Abstract:
A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score for the second password on summing the generating value, combining trust levels of multiple users to attain a higher trust level in aggregate, and obtaining access in a service if the aggregated trust level of users are equal to or more than the predetermined trust level of the service. The present technique provides flexibility of authenticating and authorizing a user to access in a service to perform desirable functions thereon. The present technique eliminates the requirement of tokens, pins, dongles etc. while attaining a higher trust level to perform a task which belongs to a higher trust level.
Abstract:
A method for watermarking of video content is provided. An averaged scene image is computed for each scene of video content by performing averaging of frames present in each scene of video content. For each averaged scene image a set of random numbers are generated using a secret key to identify pixels at random locations of the averaged scene image. The secret key is associated with a watermark pattern corresponding to each averaged scene image. The identified pixels in each averaged scene image are mapped to each pixel of corresponding watermark pattern to obtain respective mapped pixels. Using respective mapped pixels, values of verification information are fetched and assigned using predetermined rules. The values of verification information are arranged to obtain first visual cryptographic share of watermark pattern for each averaged scene image.
Abstract:
The present invention provides a method, system and computer program product for automatically generating message queue scripts for defining one or more Websphere® Message Queue™ (WMQ) objects on one or more queue managers. A user provides parameters corresponding to the WMQ objects as input in an input parameter file. The parameters include the name of the WMQ objects and the queue managers. Further, a message queue environment consistency check is performed on the input parameter file for validating the parameters provided. The validation is performed by using a database that stores information about the message queue environment. After successful validation of the input parameter file, one or more message queue scripts are generated for defining the WMQ objects on the queue managers. Fallback scripts may also be generated for rolling back the modifications performed on the queue managers, if required at a later stage.
Abstract:
A method for delivering location based information in wireless zone is disclosed. All the location based information is stored in the access point itself thus eliminating the need for backend server. Access point has the intelligence to deliver information in customized to each requesting device's display capability. To provide seamless access to local information the user will get a default web page once the device connects to access point and tries to access internet. This web page will act as a gateway to all the location based information available in the access point. Along with location based information advertisements can also be delivered to the end user in a very cost effective and targeted manner.
Abstract:
The embodiments herein provide a method and system for determining availability of a software application using Composite Hidden Markov Model (CHMM). The software application is divided into plurality of layers which are further divided into sub-components. The configurations and dependencies of the sub-components are identified and also the state of the sub-components is determined. The state of the sub-components is represented in CHMM using state space diagram. The failure rate and recovery time of the sub-components is computed using the state space diagram and the respective transition tables are derived from the CHMM to determine the availability of the layers. The availability of the layers is combined to determine the availability of the software application.
Abstract:
A method and system for reporting web standard non-compliance of web pages is provided. The method includes receiving a local copy of the web page to be tested for web standard non-compliance. The method further includes determining a set of errors on the web page corresponding to a user specified accessibility guideline. Thereafter an HTML overlay report is generated based on the determined set of errors. Further, a set of controls is generated based on the user specified accessibility guideline, the local copy and the set of errors. Finally, one or more controls are selected from the set of controls and based on the one or more selected controls and the determined set of errors one or more images are associated with each HTML element non-conformant to the accessibility guideline on the web page.
Abstract:
The disclosed embodiment relates to a system and method for rating the accessibility of websites to disabled users. The method comprises receiving, with a computing device, ratings information from at least one user, the ratings information including ratings values of at least one website based on at least one web accessibility parameter, determining, with a computing device, a web accessibility score for at least one of the websites, wherein the web accessibility score is based on the ratings information received from the at least one user, and creating, with a computing device, a web accessibility index including the web accessibility score of at least one of the websites based on the determined web accessibility score. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods.
Abstract:
The proposed disclosure relates to a computer aided method for the implementation of process unification across regionally distributed process environments. The method includes the establishment of a process framework. It further includes the creation of a present state model for each regionally distributed process environment and the creation of a unified future state model. The normalization of the future state model across the regionally distributed process environments is also called for. Some aspects of the method may include the use of computer based tools in the establishment of the process framework, the establishment of the present state model and the establishment of the future state model.
Abstract:
The method for sharing data over wireless adhoc network using mobile devices comprises a step of determining a user required data on a handheld device. The method further comprises broadcasting the user required data within the wireless adhoc network. Further, the method includes detecting a plurality of devices comprising the user required data. The method also comprises establishing a communication channel, in a proximity environment between the plurality of devices and the handheld device. The method further comprises sharing of the user required data automatically between the plurality of devices and the handheld device.
Abstract:
An electrical circuit for protecting an electrical load from overload current is provided. The system includes a voltage transformer configured to receive AC mains voltage from an electric mains supply and further configured to apply reduced voltage to the electrical load. A control switch comprising metal contacts is connected to the voltage transformer. The control switch is configured to facilitate application of reduced value of AC mains voltage to the electrical load. A reduced value of current flowing through the electrical load is measured by a current transformer connected in series with the electrical load. The reduced value of current is then used for estimating a current consumption value in event of AC mains voltage being directly applied to the electrical load. A control signal is then used for disconnecting the electrical circuit if the estimated current consumption value is greater than threshold overload current value.