Big data analytics for predictive manufacturing control-a case study from process industry

J Krumeich, S Jacobi, D Werth… - 2014 IEEE international …, 2014 - ieeexplore.ieee.org
Nowadays, companies are more than ever forced to dynamically adapt their business
process executions to currently existing business situations in order to keep up with …

Secure protocol for peer-to-peer network

AA Hassan, MK Desai, Y Gupta, H Filgueiras - US Patent 9,596,220, 2017 - Google Patents
(57) ABSTRACT A wireless computing device operating as a controller of a peer-to-peer
group configured to generate unique master keys for each device joining the group. The …

Fast join of peer to peer group with power saving mode

MK Desai, AA Hassan, M Sankaranarayan… - US Patent …, 2016 - Google Patents
7,562,129 B1 7/2009 Lee et al. 2007/0192735 A1 8, 2007 Lehto et al. 7,577.125 B2 8, 2009
Abhishek 2007/02O7750 A1 9, 2007 Brown et al. 7,580,678 B2 8/2009 Byman-Kivivuori et …

Towards planning and control of business processes based on event-based predictions

J Krumeich, S Jacobi, D Werth, P Loos - … May 22-23, 2014. Proceedings 17, 2014 - Springer
To keep up with increasing market demands in global competition, companies are forced to
dynamically adapt each of their business process executions to currently present business …

Universal dock for context sensitive computing device

AA Hassan, Y Gupta, R Rao, BR Anders - US Patent 9,542,203, 2017 - Google Patents
(57) ABSTRACT A dock for interacting with a computing device. The com puting device
configures itself for operations based on its context, which may be determined form the dock …

Context-based monitoring of logistic process events using passive UHF RFID technology

J Lechner, WA Günthner, S Nosovic… - … on Robotics and …, 2017 - ieeexplore.ieee.org
Systems and applications within the industry 4.0 have a high demand for accurate and up-to-
date information or context about their environment. A fundamental type of information is the …

A composite image encryption scheme using AES and chaotic series

X Huijuan, Q Shuisheng… - The First International …, 2007 - ieeexplore.ieee.org
This paper presents a composite scheme for image encryption. In the temporal domain,
chaotic series acts as a key for the AES (Advanced Encryption Standards) encryption. It is …

Secure protocol for peer-to-peer network

AA Hassan, MK Desai, Y Gupta… - US Patent 10,575,174, 2020 - Google Patents
(57) ABSTRACT A wireless computing device operating as a controller of a peer-to-peer
group configured to generate unique master keys for each device joining the group. The …

Operating system supporting cost aware applications

P Menezes, M Piumatti, UW Parks, R Rao - US Patent 9,338,309, 2016 - Google Patents
7,107,009 B2 9/2006 Sairanen et al. 2006/0041916 A1 2/2006 Mcquaide 7,110,843 B2 239;
Pagnano et 2006/0059462 A1 3/2006 Yamamoto 7, 177,288 B2 53. Money et al …

Direct connection with side channel control

AA Hassan, BR Anders, KM Hunter, B Larsen - US Patent …, 2016 - Google Patents
(57) ABSTRACT A wireless computer that pairs with a remote audio-video presentation
device, such as a television. As a result of the pairing, a communication channel is …