-
公开(公告)号:US20200285227A1
公开(公告)日:2020-09-10
申请号:US16880102
申请日:2020-05-21
发明人: Ezra Spiro , Andre Frederico Cavalheiro Menck , Anshuman Prasad , Arthur Thouzeau , Caroline Henry , Charles Shepherd , Jennifer Yip , Joanna Peller , Marco Diciolla , Matthew Todd , Peter Maag , Spencer Tank , Thomas Powell
摘要: Systems, methods, non-transitory computer readable media can be configured to accessing a target sensor log corresponding to a first machine; accessing one or more prior sensor logs corresponding to the first machine and one or more prior sensor logs corresponding to a plurality of second machines which are of the same type as the first machine; accessing a plurality of computer readable logs corresponding to the first machine and the second machines, the computer readable logs for each second machine comprising a maintenance log comprising a plurality of maintenance task objects, each maintenance task object comprising a time and a maintenance task type; determining a set of statistical metrics characterising a difference between the target sensor log and each prior sensor log; selecting a sub-set of the prior sensor logs in dependence upon the statistical metrics; analysing the maintenance logs to correlate each prior sensor log included in the subset to one or more correlated maintenance tasks; selecting a priority maintenance task based on the sub-set of prior sensor logs, t and the correlated maintenance tasks; and outputting the priority maintenance task.
-
公开(公告)号:US20190340531A1
公开(公告)日:2019-11-07
申请号:US16513360
申请日:2019-07-16
摘要: A method of processing sensor logs is described. The method includes accessing a first sensor log and a corresponding first reference log. Each of the first sensor log and the first reference log includes a series of measured values of a parameter according to a first time series. The method also includes accessing a second sensor log and a corresponding second reference log. Each of the second sensor log and the second reference log includes a series of measured values of a parameter according to a second time series. The method also includes dynamically time warping the first reference log and/or and second reference log by a first transformation between the first time series and a common time-frame and/or a second transformation between the second time series and the common time-frame. The method also includes generating first and second warped sensor logs by applying the or each transformation to the corresponding ones of the first and second sensor logs.
-
公开(公告)号:US20190286538A1
公开(公告)日:2019-09-19
申请号:US16434655
申请日:2019-06-07
发明人: Jesse Rickard , Peter Maag , Jared Newman , Giulio Mecocci , Harish Subbanarasimhia , Adrian Marius Dumitran , Andrzej Skrodzki , Jonah Scheinerman , Gregory Slonim , Alexandru Viorel Antihi
摘要: A method and system for data pipeline monitoring receives an event data object and a current status data object from one or more subsystems of a pipeline. The system analyzes the event data object and the current status data object to determine a first and second validation value. The system, in response to determining that either the first or second validation value is not valid, sends a notification.
-
公开(公告)号:US10362133B1
公开(公告)日:2019-07-23
申请号:US14750773
申请日:2015-06-25
发明人: Peter Maag , Tom O'Brien , Peter Tosirisuk , Saad Abdali , Carl Freeland , Greg DeArment , Maciej Albin , Matthew Lynch , Phillip Worton-Cross
摘要: Various systems and methods are provided that allow reviewers to review and potentially flag processed communication data in order to spot potential malfeasance or illegal activity. Certain systems and methods includes modules for removing duplicate data from the communication data files, generating thread data for email data files, generating lexicon tag data for the data files, removing blacklisted data that meets blacklisted criteria, or generating group association data.
-
公开(公告)号:US10354196B2
公开(公告)日:2019-07-16
申请号:US15841984
申请日:2017-12-14
发明人: Ezra Spiro , Andre Frederico Cavalheiro Menck , Anshuman Prasad , Arthur Thouzeau , Caroline Henry , Charles Shepherd , Joanna Peller , Jennifer Yip , Marco Diciolla , Matthew Todd , Peter Maag , Spencer Tank , Thomas Powell
摘要: Systems, methods, non-transitory computer readable media can be configured to access a plurality of sensor logs corresponding to a first machine, each sensor log spanning at least a first period. Access first computer readable logs corresponding to the first machine, each computer readable log spanning at least the first period, the computer readable logs comprising a maintenance log comprising a plurality of maintenance task objects, each maintenance task object comprising a time and a maintenance task type. Determine a set of statistical metrics derived from the sensor logs; determine a set of log metrics derived from the computer readable logs. Determine, using a risk model that receives the statistical metrics and log metrics as inputs, fault probabilities or risk scores indicative of one or more fault types occurring in the first machine within a second period.
-
公开(公告)号:US20180174086A1
公开(公告)日:2018-06-21
申请号:US15839745
申请日:2017-12-12
CPC分类号: G06Q10/06313 , G05B23/0283 , G06F11/3476 , G06N20/00 , G06Q10/04 , G06Q10/06 , G06Q10/0631 , G06Q10/0635 , G06Q10/103 , G06Q10/1097 , G06Q10/20
摘要: A method of assigning a task to a resource in a multiple resource environment is performed by one or more processors or special-purpose computing hardware. The method includes receiving task information relating to at least one task to be performed by a resource in the multiple resource environment. The method also includes determining a cost value for each task, the cost value indicating a cost incurred if a maintenance event occurs during performance of the respective task. The method also includes receiving predictive maintenance information in relation to each of the multiple resources in the multiple resource environment, the predictive maintenance information indicating a likelihood of a maintenance event with respect to each of the multiple resources in the multiple resource environment. The method also includes allocating the at least one task to one of the resources in the multiple resource environment dependent on the predictive maintenance information of the multiple resources and the calculated cost score.
-
公开(公告)号:US20180173216A1
公开(公告)日:2018-06-21
申请号:US15838122
申请日:2017-12-11
CPC分类号: G05B23/0283 , G05B23/0237 , G06F11/0766 , G06F11/3003 , G06F11/3089 , G06F11/3476 , G06F16/219 , G06Q10/06 , G06Q10/20
摘要: Systems, methods, and non-transitory computer-readable media can be configured to perform receiving a notification of a maintenance event associated with a resource. The method includes retrieving historic maintenance data in relation to the resource with which the fault is associated, the maintenance information originating from a time period preceding the time of the maintenance event. The method includes identifying at least a portion of the retrieved historic maintenance data as being indicative of the maintenance event. The method also includes causing the portion of the retrieved historic maintenance data identified as being indicative of the maintenance event to be stored as a precursor signal of the maintenance event. The method also includes causing future maintenance data received from a plurality of resources related to the resource with which the maintenance event is associated to be monitored to predict a future occurrence of the maintenance event in the plurality of resources.
-
公开(公告)号:US20170357562A1
公开(公告)日:2017-12-14
申请号:US15498258
申请日:2017-04-26
发明人: Jesse Rickard , Peter Maag , Jared Newman , Giulio Mecocci , Harish Subbanarasimhia , Adrian Marius Dumitran , Andrzej Skrodzki , Jonah Scheinerman , Gregory Slonim , Alexandru Viorel Antihi
IPC分类号: G06F11/32 , G06F9/54 , G06F3/0481 , G06T11/20
CPC分类号: G06F11/328 , G06F3/0481 , G06F9/542 , G06F11/3024 , G06F11/3409 , G06F17/30144 , G06T11/206
摘要: A method and system for data pipeline monitoring receives an event data object and a current status data object from one or more subsystems of a pipeline. The system analyzes the event data object and the current status data object to determine a first and second validation value. The system, in response to determining that either the first or second validation value is not valid, sends a notification.
-
公开(公告)号:US10996665B2
公开(公告)日:2021-05-04
申请号:US16880102
申请日:2020-05-21
发明人: Ezra Spiro , Andre Frederico Cavalheiro Menck , Anshuman Prasad , Arthur Thouzeau , Caroline Henry , Charles Shepherd , Jennifer Yip , Joanna Peller , Marco Diciolla , Matthew Todd , Peter Maag , Spencer Tank , Thomas Powell
摘要: Systems, methods, non-transitory computer readable media can be configured to accessing a target sensor log corresponding to a first machine; accessing one or more prior sensor logs corresponding to the first machine and one or more prior sensor logs corresponding to a plurality of second machines which are of the same type as the first machine; accessing a plurality of computer readable logs corresponding to the first machine and the second machines, the computer readable logs for each second machine comprising a maintenance log comprising a plurality of maintenance task objects, each maintenance task object comprising a time and a maintenance task type; determining a set of statistical metrics characterising a difference between the target sensor log and each prior sensor log; selecting a sub-set of the prior sensor logs in dependence upon the statistical metrics; analysing the maintenance logs to correlate each prior sensor log included in the subset to one or more correlated maintenance tasks; selecting a priority maintenance task based on the sub-set of prior sensor logs, t and the correlated maintenance tasks; and outputting the priority maintenance task.
-
公开(公告)号:US10937034B2
公开(公告)日:2021-03-02
申请号:US16297028
申请日:2019-03-08
发明人: Peter Maag , Tom O'Brien , Phil Cross , Sarun Peter Tosirisuk
摘要: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed to assist in detection of financial malfeasance. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data (such as trades, emails or chat messages) and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster, and the clusters may be displayed and ranked based on their scores. Various embodiments may enable an analyst to review clusters of trades, emails and/or chat messages that are the most likely to reveal financial malfeasance.
-
-
-
-
-
-
-
-
-