摘要:
A computer implemented method, apparatus, and computer program product for identifying positional data for an object moving in an area of interest. Positional data for each camera in a set of cameras associated with the object is retrieved. The positional data identifies a location of each camera in the set of cameras within the area of interest. The object is within an image capture range of each camera in the set of cameras. Metadata describing video data captured by the set of cameras is analyzed using triangulation analytics and the positional data for the set of cameras to identify a location of the object. The metadata is generated in real time as the video data is captured by the set of cameras. The positional data for the object is identified based on locations of the object over a given time interval. The positional data describes motion of the object.
摘要:
A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a pre/post security area within an airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives inference data comprising inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score.
摘要:
A computer implemented method, computer program product, and data processing system for performing analysis on a plurality of data stored in a database. In an illustrative method, a first cohort is generated from the plurality of data. An optimal control cohort is generated from the plurality of data. Generating is performed based on the first cohort and at least one constraint, and a mathematical process is used to derive the optimal control cohort. A first inference is generated based on a comparison of the first cohort to the optimal control cohort, wherein the first inference is absent from the database. In an illustrative example, the first inference is stored.
摘要:
Inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The first inference relates to identifying anomalous behavior of cohorts members, which identification can be used to identify crimes that are particularly difficult to detect, such as identity theft. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with the corresponding datum, data regarding hierarchies associated with the corresponding datum, data regarding a corresponding source of the datum, and data regarding probabilities associated with integrity, reliability, and importance of each associated datum. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data.
摘要:
A computer implemented method of producing macro-view conclusion data related to a seismic event. The method includes receiving at a processing center a set of data related to a parameter of a seismic event. The parameter is measured using a vibration sensor of a hard disk drive of a computer at a known, fixed location, wherein the vibration sensor produces the set of data. The method further includes processing the set of data at the processing center to produce the macro-view conclusion data. The macro-view conclusion data is then stored in a storage device.
摘要:
An invention for comparing utility and warranty of services in an information (IT) stack is provided. The invention determines, at each layer of the IT stack, a required utility and warranty (RUW) value for each of a set of services, wherein the RUW value represents a desired solution for implementing a business process; determines, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack; and compares the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.
摘要:
A computer hardware-implemented method, system, and/or computer program product generate an activity recommendation based on an identified non-synthetic event element in an electronic file. A context-based search of a database of electronic files is performed to identify a common synthetic event in all of the electronic files, where the synthetic event is a non-executable descriptor of a set of context-related factors. Each electronic file that contains the common synthetic event is a relevant electronic file. Each of the relevant electronic files are searched for at least one non-synthetic event element, wherein the non-synthetic event element is an event element that is absent from the synthetic event. A recommendation, based on the identified non-synthetic event element, is generated. A set of binary data, which includes the synthetic event, the relevant electronic file, the non-synthetic event element, and the recommendation, is then transmitted to a client.
摘要:
A processor-implemented method, system, and/or computer program product generates a recommendation for a worker to be included in a project team. A requisite skill set that is not presently needed, but will be needed in the future, by a project team is determined. Historical data that describe antecedent conditions, which caused a historical worker to obtain the requisite skill set, is received. A candidate worker's current skill set data is adjusted with skill set enhancers, which are available to members of the project team, to generate a predicted future skill set of the candidate worker. In response to the needed requisite skill set matching the predicted future skill set of the candidate worker, a recommendation is generated for adding that candidate worker to the project team.
摘要:
A processor-implemented method, system, and/or computer program product directs a user using a physiological sensor to a needed medical resource. A real-time state of a medical condition of a user is determined based on readings from a physiological sensor on a user. A processing system correlates the real-time state of the medical condition of the user to a medical resource, which has been predetermined to have a capability of ameliorating the real-time state of the medical condition of the user. Directions are then sent, to the user, for a temporally nearest medical resource that has been predetermined to have the capability of ameliorating the real-time state of the medical condition of the user.
摘要:
A computer hardware-implemented method, system, and/or computer program product identifies non-synthetic event elements in electronic files. A first set of binary data that describes a synthetic event is received from a requesting computer. The synthetic event is a non-executable descriptor of a set of context-related factors. A processor performs a context-based search of a database of electronic files to identify a relevant electronic file, which includes the synthetic event. The processor then searches the relevant electronic file for at least one non-synthetic event element, which is absent from the synthetic event. In response to determining that the relevant electronic file comprises the non-synthetic event element, the processor transmits a second set of binary data to the requesting computer. This second set of binary data includes the relevant electronic file and a description of an identified non-synthetic event element in the relevant electronic file.