Stitching maps generated using simultaneous localization and mapping

    公开(公告)号:US10990829B2

    公开(公告)日:2021-04-27

    申请号:US15581953

    申请日:2017-04-28

    Abstract: In some examples, a camera tracking failure in a simultaneous localization and mapping (SLAM) process with respect to a first SLAM map may be identified. Responsive to identification of the camera tracking failure, a second SLAM map for the SLAM process may be initialized. A video frame tracked through the second SLAM map may be accessed. Matched features between the video frame and individual keyframes of the first SLAM map may be identified to determine a keyframe subset. The keyframe subset may be analyzed to determine a candidate camera position from among the keyframe subset. The candidate camera position may be tracked with respect to the first SLAM map for subsequent video frames. The first SLAM map may be stitched to the second SLAM map responsive to tracking the candidate camera position with respect to the first SLAM map for the subsequent.

    Privacy risk assessments
    94.
    发明授权

    公开(公告)号:US10963571B2

    公开(公告)日:2021-03-30

    申请号:US15776321

    申请日:2015-11-17

    Abstract: Example implementations relate to privacy risk assessments. Some implementations may include a privacy risk identification engine to automatically identify privacy risks in an application based on an analysis of application code. Additionally, some implementations may include a privacy risk identification engine to obtain privacy risk information related to each of the privacy risks. Moreover, some implementations may include a privacy risk assessment engine to assess a severity of each of the privacy risks based on an analysis of the privacy risk information. In some examples, the analysis may include a determination of, for each of the privacy risks, a risk impact and a risk likelihood.

    GPS computation cycling
    96.
    发明授权

    公开(公告)号:US10955562B2

    公开(公告)日:2021-03-23

    申请号:US15544639

    申请日:2015-01-29

    Abstract: A method for cycling GPS computations is described in which, at a beginning of a cycle, N computing devices are determined to be members of a device group. At each of N points within the cycle: a target device of the N computing devices is instructed to compute its target location data; another member of the device group is instructed to refrain from computing its other location data; target location data is received from the target device; and the target location data is transmitted to each other member of the device group.

    Automatic detection of outliers in multivariate data

    公开(公告)号:US10915602B2

    公开(公告)日:2021-02-09

    申请号:US15553278

    申请日:2015-03-18

    Abstract: Automatic detection of outliers in multivariate data is disclosed. One example is a system including a distance generator to determine Mahalanobis distances for data elements of multivariate input data, the Mahalanobis distance of a given data element indicative of a measure of distance of the given data element from a probability distribution associated with the input data. A filter module selects a portion of the input data, the cohesive portion indicative of cohesive data elements, and the selection based on minimizing the Mahalanobis distances, and identifies candidate outliers to be data elements not in the cohesive portion. An outlier detector automatically detects outliers of the candidate outliers, the detection based on median absolute deviations of the Mahalanobis distances of the input data, and a modified z-score. A display module generates a visual representation of the detected outliers.

    Replacing a subset of digits in a sequence

    公开(公告)号:US10903854B2

    公开(公告)日:2021-01-26

    申请号:US16092926

    申请日:2016-04-20

    Inventor: Richard Minner

    Abstract: In one example in accordance with the present disclosure, a method may include receiving a digit sequence including a subset of N digits encoded with semantic information and determining a set of possible combinations for the N digits in the subset. The method may also include establishing a mapping between each possible combination in the set of possible combinations and a corresponding integer sequence belonging to a set of integer sequences. Each integer sequence in the set of integer sequences is of the length of N−1. The method may also include identifying a selected integer sequence corresponding to the subset and replacing n−1 digits from the subset with the selected integer sequence. The method may also include replacing a digit of the subset with a digit value calculated to produce a valid checksum for the entire first digit sequence, wherein the first digit is not included in the n−1 digits.

    Hash offset based key version embedding

    公开(公告)号:US10892890B2

    公开(公告)日:2021-01-12

    申请号:US15720857

    申请日:2017-09-29

    Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.

Patent Agency Ranking