Abstract:
Tools for analyzing images are disclosed. In some cases, the images are analyzed in order to determine whether a particular web site and/or email message is part of an illegitimate online activity. In an aspect, an image analysis process comprises comparing a suspect image with one or more elements of interest (which can include images, words, etc.) by generating fingerprints characterizing the suspect image and the elements of interest, to allow for a quantitative comparison.
Abstract:
A system that includes a first self propelled steerable vehicle having a first end and a second end, a second self propelled steerable vehicle having a first end and a second end and an electronic device that maintains a relative position between at least one of the first end and the second end of the first self propelled steerable vehicle and at least one of the first end and the second end of the second self propelled steerable vehicle.
Abstract:
Described are computer-based methods and apparatuses, including computer program products, for user interface management. In some examples of the technology, available services are determined based on a user input. Available options can be determined based on the available services and/or the user input. A display state can be selected from a set of states and/or the user input. A user interface can be generated based on the available services, the available options, and/or the display state.
Abstract:
An apparatus for enrolling a package is disclosed including: a receiving surface for receiving the package; at least one weight sensor in communication with the receiving surface which generates a weight signal indicative of the weight of the package; at least one RGB video camera which generates a first video signal indicative of an image of the package on the receiving surface; at least one infrared three-dimensional camera which generates a second video signal indicative of an the dimensions of the package; and a processor in communication with the at least one weight sensor and the at least one video camera.
Abstract:
A method for allowing a player of a video game to control a threedimensional game character in a three-dimensional game world includes the steps of acquiring video image data of a player of a game, analyzing the acquired video image data to identify the location or movement of a portion of the player's body; and using the identified location of the portion of the player's body to control behavior of a game character.
Abstract:
A method of determining dimension information indicative of the dimensions of an object is disclosed, the method including: receiving a depth image of the object; and processing the depth information. The processing may include: determining a region of interest (ROI) in the image corresponding to a corner of the object; generating local normal information indicative of local normals corresponding to points in the image; generating, based at least in part on the ROI and the local normal information, object face information indicative of an association of points in the image with sides of the object; and determining the dimension information based at least in part on the object face information.
Abstract:
An apparatus for enrolling a package is disclosed including a receiving surface for receiving the package, at least one weight sensor in communication with the receiving surface which generates a weight signal indicative of the weight of the package, at least one video camera which generates a video signal indicative of an image of the package on the receiving surface, and a processor in communication with the at least one weight sensor and the at least one video camera The processor includes a weight module which produces, in response to the weight signal, weight data indicative of the weight of the package, and a dimension capture module which produces, in response to the video signal, dimension data indicative of the size of the package In some embodiments, the processor further includes a recognition module which produces character data indicative of one or more characters present on the package
Abstract:
Tools for analyzing images are disclosed. In some cases, the images are analyzed in order to determine whether a particular web site and/or email message is part of an illegitimate online activity. In an aspect, an image analysis process comprises comparing a suspect image with one or more elements of interest (which can include images, words, etc.) by generating fingerprints characterizing the suspect image and the elements of interest, to allow for a quantitative comparison.