Described are methods, systems, and computer-readable storage media for lecision making through convex hull optimization. A plurality of key performance indicators KPIs) are received. A convex hull encompassing the plurality of KPIs is generated. Based at east in part on the generated convex hull and on at least one...
The present invention provides cost efficient two way authentication method in which the authentication module can be provided as a Plug and Play (PnP) architecture enabling dual layer security with reduced cost where the actions are initiated by a server and user input is received through an audio session for added...
A method for facilitating and improving process adoption in an organization is provided. The organization has a plurality of processes to carry out organizational tasks. The method includes receiving a set of priorities about the organization from at least one stakeholder in the organization. Further, the method inc...
A system and method for processing service request in service oriented architectures to minimize service overhead is provided. The method includes invoking a software service by a client by sending service request to a server hosting the software service. The method further includes receiving the software service re...
A dynamic and extensible architecture allows the selection and delivery of content in light of current context, including shopper in-store location information. Both static and real-time operation are supported. Business events can be generated based on information derived from sensors, from other business events, o...
A method for designing identity plates which are placed on corresponding shopping carts is provided. A unique identity data is represented on each identity plate using an identification code. The unique identity data is encoded employing symbols having distinct physical characteristics. The association between the s...
A method to secure an electronic transaction in an untrusted network is disclosed. The method comprises generating an electronic coupon using at least a data or a nounce value or a time stamp or a card verification value (CVV) or combinations thereof. The method includes encrypting the generated electronic coupon al...
A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent co...
A method and system is provided to manage sales and contracts effectively. The system includes analysis module to analyze sourceability of a component of the functional unit, a first processing to identify work requisites, a segmenting module to atomize work requisites, and a second processing module to group the at...
The present invention provides a method, system, and computer program product for managing the overall risk associated with any aspect in an organization. The method enables defining the focus areas associated with each context, and the change management dashboard attributes for each focus area of the context, risk ...
A method for providing a segment based differentiated customer service solution. The method comprises a step of first receiving information about online status of a customer. The method includes providing one or more personalized offers based on the received information. Further, a remote financial advisor applicati...
A system and method for executing and managing a business process in a unified business process environment is provided. The methodology of the invention describes steps to execute a business process and thereafter monitor the executed business process in a unified business process environment. A business process is...
An electrical circuit for protecting an electrical load from overload current is provided. The system includes a voltage transformer configured to receive AC mains voltage from an electric mains supply and further configured to apply reduced voltage to the electrical load. A control switch comprising metal contacts ...
A three-layer architecture is provided for implementing a software development kit (SDK) for developing blended service software applications that utilize multiple service endpoints. The three-layer architecture comprises an application programming interface (API) layer, a core layer, and a communication layer. The ...
A service definition document (SDD) framework is provided for defining blended services that utilize multiple service endpoints. The SDD framework can comprise a first category that defines a service endpoint representing a blended service, a second category that defines a plurality of service endpoints utilized by ...
Network emulation techniques are provided for dynamically varying network bandwidth and/or error rate. Network emulation can be performed by determining a bandwidth range, determining a plurality of specific bandwidth values distributed across the bandwidth range, and dynamically varying available bandwidth among th...
A method for processing information fed by a user via an inputting means is provided. The method enables, firstly, receiving a set of directional elements via a user interface. The set of directional elements represent textual or non-textual information fed by the user. Secondly, the method enables interpreting the ...
A method and system for managing communication between a plurality of team members are provided. The method includes, at a first agent associated with a team member, receiving inputs from a team member about an event associated with one or more team members. The method further includes sending an event request to ag...
A natural language query tool comprising cascaded conditional random fields (CRFs) (e.g., a linear-chain CRF and a skip-chain CRF applied sequentially) processes natural language input to produce output that can be used in database searches. For example, cascaded CRFs extract entities from natural language input th...
A method and system for reporting web standard non-compliance of web pages is provided. The method includes receiving a local copy of the web page to be tested for web standard non-compliance. The method further includes determining a set of errors on the web page corresponding to a user specified accessibility guid...
Systems, methods, and computer-readable code stored on a non-transitory media for mining association rules include determining a minimum support threshold and a minimum confidence threshold for association rule mining; determining a sampling model; sampling transactions from a transaction dataset; mining association...
A framework for articulating value-centric information technology design is presented. The framework can perform business value articulation, including establishing a relationship between change enablers and ultimate resulting business value. Key business process metrics of information technology services can be ass...
A multi-layer architecture is provided for elastic provisioning of virtualized computing resources. The multi-layer architecture comprises a physical hardware layer comprising a plurality of physical computing machines, a distributed operating system layer that aggregates and virtualizes the computing resources, and...
The present application relates to a computer implemented method and system for customizing a Unified Modelling Language (UML) tool for supporting a software application wherein the UML tool is implemented on a first software platform and the software application is implemented on a second software platform. The met...
A method and a system have been presented to automate the development and customization of one or more business applications. The system is disclosed in the form of a framework, such as a Rapid Design Toolkit (RDT). Various examples of business applications may include Order Management, Inventory Management, Enterpr...
The present disclosure relates to a framework to improve the predictability of performance problems in an enterprise application. In one embodiment, the present disclosure produces accurate predictive analysis by taking into consideration all the factors including workload, historical performance etc. which are sign...
A portable medical image capturing apparatus is disclosed. The apparatus includes a plurality of transducers that are enabled to capture medical imaging data of a patient. The plurality of transducers are placed on an enclosure. The plurality of transducers capture the medical imaging data when the enclosure is held...
A system and method of providing a dynamic virtual keyboard having a QWERTY or randomized layout that is displayed on a user interface to allow a user to input authentication information into a selected field. A first character key and a second character key are exchanged from their respective actual positions to mo...
The disclosed embodiment relates to identifying performance regions in time-series data. An exemplary method comprises identifying, with a computing device, one or more streaks in the time-series data based on at least one streak parameter, ranking, with a computing device, the identified streaks based on at least o...
A method, non-transitory computer readable medium and apparatus that simulates responses includes obtaining one or more requests from two or more different types of interfaces for an application. Each of the one or more obtained requests is parsed to obtain one or more components. A simulated response is fetched bas...
A system and a computer implemented method for granting a temporary overdraft automatically are described. In an example embodiment, one or more parameters are associated with a bank account and stored in a computer readable storage medium, the storage medium in operable communication with a processor. On receiving ...
A system and method for providing an efficient test case generator is disclosed. A test case project is established upon request from a user, via a user interface, to test an item. The test case project includes a plurality of fields and corresponding designated values to be tested. A first set of identified fields ...
Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user"s expectations and tolerance levels are different,...
Techniques and tools are described for refining source-code query results. For example, source-code query results for a query can be generated, semantic clusters of the source-code query results can be generated, and based on a selection of a semantic cluster option, refined source-code query results can be sent. Al...
The method for sharing data over wireless adhoc network using mobile devices comprises a step of determining a user required data on a handheld device. The method further comprises broadcasting the user required data within the wireless adhoc network. Further, the method includes detecting a plurality of devices com...
A system and method for generating functional tests to verify code migrated from a first host to a second host. In one embodiment, source code is analyzed in order to generate functional tests that can be used for testing the re-hosted application. In particular, user-input scenarios are extracted from the source co...
A gateway which provides network connectivity via network service providers. A method and apparatus can integrate the various connectivity options provided by multiple service providers and present to the user a single point of connectivity. Having more than one way of network coimectivity may provide the following ...
In accordance with various embodiments of the present invention, the electronic device checks whether a viewing application capable of rendering augmented reality (AR) is present in the electronic device. If such a viewing application is present, the viewing application identifies any augmented reality (AR) markers ...
Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding code digest, and based upon a comparison with the code digest received from the server, determines if the received conte...
Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of th...
The present invention provides a method and system for automated test for human presence at a client device capable of receiving touch sensitive response. At a server, the method includes receiving and storing user profile information. Receiving request from client device to access a resource on a server. Generating...
Systems and computer-implemented methods for managing underground assets include receiving, by a computing device, a request for clearance to excavate including a location identifier; resolving a location based on the location identifier; mapping land based data and asset data together; determining if one or more as...
Techniques and tools are described for searching source code. For example, source code can be indexed, a code structure query can be received, index records that conform to the code structure query can be identified, and code structure query results that correspond to the identified index records conforming to the c...
Systems and computer-implemented methods for managing a workforce include receiving a request for support including a location of the request for support, converting the request for support into a work ticket, classifying the work ticket, allocating the work ticket to a field operative out of a set of at least one f...
Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of sy...
The disclosed embodiment relates to a system and method for rating the accessibility of websites to disabled users. The method comprises receiving, with a computing device, ratings information from at least one user, the ratings information including ratings values of at least one website based on at least one web a...
A system and method of implementing a dynamic change in a server operating condition in a secured server network. A handling server receives a first request from a network device to access a specific service to be processed by a first application server. The handling server sends a first task to a first application ...
The disclosed embodiment relates to identifying telecom users. An exemplary method comprises collecting, with a computing device, call usage data based on the call usage of a new telecom user, comparing, with a computing device, the collected call usage data with existing call usage data stored within a call usage d...
A system and method of providing a window sorting mechanism comprises receiving an array having a plurality of objects, wherein each object contains a digit. The digits in the received array are unsorted in association with a desired sorting arrangement. A length of the received array is determined, whereby received...
A system and method for generating an account number are described. In an example embodiment, the creation of a first table and a first field, capable of receiving alphanumeric characters, is disclosed. An alphanumeric input is received and recorded in the first field, and a sequence number associated with the input...
A method, a system, and a computer program product code for generating a series of still images from an input video file are provided. The series of still images may include, but are not limited to, a comic strip and a storyboard. The method includes extracting audio and visual frames from the video file. Thereafter...
Tools and techniques are described for estimating web accessibility and remediation efforts. One or more web accessibility standards can be indicated to be included in the effort estimate. A user can indicate which individual guidelines are to be included in standard test effort estimates by selecting individual gui...
System and computer-implemented method for determining optimal combinations of elements having multiple dimensions, including determining the optimal number of destination servers for server consolidation, wherein existing servers are evaluated across multiple dimensions.
The present invention relates to a computer-implemented method, system and computer readable medium for providing context-based listing services. The method comprises registering at least one first service provider with an second service provider wherein registering comprises that the first service provider provides...
A system and method of implementing a dynamic change in a server operating condition in a secured server network comprises operating an application server, wherein the application server processes a plurality of scheduled tasks on behalf of one or more requesting network devices when in an operating mode. The schedu...
The present disclosure relates to a framework for centrally controlling a plurality of building automation systems. The architecture and method of the present disclosure automates a plurality of existing and new building automation systems comprising access control, HVAC, fire safety etc. in such a way that the plur...
Tools and techniques are provided that capture, aggregate, analyze and display soft data relating to an enterprise"s services and products, and to the enterprise itself. The soft data comprises customer feedback on services, products and the enterprise, and are based on interactions between enterprise employers and ...
A method, non-transitory computer readable medium and apparatus that obtains project data in one or more form fields of one or more remotely located user based interfaces for a project. The obtained project data from the one or more form fields of the one or more remotely located user based interfaces for the projec...
A system and method for logically masking data by implementing masking algorithms is provided. The method includes receiving one or more inputs from user regarding type of data masking to be implemented depending on type of data entry. Data entries include alphabetical data, data comprising unique codes, data compri...
According to the one aspect of the present disclosure, a method for automated datacenter power management comprises, monitoring a metrics of an entity such as a virtual machine, an application level, a host level and an application platform. The method further comprises forecasting an application power usage by usin...
A method, system and computer program product for performing a financial transaction at a transaction host are disclosed. The method includes the step of receiving, at the transaction host, a first set of information from an electronic portable device. The method further includes the step of identifying an associate...
A method preprocessing scheme that improves classification accuracy of a face recognition system comprises identifying a plurality of edges of an image. The method further comprises step of identifying a plurality of discontinuities in the plurality of edges of the image. Furthermore, the method also comprises gener...
The invention provides a method, system and computer program product for performing a shopping activity in a shopping store through a wireless computing device of a customer. The wireless computing device is equipped with an imaging device. The customer uses his/her wireless computing device to select a product to b...
A method and a system for generating one or more transition plans for one or more applications of an organization are provided. Transition information for identifying a set of applications for transition is obtained from information corresponding to the one or more applications. One or more groups of the identified ...
A system and method facilitating an end-to-end solution for one or more service offerings. The end-to-end solution includes the modeling, provisioning, and rating of a single subscription as at least one of prepaid and postpaid. The system includes a CRM layer, an integration layer, a rating and billing management l...
A method and a system for estimating a base sales volume of a product are provided. The method includes receiving sales data of the product from one or more sales data sources. Further, the method includes identifying a plurality of independent variables from the received sales data and substituting them in a regres...
The present invention provides a method, a system, and a computer program product for determining productivity of a team associated with maintenance and production support of software. The invention enables receiving one or more tickets associated with the software, the number of full time equivalent team-members (F...
A system and method for generating an alert mechanism corresponding to an organizational process. comprising one or more core systems is provided. The method includes identifying one or more events corresponding to the organizational process from one or more databases. The method further includes scanning operations...
A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is a...
The invention provides a method, system and computer program product for tracking a person in a pre-defined area. The pre-defined area includes a plurality of imaging devices placed at respective pre-defined locations to capture Images of the person. The system in conjunction with the plurality of imaging devices lo...
A communication system and method are disclosed for establishing a secure communication channel including: a server for generating and storing a first instance of a unique personalized client application associated with a first-time user on the server, a client terminal for the user to communicate with the server ov...
A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vu...
A method, system, and computer program product are disclosed for creating an OWL ontology from a Java source code, wherein the Java source code includes a plurality of Java classes. Each of these Java classes includes one or more Java members and one or more Java objects. The Java objects are used to instantiate eac...
1. A computer-implemented method for creating one or more e-commerce websites in
real-time, the method comprising:
receiving, via a user interface on a computing device, request to access a tenant"s website;
identifying, using a computer system, a tenant corresponding to the received request;
associating,...
A computer-implemented method for estimating buffering time of multimedia data packets for efficient playout of multimedia applications by a mobile device is provided. A wireless network with highest quality of service is selected from a plurality of wireless networks based on recorded information related to multime...
A system and method for estimation and analysis of operational parameters in workflow processes in order to establish effect of parameters on one or more critical parameters is provided. The method includes creating a Bayesian network including one or more operational nodes representing one or more operational param...
A method for dynamic management of one or more cloud database nodes is provided. The method enables gathering information related to usage of one or more cloud database nodes. The method further enables comparing time required by the one or more cloud database nodes for responding to one or more requests with a pred...
A system and method for matching one or more source schemas with one or more target schemas is provided. The matching between source and target schemas is performed by gathering inputs pertaining to the source and target schemas, wherein the inputs comprises a set of details in a predefined format. Thereafter, the g...
The present invention provides a method and system for end-to-end process execution. The method includes generating a model for a business process to be executed, wherein the business process comprises a first type of activity and a second type of activity. On initiation of a business process instance of the busines...
The present invention includes a method and a system for recommending at least one advertisement to a user. The recommendation is provided based on the interaction with at least two devices. The user is identified when an interactive session is initiated by the user on a device of the at least two devices. Thereafte...
A method and system have been disclosed for determining one or more performance parameters of a project. Various examples of the performance parameters of the project may include productivity, efficiency, and quality. The method described above includes defining one or more lifecycle stages of the project. Examples ...
A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. ...
The invention describes a method, a system, and a computer program product for determining the maturity of a testing organization. The testing organization may be defined as an organization that specializes or involves in testing of software/ software applications. The method utilizes a pre-determined model to asses...
The invention relates to a system and method for identifying occurrences of preventive maintenance on computer source code. The method comprises analyzing source code, defining data sets associated with characteristics of the source code, and applying an operation algorithm to the data sets to thereby identify occur...
The present invention provides a method and a system for reverse transferring knowledge of a project from a primary vendor to a secondary vendor. The reverse knowledge transfer process involves defining a seamless process for transferring knowledge of all applications of the project, without compromising on the comm...
A computer-implemented method for event matching in a complex event processing system includes receiving, with a computer processing device, a stream of event data; receiving, with a computer processing device, an event list and an access predicate list, wherein the event list includes one or more event data pairs; ...
The present invention provides a process modeling platform installed on a mobile device such as a cell phone, a laptop or a Personal Digital Assistant (PDA). The platform includes a User Interface module that enables the user to interact with the platform. The platform further includes a template module and a model ...
The invention describes a method, firmware, and computer program product for generating one or more One Time Passwords (OTPs) for one or more applications. The firmware embedded in a computational device receives one or more registration details corresponding to an application from a user. Thereafter, the firmware g...
A method and system for processing loan applications in a financial institution is provided. The method includes a step of receiving a first loan application from a first loan applicant. The first loan application includes personal information of the first loan applicant. Further, the method includes the step of det...
A method for detecting occupancy status of a plurality of conference rooms in real time is provided. The method enables, firstly, monitoring a first output signal of a first sensor. Secondly, the method enables monitoring a second output signal of a second sensor. The method further enables comparing the first and s...
A distributed hierarchical registry provides services, such as registry services, including client device discovery and communication services. The distributed hierarchical registry comprises a plurality of registry groups where a registry group comprises a plurality of registry servers. The registry servers receive...
The present invention provides a method, system and computer program product for generating a family of questions for a programming language. Generating the family of questions includes the generation of various questions from a particular compilable code, and the corresponding options for the questions. The options...
A system and method for communication between a plurality of users in a communication network are disclosed. Each of the plurality of users is associated with at least one communication device. The method includes receiving a message from a sender intended for at least one recipient in the communication network wher...
Product availability can be determined using radio frequency identification (RFID) by determining whether a RFID tag is detectable by a RFID reader and setting a product availability condition, where the RFID tag is not attached to the product, and where distance between the RFID tag and the RFID reader changes as q...
A system and method for forecasting one or more clinical pathways and resource requirements of at least one patient are provided. The system comprises an input module for receiving inputs pertaining to patient diagnostic data, the patient diagnostic data comprising information identified during diagnosis of the pati...
A method for watermarking of video content is provided. An averaged scene image is computed for each scene of video content by performing averaging of frames present in each scene of video content. For each averaged scene image a set of random numbers are generated using a secret key to identify pixels at random loc...
A method for processing a distributed query in a network of computational resources is provided. The method includes receiving a user-defined freshness criterion and a distributed query from a user. The user-defined data freshness criterion is based on the version of the distributed query results desired by the user...
A method and system to provide integrated operations management framework (lOMF) of a business enterprise is disclosed. The method includes the steps of identifying a list of entities required in a business enterprise to perform various functions, defining a list of parameters of each entities, determining the relat...
The invention describes a test bed, a method and a computer program product for testing an application installed on a wireless communication device. The wireless communication device communicates with a server over a network through the test bed. Further, the test bed is connected to the server and receives various ...
A method and system to obtain a license for a software application is disclosed. The method and system include requesting a central licensing server via a first device for initial verification and authentication of at least one user of the software application and sending a first application by the central licensing...
An automated method of enabling a real time transaction through a web service enabled supplier service network involving at least one supplier and at least one buyer is disclosed. The method includes providing a forward auction service to the at least one seller for selling at least one item and providing a reverse ...
A method for creating a join between multiple distributed extensible Markup Language (XML) documents is disclosed. The method includes determining number of elements to be compared for distributed XML documents and defining a traverse procedure for each compared element. The method further comprises of retrieving el...
The present technique includes a software framework which makes it possible for providing Business-to-Business (B2B) integration software as a service (SaaS). The framework follows a hub and spoke model wherein the hub and spoke communicate through web services. While the hub and spokes act as integration gateways w...
The present technique is an aparatus and method evalutating software performance. The method identifies performance scenarios using a knowledge base and selects the performance scenarios from a context module using operational laws. The system analyzes performance criticality of an application workload. Furthermore,...
A strategic framework enables improvements in IT system maintenance by taking IT system information as input and outputting useful metrics and/or proposed 1odifications to achieve efficiency improvements. The strategic framework also can be lescribed as an IT maintenance system assessment and modification tool. The ...
A method for accessing impact of an incident is disclosed. The incident occurs while executing one or more business processes (BPs). The method includes identifying the BPs corresponding to the incident, and identifying parameters affected by the incident. A relative importance of each parameter affected by the inci...
AN INTELLIGENT ACCESS POINT FOR DELIVERING LOCATION BASED
INFORMATION
A method for delivering location based information in wireless zone is disclosed. All the location based information is stored in the access point itself thus eliminating the need for backend server. Access point has the intelligence to deliver ...
A method for adaptive data masking of data present in a first database, the method comprising the steps of: extracting data from the first data base; providing one or more predefined rules for masking the extracted data; segregating a first portion of extracted data required for masking from a second portion of extr...
A method for evaluating the maintenance effort of the software application is disclosed. The method includes identifying the list of process quality metric parameters (PQM parameters) that impact the maintainability of the software application, computing the values for the identified list of PQM parameters. The meth...
A method to bypass the existing pay and use model to deliver services over existing wireless LAN infrastructure between mobile terminal and server is disclosed. Many of the existing WLAN infrastructures require users to subscribe to service provider to access their network. The inventive method uses internet protoco...
The present invention describes a method and a computer program product for finding an impact of a change on a computer generated code. The method includes the generation of a dependency graph for the computer generated code. The dependency graph includes a plurality of nodes that are connected logically by one or m...
CONCEPT-ORIENTED SOFTWARE ENGINEERING SYSTEM AND
METHOD FOR IDENTIFYING, EXTRACTING, ORGANIZING,
INFERRING AND QUERYING SOFTWARE SYSTEM FACTS
ABSTRACT
Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software ...
A knowledge tracking and analysis system and method. The method may include: an artifact evaluator that receives various use parameters for each knowledge artifact, operates on the received use parameters, and generates respective parameter scores; and a knowledge index calculator that compiles parameter scores and ...
11
SYSTEM AND METHOD FOR IMPROVING BANDWIDTH OF WIRELESS LOCAL AREA NETWORK
ABSTRACT
A system and method for improving bandwidth of a local area network is provided. The method includes splitting user data into multiple data fragments. The method further includes creating multiple beacon frames by placing each da...
The present invention relates to a Systems and methods of buyer-side consolidation of compatible purchase
orders are described herein. Purchase orders can be identified for consolidation using spatial and temporal proximity parameters. Purchase orders can be modified by changing a ship date or a delivery date and ...
FRAMEWORK FOR SUPPORTING REPAIR PROCESSES OF
AIRCRAFT
ABSTRACT
The invention provides a framework for supporting one or more repair processes of one or more aircraft. The repair processes are based on repair information or repair solution corresponding to the damages to one or more structural components of the ai...
A powerful set of features can assist software developers in searching source code. Source code can be queried to find occurrences of source code elements mapped to domain concepts appearing in an ontology. Queries can specify a search for occurrences of particular operations performed on domain concepts within the ...
METHOD OF TRANSMITTING INFORMATION FROM A MOTE TO
A BASE STATION
Abstract of the Invention
A method for reliably transmitting a plurality of information from one or more motes to a base station is disclosed. The method comprises establishing a first optimal path from the respective mote to the base station for tr...
A method and system to predict the financial impact of the implementation of a business framework for a business environment is disclosed. The method includes the steps of identifying a list of shifts required by a business environment to perform, defining a list of sub-shifts for each shift, describing a list of ac...
A system and method for controlling access mechanism of the contents broadcasted by the service provider (or the broadcaster) to the user (or consumer) who uses a mobile device along with specialized set of code segments comprising: a ready to use set-top box, a software to be used in a mobile device, inputting rele...
A method and system for injecting exceptions into a JAVA enterprise application during execution of the JAVA enterprise application is disclosed. The java enterprise application includes multiple Enterprise JAVA Bean (EJB) classes. The EJB classes include one or more DJB methods. Each EJB is scanned for exceptions, ...
Various techniques can be used to implement a collaborative filtering- based recommendation engine.For example, different similarity measures can be used for different users, Different similarity measures can be used for a particular user across time,A superior similarity measure can be found for a user. User-define...
A method for transmitting a video data over a grid infrastructure network is disclosed. The method includes receiving a request from at least one user for viewing the video data and identifying a plurality of attributes from a plurality primary grid enabled mini servers (GEMS), wherein the plurality of primary GEMS ...
METHOD AND SYSTEM FOR SELECTION OF REGRESSION TEST CASES FOR VALIDATION OF SOFTWARE APPLICATION
Abstract of the Disclosure
A method and a system for identifying a set of regression test cases from a plurality of test cases to validate an upgrade of a software application are provided. The invention involves record...
METHOD FOR IMPROVING EXECUTION EFFICIENCY OF A SOFTWARE PACKAGE CUSTOMIZATION
Abstract of the Invention
A method for improving execution efficiency of a software package customization is disclosed. The method includes identifying one or more components from a configuration table to implement at least one of a use ...
A METHOD FOR MANAGING MEETING AND THEIR OUTPUT
Abstract of the Invention
A method for managing a meeting is disclosed. The method will help in keeping track of details of all the Meetings / Walkthroughs / Inspections. The main objective of this method will be to capture 'Minutes of the Meeting 'Line Items' (confir...
METHOD AND SYSTEM FOR TESTING AN ORDER MANAGEMENT
SYSTEM
Abstract Of The Invention
The invention describes a method for testing the order management system. The order management system includes a set of sub-systems. An order life cycle is defined for the order management system, based on the set of sub-systems. T...
The method for developing an actionable IT service catalog at large organizations is disclosed. IT Service catalog helps IT organizations showcase the value of IT services they deliver to their business customers Service catalogs are made actionable by incorporating Service Request and Service portfolio functions f...
The present invention relates to a method for numeral classification and categorization of data elements using peer-to-peer model, said method comprising steps of choosing suitable numeral classification tree for the data elements from available classification trees in a numeral classification and categorization lay...
A method and system to authenticate human interactive proof (HIP) are described here. In response to a request from a web server, a motion random HIP in the form of motion-captcha is generated. The web server can then display the generated the motion random HIP in a requested web page. The web page is accompanied wi...
The present invention discloses a method and system for unified access control to a plurality of applications by a set of users in an enterprise through a common information model. The method includes the steps of defining a uniform enterprise access control policy according to the logical common information model f...
A system and methods to offer a one or more experiences using various layers to at least one customer is disclosed. The method includes user experience layer having a first plurality of components owned by at least one service provider to evaluate a plurality of experimental changes of the at least one customer. The...
A method and system to build a tool to automate predictive data mining system. In addition, the method automates one or more tasks for selecting multiple predictive data mining models using a set of meta-heuristic search techniques. Furthermore, the method updates one algorithm from the various classification algori...
A SYSTEM FOR MODELING ARCHITECTURE FOR RESOURCE CONSTRAINT DEVICES AND METHODS THEREOF
A communication system in a wireless sensor network adapted to provide a communication link between a plurality of nodes is disclosed. The system includes a protocol stack encapsulating a plurality of fundamental network protoc...
A method to create web 2.0 index for an online business environment is disclosed. The method includes the steps of listing web 2.0 parameters, assigning a value based score to the listed web 2.0 parameters against each online business environment and computing the web 2.0 index for each online business environment. ...
A data masking tool can support a wide variety of data sources and execution mechanism. For example, any of a wide variety of data masking techniques can be achieved via a web interface, API, command line, SOA, or the like. Connectivity to mainframe environments can be achieved. Multiple data source type and data to...
A method and system for estimating size of a testing project corresponding to one or more software applications is disclosed. The method includes identifying a set of test parameters for the testing project, counting number of each test parameter from the set of test parameters, and measuring the size of the testing...
A system for designing clusters is provided. The system comprises a repository module and a business logic module. The repository module comprises a questions and options repository and a hardware repository. The questions and options repository comprises an updatable set of questions and corresponding options. The ...
Performance tracking of computing systems can be provided by monitoring, determining performance states, and displaying health information. Capacity planning recommendations can be provided by monitoring performance of a software application, determining a plurality of performance state transitions of the software a...
A method and system for calculating the non-functional requirements (NFRs) of various interacting application in an enterprise is disclosed. The one or more NFRs are calculated, based on the direct transactions and indirect transactions on the interacting applications. The calculated NFR is used to track the thoughp...
A refrigeration cycle system is provided with a two-cylinder type rotary compressor having one compression mechanism which includes a switching mechanism for switching a back surface side of a blade between a low pressure mode and a high pressure mode and controlling the inner space of the cylinder chamber to the hi...
METHOD AND SYSTEM FOR ESTIMATING RESOURCE FACTORS
FOR EXECUTING A PROJECT
ABSTRACT
The present invention provides a method, system and computer program product for estimating resource factors for a steady state execution of a project. The resource factors are associated with a second set of resources. A required ...
PROCESS AND SYSTEM FOR ASSESSING MODULARITY OF AN OBJECT-ORIENTED PROGRAM
ABSTRACT
The present invention describes a process, system and computer program product for assessing the modularity of an object-oriented program. The process includes calculation of metrics associated with various properties of the object-...
The invention provides a method and clinical data mining system for enabling a user to derive knowledge from data corresponding to a plurality of electronic health records stored in a repository. One or more data elements are provided as an input. The data elements may include textual reports, images, and one or mor...
A method and system for searching one or more documents in a Local Area Network (LAN) is provided. The system includes a synchronization module, a link module, and a search engine. The synchronization module automatically synchronizes multiple knowledge sources, such as one or more pre-defined databases, one or more...
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is iisciosed. The method and system includes sending request by at least one user to iccess at least one application server. The user is provisioned to download a ippropriat...
METHOD AND SYSTEM FOR MANAGING ONE OR MORE PROCESSES IN A BUSINESS PROCESS CENTER
ABSTRACT
The present invention provides a system and a method for managing a customer contact center. The system includes a one click sign-in moduie, a ciient-host, and a controi moduie. The one click sign-in module enables one-click...
A method and system to mobile based money transaction across different transaction entity. A non-repuidable message, using a first mobile device, is sent to a first transaction entity expressing to provide a token wherein the mobile device is registered with the first transaction entity. The first transaction entity...
A SYSTEM AND METHOD FOR DYNAMIC MANAGEMENT AND DISTRIBUTION OF DATA IN A DATA NETWORK
ABSTRACT
A dynamic data management and distribution system to interact with network computing devices of a user is provided. The user has memory allocated in the system. The system includes an ingest module for automatically uplo...
METHOD AND SYSTEM FOR AUTOMATICALLY GENERATING MESSAGE QUEUE SCRIPTS
ABSTRACT
The present invention provides a metalloid, system and computer program product for automatically generating message queue scripts for defining one or more Websphere® Message Queue™ (WMQ) objects on one or more queue managers. A user pro...
METHOD AND SYSTEM FOR CASH TRANSFER
ABSTRACT
A method and system for transferring cash electronically from a sender to a receiver through cash machines and a mobile device is disclosed. On initiation of a transaction by a sender on a cash machine, a coupon containing details of the transaction is generated by the ...
A system and method generating a migration plan for migrating data from a first electronic medium to a second electronic medium is provided. The system comprises a migration readiness assessment module for determining a migrating recommendation; an effort estimation module for determining a total effort required for...
A framework for managing Ii. lifecycle of a program in an organization is provided. The framework includes a process module, a guiding module, a program lifecycie mapping module, and a matrix module. The process module provides a plurality of process guidelines for the one or more stages of the project management li...
A method to perform a diagnostic test in an integrated support platform having a plurality of services is disclosed. The method includes a process of building at least one or more knowledge model for each of the plurality of services in the integrated support platform. The process of building the knowledge model inc...
A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. Th...
Dynamic sections of a web page having dynamic content can be processed and received in parallel. Display of the dynamic sections can proceed in parallel. A script mechanism can be transmitted to a client, which executes the script to create a connection and receive dynamic content from a server independently for sep...
SYSTEM AND METHOD FOR FORMING APPLICATION DEPENDENT DYNAMIC DATA PACKET IN WIRELESS SENSOR
NETWORKS
ABSTRACT
A system and method for forming application dependent dynamic data packet format in a wireless sensor network is provided. The system comprises one or more sensor nodes, wherein each sensor node comprises ...
The present invention provides a method, system and computer program product for registering and authenticating a cuser using a processor card with the server. The method enables the user to create hsi login details. Further, the method enables the authentication of the user over a public network. The method also en...
METHOD AND SYSTEM FOR REGISTERING A CUSTOMER WITH AN
ORGANIZATION
ABSTRACT
The present invention discloses a method, system and computer program product for registering a customer with an organization to enable the customer to use various services through one or more delivery channels. Customer Relationship Infor...
The present invention provides a method, a system and a computer program product for defining a version identifier of a service component. The method includes determining various specification levels corresponding to the service component. Thereafter, the determined specification levels are integrated according to a...
SYSTEM AND METHOD FOR PROVIDING ENHANCED INSTANT
MESSAGING
ABSTRACT
A method of enhanced instant messaging in a communication network is provided. The method comprises instantiating an instant query message received from a message initiator as a message object. The method further comprises assigning a context ide...
A method for providing a customized application on different requesting device types of a user is provided. The method enables, firstly, receiving requests made by the user using the different device types over multiple communication channels. Secondly, the method enables assigning a rank to the user based on reques...
The present invention provides a method and computer program product for creating a data structure for representing a plurality of nodes in a network. One or more data fields are created corresponding to the plurality of nodes for storing information related to the nodes. One or more references are also created for ...
A method and system for providing an immersive surround environment for enhanced content experience is provided. The method includes receiving an encoded media stream and prcoessing the stream to obtain decoded media data. The received media stream can also be captured real-time media. The method further includes ex...
The present invention provides a method, test-bed and computer program product for testing an application installed on a wireless communication device. The wireless communication device communicates one or more messages wirelessly to a server through a test-bed. The test-bed is connected with the server and provides...
A method and system for representing and validating requirements of a software system is provided. The method includes capturing requirements of the software system. The method further includes converting the captured requirements into an executable business process definition. The executable business process defini...
The present invention provides methods for creating a factory, such as a software factory, a user experience factory, and a persistence factory, for developing one or more Java 2 Platform, Enterprise Edition {J2EE) applications. One or more artifacts related to the J2EE applications, such as code components workflo...
A method for tracking one or more portable devices in real time to detect theft of the one or more portable devices is provided. The method enables, firstly, interrogating a Radio Frequency Identification (RFID) tag via a RFID reader during successive sweep intervals. The sweep interval represents active state of th...
A system and method for extracting process sequences from application data is provided. The method includes extracting process sequences from one or more applications" historical data in a non-intrusive manner. Firstly, data events in application data sources are read and then mapped to business activities. While re...
A method and system for determining a best price to rent a multimedia content being offered for viewing by at least one service provider to a plurality of users through a communication network is provided. The service provider offers the multimedia content to the plurality of users at a base price. The method includ...
A method for communicating with one or more sensor nodes in a Wireless Sensor Network (WSN) over a network is disclosed. The method includes initiating communication with the sensor nodes by sending messages to the server application using the instant messaging system. The server application formats the recieved mes...
A method for handing cross-cutting concerns at business level while developing enterprise application is disclosed. The method identifies the common variation requirements for the common cross cutting business concerns. The method then identifies the architecture strategies to enable identified variations and based ...
A system for data exchange in multiprocessor computer system is disclosed. The system includes at least one processing module adapted to communicate with at least one of a plurality of routing modules or a plurality of buffer modules or both and at least one communicating interfaces to facilitate data exchange in mu...
A method of handling transactions in a plurality of organization embracing Service Oriented Architecture (SOA) is disclosed. The method includes invoking the transaction when at least one application registers for the transaction, by recognizing one or more services associated to the registered transaction context. ...
A method for enhancing telecom support service across one or more functions for a plurality of services is disclosed. The method includes identifying one or more stages of an operational business process for each of the function. The process of identifying one or more operation business process may be helpful for ad...
A method for assessing the performance of the projects in an enterprise is disclosed. The method includes determining one or more parameter associated for each project to evaluate performance of the project and setting the threshold value for each of the parameter determined for the respective project. The method fu...
The present invention provides a method, test-bed and computer program product for testing an application installed on a wireless communication device. The wireless communication device communicates one or more messages wirelessly to a server through a test-bed. The test-bed is connected with the server. A tester, t...
The present invention provides a system and method for parallel query processing. The system comprises a query fragment identifier module for estimating a number of sub-queries that may be formed corresponding to an input query based on a number of query evaluator nodes available for processing the input query and p...
Abstract
Natural equivalent of chemically modified starch:
The present invention relates to a composition comprising citrus fruit fiber having a water binding capacity of from 8 to 25 (w/w) and native starch selected from the group consisting of corn starch, rice flour, sorghum starch, tapioca starch and mixture t...
A method and a system are provided that transmit an alert to emergency numbers in response to an impact on a wireless communication device by using the device, which is connected to a telecommunications network. The method includes recording the acceleration value of the wireless communication device. An alert that ...
The invention provides a method of storing semantically similar documents on proximally located peers in a structured peer to peer overlay network, where each peer is assigned a unique identifier and each document comprises one or more words belonging to at least one hierarchical structured collection of words. The ...
The present technique is a system and methods to construct an accurate decision tree. The technique constructs a decision tree by a bottom-up approach. In addition, the technique mines a set of frequent itemsets from a dataset to store in a prefix tree data structure module. Additionally, the technique computes a se...
An iterative software development methods and system with balanced approach for feature based development and leveraging on at least one customized process is disclosed. The method combines an agile methodology with a plan driven approach for implementing the agile methodology in a global delivery model (GDM) enviro...
A method and system for providing context based remote advisor capabilities to users of web applications is provided. The method includes request for access to a live advisor by a user accessing a web application on an electronic communication device. The method further includes determining category of access of the...
A method and system to perform a secure conference over an IMS network is disclosed. The method and system include sending request by at least one user to access to an application server. The user is validated using a validation coupon provided by the user equipments followed by identifying and allowing the user equ...
A method for validating authenticity of identity claims of one or more communicating entities in an online transaction over a network is disclosed. The method includes extracting identity information of the first communicating entity by the second communicating entity during online transaction and prompting a client...
Messages can be delivered to end-user communication devices for playback to users of~he end-user communication devices during call progress events by selecting messages to deliver and delivering the selected messages to the end-user communication device, where the end-user communication device stores the messages a...
Middleware interposed between a mobile client device and a server can limit rendered online services to those appropriate to a context for the mobile client device. For example, characteristics of the mobile client device, the type of
connection, and the like can be taken into account when deciding which online se...
The invention describes a computer-implemented method and system for assessing the progress of a project in terms of its schedule. The method includes receiving project data and based on the project data, calculating a first period (PE) after which a current earned value (EV) was expected to be realized. The method ...
Simulation techniques for measuring the performance of J2EE applications are described.Simulation models for J2EE systems are generated which utilize one or moresimulation components comprising queuing centers.The queuing centers empoy logic to components and waiting to unlock until a response is received from every...
A system for providing interoperability among a plurality of taxonomies belonging to a domain is disclosed. The system includes a classification layer for standardizing the taxonomies by assigning a predetermined unique number to each taxonomic name, node and element and a translation layer logically coupled with th...
The present invention provides a method, system and computer program product for managing real-time execution of transactions between a plurality of network devices. The plurality of network devices include one or more middleware, which synchronize details, such as the state of the transactions, between the network ...
Delivery of non-standard frame field information can be accomplished by publicly broadcasting the non-standard frame field information in one or more broadcast frames within an open wireless computing network. The broadcast can be received by a client wireless device when the client wireless device has not establish...
A system and method for managing resources comprising a server adapted for interacting with at least one control system to schedule multiple jobs using at least one resource is disclosed. The system further comprises an agent adapted for monitoring execution of the at least one resource and a database server adapted...
The present invention provides a configurable domain specific abstract core (DSAC) for implementing applications within any domain. The DSAC comprises at least one function specific abstract module (FSAM) configurable at a plurality of stages for implementing a predetermined function belonging to one or more applica...
A method for processing a message received by a client device over a mobile communication network is provided. The method enables, firstly, applying one or more predetermined rules on the message. The one or more predetermined rules facilitate modifying the message by removing unwanted words therefrom. Secondly, the...
A framework for implementing Business Intelligence (BI) solutions at an organization level is provided. The framework includes an architecture module, a process module, an operations and support module, a governance module and a delivery module. The architecture module includes an execution architecture, an operatio...
A method, implemented at least in part by a computing device, for
determining an implementation size of a software package implementation project using
a sizing framework, the method comprising:
determining implementation sizes for one or more modules of the software package;
determining one or more tasks to be ...
USER INTERFACE DEVELOPMENT TOOLS
Abstract of the Invention
A user interface tool can use a repository of user interface elements to create a user interface. One or more of the elements in the repository can be reused within the interface or among multiple interfaces. At least some of the elements have associated b...
A system adapted for analyzing performance and scalability of at least one computer system is disclosed. The system include a monitoring module configured for capturing at least one metric of an application for analyzing performance and scalability and a performance knowledge repository created and represented by us...
The invention discloses a method, system and computer program product for making secure payments. A customer selects one or more items to be purchased. The customer then enters an authentication detail and a dynamic password, also referred to as a One Time Password (OTP), on an Electronic Data Capture device for aut...
A method and system for implementing automatic recovery from failure of resources in a grid-based distributed database is provided. The method includes determining the category of each node in the subgroup of nodes, where the determination identifies each node as at least one of a worker node and an idle node. The m...
The present invention provides a method and system for evaluating the knowledge risk maturity (KRM) of a team executing a project and to check the progress of the project. A method for quantifying knowledge risk maturity coefficient (KRMC) of the team and a method to identify the skills required by the team members ...
A system and method for measuring, monitoring and controlling electrical power directed through one or more electricity directing devices is provided. The one or more electricity directing devices includes electrical sockets supplying power to one or more devices. The system includes a potential transformer configur...
A system and method for delivering location based information. The methods determine multiple user location and deliver various location based information for the multiple user locations. The method continues to scan a network to locate presence of various wireless local area network (WLAN) devices in a particular z...
Grid Computing Systems and Methods Thereof
[0070] A grid computing system is disclosed. The system is adapted to execute at least one workflow having a set of predefined operating parameters and includes an execution module comprising a plurality of devices having a plurality of heterogeneous resources, wherein t...
Enterprise data and syndicated data can be integrated by obtaining enterprise data, obtaining syndicated data from a syndicated data provider, performing various processing on the enterprise and syndicated data such as recast processing, fringe compensation, event identification, and/or event matching, and outputtin...
A method for identifying user interface and character components from a captured digital image of a desktop application is provided. The captured digital image is binarized by converting the captured digital image into a plurality of binary pixels. Further, the plurality of binary pixels is segmented and thereafter,...
A method for representing the content on a display device in the form of graphical widgets overlaid over the video stream is disclosed. The method includes formatting content obtained from content source into extensible Mark-up Language (XML) format and providing the XML formatted content available on at least one o...
The present invention provides a method, a system, and a computer program product for determining an effort associated with the maintenance of software. The method, the system, and the computer program product enable receiving values corresponding to predefined factors, which are segregated into corrective factors, ...
TASK DECOMPOSITION WITH THROTTLED MESSAGE PROCESSING IN A HETEROGENEOUS ENVIRONMENT
Abstract of the invention
Tasks for a business process can be decomposed into subtasks represented by messages. Message processing can be throttled in a heterogeneous environment. For example message processing at subtask nodes can...
The present invention provides a method and system for managing various Regulations, Policies and Risks (RPR). These RPR are managed for supporting Governance, Risk and Compliance requirements of an organization. The method includes defining a tree structure for a context. The tree structure is defined for one or mo...
The invention describes a method, a tour planner, and a computer program product for planning a tour for a group including one or more travelers. In various embodiments of the invention, the tour planner enables a traveler to select a travel route and simultaneously share the selected travel route with at least one ...
The invention provides a method, system and computer program product for analyzing a service based system. Business model data including one or more activities is received. A plurality of service characteristics is determined from the business model data for each activity group. The plurality of service characterist...
A method to construct the decision tree using a FAST algorithm is disclosed. The method includes building the prefix tree from the set of records of the dataset. The prefix tree may be traversed to count the frequency of a predictor attribute value stored in each nodes of the prefix tree. The frequencies counted are...
A system and method for providing real-time alert message to one or more subscribers in a service provider network is provided. The service provider network may be an enterprise, a communication service provider or a hosted service. A throttler application receives request for alert message generated by an alert ori...
METHOD AND SYSTEM FOR EXTRACTING DATA-POINTS FROM A DATA FILE
Abstract Of The Invention
The present invention provides a method, system and computer program product for extracting data-points from a data file. A data-point is extracted in a data-base by pointing at a portion of computer recognizable text in the da...
A method and system for enabling multi-tenancy for software as a service application is provided. The method includes defining a plurality of policy configuration files for each tenant of the SaaS application. The method further includes identifying a tenant and tenant-context for the SaaS application. Thereafter, t...
The present invention provides a method system and computer program product for evaluating risk mitigation plan alternatives, to manage the risks related to a business process. A criteria model is defined, including one or more criteria agents which fate risk mitigation plan alternatives are evaluated. Weights are ...
The present invention provides a method, system and computer program product for estimating the productivity of a team for a project. The project includes various activities that are performed using an Extract, Transform and Load (ETL) tool. The method includes identifying the level of language of the ETL tool from ...
A method for managing load in a networK comprising a first set of hosts, a second set of hosts and a centralized server is provided. A virtual machine runs on each of the first set of hosts. The centralized server receives resource donation information from each of the second set of hosts that are underutilized. Fur...
A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score...
A method for providing Applications to one or more requesting devices is provided. The method comprises a step of first receiving an application request from the one or more requesting devices. The method includes extracting details of the request. The method further includes generating Extensible Markup Language st...
The present invention provides a method, system and computer program product for determining a reuse factor associated with a set of resources available for a project. The method includes identifying the set of resources from a repository. The predetermined saved effort associated with the set of resources is also d...
An electronic book locator can be a hand-held or a mounted device for locating or cataloguing books. One or more images of book spines can be processed using character recognition methods to electronically recognize book identification information appearing on the book spine. Locations of books in a book storage are...
METHOD AND SYSTEM FOR MANAGING INFORMATION TECHNOLOGY (IT) INFRASTRUCTURAL ELEMENTS
ABSTRACT
The present invention provides a method, system and computer program product for managing the Information Technology (IT) infrastructural elements of multiple organizations. The system monitors various IT infrastructural e...
METHOD AND SYSTEM FOR GENERATING AN INCLUSITIVITY INDEX OF AN ORGANIZATION
ABSTRACT
The present invention provides a method, system and computer program product for generating an inclusivity index of an organization. The inclusivity index is generated for various groups of individuals employed by the organization....
Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple lev...
METHOD AND SYSTEM FOR MANAGING ONE OR MORE PROCESSES IN A BUSINESS PROCESS CENTER
ABSTRACT
The present invention provides a system and a method for managing a customer contact center. The system includes a one click sign-in module, a client-host and a control module. The one click sign-in module enables one-click ...
SYSTEM AND METHOD FOR ASSESSING THE USABILITY AND ACCESSIBILITY OF WEB 2.0 FEATURES AND FUNCTIONALITIES
OF WEBSITES
ABSTRACT
A system and method for accessing the usability and accessibility of a website includes generating a checklist of accommodations corresponding to an accessibility metric of the website, sel...
The present invention provides a method, system and computer program product for optimizing business processes in an organization. Each business process to be optimized is characterized by one or more performance indicators. One or more process characteristics are identified corresponding to each of the performance ...
A system, method and computer program product for the root cause analysis of the failure of a manufactured product is disclosed. The present invention includes the development of a knowledge model, based on information obtained from historical warranty claim forms and various manufacturing data sources. The inventio...
A system and method for automatically generating the universe from the documented MS-Excel file is disclosed. The methods for the Generate Universe, Migrate Universe, Update Universe and Document Universe are disclosed. The method helps in reduction of build effort of the project and removes the problem of corruptio...
SYSTEM AND METHOD FOR REPORTING CHANGE OF AREA EVENT
ABSTRACT
A system and method for reporting change of area event is provided. The method comprises the steps of receiving a Location Service (LCS) request from an LCS Client to report a change of area event for a User Equipment (UE) for a predetermined location; ...
SYSTEM AND METHOD FOR PROVIDING LOCATION BASED REMINDERS
ABSTRACT
A system and method for providing location based reminder is provided. The method comprises the steps of instructing mobile switching center to remind user on reaching a predetermined location via transaction input; forwarding the transaction input ...
SYSTEM AND METHOD FOR TRANSFERRING DATA USING VARIANCE
BASED MESSAGING
ABSTRACT
A system and method for providing data transfer from a source node to a destination node in a network using variance based messaging is provided. The method comprises the steps of receiving one or more messages by the source node;...
METHOD AND SYSTEM FOR MANAGING ONE OR MORE PROCESSES IN
AN ORGANIZATION
ABSTRACT
The present invention provides a method, system and computer program product for managing one or more processes in an organization. The system enables a user to define various process clusters. The process clusters include various as...
A method for scheduling a piurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system 100 is disclosed. The method includes receiving (402) a first computation job by a scheduling DPU (308) from the plurality of computation jobs. Further, the method includes scheduling (40...
The present invention provides a method and computer program product for creating an ordered data structure for storing a plurality of data elements. The data elements to be stored are first arranged in an order. A plurality of keys is then generated for the ordered data elements such that the keys may be arranged i...
The invention provides a method and system for managing projects on a network platform. The invention enables a buyer to make a buy request for a project on a network platform. The buy request includes various requirements of the project. In response to the buy request, various sellers provide submissions for the pr...
METHOD AND SYSTEM FOR DEVELOPING A META-MODEL SCHEMA
ABSTRACT
The present invention provides a method, system and computer program product for developing a meta-model schema on the basis of one or more requirements associated with an enterprise process. The method includes defining various sets of meta-models base...
METHOD AND SYSTEM FOR MANAGING PASSENGER AND VEHICLE
SAFETY
ABSTRACT
A method and system for managing passenger and vehicle safety is disclosed. The method includes registering a passenger based on an identification parameter received from the passenger when the passenger boards a vehicle. The method further incl...
A system and method for performing testing of data at a data warehouse is provided. The methodology of the invention describes steps to develop and further invoke one or more data quality-accuracy test cases from a framework. The data quality-accuracy test cases check the sanity of the data stored at the data wareho...
An approach to determine the service demand of various resources of any individual server (present in a cluster of servers), given the overall transaction throughput and utilization values of these resources, in case of a network load balanced scenario is disclosed. The method proposes a quantitative approach to cal...
A framework for securing a source code base during the development phase of a software development lifecycle is provided. The framework includes an aspect package module and a validator package module. The aspect package module integrates security routines into the source code base. The aspect package module include...
A framework for supporting transition of one or more applications of an organization is provided. The one or more applications are transitioned from a first set of users to a second set of users. The framework includes a transition module, a knowledge capture module, a knowledge validation module, and a collaboratio...
A method, system, and computer program product for initiating a plurality of incident and service requests are provided. Outages are checked corresponding to the incident and service requests. If the outages exist, they are displayed and mapped to the incident and service requests. If the outages do not exist, they ...
METHOD FOR EVALUATING PROJECT
ABSTRACT
The present invention provides a method, system and computer program product for evaluating a project. The project includes one or more tasks. A plurality of stakeholders is assigned to each task. The stakeholders include a task owner and one or more external stakeholders. Ea...
The present invention provides a method and a system for providing at least one communications service to one or more service providers by a communications service provider. Communications capabilities of the communications service provider are sliced into a plurality of virtual slices and each of the plurality of v...
SYSTEM, WIRELESS COMMUNICATION DEVICE AND METHOD FOR COMBINING COMPATIBLE SERVICES
ABSTRACT
The present invention provides a system wireless communication device, method and computer program product for combining one or more compatible services a current service. A user of a wireless communication device is subscr...
The invention provides a method, a system, and a computer program product for managing and distributing knowledge tips in an organization. A member of the organization submits a knowledge tip and one or more data points corresponding to the knowledge tip in a Tips Management System (TiMS). The member associates the ...
A system and method for assessing and remedying accessibility of websites is provided. The method includes receiving a website address for assessment, an accessibility guideline and level of assessment to be performed from the user. The method further includes crawling the website for extracting information. The inf...
A system for managing and reporting data from a plurality of data sources for at least one user is disclosed. The plurality of data sources contain data related to one or more undertakings of the at least one user. The system includes a data collection module that collects data from the plurality of data sources. Fu...
A method and system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs from the user, the correct information of the said captcha & the user's input is compared. If the user's input and the cor...
METHOD AND SYSTEM FOR IDENTIFYING SOFTWARE APPLICATIONS
FOR OFFSHORE TESTING
ABSTRACT
The present invention provides a method and system for evaluating a plurality of software applications for offshore testing. A criteria model including one or more criteria for assessing the viability of offshore testing is defi...
The present invention provides a method and system for optimizing the performance of a service according to the load on the service. The invention includes altering the quality of various sub-ordinate services that are a part of the service and in turn achieving systemic service performance levels that satisfy presc...
The invention provides a method, a system, and a computer program product checking for human interaction dynamically to enable access to a resource in a computing environment. The method comprises collecting a plurality of objects. For each object, a plurality of properties is defined. A set of objects is selected f...
The present invention includes a method and a system for creating Web Ontology Language (OWL) ontology from a Universal Business Language (UBL) process diagram. The UBL process diagram includes one or more processes, one or more partitions, one or more activities, one or more objects, an initial node, and a final no...
A blended service creation environment is provided for developing blended service software applications that utilize multiple service endpoints. The blended service creation environment comprises a software development kit, a graphical service creation environment, and service endpoint simulators. Blended services c...
A system and method for implementing automatic self-configuration of a software component for servicing consumer requests is provided. The method includes receiving a consumer request for a software service by the software component. The method further includes creating one or more rules for defining one or more sig...
[0001] A method for creating workload model to test performance of a critical application in a data processing network (112) is disclosed. The method includes receiving (202), at one of the plurality of data processing units (114a), an activity log with a plurality of entities from the data processing network (112)....
Disclosed herein is a system which address the problem of multiple mappings of a source ICD code to a target ICD code by using an adaptive mechanism to automatically convert to a target ICD code with the help of accompanying data and associated rules. The mechanism is based on analysis of the ICD code description, a...
Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding code digest, and based upon a comparison with the code digest received from the server, determines if the received conte...
A system and method is disclosed of implementing a production planning module that is configured to optimize overall costs associated with reconfiguring a production facility during a changeover between to produce a another product family over a plurality of cycles. User input data is received via a user interface a...
The present disclosure relates to a system and a method for installing an application on a client machine. The installation program of the application is stored in a repository and the user requires appropriate permissions to access the repository. The user provides authentication details to the server which in turn...
Methods, apparatus, and computer-readable media for analyzing the prospective quality of source code produced according to a class representation (e.g., a UML class diagram) are disclosed. According to one embodiment, a class-level representation of a software application is received, one or more object classes of t...
Composite applications can be created that utilize a plurality of different services across a plurality of different cloud stack layers. The composite applications are defined using the Service Component Architecture (SCA) model. Composite applications can be translated from the SCA model into a format compatible fo...
An augmented reality system is necessary for providing assistance for the customer in retail purchase decision. The augmented reality system comprising a one data sending module which is configured to send retail product information to the central server module is provided. A central server module configured to rece...
A method and a system disclosed for determining measures being taken across an organization based on the performance specifications of a cross-level value-chain. The method includes designing the value-chain. The value-chain defines various strategic business goals, such as customer goals, financial goals, and diffe...
A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal ide...
A fast booting computer apparatus includes one or more processors and a memory comprising a hard disk drive and a solid state drive coupled to the one or more processors. The one or more processors are configured to execute programmed instructions stored in the memory. The solid state drive is configured to store an...
The present disclosure describes a method of sentiment oriented slang for opinion mining. With increasing use of internet, many users can submit their review comments directly to the companies which can be automatically processed and summarized with critical issues from time to time and help the company get real tim...
The embodiments herein provide a method and system for determining availability of a software application using Composite Hidden Markov Model (CHMM). The software application is divided into plurality of layers which are further divided into sub-components. The configurations and dependencies of the sub-components a...
Embodiments of the disclosure relate to a method and system for establishing sorting order for events from a plurality of systems. Central Unique Identity Service (CUIS) provides a unique ID to a client for an event. The client is a service provider registered with the CUIS. User is a subscriber of the client. The U...
A method and a system for determining a skill matrix of an employee is provided. The method comprises analyzing the employee's folksonomic behavior and consequently creating the skill matrix of the employee. Folksonomy comprises creating one or more tags to annotate and categorize web content. The system includes a ...
Systems and methods for deriving a service level agreement for an application hosted on a cloud platform are defined. In accordance with at least one embodiment, deriving the service level agreement comprises packaging the application for deployment on a cloud platform, executing the packaged application in a sandbo...
Embodiments of the disclosure relate to a method and system for measuring preventability metric of an application. The preventability metric quantifies the extent to which bugs and failures, and the causes for failures are diagnosed in the application. Also, the extent to which appropriate preventive or corrective a...
A method for detection of eye comprises computing an average inter-ocular distance for a given face. The method further comprises, detecting of a skin region of the given face. Furthermore, the method comprises identifying a search region for the given face. The method may also comprise computing an actual inter-ocu...
A method for space and resource optimization comprising, receiving a plurality of inputs. The method also comprises transforming the plurality of inputs into one or more of but not limited to: an algorithmic graph or a structural graph based on a domain specific area using a processor. Furthermore heuristics are cre...
A computer-implemented method for facilitating interoperation between communication devices of different networks following different protocols is provided. The computer-implemented method enables creating a virtual device. The virtual device is a software representation of a first communication device in a first ne...
AUTOMATED DATA WAREHOUSE MIGRATION
ABSTRACT
Systems, apparatus, computer-readable storage media, and methods are disclosed for allowing analysis, migration, and validation of data'from a source environment (such as an RDBMS system) to a target environment (such as a data warehouse (DW) appliance). In one example, ...
SYSTEM AND METHOD FOR CUSTOMIZING PRODUCT LIFECYCLE MANAGEMENT PROCESS TO IMPROVE PRODUCT EFFECTIVENESS
ABSTRACT
A method for improving product effectiveness of a New Product Development (NPD) process by customizing a Product Lifecycle Management (PLM) of an organization is provided. The method comprises diagnosin...
System and Method for Establishing Communication Network
A system (10) adapted for establishing a communication network is disclosed. The system (10) includes a plurality of access points (12,20,28,36), wherein each access point includes a plurality of devices (46,48,50,52,54,56) adapted to operate in communication...
A system for creating and managing a framework for integrating a plurality of business processes is disclosed. The system includes a first tier module adapted for managing at least one internal function and at least one service of the plurality of business processes, wherein each of the business process includes a p...
A method and a system have been disclosed for the preemptive detection of occurrence of one or more faulty conditions based on the usage of one or more resources. The faulty conditions are detected during an execution of a program; the program includes at least one function. The method includes initializing Applicat...
SYSTEM AND METHOD FOR ANALYZING NETWORK BANDWIDTH
The present invention relates to a system and method comprising, estimating the workload generation by an application under development at an early stage in the lifecycle. In these aspects, using actual business volume data, use case details and the screens associ...
Middleware can accept transaction requests from a client device and tailor the request to a backend transaction server. The server's response can be tailored to the client device. For example, characteristics of the client device such as screen real estate and supported functionality can be taken into account when g...
The invention provides a framework for developing the architecture of an enterprise information technology (IT) eco-system for an organization. The framework includes a business function appliance module, a core architecture appliance module, and a technology architecture appliance module. The business function 'app...
The present invention provides a method and system for generating testing templates suitable for the testing of ERP package based solutions. Functional test cases are prepared from real-life business processes as defined by industry standard and best practices. The test cases are reusable and can be used for any fut...
Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some embodiments, a user of a cloud computing service mat provides data storage may securely delete his stored set of data by acquiring elevated access privileges to t...
SYSTEM AND METHOD FOR MANAGING PLAYOUT TIME IN PACKET
COMMUNICATION NETWORK
A system (10) for dynamically managing packet delay of at least one received packet of data (k) between multiple endpoints is disclosed. The system (10) includes a delay estimator module (12) adapted to calculate packet delay of the at lea...
Methods, systems, and computer-readable storage media for selecting one of a plurality of information technology (IT)-led innovation projects include obtaining a plurality of IT-led innovation projects. A selection of one or more research projects for each of the obtained IT-led innovation projects is determined bas...
A system and computer-implemented method for creating one or more e-commerce websites in real-time is provided. The methodology for creating one or more e-commerce websites in real-time comprises receiving, via a user interface on a computing device, request to access a tenant's website. The methodology further comp...
A system and method for managing sports related information in real-time are provided. The system comprises a user interface module configured to receive data pertaining to one or more sports and sports related persons; a repository module configured to store the collected data; and a sports module configured to pro...
Disclosed are methods and computer program product for securing data corresponding to one or more data fields of a form by providing data integrity, confidentiality and non-repudiation. The present invention includes providing one or more controls for enabling selection of at least one security type for each of the ...
Systems, methods, and computer-readable media for anonymizing data include: intercepting a communication; identifying sensitive data in the communication; transmitting the sensitive data to an anonymization engine; receiving masked data from the anonymization engine; and transmitting the masked data.
...
AUTHENTICATION USING NQN-BIOMETRIC AND BIOMETRIC SYSTEMS
An access system in one embodiment that first determines that someone has correct credentials by using a non-biometric authentication method such as typing in a password, presenting a Smart card containing a cryptographic secret, or having a valid digital sig...
A system and method for extracting flowchart information from digital images is provided. The method includes converting the digital flowchart image into a grayscale image and then binarizing the image. The method further includes extracting and masking text data from the binarized image. Further, flow lines connect...
A method for providing applications to one or more requesting devices is provided. The method comprises a step of first receiving an application request from the one or more requesting devices. The method includes extracting details of the request. Further markup language structure for corresponding page of the appl...
[Class : 42] Computer Consulting Services In The Field Of Business Process Management, In Particular Relating To Enterprise Application Migration Solution Covering All Aspects Of New Technology Implementation, Providing Of Quantitative Reports To Highlight The Product Ratings Against Customer Scenarios And Details Budget Estimates; Providing On Line Information On The Subjec...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Computer Media, Including Cards, Tapes And Computer Listing Paper, Brochures, Catalogues, Advertising Material And Price Lists; Leaflets For Handling Information, Printed Programs For Use With Computers, Computer Software And Computer Programs; Computer Programming Manuals, Data Charts And Tapes; Circuit Diagrams And Drawings; User Manuals, Data Charts And Tapes...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software And Programs; Computer Operating Programs; Magnetic Data Carriers, Recording Discs, Data Processing Equipment And Computers; Computer Peripheral Devices And Software For The Electronic Transmission Of Messages, Images, Speech, Sound, Documents And Data Via A Global Network; Computer Software For Use With A Local Area Network, A Wide Area Network...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
View +1 more Brands for Pearl Infosys Technologies Private Limit Ed.