摘要:
A processor-implemented method, system, and/or computer program product protects sensitive data in a received transmission. A network interface receives a data transmission, which includes multiple units of data. Any sensitive data in the received data transmission is identified by the recipient according to a pre-determined rule. Identified sensitive data from the data transmission is then encrypted.
摘要:
A processor-implemented method, system, and/or computer program product generate a recommendation to add a member to a receptivity cohort. A receptivity cohort is made up of members who share a conduct attribute, which is a facial expression, body language, and/or social interaction of a person. The conduct attribute has been predetermined to be an indicator of a level of receptiveness to a proposed future change in a set of circumstances. Biometric sensor data, which describe the facial expression, body language and/or social interaction for a candidate member, are retrieved from a set of biometric sensors. The retrieved biometric sensor data for the candidate member is compared to the conduct attribute of members of the receptivity cohort. In response to the biometric sensor data for the candidate member matching the conduct attribute of members of the receptivity cohort, a recommendation is generated to add the candidate member to the receptivity cohort.
摘要:
A processor-implemented method, computer program product, and/or computer system predicts a future event. A first bit array, which describes characteristics of a single entity while experiencing a first event, is generated using values received from a set of physical test devices. After the first single entity experiences a different second event, a second bit array is generated from another set of physical test devices. The second bit array describes characteristics of an event cohort, which is made up of entities, other than the single entity, which also experience the second event, but which never experienced the first event. When another single entity experiences the first event, a determination is made as to whether that other single entity has characteristics from both the first bit array and the second bit array. If so, a prediction is made that the other single entity will also experience the second event.
摘要:
A computer implemented method, system, and/or computer program product optimizes systems usage. A work request is decomposed into units of work. A processor selectively sends each unit of work from the work request to either a first system or a second system for execution, depending on a work constraint on each unit of work and/or system constraints on the first and second systems.
摘要:
A computer implemented method, program product, and/or system allocate human resources to a cohort. At least one attribute held by each member of a group of human resources is identified. A request is received, from a planned cohort, for multiple human resources that collectively possess a set of predefined attributes, wherein no single human resource possesses all of the predefined attributes. The set of human resources that satisfies the request is identified and assigned to the planned cohort.
摘要:
A processor-implemented method, system, and/or computer program product generates and utilizes synthetic context-based objects. A non-contextual data object is associated with a context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A request for a data store that is associated with the synthetic context-based object results in the return of at least one data store that is associated with the synthetic context-based object.
摘要:
A context-based graph-relational intersect derived (CB-GRID) links a real entity graph node to a synthetic entity graph node. The real entity graph node comprises a pointer to a primary key in a first tuple that non-contextually describes the real entity. A primary relational database comprises the first tuple that non-contextually describes the real entity. A context relational database comprises a second tuple that contains a foreign key that matches the primary key in the primary relational database. The second tuple dynamically describes a context of data in the first tuple. A contextual entity relational database comprises a third tuple that contains data from the first tuple and the second tuple. The synthetic entity graph node describes a synthetic entity that is described by data in the third tuple, such that the contextual entity relational database links the real entity graph node to the synthetic entity graph node.
摘要:
A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. The accuracy values and weighting values are utilized to dynamically adjust inputs to the downstream subcomponent until an output from the downstream subcomponent meets a predefined trustworthiness level.
摘要:
A processor-implemented method, system, and/or computer program product guides mobility-impaired pedestrians. Mobile tracking readings are received from multiple mobility assistance devices, each of which has an affixed tracking device. Based on these mobile tracking readings, multiple pedestrian routes for mobility-impaired pedestrians, including an optimal pedestrian route that has the highest tracking history to a desired destination, are generated.
摘要:
A computer-implemented method, system, and/or computer program product monitors operational conditions of a cargo ship. A baseline composite vibration pattern is established from readings generated by multiple smart sensors. Each of the multiple smart sensors is a uniquely-identified smart sensor that has been affixed to one of multiple intermodal shipping containers that have been loaded onto a cargo ship, and each smart sensor includes a vibration sensor for detecting mechanical vibration. Subsequent readings are then taken from the multiple smart sensors to generate a new composite vibration pattern. In response to the new composite vibration pattern being different from the baseline composite vibration pattern, the new composite vibration pattern is matched with a known composite vibration pattern in order to identify a cause of the new composite vibration pattern.