Abstract:
In accordance with one aspect of the present technique, a method includes receiving one or more videos from one or more image capture devices. The method further includes generating a video-loop of the person from the one or more videos. The video-loop depicts the person in the commercial site. The method also includes generating an action clip from the video-loop. The action clip includes a suspicious action performed by the person in the commercial site. The method further includes generating an activity summary of the person including the video-loop and the action clip.
Abstract:
The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.
Abstract:
A method for identifying assets is provided. The method includes illuminating an identification pattern associated with the asset with non-visible light. The identification pattern includes retroreflective material that represents identity information of the asset. The method further includes adjusting either a shutter speed of an image sensor, or a power of the non-visible light, or both, based on motion state of the asset. The image sensor is configured to receive response of the retroreflective material to the non-visible light. Furthermore, the method includes the step of identifying the asset based on decoded identity information. The decoded identity information is obtained by processing the response of the retroreflective material.
Abstract:
In accordance with one aspect of the present technique, a method includes receiving one or more videos from one or more image capture devices. The method further includes generating a video-loop of the person from the one or more videos. The video-loop depicts the person in the commercial site. The method also includes generating an action clip from the video-loop. The action clip includes a suspicious action performed by the person in the commercial site. The method further includes generating an activity summary of the person including the video-loop and the action clip.
Abstract:
The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.
Abstract:
The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.
Abstract:
A tracking and recognition system is provided. The system includes a computer vision-based identity recognition system configured to recognize one or more persons, without a priori knowledge of the respective persons, via an online discriminative learning of appearance signature models of the respective persons. The computer vision-based identity recognition system includes a memory physically encoding one or more routines, which when executed, cause the performance of constructing pairwise constraints between the unlabeled tracking samples. The computer vision-based identity recognition system also includes a processor configured to receive unlabeled tracking samples collected from one or more person trackers and to execute the routines stored in the memory via one or more algorithms to construct the pairwise constraints between the unlabeled tracking samples.
Abstract:
The system and method disclosed herein provides an integrated and automated workflow, sensor, and reasoning system that automatically detects breaches in protocols, appropriately alarms and records these breaches, facilitates staff adoption of protocol adherence, and ultimately enables the study of protocols for care comparative effectiveness. The system provides real-time alerts to medical personnel in the actual processes of care, thereby reducing the number of negative patient events and ultimately improving staff behavior with respect to protocol adherence.
Abstract:
A tracking and recognition system is provided. The system includes a computer vision-based identity recognition system configured to recognize one or more persons, without a priori knowledge of the respective persons, via an online discriminative learning of appearance signature models of the respective persons. The computer vision-based identity recognition system includes a memory physically encoding one or more routines, which when executed, cause the performance of constructing pairwise constraints between the unlabeled tracking samples. The computer vision-based identity recognition system also includes a processor configured to receive unlabeled tracking samples collected from one or more person trackers and to execute the routines stored in the memory via one or more algorithms to construct the pairwise constraints between the unlabeled tracking samples.
Abstract:
A method for identifying assets is provided. The method includes illuminating an identification pattern associated with the asset with non-visible light. The identification pattern includes retroreflective material that represents identity information of the asset. The method further includes adjusting either a shutter speed of an image sensor, or a power of the non-visible light, or both, based on motion state of the asset. The image sensor is configured to receive response of the retroreflective material to the non-visible light. Furthermore, the method includes the step of identifying the asset based on decoded identity information. The decoded identity information is obtained by processing the response of the retroreflective material.