摘要:
A moving object detected and tracked within a field of view environment of a 2D data feed of a calibrated video camera is represented by a 3D model through localizing a centroid of the object and determining an intersection with a ground-plane within the field of view environment. An appropriate 3D mesh-based volumetric model for the object is initialized by using a back-projection of a corresponding 2D image as a function of the centroid and the determined ground-plane intersection. Nonlinear dynamics of a tracked motion path of the object are represented as a collection of different local linear models. A texture of the object is projected onto the 3D model, and 2D tracks of the object are upgraded to 3D motion to drive the 3D model by learning a weighted combination of the different local linear models that minimizes an image re-projection error of model movement.
摘要:
Visual content in images captured from a scene by a camera in each of a plurality of different pose settings are analyzed to determine predicted occurrences of a transaction associated with the visual content in each pose, which are compared with actual transaction occurrence data to generate performance values for each pose as a function difference between the predicted and actual transactions. Optimized poses are chosen having the best performance value, wherein a camera controller may place the camera in the optimum pose for use in monitoring the scene and generating the primitives of interest associated with the transactions.
摘要:
Methods and systems for remotely enrolling enrollees into biometric databases are provided. The method includes acquiring biometric data from one or more biometric sensors and authenticating an enrollee associated with the biometric data. The method includes enrolling the authenticated enrollee associated with the biometric data. The acquiring occurs externally from equipment that requires an identification. The method includes verifying individual samplings of the biometric data for quality at the time of enrollment based on a pre-determined threshold and verifying whether the enrollee presenting the biometric data is authenticated at the time of enrollment. The method includes signing a request of a third party with a private key associated with the third party, the signing denoting that the biometric data is verified for a transaction between the third party and the enrollee. The method includes sending the signed third party request to the third party to complete authenticating of the transaction.
摘要:
Images are retrieved and ranked according to relevance to attributes of a multi-attribute query through training image attribute detectors for different attributes annotated in a training dataset. Pair-wise correlations are learned between pairs of the annotated attributes from the training dataset of images. Image datasets may then be searched via the trained attribute detectors for images comprising attributes in a multi-attribute query, wherein images are retrieved from the searching that each comprise one or more of the query attributes and also in response to information from the trained attribute detectors corresponding to attributes that are not a part of the query but are relevant to the query attributes as a function of the learned plurality of pair-wise correlations. The retrieved images are ranked as a function of respective total numbers of attributes within the query subset attributes.
摘要:
A method, data processing system, and computer program product for identifying abnormalities in data. A model representing a plurality of modes for an activity generated from training data is retrieved. The training data includes a first plurality of measurements of a first performance of the activity over a period of time. Each of the plurality of modes is identified as one of normal and abnormal. Activity data including a second plurality of measurements of a second performance of the activity is received. A portion of the activity data is compared with the plurality of modes in the model. A notification of an abnormality in the second performance of the activity is generated in response to an identification that the portion of the activity data matches a mode in the plurality of modes identified as abnormal. Confirmation of the abnormality is requested via a user interface.
摘要:
In response to a query of discernible facial attributes, the locations of distinct and different facial regions are estimated from face image data, each relevant to different attributes. Different features are extracted from the estimated facial regions from database facial images, which are ranked in base layer rankings by matching feature vectors in a bipartite graph to a base layer ranking sequence as a function of edge weights parameterized by an associated base layer parameter vector. Second-layer rankings define second-layer attribute vectors as bilinear combinations of the base-layer feature vectors and associated base layer parameter vectors for common attributes, which are matched in a bipartite graph to a second-layer ranking sequence as a function of edge weights parameterized by associated second-layer parameter vectors. The images are thus ranked for relevance to the query as a function of fusing the second-layer rankings.
摘要:
Under the present invention, item verification is automated and expedited. Specifically, items to be purchased can be scanned by the shopper using a barcode reader (e.g., a scanner) attached to or positioned near the shopping receptacle. As items are scanned, they are identified based on their barcode and added to an item list. Item verification can then performed at checkout using imaging technology. For example, the shopping cart or shopping basket can be brought into the field of view of a computer-connected camera. The camera and computer can, working from the customer's item list developed when the items are scanned, observe each product in the receptacle and “ring it up”. If all products can be accounted for, the customer is free to leave; otherwise the customer is denied egress, informed of the problem, etc. A store employee can also be signaled to investigate. The total time required to make the decision is the time to take a picture and process it, which by human standards is very fast; faster than existing verification methods.
摘要:
A computer based image processing system uses an extraction process to include a pressure invariant feature for measuring distances between minutiae. The feature extraction process identifies one or more of the following features of the fingerprint: an orthogonal image contrast, a parallel image contrast, and a feature confidence. A ridge counter process, executing on the computer system, determines the number of ridges (ridge count) running across two given points and further qualifies (invalidates) this count if the confidence value of the pixels in the region adjoining the region is not reliable. The ridge count feature between minutiae is used for determining reliable features when matching fingerprints.