Patent application number | Description | Published |
20100254056 | EFFICIENT METHOD FOR CALCULATING THE DOT PRODUCT IN FAULT DETECTION ALGORITHMS - A method of electrical fault determination using the phase angle information of all the currents entering and leaving a protection zone, to determine whether a fault, if any, is internal or external to the protection zone. | 10-07-2010 |
20120081824 | METHOD AND APPARATUS FOR SUB-HARMONIC PROTECTION - A method and device for detecting damaging sub-harmonic frequencies in a power system, and recording data or initiating protective action. A microprocessor based sub-harmonic protection relay (S-PRO) monitors system voltages and currents from voltage and current transformers on the power system that may be present in the 5 Hz to 25 Hz frequency window. The user of S-PRO has full programming control to select bandwidths of frequencies or specific frequency components of the collected system voltages and currents. S-PRO can be user programmed to either detect the sub-harmonic power quantities and record them for future use in simulations or to initiate protective action. Protective action may include initiating output contact closure on the device to shut down equipment or to initiate corrective actions to prevent damage. | 04-05-2012 |
20120182657 | RATE OF CHANGE DIFFERENTIAL PROTECTION - A method and algorithm are disclosed that can be used to determine if an electrical fault exists within a protection zone defined as in the area between specific current transformers. (CTs). Currents from CTs are brought into a microprocessor (or other device) that converts the analog currents into digital quantities. The current quantities are summed both vectorially and arithmetically by the microprocessor. The mathematical derivative of the vector and the arithmetic sums are compared in order to determine if an electrical fault exists within the protection zone. An electrical trip signal is generated by the microprocessor if the fault is deemed to be in the protection zone. | 07-19-2012 |
20130015878 | POWER SYSTEM FAULT ZONE DETECTION - A system, method, and apparatus for power transmission fault zone detection. Each phase of a three-phase current in the power system is monitored, a modal component is determined from the three-phase current, high frequency transients in the modal component are extracted using wavelet packet transformation, and a travelling wave front is detected in the modal component indicating the fault. A wave sign is determined and the signs of two travelling waves are logically combined to determine whether or not the fault is within a protected zone. | 01-17-2013 |
Patent application number | Description | Published |
20090099855 | Method for Generating Software Variants - A method generates, based on an original business process comprising at least one component, a variant business process comprising at least one variation compared to the original business process. The method comprises the steps of developing a variant meta-model, representing the at least one variation, instantiating and verifying the developed variant meta-model portion to obtain a variant model, and implementing the variant model to generate the variant. The method also comprises developing a formalism for defining the at least one variation. | 04-16-2009 |
20090276256 | METHOD FOR COMPUTING AN ENTERPRISE PROCESS COMPLIANCE INDEX - Techniques for computing an enterprise process compliance index are provided. The techniques include obtaining an enterprise process, obtaining a compliance policy, segmenting the enterprise process into at least one process step and the compliance policy in at least one policy clause, and computing an enterprise process compliance index, wherein computing the enterprise process compliance index comprises determining an applicability of the at least one process step to the at least one policy clause. | 11-05-2009 |
20120016701 | INTELLIGENT TIMESHEET ASSISTANCE - A timesheet assistant mines development items in a repository of a computer to form identified development items. Development context information and effort indicators, associated with the identified development items, are extracted. Statistical analysis is applied to tasks of the identified development items using the effort indicators. Efforts expended on the tasks are predicted using historical data to create effort estimates. Developer reported efforts for the identified items are received, and a timesheet is generated using the development context information, the effort estimates and the developer reported effort. The timesheet is presented for review, verification, and approval. | 01-19-2012 |
20120123986 | SYSTEMS AND METHODS FOR MODELING AND ANALYZING SOLUTION REQUIREMENTS AND ASSETS - Systems and associated methods for capturing and storing asset analysis details are described. Systems and methods provide for building a model of the particular asset requirement for a specific purpose and a model of the range of capabilities that a particular asset can provide. The mapping of these two models allows for the identification of the best asset for a particular solution requirement. An asset match may occur when an asset capability model whose functional and non-functional capabilities subsume the functional and non-functional requirements specified in the asset requirements model. | 05-17-2012 |
20120174057 | INTELLIGENT TIMESHEET ASSISTANCE - A timesheet assistant mines development items in a repository of a computer to form identified development items. Development context information and effort indicators, associated with the identified development items, are extracted. Statistical analysis is applied to tasks of the identified development items using the effort indicators. Efforts expended on the tasks are predicted using historical data to create effort estimates. Developer reported efforts for the identified items are received, and a timesheet is generated using the development context information, the effort estimates and the developer reported effort. The timesheet is presented for review, verification, and approval. | 07-05-2012 |
20120278267 | METHODS AND ARRANGEMENTS FOR DYNAMICALLY GENERATING ESTIMATION TRENDLINES - Methods and arrangements for dynamic trendline generation. Input data are assimilated at a capture timepoint from an estimation tool. The input data are filtered, and an estimation-centric map is created from the filtered data ; this creating of a map includes generating an estimation data tree. A trendline is dynamically generated responsive to a request, wherein this generating of a trendline includes applying the estimation data tree to the input data. The dynamically generated trendline is supplied to the estimation tool. | 11-01-2012 |
20130061203 | Modeling Task-Site Allocation Networks - A method, an apparatus and an article of manufacture for modeling a task-site allocation. The method includes generating a task-site allocation network based on at least one site-task pair and at least one site-centric constraint of at least two sites, wherein generating a task-site allocation network comprises generating a task-specific constraints model based on task context information and generating a task-site pair that satisfies at least one constraint based on the task-specific constraints model, and determining a preferred allocation of task to site by comparing estimated task-site allocation cost between a single site allocation and a distributed site allocation among the at least two sites. | 03-07-2013 |
20130290500 | DIFFERENTIATED SERVICE IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for differentiated service identification/exposure in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, input model criteria will be generated. Such criteria may (among other things): identify service categories based on contextual bindings and domain centric functions; identify inter-service dependencies for a given business model (BPM); and/or provide dynamic validation of services to be exposed/identified. Embodiments of the present invention may further analyze service exposure criteria to provide efficient and accurate service exposure decisions as well as validation of the service exposure. This approach allows for consistent service exposure determinations based on decision histories of similarly (2-dimensional) aligned services in the past. This approach further allows for a validation assessment that is based on actual metrics of service usage verses an estimated usage at the time of service implementation. | 10-31-2013 |
20130304431 | AUTOMATICALLY ASESSING MATURITY OF CUSTOM APPLICATION FOR STANDARD-GOVERNED COMPUTING ENVIRONMENT - A system and associated method for automatically assessing maturity for a custom application in a cloud computing environment in accordance with a standard application model. A data fabric analyzer automatically calculates a logical data model compliance level to a process model for the custom application, and a maturity level the logical data model against a standard logical data model. If the logical data model is mature, the data fabric analyzer transforms the logical data model to a physical data model for implementation by a distillation process and a shearing process. If the logical data model is immature, the process model maturity is assessed to employ a standard physical model for implementing the custom application. The data fabric analyzer subsequently computes non-compliance levels for the physical model and calculates a capital expenditure cost caused by non-compliance of the custom physical model to a standard physical model. | 11-14-2013 |
20150081854 | DYNAMIC AGENT REPLACEMENT WITHIN A CLOUD NETWORK - A computing device receives information from one or more agents, wherein the one or more agents monitor one or more resources in a cloud network. The computing device determines that the configuration of the one or more agents monitoring the one or more resources needs to be changed based on at least the information received from the one or more agents. The computing device changes the configuration of the one or more agents monitoring the one or more resources based on at least the information received from the one or more agents. | 03-19-2015 |
20150081857 | DYNAMIC AGENT REPLACEMENT WITHIN A CLOUD NETWORK - A computing device receives information from one or more agents, wherein the one or more agents monitor one or more resources in a cloud network. The computing device determines that the configuration of the one or more agents monitoring the one or more resources needs to be changed based on at least the information received from the one or more agents. The computing device changes the configuration of the one or more agents monitoring the one or more resources based on at least the information received from the one or more agents. | 03-19-2015 |
20150127807 | MODELING COMPUTER NETWORK TOPOLOGY BASED ON DYNAMIC USAGE RELATIONSHIPS - A method for modeling dependencies in a computing system including a plurality of resources, the method includes monitoring data communications made between the resources of the plurality of resources; modeling dependencies, at least among and between the resources, based, at least in part, upon the monitored data communications; and generating a set of topology graph(s), including at least a first topology graph, based upon the modeled dependencies. | 05-07-2015 |
20150127815 | MODELING COMPUTER NETWORK TOPOLOGY BASED ON DYNAMIC USAGE RELATIONSHIPS - A method for modeling dependencies in a computing system including a plurality of resources, the method includes monitoring data communications made between the resources of the plurality of resources; modeling dependencies, at least among and between the resources, based, at least in part, upon the monitored data communications; and generating a set of topology graph(s), including at least a first topology graph, based upon the modeled dependencies. | 05-07-2015 |
20150149612 | CALCULATING THE EFFECT OF AN ACTION IN A NETWORK - An apparatus for calculating the effect of an action on a network includes a mapping module that creates a mapping of a plurality of devices of a networked computing environment. The mapping describes a relationship between a primary device and at least one device of the plurality of devices. The apparatus includes an action module that determines a plurality of potential actions to be performed on the primary device. The apparatus includes a calculation module that calculates an effect of a potential action of the plurality of potential actions on the plurality of devices in response to simulating performing the potential action on the primary device. The apparatus includes an optimization module that performs an optimization action in response to calculating the effect of the potential action. The optimization action maximizes availability of the networked computing environment. | 05-28-2015 |
20150149620 | CALCULATING THE EFFECT OF AN ACTION IN A NETWORK - A method for calculating the effect of an action on a network includes creating a mapping of a plurality of devices of a networked computing environment. In one embodiment, the mapping describes a relationship between a primary device and at least one device of the plurality of devices. In another embodiment, the method includes determining a plurality of potential actions to be performed on the primary device. In a further embodiment, the method includes calculating an effect of a potential action of the plurality of potential actions on the plurality of devices in response to simulating performing the potential action on the primary device. In yet another embodiment, the method includes performing an optimization action in response to calculating the effect of the potential action. In certain embodiments, the optimization action maximizes availability of the networked computing environment. | 05-28-2015 |