Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

8941 results about "Statistical analysis" patented technology

Web site activity monitoring system with tracking by categories and terms

A traffic monitor provides statistics of traffic using an activity input for receiving data related to activity on a server system. Events being monitored are binned by topic or term, where the terms are associated with categories. The categories can be a hierarchy of categories and subcategories, with terms being in one or more categories. The categorized events include page views and search requests and the results might be normalized over a field of events and a result output for outputting results of the normalizer as the statistical analyses of traffic.
Owner:ENERGETIC POWER INVESTMENT

Method and system for analyzing data for potential malware

A system and method for generating a definition for malware and / or detecting malware. is described. One exemplary embodiment includes a downloader for downloading a portion of a Web site; a parser for parsing the downloaded portion of the Web site; a statistical analysis engine for determining if the downloaded portions of the Web site should be evaluated by the active browser; an active browser for identifying changes to the known configuration of the active browser, wherein the changes are caused by the downloaded portion of the Web site; and a definition module for generating a definition for the potential malware based on the changes to the known configuration.
Owner:WEBROOT SOFTWARE INCORPORATED

Method and system for scheduling inbound inquiries

A method and system schedules inbound inquiries, such as inbound telephone calls, for response by agents in an order that is based in part on the forecasted outcome of the inbound inquiries. A scheduling module applies inquiry information to a model to forecast the outcome of an inbound inquiry. The forecasted outcome is used to set a priority value for ordering the inquiry. The priority value may be determined by solving a constrained optimization problem that seeks to maximize an objective function, such as maximizing an agent's productivity to produce sales or to minimize inbound call attrition. The inbound call may be placed on a virtual hold or be responded to on a real-time basis based on the inbound inquiry's priority value. A modeling module generates models that forecast inquiry outcomes based on a history and inquiry information. Statistical analysis such as regression analysis determines the model with the outcome related to the nature of the inquiry. Forecasted outcomes are based on the goal of the inbound calls and include factors such as probability an inbound caller will hang up, probability that an inbound caller will alter a business relationship based on hold time, probability that an inbound caller will make a purchase, and the relative probable reward of responding to an inbound call.
Owner:UNWIRED BROADBAND INC

Anticipation of power on of a mobile device

A method of managing the power up of a device that has power down state; and at least two power up states, wherein the method includes the following steps:statistically analysing the power up time profile of the device;determining one or more predetermined statistical indicators associated with the stored power up time profile;calculating an anticipated start up time from the statistical indicators;at the anticipated start up time changing the device state from the power down state to a pre-determined one of the power up states depending on the statistical indicators;maintaining the device at pre-determined power up states for a predetermined duration;returning the device to the power down state if there is no user interaction with the device during the predetermined duration.
Owner:NXP USA INC

Prediction of prostate cancer progression by analysis of selected predictive parameters

A method for screening individuals at risk for prostate cancer progression is disclosed. The method is useful for evaluating cells from patients at risk for recurrence of prostate cancer following surgery for prostate cancer. Specifically, the method uses specific Markovian nuclear texture factors, alone or in combination with other biomarkers, to determine whether the cancer will progress or lose organ confinement. In addition, methods of predicting the development of fatal metastatic disease by statistical analysis of selected biomarkers is also disclosed. The invention also contemplates a method that uses a neural network to analyze and interpret cell morphology data. Utilizing Markovian factors and other biomarkers as parameters, the network is first trained with a sets of cell data from known progressors and known non-progressors. The trained network is then used to predict prostate cancer progression in patient samples.
Owner:CYTODIAGNOSTICS +3

Systems and methods for investigation of financial reporting information

Financial data including general ledger activity and underlying journal entries are examined to determine whether risks of material misstatement due to fraudulent financial reporting can be identified. The financial data is analyzed statistically and modeled over time, comparing actual data values with predicted data values to identify anomalies in the financial data. The anomalous financial data is then analyzed using clustering algorithms to identify common characteristics of the various transactions underlying the anomalies. The common characteristics are then compared with characteristics derived from data known to derive from fraudulent activity, and the common characteristics are reported, along with a weight or probability that the anomaly associated with the common characteristic is an identification of risks of material misstatement due to fraud. Large volumes of financial data are therefore efficiently processed to accurately identify risks of material misstatement due to fraud in connection with financial audits, or for actual detection of fraud in connection with forensic and investigative accounting activities. The analysis is enhanced by using flow analysis methods to select subsets of financial data to examine for anomalies. Flow analysis methods are also used to reveal useful business information found in money flow graphs of financial data.
Owner:PRICEWATERHOUSECOOPERS LLP

Method and system for valuing intangible assets

The present invention provides a method and system for valuing patent assets based on statistical survival analysis. An estimated value probability distribution curve is calculated for an identified group of patent assets using statistical analysis of PTO maintenance fee records. Expected valuations for individual patent assets are calculated based on a the value distribution curve and a comparative ranking or rating of individual patent assets relative to other patents in the group of identified patents. Patents having the highest percentile rankings would be correlated to the high end of the value distribution curve. Conversely, patents having the lowest percentile rankings would be correlated to the low end of the value distribution curve. Advantageously, such approach brings an added level of discipline to the overall valuation process in that the sum of individual patent valuations for a given patent population cannot exceed the total aggregate estimated value of all such patents. In this manner, fair and informative valuations can be provided based on the relative quality of the patent asset in question without need for comparative market data of other patents or patent portfolios, and without need for a demonstrated (or hypothetical) income streams for the patent in question. Estimated valuations are based simply on the allocation of a corresponding portion of the overall patent value “pie” as represented by each patents' relative ranking or position along a value distribution curve.
Owner:PATENTRATINGS

Data security system and method with adaptive filter

ActiveUS20050138109A1Ease overhead performanceHigh overhead performanceDigital data information retrievalDigital data processing detailsInformation processingAdaptive filter
The method, program and information processing system involves filtering and securing data (security sensitive words-characters-data objects) in a source document. The adaptive filter uses a compilation of additional data (typically networked) and identifies the sensitive words / objects in the compilation of additional data, retrieves contextual, semiotic and taxonomic words / objects from the additional data compilation that are related to the sensitive words / objects. A filter is compiled with the retrieved data and the filter is used to extract sensitive words / objects and the retrieved data (words / objects) from the source document to obtain extracted data and remainder data therefrom. Contextual words related to the security sensitive words / objects are obtained based upon statistical analysis of the additional data compilation. Semiotic words related to the security words are synonyms, antonyms, and pseudonyms, syntactics relative to the target words and retrieved words, and pragmatics relative to the sensitive words and retrieved words as reflected in the compilation of additional data.
Owner:DIGITAL DOORS

Method and system for collecting data on a wireless device

A method of storing collected data on a wireless device. User interaction with a wireless device and / or the performance of the wireless device is monitored and data related thereto collected. The collected data may be structured into a tagged hierarchical structure comprising a plurality of events that are separate and independent from one another. Each event may describe a specific application with a plurality of attributes. The tagged hierarchical structure formed as a tree structure is translated into a syntax generic language. The result may be formed into a compact format using a zipped format and / or a binary-equivalent format and then stored and transmitted to a central location (e.g., a server) for statistical analysis processing. The server transforms the received data into expanded format and forms a hierarchical tree structure for each event and its attributes. The result is processed for producing a statistical analysis of the collected data.
Owner:THE NIELSEN CO (US) LLC

Cross monitoring method and system based on voiceprint recognition and location tracking

InactiveCN101673544AEnabling Contactless Biometric IdentificationOvercoming \"Only Knowing Things\"Special service for subscribersPosition fixationHuman bodyLocation tracking
The invention discloses a cross monitoring method and a system based on voiceprint recognition and location tracking, belonging to the field of monitoring systems. The invention collects personal information and voice samples of a monitored target and constructs a vocalprint model thereof, and a wireless location communication terminal collects the location information thereof and the vocalprint information which are compared with filed information in the database; then, the human body movement track reflecting the monitored target and the complete report of a practical violation condition areoutput for management personnel to inspect and evaluate the performance of the monitored target; the management personnel can require and evaluate a statistical analysis report concerning the monitored target activity performance timelessly to observe the movement track and the state thereof or adjust the monitoring scheme thereof according to the performance. The invention realizes the remote location tracing of the monitored target, realizes non-contact biological identity recognition of the monitored target and satisfies the requirement of remote and non-contact monitoring of the monitoredtarget. The invention can be widely applied to the non-contact electronic monitoring and identity recognition field.
Owner:上海电虹软件有限公司 +1

Intelligent SPAM detection system using statistical analysis

A system, method and computer program product are provided for detecting an unwanted message. First, an electronic mail message is received. Text in the electronic mail message is decomposed. Statistics associated with the text are gathered using a statistical analyzer. The statistics are analyzed for determining whether the electronic mail message is an unwanted message.
Owner:MCAFEE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products