Skip to main content

The coming age of (CLOS ID) Continuous Line Of Sight Identification.



The recent news announcement by Google that it had created it's on design of a self driving car inspired much chatter on the social media services and I've opined from an Engineering stand point why autonomous roadways and public transportation systems will be a significant boost to commerce.



I am going to formalize many of these ways in a post or two to come compiled from much of the analysis I've put forward in social media but this post is about a tangential idea I came upon while thinking about one key aspect of autonomous roadways that I mentioned in a Facebook thread. The comment in question:
"The second is often overlooked completely, what happens when trucks drive themselves? The main gain is *they can be routed at any time* they no longer have to be coupled to human wake and transit cycles and because of that *deliveries* can happen all day and night and in fact can be optimized to be most dense when HUMAN transit activity is least dense thus making much better time division of the access paths between routing people and routing stuff...in other words we'd finally be able to do TDMA on the roads between transiting human agents and transiting commerce.
This change will AGAIN reduce the potential for time based bottle necks by orders of magnitude compared to current systems which suffer from the peak effect coupled to human important temporal transit behavior."

The idea of being able to do true TDMA (time division multiple access) between commerce and people transit will allow commerce to be sent at all hours of the day, dramatically reducing density at times of the day where human transit density tends to peak but what of those times when human transit density is low?

I wondered of an autonomous truck pulling into park in front of a store and the store front being autonomously activated to remove the product from the truck for packing in the store as a possible future mode. When this is done how will owners prevent trivial thefts of goods from these delivery vehicles? The idea of what I call CLOS video identification immediately came to mind. Video camera technology coupled with machine learning in the form of vision processing algorithms for human face detection are becoming extremely efficient at identifying human faces and tracking them through crowds or behind obstructions. How can confidence be improved that a given identification from a camera is a valid one?

One way is to use the idea of a consensus report on a single observed individual from multiple cameras. When a given individual is identified from the perspective of one camera that camera would wirelessly transmit it's estimate to near by cameras that are within continuous line of sight of the same individual....these cameras would then respond back to the initial asking camera what their confidence scores are that the individual in question is indeed the estimated identity. Thus the overall confidence can be boosted, this would take into account blind spots and would benefit from registering when an individual has their head turned away from the camera. If camera A has 99% confidence that an individual with its face in its view is John Doe and camera B which is behind the individual indicates 0% confidence but "knows" that the individual in question has their head turned to the camera, it can re weight its estimate to a non zero value if it has a consensus estimate from near by cameras that can view the individual partially , say camera D and E off to either side of the individual. The consensus result of varying camera reports can help predict a very accurate identification signal threshold across all the viewing cameras that would be a fixed signal no matter HOW the individual is moving among the cameras.

This would be a powerful visual fingerprinting method for defining both the identity and location of an individual. Location could be triangulated to high accuracy by coupling depth determination and GPS location data of the observing cameras into the process....allowing CLOS algorithms to report not only who an observed face is but where they are exactly.

Why mention this in correlation to autonomous delivery trucks? Well it would be an excellent way to impact the desire for thefts to occur, at least thefts by individuals with no obfuscating methods (masks). CLOS enabling cameras in the commercial areas would allow extremely high accuracy in identifying individuals and make those areas a bad choice for committing robberies of good delivered say in the dead of night.

As for the more savvy thieves who would obfuscate their identification with a mask CLOS algorithms taken to a wider scale could provide high accuracy in tracking individuals in public from the moment they make their presence known. So unless they exit their domicile with the mask already on their face, from the moment they are outside a finger print consensus of their identity and location reported from a set of wirelessly communicating autonomous or fixed cameras could be tracked for the entire duration that they are navigating the city and CLOS consensus between any cameras mounted on any agents (be they fixed or autonomous, for example autonomous flying observer drones) could be used to spotlight individuals with potential or known criminal behavior backgrounds.

It's about to get really really really difficult to get away with crime.

Links:

http://www.bbc.com/news/technology-27587558

https://www.youtube.com/watch?v=InqV34BcheM




Comments

Popular posts from this blog

the attributes of web 3.0...

As the US economy continues to suffer the doldrums of stagnant investment in many industries, belt tightening budgets in many of the largest cities and continuous rounds of lay offs at some of the oldest of corporations, it is little comfort to those suffering through economic problems that what is happening now, has happened before. True, the severity of the downturn might have been different but the common factors of people and businesses being forced to do more with less is the theme of the times. Like environmental shocks to an ecosystem, stresses to the economic system lead to people hunkering down to last the storm, but it is instructive to realize that during the storm, all that idle time in the shelter affords people the ability to solve previous or existing problems. Likewise, economic downturns enable enterprising individuals and corporations the ability to make bold decisions with regard to marketing , sales or product focus that can lead to incredible gains as the economic ...

How many cofactors for inducing expression of every cell type?

Another revolution in iPSC technology announced: "Also known as iPS cells, these cells can become virtually any cell type in the human body -- just like embryonic stem cells. Then last year, Gladstone Senior Investigator Sheng Ding, PhD, announced that he had used a combination of small molecules and genetic factors to transform skin cells directly into neural stem cells. Today, Dr. Huang takes a new tack by using one genetic factor -- Sox2 -- to directly reprogram one cell type into another without reverting to the pluripotent state." -- So the method invented by Yamanaka is now refined to rely only 1 cofactor and b) directly generate the target cell type from the source cell type (skin to neuron) without the stem like intermediate stage.  It also mentions that oncogenic triggering was eliminated in their testing. Now comparative methods can be used to discover other types...the question is..is Sox2 critical for all types? It may be that skin to neuron relies on Sox2 ...

AgilEntity Architecture: Action Oriented Workflow

Permissions, fine grained versus management headache The usual method for determining which users can perform a given function on a given object in a managed system, employs providing those Users with specific access rights via the use of permissions. Often these permissions are also able to be granted to collections called Groups, to which Users are added. The combination of Permissions and Groups provides the ability to provide as atomic a dissemination of rights across the User space as possible. However, this granularity comes at the price of reduced efficiency for managing the created permissions and more importantly the Groups that collect Users designated to perform sets of actions. Essentially the Groups serve as access control lists in many systems, which for the variable and often changing environment of business applications means a need to constantly update the ACL’s (groups) in order to add or remove individuals based on their ability to perform cert...