The technique relates to a system and method for correcting geometric distortions in videos and images. To correct the one or more geometric distortions in videos, the frames of the original and distorted video are mapped at the beginning and then the features associated with the mapped frames which are insensitive ...
A method, non-transitory computer readable medium, and apparatus that obtains with a content management computing device application configuration information about an executing application on an end user computing device that provides content to a primary end user. Sensor data is obtained with the content managemen...
A computer-implemented method comprises receiving an initial workflow, wherein the initial workflow corresponds to a validation test and comprises one or more steps, and wherein the result of at least one step depends on one or more essential entities, receiving input identifying one or more objects in a predetermin...
ABSTRACT OF THE DISCLOSURE
Apparatus and methods are disclosed for managing master data in a master data management (MDM) environment using classification hierarchies. According to one embodiment of the disclosed technology a method of classifying master data includes receiving a classification hierarchy defini...
The present invention relates to computer-implemented methods, systems and computer-readable media for providing financial transactions. The method steps comprise initializing at least one transaction from a customer held device, wherein initializing comprises entering a network provider code, an acquiring instituti...
A method system and computer program product are disclosed for identifying silent failures in an application, comprising of generating a finite state machine (FSM) model of the application based on an input data, extracting state specific invariants relevant to the generated FSM, performing a localized invariant vio...
A Green IT maturity model (GITM) provides a framework in which the maturity of an organization's green computing effort can be assessed. Based on green computing practice data, an assessment tool implementing a GITM model can be used to calculate the competency levels of multiple green computing pillars such as data...
The invention describes a method for prediction of functional dependencies between various factors involved in a payment given by an insurance service provider to a medical service provider for medical treatment of a patient comprising various steps like receiving input information wherein the input information comp...
The present invention provides a method and system for securing communication of data to a social media application. A set of network routing parameters are configured for the communication. An encrypted response containing a sensitive data is routed from a secure entity to the social media application through a mid...
The present disclosure discloses a method, a system and a computer program product for secure data communication between a user device and a server. User credentials, a device id and a first hash are received at server from a user device. The first hash is generated using the user credentials. At server, a second ha...
Methods, devices, and computer-readable storage media for developing a business application include mapping one or more requirements of the business application to a Belief Desire Intention (BDI) architecture. The BDI architecture is mapped to a Service Component Architecture (SCA). The business application is devel...
The present disclosure includes, in a heterogeneous system, receiving a desired
speedup of an application as input and performing a static analysis and a dynamic
analysis of the application. The dynamic analysis of the application comprises,
identifying a set of parameters including, an end-to-end execution time ...
A method and system for dynamic impact analysis of at least one change to at least one functional component of a computer application comprising tracking a historical record of the at least one change, grouping a release dataset and a build dataset for matching with at least one requirement from a requirement data f...
The present invention provides a method and system for drug repurposing. In accordance with a disclosed embodiment, the method may include selecting a set of positive drugs for an indication and listing a set of pathways for the set of positive drugs and a set of negative drugs. Further, the method shall include ass...
A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a primary key to a user terminal device and a secondary key to a proxy server. A trapdoor is sent by the user terminal and received by the proxy server. The t...
[0052] A method for reconciling transactions iteratively by segregating data into homogeneous data sets. The method includes acquiring transactions from two or more systems and comparing with a set of configurable predefined matching rules. Applying, based on the result of the comparison, one or more rules on the ac...
Computer implemented systems methods and computer readable media for incremental downloads include: receiving a download specification file identifying a plurality of fields in a plurality of tables of a change data dataset to download a relationship between the plurality of tables and parameters for a download file...
The present invention provides a method and system for securing data on a financial transaction instrument by accessing a unique identification data of a user by a transaction terminal generating a set of authorized keys using the unique identification data of the user at the transaction terminal partitioning a memo...
The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or ...
The technique relates to a method for defending static and dynamic reverse engineering of software license control and devices thereof. To defend static reverse engineering of software license control the licensed application is wrapped with encryption wrapper, wherein the encryption wrapper encrypts the application...
The present invention describes a method and system for generating statefiow model from software requirements. The method includes receiving at least one software requirement as input. The method also includes annotating the received software requirements to create annotated software requirements. The method further...
The technique relates to a system and method for generating minimized test suite using a genetic algorithm. The method involves generating a plurality of test cases corresponding to a plurality of test paths associated with an activity diagram of a software requirement specification thereafter obtaining a plurality ...
ABSTRACT OF THE DISCLOSURE
The present invention provides a method and system for converting an XML artifact into a Topic Map instance. The method includes consolidating, by a schema consolidation module, an XML schema of the XML artifact; extracting, by an extracting module, a topic map model from the consolidated...
The technique relates to a system and method for implementing peta-byte scale online analytical processing solution using MapReduce. The technique involves receiving an OLAP query from a user through an OLAP-QL Driver. After receiving the query it is parsed through the compiler. Then the metadata information is retr...
A system and method for creating rules for equity corporate actions and their variations is disclosed. The method includes receiving the data corresponding to corporate action event from at least one agent. Thereafter, method includes generating a rule for one or more one corporate action event from the received dat...
The present invention provides a method and system for generating negative test input data. A set of attributes and a set of attribute properties can be extracted from a requirement specification. A constraint representation syntax can be framed from the extracted set of attribute properties. A structured diagram is...
[0046] A system and method for regulating the flow of an electronic message in a social network comprises: creating the electronic message posted by a user in a social network, associating various permissions with the electronic message, notifying the user, information relating to flow of the electronic message from...
The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obt...
A method of a enhancing code understandability through a server device includes identifying, at a processor associated with the one or more server devices, a patch of code in response to a request and searching, at a processor associated with the one or more server devices, for another patch of code similar to the p...
ABSTRACT:
The technique relates to a system and method for mining frequent and in-frequent items from a large transaction database to provide the dynamic recommendation of items. The method involves determining user interest for an item by monitoring short item behavior of at least one user then selecting a local c...
The technique relates to a method and system for providing a plurality of telecommunication services from disparate telecommunication service providers. This technique involves authenticating the client at the time of login to the system based on the received user credentials from the client. Displaying a list of av...
[0044] A method of increasing customer convenience in electronic commerce includes displaying a virtual inventory on a social media service, creating an association between an end user and one of a product and service linked to an organization on the social media service, collecting a set of preferences of the user ...
The present invention provides a sustainable enterprise framework for associated gateways in a network to leverage group level decisions and redistribute allocated energy budget among the associated gateways. The enterprise framework is configured to allocate Gateway Hourly Budget (GHB) as hourly spending limit to t...
The technique is related to a system and method for reducing a set of statements. The method involves excluding one or more redundant statements from the set of statements. Thereafter plurality of business relevant entities are identified in the remaining set of statement. Then the set of statements are reduced base...
The present invention provides a computer implemented method and system for generating OneTime Password (OTP) such that no hardware token is used. The invention uses some functions and parameters generated and transmitted to the client machine, by the server. The server generates a token for each session, cyclic gro...
Disclosed is an integrated system for implementing various interactive services for a plurality of users associated with a financial organization. The system includes a linking module and a function module. The linking module associates user profiles corresponding to each of the users with the financial organization...
A system and method for providing a rental management tool is disclosed. Information via a user interface for renting one or more rental items to a customer is received. A project corresponding to a sales order for the customer is generated, wherein the sales order includes a plurality sales order lines, at least on...
The present invention describes a system and method for detection of duplícate bug reports. The duplícate bug detector (100) íncludes a receíver (130) configured to receíve a first bug report (110) and a word matrix (120). The duplícate bug detector (100) also íncludes an extractor (140) to extract keywords from the...
A system and method for processing banking transactions in risk limit mode when connectivity to a central application server is unavailable. The method includes calculating available balance in customer account associated with current transaction and determining if current transaction amount is less than the availab...
This disclosure concerns an effective utilization of a self-care online portal containing enriched customer experience. Here the portal upon receiving a validated search string relevant to an issue faced and entered by the user through a web interface, displays the relevant information retrieved from the database by...
Disclosed herein are representative embodiments of tools and techniques for providing network service assurance. One exemplary embodiment includes a framework for network service assurance that includes a presentation layer, a service management layer, a network-infrastructure management layer, and a unified network...
The invention relates to a system and method for generating and authenticating one time dynamic password based on the context information related to a user. It involves retrieving user context information and generating a dynamic value based on that. The first one time dynamic password is generated at the user devic...
The present invention provides a system, a method and a computer program product for, identifying an anonymous patient in a health care location, when the anonymous patient requires medical attention. A health parameter data of the patient is acquired by a sensor unit, and transmitted to a gateway module associated ...
The present invention relates to a computer-implemented method, system and computer readable medium for detecting source of leakage of a video. The method comprises processing a video by a processing device resulting a processed video, identifying at least one responsible user for safekeeping and/or distributing and...
The present invention provides a method and system for comparing a first XML document with a second XML document. An XML event is parsed from one of the first XML document and the second XML document based on a plurality of parameters. The parsed XML event is stored as a node in one of a first data structure and a s...
The present invention provides a method and system for recommending an optimal shopping path to a user. A shopping layout of a shopping store is downloaded on a handheld device. A shopping list is received from the user, comprising one or more shopping items. A final shopping list is created by appending one or more...
Various technologies related to estimating costs associated with proposed information technology services solutions using global sourcing are described. Consistent and accurate estimates can be achieved by using a tool having features specific to the estimating process. The tool can construct a global sourcing busin...
The technique relates to a system and method for learning and learning oriented assessment of at least one learner based on a role to be performed by the at least one learner. This technique involves identifying knowledge areas related to a particular role to be performed by the learner. Under each knowledge area di...
Embodiments of the present invention relate to method and system for transferring media content between two telecommunication devices. The method recited in the invention is for delivering media content from a first telecommunication device to a second telecommunication device. At the first step of the method, the f...
The present invention provides a method and system for detecting a partial commit of software. A dependency information of the software is extracted from a version history and a bug database. A dimensional matrix containing a set of commit, and relationship information with a set of files with each commit is created...
The invention relates to a system and method for allocating one or more resources optimally in a composite cloud environment. This invention involves configuring organization and service level quota values, describing service composition, service unit, service level agreement, defining allocation model and resource ...
The embodiments of the present invention provide a computer-implemented method and system for translating user keywords into semantic queries based on domain vocabulary. The system receives the user keywords and search for the concepts. The concepts are transformed into a connected graph. The user keywords are trans...
A portable digital vault and related methods are disclosed that can provide a digital equivalent to the physical act of lending copyrighted content (such as a book or CD) while also providing security to prevent copying of the content. The vault acts as a self-contained authority that contains permissions relating t...
A method, non-transitory computer readable medium, and apparatus that identifies and provides notification about web content associated with an organization includes identifying one or more sets of web content which contains one or more organization keywords. At least a portion of each of the identified one or more ...
The present technique is a system and method that involves a review tool that supports manual and automated content review, defect log creation, and quantitative defect analysis. The present system supports a wide variety of defect categories that help reviewers to perform a comprehensive content review and provide ...
Systems and method for optimizing the performance of software applications are described. Embodiments include computer implemented steps for identifying at least two constituent software components for parallel execution, executing the identified software components, profiling the performance of the one or more soft...
A system and computer-implemented method for increasing the computational capabilities of a mobile device by initializing one or more virtual machines in cloud computing environment to run applications. The system and computer-implemented method comprising a manager module that stimulates an application on a virtual...
A system for establishing an automation framework includes a script of unresolved references. A reference resolution mechanism resolves the unresolved references to a plurality of software entities. A reusable library communicatively coupled to the reference resolution mechanism collects the resolved references. A r...
The present invention relates to a computer-implemented method, system and computer readable medium for embedding a watermark into a video and extracting watermark from the original or copy of the watermarked video. The method comprises converting a video frame from RGB color space to YUV color space. Divide a chrom...
Smart leave technology for the Internet Group Management Protocol (IGMP) can reduce the amount of network bandwidth consumed by unintended multicast traffic resulting from a "lost leave" situation. A network device (such as a residential gateway) positioned between a host and an upstream router, upon receipt of unin...
RANKING OF JOBS AND JOB APPLICANTS ABSTRACT
A ranking system ranks applicants for a job. Eligible applicants are selected from a pool of applicants and are ranked based on business rules applied to information about the eligible applicants and information about the job. Scores are calculated for the business rules ...
ABSTRACT
The present invention provides a method and system for converting a surface into a touch surface. In accordance with a disclosed embodiment, the system shall include a vision engine, configured to capture a set of location co-ordinates of a set of boundary points on the surface. The system shall further in...
A method for measuring performance of a networked application is provided. The method enables retrieving performance measurement data from an application database. The data relates to one or more transactions executed via the networked application. The method further enables reconstructing request and response messa...
ABSTRACT
The embodiments herein provide a system and method for program management in an organization. A Program consists of tracks and projects. A Program can have any number of tracks and each track can have any number of projects linked to it. A Program will be managed by one or more program managers, tracks b...
A process analysis tool simulates the dependency of token arrival on performance of a business process.For example, the process analysis tool includes a token generator and a feedback module.The token generator schedules arrival of tokens to a business process simulator and, using feedback that depends on state of a...
A computer implemented method and system, executed by one or more computing devices, of template creation for a data extraction tool comprising of selecting (220), by at least one of computing devices, a first template from a plurality of documents provided by a user, performing (230), by an OCR engine, an optical c...
A method, non-transitory computer readable medium, and platform management device for providing computer program development and deployment in a platform. A plurality of input parameters related to a development and deployment project are received. A plurality of development and deployment resources are determined b...
Computer-implemented systems, methods, and computer-readable media for deriving probable business transactions from a log file, the log file including a plurality of entries corresponding to traffic on a web server, each entry including a plurality of fields, including: pre-processing the log file to remove one or m...
Various technologies related to implementing payment via a mobile device are described. An authorization code and a credit card number can be provided by an issuer to a mobile device, which in turn provides the authorization code and the credit card number to a merchant. The merchant can then provide the authorizati...
A method, non-transitory computer readable medium, and access manager device includes providing an initial challenge to a client computing device requesting access to a service. The initial challenge includes one or more of one or more objects, one or more indicative answers, and one or more questions based on the o...
The disclosed embodiments relate to a method, apparatus, and computer-readable medium for improving collaborative communications that can be implemented using either centralized or decentralized modes, or combinations thereof. An exemplary method comprises receiving information corresponding to a user of a collabora...
Computer-implemented systems, methods, and computer-readable media for analyzing data in one or more artifacts and creating a modifiable data network includes: extracting the key elements from the one or more artifacts; identifying relationship among the key elements for each of the one or more artifacts; determinin...
[0058] The present invention provides method, system and computer program product for instant processing of business related operations. This invention is not restricted to any particular type of business. The system provides for means to interpret the business requirements at run time from an SMS sent by a user, an...
The technique relates to a system and method for sending an alert to at least one customer through communication network. This technique involves uploading the alert content in different formats into an operator's system to send the same to customers. Then, the spare capacity of delivery channels is identified which...
The present invention provides a method and system for tracking a position of an object. The method may include creating a plurality of geofences on a map of a predefined location and identifying, by Wi-Fi trilateration, the position of the object within the created geofence. Further a floor layout of the predefined...
The technique relates to a system and method for handling uncertainty in supplier selection using robust optimization. The technique involves receiving the historical data of one or more suppliers with respect to a plurality of factors from a database for selecting at least one of the one or more suppliers. After re...
The technique relates to a system and method for generating billing data of a composite cloud service. This technique tracks and meter manual service usage along with the infrastructure and software usage to generate billing data for the composite cloud service. The technique involves receiving a user request for th...
The present invention provides a method and system for augmented reality shopping. A visual code of the product can be scanned by a portable device. A set of information can be extracted by a web server, whereby the set of information can include a set of providers, offering the product within a location of the port...
The technique relates to a system and method for data driven anomaly detection. This technique
involves identifying region of interest from the data based on dimensionality reduction technique and change point detection algorithm. A reference data can be obtained separately or can be obtained from the test data als...
The technique relates to a system and method for determining and representing one or more authentication requirements for at least one valid service flow of one or more information centric network (ICN) based services. This technique involves capturing service specification and storing it in a repository. Then, one ...
Embodiments of the present invention provide a method and system for scenario based conceptualization and visualization of web based user interface for effort estimation. The method includes providing user selectable scenarios on said web based user interface. A plurality of web components is provided on pre-populat...
Systems and methods for leveraging social media data by entities to identify key influencers are disclosed. Monitoring criteria is based on a selected subject-matter. The analysis permits quantification of influencers and takes into account the conversari platforms and the published platforms in the social media.
R...
The present invention relates to a system and method of automated software testing. This includes identifying objects present in an application under test and identifying actions supported the objects present in application under test. Based on objects selected for testing, actions are also selected and some actions...
A method of generating alerts comprising the steps of receiving preference information to generate an alert indicating occurrence of an event, wherein the preference comprises location information of an event and determining location information of a mobile device. The location information is used for comparing the ...
Methods for controlling software usage are described. Method comprise receiving a request for at least one software application license, wherein the request comprises a user count, generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data compr...
The disclosed embodiments relate to a method, apparatus, and computer-readable medium for managing policy compliance. As exemplary method comprises receiving, by at least one of the one or more computing devices, information associated with a policy event corresponding to a system resource; determining, by at least ...
Embodiments describe enhancing bi-directional communication in an information centric computer network through a piggyback session, which comprises mapping requests for data received to content, sending at least one piggyback packet to a remote node, wherein a piggyback packet is a data packet comprising a request f...
[0058] A method and system of a data join includes capture of a metadata information associated with one of a semi-structured data and an unstructured data. A flattened structure for one of the semi-structured data and the unstructured data is defined and an entity is extracted from the unstructured data. Further, o...
A method, non-transitory computer readable medium, and account manager device comprises obtaining a plurality of inputs associated with the contact center in response to a request to calculate the return on investment associated with the contact center, wherein the plurality of inputs includes one or more contact ce...
SYSTEMS AND METHODS FOR DESIGNING FOAM TRENCH AND HOG
RING WINDOW
The technique relates to a system and method for designing foam trench and hog ring window. This technique involves allowing user to provide input regarding the dimensions of the foam trench and hog ring window. Further, this technique prompts user ...
The invention discloses a system and method of generating a cryptographic session key based on a known master key shared between a sender communicator and a receiver communicator in a communication network. The method includes receiving a request from the receiver communicator, by the sender communicator, to establi...
A method and system for updating an application residing on a computing apparatus is disclosed. The method involves comparing a version of the application residing on the computing apparatus with an undatable version of the application to determine whether an update is available for the application. The version of t...
The disclosed embodiment relates to methods for measuring camber on a surface. The method preferably comprises receiving, by a computing device, a plurality of images of a surface, identifying, by a computing device, a key image of the surface from the plurality of images, extracting, by a computing device, a portio...
A variety of technologies for partner portals are presented. The portal can support a wide variety of partner types and supporting functionality. Rights administration by partners can be supported via the portal. Common access functions, generic framework functions, co-partnering functions, and other functions can b...
The disclosed embodiment relates to a computer-implemented method, an apparatus, and computer-readable media for preparing medical treatment service bundles. An exemplary method comprises identifying historical medical treatments based on attributes of a patient"s medical condition, the historical medical treatments...
Systems and methods are provided for enabling multi-channel customer assistance for a user of a wireless telecommunication device. The current mobile assistance solutions are more a set of stored datasets which are merely queried on demand. The approach is based on presence of one or more customer assistance engines...
The invention describes a method, a system, and a computer program to provide an end-to-end solution in a test automation framework present in a communication network. A user selects at least one test script corresponding to a network service. The selected test script is executed over a topology that is generated by...
The present invention proposes a method and a system for managing a database having a plurality of tables. The tables represent a master data of a business application. The method includes receiving an input command from a user for maintaining a table of the plurality of tables. After receiving the command, an Exten...
A method and system for enabling discovery of services and automated exchange of data between multiple Bluetooth devices are disclosed. The method includes measuring signal attenuation of a Bluetooth signal between a first Bluetooth device and a second Bluetooth device. The method further includes comparing the sign...
The present invention discloses a method and system for providing a voice-based digital signature service. A first user sends a document to a second user for signature. The first user also sends a PIN to the second user and to a voice verification authority. The second user sends to the voice verification authority,...
Various technologies related to code remediation are presented. Code to be remediated can be annotated with language-independent annotations. From the annotations, remediated code in a particular language can be generated. A wide variety of change types can be supported. Automatic or custom remediation can be achiev...
A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is ob...
A system and a method for managing a health care systems transition are described. Transitions supported may include a migration from Health Insurance Portability and Accountability Act (HIPAA) Electronic Data Interchange (EDI) 4010 standards set to the HIPAA EDI 5010 standards set. An example implementation describ...
The disclosed embodiment relates to a method for optimizing end-to-end response times distribution across a plurality of components in a performance engineering process. The method preferably comprises determining first, second, and third end-to-end response times for a plurality of components in the process, and de...
A method and system for masking of sensitive fields on a cheque image based one
or more access privileges assigned to a user. The method involves receiving (202) a cheque image
at a cheque masking engine. A cheque template from one or more cheque templates is selected
(204) based on a metadata associated with the...
ABSTRACT OF THE DISCLOSURE
A method and system to automate training named entity recognition in natural language processing to build configurable entity definitions includes receiving input documents or entities through an administration module and defining a domain for each entity. Further, one or more entities co...
ABSTRACT:
[00111] A method and/or system for heterogeneous predictive models generation based on sampling of big data is disclosed. The method involves receiving a dataset and a target column associated with the dataset at a data processing engine from a distributed data warehouse (512). One or more columns associa...
Size of an enterprise application integration project can be determined by based on data exchange activities, data processing activities, other systemic requirements for the integration and associated weights. Data exchanges and processing activities can be categorized as reception, validation, transformation, publi...
Embodiments of the disclosure relate to system and method for controlling and preventing medical malpractices carried out by various healthcare facilities. In an embodiment if the result of ultrasound test is normal and still the fetus of the patient is aborted then the medical service provider providing medical s...
The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are ...
The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user"s machine and the end user by me...
A method, non-transitory computer readable medium and data masking device comprising receiving an input string comprising one or more input characters from a client computing device. A first numeric value is mapped for each of the one or more input characters of the received input string based on one or more stored ...
A method for performing access management to facilitate a user to access applications in a single sign-on enabled enterprise solution is provided. A challenge token and a response token are transmitted between a server and a client. The challenge token and response token comprises one-way hashed data. The response t...
The present invention relates to a system and method for enriching and transforming unstructured data to obtain structured data by intelligence extraction, enrichment, categorization and hierarchy creation. The invention discloses an automated approach for transformation of unstructured documents, which involves an ...
Embodiments of the present invention relate to an inventory management method and system. The present invention addresses the foregoing need of an inventory management system through which all size and shape of components can tracked before and after an assembly process in a manufacturing facility. The invention add...
Cloud-based testing of applications allows an application under test (AUT) to be subjected to test loads mimicking expected high volume real-time production loads. Test loads can be applied from geographically distributed test load sources. During testing, the system can monitor usage of AUTs and the underlying clou...
A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspecte...
Methods, devices, and computer-readable storage media for managing a product include receiving event data related to one or more events associated with a lifecycle of a portfolio of one or more products. The received event data is compared with a resource model. An estimated number of resources required to implement...
The invention relates to a system and method of context aware adaption of content for a mobile device. This involves identifying context parameters and associated values, selection of content layout based on context parameters. Content layout is selected from pre-configured content layouts based on context parameter...
A system and method of selectively consolidating applications on a machine comprises retrieving resource utilization data for a plurality of applications over a plurality of cycles for designated resource dimensions. A representative utilization profile is calculated on each application for each resource dimension. ...
Methods, devices, and computer-readable storage media for tracking changes in a database including at least one database table include adding a first column to a schema of each database table. The first column includes a row update identifier for each row of the database table. A global update identifier is incremen...
Systems, methods, and computer-readable code stored on a non-transitory media for assessing an entity's innovation level by one or more computing devices include gathering information relating to an entity's performance in plural disciplines; capturing strengths and opportunities of the entity based on the gathered ...
The disclosed embodiment relates to methods for presenting information to a user in a concise manner. The method preferably comprises receiving information specifying at least one data characteristic and at least one presentation characteristic, wherein the at least one data characteristic relates to information des...
A method, non-transitory computer readable medium, and apparatus that obtains at a first computing apparatus content responsive to a single request message received from a second computing apparatus. Two or more response messages to the single request message are generated with the first computing apparatus. The two...
ABSTRACT
Systems and methods for replication of test results in a network environment are disclosed. Methods described may include recording network traffic in a first instance of a test case by a network emulator node emplaced in the network environment, recording a time at which a connection open at the network e...
Techniques and tools are described for determining optimal product assortments and optimal planograms using a hybrid binary multi-dimensional knapsack representation. An optimal product assortment and an optimal planogram can be determined by receiving one or more objectives, receiving one or more constraints, recei...
Disclosed herein are representative embodiments of technologies that can be used to generate medical-claims simulations that can provide information about medical claims. In one exemplary embodiment disclosed herein, medical claims data is received, and a dynamic questionnaire is output. Selections of questionnaire ...
The embodiments of the present disclosure provide a framework for managing lifecycle of a project in an organization. The framework comprises of a project management module configured to provide plurality of guidelines to execute a project in a global context, a behavior module configured to provide a plurality of s...
The disclosed embodiments relate to a method for improving customer service efficiency. The method preferably comprises receiving information from a customer, identifying an issue based on the information received from the customer, and determining, by a computing device, whether a solution resolving the identified ...
Instant disclosure is related to updating an application on a mobile device without using mobile network bandwidth. The mobile device initiates the application to be updated on the mobile device to scan an encoded image of a predetermined pattern from a source. It is followed by decoding of the scanned image to extr...
Systems, methods, and computer-readable code stored on a non-transitory media for creating an innovation co-creation ecosystem by one or more computing devices, including designing an innovation co-creation ecosystem for an innovation drive by a primary innovator; providing a co-creation constituent selection framew...
The invention relates to a system and method for generating a dynamic and localized keypad in an automated teller machine (ATM). This invention involves receiving the language of preference information of the ATM users and retrieve the number values, texts and all other characters which are required to be displayed ...
One or more computing devices may determine a category of interest to a user, receive an image, extract one or more features in the image, determine a recommendation in the category of interest based, at least in part, on the one or more extracted features, and communicate the recommendation to the user. The image c...
A system, medium and method for testing an end-to-end software application is disclosed. A structured business process model (BPM) representative of a set of business requirements for an end-to-end software application to be tested is first generated. The generated structured BPM is validated in association with one...
The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open atleast one data consumer website or atleast one third party website wherein a user submits atleast one data value into their corresponding data field in a data ...
This invention describes a system and methodology for sharing, analyzing and consolidating medical data on social networks in a well secured manner. It allows patients, medical professionals and caregivers participate in an open media without the fear of their personal information being compromised. At the same time...
The technique relates to a method and system for extracting cross language dependencies and estimating code change impact in software based on a plurality of dependency graphs, a network of the plurality of co-committed files and one or more predefined graph metrics. This technique involves extracting source code an...
The present invention relates to a computer-implemented method, system and computer readable medium for scene based video watermarking. Methods are disclosed to detect the scenes inside the video. Disclosed systems and methods are capable of scene change detection for both, gradual and abrupt scenes. Methods are als...
The present invention provides a middleware to automatically bind demographic details of a patient to at least one sensor included in a body worn monitoring device of the patient. In accordance with an embodiment, the middleware comprises a receiver module and an edge intelligence module. The receiver module receive...
1. A system configured to perform batch job execution in a virtualized environment, the
system comprising:
one or more computing devices configured as a virtualized grid cluster by means of a virtualization platform, the cluster comprising:
a centralized storage repository associated with computer memory acros...
[0038] The present disclosure relates to configuration driven application persona on hand held terminals. The system comprises a data receiving unit configured to receive a memory unit and also to read the data present in the memory unit. The data receiving unit can also be initialized using the memory unit. The dat...
ABSTRACT
A computer implemented method for customer response management the method comprising the step of collecting at least an information from social networking sites wherein the information is at least a post or comment for at least a brand or product; identifying customer among pluralities of authors of the in...
Computer-implemented systems, methods, and computer-readable media electronic for financial transfers include: receiving a request for a set of at least one Icheck tokens; generating the set of Icheck tokens, each Icheck token including a unique identifier, a set of payer data, and a set of signature data,...
The technique relates to a system and method for determining co-locatability of a plurality of virtual machines on one or more physical infrastructures. The plurality of virtual machines hosts a plurality of workloads. This involves identifying workloads which have high variability from the time series data and dete...
The present invention provides a system and method for determining a location of an item using the services of an existing cellular infrastructure. A search request comprising a first item identifier of the item is received by a tracking service server from a user. A second item identifier of the item is retrieved b...
A design module for automatically optimizing business processes in an organization. Each business process to be optimized is characterized by one or more performance indicators. One or more process characteristics are identified corresponding to each of the performance indicators. For each of the process characteris...
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the computed hash of the first random number r is same as the received hash of the first random number r sent by a user device. Thereafter, the second random nu...
The present invention provides a method a system and a computer program product for configuring a Web portal for a computer based application using one or more menus available in the computer based application. It comprises classifying the menus available in the application according to the functionalities. The menu...
ABSTRACT OF THE DISCLOSURE
The present invention provides a method and system for quantifying a bug preventability measure of a bug prediction technique. In accordance with a disclosed embodiment, the method may include applying a weighted recursive function, on an actual bug count of each version of an application...
Methods and system for presenting the content personalized for a user is presented. Particularly, the content is personalized and presented to a user in more cognitive and user understandable manner to improve the impact and the effectiveness of presented content on the user. The system utilizes artificial intellige...
The technique relates to a system and method for selecting process element variants in business processes. The technique involves receiving a process element execution request from at least one user. Then, determining a plurality of enterprise dimensions associated with the process element execution request. Thereaf...
The technique relates to a system and method for effective selection of disparate distributed power sources for smart grid in near real time manner to meet the specific power demand. The technique involves receiving power from the plurality of disparate power sources then selecting one or more power sources among th...
The present disclosure discloses an embodiment for managing sustainability goals of an organization. Organizational activities associated with the sustainability goals and performed in the organization are identified. The attributes of the stakeholders of the organization are identified. A first set of activities fr...
The technique relates to a system and method for establishing non data delivery channel for checking device capabilities to send one or more media contents. This technique involves receiving request to deliver media contents to telecommunication devices. Then, a non data delivery channel is established with the tele...
A method, non-transitory computer readable medium, and apparatus that quantitatively assesses the impact of a project change request to software quality including determining at least one initial project request defect value based on an initial project request effort value and a defect insertion rate, determining at...
The present invention relates to a method and a system to automate identification of transactions. The method comprises receiving raw log files from a transaction device into a log collector, storing the raw log files to a log storage, processing the raw log files by a log parser unit to remove the fields and the en...
A system and method for managing an IT infrastructure using a mobile device, the method comprises identifying, using one or more processors of a network management system, an issue in one or more components in the infrastructure; retrieving a message instruction for the identified issue from an action database, wher...
A method and system for analyzing on-road traffic density are provided. The method involves allowing a user to select a video image capturing device and coordinates in a video image frame captured by the video image capturing device such that the coordinates form a region of interest (ROI). The ROI is processed to g...
A method and a system have been disclosed for detecting one or more memory leaks in a program. The method includes receiving the program code. After receiving the program the program is tokenized automatically in a predefined format. The predefined format may correspond to a format which is up loadable to a database...
This invention relates to a system and method for identifying one or more problematic loops in an application. This invention provides a Directed Acyclic Graph or DAG representation of structure of one or more loops in the application by performing a static and a dynamic analysis of the application source code and d...
A system for facilitating prediction of a loan recovery decision pertaining to a customer of a financial institution is provided. The system comprises one or more databases comprising customer interaction data, customer profile data, and economic data. The system further comprises a Behavioral History Sequence (BHS)...
The present invention provides a method and system for distributed probabilistic matrix factorization. In accordance with a disclosed embodiment, the method may include partitioning a sparse matrix into a first set of blocks on a distributed computer cluster, whereby a dimension of each block is MB rows and NB colum...
A method and apparatus for checking the fit of behaviour of a business process and observed behaviour of the system in terms of event logs. The method includes generating a behaviorally equivalent CSP description of the business process and trace equivalent CSP description of event logs. Further the generation of CS...
A system and method of measuring innovation performance comprises creating a performance record on a network device, wherein the performance record is stored in a memory. The performance record includes a plurality of life cycle stages and perspective factors for each life cycle stage. One or more performance goals ...
Methods and systems for facilitation navigation through a virtual input device include loading an instance of a virtual input device in response to a user input, filtering the one or more characters populated in one or more cells of the virtual input device instance on the basis of a first predefined policy stored o...
The present invention provides a method and system for configuring constraints for a resource in an electronic device. The method includes identifying context of use/ access of a resource and implementing permissions/ constraints as per the identified context. The method includes identifying an existing work environ...
A method, non-transitory computer readable medium, and device for clustering a network includes obtaining information regarding a network including relationship information for a plurality of nodes of the network. A weight value for each of a plurality of directly connected pairs of the plurality of nodes is determi...
A non-transitory computer readable medium, and plagiarism detection device is described which generates an abstract syntax tree from software code in an computer readable source file, the software code comprising at least one class; identifies one or more method invocations in the source file by means of the abstrac...
A system and method of selectively migrating at least one virtual machine to another physical machine is disclosed. Consumption information of a plurality of virtual machines and capacity information of a plurality of physical machines is retrieved. A first virtual machine to be potentially migrated is identified ba...
[0044] The present invention provides a gamification platform to provide one or more gamification services to one or more users in an enterprise. In accordance with an embodiment, the gamification platform includes a server, an application component, a consumer component and a DB layer, wherein said components and t...
Techniques for providing internet services to a user through a toll free connection are provided. The techniques include receiving, from an Internet Access Point (IAP), a request for the internet services through the toll free connection provided by a Cloud Service Provider (CSP), wherein the CSP is selected by the ...
Various technologies related to achieving financial neutrality in light of transition from one medical classification system to another are described. Mappings between and among codes such as diagnosis codes, procedure codes, and payment codes can be explored and chosen based on comparison of financial impact among ...
The present invention provides a method and system for synthesizing a voice guiding signal to a gaming controller. An input gaming data to the gaming controller is collected by a console game agent. A set of game target profiles and a set of control signals are created from the input gaming data. A set of active gam...
A METHOD, SYSTEM, AND COMPUTER-READABLE MEDIUM FOR PROVIDING A SEARCHING OVER ENCRYPTED KEYWORDS IN A DATABASE
ABSTRACT
The present invention relates to a computer-implemented method, system and computer readable medium for providing a searching over encrypted keywords in a database. The method comprises the steps...
Techniques for testing one or more applications running on a handheld device include: receiving, by a tester system, an error state corresponding to the one or more applications; retrieving, by the tester system, one or more tests script parameters corresponding to the error state from a database, wherein the one or...
ABSTRACT
The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing atleast one user defined alarm condition. The syst...
A method and apparatus for checking the fit of behaviour of a business process and observed behaviour of the system in terms of event logs. The method includes generating a behaviorally equivalent CSP description of the business process and trace equivalent CSP description of event logs. Further the generation of CS...
The technique relates to a system and method for estimating an impact of changing one or more source files in a software based on a clone dependency graph. This technique involves extracting the source files from a repository and detecting code cones present in the source files. After detecting the code clones the c...
The present invention provides a method and a framework for secure data management, in which the method comprises: enabling, by an enterprise server, a user to download an enterprise application from the enterprise server using a computing device. User authentication credentials are provided by the enterprise server...
Systems and methods are disclosed for a policy-based, power consumption management of resources. Power consumption data is relayed to an event management system for conducting a pattern analysis of the resources based on historical values and external factors. The event management system may provide a graphical inte...
The present invention provides a method and system for managing a local stack in an information processing environment. In accordance with a disclosed embodiment, the method may include classifying a type of a page as one or more of a permanent entry, a transient entry, a combination entry and a null entry. Further,...
Methods and instructions embodied in non-transitory media for the detection of plagiarism in software code implementing a design pattern are described. Steps involved may include receiving input comprising the software code at least one design pattern implemented in the software code, identifying at least one functi...
A method, non-transitory computer readable medium, and apparatus that manage data synchronization include obtaining one or more configuration rules and at least one value for one or more configuration parameters. One or more synchronization rules are generated based on the obtained one or more configuration rules an...
A system method and computer program product for facilitating non interruptive transactions is provided wherein the transactions are initiated at one or more transaction channels. The system comprises one or more transaction processing servers configured to perform transactions initiated at the transaction channels ...
The technique relates to a system and method for selecting dynamic workflow to process file data. This technique facilitates to process file data and business rules simultaneously and thus saves a lot of time. The technique involves receiving a request from File Pattern Recognition Engine (FPRE) to select rules for ...
ABSTRACT
[0044] The present disclosure provides virtual replacement of the texture of an apparel with a different texture, also taking care of the wrinkles, body shape etc. The apparel worn by the user is identified/ localized in all the frames of a video file, and replaced with a pre-identified texture from the ca...
Methods and systems for monitoring and controlling a service level agreement are disclosed. A disclosed embodiment comprises a cloud platform hosting at least one application associated with at least one service level agreement, a monitoring module for collecting at least one metric relating to an application hosted...
Method and systems for supply chain optimization include identifying at least one existing system limitation associated with a high technology organization, identifying a supply chain optimization scheme enabled by an enterprise resource planning implementation for the high technology organization on the basis of th...
Embodiments of the present invention provide a mobile device comprising a core phone with a detachable primary device. The core phone transfers an incoming call alert to the detached primary device by synchronizing the display frame buffer of the core phone with the display frame buffer associated with the detached ...
Systems and method for extracting attributes from text content are described. Example embodiments may include a computer implemented method for extracting attributes from text data, wherein the text data is obtained from at least one information source. As described, the implementation may include receiving, from a ...
Disclosed herein is a system which addresses the problem of multiple mappings of a source ICD code to a target ICD code by using medical service claim records. The mechanism is based on analysis of the ICD code description, and analysis of accompanying data to determine a set of selection parameters to assist in the...
Various technologies related to estimating programming effort to internationalize a software program are described. A sampling technique can be applied to the numerous program files that make up the software program. Stratification by impact point type can be supported. Historical data can be used to provide an ac...
The present invention provides a method of rendering a thin client application in a network device, for parsing the internet data so as convert the internet data into a common data format which can be rendered in set-top box using any type of middleware. The invention would be equipped to handle any type of applicat...
The invention relates to a system and method for extracting business process metrics from a Unified Modeling Language (UML) model. This invention involves the use of Object Constraint Language (OCL) and custom stereotypes to extract the design metrics from a UML model. The business process parameters to be measured ...
This invention describes a system and method for dynamically establish and maintain a MASTER SLAVE Network among the devices with wireless and wired connectivity. It also provides system and method for maintaining a MASTER SLAVE network in the event where the SLAVE or the MASTER or the server is dead. More important...
A method, non-transitory computer readable medium, and apparatus for assessing efficiency of a data center includes querying, based on a system management protocol, each of a plurality of information technology (IT) devices to obtain utilization information. A power rating value is obtained for each of the plurality...
A method, non-transitory computer readable medium, and apparatus for analyzing a database includes obtaining SQL code defining one or more databases, each including a plurality of objects, wherein the SQL code is stored on one or more database servers. Defects in the SQL code are identified by applying a plurality ...
Computer-implemented systems, methods, and computer-readable media for financial transfers from a mobile device, comprising: receiving a mobile device identifier, a unique user identifier, a merchant identifier, and an amount from a mobile device; determining whether the transaction is authorized based on the mobile...
Techniques and solutions are provided for determining overall effort for a package implementation program. Determining overall effort can comprise determining a program parameter complexity value for each of a plurality of program parameters, determining activities for program phases and program work streams, calcul...
A method and apparatus for providing authentication of a computing device with a communications service. A subscriber identity module image is transmitted to the device and stored in a general memory of the device and soft SIM data. A secure module on the device permits access to the soft SIM data. The Soft SIM data...
The present invention relates to a system and method of integration among software components. The method allows integration between data corresponding to a first set of software components and a second set of software components. This method also involves exposing Application Program Interfaces (APIs) to a pluralit...
A system and method for modeling a region segmented image is described. Aspects of the present invention may include the generation of a computer model that models the region segmented image, the computer model comprising one or more nodes, wherein each node in the one or more nodes represents an arbitrarily shaped ...
Various technologies related to estimating costs associated with proposed information technology services solutions using global sourcing are described. Consistent and accurate estimates can be achieved by using a tool having features specific to the estimating process. The tool can construct a global sourcing busin...
A system and computer-implemented method for generating an optimized allocation of a plurality of tasks across a plurality of processors or slots for processing or execution in a distributed computing environment. In a cloud computing environment implementing a MapReduce framework, the system and computer-implemente...
A method, non-transitory computer readable medium, and apparatus that extracts at least one key image from one or more images of an object. Outer boundary makers for an identifier of the object in the at least one key image are detected. An identification sequence from the identifier of the object between the outer...
AUTOMATIC ADDRESSING METHOD OF A PLURALITY OF SLAVES IN A
MASTER SLAVE NETWORK
ABSTRACT
The invention discloses an automatic method of assigning network address to a plurality of slaves connected in a master-slave network particularly in an emergency lighting installation. The automatic method assigns network add...
A method, non-transitory computer readable medium, and apparatus that monitor one or more capacity related factors of one or more servers providing one or more services to one or more client computing devices to obtain one or more values. An adaption factor for at least one of the one or more client computing device...
A method, non-transitory computer readable medium, and apparatus that enhances password authentication includes identifying verification password characters and a location of each of the verification password characters in one of a plurality of rows and one of a plurality of columns of a password matrix in response ...
A method for generating an influence commerce network that facilitates to identify targeted users for promotion of products is provided. The method enables generating a product network using data related to products in an ecommerce website. The generated product network represents product-product links which represe...
The invention relates to a system and method for demarcating information related to one or more blocks in an application source code. This invention provides a means to annotate block information in the source code. It parses the application source code to generate an abstract syntax tree and instruments the source ...
A method, non-transitory computer readable medium, and apparatus for discovering and analyzing a network topology includes obtaining information regarding a network including a relationship of a plurality of nodes of the network. At least one value for each of a plurality of centrality parameters is determined for e...
A system and method for monitoring and analyzing social network databases to determine actual key influencers is disclosed. Inputs are received from the user, which includes search keyword(s), time, date, language, area and country. Content corresponding to the user inputs is fetched from the social network database...
Computer-implemented systems, methods, and computer-readable media for project promotion, package assembly, and build processing in a Configurable Network Computing architecture comprising: receiving a request for a package build from a user; storing, by at least one of the one or more computing devices, the receive...
Embodiments of the present invention relate to a system for data integration and information retrieval by bringing semantically related data together for a given context. As described, the integration of data may include the building of an ontology, the mapping of one or more processes, semantic maps and concept dic...
A method, non-transitory computer readable medium, and apparatus for facilitating communication of presence information includes establishing a connection with at least one client computing device upon receiving a request for presence information from the client computing device. The request for presence information...
Various technologies related to uniform resource locator (URL) sequence patterns are described. Such patterns can be used to determine a distribution of a mix of the URL sequence patterns occurring within given URL sequences. A production environment URL log can be analyzed using the technologies described herein to...
The invention relates to a system and method for fixing application vulnerabilities through a correlated remediation approach. This invention involves identifying application vulnerabilities through dynamic and static assessment of an application. The vulnerability instances reported in the static assessment is fixe...
The present invention provides a method and system for integrating a composite message such as a Multipvirpose Internet Mail Extensions (MIME) message. A metadata template associated with a metadata XML object is extracted from a content management system, whereby a key of the metadata XML object is passed with the ...
The invention relates to a system and method for predicting abnormal temperature of a server room using Hidden Markov model. This invention involves capturing the real temperature value at a given point of time through sensors and determining that the temperature patterns follow the Normal Distribution. Then the Hid...
Systems and methods for optimizing the performance of an application, as described, may include determining an arrival time of a packet at a network emulator node by the network emulator node, wherein the packet is transmitted from a node to the network emulator node over the network, establishing a packet ordering ...
A method for generating feature graphs employed for creation of a head note in a legal document is provided. The method enables identifying one or more predetermined features in a plurality of legal documents. The one or more predetermined features are based on grammatical constituents of text in the legal document....
The present invention provides a method and system for assessing usability of a website. The method includes scanning at least a portion of the website to be assessed based on a keyword input by a user, where the keyword specifies a structure of an HTML element. The method further includes validating the scanned res...
A method, non-transitory computer readable medium, and apparatus that defines one or more of initial validation rules, one or more source to target mapping instructions, one or more data filtering rules one or more data validation rules, one or more data transformation rules, and one or more file definition rules. T...
A system and computer-implemented method for transforming source code in an original natively encoded format to a locale neutral format, wherein data types and functions in the original format are estimated for compliance with the locale neutral format and an estimation is made as to the amount of code conversions n...
The invention relates to a system and method for estimating a cost for one or more system testing request in a data warehouse environment for a client based on a single table unit. This invention uses the past data of the client requests to derive the single table unit. It classifies the tables impacted in the past ...
The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identifi...
A method, non-transitory computer readable medium, and resource management computing device comprises identifying one or more workload bursts in a production environment. One or more additional resources in a non-production environment required to manage the one or more workload burst in a production environment is ...
Various technologies related to managing energy wastage management in the information technology (IT) domain are described. Implementation of the described features can lead to considerable energy savings for organizations having significant information technology hardware. Attendance information from various source...
A method, non-transitory computer readable medium, and apparatus that obtains a request message in a hierarchical format. A set of flat request records is generated based on the request message wherein each flat request record includes at least a key and a value. Each flat request record is compared to a set of crit...
An integrated network architecture can provide information centric and Internet Protocol processing. The integrated network architecture can comprise a packet core that supports packet processing for information centric network packets and Internet Protocol packets, a service core that comprises services supporting ...
A method, non-transitory computer readable medium, and apparatus that extracts a plurality of attributes from a software requirements specification wherein each attribute is associated with a data type and one or more properties. Constraint representation syntax is applied to the extracted attributes based on the da...
A method, non-transitory computer readable medium, and apparatus that obtains a version history for a plurality of source code files associated with the computer program. At least one defect probability value is generated for each of the plurality of source code files using at least one metric and the obtained versi...
Systems and methods for multi-dimensional object detection are described. Embodiments disclose receiving image frames, extracting image components in the image frame, identifying line segments in the extracted components, grouping the line segments into groups, based at least in part on one or more similarities betw...
INTELLIGENT SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR MANAGING INTEGRITY OF A FIELD ASSET
ABSTRACT
The present invention provides a method and system for managing integrity of a field asset. A request for managing the integrity of the field asset is received by a handheld device. A set of integrity data es...
A system and method for developing a financial tool is provided. The system is an enterprise level framework. The system for developing a financial tool includes a User Interface Module a Component Module a Business Logic Layer Module and an Application Programming Interface (API). The User Interface Module is confi...
UNIFIED PLATFORM FOR BIG DATA PROCESSING
Embodiments of the present invention relate to methods and systems for big data processing. The invention also discloses a system for processing big data. The system includes extraction modules for extracting data from the data sources. The system also includes means for def...
ABSTRACT
A method, non-transitory computer readable medium and transaction management device comprising receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management devi...
Various technologies related to managing a medical device recall are implemented. Automated recall functions can facilitate an efficient and effective recall process. Full lifecycle of the recall process can be managed including communication with patients and replacement of devices, as well as auditing and regulato...
A system, medium and method of managing, via a gateway device, to wirelessly communicate with a plurality of network appliances in a closed local area network is disclosed. A data message is received from a first network appliance configured to communicate data in association with a first application profile. The fi...
A computer implemented method for calculating trust level of user on social networking sites, the method comprising: consolidating information related to users operatively associated with at least a web based social platform; assigning weight to each of the consolidated information; computing aggregated score for at...
Systems and methods for improved management of sentiments over conventional approaches are disclosed. Supervised approach is used to augment the rule-based approach for classification. Initially, sentiment evaluation is performed by the system using a rule based approach and an interface is provided to the user to g...
A system and method for generating an optimized operating schedule for a plurality of heterogeneous wireless network appliances managed by a gateway device in a closed area network is disclosed. An amount of energy consumed by each network appliance as well as preassigned operational priority values assigned to each...
The present invention describes a method, system and computer product program for governance of data migration process in an enterprise from atleast one source to atleast one target. The method includes receiving, using a rules engine, the source information and the target information in response to a request for th...
A method and a system for determining, managing and deploying an application topology in a virtual environment are provided. QoS parameters, workload attributes and application topology elements are received. An application topology and a deployment strategy are determined based on the received one or more of QoS pa...
ABSTRACT
A method and a system for test output evaluation of a JAVA component. The Java component and reference classes are received and non-private members of the Java component are identified using JAVA reflection API and the reference classes. An API structure comprising public members is extracted from the non-...
The present disclosure is related to a method for securing financial transaction. The method includes encrypting transaction information on a server (102) upon receipt of said information from a computing device (101). Encoding the encrypted transaction information into a predefined image pattern and transmitting th...
A system and method for locking an application to specific hardware device without storing device or user information on server. A lock registration is performed during the first usage of the application where the application sends a unique value to the server through secured channel. This unique value is combinatio...
ABSTRACT
[0036] Improving operation stability and system availability of the IT systems at low costs is a primary objective of IT department of any customer. Implementing a one stop solution to monitor the system availability, to identify critical incidents in the systems before it becomes service impacting, to hav...
Method, apparatus and computer readable code for embedding and extracting a watermark in a text document using digital watermarking processes is disclosed. When the text document is watermarked, the following steps are performed. The pages of the text document are transformed into corresponding images. Then, the mar...
The disclosed embodiment relates to a system and method for mapping trends in defects that occur during a project. The method comprised processing defect information related to defects that occurred during a project over a set period of time, the defect information including classification information regarding cate...
This technique determines the possible Service Level Agreement (SLA) violation during migrating a workload from a physical environment to a virtualized environment and also migrating a virtual machine (VM) from one physical machine to another within a virtualized environment. This technique uses capacity factor, i.e...
The technique relates to a dynamic input device for providing an input and method thereof. A character as an input is received. The input character as a central character of a virtual grid is arranged. Thereafter, a set of one or more characters towards the center of the virtual grid and adjacent to the central inpu...
[00128] A method a system, and/or apparatus for omni-channel multi-hub order and
inventory management system. The method involves receiving (302) a request through an order capture channel an inventory stock. An availability of the inventory stock is checked (304) in a computer datábase associated with a primary hu...
According to the one aspect of the present disclosure, a method for knowledge and process based estimation model for product development activities of engineering services comprises: accepting a plurality of input details of a product. A component of the product is chosen for the purpose of estimation. The method of...
In a preferred aspect of the present invention there is disclosed a method of generating platform agnostic abstract syntax tree (AST) comprising of receiving data in a predefined format, through an input unit. Subsequently parsing the data to extract a model information corresponding to the predefined format of the ...
A method for processing customer service query requested by a customer is provided. The customer service query relates to at least one of one or more products and services. The method enables receiving the customer service query. The customer service query is received through an Integrated Voice Response system. The...
The present disclosure provides method for accessing digital web content. It provides for selective access rights for users, to a web content. When the user tries to retrieve the data, the system checks for the rights available to the user, and accordingly implements the access before providing the content.
REF FIG...
In an aspect, a system, non-transitory machine readable medium and method for providing a personalized executable file to a client device is disclosed. A request sent from a client device to obtain a software application is received. The request is processed to identify the client device and a user associated with t...
A system and method for navigating using a dynamic header in an interactive application of a television having a number of modules are described. Among all the modules of the interactive application, one or more desired modules are determined by analyzing at least one parameter (either based on user input or default...
A method and apparatus for creating a machine image to be used in instantiating virtual nodes in a cloud computing environment. A virtual machine operating system image is created based on the configuration file. The machine operating system image is loaded in the cloud environment as a machine instance. An EBS disc...
The present invention provides a system and method for predictive analytics in an electrical grid network. It comprises aggregating a plurality of events from an electrical grid network. Analyzing the plurality of events to recognize at least one event pattern. Serializing the at least one of event patterns in a dat...
ABSTRACT OF THE DISCLOSURE
[0052] A method for adapting services of applications. The method includes invoking an application installed on a device in an environment of a device. The environment of the device is sensed after the launch of the application. The sensing involve steps to obtain environment information ...
In an aspect, a system, non-transitory machine readable medium and method for updating at least a portion of a previously transmitted personalized software application is disclosed. A request is received from a user's client device to obtain one or more updated files associated with a previously transmitted personal...
A method system and computer readable medium for a method of identifying assets in an asset store, said method comprising, receiving an input representing a predetermined requirement, generating semantic based segments of the predetermined requirement, from the received input, mapping at least one parameter for each...
A systém and method for evaluating performance of a software application. The present invention includes analyzing by one or more computing devices a plurality of program code lines of tne software application stored in one or more computer databases. Further, one or more equivalent program regions within the plural...
The present disclosure relates to a framework to improve the predictability of performance problems in an enterprise application. In one embodiment, the present disclosure produces accurate predictive analysis by taking into consideration all the factors including workload, historical performance, environments, conf...
ABSTRACT:
The technique relates to a system and method for enhancing usability of devices that securely store data. The method involves receiving a plurality of client related context information from a client on a server, in response to invocation of a client application on a device then obtaining data and a plura...
A system and method of evaluating a software program is disclosed. Information of a proposed problem is received from a user via the user interface and a problem profile associated with the proposed problem is created. A master software solution associated with the proposed problem is processed to identify one or mo...
The disclosure provides activation of end to end virtual network services, along with various validations. It uses model driven architecture to convert the configurations to VNF/PNF specific commands and abstract the complexity of different types of syntax & command lines. The disclosure also provides test and diagn...
A method for creating a search index on cloud database is provided. The method enables providing inputs for creating multiple indexes on documents stored in the cloud database. One of the inputs may include a first value representing number of documents to be assigned a single index. The method further enabl...
A system for remote management of patients and medical devices is provided. The system comprises one or more medical devices configured to measure one or more patient's health parameters. Further, the system comprises a personal health gateway configured to receive the one or more measured patient's health parameter...
Described herein are representative embodiments for localization quality assurance (LQA) of localized software. In one exemplary implementation, a localization quality assurance plan for performing LQA of a localized software based on a base-language software is developed, and using the localization quality assuranc...
A method, implemented at least in part by a computing device to measuring operational efficiency levels of business functions the method comprising acquiring a plurality of business data from at least one database, wherein the plurality of business data is indicative of a predefined set of business parameters for on...
Systems and methods for leveraging social data by entities to acquire new customers through social channels are disclosed. Offers are personalized as these are transmitted based on the desire of the prospect, which may be expressed through network activities. The interest profile of members of social network communi...
A system for generating a plurality of surveillance and compliance scenarios includes a first user interface comprising a graphical modeling tool for writing fraud detection logic in a first language and a second user interface for creating one or more configurable threshold parameters, one or more general parameter...
The present invention discloses a method to dynamically render a service for multiple channels based on predefined user specification. The method comprises registering user specification such as choice of the one or more services, format of each service, preferred channel of each service, content of each service, an...
A method and system of a method of tracing a data element for flow analysis includes receiving an input of a data element to be traced, tagging the data element to be traced and selecting one or more tiers of an application to trace the flow of the tagged data element. The selected one or more tiers of the applicati...
In a preferred aspect of the present invention there is disclosed method of authentication and OTA registration of a new user without a SIM card, comprising the steps of transmitting a set of first time registration parameters to a selected service provider by a user device. In response the user device receives a no...
A method and system for error and event log correlation in an apparatus includes extracting
one or more log information associated with a storage location (302) and creating a flexible
structure of the one or more log information (304). The one or more log information is
translated to a database store based on...
Hashing data using image by performing a bit by bit concatenation of input text and hash key. The result is concatenated bit by bit with the salt. A two bit by two bit multiplication between the result and the reverse of the result is performed to get a next output. The bits of this output are used as coordinates to...
A method and system for authenticating software licenses of a software includes a request for a software authentication received from one or more software subscribers (302) and one or more electronic licenses distributed between one or more software vendors and the one or more software subscribers (304). Further, on...
A system and method combining supervised and unsupervised natural language processing
to extract keywords from text in natural language processing, the method includes
receiving, through a processor, one or more entities through an input processing unit (302)
and converting the one or more entities into a stan...
The present technique discloses a method and system for committing atomic transaction in NoSQL database by using a transaction manager (204). The transaction manager (204) is a middle layer between a distributed columnar database (202) and an application (218) accessing the database. The business entity for which da...
A computer implemented a method and system for enrichment of OCR extracted data is disclosed comprising of accepting a set of extraction criteria and a set of configuration parameters by a data extraction engine. The data extraction engine captures data satisfying an extraction criteria using the configuration param...
A method and/or system for a computer implemented method for seamlessly patching shared libraries is disclosed. The method involves receiving by a broadcast process (406), an information of a new library from a patch management repository (402) over a computer network (404). The broadcast process (406) creates a sym...
[0001] A system and method of creating an entity relationship map includes receiving a stream of lexical matter associated with one or more categories (302) and identifying one or more tokens from the received lexical matter based on the one or more categories (304). A frequency of one or more of unique lexical toke...
[0069] A system and method for on-demand cleaning of solar panel. The system comprising a modular frame for mounting the solar panel cleaning robot with dry cleaning and wet cleaning unit. The dry cleaning unit is coupled with traction motor and supported with wheels for cleaning accumulated dust particle. A wet cle...
Methods, non-transitory computer readable media, and resource management apparatuses that assist with sharing an input/output device for process automation on a computing machine includes receiving a plurality of surface automation requests to use an input device or an output device for surface automation. A priorit...
[00109] A system and/or a method for integrated auto-steering apparatus (300), auto-braking apparatus (200) and auto-acceleration apparatus to facilitate actuating brake and turning steering wheel without a driver. The invention made as a part of Drive-By-Wire system to make the system retrofit using a spur gear tra...
A method and a system (300) for automated testing of applications is disclosed. The application is crawled by an application crawler (310) to identify application states. Rewards associated with the application states are calculated using a reinforcement learning engine (308), based on reward matrix. Critical paths ...
Onboarding a VNF package utilized by multiple network services is disclosed. VNF package is received from vendor, for network services requested by a customer. The VNF package and its contents on an orchestrating manager, and a NFVI admin decides some workflows for the VNF package, for validating and certifying the ...
“METHOD AND SYSTEM FOR DECENTRALIZED TRANSACTION MANAGEMENT IN PROJECT RESOURCING”
ABSTRACT
A method and system for decentralized transaction management in project resourcing is provided that ensures transparent and decentralized tracking of data across all stakeholders. It also provides ease of compliance for org...
A COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR GENERATING PLATFORM AGNOSTIC DIGITAL WORKER
ABSTRACT
A computer implemented system and method for generating of platform agnostic digital worker comprising of an orchestration editor to identify a task to be performed by the digital worker by generating a specificatio...
The present technique discloses a method and system generating three dimensional animation in gaming engine. A CAD tool is used to generate 3D animation of kinematic assembly and it also stores the information related to complex joints and constraints of each component of the kinematic assembly. Then, it extracts in...
ABSTRACT
Provided is a method and system for performance evaluation using an AI model comprising automatic extraction of accurate call disposition details from the interactions for any domain, so that interactions can be tagged consistently and accurately, and actionable insights can be derived, by training AI model...
COGNITIVE PLATFORM FOR KNOWLEDGE EXTRACTION FROM HETEROGENOUS DATA SOURCES AND THE METHOD THEREOF
ABSTRACT
Provided is a method and platform for knowledge extraction from multiple data sources. The disclosure includes extracting entities from the data sources and synthesizing the same. They are then classified int...
ABSTRACT
Provided is a method & system for placing one or more elements over a media artifact by identifying an adjustment requirement of the media artifact on a device, identifying a placeholder for each of the one or more elements on the media artifact, checking a position of the placeholder in an initial device;...
METHOD AND SYSTEM FOR INTEROPERABILITY OF SOFTWARE DEFINED WIDE AREAS NETWORKS (SD-WANs)
ABSTRACT
Embodiments of the present disclosure discloses a method and an interoperability system (101). The present disclosure aims to provide interoperability betw...
ABSTRACT
Disclosed herein is method and system for contextual sentiment analysis of competitor referenced texts. The method comprises obtaining, by a system (103) a plurality of texts and a lexicon comprising keywords indicating a competitor entity a...
METHOD AND SYSTEM FOR SETTING UP A CROSS-DOMAIN PRIVATE 5G NETWORK FOR AN ENTERPRISE
ABSTRACT
Provided is a method and system for setting up a cross-domain private 5g network for an enterprise. The resources needed for the enterprise locations maybe checked for availability with the network service providers (102). ...
A METHOD AND SYSTEM OF ENHANCED HYBRID QUANTUM-CLASSICAL COMPUTING MECHANISM FOR SOLVING OPTIMIZATION PROBLEMS
ABSTRACT
A method of enhanced hybrid quantum-classical computing mechanism for solving optimization problems is disclosed comprising altering a value of a configuration chromosome by storing an angle memory...
The present technique discloses a method and system for creating target entity profile. Data related to target entity are collected from various sources. User configures, through genome management console of genome query engine (610), gene block – dimension matrix which defines relationship between gene blocks and d...
The present technique discloses a method and system for analyzing data based on a statistical model, wherein the statistical model is used in one or more contexts without needing intervention of data scientists. This statistical model is parameterized and uploaded in an analytics platform. Parameterizing the statist...
[0001] Disclosed are a system, method and apparatus for dynamically generating a personalized video content through a browser embedded video player. In one aspect, a method for generating a personalized video content at run time, for a user through a browser embedded video player is disclosed. Further, receiving (31...
A method and system of cloning a multi-tiered application is disclosed and it comprises of validating a received source server configuration data against a received target server configuration data. Further the data at a set of nodes on the target server is restored. The cloning of the multi-tiered application is in...
SYSTEM AND METHOD FOR TRAINING A NEURAL MACHINE TRANSLATION MODEL
ABSTRACT
[0086] The system and method for training a neural machine translation (NMT) model (210) is disclosed wherein training data in terms of source statements and equivalent targets statements may be received. The source statements and equivalen...
ABSTRACT
[0071] A computer aided method of configuring a smart assistant for domain specific self-service; comprising receiving, through a user interface, a predefined domain specific dataset; generating, by a training engine, a set of positive and negative samples in equal ratio; validating the predefined datase...
METHOD AND SYSTEM FOR CLONING DATABASE AND ASSOCIATED APPLICATION
ABSTRACT
A method and system for cloning a database and associated application are disclosed. A central server (404) is connected to source and multiple target servers over SSH protocol. The central server (404) has a user interface through which ...
A method and/or system for dynamic generation of charts in a personalized video content (230) is disclosed. A client device (212) may receive user data (210), a video template (204) and a metadata (206) associated with the video template (204) over a computer network (126). The dynamic generation of the personalized...
A method and system for automatic technical assistance is provided. The technical assistant is first trained using the user profile of the users who will be accessing the technical assistant, and the workflow details. The technical assistant continuously monitors user screen and checks if the user is on the correct ...
Air Purifier Mask and Method thereof
ABSTRACT
[0054] The present patent application discloses an air purifying mask having a face mask (01) along with its components. Some of the components maybe arranged inside a casing(03). The casing may contain an air filtering system, along with other associated components ...
[00103] A method and/or system for automated simulation of releases in Agile environments is disclosed. The system is an automated simulation engine (200) comprising - release simulation engine (202) to perform simulate at program or release level and sprint simulation engine (204) to perform simulation at sprint le...
ABSTRACT
Provided is method and system for organizing a virtual showroom with one or more 3d images. Scripts are generated from the input images provided by the user, for generating 3D images of the products in the showroom. The generated 3D images can be in folded form, hanger display or mannequin.
...
SYSTEM AND METHODS FOR AUTOMATED GENERATION OF DISPATCH SCHEDULE
ABSTRACT
[00101] A method and/or system (204) for automated generation of dispatch schedule in warehouse outbound operations is disclosed. The method comprising, receiving configuration data (304) comprising information about a warehouse and one or m...
The method of enrichment of data for digital product definition in a heterogenous environment; comprising of converting an input unstructured data into structured data by a mining engine. The mining engine also performs the assignment of a priority to the converted structured data and merges it with an input structu...
A method and system for analysing customer experience from unstructured social media
data comprising, fetching data from the social media platforms and segregate these social
media conversations into a campaign data, a “True social” data, and a news data using the
industry topic related plurality of keywords. Fur...
[0084] A method and/or system for automated detection and automated remediation of anomalies in Robotic Process Automation (RPA) environment is disclosed. The method comprises auto discovering (302) resources (RPA components and its dependencies) in an RPA platform (202). The discovered resources are monitored (304)...
METHOD AND SYSTEM FOR REAL-TIME CROSS-VERIFICATION OF ALARMS
ABSTRACT
A method and system for cross-verification of alarms in real-time comprising identifying primary variables and secondary variables causing the event (104), labelling the primary variables and the secondary variables by primary engine and secon...
METHOD AND SYSTEM FOR PRODUCT SOURCING
ABSTRACT
Disclosed is a method and system for optimal product sourcing. For each combination of the products requested in an order, and for each fulfilling location, the value of multiple parameters is calculated. Ranking of each parameter is also used while calculating t...
A SYSTEM AND METHOD OF PERFORMING A QUERY PROCESSING IN A DATABASE SYSTEM USING DISTRIBUTED IN-MEMORY TECHNIQUE
ABSTRACT
[0050] A computer aided method of configuring a smart assistant for domain specific self-service; comprising receiving, through a user interface, a predefined domain specific dataset; generating...
[0075] A method and/or system for automated estimation of 3D orientation of a physical asset using deep learning models and computer vision algorithms, according to one or more embodiments. The system may be configured to receive images (204) of the physical asset and camera orientation data (208) as input, use deep...
“SYSTEM AND METHOD FOR PERSONALIZED VIDEO CONTENT IN CONVERSATIONAL INTERFACE”
ABSTRACT
[0061] A method and/or system for dynamic generation of personalized video content in a conversational interface is disclosed. A chat application (206) at a client device (202) receives input from user which is communicated t...
SYSTEM AND METHOD FOR EXECUTING SEARCHES USING DIRECTED
PROPERTY GRAPHS
ABSTRACT
A system for executing a search in a dataset is provided. The system includes a storage element
that stores a directed property graph derived from the dataset. The directed property graph includes
entity vertices corresponding to entiti...
ABSTRACT
IN-SITU MESSAGING HISTORY IN GRAPH-BASED MODELS
An overlay system is provided that includes processing circuitry and a storage element that
stores an executable graph-based model including various active nodes, various history
message nodes, and various history overlay nodes. Each active node is associa...
ABSTRACT
RESOURCE UTILIZATION IN OVERLAY SYSTEMS USING PROJECTIONS
An overlay system including a storage element and processing circuitry is provided. The storage
element stores an executable graph-based model. The processing circuitry receives a
contextualized stimulus. Further, the processing circuitry identifies ...
IN-SITU DATA PROCESSING IN OVERLAY SYSTEMS USING MICROOVERLAYS
ABSTRACT
An overlay system including a storage element and processing circuitry is provided. The storage
element stores an executable graph-based model that includes various active nodes and various
micro-overlay nodes. Further, each active node includes...
Title: TIME-SERIES MESSAGE MANAGEMENT USING GRAPH-BASED MODELS
ABSTRACT
An overlay system is provided that includes a storage element and processing circuitry. The storage
element stores an executable graph-based model that includes various executable nodes that
communicate with each other by way of messages. The ex...
SYSTEMS AND METHODS FOR HYPERGRAPH BASED NEURAL NETWORKS
ABSTRACT
An artificial neural network (ANN) modelled as an overlay hypergraph
comprising a plurality of hyperedges, a plurality of role nodes, and one or
more overlay nodes. A hyperedge of the plurality of hyperedges represents
an artificial neuron within the ...
An executable inference hypergraph representing a rule-based model, the executable
inference hypergraph comprising a first hyperedge associated with a first inference rule of the
rule-based model and encapsulating a plurality of value nodes storing a plurality of values such
that the plurality of values form a part ...
ABSTRACT
IN-SITU HISTORY IN GRAPH-BASED MODELS
An overlay system is provided that includes a storage element and processing circuitry. The
storage element stores an executable graph-based model that includes various active nodes,
various history nodes, and various history overlay nodes. Each active node is associate...
ABSTRACT
DYNAMIC SECURITY FOR GRAPH-BASED MODELS
An overlay system including processing circuitry and storage element that stores various base nodes and various security overlay nodes, is provided. Each base node is associated with one or more security overlay nodes that control access to the information value conta...
TITLE: INDEXING IN GRAPH-BASED MODELS
ABSTRACT
An overlay system is provided that includes a storage element and processing circuitry. The
storage element stores an executable graph-based model that includes node templates, node
instances, and index nodes. Each node template is associated with one or more node inst...
An overlay system is provided that includes a plurality of storage elements and processing circuitry coupled thereto. The plurality of storage elements store a plurality of executable graph-based models such that first and second storage elements store first and second executable graph-based models, respectively. Ea...
ABSTRACT
IN-SITU DATA ANALYSIS IN GRAPH-BASED MODELS
An overlay system is provided that includes a storage element and processing circuitry coupled thereto. The storage element stores an executable graph-based model including a plurality of nodes, a plurality of rule overlay nodes, and a plurality of data analysis o...
IN-SITU ONTOLOGY MAPPING IN OVERLAY SYSTEMS
An overlay system provided, includes processing circuitry and storage circuitry that stores
primary executable graph-based models and auxiliary executable graph-based models. Each
primary executable graph-based model is mapped to one or more auxiliary executable graphbased...
A method for maintaining ownership integrity of templated executable graph-based models is provided. A node template that comprises a predetermined node structure and rules governing generation of node instances is obtained. A bounded executable run-time node is generated. The bounded executable run-time node compri...
A method discloses obtaining a node template comprising a predetermined node structure and rules governing generation of node instances based on the node template. Data elements are received. A run-time node is generated in response to the reception of the data elements. The run-time node comprises the node template...
An overlay system is provided that includes a storage element and processing circuitry. The storage
element stores an executable graph-based model that includes various executable nodes. Each
executable node includes a base node and a set of handler overlay nodes. Each handler overlay
node subscribes to messages map...
[0093] A system and/or a method for a cognitive platform (200) for autonomous data orchestration, comprising edge computing devices (204), data platforms (208) and cognitive computing engine (206). The cognitive computing engine (206) is configured to receive digital events either generated by external computing dev...
A method for transforming data organized in tabular structure is disclosed. In some
embodiments, the method includes assigning (502) a score to each of a plurality of cells within
a table based on an associated set of orthogonal features characterizing a set of data. The set of
orthogonal features comprises visua...
The disclosure relates to system and method for exchanging data between data
processing systems. The method includes receiving (402), from a second data processing
(204) system by a first data processing system (202), a data trigger associated with an
event within the second data processing system (204). The firs...
A method (2000) and system (100) for evaluating contract-worthiness of performing artists is disclosed. The method (2000) includes receiving (2002) consolidated data (206b). The method (2000) further includes processing (2004) the consolidated data (206b) by classifying (2004a) a set of topics (608) in the text data...
This disclosure relates to method (500) for developing and managing a product (301). The
method (500) includes creating (501) a product template (206) including a plurality of data
elements. The plurality of data elements is indicative of configurable items. The method (500)
further includes configuring (502) one...
ABSTRACT
[0046] A method and/or system for agent-based establishment of secure connection between endpoints (206, 208 and 210) and cloud servers (214) is disclosed wherein a deployment information is received at an agent controller (202) comprising information of endpoint (206, 208 and 210) and a cloud server (214) ...
SYSTEM AND METHOD FOR ARTIFICIAL INTELLIGENCE ASSISTED SERVICE CATALOGUE GENERATION FOR NETWORK SERVICE PROVISIONING
ABSTRACT
[0070] A method and/or system for Artificial Intelligence assisted service catalogue generation for network service prov...
The present disclosure relates to surveillance system (103) and method for detecting violation by driver in vehicle (101). The surveillance system (103) comprises capturing unit (105) for capturing license information of driver of the vehicle (101), upon start of the vehicle (101). Further, the surveillance system (...
This disclosure relates to a method (300) and a system (200) for managing extensions of a
product. The method (300) includes determining (302) a set of extensions associated with the
product. The set of extensions includes a set of existing extensions and a set of potential extensions.
The method (300) further in...
A method for contract-based loading of graph-based models is provided. A
stimulus, associated with a contract node and having a contract identifier, is
5 received. A contract node manifest, comprising the contract identifier and
one or more node identifiers of one or more nodes associated with the
contract node,...
A method for access management in graph-based model is provided. The
graph-based model comprises a plurality of nodes and an overlay structure
comprising processing logic. The overlay structure is associated with one or
more nodes of the plurality of nodes. Processing circuitry determines a first
node group of t...
This disclosure relates to a method and system for managing knowledge of a
primary ML model (102A). The method includes generating a set of class probabilities
for an unlabelled dataset based on a labelling function. The unlabelled dataset may be
associated with the primary ML model (102A), and the primary ML mod...
This disclosure relates to method and system for generation and presentation of User
Experience (UX) recommendations. The method includes retrieving (301) data corresponding to
one or more users of an application from a database (204). The data includes one or more of user
device screen recording data (403), appl...
METHOD AND SYSTEM FOR OPTIMIZING TRANSMISSION OF USER RELEVANT
EVENTS
ABSTRACT
5
The disclosure relates to a method (400) and a system (100) for optimizing transmission of
user relevant events. The method (400) includes generating (402) an event metadata (312) for a
user relevant event from an event snippet (3...
This disclosure relates to a method and system for hyper-personalization of user
experience. The method includes receiving (401) a data request from a user device
upon accessing a page of an application. The page may include a plurality of experience
blocks. Each of the plurality of experience blocks may include ...
METHOD AND SYSTEM FOR MANAGING ANONYMIZED DATA USING
BLOCKCHAIN NETWORK
ABSTRACT
This disclosure relates to a method (500) and a system (200) for managing
anonymized data across computing devices in a blockchain network. The method (500)
10 includes generating (502) the blockchain network including a blockchain ledg...
The disclosure relates to system (100) and method (300) for managing a plurality of applications. The method includes receiving (302) a first input for customization of a master map associated with the plurality of applications. The master map includes a plurality of components and a set of control settings for each...
A method for dynamic execution of sub-graphs within executable graph-based
models is provided. Processing circuitry obtains an executable graph-based model
comprising a plurality of sub-graphs and an overlay structure comprising processing
logic associated with the plurality of sub-graphs. Each sub-graph defines ...
A system comprises an executable graph-based model. The executable
graph-based model comprises a first overlay node. The first overlay node
comprises processing logic that is operable to interact with one or more
associated nodes of the executable graph-based model. Further, the
executable graph-based model comp...
A method and/or system for identity relationship determination among enterprise data entities to extend master data management is disclosed. The method involves, extracting the data from the one or more data sources thereafter grouping the extracted data into one or more groups based on one or more predefined criter...
METHOD AND SYSTEM FOR CONTINUOUSLY TRACKING HUMANS IN AN AREA
ABSTRACT
The disclosure relates to system (100) and method (300) for continuously tracking humans in area. The method (300) includes receiving (302) video data of area from overhead cameras (104). Each of the overhead cameras (104) includes Field-of-Vie...
DYNAMIC THREAT MITIGATION OF GENERATIVE ARTIFICIAL INTELLIGENCE 5 MODELS
ABSTRACT
The disclosure relates to a method and system for dynamically mitigating threats of 10 generative Artificial Intelligence (AI) models. Conventional systems often suffer from inefficiencies due to sequentially applying threat detectio...
METHOD AND SYSTEM FOR PROVIDING REAL-TIME ASSISTANCE To USERS USING GENERATIVE ARTIFICIAL INTELLIGENCE (AI) MODELS
ABSTRACT
This disclosure relates to a method and a system for providing real-time assistance to a user using a generative AI model (304). The method includes receiving (402), by the generative AI mo...
METHOD AND SYSTEM FOR GENERATING USER ROLE-SPECIFIC RESPONSES THROUGH LARGE LANGUAGE MODELS
ABSTRACT
This disclosure relates to method (300) and system (200) for generating user role-specific responses (211) through Large Language Models (LLMs). The method (300) includes receiving (303) a user query (210) from a ...
METHOD AND SYSTEM FOR MANAGING TABLES METADATA
ABSTRACT
This disclosure relates to a method and a system for managing metadata of a table. The
method includes receiving (302) a user input corresponding to the table. The table is one an
existing table or a new table, and the user input is for at least one of a mo...
ABSTRACT
METHOD AND SYSTEM FOR SANITIZATION OF SENSITIVE DATA
This disclosure relates to a method and system for sanitization of sensitive data. The method includes analyzing (301) sensitive data present within a page of an application based on a deterministic algorithm. Further, the method includes classifying ...
This disclosure relates to method and system for framework agnostic smart test orchestration in network test automation in a network. The method (400) includes receiving (402) input data for executing one or more test scripts to test one or more functions on one or more devices in the network. The input is received ...
The disclosure relates to method (300) and system (100) for hyper-localization of application. The method (300) includes obtaining (302) first page associated with the application. The first page includes at least one element. The method (300) includes receiving (304) user input corresponding to the at least one ele...
A method for loading run-time nodes of a template-based executable graph-based model is provided. A node instance manifest state is obtained based on a first node identifier associated with a node instance. The node instance manifest state includes a second node identifier associated with a node template. A node ins...
ABSTRACT
A method for dynamic execution of sub-graphs within executable graph-based
5 models is provided. Processing circuitry obtains an executable graph-based model
comprising a plurality of sub-graphs and an overlay structure comprising processing
logic associated with the plurality of sub-graphs. Each sub-gra...
METHOD AND SYSTEM FOR SMART TEST EXECUTION IN A NETWORK TEST AUTOMATION PLATFORM
ABSTRACT
The disclosure relates to system (100) and method (1000) for smart test execution in a network test automation platform. The method (1000) includes retrieving (1006) set of parameter values for each of plurality of test cas...
ABSTRACT
METHOD AND SYSTEM FOR LEGACY NETWORK TRANSFORMATION
This disclosure relates to method and system for legacy network transformation. The method includes receiving (301) data corresponding to a legacy WAN (501) from data sources. Further, the method includes analyzing (302) the data to identify transformati...
SYSTEMS AND METHODS FOR IN-SITU GRAPH-BASED DATA PROCESSING
ABSTRACT
A system comprises an executable graph-based model. The executable
graph-based model comprises a first overlay node. The first overlay node
comprises processing logic that is operable 5 to interact with one or more
associated nodes of the executabl...
METHOD AND SYSTEM FOR GENERATING CONTEXTUAL THUMBNAIL
PREVIEWS
ABSTRACT
5 The disclosure relates to method and system for generating contextual thumbnail previews.
The method includes extracting data associated with a project including at least one component.
The data includes one or more breakpoints, and one o...
METHOD AND SYSTEM FOR AUTOMATICALLY GENERATING NETWORK DESIGN DOCUMENTS USING GENERATIVE ARTIFICIAL INTELLIGENCE (AI) MODELS
ABSTRACT
This disclosure relates to a method and a system for generating a network design 5 document for a communication network using a generative AI model (312). The method includes receiv...
This disclosure relates to method and system for facilitating legacy code transformation. The method includes receiving (301) legacy code data (801) and natural language document from one or more data sources. Each of the one or more data sources is one of an external data source or an internal data source. Further,...
METHOD AND SYSTEM FOR GENERATING SEASONALLY ADJUSTED
RESPONSES IN REAL-TIME
ABSTRACT
The disclosure relates to a method (300) and a system (200) for generating seasonally
adjusted responses in real time. The method includes receiving (305) a set of 5 parameters from a
device (610) associated with a user (605). The m...
SYSTEM AND METHOD FOR MANAGING CO-DEVELOPMENT OF
APPLICATIONS
ABSTRACT
5
This disclosure relates to method (300) and system (200) for managing co-development of
applications. The method (300) includes receiving (305) a request corresponding to a first user to
edit a Graphical User Interface (GUI) of a developm...
SYSTEM AND METHOD FOR MANAGING UPDATES TO WEBPAGES
ABSTRACT
A method for managing updates includes receiving (505) a first set of elements indicative of a first
set of updates to be made to a first webpage that is currently deployed. Prior to deployment of the
updated first webpage, a first impact score indicati...
ABSTRACT
PAGE MANAGEMENT METHOD AND SYSTEM THEREOF
This disclosure relates to a page management method and system thereof. The method includes categorizing (302), using a first ML model (108), a set of pages into at least one of a plurality of strands, based on a set of first parameters. Further, the method includ...
METHOD FOR MANAGING UPDATES TO CACHED PAGES AND SYSTEM
THEREOF
ABSTRACT
The disclosure 5 relates to method and system for managing recaching of pages. The method
includes extracting (304) a set of attributes associated with a page. The method includes generating
(306) a set of first scores and a second score. E...
GRAPH-B ASED MODELS WITH COMPLEX NODES
An overlay system is provided that includes a storage element and processing circuitry coupled
thereto. The storage element stores an executable graph-based model having a plurality of nodes. The processing circuitry receives a stimulus indicative of creation of a complex nod...
[Class : 9] Computer Software And Software Platforms; Computer Software Platforms, Recorded Or Downloadable; Downloadable Software Utilizing Artificial Intelligence And Machine Learning To Facilitate Digital Transformation
[Class : 42] Development Of Computer Platforms; Platform As A Service [Paas]; Platforms For Artificial Intelligence As Software As A Service [Saas]; Cloud Based Digital Platform As A Service (Paas) Featuring Computer Software Utilizing Artificial Intelligence To Enhance Operational Efficiency And Facilitate Digital Transformation Across Business Enterprises; Computer Softwar...
[Class : 42] Software As A Service (Saas) Services Featuring Software For Improving The Impact And Efficiency Of Marketing Operations, Delivering Real Time Actionable Insights, And Capturing Customer Demand; Platform As A Service (Paas) Featuring Computer Software Platforms For Improving The Impact And Efficiency Of Marketing Operations, Delivering Real Time Actionable Insig...
View +94 more Brands for Infosys Limited.
Documents
Form MGT-6-04042021_signed
Form MGT-6-08012021_signed
Form MGT-6-08012021_signed
Form PAS-3-05012021_signed
Copy of Board or Shareholders? resolution-30122020
-30122020
Optional Attachment-(1)-30122020
List of allottees. Attach separate list for each allotment (refer instruction kit for format).If not attached, then it shall be submitted separately in a CD.-30122020
Form PAS-3-19122020_signed
List of allottees. Attach separate list for each allotment (refer instruction kit for format).If not attached, then it shall be submitted separately in a CD.-19122020
Copy of Board or Shareholders? resolution-19122020
Form MGT-6-15122020_signed
Optional Attachment-(1)-15122020
-15122020
Form MGT-6-10122020_signed
Optional Attachment-(2)-04122020
Optional Attachment-(3)-04122020
-04122020
Optional Attachment-(1)-04122020
Form PAS-3-26112020_signed
List of allottees. Attach separate list for each allotment (refer instruction kit for format).If not attached, then it shall be submitted separately in a CD.-26112020
Copy of Board or Shareholders? resolution-26112020