An anomaly can generally be defined as an event or occurrence that does not follow expected or normal behavior. In the context of neural networks or machine learning, an anomaly can be difficult to define, but the definition can be critical to the success and effectiveness of a given anomaly detector. An efficient anomaly detector should be capable of differentiating between anomalous and normal instances with high precision, so as to avoid false alarms. In some cases, for instance in quality control for manufacturing, detecting anomalies on surfaces of objects is a critical task in computer vision. Current approaches to identifying such surface anomalies often rely on deep-learning architectures to achieve precise detection and/or segmentation of anomalies.
It is recognized herein, however, that deep-learning approaches to anomaly detection can require a large amount of training data to properly learn the task. It is further recognized herein that capturing images of anomalies can be particularly costly or impractical or, in some cases, impossible. For example, by definition, anomalies can be rare and, therefore, gathering enough samples to train a convolutional neural network can be tedious. Annotating anomalies that are depicted can also be an expensive and time-consuming task.
Embodiments of the invention address and overcome one or more of the described-herein shortcomings by providing methods, systems, and apparatuses that improve anomaly detection. For example, in various embodiments, realistic synthetic images are generated that include plausible and annotated surface defects (anomalies). Further, in accordance with various embodiments, such synthetic images are used to train an efficient anomaly segmentation network in a fully supervised manner.
In an example aspect, an anomaly texture generator can generate first color texture images that include respective surface anomalies. Three-dimensional (3D) models (meshes) of objects associated with the first color texture images are obtained. Based on the 3D models and the first color texture images associated with the 3D models, a rendering module can generate first synthetic images of the respective objects. The first synthetic images can define the objects in a realistic scene. The objects of the first synthetic images can each define a surface and at least one anomaly on the surface of the respective object. An anomaly segmentation network can be trained, to detect anomalies, with the first synthetic images. A real image of a target object can be captured and input into the anomaly segmentation network. The anomaly segmentation network can detect at least one anomaly on a surface of the target object. In some cases, the at least one anomaly defines a stain or unclean portion of the target object. In various examples, the target object is not one of the objects defined by the first synthetic images. The rendering module can further obtain second color texture images associated with the 3D models. In an example, the second color texture images each include no surface anomalies so as to define non-anomalous color texture images. Based on the 3D models and the second color texture images associated with the 3D models, the rendering module can generate second synthetic images of the respective objects. The second synthetic images can define the objects in a realistic scene. The objects of the second synthetic images can each including no surface anomalies so such that the second synthetic images define non-anomalous synthetic images. The anomaly segmentation network can further be trained on the second synthetic images.
The foregoing and other aspects of the present invention are best understood from the following detailed description when read in connection with the accompanying drawings. For the purpose of illustrating the invention, there is shown in the drawings embodiments that are presently preferred, it being understood, however, that the invention is not limited to the specific instrumentalities disclosed. Included in the drawings are the following Figures:
As an initial matter, it is recognized herein that current approaches to anomaly detection or segmentation from images generally rely on weakly supervised or unsupervised training schemes. In particular, for example, image-level annotations that indicate whether a given image contains an anomaly can be leveraged, or normal image distributions can be learned so as to detect deviations. In some computer vision cases, in order to utilize direct supervised training schemes without spending excessive effort collecting real data, synthetic images with annotations can be generated from 3D representations (e.g., CAD models). Further, in some cases, machine learning (ML) based image processing can reduce visual discrepancies between real and synthetic images. In some cases, one or more generative adversarial networks (GANs) can map synthetic images closer to the real domain in an unsupervised manner. It is also recognized herein that some computer graphics approaches purport to render synthetic images with anomalies, but such approaches typically require heavy human parameterization and supervision.
As described herein, various embodiments define a comprehensive pipeline for rendering realistic synthetic images with plausible and annotated surface defects, and for leveraging these synthetic images (or data modalities) to train an efficient anomaly segmentation network in a fully supervised manner. In some examples, anomalies of a given object (which can be referred to as the target object) can be detected with 3D models of the object and few real images of the target object. As used herein, unless otherwise specified, surface anomalies and surface defects can be used interchangeably, without limitation. By way of example, and without limitation, detecting surface anomalies is useful in various manufacturing applications in which a defect might define a change of color or a scratch, but does not change other properties of a given object. For example, in accordance with various embodiments described herein, a system can determine whether medical devices have been properly cleaned or are scratched by inspecting the devices for surface anomalies. It will be understood that various example manufacturing or medical device applications are presented herein to illustrate example embodiments, but embodiments are not limited to the example applications, and all other applications of the embodiments are contemplated as being within the scope of this disclosure.
Referring to
To address various technical problems associated with synthetic data generation, in accordance with various embodiments described herein, realistic and varied anomaly texture maps are generated. In some cases, such maps can be generated from few real images of anomalous target objects and normal (non-anomalous) target objects. Further, in various examples, ground-truth segmentation maps are generated that can be used as targets during supervised training of the anomaly detection or segmentation. As used herein, unless otherwise specified, anomaly detection and anomaly segmentation can be used interchangeably without limitation. The ground-truth segmentation maps can define binary images that indicate the location of anomalies in the rendered images.
Referring now to
Referring to h×w×3. In various examples, the texture images 318 (t) define a respective original texture image. In particular, by way of example and without limitation, the texture image 318 can define a texture of yellow and black shades which, when properly sampled and applied to the corresponding 3D model (e.g., 3D model 316), can result in a model that represents a yellow rubber duck.
With continuing reference to (0,1)) that the anomaly texture generator 302 (G) can receive as input, and at can represent a defect/stain or anomalous image or map 321. In some cases, the anomaly texture generator 302 defines a learnable machine-learning model. In particular, by way of example and without limitation, the anomalous image 321 can define a transparent image having one or more spots which, when properly sampled and applied to the corresponding 3D model (e.g., 3D model 316), can result in a model that includes a realistic anomaly (e.g., defect or stain). The noise vector can be sampled from a normal distribution so as to return or generate the anomaly map 321 that can be represented as at δt∈
h×w×3. Using the color texture image 318 and the anomaly map 321, an anomaly texture map 322 (or texture map that contains an anomaly) can be generated, which can be represented as {tilde over (t)}=t+δt. Thus, as {tilde over (t)}=t+δt can represent a texture image with an anomaly added to the texture image, or the anomaly texture map 322. In particular, by way of example and without limitation, the anomaly texture map 322 can define an image that can be sampled and applied to its corresponding 3D model (e.g., model 316) so as to result in a model that maintains its original appearance except for at least one real-looking anomaly that is added to the model.
With continuing reference to
Thus, the rendering module 304 can define a differentiable rendering module R that is defined as a function that is parametrized by parameters θR. The differential rendering function can be represented as R(S, t; θR) {xs,ys}, wherein xs represents non-anomalous synthetic images 324, and ys represents an anomaly semantic map that corresponds to a particular synthetic image xs. In various examples, ys is empty when xs defines a non-anomalous synthetic image 324. Additionally, the rendering function can be represented as R(S, {tilde over (t)}; θR)={,
}, wherein
represents anomalous synthetic images 326, and
represents an anomaly semantic map that corresponds to a particular synthetic image
. The anomalous synthetic images 326 include one or more surface anomalies. The parameters θR can define various attributes associated with a given scene, such intrinsic properties of a virtual camera, scene clutter, lighting conditions, or the like, such that the rendering module 304 can learn to render synthetic images defining optimal or realistic visual scenes. In particular, the rendering module 304 can optimize the parameters θR to optimize visual scenes, so as to render realistic synthetic images from 3D models and texture images.
In various examples, the system 300 performs adversarial training to teach the anomaly texture generator 302 to generate realistic anomalous texture images 322, and to teach the rendering module 304 to render more realistic synthetic images 324 and 326, based on the corresponding 3D model 316 that is received by the rendering module 304. In particular, by way of example, as the rendering module 304 is trained, the rendering module 304 can learn more realistic clutter and lighting settings, so as to generate more realistic synthetic images 324 and 326. In the architecture defined by the computing system 300, the anomaly texture generator 302 and the rendering module 304 can define the generative network of the architecture, and the first discriminator network 306 (D) and the second discriminator network 308 ({tilde over (D)}) can define the discriminative network of the architecture that determines whether images are real or synthetic. In particular, for example, the first discriminator network 306 (D(x; θD)) can be tasked to distinguish between non-anomalous synthetic images 324 and non-anomalous real images 312, as to determine whether the non-anomalous images are real or synthetic. Similarly, the second discriminator network 308 ({tilde over (D)}(x; θ{tilde over (D)})) can be tasked to distinguish between anomalous synthetic images 326 and anomalous real images 314, so as to determine whether images having at least one surface anomaly are real or synthetic. The above-mentioned networks of the system 300 can trained using typical generative adversarial network (GAN) losses, such as cross-entropy over the discriminators' predictions. For example, losses computed by the discriminative network, in particular the first discriminator network 306 and the second discriminator network 308, can be returned to the rendering module 304 to train the rendering module 304.
In particular, the discriminator networks 306 and 308 can be trained as classifiers that determine whether an image is fake or real. Given an input image, the discriminator networks can predict if that image is real (actual picture) or fake (synthetic image). Their loss function can correspond to the inaccuracy of their predictions over training images (e.g., computed as cross-entropy). Generative models, for instance the anomaly texture generator 302 or the rendering module 304, can be trained to fool discriminator networks, for instance the first and second discriminator networks 306 and 308. In particular, for example, an object these generative models can be to generate an output (synthetic images) that is classified as real (real images) by the discriminator networks, which can be referred to as a min-max strategy between generators and discriminators. Thus, their loss functions can correspond to the accuracy of a given discriminator's predictions over the generated images.
Still referring to ,
respectively) that are rendered after the optimization of the anomaly texture generator 302 and the rendering module 304. Alternatively, in some cases, the anomaly segmentation network 310 is trained with the other networks (e.g., anomaly texture generator 302 and rendering module 304) are trained so as to make the anomaly segmentation network 310 more robust to data variability. In particular, the anomaly segmentation network 310 can be trained over each batch of synthetic images 324 and 326, so as to leverage traditional supervised losses, for example, by comparing the predicted output (y) of the anomaly detection model (e.g., anomaly segmentation network 310) to the corresponding ground-truth map. The output of the anomaly detection models (y) can define a probability/semantic map that can be binarized into a mask highlighting where the anomaly is in the image. The ground-truth maps can be manually annotated by experts in the case of real images, or automatically generated, for example, for synthetic images in which the position of the simulated anomaly in the image is known. In various example embodiments, the ground-truth anomaly mask can be obtained by rendering the 3D model a second time (for each training image) using the same parameters except using δt instead of {tilde over (t)} for the texture.
Additionally, or alternatively, the anomaly segmentation network 310 can be trained over real non-anomalous images 312 (xr), using empty semantic maps as target ground-truth. In various examples, the error from the anomaly segmentation network 310 is back-propagated to the anomaly texture generator 302 to further train the anomaly texture generator 302 to generate anomalies that are realistic and challenging for the anomaly segmentation network 310 to detect, for example, because of increases to loss and error. By way of example, to create realistic anomaly images, the generative models can be pit against the discriminators in a min-max game, such that the discriminator learns to distinguish between real and fake images, while the generator learns to generate more-and-more realistic images to fool the other model. In an example in which the goal is to train a third model to detect actual anomalies in real images, synthetic anomaly images can be created that are not only realistic, but also challenging for the anomaly detection model. It is recognized herein that, in some cases, the more challenging its training, the more likely the detection model will perform well in real conditions. Thus, the detection model can learn to detect an anomaly, while the generator can learn to generate challenging anomalies. In particular, the generator models can generate challenging and realistic anomalies because the generator is still competing against the discriminators, in parallel.
Thus, as described above, the computing system 300 can automatically learn to render realistic images of surface anomalies in an unsupervised manner. Such images can define precious annotated training data for various anomaly detection/segmentation networks or systems. For example, by rendering such synthetic data, the anomaly segmentation network 310 can be trained using the synthetic data, such that the anomaly segmentation network 310 can detect more anomalies more accurately as compared to anomaly segmentation networks that do not have access to the synthetic data described herein.
Referring to
With continuing reference to
The fully connected layers 403, which can include a first layer 403a and a second or output layer 403b, include connections between layers that are fully connected. For example, a neuron in the first layer 403a may communicate its output to every neuron in the second layer 403b, such that each neuron in the second layer 403b will receive input from every neuron in the first layer 403a. It will again be understood that the model is simplified for purposes of explanation, and that the model 400 is not limited to the number of illustrated fully connected layers 403. In contrast to the fully connected layers, the convolutional layers 402 may be locally connected, such that, for example, the neurons in the intermediate layer 402b might be connected to a limited number of neurons in the final convolutional layer 402c. The convolutional layers 402 can also be configured to share connections strengths associated with the strength of each neuron.
Still referring to
Referring now to
In various examples, the first discriminator network 306 obtains real images of objects. The first discriminator network 306 is trained on the real images of objects and the second synthetic images. The first discriminator network 306 can generate predictions and losses associated with the respective predictions. The predictions can indicate whether images are real or synthetic. The system 300 can backpropagate the losses to the rendering module 304 so as to optimize the rendering module 304. Similarly, the second discriminator network 308 can obtain real images of objects that each define at least one surface anomaly. In an example, the second discriminator network 308 is trained on the real images of objects that each define at least one surface anomaly and the first synthetic images. The second discriminator network 308 can generate predictions and losses associated with the respective predictions, wherein the predictions indicate whether images are real or synthetic. The system 300 can backpropagate the losses to the rendering module 304 so as to optimize the rendering module 304. In various examples, the anomaly segmentation network 310, the first discriminator network 306, the second discriminator network 308, and the rendering module 304 are trained in parallel with one another so as to be trained at the same time.
The processors 620 may include one or more central processing units (CPUs), graphical processing units (GPUs), or any other processor known in the art. More generally, a processor as described herein is a device for executing machine-readable instructions stored on a computer readable medium, for performing tasks and may comprise any one or combination of, hardware and firmware. A processor may also comprise memory storing machine-readable instructions executable for performing tasks. A processor acts upon information by manipulating, analyzing, modifying, converting or transmitting information for use by an executable procedure or an information device, and/or by routing the information to an output device. A processor may use or comprise the capabilities of a computer, controller or microprocessor, for example, and be conditioned using executable instructions to perform special purpose functions not performed by a general purpose computer. A processor may include any type of suitable processing unit including, but not limited to, a central processing unit, a microprocessor, a Reduced Instruction Set Computer (RISC) microprocessor, a Complex Instruction Set Computer (CISC) microprocessor, a microcontroller, an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), a System-on-a-Chip (SoC), a digital signal processor (DSP), and so forth. Further, the processor(s) 620 may have any suitable microarchitecture design that includes any number of constituent components such as, for example, registers, multiplexers, arithmetic logic units, cache controllers for controlling read/write operations to cache memory, branch predictors, or the like. The microarchitecture design of the processor may be capable of supporting any of a variety of instruction sets. A processor may be coupled (electrically and/or as comprising executable components) with any other processor enabling interaction and/or communication there-between. A user interface processor or generator is a known element comprising electronic circuitry or software or a combination of both for generating display images or portions thereof. A user interface comprises one or more display images enabling user interaction with a processor or other device.
The system bus 621 may include at least one of a system bus, a memory bus, an address bus, or a message bus, and may permit exchange of information (e.g., data (including computer-executable code), signaling, etc.) between various components of the computer system 610. The system bus 621 may include, without limitation, a memory bus or a memory controller, a peripheral bus, an accelerated graphics port, and so forth. The system bus 621 may be associated with any suitable bus architecture including, without limitation, an Industry Standard Architecture (ISA), a Micro Channel Architecture (MCA), an Enhanced ISA (EISA), a Video Electronics Standards Association (VESA) architecture, an Accelerated Graphics Port (AGP) architecture, a Peripheral Component Interconnects (PCI) architecture, a PCI-Express architecture, a Personal Computer Memory Card International Association (PCMCIA) architecture, a Universal Serial Bus (USB) architecture, and so forth.
Continuing with reference to
The operating system 634 may be loaded into the memory 630 and may provide an interface between other application software executing on the computer system 610 and hardware resources of the computer system 610. More specifically, the operating system 634 may include a set of computer-executable instructions for managing hardware resources of the computer system 610 and for providing common services to other application programs (e.g., managing memory allocation among various application programs). In certain example embodiments, the operating system 634 may control execution of one or more of the program modules depicted as being stored in the data storage 640. The operating system 634 may include any operating system now known or which may be developed in the future including, but not limited to, any server operating system, any mainframe operating system, or any other proprietary or non-proprietary operating system.
The computer system 610 may also include a disk/media controller 643 coupled to the system bus 621 to control one or more storage devices for storing information and instructions, such as a magnetic hard disk 641 and/or a removable media drive 642 (e.g., floppy disk drive, compact disc drive, tape drive, flash drive, and/or solid state drive). Storage devices 640 may be added to the computer system 610 using an appropriate device interface (e.g., a small computer system interface (SCSI), integrated device electronics (IDE), Universal Serial Bus (USB), or FireWire). Storage devices 641, 642 may be external to the computer system 610.
The computer system 610 may also include a field device interface 665 coupled to the system bus 621 to control a field device 666, such as a device used in a production line. The computer system 610 may include a user input interface or GUI 661, which may comprise one or more input devices, such as a keyboard, touchscreen, tablet and/or a pointing device, for interacting with a computer user and providing information to the processors 620.
The computer system 610 may perform a portion or all of the processing steps of embodiments of the invention in response to the processors 620 executing one or more sequences of one or more instructions contained in a memory, such as the system memory 630. Such instructions may be read into the system memory 630 from another computer readable medium of storage 640, such as the magnetic hard disk 641 or the removable media drive 642. The magnetic hard disk 641 and/or removable media drive 642 may contain one or more data stores and data files used by embodiments of the present disclosure. The data store 640 may include, but are not limited to, databases (e.g., relational, object-oriented, etc.), file systems, flat files, distributed data stores in which data is stored on more than one node of a computer network, peer-to-peer network data stores, or the like. The data stores may store various types of data such as, for example, skill data, sensor data, or any other data generated in accordance with the embodiments of the disclosure. Data store contents and data files may be encrypted to improve security. The processors 620 may also be employed in a multi-processing arrangement to execute the one or more sequences of instructions contained in system memory 630. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions. Thus, embodiments are not limited to any specific combination of hardware circuitry and software.
As stated above, the computer system 610 may include at least one computer readable medium or memory for holding instructions programmed according to embodiments of the invention and for containing data structures, tables, records, or other data described herein. The term “computer readable medium” as used herein refers to any medium that participates in providing instructions to the processors 620 for execution. A computer readable medium may take many forms including, but not limited to, non-transitory, non-volatile media, volatile media, and transmission media. Non-limiting examples of non-volatile media include optical disks, solid state drives, magnetic disks, and magneto-optical disks, such as magnetic hard disk 641 or removable media drive 642. Non-limiting examples of volatile media include dynamic memory, such as system memory 630. Non-limiting examples of transmission media include coaxial cables, copper wire, and fiber optics, including the wires that make up the system bus 621. Transmission media may also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
Computer readable medium instructions for carrying out operations of the present disclosure may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present disclosure.
Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, may be implemented by computer readable medium instructions.
The computing environment 400 may further include the computer system 610 operating in a networked environment using logical connections to one or more remote computers, such as remote computing device 680. The network interface 670 may enable communication, for example, with other remote devices 680 or systems and/or the storage devices 641, 642 via the network 671. Remote computing device 680 may be a personal computer (laptop or desktop), a mobile device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to computer system 610. When used in a networking environment, computer system 610 may include modem 672 for establishing communications over a network 671, such as the Internet. Modem 672 may be connected to system bus 621 via user network interface 670, or via another appropriate mechanism.
Network 671 may be any network or system generally known in the art, including the Internet, an intranet, a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), a direct connection or series of connections, a cellular telephone network, or any other network or medium capable of facilitating communication between computer system 610 and other computers (e.g., remote computing device 680). The network 671 may be wired, wireless or a combination thereof. Wired connections may be implemented using Ethernet, Universal Serial Bus (USB), RJ-6, or any other wired connection generally known in the art. Wireless connections may be implemented using Wi-Fi, WiMAX, and Bluetooth, infrared, cellular networks, satellite or any other wireless connection methodology generally known in the art. Additionally, several networks may work alone or in communication with each other to facilitate communication in the network 671.
It should be appreciated that the program modules, applications, computer-executable instructions, code, or the like depicted in
It should further be appreciated that the computer system 610 may include alternate and/or additional hardware, software, or firmware components beyond those described or depicted without departing from the scope of the disclosure. More particularly, it should be appreciated that software, firmware, or hardware components depicted as forming part of the computer system 610 are merely illustrative and that some components may not be present or additional components may be provided in various embodiments. While various illustrative program modules have been depicted and described as software modules stored in system memory 630, it should be appreciated that functionality described as being supported by the program modules may be enabled by any combination of hardware, software, and/or firmware. It should further be appreciated that each of the above-mentioned modules may, in various embodiments, represent a logical partitioning of supported functionality. This logical partitioning is depicted for ease of explanation of the functionality and may not be representative of the structure of software, hardware, and/or firmware for implementing the functionality. Accordingly, it should be appreciated that functionality described as being provided by a particular module may, in various embodiments, be provided at least in part by one or more other modules. Further, one or more depicted modules may not be present in certain embodiments, while in other embodiments, additional modules not depicted may be present and may support at least a portion of the described functionality and/or additional functionality. Moreover, while certain modules may be depicted and described as sub-modules of another module, in certain embodiments, such modules may be provided as independent modules or as sub-modules of other modules.
Although specific embodiments of the disclosure have been described, one of ordinary skill in the art will recognize that numerous other modifications and alternative embodiments are within the scope of the disclosure. For example, any of the functionality and/or processing capabilities described with respect to a particular device or component may be performed by any other device or component. Further, while various illustrative implementations and architectures have been described in accordance with embodiments of the disclosure, one of ordinary skill in the art will appreciate that numerous other modifications to the illustrative implementations and architectures described herein are also within the scope of this disclosure. In addition, it should be appreciated that any operation, element, component, data, or the like described herein as being based on another operation, element, component, data, or the like can be additionally based on one or more other operations, elements, components, data, or the like. Accordingly, the phrase “based on,” or variants thereof, should be interpreted as “based at least in part on.”
Although embodiments have been described in language specific to structural features and/or methodological acts, it is to be understood that the disclosure is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as illustrative forms of implementing the embodiments. Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments could include, while other embodiments do not include, certain features, elements, and/or steps. Thus, such conditional language is not generally intended to imply that features, elements, and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements, and/or steps are included or are to be performed in any particular embodiment.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
| Filing Document | Filing Date | Country | Kind |
|---|---|---|---|
| PCT/US2022/015169 | 2/4/2022 | WO |