Abstract:
Methods and systems for executing an application include extending a container orchestration system application programming interface (API) to handle objects that specify components of an application. An application representation is executed using the extended container orchestration system API, including the instantiation of one or more services that define a data stream path from a sensor to a device.
Abstract:
Systems and methods are provided for increasing accuracy of video analytics tasks in real-time by acquiring a video using video cameras, and identifying fluctuations in the accuracy of video analytics applications across consecutive frames of the video. The identified fluctuations are quantified based on an average relative difference of true-positive detection counts across consecutive frames. Fluctuations in accuracy are reduced by applying transfer learning to a deep learning model initially trained using images, and retraining the deep learning model using video frames. A quality of object detections is determined based on an amount of track-ids assigned by a tracker across different video frames. Optimization of the reduction of fluctuations includes iteratively repeating the identifying, the quantifying, the reducing, and the determining the quality of object detections until a threshold is reached. Model predictions for each frame in the video are generated using the retrained deep learning model.
Abstract:
Methods and systems for managing communications include identifying a system condition in a distributed computing system comprising a first microservice in communication with a second microservice. A communications method is identified responsive to the identified system condition using a reinforcement learning model that associates communication methods with system conditions. The identified communications method is implemented for communications between the first microservice and the second microservice, such that the first microservice and the second microservice use the identified communications method to transmit data.
Abstract:
Systems and methods for network bandwidth optimization, including transmitting sensor data from one or more sensors over a wireless network into a generated network slice, submitting a Quality-of-Service (QoS) request for one or more applications by specifying desired network slice characteristics, and predicting network bandwidth needed for granting the QoS request for the one or more applications using a cost function based on magnitude, direction, and frequency of error. Time-varying network bandwidth usage is continuously monitored, and new QoS requests for the one or more applications are periodically requested based on the monitoring. An updated prediction for updated bandwidth needed for the new QoS request is generated using the cost function, and network bandwidth reservations are iteratively adjusted based on the updated prediction for the new QoS request to provide an amount of network resources to the one or more applications to support the new QoS request.
Abstract:
Systems and methods for determining dwell time is provided. The method includes receiving images of an area including one or more people from one or more cameras, and detecting a presence of each of the one or more people in the received images using a worker. The method further includes receiving by the worker digital facial features stored in a watch list from a master controller, and performing facial recognition and monitoring the dwell time of each of the one or more people. The method further includes determining if each of the one or more people is in the watch list or has exceeded a dwell time threshold.
Abstract:
Methods and systems for deploying a video analytics system include determining one or more applications for a security system in an environment, including one or more constraints. Each functional module in a directed graph representation of one or more applications is profiled to generate one or more configurations for each functional module. The nodes of each graph representation represent functional modules of the respective application, and repeated module configurations are skipped. Resource usage for each of the one or more applications is estimated using the one or more configurations of each functional module and the one or more constraints. The one or more applications are deployed in the environment.
Abstract:
A method for performing resource orchestration for microservices-based 5G applications in a dynamic, heterogenous, multi-tiered compute and network environment is presented. The method includes managing compute requirements and network requirements of a microservices-based application jointly by positioning computing nodes distributed across multiple layers, across edges and at a central cloud, identifying and modeling coupling relationships between compute and network resources for a plurality of microservices, when only application-level requirements are provided, to build coupling functions, solving a multi-objective optimization problem to identify how each of the plurality of microservices are deployed in the dynamic, heterogenous, multi-tiered compute and network environment by employing the coupling functions to jointly optimize resource usage of the compute and network resources across different compute and network slices, and deriving optimal joint network and compute resource allocation and function placement decisions.
Abstract:
Methods and systems for managing access include detecting a person within a region of interest in a video stream. It is determined that a clear image of the person's face is not available within the region of interest. Tracking information of the person is matched to historical face tracking information for the person in a previously captured frame. The person's face from the previously captured video frame is matched to an authentication list, responsive to detecting the person within the region of interest, to determine that the detected person is unauthorized for access. A response to the determination that the detected person is unauthorized for access is performed.
Abstract:
A method is provided for managing applications for sensors. In one embodiment, the method includes loading a plurality of applications and links for communicating with a plurality of sensors on a platform having an interface for entry of a requested use case; and copying a configuration from a grouping of application instances being applied to a first sensor performing in a function comprising of the requested use case. The method may further include applying the configuration for the grouping of application instances to a second set of sensors to automatically conform the plurality of sensors on the platform to perform the requested use case.
Abstract:
Methods and systems for scheduling jobs to manycore nodes in a cluster include selecting a job to run according to the job's wait time and the job's expected execution time; sending job requirements to all nodes in a cluster, where each node includes a manycore processor; determining at each node whether said node has sufficient resources to ever satisfy the job requirements and, if no node has sufficient resources, deleting the job; creating a list of nodes that have sufficient free resources at a present time to satisfy the job requirements; and assigning the job to a node, based on a difference between an expected execution time and associated confidence value for each node and a hypothetical fastest execution time and associated hypothetical maximum confidence value.