Texas Health Physicians GroupTexas Hip & Knee Center 6301 Harris Pkwy STE 300, Fort Worth, TX 76132 8178773432 (phone), 8173464394 (fax)
Languages:
English Spanish
Description:
Mr. Tran works in Fort Worth, TX and specializes in Orthopaedic Surgery. Mr. Tran is affiliated with Baylor Surgical Hospital Fort Worth and Texas Health Harris Methodist Hospital Fort Worth.
- Atlanta GA, US Appavu Siva Prakasam - New Providence NJ, US Ann Eileen Skudlark - San Ramon CA, US Siva Kolachina - Plano TX, US Nisha Shahul Hameed - Bellevue WA, US Prashanth Boddhireddy - Plano TX, US Lien Tran - Seattle WA, US
Aspects of the subject disclosure may include, for example, determining classes from a corpus based on topic modeling, data clustering and unsupervised learning. Labels are determined for each of the classes and trained models are generated for each of the classes by assignment of a plurality of textual documents to labels based on a highest number of matches. A raw textual document can be tokenized and stop words removed. A corresponding one of the trained models can be selected according to a class that is applicable to subject matter of the raw textual document. The processed document can be assigned to a target label based on a highest number of matches of words. Other embodiments are disclosed.
System For Trend Discovery And Curation From Content Metadata And Context
- Atlanta GA, US Eric Zavesky - Austin TX, US Lien Tran - Seattle WA, US David Crawford Gibbon - Lincroft NJ, US Zhu Liu - Marlboro NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 67/306 H04N 21/25 H04L 67/50 H04N 21/442
Abstract:
Aspects of the subject disclosure may include, for example, a method that includes obtaining metadata from media content and consumed by network subscribers; determining for each network subscriber a consumer context associated with the media content; and determining a media consumption pattern for each network subscriber based on the metadata and the consumer context, thereby generating a plurality of media consumption patterns. The method further includes aggregating the media consumption patterns; determining, based on the aggregated media consumption patterns, a media consumption trend for the network subscribers; and correlating the media consumption trend with a profile including a current activity for a network subscriber of the plurality of network subscribers, thereby generating a recommendation for the network subscriber regarding new media content not previously consumed by the network subscriber. The method also includes communicating the recommendation to the network subscriber. Other embodiments are disclosed.
- Atlanta GA, US Lien K. Tran - Seattle WA, US Yu Jin - Madison NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 51/212 H04L 9/40 H04W 4/14
Abstract:
A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user’s response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device.
- Atlanta GA, US Lien K. Tran - Seattle WA, US Yu Jin - Madison NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 12/58 H04L 29/06 H04W 4/14
Abstract:
A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user's response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device.
- Atlanta GA, US Lien K. Tran - Chatham NJ, US Yu Jin - Foster City CA, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 12/58 H04L 29/06 H04W 4/14
Abstract:
A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user's response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device.
- Atlanta GA, US Lien K. Tran - Chatham NJ, US Yu Jin - Foster City CA, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 12/58 H04W 4/14 H04L 29/06 G06F 9/455
Abstract:
A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user's response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device.
System And Method For Cloud Based Ip Mobile Messaging Spam Detection And Defense
- Atlanta GA, US Lien K. Tran - Chatham NJ, US Yu Jin - Foster City CA, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Atlanta GA
International Classification:
H04L 12/58 G06F 9/455
Abstract:
A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user's response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device.
System And Method For Crowd-Sourcing Mobile Messaging Spam Detection And Defense
- Atlanta GA, US Jeffrey Erman - Morristown NJ, US Yu Jin - Madison NJ, US Abhinav Srivastava - Edison NJ, US Lien K. Tran - Chatham NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04W 4/12 H04W 4/00 H04W 12/08
US Classification:
455411, 455 261
Abstract:
A crowd-sourced mobile messaging spam detection and defense system includes an application running on a mobile device. The application uses an unwanted message detection algorithm to analyze and classify messages as potential unwanted messages. The potential unwanted messages are presented to a user for confirmation that the messages are unwanted messages. In response to confirmation, the mobile device transmits a notification to a virtual machine associated with the user. The virtual machine uses the notification to update the unwanted message detection algorithm which may then be transmitted to the mobile device. The virtual machine may also transmit the notification to a global virtual machine. The global virtual machine may use the notification to update a set of classification rules maintained by the global virtual machine and transmit the set of classification rules as necessary to the multiple virtual machines for use in updating the unwanted message detection algorithm.
dorkShop New York, NY Feb 2010 to Mar 2011 Founding Member & PresidentMFA D
2011 to 2011 Parsons Bootcamp Teaching Fellow
Education:
College of William and Mary MFA in Design & TechnologyThe New School for Social Research Dec 2011 Parsons Research AssistantshipsUniversity and division committees and disaster risk management Nov 2010 Business ConsultantCollege of William and Mary 2009 Tiano Book DesignParsons The New School for Design Jul 2005
Lien Tran 1998 graduate of Capital Community - Technical College in Hartford, CT is on Memory Lane. Get caught up with Lien and other high school alumni from