Abstract:
In accordance with one aspect of the present technique, a method includes receiving one or more videos from one or more image capture devices. The method further includes generating a video-loop of the person from the one or more videos. The video-loop depicts the person in the commercial site. The method also includes generating an action clip from the video-loop. The action clip includes a suspicious action performed by the person in the commercial site. The method further includes generating an activity summary of the person including the video-loop and the action clip.
Abstract:
The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.
Abstract:
A tracking and recognition system is provided. The system includes a computer vision-based identity recognition system configured to recognize one or more persons, without a priori knowledge of the respective persons, via an online discriminative learning of appearance signature models of the respective persons. The computer vision-based identity recognition system includes a memory physically encoding one or more routines, which when executed, cause the performance of constructing pairwise constraints between the unlabeled tracking samples. The computer vision-based identity recognition system also includes a processor configured to receive unlabeled tracking samples collected from one or more person trackers and to execute the routines stored in the memory via one or more algorithms to construct the pairwise constraints between the unlabeled tracking samples.
Abstract:
A method for identifying assets is provided. The method includes illuminating an identification pattern associated with the asset with non-visible light. The identification pattern includes retroreflective material that represents identity information of the asset. The method further includes adjusting either a shutter speed of an image sensor, or a power of the non-visible light, or both, based on motion state of the asset. The image sensor is configured to receive response of the retroreflective material to the non-visible light. Furthermore, the method includes the step of identifying the asset based on decoded identity information. The decoded identity information is obtained by processing the response of the retroreflective material.
Abstract:
An example method includes: classifying lung function risk based on patient attributes and a clinical protocol; generating alarms and incentives for compliance with the clinical protocol based on patient attributes, clinical protocol, and patient lung function risk; determining an orientation and position of a clinical device based on tagged feature(s) of the clinical device compared to identified patient feature(s); monitoring patient interaction with the clinical device; identifying a deviation from the clinical protocol based on the monitored patient interaction, a patient biometric indicator, and a desired setpoint state in the protocol; when a deviation is identified, providing feedback proportional to the deviation, the feedback including an adjustment with respect to the clinical protocol and/or the clinical device; and triggering at least one alarm and/or incentive based on deviation and feedback, wherein the alarm/incentives differs based on whether and to what extent deviation is identified and feedback.
Abstract:
In accordance with one aspect of the present technique, a method includes receiving one or more videos from one or more image capture devices. The method further includes generating a video-loop of the person from the one or more videos. The video-loop depicts the person in the commercial site. The method also includes generating an action clip from the video-loop. The action clip includes a suspicious action performed by the person in the commercial site. The method further includes generating an activity summary of the person including the video-loop and the action clip.
Abstract:
A novel technique for performing video matting, which is built upon a proposed image matting algorithm that is fully automatic is disclosed. The disclosed methods utilize a PCA-based shape model as a prior for guiding the matting process, so that manual interactions required by most existing image matting methods are unnecessary. By applying the image matting algorithm to these foreground windows, on a per frame basis, a fully automated video matting process is attainable. The process of aligning the shape model with the object is simultaneously optimized based on a quadratic cost function.
Abstract:
The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.
Abstract:
A system and method include a plurality of sensors proximate a subject, wherein each sensor includes a plurality of antennas, and wherein each sensor operates on a plurality of frequency channels. The method includes receiving, at a respiration module, a signal associated with each antenna for each of the plurality of frequency channels; and calculating a respiration rate of the subject based on the received signal associated with each antenna for each of the plurality of frequency channels. Numerous other aspects are provided.
Abstract:
An example method includes: classifying lung function risk based on patient attributes and a clinical protocol; generating alarms and incentives for compliance with the clinical protocol based on patient attributes, clinical protocol, and patient lung function risk; determining an orientation and position of a clinical device based on tagged feature(s) of the clinical device compared to identified patient feature(s); monitoring patient interaction with the clinical device; identifying a deviation from the clinical protocol based on the monitored patient interaction, a patient biometric indicator, and a desired setpoint state in the protocol; when a deviation is identified, providing feedback proportional to the deviation, the feedback including an adjustment with respect to the clinical protocol and/or the clinical device; and triggering at least one alarm and/or incentive based on deviation and feedback, wherein the alarm/incentives differs based on whether and to what extent deviation is identified and feedback.