摘要:
Embodiments of the present invention provide a method and a system for analyzing and learning behavior based on an acquired stream of video frames. Objects depicted in the stream are determined based on an analysis of the video frames. Each object may have a corresponding search model used to track an object's motion frame-to-frame. Classes of the objects are determined and semantic representations of the objects are generated. The semantic representations are used to determine objects' behaviors and to learn about behaviors occurring in an environment depicted by the acquired video streams. This way, the system learns rapidly and in real-time normal and abnormal behaviors for any environment by analyzing movements or activities or absence of such in the environment and identifies and predicts abnormal and suspicious behavior based on what has been learned.
摘要:
Techniques are disclosed for a video surveillance system to learn to recognize complex behaviors by analyzing pixel data using alternating layers of clustering and sequencing. A combination of a self organizing map (SOM) and an adaptive resonance theory (ART) network may be used to identify a variety of different anomalous inputs at each cluster layer. As progressively higher layers of the cortex model component represent progressively higher levels of abstraction, anomalies occurring in the higher levels of the cortex model represent observations of behavioral anomalies corresponding to progressively complex patterns of behavior.
摘要:
Techniques are disclosed to optimize feature selection in generating betas for a feature dictionary of a neuro-linguistic Cognitive AI System. A machine learning engine receives a sample vector of input data to be analyzed by the neuro-linguistic Cognitive AI System. The neuro-linguistic Cognitive AI System is configured to generate multiple feature words for each of a plurality of sensors. The machine learning engine identifies a sensor specified in the sample vector and selects optimization parameters for generating feature words based on the identified sensor.
摘要:
Techniques are disclosed for analyzing and learning behaviors based on acquired sensor data. A neuro-linguistic cognitive engine performs learning and analysis on linguistic content (e.g., identified alpha symbols, betas, and gammas) obtained by a linguistic model that clusters observations to generate the linguistic content. The neuro-linguistic cognitive engine compares new data to learned patterns stored in short and longer-term memories and determines whether to issue special event notifications indicating anomalous behavior. In one embodiment, condition(s) may be generated for new data and checked against inference nodes of an inference network. Inference nodes matching the condition(s) are executed to, e.g., compare the new data with the learned patterns, with output from the inference nodes being used to generate additional condition(s) that are again matched to inference nodes which may be executed.
摘要:
A touch position locating method, text selecting method, device, and an electronic equipment. The touch position locating method including: acquiring position movement information from a gravity and acceleration sensor; calculating movement direction and distance of a cursor displayed on a touch screen according to the position movement information; and controlling a display position of the cursor according to the movement direction and distance of the cursor. The beneficial effect of the embodiments of the present invention is as follows: by swaying or slanting the electronic equipment having a touch screen, the display position of the cursor is controlled using the position movement information sensed by the gravity and acceleration sensor to accurately locate a point or select a text area, thereby improving the location accuracy of the touch screen and the user's experience.
摘要:
Several improvements on roller ball applicators on glass bottles have been described. A unique mechanical design of the roller ball housing to obtain minimal leak of the bottle ingredients is described. Also described is a hidden tamper evident band.
摘要:
A illumination device comprises a light guide having a first end for receiving light and configured to support propagation of light along the length of the light guide. A turning microstructure is disposed on a first side of the light guide configured to turn light incident on the first side and to direct the light out a second opposite side of the light guide, wherein the turning microstructure comprises a plurality of indentations. A cover is physically coupled to the light guide and disposed over the turning microstructure. An interlayer is between the cover and the light guide, wherein the interlayer physically couples the cover to the light guide. A plurality of open regions is between the interlayer and the plurality of indentations. Various embodiments include methods of coupling the cover to the light guide while preserving open regions between the cover and plurality of indentations.
摘要:
The present invention provides a portable terminal, comprising: a first body provided with a first transparent display panel; a second body provided with a second transparent display panel; and a connecting part for movably connecting the first body with the second body; wherein both surfaces of the first transparent display panel are provided with a touch screen respectively; and at least one surface of the second transparent display panel is provided with a touch screen. The present invention provides a display area as large as possible.
摘要:
A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address.