Patent application number | Description | Published |
20080208801 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR ANALYSIS OF BIOLOGICAL SYSTEMS - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080208813 | SYSTEM AND METHOD FOR QUALITY CONTROL IN HEALTHCARE SETTINGS TO CONTINUOUSLY MONITOR OUTCOMES AND UNDESIRABLE OUTCOMES SUCH AS INFECTIONS, RE-OPERATIONS, EXCESS MORTALITY, AND READMISSIONS - A method for inferring a probability of a first inference. The inference is related to identification of a cause of an outcome in a healthcare setting. A fact, related to the query, is related to the healthcare setting. The fact further relates to a network of interactions associated with the outcome. Each datum of the database conforms to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query establishes a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080208814 | SYSTEM AND METHOD OF ACCIDENT INVESTIGATION FOR COMPLEX SITUATIONS INVOLVING NUMEROUS KNOWN AND UNKNOWN FACTORS ALONG WITH THEIR PROBABILISTIC WEIGHTINGS - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference related to a chaotic event. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. The probability of the first inference relates to a cause of the chaotic event, an affect of the chaotic event, an effect of the chaotic event, whether an event is related to the chaotic event, a whether an object is related to the chaotic event, and combinations thereof. | 08-28-2008 |
20080208832 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR PHARMACEUTICAL ANALYSIS - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080208838 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE HAVING ACTION TRIGGERS BASED ON INFERRED PROBABILITIES - Inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. An action trigger is executed responsive to at least one of a) the probability of the first inference exceeding a first pre-selected value, b) a significance of the inference exceeding a second pre-selected value, c) a rate of change in the probability of the first inference exceeding a third pre-selected value, d) an amount of change in the probability of the first inference exceeding a fourth pre-selected value, and e) combinations thereof. At least one of the probability of the first inference and the action trigger is stored in the database. | 08-28-2008 |
20080208875 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR PRIVACY AND SECURITY FILTERING - Inferring a probability of a first inference absent from a database. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. Security filtering is performed based on at least one of a significance level of the probability of the first inference, the probability itself exceeding a pre-selected value, and a security level possessed by a user. | 08-28-2008 |
20080208901 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR ANALYSIS OF CRIMINAL AND SECURITY INFORMATION - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080208902 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR ANALYSIS OF CHAOTIC EVENTS - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080208903 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR CLINICAL APPLICATIONS - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080208904 | SYSTEM AND METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR ANALYSIS OF COMPLEX ACCIDENTS - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 08-28-2008 |
20080270034 | SYSTEM AND METHOD FOR DETECTION OF EARTHQUAKES AND TSUNAMIS, AND HIERARCHICAL ANALYSIS, THREAT CLASSIFICATION, AND INTERFACE TO WARNING SYSTEMS - A computer implemented method of producing macro-view conclusion data related to a seismic event. The method includes receiving at a processing center a set of data related to a parameter of a seismic event. The parameter is measured using a vibration sensor of a hard disk drive of a computer at a known, fixed location, wherein the vibration sensor produces the set of data. The method further includes processing the set of data at the processing center to produce the macro-view conclusion data. The macro-view conclusion data is then stored in a storage device. | 10-30-2008 |
20080278334 | SYSTEM AND METHOD TO AID IN THE IDENTIFICATION OF INDIVIDUALS AND GROUPS WITH A PROBABILITY OF BEING DISTRESSED OR DISTURBED - A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The first inference relates to identifying a potentially violent person or group. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 11-13-2008 |
20080288430 | SYSTEM AND METHOD TO INFER ANOMALOUS BEHAVIOR OF MEMBERS OF COHORTS AND INFERENCE OF ASSOCIATE ACTORS RELATED TO THE ANOMALOUS BEHAVIOR - Inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The first inference relates to identifying anomalous behavior of cohorts members, which identification can be used to identify crimes that are particularly difficult to detect, such as identity theft. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 11-20-2008 |
20080294459 | Health Care Derivatives as a Result of Real Time Patient Analytics - A computer implemented method that includes receiving a cohort. The cohort comprises first data regarding a set of patients and second data comprising a relationship of the first data to at least one additional datum existing in at least one database. A numerical risk assessment is associated with the cohort. The computer implemented method further includes establishing a monetary value for the cohort, wherein the monetary value is based at least on the numerical risk assessment. | 11-27-2008 |
20080294692 | Synthetic Events For Real Time Patient Analysis - Generating synthetic events based on a vast amount of data. First and second data are received. The first data is organized into a first cohort. The second data is organized into a second cohort. The first cohort and the second cohort are processed to generate a synthetic event. The synthetic event comprises third data representing a result of a mathematical computation defined by S(p | 11-27-2008 |
20080306984 | SYSTEM AND METHOD FOR SEMANTIC NORMALIZATION OF SOURCE FOR METADATA INTEGRATION WITH ETL PROCESSING LAYER OF COMPLEX DATA ACROSS MULTIPLE DATA SOURCES PARTICULARLY FOR CLINICAL RESEARCH AND APPLICABLE TO OTHER DOMAINS - A computer implemented method, apparatus, and computer usable program code for mapping data. A rule set is received. The rule set defines a semantic conceptual mapping between a source attribute of a source datum and a target attribute of a target domain. Furthermore, the rule set is implemented using first metadata associated with the source datum. A semantic conceptual construct is created based on the rule set. The semantic conceptual construct specifies the semantic conceptual mapping and is adapted to interact with a tool for performing an extract, transform, and load process. The source datum is mapped to the target domain using the tool. The tool performs the semantic conceptual mapping using the semantic conceptual construct. A conformed datum is created by the semantic conceptual mapping. The conformed datum is stored in a target data repository. | 12-11-2008 |
20080307430 | SYSTEM AND METHOD FOR A MULTIPLE DISCIPLINARY NORMALIZATION OF SOURCE FOR METADATA INTEGRATION WITH ETL PROCESSING LAYER OF COMPLEX DATA ACROSS MULTIPLE CLAIM ENGINE SOURCES IN SUPPORT OF THE CREATION OF UNIVERSAL/ENTERPRISE HEALTHCARE CLAIMS RECORD - Exemplary illustrative embodiments provide for a computer implemented method, apparatus, and computer usable program code for mapping data. The mapping is defined by a user and maps a source datum to a target datum having a target attribute. The mapping is defined using metadata. Source specific information is omitted from the mapping and stored in a target data repository. | 12-11-2008 |
20090024553 | AUTOMATIC GENERATION OF NEW RULES FOR PROCESSING SYNTHETIC EVENTS USING COMPUTER-BASED LEARNING PROCESSES - A computer implemented method. A first synthetic event is received. The first synthetic event is derived from a first cohort comprising a first set of data and a second cohort comprising a second set of data. The first synthetic event comprises a third set of data representing a result of a mathematical computation on the first and second cohorts. A first rule set is created, the first synthetic event being expected as a result of application of the first rule set to the first cohort and the second cohort. The first rule set is applied to the first cohort and the second cohort to achieve a first result. The first result comprises a second event that is compared to the first synthetic event. A comparison is formed, the comparison comprising additional data that can be used to describe a difference between the second event and the first synthetic event. | 01-22-2009 |
20090106179 | SYSTEM AND METHOD FOR THE LONGITUDINAL ANALYSIS OF EDUCATION OUTCOMES USING COHORT LIFE CYCLES, CLUSTER ANALYTICS-BASED COHORT ANALYSIS, AND PROBABLISTIC DATA SCHEMAS - A computer implemented method, computer program product, and data processing system for performing analysis on a plurality of data stored in a database. In an illustrative method, a first cohort is generated from the plurality of data. An optimal control cohort is generated from the plurality of data. Generating is performed based on the first cohort and at least one constraint, and a mathematical process is used to derive the optimal control cohort. A first inference is generated based on a comparison of the first cohort to the optimal control cohort, wherein the first inference is absent from the database. In an illustrative example, the first inference is stored. | 04-23-2009 |
20090171889 | SYSTEM AND METHOD FOR OPTIMIZING FEDERATED AND ETL'D DATABASES WITH CONSIDERATIONS OF SPECIALIZED DATA STRUCTURES WITHIN AN ENVIRONMENT HAVING MULTIDIMENSIONAL CONSTRAINTS - A method for creating a data warehousing scheme having optimally selected components. A mathematical model of a goal for the data warehousing scheme is input into an optimization engine. At least one constraint on the data warehousing scheme is input into the optimization engine. A mathematical optimization algorithm is performed using the optimization engine, wherein an output of the optimization engine is an optimized data warehousing scheme having optimally selected components. The optimized data warehousing scheme can be stored. | 07-02-2009 |
20090177605 | RISK ASSESSMENT WITHIN AN AIRCRAFT - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within an aircraft. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score. | 07-09-2009 |
20090177606 | RISK ASSESSMENT IN A PRE/POST SECURITY AREA WITHIN AN AIRPORT - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a pre/post security area within an airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives inference data comprising inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score. | 07-09-2009 |
20090177608 | RISK ASSESSMENT IN A GATE AREA OF AN AIRPORT - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a gate area of an airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score. | 07-09-2009 |
20090177609 | RISK ASSESSMENT IN AN AREA EXTERNAL TO AN AIRPORT - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a security perimeter area surrounding an airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score. | 07-09-2009 |
20090177614 | RISK ASSESSMENT BETWEEN AIRCRAFTS - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a first aircraft. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score. | 07-09-2009 |
20090177615 | RISK ASSESSMENT BETWEEN AIRPORTS - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a first airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score. | 07-09-2009 |
20090208054 | MEASURING A COHORT'S VELOCITY, ACCELERATION AND DIRECTION USING DIGITAL VIDEO - A computer implemented method, apparatus, and computer program product for identifying positional data for an object moving in an area of interest. Positional data for each camera in a set of cameras associated with the object is retrieved. The positional data identifies a location of each camera in the set of cameras within the area of interest. The object is within an image capture range of each camera in the set of cameras. Metadata describing video data captured by the set of cameras is analyzed using triangulation analytics and the positional data for the set of cameras to identify a location of the object. The metadata is generated in real time as the video data is captured by the set of cameras. The positional data for the object is identified based on locations of the object over a given time interval. The positional data describes motion of the object. | 08-20-2009 |
20090234839 | SMART SENSOR BASED ENVIRONMENT FOR OPTIMIZING A SELECTION OF MEAL PLANS - A computer implemented method, apparatus, and computer program product for selection of meal plans. In one embodiment, a set of prospective guests are identified from at least one of a set of sensors collecting historical attendance data and a calendaring application. A set of nutritional requirements is then identified for the set of prospective guests. Thereafter, a set of meal plans is selected on an availability of ingredients and the nutritional requirements of the set of prospective guests, wherein the availability of ingredients is determined by sensors from the set of sensors monitoring the ingredients. | 09-17-2009 |
20090240513 | OPTIMIZING CLUSTER BASED COHORTS TO SUPPORT ADVANCED ANALYTICS - A computer implemented method, apparatus, and computer program product is provided for selecting subjects for treatment study cohorts. A set of selected dimensions for optimizing selection of subjects for a treatment cohort group and a control cohort group associated with a treatment study is identified. Attribute data associated with subjects in the pool of available subjects is clustered at the atomic level to form clustered cohort data. A set of optimized subjects from a pool of available subjects is selected using the clustered cohort data and the set of selected dimensions. Subjects in the set of optimized subjects are optimized across the set of selected dimensions. Each subject in the set of optimized subjects is assigned to the treatment cohort group or the control cohort group. | 09-24-2009 |
20090240556 | ANTICIPATING MERCHANDISING TRENDS FROM UNIQUE COHORTS - A computer implemented method, apparatus, and computer-usable program product for identifying marketing trends in unique cohort groups. Information describing a plurality of unique cohort groups associated with a public environment is retrieved. Each member of a cohort group in the plurality of unique cohort groups shares at least one common attribute. Sets of attributes associated with the plurality of unique cohort groups are identified. The sets of attributes are analyzed by a cohort trend detection engine to identify attribute trends associated with the sets of attributes and a frequency of occurrence of the attribute trends in the plurality of unique cohort groups to form current attribute trends. In response to a query to an inference engine requesting inferences associated with the marketing trends, inferences describing future occurrences of the attributes in the plurality of cohort groups are received to form a set of future attribute trends. A set of marketing trends are generated using the current attribute trends and the set of future attribute trends. The set of marketing trends describes probable future marketing trends in the given environment. | 09-24-2009 |
20090240695 | UNIQUE COHORT DISCOVERY FROM MULTIMODAL SENSORY DEVICES - According to one embodiment of the present invention, a computer implemented method, apparatus, and computer-usable program product for generating unique cohort groups using multimodal sensory device. Multimodal sensory data is received from a set of multimodal sensors in a public environment. The set of multimodal sensors are associated with a network. The multimodal sensory data is received from the set of multimodal sensors over the network. The multimodal sensory data is processed to generate a plurality of attributes to form cohort attributes. A plurality of unique cohort groups is generated using the cohort attributes and the multimodal sensory data. Each member of the cohort group shares at least one common attribute. | 09-24-2009 |
20090265206 | SYSTEM AND METHOD FOR MANAGING A CHAOTIC EVENT - A computer implemented method, apparatus, and computer usable program code for managing a chaotic event. A management location is determined for managing a chaotic event in response to receiving an indication of the chaotic event. Resources necessary for managing the chaotic event are identified. The availability of the necessary resources is determined to form available resources. The available resources are optimized based on requirements and constraints to form optimized resources. The availability and cost of the optimized resources are verified. The chaotic event is managed from the management location using the optimized resources. | 10-22-2009 |
20090287503 | ANALYSIS OF INDIVIDUAL AND GROUP HEALTHCARE DATA IN ORDER TO PROVIDE REAL TIME HEALTHCARE RECOMMENDATIONS - A method for managing data. A datum regarding a first patient is received. A first set of relationships is established. The first set of relationships comprises at least one relationship of the datum to at least one additional datum existing in at least one database. A plurality of cohorts to which the first patient belongs is established based on the first set of relationships. Ones of the plurality of cohorts contain corresponding first data regarding the first patient and corresponding second data regarding a corresponding set of additional information. The corresponding set of additional information is related to the corresponding first data. The plurality of cohorts is clustered according to at least one parameter, wherein a cluster of cohorts is formed. A determination is made of which of at least two cohorts in the cluster are closest to each other. The at least two cohorts can be stored. | 11-19-2009 |
20090299766 | SYSTEM AND METHOD FOR OPTIMIZING MEDICAL TREATMENT PLANNING AND SUPPORT IN DIFFICULT SITUATIONS SUBJECT TO MULTIPLE CONSTRAINTS AND UNCERTAINTIES - A computer implemented method for managing a condition of a patient during a chaotic event. A datum regarding a first patient is received. A first set of relationships is established. The first set of relationships comprises at least one relationship of the datum to at least one additional datum existing in a database. Based on the first set of relationships, cohorts to which the first patient belongs are established. Ones of the plurality of cohorts contain first data regarding the first patient and second data regarding a set of additional information. The set of additional information is related to the first data. The second data further regards a constraint imposed by a chaotic event. The plurality of cohorts is clustered according to at least one parameter. A cluster of cohorts is formed. Which of at least two cohorts in the cluster are closest to each other is determined. | 12-03-2009 |
20090316968 | MAPPING OF LITERATURE ONTO REGIONS OF INTEREST ON NEUROLOGICAL IMAGES - A computer implemented method, apparatus, and computer program product for analyzing neurological images. A set of brain scans for a patient is compared to a set of baseline control scans to automatically identify regions of interest in the set of patient scans. A region of interest is an area in a scan that shows an indication of a potential abnormality. A set of electronic medical literature sources is searched for medical literature relevant to the regions of interest in the set of patient scans. The relevant medical literature is correlated to the medical literature describing the regions of interest in the set of patient scans to the regions of interest in the set of patient scans. A result is generated. The result comprises the regions of interest and a set of links to the correlated portions of the relevant medical literature are outputted. | 12-24-2009 |
20090316969 | DETERMINING EFFICACY OF THERAPEUTIC INTERVENTION IN NEUROSYCHIATRIC DISEASE - A computer implemented method, apparatus, and computer program product for determining the efficacy of neuropsychiatric therapy is provided. A neuroimage mapping manager automatically compares a first set of regions of interest in a first set of scans taken at a first time to a second set of regions of interest in a second set of scans generated at a second time and identifies a set of changes in the regions of interest occurring over time. The neuroimage mapping manager searches a set of electronic medical literature sources for medical literature relevant to the set of changes in the regions of interest and identifies portions of the relevant medical literature associated with the set of changes in the regions of interest. The neuroimage mapping manager generates results comprising the set of changes in the regions of interest and a set of links to the portions of the relevant medical literature. | 12-24-2009 |
20100010316 | DIFFERENTIAL DIAGNOSIS OF NEUROPSYCHIATRIC CONDITIONS - A computer implemented method, apparatus, and computer program product for generating neuropsychiatric diagnoses. Quantitative information describing diagnostic characteristics associated with a patient is generated based on an analysis of a set of patient scans. The quantitative information comprises a set of indictors associated with regions of interest in the set of scans for the patient. The set of indicators of potential neuropsychiatric conditions is compared with a set of diagnostic signatures. A diagnostic signature comprises a set of indicators of a known neuropsychiatric condition. Matching signatures are identified. A matching signature is a diagnostic signature that corresponds to at least one indicator in the set of indicators to form a set of signatures. A diagnosis associated with each signature in the set of signatures is identified to form a set of potential diagnoses. The set of potential diagnoses is presented with links to relevant portion of the medical literature. | 01-14-2010 |
20100010363 | DETERMINATION OF NEUROPSYCHIATRIC THERAPY MECHANISMS OF ACTION - A computer implemented method, apparatus, and computer program product of determining mechanisms of action for therapies. A first set of brain scans for each subject in a plurality of subjects generated at a first time period and a second set of brain scans for each subject generated at a second time period are received. Each subject is diagnosed with a given condition and received a given therapy. A set of changes in the set of brain scans is identified for the each subject based on a comparison of a first set of regions of interest in the first set of scans for each subject with a second set of regions of interest in the second set of scans for each subject. A set of typical changes attributable to the given therapy is identified. A mechanism of action for the given therapy is generated based on the set of typical changes. | 01-14-2010 |
20100010827 | AUTOMATICALLY DEVELOPING NEUROPSYCHIATRIC TREATMENT PLANS BASED ON NEUROIMAGE DATA - A computer implemented method, apparatus, and computer program product for developing neuropsychiatric treatment plans. A treatment plan generator receives a set of diagnoses for a patient. The treatment plan generator automatically analyzes medical information in a set of electronic medical literature sources for potential therapies associated with treatment of each identified condition in the set of diagnoses. The treatment plan generator identifies the potential therapies associated with the treatment of each diagnosed condition. The treatment plan generator selects a set of recommended therapies from the potential therapies based on portions of the medical literature describing each therapy in the potential therapies and a medical history for the patient. The treatment plan generator generates a treatment plan. The treatment plan comprises the set of recommended therapies to treat each diagnosed condition in the set of diagnoses. | 01-14-2010 |
20100010831 | AUTOMATICALLY DETERMINING IDEAL TREATMENT PLANS FOR COMPLEX NEUROPSYCHIATRIC CONDITIONS - A computer implemented method, apparatus, and computer program product for modifying neuropsychiatric treatment plans based on efficacy of treatment. A current treatment plan comprising a first set of therapies to treat a set of neuropsychiatric conditions and portions of the medical literature associated with the set of neuropsychiatric conditions is retrieved. A set of brain scans of the patient is analyzed to determine a set of changes over time associated with the set of neuropsychiatric conditions. The portions of the medical literature and the set of changes are analyzed to determine a patient rate of response to the treatment plan. If the patient rate of response falls below a threshold expected rate, a set of alternative treatments for the patient is identified. A modified treatment plan is generated using the set of alternative treatments. | 01-14-2010 |
20100049805 | Selection and Delivery of Messages Based on an Association of Pervasive Technologies - A computer implemented method, apparatus, and computer program product for selectively delivering messages. In one embodiment, the process identifies a set of pervasive devices using detection data. The detection data comprises an electronic signature transmitted from the set of pervasive devices associated with a set of users in a monitored location. The process then assigns a demographic profile to each user of the set of users based on an identity of a pervasive device from the set of pervasive devices which is associated with the user. Thereafter, the process presents a set of messages to the set of users, wherein the set of messages are selected using the demographic profile assigned to each user of the set of users. | 02-25-2010 |
20100114660 | SYSTEM AND METHOD FOR MAKING AN INFERENCE BASED ON CUMULATIVE DATA - A method for making an inference based on cumulative data. The method utilizes video, audio, and biometric devices to observe a retail environment for the presence of a customer. Once a customer is present, the method identifies every cohort to which the customer corresponds. Next, the method observes the customer as they peruse aisles in the retail environment. When the customer selects a product, the method identifies the selected product and searches the cohorts for alternate products to offer the customer. The method offers one alternate product to the customer and records to the cohorts whether the customer thereinafter accepts the method's offer and selects the alternate product or rejects the method's offer and continues perusing the retail environment aisles. The method continues observing the customer and offering alternate product until the customer leaves the retail environment. | 05-06-2010 |
20100131206 | Identifying and Generating Olfactory Cohorts Based on Olfactory Sensor Input - A computer implemented method, apparatus, and computer program product for generating olfactory cohorts. Olfactory data is received from a set of chemical sensors. The olfactory data describes a set of olfactory patterns for an air sample. The olfactory data is processed to identify attributes of particles in the air sample and generate digital olfactory data. The digital olfactory data comprises metadata describing the attributes of the particles in the air sample to form digital olfactory data. A set of olfactory cohorts is generated using the attributes in the digital olfactory data. | 05-27-2010 |
20100131263 | Identifying and Generating Audio Cohorts Based on Audio Data Input - A computer implemented method, apparatus, and computer program product for generating audio cohorts. An audio analysis engine receives audio data from a set of audio input devices. The audio data is associated with a plurality of objects. The audio data comprises a set of audio patterns. The audio data is processed to identify attributes of the audio data to form digital audio data. The digital audio data comprises metadata describing the attributes of the audio data. A set of audio cohorts is generated using the digital audio data and cohort criteria. Each audio cohort in the set of audio cohorts comprises a set of objects from the plurality of objects that share at least one audio attribute in common. | 05-27-2010 |
20100148970 | Generating Deportment and Comportment Cohorts - A computer implemented method, apparatus, and computer program product for generating deportment and comportment cohorts. Digital sensor data associated with an individual is received. The digital sensor data comprises event metadata describing a set of events associated with the individual. The set of events comprises at least one of body language, facial expressions, vocalizations, and social interactions of the individual. In response to determining description data for the individual is available, the description data is retrieved. The description data comprises at least one of identification information, past history information, and current status information for the individual. A set of conduct analysis models based on the event metadata and the available description data is selected. The set of conduct analysis models process the event metadata describing the set of events associated with the individual to identify and interpret the set of events. The event metadata and the description data is analyzed in the set of conduct analysis models to form a deportment and comportment cohort. The deportment and comportment cohort comprises attributes identifying a demeanor and manner of the individual. | 06-17-2010 |
20100150457 | Identifying and Generating Color and Texture Video Cohorts Based on Video Input - A computer implemented method, apparatus, and computer program product for generating video based cohorts. Digital video data is processed to identify a set of color and texture based attributes associated with the set of objects. The digital video data comprises metadata describing the set of objects. The set of color and texture based attributes are analyzed using cohort criteria to form a result. The cohort criteria specify attributes that are associated with members of a given cohort. A set of cohorts is generated based on the result. Each cohort in the set of cohorts comprises a subset of objects from the set of objects that share at least one color and texture based attribute in common. | 06-17-2010 |
20100150458 | Generating Cohorts Based on Attributes of Objects Identified Using Video Input - A computer implemented method, apparatus, and computer program product for generating video based cohorts. Digital video data is processed to identify a set of size and shape based attributes associated with the set of objects. The digital video data comprises metadata describing the set of objects. A size and shape attribute comprises an attribute describing a shape associated with a portion of an object or a size measurement of the portion of the object. The set of size and shape based attributes are analyzed using cohort criteria to form a result. The cohort criteria specify attributes that are associated with members of a given cohort. A set of cohorts is generated based on the result. Each cohort in the set of cohorts comprises a subset of objects from the set of objects that share at least one size and shape based attribute in common. | 06-17-2010 |
20100153133 | Generating Never-Event Cohorts from Patient Care Data - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for generating never-event cohorts. In response to receiving patient care data derived from a population of patients, the patient care data is processed to form digital patient care data. The digital patient care data includes metadata describing a set of patient care patterns associated with one or more patients in the population of patients. The digital patient care data is analyzed using cohort criteria to identify a set of never-event attributes from the set of patient care patterns. The cohort criteria specifies at least one never-event attribute from the set of never-event attributes for each cohort in a set of never-event cohorts. Thereafter, a set of never-event cohorts is generated. The set of never-event cohorts is formed from members selected from the population of patients, and each member of a cohort in the set of never-event cohorts has the at least one never-event attribute in common. | 06-17-2010 |
20100153146 | Generating Generalized Risk Cohorts - A computer implemented method, apparatus, and computer program product for generating general risk scores for general risk cohorts. Digital sensor data associated with a general risk cohort is received from a set of multimodal sensors. The digital sensor data comprises metadata describing attributes associated with at least one member of the general risk cohort. Each member of the general risk cohort comprises data describing objects belonging to a category. A general risk score for the general risk cohort is generated based on selected risk factors and the attributes associated with the at least one member of the general risk cohort. In response to a determination that the general risk score exceeds a risk threshold, a response action is initiated. | 06-17-2010 |
20100153147 | Generating Specific Risk Cohorts - A computer implemented method, apparatus, and computer program product for generating risk scores for specific risk cohorts. Digital sensor data associated with a specific risk cohort is received from a set of multimodal sensors. The specific risk cohort includes a set of identified cohort members. The digital sensor data includes metadata describing attributes associated with at least one cohort member in the set of identified cohort members. Description data for each cohort member in the set of identified cohort members is retrieved to form a set of cohort description data. The description data for each cohort member comprises data describing a previous history of the cohort member or a current status of the cohort member. The cohort member is a person, animal, plant, thing, or location. A specific risk score is generated for the specific risk cohort based on selected risk factors, the attributes associated with the at least one identified member, and the set of cohort description data. A response action is initiated in response to a determination that the specific risk score exceeds a risk threshold. | 06-17-2010 |
20100153174 | Generating Retail Cohorts From Retail Data - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for generating retail cohorts. In an illustrative embodiment, retail data derived from a population of retail customers is received and processed to form digital retail data. The digital retail data includes metadata describing a set of retail patterns associated with one or more customers in the population of retail customers. The set of retail patterns form a set of retail attributes for cohort generation. The digital retail data is analyzed using cohort criteria to identify a set of retail cohorts based on the set of retail attributes. The cohort criteria specify at least one retail attribute from the set of retail attributes for each cohort in the set of retail cohorts. Thereafter, a set of retail cohorts are generated. The retail cohorts have members selected from the population of retail customers, and have the at least one retail attribute in common. | 06-17-2010 |
20100153180 | Generating Receptivity Cohorts - A computer implemented method, apparatus, and computer program product for generating receptivity cohorts. Digital sensor data associated with a set of individuals is retrieved in response to receiving an identification of a proposed future change in a current set of circumstances associated with the set of individuals. The digital sensor data comprises events metadata describing a set of events associated with the set of individuals. The set of events comprises at least one of body language, facial expressions, vocalizations, and social interactions of the set of individuals. An analysis server selects a set of receptivity analysis models based on the proposed future event and the set of events. Each analysis model in the set of receptivity analysis models analyzes the set of events to identify conduct attributes indicating receptiveness of each individual in the set of individuals to the proposed future change. The events metadata describing the set of events is analyzed in the selected set of receptivity analysis models to form a receptivity cohort. The receptivity cohort comprises a set of conduct attributes indicating receptiveness of each individual in the set of individuals to the proposed future change. | 06-17-2010 |
20100153353 | Generating Predilection Cohorts - A computer implemented method, apparatus, and computer program product for generating risk scores for specific risk cohorts. Digital sensor data associated with a specific risk cohort is received from a set of multimodal sensors. The specific risk cohort includes a set of identified cohort members. The digital sensor data includes metadata describing attributes associated with at least one cohort member in the set of identified cohort members. Description data for each cohort member in the set of identified cohort members is retrieved to form a set of cohort description data. The description data for each cohort member comprises data describing a previous history of the cohort member or a current status of the cohort member. The cohort member is a person, animal, plant, thing, or location. A specific risk score is generated for the specific risk cohort based on selected risk factors, the attributes associated with the at least one identified member, and the set of cohort description data. A response action is initiated in response to a determination that the specific risk score exceeds a risk threshold. | 06-17-2010 |
20100153389 | Generating Receptivity Scores for Cohorts - A computer implemented method, apparatus, and computer program product for generating receptivity cohorts. A receptivity cohort is identified. The receptivity cohort includes a set of members and conduct attributes for the set of members. Each conduct attribute in the set of conduct attributes describes at least one of a facial expression, vocalization, body language, and social interactions of a member in the set of members. Each conduct attribute is an indicator of receptiveness to a proposed future change in a set of circumstances associated with the set of members. Events metadata is received. The events metadata describes the set of circumstances associated with the set of members. The set of conduct attributes and the events metadata is analyzed to generate a receptivity score for the receptivity cohort. The receptivity score indicates a level of receptiveness of the set of members to the proposed future change in the set of circumstances. The set of members of the receptivity cohort are identified as receptive to the proposed future change based on the result of a comparison of the receptivity score to a threshold score. | 06-17-2010 |
20100153390 | Scoring Deportment and Comportment Cohorts - A computer implemented method, apparatus, and computer program product for scoring deportment and comportment cohorts. A deportment and comportment cohort having a set of conduct attributes is received. The conduct attributes may include at least one of a facial expression, vocalization, body language, and social interactions. A deportment and comportment cohort score is calculated. The deportment and comportment cohort score is normalized to calculate an overall deportment and comportment cohort score using at least one of demographic data and patterns of historical conduct. The overall cohort score indicates an appropriateness of conduct displayed by a member of the deportment and comportment cohort. Thereafter, a predefined action is executed based on the overall deportment and comportment cohort score. | 06-17-2010 |
20100153458 | Identifying and Generating Sensor and Actuator Cohorts - A computer implemented method, apparatus, and computer program product for generating a cohort using sensor and actuator input data. A signal is received from a set of sensors and actuators associated with a set of objects. In response to a determination that the signal is in an analog format, the signal is converted from the analog format into a digital format to form digital signal data. The digital signal data is processed to identify sensor and actuator attributes associated with the set of objects. The digital signal data comprises metadata describing the identified sensor and actuator attributes. A set of cohorts is generated using the sensor and actuator attributes, wherein each cohort in the set of cohorts comprises a subset of objects from the set of objects that share at least one sensor and actuator attribute in common. | 06-17-2010 |
20100153470 | Identifying and Generating Biometric Cohorts Based on Biometric Sensor Input - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for generating biometric cohorts. In one embodiment, biometric data is received which identifies a set of biometric patterns. The biometric data is received from a set of biometric sensors. The biometric data is processed to form digital biometric data that identifies attributes of the biometric data. In addition, the digital biometric data includes metadata describing the attributes of the biometric data. Thereafter, a set of biometric cohorts is generated using the digital biometric data. Each member of the set of biometric cohorts shares at least one biometric attribute in common. | 06-17-2010 |
20100153597 | Generating Furtive Glance Cohorts from Video Data - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for generating furtive glance cohorts. In an illustrative embodiment, video data of a monitored population is received and processed to form digital video data. The digital video data includes metadata describing glancing patterns associated with one or more subjects from the monitored population. The digital video is analyzed to identify a set of furtive glance patterns from the glancing patterns. One or more furtive glance attributes for the set of furtive glance cohorts are selected from the set of furtive glance patterns. Thereafter, the set of furtive glance cohorts is generated. The set of furtive glance cohorts have members selected from the monitored population and have at least one furtive glance attribute in common. | 06-17-2010 |
20100165457 | FACILITATING THE MORE NATURAL AIMING OF TELESCOPES - The illustrative embodiments provide for a computer implemented method, computer readable medium, and data processing system for adjusting a perceived image seen through an optical observation device. The azimuth-elevation-rotation of the optical observation device is measured relative to an observer. The field of view observed through the observation device appears with at least one of rotated and inverted optical translation relative to observation of the object with an unaided eye of the observer. Based on the celestial coordinate system inherent in the design of the mounting of the optical observation device, moving optical observation device in the optical translation direction, wherein the field of view moves in the optical view direction, and wherein the celestial coordinate system is selected from a group consisting of an equatorial coordinate system and an azimuth-elevation coordinate system. | 07-01-2010 |
20100262918 | MANAGEMENT OF DATA ON RELATED WEBSITES - A computer-implemented method, system and computer program product of managing and sharing entries into a webpage are presented. The computer-implemented method receives an input to an input box located in a first webpage on a first network. This input is analyzed to determine its subject matter, and is then migrated into an appropriate subject box on the webpage. In one embodiment, the input is then shared with another webpage, for the same user, which is on a second network. | 10-14-2010 |
20100268684 | System and Method for Optimizing Federated and ETLd Databases with Considerations of Specialized Data Structures Within an Environment Having Multidimensional Constraints - A method for creating a data warehousing scheme having optimally selected components. A mathematical model of a goal for the data warehousing scheme is input into an optimization engine. At least one constraint on the data warehousing scheme is input into the optimization engine. A mathematical optimization algorithm is performed using the optimization engine, wherein an output of the optimization engine is an optimized data warehousing scheme having optimally selected components. The optimized data warehousing scheme can be stored. | 10-21-2010 |
20100280680 | PROCESSOR COOLING MANAGEMENT - Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for adjusting cooling settings. The computer implemented method comprises analyzing a set of instructions of an application to determine a number of degrees by which a set of instructions will raise a temperature of at least one processor core. The computer implemented method further calculates a cooling setting for at least one cooling system for the at least one processor core. The computer implemented method adjusts the at least one cooling system based on the cooling setting. The step of analyzing the set of instructions is performed before the set of instructions is executed on the at least one processor core. The step of adjusting the at least one cooling system is performed before the set of instructions is executed on the at least one processor core. | 11-04-2010 |
20110071975 | Deriving a Hierarchical Event Based Database Having Action Triggers Based on Inferred Probabilities - Inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. An action trigger is executed responsive to at least one of a) the probability of the first inference exceeding a first pre-selected value, b) a significance of the inference exceeding a second pre-selected value, c) a rate of change in the probability of the first inference exceeding a third pre-selected value, d) an amount of change in the probability of the first inference exceeding a fourth pre-selected value, and e) combinations thereof. At least one of the probability of the first inference and the action trigger is stored in the database. | 03-24-2011 |
20110078250 | ROUTING INCOMING MESSAGES AT A BLADE CHASSIS - A pass-through module in a blade chassis receives an incoming message that utilizes a transmission protocol from one of multiple transmission protocols. The pass-through module determines which of the multiple transmission protocols is used by the incoming message by: comparing a physical component of the transmission protocol used by the incoming message with known physical components of the multiple transmission protocols, and, if necessary, comparing a logical component of the transmission protocol used by the incoming message with known logical components of the multiple transmission protocols. The incoming message is then routed to an optimal blade that is specifically adapted to process messages that utilize the transmission protocol used by the incoming message. | 03-31-2011 |
20110082887 | ENSURING SMALL CELL PRIVACY AT A DATABASE LEVEL - A request is received for a set of entries that make up a small cell in a database, wherein the small cell is initially described at a fine granular level of detail by a set of descriptors. In response to the total number of entries in the small cell being below a predetermined limit, the set of descriptors are modified to reduce the fine granular level of detail to a coarse granular level of detail in order to protect the privacy of individuals described by the set of entries. | 04-07-2011 |
20110106516 | AUTOMATED DERIVATION, DESIGN AND EXECUTION OF INDUSTRY-SPECIFIC INFORMATION ENVIRONMENT - A computer-implemented method, system and program product for creating a physical information environment for a specific industry type are presented. A candidate industry type is selected to describe a customer's operations. A set of information environment components, which is modeled and simulated in software and is specific for the candidate industry type, is selected. Inherent constraints, from the candidate industry type and the set of information environment components, are identified. The set of information environment components are then recursively optimized in order to comply with the inherent constraints and to meet the specific information environment requirements. Based on optimized information environment components, construction of a information environment is simulated in order to define an architecture of a simulated information environment for the candidate industry type. A physical information environment that comports with the architecture of the optimally simulated information environment is then constructed and deployed. | 05-05-2011 |
20110106722 | COMPARING UTILITY AND WARRANTY OF SERVICES - An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process. | 05-05-2011 |
20110106854 | OPTIMIZING DISTRIBUTED AND HYBRID QUERIES INCORPORATING TRUST MEASURES - A rules engine assigns a set of appropriateness rules to a particular data collection. The set of appropriateness rules describes an optimum usage for the particular data collection based on a source of the particular data collection and a type of activity that is deemed best suited to utilize the particular data collection. In response to determining that a requesting computer is implementing an activity that matches the particular set of appropriateness rules, a database controller is directed to transmit the particular data collection to the requesting computer. | 05-05-2011 |
20110270866 | SEMANTIC MODEL ASSOCIATION BETWEEN DATA ABSTRACTION LAYER IN BUSINESS INTELLIGENCE TOOLS - Systems, methods and articles of manufacture are disclosed for determining Business Intelligence (BI) tools and/or abstract queries that use similar semantic concepts. A semantics table may standardize semantic concepts across both BI tools and a data abstraction model. A BI concept repository may map BI tools to semantic concepts used by the BI tools. A user may be notified of a BI tool and/or of an abstract query that may be of interest to the user, on the basis of the semantic concepts. | 11-03-2011 |
20110301967 | PROBABILISTIC OPTIMIZATION OF RESOURCE DISCOVERY, RESERVATION AND ASSIGNMENT - A computer implemented method, system and/or computer program product allocate multiple resources from multiple organizations. A series of requests for multiple resources from multiple organizations is received. The multiple resources are required to accomplish a specific task, and each of the multiple resources is assigned a probability of consumption. Probabilities of availability of the multiple resources are then determined and transmitted to the organizations. | 12-08-2011 |
20120016715 | OPTIMIZING IT INFRASTRUCTURE CONFIGURATION - A computer implemented method optimizes a configuration of an information technology (IT) infrastructure. A processor establishes a technology rule set, which defines technology weights of an IT infrastructure by mapping capabilities of IT infrastructure components to IT infrastructure attributes needed to execute a specific workload. A candidate IT infrastructure for executing the specific workload is then configured. The processor then receives responses, provided by a customer, to an attribute questionnaire. Each question in the attribute questionnaire is mapped to an IT infrastructure attribute of the candidate IT infrastructure, and the responses define a customer's level of agreement/disagreement with the technology weights. In response to the processor determining that the candidate IT infrastructure fails to meet the customer's expectations, the candidate IT infrastructure is reconfigured until the customer's expectations are met. | 01-19-2012 |
20120035971 | GENERATING CANDIDATE INCLUSION/EXCLUSION COHORTS FOR A MULTIPLY CONSTRAINED GROUP - A computer implemented method, program product, and/or system allocate human resources to a cohort. At least one attribute held by each member of a group of human resources is identified. A request is received, from a planned cohort, for multiple human resources that collectively possess a set of predefined attributes, wherein no single human resource possesses all of the predefined attributes. The set of human resources that satisfies the request is identified and assigned to the planned cohort. | 02-09-2012 |
20120059227 | DIRECTING A USER TO A MEDICAL RESOURCE - A processor-implemented method, system, and/or computer program product directs a user using a physiological sensor to a needed medical resource. A real-time state of a medical condition of a user is determined based on readings from a physiological sensor on a user. A processing system correlates the real-time state of the medical condition of the user to a medical resource, which has been predetermined to have a capability of ameliorating the real-time state of the medical condition of the user. Directions are then sent, to the user, for a temporally nearest medical resource that has been predetermined to have the capability of ameliorating the real-time state of the medical condition of the user. | 03-08-2012 |
20120059815 | USER ACCESSIBILITY TO RESOURCES ENABLED THROUGH ADAPTIVE TECHNOLOGY - A computer implemented method, system and/or computer program product identify an appropriate resource for a user. A user profile is created for a user. A request, from the user, is received for a requested resource. Based on the user profile, a user-specific scope of the request, which defines a type of resource that is being requested by the user, is established. An identifier of an appropriate resource that meets the user-specific scope of the request is transmitted to the user. | 03-08-2012 |
20120072460 | USER ACCESSIBILITY TO DATA ANALYTICS - A computer implemented method, system, and/or computer program product performs an appropriate type of data analysis for a user. A preliminary request for a data analysis is received from a user having a user profile. The preliminary request fails to identify an appropriate data source for the data analysis, and fails to identify an appropriate type of data analysis. Thus, a customized request, that identifies the appropriate data source for analysis, is created from the preliminary request based on the user's profile. The customized request is mapped, based on the user's profile, to a specific data constrained analytic algorithm that performs the appropriate type of data analysis. This specific data constrained analytic algorithm performs the appropriate type of data analysis on the appropriate data source in order to generate an analytic result, which is transmitted to the user. | 03-22-2012 |
20120079493 | USE OF CONSTRAINT-BASED LINEAR PROGRAMMING TO OPTIMIZE HARDWARE SYSTEM USAGE - A computer implemented method, system, and/or computer program product optimizes systems usage. A work request is decomposed into units of work. A processor selectively sends each unit of work from the work request to either a first system or a second system for execution, depending on a work constraint on each unit of work and/or system constraints on the first and second systems. | 03-29-2012 |
20120095775 | CHARACTERIZING, TRACKING AND OPTIMIZING POPULATION HEALTH BASED ON INTEGRATION OF MULTI-DISCIPLINARY DATABASES - A computer implemented method, system and/or computer program product identifies a public health care issue for a specific population based on data from a confederated public health database. A confederated public health database is created from multi-disciplinary databases that include both medical databases and non-medical databases. A health care issue for a specific population is identified based on data from the confederated public health database, in order to create a public health care plan to address that health care issue, which is then transmitted to a public health official. | 04-19-2012 |
20120095948 | COHORT-BASED PREDICTION OF A FUTURE EVENT - A processor-implemented method, computer program product, and/or computer system predicts a future event. A first bit array, which describes characteristics of a single entity while experiencing a first event, is generated using values received from a set of physical test devices. After the first single entity experiences a different second event, a second bit array is generated from another set of physical test devices. The second bit array describes characteristics of an event cohort, which is made up of entities, other than the single entity, which also experience the second event, but which never experienced the first event. When another single entity experiences the first event, a determination is made as to whether that other single entity has characteristics from both the first bit array and the second bit array. If so, a prediction is made that the other single entity will also experience the second event. | 04-19-2012 |
20120096020 | DESCRIBING A PARADIGMATIC MEMBER OF A TASK DIRECTED COMMUNITY IN A COMPLEX HETEROGENEOUS ENVIRONMENT BASED ON NON-LINEAR ATTRIBUTES - A computer implemented method, system, and/or computer program product define a paradigmatic member of a known task directed community. Non-linear attributes of each member of the known task directed community having a known agenda are identified. Each of the non-linear attributes is individually unrelated to the known agenda. Common non-linear attributes shared by multiple members of the known task directed community are identified for use in defining the paradigmatic member of the known task directed community. | 04-19-2012 |
20120096032 | POPULATING A TASK DIRECTED COMMUNITY IN A COMPLEX HETEROGENEOUS ENVIRONMENT BASED ON NON-LINEAR ATTRIBUTES OF A PARADIGMATIC COHORT MEMBER - A computer implemented method, system, and/or computer program product defines a paradigmatic member of a first task directed community. Non-linear attributes of each member of the first task directed community having a first agenda are identified. Each of the non-linear attributes is individually unrelated to the first agenda. Common non-linear attributes shared by multiple members of the first task directed community are identified for use in defining the paradigmatic member of the first task directed community. A second task directed community, which has an agenda that substantially matches the first agenda of the first task directed community, is then presented with candidate members that match the paradigmatic member of the first task directed community. | 04-19-2012 |
20120130728 | SEMANTICALLY ENABLED, DATA SENSITIVE NEGOTIATION AND COLLABORATION ENGINE - A computer implemented method, system, and/or computer program product facilitates fulfillment of a term of a contract between a healthcare provider and a healthcare authorizer. A healthcare provider profile that describes a first set of business priorities for a healthcare provider and a healthcare authorizer profile that describes a second set of business priorities for a healthcare authorizer are created. A request is received from the healthcare provider for the healthcare authorizer to fulfill a term of a contract between the healthcare provider and the healthcare authorizer. Confidential data is received from the healthcare provider and the healthcare authorizer. A solution that fulfils the request is then generated, based on the contract, the healthcare provider profile, the healthcare authorizer profile, and the confidential data. | 05-24-2012 |
20120131468 | TEMPLATE FOR OPTIMIZING IT INFRASTRUCTURE CONFIGURATION - A computer implemented method, system, and/or computer program product provides hierarchical templates to optimize a configuration of an information technology (IT) infrastructure. A technology rule set, which defines technology weights of an IT infrastructure by mapping capabilities of IT infrastructure components to IT infrastructure attributes needed to execute a specific workload, is established. Hierarchical templates, which are tied to configuration logic for creating IT infrastructures, are sent to a user. Based on user-selected templates, a candidate IT infrastructure for executing the specific workload is configured. In response to determining that the candidate IT infrastructure fails to meet the customer's expectations, the candidate IT infrastructure is reconfigured until the customer's expectations are met. | 05-24-2012 |
20120139697 | IDENTIFYING AND GENERATING BIOMETRIC COHORTS BASED ON BIOMETRIC SENSOR INPUT - Biometric data, which identifies a set of biometric patterns, is received from a set of biometric sensors. The biometric data is processed to form digital biometric data that identifies attributes of the biometric data. Thereafter, a biometric cohort is generated using the digital biometric data. Each member of the set of biometric cohorts shares at least one biometric attribute in common. | 06-07-2012 |
20120150790 | GENERATING A RECOMMENDATION TO ADD A MEMBER TO A RECEPTIVITY COHORT - A processor-implemented method, system, and/or computer program product generate a recommendation to add a member to a receptivity cohort. A receptivity cohort is made up of members who share a conduct attribute, which is a facial expression, body language, and/or social interaction of a person. The conduct attribute has been predetermined to be an indicator of a level of receptiveness to a proposed future change in a set of circumstances. Biometric sensor data, which describe the facial expression, body language and/or social interaction for a candidate member, are retrieved from a set of biometric sensors. The retrieved biometric sensor data for the candidate member is compared to the conduct attribute of members of the receptivity cohort. In response to the biometric sensor data for the candidate member matching the conduct attribute of members of the receptivity cohort, a recommendation is generated to add the candidate member to the receptivity cohort. | 06-14-2012 |
20120150910 | MANAGING DATABASE INQUIRIES - A rules engine assigns a set of appropriateness rules to a particular data collection. The set of appropriateness rules describes an optimum usage for the particular data collection based on a source of the particular data collection and a type of activity that is deemed best suited to utilize the particular data collection. The set of appropriateness rules also requires that a data collection requester's role matches a data collection provider's role. In response to determining that a requesting computer is implementing an activity that matches the set of appropriateness rules, a rules engine directs a database controller to transmit the particular data collection to the requesting computer. | 06-14-2012 |
20120173494 | METHOD FOR DERIVING A HIERARCHICAL EVENT BASED DATABASE OPTIMIZED FOR PHARMACEUTICAL ANALYSIS - A computer implemented method for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. | 07-05-2012 |
20120207362 | MAPPING OF LITERATURE ONTO REGIONS OF INTEREST ON NEUROLOGICAL IMAGES - A computer implemented method, apparatus, and computer program product for analyzing neurological images. A set of brain scans for a patient is compared to a set of baseline control scans to automatically identify regions of interest in the set of patient scans. A region of interest is an area in a scan that shows an indication of a potential abnormality. A set of electronic medical literature sources is searched for medical literature relevant to the regions of interest in the set of patient scans. The relevant medical literature is correlated to the medical literature describing the regions of interest in the set of patient scans to the regions of interest in the set of patient scans. A result is generated. The result comprises the regions of interest and a set of links to the correlated portions of the relevant medical literature are outputted. | 08-16-2012 |
20120238032 | LAB ON A CHIP - A Lab On a Chip (LOC) has a Sample Preparation Module (SPM) coupled to a sample inlet, a microchannel coupled to the SPM, and an optic module optically proximate to the microchannel. The optic module holds multiple lenses, each of which has a different effective focal length, such that all fields of focus within the microchannel are covered as objects suspended within the liquid sample pass through the microchannel. | 09-20-2012 |
20120246488 | BORN ENCRYPTED OPTICAL DATA - A device for generating a born encrypted optical file includes a photovoltaic matrix for converting an optical image into a digital file. The digital file is a collection of digital data that has not been processed by any image processing logic and thus cannot be used to directly generate a reproduced image of the object. An encryption logic converts the digital file into an encrypted digital file that can be exported from the device to an authorized device to create a decrypted digital file. This decrypted digital file is capable of being used by a display logic to display an image of the object. | 09-27-2012 |
20120265365 | PROCESSOR COOLING MANAGEMENT - Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for adjusting cooling settings. The computer implemented method comprises analyzing a set of instructions of an application to determine a number of degrees by which a set of instructions will raise a temperature of at least one processor core. The computer implemented method further calculates a cooling setting for at least one cooling system for the at least one processor core. The computer implemented method adjusts the at least one cooling system based on the cooling setting. The step of analyzing the set of instructions is performed before the set of instructions is executed on the at least one processor core. The step of adjusting the at least one cooling system is performed before the set of instructions is executed on the at least one processor core. | 10-18-2012 |
20120265550 | COHORT DRIVEN MEDICAL DIAGNOSTIC TOOL - A computer implemented method, system, and/or computer program products derives a medical diagnosis for a patient. A current description of a patient is matched to a cohort of persons who each have a substantially similar description as the patient. Possible medical diagnoses, which have been accurate for members of the cohort, are presented for the patient. If one of the secondary medical diagnoses has an unacceptably high potential for an unacceptable outcome if improperly treated, then additional tests are run to rule out that secondary medical diagnosis. | 10-18-2012 |
20120278122 | AUTOMATED DERIVATION, DESIGN AND EXECUTION OF INDUSTRY-SPECIFIC INFORMATION ENVIRONMENT - A computer-implemented method, system, and/or computer program product creates a physical information environment for a specific industry type. A candidate industry type, which has specific information environment requirements, is selected to describe a customer's operations. A set of information environment components that is specific to the candidate industry type is selected. Inherent constraints, for the set of information environment components, are identified. A processor recursively optimizes the set of information environment components to create a set of optimized information environment components that meet the inherent constraints and key performance indicators (KPIs) of the candidate industry type. A hierarchy of KPIs for the candidate industry type is defined. The processor predicts access patterns to the optimized information environment components based on the hierarchy of KPIs. A physical information environment that comprises the set of optimized information environment components is then constructed and deployed. | 11-01-2012 |
20120316891 | COHORT DRIVEN SELECTION OF A COURSE OF MEDICAL TREATMENT - A computer implemented method, system, and/or computer program product create a recommended course of medical treatment of a current patient. A current medical diagnosis of a medical condition being suffered by the current patient is used to identify a cohort of other persons who have been diagnosed with the same medical condition as that suffered by the current patient. Past medical treatment procedures used on members of the cohort are sorted according to how closely these medical treatments matched desired results of the current patient and constraints for the current patient. The sorted medical treatment sets are then presented as a recommended course of treatment to a health care provider for the current patient. | 12-13-2012 |
20120317127 | COHORT DRIVEN SELECTION OF MEDICAL DIAGNOSTIC TESTS - A computer implemented method, system, and/or computer program product create a suggested diagnostic test selection. A description of a current patient includes a current medical complaint, medical history, and physical examination result for the current patient. A cohort for the current patient is made up of persons who have a substantially similar medical complaint, medical history, and physical examination result as the current patient. Past diagnostic test sets used to make correct medical diagnoses for persons in the cohort are identified and stored in a cohort diagnostic test database. The past diagnostic test sets are sorted based on increasing levels of detrimental effects posed by each of the past diagnostic test sets. The sorted diagnostic test sets are then presented to a health care provider for the current patient. | 12-13-2012 |
20120330654 | IDENTIFYING AND GENERATING AUDIO COHORTS BASED ON AUDIO DATA INPUT - A computer implemented method, system, and/or computer program product generates an audio cohort. Audio data from a set of audio sensors is received by an audio analysis engine. The audio data, which is associated with a plurality of objects, comprises a set of audio patterns. The audio data is processed to identify audio attributes associated with the plurality of objects to form digital audio data. This digital audio data comprises metadata that describes the audio attributes of the set of objects. A set of audio cohorts is generated using the audio attributes associated with the digital audio data and cohort criteria, where each audio cohort in the set of audio cohorts is a cohort of accompanied customers in a store, and where processing the audio data identifies a type of zoological creature that is accompanying each of the accompanied customers. | 12-27-2012 |
20130030613 | EVALUATING AIRPORT RUNWAY CONDITIONS IN REAL TIME - A computer-implemented method, system, and/or computer program product evaluates a real-time condition of a construct of an airport runway. A processor receives a set of temporally-spaced runway vibrations. This set of temporally-spaced runway vibrations is measured by a set of smart sensors on an airport runway after a landing aircraft touches down on the airport runway. Using data that describes the set of temporally-spaced runway vibrations as inputs to an analysis algorithm, a real-time physical condition of a construct of the airport runway is determined. | 01-31-2013 |
20130030680 | EVALUATING ROAD CONDITIONS USING A MOBILE VEHICLE - A computer-implemented method, system, and/or computer program product evaluates a real-time condition of a construct of a roadway. A processor receives a set of roadway vibration patterns from a mobile smart sensor that is mounted on a terrestrial vehicle as it travels along a roadway. This set of roadway vibration patterns is created by a physical contact between a roadway surface of the roadway and a tire on the terrestrial vehicle. The processor also receives a set of transient data from a probe on the terrestrial vehicle. This transient data describes a real-time transient environmental condition at the roadway. The set of roadway vibration patterns and the set of transient data are input into an analysis algorithm to determine a real-time physical condition of a construct of the roadway, such that the analysis algorithm removes any effect the set of transient data has on the set of roadway vibration patterns. | 01-31-2013 |
20130030724 | DETECTION OF PIPELINE CONTAMINANTS - A computer-implemented method, system, and/or computer program product detects contaminants in a pipe that is transporting a known fluid. A baseline vibration pattern is established from readings generated by a smart sensor that is affixed to the pipe. This baseline vibration pattern is caused by a flow of the known fluid as the known fluid travels through the pipe in an unadulterated form. Subsequent readings from the smart sensor are taken to generate a new vibration pattern. In response to the new vibration pattern being different, beyond a predefined range, from the baseline vibration pattern, the new vibration pattern is matched to a known vibration pattern in order to identify a specific contaminant of the known fluid. | 01-31-2013 |
20130030725 | MONITORING OPERATIONAL CONDITIONS OF A CARGO SHIP THROUGH USE OF SENSOR GRID ON INTERMODAL CONTAINERS - A computer-implemented method, system, and/or computer program product monitors operational conditions of a cargo ship. A baseline composite vibration pattern is established from readings generated by multiple smart sensors. Each of the multiple smart sensors is a uniquely-identified smart sensor that has been affixed to one of multiple intermodal shipping containers that have been loaded onto a cargo ship, and each smart sensor includes a vibration sensor for detecting mechanical vibration. Subsequent readings are then taken from the multiple smart sensors to generate a new composite vibration pattern. In response to the new composite vibration pattern being different from the baseline composite vibration pattern, the new composite vibration pattern is matched with a known composite vibration pattern in order to identify a cause of the new composite vibration pattern. | 01-31-2013 |
20130046680 | ALLOCATING RESEARCH FUNDING - Allocation of research funding is based on changes to sizes of resource clusters. Each resource cluster is composed of a set of researchers devoted to a single aspect of a research field. A size change to a specific resource cluster indicates a change to a level of activities associated with a corresponding specific aspect of the research field. In response to identifying an under-attended aspect of the research field caused by the change in sizes of the resource clusters, a recommendation is issued to allocate additional funding for research to the under-attended aspect of the research field. | 02-21-2013 |
20130085671 | MOBILITY ROUTE OPTIMIZATION - A processor-implemented method, system, and/or computer program product guides mobility-impaired pedestrians. Mobile tracking readings are received from multiple mobility assistance devices, each of which has an affixed tracking device. Based on these mobile tracking readings, multiple pedestrian routes for mobility-impaired pedestrians, including an optimal pedestrian route that has the highest tracking history to a desired destination, are generated. | 04-04-2013 |
20130111220 | PROTECTING SENSITIVE DATA IN A TRANSMISSION | 05-02-2013 |
20130173292 | IDENTIFYING AN OPTIMAL COHORT OF DATABASES FOR SUPPORTING A PROPOSED SOLUTION TO A COMPLEX PROBLEM - A processor-implemented method, system, and/or computer program product identifies an optimal cohort of databases for supporting a proposed solution to a complex problem. A synthetic event is based on multiple disparate factors. A complex problem is developed to establish a probability that a specific set of disparate factors causes the synthetic event. A set of optimization rules is applied to identify an optimal cohort of databases used to solve the complex problem. | 07-04-2013 |
20130173585 | OPTIMIZING MAP/REDUCE SEARCHES BY USING SYNTHETIC EVENTS - A processor-implemented method, system, and/or computer program product optimizes a search for data from documents. A processor receives an instruction to perform an initial map/reduce search for a specific set of data in documents from a first database. A synthetic event, which is a non-executable descriptor of the specific set of data in documents from the first database, is generated, and a revised map/reduce search for the synthetic event in a second database is conducted. The processor then returns a solution for the revised map/reduce search. | 07-04-2013 |
20130185112 | OPTIMIZING BENEFITS OF COMMUNITY DEVELOPMENT WITH REFERENCE TO RESOURCES THROUGH MULTIPLE TIME PERIODS FOR MULTIPLE COOPERATING AND COMPETING ENTITIES WITH REFERENCE TO MULTIPLE DIMENSIONS - A method, system and computer program product for optimizing resources for organizations. The steps include discovering goals and objectives of organizations and resources available from resource groups and storing the data in a repository; categorizing the data regarding the goals and objectives and the resources available; matching the resources available from the resource groups with the goals and objectives of the organizations; assigning values and weights to the resources and optimizing the resources; determining global optima and parse the global optima into resource allocation subsets, sending the subsets to the resource groups; capturing locally chosen resource allocation from the resource groups and storing the locally chosen resource allocation in the repository; determining unstated weights and values from the locally chosen resource allocation from the resource groups; storing actual pairings of the resources with a project of the organization, and recalculating the global optima based on remaining resources available. | 07-18-2013 |
20130218619 | GENERATING RECOMMENDATIONS FOR STAFFING A PROJECT TEAM - A processor-implemented method, system, and/or computer program product generates a recommendation for a worker to be included in a project team. A requisite skill set that is not presently needed, but will be needed in the future, by a project team is determined. Historical data that describe antecedent conditions, which caused a historical worker to obtain the requisite skill set, is received. A candidate worker's current skill set data is adjusted with skill set enhancers, which are available to members of the project team, to generate a predicted future skill set of the candidate worker. In response to the needed requisite skill set matching the predicted future skill set of the candidate worker, a recommendation is generated for adding that candidate worker to the project team. | 08-22-2013 |
20130227305 | BORN ENCRYPTED OPTICAL DATA - A device for generating a born encrypted optical file includes a photovoltaic matrix for converting an optical image into a digital file. The digital file is a collection of digital data that has not been processed by any image processing logic and thus cannot be used to directly generate a reproduced image of the object. An encryption logic converts the digital file into an encrypted digital file that can be exported from the device to an authorized device to create a decrypted digital file. This decrypted digital file is capable of being used by a display logic to display an image of the object. | 08-29-2013 |
20130246123 | OPTIMIZING IT INFRASTRUCTURE CONFIGURATION - A computer implemented method optimizes a configuration of an information technology (IT) infrastructure. A processor establishes a technology rule set, which defines technology weights of an IT infrastructure by mapping capabilities of IT infrastructure components to IT infrastructure attributes needed to execute a specific workload. A candidate IT infrastructure for executing the specific workload is then configured. The processor then receives responses, provided by a customer, to an attribute questionnaire. Each question in the attribute questionnaire is mapped to an IT infrastructure attribute of the candidate IT infrastructure, and the responses define a customer's level of agreement/disagreement with the technology weights. In response to the processor determining that the candidate IT infrastructure fails to meet the customer's expectations, the candidate IT infrastructure is reconfigured until the customer's expectations are met. | 09-19-2013 |
20130253839 | SURPRISAL DATA REDUCTION OF GENETIC DATA FOR TRANSMISSION, STORAGE, AND ANALYSIS - A method, computer product, and computer system of reducing an amount of data representing a genetic sequence of an organism, comprising: a computer comparing nucleotides of the genetic sequence of the organism to nucleotides from a reference genome, to find differences where nucleotides of the genetic sequence of the organism which are different from the nucleotides of the reference genome; the computer using the differences to create and store surprisal data in a repository, the surprisal data comprising a starting location of the differences within the reference genome, and the nucleotides from the genetic sequence of the organism which are different from the nucleotides of the reference genome, discarding sequences of nucleotides that are the same in the genetic sequence of the organism and the reference genome. | 09-26-2013 |
20130253892 | CREATING SYNTHETIC EVENTS USING GENETIC SURPRISAL DATA REPRESENTING A GENETIC SEQUENCE OF AN ORGANISM WITH AN ADDITION OF CONTEXT - A method, program product and system creating synthetic events using genetic surprisal data representing a genetic sequence of an organism with an addition of context, comprising: if the reference genome used to generate the genetic surprisal data for each of the at least two organisms is different: retrieving each of the reference genomes and dividing each of the reference genomes into pieces corresponding to the genetic surprisal data of the organisms; and combining the pieces of the reference genomes together to form a single reference genome. Synthetic events are created based on searching the genetic surprisal data for at least one attribute repeated at a frequency within the genetic surprisal data of the organisms and organism records, optimizing the genetic surprisal data through clustering defined by at least one parameter; and forming at least two cohorts, a control cohort and a treatment cohort based on optimization of the surprisal data. | 09-26-2013 |
20130254202 | PARALLELIZATION OF SYNTHETIC EVENTS WITH GENETIC SURPRISAL DATA REPRESENTING A GENETIC SEQUENCE OF AN ORGANISM - A method, system, and computer program product for parallelization of updating synthetic events with genetic surprisal data comprising dividing the synthetic event into cohort parts and assigning the cohort parts to one of a plurality of computer processing elements. Within each processing element: searching data records of patients for genetic surprisal data; generating a cluster comprising a centroid by populating the cluster based on all of the matches of the data records; calculating a new centroid for each cluster; calculating a Euclidean distance in multiple dimensions for each match of data records to the new centroid for each cluster; reassigning each match of data to the new centroid of each cluster based on the shortest calculated Euclidean distance to the new centroid for each cluster; and determining at least one cohort part from the clusters and recombining the cohort parts into updated synthetic events based on the metadata. | 09-26-2013 |
20130254218 | PARALLELIZATION OF SURPRISAL DATA REDUCTION AND GENOME CONSTRUCTION FROM GENETIC DATA FOR TRANSMISSION, STORAGE, AND ANALYSIS - A method, computer product, and computer system of reducing an amount of data representing a genetic sequence of an organism, comprising: a computer dividing a reference genome and a sequence of the organism into parts and assigning the parts to one of a plurality of computer processing elements. Within each computer processing element, comparing nucleotides of the genetic sequence of the organism to nucleotides from a part of the reference genome, to find differences where nucleotides of the genetic sequence of the organism which are different from the nucleotides of the reference genome; and storing the surprisal data in a repository. Combining the parts of the surprisal data from the repository to form a complete set of surprisal data representing the differences between the genetic sequence of the organism and the reference genome; and storing the complete set of surprisal data in the repository. | 09-26-2013 |
20130254547 | ENCRYPTED TRANSMISSION TO AND STORAGE OF SURPRISAL DATA - A method of providing secure access to data representing a genetic sequence of an organism to at least one user requesting access to the data, the user having a private key and a public key related to the private key. The method comprising the steps of: the source computer receiving a request from a user for specific surprisal data and associated metadata; the source computer retrieving the specific surprisal data and associated metadata indicated by the user within the repository; the source computer using the public key of the user to encrypt the specific surprisal data and associated metadata to produce encrypted specific surprisal data and associated metadata; the source computer sending the encrypted specific surprisal data and associated metadata to a repository accessible to the user, the repository having a location indicator for accessing the repository over network; and the source computer sending the location indicator to the user. | 09-26-2013 |
20130262140 | PATIENT COHORT MATCHING - A computer hardware-implemented method, system, and/or computer program product matches a current patient to a specific patient readmission cohort. The specific patient readmission cohort, made up of patients having a shared attribute, has a historical likelihood of hospital readmission within a predefined post-discharge length of time for members of the specific patient readmission cohort. A database describing a current patient is selected, based on the cost and speed of accessing that database, as well as the probability that the database describes a similar attribute for the current patient as the shared attribute in the specific patient readmission cohort. If the current patient meets the requisite criteria for entry into the specific patient readmission cohort, then a recommendation designed to reduce a likelihood of hospital readmission of the current patient is generated. | 10-03-2013 |
20130268530 | GENERATING DEPORTMENT AND COMPORTMENT COHORTS - A computer implemented method, system, and/or computer program product generates deportment and comportment cohorts. Digital sensor data comprises event metadata describes a set of events associated with an individual. Descriptive data about the individual is retrieved by data mining a combination of online sources and off-line sources. A set of conduct analysis models is selected based on event metadata and available description data. The event metadata and the description data are analyzed in the set of conduct analysis models to form a deportment and comportment cohort, where the deportment and comportment cohort comprises attributes identifying a demeanor and manner of the individual. | 10-10-2013 |
20130286195 | LAB ON A CHIP - A Lab On a Chip (LOC) has a Sample Preparation Module (SPM) coupled to a sample inlet, a microchannel coupled to the SPM, and an optic module optically proximate to the microchannel. The optic module holds multiple lenses, each of which has a different effective focal length, such that all fields of focus within the microchannel are covered as objects suspended within the liquid sample pass through the microchannel. | 10-31-2013 |
20130287632 | LAB ON A CHIP - A Lab On a Chip (LOC) has a Sample Preparation Module (SPM) coupled to a sample inlet, a microchannel coupled to the SPM, and an optic module optically proximate to the microchannel. The optic module holds multiple lenses, each of which has a different effective focal length, such that all fields of focus within the microchannel are covered as objects suspended within the liquid sample pass through the microchannel. | 10-31-2013 |
20130304391 | TRANSMISSION AND COMPRESSION OF GENETIC DATA - A method, computer product and computer system of transmitting a compressed genome of an organism: a computer at a source reading an uncompressed sequence and a reference genome from a repository; the computer comparing nucleotides of the genetic sequence of the organism to nucleotides from a reference genome, to find differences where nucleotides of the genetic sequence of the organism which are different from the nucleotides of the reference genome; the computer using the differences to create surprisal data, the surprisal data comprising a starting location of the differences within the reference genome, and the nucleotides from the genetic sequence of the organism which are different from the nucleotides of the reference genome; and the computer transmitting, to a destination, a compressed genome comprising: surprisal data and an indication of the reference genome, discarding sequences of nucleotides that are the same in the sequence of the organism and reference genome. | 11-14-2013 |
20130304494 | COHORT DRIVEN SELECTION OF MEDICAL DIAGNOSTIC TESTS - A computer implemented method, system, and/or computer program product creates a suggested diagnostic test selection. A description of a current patient includes a current medical complaint, medical history, and physical examination result for the current patient. A cohort for the current patient is made up of persons who have a substantially similar medical complaint, medical history, and physical examination result as the current patient. Past diagnostic test sets used to make correct medical diagnoses for persons in the cohort are identified and stored in a cohort diagnostic test database. The past diagnostic test sets are sorted based on increasing levels of detrimental effects posed by each of the past diagnostic test sets. The sorted diagnostic test sets are then presented to a health care provider for the current patient. | 11-14-2013 |
20130311088 | MOBILITY ROUTE OPTIMIZATION - A processor-implemented method, system, and/or computer program product guides mobility-impaired pedestrians. Mobile tracking readings are received from multiple mobility assistance devices, each of which has an affixed tracking device. Based on these mobile tracking readings, multiple pedestrian routes for mobility-impaired pedestrians, including an optimal pedestrian route that has the highest tracking history to a desired destination, are generated. | 11-21-2013 |
20130311101 | MINIMIZATION OF SURPRISAL DATA THROUGH APPLICATION OF HIERARCHY OF REFERENCE GENOMES - A method, computer product, and computer system of minimizing surprisal data comprising: at a source, reading and identifying characteristics of a genetic sequence of an organism; receiving an input of rank of at least two identified characteristics of the genetic sequence of the organism; generating a hierarchy of ranked, identified characteristics based on the rank of the at least two identified characteristics of the genetic sequence of the organism; comparing the hierarchy of ranked, identified characteristics to a repository of reference genomes; and if at least one reference genome from the repository matches the hierarchy of ranked, identified characteristics, comparing nucleotides of the genetic sequence of the organism to nucleotides from the at least one matched reference genome, to obtain differences and create surprisal data. | 11-21-2013 |
20130311435 | MINIMIZATION OF SURPRISAL DATA THROUGH APPLICATION OF HIERARCHY FILTER PATTERN - A method, computer product, and computer system of minimizing surprisal data comprising: at a source, reading and identifying characteristics of a genetic sequence of an organism; receiving an input of rank of at least two identified characteristics of the genetic sequence of the organism; generating a hierarchy of ranked, identified characteristics based on the rank of the at least two identified characteristics of the genetic sequence of the organism; comparing the hierarchy of ranked, identified characteristics to a repository of reference genomes; and if at least one reference genome from the repository matches the hierarchy of ranked, identified characteristics, breaking the matched reference genomes into pieces, combining pieces associated with the identified characteristics from at least one matched reference genome to form a filter pattern to be compared to the nucleotides of the genetic sequence of the organism, to obtain differences and create surprisal data. | 11-21-2013 |
20130311834 | PREVENTING CASCADE FAILURES IN COMPUTER SYSTEMS - A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. The accuracy values and weighting values are utilized to dynamically adjust inputs to the downstream subcomponent until an output from the downstream subcomponent meets a predefined trustworthiness level. | 11-21-2013 |
20130325308 | EVALUATING ROAD CONDITIONS USING A MOBILE VEHICLE - A method, system, and/or computer program product evaluates a real-time condition of a construct of a roadway. A processor receives a set of roadway acoustic sound patterns from a mobile microphone that is mounted on a terrestrial vehicle as it travels along a roadway. This set of roadway acoustic sound patterns is created by a physical contact between a roadway surface of the roadway and a tire on the terrestrial vehicle. The processor also receives a set of transient data from a probe on the terrestrial vehicle. This transient data describes a real-time transient environmental condition at the roadway. The set of roadway acoustic sound patterns and the set of transient data are input into an analysis algorithm to determine a real-time physical condition of a construct of the roadway. Data describing the real-time physical condition of the construct of the roadway is then transmitted to a remote computer. | 12-05-2013 |
20130326372 | MANAGEMENT OF DATA ON RELATED WEBSITES - A computer-implemented method, system and/or computer program product manages data in a webpage. A processor receives an input to an input box located in a first webpage on a first network. This input is analyzed to determine whether there is match between a subject topic of the entered data and a first interest window on the first webpage, where the first interest window is reserved for data entries that are described by the subject topic. In response to a processor being unable to determine the subject topic of the entered data in the text entry box, the processor creates a new interest window in the first webpage. | 12-05-2013 |
20130346996 | PROBABILISTIC OPTIMIZATION OF RESOURCE DISCOVERY, RESERVATION AND ASSIGNMENT - A processor-implemented method, system and/or computer program product allocates multiple resources from multiple organizations. A series of requests for multiple resources from multiple organizations is received. The multiple resources are required to accomplish a specific task, and each of the multiple resources is assigned a probability of consumption. Probabilities of availability of the multiple resources are then determined and transmitted to the organizations. | 12-26-2013 |
20140006365 | MINIMIZATION OF EPIGENETIC SURPRISAL DATA OF EPIGENETIC DATA WITHIN A TIME SERIES | 01-02-2014 |
20140006390 | CONTEXT-BASED ELECTRONIC DOCUMENT SEARCH USING A SYNTHETIC EVENT | 01-02-2014 |
20140006391 | ACTIVITY RECOMMENDATION BASED ON A CONTEXT-BASED ELECTRONIC FILES SEARCH | 01-02-2014 |
20140006419 | IDENTIFICATION OF NULL SETS IN A CONTEXT-BASED ELECTRONIC DOCUMENT SEARCH | 01-02-2014 |
20140006447 | GENERATING EPIGENENTIC COHORTS THROUGH CLUSTERING OF EPIGENETIC SUPRISAL DATA BASED ON PARAMETERS | 01-02-2014 |
20140046981 | CONTEXT-BASED GRAPHICAL DATABASE - A context-based graphical database system for storing a data structure comprises an entity node that stores an identifier of an entity. A data node stores non-contextual entity data about the entity. At least one context node is linked to the data node. The at least one context node provides context to the non-contextual entity data in the data node to create contextual entity data. A pointer from the entity node to the data node returns a data node identifier to the entity node to link the contextual entity data to the entity. | 02-13-2014 |
20140056483 | IDENTIFYING AND GENERATING COLOR AND TEXTURE VIDEO COHORTS BASED ON VIDEO INPUT - A computer system generates video based cohorts. Digital video data is processed to identify a set of color and texture based attributes associated with clothing worn by a set of objects. The digital video data comprises metadata describing the set of objects. The set of color and texture based attributes are analyzed using cohort criteria to form a result. The cohort criteria specify attributes that are associated with members of a given cohort. A set of cohorts is generated based on the result. Each cohort in the set of cohorts comprises a subset of objects from the set of objects that share at least one color and texture based attribute in common. | 02-27-2014 |
20140059083 | CONTEXT-BASED SEARCH FOR A DATA STORE RELATED TO A GRAPH NODE - A graph database storage system contains a graph database that has multiple graph nodes. A first pointer points from a particular graph node to a particular synthetic context event node in a synthetic context event database. A second pointer points from the particular synthetic context event node in the synthetic context event database to a particular data store in a data structure, such that the first pointer and the second pointer associate the particular data store with the particular entity represented in the graph database via the particular synthetic context event node. | 02-27-2014 |
20140059084 | CONTEXT-BASED GRAPH-RELATIONAL INTERSECT DERIVED DATABASE - A context-based graph-relational intersect derived (CB-GRID) links a real entity graph node to a synthetic entity graph node. The real entity graph node comprises a pointer to a primary key in a first tuple that non-contextually describes the real entity. A primary relational database comprises the first tuple that non-contextually describes the real entity. A context relational database comprises a second tuple that contains a foreign key that matches the primary key in the primary relational database. The second tuple dynamically describes a context of data in the first tuple. A contextual entity relational database comprises a third tuple that contains data from the first tuple and the second tuple. The synthetic entity graph node describes a synthetic entity that is described by data in the third tuple, such that the contextual entity relational database links the real entity graph node to the synthetic entity graph node. | 02-27-2014 |
20140067813 | PARALLELIZATION OF SYNTHETIC EVENTS WITH GENETIC SURPRISAL DATA REPRESENTING A GENETIC SEQUENCE OF AN ORGANISM - A method, system, and computer program product for parallelization of updating synthetic events with genetic surprisal data comprising dividing the synthetic event into cohort parts and assigning the cohort parts to one of a plurality of computer processing elements. Within each processing element: searching data records of patients for genetic surprisal data; generating a cluster comprising a centroid by populating the cluster based on all of the matches of the data records; calculating a new centroid for each cluster; calculating a Euclidean distance in multiple dimensions for each match of data records to the new centroid for each cluster; reassigning each match of data to the new centroid of each cluster based on the shortest calculated Euclidean distance to the new centroid for each cluster; and determining at least one cohort part from the clusters and recombining the cohort parts into updated synthetic events based on the metadata. | 03-06-2014 |
20140074833 | USER-SPECIFIC SYNTHETIC CONTEXT OBJECT MATCHING - A processor-implemented method, system, and/or computer program product generates and utilizes a synthetic context-based object to locate a user-specific data store. A processor associates a non-contextual data object with a context object to define a synthetic context-based object. The synthetic context-based object is associated with at least one specific data store that contains data that is associated with data in the non-contextual data object and in the context object. The processor determines a subject-matter of interest for a specific user, and associates that determined subject-matter of interest to a specific synthetic context-based object. In response to receiving a request for data from a specific user, the request is directed to the specific synthetic context-based object that describes the subject-matter of interest for that specific user. This specific synthetic context-based object locates the appropriate data store in order to return the requested data to the specific user. | 03-13-2014 |
20140074885 | GENERATION OF SYNTHETIC CONTEXT OBJECTS - A processor-implemented method, system, and/or computer program product generates and utilizes synthetic context-based objects. A non-contextual data object is associated with a context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A request for a data store that is associated with the synthetic context-based object results in the return of at least one data store that is associated with the synthetic context-based object. | 03-13-2014 |
20140074892 | DIMENSIONALLY CONSTRAINED SYNTHETIC CONTEXT OBJECTS DATABASE - A processor-implemented method, system, and/or computer program product generate and utilize a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects. A non-contextual data object is associated with a context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is then constructed for handling requests for data stores. | 03-13-2014 |
20140081939 | CONTEXT-BASED NAVIGATION THROUGH A DATABASE - A processor-implemented method, system, and/or computer program product navigates through a database. A non-contextual data object, which ambiguously relates to multiple subject-matters, is associated with a context object to define a synthetic context-based object. The context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is associated with a first data node and a second data node within a database. In response to receiving a request for identifying and retrieving data from a data node that has a same context as the first data node, data from the second data node is retrieved. | 03-20-2014 |
20140090049 | CONTEXT-BASED DATABASE SECURITY - A processor-implemented method, system, and/or computer program product secures data stores. A non-contextual data object is associated with a context object to define a synthetic context-based object. The synthetic context-based object is associated with at least one specific data store in a data structure, where the specific data store contains data that is associated with data contained in the non-contextual data object and the context object. An ambiguous request is received from a user for data related to an ambiguous subject-matter. The context of the ambiguous request from the user is determined and associated with the synthetic context-based object that is associated with said a specific data store, where that specific data store contains data related to the context of a now contextual request from the user. The user is then provided access to the specific data store while blocking access to other data stores in the data structure. | 03-27-2014 |
20140098101 | NODE CLUSTER RELATIONSHIPS IN A GRAPH DATABASE - A processor-implemented method, system, and/or computer program product manages nodes in a graph database. Graph nodes in a graph database are organized into graph node clusters. A cluster edge, which describes a relationship between two of the graph node clusters, is generated to logically associate those two graph node clusters with one another. | 04-10-2014 |
20140129155 | DETECTION OF PIPELINE CONTAMINANTS - A computer-implemented method, system, and/or computer program product detects contaminants in a pipe that is transporting a known fluid. A baseline vibration pattern is established from readings generated by a smart sensor that is affixed to the pipe. This baseline vibration pattern is caused by a flow of the known fluid as the known fluid travels through the pipe in an unadulterated form. Subsequent readings from the smart sensor are taken to generate a new vibration pattern. In response to the new vibration pattern being different, beyond a predefined range, from the baseline vibration pattern, the new vibration pattern is matched to a known vibration pattern in order to identify a specific contaminant of the known fluid. | 05-08-2014 |
20140143891 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object and the first synthetic context-based object, then the data is returned to the requester. | 05-22-2014 |
20140156580 | INFERENCE OF ANOMALOUS BEHAVIOR OF MEMBERS OF COHORTS AND ASSOCIATE ACTORS RELATED TO THE ANOMALOUS BEHAVIOR BASED ON DIVERGENT MOVEMENT FROM THE COHORT CONTEXT CENTROID - A method, a system and a computer program product for determining whether a change in value of a data item relating to an entity being tracked within a cohort is statistically and contextually significant. A computer captures a plurality data items relating to the entity being tracked at a time N+1. The value of the data item at time N+1 is compared to a value of a historical data item at time N. If the value of the data item at time N+1 is different from the value of the historical data item at time N, determining that a change has occurred. If a change in a data item has occurred, determining whether the change in the data item is related to the entity being tracked is statistically and contextually significant in n space on multiple dimensions. | 06-05-2014 |
20140164069 | Generating Global Optimized Strategies For Information Requests, Proposals, And Statements of Work Within a Time Period Across Hierarchical Entity Boundaries - A method, system and computer program product for determining a response to a sales event within a time period with information which spans across hierarchical entity boundaries of a company. The method detects a sales event and determines requirements of the sales event, parties involved and resource area of the sales event. If the resource area is not supported by the company, return to detecting another sales event without responding to the sales event. If the area is supported by the company, initiating a sales resource optimization to determine an optimized resource package to respond to the sales event and determining a likelihood of the company being awarded the sales event based on the optimized resource package. If the likelihood of the company being awarded the sales event based on the optimized resource package is greater than a predetermined probability, responding to the sales event with the optimized resource package. | 06-12-2014 |
20140184500 | POPULATING NODES IN A DATA MODEL WITH OBJECTS FROM CONTEXT-BASED CONFORMED DIMENSIONAL DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. | 07-03-2014 |
20140188887 | CONTEXT-BASED DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple context-based data gravity wells on a context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-based objects are parsed into an n-tuple that includes a pointer to one of the non-contextual data objects, a probability that a non-contextual data object has been associated with a correct context object, and a weighting factor of importance of the synthetic context-based object. A virtual mass of each parsed synthetic context-based object is calculated, in order to define a shape of multiple context-based data gravity wells that are created when synthetic context-based objects are pulled into each of the context-based data gravity well frameworks on a context-based data gravity wells membrane. | 07-03-2014 |
20140188915 | CONFORMED DIMENSIONAL AND CONTEXT-BASED DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of the multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. | 07-03-2014 |
20140188960 | CONFORMED DIMENSIONAL DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple dimensional data gravity wells on a conformed dimensional data gravity wells membrane. Non-dimensional data objects are associated with dimension objects to define conformed dimensional objects. The conformed dimensional objects are parsed into an n-tuple that includes a pointer to one of the non-dimensional data objects, a probability that a non-dimensional data object has been associated with a correct dimension object, and a weighting factor of importance of the conformed dimensional object. A virtual mass of each parsed conformed dimensional object is calculated, in order to define a shape of multiple dimensional data gravity wells that are created when conformed dimensional objects are pulled into each of the dimensional data gravity well frameworks on a conformed dimensional data gravity wells membrane. | 07-03-2014 |
20140207936 | SIGNAL OVERLOAD MANAGEMENT IN MAJOR EVENTS AND DISASTERS - A method, computer program product and system for managing an overload of signals on a network due to usage by a large number of users on the network during an event, comprising: detecting a cluster of communication on the network, determining a physical location of a centroid of the cluster of the communication on the network, associating the physical location of the centroid to be the approximate physical location of the event; reviewing information within cluster of communication being sent through the network regarding the event; categorizing the event based on a predetermined set of rules; determining bandwidth limitations of the network for users within a determined proximity to the physical location of the event; determining the resources necessary to respond to and resolve the event; and allocating bandwidth of the network based upon the resources and the proximity of users to the physical location of the event. | 07-24-2014 |
20140214865 | MEASURING AND DISPLAYING FACETS IN CONTEXT-BASED CONFORMED DIMENSIONAL DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to the how closely each of the multiple parsed synthetic context-based objects matches said at least one context object and/or at least one dimension object. | 07-31-2014 |
20140214871 | GENERATION OF SYNTHETIC CONTEXT FRAMEWORKS FOR DIMENSIONALLY CONSTRAINED HIERARCHICAL SYNTHETIC CONTEXT-BASED OBJECTS - A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document that contains multiple instances of the non-contextual data object. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is then constructed for handling requests for data stores. | 07-31-2014 |
20140215633 | SECURITY FILTER FOR CONTEXT-BASED DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-based objects are associated with one or more security objects to generate security-enabled synthetic context-based objects, which are parsed into an n-tuple that includes a pointer to one of the non-contextual data objects, a probability that a non-contextual data object has been associated with a correct context object, probability that the security object has been associated with a correct synthetic context-based object, and a weighting factor of importance of the security-enabled synthetic context-based object. A virtual mass of each parsed security-enabled synthetic context-based object is calculated, in order to define a shape of multiple security-enabled context-based data gravity wells that are created when security-enabled synthetic context-based objects are pulled in. | 07-31-2014 |
20140236977 | MAPPING EPIGENETIC SURPRISAL DATA THROUGTH HADOOP TYPE DISTRIBUTED FILE SYSTEMS - A method, system and computer program product for reducing an amount of epigenetic data representing epigenetic modifications of a genetic sequence of an organism using a Hadoop type distributed file system. The method including the steps of breaking epigenetic data and a reference epigenetic map into blocks of data of a fixed size; distributing the blocks of data to the plurality of worker nodes within the clusters and replicating the blocks of data within each of the worker nodes; tasking the plurality of worker nodes to perform a map job comprising mapping the reference epigenetic map relative to the epigenetic data; and when a worker node has reported a completion of the map job, tasking the worker node with a reduce job based on a specific key to an output of epigenetic surprisal data and associated metadata. | 08-21-2014 |
20140236990 | MAPPING SURPRISAL DATA THROUGTH HADOOP TYPE DISTRIBUTED FILE SYSTEMS - A method, system and computer program product for reducing an amount of data representing a genetic sequence of an organism using a Hadoop type distributed file system. The method including the steps of breaking a surprisal data filter and an uncompressed genetic sequence into blocks of data of a fixed size; distributing the blocks of data to the plurality of worker nodes within the clusters and replicating the blocks of data within each of the worker nodes; tasking the plurality of worker nodes to perform a map job comprising mapping the surprisal data filter relative to the uncompressed genetic sequence; and when a worker node has reported a completion of the map job, tasking the worker node with a reduce job based on a specific key to an output of surprisal data and associated metadata. | 08-21-2014 |
20140244639 | SURPRISAL DATA REDUCTION OF GENETIC DATA FOR TRANSMISSION, STORAGE, AND ANALYSIS - A method, computer product, and computer system of reducing an amount of data representing a genetic sequence of an organism, comprising: a computer comparing nucleotides of the genetic sequence of the organism to nucleotides from a reference genome, to find differences where nucleotides of the genetic sequence of the organism which are different from the nucleotides of the reference genome; the computer using the differences to create and store surprisal data in a repository, the surprisal data comprising a starting location of the differences within the reference genome, and the nucleotides from the genetic sequence of the organism which are different from the nucleotides of the reference genome, discarding sequences of nucleotides that are the same in the genetic sequence of the organism and the reference genome. | 08-28-2014 |
20140244677 | DYNAMIC GENERATION OF DEMONSTRATIVE AIDS FOR A MEETING - A method, computer program product and/or system generate presentation material for a proposed meeting. Synthetic insights of members of an expected audience at the proposed meeting are generated. The synthetic insights describe a preferred style of communication as indicated by the members of the expected meeting audience during a previous commercial interaction. Information documents from a document database are matched to a topic of the proposed meeting and the synthetic insights of the expected meeting audience, in order to retrieve relevant information documents for the proposed meeting. Presentation material for the proposed meeting is then generated from information documents that match the topic of the proposed meeting and the synthetic insights of the expected meeting audience. | 08-28-2014 |
20140245318 | DATA PROCESSING WORK ALLOCATION - A processor-implemented method, system, and/or computer program product allocates computer processing work. Input data, which has been deemed to be in need of processing, is stored in a first computer. A virtual machine that is capable of processing the input data is stored on a second computer. A first set of constraint rules contains constraint rules against moving the input data from the first computer, and a second set of constraint rules contains constraint rules against moving the virtual machine from the second computer. Based on the first and second constraint rules, either the virtual machine is moved to the first computer or the input data is moved to the second computer. | 08-28-2014 |
20140310214 | OPTIMIZED AND HIGH THROUGHPUT COMPARISON AND ANALYTICS OF LARGE SETS OF GENOME DATA - A method, computer program product and system for reconciling a plurality of surprisal data sets of a genetic sequence of an organism being generated from a surprisal data reference genome using a base reference genome. If the base reference genome is not the surprisal data reference genome indicated in the surprisal data set, the surprisal data reference genome is retrieved and compared to the base reference genome to obtain reference genome differences. If a starting location of an instance of the surprisal data set is present in the reference genome differences, the nucleotides of the instance of the surprisal data are compared to the nucleotides of the reference genome difference. If the nucleotides of the instance of the surprisal data are the same as the nucleotides of the reference genome difference, the instance of surprisal data is removed from the surprisal data set. | 10-16-2014 |
20140310313 | GENERATION OF SYNTHETIC OBJECTS USING BOUNDED CONTEXT OBJECTS - A processor-implemented method, system, and/or computer program product generates and utilizes synthetic context-based objects. A non-contextual data object is associated with a context object, which comports with a predetermined set of constraints, to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A request for a data store that is associated with the synthetic context-based object results in the return of at least one data store that is associated with the synthetic context-based object. | 10-16-2014 |
20140316860 | COMMON CONDITIONS FOR PAST PROJECTS AS EVIDENCE FOR SUCCESS CAUSES - A processor-implemented method, system, and/or computer program product identifies a cause of a level of success in multiple projects from a set of past projects. Multiple artifacts describe conditions associated with each project from a set of past projects, where a cause for a level of success in the past projects is initially unknown. Logic identifies a set of common artifacts in multiple projects from the set of past projects, where the set of common artifacts describes common conditions that are common to all of the multiple projects. Additional logic identifies a level of success experienced by each of the multiple projects. In response to a particular set of projects having a same level of success, common conditions identified by the set of common artifacts are identified as the cause for the same level of success experienced by all of the projects in the particular set of projects. | 10-23-2014 |
20140324735 | MAXIMIZING THE UTILITY OF INFORMATION IN MULTIPLE INTERSECTING DATA STRUCTURES USING PLATONIC SOLIDS AND RELATED POLYHEDRA AND POLYTOPES - A method, system and computer program product for maximizing the utility of data obtained from multiple intersecting data structures and stored in a multi-dimension information space. The method includes the steps of generating a rigid mathematical structure within the multi-dimensional information space; dividing the rigid mathematical structure into segments, each segment having a volume determined by a time of access to the segment relative to an event, a duration of access to the segment and a quantity of data in the segment; and determining a sellable price point for each segment of the rigid mathematical structure based on the volume of the segment. | 10-30-2014 |
20140344292 | Population of Context-Based Data Gravity Wells - A method and/or system sorts data into data gravity wells on a data gravity wells membrane. A hashing logic executes instructions to convert raw data into a first logical address and first payload data, wherein the first logical address describes metadata about the first payload data. A hardware XOR unit compares the first logical address to a second logical address to derive a Hamming distance between the first and second logical addresses, wherein the second logical address is for a second payload data. A hardware data vector generator creates a data vector for the second payload data, wherein the data vector comprises the Hamming distance between the first and second logical addresses. A hardware data vector sorter then sorts data vectors into specific hardware data gravity wells on a data gravity wells membrane according to the Hamming distance stored in the data vector. | 11-20-2014 |
20140344548 | Stored Data Analysis - A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors. A hardware retrieval unit retrieves other payload data that is stored at a second physical address whose second logical address is within a predefined Hamming distance from the first logical address, thus allowing payload data from the two logical addresses to be grouped/associated with one another. | 11-20-2014 |
20140358908 | MINIMIZATION OF SURPRISAL CONTEXT DATA THROUGH APPLICATION OF CUSTOMIZED SURPRISAL CONTEXT FILTERS - A method, system, and computer program product for minimizing surprisal context data. The method includes the steps of: identifying characteristics of a data event; receiving an input of rank of at least two identified characteristics of the data event; generating a hierarchy of ranked, identified characteristics based on the rank of the identified characteristics of the data event; and comparing the hierarchy of ranked, identified characteristics to a repository of characteristic context patterns. If at least one reference artifact of the characteristic context pattern matches the hierarchy of ranked, identified characteristics, the characteristic context pattern is broken into pieces, storing the pieces that matched the hierarchy. The stored pieces are then combined into a surprisal context filter pattern with context determined to be probabilistically present within a specified degree of certainty in a data input and compared to a data input of data events to detect anomalous events. | 12-04-2014 |
20140358941 | MINIMIZATION OF SURPRISAL CONTEXT DATA THROUGH APPLICATION OF A HIERARCHY OF REFERENCE ARTIFACTS - A method, system, and computer program product for minimizing surprisal context data. The method comprising the steps of: identifying characteristics of a data event; receiving an input of rank of at least two identified characteristics of the data event; the computer generating a hierarchy of ranked, identified characteristics based on the rank of the at least two identified characteristics of the data event; and comparing the hierarchy of ranked, identified characteristics to a repository of reference artifacts arranged in characteristic context patterns. If at least one reference artifact arranged in characteristic context patterns from the repository matches the hierarchy of ranked, identified characteristics, the characteristic context pattern is stored as a surprisal context filter and compared to a data input of data events to detect anomalous events. | 12-04-2014 |
20140358948 | DISCOVERY OF UNUSUAL, UNEXPECTED, OR ANOMALOUS INFORMATION AND TRENDS IN HIGH THROUGHPUT DATA STREAMS AND DATABASES USING PROBABILITSTIC SURPRISAL CONTEXT FILTERS - A method, system, and computer program product for detecting anomalous events from a data input comprising a plurality of events. The method comprising the steps of: selecting at least one filter selecting for context data determined to be probabilistically present within a specified degree of certainty in the data input; comparing the data input to the selected at least one filter; discarding the events from the data input that are the same as the context data for which the at least one filter selects; and storing in a repository the events remaining in the data input as anomalous events. | 12-04-2014 |
20140358952 | GENERATION AND MAINTENANCE OF SYNTHETIC EVENTS FROM SYNTHETIC CONTEXT OBJECTS - A method, computer program product and system for generating and maintaining synthetic context events. The steps include searching a data structure of synthetic context-based objects and associated data for a pattern of context exhibited at a first specified frequency within a first specified time period; combining the synthetic context-based objects and associated data exhibiting the pattern of context exhibited at the first specified frequency within the first specified time period into a synthetic context event; and optimizing and maintaining the synthetic context event by searching the data structure for additional synthetic context-based objects and associated data exhibiting a same pattern of context at a second specified time period different than the first specified time period and adding the additional synthetic context-based objects and associated data to the synthetic context event. | 12-04-2014 |
20150025913 | ASSOCIATING RECORDS IN HEALTHCARE DATABASES WITH INDIVIDUALS - At least one attribute type associated with an individual in a first record of a first database and one or more similar attribute types in record(s) of other second database(s) are located. The attribute types compared. Based on the comparison, a first weighted score for the first record and another weighted score for each other records are computed. The weighted score indicates a likelihood the particular attribute type is associated with a same individual as other attribute type(s) located in other record(s) and further accounts for a time delta between measurements of the attribute types. Confidence score outputs for the records are also computed. The confidence score output of a record is based on all weighted scores of that record and indicates a likelihood that record is associated with the same individual. At least one database is updated based on at least one of the confidence score outputs. | 01-22-2015 |
20150037215 | LAB ON A CHIP - A Lab On a Chip (LOC) comprises: a sample inlet for receiving a liquid sample; and a Sample Preparation Module (SPM) coupled to the sample inlet. The SPM comprises: a mixing chamber; a reagent chamber containing a reagent; a semi-permeable membrane oriented between the mixing chamber and the reagent chamber; and a tuned energy source, wherein the tuned energy source selectively causes contents of the reagent chamber to expand and pass through the semi-permeable membrane into the mixing chamber to mix the reagent with the liquid sample. The LOC further comprises a microchannel coupled to the SPM; a light source; an optic module optically proximate to the microchannel; and a plurality of lenses within the optic module, wherein each lens has a different effective focal length for generating a single composite image of an object passing through the microchannel. | 02-05-2015 |
20150040222 | DETECTING AND REACTING TO INAPPROPRIATE EQUIPMENT AND PROGRAMMING IN A COMPUTER SYSTEM WITHOUT GENERATING ALERTS TO UNAUTHORIZED USERS OF THE DETECTION - A method, computer program product and system of detecting changes in hardware, software, or programming of a device in a computer system by a computer in the system coupled to the device through a network, without generating alerts or alerting unauthorized users of the detection of the changes. | 02-05-2015 |
20150047057 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester. | 02-12-2015 |
20150073844 | GENERATING MULTIPLY CONSTRAINED GLOBALLY OPTIMIZED REQUESTS FOR PROPOSAL PACKAGES SUBJECT TO UNCERTAINTY ACROSS MULTIPLE TIME HORIZONS - A method, system and computer program product for determining an optimized set of sales events for a company. The method including the steps of if a likelihood of the company being awarded the sale is greater than a predetermined probability: determining a weighted profitability from being awarded the sale; determining unavailability costs and penalties associated with providing the resource package if resources within the package are unavailable; determining a weighted overall cost by assigning weights to the costs and penalties of the resources in the resource package and the unavailability costs and penalties; selecting an optimized mathematical set of sales events to be followed up, based on the weighted overall cost relative to the weighted profitability from being awarded the sale. | 03-12-2015 |
20150074464 | PREVENTING CASCADE FAILURES IN COMPUTER SYSTEMS - A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent, wherein the multiple upstream subcomponents execute upstream computational processes. Each upstream computational process is examined to determine an accuracy of each identified output. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. The accuracy values and weighting values are utilized to dynamically adjust inputs to the downstream subcomponent until an output from the downstream subcomponent meets a predefined trustworthiness level. | 03-12-2015 |
20150081383 | GENERATING MULTIPLY CONSTRAINED GLOBALLY OPTIMIZED REQUESTS SUBJECT TO STATE OF ENVIRONMENT FOR PROPOSAL PACKAGES - A method, system and computer program product for determining an optimized set of sales events for a company. The method including the steps of determining a sales event is in an area supported by the company; extracting sales event parameters regarding the sales event; extracting data regarding a state of an environment surrounding a party offering the sales event; determining a probability of the extracted data regarding a state of the environment surrounding the party and assigning weights to the extracted data will affect the awarding of the sales event to the company; and based on the determined probabilities, mapping the sales event parameters to industry solution ontology based on the probabilities of extracted data of the state of the environment surrounding the party that will affect the sales event from being awarded to the company by the party. | 03-19-2015 |
20150081694 | MULTI-TEMPORAL WIDELY DISTRIBUTED HARDWARE AND SOFTWARE TRANSACTION STATE AND DATA STATE MEMORY SYSTEM - A method, in a multi-temporal widely distributed hardware and software transaction state and data state memory system, the steps comprising: creating an entry within the metadata layer for a first access to a data item within the data structure at a time-equals-zero state to create a time-equals-zero version branch of the data item in a graph structure of the data structure at a time-equals-zero time; updating the graph structure within the metadata layer when a copy-on-write overlay is generated by creating an additional branch connected to a same node as the time-equals-zero branch, storing a set of characteristics regarding the copy-on-write overlay within the metadata layer; updating the graph structure to reflect a status of propagated changes from the copy-on-write overlay to the plurality of computers; and storing a set of characteristics regarding the propagated changes to the plurality of computers. | 03-19-2015 |