Patent classifications
G06V10/75
METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING ARTIFICIAL-INTELLIGENCE-BASED INDICIA DATA EDITING
Methods, apparatuses and computer program products for providing artificial-intelligence-based indicia data editing are provided. For example, an example computer-implemented method may include determining, based at least in part on a data processing model associated with a scan setting module, a first decoded data string corresponding to a first indicia; determining, based at least in part on user input data, a first input data string corresponding to the first indicia; generating a predictive indicia data editing model based at least in part on providing the first decoded data string and the first input data string to an artificial intelligence algorithm; and updating the scan setting module based at least in part on the predictive indicia data editing model.
VISION-BASED NAVIGATION SYSTEM INCORPORATING HIGH-CONFIDENCE ERROR OVERBOUNDING OF MULTIPLE OPTICAL POSES
A system and method for high-confidence error overbounding of multiple optical pose solutions receives a set of candidate correspondences between 2D image features captured by an aircraft camera and 3D constellation features including at least one ambiguous correspondence. A candidate estimate of the optical pose of the camera is determined for each of a set of candidate correspondence maps (CMAP), each CMAP resolving the ambiguities differently. Each candidate pose estimate is evaluated for viability and any non-viable estimates eliminated. An individual error bound is determined for each viable candidate pose estimate and CMAP, and based on the set of individual error bounds a multiple-pose containment error bound is determined, bounding with high confidence the set of candidate CMAPs and multiple pose estimates where at least one is correct. The containment error bound may be evaluated for accuracy as required for flight operations performed by aircraft-based instruments and systems.
EVALUATION METHOD FOR IMAGE STABILIZATION EFFECT OF IMAGING APPARATUS, EVALUATION DEVICE, AND PROGRAM STORAGE MEDIUM
An evaluation method for an image stabilization effect of an imaging apparatus comprising: acquiring a first image obtained by imaging an object in a state in which the imaging apparatus is vibrated; acquiring a second image obtained by imaging the object in a state in which the imaging apparatus is stationary; and calculating an evaluation value indicating an image stabilization effect in a peripheral region of the imaging apparatus, based on a difference in blur amounts between the first image and the second image in the peripheral region deviated from the center of an optical axis.
ARTIFICIAL INTELLIGENCE VEHICLE LEAK DETECTION SYSTEM AND RELATED METHODOLOGY
A leak detection system is configured to provide vehicle-specific leak detection for a vehicle. The leak detection system includes a memory circuit having a plurality of leak detection instructions matched with vehicle identification information. The system additionally includes an ultraviolet light source and a camera configured to capture an image of an area illuminated by the ultraviolet light source. A processor is in operative communication with the memory circuit and the camera. The processor is configured to facilitate identification of at least one of the plurality of leak detection instructions in response to receipt of vehicle identification information associated with the vehicle, and compare the image captured by the camera to a known image of the vehicle to determine presence and location of a leak.
Field of view limits of image sensors
In some examples, an electronic device comprises an image sensor and a processor. The processor is to detect a feature of a frame of a video received via the image sensor, determine whether the feature indicates an object of interest, and, responsive to a determination that the feature indicates the object of interest, limit a first field of view of the image sensor to the object of interest and overlay the first field of view with a second field of view. The second field of view is unlimited.
ADVERSARIALLY ROBUST VISUAL FINGERPRINTING AND IMAGE PROVENANCE MODELS
The present disclosure relates to systems, methods, and non-transitory computer readable media that utilize a deep visual fingerprinting model with parameters learned from robust contrastive learning to identify matching digital images and image provenance information. For example, the disclosed systems utilize an efficient learning procedure that leverages training on bounded adversarial examples to more accurately identify digital images (including adversarial images) with a small computational overhead. To illustrate, the disclosed systems utilize a first objective function that iteratively identifies augmentations to increase contrastive loss. Moreover, the disclosed systems utilize a second objective function that iteratively learns parameters of a deep visual fingerprinting model to reduce the contrastive loss. With these learned parameters, the disclosed systems utilize the deep visual fingerprinting model to generate visual fingerprints for digital images, retrieve and match digital images, and provide digital image provenance information.
Methods and apparatuses for updating user authentication data
A method for updating biometric authentication data authenticates an input image using an enrollment database (DB) over a first length of time, the authentication including generating information for authenticating the input image, and updates the enrollment DB based on the first length time and the information for authenticating the input image.
Training method of image-text matching model, bi-directional search method, and relevant apparatus
This application relates to the field of artificial intelligence technologies, and in particular, to a training method of an image-text matching model, a bi-directional search method, and a relevant apparatus. The training method includes extracting a global feature and a local feature of an image sample; extracting a global feature and a local feature of a text sample; training a matching model according to the extracted global feature and local feature of the image sample and the extracted global feature and local feature of the text sample, to determine model parameters of the matching model; and determining, by the matching model, according to a global feature and a local feature of an inputted image and a global feature and a local feature of an inputted text, a matching degree between the image and the text.
Threat intelligence system
Systems and methods for providing a threat intelligence system include a system provider device that downloads, through communication over a network and from one or more targeted websites, a plurality of images of a first environment. Based on an OCR process, the system provider device may extract a set of textual data corresponding to a subset of images of the plurality of images, where the subset of images depict text. The system provider device stores the set of textual data in an indexed and searchable database. The system provider device assigns a threat assessment score to each image based on the set of textual data, and the threat assessment score may be updated based on comparison of the set of textual data with other sets of textual data. Based on the threat assessment score being greater than a threshold value, the system provider device may generate a security alert.
Threat intelligence system
Systems and methods for providing a threat intelligence system include a system provider device that downloads, through communication over a network and from one or more targeted websites, a plurality of images of a first environment. Based on an OCR process, the system provider device may extract a set of textual data corresponding to a subset of images of the plurality of images, where the subset of images depict text. The system provider device stores the set of textual data in an indexed and searchable database. The system provider device assigns a threat assessment score to each image based on the set of textual data, and the threat assessment score may be updated based on comparison of the set of textual data with other sets of textual data. Based on the threat assessment score being greater than a threshold value, the system provider device may generate a security alert.