Abstract:
A framework for securing a source code base during the development phase of a software development lifecycle is provided. The framework includes an aspect package module and a validator package module. The aspect package module integrates security routines into the source code base. The aspect package module includes a custom interface module and a validator aspect module. The custom interface module includes a function declaration, wherein the custom interface module is implemented by at least one class of the one or more classes. The validator aspect module includes a controller code for controlling the flow of the execution, based on the context for the security validation of the at least one class, wherein one or more security routine integration points are defined in the at least one class. The validator package module validates the at least one class, based on the defined context, by using one or more validation classes.
Abstract:
The present invention provides a method and a system for reverse transferring knowledge of a project from a primary vendor to a secondary vendor. The reverse knowledge transfer process involves defining a seamless process for transferring knowledge of all applications of the project, without compromising on the committed timelines for the release of the applications. Further, the knowledge transfer process is regularly monitored and controlled by various stakeholders to ensure the timelines are met and quality of transfer is maintained.
Abstract:
The present invention includes a method and a system for recommending at least one advertisement to a user. The recommendation is provided based on the interaction with at least two devices. The user is identified when an interactive session is initiated by the user on a device of the at least two devices. Thereafter, a contextual profile of the identified user is selected from a database. The contextual profile is associated with one or more contextual sub-profiles. Further, each contextual sub-profile is associated with a corresponding device. Furthermore, one or more contextual attributes are dynamically captured from the interactive session. Thereafter, at least one of the contextual profile and the captured contextual attributes is mapped with a plurality of pre-stored advertisements. Subsequently, at least one advertisement is suggested on the device based on the mapping.
Abstract:
A system and method for estimation and analysis of operational parameters in workflow processes in order to establish effect of parameters on one or more critical parameters is provided. The method includes creating a Bayesian network including one or more operational nodes representing one or more operational parameters and one or more critical nodes representing one or more critical parameters. The method further includes generating an evidence set based on market events and deducing inferences based on the generated evidence set and Bayesian engine. Inferences are deduced by determining possible discrete states of operational parameters associated with one or more target nodes and their probability distribution values. Deduced inferences are then validated to confirm strength of probability distribution values. Forecasting for a selected operational parameter is performed by obtaining probability distribution of independent parameters and then performing forecasting for the selected parameter using Bayesian locally weighted regression model.
Abstract:
The present invention provides a method and system for end-to-end process execution. The method includes generating a model for a business process to be executed, wherein the business process comprises a first type of activity and a second type of activity. On initiation of a business process instance of the business process, the first type of activity is executed by a business process engine. Further, the second type of activity is dynamically assigned to a first user for execution on an application external to the business process engine based on a set of predefined factors, provided the second type of activity is a manual activity. The method further includes monitoring execution of the second type of activity by the business process engine and displaying status of each activity in the business process instance to a second user.
Abstract:
A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
Abstract:
A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is authorized to access the requested application data. For an authorized user, a category of the user is determined to ascertain whether the user is privileged to obtain full access. In case the user is a privileged user, unmasked application data is fetched from a database utility and provided to the user. In case the user is not a privileged user, application data access request is transferred to a data masking service. Application data is fetched from database utility, masked based on pre-defined masking rules and provided to the user.
Abstract:
The present invention provides a method, a system, and a computer program product for determining an effort associated with the maintenance of software. The method, the system, and the computer program product enable receiving values corresponding to predefined factors, which are segregated into corrective factors, preventive factors, perfective factors, and adaptive factors. A corrective effort is determined based on the corrective factors and predefined rules. Thereafter, a preventive effort is determined based on the preventive factors, the predefined rules, and the corrective effort. Thereafter, a perfective effort is determined based on the perfective factors, the predefined rules, and the corrective effort. Subsequently, an adaptive effort is determined based on the adaptive factors, the predefined rules, the corrective effort, the preventive effort, and the perfective effort. A total effort is then generated based on the corrective effort, the preventive effort, the perfective effort, and the adaptive effort.
Abstract:
A method for creating a search index on cloud database is provided. The method enables providing inputs for creating multiple indexes on documents stored in the cloud database. One of the inputs may include a first value representing number of documents to be assigned a single index. The method further enables determining total number of documents stored in the cloud database which is represented by a second value. Further, the method enables estimating total number of indexes to be created based on first value and second value. The method further comprises executing a loop to create multiple indexes for a predetermined number of iterations which corresponds to the estimated value. Furthermore, the method comprises indexing documents for creating the multiple indexes. Finally, the method comprises merging the multiple indexes to create a single index which facilitates a user to search documents stored in the cloud database.
Abstract:
A method for processing information fed by a user via an inputting means is provided. The method enables, firstly, receiving a set of directional elements via a user interface. The set of directional elements represent textual or non-textual information fed by the user. Secondly, the method enables interpreting the set of directional elements. The set of directional elements are identified as a combination of motion of the inputting means on the user interface and one or more inputs from the inputting means. Further, the method enables converting the directional elements into a sequence and translating the sequence into the textual or non-textual information using a mapping format. The mapping format corresponds to a predetermined mapping format or a new mapping format. Finally, the method enables rendering the textual or non-textual information on the user interface in the form of one or more symbols.