Abstract:
A framework for centrally controlling a plurality of building automation systems. The architecture and method automates a plurality of existing and new building automation systems comprising access control, HVAC, fire safety etc. in such a way that the plurality of building automation systems can be monitored and controlled from a central dashboard. The central dashboard effectively monitors, takes right decisions and remotely controls the buildings across the globe from a centralized location.
Abstract:
Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps.
Abstract:
A method and system for injecting exceptions into a JAVA enterprise application during execution of the JAVA enterprise application is disclosed. The Java enterprise application includes multiple Enterprise JAVA Bean (EJB) classes. The EJB classes include one or more EJB methods. Each EJB is scanned for exceptions, and corresponding interface points of the EJB. The exceptions are automatically injected at the corresponding interface points based on scanning the EJB. The exceptions are then thrown to callers of the EJB methods. The exceptions are thrown before beginning execution of business logic of the EJB methods. Finally, the response of the JAVA enterprise application to the injected exceptions is analyzed.
Abstract:
A method, system and computer-readable media for detecting scene changes in a video that includes providing by one or more computing devices a plurality of passes through the video where a plurality of detected scenes from a first pass in a conventional method are identified and a second pass through the detected scenes are provided by the computing device. A plurality of scene boundary differences corresponding to the detected scenes, a fixed average, and a varying average are computed by the computing device. The scene boundary difference is compared with the fixed average and the varying average and if the scene boundary difference is less than the fixed average and the varying average, the detected scenes are combined else the detected scene being an abrupt scene change is determined. The steps of computing a varying average to combining the detected scenes are repeated by the computing device.
Abstract:
A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.
Abstract:
A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device.
Abstract:
A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data.
Abstract:
Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps.
Abstract:
A system and method of providing a window sorting mechanism comprises receiving an array having a plurality of objects, wherein each object contains a digit. The digits in the received array are unsorted in association with a desired sorting arrangement. A length of the received array is determined, whereby received array is separated into a plurality of sub-arrays based on the length of the received array. An inter sub-array digit sorting process is performed in a first iteration between a first sub-array and a second sub-array to sort digits in correspondingly positioned objects in accordance with a first comparison rule. A first adjacent-object digit sorting process is performed in a second iteration on the first and second sub-arrays using simultaneously sorting windows of a first digit size in accordance with a second comparison rule. A second adjacent-object digit sorting process is then performed in a third iteration on the first and second sub-arrays using sorting windows of a second digit size.
Abstract:
The present disclosure describes a method of sentiment oriented slang for opinion mining. With increasing use of internet, many users can submit their review comments directly to the companies which can be automatically processed and summarized with critical issues from time to time and help the company get real time feedback from its customers. The method comprises, receiving at least one document comprising a plurality of sentiment oriented slang. The next step of the method comprises identifying the plurality of sentiment oriented slang in the at least one document. Further, a polarity score of each of a slang word identified is determined and sentiment information is displayed on an output device as an output.