WIPRO LIMITED Patent applications |
Patent application number | Title | Published |
20160132669 | BIOMETRIC USER AUTHENTICATION SYSTEM AND A METHOD THEREFOR - The present disclosure relates to a method and a system for authenticating a user. In one embodiment, one or more input and target data samples extracted from a plurality of physiological and movement signals of the user are processed to train one or more regression models. In real time authentication, the input and target data samples are extracted from the plurality of physiological and activity signals and mapped with trained regression models to determine a regression error. Based on the regression error, an appropriate authentication signal is then generated and transmitted to the user. Using dynamically selected multiple input and target data samples for user authentication increases the accuracy of authentication, thereby reducing possibilities of invalid authentication. Further, the power consumed by the sensors and computation load is reduced by dynamically powering up and powering down of the one or more sensors based on their usage during the authentication process. | 05-12-2016 |
20160099925 | SYSTEMS AND METHODS FOR DETERMINING DIGITAL DEGREES OF SEPARATION FOR DIGITAL PROGRAM IMPLEMENTATION - This disclosure relates generally to enterprise software management, and more particularly to systems and methods for determining digital degrees of separation for digital program implementation. In one embodiment, a digital degrees of separation determination system is disclosed, comprising a hardware processor, and a memory storing instructions executable by the processor for obtaining user credentials, and determining a user classification based on the user credentials. The processor may execute the instructions for identifying a user digital need based on the user classification, and querying a database for market-available software applications related to the user digital need. Further, the processor may execute the instructions for obtaining a list of user-accessible software applications related to the user digital need, and comparing characteristics of the market-available software applications to the user-accessible software applications. Also, the processor may execute the instructions for calculating a digital degrees of separation based on the comparison. | 04-07-2016 |
20160094319 | Method and System for Inter-Cell Interference Coordination in Wireless Networks - A method, system, and non-transitory computer-readable storage medium for managing inter-cell interference in a wireless network is provided. The method may be executed by at least one processor at a small cell gateway and may include receiving, uplink interference power corresponding to a first small cell base station (SCBS). The method may further include receiving neighboring cell information of the first SCBS, the neighboring cell information including information on a first plurality of SCBSs neighboring the first SCBS. The method may further include determining based on the received uplink interference power, that the first SCBS is experiencing inter-cell interference and determining a second plurality of SCBSs from among the first plurality of SCBSs that are interfering with the first SCBS. The method may further include adjusting uplink power allocation corresponding to a second SCBS from among the second plurality of SCBSs. | 03-31-2016 |
20160077956 | SYSTEM AND METHOD FOR AUTOMATING TESTING OF SOFTWARE - The present disclosure relates to systems, methods, and non-transitory computer-readable media for automating testing of software. The method comprises receiving, the at least one test case. The at least one test case associated with at least one test platform may be executed. Further, a variable time delay may be interjected between successive runs for the at least one test case. The variable time delay based on inertia associated with the at least one test platform. A sequence of the one or more test results for the at least one test case may be built. Based on the one or more test results, an output consistency based on the one or more test results may be determined. Finally, a fault associated with the at least one test platform or a software based on the output consistency may be determined. | 03-17-2016 |
20160077874 | Method and System for Efficient Execution of Ordered and Unordered Tasks in Multi-Threaded and Networked Computing - The present disclosure provides methods for concurrently executing ordered and unordered tasks using a plurality of processing units. Certain embodiments of the present disclosure may store the ordered and unordered tasks in the same processing queue. Further, processing tasks in the processing queue may comprise concurrently preprocessing ordered tasks, thereby reducing the amount of processing unit idle time and improving load balancing across processing units. Embodiments of the present disclosure may also dynamically manage the number of processing units based on a rate of unordered tasks being received in the processing queue, a processing rate of unordered tasks, a rate of ordered tasks being received in the processing queue, a processing rate of ordered tasks, and/or the number of sets of related ordered tasks in the processing queue. Also provided are related systems and non-transitory computer-readable media. | 03-17-2016 |
20160019484 | SYSTEM AND METHOD FOR MANAGING RESOURCES OF A PROJECT - Systems and methods for managing resources in a project management model are described herein. In one embodiment, a computer-implemented resource management method is disclosed. The method comprises generating, for fulfilling a project specification, a resource allocation model indicative of at least one of: a hierarchical arrangement of a plurality of resource entities, or a competency index of one or more of the resource entities. One more project phases capable of being automated are identified by analyzing the project specification using one or more automation rules. The method includes initiating computational processing by a bot for automating the identified one or more project phases, and generating a modified workbench for at least one of the resource entities based on the resource allocation model and the identified one or more project phases. | 01-21-2016 |
20160019250 | SYSTEM AND METHOD FOR MANAGING ENTERPRISE USER GROUP - According to an exemplary embodiment, a method for generating an enterprise user group is provided. The method may include receiving a set of attributes for an enterprise network user; receiving one or more enterprise group member identification rules including a similarity distance threshold and a set of target attributes; calculating, using a hardware processor, a similarity assessment score based on the set of target attributes and the set of attributes; and determining, using the hardware processor, whether the enterprise network user is an enterprise group member based on the similarity assessment score and the similarity distance threshold. | 01-21-2016 |
20150363187 | SYSTEMS AND METHODS FOR INSTALLING UPGRADED SOFTWARE ON ELECTRONIC DEVICES - Systems, methods, and computer-readable media for upgrading electronic devices are provided. An exemplary method executed by a hardware processor may comprise providing a management agent on an electronic device for communicating with one or more device drivers associated with the electronic device. The management agent may be installed, for example, using a downloaded upgrade package. The method may further comprise upgrading the one or more device drivers to enable a direct connection between the management agent and the one or more device drivers. This direct connection, in some embodiments, may enable the management agent to access, using the one or more device drivers, persistent storage associated with the electronic device. The method may further comprise providing a new boot loader to the management agent, and overwriting, by the management agent, an existing boot loader in the persistent storage with the received new boot loader, using the one or more device drivers. | 12-17-2015 |
20150358469 | SYSTEM AND METHOD FOR DYNAMIC JOB ALLOCATION BASED ON ACOUSTIC SENTIMENTS - The present disclosure relates to methods of systems for allocating a call from a user to an agent. Embodiments of the disclosure may determine a set of sentiment indicators associated with the user from one or more acoustic parameters of the call. In addition, embodiments of the disclosure may select a candidate agent to handle the call based on the set of sentiment indicators and a sentiment handling capability associated with the candidate agent. Moreover, embodiments of the disclosure may allocate the call to the candidate agent. | 12-10-2015 |
20150348059 | SYSTEM AND METHOD FOR DETERMINING THE SHOPPING PHASE OF A SHOPPER - The present disclosure relates to methods of systems for analyzing online shopping behavior. Embodiments of the disclosure may receive an event indicating shopping activities of a shopper from a shopping channel and determine an action type associated with the event. A rule engine may classify the event into one of a plurality of shopping phases based on at least one of: classification rules, the action type, or a history of past events. Some embodiments may also calculate a raw score for the shopping phase base on at least one of: an existing number of events in that shopping phase or an event weight associated with the event. In addition, some embodiments may calculate a weighted score based on the raw score and a weighting factor associated with the shopping phase into which the event is classified and determine a target shopping phase based on the weighted score. | 12-03-2015 |
20150332053 | SYSTEMS AND METHODS FOR EVALUATING A SOURCE CODE SCANNER - Apparatuses, methods, and non-transitory computer readable medium that evaluate a source code scanner are described. In one implementation, the method comprises obtaining source code. One or more good code snippets and one or more bad code snippets are inserted into the source code to obtain a modified source code. An issue list generated by the source code scanner upon scanning the modified source code is obtained. The issue list comprises code segments having security defects identified by the source code scanner, reasons for the security defects, and locations of the security defects in the modified source code. The code segments present in the issue list are compared with the one or more good code snippets and the one or more bad code snippets. A plurality of metrics, indicating quality of the source code scanner, are generated based on the comparison. | 11-19-2015 |
20150278991 | METHOD AND SYSTEM FOR IMAGE SCALING - A method, system, and non-transitory computer-readable storage medium for image scaling is provided. In one embodiment, the method may include determining one or more filter phases based on a vertical target grid distance and a horizontal target grid distance; and scaling, by one or more hardware processors, an input image using filter coefficients corresponding to the one or more filters phases to output a target image. The horizontal target grid distance may be based on a ratio of a number of horizontal filter phases and a horizontal scaling ratio, and the vertical target grid distance may be based on a ratio of a number of vertical filter phases and a vertical scaling ratio. | 10-01-2015 |
20150278590 | SYSTEM AND METHOD FOR DETERMINING THE CHARACTERISTICS OF HUMAN PERSONALITY AND PROVIDING REAL-TIME RECOMMENDATIONS - The present disclosure relates to systems, methods, and non-transitory computer-readable media for identifying a personality of a human subject based on correlations between personality traits obtained from the subject's physical features, which may include a movement pattern of the subject, such as the subject's gait. Embodiments in accordance with the present disclosure are further capable of providing a recommendation to the subject for a product or service based on the identified personality of the subject. | 10-01-2015 |
20150278586 | SYSTEM AND METHOD FOR GUIDED CONTINUOUS BODY TRACKING FOR COMPLEX INTERACTION - A method, non-transitory computer readable medium and apparatus that provides feedback to a user for interacting continuously without any disconnect. It gives real time visual clues and gestures based on application need. This solves the problem of a disconnected user found in current system and applications as user will be continuously aware whether and how much he is being tracked by the application that will allow him to continuously interact with the application. The requirements from various applications like FBT (Full body Tracking), HBT (Half Body Tracking), LTO (Leg Tracking Only), HTO (Hand Tracking Only), STO (Specific Tracking only) is sent to the CFBTE (Continuous Full Body Tracking Engine). The CFBTE process the requirements and generates the visual clues and gesture events. In visual clues the tracking level/intensity is continuously displayed, which will guide the user on system readiness and effectiveness for interaction. | 10-01-2015 |
20150278526 | COMPUTERIZED SYSTEMS AND METHODS FOR PRESENTING SECURITY DEFECTS - Systems, methods, and computer-readable media for presenting and mitigating security defects in a systems development process. An example method is provided. The method comprises receiving a set of security defects, each of which may be associated with a severity level and a development stage. The method further comprises applying at least one rule to one of the received security defects to determine whether a risk associated with the at least one defects is reduced. Each rule may be associated with a weight representative of the probability that the rule correctly predicts that the risk is reduced. The method further comprises determining which of the rules applied to the at least one defect and appropriately modifying the associated severity level. The method further comprises presenting the received security defects, based on the severity level associated with each defect and the weight associated with a rule applied to each defect. Systems and computer-readable media are also provided. | 10-01-2015 |
20150278418 | LOGIC ANALYZER CIRCUIT FOR PROGRAMMABLE LOGIC DEVICE - The present disclosure relates to methods and related systems and computer-readable mediums. The methods include receiving a design for a programmable logic device (PLD). The design includes a plurality of nodes. The method also includes modifying, via one or more hardware processors, the design to include a logic analyzer circuit. The logic analyzer circuit includes inputs for a plurality of selectable groups of capture signals for connecting to selected nodes of the plurality of nodes. In addition, the method includes outputting the design to the PLD to program the PLD. The disclosure also relates a system comprising a user logic circuit, a logic analyzer circuit, and a memory. | 10-01-2015 |
20150278393 | SYSTEM AND METHOD FOR BUSINESS INTELLIGENCE DATA TESTING - Apparatuses, methods, and non-transitory computer readable medium for testing business intelligence data over a communication network include receiving a data mapping file, applicable to a source data repository and a target data repository, and generating data mapping file based on the same. Test cases are generated, based on the data mapping file, and SQL scripts, for execution of the test cases, and executing the SQL scripts on the source data repository and the target data. An online analytical processing (OLAP) cube report for the target data repository is received and the OLAP cube report and a report, which is to be tested, are compared to generate a comparison report. The comparison report is indicative of the fields of the OLAP cube report and the report, which is to be tested, which generated at least one error. | 10-01-2015 |
20150277976 | SYSTEM AND METHOD FOR DATA QUALITY ASSESSMENT IN MULTI-STAGE MULTI-INPUT BATCH PROCESSING SCENARIO - The present disclosure relates to systems, methods, and non-transitory computer-readable media for assessing data quality in multi-stage, multi-source batch processes that do not require validation of input data prior to processing. Embodiments of the present disclosure are further capable of identifying or predicting potential data quality issues, assessing their impact (if any) on the batch process, and providing recommendations for preventing or resolving the identified or predicted data quality issues. | 10-01-2015 |
20150277716 | SYSTEM AND METHOD FOR IMPROVED LIGHT-WEIGHT BUSINESS PROCESS MODELING IN OFFLINE MODE USING BROWSER RESOURCES - The present disclosure relates to methods of systems for process modeling. Embodiments of the present disclosure may store a user interface framework in a memory allocated to a browser application in the computer. The user interface framework may provide a user interface to a user operating the computer to perform process modeling. Some embodiments may also render the user interface using a rendering engine associated with the browser application and capture one or more process modeling events received as input by the user. The one or more process modeling events may be associated with one or more process models. In addition, some embodiments may store the one or more process modeling events as model data in the memory allocated to the browser application and render the one or more process models on the user interface based on at least a subset of the model data. | 10-01-2015 |
20150271178 | SYSTEM AND METHOD FOR SECURE DATA GENERATION AND TRANSMISSION - Systems and methods for secure generation and transmission of data over a communication network are described herein. In one example, the method comprises receiving a query from the user and retrieving raw data from a data repository based on the received query. The method further comprises generating an obfuscated query and randomizing at least one of a table and a field of the raw data to produce a randomized schema. In one example, the method further comprises pre-processing the raw data based on the received query and inserting the preprocessed data into the randomized schema. Thereafter a data payload is generated by inserting the obfuscated query and the randomized schema into a data carrier, wherein the data payload is to be transferred to at least one client device for processing. | 09-24-2015 |
20150269596 | SYSTEMS AND METHODS FOR ASSESSING CUSTOMER CENTRIC BUSINESS PROCESS METHOD MATURITY - The present disclosure relates to methods of systems for assessing customer centric BPM maturity of an organization. Embodiments of the present disclosure may create an assessment model for an initiative, wherein creating the assessment model includes providing an initial assessment criteria selection for presentation on a user device. Create the assessment model may also include receiving, from the user device, a selection of initial assessment criteria and calculating a first score based on the selected assessment criteria. Create the assessment model may also include determining a first maturity state of the initiative based on the first score, and generating a first plurality of guidelines associated with the first score for moving the initiative to a maturity state that is not the first maturity state. | 09-24-2015 |
20150269587 | METHODS FOR PREDICTING CUSTOMER SATISFACTION AND DEVICES THEREOF - A method, non-transitory computer readable medium and utility management computing device for obtaining data associated with one or more electric utilities from a utility monitoring system. An asset reliability score and a consumption score is determined from the obtained data associated with the one or more electric utilities. Next, a customer satisfaction score is determined for the one or more electric utilities based on the determined asset reliability score and the consumption score. The determined customer satisfaction score for the one or more electric utilities is provided. | 09-24-2015 |
20150269262 | METHODS FOR RETRIEVING INFORMATION AND DEVICES THEREOF - A method for retrieving information includes determining, by the information retrieval management computing device, when an identified subject of interest in a received query maps to one of one or more ontology entities. An identification is made, by the information retrieval management computing device, when the identified subject of interest is one of one or more existing subjects of interest when the identified subject of interest is determined to map to one of the ontology entities. One or more filters associated with the identified subject of interest are stored by the information retrieval management computing device. The one or more filters include: one or more new property conditions in the received query, one or more ontology property conditions associated with the mapped one of the ontology entities, and one or more existing property conditions associated with the one of the one or more existing subjects of interest when the identified subject of interest is identified as one of the existing subjects of interest; or the one or more new property conditions and the one or more ontology property conditions when the identified subject of interest is not identified as one of the existing subjects of interest. An updated query is automatically built based on the stored one or more filters by the information retrieval management computing device. One or more results are retrieved and provided, by the information retrieval management computing device, based on the automatically built updated query. | 09-24-2015 |
20150264607 | METHOD AND SYSTEM FOR NEIGHBOR REPORTING IN A MOBILE COMMUNICATION NETWORK - A method, neighbor relation maintenance device, and non-transitory computer readable medium for neighbor reporting in a wireless communication network is disclosed. The method comprises categorizing, by a neighbor relation maintenance device, a plurality of Mobile Stations (MSs) into one or more groups. A primary neighbor BS for each group of the one or more groups of MSs is determined. Each MS of each group is instructed to report signal strength measurements between the each MS and the corresponding primary neighbor BS associated with the each group in a first time period. Each MS of each group is instructed to report signal strength measurements between the each MS and each neighbor BS in a predefined neighbor list associated with the each MS in a second time period. | 09-17-2015 |
20150264255 | METHOD AND A GUIDED IMAGING UNIT FOR GUIDING A USER TO CAPTURE AN IMAGE - Embodiments of the present disclosure provide a method for guiding a user to capture an image of a target object using an image capturing device. In an embodiment, the method of the present disclosure comprises determining a bounding area for image to be captured and capturing at least one frame of the image upon detecting image to be inside the bounding area. Then, the target object in captured at least one frame is segmented by separating the target object from the rest of the image. Further, at least one of symmetry and self-similarity of the segmented target object is determined. In addition, at least one image parameter is determined by a sensor. The method then provides inputs for guiding user to capture a final image of the target object, based on at least one of determined symmetry, self-similarity, and at least one image parameter. | 09-17-2015 |
20150262308 | METHODS FOR IMPROVING CLAIMS PROCESSING FOR A VEHICLE IN AN EVENT AND DEVICES THEREOF - A method, device, and non-transitory computer readable medium that improves claims processing for a vehicle in an event includes receiving an application code and one or more images of the vehicle captured by a photographic device in a portable computing device based on received guidance. A claims application for a user is filled based on the application code and the one or more images. The claims application is authenticated and a claim amount is calculated based on the authenticated claims application. A determination is made whether the calculated claim amount is approved for the claims application based on a stored claim limit associated with the user. An indication on the determination of whether the calculated claim amount is approved is provided. | 09-17-2015 |
20150261903 | SYSTEM AND METHOD FOR IMPROVED TRANSACTION BASED VERIFICATION OF DESIGN UNDER TEST (DUT) TO MINIMIZE BOGUS FAILS - A method and system for transaction-based verification of a design under test (DUT) by a test bench that configures the DUT with at least one configuration including one or more configuration values. At least one input to the DUT is applied to generate at least one output based on a configuration value. A list of changed one or more configuration values is associated with at least one abstract input transaction to generate at least one input transaction. A list of changed one or more configuration values is associated with one or more abstract output transactions to generate at least one output transaction. One or more expected transactions is generated based on the at least one input transaction using one or more transfer functions. An outcome is generated as pass/fail based on comparing the at least one output transaction with each of the one or more expected transactions. | 09-17-2015 |
20150261824 | SYSTEM AND METHOD FOR DATA VALIDATION - Systems and methods for validating data in a communication network environment include receiving a data transformation specification from a user. The data transformation specification is analyzed to determine data transformation rules which are indicative of a relationship between corresponding fields of the source repository and the target repository. Test cases and test scripts are generated based on the data transformation rules and the test cases and the test scripts are executed on the source repository and the target repository to validate the relationship between the corresponding fields of the source repository and the target repository. Thereafter, a log file, indicative of the outcome of the execution of the test cases and the test scripts, is generated. | 09-17-2015 |
20150257033 | SYSTEMS AND METHODS FOR BUFFER STATUS REPORTING IN WIRELESS COMMUNICATION SYSTEMS - A method and system for efficient buffer status reporting at a base station is provided. The method may include identifying a transmission opportunity associated with a first protocol layer of the base station, where the transmission opportunity indicates a transmission capacity of the base station. The method may further include determining, via one or more hardware processors, a time interval for sending a buffer status report from a second protocol layer of the base station to the first protocol layer based on at least the transmission opportunity. The method may further include determining, via the one or more hardware processors, an expected buffer occupancy based on at least the time interval and a packet incoming rate associated with downlink packets, and sending the buffer status report from the second protocol layer to the first protocol layer based on at least the time interval. | 09-10-2015 |
20150256475 | SYSTEMS AND METHODS FOR DESIGNING AN OPTIMIZED INFRASTRUCTURE FOREXECUTING COMPUTING PROCESSES - This disclosure relates generally to optimizing computing resources and, more particularly, to systems and methods for dynamically determining an optimized infrastructure for processing data. In one embodiment, a method for dynamically determining an optimized infrastructure for processing data is disclosed, comprising: receiving a task-processing request. The method may also include identifying, based on the received task-processing request, one or more rules associated with performing the task-processing request. The method may further include accessing historical learning information associated with performing at least one past task-processing request. The method may further include allocating computing resources for performing the task-processing request based on the identified one or more rules, accessed historical learning information, and available computing resources associated with a distributed computing environment. The method may further include determining the optimized infrastructure based on the allocated computing resources. | 09-10-2015 |
20150254600 | SYSTEM AND METHOD FOR REAL TIME ASSESSMENT OF CARGO HANDLING - Disclosed herein are a method and a system for real time assessment of cargo handling. The method comprises: receiving a cargo plan for at least one stage of transportation of the cargo; creating at least one first sensor configuration corresponding to the at least one stage of transportation based on the cargo plan; enabling each of at least one first sensor configuration corresponding to the stage of transportation, the at least one first sensor configurations monitoring physical condition of the cargo and the at least one container; receiving dynamic data associated with the cargo and the at least one container; creating at least one context based on analysis of the dynamic data; enabling at least one second sensor configurations based on the at least one context; detecting damage to the cargo and the at least one container based on data received from the at least one second sensor configuration; recommending change in the cargo plan and repackaging of the cargo based on the damage. | 09-10-2015 |
20150250308 | ADJUSTABLE SHELVING ASSEMBLY AND THE METHOD THEREOF - An adjustable shelving assembly includes at least two support rails, at least one geared rack provided in each of the at least two support rails, and an actuating mechanism placed adjacent to the at least one geared rack. The actuating mechanism is configured to support at least one shelf and facilitates movement of the at least one shelf along the at least two support rails. The actuating mechanism includes a pinion mating with the at least one geared rack, a plurality of permanent magnets mounted coaxially inside the pinion, ferromagnetic disks provided on either ends of the pinion, and a shaft placed axially in the pinion, connecting the permanent magnets. The permanent magnets magnetize or demagnetize the ferromagnetic disks when the shaft is rotated for locking or unlocking the at least one shelf. | 09-10-2015 |
20150242910 | METHODS FOR EVALUATING A NETWORK ASSOCIATED WITH AN ORGANIZATION AND DEVICES THEREOF - A method, non-transitory computer readable medium and network analyzer device that generates a relationship health score for a plurality of entities based on relationship utility scores and relationship strength scores generated for each pair of one of a plurality of connects and one of a plurality of connectors having a relationship. Next, connect dependence scores are generated for each of the connects. A total monetary value of the network is then generated based on a potential monetary value of the network and a realized monetary value of the network. The potential and realized monetary values are respectively generated based on potential and executed interactions between the connectors and the connects. A total value of the network is then generated based on the relationship health scores, the connect dependence scores, and the total monetary value of the network. The total value of the network is output to an information consumer device. | 08-27-2015 |
20150242686 | METHODS FOR ASSESSING IMAGE CHANGE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and an image analysis computing device that retrieves, based on a captured version of an object in a received image, training images which display related versions of the object and items of data related to the related versions of the object of the training images. Keypoints which are invariant to changes in scale and rotation in the captured version of the object in the received image and in the related versions of the object in the training images are determined. Changes to the object in the received image based on any of the determined keypoints in the related version of the object which do not match the determined keypoints in the captured version of the object are identified. The identified changes in the captured version of the object in the received image are provided. | 08-27-2015 |
20150227745 | SYSTEM AND METHOD FOR SAMPLING BASED SOURCE CODE SECURITY AUDIT - This disclosure relates to methods and systems for performing software security audit for an executable code, the method comprising: receiving, by a hardware processor, the executable code along with a plurality of life-cycle artifacts associated with the executable code; performing a security assessment on the executable code and the plurality of life-cycle artifacts associated with the executable code to identify one or more potential security issues associated with the executable code; determining a first set of questions based on the identified one or more security issues associated with the executable code; determining a second set of questions based on a requirements specification associated with the executable code; and performing a security audit session with one or more audit participants based on the first set of questions and the second set of questions. | 08-13-2015 |
20150227453 | SYSTEM AND METHOD FOR AUTOMATICALLY TESTING PERFORMANCE OF HIGH-VOLUME WEB NAVIGATION TREE SERVICES - The present disclosure relates to methods and systems for testing navigation graph services. Embodiments of the present disclosure may provide a directed graph based on a navigation graph service, determine a set of paths between nodes in the directed graph, and generate a testing script for an arbitrary performance testing tool based on the determined set of paths. The set of paths may comprise edge-disjoint paths between nodes in the directed graph. | 08-13-2015 |
20150227452 | SYSTEM AND METHOD FOR TESTING SOFTWARE APPLICATIONS - Systems and methods of testing, of software applications, based on business process models are described herein. In one example, the method comprises receiving, by a processor, the at least one business process model, wherein the at least one business process model is indicative of a business process associated with the software application and analyzing, by the processor, the at least one business process model to identify at least one test scenario. The method further comprises generating, by the processor, a set of test cases and test data for the at least one test scenario and producing, by the processor, a set of test automation scripts based on one or more keywords associated with the at least one test scenario. | 08-13-2015 |
20150227404 | SYSTEMS AND METHODS FOR SMART SERVICE MANAGEMENT IN A MEDIA NETWORK - This disclosure relates generally to network service management, and more particularly to systems and methods for smart service management in a media network. In one embodiment, a smart diagnostic system is disclosed, comprising: a hardware processor; and a memory storing processor-executable instructions comprising instructions for: receiving an agent fault report, including one or more network-wide standardized fault codes, from an agent application executing on a remote device in a media network; aggregating one or more relevant fault reports related to the agent fault report; obtaining one or more fault classification rules; identifying one or more fault nodes and associated fault conditions in the media network using the one or more fault classification rules, by analyzing the aggregated relevant fault reports; and providing an agent configuration instruction for one or more agent applications using the identification of the one or more fault nodes and associated fault conditions. | 08-13-2015 |
20150223750 | METHOD FOR IMPROVING BREATHING PERFORMANCE OF A USER AND AN ELECTRONIC DEVICE THEREFOR - Embodiments of the present disclosure provide a method of improving breathing performance of a user using an electronic device. In an embodiment, the method of the present disclosure comprises creating a profile of a user by using personal information of the user, determining one or more threshold values corresponding to one or more levels based on the user profile, receiving values associated with at least parameter from respiratory blows of the user, determining breathing performance of the user by comparing the values with a corresponding threshold value, displaying the breathing performance of the user and adjusting the threshold values for successive levels based on the breathing performance. | 08-13-2015 |
20150223743 | METHOD FOR MONITORING A HEALTH CONDITION OF A SUBJECT - Embodiments of the present disclosure provide a method and a computing unit to monitor health condition of a subject. The computing unit receives physiological signals from a plurality of sensors placed on the subject. The computing unit detects a work-type based on the physiological signals received from the plurality of sensors and assigns a weight to each of the plurality of sensors based on the work-type. Thereafter, the computing unit generates a fatigue score using the physiological signals and the weight of the plurality of sensors. The fatigue score indicates the health condition of the subject. | 08-13-2015 |
20150222487 | SYSTEMS AND METHODS FOR SMART REQUEST PROCESSING - This disclosure relates generally to compensating for the impact of fluctuations in network communicationsError! Reference source not found. and, more particularly, to systems and methods for optimizing transmission of web content. In one embodiment, a web content transmission optimization method is disclosed that includes receiving a request to transmit web content. The method may also include identifying, based on the request, a response that includes one or more response objects corresponding to the web content. The method may further include restructuring, by one or more processors, the response based on one or more configuration parameters. The method also comprises scheduling the restructured response and transmitting the requested web content according to the scheduled restructured response. | 08-06-2015 |
20150221037 | SYSTEM AND METHOD FOR ALLOCTING INVESTMENT FUND FOR AN APPLICATION - A method and system for optimizing investment fund allocation for an application is provided. The method may include identifying a directed graph representative of the application, the directed graph comprising a plurality of nodes and paths, where an incremental investment amount and an incremental revenue value are associated with the respective nodes and paths. The method may further include determining, using a computer processor, a path of the directed graph that provides a maximum return on investment among the plurality of paths of the directed graph. The method may further include allocating an investment amount, equaling the incremental investment amount associated with the path, to the path of the directed graph, and updating the incremental revenue value associated with the respective nodes and paths based on the incremental revenue value associated with the path of the directed graph. | 08-06-2015 |
20150220860 | METHOD AND A SYSTEM FOR OPTIMAL DEBT COLLECTION - Disclosed herein are a method and a system for optimizing the process of debt collection. The method comprises: identifying a customer with a debt; classifying the customer with the debt into one of a plurality of predefined categories based on a profile of the customer; retrieving one or more category specific collection actions capable of being taken against the customer based on the category associated with the customer; determining a historic probability of success and/or failure for the one or more category specific collection actions; generating, by a processor, a decision tree having a source node, one or more intermediate nodes, and one or more destination nodes, the source node, the one or more intermediate nodes, and the one or more destination nodes representing the one or more category specific collection actions, and the source node, the one or more intermediate nodes and the one or more destination nodes constituting one or more workflows; determining an optimal workflow from the one or more workflows on basis of maximum expected value at the source node, the maximum expected value based on cost associated with the one or more category specific collection actions and probability of success and/or failure of the one or more category specific collection actions. | 08-06-2015 |
20150207742 | METHODS FOR OPTIMIZING DATA FOR TRANSMISSION AND DEVICES THEREOF - A method, non-transitory computer readable medium and data optimizing computing device for optimizing data for transmission obtaining data set for transmission. One or more configuration rules associated with the obtained data set are obtained. The obtained data set is optimized based on the obtained one or more configuration rules for transmission. A client code and a server code associated with the optimized data set are generated. At least one of the generated client code is transmitted to a client computing device or the server code is transmitted to a server computing device. | 07-23-2015 |
20150207719 | METHOD AND SYSTEM FOR PORT PERFORMANCE RANKING IN MULTI-PROTOCOL SWITCH - A system and method for port performance ranking in a multi-protocol switch includes monitoring one or more first parameters, the one or more first parameters associated with operating condition of one or more ports of the multi-protocol switch. Each of the one or more first parameters is compared with an associated predefined criterion to determine deviation from the associated predefined criterion. One or more eligible ports is determined from the one or more ports based on non-deviation of each of the one or more first parameters from the associated predefined criterion. For each of the one or more eligible ports, each of one or more second parameters is compared with an associated predefined threshold, the one or more second parameters associated with port traffic statistics. The one or more eligible ports are ranked based on the comparison between each of the second parameters and the associated predefined threshold. | 07-23-2015 |
20150206157 | METHODS AND SYSTEMS FOR ESTIMATING CUSTOMER EXPERIENCE - This disclosure relates to methods and systems for estimating customer experience, the method comprising: receiving one or more interaction parameters associated with an interaction between the utility providing entity and a customer entity; determining, by a hardware processor in communication with the utility providing entity, a first interaction score based on the received one or more interaction parameters; determining a second interaction score based on the first interaction score and a feedback rating, provided by the customer entity, associated with the interaction; determining a third interaction score based on the second interaction score and a time interval between the interaction and a previous interaction between the utility providing entity and the customer entity; determining a customer experience score associated with the interaction based on the third interaction score and a stored customer experience score associated with the previous interaction; and providing the customer experience score. | 07-23-2015 |
20150206154 | METHODS AND SYSTEM FOR DETERMINING USER ATTRIBUTES - This disclosure relates to methods and systems for determining user attributes. In one embodiment, a method performed by an electronic device for determining user attributes receiving a touch input is disclosed, the method comprising: determining one or more sets of touch parameters based on the touch input, each set associated with a user attribute; identifying, for each of the one or more sets of touch parameters, an associated set of stored touch parameters from among a plurality of stored touch parameters based on a predefined criterion of match between the set of touch parameters and the plurality of stored touch parameters; determining, for each of the one or more sets of touch parameters, the associated user attribute based on the associated set of stored touch parameters; and providing the determined user attribute associated with each of the one or more sets of touch parameters. | 07-23-2015 |
20150195618 | METHOD OF RECOMMENDING EVENTS ON AN ELECTRONIC DEVICE - This technology provides a method, non-transitory computer readable medium and device that recommends one or more events on an electronic device. The electronic device provides an event to the user. The user selects a frame to obtain certain information. The electronic device detects frame number and event identification (ID) number associated with selected frame and provides frame number and event ID number to recommendation server for identifying attributes and values. The recommendation server identifies the attributes and values associated with the selected frame. Thereafter, the recommendation server provides the attributes and the values to the electronic device for selection of at least value by the user. The electronic device provides selected values to the recommendation server. The recommendation server searches listing of plurality of events to determine one or more events having the selected values. The recommendation server may then provide the list of one or more events having the selected values to the electronic device. | 07-09-2015 |
20150186133 | SYSTEMS AND METHODS FOR ENTERPRISE APPLICATION PORTFOLIO MANAGEMENT - This disclosure relates generally to information technology management, and more particularly to systems and methods for enterprise application portfolio management. In one embodiment, an application portfolio management system is disclosed, comprising: a hardware processor; and a memory storing processor-executable instructions for: receiving application usage data associated with software applications utilized by a plurality of users; obtaining computer program instructions for processing the application usage data; processing the application usage data according to the computer program instructions, to generate a recommendation for one or more maintenance operations associated with one or more of the applications; and providing the generated recommendation. | 07-02-2015 |
20150182174 | METHOD AND SYSTEM FOR FAIL-PROOF PATIENT MONITORING - This disclosure relates generally to patient monitoring techniques, and more specifically to a method and a system to reduce false alarms generated by the patient monitoring system, the false alarms being associated with clinical condition of the patient. Disclosed herein is a patient monitoring method that includes monitoring one or more clinical parameters associated with condition of a patient, identifying a clinical condition based on deviation of the monitored one or more clinical parameters from corresponding one or more first predefined criteria, determining a status associated with one or more devices that monitor the deviated one or more clinical parameters, and generating a clinical alert based on the determined status not indicating an error by the one or more devices. | 07-02-2015 |
20150181477 | METHOD AND SYSTEM FOR AUTOMATICALLY UPDATING A NEIGHBOR LIST - A method and system for automatically updating a neighbor list associated with a serving base station is disclosed. The method involves receiving a measurement report from a User Equipment (UE) associated with the serving base station, wherein the measurement report comprises at least one relative signal strength measurement between the UE and each of a plurality of neighboring base stations; comparing the at least one relative signal strength measurement between the UE and the plurality of neighboring base stations with a current signal strength between the UE and the serving base station; identifying at least one of the plurality of neighboring base stations having a greater relative signal strength with respect to the UE than the serving base station a predefined number of times based on the comparison; and updating the neighbor list associated with the serving base station with the identified at least one neighboring base stations. | 06-25-2015 |
20150155983 | METHOD AND SYSTEM FOR INTER-CELL INTERFERENCE COORDINATION IN WIRELESS NETWORKS - A method, system, and non-transitory computer-readable storage medium for managing inter-cell interference in a wireless network is provided. The method may be executed by at least one processor at a small cell gateway and may include receiving, uplink interference power corresponding to a first small cell base station (SCBS). The method may further include receiving neighboring cell information of the first SCBS, the neighboring cell information including information on a first plurality of SCBSs neighboring the first SCBS. The method may further include determining based on the received uplink interference power, that the first SCBS is experiencing inter-cell interference and determining a second plurality of SCBSs from among the first plurality of SCBSs that are interfering with the first SCBS. The method may further include adjusting uplink power allocation corresponding to a second SCBS from among the second plurality of SCBSs. | 06-04-2015 |
20150149564 | METHOD AND SYSTEM FOR PROVIDING MESSAGES TO A USER - This disclosure relates generally to a method and system of providing messages to a user, and more particularly to a method of providing messages to a preferred device and/or message service account of the user. The method includes initially registering one or more devices and/or message service accounts at a managing server. Thereafter, one or more messages received at the registered message service accounts are forwarded to the managing server. Subsequently, the managing server may multicast a notification of the message to all the registered devices and/or service accounts of the user. The notification may include an indication of the registered devices and/or message service accounts of the user. The user may then select a preferred device and/or message service account from the notification. Thereafter, the managing server may forward the message to the preferred device and/or message service account. | 05-28-2015 |
20150142997 | METHODS FOR FRAME ORDER CONTROL AND DEVICES IN STORAGE AREA NETWORK - A method, non-transitory computer readable medium, and device that sends an outgoing storage device frame to a storage device, the outgoing storage device frame converted from an incoming storage device frame received from a host device based on a protocol supported by the storage device. An incoming host device frame is received from the storage device in response to the outgoing storage device frame. Whether an outgoing host device frame has been sent to the host device is determined, the outgoing host device frame converted from the incoming host device frame based on a protocol supported by the host device, wherein the protocol supported by the host device requires a different frame sequencing than the protocol supported by the storage device. A next incoming storage device frame received from the host device is retrieved when the outgoing host device frame is determined to have been sent to the host device. | 05-21-2015 |
20150135289 | SYSTEMS AND METHODS FOR AUTHENTICATION BASED ON USER PREFERENCES - This disclosure relates generally to authentication for an electronic device, and more particularly to systems and method for authentication based on user preferences. In one embodiment, an authentication method is disclosed, comprising: receiving, at the electronic device, a first input; determining a password theme based on the first input and user preferences associated with the password theme; displaying the password theme, the displayed password theme comprising a plurality of visual cues; receiving, at the electronic device, a second input comprising a sequence of visual cues selected from the visual cues; verifying the sequence of visual cues; and providing access to the electronic device based on the verification. | 05-14-2015 |
20150131912 | SYSTEMS AND METHODS FOR OFFLINE CHARACTER RECOGNITION - A method, non-transitory computer readable medium and character recognition device for character recognition includes a character recognition device for receiving an image representing a character comprising one or more strokes. A set of first parameters associated with each of the one or more first strokes is determined. Each of the one or more first strokes is compared with the associated set of first parameters with a plurality of stored sets of second parameters, where each of the plurality of stored second strokes is associated with a stored set of second parameters. A second stroke is identified from among the plurality of stored second strokes corresponding to each of the one or more first strokes based on the comparison. The character is identified based on the identified one or more second strokes. | 05-14-2015 |
20150120073 | SYSTEM AND METHOD FOR MODELING OF TARGET INFRASTRUCTURE FOR ENERGY MANAGEMENT IN DISTRIBUTED-FACILITIES - This disclosure relates to modeling of target infrastructure for energy management in distributed-facilities. In one embodiment, an energy management modeling method is disclosed, comprising: obtaining customer facility information and a customer business type; obtaining energy management industry standard information related to the customer business type; generating a baseline customer knowledge base, based on the obtained energy management industry standard information; obtaining facility historical operational information and operational policy information; generating a first energy operational model using the customer facility information, the baseline customer knowledge base, the facility historical operational information, and the operational policy information; generating a mapping of energy sources to asset systems, using the first energy operational model; generating an optimized energy operational model using the mapping of the energy sources to asset systems, wherein the optimized energy operational model utilizes an objective function of cost, energy consumption, and emission; and providing the optimized energy operational model. | 04-30-2015 |
20150113331 | SYSTEMS AND METHODS FOR IMPROVED SOFTWARE TESTING PROJECT EXECUTION - This disclosure relates generally to software development, and more particularly to systems and methods for improved software testing project execution. In one embodiment, a software testing system is disclosed, comprising: a processor; and a memory storing processor-executable instructions comprising instructions for: obtaining a software test execution request including one or more software test cases to execute; identifying one or more software test environmental parameters; determining one or more computing systems for performing software test execution, based on the one or more software test environmental parameters; generating one or more configuration settings associated with initiating or terminating software test execution on the one or more computing systems; and storing the one or more configuration settings. | 04-23-2015 |
20150100963 | METHOD AND SYSTEM FOR EFFICIENT EXECUTION OF ORDERED AND UNORDERED TASKS IN MULTI-THREADED AND NETWORKED COMPUTING - The present disclosure provides methods for concurrently executing ordered and unordered tasks using a plurality of processing units. Certain embodiments of the present disclosure may store the ordered and unordered tasks in the same processing queue. Further, processing tasks in the processing queue may comprise concurrently preprocessing ordered tasks, thereby reducing the amount of processing unit idle time and improving load balancing across processing units. Embodiments of the present disclosure may also dynamically manage the number of processing units based on a rate of unordered tasks being received in the processing queue, a processing rate of unordered tasks, a rate of ordered tasks being received in the processing queue, a processing rate of ordered tasks, and/or the number of sets of related ordered tasks in the processing queue. Also provided are related systems and non-transitory computer-readable media. | 04-09-2015 |
20150095887 | SYSTEMS AND METHODS FOR FIXING SOFTWARE DEFECTS IN A BINARY OR EXECUTABLE FILE - This disclosure relates generally to application development, and more particularly to systems and methods for fixing software defects in a binary or executable file. In one embodiment, a software defect management system is disclosed, comprising: a processor; and a memory disposed in communication with the processor and storing processor-executable instructions comprising instructions for: obtaining an application programming interface call for a black-box software application; determining whether the black-box software application is configured in a defective manner to process the application programming interface call; identifying a call processing application to process the application programming interface call, based on determining whether the black-box software application is configured in a defective manner to process the application programming interface call; and providing the application programming interface call for the identified call processing application. | 04-02-2015 |
20150082128 | METHODS AND SYSTEMS FOR MINIMIZING DECODING DELAY IN DISTRIBUTED VIDEO CODING - This disclosure generally relates to encoding, transmission, and decoding of digital video, and more particularly to methods and systems for minimizing decoding delay in distributed video coding (DVC). In one embodiment, a video decoding method is disclosed, comprising: obtaining side information; obtaining a syndrome bit chunk corresponding to a non-key-frame bit-plane; performing, via one or more processors, at least one non-key-frame bit-plane channel decoding iteration using the side information and the syndrome bit chunk; generating a decoded bit-plane via performing the at least one non-key-frame bit-plane channel decoding iteration; determining a bit error rate measure for the decoded bit-plane; determining, based on the bit error rate measure, a number of additional syndrome bit chunks to request; and providing a request for the additional syndrome bit chunks. | 03-19-2015 |
20150079966 | METHODS FOR FACILITATING TELECOMMUNICATION NETWORK ADMINISTRATION AND DEVICES THEREOF - A method, non-transitory computer readable medium and network management data server device for receiving a service request from a mobile device, where the service request comprises a value for one or more attributes of the mobile device and an indication of at least one of a view profile or one or more network attributes. Network data from a network data snapshot is extracted based on one or more of the indicated view profile or one or more network attributes. A plurality of chunks is generated from the extracted network data based on the value of the one or more attributes of the mobile device. A first one of the plurality of chunks is sent to the mobile device in response to the service request and an additional one of the plurality of chunks in response to each of one or more requests received from the mobile device. | 03-19-2015 |
20150077574 | METHOD AND SYSTEM FOR ASSISTIVE PHOTOGRAPHY - The disclosure relates generally to photography techniques, and more specifically to a method and system for assistive photography. In one embodiment, an assistive photography method is disclosed, which comprises: capturing one or more image frames of a subject using a photographic device, selecting dynamically, using one or more processors, an assistive stencil based on the one or more image frames and at least one predefined subject photograph requirement; and providing the dynamically selected assistive stencil in a preview display of the photographic device; wherein the assistive stencil assists in at least partially satisfying the at least one predefined subject photograph requirement. | 03-19-2015 |
20150071082 | METHODS FOR MANAGING UPGRADING A TELECOMMUNICATION NETWORK AND DEVICES THEREOF - A method, non-transitory computer readable medium and upgrade management computing device for managing upgrade in a telecommunication network comprising identifying one or more telecommunication network elements which are currently active. A type, a subnet and one or more network topologies is identified for each of the identified active one or more telecommunication network elements. The identified active one or more telecommunication network elements is upgraded with one or more available upgrades based on the identified type, the subnet and the one or more network topologies. During the upgrading, the identified active one or more telecommunication network elements is monitored for occurrence of one or more errors. One or more reports are generated based on the monitoring. | 03-12-2015 |
20150067188 | SYSTEMS AND METHODS FOR MULTI-PROTOCOL TRANSLATION - This disclosure relates generally to communication network protocols, and more particularly to systems and methods for multi-protocol translation. In one embodiment, a multi-protocol translation method is disclosed, comprising: receiving, at a storage area network switch, a frame formatted according to a first protocol; selecting, using the received frame, a second protocol from a plurality of protocols according to which to convert the received frame; obtaining a protocol format specification data of a second protocol; converting by the storage area network switch, the received frame to a converted frame according to the second protocol based on the protocol format specification data of the second protocol; and providing, by the storage area network switch, the converted frame. | 03-05-2015 |
20150040198 | SYSTEMS AND METHODS FOR ACCESSING A DEVICE USING A PAIRED DEVICE IN ITS PROXIMITY - This disclosure relates to systems and methods for accessing a device using a paired device in its proximity. In one embodiment, a resource sharing method is disclosed, comprising: obtaining a proximal device identifier associated with a proximal device; identifying a proximal device profile associated with the proximal device identifier; retrieving access privilege data stored in the proximal device profile; generating, via a processor, user interface data based on the access privilege data; and providing the user interface data for display. The method may further comprise: providing, for the proximal device, an authentication key identifier and a request for user security input format data; obtaining, from the proximal device: an authentication key associated with the authentication key identifier, and user security input format data; determining that the proximal device is authenticated, based on the authentication key; and displaying a user security input interface based on the user security input format data. | 02-05-2015 |
20150032966 | SYSTEM AND METHOD FOR APPLICATION LEVEL CACHING - The disclosure generally relates to methods and systems for application level caching and more particularly to dynamically applying caching policies to a software application. In one embodiment, an application level caching method, comprising: monitoring, using a utility executed by a processor, run-time data access operations corresponding to an application; identifying, using the processor, at least one characteristic associated with the run-time data access operations; triggering, using the processor, a caching rule based on the at least one characteristic associated with the run-time data access operations; and providing, using the processor, a memory access instruction according to the caching rule. | 01-29-2015 |
20150032547 | METHODS FOR PROVIDING ADVERTISEMENTS IN A DIGITAL RADIO AND DEVICES THEREOF - A method, non-transitory computer readable medium, and a mobile computing device comprises receiving multiplexed data comprising an audio program and one or more advertisements from a broadcasting computing device, wherein the advertisements are each assigned to one of one or more genres. The received multiplexed data is demultiplexed to separate the audio program and the one or more advertisements. Next, based on program information of the audio program, genre corresponding with the program information of the audio program is identified. Further, one or more of the advertisements associated with the identified one of the genres that corresponds with the program information of the audio program are identified. The audio program and the identified one or more of the advertisements are output. | 01-29-2015 |
20150011175 | SYSTEMS AND METHODS FOR EFFECTIVE IDENTIFICATION OF GEO-LOCATION IN MOBILE HETNET ENVIRONMENTS - This disclosure relates generally to location services, and more particularly to systems and methods for effective identification of geo-location in mobile HetNet environments. In one embodiment, a device geo-location method is disclosed, comprising: receiving one or more wireless signal strengths associated with connectivity of a user device to one or more wireless access points; calculating, via a processor, one or more distances of the user device from the one or more wireless access points using the one or more wireless signal strengths; triangulating a user device location coordinate using: a pre-determined wireless access point location coordinate associated with at least one of the one or more wireless access points; and the calculated one or more distances of the user device from the one or more wireless access points; and storing the user device location coordinate. | 01-08-2015 |
20150010292 | METHOD AND SYSTEM FOR FAIL-SAFE PROGRAM RECORDING IN PERSONAL VIDEO RECORDERS - A method, system, and non-transitory computer-readable storage medium for implementing backup recording of events are disclosed. The method may include detecting, by a personal video recorder (PVR) cluster coordinator, an interruption in a current or scheduled recording of an event at a first PVR. The method may further include determining, by the PVR cluster coordinator, a PVR cluster corresponding to the first PVR in response to the detection, the PVR cluster comprising a plurality of PVRs and including the first PVR. The method may further include facilitating, by the PVR cluster coordinator, a backup recording of the interrupted recording at a serving PVR in the PVR cluster after determining the PVR cluster corresponding to the first PVR. Further, the PVR cluster coordinator may be implemented by at least one computer processor. | 01-08-2015 |
20140379852 | SYSTEM AND METHOD FOR SUBSCRIBING TO A CONTENT STREAM - This disclosure generally relates to content distribution, and more particularly to a system and method for subscribing to a content stream. In one embodiment, a content subscription method is disclosed, comprising: receiving, at a subscriber electronic device, a publisher program schedule including a media item indication of a media item accessible to a publisher electronic device from a source; identifying, via the subscriber electronic device, a source accessible to the subscriber electronic device for the media item, wherein the source accessible to the subscriber electronic device comprises at least one of: the source accessible to the publisher electronic device, and/or a source not accessible to the publisher electronic device; accessing, via the subscriber electronic device, the media item from the source accessible to the subscriber electronic device in accordance with the publisher program schedule; and storing a portion of the accessed media item. | 12-25-2014 |
20140375447 | CONTEXT-AWARE IN-VEHICLE DASHBOARD - Context-aware in-vehicle dashboard systems and methods are disclosed. Said systems and methods are capable of determining vehicle states and context using a variety of both vehicle-based and non-vehicle based data sources, and adapting to different vehicle states. Systems and methods in accordance with the present disclosure may be capable of presenting different information and/or notifications based on the vehicle state and the category/priority of the information and/or notifications. | 12-25-2014 |
20140373020 | METHODS FOR MANAGING THREADS WITHIN AN APPLICATION AND DEVICES THEREOF - This technology relates to assigning a task to a current task queue based on one or more matching category when the new task is received within an application for execution. Availability of one or more existing idle threads within one or more thread groups required for the execution of the received task determined based on one or more utilization parameters, where each of the thread groups is associated with one or more task queues and where the current task queue is one of the task queues. One or more new threads are created to allocate for execution of the task when the existing idle threads are determined to be unavailable in the thread groups within the application. Next, the created new threads are allocated to the task when the existing idle threads are determined to be unavailable. The task is executed using the allocated new threads. | 12-18-2014 |
20140366066 | METHOD AND SYSTEM FOR PROVIDING BROADCAST PROGRAM RECOMMENDATIONS IN A DIGITAL TELEVISION SYSTEM - The disclosure generally relates to media broadcast technologies, and more specifically relates to a method and system for providing broadcast program recommendations in a digital television system. In one embodiment, a processor-implemented broadcast program recommendation method is disclosed, comprising: storing a user profile including a user interest pattern; tuning to a program channel not currently provided for display, using a tuner; extracting a snippet from the program channel; comparing, using a processor, the snippet with the user interest pattern, to identify a match; determining that the match is valid; and providing by the processor a notification of the match. The user interest pattern may comprise at least one of: a still image, a video clip, an audio clip, and a text pattern. The user profile may be created via selecting at least the user interest pattern from one of: a network source; and a user device. | 12-11-2014 |
20140365437 | SYSTEM AND METHOD FOR IMPLEMENTING DATABASE REPLICATION CONFIGURTIONS USING REPLICATION MODELING AND TRANSFORMATION - A reverse engineering database replication data system is disclosed. In one embodiment, the replication data system receives an input of replication configuration data for a plurality of databases and builds memory models based on metadata accessed from the plurality of databases, which are then transformed to a first platform-specific replication model. Then, based on the first platform-specific replication model, a first universal replication model is configured, which is used to create a replication visual model using the rendering canvas. A user may modify the first universal replication model using the replication visual model to create a second universal replication model, which is then transformed to a second platform-specific replication model. Finally, scripts are generated for the second platform-specific replication model, which are then provided to a memory device. | 12-11-2014 |
20140337268 | SYSTEMS AND METHODS FOR IMPROVED SECURITY AND PRECISION IN EXECUTING ANALYTICS USING SDKS - This disclosure generally relates to computer-implemented analytics, and more particularly to systems and methods for improved security and precision in executing analytics using SDKs. In one embodiment, an analytics system is disclosed, comprising: a processor; and a memory device operatively connected to the processor and storing processor-executable instructions for: receiving an application programming interface (API) call for a service; parsing the API call to extract an API call name and one or more API call parameters; generating prediction values for one or more interpreted-data parameters; obtaining one or more analytics rules; performing an analytics operation to generate an analytics result according to the one or more analytics rules based on the generated prediction values for the one or more interpreted-data parameters and the extracted one or more API call parameters; and generating a visual representation of the analytics result. | 11-13-2014 |
20140310679 | SYSTEMS AND METHODS FOR LOG GENERATION AND LOG OBFUSCATION USING SDKS - This disclosure generally relates to application development platforms, and more particularly to systems and methods for log generation and log obfuscation using software development kits (SDKs). In one embodiment, an application logging configuration method is disclosed, comprising: obtaining, for an application, a developer-specific log generation schema specifying at least a developer-specific set of variables to be logged and associated code line numbers; obtaining a developer-independent log generation schema specifying at least a developer-independent set of variables to be logged and associated code line numbers; extracting the specifications of the developer-specific and developer-independent sets of variables to be logged and associated code line numbers; generating an application logging schema specifying at least a combination of the developer-specific and developer-independent sets of variables to be logged and associated code line numbers; and storing the application logging schema. | 10-16-2014 |
20140282781 | METHODS FOR PROCESSING AND FOR END USER MANAGEMENT OF INTERACTIVE CONTENT AND DEVICES THEREOF - A method, non-transitory computer readable medium and device that manage interactive content include initiating at least one widget application. A list of available interactive content previously received and stored from a broadcast stream is received based on the initiated widget application. An item of interactive content is selected from the received list of available interactive content. The selected item of interactive content is received and provided. Another method, non-transitory computer readable medium and device that processes interactive content includes obtaining interactive content from one or more content providers. One of one or more content types for the obtained interactive content is identified and metadata associated with the identified content type is identified. The obtained interactive content is transformed into a standard format based on the identified content type and the metadata associated with the obtained interactive content. The transformed interactive content is transmitted with a broadcast stream. | 09-18-2014 |
20140282712 | SYSTEM AND METHOD FOR SHARING EVENT INFORMATION IN A DIGITIAL TELEVISION SYSTEM - Broadcast receivers, computer implemented methods and non-transitory computer-readable storage medium are disclosed for sharing event information. Sharing event information involves, at a sender end, collecting event information for a broadcast after receiving a command from the sender and creating a message that includes the event information. The sender may then select one or more contacts with whom to share the event information. Thereafter, the message and information on the contact is transmitted to a mobile device of the sender over a short range communication link. The message may then be automatically forwarded from the mobile device to the selected recipients. At the recipient end, the message is received from the mobile device of the recipient over a short range communication link and processed to determine if the message is a recommendation message. If so, the contents of the message are extracted and displayed on a television display of the recipient. | 09-18-2014 |
20140241145 | METHODS FOR ANALYZING NETWORK TRAFFIC AND DEVICES THEREOF - A method, non-transitory computer readable medium and traffic analysis computing device for analyzing network traffic comprising sending to one or more network devices a request to capture one or more network information upon identifying a fault within a network. Next, one or more network reporting files comprising the captured one or more network information is received from each of the one or more network devices. Upon receiving the network reporting files, a location at which the identified fault occurred within the network is determined. Based on the determination, one or more corrective actions is performed at the location of the identified fault within the network. | 08-28-2014 |
20140237594 | METHODS AND SYSTEMS FOR API-LEVEL INTRUSION DETECTION - This disclosure generally relates to computer security, and more particularly to methods and systems for application programming interface (API)-level intrusion detection. In some embodiments, a computer-readable medium is disclosed, storing instructions for: receiving an API call for a service at an API sandbox module; parsing the API call to extract at least one of: an API call name; and or one or more API call parameters; generating a copy of the at least one of: the API call name and or the one or more API call parameters; determining, via an intrusion detection rules execution engine, whether the API call violates one or more security rules obtained from a security rules object, using the copy of the at least one of: the API call name and or the one or more API call parameters; and providing an indication of whether the API call violates the one or more security rules. | 08-21-2014 |
20140219197 | METHOD AND SYSTEM FOR INTER-CELL INTERFERENCE COORDINATION IN WIRELESS NETWORKS - A method, system, and non-transitory computer-readable storage medium for managing inter-cell interference in a wireless network is provided. The method may be executed by at least one processor at a small cell gateway and may include receiving, uplink interference power corresponding to a first small cell base station (SCBS). The method may further include receiving neighboring cell information of the first SCBS, the neighboring cell information including information on a first plurality of SCBSs neighboring the first SCBS. The method may further include determining based on the received uplink interference power, that the first SCBS is experiencing inter-cell interference and determining a second plurality of SCBSs from among the first plurality of SCBSs that are interfering with the first SCBS. The method may further include adjusting uplink power allocation corresponding to a second SCBS from among the second plurality of SCBSs. | 08-07-2014 |
20140214868 | METHODS FOR IDENTIFYING UNIQUE ENTITIES ACROSS DATA SOURCES AND DEVICES THEREOF - A method, non-transitory computer readable medium, and data manager computing device comprises obtaining a plurality of entity profiles from one or more sources. The obtained plurality of entities are transformed to one or more standard formats. Further, the related and unrelated entity profiles are determined based on a comparison of the transformed entity profiles against each other and the determined related and unrelated entity profiles are provided. | 07-31-2014 |
20140208349 | METHOD AND SYSTEM FOR UNINTERRUPTED BROADCAST CONTENT PROVISIONING - A method and system for uninterrupted broadcast content provisioning is disclosed. The method and system includes receiving one or more transport streams corresponding to one or more broadcast programs. The one or more transport streams may be transmitted using one or more of a satellite medium, a cable medium, and a terrestrial medium. One or more of the one or more received broadcast programs are then monitored using one or more hardware processor to detect an interruption in reception of the one or more of the one or more broadcast programs. On detecting an interruption, the one or more of the one or more broadcast programs are rendered automatically from one or more standby sources from the point of interruption of the one or more of the one or more broadcast programs. | 07-24-2014 |
20140204200 | METHODS AND SYSTEMS FOR SPEED CALIBRATION IN SPECTRAL IMAGING SYSTEMS - This disclosure generally relates to spectral imaging and, more particularly, to methods and systems for speed calibration in spectral imaging systems. In one embodiment, a spectral imaging system is disclosed, comprising: an imaging sensor configured to acquire image data for an imaged object; a multi-band wavelength filter disposed to filter light detected by the imaging sensor; and a motion stage configured to cause relative motion between the imaged object and the multi-band wavelength filter at a motion rate that is based on a frame rate of the imaging sensor and a number of wavelength bands of the wavelength filter utilized to filter light detected by the imaging sensor; wherein the motion rate is set such that light detected by the imaging sensor corresponding to a portion of the imaged object is filtered by successive wavelength bands of the wavelength filter for successive frames capturing the portion of the imaged object. | 07-24-2014 |
20140176596 | METHOD AND SYSTEM FOR DYNAMIC BRIGHTNESS CORRECTION IN DIGITAL IMAGES - This disclosure generally relates to digital image and video signal processing, and more particularly to methods and systems for dynamic brightness correction. In one embodiment, an electronic circuit configured to perform an image correction method is disclosed, the method comprising: obtaining a pixel value of a color space component from an image; determining whether to perform mid-tone correction for the pixel value of the color space component; calculating, via the electronic circuit, a corrected pixel value based on the determination of whether to perform the mid-tone correction for the pixel value of the color space component; and outputting the corrected pixel value. The color space component may be one of: an Intensity component from a Hue-Saturation-Intensity color space; a Value component from a Hue-Saturation-Value color space; a Lightness component from a Hue-Saturation-Lightness color space; and a Brightness component from a Hue-Saturation-Brightness color space. | 06-26-2014 |
20140164796 | SYSTEMS AND METHODS FOR PROVIDING IMPROVED POWER BACKUP FOR DESKTOP COMPUTERS - The present disclosure relates to systems and methods for providing power from a secondary power source upon an interruption of a primary power source. In certain embodiments, the secondary power source may supply power without use of a power inverter that converts direct current into alternating current or a current rectifier that provides a second conversion of alternating current into a direct current. Embodiments in accordance with the present disclosure may also employ a time delay to improve operation of the secondary power source. | 06-12-2014 |
20140130036 | Methods and Systems for Automated Deployment of Software Applications on Heterogeneous Cloud Environments - A method and system of deploying at least one software application from at least one source platform to at least one target platform is provided. The method may include obtaining configuration data on interdependency between the at least one target platform and the at least one software application. The method may further include checking a readiness of the at least one source platform for initiating deployment of the at least one software application. The method may further include checking a readiness of the at least one target platform for initiating deployment of the at least one software application and performing a selective deployment of the at least one software application after the readiness check. The method may further include performing a post-deployment assessment of the selectively deployed at least one software application after the selective deployment, wherein the post-deployment assessment includes checking a status parameter of the selectively deployed at least one software application. | 05-08-2014 |
20140122962 | METHODS AND SYSTEMS FOR MINIMIZING DECODING DELAY IN DISTRIBUTED VIDEO CODING - This disclosure generally relates to encoding, transmission, and decoding of digital video, and more particularly to methods and systems for minimizing decoding delay in distributed video coding (DVC). In one embodiment, a video decoding method is disclosed, comprising: obtaining side information; obtaining a syndrome bit chunk corresponding to a non-key-frame bit-plane; performing, via one or more processors, at least one non-key-frame bit-plane channel decoding iteration using the side information and the syndrome bit chunk; generating a decoded bit-plane via performing the at least one non-key-frame bit-plane channel decoding iteration; determining a bit error rate measure for the decoded bit-plane; determining, based on the bit error rate measure, a number of additional syndrome bit chunks to request; and providing a request for the additional syndrome bit chunks. | 05-01-2014 |
20140108307 | METHODS AND SYSTEMS FOR PROVIDING PERSONALIZED AND CONTEXT-AWARE SUGGESTIONS - Embodiments of the disclosure relate to methods and systems for providing personalized and context-aware suggestions to a user. The method includes providing a user profile. Further, the method includes establishing contextual information regarding the user. Thereafter, one or more suggestions are provided to the user based on the user profile and the contextual information. Subsequently, the user profile based on the user feedback in response to the suggestion is modified. The user profile may be modified using a machine learning algorithm executed on a processor in order to improve the quality of the personalized and context-aware suggestions. In certain embodiments, the personalized and context-aware suggestions can be provided while the user is in a vehicle or while the user is operating a vehicle. | 04-17-2014 |
20140105059 | METHOD AND SYSTEM FOR SESSION ADMISSION CONTROL IN BROADBAND WIRELESS NETWORK - A method and system for providing session admission control for a new session in a broadband wireless network is provided. The method may include obtaining a guaranteed bit rate, a priority level, and a quality of service class indicator for the new session. The method may further include calculating an available capacity by utilizing the guaranteed bit rate. The method may further include searching through existing sessions for a first plurality of existing sessions having same quality of service class indicator as the new session and priority level lower than the priority level for the new session, if the available capacity is found to be a negative value. The method may further include filtering the first plurality of existing sessions to obtain a second existing session, preempting the second existing session, and admitting the new session in response to the preempting. | 04-17-2014 |
20140105006 | METHOD AND SYSTEM FOR SESSION ADMISSION CONTROL IN BROADBAND WIRELESS NETWORK - A method and system for providing session admission control for a new session in a broadband wireless network is provided. The method may include obtaining a guaranteed bit rate and a first quality of service class indicator for the new session. The method may further include calculating an available capacity using the guaranteed bit rate and determining whether the available capacity is a negative or a positive value. The new session may be admitted or rejected based on whether the available capacity is a negative or positive value. | 04-17-2014 |
20140068348 | SYSTEM AND METHOD FOR INTELLIGENT TROUBLESHOOTING OF IN-SERVICE CUSTOMER EXPERIENCE ISSUES IN COMMUNICATION NETWORKS - The present disclosure relates to methods and systems for improving customer experience through real time troubleshooting in relation to customer experience management. In one embodiment, a proactive customer experience management method is disclosed, comprising: obtaining a performance-indicating alert (PA); identifying relevant alerts from the alert database in absence of possible fault condition from the PA; determining a possible problem condition from the PA and identified relevant alerts; raising trace trigger for gathering relevant trace data; determining specific problem condition and relevant cause, based on gathered trace data and relevant data from PM/FM, CDR, OSS systems; determining appropriate recommendation for resolution of the determined specific problem condition; updating a user interface dashboard using the determination of the root cause of the possible problem and the recommendation for resolution of the possible problem; and updating new knowledge into a knowledge base with problem-context, resolution, relevant adjustments to alerts, thresholds and rules. | 03-06-2014 |
20130262684 | METHODS FOR IMPROVED PROVISIONING OF INFORMATION TECHNOLOGY RESOURCES AND DEVICES THEREOF - A method, non-transitory computer readable medium, and information technology (IT) resource optimization apparatus that improves the provisioning of IT resources includes obtaining for each of a plurality of users of IT resources, demographic attributes and an entitlement record comprising an indication of an assigned one or more of the IT resources. For each of the demographic attributes, which of one or more of the IT resources assigned to a threshold number of the plurality of users sharing the demographic attribute are identified. For each of the plurality of users, a recommended provisioning profile is generated based on the identified IT resources. For one or more of the plurality of users, provisioning recommendation(s) are determined based on a comparison of the recommended provisioning profile for the one or more users to the entitlement record for the one or more users. The determined provisioning recommendation(s) are output. | 10-03-2013 |
20130218427 | SYSTEMS AND METHODS TO ENABLE ECO-DRIVING - Systems and methods for enabling eco-driving are herein provided. Systems and methods in accordance with the present disclosure allow for real-time monitoring of greenhouse gas emissions and other variables that influence the environmental friendliness of vehicle operation. Systems and methods in accordance with the present disclosure also provide analytical tools for quantifying the environmental friendliness of vehicle operation and driving patterns. | 08-22-2013 |
20110081632 | SYSTEM AND METHOD FOR DISTRIBUTED AGILE - Training system and method for distributed agile learning in a team are disclosed. In one embodiment, a system includes a simulation server, a distributed Agile learning module residing in the simulation server, and two or more client servers associated with two or more team participants. The two or more client servers are communicatively coupled to the simulation server via a network. The distributed Agile learning module selectively uses combination of numeric, alphanumeric and pictorial puzzles/brain teasers and set of role play instructions upon the team participants learning theoretical understanding of the distributed Agile practices for end to end project simulation. | 04-07-2011 |
20100138812 | SYSTEM AND METHOD FOR ANALYZING PERFORMANCE OF A SOFTWARE TESTING SYSTEM - A system and method for analyzing performance of a software testing system is disclosed. In one embodiment, a method of analyzing performance of a software testing system associated with a software system having multiple modules includes performing a computer-based complexity analysis of the software system, performing a computer-based impact analysis of information related to an impact of a defect on a module of the software system, and generating a computer-based distribution of effort across an impacted module of the software system based on the complexity analysis and the impact analysis to enhance the software testing system performance. The information may include reported defects from a working environment associated with the software system. The method may also include utilizing output data associated with the complexity analysis as input data to the impact analysis. | 06-03-2010 |
20100114785 | SYSTEM AND METHOD FOR ALLOCATING JOBS TO AN AGENT - A system and method for allocating jobs to an agent is disclosed. In one embodiment, a method for allocating jobs to an agent includes defining, for each job of the jobs, a job type associated with at least one job and at least one sub-step associated with the at least one job, determining eligibility to perform the at least one sub-step by an agent of agents, determining a number of jobs of each job type to be performed by the agent based on the eligibility determination, and automatically generating agent-specific job queues based on the number of jobs. | 05-06-2010 |
20100091891 | LINK QUALITY METRIC BASED ANTENNA SELECTION FOR TRANSCEIVERS - A method and system for link quality metric based antenna selection for transceiver are disclosed. In one embodiment, a method for selecting an antenna from multiple antennas associated with a receiver, includes receiving multi-carrier modulated signals via a currently active antenna of the receiver, and estimating a predicted packet error rate (PER) associated with a current receive path of the receiver. The current receive path is used to process the multi-carrier modulated signals. The method further includes selecting a next antenna from the multiple antennas for forming a next receive path of the receiver based on the predicted PER and a packet error history associated with at least one previous receive path. | 04-15-2010 |