Practical
applications
“Don’t believe me, just watch!”
Mark Ronson ft. Bruno Mars – Uptown Funk

Our 3 specialities of the house
Wort
Baseline situation: A law firm advises clients on their contracts. But since the legal situation changes regularly, a large number of court websites had to be read every day. In addition, the contract pool at hand was unclear and there was a certain legal uncertainty for clients.
Then came boot.AI and mixed the ingredients
into a software that automatically indicates whether existing contracts are affected by a change in the law and are therefore no longer legally compliant. This is because the software extracts up-to-date judgements on a daily basis. This made the contract pool clearer. Contracts could be created within 120 seconds. Furthermore, the law firm was able to record a greatly increased legal certainty as well as consulting quality in real time.


Bild
Baseline Situation: In the case of wind turbines, a costly mandatory inspection must be carried out every two years at the risk of life and limb of employees.
Then boot.AI got from the computer vision cabinet the ingredients
- Image Classification
- Optical Character Recognition
- Object Detection
- Object Tracking
- Action Recognition
- Semantic Segmentation
- Instance Segmentation
and completed this with
which means that the wind turbines can now be safely inspected using special cameras. With a cost reduction of up to 95 %. And the guarantee of continuous power generation during the inspection.
Zeit
Baseline situation: A company with subjective quality assurance and no insight into the processes records 49 % successful products.
boot.AI combined the computer vision ingredients
- Image Classification
- Optical Character Recognition
- Object Detection
- Object Tracking
- Action Recognition
- Semantic Segmentation
- Instance Segmentation
with the NLP components
and spiced everything up with
This increased the success rate to 95 % – saving 5 million euros per plant per year.

Ready to boot?


Face Recognition
Face recognition performs the task of identifying or verifying a person by comparing and analyzing patterns based on facial features extracted from face images. It is widely used for security applications – like tracking criminals more easily or protecting data with your own face instead of a username and password, though there is increasing interest in other areas like augmented reality.


Object Detection
Object detection performs the task of finding all objects in an image and drawing bounding boxes around them. It is one of the most common used techniques in a broad range of applications such as surveillance, security and advanced driver assistance systems.


Optical Character Recognition
Optical character recognition performs the task of converting images of typed, handwritten, or printed text into editable and searchable data. It allows users to save a lot of time and effort in various applications from exploiting text-related content in images to scanning and extracting information in documents.


Image Classification
Image classification performs the task of assigning one label to an input image depending on the image content. It is one of the most fundamental problems in Computer Vision that, despite its simplicity, appears in most practical problems.


Object Tracking
Object tracking performs the task of locating a moving object or multiple objects while maintaining a unique ID for each object over time and controlling the camera if necessary. It is often combined with object detection in a variety of applications such as human-computer interaction, surveillance, security, counting systems.


Semantic Segmentation
Semantic segmentation performs the task of understanding an image at pixel level by assigning a label to every pixel in an image in order to identify image regions of same characteristics (like “street”, “person”). Some of the practical applications of semantic segmentation are in medical imaging, autonomous driving and traffic control systems.


Instance Segmentation
Instance segmentation performs the task of assigning a label and entity ID to each pixel in an image in order to identify image regions of same instance (like “person 1”, “person 2”). Instance segmentation can be used in many applications where we need to localize each instance in the image like object detection, but at pixel-level accuracy like semantic segmentation.


Action Recognition
Vision-based action recognition performs the task of identifying and inferring human actions or goals of one or more people based upon a series of observations or video clips. Due to its multifaceted nature, it can be immensely useful in very different fields related to human activities such as home-based rehabilitation, security-related applications, healthcare and logistics support.


Machine Translation
Machine translation means the software-supported translation of a language A into a language B and vice versa. It consists of both language analysis and language generation. Machine translation enables people who do not speak the same language to work together and facilitates the learning of foreign languages.


Information Extraction
Information extraction performs the task of automatically finding structured information from unstructured machine-readable documents. Information extraction, at a basic level, identifies named entity mentions such as products, organizations, locations and time expressions. At a deeper level, information extraction can find events, relationships and coreferences hiding deeply in written text.


Sentiment Analysis
Sentiment analysis, also known as opinion mining or emotion AI, refers to the automated process of identifying opinions within written or spoken language. Companies may use sentiment analysis to understand what customers think about their products and services. Beyond determining simple polarity (positive, neutral, negative), sentiment analysis can extract deeper understanding of the context such as the aspects and the emotions of the opinions.


Question-Answering-System
A Question Answering System refers to computer systems with the capability of answering the questions posed by humans in a natural language. These systems first translate sentences into a machine-representation, then try to find supported data in databases to generate valid answers. Question Answering Systems are becoming more and more popular thanks to Siri and Google Home, so-called virtual assistants.


Text Summarization
Text Summarization states the main ideas or facts in compact statements from a single or a bunch of documents. Considering the nowadays information overload, text summarization can help a company in data analysis and fast decision-making.


Attention Mechanism
(in Natural Language Processing)
Attention mechanism (in Natural Language Processing) refers to the idea of allowing the decoder to attend to different parts of a source sentence at each step of the output generation, instead of encoding the full sentence into a fixed-length vector. The algorithm learns what to attend to – based on the input sentence and what it has produced so far.
One of the problems that researchers have struggled with is how to link pronouns to antecedents, which resulted in this old joke, mimicking the call and response of a protest march:
What do we want? Natural Language Processing!
When do we want it? – Sorry, when do we want WHAT?
A neural network armed with an attention mechanism can actually understand what “it” is referring to. That is, it knows how to disregard the noise and focus on what’s relevant.


Fraud Detection
Fraud detection refers to the detection of criminal activities occurring in commercial organizations such as banks, credit card companies, insurance agencies, cell phone companies or stock markets. The malicious users might be the actual customers of the organization or might be posing as a customer (also known as identity theft).


Intrustion Detection System
An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. The foundation of any intelligent IDS is a robust data set to provide examples from which the computer can learn.


Recommender Systems
Recommender systems represent an approach to develop more personalized information systems with the aim of providing people and organizations with the right information at the right time. Recommender systems have gained considerable traction online, for example, music recommendations by Spotify, film recommendations by Netflix or quotation creation in the sales department of companies.


Anomaly Detection
Anomaly detection (or outlier detection) performs the task of identifying rare items, events or observations which raise suspicions by differing significantly from the majority of the data. It is applicable in a variety of domains, such as intrusion detection, fraud detection, IoT malware detection, fault detection, system health monitoring, event detection in sensor networks and detecting ecosystem disturbances.


IoT Malware Detection
Malware detection using machine learning can automatically identify malware from normal programs and has become increasingly important these days.
