摘要:
Events are classified through string pattern recognition. Text labels are assigned to image primitives in a time-ordered set of training images and to related time-ordered transactions in an associated training transaction log in a combined time-ordered training string of text labels as a function of image types. Transactions are labeled in a training transaction log with a transaction label, a training primitive image of a start of a transaction with a start image text label, a training primitive of an entry of a transaction into the log with an entry image text label, and a training primitive of a conclusion of a transaction with an ending image text label. Positive subset string patterns are discovered representing true events from the combined time-ordered training string of text labels, and negative subset string patterns defined by removing single transaction primitive labels from the positive subset string patterns.
摘要:
An approach that detects locations of hazardous conditions within an infrastructure is provided. This approach uses satellite imagery, GIS data, automatic image processing, and predictive modeling to determine the location of the hazards automatically, thus optimizing infrastructure management. Specifically, a hazard detection tool provides this capability. The hazard detection tool comprises a detection component configured to: receive visual media containing asset location data about a set of physical assets, and hazard location data about potential hazards within a vicinity of each of the set of physical assets. The detection component further receives graphical information system (GIS) data containing asset location data about each of the set of physical assets. The hazard detection tool further comprises an analysis component configured to: analyze the visual media to determine if a hazardous condition exists for each of the set of physical assets; and apply the GIS data to the visual media to determine a location of hazardous conditions within the infrastructure.
摘要:
Determination of human behavior from an alignment of data streams includes acquiring visual image primitives from a video input comprising visual information relevant to a human activity. The primitives are temporally aligned to an optimally hypothesized sequence of primitives transformed from a sequence of transactions as a function of a distance metric between the observed primitive sequence and the transformed primitive sequence. More particularly, transforming includes comparing the distance metric costs and choosing and performing the lowest cost of temporally matching the observed primitives to one or more transactions, deleting a primitive, or associating a primitive with a pseudo transaction marker. Accordingly, alerts are issued based on analysis of the transformation of primitives.
摘要:
In an embodiment, automated analysis of video data for determination of human behavior includes providing a programmable device that segments a video stream into a plurality of discrete individual frame image primitives which are combined into a visual event that may encompass an activity of concern as a function of a hypothesis. The visual event is optimized by setting a binary variable to true or false as a function of one or more constraints. The optimized visual event is processed in view of associated non-video transaction data and the binary variable by associating the optimized visual event with a logged transaction if associable, issuing an alert if the binary variable is true and the optimized visual event is not associable with the logged transaction, and dropping the optimized visual event if the binary variable is false and the optimized visual event is not associable.
摘要:
A novel system and method of treating the output of moving cameras, in particular ones that enable the application of conventional “static camera” algorithms, e.g., to enable the continuous vigilance of computer surveillance technology to be applied to moving cameras that cover a wide area. According to the invention, a single camera is deployed to cover an area that might require many static cameras and a corresponding number of processing units. A novel system for processing the main video sufficiently enables long-term change detection, particularly the observation that a static object has been moved or has appeared, for instance detecting the parking and departure of vehicles in a parking lot, the arrival of trains in stations, delivery of goods, arrival and dispersal of people, or any other application.
摘要:
A system and method of treating the output of moving cameras, in particular ones that enable the application of conventional “static camera” algorithms, e.g., to enable the continuous vigilance of computer surveillance technology to be applied to moving cameras that cover a wide area. A single camera is deployed to cover an area that might require many static cameras and a corresponding number of processing units. A novel system for processing the main video sufficiently enables long-term change detection, particularly the observation that a static object has been moved or has appeared, for instance detecting the parking and departure of vehicles in a parking lot, the arrival of trains in stations, delivery of goods, arrival and dispersal of people, or any other application.
摘要:
An approach that allows for facilitating checkout related fraud investigation is presented. In one embodiment, there is described a generating tool configured to generate a set of benchmark parameters based on results of a cumulative learning process; a normalizing tool configured to normalize said set of benchmark parameters; an establishing tool configured to establish a confidence time interval required for identifying normal variations; a recording tool configured to record a particular checker's transactions during said confidence time interval, and an identifying tool configured to identify transactions, recorded during said confidence time interval, that fail meeting said set of benchmark parameters.
摘要:
Under the present invention, a single, overall alarm for an entire set of shopping items will be used for any and all discrepancies. The metric used for creating an alarm for the overall set of shopping items can be based on any one of the following candidate policies: if at least one item generated an alarm; if some fixed number of items generated an alarm; if some threshold discrepancy metric got exceed; if basket size is larger than certain threshold cash value and the alarm exceeded certain threshold alarm rate; a randomly generated alarm (e.g., random audit); the customer's identity and track record (e.g., loyalty card); and/or any combination of the above. Regardless, if an overall alarm is generated one or more of the following actions can be taken: no action send the customer to customer service; appropriately record customer track record (e.g., loyalty card) when customer identity is available; audit the customer at the “shop exit; and/or any combination of thereof.
摘要:
Aspects of the present invention provide a secure checkout system comprising an image capture device (e.g., a camera) that is collocated with a handheld/portable scanner. The barcode of an item is scanned and an image of the item is recorded. It is then determined whether the identity of the item as determined based on the barcode is consistent with its appearance as determined from the image. If not, a discrepancy is registered. It is then determined whether the discrepancy is due to fraud (e.g., theft) or device error. In the case of the latter, the system can be updated to prevent a repeat of the error.
摘要:
The present invention provides a smart scanning system comprising an integrated scanning and image capture system in which one or more image capture device(s) (e.g., still camera, video camera, etc.) and a barcode scanner are positioned within a common enclosure that is a component of a checkout station. The barcode of item is scanned and an image of the item is recorded. The identity of the item as determined based on the barcode is compared to its appearance as determined based on its image. If the identity is inconsistent with its appearance, a discrepancy is registered. It is then determined whether the discrepancy is due to fraud (e.g., theft) or device error. In the case of the latter, the system can be updated to prevent a repeat of the error.