Patent classifications
G06V10/7784
SYSTEM AND METHOD FOR POPULATING A VIRTUAL SHOPPING CART BASED ON A VERIFICATION OF ALGORITHMIC DETERMINATIONS OF ITEMS SELECTED DURING A SHOPPING SESSION IN A PHYSICAL STORE
An apparatus includes a display and a processor. The processor displays a virtual shopping cart. The processor also receives information indicating that an algorithm determined that a physical item was selected by a person during a shopping session in a physical store, based on a set of inputs received from sensors located within the store. In response, the processor displays a virtual item, which includes a graphical representation of the physical item. The processor additionally displays a rack video captured during the shopping session by a rack camera located in the store. The rack camera is directed at a physical rack located in the store, which includes the physical item. In response to displaying the rack video, the processor receives information identifying the virtual item, where the rack video depicts that the person selected the physical item. The processor then stores the virtual item in the virtual shopping cart.
INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM
An information processing apparatus includes a hardware processor which (i) performs learning by a learning data set associated with a correct answer label for a preset problem and creates a machine learning model for estimating a correct answer to the preset problem for input data, (ii) estimates the correct answer to the preset problem for the input data by using the machine learning model, (iii) in response to a user operation, determines a label indicating a result of the estimation as a correct answer label of the input data or corrects the label to determine the corrected label as a correct answer label of the input data, and (iv) additionally registers the determined correct answer label as learning data in association with the input data in the learning data set.
Neural Network Host Platform for Detecting Anomalies in Cybersecurity Modules
Aspects of the disclosure relate to anomaly detection in cybersecurity training modules. A computing platform may receive information defining a training module. The computing platform may capture a plurality of screenshots corresponding to different permutations of the training module. The computing platform may input, into an auto-encoder, the plurality of screenshots corresponding to the different permutations of the training module, wherein inputting the plurality of screenshots corresponding to the different permutations of the training module causes the auto-encoder to output a reconstruction error value. The computing platform may execute an outlier detection algorithm on the reconstruction error value, which may cause the computing platform to identify an outlier permutation of the training module. The computing platform may generate a user interface comprising information identifying the outlier permutation of the training module. The computing platform may send the user interface to at least one user device.
Query change system, search system, and computer readable medium
A query change system includes: a processor configured to correct, in a case where a first query image inputted by a user includes a contradicting part that contradicts a first condition related to a search target, the contradicting part of the first query image in accordance with the first condition to generate a second query image.
Intelligent determination of aesthetic preferences based on user history and properties
Techniques for selecting a digital image are disclosed. The techniques may include receiving a first set of digital images, analyzing the first set of digital images to extract first image features from each of the first set of digital images, accessing a user profile, comparing the extracted first image features to a preset list of image features, ranking each digital image of the first set, selecting each digital image having a ranking that exceeds a threshold, assigning a category to each selected digital image based on a comparison of each selected digital image to a category database of digital image categories, displaying each selected digital image with the assigned category, receiving an input from the user in response to the displaying, updating the user profile and the category database based on the input, and selecting at least one subsequent digital image based on the updated user profile and category database.
Using relevance feedback in face recognition
Images are searched to locate faces that are the same as a query face. Images that include a face that is the same as the query face may be presented to a user as search result images. Images also may be sorted by the faces included in the images and presented to the user as sorted search result images. The user may provide explicit or implicit feedback regarding the search result images. Additional feedback may be inferred regarding the search result images based on the user-provided feedback, and the results may be updated based on the user-provided and inferred feedback.
Optimal scanning parameters computation methods, devices and systems for malicious URL detection
A computer-implemented method may comprise collecting and storing a plurality of electronic messages and a corresponding plurality of phishing kits, each of which being associated with one or several malicious Uniform Resource Locator (URL) and extracting a set of features from each of the plurality of electronic messages. For each of the extracted set of features, the method may comprise determining a set of optimal scanning parameters using one or more decision trees, trained with a supervised learning algorithm based on programmatically or manually examining or reverse-engineering the source code of the phishing kits, or trained with a supervised learning algorithm based on a function that iteratively requests data from the websites pointed to by the malicious URLs and examines data and codes returned by such requests. These optimal scanning parameters may then be used to scan a malicious URL with a reduced likelihood that a defensive action will be taken to hide the existence of the malicious content pointed to by the malicious URL.
Intelligent recognition and alert methods and systems
An intelligent target object detection and alerting platform may be provided. The platform may receive a content stream from a content source. A target object may be designated for detection within the content stream. A target object profile associated with the designated target object may be retrieved from a database of learned target object profiles. The learned target object profiles may be associated with target objects that have been trained for detection. At least one frame associated with the content stream may be analyzed to detect the designated target object. The analysis may comprise employing a neural net, for example, to detect each target object within each frame. A parameter for communicating target object detection data may be specified. In turn, when the parameter is met, the detection data may be communicated.
Generating concept images of human poses using machine learning models
Methods, systems, and computer program products for generating concept images of human poses using machine learning models are provided herein. A computer-implemented method includes identifying events from input data by applying a machine learning recognition model to at least a portion of the input data, wherein the identifying comprises (i) detecting multiple entities from the input data and (ii) determining behavioral relationships among at least a portion of the multiple entities; generating, using a machine learning interpretability model and at least a portion of the identified events, images illustrating human poses related to at least a portion of the identified events; outputting at least a portion of the generated images to a user; and updating the machine learning recognition model based at least in part on (i) at least a portion of the generated images and (ii) input from the user.
ANALYSIS DEVICE
An analysis device includes an analysis unit configured to receive scattered light, transmitted light, fluorescence, or electromagnetic waves from an observed object located in a light irradiation region light-irradiated from a light source and analyze the observed object on the basis of a signal extracted on the basis of a time axis of an electrical signal output from a light-receiving unit configured to convert the received light or electromagnetic waves into the electrical signal.