Abstract:
A computer system (100) enables real-time business event monitoring and tracking by means of a client-server computer asynchronously acquiring (110) physical event data from a variety of network-connected (105) data collection devices (102), processing the event data on the basis of the knowledge and history of previous events, and analyzing the event data using business logic/rules, filters, and/or other criteria to identify (115) “significant” business events for real-time communication to a network (120) of clients (122). The system (100) is bi-directional in that it also receives business information requests from the clients (122) and processes the requests in the light of the knowledge and history of previous client requests to generate a plurality of device-specific control commands for execution on one or more of the data collection devices (102).
Abstract:
A method for tracking one or more portable devices in real time to detect theft of the one or more portable devices is provided. The method enables, firstly, interrogating a Radio Frequency Identification (RFID) tag via a RFID reader during successive sweep intervals. The sweep interval represents active state of the RFID reader. Secondly, the method enables receiving one or more pairing information from the RFID tag. Further, the method enables comparing the one or more pairing information with corresponding one or more pairing information stored in the RFID reader. Finally, the method enables generating an alert signal via the wearable-band or the one or more portable devices when the one or more pairing information does not match with the corresponding one or more pairing information stored in the RFID reader.
Abstract:
The present invention provides a method and a system for providing at least one communications service to one or more service providers by a communications service provider. Communications capabilities of the communications service provider are sliced into a plurality of virtual slices and each of the plurality of virtual slices is configured for a different service provider from among the one or more service providers. At least one communications service is provided to each of the one or more service providers through a respective configured virtual slice by the communications service provider. Each of the one or more service providers further provides the communications service to a user through the respective configured virtual slice in collaboration with the communications service provider.
Abstract:
A system and method for matching one or more source schemas with one or more target schemas is provided. The matching between source and target schemas is performed by gathering inputs pertaining to the source and target schemas, wherein the inputs comprises a set of details in a predefined format. Thereafter, the gathered inputs are processed by comparing the source schemas with the target schemas. The processing is performed to identify a set of matches between the source and target schemas based on the linguistic similarity, structural similarity and functional similarity and relationship between the source and target schemas. Subsequently, the identified matches are stored.
Abstract:
A system for data exchange in multiprocessor computer system is disclosed. The system includes at least one processing module adapted to communicate with at least one of a plurality of routing modules or a plurality of buffer modules or both and at least one communicating interfaces to facilitate data exchange in multiprocessor computer system.
Abstract:
A method and a system disclosed for determining measures being taken across an organization based on the performance specifications of a cross-level value-chain. The method includes designing the value-chain. The value-chain defines various strategic business goals, such as customer goals, financial goals, and differentiator goals of the organization. Once the value-chain is designed, outcome, input, and moderating parameters are identified to realize the strategic business goals. Thereafter, the performance of the value-chain designed to realize the strategic business goals is simulated. The performance of the value-chain is simulated in one or more scenarios to output uncertainties in achieving the strategic business goals. Thereafter, the probability of achieving the strategic business goals is determined. Subsequently, one or more measures to be taken in the organization are generated based on the have been method described above.
Abstract:
The present disclosure relates to a system and a method for installing an application on a client machine. The installation program of the application is stored in a repository and the user requires appropriate permissions to access the repository. The user provides authentication details to the server which in turn provides the user with credentials for installation. Then, the user runs a client application and inputs the credentials thereon to install the application on the client machine. The client application then installs the application available on the repository on the client machine after authenticating the client machine with the server using the credentials.
Abstract:
Systems, methods, and computer-readable code stored on a non-transitory media for mining association rules include determining a minimum support threshold and a minimum confidence threshold for association rule mining; determining a sampling model; sampling transactions from a transaction dataset; mining association rules from the sampled transactions; and transmitting mined association rules.
Abstract:
A system and method for implementing automatic self-configuration of a software component for servicing consumer requests is provided. The method includes receiving a consumer request for a software service by the software component. The method further includes creating one or more rules for defining one or more significant parameters of the software component based on requirements of the consumer request. Thereafter, current values of the one or more parameters are determined by a software agent implemented by the software component. Current values of the one or more parameters are then compared with values defined as per the created rules for checking whether requirements for servicing the consumer request are conformed. If it is determined that requirements for servicing the consumer request are not conformed, at least one parameter of the one or more parameters is configured. Following configuration of the parameter, the consumer request is executed.
Abstract:
A system and method for executing and managing a business process in a unified business process environment is provided. The methodology of the invention describes steps to execute a business process and thereafter monitor the executed business process in a unified business process environment. A business process is received in a unified business process environment. The business process comprises at least one workflow. The methodology further ascertains execution details of the at least one workflow based on a predefined attribute of the at least one workflow. Thereafter, the methodology processes the at least one workflow at a location selected from at least one of a grid processing environment and a local processing environment, based on the ascertained execution details of the at least one workflow. After which, the methodology monitors the at least one workflow, executed for processing at the grid processing environment and the local processing environment.