Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 141. Отображено 141.
11-06-2009 дата публикации

System and method for personalized call treatment by using a combination of communication and data services

Номер: US20090147937A1
Принадлежит: Infosys Technologies Ltd.

A system and method for providing personalized call treatment to an incoming call by using a combination of data and communication services is provided. The system comprises a Mashup application for determining a treatment method corresponding to each incoming call based on a called person's profile and one or more predefined rules. The system also comprises a communication services platform and a data services platform coupled with the Mashup application.

Подробнее
25-10-2007 дата публикации

Grid computing systems and methods thereof

Номер: US20070250365A1
Принадлежит: Infosys Technologies Ltd.

A grid computing system, method, and computer program product, adapted to execute at least one workflow having a set of predefined operating parameters and including an execution module comprising a plurality of devices having a plurality of heterogeneous resources, wherein the plurality of devices is adapted to execute the at least one job by integrating the plurality of heterogeneous resources. The system further includes at least one grid workflow module. The grid workflow module includes a graphical user interface to provide at least one user to initiate and manage the at least one workflow based on the set of predefined operating parameters and the plurality of heterogeneous resources. Furthermore, the grid workflow module includes a manager module adapted to partition the at least one workflow into multiple jobs prior to the execution of the at least one workflow.

Подробнее
24-08-2010 дата публикации

Context-aware middleware platform for client devices

Номер: US0007783613B2

Middleware can accept transaction requests from a client device and tailor the request to a backend transaction server. The server's response can be tailored to the client device. For example, characteristics of the client device such as screen real estate and supported functionality can be taken into account when generating a tailored response. Features such as caching can avoid repeatedly contacting the backend server. Pagination and column truncation can be supported. A transaction model can represent a transaction as device independent configuration information. The transaction model can be added or changed without coding. Useful for implementing an application across a wide range of devices transparently to the backend server.

Подробнее
23-04-2009 дата публикации

ELECTRONIC BOOK LOCATOR

Номер: US20090106037A1
Автор: Rajmohan Harindranath
Принадлежит: Infosys Technologies Ltd.

An electronic book locator can be a hand-held or a mounted device for locating or cataloguing books. One or more images of book spines can be processed using character recognition methods to electronically recognize book identification information appearing on the book spine. Locations of books in a book storage area can be determined from images of the books in the book storage area. Determined book locations can be compared to designated locations and misplaced books can be indicated. A book database can be generated based on images of books. Identification information of a target book can be input into a book locator device and a location of the target book can be indicated by the device.

Подробнее
07-08-2008 дата публикации

RFID BASED PRODUCT LEVEL AVAILABILITY

Номер: US20080186167A1
Автор: Girish A. Ramachandra
Принадлежит: Infosys Technologies Ltd.

Product availability can be determined using radio frequency identification (RFID) by determining whether a RFID tag is detectable by a RFID reader and setting a product availability condition, where the RFID tag is not attached to the product, and where distance between the RFID tag and the RFID reader changes as quantity of the product changes. A system for determining availability of products using RFID can comprise a product display unit, a RFID reader, a RFID tag associated with the product display unit, and a computing device configured to set product availability conditions. In the system, distance between the RFID tag and the RFID reader changes as quantity of the product changes.

Подробнее
13-09-2012 дата публикации

SERVICE DEFINITION DOCUMENT FOR PROVIDING BLENDED SERVICES UTILIZING MULTIPLE SERVICE ENDPOINTS

Номер: US20120233595A1
Принадлежит: Infosys Technologies Ltd.

A service definition document (SDD) framework is provided for defining blended services that utilize multiple service endpoints. The SDD framework can comprise a first category that defines a service endpoint representing a blended service, a second category that defines a plurality of service endpoints utilized by the blended service, and a third category that defines execution of the blended service. Blended services can be provided by creating a model of a blended service and saving a representation of the model of the blended service in a service definition document (SDD) framework. A blended service defined in a SDD framework can be executed by receiving the SDD and executing the blended service as defined by the SDD using a service execution environment (SEE). 1. A service definition document (SDD) framework for defining blended service software applications that utilize multiple service endpoints , the SDD framework comprising:a first category of the SDD, wherein the first category of the SDD defines a service endpoint representing a blended service;a second category of the SDD, wherein the second category of the SDD defines a plurality of other service endpoints utilized by the blended service; anda third category of the SDD, wherein the third category of the SDD defines execution of the blended service.2. The SDD framework of claim 1 , wherein the first category of the SDD defines input parameters and output parameters for the blended service. 153. The SDD framework of claim 1 , wherein the SDD is defined in an extensible markup language (XML) format.4. The SDD framework of claim 1 , wherein the second category of the SDD defines service access adapters for the plurality of other service endpoints.5. The SDD framework of claim 1 , wherein the third category of the SDD defines gateways which indicate sequence flow of the blended service claim 1 , including gateways which define parallel execution claim 1 , gateways which define joining from parallel ...

Подробнее
14-02-2008 дата публикации

CONTEXT-AWARE MOBILE PORTAL

Номер: US20080040488A1
Принадлежит: Infosys Technologies Ltd.

Middleware interposed between a mobile client device and a server can limit rendered online services to those appropriate to a context for the mobile client device. For example, characteristics of the mobile client device, the type of connection, and the like can be taken into account when deciding which online services to render at the mobile client device. Useful for avoiding presentation of online services that are inappropriate, incompatible, or the like.

Подробнее
06-09-2007 дата публикации

CONTEXT-AWARE MIDDLEWARE PLATFORM FOR CLIENT DEVICES

Номер: US20070208686A1
Принадлежит: Infosys Technologies Ltd.

Middleware can accept transaction requests from a client device and tailor the request to a backend transaction server. The server's response can be tailored to the client device. For example, characteristics of the client device such as screen real estate and supported functionality can be taken into account when generating a tailored response. Features such as caching can avoid repeatedly contacting the backend server. Pagination and column truncation can be supported. A transaction model can represent a transaction as device independent configuration information. The transaction model can be added or changed without coding. Useful for implementing an application across a wide range of devices transparently to the backend server.

Подробнее
21-05-2009 дата публикации

Method for benchmarking online business environments

Номер: US20090133002A1
Автор: Jai Ganesh
Принадлежит: Infosys Technologies Ltd.

A method to create web 2.0 index for an online business environment includes listing web 2.0 parameters, assigning a value based score to the listed web 2.0 parameters against each online business environment and computing the web 2.0 index for each online business environment. The method can create a benchmark between online business environments based on indicative of the computed web 2.0 indices. The web 2.0 index for an online business environment is the calculated by aggregating the value based scores assigned to individual web 2.0 parameters. The list of web 2.0 parameters for an online business environment captures content index constituents, collaboration index constituents and commerce index constituents.

Подробнее
05-06-2008 дата публикации

CONFIGURABLE DATA MASKING FOR SOFTWARE TESTING

Номер: US20080133934A1
Принадлежит: Infosys Technologies Ltd.

A data masking tool can support a wide variety of data sources and execution mechanisms. For example, any of a wide variety of data masking techniques can be achieved via a web interface, API, command line, SOA, or the like. Connectivity to mainframe environments can be achieved. Multiple data source types and data to and from different technology platform types can be supported. The tool can support interfacing with a metadata management tool. High quality randomness can be provided by a Mersenne Twister random number generator. The tool can be useful for performing data masking during software testing without having to write data masking code.

Подробнее
11-01-2011 дата публикации

Method for semantic based storage and retrieval of information

Номер: US0007870133B2

A method of storing semantically similar documents on proximally located peers in a structured peer to peer overlay network, where each peer is assigned a unique identifier and each document includes one or more words belonging to at least one hierarchical structured collection of words. A method of searching and retrieving documents, corresponding to a search query, from a structured peer to peer overlay network is also provided.

Подробнее
07-08-2008 дата публикации

SENSOR NETWORK-BASED CONTEXT-AWARE CONTENT DELIVERY SYSTEM

Номер: US20080189170A1
Автор: Girish A. Ramachandra
Принадлежит: Infosys Technologies Ltd.

A dynamic and extensible architecture allows the selection and delivery of content in light of current context, including shopper in-store location information. Both static and real-time operation are supported. Business events can be generated based on information derived from sensors, from other business events, or both. A rich context supporting a wide variety of conditions can be supported, including shopper in-store location, shopper history, shopper in-store shopping path, and the like. Content can be delivered in a personalized, shopper-specific manner, according to any condition indicated in the current context. Content directed to store operational staff, such as out-of-stock notifications, can also be supported. New devices or applications can easily be added to the system. Context relevant content can be delivered via a variety of mechanisms, including the shopper's own cell phone to enable a cost effective delivery channel.

Подробнее
16-08-2011 дата публикации

Managing real-time execution of transactions in a network

Номер: US0008001080B2

Real-time execution of transactions can be managed between network devices. A method for managing real-time execution of transactions can comprise receiving one or more transactions, storing details associated with the one or more transactions, and synchronizing the details from a first network device to a second network device. Synchronizing details can comprise checking network connectivity between devices. Synchronization middleware can comprise a command engine, a synchronization engine, and a request-response engine. Synchronization middleware can be configured to process transactions, comprising checking network connectivity and determining whether transactions have expired. A method for managing real-time execution of transactions can comprise receiving real-time transactions from applications running on a network device, determining whether a network connection to a second network device is operational, if the connection is operational synchronizing the transactions, and if the ...

Подробнее
04-01-2011 дата публикации

Methods and systems for secured access to devices and systems

Номер: US0007864987B2

An access system in one embodiment that first determines that someone has correct credentials by using a non-biometric authentication method such as typing in a password, presenting a Smart card containing a cryptographic secret, or having a valid digital signature. Once the credentials are authenticated, then the user must take at least two biometric tests, which can be chosen randomly. In one approach, the biometric tests need only check a template generated from the user who desires access with the stored templates matching the holder of the credentials authenticated by the non-biometric test. Access desirably will be allowed when both biometric tests are passed.

Подробнее
13-12-2007 дата публикации

PRE-CREATING VIRTUAL MACHINES IN A GRID ENVIRONMENT

Номер: US20070288224A1
Принадлежит: Infosys Technologies Ltd.

Virtual machines can be pre-created in a grid environment. Pre-created machines can be of a tiny configuration to avoid consuming resources. A request for a virtual machine in the grid can be granted by ballooning a pre-created tiny virtual machine to a larger configuration. The tiny pre-created virtual machine can be advertised as being of a non-tiny configuration. Agents can work in concert to coordinate handing requests for a virtual machine in the grid. The virtual machine can be initialized before it is reduced to a tiny configuration. Ballooning the virtual machine can take considerably less time than creating it from scratch. Thus, high performance computing can be provided on virtual machines in a grid environment, enabling virtual machine technology to be applied in a wide variety of grid-based scenarios.

Подробнее
15-01-2013 дата публикации

Method and system for integrated scheduling and replication in a grid computing system

Номер: US0008356303B2

A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system 100. The method includes receiving a first computation job by a scheduling DPU from the plurality of computation jobs. Further, the method includes scheduling the first computation job at a first set of DPUs in the grid computing system based on first scheduling criteria. Furthermore, the method includes scheduling the first computation job at a first DPU from the first set of DPUs based on second scheduling criteria. The method also includes storing information about the first computation job and the first set of DPUs in a history table at the scheduling DPU. The method further includes storing information about the first DPU in a demand matrix of the first set of DPUs.

Подробнее
13-09-2012 дата публикации

SOFTWARE DEVELOPMENT KIT FOR BLENDED SERVICES

Номер: US20120233589A1
Принадлежит: Infosys Technologies Ltd.

A three-layer architecture is provided for implementing a software development kit (SDK) for developing blended service software applications that utilize multiple service endpoints. The three-layer architecture comprises an application programming interface (API) layer, a core layer, and a communication layer. The API layer provides a set of interfaces for developing blended services that utilize a plurality of service endpoints. The core layer receives commands from the API layer and transforms the received commands for communication with the plurality of service endpoints. The communication layer provides communication adapters for communicating with the plurality of service endpoints. Blended service software applications can be developed using the SDK by receiving a plurality of API commands for a blended service that utilizes a plurality of service endpoints, determining a plurality of worker classes, and providing communication adapters for communicating with the plurality of service endpoints. 1. A three-layer architecture implementing a software development kit (SDK) for developing blended service software applications that utilize multiple service endpoints , comprising:an application programming interface (API) layer, wherein the API layer provides a set of interfaces for developing blended services that utilize a plurality of service endpoints;a core layer, wherein the core layer receives commands from the API layer and transforms the received commands for communication with the plurality of service endpoints; anda communication layer, wherein the communication layer provides communication adapters for communicating with the plurality of service endpoints, and wherein the communication adapters supports a plurality of communication protocols for communicating with the plurality of service endpoints.2. The three-layer architecture of claim 1 , wherein the API layer provides a set of service-independent commands claim 1 , and wherein at least one service- ...

Подробнее
04-10-2012 дата публикации

GENERATION OF FUNCTIONAL TESTS FOR RE-HOSTED APPLICATIONS

Номер: US20120254665A1
Принадлежит: Infosys Technologies Ltd.

A system and method for generating functional tests to verify code migrated from a first host to a second host. In one embodiment, source code is analyzed in order to generate functional tests that can be used for testing the re-hosted application. In particular, user-input scenarios are extracted from the source code and system output responses are determined based on the user-input scenarios. Functional tests can then be generated using the extracted user-input scenarios and output responses to ensure that the re-hosted application responds in a like manner. 1. A method for generating functional tests for verifying code migrated from a first host to a second host , comprising:analyzing source code associated with the first host to extract user input scenarios;determining based on the analysis, an output response for each of the extracted user input scenarios; andgenerating functional tests for testing the code on the second host using the extracted user input scenarios and determined output responses.2. The method of claim 1 , wherein the extracted user input scenarios include candidate user input and conditions on input data values.3. The method of claim 1 , wherein analyzing the source code includes building an abstract syntax tree for the source code.4. The method of claim 3 , wherein building the abstract syntax tree further includes creating a syntax grammar for the source code language syntax specifications.5. The method of claim 4 , wherein building the abstract syntax tree further includes traversing independent paths through the source code.6. The method of claim 5 , further including relating the independent paths to functions in the source code.7. The method of claim 1 , further including generating a set of units of behaviors claim 1 , wherein each unit of behavior includes a user input claim 1 , conditions on the input data values claim 1 , and system output corresponding to the user input and conditions on the input data values.8. The method of claim ...

Подробнее
10-01-2008 дата публикации

COLLABORATIVE FILTERING-BASED RECOMMENDATIONS

Номер: US20080010258A1
Автор: Ashish Sureka
Принадлежит: Infosys Technologies Ltd.

Various techniques can be used to implement a collaborative filtering-based recommendation engine. For example, different similarity measures can be used for different users. Different similarity measures can be used for a particular user across time. A superior similarity measure can be found for a user. User-defined similarity measures can be supported.

Подробнее
15-01-2009 дата публикации

CONTENT LICENSING AND CONDITIONAL ACCESS USING A MOBILE DEVICE

Номер: US20090019501A1
Принадлежит: Infosys Technologies Ltd.

Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted.

Подробнее
26-06-2008 дата публикации

EVALUATING PROGRAMMER EFFICIENCY IN MAINTAINING SOFTWARE SYSTEMS

Номер: US20080155508A1
Принадлежит: Infosys Technologies Ltd.

Quality of modularization of source code is tested using different perspectives such as a structural modularity perspective, an architectural modularity perspective, a size perspective, and a similarity of purpose perspective. A history of changes in modularization may be kept such that the degree to which given source code is well-modularized can be determined over time. The changes made to the code by individual programmers may be kept, such that the degree to which their coding enhanced or harmed modularization may be tracked.

Подробнее
23-10-2007 дата публикации

Method and system for providing reliable and fast communications with mobile entities

Номер: US0007286546B2

A gateway module is provided for connecting multiple networks. A connection set up module is provided. The connection set up module is configured to set up a transport layer connection between two correspondent nodes in first and second wire networks in divided forms of first and second connections. The first and second connections are in a transport layer protocol suitable for communications with correspondent nodes in the first and second wire networks. A control module controls the connection set up module by determining whether or not to carry out a connection set up by the connection set up module. The connection set up is made according to information content of a packet. The packet contains a transport layer protocol data unit, from a correspondent node in the second network, that requests a set up of the transport layer connection between the first and second networks.

Подробнее
05-06-2008 дата публикации

PARALLEL DYNAMIC WEB PAGE SECTION PROCESSING

Номер: US20080133722A1
Принадлежит: Infosys Technologies Ltd.

Dynamic sections of a web page having dynamic content can be processed and received in parallel. Display of the dynamic sections can proceed in parallel. A script mechanism can be transmitted to a client, which executes the script to create a connection and receive dynamic content from a server independently for separate sections. An identifier can be used to differentiate between different sections on the web page.

Подробнее
15-06-2010 дата публикации

Methods and system for configurable domain specific abstract core

Номер: US0007739647B2

The present invention provides a configurable domain specific abstract core (DSAC) for implementing applications within any domain. The DSAC comprises at least one function specific abstract module (FSAM) configurable at a plurality of stages for implementing a predetermined function belonging to one or more applications in the domain. The FSAM comprises a function specific abstract logic (FSAL) for implementing functional logic and a micro state engine (MSE) for generating and monitoring one or more control signals, at least one of the control signals being generated by execution of a dynamic script for controlling the FSAL. The DSAC further comprises one or more buffer modules for data exchange among one or more FSAMs, and for temporary storage of data, one or more programmable data path connection maps comprising a set of interconnections, for configuring data paths among the one or more FSAMs and the one or more buffers, and a programmable hardware software interface module for coupling ...

Подробнее
27-03-2008 дата публикации

AUTOMATED PREDICTIVE DATA MINING MODEL SELECTION

Номер: US20080077544A1
Автор: Ashish Sureka
Принадлежит: Infosys Technologies Ltd.

A predictive data mining model can be selected based on how well the model meets an objective function. In certain implementations genetic algorithms can be used to search a space of predictive data mining model building parameters to determine an optimal predictive data mining model based on a score function corresponding to, for example, the accuracy of the selected predictive data mining model.

Подробнее
05-10-2010 дата публикации

Wireless delivery of non-standard frame field information via broadcast frames

Номер: US0007808963B2

Delivery of non-standard frame field information can be accomplished by publicly broadcasting the non-standard frame field information in one or more broadcast frames within an open wireless computing network. The broadcast can be received by a client wireless device when the client wireless device has not established a connection to the wireless network. The client can store the received information. A system for delivery of non-standard frame field information can comprise a special-purpose access point configured to deliver the information by broadcasting the information in a plurality of broadcast frames. The system can also comprise a client wireless device that receives the broadcast and aggregates the received information when the client is not connected to a wireless network.

Подробнее
16-10-2008 дата публикации

System And Method For Generating Data Migration Plan

Номер: US20080255895A1
Принадлежит: Infosys Technologies Ltd.

A system and method for generating a migration plan for migrating data from a first electronic medium to a second electronic medium is provided. The system comprises a migration readiness assessment module for determining a migration recommendation; an effort estimation module for determining a total effort required for migrating data from a first electronic medium to a second electronic medium; and a migration plan generator module for generating a migration plan based on the determined migration recommendation and the total estimated effort.

Подробнее
19-02-2019 дата публикации

System and method for detecting preventative maintenance operations in computer source code

Номер: US0010209967B2

The invention relates to a system and method for identifying occurrences of preventive maintenance on computer source code. The method comprises analyzing source code, defining data sets associated with characteristics of the source code, and applying an operation algorithm to the data sets to thereby identify occurrences of preventive maintenance operations that were carried out on the source code. A first instance of a source code and a second instance of the source code are preferably analyzed, wherein the second instance of the source code is a revised version of the first instance of the source code, a first data set associated with the first instance of the source code and a second data set associated with the second instance of the source code are preferably defined, and the operation algorithm is preferably applied to the first data set and the second data set to thereby identify at least one occurrence of a preventive maintenance operation that was carried out on the source code ...

Подробнее
03-08-2006 дата публикации

Software system requirements specification framework and tool

Номер: US20060174222A1
Принадлежит: Infosys Technologies Ltd.

Described herein are methods and systems for capturing functional and non-functional requirements of a software system. Both functional and non-functional requirements are captured in a framework that is easy for end users to use for participating directly at various levels of a requirements capture process. Functional aspects are desirably captured in terms of workflow notations to form a task flow model of the system, which in turn provides a desirable framework for eliciting and appropriately capturing the non-functional requirements. The task flow model updated with functional and non-functional requirements can be comprehensive and accurate enough to be used to generate test cases, to simulate usability and to generate conventional text based use cases. The requirements captured can be verified for quality of domain context to encourage re-use of domain terms.

Подробнее
08-10-2009 дата публикации

CONCEPT-ORIENTED SOFTWARE ENGINEERING SYSTEM AND METHOD FOR IDENTIFYING, EXTRACTING, ORGANIZING, INFERRING AND QUERYING SOFTWARE SYSTEM FACTS

Номер: US20090254876A1
Принадлежит: Infosys Technologies Ltd.

Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software system facts are extracted from artifacts comprising the software system or are provided through explicit definition. Architectures of the software system are recovered from the stored software system facts. Layered views of the recovered architectures are generated. The stored software system facts are checked against architectural rules to ensure architectural compliance of the software system. The impact of proposed changes to the software system is assessed by querying the identified software system facts.

Подробнее
13-03-2008 дата публикации

Methods and system for configurable domain specific abstract core

Номер: US20080066045A1
Принадлежит: Infosys Technologies Ltd.

The present invention provides a configurable domain specific abstract core (DSAC) for implementing applications within any domain. The DSAC comprises at least one function specific abstract module (FSAM) configurable at a plurality of stages for implementing a predetermined function belonging to one or more applications in the domain. The FSAM comprises a function specific abstract logic (FSAL) for implementing functional logic and a micro state engine (MSE) for generating and monitoring one or more control signals, at least one of the control signals being generated by execution of a dynamic script for controlling the FSAL. The DSAC further comprises one or more buffer modules for data exchange among one or more FSAMs, and for temporary storage of data, one or more programmable data path connection maps comprising a set of interconnections, for configuring data paths among the one or more FSAMs and the one or more buffers, and a programmable hardware software interface module for coupling ...

Подробнее
17-01-2008 дата публикации

OCCASIONALLY CONNECTED COMPUTING FOR MOBILE WEB SERVICES

Номер: US20080014929A1
Принадлежит: Infosys Technologies Ltd.

Reliable messaging can be incorporated into a framework for occasionally connected computing (OCC). For example, various delivery assurance profiles can be supported for an application accessing Web Services to accomplish online business processing. Processing can be accomplished transparently with respect to whether the Web Services are available to a mobile computing device.

Подробнее
21-10-2014 дата публикации

Methods for recommending personalized content based on profile and context information and devices thereof

Номер: US0008868680B2

A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device.

Подробнее
11-10-2012 дата публикации

COMPOSITE APPLICATIONS USING SERVICE COMPONENT ARCHITECTURE MODEL AND OPEN VIRTUALIZATION FORMAT

Номер: US20120260228A1
Принадлежит: Infosys Technologies Ltd.

Composite applications can be created that utilize a plurality of different services across a plurality of different cloud stack layers. The composite applications are defined using the Service Component Architecture (SCA) model. Composite applications can be translated from the SCA model into a format compatible for a virtualization platform, such as the Open Virtualization Format (OVF). Composite applications, as defined in the format compatible for the virtualization platform, can be deployed on the virtualization platform. 1. A method , implemented at least in part by a computing device , for creating composite applications , the method comprising:creating, using the computing device, a composite application that utilizes a plurality of different services across a plurality of different cloud stack layers, the composite application defined using a Service Component Architecture (SCA) model;translating, by the computing device, the composite application from the SCA model into a format compatible for a virtualization platform; anddeploying, by the computing device, the composite application, as defined in the format compatible for the virtualization platform, on the virtualization platform.2. The method of wherein the format compatible for a virtualization platform is the Open Virtualization Format (OVF).3. The method of wherein the OVF composite application is deployed on a cloud enabled virtualized environment that supports the OVF format.4. The method of wherein the plurality of different cloud stack layers comprise:an infrastructure as a service (IaaS) cloud stack layer;a platform as a service (PaaS) cloud stack layer; andan software as a service (SaaS) cloud stack layer.5. The method of wherein the composite application utilizes:a first service, of the plurality of different services, at a first cloud stack layer, of the plurality of different cloud stack layers; anda second service, of the plurality of different services, at a second cloud stack layer, of ...

Подробнее
29-01-2009 дата публикации

PREDICTING FINANCIAL IMPACT OF BUSINESS FRAMEWORK

Номер: US20090030761A1
Принадлежит: Infosys Technologies Ltd.

The financial impact of the implementation of a business framework can be predicted. Shifted business condition metrics associated with business activities for implementing the business framework can be applied to model financial impact for a business entity. Impact on financial condition according to income statement and balance sheet can be modeled based on financial data for the business entity. Impact can be modeled per activity. Activities can be prioritized based on modeled impact.

Подробнее
24-04-2007 дата публикации

Displaying holographic three dimensional images

Номер: US0007209269B1

Holographic three dimensional images of objects can be displayed via a device comprising micro holographic optical elements (MHOEs). A device for displaying holographic three dimensional images of objects can comprise a laser source, a spatial filter using a micro holographic optical element (MHOE) lens, a collimating MHOE lens, a spatial light modulator, and cylindrical MHOE lenses. A holographic three dimensional image of an object can be displayed using MHOEs by emitting a coherent light, filtering and expanding the light, aligning the expanded light, modulating the aligned expanded light, and focusing the modulated light.

Подробнее
16-07-2009 дата публикации

Method and framework for securing a source code base

Номер: US20090183137A1
Автор: Maneesh Kumar Ponnath
Принадлежит: Infosys Technologies Ltd.

A framework for securing a source code base during the development phase of a software development lifecycle is provided. The framework includes an aspect package module and a validator package module. The aspect package module integrates security routines into the source code base. The aspect package module includes a custom interface module and a validator aspect module. The custom interface module includes a function declaration, wherein the custom interface module is implemented by at least one class of the one or more classes. The validator aspect module includes a controller code for controlling the flow of the execution, based on the context for the security validation of the at least one class, wherein one or more security routine integration points are defined in the at least one class. The validator package module validates the at least one class, based on the defined context, by using one or more validation classes.

Подробнее
21-05-2009 дата публикации

Method and system for data security in an IMS network

Номер: US20090133103A1
Принадлежит: Infosys Technologies Ltd.

A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.

Подробнее
18-12-2008 дата публикации

BUYER-SIDE CONSOLIDATION OF COMPATIBLE PURCHASE ORDERS

Номер: US20080312991A1
Принадлежит: Infosys Technologies Ltd.

Systems and methods of buyer-side consolidation of compatible purchase orders are described herein. Purchase orders can be identified for consolidation using spatial and temporal proximity parameters. Purchase orders can be modified by changing a ship date or a delivery date and the changing can be based on a buyer input. Shipments can be consolidated based on the purchase order modifications and less than truckload shipments can be reduced. Consolidated shipments can be associated with different requested delivery dates, different suppliers, and/or different buyers. Buyer-side consolidation of compatible purchase orders can occur before purchase orders are processed by a transportation management system.

Подробнее
19-11-2013 дата публикации

Methods for selecting one of a plurality of competing IT-led innovation projects and devices thereof

Номер: US0008589205B2

Methods, systems, and computer-readable storage media for selecting one of a plurality of information technology (IT)-led innovation projects include obtaining a plurality of IT-led innovation projects. A selection of one or more research projects for each of the obtained IT-led innovation projects is determined based at least on one or more research project criteria. One of the obtained IT-led innovation projects is selected based at least on the determined selection of one or more research projects for each of the obtained IT-led innovation projects and one or more innovation project criteria. The selection of the one of the obtained IT-led innovation projects is provided.

Подробнее
15-03-2007 дата публикации

System for modeling architecture for business systems and methods thereof

Номер: US20070061354A1
Принадлежит: Infosys Technologies Ltd.

A system and method for generating architecture for a business system is disclosed. The method comprises, in one embodiment, modeling a plurality of viewpoints adapted for describing the architecture of the business system in form of a collection of views and viewpoints and creating a software organization viewpoint adapted for providing architecture guidelines. An exemplary method further comprises creating a first plurality of notations for each of the plurality of viewpoints for describing the plurality of viewpoints and creating a second plurality of notations for capturing design rationale indicative of the first plurality of notations. Furthermore, an exemplary method comprises generating the architecture of the business system using at least one of the plurality of viewpoints or the software organization viewpoint, or at least the second plurality of notations, or combinations thereof.

Подробнее
19-06-2008 дата публикации

MEASURING QUALITY OF SOFTWARE MODULARIZATION

Номер: US20080148225A1
Принадлежит: Infosys Technologies Ltd.

Quality of modularization of source code is tested using different perspectives such as a structural modularity perspective, an architectural modularity perspective, a size perspective, and a similarity of purpose perspective. A history of changes in modularization may be kept such that the degree to which given source code is well-modularized can be determined over time. The changes made to the code by individual programmers may be kept, such that the degree to which their coding enhanced or harmed modularization may be tracked.

Подробнее
08-05-2008 дата публикации

INTEROPERABILITY ACROSS HETEROGENEOUS TAXONOMIES

Номер: US20080109254A1
Принадлежит: Infosys Technologies Ltd.

Interoperability across two or more heterogeneous clinical medical error taxonomies can be improved by associating categories in various taxonomies with one or more categories in a master taxonomy. These associations can be expressed using a unique identifier, e.g., a number that identifies one or more categories in the master taxonomy. Various aspects of the associations and/or one or more master taxonomies can be modified by users of a system employing embodiments of the technologies described herein. Searches of clinical medical error records can also be aided using the technologies described herein.

Подробнее
17-04-2008 дата публикации

AUTOMATED PERFORMANCE MONITORING

Номер: US20080092122A1
Принадлежит: Infosys Technologies Ltd.

Performance tracking of computing systems can be provided by monitoring, determining performance states, and displaying health information. Capacity planning recommendations can be provided by monitoring performance of a software application, determining a plurality of performance state transitions of the software application, and, based on the transitions, making capacity planning recommendations. Performance state transitions can be selected from a set of transitions between four possible quadrant states. Performance of a software application can be categorized into one of the four possible quadrant states from. Capacity planning recommendations can be provided by a capacity planning framework. The framework can comprise a performance monitoring module for monitoring performance of software applications, a quadrant tracking module for determining performance state transitions, and a capacity planning module for making capacity planning recommendations based on the transitions. Capacity ...

Подробнее
04-10-2012 дата публикации

METHOD, DEVICE AND SYSTEM FOR UPDATING AN APPLICATION ON A MOBILE DEVICE

Номер: US20120250106A1
Принадлежит: Infosys Technologies Ltd.

The instant disclosure is related to updating an application on a mobile device without using mobile network bandwidth. The mobile device initiates the application to be updated on the mobile device to scan an encoded image of a predetermined pattern from a source. It is followed by decoding of the scanned image to extract information required to update the application. And then, updating the application on the mobile device based on the extracted information. 1. A method for updating an application on a mobile device comprising acts of initiating the application to be updated on the mobile device;scanning an encoded image of a predetermined pattern from a source using the mobile device;decoding the scanned image for extracting information required to update the application; andupdating the application on the mobile device based on the extracted information.2. The method as claimed in claim 1 , wherein the image is scanned using a camera of the mobile device.3. The method as claimed in claim 1 , wherein the image is selected from at least one of barcode image and quick response code image.4. The method as claimed in claim 1 , wherein the information comprises changes to be made to a configuration file of the application.5. The method as claimed in claim 1 , wherein the source is selected from at least one of digital device and print media that are capable of displaying the image.6. The method as claimed in claim 1 , wherein the information is encrypted.7. The method as claimed in claim 6 , wherein the encrypted information is decrypted after decoding the scanned image.8. A mobile device comprising:a camera capable of scanning an encoded image having information required to updated an application on the mobile device; and initiating the application on the mobile device;', 'decoding the scanned image to extract the information; and', 'updating the application on the mobile device based on the extracted information., 'a processing unit capable of performing acts of9. ...

Подробнее
13-05-2010 дата публикации

System and method for transferring data using variance based messaging

Номер: US20100118770A1
Принадлежит: Infosys Technologies Ltd.

A system and method for providing data transfer from a source node to a destination node in a network using variance based messaging are provided. The method comprises the steps of receiving one or more messages by the source node; selecting a plurality of messages to be grouped from the one or more messages, wherein the plurality of messages comprise data with minimum deviation in content; creating an integrated message from the plurality of messages; sending the integrated message from the source node to the destination node; and recreating each message of the plurality of messages at the destination node.

Подробнее
28-06-2007 дата публикации

PROVIDING LOCATION-BASED SERVICES VIA WIRELESS NETWORKS

Номер: US20070149212A1
Принадлежит: Infosys Technologies Ltd.

Location-based services can be provided by broadcasting location-based information within wireless network zones. A system for providing location-based services within an ad-hoc wireless network zone can include an information server for providing the location-based services by broadcasting location-based information, where the broadcast location-based information is received by a client wireless device when the client wireless device enters the ad-hoc wireless network zone. Location-based services can be provided within an ad-hoc wireless network zone by broadcasting location-based information regarding the location-based services. The broadcast can be received by a client wireless device within the zone. The client wireless device can display alerts based on the received location-based information.

Подробнее
17-04-2008 дата публикации

SIZE AND EFFORT ESTIMATION IN TESTING APPLICATIONS

Номер: US20080092120A1
Принадлежит: Infosys Technologies Ltd.

Size of a software application testing project is determined, and person/hours required for the testing project is estimated. The software application is sized by counting the number of different parameter types that occur within testing activities associated with the application. The parameter type numbers are then divided by a scaling weight to arrive at a Testing Unit number, which is then divided by a Testing Unit rate, e.g., person hours associated with each testing unit, to arrive at an estimated testing project effort. Some embodiments include an uncertainty calculation that potentially increases testing time based on clarity of the project requirements, the tester familiarity with the application area and the tester familiarity with the domain. Some embodiments calculate separate testing project times for different phases of the testing project.

Подробнее
27-09-2012 дата публикации

ONLINE INTEGRATED DEVELOPMENT ENVIRONMENT WITH CODE ASSIST

Номер: US20120246610A1
Принадлежит: Infosys Technologies Ltd.

An online integrated development environment (IDE) providing code assist is described. A method for providing code assist within the online IDE comprises receiving a request from a client device to access a software development project, storing code assist information related to the software development project, and sending code assist information to the client device. The client device stores the received code assist information and uses it for local code assist operations at the client device. The client device can receive a subset of a database of code assist information stored at a server environment providing the online IDE. The client device accesses the online IDE via a web browser. 1. A method , implemented at least in part by a server environment comprising one or more computer servers , for providing code assist within an online integrated development environment (IDE) , the method comprising:receiving, by the server environment from a client device, a request to access a software development project within the online IDE, wherein the online IDE is accessed by the client device using only a web browser;storing, at the server environment, a database of code assist information related to the software development project; andsending, by the server environment to the client device, a subset of the database of code assist information, wherein the subset of the database of code assist information is stored by the client device and used by the client device for local code assist operations at the client device.2. The method of wherein the subset of the database of code assist information comprises class names and data member names.3. The method of wherein the subset of the database of code assist information comprises class names claim 1 , method names claim 1 , and variable names.4. The method of wherein the subset of the database of code assist information is used for client-side code completion while the user of the client device is entering code.5. The method ...

Подробнее
05-06-2008 дата публикации

PERFORMANCE EVALUATION OF J2EE APPLICATIONS

Номер: US20080133212A1
Принадлежит: Infosys Technologies Ltd.

Simulation techniques for measuring the performance of J2EE applications are described. Simulation models for J2EE systems are generated which utilize one or more simulation components comprising queuing centers. The queuing centers employ logic to emulate J2EE thread models by locking on threads when messages are received by simulation components and waiting to unlock until a response is received from every subsequent component in the system. Additionally, simulation components which correspond to J2EE system components running on java virtual machines employ logic which emulates overhead introduced during memory allocation and garbage collection. The simulation models are also utilized during software development in a continuous performance evaluation process which gives feedback at each software development stage based on simulations run using the models described.

Подробнее
04-10-2012 дата публикации

FACET SUPPORT, CLUSTERING FOR CODE QUERY RESULTS

Номер: US20120254162A1
Принадлежит: Infosys Technologies Ltd.

Techniques and tools are described for refining source-code query results. For example, source-code query results for a query can be generated, semantic clusters of the source-code query results can be generated, and based on a selection of a semantic cluster option, refined source-code query results can be sent. Also, for example, source-code query results can be received, selections of facet values associated with groups of the source-code query results can be sent, and based on selected facet values, a subset of the source-code query results can be received. 1. A method implemented at least in part by a computer system , the method comprising:generating source-code query results for a query;generating, by the computer system, one or more semantic clusters of the source-code query results; andsending refined source-code query results based at least on an indication of a selected one or more semantic cluster options.2. The method of further comprising:sending one or more semantic cluster options corresponding to the one or more semantic clusters.3. The method of claim 2 , wherein a semantic cluster option of the one or more semantic cluster options comprises an indication of a percentage of the source-code query results that are included in a corresponding semantic cluster of the one or more semantic clusters.4. The method of claim 1 , wherein generating the one or more semantic clusters comprises clustering based on words contained in code elements of source code.5. The method of claim 4 , wherein the query is received from a user searching for source code;wherein the source-code query results are sent to a client for display in a user interface; andwherein the source-code query results correspond to the code elements of the source code.6. The method of claim 1 , wherein the one or more semantic clusters comprises a subset of the plurality of source-code query results.7. The method of further comprising:generating cluster identifiers for the one or more semantic ...

Подробнее
08-11-2016 дата публикации

Method and system for preauthenticating a mobile node

Номер: US0009491619B2

A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.

Подробнее
24-05-2012 дата публикации

DISTRIBUTED REGISTRY FOR DEVICE DISCOVERY USING QUORUM CONSENSUS PROTOCOL

Номер: US20120131090A1
Принадлежит: Infosys Technologies Ltd.

A distributed hierarchical registry provides services, such as registry services, including client device discovery and communication services. The distributed hierarchical registry comprises a plurality of registry groups where a registry group comprises a plurality of registry servers. The registry servers receive client device information, such as status, capability, and usage information, and update other registry servers, in the same registry group and/or in other registry groups, using a quorum consensus protocol. The registry servers also respond to lookup requests from client devices. Registry servers use policies to define parameters such as a number of registry servers that make up a read quorum and the number of registry servers that make up a write quorum. 1. A distributed hierarchical registry for device discovery and communication , the distributed hierarchical registry comprising: receiving client update information from client devices; and', 'responding to client lookup requests from client devices;, 'a plurality of registry groups at a first level of the hierarchical registry, each registry group comprising a plurality of registry servers, wherein the plurality of registry servers in a registry group provide services comprisingwherein the plurality of registry servers in each of the plurality of registry groups provide the services using, at least in part, a quorum consensus protocol.2. The distributed hierarchical registry of wherein the client update information comprises:client device capabilities;client device status; andclient device usage.3. The distributed hierarchical registry of further comprising: a policy defining a write quorum; and', 'a policy defining a read quorum., 'a policy database, wherein the policy database comprises policies comprising4. The distributed hierarchical registry of wherein registry servers within a registry group update other registry servers in the same registry group using Paxos algorithm.5. The distributed ...

Подробнее
08-06-2010 дата публикации

Automated relationship traceability between software design artifacts

Номер: US0007735068B2

Tools and methods are described herein that allow for measuring and using the relationship between artifacts of a software design, such as requirements, test plans, and so on. The relationship can be quantified by determining a relationship quotient for quantifying a similarity between components of software design artifacts and presenting the quantified relationships to a user, such as a software designer, so that he or she can account for the relationship between such components during design changes and so on. The relationship quotient is made more representative of substantive similarity by selecting the key terms that are to be submitted to a similarity analysis such that words that are too common in the English language, such as conjunctions, articles, etc., are not used. Ubiquity of certain key terms in an enterprise is accounted for by adding a term significance weight to the similarity analysis. The similarity analysis is made contextual, for instance, by the use of inputs from ...

Подробнее
15-03-2011 дата публикации

Efficient XML joins

Номер: US0007908301B2

An XML join between XML documents can be performed by comparing XML elements between the XML documents, obtaining join-selection elements from a first XML document, obtaining join-required elements from one or more other XML documents, and performing the XML join using the elements in the first XML document and the join-required elements. The XML documents can be at different locations connected via a network. Where two XML documents are at different locations, the join-selection elements can be transmitted from a first location (of a first XML document) to a second location (of a second XML document). The join-required elements can be obtained at the second location and transmitted back to the first location. The XML join can then be performed at the first location.

Подробнее
01-03-2007 дата публикации

SEMANTIC-BASED QUERY TECHNIQUES FOR SOURCE CODE

Номер: US20070050343A1
Принадлежит: Infosys Technologies Ltd.

A powerful set of features can assist software developers in searching source code. Source code can be queried to find occurrences of source code elements mapped to domain concepts appearing in an ontology. Queries can specify a search for occurrences of particular operations performed on domain concepts within the source code. Query expansion can be used to locate related domain concepts as indicated in the ontology. Query keyword weighting can be used to emphasize one domain concept over another. Tools can be provided to create the ontology and associate the ontology with the elements appearing in the source code. Results can include user interface features assisting in navigation to a location within the source code associated with the query results.

Подробнее
23-10-2008 дата публикации

SECURE CONFERENCING OVER IP-BASED NETWORKS

Номер: US20080263648A1
Принадлежит: Infosys Technologies Ltd.

Methods and systems for secure conferencing over an IMS network or other networks include sending request by at least one user to access to an application server. The user is validated using a validation coupon provided by the user equipment followed by identifying and allowing the user equipment to download a valid media client. Conference data is encrypted and transmitted to the user equipment, and processed by the media client. Typically, the encrypted conference data is decrypted by the media client and communicated to a user interface presentation to the user. In some examples, the conference data is validated prior to downloading to the user equipment.

Подробнее
07-06-2011 дата публикации

Method for conducting real-time execution of transactions in a network

Номер: US0007958540B2

The present invention provides a method, system and computer program product for registering and authenticating a user using a processor card with the server. The method enables the user to create his login details. Further, the method enables the authentication of the user over a public network. The method also enables the user to change the login details without accessing the server.

Подробнее
12-11-2009 дата публикации

Method and system for integrated scheduling and replication in a grid computing system

Номер: US20090282418A1
Принадлежит: Infosys Technologies Ltd.

A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system 100. The method includes receiving a first computation job by a scheduling DPU from the plurality of computation jobs. Further, the method includes scheduling the first computation job at a first set of DPUs in the grid computing system based on first scheduling criteria. Furthermore, the method includes scheduling the first computation job at a first DPU from the first set of DPUs based on second scheduling criteria. The method also includes storing information about the first computation job and the first set of DPUs in a history table at the scheduling DPU. The method further includes storing information about the first DPU in a demand matrix of the first set of DPUs.

Подробнее
08-10-2009 дата публикации

ALLOCATING RESOURCES FOR PARALLEL EXECUTION OF QUERY PLANS

Номер: US20090254916A1
Принадлежит: Infosys Technologies Ltd.

Computing resources can be assigned to sub-plans within a query plan to effect parallel execution of the query plan. For example, computing resources in a grid can be represented by nodes, and a shortest path technique can be applied to allocate machines to the sub-plans. Computing resources can be provisionally allocated as the query plan is divided into query plan segments containing one or more sub-plans. Based on provisional allocations to the segments, the computing resources can then be allocated to the sub-plans within respective segments. Multiprocessor computing resources can be supported. The techniques can account for data locality. Both pipelined and partitioned parallelism can be addressed. Described techniques can be particularly suited for efficient execution of bushy query plans in a grid environment. Parallel processing will reduce the overall response time of the query.

Подробнее
08-10-2009 дата публикации

IDENTIFICATION OF TOPICS IN SOURCE CODE

Номер: US20090254884A1
Принадлежит: Infosys Technologies Ltd.

Topics in source code can be identified using Latent Dirichlet Allocation (LDA) by receiving source code, identifying domain specific keywords from the source code, generating a keyword matrix, processing the keyword matrix and the source code using LDA, and outputting a list of topics. The list of topics is output as collections of domain specific keywords. Probabilities of domain specific keywords belonging to their respective topics can also be output. The keyword matrix comprises weighted sums of occurrences of domain specific keywords in the source code.

Подробнее
09-10-2008 дата публикации

INFORMATION TECHNOLOGY MAINTENANCE SYSTEM FRAMEWORK

Номер: US20080249825A1
Принадлежит: Infosys Technologies Ltd.

A strategic framework enables improvements in IT system maintenance by taking IT system information as input and outputting useful metrics and/or proposed modifications to achieve efficiency improvements. The strategic framework also can be described as an IT maintenance system assessment and modification tool. The described framework encompasses strategies for effective IT maintenance and improvement. The framework addresses the effectiveness of IT maintenance by focusing on, for example, technology, operations, human and/or non-human resources, and governance solutions. One or more of these dimensions can be assessed and evaluated, for example, to discover and process useful metric information. From the results of a described IT maintenance system assessment, which provides metrics for evaluating efficiency and improvability of IT maintenance systems, an overall roadmap of solutions can be developed. This can be used to form an end-to-end solution for better IT maintenance and portfolio ...

Подробнее
12-04-2012 дата публикации

AUTOMATED SERVICE LEVEL MANAGEMENT OF APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT

Номер: US20120089726A1
Принадлежит: Infosys Technologies Ltd.

Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple levels using a plurality of techniques including automated dynamic application migration. Automated deployment of applications in a cloud computing environment using deployment descriptors comprises receiving values for service level parameters for an application, creating a deployment descriptor based on the parameters, identifying application servers that satisfy the deployment descriptors, and deploying the application to the identified application servers. Automated dynamic migration of applications in a cloud computing environment comprises deciding to migrate an application, obtaining application resource requirements, identifying application server candidates, selecting an application server from one of the candidates, and migrating the application. 1. A method , implemented at least in part by a computing device , for automated service level management of applications by deployment of applications in a cloud computing environment using deployment descriptors , the method comprising:receiving, by the computing device, values for a plurality of service level parameters for an application;creating, by the computing device, a deployment descriptor based, at least in part, on the received values for the plurality of service level parameters;identifying, by the computing device, one or more application servers in the cloud computing environment that satisfy the deployment descriptor; anddeploying, by the computing device, the application on the one or more identified application servers to achieve service level management of the application in the cloud computing environment.2. The method of wherein the deployment descriptor comprises:entries for ...

Подробнее
01-11-2007 дата публикации

SECURE WIRELESS CONNECTIONS USING SSID FIELDS

Номер: US20070254614A1
Принадлежит: Infosys Technologies Ltd.

Secure wireless connections can be established by broadcasting wireless security parameters within SSID fields. A wireless security parameter can be received and a broadcast SSID generated from the wireless security parameter. The broadcast SSID can be broadcast. Secure connections can be established with wireless devices that receive the broadcast SSID and connect using the broadcast SSID and the wireless security parameter. Secure wireless connections can also be established by broadcasting wireless security parameters and connection SSIDs within SSID fields. A wireless security parameter and a connection SSID can be received and a broadcast SSID generated from the wireless security parameter and connection SSID. The broadcast SSID can be broadcast. Secure connections can be established with wireless devices that receive the broadcast SSID and connect using the connection SSID and the wireless security parameter.

Подробнее
04-12-2008 дата публикации

System and method for application migration in a grid computing environment

Номер: US20080300851A1
Принадлежит: Infosys Technologies Ltd.

A system and method for assessing performance of a software application migrated to a grid infrastructure is provided. The system comprises a grid code analyzer for generating a directed acyclic graph (DAG) corresponding to the software application by performing static and dynamic analysis; a grid task generator for reducing the DAG generated by the grid code analyzer; and a grid simulator for simulating performance of the software application on one or more predetermined grid infrastructures. The grid simulator accepts the reduced DAG as input and produces performance data as output.

Подробнее
13-09-2012 дата публикации

BLENDED SERVICE CREATION, TEST, AND DEPLOYMENT ENVIRONMENT FOR MULTIPLE SERVICE ENDPOINTS

Номер: US20120233588A1
Принадлежит: Infosys Technologies Ltd.

A blended service creation environment is provided for developing blended service software applications that utilize multiple service endpoints. The blended service creation environment comprises a software development kit, a graphical service creation environment, and service endpoint simulators. Blended services can be tested locally using the service endpoint simulators, which simulate communication with actual service endpoints. The graphical service creation environment can be used to create blended services that utilize multiple service endpoints from different service providers. A service definition document can be used to define a blended service and the service definition document can be used to execute the blended service using a service execution environment. 1. A blended service creation environment for developing blended service software applications that utilize multiple service endpoints , comprising:a software development kit (SDK), wherein the SDK comprises application programming interfaces (APIs), wherein the APIs support developing a blended service that uses a plurality of service endpoints;a graphical service creation environment, wherein the graphical service creation environment provides graphical user interface (GUI) tools supporting user creation of the blended service, wherein the blended service utilizes information obtained from the plurality of service endpoints; anda plurality of service endpoint simulators, wherein the plurality of service endpoint simulators simulate, within the blended service creation environment, the plurality of service endpoints, and wherein the plurality of service endpoint simulators perform the simulation locally to the blended service creation environment without communicating with the plurality of service endpoints.2. The blended service creation environment of wherein the plurality of service endpoints are a plurality of different service endpoints provided by a plurality of different service providers ...

Подробнее
10-05-2011 дата публикации

RFID based product level availability

Номер: US0007940181B2

Product availability can be determined using radio frequency identification (RFID) by determining whether a RFID tag is detectable by a RFID reader and setting a product availability condition, where the RFID tag is not attached to the product, and where distance between the RFID tag and the RFID reader changes as quantity of the product changes. A system for determining availability of products using RFID can comprise a product display unit, a RFID reader, a RFID tag associated with the product display unit, and a computing device configured to set product availability conditions. In the system, distance between the RFID tag and the RFID reader changes as quantity of the product changes.

Подробнее
11-10-2012 дата публикации

EARLY ANALYSIS OF SOFTWARE DESIGN DIAGRAMS

Номер: US20120260230A1
Принадлежит: Infosys Technologies Ltd.

Methods, apparatus, and computer-readable media for analyzing the prospective quality of source code produced according to a class representation (e.g., a UML class diagram) are disclosed. According to one embodiment, a class-level representation of a software application is received, one or more object classes of the class-level representation are selected, and a number of quality metrics are calculated for the selected object classes. The quality metrics can be output as a report or used to modify object classes of the class representation to improve the prospective quality of source code produced according to the class representation.

Подробнее
11-05-2010 дата публикации

System for modeling architecture for business systems and methods thereof

Номер: US0007716254B2

A system and method for generating architecture for a business system is disclosed. The method comprises, in one embodiment, modeling a plurality of viewpoints adapted for describing the architecture of the business system in form of a collection of views and viewpoints and creating a software organization viewpoint adapted for providing architecture guidelines. An exemplary method further comprises creating a first plurality of notations for each of the plurality of viewpoints for describing the plurality of viewpoints and creating a second plurality of notations for capturing design rationale indicative of the first plurality of notations. Furthermore, an exemplary method comprises generating the architecture of the business system using at least one of the plurality of viewpoints or the software organization viewpoint, or at least the second plurality of notations, or combinations thereof.

Подробнее
21-08-2008 дата публикации

DECISION TREE CONSTRUCTION VIA FREQUENT PREDICTIVE ITEMSETS AND BEST ATTRIBUTE SPLITS

Номер: US20080201340A1
Автор: Risi Vardhan Thonangi
Принадлежит: Infosys Technologies Ltd.

A decision tree can be constructed via frequent predictive itemsets and best item splits. A hierarchical frequent predictive itemsets tree data structure can be used to construct the decision tree. A bottom-up traversal of the data structure can be used during determination of best item splits. The described technologies can construct decision trees with superior accuracy as compared to conventional greedy decision tree construction approaches.

Подробнее
16-07-2009 дата публикации

Method for semantic based storage and retrieval of information

Номер: US20090182730A1
Принадлежит: Infosys Technologies Ltd.

A method of storing semantically similar documents on proximally located peers in a structured peer to peer overlay network, where each peer is assigned a unique identifier and each document includes one or more words belonging to at least one hierarchical structured collection of words. A method of searching and retrieving documents, corresponding to a search query, from a structured peer to peer overlay network is also provided.

Подробнее
21-09-2010 дата публикации

Decision tree construction via frequent predictive itemsets and best attribute splits

Номер: US0007801924B2

A decision tree can be constructed via frequent predictive itemsets and best item splits. A hierarchical frequent predictive itemsets tree data structure can be used to construct the decision tree. A bottom-up traversal of the data structure can be used during determination of best item splits. The described technologies can construct decision trees with superior accuracy as compared to conventional greedy decision tree construction approaches.

Подробнее
21-09-2010 дата публикации

Automated predictive data mining model selection using a genetic algorithm

Номер: US0007801836B2

A predictive data mining model can be selected based on how well the model meets an objective function. In certain implementations genetic algorithms can be used to search a space of predictive data mining model building parameters to determine an optimal predictive data mining model based on a score function corresponding to, for example, the accuracy of the selected predictive data mining model.

Подробнее
19-04-2016 дата публикации

Method and system for performing event-matching with a graphical processing unit

Номер: US0009317456B2

A computer-implemented method for event matching in a complex event processing system includes receiving, with a computer processing device, a stream of event data; receiving, with a computer processing device, an event list and an access predicate list, wherein the event list includes one or more event data pairs; and identifying, with a graphical processing device, patterns in the stream of event data.

Подробнее
05-11-2009 дата публикации

Framework for realization of web 2.0 features

Номер: US20090276263A1
Принадлежит: Infosys Technologies Ltd.

A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises.

Подробнее
12-04-2011 дата публикации

System and method for providing framework for business process improvement

Номер: US0007925594B2

A method for developing a process roadmap for a business system is disclosed. The method includes identifying a business process and determining business goals and key process metrics for the business process. The method further includes measuring process maturity levels of the business process and identifying business process improvement initiatives based on the process maturity levels. Furthermore, the method includes linking the business process to at least one of the business goals and key process metrics, the process maturity levels, and the business process improvement initiatives for developing the process roadmap for the business system.

Подробнее
26-04-2007 дата публикации

AUTOMATED SOFTWARE TESTING ARCHITECTURE USING A MULTI-LEVEL FRAMEWORK

Номер: US20070094543A1
Принадлежит: Infosys Technologies Ltd.

A software testing architecture can comprise a three-level framework. The three-level framework can comprise a first level (comprising a first data source), a second level (comprising a second data source), and a third level (comprising a third data source). The framework can further comprise an intermediate entity data source. The first data source can specify test pages, the second test cases for the test pages, and the third test data for the test cases. Each of the three levels can be associated with respective scripts. A method for testing multi-staged scenarios can select test pages and, for the test pages, determine and execute test cases and save intermediate entities. A method for testing multi-staged scenarios using a three-level framework can execute a first test case for a first test page, save an intermediate entity, and execute a second test case for a second test page using the saved intermediate entity.

Подробнее
16-02-2010 дата публикации

Automated software testing architecture using a multi-level framework

Номер: US0007664989B2

A software testing architecture can comprise a three-level framework. The three-level framework can comprise a first level (comprising a first data source), a second level (comprising a second data source), and a third level (comprising a third data source). The framework can further comprise an intermediate entity data source. The first data source can specify test pages, the second test cases for the test pages, and the third test data for the test cases. Each of the three levels can be associated with respective scripts. A method for testing multi-staged scenarios can select test pages and, for the test pages, determine and execute test cases and save intermediate entities. A method for testing multi-staged scenarios using a three-level framework can execute a first test case for a first test page, save an intermediate entity, and execute a second test case for a second test page using the saved intermediate entity.

Подробнее
18-03-2010 дата публикации

System and method for improving modularity of large legacy software systems

Номер: US20100070948A1
Принадлежит: Infosys Technologies Ltd.

A system and method for improving modularity of a software source code is provided. The system comprises of a user interface for receiving source code; a source code model extractor for parsing and forming a model of the source code; a source code model database for storing the source code model, refactoring operators, and a record of refactoring changes; a modularity improvement analyzer for reading the source code model and modularity problem diagnosis data and generating a set of prescriptions; an optimal improvement suggestion selector for evaluating and selecting prescriptions; and a refactoring engine for receiving selected prescriptions and applying them on the source code.

Подробнее
13-03-2008 дата публикации

MANAGING REAL-TIME EXECUTION OF TRANSACTIONS IN A NETWORK

Номер: US20080065648A1
Принадлежит: Infosys Technologies Ltd.

Real-time execution of transactions can be managed between network devices. A method for managing real-time execution of transactions can comprise receiving one or more transactions, storing details associated with the one or more transactions, and synchronizing the details from a first network device to a second network device. Synchronizing details can comprise checking network connectivity between devices. Synchronization middleware can comprise a command engine, a synchronization engine, and a request-response engine. Synchronization middleware can be configured to process transactions, comprising checking network connectivity and determining whether transactions have expired. A method for managing real-time execution of transactions can comprise receiving real-time transactions from applications running on a network device, determining whether a network connection to a second network device is operational, if the connection is operational synchronizing the transactions, and if the ...

Подробнее
04-10-2012 дата публикации

STRUCTURAL SEARCH OF SOURCE CODE

Номер: US20120254835A1
Принадлежит: Infosys Technologies Ltd.

Techniques and tools are described for searching source code. For example, source code can be indexed, a code structure query can be received, index records that conform to the code structure query can be identified, and code structure query results that correspond to the identified index records conforming to the code structure query can be sent. Also for example, a code structure query can be sent, a list of code structure query results corresponding to index records that conform to the code structure query can be received, at least one of the code structure query results can be selected, based on the selection, a formatted source-code file and a code hierarchy can be received, a code annotation associated with the formatted source-code file can be sent, and an annotation result corresponding to the formatted source-code file can be received. 1. A method implemented at least in part with a computing system , the method comprising:indexing source code, the indexing comprising creating index records for a plurality of code elements, wherein the index records for the plurality of code elements comprise structure fields and structure values that correspond to the structure fields;receiving a code structure query comprising at least one field-value expression, wherein the at least one field-value expression comprises a field term and a value term;identifying one or more of the index records that conform to the code structure query, wherein the identified one or more of the index records comprises identifying structure fields and structure values that correspond to the at least one field-value expression; andsending code structure query results that correspond to the identified one or more of the index records that conform to the code structure query.2. The method of claim 1 , wherein the indexing further comprises parsing the source code according to syntax of a programming language to extract information from code elements.3. The method of further comprising:receiving ...

Подробнее
04-10-2012 дата публикации

NATURAL LANGUAGE QUERYING WITH CASCADED CONDITIONAL RANDOM FIELDS

Номер: US20120254143A1
Принадлежит: Infosys Technologies Ltd.

A natural language query tool comprising cascaded conditional random fields (CRFs) (e.g., a linear-chain CRF and a skip-chain CRF applied sequentially) processes natural language input to produce output that can be used in database searches. For example, cascaded CRFs extract entities from natural language input that correspond to column names or column values in a database, and identify relationships between the extracted entities. A search engine can execute queries based on output from the cascaded CRFs over an inverted index of a database, which can be based on one or more materialized views of the database. Results can be sorted (e.g., according to relevance scores) and presented in a user interface. 1. A computer-implemented method comprising:receiving natural language input at a computing device;processing the natural language input in a first conditional random field to obtain a first output from the first conditional random field, the processing in the first conditional random field comprising extracting at least a first entity and a second entity from the natural language input, labeling the first entity as a column value, and labeling the second entity as a column name, the first output comprising a column value label associated with the first entity and a column name label associated with the second entity;processing the natural language input and the first output in a second conditional random field to obtain a second output from the second conditional random field, the processing in the second conditional random field comprising identifying at least one relationship between the first entity and the second entity, the second output comprising information that represents the at least one relationship.2. The method of wherein the second entity corresponds to a column in a database table.3. The method of wherein the first entity corresponds to a value in the column in the database table.4. The method of further comprising representing the at least one ...

Подробнее
14-09-2010 дата публикации

Automated downloading from mainframe to local area network

Номер: US0007797334B2

A tool can automate the process of downloading from a mainframe to a local area network (LAN). A back-end tool and a front-end tool can cooperate to accomplish the downloading process. Both tools can simplify the download process, avoiding complications and common errors. A user interface can provide features for simplifying the download process. Files can be downloaded from separate sub-areas on the mainframe to respective separate sub-areas on the LAN. Download settings can be saved and later retrieved via a name. Downloading for multiple software projects can be supported.

Подробнее
07-01-2010 дата публикации

TASK DECOMPOSITION WITH THROTTLED MESSAGE PROCESSING IN A HETEROGENEOUS ENVIRONMENT

Номер: US20100005472A1
Принадлежит: Infosys Technologies Ltd.

Tasks for a business process can be decomposed into subtasks represented by messages. Message processing can be throttled in a heterogeneous environment. For example, message processing at subtask nodes can be individually throttled at the node level by controlling the number of instances of subtask processors for the subtask node. An infrastructure built with framework components can be used for a variety of business process tasks, separating business logic from the framework logic. Thus, intelligent scalability across platform types can be provided for large scale business processes with reduced development time and resources.

Подробнее
25-01-2007 дата публикации

System and method for providing framework for business process improvement

Номер: US20070021967A1
Принадлежит: Infosys Technologies Ltd.

A method for developing a process roadmap for a business system is disclosed. The method includes identifying a business process and determining business goals and key process metrics for the business process. The method further includes measuring process maturity levels of the business process and identifying business process improvement initiatives based on the process maturity levels. Furthermore, the method includes linking the business process to at least one of the business goals and key process metrics, the process maturity levels, and the business process improvement initiatives for developing the process roadmap for the business system.

Подробнее
11-10-2012 дата публикации

COLLECTION AND ANALYSIS OF SERVICE, PRODUCT AND ENTERPRISE SOFT DATA

Номер: US20120260201A1
Принадлежит: Infosys Technologies Ltd.

Tools and techniques are provided that capture, aggregate, analyze and display soft data relating to an enterprise's services and products, and to the enterprise itself. The soft data comprises customer feedback on services, products and the enterprise, and are based on interactions between enterprise employers and the customers. The soft data comprises quantitative ratings and qualitative comments and is entered by employees at a capture engine. The captured soft data is aggregated and analyzed by an analytics engine, thereby generating aggregate data for use in generating data clouds at a display. Data clouds comprise service, product and enterprise attributes that are weighted according to quantitative rankings and qualitative comments relating to the attributes. Enterprise employees having decision-making authority can request data clouds for display, which can aid the decision makers in making decisions relating to enterprise services and products, and to the enterprise itself.

Подробнее
14-02-2012 дата публикации

System and method for application migration in a grid computing environment

Номер: US0008117606B2

A system and method for assessing performance of a software application migrated to a grid infrastructure are provided. The system comprises a grid code analyzer for generating a directed acyclic graph (DAG) corresponding to the software application by performing static and dynamic analysis; a grid task generator for reducing the DAG generated by the grid code analyzer; and a grid simulator for simulating performance of the software application on one or more predetermined grid infrastructures. The grid simulator accepts the reduced DAG as input and produces performance data as output.

Подробнее
23-10-2008 дата публикации

SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES

Номер: US20080262968A1
Принадлежит: Infosys Technologies Ltd.

Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application.

Подробнее
22-03-2011 дата публикации

Performance evaluation of J2EE applications

Номер: US0007912695B2

Simulation techniques for measuring the performance of J2EE applications are described. Simulation models for J2EE systems are generated which utilize one or more simulation components comprising queuing centers. The queuing centers employ logic to emulate J2EE thread models by locking on threads when messages are received by simulation components and waiting to unlock until a response is received from every subsequent component in the system. Additionally, simulation components which correspond to J2EE system components running on java virtual machines employ logic which emulates overhead introduced during memory allocation and garbage collection. The simulation models are also utilized during software development in a continuous performance evaluation process which gives feedback at each software development stage based on simulations run using the models described.

Подробнее
08-10-2009 дата публикации

CONCEPT-ORIENTED SOFTWARE ENGINEERING SYSTEM AND METHOD FOR IDENTIFYING, EXTRACTING, ORGANIZING, INFERRING AND QUERYING SOFTWARE SYSTEM FACTS

Номер: US20090254877A1
Принадлежит: Infosys Technologies Ltd.

Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software system facts are extracted from artifacts comprising the software system or are provided through explicit definition. Architectures of the software system are recovered from the stored software system facts. Layered views of the recovered architectures are generated. The stored software system facts are checked against architectural rules to ensure architectural compliance of the software system. The impact of proposed changes to the software system is assessed by querying the identified software system facts.

Подробнее
11-10-2012 дата публикации

ELASTIC PROVISIONING OF RESOURCES VIA DISTRIBUTED VIRTUALIZATION

Номер: US20120260019A1
Принадлежит: Infosys Technologies Ltd.

A multi-layer architecture is provided for elastic provisioning of virtualized computing resources. The multi-layer architecture comprises a physical hardware layer comprising a plurality of physical computing machines, a distributed operating system layer that aggregates and virtualizes the computing resources, and a virtual machine layer that comprises virtual machines provisioned, by the distributed operating system layer, with virtualized computing resources. Elastic provisioning of virtualized computing resources comprising receiving computing resource information of a plurality of physical computing machines, producing virtualized computing resources by aggregating the received computing resource information of the plurality of physical computing machines, and provisioning the virtualized computing resources among a plurality of virtual machines.

Подробнее
02-08-2007 дата публикации

Assisted business process exception management

Номер: US20070179833A1
Принадлежит: Infosys Technologies Ltd.

A computer-implemented method of handling exceptions in a business process is disclosed. In one embodiment, a business process exception is identified, classified as being at least one of a plurality of exception types, wherein the classification is based at least in part on a plurality of classification rules, and allocated to at least one user based at least in part on a plurality of allocation rules. The exception can then be investigated and resolved.

Подробнее
04-10-2012 дата публикации

ESTIMATION OF WEB ACCESSIBILITY ASSESSMENT AND REMEDIATION EFFORTS

Номер: US20120254826A1
Принадлежит: Infosys Technologies Ltd.

Tools and techniques are described for estimating web accessibility and remediation efforts. One or more web accessibility standards can be indicated to be included in the effort estimate. A user can indicate which individual guidelines are to be included in standard test effort estimates by selecting individual guidelines, sub-guidelines or priority or success criteria levels. Standard test effort estimates are calculated based on test factors associated with the indicated individual guidelines or sub-guidelines. A total test effort estimate is calculated based on the standard test effort estimates and one or more web page counts, and a web accessibility and remediation effort estimate is calculated based on the total test effort estimate. A framework implementing the effort estimation methods can comprise multiple spreadsheets for use within a spreadsheet application running on a computing device. 1. A computer-implemented method of estimating web accessibility assessment and remediation efforts for one or more web pages , the method comprising:receiving an indication of one or more indicated web accessibility standards to be included in a total standard test effort estimate;receiving one or more web page counts corresponding to the one or more web pages;calculating standard test effort estimates for respective of the one or more indicated web accessibility standards, the standard test effort estimates being based at least in part on test factors associated with the indicated one or more web accessibility standards;calculate the total standard test effort estimate based on the standard test effort estimates;calculating a total test effort estimate based at least in part on the total standard test effort estimate and the one or more web page counts; andcalculating a web accessibility assessment and remediation effort estimate for the one or more web pages based at least in part on the total test effort estimate.2. The method of claim 1 , further comprising ...

Подробнее
29-03-2011 дата публикации

Configurable data masking for software testing

Номер: US0007917770B2

A data masking tool can support a wide variety of data sources and execution mechanisms. For example, any of a wide variety of data masking techniques can be achieved via a web interface, API, command line, SOA, or the like. Connectivity to mainframe environments can be achieved. Multiple data source types and data to and from different technology platform types can be supported. The tool can support interfacing with a metadata management tool. High quality randomness can be provided by a Mersenne Twister random number generator. The tool can be useful for performing data masking during software testing without having to write data masking code.

Подробнее
19-11-2009 дата публикации

Method and system for managing projects over a network

Номер: US20090287609A1
Автор: Vivek Sharma, Varun Sharma
Принадлежит: Infosys Technologies Ltd.

A method and system for managing projects on a network platform that enables a buyer to make a buy request for a project on a network platform. The buy request includes various requirements of the project. In response to the buy request, various sellers provide submissions for the project on the network platform. The submissions may be utilized by the buyer of the project. Various sellers can provide the submissions that comply with one or more requirements of the project. The buyer utilizes the submissions to execute the project, based on their compliance with the requirements of the project, and provides compensation to the sellers.

Подробнее
11-12-2008 дата публикации

USER INTERFACE DEVELOPMENT TOOLS

Номер: US20080307312A1
Принадлежит: Infosys Technologies Ltd.

A user interface tool can use a repository of user interface elements to create a user interface. One or more of the elements in the repository can be reused within the interface or among multiple interfaces. At least some of the elements have associated behavioral information. The behavioral information can indicate how an element is to function or appear based on, for example, the device or business channel in which the user interface is used. The tool can employ a multi-layer architecture. At least some behaviors of the tool (e.g., which elements from the repository are presented to the user, which actions the user can perform on a user interface) can be dependant on one or more roles of the user.

Подробнее
27-11-2008 дата публикации

EFFICIENT XML JOINS

Номер: US20080294659A1
Принадлежит: Infosys Technologies Ltd.

An XML join between XML documents can be performed by comparing XML elements between the XML documents, obtaining join-selection elements from a first XML document, obtaining join-required elements from one or more other XML documents, and performing the XML join using the elements in the first XML document and the join-required elements. The XML documents can be at different locations connected via a network. Where two XML documents are at different locations, the join-selection elements can be transmitted from a first location (of a first XML document) to a second location (of a second XML document). The join-required elements can be obtained at the second location and transmitted back to the first location. The XML join can then be performed at the first location.

Подробнее
04-10-2012 дата публикации

ONE-TIME CREDIT CARD NUMBERS

Номер: US20120254041A1
Принадлежит: Infosys Technologies Ltd.

Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker. 1. A method , implemented at least in part by a computing device , the method comprising:receiving a one-time credit card number for a purchase transaction being made via a customer device;receiving signed purchase transaction details of the purchase transaction originating from the customer device;via a shared secret shared with the customer device and the signed purchase transaction details, determining whether the one-time credit card number is valid; andresponsive to determining that the one-time credit card number is valid, outputting an indication of validity of the purchase transaction.2. One or more computer-readable storage devices having encoded therein computer-executable instructions causing a computer to perform the method of .3. The method of claim 1 , wherein:the one-time credit card number originates from the customer device.4. The method of claim 1 , wherein:the one-time credit card number is of a format and syntax of a conventional credit card number.5. The method of claim 1 , wherein:determining whether the one-time credit card number is valid comprises:generating, via the shared secret shared with the customer device, a check one-time credit card number; anddetermining whether the one-time credit card number and the check one-time credit card number match.6. The method of claim 1 , wherein:determining whether the one-time credit card number is valid ...

Подробнее
03-12-2009 дата публикации

System and method for universe generation

Номер: US20090300061A1
Принадлежит: Infosys Technologies Ltd.

A system and method for automatically generating the universe from the documented MS-Excel file is disclosed. The methods for the Generate Universe, Migrate Universe, Update Universe and Document Universe are disclosed. The method helps in reduction of build effort of the project and removes the problem of corruption of the universe file of link being lost. The method provides easy maintenance of the universe versions and multi-user development environments and updating of universe files.

Подробнее
26-07-2007 дата публикации

AUTOMATED DOWNLOADING FROM MAINFRAME TO LOCAL AREA NETWORK

Номер: US20070174294A1
Принадлежит: Infosys Technologies Ltd.

A tool can automate the process of downloading from a mainframe to a local area network (LAN). A back-end tool and a front-end tool can cooperate to accomplish the downloading process. Both tools can simplify the download process, avoiding complications and common errors. A user interface can provide features for simplifying the download process. Files can be downloaded from separate sub-areas on the mainframe to respective separate sub-areas on the LAN. Download settings can be saved and later retrieved via a name. Downloading for multiple software projects can be supported.

Подробнее
29-03-2012 дата публикации

METHOD AND SYSTEM FOR PREAUTHENTICATING A MOBILE NODE

Номер: US20120077461A1
Автор:
Принадлежит: Infosys Technologies Ltd.

A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers. 1. A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) , comprising:at the CPoA, receiving one or more preauthentication requests comprising a proxy assignment from the mobile node, wherein each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs); andusing the CPoA, preauthenticating the mobile node with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.2. The method of claim 1 , wherein the proxy assignment for each of the one or more preauthentication requests is digitally signed by the mobile node.3. The method of claim 2 , wherein preauthenticating the mobile node further comprises:verifying the proxy assignment for each of the one or more preauthentication requests with at least one of the one or more authentication servers; andtransmitting each of the one or more preauthentication requests by the CPoA to a corresponding authentication server of the one or more authentication servers.4. The method of claim 3 , wherein each of the one or more preauthentication requests comprises an authentication protocol selected from the group consisting of:extensible authentication protocol (EAP);extensible authentication protocol- ...

Подробнее
19-04-2012 дата публикации

METHOD AND SYSTEM FOR PERFORMING EVENT-MATCHING WITH A GRAPHICAL PROCESSING UNIT

Номер: US20120092352A1
Принадлежит: Infosys Technologies Ltd.

A computer-implemented method for event matching in a complex event processing system includes receiving, with a computer processing device, a stream of event data; receiving, with a computer processing device, an event list and an access predicate list, wherein the event list includes one or more event data pairs; and identifying, with a graphical processing device, patterns in the stream of event data. 1. A computer-implemented method for event matching in a complex event processing system comprising:receiving, with a computer processing device, a stream of event data;receiving, with a computer processing device, an event list and an access predicate list, wherein the event list comprises one or more event data pairs; andidentifying, with a graphical processing device, patterns in the stream of event data.2. The method of claim 1 , wherein the step of identifying patterns comprises:loading in memory said event list;loading in memory for each of one or more threads said access predicate list and one of said event data pairs;initializing a bit vector for each thread;indexing said bit vector according to corresponding predicates;traversing said access predicate list;computing in each thread the result of a comparison function; andadvancing through each event in said event list.3. The method of claim 2 , wherein said event list is loaded in a global memory of said graphical processing device.4. The method of claim 3 , wherein said one or more event data pairs and said access predicate list are loaded in a local memory of said each thread.5. The method of claim 4 , wherein said bit vector is the size of the number of predicates in said access predicate list.6. The method of claim 1 , wherein the step of identifying patterns comprises:loading in memory said event list;allocating one or more threads in said graphical processing device per each event in said event list;loading in memory one or more event data pair and an access predicate list;initializing a bit vector; ...

Подробнее
19-04-2012 дата публикации

SYSTEM AND METHOD FOR DETECTING PREVENTATIVE MAINTENANCE OPERATIONS IN COMPUTER SOURCE CODE

Номер: US20120096434A1
Автор:
Принадлежит: Infosys Technologies Ltd.

The invention relates to a system and method for identifying occurrences of preventive maintenance on computer source code. The method comprises analyzing source code, defining data sets associated with characteristics of the source code, and applying an operation algorithm to the data sets to thereby identify occurrences of preventive maintenance operations that were carried out on the source code. A first instance of a source code and a second instance of the source code are preferably analyzed, wherein the second instance of the source code is a revised version of the first instance of the source code, a first data set associated with the first instance of the source code and a second data set associated with the second instance of the source code are preferably defined, and the operation algorithm is preferably applied to the first data set and the second data set to thereby identify at least one occurrence of a preventive maintenance operation that was carried out on the source code. 1. A method for identifying occurrences of preventive maintenance on computer source code , the method comprising:analyzing, by a computing device, a first instance of a source code and a second instance of the source code, wherein the second instance of the source code is a revised version of the first instance of the source code;defining, by a computing device, a first data set associated with at least one characteristic of the first instance of the source code and a second data set associated with at least one characteristic of the second instance of the source code; andapplying, by a computing device, an operation algorithm to the first data set and the second data set to thereby identify at least one occurrence of a preventive maintenance operation that was carried out on the source code.2. The method of claim 1 , wherein:the step of analyzing comprises selecting a file that exists within a module in the first instance of the source code and within a module in the second ...

Подробнее
12-07-2012 дата публикации

METHOD AND SYSTEM FOR CREATING A VIRTUAL WIRELESS SENSOR NETWORK

Номер: US20120176938A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN. 1. A computer implemented method of creating a virtual Wireless Sensor Network (WSN) , the method comprising: determining a communication mode between a plurality of sensor nodes of the physical WSN and a base station;', 'segregating a plurality of packets exchanged by the plurality of sensor nodes of the physical WSN and the base station;', 'identifying a source sensor node and a traversed network path of the plurality of segregated packets;', 'transforming at least one of sensor data and control data from the plurality of segregated packets into a predefined format; and, 'extracting one or more niceties of a physical WSN, wherein extracting the one or more niceties comprisesembedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN.2. The method as recited in claim 1 , wherein the communication mode comprises at least one of serial communication claim 1 , USB communication claim 1 , Ethernet communication and wireless communication.3. The method as recited in claim 2 , further comprising translating details of the determined communication mode into details of a predetermined communication mode.4. The method as recited in claim 1 , wherein segregating the ...

Подробнее
19-07-2012 дата публикации

METHOD AND SYSTEM FOR CONVERTING UBL PROCESS DIAGRAMS TO OWL

Номер: US20120185517A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

The present invention includes a method and a system for creating Web Ontology Language (OWL) ontology from a Universal Business Language (UBL) process diagram. The UBL process diagram includes one or more processes, one or more partitions, one or more activities, one or more objects, an initial node, and a final node. At least one of the processes, the partitions, the activities, and the objects are extracted from the UBL process diagram. A first OWL class, a second OWL class, and a third OWL class are created corresponding to the processes, partitions, and objects, respectively. Thereafter, an object property is created corresponding to each of the activities, the initial node, and the final node. Finally, the first OWL class, the second OWL class, the third OWL class, and each of the created object property are added to obtain the OWL ontology. 1. A method for creating OWL (Web Ontology Language) ontology rom a BL (Universal Business Language) process diagram , the UBL process diagram comprising one or more processes , one or more partitions , one or more activities , one or more objects , an initial node , and a final node , the method comprising:a. extracting at least one of the one or more processes, the one or more partitions, the one or more activities, and the one or more objects from the UBL process diagram;b. creating a first OWL class corresponding to the one or more processes, the one or more processes being assigned as instances to the first OWL class;c. creating a second OWL class corresponding to the one or more partitions, the one or more partitions being assigned as instances to the second OWL class;d. creating a third OWL class corresponding to the one or more objects, the one or more objects being assigned as instances to the third OWL class;e. creating an object property corresponding to each of the one or more activities; andf. adding the first OWL class, the second OWL class, the third OWL class, and each of the created object property, ...

Подробнее
20-09-2012 дата публикации

NETWORK EMULATION WITH VARYING BANDWIDTH AND/OR ERROR RATE

Номер: US20120236740A1
Автор:
Принадлежит: Infosys Technologies Ltd.

Network emulation techniques are provided for dynamically varying network bandwidth and/or error rate. Network emulation can be performed by determining a bandwidth range, determining a plurality of specific bandwidth values distributed across the bandwidth range, and dynamically varying available bandwidth among the plurality of specific bandwidth values for a stream of network packets. Transitioning between specific bandwidth values can be performed using a probability jump matrix. Network emulation can also be performed by varying error rates, such as dropped packets, separately or in addition to dynamic bandwidth variation. 1. A method , implemented at least in part by a computing device , for implementing a network emulator for emulating network conditions , the method comprising:determining, by the computing device, a bandwidth range;determining, by the computing device, a plurality of specific bandwidth values distributed across the bandwidth range; andfor a stream of network packets, dynamically varying, by the computing device, available bandwidth among the plurality of specific bandwidth values according to a probability jump matrix associated with the plurality of specific bandwidth values.2. The method of further comprising:obtaining, by the computing device, a maximum bandwidth value; andobtaining, by the computing device, a minimum bandwidth value;wherein the bandwidth range is from the minimum bandwidth value to the maximum bandwidth value.3. The method of further comprising:partitioning, by the computing device, the bandwidth range into a plurality of non-overlapping bandwidth intervals, each of the plurality of non-overlapping bandwidth intervals assigned a bandwidth state identifier, and each of the plurality of specific bandwidth values corresponding to a respective one of the plurality of non-overlapping bandwidth intervals.4. The method of wherein the stream of network packets is received by the network emulator from a software application ...

Подробнее
27-09-2012 дата публикации

METHOD AND SYSTEM FOR CAPTURING MEDICAL IMAGING DATA

Номер: US20120245466A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A portable medical image capturing apparatus is disclosed. The apparatus includes a plurality of transducers that are enabled to capture medical imaging data of a patient. The plurality of transducers are placed on an enclosure. The plurality of transducers capture the medical imaging data when the enclosure is held close to the patient. Further, the apparatus includes a communications module to transmit the medical imaging data of the patient to a remote data processing unit. The remote data processing unit is enabled to enhance the captured medical imaging data of the patient. 1. A portable medical image capturing apparatus , comprising:a plurality of transducers placed on an enclosure, wherein the plurality of transducers are enabled to capture medical imaging data of a patient when the enclosure is held close to the patient; anda communications module to transmit the medical imaging data of the patient to a remote data processing unit, wherein the remote data processing unit is enabled to enhance the captured medical imaging data of the patient.2. The portable medical image capturing apparatus as recited in wherein the remote server is further configured to transmit the enhanced medical imaging data of the patient to a user system.3. The portable medical image capturing apparatus as recited in wherein the plurality of transducers capture 2-dimensional ultrasound images of the patient.4. The portable medical image capturing apparatus as recited in wherein the remote data processing unit enhances the 2-dimensional ultrasound images of the patient to a 3-dimensional Doppler image.5. The portable medical image capturing apparatus as recited in claim 1 , wherein the communications module is a wireless data transmitter.6. The portable medical image capturing apparatus as recited in claim 1 , wherein the communications module is a Bluetooth device that transmits the medical imaging data to the patient's computer for transmission to the remote server.7. The portable ...

Подробнее
04-10-2012 дата публикации

METHODS FOR DECISION MAKING THROUGH CONVEX HULL OPTIMIZATION AND DEVICES THEREOF

Номер: US20120253860A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

Described are methods, systems, and computer-readable storage media for decision making through convex hull optimization. A plurality of key performance indicators (KPIs) are received. A convex hull encompassing the plurality of KPIs is generated. Based at least in part on the generated convex hull and on at least one KPI satisfying a condition, an operating range of one or more other KPIs is determined. Moreover, specific values at which each of the other KPIs may be maintained in order to reach a defined objective are determined. 1. A method for decision making through convex hull optimization , the method comprising:receiving, by a decision-making computing device, a plurality of key performance indicators (KPIs);generating, by the decision-making computing device, a convex hull encompassing the plurality of KPIs; anddetermining, by the decision-making computing device, based at least in part on the generated convex hull and on at least one KPI satisfying a condition, an operating range of one or more other KPIs.2. The method of claim 1 , wherein the plurality of KPIs comprise an internal KPI claim 1 , an external KPI claim 1 , a response KPI claim 1 , or any combination thereof.3. The method of claim 2 , wherein the plurality of KPIs comprise at least one response KPI.4. The method of claim 3 , wherein determining further comprises:determining, by the decision-making computing device, based at least in part on the generated convex hull and on a response KPI satisfying a condition, the operating range of one or more other KPIs.5. The method of claim 1 , wherein determining the operating range of the one or more other KPIs further comprises:optimizing, by the decision-making computing device, an objective function with the at least one KPI as a variable, subject to constraints of the generated convex hull and to the condition.6. The method of claim 5 , wherein optimizing comprises minimizing the objective function claim 5 , maximizing the objective function claim ...

Подробнее
04-10-2012 дата публикации

METHODS FOR RECORDING AND TRACKING PROJECTS AND DEVICES THEREOF

Номер: US20120253864A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method, non-transitory computer readable medium and apparatus that obtains project data in one or more form fields of one or more remotely located user based interfaces for a project. The obtained project data from the one or more form fields of the one or more remotely located user based interfaces for the project is validated. The validated project data is recorded in a project database for the project directly from each of the one or more remotely located user based interfaces. A project tracking report is generated based on the recorded project data. 1. A method for recording and tracking a project , the method comprising:obtaining with a project management computing apparatus project data in one or more form fields of one or more remotely located user based interfaces for a project;validating with the project management computing apparatus the obtained project data from the one or more form fields of the one or more remotely located user based interfaces for the project;recording with the project management computing apparatus the validated project data in a project database for the project directly from each of the one or more remotely located user based interfaces; andgenerating with the project management computing apparatus a project tracking report based on the recorded project data.2. The method as set forth in further comprising providing with the project management computing apparatus the one or more user based interfaces to one or more client computing devices remotely located from the project management computing apparatus.3. The method as set forth in further comprising generating with the project management computing apparatus the project with a plurality of fields for tracking one or more stages in the project database claim 2 , wherein the one or more form fields of the provided one or more remotely located user based interfaces corresponds with the plurality of fields.4. The method as set forth in wherein the obtaining further comprises ...

Подробнее
04-10-2012 дата публикации

SYSTEM AND METHOD FOR OPTIMIZING PLANNING PRODUCTION USING FEATURE DRIVEN VALUE APPROXIMATION TECHNIQUES

Номер: US20120253865A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method is disclosed of implementing a production planning module that is configured to optimize overall costs associated with reconfiguring a production facility during a changeover between to produce a another product family over a plurality of cycles. User input data is received via a user interface and a first state vector is created and is representative of a first product family and a first inventory of items of all product families manufactured at the production facility. A first action vector is created of a first quantity of items to be produced of the first product family in a first current cycle and a second product family to be produced in a second cycle. A first state-action value function is calculated for the first action vector in a first iteration and incorporates a first sampled demand of the first inventory items of the product families, a first inventory cost associated with the first inventory and a first set up cost. A second state vector is created based on the first state vector, the first action vector and the first sampled demand. The second state vector is made of a second inventory of items of all the product families. The method comprises creating a second action vector of a second quantity of items to be produced of the second product family in the second cycle and a third product family to be produced in a third cycle. A second state-action value function is calculated for the second action vector, a second sample demand of items, a second inventory cost associated with production of the second quantity of items and a second set up cost associated with reconfiguration of the production facility from producing the second product family to producing the third product family. A cost optimization result policy is output by minimizing, over all actions vectors, the first state-action value function in the user interface. 1. A method of implementing a production planning module configured to optimize overall costs associated with ...

Подробнее
04-10-2012 дата публикации

CENTRALIZED FINANCIAL MANAGEMENT TOOL AND METHOD OF USE

Номер: US20120254002A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method of providing a centralized financial management tool which includes a financial application module implemented on a network device. The network device includes a linking interface which operates with the financial application module. The module, via the linking interface, sends requests in the form of messages compliant with a standardized messaging scheme, to receive account information of the user's different accounts from one or more different subscribed financial institutions. The module receives account information of the user's different accounts in the form of messages compliant with the standardized messaging scheme from the subscribed financial institutions. The module compiles and displays the account information for the user's different accounts in a user interface. The compiled account information can be categorized to allow the user to analyze, budget, and seek information from other users and financial advisors as well as perform any other financial management related functions on any of the user's different accounts. 1. A method of providing a centralized financial management tool comprising:executing a financial application module implemented on a network device, the network device including a linking interface configured to operate with the financial application module;requesting first account information for a user from a first server of a subscribed first financial institution, the request communicated from the financial application module, wherein the request is sent from the linking interface as one or more messages in compliance with a standardized messaging scheme;receiving the first account information at the linking interface of the network device, the first account information transmitted from the first server of the subscribed first financial institution as one or more transmitted messages in compliance with the standardized messaging scheme;compiling the first account information from the first server; anddisplaying ...

Подробнее
04-10-2012 дата публикации

DETECTING CODE INJECTIONS THROUGH CRYPTOGRAPHIC METHODS

Номер: US20120255027A1
Принадлежит: Infosys Technologies Ltd.

Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding code digest, and based upon a comparison with the code digest received from the server, determines if the received content has been corrupted. The code digest can be signed or supplied with a digital certification for verification that the code digest originated from the server providing the content. 1. A method , comprising:receiving a code digest associated with content received from a content server;determining if the received content corresponds to the code digest; andprocessing the received content based on the determination.2. The method of claim 1 , wherein the content received from the content server includes at least one web page.3. The method of claim 1 , wherein determining if the received content corresponds to the message digest is based on applying a hash function to the received content.4. The method of claim 3 , wherein the determining is based on a comparison of the received code digest with a digest obtained by applying the hash function to the received content.5. The method of claim 1 , wherein the received code digest is associated with static content portions claim 1 , and further comprising:parsing the received content to identify static content portions;obtaining a static content digest associated with the identified static content portions; anddetermining if the received content corresponds to the received message digest based on a comparison of the static content digest and the received content digest.6. The method of claim 5 , wherein the static content digest is obtained by applying a hash function to the identified static content portions.7. The method of claim 6 , wherein the hash function is the SHA function.8. The method of claim 5 , further comprising determining that the content digest is associated with the content provider based on a ...

Подробнее
11-10-2012 дата публикации

METHOD AND SYSTEM FOR GENERATING AT LEAST ONE OF: COMIC STRIPS AND STORYBOARDS FROM VIDEOS

Номер: US20120257876A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method, a system, and a computer program product code for generating a series of still images from an input video file are provided. The series of still images may include, but are not limited to, a comic strip and a storyboard. The method includes extracting audio and visual frames from the video file. Thereafter, basic units of the video file are identified. The basic units are exposition (beginning), conflict (middle), and resolution (end). Thereafter, key frames are extracted from the basic units based on at least one of audio frames, visual frames, and a combination of the visual frames and the audio frames. Then, the extracted key frames are manipulated to output a series of still images. Subsequently, narration in the form of audio or text is attached to the still images to generate at least one of comic strips and storyboards.

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR EFFICIENT TEST CASE GENERATION USING INPUT DEPENDENCY INFORMATION

Номер: US20120259576A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method for providing an efficient test case generator is disclosed. A test case project is established upon request from a user, via a user interface, to test an item. The test case project includes a plurality of fields and corresponding designated values to be tested. A first set of identified fields of the plurality are received, wherein the first set includes two or more fields identified by the user as having a dependent relationship with at least one another. A first relational field cluster for the first set of related fields and their values is created. A test case generation technique is performed on the first relational field cluster to compute all relevant test conditions for the first relation field cluster. Results of the computed test conditions for the first relational field cluster are displayed to the user via the user interface.

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR SLANG SENTIMENT CLASSIFICATION FOR OPINION MINING

Номер: US20120259617A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

The present disclosure describes a method of sentiment oriented slang for opinion mining. With increasing use of internet, many users can submit their review comments directly to the companies which can be automatically processed and summarized with critical issues from time to time and help the company get real time feedback from its customers. The method comprises, receiving at least one document comprising a plurality of sentiment oriented slang. The next step of the method comprises identifying the plurality of sentiment oriented slang in the at least one document. Further, a polarity score of each of a slang word identified is determined and sentiment information is displayed on an output device as an output.

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR AUGMENTED REALITY AND SOCIAL NETWORKING ENHANCED RETAIL SHOPPING

Номер: US20120259744A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

An augmented reality system is necessary for providing assistance for the customer in retail purchase decision. The augmented reality system comprising a one data sending module which is configured to send retail product information to the central server module is provided. A central server module configured to receive the retail product information from the data sending server where, the central server module is attached to a processor to process the retail product information. Processing the retail product information at the central server module, wherein the central server module retrieves retail product information from multiple databases which contains the retail product information. A data receiving module configured to receive the retail product information from the central server module. An application server configured to accept input from a user and to share the user details with a social networking platform. 1. A method comprising the steps of:receiving a predefined retail product as an input through a digital device, the displaying the predefined retail product on an output display in the form of a three dimensional image;sending a predefined retail product metadata through a communication channel to a plurality of databases;receiving a processed predefined retail product information from the plurality of databases; andsharing the processed predefined retail product information to at least one application in real time.2. The method of wherein receiving a predefined retail product through a digital medium is claim 1 , flashing the predefined retail product with a unique mark against a camera.3. The method of wherein the step of receiving the processed predefined retail product information from the plurality of databases further comprises displaying the predefined retail product information on request by a user.4. The method of wherein the step of displaying the three dimensional image on the output display further comprises sharing with the at least one ...

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR IMPLEMENTING A WINDOW SORTING MECHANISM

Номер: US20120259869A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method of providing a window sorting mechanism comprises receiving an array having a plurality of objects, wherein each object contains a digit. The digits in the received array are unsorted in association with a desired sorting arrangement. A length of the received array is determined, whereby received array is separated into a plurality of sub-arrays based on the length of the received array. An inter sub-array digit sorting process is performed in a first iteration between a first sub-array and a second sub-array to sort digits in correspondingly positioned objects in accordance with a first comparison rule. A first adjacent-object digit sorting process is performed in a second iteration on the first and second sub-arrays using simultaneously sorting windows of a first digit size in accordance with a second comparison rule. A second adjacent-object digit sorting process is then performed in a third iteration on the first and second sub-arrays using sorting windows of a second digit size. 1. A method of providing a window sorting mechanism , the method comprising:executing a window sorting mechanism implemented on a network device;receiving an array having a plurality of objects, each object containing a digit, wherein the digits in the received array are unsorted in association with a desired sorting arrangement;determining a length of the received array using one or more processors;separating, using the one or more processors, the received array into a plurality of sub-arrays based on the length of the received array, wherein at least two sub-arrays comprise a first sub-array and a second sub-array, the first and second sub-arrays having an equal number of objects;performing, using the one or more processors, an inter sub-array digit sorting process in a first iteration between the first sub-array and the second sub-array to sort digits in correspondingly positioned objects of the first and second sub-arrays in accordance with a first comparison ...

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR IMPLEMENTING A DYNAMIC CHANGE IN SERVER OPERATING CONDITION IN A SECURED SERVER NETWORK

Номер: US20120259913A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method of implementing a dynamic change in a server operating condition in a secured server network comprises operating an application server, wherein the application server processes a plurality of scheduled tasks on behalf of one or more requesting network devices when in an operating mode. The scheduled tasks are assigned to the application server by a handling server. A stand-by status command sent from the application server to the handling server indicates that the application server's status has changed from the operating mode to a stand-by mode. The handling server accordingly does not schedule any new tasks to the application server when in it is in the stand-by mode. The application server processes all already scheduled tasks and outputs results for the scheduled tasks to the handling server while it is in the stand-by mode. 1. A method of implementing a dynamic change in server operating condition in a secured server network comprising:operating an application server in a secured server network, wherein the application server processes a plurality of scheduled tasks on behalf of one or more requesting network devices when in an operating mode, wherein the plurality of scheduled tasks are assigned to the application server by a handling server;sending a stand-by status command from the application server to the handling server indicating that a status of the application server has changed from the operating mode to a stand-by mode, wherein the handling server does not schedule any new tasks to be processed by the application server when in the stand-by mode;processing, at the application server, all already scheduled tasks to produce results for each of the already scheduled tasks while in the stand-by mode; andsending the results associated with each of the already scheduled tasks to the handling server, wherein the results are routed from the handling server to corresponding requesting network devices.2. The method of wherein the ...

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR DYNAMICALLY MODIFYING CONTENT BASED ON USER EXPECTATIONS

Номер: US20120259945A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps. 1. A computer-implemented method for dynamically rendering content based on user expectations , the method comprising:intercepting at a computing device a request for content to be delivered from a server;determining a quality of service value based on user expectations and a user tolerance level based on the content and a user profile; anddelivering a modified version of the content to the user based on the quality of service value.2. The method of claim 1 , further comprising:downloading the requested content from the server to a cache; andmodifying the cached content based on the quality of service value.3. The method of claim 1 , wherein the content is at least one of a web page claim 1 , a form claim 1 , multimedia claim 1 , and streaming content.4. The method of claim 1 , wherein the user expectations define specifications of the modified version of the content.5. The method of claim 1 , wherein the user tolerance level defines an accepted latency time for the delivered content.6. The method of claim 1 , wherein the user ...

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR IMPLEMENTING A DYNAMIC CHANGE IN SERVER OPERATING CONDITION IN A SECURED SERVER NETWORK

Номер: US20120259956A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method of implementing a dynamic change in a server operating condition in a secured server network. A handling server receives a first request from a network device to access a specific service to be processed by a first application server. The handling server sends a first task to a first application server to process the first request, wherein the first task is stored and scheduled in a task processing queue of the first application server. The handling server receives a stand-by status command from the first application server indicating that it is going into a stand-by mode. The handling server does not send any new tasks to the first application server after receiving the stand-by status command. The handling server receives a first output result associated with the first task from the first application server, wherein the handling server sends the first output result to the network device.

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR DYNAMIC MODIFICATION OF WEB PAGE CONTENT TO ENSURE CONSISTENT RESPONSE TIME

Номер: US20120259974A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of system constraints. Further, an available time is computed by the middleware for a data response by using one or both of the plurality of the system constraints and a target time. Determining an amount of the data response to be provided to a client based on the available time and converting the data response based on the amount of data response to be provided to the client.

Подробнее
11-10-2012 дата публикации

FAST BOOTING COMPUTER APPARATUSES AND METHODS THEREOF

Номер: US20120260079A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A fast booting computer apparatus includes one or more processors and a memory comprising a hard disk drive and a solid state drive coupled to the one or more processors. The one or more processors are configured to execute programmed instructions stored in the memory. The solid state drive is configured to store and provide the programmed instructions for an operating system for execution by the one or more processors when requested.

Подробнее
11-10-2012 дата публикации

SYSTEM AND METHOD FOR SECURING DATA TRANSACTION

Номер: US20120260089A1
Автор:
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data. 1. A method comprising:providing a personal identification number, wherein the personal identification number is associated to a unique number of a user;invoking a one-time password generator using the personal identification number;accessing a metadata by the one-time password generator, wherein a value is retrieved from the metadata to generate a dynamic key; and a symmetric encryption key; and', 'a symmetric decryption key;, 'converting the dynamic key to at least one or more ofwherein the symmetric encryption key is used to encrypt a data and the symmetric decryption key is used to decrypt the data.2. The method of wherein the step of providing a personal identification number further comprises receiving the personal identification number on a client device from a user.3. The method of wherein the client device is at least one or more of:a mobile device;a handheld device;a kiosk; anda personal computer.4. The method of wherein the step of using the symmetric encryption key to encrypt a data further comprises claim 1 , transmitting the encrypted data to a server.5. The method of further ...

Подробнее
11-10-2012 дата публикации

RESPONSE SIMULATOR COMPUTING APPARATUSES AND METHODS THEREOF

Номер: US20120260235A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method, non-transitory computer readable medium and apparatus that simulates responses includes obtaining one or more requests from two or more different types of interfaces for an application. Each of the one or more obtained requests is parsed to obtain one or more components. A simulated response is fetched based on the parsed one or more components for each of the one or more obtained requests. The fetched simulated response for each of the one or more obtained requests is provided to the corresponding one of the two or more different types of interfaces for the application. This technology provides a simple data driven simulation that is easily deployable and integrated into the existing development environments with customizable plug-in components.

Подробнее
22-11-2012 дата публикации

METHODS FOR SELECTING ONE OF A PLURALITY OF COMPETING IT-LED INNOVATION PROJECTS AND DEVICES THEREOF

Номер: US20120296688A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

Methods, systems, and computer-readable storage media for selecting one of a plurality of information technology (IT)-led innovation projects include obtaining a plurality of IT-led innovation projects. A selection of one or more research projects for each of the obtained IT-led innovation projects is determined based at least on one or more research project criteria. One of the obtained IT-led innovation projects is selected based at least on the determined selection of one or more research projects for each of the obtained IT-led innovation projects and one or more innovation project criteria. The selection of the one of the obtained IT-led innovation projects is provided. 1. A method for selecting one of a plurality of information technology (IT)-led innovation projects , the method comprising:obtaining, at a project selection computing device, a plurality of IT-led innovation projects;determining, with the project selection computing device, a selection of one or more research projects for each of the obtained IT-led innovation projects based at least on one or more research project criteria;selecting, with the project selection computing device, one of the obtained IT-led innovation projects based at least on the determined selection of one or more research projects for each of the obtained IT-led innovation projects and one or more innovation project criteria; andproviding, with the project selection computing device, the selection of the one of the obtained IT-led innovation projects.2. The method as set forth in claim 1 , wherein the determining further comprises applying claim 1 , with the project selection computing device claim 1 , one or more research project metrics to the one or more research project criteria claim 1 , wherein the determined selection of one or more research projects for each of the obtained IT-led innovation projects is further based on the applied one or more research project metrics.3. The method as set forth in claim 2 , wherein ...

Подробнее
13-12-2012 дата публикации

METHOD FOR PROVIDING CONTEXT AWARE ACCESS IN GLOBAL SOFTWARE PROJECT MANAGEMENT

Номер: US20120317195A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method and system for managing communication between a plurality of team members are provided. The method includes, at a first agent associated with a team member, receiving inputs from a team member about an event associated with one or more team members. The method further includes sending an event request to agents of one or more team members and receiving responses from them. Based on the responses, the first agent either cancels the event, schedules the event, or reschedules the event. 1. A method for managing communication between a plurality of team members , the method comprising: a) receiving inputs from the first team member for an event associated with one or more team members of the plurality of team members;', 'b) sending an event request to each agent associated with the one or more team members;', 'c) receiving one or more responses from each agent associated with a subset of team members from the one or more team members;', 'd) cancelling the event when an agent associated with a predetermined team member sends a reject response;', 'e) re-scheduling the event when a predefined number of reject requests are received, wherein the re-scheduling is performed based on responses received from one or more team members; and', 'f) scheduling the event when at least one of a predefined criterion is satisfied., 'at a first agent associated with a first team member2. The method of claim 1 , wherein each team member of the subset of team members is in an offline state.3. The method of claim 1 , wherein the event is at least one of:a) a meeting between the first team member and the one or more team members; andb) a review of a document sent by the first team member by the one or more team members4. The method of claim 1 , wherein the event request comprises at least one of a time for the event claim 1 , a location for the event claim 1 , a purpose for the event and a priority of the event.5. The method of claim 3 , wherein the time of the event is estimated ...

Подробнее
03-01-2013 дата публикации

METHODS FOR RECOMMENDING PERSONALIZED CONTENT BASED ON PROFILE AND CONTEXT INFORMATION AND DEVICES THEREOF

Номер: US20130007198A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device. 1. A method for recommending personalized content , the method comprising:identifying with a content management computing apparatus profile information for a received request associated with an end user at a requesting computing device;identifying with the content management computing apparatus context information associated with the requesting computing device;obtaining by the content management computing apparatus customized content responsive to the received request from a content provider device based on the identified profile information and the identified context information; andproviding by the content management computing apparatus the obtained customized content to the requesting computing device.2. The method as set forth in further comprising:determining with the content management computing apparatus whether the end user at the requesting computing device associated with the received request is registered; andregistering with the content management computing apparatus the end user at the requesting computing device associated with the receive request when the determining indicates the profile information is not stored.3. The method as set forth in wherein the identifying the profile information further comprises identifying with the content management computing apparatus personal information and usage pattern information associated with the end user at the requesting computing device.4. The method as set forth in wherein the identifying the ...

Подробнее
09-05-2013 дата публикации

METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR DETECTING SCENE CHANGES IN A VIDEO

Номер: US20130113999A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A method, system and computer-readable media for detecting scene changes in a video that includes providing by one or more computing devices a plurality of passes through the video where a plurality of detected scenes from a first pass in a conventional method are identified and a second pass through the detected scenes are provided by the computing device. A plurality of scene boundary differences corresponding to the detected scenes, a fixed average, and a varying average are computed by the computing device. The scene boundary difference is compared with the fixed average and the varying average and if the scene boundary difference is less than the fixed average and the varying average, the detected scenes are combined else the detected scene being an abrupt scene change is determined. The steps of computing a varying average to combining the detected scenes are repeated by the computing device. 1. A computer implemented method executed by one or more computing devices to detect scene changes in a video , said method comprising the steps of:a) providing, by at least one of the computing devices, plurality of passes through the video;b) wherein identifying, by at least one of the computing devices, plurality of detected scenes from a first pass in a conventional method;c) providing, by at least one of the computing devices, a second pass through said plurality of detected scenes;d) computing, by at least one of the computing devices, plurality of scene boundary differences corresponding to said plurality of detected scenes;e) computing, by at least one of the computing devices, a fixed average;f) computing, by at least one of the computing devices, a varying average;g) comparing, by at least one of the computing devices, said scene boundary difference with said fixed average and said varying average;h) combining, by at least one of the computing devices, said detected scenes if said scene boundary difference is less than said fixed average and said varying average ...

Подробнее
22-08-2013 дата публикации

SYSTEM AND METHOD FOR AUTOMATED AND OBJECTIVE ASSESSMENT OF PROGRAMMING LANGUAGE CODE

Номер: US20130219374A1
Принадлежит: INFOSYS TECHNOLOGIES, LTD.

A system and method of evaluating a software program is disclosed. Information of a proposed problem is received from a user via the user interface and a problem profile associated with the proposed problem is created. A master software solution associated with the proposed problem is processed to identify one or more attributes, such as a first identified attribute. One or more first test cases associated with the first identified attribute in the master software solution are generated. An evaluation program including at least the one or more generated first test cases is generated. The generated evaluation program is configured to be applied to at least one submitted software program that is to be evaluated. At least the one or more first test cases is configured to be applied as one or more test inputs to a corresponding attributes in the submitted software program. 1. A method of evaluating a software program , the method comprising:receiving information of a proposed problem from a user via the user interface and creating a problem profile associated with the proposed problem;processing a master software solution associated with the proposed problem to identify one or more attributes, wherein the one or more identified attributes includes at least a first identified attribute;generating one or more first test cases associated with the first identified attribute in the master software solution; andgenerating an evaluation program including at least the one or more generated first test cases, wherein the generated evaluation program is configured to be applied to at least one submitted software program to be evaluated such that at least the one or more first test cases is configured to be applied as one or more test inputs to a corresponding attributes in the submitted software program.2. The method of claim 1 , further comprising:identifying a second attribute from the master software solution during processing;generating one or more second test cases associated ...

Подробнее
26-04-2016 дата публикации

Method for providing context aware access in global software project management

Номер: US9324059B2
Принадлежит: Infosys Technologies Ltd

A method and system for managing communication between a plurality of team members are provided. The method includes, at a first agent associated with a team member, receiving inputs from a team member about an event associated with one or more team members. The method further includes sending an event request to agents of one or more team members and receiving responses from them. Based on the responses, the first agent either cancels the event, schedules the event, or reschedules the event.

Подробнее
02-02-2021 дата публикации

一种新型果杯换向装置

Номер: CN212449323U
Автор: 朱二, 朱壹

本实用新型公开了一种新型果杯换向装置,包括主动轮,所述主动轮内侧轴线上固定连接有固定轴,所述主动轮外侧活动啮合连接有链条,所述主动轮后端固定连接有同心圆盘,所述链条右端内侧啮合连接有从动轮,所述链条内部左端下侧固定连接有导向张紧装置,所述链条外侧活动连接有果杯,所述链条上端前后两端固定连接有分选线,所述同心圆盘呈圆柱形片状结构分分别与主动轮从动轮共轴分布。该新型果杯换向装置,导向张紧装置可以有效的实现链条的导向张紧,增大链条的转弯半径,有效的避免了链条跳链、跑偏的非正常损坏,保证了链条传动的稳定性,减小传动过程中的噪声,增长链条的使用寿命。

Подробнее
02-02-2021 дата публикации

一种非对称式翻箱机

Номер: CN212449503U
Автор: 朱二, 朱壹

本实用新型公开了一种非对称式翻箱机,包括动力滚筒,所述动力滚筒的一端固定安装有驱动接头,所述动力滚筒的另一端固定安装有连接接头,所述动力滚筒的上端活动安装有果蔬箱,所述动力滚筒的一端活动安装有偏心转轴,所述偏心转轴的远离动力滚筒的一端活动安装有限位杆。该非对称式翻箱机,增加了能够与进行翻箱工作的偏心装置,通过内部设置的转轴和送料滑道能够更好的进行翻箱工作,提高工作的速度,同时减少工作人员的使用,增加了能够进行拆卸的限位板,能够更好的帮助设备进行不同的出料方向,增加产品的使用多样性,可以更好的适应不同的使用环境,提高工作的速度,减少了工作人员的投入,也能够降低工作的成本投入,提高工作的效率。

Подробнее
02-02-2021 дата публикации

自适应柔性水果输送果杯

Номер: CN212448659U
Автор: 朱二, 朱壹

本实用新型公开了自适应柔性水果输送果杯,包括果杯托盘底座,所述果杯托盘底座上端活动连接有果杯托盘中间架,所述果杯托盘中间架上端活动连接有柔性托盘,所述柔性托盘底部开设有穿孔,所述柔性托盘内侧开设有环形等距分布的通槽,所述柔性托盘内通槽外侧固定连接有柔性凸出唇,所述柔性凸出唇外侧固定连接有等距分布的防滑条,所述果杯托盘中间架内开设有通孔,所述通孔上端开设有开口槽,所述开口槽内侧开设有环形等距分布的限位槽,所述柔性托盘外侧固定连接有环形等距分布的限位块,所述限位块和限位槽为卡合连接。该自适应柔性水果输送果杯,使用范围广泛,使柔性托盘的内径可以根据水果的大小进行改变,有效避免在水果表面产生损伤。

Подробнее
02-03-2021 дата публикации

一种水果分选前的处理装置

Номер: CN212629804U
Автор: 朱二, 朱壹

本实用新型公开了一种水果分选前的处理装置,包括入料水池,所述入料水池的中间位置设置有导流系统,所述导流系统的前侧设置有自走式清洗机,所述入料水池的右侧设置有自走式提升抛光机,所述自走式提升抛光机的右侧设置有旋转盘,所述旋转盘的下侧设置有自动分选机,且自动分选机设置在自走式提升抛光机的右侧。该水果分选前的处理装置,自走式清洗机可以对苹果进行冲洗,自走式提升抛光机可以对苹果进行抛光,使其表面变得更加整洁光亮,同时在毛刷滚筒二的上侧还设置了快速脱水机构,可以对苹果的表面进行风干,自动分选机的右侧设置了重力感应器、尺寸测控装置和甜度照射灯,能够从重量、尺寸、甜度三个方面对苹果进行分类,使其分类更加细致。

Подробнее
20-11-2020 дата публикации

一种果蔬自动升降切换输送机构

Номер: CN211970838U
Автор: 朱二, 朱壹

本实用新型公开了一种果蔬自动升降切换输送机构,包括支撑机架,所述支撑机架内侧的上端位置活动安装有长固定轴,所述支撑机架上端内侧的边侧位置固定安装有联轴器,所述轴传动齿轮的外部另一侧固定安装有固定导杆,所述变速箱外部的内侧位置活动安装有伸缩杆,所述固定导杆的上端固定安装有输送机架,所述伸缩杆外部内侧的下端位置设置有关电开关信号接收器,所述关电开关信号接收器的外部边侧固定安装有行程限位开关。该果蔬自动升降切换输送机构,简化了整体结构,在不破坏整体结构使用稳定性的基础上降低了整体的使用难度,能够较大程度的提升整体的工作效率,简化了整体的操作方式,有效提升了整体在实际应用使用中的使用效果及工作性能。

Подробнее
28-05-2021 дата публикации

一种果蔬分选设备用防果杯掉落检测系统

Номер: CN112845116A
Автор: 刘海涛, 朱二, 朱壹

本发明公开了一种果蔬分选设备用防果杯掉落检测系统,该系统旨在解决现有果蔬分选设备中,果杯在主动轮或从动轮处易因碰撞导致大量掉落,若未及时发现并停机,将会对果蔬分选设备造成严重损坏的技术问题;该系统包括安装于果蔬分选设备的主动轮和从动轮下方用于检测主动轮和从动轮处果杯掉落的第一检测光栅和第二检测光栅、计时器、计数器、用于收集信息分析并自动控制反馈的控制器,第一检测光栅、第二检测光栅、计时器、计数器与控制器电信号连接。该系统可快速高效地识别果蔬分选设备在运行过程中果杯掉落的问题,使果蔬分选设备自动及时关闭,并输出报警提示,避免对果蔬分选设备造成更严重的损坏,延长果蔬分选设备的使用寿命。

Подробнее
20-11-2020 дата публикации

一种果蔬分选机多工位自动空箱切换输送机构

Номер: CN211965030U
Автор: 朱二, 朱壹

本实用新型公开了一种果蔬分选机多工位自动空箱切换输送机构,包括机架,所述机架的两端的内侧通过轴承座安装有输送辊,所述输送辊的外侧设置有输送带,所述输送带上摆放有输送空箱,所述机架的上端面固定安装有固定架。该果蔬分选机多工位自动空箱切换输送机构,通过缓冲毛刷对输送空箱进行缓冲,避免移动速度过快,输送效率高;通过设置的气缸带动推杆进行移动,推杆推动输送空箱到对应的渠道中,从而完成分拣工作,分拣速度快;通过设置的渠道使被分拣的输送空箱流出,渠道至少设置有是三组,用户可根据生产需求进行适当添加,多工位的分拣方式,代替了传统的人工分拣方式,大大提高了工作的效率,降低了人工成本,便于使用。

Подробнее
25-05-2021 дата публикации

一种皮带输送式的果蔬内部品质检测机

Номер: CN112827861A
Автор: 刘海涛, 朱二, 朱壹

本发明公开了一种皮带输送式的果蔬内部品质检测机,包括传送架,所述传送架内侧转动连接有转动轴,所述转动轴外侧设置有前后对称的传送带,所述传送架内侧固定连接有连接板,所述连接板上端固定连接有接收镜头组件,所述传送架外侧固定连接有光源固定架,所述光源固定架上端内壁固定连接有光源镜片组,所述接收镜头组件与光纤的一端相连,所述光纤的另一端与分选模块相连,所述传送架下端固定连接有支撑脚,所述支撑脚和另一支撑脚间固定连接有加固杆。该皮带输送式的果蔬内部品质检测机,带动水果连续自动进料,通过对光源和凸透镜的位置进行调整,便于对光束的高度和角度进行调节,适用于不同规格的水果,便于检测机更好的工作。

Подробнее
28-05-2021 дата публикации

一种果蔬分选设备用防果杯掉落检测系统

Номер: CN112845116
Автор: 刘海涛, 朱二, 朱壹

本发明公开了一种果蔬分选设备用防果杯掉落检测系统,该系统旨在解决现有果蔬分选设备中,果杯在主动轮或从动轮处易因碰撞导致大量掉落,若未及时发现并停机,将会对果蔬分选设备造成严重损坏的技术问题;该系统包括安装于果蔬分选设备的主动轮和从动轮下方用于检测主动轮和从动轮处果杯掉落的第一检测光栅和第二检测光栅、计时器、计数器、用于收集信息分析并自动控制反馈的控制器,第一检测光栅、第二检测光栅、计时器、计数器与控制器电信号连接。该系统可快速高效地识别果蔬分选设备在运行过程中果杯掉落的问题,使果蔬分选设备自动及时关闭,并输出报警提示,避免对果蔬分选设备造成更严重的损坏,延长果蔬分选设备的使用寿命。

Подробнее
25-05-2021 дата публикации

一种皮带输送式的果蔬内部品质检测机

Номер: CN112827861
Автор: 刘海涛, 朱二, 朱壹

本发明公开了一种皮带输送式的果蔬内部品质检测机,包括传送架,所述传送架内侧转动连接有转动轴,所述转动轴外侧设置有前后对称的传送带,所述传送架内侧固定连接有连接板,所述连接板上端固定连接有接收镜头组件,所述传送架外侧固定连接有光源固定架,所述光源固定架上端内壁固定连接有光源镜片组,所述接收镜头组件与光纤的一端相连,所述光纤的另一端与分选模块相连,所述传送架下端固定连接有支撑脚,所述支撑脚和另一支撑脚间固定连接有加固杆。该皮带输送式的果蔬内部品质检测机,带动水果连续自动进料,通过对光源和凸透镜的位置进行调整,便于对光束的高度和角度进行调节,适用于不同规格的水果,便于检测机更好的工作。

Подробнее
06-04-2021 дата публикации

一种基于多光谱灯源成像的果蔬视觉检测系统

Номер: CN112611717
Автор: 刘海涛, 朱二, 朱壹

本发明公开了一种基于多光谱灯源成像的果蔬视觉检测系统,该检测系统旨在解决现有果蔬视觉检测系统受果蔬形状及自身表面色彩饱和度变化的限制,易在被测果蔬的表面形成高亮光斑,影响了图像的采集及后续的分析检测结果的技术问题;该检测系统包括两个左右对称设置且用于对待测果蔬位置进行打光的LED灯组,所述LED灯组的光线照射方向上设置有用于将光线折射至待测果蔬位置的反光板,待测果蔬位置上方还并列地设置有用于对待测果蔬进行表面成像的彩色相机和红外相机;该检测系统通过多光谱灯源成像对果蔬的表面进行视觉检测,避免了光线直射产生的光晕,从而提高了信息采集及后续分析检测结果的准确性,实现了高精准性的视觉检测。

Подробнее