Patent classifications
G06V10/776
Instance segmentation by instance label factorization
A computer system trains a neural network on an instance segmentation task by casting the problem as one of mapping each pixel to a probability distribution over arbitrary instance labels. This simplifies both the training and inference problems, because the formulation is end-to-end trainable and requires no post-processing to extract maximum a posteriori estimates of the instance labels.
Information processing apparatus and method
According to one embodiment, an apparatus includes a processor and a memory. The processor performs a learning process of a neural network including a batch normalization layer. The processor sets up the neural network. The processor updates, in the learning process, a weight parameter and a normalization parameter, used in the normalization of the batch normalization layer, alternately or at different timings.
SAFETY MONITOR FOR IMAGE MISCLASSIFICATION
Systems, apparatuses, and methods for implementing a safety monitor framework for a safety-critical inference application are disclosed. A system includes a safety-critical inference application, a safety monitor, and an inference accelerator engine. The safety monitor receives an input image, test data, and a neural network specification from the safety-critical inference application. The safety monitor generates a modified image by adding additional objects outside of the input image. The safety monitor provides the modified image and neural network specification to the inference accelerator engine which processes the modified image and provides outputs to the safety monitor. The safety monitor determines the likelihood of erroneous processing of the original input image by comparing the outputs for the additional objects with a known good result. The safety monitor complements the overall fault coverage of the inference accelerator engine and covers faults only observable at the network level.
SAFETY MONITOR FOR IMAGE MISCLASSIFICATION
Systems, apparatuses, and methods for implementing a safety monitor framework for a safety-critical inference application are disclosed. A system includes a safety-critical inference application, a safety monitor, and an inference accelerator engine. The safety monitor receives an input image, test data, and a neural network specification from the safety-critical inference application. The safety monitor generates a modified image by adding additional objects outside of the input image. The safety monitor provides the modified image and neural network specification to the inference accelerator engine which processes the modified image and provides outputs to the safety monitor. The safety monitor determines the likelihood of erroneous processing of the original input image by comparing the outputs for the additional objects with a known good result. The safety monitor complements the overall fault coverage of the inference accelerator engine and covers faults only observable at the network level.
Automatic crop classification system and method
Methods and systems used for the classification of a crop grown within an agricultural field using remotely-sensed image data. In one example, the method involves unsupervised pixel clustering, which includes gathering pixel values and assigning them to clusters to produce a pixel distribution signal. The pixel distribution signals of the remotely-sensed image data over the growing season are summed up to generate a temporal representation of a management zone. Location information of the management zone is added to the temporal data and ingested into a Recurrent Neural Network (RNN). The output of the model is a prediction of the crop type grown in the management zone over the growing season. Furthermore, a notification can be sent to an agricultural grower or to third parties/stakeholders associated with the grower and/or the field, informing them of the crop classification prediction.
IDENTIFYING OVERFILLED CONTAINERS
Among other things, the techniques described herein include a method for receiving a plurality of images of one or more containers while the one or more containers are being emptied, the plurality of images comprising a training set of images and a validation set of images; labeling each image of the plurality of images as including either an overfilled container or a not-overfilled container; processing each image of the plurality of images to reduce bias of a machine learning model; training, and based on the labeling, the machine learning model using the plurality of images; and optimizing the machine learning model by performing learning against the validation set, the optimized machine learning model being used to generate a prediction for a new image of a container, the prediction indicating whether the container in the new image was overfilled prior to the new container being emptied.
IDENTIFYING OVERFILLED CONTAINERS
Among other things, the techniques described herein include a method for receiving a plurality of images of one or more containers while the one or more containers are being emptied, the plurality of images comprising a training set of images and a validation set of images; labeling each image of the plurality of images as including either an overfilled container or a not-overfilled container; processing each image of the plurality of images to reduce bias of a machine learning model; training, and based on the labeling, the machine learning model using the plurality of images; and optimizing the machine learning model by performing learning against the validation set, the optimized machine learning model being used to generate a prediction for a new image of a container, the prediction indicating whether the container in the new image was overfilled prior to the new container being emptied.
Counterfeit pharmaceutical and biologic product detection using progressive data analysis and machine learning
Techniques are provided for detecting counterfeit products. Measurements and images corresponding to a product are obtained, wherein at least a portion of the measurements or images are obtained from a mobile/IoT/IoB device. The measurements and images are provided to a trained machine learning model to progressively analyze the measurements and images. Based on the progressive analysis, a determination/prediction is made with an associated confidence score as to whether the product is real or counterfeit.
Prediction error scenario mining for machine learning models
Provided are methods for prediction error scenario mining for machine learning methods, which can include determining a prediction error indicative of a difference between a planned decision of an autonomous vehicle and an ideal decision of the autonomous vehicle. The prediction error is associated with an error-prone scenario for which a machine learning model of an autonomous vehicle is to make planned movements. The method includes searching a scenario database for the error-prone scenario based on the prediction error. The scenario database includes a plurality of datasets representative of data received from an autonomous vehicle sensor system in which the plurality of datasets is marked with at least one attribute of the set of attributes. The method further includes obtaining the error-prone scenario from the scenario database for inputting into the machine learning model for training the machine learning model. Systems and computer program products are also provided.
Watermarking synchronized inputs for machine learning
A method and system for providing synchronized input feedback, comprising receiving an input event, encoding the input event in an output stream wherein the encoding of the input event is synchronized to a specific event and reproducing the output stream through an output device whereby the encoded input event in the reproduced output stream is imperceptible to the user.