Abstract:
Apparatus and associated methods relate to identifying objects of interest and detecting motion to automatically detect a security threat as a function of video frame delta information received from a video encoder. In an illustrative example, the video encoder may be an H.264 encoder onboard a video camera. A cloud server may receive the video frame delta information in a compressed video stream from the camera. Threats may be detected by the cloud server processing the video frame delta information in the compressed video stream, without decompression, to identify objects and detect motion. The cloud server may employ artificial intelligence techniques to enhance threat detection by the cloud server. Various examples may advantageously provide increased capacity of a computer tasked with detecting security breaches, due to the significant reduction in the amount of data to be processed, relative to threat detection based on processing uncompressed video streams.
Abstract:
Apparatus and associated methods relate to training a neural network on a first host system, sending the neural network to a second host system, training the neural network by the second host system based on data private to the second host system, and employing the neural network to filter events sent to the first host system. In an illustrative example, the first host system may be a server having a central repository including trained neural networks and historical data, and the second host system may be a remote server having a data source private to the remote server. The private remote data source may be a camera. In some examples, events may be filtered as a function of a prediction of error in the neural network. Various examples may advantageously provide remote intelligent filtering. For example, remote data may remain private while adaptively filtering events to the central server.
Abstract:
Apparatus and associated methods relate to identifying objects of interest and detecting motion to automatically detect a security threat as a function of video frame delta information received from a video encoder. In an illustrative example, the video encoder may be an H.264 encoder onboard a video camera. A cloud server may receive the video frame delta information in a compressed video stream from the camera. Threats may be detected by the cloud server processing the video frame delta information in the compressed video stream, without decompression, to identify objects and detect motion. The cloud server may employ artificial intelligence techniques to enhance threat detection by the cloud server. Various examples may advantageously provide increased capacity of a computer tasked with detecting security breaches, due to the significant reduction in the amount of data to be processed, relative to threat detection based on processing uncompressed video streams.
Abstract:
Techniques are described related to selecting content items, such as by enabling user analysis and control of product-related content items selected for display to users. The content items may include advertisements or other promotional materials, and the selecting of the content items may be performed as part of determining particular promotional materials to display or otherwise present to particular users in particular situations. User analysis and control of selected content items that are displayed on a target electronic site may be enabled by providing, as part of the target electronic site, additional selection-related functionality whose availability is restricted to one or more authorized users—for example, such additional restricted access information and user-selectable controls may be provided on a version of a Web page of an online retailer to enable the retailer to analyze and influence future content items selected for display on the online retailer's Web page(s).
Abstract:
Techniques are described for dynamically generating recommendations for users, such as for products and other items. In at least some situations, the techniques include using multiple recommendation strategies, such as by aggregating recommendation results from multiple different recommendation strategies. Such recommendation strategies may have various forms, and may be based at least in part on data regarding prior interactions of numerous users with numerous items. In addition, information about current selections of a particular user may be gathered based at least in part on providing a GUI (“graphical user interface”) for display to the user that includes selectable information about numerous recommended items, and dynamically updating the displayed GUI with newly generated recommendations of items as the user makes selections of particular displayed recommended items (e.g., newly generated recommendations that are similar to the selected items in one or more manners, or are otherwise related to the selected items).
Abstract:
A video security system and method for monitoring active environments that detects a security-relevant breach of a virtual perimeter and can track a virtual perimeter breaching object to detect risk-relevant behavior of persons and objects such as loitering and parking, and provides fast and accurate alerts. The system is able to achieve advance alerts by monitoring an extended virtual perimeter. The image processing module of the system employs a deep learning neural network (DNN) for fast image processing. The system can further increase speed by reducing the image data that is being processed to data extracted from one or more reduced data sources including virtual perimeter zones, a delta of a series of image frames, and a representative image frame of a series of frames.
Abstract:
Techniques are described for dynamically generating recommendations for users, such as for products and other items. In at least some situations, the techniques include using multiple recommendation strategies, such as by aggregating recommendation results from multiple different recommendation strategies. Such recommendation strategies may have various forms, and may be based at least in part on data regarding prior interactions of numerous users with numerous items. In addition, information about current selections of a particular user may be gathered based at least in part on providing a GUI (“graphical user interface”) for display to the user that includes selectable information about numerous recommended items, and dynamically updating the displayed GUI with newly generated recommendations of items as the user makes selections of particular displayed recommended items (e.g., newly generated recommendations that are similar to the selected items in one or more manners, or are otherwise related to the selected items).
Abstract:
A security device for monitoring the radio frequency signals generated by mobile phones and similar mobile computing and communication devices. The security device employs an antennae array and computer process that are configured to detect and provide a “fingerprint” for a mobile device based on the unique identifiers contained with the radio and other wireless signals utilized by such mobile device. The “fingerprint” that is obtained can be used to keep track of mobile devices as those devices enter and leave the area of the security device. Moreover, the security device can provide an alert when any new, foreign, or otherwise unrecognized device is within range of the security device and share “fingerprints” and alerts with other security devices in its network.
Abstract:
Techniques are described for dynamically generating recommendations for users, such as for products and other items. In at least some situations, the techniques include using multiple recommendation strategies, such as by aggregating recommendation results from multiple different recommendation strategies. Such recommendation strategies may have various forms, and may be based at least in part on data regarding prior interactions of numerous users with numerous items. In addition, information about current selections of a particular user may be gathered based at least in part on providing a GUI (“graphical user interface”) for display to the user that includes selectable information about numerous recommended items, and dynamically updating the displayed GUI with newly generated recommendations of items as the user makes selections of particular displayed recommended items (e.g., newly generated recommendations that are similar to the selected items in one or more manners, or are otherwise related to the selected items).
Abstract:
A security device for monitoring the radio frequency signals generated by mobile phones and similar mobile computing and communication devices. The security device employs an antennae array and computer process that are configured to detect and provide a “fingerprint” for a mobile device based on the unique identifiers contained with the radio and other wireless signals utilized by such mobile device. The “fingerprint” that is obtained can be used to keep track of mobile devices as those devices enter and leave the area of the security device. Moreover, the security device can provide an alert when any new, foreign, or otherwise unrecognized device is within range of the security device and share “fingerprints” and alerts with other security devices in its network.