Disruptor mitigation
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Vaidyanathan, Jayashree Boss, Gregory J Rodriguez Bravo, Cesar Augusto Pierson, Bernadette |
description | Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area; examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals; identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied; detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10769419B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10769419B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10769419B23</originalsourceid><addsrcrecordid>eNrjZBBxySwuKi0oyS9SyM0syUxPLMnMz-NhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYG5maWJoaWTkbGxKgBAHcLIVo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Disruptor mitigation</title><source>esp@cenet</source><creator>Vaidyanathan, Jayashree ; Boss, Gregory J ; Rodriguez Bravo, Cesar Augusto ; Pierson, Bernadette</creator><creatorcontrib>Vaidyanathan, Jayashree ; Boss, Gregory J ; Rodriguez Bravo, Cesar Augusto ; Pierson, Bernadette</creatorcontrib><description>Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area; examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals; identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied; detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200908&DB=EPODOC&CC=US&NR=10769419B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200908&DB=EPODOC&CC=US&NR=10769419B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Vaidyanathan, Jayashree</creatorcontrib><creatorcontrib>Boss, Gregory J</creatorcontrib><creatorcontrib>Rodriguez Bravo, Cesar Augusto</creatorcontrib><creatorcontrib>Pierson, Bernadette</creatorcontrib><title>Disruptor mitigation</title><description>Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area; examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals; identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied; detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBBxySwuKi0oyS9SyM0syUxPLMnMz-NhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYG5maWJoaWTkbGxKgBAHcLIVo</recordid><startdate>20200908</startdate><enddate>20200908</enddate><creator>Vaidyanathan, Jayashree</creator><creator>Boss, Gregory J</creator><creator>Rodriguez Bravo, Cesar Augusto</creator><creator>Pierson, Bernadette</creator><scope>EVB</scope></search><sort><creationdate>20200908</creationdate><title>Disruptor mitigation</title><author>Vaidyanathan, Jayashree ; Boss, Gregory J ; Rodriguez Bravo, Cesar Augusto ; Pierson, Bernadette</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10769419B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>Vaidyanathan, Jayashree</creatorcontrib><creatorcontrib>Boss, Gregory J</creatorcontrib><creatorcontrib>Rodriguez Bravo, Cesar Augusto</creatorcontrib><creatorcontrib>Pierson, Bernadette</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Vaidyanathan, Jayashree</au><au>Boss, Gregory J</au><au>Rodriguez Bravo, Cesar Augusto</au><au>Pierson, Bernadette</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Disruptor mitigation</title><date>2020-09-08</date><risdate>2020</risdate><abstract>Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining one or more data feed that includes data of individuals within a crowd, wherein the crowd comprises a plurality of individuals gathered within an area; examining data of the one or more data feed to return behavior parameter values for respective individuals of the plurality of individuals; identifying, using values of the behavior parameter values, a disrupted group of a plurality of the individuals of the crowd, wherein the identifying is in dependence on a first one or more criterion being satisfied; detecting, using values of the behavior parameter values, a disruptor individual within the disrupted group, the detecting in dependence on a second one or more criterion being satisfied; and providing, by machine logic, one more disruptor mitigation output to mitigate disruptive behavior of the disruptor individual.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10769419B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY HANDLING RECORD CARRIERS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WIRELESS COMMUNICATIONS NETWORKS |
title | Disruptor mitigation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T02%3A06%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Vaidyanathan,%20Jayashree&rft.date=2020-09-08&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10769419B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |