Abstract:
In a method of diarization of audio data, audio data is segmented into a plurality of utterances. Each utterance is represented as an utterance model representative of a plurality of feature vectors. The utterance models are clustered. A plurality of speaker models are constructed from the clustered utterance models. A hidden Markov model is constructed of the plurality of speaker models. A sequence of identified speaker models is decoded.
Abstract:
Video is often used to count and identify people entering and exiting an area, such as a store. This information may be used to determine the number and amount of time people are in the area, and other statistics and characteristics. These variables may be skewed by the associates employed or working in the area, instead of patrons or others. The present disclosure is directed to method for eliminating associates from video by facial analysis and the application of analytics.
Abstract:
Systems and methods for receiving video images from a plurality of video cameras having respective fields of view that cover a geographical region. At a first time, first video images of an object may be output, where the images are captured by a first video camera selected from the plurality of video cameras. Location indications may be received, which specify a geographical location of the object in the geographical region and which are determined independently of the video images. At a second time subsequent to the first time, a second video camera from the plurality may be selected based on the location indications. The output may be switched to the second video images of the object, which are captured by the selected second video camera.
Abstract:
Systems and methods of detecting irregular events include the extraction of values for measure in each of a plurality of notifications. The extracted values are stored in a measures database and a distribution is calculated for the values of each of the measures. The extracted values are compared to the calculated distributions to determine if an irregular event has occurred. An irregularity alert is produced if an irregular event has occurred.
Abstract:
A subject can be tracking using a plurality of physical video monitoring or image acquisition devices deployed in a delimited area. A map represents the delimited area. Icons representing the physical monitoring devices can be placed and configured on the map representing the delimited area. Some or all of the placed and configured video monitoring devices can be logically linked together to form scenes. The video feed from the physical video monitoring devices may be recorded in stable storage. A layout for display of the video feeds may be selected. Upon playing the video feed, whether live or recorded, a subject can be tracked through the delimited area by selecting one of the video monitoring devices in one of the available scenes.
Abstract:
A method for converting speech to text in a speech analytics system is provided. The method includes receiving audio data containing speech made up of sounds from an audio source, processing the sounds with a phonetic module resulting in symbols corresponding to the sounds, and processing the symbols with a language module and occurrence table resulting in text. The method also includes determining a probability of correct translation for each word in the text, comparing the probability of correct translation for each word in the text to the occurrence table, and adjusting the occurrence table based on the probability of correct translation for each word in the text.
Abstract:
Methods and systems for deanonymizing digital currency users and transactions. The deanonymization system monitors communication sessions that are conducted in a communication network. From among the monitored sessions, the system detects sessions in which users carry out digital currency transactions. Having detected such a session, the system attempts to deanonymize the user, i.e., to correlate the digital currency pseudonym given in the session with some other information that is indicative of the user. The system may determined the identity of the terminal on which the user conducts the session, and uses the identity of the terminal to establish a correlation between the pseudonym and the user. In some cases the terminal is known to belong to a specific user.
Abstract:
The disclosed solution uses machine learning-based methods to improve the knowledge extraction process in a specific domain or business environment. By formulizing a specific company's internal knowledge and terminology, the ontology programming accounts for linguistic meaning to surface relevant and important content for analysis. Based on the self-training mechanism developed by the inventors, the ontology programming automatically trains itself to understand the business environment by processing and analyzing a defined corpus of communication data. For example, the disclosed ontology programming adapts to the language used in a specific domain, including linguistic patterns and properties, such as word order, relationships between terms, and syntactical variations. The disclosed system and method further relates to leveraging the ontology to assess a dataset and conduct a funnel analysis to identify patterns, or sequences of events, in the dataset.
Abstract:
Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network. As a result, the malware identification models are adapted with high speed and accuracy.
Abstract:
Methods and systems for tracking mobile communication terminals based on their identifiers. The disclosed techniques identify cellular terminals and Wireless Local Area Network (WLAN) terminals that are likely to be carried by the same individual, or cellular and WLAN identifiers that belong to the same multi-mode terminal. A correlation system is connected to a cellular network and to a WLAN. The system receives location coordinates of cellular identifiers used by mobile terminals in the cellular network, and location coordinates of WLAN identifiers used by mobile terminals in the WLAN. Based on the location coordinates, the system is able to construct routes that are traversed by the terminals having the various cellular and WLAN identifiers. The system attempts to find correlations in time and space between the routes.