摘要:
In one embodiment, a method for providing access to big data is disclosed. The method includes receiving biometric data of a user to provide access to columns of a table storing the big data, wherein one or more columns of the table are masked based on one or more data parameters and authenticating the user by comparing the biometric data of the user with pre-stored biometric data, wherein the pre-stored biometric data is retrieved from a biometric database. Further, the method includes providing upon the authentication, selective access to each column of the table based on a pre-defined user privilege for each column.
摘要:
The present disclosure relates to field of retail environment. Accordingly, disclosed herein is a method and system for providing one or more purchase recommendations to a user. Purchase details corresponding to previous purchases by the user and user information are collected. Further, a plurality of optimal purchase parameters is determined by analyzing the purchase details based on the user information. Finally, one or more purchase recommendations are provided to the user based on the plurality of optimal purchase parameters. In an embodiment, the present method facilitates the user to identify a retail store that offers optimal savings on the purchase of a product of interest to the user. Also, the present method helps retailers to analyze purchase pattern of the user for predicting and determining appropriate products to be sold to the user on future purchases.
摘要:
A method for lawful interception in a communication network involving adulteration by colluding agent is disclosed. The method includes activating, selectively, communication data duplication functionality in at least one of a plurality of network devices, each of the plurality of network devices being located in separate network segments of a communication path between users, the data duplication functionality duplicates data being communicated between the users; comparing, in real-time, a set of adulteration parameters derived from duplicated communication data received from the at least one of the plurality of network devices with associated thresholds within a set of thresholds to detect adulteration in the duplicated communication data; determining a confidence level of detecting adulteration in duplicated communication data received from the at least one of the plurality of network devices; and modifying number of network devices having active communication data duplication functionality based on the comparing and the confidence level.
摘要:
This disclosure relates generally to software testing, and more particularly to a system and method for optimizing testing of software production incidents. In one embodiment, the method comprises analyzing an incident ticket using a machine learning algorithm to identify one or more keywords in the incident ticket, and identifying a location of the incident ticket based on the one or more keywords, a test workspace corresponding to the incident ticket based on the location, and a plurality of specific test cases corresponding to the incident ticket based on the test workspace. The identification leads to a first scenario and a second scenario. In the first scenario, the method further comprises initiating a learning process based on intelligence gathered from a manual processing of the incident ticket. In the second scenario, the method further comprises executing the plurality of specific test cases in a test environment.
摘要:
The present disclosure relates to a method for enhancing quality of requirements for an application development. The method comprises retrieving expertise information of each user of groups involved in identifying requirements, domain knowledge of each user, information on number of defects associated with requirements and information of requirements for application development from sources. Then, skill score of the groups is computed using expertise information and domain knowledge of each user of corresponding groups. Solidity score of each of requirements is determined using information of requirements and predetermined threshold solidity score. Weightage score of each of requirements is computed based on information of requirements and information on number of defects. The, using skill score of groups, solidity score of each of requirements and weightage score, strength score of each of requirements is computed for enhancing quality of requirements.
摘要:
Method and system for predicting failures in interconnected systems based on quantum computing is disclosed. The method may include identifying a set of unique patterns from input data received from a plurality of input data sources, determining a correlation between at least two input data sources, creating a plurality of sets of clusters corresponding to the plurality of input data sources based on the correlation, extracting data associated with each of the set of unique patterns based on the plurality of sets of clusters, predicting, based on the extracted data, a failure of at least one interconnected system using a trained ML model, processing the extracted data associated with each of the set of unique patterns and information associated with the predicted failure through a quantum computing layer, and generating, through the quantum computing layer, at least one corrective action for the at least one interconnected system.
摘要:
A method and a system are described for determining an effectiveness index of a software test environment. The method includes receiving a plurality of factors associated with a plurality of software modules of a plurality of software under test from a plurality of external systems. The method includes identifying the software test environment based on one or more values associated with each of the plurality of factors. The method includes collecting failure logs of each of the plurality of factors for the identified software test environment. The method includes assigning a score to each of the plurality of factors based on collected failure logs. The method includes determining an effectiveness index of the identified software test environment for each of the plurality of software modules based on the score.
摘要:
Devices and methods for identifying relevant features of software product are described. The system retrieves requirement data, test case data and defect data associated with plurality of features of the software product. The requirement data comprises de-scoped requirements which indicate those requirements which are not required for performing the regression testing. The device further computes an impact score, a test effort score, and a weightage factor for each of the plurality of features based on the requirement data, the test case data and the defect data respectively. Based on the computed impact score, the test effort score, and the weightage factor, the device further determines a regression factor for each of the plurality of features. Further, the device identifies one or more relevant features amongst the plurality of features based on the regression factor. This way, the device facilitates structured regression planning which optimizes the overall performance of the device.
摘要:
Devices and methods for identifying relevant features of software product are described. The system retrieves requirement data, test case data and defect data associated with plurality of features of the software product. The requirement data comprises de-scoped requirements which indicate those requirements which are not required for performing the regression testing. The device further computes an impact score, a test effort score, and a weightage factor for each of the plurality of features based on the requirement data, the test case data and the defect data respectively. Based on the computed impact score, the test effort score, and the weightage factor, the device further determines a regression factor for each of the plurality of features. Further, the device identifies one or more relevant features amongst the plurality of features based on the regression factor. This way, the device facilitates structured regression planning which optimizes the overall performance of the device.
摘要:
A lawful interception system to perform operations comprising determining an appropriate session continuity server, a content duplication element associated with a source communication network and one or more communication network properties associated with the source communication network; initiating, duplication of one or more first data packets associated with the ongoing voice and data session by the content duplication element; detecting a handover of the ongoing voice and data session from the source communication network to a destination communication network; determining the content duplication element associated with the destination communication network and one or more communication network properties associated with the destination communication network; and initiating, duplication of one or more second data packets associated with the ongoing voice and data session by the content duplication element.