Abstract:
A method for detecting flame and smoke using spatial analysis of video input (40) provided by a video detector. The video input (40) consists of a number of individual frames, wherein analysis is performed on each individual frame to detect and outline regions that may contain smoke or flame (42). Based on the defined outline or boundary of each detected region, spatial features associated with the region are extracted (52), such as perimeter/area and surface area/volume. The extracted spatial features are related to one another (54) to determine the likelihood that the region contains smoke or flame. Extracted spatial features may be related to one another using a power law relationship that provides an indication of the turbulence associated with a bounded region, wherein turbulence is a characteristic of both flame and smoke.
Abstract:
An auto-commissioning system provides automatic parameter selection for an intelligent video system based on target video provided by the intelligent video system. The auto-commissioning system extracts visual feature descriptors from the target video and provides the one or more visual feature descriptors associated with the received target video to an parameter database that is comprised of a plurality of entries, each entry including a set of one or more stored visual feature descriptors and associated parameters tailored for the set of stored visual feature descriptors. A search of the parameter database locates one or more best matches between the extracted visual feature descriptors and the stored visual feature descriptors. The parameters associated with the best matches are returned as part of the search and used to commission the intelligent video system.
Abstract:
A system and method for performing automated defect detection by utilizing data from prior inspections is disclosed. The system and method may include providing a image capture device for capturing and transmitting at least one current image of an object and providing a database for storing at least one prior image from prior inspections. The system and method may further include registering the at least one current image with the at least one prior image, comparing the registered at least one current image with the at least one prior image to determine a transformation therebetween and updating the database with the at least one current image.
Abstract:
A video-based fire detection system receives video data comprised of a plurality of individual frames, and determines based on the video data the ability of the system to detect the presence of fire. The system includes a video recognition system connectable to receive the video data and to calculate one or more background features associated with the video data. Based on the calculated background features, the video recognitions system assesses the ability of the video-based fire detection system to detect the presence of fire. The system includes one or more outputs operably connectable to communicate the results of the assessment made by the video recognitions system.
Abstract:
A computer program product and method for performing position control on device members that have been identified as defective. The method may include providing a storage medium that stores data and programs used in processing images and a processing unit that processes the images, receiving, by the processing unit from an image capture device coupled to the processing unit, a set of images of a plurality of members inside of a device, detecting, by the processing unit, a defect in a first member of the plurality of members, and providing instructions to move the first member to an inspection position in the device. The device may be an engine and the members may be blades within the engine.
Abstract:
A video enhancement system provides automatic enhancement to video data that includes the presence of obscurations. The system provides near-field enhancement of the video data by detecting the presence of near-field obscurations such as snowflakes/raindrops and determining whether the detected obscurations are located over background pixels or foreground objects. The detected obscuration pixels are filled-in depending on whether they are located over the background or foreground to create an enhanced image. The system may also provide local/global adaptive contrast enhancement to enhance video in the presence of far-field obscurations.
Abstract:
A communication system includes a first communication module within a rotating frame of reference and a second communication module within a fixed frame of reference. The first communication module and the second communication module in wireless communication at least partially through a hollow shaft.
Abstract:
A method for improving a video-processing algorithm (36) identifies Video data (48) that may have been misinterpreted by the video-processing algorithm (36). The identified video data (48) is provided to a monitoring center (38) that uses the identified video data (48) to modify and improve upon the video-processing algorithm (36). An improved video-processing algorithm (49) is able to correctly analyze the identified video data (48).
Abstract:
In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
Abstract:
In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.