Abstract:
Systems and methods described herein can dynamically display an augmented reality image including information about an object. The systems and methods can extract attributes from an image of, or image related to, the object and can use those attributes to construct a database query for a plurality of data sources. After querying the data sources and receiving a response, systems and methods described herein can generate data based on the response to augment the image of, or image related to, the object. The systems and methods can modify the image of, or image related to, the object based on the generated data to generate an augmented image and can display the augmented image on a display.
Abstract:
A monitoring system for items in a delivery vehicle is described. Sensors disposed in the delivery vehicle are configured to sense data indicative of a current quality of items stored in the delivery vehicle. A computing device calculates navigation routes for the items in the vehicle and selects among the delivery routes at least partly based on sensor data relating to the monitored quality of the items.
Abstract:
Systems and methods are described that provide access to secured containers in a facility. The systems and methods unlock a lock securing the container in response to receiving identifying information for an individual seeking access to the secured container. If objects are removed from the secured container by the individual, the systems and methods can determine whether an authorization was received for the removed objects within a time period. If the authorization is not received, the systems and methods can issue an alert including the identifying information using an alert system.
Abstract:
A technique for forming a product with an embedded RFID element is disclosed. An extruder can extrude a first material and a second material onto a print bed. The first material has multiple RFID chips dispersed throughout the first material, and the second material has metallic particles dispersed throughout the second material to achieve a specified concentration of metallic particles. A computing system controls the extruder to print a three dimensional product on the print bed using the first extrusion material and the second extrusion material. The computing system also controls the rate at which the first material and the second material is extruded in order to electrically couple at least one of the RFID chips to at least some of the metallic particles in the three dimensional product to form an RFID tag embedded in the three dimensional product that is readable by an RFID reader.
Abstract:
Exemplary embodiments relate to a system for monitoring items in a residence for replenishment. Multiple sensors are disposed in a residence and configured to sense characteristics of an item indicating at least a quality of the item. A computing device is configured to retrieve and analyze usage data for the item. The computing device determines that the item needs replenishment based at least in part on the sensed quality of the item and the usage data for the item. The computing device generates an alert at a user interface in response to determining that the item needs replenishment.
Abstract:
An example secure enclosure system and associated methods are described. The example enclosure system includes a housing, a shelf disposed within the housing, an array of sensors arranged within the housing, and an interface operatively coupled to the array of sensors. The shelf includes a supporting surface configured to support physical objects. The array of sensors is configured to detect characteristics of the each physical object supported by the supporting surface of the shelf. The interface is configured to transmit the detected characteristics from the array of sensors to a central computing system. The central computing system is configured to determine an identity of each physical object based on the detected characteristics.
Abstract:
Methodologies, systems, and computer-readable media are provided for automatically triggering predictive events in a facility in response to user detection. Once an individual enters or approaches a facility, location and identification data can be received from a mobile device associated with the individual. The location of the individual and the individual's identity can be determined, and a computing system can access an account associated with the individual. The computing system can trigger the a predictive event, such as the preparation of a product that the individual is likely to purchase, and a notification can be sent to the individual's mobile device once the predictive event is complete. The predictive event can be based on the individual's previous purchase or service history.
Abstract:
Described in detail herein are methods and systems for a label position determination. A label position determination system can include labels mounted on the front face of the shelving units. The labels can include conductive patterns on the back face of the label. The conductive patterns of the labels can be electrically coupled with electrically conductive wires extending along a front face of a shelf. The system can further include a controller coupled to with electrically conductive wires, configured to transmit electrical pulses through the electrically conductive wires. The controller can determine at least one of: an identity of each of the labels mounted to the front face, whether a label has been mounted at an incorrect location on the front face of the shelf, or whether a label is missing from the front face of the shelf based on a response to the electrical pulse.
Abstract:
Described in detail herein are methods and systems for identifying actions based on detected sounds in a facility. An array of microphones can be disposed in a facility. The microphones can detect various sounds and encode the sounds in an electrical signal and transmit the sounds to a computing system. The computing system can determine the sound signature of each sound and based on the sound signature the chronological order of the sounds and the time interval in between the sounds the computing system can determine the action being performed causing the sounds.
Abstract:
Described in detail herein are methods and systems for estimating storage capacity of a storage unit disposed in a facility based on echoes detected by microphones. The microphones can detect sounds generated in the warehouse and reflected off the storage unit structures. The microphones detect the intensity of the sounds. The microphones can encode the sounds and the intensity of the sounds in time- varying electrical signals and transmit the time-varying electrical signals to a computing system. The computing system can decode the sounds and the intensity of the sounds from the time- varying electrical signals and estimate storage capacity of a storage unit from which the sounds reflected off of based on the intensity of the sounds.