Abstract:
The present disclosure describes a method of sentiment oriented slang for opinion mining. With increasing use of internet, many users can submit their review comments directly to the companies which can be automatically processed and summarized with critical issues from time to time and help the company get real time feedback from its customers. The method comprises, receiving at least one document comprising a plurality of sentiment oriented slang. The next step of the method comprises identifying the plurality of sentiment oriented slang in the at least one document. Further, a polarity score of each of a slang word identified is determined and sentiment information is displayed on an output device as an output.
Abstract:
The present invention includes a method and a system for creating Web Ontology Language (OWL) ontology from a Universal Business Language (UBL) process diagram. The UBL process diagram includes one or more processes, one or more partitions, one or more activities, one or more objects, an initial node, and a final node. At least one of the processes, the partitions, the activities, and the objects are extracted from the UBL process diagram. A first OWL class, a second OWL class, and a third OWL class are created corresponding to the processes, partitions, and objects, respectively. Thereafter, an object property is created corresponding to each of the activities, the initial node, and the final node. Finally, the first OWL class, the second OWL class, the third OWL class, and each of the created object property are added to obtain the OWL ontology.
Abstract:
A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.
Abstract:
A method, non-transitory computer readable medium, and apparatus for receiving data from a cloud database. One or more queries requesting data from the cloud database are received. The one or more queries are converted from a row-store database query into a column-store database query. An optimal join plan is identified for the one or more queries using a cost based optimizer based on metadata for one or more relations in the cloud database. The optimal join plan is executed using a cloud application programming interface.
Abstract:
A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data.
Abstract:
A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.
Abstract:
A system and method to offer a one or more experiences using various layers to at least one customer is disclosed. The method includes user experience layer having a first plurality of components owned by at least one service provider to evaluate a plurality of experimental changes of the at least one customer. The method further includes user service layer having a second plurality of components owned by the at least one service provider to offer a first plurality of services for the at least one customer. The method further includes an adaptation layer, a network service layer, a protocol layer and a platform layer having one or more components to provide one or more functionalities. Additionally, the method further includes a monitoring and control layer with one or more components to build management information across the one or more layers.
Abstract:
Composite applications can be created that utilize a plurality of different services across a plurality of different cloud stack layers. The composite applications are defined using the Service Component Architecture (SCA) model. Composite applications can be translated from the SCA model into a format compatible for a virtualization platform, such as the Open Virtualization Format (OVF). Composite applications, as defined in the format compatible for the virtualization platform, can be deployed on the virtualization platform.
Abstract:
Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker.
Abstract:
The instant disclosure is related to updating an application on a mobile device without using mobile network bandwidth. The mobile device initiates the application to be updated on the mobile device to scan an encoded image of a predetermined pattern from a source. It is followed by decoding of the scanned image to extract information required to update the application. And then, updating the application on the mobile device based on the extracted information.