Abstract:
A system and method for consolidating a plurality of resources on a plurality of data processing units (DPUs) in a data processing network is provided. The method includes selecting a first DPU having a highest DPU volume among the plurality of DPUs. The method further includes calculating an angle made by a first DPU vector of the first DPU with a horizontal dimension of a multi-dimensional chart using first DPU co-ordinates from the plurality of DPU co-ordinates. Further, the method includes calculating an angle made by a first resource vector of a first resource to be assigned to the first DPU with a horizontal dimension of the multi-dimensional chart. Thereafter, the first resource is assigned to the first DPU, when a deviation of the first resource vector from the first DPU vector is minimum among the plurality of resources.
Abstract:
The present invention describes a method and a computer program product for finding an impact of a change on a computer generated code. The method includes the generation of a dependency graph for the computer generated code. The dependency graph includes a plurality of nodes that are connected logically by one or more edges. The method enables an expert to assign nodal weights to the nodes, based on their importance. The method also enables the expert to assign edge weights and distribution ratios, based on the criticality of the relationship between the nodes and their distance from the root node. Thereafter, the impact of the change is found by implementing a spreading activation technique on the dependency graph. The output gathered after the activation represents the impact of the change on the computer generated code.
Abstract:
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.
Abstract:
Systems, methods, and computer-readable media for anonymizing data include: intercepting a communication; identifying sensitive data in the communication; transmitting the sensitive data to an anonymization engine; receiving masked data from the anonymization engine; and transmitting the masked data.
Abstract:
Systems and computer-implemented methods for managing a workforce include receiving a request for support including a location of the request for support, converting the request for support into a work ticket, classifying the work ticket, allocating the work ticket to a field operative out of a set of at least one field operatives, transmitting a request for a map including data from the work ticket, receiving a map image including data relating to the work ticket, and transmitting the map image including data relating to the work ticket to the field operative.
Abstract:
Systems and methods for managing underground assets are disclosed. One or more computing devices may be used to receive a request for clearance to excavate including a location identifier, resolve a location based on the location identifier, and retrieve asset data corresponding to the location from an asset location database. The asset location database can include location data regarding the positions of a plurality of assets associated with a plurality of different asset owners and may be maintained by one or more updates regarding the positions of assets from computing devices associated with the different asset owners. The systems and methods can include determining if one or more assets are buried proximate the location based on the retrieved data and transmitting data related to the determination of assets buried proximate the location.
Abstract:
Disclosed herein is a system which address the problem of multiple mappings of a source ICD code to a target ICD code by using an adaptive mechanism to automatically convert to a target ICD code with the help of accompanying data and associated rules. The mechanism is based on analysis of the ICD code description, and analysis of accompanying data to determine a set of parameters to assist in the conversion. The rules are assigned numerical values to indicate the confidence of conversion. An adaptive mechanism is also disclosed that automatically tracks user overrides to refine the rules and the indicator values over time.
Abstract:
A system and method for processing service request in service oriented architectures to minimize service overhead is provided. The method includes invoking a software service by a client by sending service request to a server hosting the software service. The method further includes receiving the software service request by the server and determining whether one or more portions of service logic software code should be executed by the client, based on information related to client capabilities. Thereafter, service logic software code is streamed to the client partly or in-total. The client executes service logic software code provided by the server. The server is pre-configured to execute or transfer one or more portions of service logic software code to the client based on client capability information and extent of affinity of the service for server-specific resources. The server executes the software service partly or in-total based on the configuration.
Abstract:
A system, method and computer program product for forecasting one or more clinical pathways and resource requirements of at least one patient are provided. The system comprises an input module for receiving inputs pertaining to patient diagnostic data, the patient diagnostic data comprising information identified during diagnosis of the patient. The system also comprises a repository for storing data comprising at least one of patient data and pre-existing clinical pathways. The patient data comprises at least one of the patient diagnostic data received from the input module; patient historical data comprising historical treatment data of the patient and patient demographic data comprising demographic details of the patient. The system also comprises a clinical pathway forecasting module for forecasting clinical pathways by application of predetermined analytical models on the patient data and pre-existing clinical pathways. The system further comprises a resource requirement forecasting module for forecasting resource requirements of the patient.
Abstract:
A method for watermarking of video content is provided. An averaged scene image is computed for each scene of video content by performing averaging of frames present in each scene of video content. For each averaged scene image a set of random numbers are generated using a secret key to identify pixels at random locations of the averaged scene image. The secret key is associated with a watermark pattern corresponding to each averaged scene image. The identified pixels in each averaged scene image are mapped to each pixel of corresponding watermark pattern to obtain respective mapped pixels. Using respective mapped pixels, values of verification information are fetched and assigned using predetermined rules. The values of verification information are arranged to obtain first visual cryptographic share of watermark pattern for each averaged scene image.