Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 49. Отображено 49.
24-01-2023 дата публикации

Sensitive data policy recommendation based on compliance obligations of a data source

Номер: US0011562087B2

Systems, computer-implemented methods, and computer program products that can facilitate sensitive data policy recommendation are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise an extraction component that can employ an artificial intelligence model to extract compliance data from a data source. The computer executable components can further comprise a recommendation component that can recommend a sensitive data policy based on the compliance data. In some embodiments, the recommendation component can further identify one or more sensitive data entities of a sensitive data dataset that are affected by actionable obligation data of the data source.

Подробнее
10-11-2020 дата публикации

Extraction and summarization of decision elements from communications

Номер: US0010832009B2

Embodiments for extraction and summarization of decision discussions of a communication by a processor. The decision elements may be grouped together according to similar characteristics. The decision elements may be linked, and sentiments of the discussion participants towards each of the decision elements may be analyzed. A summary of the plurality of the decision elements may be provided via an interactive graphical user interface (GUI) on one or more Internet of Things (IoT) devices. The summary of the decision elements may be linked to domain knowledge. The summary may be enhanced using a domain knowledge.

Подробнее
13-06-2023 дата публикации

Transaction interaction analysis and summarization

Номер: US0011676134B2

Embodiments for entity transaction interaction analysis and summarization by a processor. Transaction elements relating to one or more entity transaction interactions may be identifies and extracted from one or more communications. The transaction elements may be combined with one or more transaction opportunities and transaction historical data to provide a transaction summary.

Подробнее
14-09-2021 дата публикации

Augmenting password generation and validation

Номер: US0011120122B2

To improve the security performance of a computer system, a retrieval component executing on at least one hardware processor obtains a list of known compromised passwords. A validation component executing on the at least one hardware processor obtains a specification of a putative password and risk-scores the putative password based at least in part on presence of the putative password in the list of known compromised passwords. The system obtains a specification of an actual password chosen in accordance with the risk score of the putative password. Access to at least one aspect of the computer system is controlled based on the actual chosen password.

Подробнее
17-01-2023 дата публикации

Managing regulatory compliance for an entity

Номер: US0011556938B2

Various embodiments are provided for managing regulatory compliance for an entity in a computing environment by a processor. A law, policy, regulation, or a combination thereof extracted from one or more segments of text data from one or more data sources may be identified requiring an obligation to be performed by the entity.

Подробнее
23-04-2024 дата публикации

Land use planning recommendations using heterogeneous temporal datasets

Номер: US0011966993B2

Embodiments for providing intelligent land use planning recommendations using heterogeneous temporal datasets in a computing environment. One or more positive land-use interventions, one or more negative land-use interventions, or a combination thereof may be recommended for a selected geographical region from heterogeneous chronological data.

Подробнее
28-09-2023 дата публикации

BEHAVIOR DRIVEN SECURITY FOR IOT DEVICES

Номер: US20230308438A1
Принадлежит: International Business Machines Corp

A method, system, and computer program product for behavior-based Internet of Things (IoT) device security are provided. The method detects an action from a set of IoT devices. A context is identified for the action and at least one IoT device of the set of IoT devices. The action and the context are validated for the at least one IoT device. The action is identified as an anomaly based on the validating of the action and the context. A potential state change is identified for the at least one IoT device based on the anomaly. The method determines a responsive action based on the potential state change and the anomaly.

Подробнее
20-07-2021 дата публикации

Unsupervised method for enriching RDF data sources from denormalized data

Номер: US0011068439B2

A method for unsupervised transformation of denormalized data into RDF data includes summarizing an existing resource description framework (RDF) file wherein a data summary file is produced, wherein said RDF file includes a plurality of nodes, property labels, and literals and is represented as a directed graph, and said data summary file is a graph that includes a single instance of each node-property-literal triple in the RDF file; analyzing a plurality of denormalized records wherein a record summary is produced, wherein said record summary is represented as a directed graph with a root node corresponding to each record connected to a node for each field in the record; determining one or more transformation patterns that match elements of the record summary to elements of the data summary; and transforming the plurality of denormalized records into a new RDF file by executing one of the one or more transformation patterns.

Подробнее
10-12-2019 дата публикации

Passenger operation network concurrent with vehicle operation

Номер: US0010506092B1

A first client device detects driving of a vehicle. The first client device establishes a passenger operation network connection with a second client device. The first client device receives, based on the established network connection and based on the detected driving of the vehicle, at least one instruction directed towards a first client operation of the first client device. The first client device executes, responsive to the received at least one instruction and based on the established network, the first client operation.

Подробнее
02-10-2018 дата публикации

Cognitive intercom assistant

Номер: US0010089809B1

Embodiments for intelligent premise security access management by a processor. Identification information of a user requesting access to enter a premise via a premise entry may be authenticated using a knowledge domain of trusted users in an Internet of Things (IoT) computing network. Entry access to the premise may be granted via the premise entry upon authenticating the identification information.

Подробнее
16-07-2019 дата публикации

Cognitive intercom assistant

Номер: US0010354465B2

Embodiments for intelligent premise security access management by a processor. Identification information of a user requesting access to enter a premise via a premise entry may be authenticated using a knowledge domain of trusted users in an Internet of Things (IoT) computing network. Entry access to the premise may be granted via the premise entry upon authenticating the identification information.

Подробнее
17-09-2020 дата публикации

SENSITIVE DATA POLICY RECOMMENDATION BASED ON COMPLIANCE OBLIGATIONS OF A DATA SOURCE

Номер: US20200293675A1
Принадлежит:

Systems, computer-implemented methods, and computer program products that can facilitate sensitive data policy recommendation are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise an extraction component that can employ an artificial intelligence model to extract compliance data from a data source. The computer executable components can further comprise a recommendation component that can recommend a sensitive data policy based on the compliance data. In some embodiments, the recommendation component can further identify one or more sensitive data entities of a sensitive data dataset that are affected by actionable obligation data of the data source.

Подробнее
05-03-2020 дата публикации

PASSENGER OPERATION NETWORK CONCURRENT WITH VEHICLE OPERATION

Номер: US20200076943A1
Принадлежит: International Business Machines Corp

A first client device detects driving of a vehicle. The first client device establishes a passenger operation network connection with a second client device. The first client device receives, based on the established network connection and based on the detected driving of the vehicle, at least one instruction directed towards a first client operation of the first client device. The first client device executes, responsive to the received at least one instruction and based on the established network, the first client operation.

Подробнее
26-01-2021 дата публикации

Passenger operation network concurrent with vehicle operation

Номер: US0010904377B2

A first client device detects driving of a vehicle. The first client device establishes a passenger operation network connection with a second client device. The first client device receives, based on the established network connection and based on the detected driving of the vehicle, at least one instruction directed towards a first client operation of the first client device. The first client device executes, responsive to the received at least one instruction and based on the established network, the first client operation.

Подробнее
21-05-2015 дата публикации

METHOD AND SYSTEM FOR ANONYMISATION IN CONTINUOUS LOCATION-BASED SERVICES

Номер: US20150143529A1

In some embodiments, a computer-implemented method includes receiving a first location-based service (LBS) request from a requesting device. One or more peer devices are selected from a plurality of actual peer devices. A set of false queries is generated, by a computer processor, based on the selected peer devices. Transmitted to a service provider are a real query, representing the first LBS request of the requesting device, and the set of false queries representing the selected peer devices. A set of query responses are received from the service provider. From the set of query responses, a real query response is extracted, corresponding to the real query. The real query response is transmitted to the requesting device in reply to the first LBS request.

Подробнее
14-12-2017 дата публикации

UNSUPERVISED METHOD FOR ENRICHING RDF DATA SOURCES FROM DENORMALIZED DATA

Номер: US20170357653A1
Принадлежит:

A method for unsupervised transformation of denormalized data into RDF data includes summarizing an existing resource description framework (RDF) file wherein a data summary file is produced, wherein said RDF file includes a plurality of nodes, property labels, and literals and is represented as a directed graph, and said data summary file is a graph that includes a single instance of each node-property-literal triple in the RDF file; analyzing a plurality of denormalized records wherein a record summary is produced, wherein said record summary is represented as a directed graph with a root node corresponding to each record connected to a node for each field in the record; determining one or more transformation patterns that match elements of the record summary to elements of the data summary; and transforming the plurality of denormalized records into a new RDF file by executing one of the one or more transformation patterns. 1. A computer implemented method for unsupervised transformation of denormalized data into RDF data , the method performed by the computer comprising the steps of:summarizing an existing resource description framework (RDF) file wherein a data summary file is produced, wherein said RDF file includes a plurality of nodes, property labels, and literals and is represented as a directed graph, and said data summary file is a graph that includes a single instance of each node-property-literal triple in the RDF file;analyzing a plurality of denormalized records wherein a record summary is produced, wherein said record summary is represented as a directed graph with a root node corresponding to each record connected to a node for each field in the record;determining one or more transformation patterns that match elements of the record summary to elements of the data summary; andtransforming the plurality of denormalized records into a new RDF file by executing one of the one or more transformation patterns.2. The method of claim 1 , further ...

Подробнее
24-05-2022 дата публикации

Automatic generation of logically consistent application code change groups

Номер: US0011340895B2

Embodiments for intelligent application development by a processor. One or more application code changes may be automatically into one or more application code change groups for a versioning system, wherein the one or more application code groups are logically consistent and self-contained.

Подробнее
15-09-2015 дата публикации

Method and system for anonymization in continuous location-based services

Номер: US0009135452B2

In some embodiments, a computer-implemented method includes receiving a first location-based service (LBS) request from a requesting device. One or more peer devices are selected from a plurality of actual peer devices. A set of false queries is generated, by a computer processor, based on the selected peer devices. Transmitted to a service provider are a real query, representing the first LBS request of the requesting device, and the set of false queries representing the selected peer devices. A set of query responses are received from the service provider. From the set of query responses, a real query response is extracted, corresponding to the real query. The real query response is transmitted to the requesting device in reply to the first LBS request.

Подробнее
15-02-2007 дата публикации

Aerospace vehicle flow body systems and associated methods

Номер: US20070034748A1
Принадлежит: The Boeing Company

Flow body systems and associated methods, including aerospace vehicle control surface systems are disclosed herein. One aspect of the invention is directed toward an aerospace vehicle system that includes a first flow body that can be coupleable to an aerospace vehicle. The system can further included a second flow body that includes a chord line and can be rotatably coupled to the first flow body at a hinge point positioned away from the chord line. The hinge point can have a hinge axis. The hinge line can extend through the hinge point, but being nonparallel with the hinge axis. The system can still further include at least one self-aligning mechanism coupled between the first flow body and the second flow body. The at least one self-aligning mechanism can be positioned to allow the second flow body to rotate about the hinge line and the hinge axis.

Подробнее
02-02-2021 дата публикации

Intelligent facilitation of communications

Номер: US0010909973B2

Embodiments for intelligent facilitation of communication by a processor. A communication error in one or more selected portions of a communication of a user may be identified. The communication error in the one or more selected portions of the communication may be automatically translated.

Подробнее
23-01-2020 дата публикации

AUGMENTING PASSWORD GENERATION AND VALIDATION

Номер: US20200026847A1
Принадлежит:

To improve the security performance of a computer system, a retrieval component executing on at least one hardware processor obtains a list of known compromised passwords. A validation component executing on the at least one hardware processor obtains a specification of a putative password and risk-scores the putative password based at least in part on presence of the putative password in the list of known compromised passwords. The system obtains a specification of an actual password chosen in accordance with the risk score of the putative password. Access to at least one aspect of the computer system is controlled based on the actual chosen password. 1. A method for improving the security performance of a computer system , said method comprising:with a retrieval component executing on at least one hardware processor, obtaining a list of known compromised passwords;with a validation component executing on said at least one hardware processor, obtaining a specification of a putative password;with said validation component executing on said at least one hardware processor, risk-scoring said putative password based at least in part on presence of said putative password in said list of known compromised passwords;obtaining, at said computer system, a specification of an actual password chosen in accordance with said risk score of said putative password; andcontrolling access to at least one aspect of said computer system based on said actual chosen password.2. The method of claim 1 , wherein said actual chosen password is identical to said putative password claim 1 , based on said risk-scoring indicating acceptable risk.3. The method of claim 1 , wherein said actual chosen password is different than said putative password claim 1 , based on said risk-scoring indicating unacceptable risk.4. The method of claim 3 , wherein said obtaining of said list of known compromised passwords comprises downloading from known sources of compromised passwords.5. The method of claim 3 ...

Подробнее
04-02-2021 дата публикации

IDENTIFICATION, RANKING AND PROTECTION OF DATA SECURITY VULNERABILITIES

Номер: US20210034602A1

Various embodiments are provided for providing intelligent data security in a computing environment are provided. One or more data vulnerabilities may be identified from a plurality of data. Selected data having the one or more identified data vulnerabilities may be protected by applying one or more data protection policies or rules, wherein the selected data is de-identified. 1. A method , by a processor , for providing intelligent data security in a computing environment , comprising:identifying one or more data vulnerabilities from a plurality of data; andprotecting selected data having the one or more data vulnerabilities by applying one or more data protection policies or rules, wherein the selected data is de-identified.2. The method of claim 1 , further including ranking the one or more data vulnerabilities according to a degree of importance.3. The method of claim 1 , further including matching the one or more data vulnerabilities with the one or more data protection policies or rules.4. The method of claim 1 , further including defining one or more eligible data compliance formats for protecting selected data using the one or more data protection policies or rules.5. The method of claim 1 , further including providing a list of the selected data having potential data vulnerabilities claim 1 , wherein the list of the selected data is ranked according to a degree of importance.6. The method of claim 1 , further including generating a set of actionable and non-actionable data protection polies using a data protection vulnerability model and a list of the selected data having potential data vulnerabilities.7. The method of claim 1 , further including initiating a machine learning model to:train a data protection vulnerability model;predict a ranking of the one or more data vulnerabilities according to a set of data vulnerabilities from the plurality of data;learn and apply actional data protection policies to the selected data and the one or more data security ...

Подробнее
18-02-2021 дата публикации

AUTOMATIC GENERATION OF LOGICALLY CONSISTENT APPLICATION CODE CHANGE GROUPS

Номер: US20210049006A1

Embodiments for intelligent application development by a processor. One or more application code changes may be automatically into one or more application code change groups for a versioning system, wherein the one or more application code groups are logically consistent and self-contained. 1. A method for providing intelligent application development by a processor , comprising:automatically grouping one or more application code changes into one or more application code change groups for a versioning system, wherein the one or more application code groups are logically consistent and self-contained.2. The method of claim 1 , further including tracking the one or more application code changes occurring during a selected time period.3. The method of claim 1 , further including:automatically linking each of the application code change groups to an existing issue; orautomatically linking each of the application code change groups to a new issue.4. The method of claim 1 , further including:combining the one or more application code changes with metadata describing each application change; andproviding a list of the one or more application code change groups having the metadata associated therewith.5. The method of claim 1 , further including generating a message that describes the one or more application code change groups relating to an issue.6. The method of claim 5 , further including collecting feedback data on the one or more application code change groups relating to the message.7. The method of claim 1 , further including initializing a machine learning mechanism to:collect feedback data from a user;suggest the one or more application code change groups to the user for acceptance, denial, or modification; orlearn to automatically group one or more application code changes into one or more application code change groups according to feedback data.8. A system for providing intelligent application development in a computing environment claim 1 , comprising: ' ...

Подробнее
29-05-2014 дата публикации

Hinged Panel Operation Systems and Methods

Номер: US20140145039A1
Принадлежит: The Boeing Company

A hinged panel operation system is provided having a mechanical linkage assembly coupled between a fixed structure and a trailing edge device. The mechanical linkage assembly has a first link operatively coupled to the trailing edge device, a second link pivotably connected at a first end to the first link and pivotably connected at a second end to a third link, and an eccentric attachment connecting the second link to the third link. The hinged panel operation system further has a hinged panel positioned forward of the trailing edge device and being operatively coupled to the mechanical linkage assembly. The hinged panel is movable by the mechanical linkage assembly between a stowed position and a drooped position. The mechanical linkage assembly provides a load path to the hinged panel. 1. A hinged panel operation system comprising:a mechanical linkage assembly coupled between a fixed structure and a trailing edge device, the mechanical linkage assembly comprising a first link operatively coupled to the trailing edge device, a second link pivotably connected at a first end to the first link and pivotably connected at a second end to a third link, and an eccentric attachment connecting the second link to the third link; and,a hinged panel positioned forward of the trailing edge device and being operatively coupled to the mechanical linkage assembly, the hinged panel being movable by the mechanical linkage assembly between a stowed position and a drooped position, and the mechanical linkage assembly providing a load path to the hinged panel.2. The system of wherein the mechanical linkage assembly is operatively coupled to a control device configured to control the mechanical linkage assembly to move the hinged panel to a selected position.3. The system of wherein the fixed structure is a wing of an aircraft and the control device is configured to control the mechanical linkage assembly to move the hinged panel to the stowed position when the aircraft is in a cruise ...

Подробнее
23-03-2017 дата публикации

Efficient Distributed Query Execution

Номер: US20170083632A1
Принадлежит: International Business Machines Corp

An embodiment of the invention provides a method wherein a database query including a first constraint and additional constraint(s) are received in a first node. Data in the first node that satisfies the first constraint is identified, encoded, and sent to a second node. Encoded data is identified in a mapping table in the second node; and, one or more missing identifiers are identified that include encoded data that is not in the mapping table. The missing identifier is sent to the first node, decoded to retrieve the value of the missing identifier, and mapped to the retrieved value. The mapping of the missing identifier and the retrieved value are sent to the second node. A dictionary in the second node is queried with the retrieved value to identify an identification number for the retrieved value. The missing identifier is mapped to the identification number for the retrieved value.

Подробнее
29-03-2018 дата публикации

Targeted learning and recruitment

Номер: US20180090022A1
Принадлежит: International Business Machines Corp

Embodiments for targeted learning and recruitment by a processor. Attributes obtained from a user profile are used to identify a user as a potential candidate for performing an activity related to either the recruiting or the learning and providing a customized learning experience with targeted course suggestions for the user.

Подробнее
07-06-2018 дата публикации

MANAGING PASSWORDS USING STEGANOGRAPHY

Номер: US20180157824A1
Принадлежит:

A computer system, method, and computer readable product are provided for managing passwords using steganography. In various embodiments, a computing system provides a password manager that a user provides a password to. The user then selects a service for which credentials will be generated or stored, and an image on the user's device that will be used to steganographically store the credentials. The computing system then generates a steganographic image that includes the credentials and stores that image with the other images on the user's device. 1. A computer-implemented method for managing passwords using steganography , the method comprising:receiving a master password for a password manager;determining whether the master password is valid;upon determining that the master password is valid, displaying a plurality of images that are stored in a computer memory;receiving user input indicative of selecting a first image of the plurality of images;receiving an indication of a computer service for which a first password is to be stored;receiving an indication of the first password;generating a steganographic image based on the first image and the indication of the first password; andreplacing the first image with the steganographic image in the plurality of images stored in the computer memory.2. The computer-implemented method of claim 1 , further comprising:receiving the master password for the password manager a second time;determining whether the master password is valid a second time;after determining that the master password is valid a second time, displaying the plurality of images;receiving a second indication of the computer service;receiving user input indicative of selecting the first image of the plurality of images;extracting the first password from the steganographic image; andproviding the extracted first password as a credential to the computer service.3. The computer-implemented method of claim 1 , further comprising:encrypting the first password; ...

Подробнее
04-07-2019 дата публикации

EXTRACTION AND SUMMARIZATION OF DECISION ELEMENTS FROM COMMUNICATIONS

Номер: US20190205395A1

Embodiments for extraction and summarization of decision discussions of a communication by a processor. The decision elements may be grouped together according to similar characteristics. The decision elements may be linked, and sentiments of the discussion participants towards each of the decision elements may be analyzed. A summary of the plurality of the decision elements may be provided via an interactive graphical user interface (GUI) on one or more Internet of Things (IoT) devices. The summary of the decision elements may be linked to domain knowledge. The summary may be enhanced using a domain knowledge. 1. A method for automated extraction and summarization of decision discussions of a communication by a processor , comprising:receiving one or more communications from one or more data sources including document sources, audio sources, and video sources;identifying and extracting decision elements relating to one or more decisions from the one or more communications so as to provide a summary of the decision elements; wherein the identification and extraction includes using natural language processing (NLP) to process and transcribe content received from the audio sources and video sources, and artificial intelligence (AI) to aggregate and prioritize the decision elements within the summary; anddisplaying the summary of the decision elements via an interactive graphical user interface (GUI) on one or more Internet of Things (IoT) devices.2. The method of claim 1 , further including:grouping the plurality of decision elements according to similar characteristics; andidentifying segments and topics that pertain to the one or more decisions.3. The method of claim 1 , further including linking together each of the decision elements.4. The method of claim 1 , further including:linking the summary of the plurality of the decision elements to a domain knowledge; andenhancing the summary using the domain knowledge.5. The method of claim 1 , further including ...

Подробнее
09-07-2020 дата публикации

Managing regulatory compliance for an entity

Номер: US20200219111A1
Принадлежит: International Business Machines Corp

Various embodiments are provided for managing regulatory compliance for an entity in a computing environment by a processor. A law, policy, regulation, or a combination thereof extracted from one or more segments of text data from one or more data sources may be identified requiring an obligation to be performed by the entity.

Подробнее
09-07-2020 дата публикации

Intelligent facilitation of communications

Номер: US20200219489A1
Принадлежит: International Business Machines Corp

Embodiments for intelligent facilitation of communication by a processor. A communication error in one or more selected portions of a communication of a user may be identified. The communication error in the one or more selected portions of the communication may be automatically translated.

Подробнее
29-08-2019 дата публикации

MANAGING PASSWORDS USING STEGANOGRAPHY

Номер: US20190266319A1
Принадлежит:

A computer system, method, and computer readable product are provided for managing passwords using steganography. In various embodiments, a computing system provides a password manager that a user provides a password to. The user then selects a service for which credentials will be generated or stored, and an image on the user's device that will be used to steganographically store the credentials. The computing system then generates a steganographic image that includes the credentials and stores that image with the other images on the user's device. 1. A computer-implemented method for managing passwords using steganography , the method comprising:receiving a master password for a password manager;determining whether the master password is valid;upon determining that the master password is valid, displaying a plurality of images that are stored in a computer memory;receiving user input indicative of selecting a first image of the plurality of images;receiving an indication of a computer service for which a first password is to be stored;receiving an indication of the first password;generating a steganographic image based on the first image and the indication of the first password; andreplacing the first image with the steganographic image in the plurality of images stored in the computer memory.2. The computer-implemented method of claim 1 , further comprising:receiving the master password for the password manager a second time;determining whether the master password is valid a second time;after determining that the master password is valid a second time, displaying the plurality of images;receiving a second indication of the computer service;receiving user input indicative of selecting the first image of the plurality of images;extracting the first password from the steganographic image; andproviding the extracted first password as a credential to the computer service.3. The computer-implemented method of claim 1 , further comprising:encrypting the first password; ...

Подробнее
20-12-2018 дата публикации

Cognitive intercom assistant

Номер: US20180365920A1
Принадлежит: International Business Machines Corp

Embodiments for intelligent premise security access management by a processor. Identification information of a user requesting access to enter a premise via a premise entry may be authenticated using a knowledge domain of trusted users in an Internet of Things (IoT) computing network. Entry access to the premise may be granted via the premise entry upon authenticating the identification information.

Подробнее
17-12-2020 дата публикации

TRANSACTION INTERACTION ANALYSIS AND SUMMARIZATION

Номер: US20200394649A1

Embodiments for entity transaction interaction analysis and summarization by a processor. Transaction elements relating to one or more entity transaction interactions may be identifies and extracted from one or more communications. The transaction elements may be combined with one or more transaction opportunities and transaction historical data to provide a transaction summary. 1. A method for entity transaction interaction analysis and summarization by a processor , comprising:identifying and extracting transaction elements relating to one or more entity transaction interactions from one or more communications; andcombining the transaction elements with one or more transaction opportunities and transaction historical data to provide a transaction summary.2. The method of claim 1 , further including defining the transaction elements as transaction goals claim 1 , transaction criteria claim 1 , transaction consensus or dissensions claim 1 , alternative entity transaction opportunities.3. The method of claim 1 , further including linking together each of the transaction elements with identified sources of the transaction elements in the one or more communications.4. The method of claim 1 , further including identifying a consensus or dissension to the transaction elements by one or more users involved in the one or more communications.5. The method of claim 1 , further including:recommending a potential transaction opportunity according to a ranking of criteria of the transaction elements, the one or more transaction opportunities, the transaction historical data, or a combination thereof; orrecommending one or more actions items required for execution to obtain the one or more transaction opportunities.6. The method of claim 1 , further including providing the transaction summary via an interactive graphical user interface (GUI) on one or more Internet of Things (IoT) devices.7. The method of claim 1 , further including initializing a machine learning mechanism to: ...

Подробнее
11-09-1985 дата публикации

Wing flap mechanism

Номер: EP0154047A1
Автор: Martin F. Stephenson
Принадлежит: Boeing Co

A carrier unit for chordwise extending and rotatably positioning an auxiliary airfoil mounted adjacent to the trailing edge of a relatively fixed main airfoil of an airplane. When the auxiliary airfoil is in a fully retracted and stowed position, the actuation and positioning linkage mechanism of the carrier unit is completely housed within the combined auxiliary and main airfoil envelope with no external protrusions or fairings. For auxiliary airfoil extension, to increase the overall chord plane by approximately eight percent, a first set of four-bar linkages (13, 20, 22, 24) is utilized comprising: a beam member (22) supported at a forward portion by a pair of approximately parallel links (20, 24) pivoted to wing structure (13) and swingable chordwise in a generally parallel relationship for translatably shifting the auxiliary airfoil which is pivoted to a rearward portion of the beam member. For changing the auxiliary airfoil angle-of-incidence relative to the main airfoil, one or more sets of four-bar linkage (22, 24, 28, 11) are integfatadtwith the first set for a unified rotation programming and extension driva that functionsto produes an aerodynamic slot opening when the atrxiliery airfoil is extended to takeoff and landing positions whereat it is deflected up to approximately forty degrees relative to the main airfoil reference chord plane. For an aerodynamic braking action during landing roll-out, the geometrical relationship of the sets of four-bar linkages functions to deflect the auxiliary airfoil chord plane greater than forty degrees, to approximately ninety degrees or more relative to the main airfoil reference chord plane.

Подробнее
08-03-1989 дата публикации

Wing flap mechanism

Номер: EP0154047B1
Автор: Martin F. Stephenson
Принадлежит: Boeing Co

Подробнее
12-08-1986 дата публикации

Wing flap mechanism

Номер: US4605187A
Автор: Martin F. Stephenson
Принадлежит: Boeing Co

A carrier unit for chordwise extending and rotatably positioning an auxiliary airfoil mounted adjacent to the trailing edge of a relatively fixed main airfoil of an airplane. When the auxiliary airfoil is in a fully retracted and stowed position, the actuation and positioning linkage mechanism of the carrier unit is completely housed within the combined auxiliary and main airfoil envelope with no external protrusions or fairings. For auxiliary airfoil extension, to increase the overall chord plane by approximately eight percent, a first set of four-bar linkages is utilized comprising: a beam member supported at a forward portion by a pair of approximately parallel links pivoted to wing structure and swingable chordwise in a generally parallel relationship for translatably shifting the auxiliary airfoil which is pivoted to a rearward portion of the beam member. For changing the auxiliary airfoil angle-of-incidence relative to the main airfoil, one or more sets of four-bar linkages are integrated with the first set for a unified rotation programming and extension drive that functions to produce an aerodynamic slot opening when the auxiliary airfoil is extended to takeoff and landing positions whereat it is deflected up to approximately forty degrees relative to the main airfoil reference chord plane. For an aerodynamic braking action during landing roll-out, the geometrical relationship of the sets of four-bar linkages functions to deflect the auxiliary airfoil chord plane greater than forty degrees, to approximately ninety degrees or more relative to the main airfoil reference chord plane.

Подробнее
13-04-1989 дата публикации

Wing flap mechanism

Номер: DE3476988D1
Автор: Martin F Stephenson
Принадлежит: Boeing Co

Подробнее
26-02-1991 дата публикации

Wing trailing edge flap mechanism

Номер: US4995575A
Автор: Martin F. Stephenson
Принадлежит: Boeing Co

Actuation and support mechanisms for wing trailing edge flap systems wherein each flap system has a streamwise or chordwise pair of geometrically similar flap support assemblies. Each of the flap support assemblies has a chordwise aligned cantilever support beam fixedly attached to wing structure. The beam incorporates multiple cam tracks for providing guidance and support to a movable dual carriage assembly upon which a wing trailing edge flap assembly is mounted. The dual carriage assembly comprises a fore-carriage which is articulatably connected to an aft-carriage. The wing trailing edge flap assembly is mounted upon the aft-carriage. Both the fore-carriage and the aft-carriage are individually supported by rollers constantly engaging a separate cam track for each of said carriages. For actuation of the dual carriage assembly and the wing trailing edge assembly mounted thereon, a ball screw drive mechanism is incorporated between the cantilever beam and the dual carriage assembly.

Подробнее
27-03-1984 дата публикации

Absorbable hemostatic composition

Номер: US4439420A
Принадлежит: Ethicon Inc

An absorbable hemostatic composition for use in the control of osseous hemorrhage, comprising a biocompatible fatty acid salt in a biocompatible base, said composition having a putty-like consistency at room temperature. The preferred composition is one in which the fatty acid salt is calcium stearate.

Подробнее
13-06-1984 дата публикации

Composite sutures of silk and hydrophobic thermoplastic elastomers

Номер: EP0110495A2
Принадлежит: Ethicon Inc

Composite suture of multifilament silk embedded in a highly flexible, hydrophobic highly deformable matrix made of thermoplastic elastomer. This suture exhibits minimal irritation to living tissue and retains its strength in vivo for extended periods of time and also retains the desirable handling qualities of silk. The suture ist prepared by treating a multifilament silk suture with a solution of a suitable polymer in a solvent and heating the moving suture to obtain a continuous impregnation of the silk with the elastomer.

Подробнее
31-12-1976 дата публикации

Coating auxiliary surgical materials - pref sutures with ionically bonded elastomeric block copolymers retaining anti-microbial cpds or dyes

Номер: FR2313083A1
Автор: Martin Stephenson
Принадлежит: Ethicon Inc

Surgical auxiliary material (A) is coated anti-microbially with an ionic block elastomer of formula (I) (where R is 1-15C alkylene, R2 is low alkylene; R3,R4 and R5 are H and lower alkyl, R1 is a liq. prepolymer having mol. wt. 1000-3000 consisting of polyether, silicone, polyurethane or polyamide; Z and Y or OH or isocyanate gps. ZY is urethane gp. formed in condensation of Z and Y; n is integer 10-1000, B- is an anionic polymer and X is an anionic or cationic antimicrobial cpd). Dyed (A) coated with (I; X = anionic or cationic dye gp). and sterile suture material consisting of (A) coated with (I free from X) are also claimed. (A) pref. consist of surgical suture materials, dressings for wounds, fabrics and internal prostheses. Antimicrobial cpd. X added to sterile (I)-coated (A) is retained for a longer duration of use and is released slowly by action of water, blood or tissue-fluids, while bacterial growth in and around suture matl. is inhibited.

Подробнее
14-06-2017 дата публикации

Hinged panel operation systems and methods

Номер: EP2738087A3
Принадлежит: Boeing Co

A hinged panel operation system (10) is provided having a mechanical linkage assembly (90) coupled between a fixed structure (96) and a trailing edge device (36). The mechanical linkage assembly has a first link (118) operatively coupled to the trailing edge device, a second link (130) pivotably connected at a first end to the first link and pivotably connected at a second end to a third link (142), and an eccentric attachment (154) connecting the second link to the third link. The hinged panel operation system further has a hinged panel (162) positioned forward of the trailing edge device and being operatively coupled to the mechanical linkage assembly. The hinged panel is movable by the mechanical linkage assembly between a stowed position and a drooped position. The mechanical linkage assembly provides a load path to the hinged panel.

Подробнее
10-11-2020 дата публикации

Targeted learning and recruitment

Номер: US10832583B2
Принадлежит: International Business Machines Corp

Embodiments for targeted learning and recruitment by a processor. Attributes obtained from a user profile are used to identify a user as a potential candidate for performing an activity related to either the recruiting or the learning and providing a customized learning experience with targeted course suggestions for the user.

Подробнее
04-06-2014 дата публикации

Hinged panel operation systems and methods

Номер: EP2738087A2
Принадлежит: Boeing Co

A hinged panel operation system (10) is provided having a mechanical linkage assembly (90) coupled between a fixed structure (96) and a trailing edge device (36). The mechanical linkage assembly has a first link (118) operatively coupled to the trailing edge device, a second link (130) pivotably connected at a first end to the first link and pivotably connected at a second end to a third link (142), and an eccentric attachment (154) connecting the second link to the third link. The hinged panel operation system further has a hinged panel (162) positioned forward of the trailing edge device and being operatively coupled to the mechanical linkage assembly. The hinged panel is movable by the mechanical linkage assembly between a stowed position and a drooped position. The mechanical linkage assembly provides a load path to the hinged panel.

Подробнее
02-04-2019 дата публикации

Efficient distributed query execution

Номер: US10248701B2
Принадлежит: International Business Machines Corp

An embodiment of the invention provides a method wherein a database query including a first constraint and additional constraint(s) are received in a first node. Data in the first node that satisfies the first constraint is identified, encoded, and sent to a second node. Encoded data is identified in a mapping table in the second node; and, one or more missing identifiers are identified that include encoded data that is not in the mapping table. The missing identifier is sent to the first node, decoded to retrieve the value of the missing identifier, and mapped to the retrieved value. The mapping of the missing identifier and the retrieved value are sent to the second node. A dictionary in the second node is queried with the retrieved value to identify an identification number for the retrieved value. The missing identifier is mapped to the identification number for the retrieved value.

Подробнее
07-02-1990 дата публикации

Trailing edge flaps

Номер: EP0230061B1
Автор: Martin F. Stephenson
Принадлежит: Boeing Co

Подробнее
08-01-1980 дата публикации

Antimicrobial sutures

Номер: CA1069394A
Автор: Martin Stephenson
Принадлежит: Ethicon SAS

ABSTRACT A surgical suture is coated with an ionically bonded block elastomeric copolymer of a polyquaternary polyurethane and a polyanionic polymer such as heparin. The coated suture is receptive to treatment with anti-microbial compounds to produce a suture having long-lasting antimicrobial properties which inhibit bacterial growth in and immediately around the suture. The coated suture is also receptive to dyes for the preparation of colored sutures. Surgical aids other than sutures such as films, fabrics, wound dressings and the like may be coated and rendered antimicrobial or colored in a like manner.

Подробнее
26-06-1985 дата публикации

Absorbable hemostatic composition

Номер: ZA838524B
Принадлежит: Ethicon Inc

Подробнее