摘要:
A computer implemented system and method for managing a stack containing a plurality of documents. The system scans and manages documents provided by the users in form of batches. Multiple users can provide the documents to be managed in form of a stack that contains the documents separated by separating pages and submission forms. The submission forms are then identified by the system to identify the batches and allot track numbers to the identified batches for future reference. Documents within the batches are identified by the separating pages and are allotted barcodes for identification. These documents are scanned and processed to obtain quality checked images of the documents which are then stored in a central repository. The system allows the users to change/set prioritization of a request or document type and also allows automatic indexing, routing of the transactions, processing, quality checking, and modification in the scanned images.
摘要:
A system(s) and method(s) for secure session establishment and secure encrypted exchange of data is disclosed. The system satisfies authentication requirement of general networking/communication systems. It provides an easy integration with systems already using schemes like DTLS-PSK. The system follows a cross layer approach in which session establishment is performed in a lightweight higher layer like the application layer. The system then passes resultant parameters of such session establishment including the session keys to a lower layer. The lower layer like the transport layer is then used by the system to perform channel encryption to allow exchange of encrypted data based on a cross layer approach, over a secure session. As the exchange of data becomes the responsibility of the lower layer like the transport layer, the data is protected from replay attacks since the transport layer record encryption mechanism provides that kind of protection.
摘要:
A method(s) and system(s) provide a non-intrusive sensing and instrumentation of work processes performed in computing environment. The method includes providing a pre-defined collection of work processes covering the entire activities to be performed by the end user on the IT system. Each of the process steps of the work processes are assigned with a meta-data. The method further includes obtaining a plurality of measures for each of the process step and obtaining task performance metrics by analyzing the plurality of measures. Furthermore, the method includes collecting a set of actions being performed by the user on the IT system. The method further includes identifying the work processes performed by the user and subsequently, identifying the task performance measures of the user by comparing the identified work processes with the task performance metrics.
摘要:
A computer implemented system and method for lightweight authentication on datagram transport for internet of things provides a robust authentication scheme based on challenge-response type of exchanges between two endpoints sharing a pre-shared secret. A symmetric key-based security mechanism is utilized in the present disclosure where key management is integrated with authentication. It provides mutual authentication wherein the end-points in the system are provisioned with a pre-shared secret during a provisioning phase and a client database is provided at the server side for client identification. The system comprises random number generators for generation of nonces, and key generators to generate secret key and session key. The nonces and keys are valid only during the session and thus help in providing secure authentication across sessions.The system can be further adapted on transport layer security protocols like DTLS and can be integrated with application layer protocols like CoAP for constrained devices.
摘要:
Methods and systems for selecting an appropriate forecasting model for accurate workload prediction of a processor is disclosed. The processor is configured to monitor workload and extract workload history of the processor for a given time interval. Further, the processor is configured to create plurality of forecasting models based on the extracted workload history and apply the group of forecasting model on the extracted workload history to obtain a plurality of predicted future workload for the given time interval. Further, the processor is configured to compute an error measure of the plurality of predicted future workload in reference to an actual workload of the processor and select the appropriate forecasting model from plurality of the forecasting models having least error measure among the computed error measures for dynamically scaling frequency and voltage required by the processor and thereby optimizing energy consumption in the processor.
摘要:
Methods and systems for selecting an appropriate forecasting model for accurate workload prediction of a processor is disclosed. The processor is configured to monitor workload and extract workload history of the processor for a given time interval. Further, the processor is configured to create plurality of forecasting models based on the extracted workload history and apply the group of forecasting model on the extracted workload history to obtain a plurality of predicted future workload for the given time interval. Further, the processor is configured to compute an error measure of the plurality of predicted future workload in reference to an actual workload of the processor and select the appropriate forecasting model from plurality of the forecasting models having least error measure among the computed error measures for dynamically scaling frequency and voltage required by the processor and thereby optimizing energy consumption in the processor.
摘要:
A computer implemented system and method for extracting and recognizing alphanumeric characters from traffic signs is envisaged. A camera present in the system is adapted to be mounted on the vehicle for capturing images of traffic signs. The system then gives a region of interest (ROI) within the frame of the captured image, from where the alphanumeric characters are extracted and enhanced for recognition. For recognizing the enhanced alphanumeric characters, the image is converted to binary image and morphological thinning technique is applied on it. The space then obtained between two alphanumeric characters thus helps in extracting the characters and recognizing them independently from the captured image. For each extracted alphanumeric character is re-sized to a specified size and is recognized with the help of white pixels count. Once the alphanumeric characters are recognized they are displayed on a display.
摘要:
Present disclosure provides a process for the synthesis of visible light responsive doped titania photocatalysts. The process involves step a) milling a mixture containing titania and a precursor compound, the compound selected from the group consisting of chloroauric acid and a mixture containing chloroauric acid and silver nitrate, in the presence of water and oxide milling media, at a temperature in the range of 20 to 50° C. for a period of 60-120 minutes, to form a slurry, wherein the amount of water is in the range of 15 to 25% by weight of the total mixture; and b) filtering the slurry to separate the oxide milling media and obtain a filtrate containing doped titania nanoparticles.
摘要:
A system(s) and method(s) for secure session establishment and secure encrypted exchange of data is disclosed. The system satisfies authentication requirement of general networking/communication systems. It provides an easy integration with systems already using schemes like DTLS-PSK. The system follows a cross layer approach in which session establishment is performed in a lightweight higher layer like the application layer. The system then passes resultant parameters of such session establishment including the session keys to a lower layer. The lower layer like the transport layer is then used by the system to perform channel encryption to allow exchange of encrypted data based on a cross layer approach, over a secure session. As the exchange of data becomes the responsibility of the lower layer like the transport layer, the data is protected from replay attacks since the transport layer record encryption mechanism provides that kind of protection.
摘要:
A computer implemented system for audio watermarking for providing robust and blind audio watermarking. The system comprises a watermark embedding system wherein an audio signal is divided into audio frames, multi-level District Wavelet Transform (DWT) is applied on each frame, followed by Singular Value Decomposition (SVD) and embedding the watermark, further followed by inverse SVD and inverse DWT to get watermarked audio frames which are combined to generate a watermarked audio signal. The system further comprises watermark extracting detection system wherein the watermarked audio signal which may be attacked and/or modified is divided into watermarked audio frames, multilevel DWT is applied on each watermarked audio frame, followed by SVD, extracting the embedded watermarked, correlating the extracted watermark with pre-stored watermarks, calculating Peak to Sidelobe ratio (PSR) from the correlation coefficient arrays and finally comparing each PSR with a threshold to authenticate the embedded watermark.