one or more emotion tags. | 07-31-2014 |
20140214630 | System and Method for Merchandising on an Electronic Device with Instantaneous Loan and Insurance - A system and method to enable merchandising on an electronic device is disclosed. The system enables instantaneous loan for the purchase of a product and accordingly generate a customized insurance policy for the purchased product in a purchase lifecycle. The system analyzes financial transaction data of buyer's financial instruments and accordingly suggests the best mode of splitting the transaction amount of the product over the financial instruments owned by the buyer. The system further enable biometric authentication of the buyer on the electronic device before granting an instantaneous loan for the purchase of said product. The electronic device is further enabled with means to transmit digitally signed transaction documents to the buyer. | 07-31-2014 |
20140214422 | METHOD AND SYSTEM FOR DETECTING BOUNDARY OF COARTICULATED UNITS FROM ISOLATED SPEECH - The application provides a method and system for determinism in non-linear systems for speech processing, particularly automatic speech segmentation for building speech recognition systems. More particularly, the application enables a method and system for detecting boundary of coarticulated units from isolated speech using recurrence plot. | 07-31-2014 |
20140208379 | METHOD AND SYSTEM FOR EMBEDDING METADATA IN MULTIPLEXED ANALOG VIDEOS BROADCASTED THROUGH DIGITAL BROADCASTING MEDIUM - A method and system for broadcast of additional content such as metadata required for client specific interactive application in an analog domain along with conventional audio, video and PSI or SI data is disclosed. The present invention enables transmission of encoded audio data or EPG data, timestamp information required for audio video synchronization referred to as metadata by embedding such metadata in the pixels of video pixels and then encoding by the standard video encoder to generate an encoded stream. The encoded stream is decoded using the standard video decoder at the receiving station to generate a Composite Video Blanking and Sync (CVBS) analog video signal. From the CVBS signal, the RGB or YUV pixels of the videos are extracted. Finally a data extractor module retrieves the embedded metadata from the RGB or YUV pixels. | 07-24-2014 |
20140207614 | METHOD AND SYSTEM FOR ASSISTING CUSTOMERS IN RETAIL STORES - Methods and systems for assisting customers in retail stores are described. The method comprises obtaining one or more assistance requests from a customer mobile device. The one or more assistance requests include customer device location and assistance information. Further, the assistance information includes at least one of a customer image, a text message, a video, and an audio. The method further comprises analyzing the one or more assistance requests to obtain assistance details. The assistance details include customer data and store associate data. Further, the method comprises transmitting the customer data and the store associate data to store associate mobile devices and the customer mobile device respectively for assisting the customer. | 07-24-2014 |
20140207424 | DESIGN OPTIMIZATION FOR COOLING - A design optimization system ( | 07-24-2014 |
20140201714 | EVALUATING PERFORMANCE MATURITY LEVEL OF AN APPLICATION - Systems and methods for evaluating a performance maturity level of a software application are described herein. In an implementation, the method includes obtaining at least one assessment parameter and at least one sub-parameter of the at least one assessment parameter, based on at least one of a key performance area and a key competency area. Further, a weightage is assigned to the at least one sub-parameter, the weightage being based on significance of the at least one sub-parameter to the assessment parameter. In addition, a performance questionnaire is configured, based on the at least one assessment parameter and the at least one sub-parameter. Subsequently, a maturity score is determined for the software application, in response to inputs to the performance questionnaire, the maturity score being indicative of the performance maturity level of the software application. | 07-17-2014 |
20140201223 | INTELLIGENT SYSTEM AND METHOD FOR PROCESSING DATA TO PROVIDE RECOGNITION AND EXTRACTION OF AN INFORMATIVE SEGMENT - The present disclosure in particular relates to data processing, and more particularly, to systems and methods for identifying and extracting an informative segment from data objects. In one embodiment, a system for facilitating identification of an informative segment from a data is provided. The system includes one or more processors; and a memory storing processor-executable instructions comprising instructions to generate a customized search query based on one or more input parameters, process the data to obtain a plurality of machine-readable data objects, obtain one or more approximate results corresponding to the informative segment based on the customize search query and the plurality of data objects, validate the one or more approximate results based on a comparison of the one or more approximate results and the data, and provide the validated one or more approximate result to identify the informative segment. | 07-17-2014 |
20140198888 | DISCRETE SIGNAL SYNCHRONIZATION BASED ON A KNOWN BIT PATTERN - Systems and methods for discrete signal synchronization based on a known bit pattern are described. In one aspect of the present subject matter, a discrete signal synchronization system is configured to synchronize a preprocessed discrete signal with a modified discrete signal. The system comprises a processor and a synchronization module coupled to the processor. The synchronization module comprises an extraction module and comparison module. The extraction module determines a bit pattern from the modified discrete signal using Discrete Wavelet Transformation (DWT) and Singular Value Decomposition (SVD). The comparison module compares the determined bit pattern with a known bit pattern of the preprocessed discrete signal and records a time point at which the determined bit pattern matches with the known bit pattern of the preprocessed discrete signal as a synchronization point. | 07-17-2014 |
20140195494 | METHOD AND SYSTEM FOR CREATING AND MAINTAINING UNIQUE DATA REPOSITORY - In accordance with the disclosure, there is provided a system and method for creating and maintaining unique data repository comprising a matching process based on a set of predefined matching conditions and thereon performing an action type corresponding to the outcome of matching process. The present disclosure provides for real time data de-duplication and updation of unique data repository to obtain a unified view of unique and matching records. | 07-10-2014 |
20140193793 | METHOD AND SYSTEM FOR DISTANCE EDUCATION BASED ON ASYNCHRONOUS INTERACTION - The invention facilitates asynchronous interaction between a geographically separated facilitator and at least one user. The said invention provides asynchronous interaction between rural classrooms (teacher-student community) and expert teachers to increase the outreach of the expert teachers much beyond that is permitted with the teachings of the prior art. | 07-10-2014 |
20140189436 | FAULT DETECTION AND LOCALIZATION IN DATA CENTERS - Systems and Methods for detection and localization of performance faults in data centers are described. In one embodiment, a method comprises identifying a performance fault in a data center upon detection of the performance fault at any of a plurality of monitors in the data center, wherein the plurality of monitors are placed at monitor nodes, amongst a plurality of nodes, in the data center. Further, the method comprises evaluating a fault vector for the data center upon identification of the performance fault, wherein the fault vector is evaluated based on a fault indicator corresponding to each of the plurality of monitors. Based on the comparison of the fault vector with signatures of each of the plurality of nodes, one or ore faulty nodes, amongst the plurality of nodes in the data center, are determined as likely root cause of the performance fault. | 07-03-2014 |
20140188562 | SYSTEM AND METHOD FOR TRANSACTION BASED PRICING - System and method for transaction based pricing are described. The method comprises defining one or more transactions which include at least one sub-process. Further, units per transaction for each of the at least one sub-process is identified based on requirement data. Thereafter, a process complexity is assigned to the each of the at least one sub-process based on a complexity score computed for the each of the at least one sub-process. Further, a processing time is obtained for the each of the at least one sub-process based on the process complexity assigned to the each of the at least one sub-process. Further, estimated efforts for performing the one or more transactions are ascertained based on the processing time obtained for the each of the at least one sub-process. Furthermore, pricing for each of the one or more transactions is identified based on the estimated efforts. | 07-03-2014 |
20140186813 | ACADEMIA INDUSTRY INTERFACE FRAMEWORK - The present subject matter relates to an academia industry interface framework. The method includes receiving collaboration instructions from an industrial organization. The method further comprises defining a plurality of collaboration parameters based on the collaboration instructions. The collaboration parameters comprise at least one of communication parameters, leadership influence parameters, influencing curriculum parameters, faculty influence parameters, and student influence parameters. Further, the method initiates the communication between the industrial organization and different sections of an academic institution in a predefined sequence based on the collaboration parameters. | 07-03-2014 |
20140186812 | Secured Computer Based Assessment - Systems and methods for secured computer based assessment are described. In one embodiment, the method comprises capturing of proctoring data at a candidate assessment device from a candidate at predefined time intervals during an examination. The proctoring data includes biometric data, still image, and surround sound associated with the at least one candidate. The proctoring data captured at the candidate assessment device is then transmitted to a central assessment server connected to the candidate assessment device. At the central assessment server, the proctoring data is compared with registration data, of the candidate, stored in the central assessment server. Based on the comparison, malpractice by the candidate during the examination is determined when the proctoring data deviates from the registration data. | 07-03-2014 |
20140164300 | Analyzing Social Network - Disclosed is a method and system for analyzing a social network, the method comprising: segregating, by a processor, the social network into a plurality of groups of users, wherein each group of users has a unique identity in the social network; mining, by the processor, data from a group of users of the plurality of groups of users; identifying a plurality of social variables from the data, wherein the plurality of social variables comprises at least one of a number of users, connections of the users, interactions of the users, affinity of the users, or posts by the users; equating a social variable of the plurality of social variables with a thermodynamic variable of a plurality of thermodynamic variables; determining quantitative values of the plurality of thermodynamic variables based upon the plurality of social variables; generating a virtual thermodynamics system based upon the quantitative values for analyzing the social network. | 06-12-2014 |
20140163969 | METHOD AND SYSTEM FOR DIFFERENTIATING TEXTUAL INFORMATION EMBEDDED IN STREAMING NEWS VIDEO - The application provides a method and system for differentiating textual information embedded in a streaming news video. The application enables a method and system for differentiating textual information embedded in a streaming news video for simplified indexing and annotation of the said news video. | 06-12-2014 |
20140149852 | METHOD AND SYSTEM FOR DISINTEGRATING AN XML DOCUMENT FOR HIGH DEGREE OF PARALLELISM - The present invention relates to the field of high performance computation. Particularly, the invention relates to converting a huge XML document into SDML format which can be processed with high degree of parallelism to achieve high performance. In addition also SDML can be used as a standalone protocol for data representation. SDML deals with one time write and many times read. Further, SDML files can be splitted on number of lines which makes it easier to distribute among multi cores and even distributing across servers. | 05-29-2014 |
20140149184 | SYSTEMS AND METHODS FOR SIMULATING A PRODUCT AT DIFFERENT ATTRIBUTES AND LEVELS - The present disclosure relates to conjoint analysis, and more particularly to systems and methods for simulating a new product at different price points and different attributes. In one embodiment, a method for simulating performance of a product is disclosed. The method comprises: providing a profile of the product and a corresponding choice card, wherein the choice card assists selecting of a sub-set of an updated first set of attributes and levels based on the profile; performing an analysis on the selected sub-set of the updated first set of attributes and levels; and simulating a plurality of scenarios to determine an optimum scenario depicting the performance of the product. | 05-29-2014 |
20140149181 | METHOD AND SYSTEM FOR CONDUCTING A SURVEY - Described are a method and a system for conducting a survey of at least one survey item. The method includes obtaining historical survey data of the at least one survey item for T number of data stores. The method also includes determining a sparsity number K associated with the historical survey data of the at least one survey item for the T number of data stores. The method also includes determining a target number M based on the sparsity number K. The target number M is indicative of a reduced number of data stores, present amongst the T number of data stores, for collection of current survey data to estimate current survey data of the at least one survey item for the T number of data stores. | 05-29-2014 |
20140143605 | SYSTEM AND METHOD FOR VALIDATING CONFIGURATION SETTINGS - The present disclosure relates to a system and method for providing a validation tool to automate in validation of the configuration settings of the computing devices and their interaction thereof for an enterprise application over a network. Also, the present disclosure validates the configurations of the enterprise application which is deployed and executed over the computing devices. Further, the present disclosure provides a method for verifying the configurations settings and applying the required configuration settings across the computing devices, if the existing configuration settings of said computing devices are not verified. Upon verifying and/or applying the configuration settings, said validation tool is configured to generate a compliance report and further notify said generated report to the intended user of a group. | 05-22-2014 |
20140140622 | SYSTEM AND METHOD FACILITATING DESIGNING OF CLASSIFIER WHILE RECOGNIZING CHARACTERS IN A VIDEO - The present disclosure relates to designing of a hierarchy of feature vectors. In one embodiment, a method for facilitating design of a hierarchy of feature vectors while recognizing one or more characters in a video is disclosed. The method comprises collecting one or more features from each of the segments in a video frame extracted from a video; preparing multi-dimensional feature vectors to classify the one or more characters; calculating a minimum distance between the multi-dimensional features vectors of a test character and the multi-dimensional feature vectors of a pre-stored character template; selecting, with respect to a decreasing order of the minimum distance, the multi-dimensional feature vectors to design a hierarchy of the multi-dimensional feature vectors; and classifying the characters based on the hierarchy of the multi-dimensional feature vectors. | 05-22-2014 |
20140139746 | SYSTEM AND METHOD FOR MULTIPLEXING VIDEO CONTENTS FROM MULTIPLE BROADCASTING CHANNELS INTO SINGLE BROADCASTING CHANNEL - A method and system for multiplexing of multiple channels of video data through a single analog broadcasting channel is disclosed. The method enables a spatial and temporal multiplexing of videos of each of the multiple channels. The multiplexed content is created as a result of multiplexing that is encoded to generate digital transport stream that is transmitted through analog medium. The system enables a STB receiver to decode each of the videos from the stream. At least one video from the multiple videos is played on the television based on user selection. | 05-22-2014 |
20140134948 | Method and System for Accurate Straight Line Distance Estimation Between Two Communication Devices - A method and system is provided for estimating proximity and accurately calculating the straight line distance between the communicating Bluetooth enabled portable communication devices. Particularly, the invention provides a method and system for capturing the received signal strength indicator (RSSI) values form at least one target communication device ( | 05-15-2014 |
20140123303 | DYNAMIC DATA MASKING - Described is a method for dynamic data masking (DDM) of sensitive data. The method for DDM comprises receiving a response output comprising sensitive data, based on a client request, from an application, and identifying a main masking specification, based on the response output, for masking of the sensitive data in the response output. Further, the response output is parsed for creating a Document Object Model (DOM) tree for the response output. Status of a masking approach indication field of the main masking specification is checked, and masking is performed on nodes in the DOM tree comprising the sensitive data, based on the status of the masking approach indication field of the main masking specification. | 05-01-2014 |
20140123165 | METHOD AND SYSTEM FOR CONTEXT-AWARE RECOMMENDATION - A context aware recommendation system and method for recommending at least one program to the user responsive to dynamically varying user preferences, learned user behavior and contextual information is described. The recommended program is a television program, radio program or music file. The system and method further alert the user about change in user's preferences and guides the user to change stated preferences. | 05-01-2014 |
20140122412 | SYSTEM AND METHOD TO PROVIDE ANALYTICAL PROCESSING OF DATA IN A DISTRIBUTED DATA STORAGE SYSTEMS - The present disclosure in general relates to technologies for processing data in a distributed data storage system, and more particularly, to a method, a system, and a computer program product for analytical processing of data by using the processing power of the distributed data storage system. In one embodiment, a system for analytical processing of data in a distributed data storage system is disclosed. The system comprises: a data extraction module configured to perform analytical operations to extract data from source databases in one or more data formats; and a processing module configured to perform data refinement operations to categorize the data while the data is being extracted. The processing module comprises: a mapping module configured to perform mapping operations of the categorized data; and a transformation module configured to perform an analytical transforming operation of the mapped categorized data to obtain a transformed categorized data. | 05-01-2014 |
20140122271 | System and Method for Enabling Deployment Variability in a Point of Sale - A method and system for deployment variability in a Point of Sale wherein the deployment variability includes a plurality of scenarios, the deployment variability wherein in one of a scenario, a POS Till, a POS Back Office, and a POS Central Instance run in a standalone mode and in another scenario, the POS Till, the POS Back Office, and the POS Central Instance run on a n-tiered mode, based on the requirement, wherein transition from one mode to another mode does not involve complexity of data being replicated. | 05-01-2014 |
20140122185 | SYSTEMS AND METHODS FOR ENGAGEMENT ANALYTICS FOR A BUSINESS - Described is a method for engagement analytics. The method includes identifying criteria, and sub-criteria of each of the criteria, associated with a plurality of engagements between a vendor and a client, and identifying influencor sub-criteria and influencee sub-criteria amongst the sub-criteria. First levels of influence of the influencor sub-criteria of each of the criteria with respect to the influencee sub-criteria of each of the criteria; second levels of influence of the plurality of engagements with respect to the sub-criteria of all the criteria; and third levels of influence of the sub-criteria of all the criteria with respect to the engagements, are estimated. Further, a selection order of the plurality of engagements is determined based on the first, the second and third levels of influence. The selection order has priority values indicative of a level of realization of each of the engagements for the selection of the at least one engagement. | 05-01-2014 |
20140122182 | SYSTEM AND METHOD FOR ASSESSING PRODUCT MATURITY - A method and system to evaluate maturity level of a software product is provided wherein the evaluation is based on four maturity levels, the maturity levels being Basic, Established, Differentiated, and Leadership in dimensions of key focus areas namely Product planning, Technology Tools & Methodology, Product Code & Quality, Release & Configuration Management, Usability, Security & Supply chain, and Intellectual Property Rights, and competency areas of Process, Infrastructure, Architecture, and People. A checklist having plurality of conformance requirements is provided at each maturity level for each key focus area to assess the maturity level of the software product. | 05-01-2014 |
20140114729 | ASSESSING OUTSOURCING ENGAGEMENTS - Systems and methods for assessing performance of an outsourcing engagement are described. According to the present subject matter, the system(s) implement the described method(s) for assessing the outsourcing engagement. The method includes identifying at least one Critical Success Factor (CSF) associated with the outsourcing engagement between a vendor and a client based on conducive conditions of outsourcing. The method further includes determining at least one of a plurality of parameters and a plurality of sub parameters associated with the identified at least one CSF, wherein the plurality of parameters and the plurality of sub parameters are inter dependent and effect performance of the at least one CSF. Further, the method includes assessing a value of performance for at least one parameter and at least one sub parameter from amongst the plurality of parameters and the plurality of sub parameters respectively, based on a system dynamics model. | 04-24-2014 |
20140101784 | ANALYSIS AND SPECIFICATION CREATION FOR WEB DOCUMENTS - Described herein is a method for rendering specification creation, including identifying, within one or more contents, labels as sensitive labels when data associated with the label are determined sensitive based on one or more user-defined policy rules, wherein the identifying considers structural locations of labels determined as sensitive and the data associated with the sensitive label; configuring rendering specifications for data associated with the identified sensitive labels; and associating the configured rendering specifications with the sensitive labels of the data determined as sensitive, for execution in real time. | 04-10-2014 |
20140101691 | METHOD AND SYSTEM FOR AUTOMATIC TAGGING IN TELEVISION USING CROWD SOURCING TECHNIQUE - A method and system for tracking of objects in a video is disclosed. The method of the present invention enables user to indicate a boundary-box to the identified object of interest in the broadcast video on television or any other communication media. The object indicted in the boundary-box is than tracked by the users connected in a social community network in the upcoming video frames of the broadcasted video. The tracked object is then tagged by the users in the social community network. Further, the present invention enables augmentation of the tracked object in the video by extracting additional information from the online service providers. The augmentation and tagging of the object generates metadata related to the object. The metadata generated is stored on a server to track the object in future based on the metadata related to the object. | 04-10-2014 |
20140101255 | SOCIAL NETWORK GRAPH BASED SENSOR DATA ANALYTICS - The present invention relates to a system and method of effective physical data aggregation and its logical analytics by way of utilizing socially interacting and networking platforms to create meaningful association and relevancy between the captured physical data. The physical data associated by social networking platforms results in creation of reduced data set for analytics and requires low processing requirements for application usage. | 04-10-2014 |
20140095231 | GUIDED ANALYTICS - A method and a system described herein relate to guided analytics for analysis of data. In one implementation, the method includes acquiring enterprise data and external intelligence data, and identifying facts, which are measures, and attributes, which are indicative of a characteristic parameter to which the measures correspond, from the enterprise data and the external intelligence data. The method also includes identifying influencing links, where each of the influencing links is indicative of a relationship amongst the facts and the attributes. The method further includes analyzing the facts to obtain analyzed data and identifying at least one correlation in the analyzed data based on at least one of the influencing links and the external intelligence data. The analyzing is carried out using at least one predefined analytical model and is in relation to at least one of the attributes and at least one of the influencing links. | 04-03-2014 |
20140090026 | System and Method for Managing Role Based Access Controls of Users - A method and system for role based access control for a plurality of users in a heterogeneous enterprise environment, comprising: establishing a functional relationship between a plurality of provisioning unit using a provision unit module. The users are mapped with the provisioning unit based on attributes of the users. Events are captured via the provision unit module. The users needed to be re-mapped are determined upon the event completion. Application role defined in context of an application embedded in an application registry module is mapped with the provisioning unit. Call back service is executed for the re-mapped users having entitlement associated with each of the application stored in a roles registry module. An application role is determined and defined for a new user for the plurality of the application enabling managing of the role based access control. | 03-27-2014 |
20140090001 | METHOD AND SYSTEM FOR IMPLEMENTATION OF AN INTERACTIVE TELEVISION APPLICATION - The present invention provides a method and system for implementation of an interactive television application. Particularly, the invention provides method and system for designing and implementation of synchronized interactive television applications using quick response (QR) code, wherein the quick response (QR) code is used to tag the broadcasted television content. More particularly, the invention provides method and system for decoding the quick response (QR) code at the receiver side to provide a universal resource locator (URL) which hosts augmented services for the content on the interactive television as well as on the secondary communication device. | 03-27-2014 |
20140089887 | METHOD AND SYSTEM FOR ESTIMATING SIZE AND EFFORT OF SOFTWARE ASSURANCE PROJECTS - A method and system is provided for estimating size and effort of software assurance project for distributing the estimated effort across the software assurance project phases. Particularly, the invention provides a method and system for estimating the software assurance project size based on the predefined weight ratios assigned to the test cases after classifying them into simple, medium and complex categories. Further, the invention provides a method and system for utilizing the estimated software assurance project size and organizational baseline productivity information for estimating the software assurance efforts. Further, the invention provides a method and system for distributing the estimated effort across the software assurance project phases. | 03-27-2014 |
20140089738 | SYSTEM AND METHOD FOR IDENTIFYING SOURCE OF RUN-TIME EXECUTION FAILURE - The present disclosure relates to identifying the source of run-time execution failure and performing static analysis on the computer program without changing actual computer program code. In one embodiment, a method for performing static analysis on run-time execution failure is disclosed, comprising: identifying a point of interest in a computer program by statically analyzing the computer program, wherein the point of interest comprises one of: a variable or an expression; identifying previous assignments of the variable or the expression by performing static analysis depending on a value associated with the variable or the expression; modifying the value to a new value or modifying the expression to a new expression; modifying the computer program based upon the new value or the new expression to generate a modified computer program; and performing incremental static analysis on the modified computer program in order to identify a change in the computer program. | 03-27-2014 |
20140089255 | FOREIGN KEY IDENTIFICATION IN DATABASE MANAGEMENT SYSTEMS - Systems and methods for foreign key identification are described. In one embodiment, the method includes computing a threshold value for each of a primary key-foreign key (PK-FK) pair of a super-set of PK-FK, and generating a sub-set of PK-FK pair based on comparison of the threshold value and a predefined threshold value, where the predefined threshold value is indicative of an acceptance criterion. Further, the method includes determining a conformance score for each of the PK-FK pair of the subset of PK-FK pair, wherein the conformance score is based on deviations between Cumulative Probability Distribution (CPD) values of PK and CPD of FK for each PK-FK pair. Further comparing the conformance score of the each PK-FK pair of the sub-set of PK-FK pairs with a predetermined acceptability index, where the predetermined acceptability index is indicative of an acceptance of at least one positive FK from the set of PK-FK pairs. | 03-27-2014 |
20140089159 | LOCALLY OPTIMUM TRADING POSITIONS IN MARKET MEASURE - A trading position evaluation system for evaluating trading positions that are locally optimum in a market measure includes an option price determination module configured to determine at a trading time instance amongst a plurality of trading time instances obtained from a trader, a scaled option price and a shifted scaled option price of an underlying asset of a European Contingent Claim (ECC) based on ECC data and market data. The ECC data comprises data associated with the ECC and the underlying asset of the ECC, and the market data comprises annualized rate of return and annualized volatility of the underlying asset, and interest rate of market. Based on the scaled option price and the shifted scaled option price, a position evaluation module evaluates a trading position at the trading time instance that minimizes local variance of profit and loss to the trader. | 03-27-2014 |
20140089040 | System and Method for Customer Experience Measurement & Management - The invention measures and captures customer experience perception parameters against a host of touch-points and from various perspectives, through a coordinated and participative process. Further it provides detailed insight into various telecom process and application impacting the customer experience by using standard approach of eTOM process & TAM application for better understand ability. The system also enabled to perform RAG analysis for the purpose of report generation that helps the management identify good/bad customer experience areas within the total lifecycle of the interaction with the customer. | 03-27-2014 |
20140078900 | System and Method for Reducing the Data Packet Loss Employing Adaptive Transmit Queue Length - The present invention provides a system and method for reduction of data packet loss for the multiple network interfaces. Particularly, the invention provides a cross layer system for reduction of data packet loss based on dynamic analysis of network conditions. Further, the invention provides a system and method of estimation of network condition and adapting the transmit queue of the multiple interfaces according to channel condition/available bandwidth of the associated network. | 03-20-2014 |
20140078395 | VIDEO SYNCHRONIZATION - The present subject matter discloses systems and methods for synchronizing a plurality of video files. In one implementation, the method comprises detecting a one shot boundary in each of a first video file and a second video file, determining a first reference point in the first video and a second reference point in second video based on the shot boundary detection and extracting a plurality of features associated with the reference points. The method further comprises comparing each of the plurality of corresponding features extracted from the reference points in a log-polar domain based in part on normalized cross correlation, computing a matching index, indicative of the extent of match between the extracted features, and generating a notification indicating the synchronization of the first video file and the second video file if the matching index is determined to be greater than a pre-defined matching threshold. | 03-20-2014 |
20140077673 | Enclosure for Biometric Sensor - An enclosure for a biometric sensor is described. The enclosure comprises a cabinet having a plurality of surfaces. The biometric sensor placed inside the cabinet on a holder fixed on a primary surface from amongst the plurality of the surfaces. A secondary surface from amongst the plurality of surfaces is opposite to the primary surface. The secondary surface is substantially transparent to electromagnetic rays emitted by the biometric sensor. | 03-20-2014 |
20140074682 | GLOBALLY OPTIMUM TRADING POSITIONS IN RISK-NEUTRAL MEASURE - A trading position evaluation system for evaluating trading positions that are globally optimum in a risk-neutral measure includes an option price determination module configured to determine a current option price and a shifted option price of an underlying asset of a European Contingent Claim (ECC) at a trading time instance amongst a plurality of trading time instances obtained from a trader, based on ECC data and market data. The ECC data comprises data associated with the ECC and the underlying asset of the ECC, and the market data comprises annualized volatility of the underlying asset and risk-free interest rate of market. Based on the current option price and the shifted option price, a position evaluation module evaluates a trading position at the trading time instance that minimizes global variance of profit and loss to the trader. | 03-13-2014 |
20140068340 | Method and System for Compliance Testing in a Cloud Storage Environment - The invention provides automated test suite for compliance testing of cloud storage server to a Cloud Data Management Interface (CDMI) by performing functional testing of CRUD (Create, Read, Update, and Delete) operations. It offers a solution containing test scripts for validating the response from CRUD operations performed on CDMI objects and checks for the cloud storage to be CDMI compliant. | 03-06-2014 |
20140067294 | POWER MONITORING SYSTEM - The subject matter described herein is directed to a power monitoring system for managing power in a data center. In one embodiment, the power monitoring system includes: at least one processor, a memory coupled to the at least one processor, wherein the memory includes, a computation module configured to compute at least one of peak power consumption and current power consumption of each power distribution point of a power distribution unit and an analysis module configured to identify the power distribution points which are overloaded or are underutilized based on a policy data. | 03-06-2014 |
20140066041 | SYSTEM AND METHOD FACILITATING COMMUNICATION IN AN ADAPTIVE VIRTUAL ENVIRONMENT - The present disclosure relates generally to a communication technologies, and more particularly to a system and method facilitating communication in an adaptive virtual environment. In one embodiment, an adaptive virtual environment communication system is disclosed, comprising: a processor; and a memory storing processor-executable instructions comprising instructions to: create one or more virtual images of one or more communication devices via a virtual network; emulate one or more features of the one or more communication devices; synchronize the emulated features in real-time by receiving data from the one or more communication devices at pre-determined intervals of time; and execute one or more of the images of the one or more communication devices. | 03-06-2014 |
20140064478 | USER INPUT BASED DATA ENCRYPTION - Systems and methods for securing data by a user input based data encryption are described. In one aspect of the invention, the method may include receiving an authentication string from a user to authenticate access to the application. On successful authentication of the user, the data to be secured is obtained from the user. The obtained data is then secured by encryption, which results in generation of a private key. The private key is then associated with the authentication string to form a first secure key. The first secure key is stored with the encrypted data in a data file. The data file is then transferred to a server associated with the application. The data file in the server is further encrypted to generate a second secure key. | 03-06-2014 |
20140062697 | CUSTOMIZED AUDIO ALERTS - A methods and systems for generating customized audio alerts are described. The method includes identifying occurrence of an event on a communication device. The event is associated with at least one attributes. The at least one attribute associated with the event is compared with user-defined attributes. Further, a customized audio alert is generated on the communication device based on the comparing. | 03-06-2014 |
20140059659 | SYSTEM AND METHOD FOR AUTHENTICATING MANUAL INTERACTION IN A COMPUTING ENVIRONMENT - The present invention relates to a system and method for providing a secure manual interaction with one or more electronic devices in a network. An authentication module generates an authentication task to a user to input data using a user interface. The data is processed and a second security module generates security tasks to be responded by the user such that the security tasks are generated in real-time by using the input data fed by the user. A verification module correlates the input data with the security tasks responded by the user in order to check the data integrity before completing the interaction. | 02-27-2014 |
20140056992 | SUSPENSION OF NANOPARTICLES - A method for preparing suspension of inorganic nanoparticles is described herein. The method includes mixing a dispersing medium ( | 02-27-2014 |
20140056418 | SYSTEM AND METHOD PROVIDING MULTI-MODALITY INTERACTION OVER VOICE CHANNEL BETWEEN COMMUNICATION DEVICES - The present disclosure relates generally to interactive response systems, and more particularly to systems and methods for providing multi-modality interaction between communication devices. In one embodiment, a multi-modality interactive system is disclosed, comprising: a processor; and a memory storing processor-executable instructions comprising instructions to: obtain a request to initiate an interactive session with a communication device; obtain interactive session data for communication to the communication device; select a modality for the interactive session data, by analyzing one or more parameters associated with the interactive session data and the communication device; convert a format of the interactive session data according to the selected modality; and transmit the interactive session data in the converted format to the communication device. | 02-27-2014 |
20140055506 | Dynamic Image Modification for a Color Deficient User - A system and method for detecting spectrum of colors that is indistinguishable to a color blind individual and modifying the colors to fade in or out to the shade of same color, is provided. While the partial color blind user is enabled to view and better distinguish colors that were problematic earlier, the present invention achieves a significant reduction in power consumption of the display device with this modified color set. | 02-27-2014 |
20140047242 | METHOD AND SYSTEM FOR PRESERVING PRIVACY DURING DATA AGGREGATION IN A WIRELESS SENSOR NETWORK - A computer-based system and method for secured privacy preservation scheme while data aggregation in a non-hierarchical wireless sensor network that lacks peer-to-peer communication between the communicating sensor nodes is disclosed. The method and system adopts formation of self-adaptive efficient cluster formation for robust privacy preservation in the network by grouping the multiple sensor nodes in the network to form multiple clusters that enables low computation overhead and high scalability in the network. The method and system of the invention discloses an effective twin-key management scheme that provides establishment of secure communication among the sensor nodes and the secure communication between at least one sensor node with the sever node performing the function data aggregation of the data collected by the sensor nodes. | 02-13-2014 |
20140046144 | REAL-TIME STRESS DETERMINATION OF AN INDIVIDUAL - The present subject matter relates to a computer implemented method for real time determination of stress levels of an individual. The method includes receiving at least one stream of physiological data from at least one primary sensor for a predetermined duration, and preprocessing the at least one stream of physiological data to extract physiological parameters, where the preprocessing includes performing a preliminary analysis on the at least one stream of physiological data. The method further includes determining a stress level of the individual based on at least the physiological parameters, wherein the determining comprises performing a statistical analysis on the physiological parameters. | 02-13-2014 |
20140040292 | SYSTEM AND METHOD FOR MASSIVE CALL DATA STORAGE AND RETRIEVAL - A system and method for processing data in a big data storage system has been described, wherein the data is being pulled, transformed and loaded from a singular or a plurality of source systems to a big data storage system, Further, a query engine is configured to execute one or more query in a real-time for retrieving the data from the target big data storage system and a processor maps the executed query with the data thus stored by generating a key value in a preset format with respect to each query, such that the query results are retrieved by scanning the target big data storage system in accordance with the key value thus formed. | 02-06-2014 |
20140039964 | ORDER MANAGEMENT IN LINER SHIPPING SERVICES - Method(s) and system(s) for managing orders in liner based services are described herein. The method includes receiving a request for booking a shipment order. The shipment order may include booking an empty liner slot and an empty container. The method includes determining, based on an operational plan, temporal and geographical availabilities of empty liner slots and empty containers to promise the request. The operational plan is generated by evaluating availabilities and reservations of the empty liner slots to optimize revenues. Further, the operational plan is generated by performing a configurable search over the multiple dimensions and optimal intra-regional repositioning of empty containers. The method also includes providing a response to the request, based on the determination. Further, the method includes executing the request, upon acceptance of the request and continuous gathering and updating of the status of orders, demands and supplies as well as business parameters. | 02-06-2014 |
20140025624 | SYSTEM AND METHOD FOR DEMOGRAPHIC ANALYTICS BASED ON MULTIMODAL INFORMATION - The system and method of the present invention are described for automatic detection of error in the entry of particular category of individuals, especially referring to gender and age classification either real time while creating a database of such information or on an existing database on the record of individuals by analyzing their biometric characteristics like speech, image or face and other related demographic information like name of the individual in order to accord each individual with a unique identification. | 01-23-2014 |
20140016864 | LOGO RECOGNITION - A computerized method for recognition of a logo is described herein. The method comprises obtaining a plurality of feed frame of a feed video wherein the feed video has a logo embedded therein. At least one feed frame from the plurality of feed frames is compared with each template from a plurality of templates. For each template compared with the feed frame, a correlation parameter is computed and the logo is recognized based on the computing. | 01-16-2014 |
20130332896 | SYSTEMS AND METHODS FOR CONTEXT UNDERSTANDING FOR DEVELOPING A SOFTWARE SOLUTION FOR A PROJECT - A method and a system for facilitating holistic comprehension of a project and simultaneously reducing human effort involved in comprehending such project are disclosed. The method further comprises generating a cybernetics influence diagram (CID) using the plurality of parameters. The CID is indicative of a relationship of at least one parameter of a plurality of parameters with at least another parameter of the plurality of parameters. The method further comprises identifying at least one parameter from amongst the plurality of parameters as key thrust areas (KTAs) based upon threshold rules. The threshold rules are based upon the relationship of the parameters with one another. The method further comprises receiving a set of stakeholder objectives from a user. The set of stakeholder objectives is associated with the project. The method further comprises generating a traceability matrix template to facilitate mapping of the KTAs against the set of stakeholder objectives. | 12-12-2013 |
20130332487 | GENERATING REPORTS BASED ON MATERIALIZED VIEW - The present subject matter provides a system and a method for generating report on a materialized view. The method includes generation of a first query based on selection of at least one attribute from a plurality of attributes of a resource associated with a metadata driven framework. The plurality of attributes is associated with a particular instance of the resource. The method further includes storing the first query in a table schema. The table schema is associated with a first trigger. The method also includes invoking the first trigger upon storage of the first query in the table schema. The first trigger is configured to execute the first query to generate a materialized view based on an output of the first query. The method may include executing a second query on the materialized view for generating the report. The second query may be created based on materialized view data. | 12-12-2013 |
20130328880 | IDENTIFICATION OF MARKER FEATURES IN MULTI-DIMENSIONAL DATA - Method(s) and system(s) for identifying marker features of various subsets of a multi-dimensional data are provided. Each subset includes various data points associated with various features. Each of the data points are defined by feature values corresponding to the associated features. The method includes identifying feature pairs based on a matrix of the data points and the features, and computing correlation distances between features in each of the feature pairs. The method includes generating a non-linear pattern of the plurality of features in a two-dimensional plane. Additionally, the method includes calculating a threshold feature value for the associated features of the data points of a particular subset and representing the threshold feature value as a threshold non-linear pattern in the two-dimensional plane. The method includes determining the marker features based on a relative position of the features with respect to the threshold feature value in the two-dimensional plane. | 12-12-2013 |
20130326349 | Method and System to Perform Multiple Scope Based Search and Replace - A method and system for performing search and replace operation has been implemented. The system enables to perform multiple scope based search concurrently within plurality of documents. The system also supports multiple file formats and is able to generate reports post completion of the search and replace operation. | 12-05-2013 |
20130326055 | Method and System for Network Transaction Monitoring Using Transaction Flow Signatures - A method and system for monitoring performance of network transactions is described herein. According to the present invention, in a testing environment, transaction flow signatures representing a hierarchical flow of sub-transactions constituting the said network transactions are generated and stored for monitoring and analysis of the network transactions. In a real-time environment, the sub-transactions are identified through the stored transaction flow signatures for a particular network transaction and the identified sub-transactions are then monitored by metrics analysis engine to determine the performance of the network. | 12-05-2013 |
20130325428 | Assembly of Metagenomic Sequences - Systems and methods for assembly of metagenomic sequences are described herein. In one embodiment, a plurality of metagenomic sequences is represented in three dimensional space to obtain a plurality of sequence vectors. Based on plurality of the sequence vectors, a cuboid having a plurality of grids is defined in the three dimensional space such that it encompasses the plurality of metagenomic sequences. Further, the plurality of metagenomic sequences is assembled into one or more contigs based on traversal of the plurality of grids. In one implementation, the one or more contigs are assembled such that a contig includes metagenomic sequences probably originating from the same genome. | 12-05-2013 |
20130318022 | Predictive Analytics for Information Technology Systems - Disclosed is a method and apparatus for organizing, correlating IT management data in batch mode as well as real time and doing predictive analytics to indicate possible threshold breaches, possible failures and usage bottlenecks in the systems in an information technology (IT) environment. The system and method further predicts the state of the information technology (IT) system components systematically based on current and past system states and system component states, overall systemic behavior, known system behavioral rules and load conditions /usage characteristics. | 11-28-2013 |
20130309644 | SECURED COMPUTER BASED ASSESSMENT - System and methods for secured computer based assessment are described. In one embodiment, the method comprises receiving a question paper from an assessment conduction center, wherein the question paper contains dummy content having structure similar to an actual content of the question paper. A question paper metadata template containing metadata of the actual content that is generated based on the dummy content is created, and provided to the assessment conduction center for loading the actual content of the question paper in the question paper metadata template to generate an examination paper for distribution to one or more exam centers. A response of each of a plurality of aspirants corresponding to the examination paper is obtained from the one or more exam centers and said response is evaluated based on the metadata of the actual content, to generate a result for each of the plurality of aspirants. | 11-21-2013 |
20130307702 | METHOD AND SYSTEM FOR EFFECTIVE MANAGEMENT OF ENERGY CONSUMPTION BY HOUSEHOLD APPLIANCES - A method and system for effective management of energy consumption by household appliances, using a home energy information gateway. Particularly, the invention provides a method and system for an efficient and economic home energy information gateway which can provide the energy consumption information and communication interface through a set top box like gateway device on the existing display device such as television thereby reducing extra display medium cost. More particularly, the invention provides a method and system for managing energy consumption effectively by monitoring, controlling and displaying energy usage of household appliances by way of collecting smart meter data and generating user friendly reports and graphs. | 11-21-2013 |
20130305075 | GENERATION OF ENERGY CONSUMPTION PROFILES - The subject matter described herein relates to a system and a method for generation of energy consumption profiles corresponding to a plurality of computing systems. For each of the plurality of the computing systems, a plurality of consumption parameters from at least one measurement device is received. The consumption parameters include a processor utilization parameter and an energy consumption parameter. Further, a normalization factor corresponding to each of the plurality of the computing systems is identified. Based on the normalization factor, the processor utilization parameter is normalized. Based on the normalized processor utilization parameter and the energy consumption parameter, the energy consumption profile is generated. The energy consumption profile is indicative of energy efficiency of the plurality of the computing systems. | 11-14-2013 |
20130282424 | CONFIGURABLE PROCESS MANAGEMENT SYSTEM - The present subject matter relates to a configurable process management system. In one embodiment, the configurable process management system comprises a configuration module configured to model one or more process workflows based at least on process requirements. Each of the process workflows comprises a plurality of process activities. Further, the configuration module is configured to create at least one custom application for one of a plurality of process activities, based on application inputs obtained from a user. The custom application, thus, created is associated with a selected process workflow amongst the one or more process workflows. | 10-24-2013 |
20130274091 | PROCESS FOR SYNTHESIS OF DOPED TITANIA NANOPARTICLES HAVING PHOTOCATALYTIC ACTIVITY IN SUNLIGHT - Present disclosure provides a process for the synthesis of doped titania nanoparticle having photocatalytic activity greater than 90% at 2 hours under sunlight irradiation. The process involves step a) milling a mixture containing anatase titania and a precursor compound, the compound selected from the group consisting of metal and non-metal salts, in the presence of water and oxide milling media, at a temperature in the range of 20 to 50° C. for a period of 60-120 minutes, to form a slurry, wherein the amount of water is in the range of 15 to 25% by weight of the total mixture; and
| 10-17-2013 |
20130272607 | System and Method for Processing Image for Identifying Alphanumeric Characters Present in a Series - A system and a method for identification of alphanumeric characters present in a series in an image are disclosed. The system and method captures the image and further processes it for binarization by computing a pattern of the image. The generated binarized images are then filtered for removing unwanted components. Candidate images are identified out of the filtered binarized images. All the obtained candidate images are combined to generate a final candidate image which is further segmented in order to recognize a valid alphanumeric character present in the series. | 10-17-2013 |
20130262406 | AUTOMATED SYSTEM AND METHOD OF DATA SCRUBBING - A system and method enabling automated data cleansing and scrubbing at the attribute level is disclosed. A consolidated view may be provided of the scrubbed data or narratives that gets promoted to a final copy and the data or narratives received from multiple sources on a single user interface. | 10-03-2013 |
20130254744 | System and Method to Select Compatible Open-Source Software and Components for Developed or Conceptualized Solution - The present invention relates to a system and method for verifying the compatibility among the software components used in the software solution using an auto-license compatibility verifier. Further, the present invention provides the method for enabling the auto-license compatibility verifier, a tool for automatically and dynamically mapping the licensing information of the software components which are used in the software solution with respect to the already stored licensing information which are stored in the database. | 09-26-2013 |
20130254737 | PROJECT DELIVERY SYSTEM - Systems and methods for managing projects are described herein. In one implementation, the computer implemented method for delivering projects includes obtaining project detail components comprising at least one of a project scope definition, a project business requirements set, a project technical requirements set and a project test requirements set. The method further includes retrieving at least one project analysis rule, pertaining to the project, wherein the at least one project analysis rule integrates a plurality of the project detail components of the project details; analyzing the project detail components, based on the at least one project analysis rule; and determining, based on the analyzing, an inconsistency parameter, indicative of inconsistencies present in at least one of the project scope definition, the project business requirements set, and the project technical requirements set. The method further comprises creating a system design report for completion the project based in part on the analyzing. | 09-26-2013 |
20130254735 | USER EXPERIENCE MATURITY LEVEL ASSESSMENT - The present subject matter provides a system and a method for assessing user experience maturity (UXM) level for a software product. The method includes defining a set of hierarchical UXM levels that may be associated with one or more user experience (UX) parameters. Each of the one or more UX parameters may be assigned a weight based on relevance of the each of the one or more UX parameters. In addition, the method may include determining ratings for the each of the one or more UX parameters and evaluating a UXM score of the software product based on the ratings. Moreover, the method may include categorizing the software product in one of the hierarchical UXM levels based on the UXM score of the software product. The software product may be categorized if the UXM score is greater than a pre-defined threshold value for that hierarchical UXM level. | 09-26-2013 |
20130254408 | Ephemeral Communication - In an embodiment, method(s) and system(s) for providing ephemeral communication is described herein. In an implementation, the method may include determining one or more request keywords associated with a request received from a requesting terminal. The request may be intended for initiating communication. The method may further include transmitting, based on the one or more request keywords, a notification to each of a plurality of target terminals over a communication network for joining a communication group. The method may also include initiating the communication between the requesting terminal and at least one target terminal from the plurality of target terminals. The communication may be initiated upon receiving an acceptance notification from the at least one target terminal to join the communication group. | 09-26-2013 |
20130254405 | METHOD AND A SYSTEM FOR AUTOMATING AN ENTERPRISE NETWORK OPTIMIZATION - A method and system for optimizing a distributed enterprise information technology (IT) network infrastructure is disclosed, wherein the IT infrastructure comprises at least one server, at least one storage element, and at least one network element. The method comprises collecting data and arranging the collected data pertaining to an existing state of the information technology network infrastructure in a first set of templates. The method further comprises mapping the existing state and a new state of at least one of the at least one server and at least one storage element with an existing set of network elements using the first set of templates to form a second set of templates, wherein the method further comprises of planning the new state of the IT network infrastructure for transformation using the first set of templates and the second set of templates, the new state being an optimized state. | 09-26-2013 |
20130254113 | ADMINISTERING PAY PER USE SOFTWARE LICENSING - A method and a system for administering pay-per-use (PPU) licensing of software applications are disclosed. The system comprises a processor and a memory. The memory comprises an administrative module configured to generate a license file based upon a request sent by a user. The license file is used by the user for accessing a software application. The administrative module is further configured to receive a log file from the user. The log file comprises a track of at least one of a number of usages of the software application and a time period of the software application. The memory further includes an assessment module configured to determine a validity of the license file based upon the log file. | 09-26-2013 |
20130254033 | SYSTEM AND METHOD FOR DYNAMIC MEMBER SEGMENTATION AND TARGETING - A system and method for dynamic segmentation of members and further rewarding or transmitting one or more promotional notifications to members having an associated member profile, wherein the member profile includes one or more updatable attributes, the method comprising the steps of retrieving a segmentation rule from a promotion rule stored in a database based on triggering of a promotion or notification; dynamically assessing the qualification of members based on matching corresponding predetermined value of one or more attributes of the segmentation rule with the value of the updatable attribute of the member profile based on a rule criteria of the segmentation rule; rewarding or notifying based on a promotion or notification rule. | 09-26-2013 |
20130253909 | SECOND LANGUAGE ACQUISITION SYSTEM - Method(s) and system(s) for speech processing of second language speech are described. According to the present subject matter, the system(s) implement the described method(s) for speech processing of Oriya English. The method for speech processing include receiving a plurality of speech samples of Oriya English to form a speech corpora where the plurality of speech samples comprise sounds of both vowels and consonants and, a plurality of speech parameters are associated with each of the plurality of speech samples. Method also includes determining values of the plurality of speech parameters for each of the plurality of speech samples and identifying difference between the values of each of the plurality of speech parameters and a corresponding value of accent neutral English. Further, the method includes articulating governing language rules based on the identifying to assess phonetic variation and mother tongue influence in sounds of vowels and consonants of Oriya English. | 09-26-2013 |
20130250812 | SYSTEM AND METHOD FOR ENHANCING LIFETIME AND THROUGHPUT IN A DISTRIBUTED WIRELESS NETWORK - A system and method for enhancing lifetime and throughput in a distributed wireless network is disclosed herein. The method may include sensing, by a first machine, different parameters of at least one neighboring machine; updating, by the first machine, at least one parameter of said first machine based on said sensed parameters of said neighboring machine; generating, by the first machine, a signed-graph on the basis of the updated parameter, wherein said generated graph comprises at least two nodes representing said updated parameter and at least one edge interconnecting said two nodes; iteratively updating, by the first machine, the at least one parameter at different time-scales until convergence is achieved; and communicating, by the first machine, inter-layer updates in individual layers of a transmission protocol stack of the first machine due to said update of at least one parameter. | 09-26-2013 |
20130248590 | RECEIPT NUMBER GENERATION - The present subject matter relates to a computer-implemented method for generating a receipt number. The computer-implemented method includes generating a receipt number generation request in response to transaction involving an item to be purchased, wherein the generating is based at least on input data. The computer-implemented method further includes obtaining the receipt number based on the receipt number generation request and one or more predefined rules. In one implementation, the receipt number is indicative of a mode field, a receipt type field, a format type field, a store number field, a till number field, and a transaction number field. | 09-26-2013 |
20130238513 | COLLABORATIVE SYSTEM AND METHOD TO MINE INVENTIONS - A system, method and computer program product for Collaborative Invention Mining (CIM) is described herein, comprising focused segmentation and articulation of an ideation data through a comprehensive 48-cell Idea Detailing Tree (IDT) module and systematically validating and maturing it iteratively towards patentable invention. The IDT is designed based on weighted Category, Area and Characteristic dimensions to widening scope, lengthening coverage and deepening sustenance capabilities of ideation object, respectively. The Collaboration workflow is designed on contextual SFNC (Storm-Form-Norm-Compose) hierarchical maturity stages, each of which further operates ETVX (Entry-Task-Validate-Exit) sequence to mature an ideation data efficiently on a fast track mode to maximize stakeholders' benefits with efficient use of resources. Scoring of the IDT matrix further evaluates and positions the ideation object by cell-pattern identification, dominance determination and Invention Mining Performance measure. A computer implemented system supporting the CIM process integrates with invention management system for administration, portfolio analysis and valuation. | 09-12-2013 |
20130231795 | Method and System for Optimizing a Composite Load Disaggregation - Disclosed is a method and system for optimizing a composite load disaggregation. The system comprises an input module, a factor graph module, a contextual information database, a rule engine, a priori database and a rule database. The factor-graph module is configured to perform factor-graph analysis on one or more input variables received from the input module to generate confidence measures wherein the confidence measures indicate the composite load disaggregation. The method and system is enabled to retrieve contextual information from the contextual information database. The method and system is further enabled to optimize the composite load disaggregation by means of the rule engine. The rule engine is adapted to retrieve one or more rules from the rule database and further adapted to apply retrieved rules to the confidence measures and to the contextual information for identifying at least one appliance from one or more appliances in an electrical environment. | 09-05-2013 |
20130227515 | FORECASTING OF REUSABLE SOFTWARE ASSETS - Systems and methods for forecasting reusable software assets are described. In one embodiment, the method comprises receiving a forecast comprising forecast information pertaining to at least one forecasted software asset. Further, the method comprises mapping the forecast to a domain map based on the forecast information, wherein the domain map includes a plurality of domain constituents. Based in part on the mapping, a development request for creation of the at least one forecasted software asset is generated. | 08-29-2013 |
20130226756 | SYSTEM FOR DEBT COLLECTION WORKFLOW ADMINISTRATION - A method and a system for debt collection workflow administration for a financial institution are disclosed. The method comprises defining a debt collection workflow for a set of stakeholders each having one or more hierarchy levels. The debt collection workflow defines a plurality of functions to be performed at the one or more hierarchy levels of each stakeholder of the set of stakeholders. Further, the debt collection workflow is based in part on regulatory requirements. The method further comprises administering the one or more hierarchy levels. The administering comprises generating statistic cards comprising debtors' information. The administering further comprises encrypting the statistic cards and providing selective access of the statistic cards to the one or more hierarchy levels of each stakeholder of the set of stakeholders based upon access privileges assigned to the one or more hierarchy levels. | 08-29-2013 |
20130226642 | FIELD COLLECTION DEVICE TRACKING - System(s) and method(s) for field collections and tracking of field collection devices are described herein. In an implementation, a field collection device tracking system ( | 08-29-2013 |
20130226623 | INSURANCE CLAIMS PROCESSING - Systems and methods for insurance claims processing in an insurance industry are described. The method comprises combining extracted claims data from one or more data sources to obtain a consolidated claims record and removing noise from text data of the consolidated claims record to obtain a claim dataset. The claims data comprises a plurality of claims. Further, ascertaining one or more suspicion indicators in the plurality of claims based on an analytical technique. Further, assigning a score to each of the plurality of claims based on at least one scoring rule. The score is an indicative of a level of suspicion of a claim. Furthermore, detecting at least one of insurance claims fraud and subrogation potential claims based on the score assigned to each of the plurality of claims. | 08-29-2013 |
20130219227 | Multi-Entity Test Case Execution Workflow - The present subject matter relates to a method for managing a testing workflow, based on execution of at least one Multi Entity Test Case (METC) of the testing workflow. The method includes assigning at least one role to each of a plurality of test steps of the METC, where the at least one role is indicative of a privilege level to execute each of the plurality of test steps. The method also includes defining a failure condition for each of the plurality of test steps, where the failure condition is indicative of an expected result of execution of each of the plurality of test steps. The method further includes specifying a failure action associated with the failure condition for execution of each of the plurality of test steps, executing one of the plurality of test steps, and applying the failure action to proceed with the testing workflow. | 08-22-2013 |
20130218849 | AUTOMATED DICTIONARY CREATION FOR SCIENTIFIC TERMS - Systems and methods for automated creation of a dictionary of scientific terms are described herein. Initially, input data is filtered to obtain a primary file having a plurality of term-ID pairs with each term-ID pair having a unique term ID and a scientific term. Further, a remove-term file is generated based on one or more term-ID pairs identified from the primary file such that the scientific terms of each term-ID pair corresponds to one of additional terms, frequent scientific terns, and undesirable terms. At least one term-ID pair from among the one or more term-ID pairs is altered to obtain a modified term-ID pair based on modification rules. The modified term-ID pair is added to an add-term file and a modified file is obtained based on the remove-term file and the add-term file. Duplicate term-ID pairs present in the modified file are removed to obtain the dictionary of scientific terms. | 08-22-2013 |
20130218738 | Integrating Payment Aggregators With E-Commerce Platform - Systems and methods for integrating an e-commerce platform with at least one payment aggregator are provided. The system comprising a processor and a memory coupled to the processor. The memory comprises an integrating module configured to provide a Generic Interface Framework (GIF). The GIF comprises a plurality of configuration files having activity details of a plurality of payment aggregators. The integrating module is further configured to integrate at least one payment aggregator selected from amongst the plurality of payment aggregators with the e-commerce platform based upon the plurality of configuration files. | 08-22-2013 |
20130212703 | Role-Based Content Rendering - Systems and methods for rendering role-based content are described herein. The system includes a registration module configured to define an application role in a metadata driven framework for providing selective access to the content. The content may include data and content objects. The registration module may also be configured to associate content objects with the application role. The system may also include an authentication module configured to authenticate a user from a plurality of users. The user may be authenticated based on log-in credentials of the user. The authentication module may also determine the application role of the user. Additionally, the authentication module may identify one or more content objects based on the determined application role of the user. The content objects may be identified based on the application role of the user. | 08-15-2013 |
20130211881 | Product Pricing in E-Commerce - Systems and methods for dynamically fixing price of a product in an electronic commerce (e-commerce) environment are described. In one embodiment, the method comprises obtaining product information associated with the product. Further, the method comprises extracting a real time market price of at least one product constituent indicated in the product information from at least one market information source. Furthermore, the method comprises evaluating a market price factor for the product based on the extracting, where the market price factor is indicative of impact of market conditions onto the price of the product. Based at least on the product information and the market price factor, a real time selling price of the product may be fixed. | 08-15-2013 |
20130211569 | System and Method for Providing Enterprise Information Technology Lifecycle Tools Synchronization Platform - The present invention relates to a system and method for integrating and assembling plurality of service delivery tools created on disparate technologies on a product assembly platform. Further, the invention provides a reference architecture and method for orchestrating the assembled plurality of service delivery tools and monitoring the lifecycle activities of the plurality of service delivery tools. | 08-15-2013 |
20130208881 | System for Conversation Quality Monitoring of Call Center Conversation and a Method Thereof - The present invention is related to improving a conversation quality of calls in a call center setup/environment. The system of the present invention allows monitoring of several live ongoing audio conversations to alert supervisor regarding vulnerable/deviations in the call being handled by a call center agent. The alerts are displayed on the supervisor console by way of providing graphical visual display in order to seek attention of the supervisor. The system also facilitates the supervisor to listen to the live conversation on his desktop by clicking on the visual display. | 08-15-2013 |
20130204911 | REAL TIME PERFORMANCE MONITORING - Systems and methods for real time performance monitoring of an application are described. In one implementation, when a metrics collection request is obtained from a user device, a data storage location is selected from a plurality of data storage locations based on a location status associated with the data storage location. The metrics data, for monitoring the performance of the application, is then provided to the user device through a data store from the selected data storage location in real time. | 08-08-2013 |
20130204796 | INNOVATION MANAGEMENT - The subject matter described herein relates to a system and a method for innovation management. The method is performed to ascertain a current innovation maturity level from a plurality of innovation maturity levels of a unit. In that respect, the system assesses inputs received from the unit to calculate a score of each of a plurality of innovation factors. The score is used to determine the factor strength of each of a plurality of innovation factors for each of the innovation maturity levels. Based on the factor strength, the current innovation maturity level is ascertained for the unit. | 08-08-2013 |
20130204458 | SYSTEM, A METHOD AND, AN APPARATUS FOR VEHICULAR COMMUNICATION - A system and method vehicle-to-mobile communication using a smart horn ( | 08-08-2013 |
20130203037 | EXAMINATION MANGEMENT - The present subject matter discloses a method and system ( | 08-08-2013 |
20130198265 | CONNECTION MANAGEMENT IN A COMPUTER NETWORKING ENVIRONMENT - The present subject matter discloses a system and a method for managing a connection between a client and an application within a server in a network. In one implementation, the method includes receiving a connection request from the client. The method further includes associating with a worker thread, a unique identifier (UID) that uniquely identifies the received connection request. Further, the method involves, communicating a message that includes client data associated with the connection request to the application by the worker thread. The method also includes obtaining, by a reverse worker thread, a reply message associated with the UID from the application. The reverse worker thread is configured to communicate the reply message to the client. | 08-01-2013 |
20130197863 | PERFORMANCE AND CAPACITY ANALYSIS OF COMPUTING SYSTEMS - The present subject matter relates to systems and methods for assessing performance and capacity of computing systems. In one implementation, the method comprises identifying at least one gap in a plurality of benchmark data sets of the computing systems; ascertaining at least one of a maximum ratio, a minimum ratio, and an average ratio of values present in the plurality of benchmark data sets; and generating at least one value to fill the at least one gap based in part on the ascertaining. The method further comprises defining a normalized benchmark data sheet based in part on the generating; and determining a performance and capacity score (P/C score), indicative of performance and capacity of the computing systems, based in part on the normalized benchmark data sheet. | 08-01-2013 |
20130194419 | Automatic Detection of Moving Object by Using Stereo Vision Technique - The present invention discloses a system and method for identifying a moving object in front of a vehicle by using stereo vision based technique. The invention also discloses a method and a system for determining an instantaneous distance between the moving object and the vehicle by processing the image of the moving object through a processor and by filtering and refining the image by using a Kalman filter to remove noise. | 08-01-2013 |
20130194073 | EVENT MANAGEMENT SYSTEM - Systems and methods for event management are described. In one embodiment of the present subject matter, an audio beacon indicative of a location code associated with a location is received from a user device by an event management system. The event management system may then identify the location and an event associated with the location, based on a current time and an event schedule. Event content related to the identified event may then be provided to the user device in real time. In another embodiment, visual tag data pertaining to color coded tags embedded in one or more objects in the location of the event may be received and information content related to the object may be provided to the user device, based on the event schedule. | 08-01-2013 |