Patent classifications
G06Q10/00
System and method for making a recommendation for a user of a life management system
A life management system receives data from a client device worn by a user, the data comprising biotelemetry data and activity data collected about a user wearing the client device. The life management system generates snapshot information using information from a group consisting of: the biotelemetry data, activity data, social data associated with the user, and user profile information associated with the user. The life management system generates a recommendation using portions of the snapshot information, and updates the snapshot information with the recommendation. The life management system executes a recommendation associated with the snapshot information in accordance with the user controls associated with the user.
Method for identifying and evaluating common cause failures of system components
Provided is a method and system for identifying and evaluating common cause failures of system components, wherein at least one analytical artifact and machine readable system related to at least one of spatial, topological data and machine readable system related lifecycle data are processed to analyze automatically a susceptibility of system components to common cause failure based on common cause failure influencing factors.
Using flat data input for simultaneous application of multiple separate calculations rule sets to obtain multiple output results
A method may include updating database posting logic to obtain an updated database posting logic that, during a posting process to a database, adds a data field to a new line item being posted via the posting process. The method may further include receiving information from a data provider. The method may further include posting, using the updated database posting logic, the information to the database as a line item including various fields including the data field. The method may further include receiving a request to generate a transactional report. The method may further include using the data field to identify the line item. The method may further include generating the transactional report using the line item.
System and method for safety management
The present disclosure relates to a safety management system. The safety management system calculates a real-time data risk score and an incident data risk score based on real-time data received from a wearable device and incident data selected from big data, calculates a total risk score by summing all values obtained by multiplying calculated risk for respective data by weights for respective data, compares the total risk store with a preset threshold score, and transmits a dangerous situation message to a risk recognition subject when it is determined that a user is at risk. The safety management system of the present disclosure may transmit the real-time data, the incident data, and the dangerous situation message using a 5G communication system, and a safety management server for determining whether or not the user is at risk may be implemented using an artificial neural network.
Method and device for recording digital data representative of an operating variable of an observed system
The invention relates to a method and a device for recording digital data representative of an operating variable of an observed system, the digital data representative of said variable being obtained in the form of samples, the method comprising a data recording over time. The method receiving successive samples representative of said observed variable, and for a current sample, for at least two observation windows of different sizes, each observation window including a number, equal to the size of said window, of successive samples received before the moment in time corresponding to the current sample, calculating an average value per observation window, calculating a difference between the current sample and each of said average values, comparing each difference, in absolute value, to a predetermined threshold value associated with said observation window, and in case of excess, triggering a recording of the current sample in a non-volatile memory.
Information-technology-utilization evaluation device, information-technology-utilization evaluation system, and information-technology-utilization evaluation method
An information-technology-utilization evaluation device evaluates the degree of utilization of information technology in process management targeted at a managed process that is a set of unit processes. The information-technology-utilization evaluation device includes a first determination unit to evaluate an achievement status of automation of the process management through utilization of the information technology to determine a maturity level of the automation in the managed process and a maturity level of the automation in the unit processes.
Information processing method and information processing system
A computer-implemented information processing method includes: obtaining a plan including at least locations to which moving object is expected to travel and stay at; setting, on the basis of the locations included in the plan, a candidate charging location at which the battery of the moving object is chargeable; obtaining the reservation status of a charging station associated with the candidate charging location; and arranging reservation details according to the reservation status of the charging station.
Apparatus and method for automated and assisted patent claim mapping and expense planning
An apparatus and computer implemented method that include obtaining, into a computer, text of a patent, automatically finding and extracting, using the computer, a set of claim text from the patent text, identifying, using the computer, text of independent claims from the set of claim text, displaying in a first row on a computer monitor the text of the independent claims, automatically determining a plurality of preliminary scope-concept phrases from the text of the independent claims, displaying in a second row on the computer monitor the text of the plurality of preliminary scope-concept phrases, eliciting and receiving user input to specify a first one of the plurality of preliminary scope-concepts phrases, and highlighting each occurrence of the specified first one of the plurality of preliminary scope-concept phrases in a plurality of the independent claims displayed in the first row. A scope concept builder tool is also provided.
Apparatus and method for automated and assisted patent claim mapping and expense planning
An apparatus and computer implemented method that include obtaining, into a computer, text of a patent, automatically finding and extracting, using the computer, a set of claim text from the patent text, identifying, using the computer, text of independent claims from the set of claim text, displaying in a first row on a computer monitor the text of the independent claims, automatically determining a plurality of preliminary scope-concept phrases from the text of the independent claims, displaying in a second row on the computer monitor the text of the plurality of preliminary scope-concept phrases, eliciting and receiving user input to specify a first one of the plurality of preliminary scope-concepts phrases, and highlighting each occurrence of the specified first one of the plurality of preliminary scope-concept phrases in a plurality of the independent claims displayed in the first row. A scope concept builder tool is also provided.
Dynamic scope adjustment
An embodiment includes a method of secured, remote device access through dynamic scope adjustment in an incident management system. The method includes receiving an incident report indicative of a technical issue at a first device. Responsive to receipt of the incident report, the method includes determining that the first device is assigned an information technology (IT) support provider and dynamically elevating the first device to a scope of the IT support provider. Following a correction of at least a portion of the technical issue by the IT support provider, the method includes dynamically relegating the first device from the scope to prevent remote access to the first device following the correction.