Zhai K.,Mach 1 Development |
Jiang N.,Mach 1 Development |
Pedrycz W.,University of Alberta
International Journal of Advanced Manufacturing Technology | Year: 2013
Scientific cost prediction is the foundation for formulating a business plan, which helps enterprises to determine the target costs and to control the operating costs. In today’s world, quantitative methods are crucial for prediction purposes in cost management. On the basis of studying some typical methods of cost prediction, we propose a cost prediction method based on an improved fuzzy model. Firstly, owning to the inefficiency of existing fuzzifier, such that it is difficult to determine the number of fuzzy rules, we present an improved fuzzy c-means (FCM) fuzzifier to solve this problem referring to “granulation–degranulation” strategy and sample error function. Secondly, a fuzzy model based on the improved FCM fuzzifier is constructed through combining Takagi–Sugen–Kang fuzzy inference system. The algorithm of the improved fuzzy model is also realized by this study. Finally, through a series of experimental analyses for steel number product and steel class product of certain machinery enterprise, the results have demonstrated that the proposed method has the better prediction accuracy, which can be used effectively and practically in real-world cost prediction. © Springer-Verlag London Limited 2012
The present invention is a system and process for inserting a marker inertly within an image file. The marker is inert in that it is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked.
The present invention is a system and process for updating a marked image file. The system and process seeks a marker that is inertly placed in an image file such that the marker is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked.
The present invention is a system and process for analyzing a marked image file. The system and process seeks a marker that is inertly placed in an image file such that the marker is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked and updated as required by a user.
Mach 1 Development | Date: 2014-04-07
The present invention includes a system for monitoring the transmission of digital files across a secured boundary of a private ecosystem. Because an application programming interface making calls to a web application platform controls the placement of security tokens, distinct programs on devices from which transmissions originate, or are bound, to place and update tokens is generally obviated.
Mach 1 Development | Date: 2014-03-04
Apparatus for transmission of communication; Computer software for the monitoring, administration, and analysis of data related to articles/personnel bearing electronic security and surveillance devices; Electronic security and surveillance devices, namely, electronic security tags and labels, acoustic tags, magnetic tags.
Mach 1 Development | Date: 2012-06-26
Computer software for electronic file data security. Authentication in the field of electronic data; Software as a service (SAAS) services featuring software for electronic file data security, and monitoring, administration, and management of data records associated with electronic files.
Mach 1 Development | Date: 2014-04-08
The present invention is directed to security systems that utilize electromagnetic radiation. The security system includes an authentication security document, an authentication system, and a process for authenticating security documents. The security document includes a document body with an RFID and body information pertinent to the security document. The RFID inlay includes a radiopaque material or other material that is opaque to ranges of electromagnetic radiation. The authentication system for secured documents includes an electromagnetic scanning device, a document with a document body, and the RFID device. The scanning device includes a secured device inlet suitable to accept the document body and a display that shows the results of the electromagnetic bombardment of the document body. The process for authenticating security documents includes positioning within the scanning device the security document to create a radiated image thereof that displays the inlay information.
News Article | October 17, 2013
Mach 1 Development, Inc., an Austin, Texas-based provider of Identity Management Systems expertise, smartcard design, encrypted communications, e-ID implementation, RFID design, Logistics Integrity and border control systems expertise, closed a $1m funding. The funds were raised from an unnamed individual that invests in the digital security software industry. The investment follows a $500k angel financing the company had raised in February 2013 (read here). Mach 1 Development intends to use the funds to expand the capabilities of its solution as well as to expand its sales and marketing efforts. Led by Paul Greene, CEO, the company provides DocuTRACER®, a policy-driven solution that enables commercial and government customers to tag, track, and trace the real-time creation, movement, genealogy and chain-of-custody of digital documents. Mach 1 has also completed the development of inmateID™, a RFID-based system that provides corrections facilities with real-time monitoring and tracking of inmate movement, gang interactions, and the spread of communicable diseases within prisons.