Noblis, Inc. Patent applications |
Patent application number | Title | Published |
20160132720 | VECTOR-BASED FACE RECOGNITION ALGORITHM AND IMAGE SEARCH SYSTEM - Systems and methods for performing face recognition and image searching are provided. A system for face recognition and image searching includes an ingestion system, a search system, a user device, and a database of galley files that include feature vectors. The ingestion system crawls the internet starting with a seed URL to scrape image files and generate feature vectors. Feature vectors of images input by a user may be compared by the search system to feature vectors in the gallery files. A method for generating feature vectors includes landmark detection, component aligning, texture mapping, vector computation, comparing cluster centers defined by vectors stored in a database with vectors generated based on an input image, linear discriminant analysis, and principal component analysis. | 05-12-2016 |
20140344557 | METHOD AND SYSTEM TO AUTOMATICALLY ENFORCE A HYBRID BRANCHING STRATEGY - A method and system for automatically enforcing a hybrid branching strategy include receiving a changeset designated for a branch. In response to receiving the changeset, the system may automatically determine whether a merge conflict associated with the changeset exists between the branch and an associated protected branch, and the system may automatically determine whether the changeset is up to date. Upon determining that no merge conflict exists, the system automatically initiates execution of a continuous integration testing pipeline. The continuous integration testing pipeline includes a series of tests applied to the changeset. If the changeset passes the series of tests, the system automatically merges the changeset with the associated protected branch. | 11-20-2014 |
20140317752 | COMPUTER NETWORK SECURITY PLATFORM - A computer system for managing security information for an organization includes a scanner execution module configured to automatically execute at least two scanners in a predetermined interval to analyze potential vulnerabilities of a computer environment. A vulnerability is acquired from the at least two scanners and stored in a data store. A user associated with the analyzed computer environment is determined based on the vulnerability stored in the data store, the user is notified of the vulnerability. | 10-23-2014 |
20140244465 | SYSTEMS AND METHODS FOR DETECTING MARKET IRREGULARITIES - A system and method is provided for detecting market irregularities. Consistent with disclosed embodiments, a processing entity may receive securities prices over a first predetermined time period, the securities prices representing prices of at least a subset of securities within a particular market. The processing entity may compare securities price changes for a first security in the subset with securities price changes for every other security in the subset, and may determine a correlation between the first security and at least one other security in the subset based on the comparison of securities prices. Additionally, the processing entity may create a first network by associating the first security with each security in the subset determined to be correlated with the first security, and may compare the first network with one or more previously created networks to determine one or more market irregularities for the first security. | 08-28-2014 |
20140236844 | Systems and Methods for Product Event Management - A system for processing and managing product events is disclosed. The system may include one or memories storing instructions and one or more processors configured to execute the instructions to perform certain operations. The operations performed by the processors may include receiving a first product alert corresponding to a product event, wherein the product event is one of a recall event, a field correction event, or a repair instructions event, and receiving a second product alert. The operations may also include determining that the second product alert also corresponds to the product event, and responsive to determining that the second product alert also corresponds to the product event, generating an event data entry that represents the product event and includes the first product alert and the second product alert. | 08-21-2014 |
20140188652 | FLEXIBLE DATA STORE FOR IMPLEMENTING A STREAMLINED ACQUISITION PROCESS - Methods and systems for seamlessly integrating an end-to-end acquisition process using a flexible data structure are disclosed. A flexible data structure consistent with these methods and systems may connect the buyer's requirement to the vendor's proposed solution, facilitating a requirement-by-requirement evaluation process allowing buyers to evaluate content as well as price of a proposal. Embodiments of the present invention standardize the format of proposals, allowing buyers to more easily compare vendors' proposals side-by-side. Still other embodiments of the present invention produce an error checking report to further aid vendors in improving proposals and buyers in evaluating proposals. | 07-03-2014 |
20110258213 | METHOD AND SYSTEM FOR PERSONAL INFORMATION EXTRACTION AND MODELING WITH FULLY GENERALIZED EXTRACTION CONTEXTS - Systems and methods for modeling information from a set of documents are disclosed. A tool allows a user to model concepts of interest and extract information from a set of documents in an editable format. The extracted information includes a list of instances of a document from the set of documents that contains the selected concept. The user may modify the extracted information to create subsets of information, add new concepts to the model, and share the model with others. | 10-20-2011 |