Abstract:
The disclosed embodiments illustrate methods and systems for data processing to predict domain knowledge of a user for content recommendation. The method includes extracting a set of features from user data based on at least a domain-of-interest. The method further includes categorizing each feature in each set of the extracted set of features into one of a plurality of categories. The method further includes determining a domain literacy weight of the user for each category of the plurality of categories based on at least an average weight associated with each set of the extracted set of features in each category. The method further includes predicting the domain knowledge of the user based on at least the determined domain literacy weight associated with each category. The predicted domain knowledge is further utilized for the content recommendation to the user.
Abstract:
Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.
Abstract:
A method of producing a variable data design file for use in production of personalized copies of a reference 3D object may include receiving a plurality of fixed structural parameters for a reference object and receiving information for creation of a plurality of variable structural parameters corresponding to variable data regions on the reference 3D object. The method may include using the plurality of fixed structural parameters to develop an instruction set configured to cause a 3D printing device to form a 3D object that exhibits the plurality of fixed structural parameters; and including, in the instruction set, instructions for creating the plurality of variable structural parameters based on the received information that will cause the 3D printing device to render at least one of the plurality of variable data regions in the 3D object, wherein the variable data region differs from a corresponding region of the reference 3D object.
Abstract:
A method of extracting data embedded in a 3D object includes a 3D scanning device scanning a 3D object and extracting data embedded as physical representations in the 3D object. A processing device will identify, from the extracted data, instructions for performing an action on the data such as: displaying at least a portion of the data, transmitting at least a portion of the data to an external database, transmitting at least a portion of the data to an external application, or receiving user input for handling the data. The processing device may be part of the 3D scanning device or part of another device or system that is in communication with the 3D scanning device. The method includes performing the action, and returning a result of the action to a user of an electronic device. It may also include receiving a user selection of the portion of the data.
Abstract:
A method and system for embedding a database in a 3D object uses a 3D dimensional printing device and a computer-readable memory that stores a build sequence comprising instructions that, when executed by a processor, will cause the 3D printing device to form a three-dimensional object with an embedded data structure by depositing layers of build material and by including, in one or more of the layers, physical representations that represent a data structure.
Abstract:
The disclosed embodiments illustrate methods and systems for determining strategies in crowdsourcing. The method includes generating first graphs representative of an association between workers, between crowdsourcing tasks, or between workers and crowdsourcing tasks, at first time instance. The method includes determining values of metrics associated with first graphs, comparing determined values of metrics and threshold values of metrics, and generating second graphs based on comparison. The second graphs are representative of an association between workers, between crowdsourcing tasks, or between workers and crowdsourcing tasks, at second time instance. The second time instance precedes first time instance. Thereafter, the method includes determining strategies based on second graphs. The strategies comprise recommendation to a first set of workers for attempting a first set of crowdsourcing tasks or recommendation to first set of workers for increasing interaction with second set of workers. The method is performed by one or more microprocessors.
Abstract:
A system and method for enabling safety in and for initial impromptu meetings facilitated by electronic devices. Prior to the meeting, participants each download a same generated event ticket and the public key of the other meeting participant. At the meeting location, each individual's electronic device via a mobile application initiates close-proximity communication with the other mobile application; signs the ticket with its stored private key; exchanges signed tickets; verifies the received signed ticket using the downloaded public key; and compares the verified signed ticket with the downloaded ticket to authenticate the other individual.
Abstract:
A method of creating a secure audit trail for transactions may include, by a host electronic device, for each of a plurality of transactions, receiving, from a client electronic device, a transaction details document that summarizes the transaction, generating a document hash by performing a first cryptographic hash function on the received transaction details document, and identifying metadata associated with the transaction. The method may include generating an entry hash associated with the plurality of transactions by performing a second cryptographic hash function on at least the document hash of each transaction in the plurality of transactions and the metadata associated with each transaction in the plurality of transactions, and storing the entry hash in an entry in a transaction log database.
Abstract:
A method of processing a specification may include receiving, by a home site, information regarding a search for at least one good or service, automatically generating, by the home site, a specification comprising a command block, an origin block and a routing block, based on the received information, and transmitting, by the home site, the specification to the one or more destination marketplaces. One or more of the command block, the origin block and the routing block may include one or more domain-specific language instructions. The command block may include one or more instructions defining the search and one or more instructions defining one or more actions to perform with respect to results of the search. The origin block may include information identifying the home site. The routing block comprises information identifying one or more destination marketplaces.
Abstract:
The present invention generally relates to systems and methods for document redaction. The disclosed techniques adapt to the needs of different levels of data sensitivity and different needs for disclosure or analysis by using pre-defined templates related to use cases, and mapping those to the relative sensitivity of private data types both in their natural form and after redaction by various redaction types. In this way, data is given the appropriate level of protection within the needs of a given use case.