Abstract:
Optical networks may store information or data therein by maintaining the information or data in motion. The optical networks may include optical fiber rings configured to receive optical signals comprising the information or data and to circulate the optical signals within the optical fiber rings. The optical signals and the information or data may be transferred out of the optical fiber rings in order to amplify the optical signals (e.g., to overcome losses due to attenuation within the optical fiber rings), to analyze the optical signals according to one or more processing techniques, or to transfer the information or data to another computer device upon request. If continued storage of the information or data is required, an optical signal including the information or data may be transferred back into the optical fiber rings and may continue to circulate therein.
Abstract:
An imaging device may be configured to monitor a field of view for various objects or events occurring therein. The imaging device may capture a plurality of images at various focal lengths, identify a region of interest including one or more semantic objects therein, and determine measures of the levels of blur or sharpness within the regions of interest of the images. Based on their respective focal lengths and measures of their respective levels of blur or sharpness, a focal length for capturing subsequent images with sufficient clarity may be predicted. The imaging device may be adjusted to capture images at the predicted focal length, and such images may be captured. Feedback for further adjustments to the imaging device may be identified by determining measures of the levels of blur or sharpness within the subsequently captured images.
Abstract:
Techniques for managing notifications may be described. In an example, the notifications may relate to an item and may be provided to a user device. A passive device may be associated with the item. A delivery management device at a particular location may detect the proximity of the passive device. The delivery management device may cause a notification to be sent to the user device based on the proximity. The notification may describe that the item may have been detected at the particular location.
Abstract:
Depth information may be encoded into pixels of visual imaging data according to steganographic techniques. The depth information may be captured simultaneously with the visual imaging data, and one or more representative pixels may be identified within a region or sector of the visual imaging data according to a pixel traversal strategy. The depth information corresponding to the region or sector may be encoded into one or more least significant bits of the representative pixels, and a modified set of imaging data including the visual imaging data with the depth information encoded into the representative pixels may be stored in a data store and used for any relevant purpose.
Abstract:
Images of an environment that are captured from two or more imaging devices may be captured and evaluated in order to identify a state of the environment, or an interaction that placed the environment in the state. The content of the images may be analyzed in order to recognize observed information or data expressed therein. The information or data may be associated with a given state according to one or more observation functions, and the state may be used to identify an action according to one or more transition functions. The observation function uses conditional probabilities to transfer the probability of making an observation by one imaging device to the observation made by the other imaging device. The observation functions and the transition functions may be derived based on historical training data including clips that are labeled to identify states or interactions expressed therein.
Abstract:
Devices and techniques are generally described for privacy preservation for computer vision models. In some examples, a first field of text and a second field of text may be detected in a first image. A first alpha-numeric text string may be detected in the first field and a second alpha-numeric text string may be detected in the second field. A first sub-image including the first alpha-numeric text string may be generated and a second sub-image including the second alpha-numeric text string may be generated. The first sub-image may be sent to a first computing device for annotation and the second sub-image may be sent to a second computing device for annotation.
Abstract:
A physical space may contain sliding doors in various places such as between rooms, as closet doors, on furniture, and so forth. An autonomous mobile device (AMD) capable of non-holonomic motion may selectively contact a portion of the sliding door and apply a force to open or close the door. The AMD moves to an initial pose relative to the door, with a portion of the AMD coming into contact with the door. The AMD then rotates and translates, relative to the door, applying a force to the door. Sensor data, such as linear acceleration, rotation, drive wheel torque, and so forth is used as input to determine the next movement in a series of motions, resulting in continued contact and force application. As the end of travel for this motion is reached, the AMD may separate from the door, reposition, and continue to apply a force to the door.
Abstract:
Described are systems and methods relating to the causal detection and diagnosing of faults and anomalous operation of autonomous vehicles, such as unmanned aerial vehicles (UAVs), using machine learning. Embodiments of the present disclosure can provide systems and methods for detecting and diagnosing faults based on comparisons between the measured operation and/or behavior of a vehicle to the vehicle's expected nominal operation and/or behavior. Accordingly, the systems and methods according to embodiments of the present disclosure do not require prior knowledge of faults or modeling of the vehicle, the vehicle's operation, and/or environmental uncertainties. Further, embodiments of the present disclosure can facilitate sequencing of a vehicle's faults and/or anomalous operation and/or behavior, identify dependencies between a vehicle's faults and/or anomalous operation and/or behavior, and can detect and diagnose faults and/or anomalous operation and/or behavior in a contextual manner.
Abstract:
Bid values submitted for various keywords can take into account the recovery propensity between paid search and organic search. When submitting a bid to a search engine provider for a keyword, an entity may get a certain level of performance in return. If not submitting a bid, however, the entity will likely still get some level of performance, although likely less than for paid search. In order to optimize for a parameter such as impressions, purchases, or profit, the recovery propensity can be taken into account in order to adjust the bid price, taking into account the relative performance of paid and organic search and then optimizing for the determined goal. Organic search data in some embodiments can be obtained through testing or modeling, or a combination thereof.
Abstract:
Systems and methods related to designation, design, and service of replaceable components of aerial vehicles may include designating a component as a replaceable component based on a determined service frequency, designing the replaceable component for incorporation into an aerial vehicle based on the service frequency, and servicing the replaceable component according to the service frequency. In this manner, a replaceable component having a relatively high service frequency may be incorporated into an aerial vehicle at a relatively more accessible location, and a replaceable component having a relatively low service frequency may be incorporated into an aerial vehicle at a relatively less accessible location, thereby facilitating efficient and reliable maintenance of replaceable components. Further, replaceable components may be stacked relative to each other based at least in part on respective service frequencies, and/or replaceable components having similar service frequencies may be combined together in replaceable modules.