Patent classifications
G06V30/194
System for generation of resource identification numbers to avoid electronic misreads
Embodiments of the invention are directed to a system, method, or computer program product structured for generating resource identification strings to avoid electronic misreads. In some embodiments, the system is structured for generating a new technology resource string of characters, comparing the new string to existing technology resource strings, and determining whether the new string is the same as an existing string. The system is also structured for, in response to determining it is not, for each existing string, pairing characters of the strings and determining whether the strings have at least a threshold number of matching character pairs; if there are, for at least one of the existing strings, determining whether characters of the non-matching pairs are commonly misread characters and determining whether there are a threshold combination of matching/commonly misread pairs; and if there are, discard the new string and generate a second new technology resource string.
System for generation of resource identification numbers to avoid electronic misreads
Embodiments of the invention are directed to a system, method, or computer program product structured for generating resource identification strings to avoid electronic misreads. In some embodiments, the system is structured for generating a new technology resource string of characters, comparing the new string to existing technology resource strings, and determining whether the new string is the same as an existing string. The system is also structured for, in response to determining it is not, for each existing string, pairing characters of the strings and determining whether the strings have at least a threshold number of matching character pairs; if there are, for at least one of the existing strings, determining whether characters of the non-matching pairs are commonly misread characters and determining whether there are a threshold combination of matching/commonly misread pairs; and if there are, discard the new string and generate a second new technology resource string.
Image processing method, an image processing apparatus, and a surveillance system
An image processing method including: capturing changes in a monitored scene; and performing a sparse feature calculation on the changes in the monitored scene to obtain a sparse feature map.
NEURAL NETWORK BASED RADIOWAVE MONITORING OF FALL CHARACTERISTICS IN INJURY DIAGNOSIS
System and method of deploying a trained machine learning neural network (MLNN) in generating a fall injury condition of a subject. The method comprises receiving, at input layers of the trained MLNN, millimeter wave (mmWave) radar point cloud data representing fall attributes from monitoring the subject via mmWave radar sensing device, the input layers associated with the fall attributes, receiving, at a second set of input layers, personal attributes of the subject associated with ones of the second set of input layers, the first and second sets of input layers interconnected with an output layer of the trained MLNN via intermediate layers, the trained MLNN produced by establishing a correlation between an injury condition of prior subjects and mmWave point cloud data and personal attributes associated with the prior subjects, and generating, at the output layer, the fall injury condition attributable to the subject.
NEURAL NETWORK BASED RADIOWAVE MONITORING OF FALL CHARACTERISTICS IN INJURY DIAGNOSIS
System and method of deploying a trained machine learning neural network (MLNN) in generating a fall injury condition of a subject. The method comprises receiving, at input layers of the trained MLNN, millimeter wave (mmWave) radar point cloud data representing fall attributes from monitoring the subject via mmWave radar sensing device, the input layers associated with the fall attributes, receiving, at a second set of input layers, personal attributes of the subject associated with ones of the second set of input layers, the first and second sets of input layers interconnected with an output layer of the trained MLNN via intermediate layers, the trained MLNN produced by establishing a correlation between an injury condition of prior subjects and mmWave point cloud data and personal attributes associated with the prior subjects, and generating, at the output layer, the fall injury condition attributable to the subject.
TRANSFORMER-BASED ENCODING INCORPORATING METADATA
From metadata of a corpus of natural language text documents, a relativity matrix is constructed, a row-column intersection in the relativity matrix corresponding to a relationship between two instances of a type of metadata. An encoder model is trained, generating a trained encoder model, to compute an embedding corresponding to a token of a natural language text document within the corpus and the relativity matrix, the encoder model comprising a first encoder layer, the first encoder layer comprising a token embedding portion, a relativity embedding portion, a token self-attention portion, a metadata self-attention portion, and a fusion portion, the training comprising adjusting a set of parameters of the encoder model.
Method and System for Hand Pose Detection
A method for hand pose identification in an automated system includes providing map data of a hand of a user to a first neural network trained to classify features corresponding to a joint angle of a wrist in the hand to generate a first plurality of activation features and performing a first search in a predetermined plurality of activation features stored in a database in the memory to identify a first plurality of hand pose parameters for the wrist associated with predetermined activation features in the database that are nearest neighbors to the first plurality of activation features. The method further includes generating a hand pose model corresponding to the hand of the user based on the first plurality of hand pose parameters and performing an operation in the automated system in response to input from the user based on the hand pose model.
Method and System for Hand Pose Detection
A method for hand pose identification in an automated system includes providing map data of a hand of a user to a first neural network trained to classify features corresponding to a joint angle of a wrist in the hand to generate a first plurality of activation features and performing a first search in a predetermined plurality of activation features stored in a database in the memory to identify a first plurality of hand pose parameters for the wrist associated with predetermined activation features in the database that are nearest neighbors to the first plurality of activation features. The method further includes generating a hand pose model corresponding to the hand of the user based on the first plurality of hand pose parameters and performing an operation in the automated system in response to input from the user based on the hand pose model.
SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING
In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network (“DNN”) on those one-way homomorphic encryptions (i.e., each biometrics' feature vector) an authentication system can determine matches or execute searches on encrypted data. Each biometrics' feature vector can then be stored and/or used in conjunction with respective classifications, for use in subsequent comparisons without fear of compromising the original biometric data. In various embodiments, the original biometric data is discarded responsive to generating the encrypted values. In another embodiment, the homomorphic encryption enables computations and comparisons on cypher text without decryption of the encrypted feature vectors. Security of such privacy enable biometrics can be increased by implementing an assurance factor (e.g., liveness) to establish a submitted biometric has not been spoofed or faked.
SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING
In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network (“DNN”) on those one-way homomorphic encryptions (i.e., each biometrics' feature vector) an authentication system can determine matches or execute searches on encrypted data. Each biometrics' feature vector can then be stored and/or used in conjunction with respective classifications, for use in subsequent comparisons without fear of compromising the original biometric data. In various embodiments, the original biometric data is discarded responsive to generating the encrypted values. In another embodiment, the homomorphic encryption enables computations and comparisons on cypher text without decryption of the encrypted feature vectors. Security of such privacy enable biometrics can be increased by implementing an assurance factor (e.g., liveness) to establish a submitted biometric has not been spoofed or faked.