Patent application number | Description | Published |
20090041145 | METHOD TO DETECT DATA TRANSMITTED FROM MULTIPLE ANTENNAS AND SYSTEM THEREOF - A method to detect data transmitted from multiple antennas, said method comprising steps of: selecting a starting data block and calling it as previous data block; defining a set of indices of bits to be checked for possible flip in the previous data block as a check candidate set; applying update rule to obtain updated data block using the previous data block and the check candidate set, wherein the update is made in such a manner that change in likelihood is positive; checking if the updated data block and several consecutive previous data blocks are the same; if yes, declare the updated data block as the detected data block; if no, make updated data block as previous data block and repeat updation of data block. | 02-12-2009 |
20100254300 | LEVERAGING COHERENT DISTRIBUTED SPACE-TIME CODES FOR NONCOHERENT COMMUNICATION IN RELAY NETWORKS VIA TRAINING - In a training cycle, a source node transmits at least one pilot symbol to relay nodes in a training cycle. The relay nodes each amplifies and forwards the pilot symbol to a destination node in an assigned time slot in the training cycle. The destination node sequentially receives multiple versions of the pilot symbol from the relay nodes and estimates channel information based on the multiple versions of the pilot symbol. In data transmission cycles that follow the training cycle, the nodes apply coherent distributed space-time block code (DSTBC) with the estimated channel information to communicate data symbols. The power allocation between training and data cycles may be adjusted to improve the error performance. The nodes may also apply orthogonal frequency division multiplexing (OFDM) based DSTBC when timing errors are not known. | 10-07-2010 |
20100260279 | DATA TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM - Embodiment of the disclosure set forth methods for transmitting data in a wireless communication system. Some example methods include converting a data stream to a symbol set; selecting a first plurality of symbols from the symbol set, wherein the first plurality of symbols includes at least a first symbol, a second symbol, a third symbol, and a fourth symbol; generating a second plurality of symbols having at least a fifth symbol and a sixth symbol, wherein the fifth symbol includes a first part of the first symbol and a second part of the second symbol and the sixth symbol includes a first part of the third symbol and a second part of the fourth symbol; weighting the sixth symbol to form a first weighted symbol; and transmitting in a first time slot the fifth symbol with a first antenna and the first weighted symbol with a second antenna. | 10-14-2010 |
20100260280 | DATA TRANSMISSION IN WIRELESS COMMUNICATION SYSTEM - Embodiments of the disclosure set forth methods for transmitting data in a wireless communication system. Some example methods include converting a data stream to a symbol set and selecting a first plurality of symbols from the symbol set. The first plurality of symbols includes at least a first symbol, a second symbol, a third symbol, a fourth symbol, a fifth symbol, a sixth symbol, a seventh symbol, and a eighth symbol. The methods include generating one or plurality of symbols of a second plurality of symbols based on interleaving two symbols selected from the first plurality of symbols. The methods further include weighting some symbols of the second plurality of symbols and generating a matrix based on symbols selected from the second plurality of symbols and the weighted symbols. The methods also include encoding the data stream based on the matrix. | 10-14-2010 |
20110069746 | Method to Detect Data Transmitted by Multiple Antennas - The present invention relates to a system and a multistage signal detection method to jointly detect the data symbols transmitted from multiple transmit antennas in a communication terminal and received using multiple receive antennas in another communication terminal. | 03-24-2011 |
20110268203 | Techniques for Decoding Transmitted Signals Using Reactive Taboo Searches (RTS) - Techniques for enabling an estimate of a transmitted signal vector, given a received signal vector and a channel matrix to be computed, are provided. An initial solution signal vector for the estimate is calculated, and based on the initial estimate, a pool of possible solutions is generated. Methods described herein may be iterative in nature, and may cycle through possible estimates of the transmitted signal vector so as to continually improve the estimates and the pool of possible estimates. The methods may terminate once stopping criteria are reached. In some example methods, solutions may be marked at taboo and a taboo period can be established that indicates a number of subsequent iterations for which the current solution signal vector cannot be considered. | 11-03-2011 |
20120307924 | MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) TRANSMITTED SIGNAL VECTOR ESTIMATION EMPLOYING MONTE CARLO SAMPLING TECHNIQUES - A method of determining a transmitted vector (x) in a MIMO receiver includes the steps of receiving a received vector (y) representative of the transmitted vector (x), generating a first random number and forming, in a first iteration, a first symbol of a first candidate vector, the candidate vector representing a potential solution vector. The step of forming is based on a first approach if the first random number is greater than a first predetermined value (q), but is based on a second approach if the random number is less than or equal to the first predetermined value (q). The first approach randomly selects the first symbol from a uniform distribution of symbols in the transmission alphabet. The second approach selects the first symbol based on Gibbs sampling. The method represents a randomized Markov Chain Monte Carlo (RMCMC) sampling technique. | 12-06-2012 |
20130039436 | TECHNIQUES FOR DETECTION OF SIGNALS IN MULTIPLE-INPUT MULTIPLE-OUTPUT COMMUNICATION SYSTEMS - A receiver of a multiple-input multiple-output (MIMO) system performs QR decomposition of the channel matrix to enable detection of a transmitted vector in a layered manner. In each layer, a sub-vector of the transmitted vector is estimated. A reactive tabu search is performed if an estimated symbol differs from a nearest symbol in the alphabet by a predetermined value. The receiver may order the entries of the channel matrix prior to QR decomposition to enable estimation in an optimum order. In another embodiment, a receiver performs multiple reactive tabu searches to estimate a transmitted vector. The receiver employs a fixed threshold or a variable threshold for a cost function used in the multiple reactive tabu searches depending on whether the MIMO system is under-determined or not. The techniques enable low bit-error rate (BER) performance in MIMO systems with large number of antennas and when higher-order modulation techniques are used. | 02-14-2013 |
20130058434 | DEVICE AND METHOD FOR PRECODING VECTORS IN A COMMUNICATION SYSTEM - A device and method for precoding vectors in a communication system is provided. A transmitter may precode a data vector using information regarding a communication channel prior to transmitting the data vector. The transmitter may precode the data vector in a manner that reduces an energy value of a resulting transmit data vector so as to minimize interference in a received signal at a receiver. The transmitter may perturb entries of the data vector one-by-one in an iterative fashion until a minimum in an energy value of the transmit data vector is obtained. | 03-07-2013 |
20130315356 | Techniques for Decoding Transmitted Signals Using Reactive Taboo Searches (RTS) - Techniques for enabling an estimate of a transmittal signal vector, given a received signal vector and a channel matrix to be computed, are provided. An initial solution signal vector for the estimate is calculated, and based on the initial estimate, a pool of possible solutions is generated. Methods described herein may be iterative in nature, and may cycle through possible estimates of the transmitted signal vector so as to continually improve the estimates and the pool of possible estimates. The methods may terminate once stopping criteria are reached. In some example methods, solutions may be marked at taboo and a taboo period can be established that indicates a number of subsequent iterations for which the current solution signal vector cannot be considered. | 11-28-2013 |
20140133591 | MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) TRANSMITTED SIGNAL VECTOR ESTIMATION EMPLOYING MONTE CARLO SAMPLING TECHNIQUES - A method of determining a transmitted vector (x) in a MIMO receiver includes the steps of receiving a received vector (y) representative of the transmitted vector (x), generating a first random number and forming, in a first iteration, a first symbol of a first candidate vector, the candidate vector representing a potential solution vector. The step of forming is based on a first approach if the first random number is greater than a first predetermined value (q), but is based on a second approach if the random number is less than or equal to the first predetermined value (q). The first approach randomly selects the first symbol from a uniform distribution of symbols in the transmission alphabet. The second approach selects the first symbol based on Gibbs sampling. The method represents a randomized Markov Chain Monte Carlo (RMCMC) sampling technique. | 05-15-2014 |
Patent application number | Description | Published |
20090238170 | METHOD AND SYSTEM FOR PROVIDING VOICE OVER IP (VOIP) TO WIRELESS MOBILE COMMUNICATION DEVICES - A wireless voice over Internet Protocol (VOIP) system comprises a VOIP-enabled wireless communication device (WCD) and a VOIP gateway. The WCD includes a short-range wireless interface and a client application configured to place and receive VOIP calls through the short-range wireless interface. The VOIP gateway includes a short-range wireless interface for communicating with the WCD, a network interface for communicating with the Internet, and a VOIP service client configured to communicate with a VOIP service over the Internet by way of the network interface. The VOIP gateway also includes a proxy server configured to act as an interface between the WCD client application and the VOIP service client and to route the VOIP calls through the gateway's short-range wireless interface. | 09-24-2009 |
20090258596 | DYNAMICALLY VARYING LINK SUPER VISION TIMEOUT IN BLUETOOTH AND SIMILARLY ENABLED DEVICES TO DETECT LINK LOSS - The present example provides for modification of the link supervision timer allows for an enhanced user experience with wireless devices, by allowing loss of the wireless link to be handled more effectively. The link super vision timer may be changed without modifying the device profile being used. The change in the timer may be based upon the profile of the communications that is occurring, and upon the current state of the communications. | 10-15-2009 |
20100273526 | WIRELESS DEVICE ACCESS TO INTERNET VIA PERSONAL COMPUTER - A wireless device, system and method that receive a downloadable file from a wide area network are described. The system comprises a wireless device, a computer and a computer software module. The computer is communicatively coupled to a modem that communicates with a wide area network. The computer further comprises a computer wireless communications module that communicates with at least one wireless device that is in proximity to the computer. The wireless device comprises a device memory, a first wireless device communications module that is configured to communicate with the computer wireless module, and a device display that displays a link that corresponds to a downloadable file accessible using the wide area network. The computer software module resides on the computer and receives the link from the wireless device. The computer software module requests the downloadable file from the wide area network and forwards the downloadable file to the wireless device without storing the downloadable file on the computer. | 10-28-2010 |
Patent application number | Description | Published |
20120016701 | INTELLIGENT TIMESHEET ASSISTANCE - A timesheet assistant mines development items in a repository of a computer to form identified development items. Development context information and effort indicators, associated with the identified development items, are extracted. Statistical analysis is applied to tasks of the identified development items using the effort indicators. Efforts expended on the tasks are predicted using historical data to create effort estimates. Developer reported efforts for the identified items are received, and a timesheet is generated using the development context information, the effort estimates and the developer reported effort. The timesheet is presented for review, verification, and approval. | 01-19-2012 |
20120174057 | INTELLIGENT TIMESHEET ASSISTANCE - A timesheet assistant mines development items in a repository of a computer to form identified development items. Development context information and effort indicators, associated with the identified development items, are extracted. Statistical analysis is applied to tasks of the identified development items using the effort indicators. Efforts expended on the tasks are predicted using historical data to create effort estimates. Developer reported efforts for the identified items are received, and a timesheet is generated using the development context information, the effort estimates and the developer reported effort. The timesheet is presented for review, verification, and approval. | 07-05-2012 |
Patent application number | Description | Published |
20090234972 | Systems and Methods for Content Injection - The present solution is directed towards a policy-based intermediary that dynamically and flexibly injects content in responses between a client and a server based on one or more policies. The present solution addresses the challenges of injecting content in a client-server transaction. The intermediary determines when and what content to inject into a response of a client-server transaction based on a request and/or response policy. The injected content may include timestamp and/or variable tracking of different events in a client-server transaction. For example, when an intermediary appliance is deployed in a system to accelerate system performance and improve user experience, the appliance may inject content based on policy to monitor the acceleration performance of the deployed appliance. | 09-17-2009 |
20100325287 | SYSTEMS AND METHODS OF HANDLING NON-HTTP CLIENT OR SERVER PUSH ON HTTP VSERVER - The present application presents systems and methods for handling by an HTTP virtual server (HTTPVS), connections via which non-HTTP data is transmitted between clients and servers. HTTPVS intercepts a request from a client to establish first transport layer connection (TLC) with a server. HTTPVS establishes second TLC with the servers in response to receiving an acknowledgment from a client to establish the first TLC. HTTPVS determines if a first network packet transmitted via first TLC comprises an HTTP payload or non-HTTP payload. If HTTPVP the first network packet includes HTTP payload, HTTPVS may process all transmissions from the first TLC in accordance with connection tracking and forward the processed transmissions to the server via the second TLC. If HTTPVS determines that the first network packet does not include an HTTP payload, HTTPVS may link the first TLC and the second TLC so the client and server exchange non-HTTP communication without interruption. | 12-23-2010 |
20100325288 | SYSTEMS AND METHODS OF STATE MIGRATION IN A MULTI-CORE SYSTEM - The present application is directed towards systems and methods of state migration in a multi-core system. An external process on a client or server may initiate a plurality of connections with the multi-core system, such that some cores have a plurality of connections and others have none. The present invention provides systems and methods for redirecting a connection or migrating the state of a connection from being associated with a first core with a plurality of connections to a second core with no connections. | 12-23-2010 |
20110125892 | SYSTEMS AND METHODS FOR TRACE FILTERS BY ASSOCIATION OF CLIENT TO VSERVER TO SERVICES - The present disclosure is directed towards systems and methods for tracing packets via an intermediary device. The systems and methods include an intermediary device that establishes connections with clients and connections with servers. The intermediary device links a connection to a server with a connection to a client to provide a client with access to the server. When the client requests a packet trace, the intermediary device applies the trace to linked connections with the client to obtain full trace information for network packets servicing the client. | 05-26-2011 |
20110153720 | SYSTEMS AND METHODS FOR SAMPLING MANAGEMENT ACROSS MULTIPLE CORES FOR HTML INJECTION - A method for sampling management includes establishing, for a multi-core intermediary comprising a plurality of packet evaluation components executing on a corresponding plurality of cores, a frequency at which the multi-core intermediary intercepts a response transmitted from a server to a client and injects data into the intercepted response. For each of the plurality of packet evaluation components, an offset and a frequency based on a number of packet evaluation components in the plurality of packet evaluation components is established, a combination of the established frequencies substantially similar to the frequency established for the multi-core intermediary. One of the plurality of cores intercepts a response from the server to the client, at a time specified by the frequency and the offset. The packet evaluation component executing on the one of the plurality of cores injects data into the intercepted response. | 06-23-2011 |
20110153822 | SYSTEMS AND METHODS FOR MANAGING PREFERRED CLIENT CONNECTIVITY TO SERVERS VIA MULTI-CORE SYSTEM - The present application is directed towards systems and methods for providing a cookie by an intermediary device comprising a plurality of packet processing engines executing on a corresponding plurality of cores, the cookie identifying a session of a user that was redirected responsive to a service exceeding a response time limit. The cookie may be generated with identifiers based off a name of a virtual server managing a service of a server, and a name of a policy associated with the virtual server. Each packet processing engine of the plurality of packet processing engines may interpret cookies generated by other packet processing engines due to the name of the virtual server and name of the policy, and may provide preferred client connectivity based on cookies included in requests for access to a service. | 06-23-2011 |
20110153839 | SYSTEMS AND METHODS FOR SERVER SURGE PROTECTION IN A MULTI-CORE SYSTEM - The present application is directed towards systems and methods for providing connection surge protection to one or more servers by an intermediary multi-core system. A packet processing engine of a multi-core device deployed as an intermediary between a plurality of clients and one or more servers determines an estimated number of total pending requests received by all packet processing engines based on a value of a local counter of received requests, the total number of pending requests received by all other packet processing engines at a last predetermined interval, and a rate of change of the total number of pending requests received by all other packet processing engines multiplied by the time since the last predetermined interval. The packet processing engine applies a surge protection policy to received pending requests responsive to the determined estimated number of total pending requests. | 06-23-2011 |
20110154488 | SYSTEMS AND METHODS FOR GENERATING AND MANAGING COOKIE SIGNATURES FOR PREVENTION OF HTTP DENIAL OF SERVICE IN MULTI-CORE SYSTEM - The present application is directed towards systems and methods for generating and maintaining cookie consistency for security protection across a plurality of cores in a multi-core system. A packet processing engine executing on one core designated as a primary packet processing engine generates and maintains a global random seed. The global random seed may be used as an initial seed for creation of cookie signatures by each of a plurality of packet processing engines executing on a plurality of cores of the multi-core system using a deterministic pseudo-random number generation function such that each core creates an identical set of cookie signatures. | 06-23-2011 |
20110320617 | SYSTEMS AND METHODS FOR DETECTING INCOMPLETE REQUESTS, TCP TIMEOUTS AND APPLICATION TIMEOUTS - Described herein is a method and system for preventing Denial of Service (DoS) attacks. An intermediary device is deployed between clients and servers. The device receives a first packet of an application layer transaction via a transport layer connection between the device and client. The device records a last activity time for the transport layer connection based upon the timestamp of the first packet. The device receives subsequent data packets and determines whether the data in the packets completes a protocol data structure of the application layer protocol. If the device determines that the subsequent packet completes the protocol data structure, the last activity time is updated. If the device determines that the application layer protocol remains incomplete, the device retains the last activity time and determines that the duration of inactivity for the transport layer connection exceeds a predetermined threshold. The device may subsequently drop the connection. | 12-29-2011 |
20130151650 | SYSTEMS AND METHODS FOR GENERATING AND MANAGING COOKIE SIGNATURES FOR PREVENTION OF HTTP DENIAL OF SERVICE IN A MULTI-CORE SYSTEM - The present application is directed towards systems and methods for generating and maintaining cookie consistency for security protection across a plurality of cores in a multi-core system. A packet processing engine executing on one core designated as a primary packet processing engine generates and maintains a global random seed. The global random seed may be used as an initial seed for creation of cookie signatures by each of a plurality of packet processing engines executing on a plurality of cores of the multi-core system using a deterministic pseudo-random number generation function such that each core creates an identical set of cookie signatures. | 06-13-2013 |
20130173801 | SYSTEMS AND METHODS FOR MANAGING PREFERRED CLIENT CONNECTIVITY TO SERVERS VIA MULTI-CORE SYSTEM - The present application is directed towards systems and methods for providing a cookie by an intermediary device comprising a plurality of packet processing engines executing on a corresponding plurality of cores, the cookie identifying a session of a user that was redirected responsive to a service exceeding a response time limit. The cookie may be generated with identifiers based off a name of a virtual server managing a service of a server, and a name of a policy associated with the virtual server. Each packet processing engine of the plurality of packet processing engines may interpret cookies generated by other packet processing engines due to the name of the virtual server and name of the policy, and may provide preferred client connectivity based on cookies included in requests for access to a service. | 07-04-2013 |
20130275617 | SYSTEMS AND METHODS FOR SERVER SURGE PROTECTION IN A MULTI-CORE SYSTEM - The present application is directed towards systems and methods for providing connection surge protection to one or more servers by an intermediary multi-core system. A packet processing engine of a multi-core device deployed as an intermediary between a plurality of clients and one or more servers determines an estimated number of total pending requests received by all packet processing engines based on a value of a local counter of received requests, the total number of pending requests received by all other packet processing engines at a last predetermined interval, and a rate of change of the total number of pending requests received by all other packet processing engines multiplied by the time since the last predetermined interval. The packet processing engine applies a surge protection policy to received pending requests responsive to the determined estimated number of total pending requests. | 10-17-2013 |
20140365563 | SYSTEMS AND METHODS FOR CONTENT INJECTION - The present solution is directed towards a policy-based intermediary that dynamically and flexibly injects content in responses between a client and a server based on one or more policies. The present solution addresses the challenges of injecting content in a client-server transaction. The intermediary determines when and what content to inject into a response of a client-server transaction based on a request and/or response policy. The injected content may include timestamp and/or variable tracking of different events in a client-server transaction. For example, when an intermediary appliance is deployed in a system to accelerate system performance and improve user experience, the appliance may inject content based on policy to monitor the acceleration performance of the deployed appliance. | 12-11-2014 |
20150019630 | SYSTEMS AND METHODS FOR SAMPLING MANAGEMENT ACROSS MULTIPLE CORES FOR HTML INJECTION - A method for sampling management includes establishing, for a multi-core intermediary comprising a plurality of packet evaluation components executing on a corresponding plurality of cores, a frequency at which the multi-core intermediary intercepts a response transmitted from a server to a client and injects data into the intercepted response. For each of the plurality of packet evaluation components, an offset and a frequency based on a number of packet evaluation components in the plurality of packet evaluation components is established, a combination of the established frequencies substantially similar to the frequency established for the multi-core intermediary. One of the plurality of cores intercepts a response from the server to the client, at a time specified by the frequency and the offset. The packet evaluation component executing on the one of the plurality of cores injects data into the intercepted response. | 01-15-2015 |
Patent application number | Description | Published |
20150196269 | SYSTEM AND METHOD FOR REMOTE DETERMINATION OF ACUTE RESPIRATORY INFECTION - What is disclosed is a system and method for determining whether a patient has an acute respiratory infection. In one embodiment, the present method involves using a handheld device to acquire an audio signal of a sound made by a patient coughing. The audio signal is then communicated, by the handheld device, to a remote computing device. Upon receiving the audio signals, signal are repeatedly retrieved from a database of signals associated with different severities of various acute respiratory conditions. A comparison is made between the received audio signal and the retrieved signals. As a result of the comparison, a determination is made whether the patient has an acute respiratory infection. An audio playback device may be employed for playing the audio signal so that a medical professional can listen to that audio signal and facilitate the determination. Various embodiments are disclosed. | 07-16-2015 |
20150220871 | METHODS AND SYSTEMS FOR SCHEDULING A BATCH OF TASKS - The disclosed embodiments illustrate methods and systems for scheduling a batch of tasks on one or more crowdsourcing platforms. The method includes generating one or more forecast models for each of the one or more crowdsourcing platforms based on historical data associated with each of the one or more crowdsourcing platforms and a robustness parameter. Thereafter, for a forecast model, from the one or more forecast models, associated with each of the one or more crowdsourcing platforms, a schedule is generated based on the forecast model and one or more parameters associated with the batch of tasks. Further, the schedule is executed on each of the one or more forecasts models associated with the one or more crowdsourcing platforms to determine a performance score of the schedule on each of the one or more forecast models. Finally, the schedule is recommended to a requestor based on the performance score. | 08-06-2015 |
20150227691 | METHODS AND SYSTEMS FOR ANALYZING HEALTHCARE DATA - Disclosed are the embodiments for creating a model capable of identifying one or more clusters in a healthcare dataset. An input is received pertaining to a range of numbers. Each number in the range of numbers is representative of a number of clusters in the healthcare dataset. For a cluster, one or more first parameters of a distribution associated with the cluster are estimated. Thereafter, a threshold value is determined based on the one or more first parameters. An inverse cumulative distribution of each of one or more n-dimensional variables in the healthcare dataset is determined. The one or more first parameters are updated to generate one or more second parameters based on the estimated inverse cumulative distribution. A model is created for each number in the range of numbers based on the one or more second parameters. | 08-13-2015 |
20150228015 | METHODS AND SYSTEMS FOR ANALYZING FINANCIAL DATASET - Disclosed are the embodiments for creating a model capable of identifying one or more clusters in a financial data. An input is received pertaining to a range of numbers. Each number in the range of numbers is representative of a number of clusters in the financial data. For a cluster, one or more first parameters of a distribution associated with the cluster are estimated. Thereafter, a threshold value is determined based on the one or more first parameters. An inverse cumulative distribution of each of one or more n-dimensional variables in the financial data is determined. The one or more first parameters are updated to generate one or more second parameters based on the estimated inverse cumulative distribution. A model is created for each number in the range of numbers based on the one or more second parameters. | 08-13-2015 |
20150297143 | ASSESSING PATIENT RISK FOR AN ACUTE HYPOTENSIVE EPISODE - What is disclosed is a system and method for assessing patient risk for an acute hypotensive episode. In one embodiment, the present method involves retrieving a training set from a database. The training set comprises mean arterial pressures (MAPs) for a plurality of subjects. Each MAP comprises systolic and diastolic measurements. The training set is used to train the present classifier system. Once trained, the present classifier system classifies an unclassified patient into either a first class or a second class. The first class is at risk for an acute hypotensive episode occurring within a prediction window of w≧60 minutes in the future. The second class is not at risk for an acute hypotensive episode. A MAP of an unclassified patient is retrieved or otherwise obtained. Thereafter, the present classifier system proceeds to classify the patient into the first or second class. Various embodiments are disclosed. | 10-22-2015 |
20150302155 | METHODS AND SYSTEMS FOR PREDICTING HEALTH CONDITION OF HUMAN SUBJECT - Disclosed are the methods and systems for classifying one or more patients in one or more categories. A distribution of one or more physiological parameters associated with the one or more patients is determined based on a patient dataset. The one or more physiological parameters correspond to at least a stroke scale score. One or more parameters associated with a copula are estimated by the one or more processors. In an embodiment, the copula defines a joint distribution of the one or more physiological parameters. A classifier is created based on the one or more parameters, wherein the classifier classifies the one or more patients in the one or more categories. The one or more categories correspond to a range of the stroke scale score. | 10-22-2015 |