Abstract:
A computer-implemented method of managing medical device safety comprises communicatively coupling a recall portal hosted on a network server to a health network and a computer database of medical records. Further, initiating a medical device recall through the recall portal and the health network. A consumer contact information associated with a medical device to be recalled is queried. A medical recall information is sent to the consumer contact information accessed from the computer database of medical records.
Abstract:
Various technologies related to managing a medical device recall are implemented. Automated recall functions can facilitate an efficient and effective recall process. Full lifecycle of the recall process can be managed including communication with patients and replacement of devices, as well as auditing and regulatory compliance. Via the technologies described herein, healthcare providers can manage a successful medical device recall. Unique device identification, electronic health records, electronic medical records, and nationwide health information networks can be supported. A unique device identifier-centric approach can support a very high degree of automation and avoid errors during any of a variety of segments in the medical device recall life cycle.
Abstract:
The present invention provides a method and system for determining a time-to-failure of an asset. A probabilistic non-linear model of a limit state of the asset is simulated and approximated by a predetermined set of particles. A numerical scheme for computation of a conditional probability distribution of a size of the defect, based on a value of the limit state is evaluated. A set of future values of a weight factor of each particle is predicted based on an initial assigned value. The predicted set of future values can be updated on capturing a new set of inspection data. A probability of the time-failure of the asset is estimated by summing the weight factor of a set of particles, the set of particles comprising particles at which the limit state is less than a zero limit threshold.
Abstract:
The technique relates to a system and method for learning and learning oriented assessment of at least one learner based on a role to be performed by the at least one learner. This technique involves identifying knowledge areas related to a particular role to be performed by the learner. Under each knowledge area different learning workflows are identified and relevant topics are mapped to the learning workflows. The performance expectation from the learner at each learning workflow level is defined. The one more challenges related to the mapped topics are created and presented to the learner to solve and a score is generated for solving the challenges. This score is compared with the predefined performance expectation to determine the learning effectiveness of the learner and a capability index is computed for the learner.
Abstract:
A method, non-transitory computer readable medium and transaction management device comprising receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data. The received data is decrypted using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data. One or more actions are performed on the decrypted data
Abstract:
A system, medium and method for testing an end-to-end software application is disclosed. A structured business process model (BPM) representative of a set of business requirements for an end-to-end software application to be tested is first generated. The generated structured BPM is validated in association with one or more validation rules. A functional flow layout representative of a node structure embodying all possible scenarios to be handled by the software application is then generated. A plurality of functional flow paths is identified from the functional flow layout, wherein each functional flow path is associated with one or more corresponding scenarios of the possible scenarios. One or more test cases for each identified functional flow path is then generated.
Abstract:
The technique relates to a system and method for estimating an impact of changing one or more source files in a software based on a clone dependency graph. This technique involves extracting the source files from a repository and detecting code cones present in the source files. After detecting the code clones the clone dependency graph is created. Several graph metrics are calculated and applied to the clone dependency graph to estimate the impact of changing a source file on other source files of the software. Finally, the output is visualized with the help of graph visualization technique.
Abstract:
A system and method of providing a dynamic virtual keyboard having a QWERTY or randomized layout that is displayed on a user interface to allow a user to input authentication information into a selected field. A first character key and a second character key are exchanged from their respective actual positions to modified positions. Mapped information associated with the exchanged original and modified positions of the first and second character keys is stored in a memory. Selection by the user of at least the displayed first character key in the modified position by the user is detected and the stored mapped information is retrieved from the memory of the first character key, wherein the first character key is translated to the second character key based on the retrieved mapped information. An authentication array including the second character key is sent to a server to authenticate the user.
Abstract:
Systems and methods are disclosed for a policy-based, power consumption management of resources. Power consumption data is relayed to an event management system for conducting a pattern analysis of the resources based on historical values and external factors. The event management system may provide a graphical interface for implement decisions pertaining to resource management and effective policy enforcements. The energy management system is further configured to communicate with a data layer to receive measured values.
Abstract:
A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output.