Abstract:
Methods and systems for modeling user arrival and choice in the context of off-street parking solutions. A first component models the arrival and duration of stay of users as a function of time, taking into account different user profiles (or “clusters”), captured by a latent variable. A second component provides a ranking function (for each user cluster), wherein the input features describing the “choice” constitute status variables associated different car park(s), and the output constitutes a preferred car park and a pricing scheme. The system simulates different user behaviors by assuming some standard groups of users will behave similarly. Groups of users or user profiles are learned automatically. The profiles are then employed as a key element for automatically learning a decision function of parking users, and automatically learning one decision function per profile.
Abstract:
Methods and systems for modeling user arrival and choice in the context of off-street parking solutions. A first component models the arrival and duration of stay of users as a function of time, taking into account different user profiles (or “clusters”), captured by a latent variable. A second component provides a ranking function (for each user cluster), wherein the input features describing the “choice” constitute status variables associated different car park(s), and the output constitutes a preferred car park and a pricing scheme. The system simulates different user behaviors by assuming some standard groups of users will behave similarly. Groups of users or user profiles are learned automatically. The profiles are then employed as a key element for automatically learning a decision function of parking users, and automatically learning one decision function per profile.
Abstract:
A method for recognition of an identifier such as a license plate includes storing first visual signatures, each extracted from a first image of a respective object, such as a vehicle, captured at a first location, and first information associated with the first captured image, such as a time stamp. A second visual signature is extracted from a second image of a second object captured at a second location and second information associated with the second captured image is acquired. A measure of similarity is computed between the second visual signature and at least some of the first visual signatures to identify a matching one. A test is performed, which is a function of the first and the second information associated with the matching signatures. Only when it is confirmed that the test has been met, identifier recognition is performed to identify the identifier of the second object.
Abstract:
A system and method for document image acquisition and retrieval find application in litigation for responding to discovery requests. The method includes receiving automatically acquired electronic image logs comprising image data and associated records for documents processed by a plurality of image output devices within an organization. When a request for document production is received, the image logs (and/or information extracted therefrom) are automatically filtered through at least one classifier trained to return documents responsive to the document request, and documents corresponding to the filtered out image logs are output. One of the filters may be configured for filtering out documents that include attorney-client exchanges.
Abstract:
Methods and systems for estimating airport usage demand. Airport parking traffic usage data and flight-time table data can be compiled with respect to an airport (or more than one airport). The airport parking traffic usage data and flight-time table data can be analyzed using an efficient time matching approach (e.g., a time segment matching algorithm). An efficient method to match passengers and flights is introduced. Passenger behavior can be estimated with respect to the airport based on the airport parking traffic usage data and flight-time table data.
Abstract:
Methods and systems for estimating airport usage demand. Airport parking traffic usage data and flight-time table data can be compiled with respect to an airport (or more than one airport). The airport parking traffic usage data and flight-time table data can be analyzed using an efficient time matching approach (e.g., a time segment matching algorithm). An efficient method to match passengers and flights is introduced. Passenger behavior can be estimated with respect to the airport based on the airport parking traffic usage data and flight-time table data.
Abstract:
A method for recognition of an identifier such as a license plate includes storing first visual signatures, each extracted from a first image of a respective object, such as a vehicle, captured at a first location, and first information associated with the first captured image, such as a time stamp. A second visual signature is extracted from a second image of a second object captured at a second location and second information associated with the second captured image is acquired. A measure of similarity is computed between the second visual signature and at least some of the first visual signatures to identify a matching one. A test is performed, which is a function of the first and the second information associated with the matching signatures. Only when it is confirmed that the test has been met, identifier recognition is performed to identify the identifier of the second object.
Abstract:
A method and system are disclosed for wireless payment and information collection. A central system generates a personalized application including unique application and transaction identifiers, security keys, and signatures for a user device. The user device implements the personalized application in order to access the services of the associated network. Tags, capable of short-range communication with the user devices, are deployed to service access points of the associated network. The tags and user device mutually authenticate and share identifiers. Validation of the user device results in the tag updating an irreversible counter, generating transaction certificate, and logging this transaction information. The transaction certificate and a portion of the log are communicated to the user device, and service is granted. The user device transmits the transaction information and log to the central system for billing when a network connection is available.