Abstract:
A computer-implemented method includes obtaining a usecase specification and a usecase runtime specification corresponding to the usecase. The usecase includes a plurality of applications each being associated with a micro-service providing a corresponding functionality within the usecase for performing a task. The method further includes determining that at least one instance of the at least one of the plurality of applications can be reused during execution of the usecase based on the usecase specification and the usecase runtime specification, and reusing the at least one instance during execution of the usecase.
Abstract:
Systems and methods are disclosed for distributed real-time security monitoring and alerting. The methods include transmitting a selected portion of biometrics data as a watchlist to each worker unit. The portion of biometrics data is selected in response to respective characteristic data received from each worker unit. Facial recognition data is received from each worker unit. The facial recognition data includes a person of interest with an associated match confidence value calculated by each worker unit based on respective watchlists received by each worker unit. A combined match confidence value is calculated between a same person of interest identified in multiple facial recognition data received from each worker unit and the biometric data associated with an individual. The combined match confidence value is calculated in response to match confidence values associated with the same person of interest in respective facial recognition data being below a match confidence threshold.
Abstract:
Systems and methods are disclosed for distributed real-time security monitoring and alerting. The methods include transmitting a selected portion of biometrics data as a watchlist to each worker unit. The portion of biometrics data is selected in response to respective characteristic data received from each worker unit. Facial recognition data is received from each worker unit. The facial recognition data includes a person of interest with an associated match confidence value calculated by each worker unit based on respective watchlists received by each worker unit. A combined match confidence value is calculated between a same person of interest identified in multiple facial recognition data received from each worker unit and the biometric data associated with an individual. The combined match confidence value is calculated in response to match confidence values associated with the same person of interest in respective facial recognition data being below a match confidence threshold.
Abstract:
Methods and systems for authentication include determining, at a first worker system, that a master system that stores a current authentication-list cannot be reached by a first network. Authentication is performed on an authentication request using a previously stored copy of the authentication-list at the first worker system. The authentication includes facial recognition that is performed on detected face images for a first time window, before receiving the authentication request, and for a second time window, after receiving the authentication request. Authentication removes matching detected face images after completing an authentication request to prevent other individuals from using a same identifier. Access is granted to a secured area responsive to the authentication.
Abstract:
A computer-implemented method executed by at least one processor for reducing radial distortion errors in fish-eye images is presented. The method includes capturing an image from a camera including distortions, detecting arc-shaped edge segments in the image including the distortions, estimating a main distortion parameter by fixing a distortion centerpoint in a middle of the image, estimating the distortion centerpoint with the main distortion parameter, and obtaining an undistorted version of the captured image by inverting the distortion model.
Abstract:
A computer-implemented method includes obtaining a usecase specification and a usecase runtime specification corresponding to the usecase. The usecase includes a plurality of applications each being associated with a micro-service providing a corresponding functionality within the usecase for performing a task. The method further includes managing execution of the usecase within a runtime system based on the usecase and usecase runtime specifications to perform the task by serving an on-demand query and dynamically scaling resources based on the on-demand query, including using a batch helper server to employ the usecase specification to load dynamic application instances and connect the dynamic application instances to existing instances, and employ a batch helper configuration to load nodes/machines for execution of the on-demand query.
Abstract:
A computer-implemented method includes obtaining a usecase specification and a usecase runtime specification corresponding to the usecase. The usecase includes a plurality of applications each being associated with a micro-service providing a corresponding functionality within the usecase for performing a task. The method further includes determining that at least one instance of the at least one of the plurality of applications can be reused during execution of the usecase based on the usecase specification and the usecase runtime specification, and reusing the at least one instance during execution of the usecase.
Abstract:
Systems and methods for system for source-to-source transformation for optimizing stacks and/or queues in an application, including identifying usage of stacks and queues in the application and collecting the resource usage and thread block configurations for the application. If the usage of stacks is identified, optimized code is generated by determining appropriate storage, partitioning stacks based on determined storage, and caching tops of the stacks in a register. If the identifier identifies usage of queues, optimized code is generated by combining queue operations in all threads in a warp/thread block into one batch queue operation, converting control divergence of the application to data divergence to enable warp-level queue operations, determining whether at least one of the threads includes a queue operation, and combining queue operations into threads in a warp.
Abstract:
Methods and systems for deploying a video analytics system include determining one or more applications for a security system in an environment, including one or more constraints. Each functional module in a directed graph representation of one or more applications is profiled to generate one or more configurations for each functional module. The nodes of each graph representation represent functional modules of the respective application, and repeated module configurations are skipped. Resource usage for each of the one or more applications is estimated using the one or more configurations of each functional module and the one or more constraints. The one or more applications are deployed in the environment.
Abstract:
Systems and methods for demographic determination using image recognition. The method includes analyzing an image with a pre-trained lightweight neural network model, where the lightweight neural network model generates a confidence value, and comparing the confidence value to a threshold value to determine if the pre-trained lightweight neural network model is sufficiently accurate. The method further includes analyzing the image with a pre-trained heavyweight neural network model for the confidence value below the threshold value, wherein the pre-trained heavyweight neural network model has above about one million trainable parameters and the pre-trained lightweight neural network model has a number of trainable parameters below one tenth the heavyweight model, and displaying demographic data to a user on a user interface, wherein the user modifies store inventory based on the demographic data.