System and method for opening containers

ABSTRACT

Features are applied to a mathematical model to produce a cutting pattern for opening a container. The cutting pattern specifies which of one or more cutting tools is to be used and the location of where cuts are to be made on the container. The cutting pattern is sent to a container opening machine. The container opening machine is operated and the container cut and opened by the container opening machine according to the cutting pattern.

CROSS REFERENCES TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional Application No.62/837,261, filed Apr. 23, 2019, which is incorporated herein byreference in its entirety.

TECHNICAL FIELD

These teachings relate to approaches for opening containers such asboxes without damaging the contents of the container.

BACKGROUND

Boxes, crates, cases, and other types of containers are used to shipvarious types of products. The containers may arrive at a warehouse,distribution center, or retail store and need to be opened. In oneexample, the containers are opened manually. However, in other examplesand when large number of containers are shipped and received, a cuttingor opening machine is used to remove the top of the container (orotherwise open the container). Once opened, the contents of thecontainer can be removed, for example, by a robot or by a human.

The containers are typically opaque and, consequently, the contents arenot visible either to a human or machine opening the container. Sincethe cutting or opening machine is unaware of the contents or how thecontents are arranged, the cutting or opening process may result indamage to the contents of the container. For example, a cutting machinethat removes the top of a shipping case may also cut off a portion of anitem that is being shipped in the shipping case.

BRIEF DESCRIPTION OF THE DRAWINGS

The above needs are at least partially met through the provision ofapproaches that opens containers, wherein:

FIG. 1 comprises a diagram of a system as configured in accordance withvarious embodiments of these teachings;

FIG. 2 comprises a flowchart as configured in accordance with variousembodiments of these teachings;

FIGS. 3A, 3B, 3C, and 3D comprise diagrams of an approach as configuredin accordance with various embodiments of these teachings;

FIG. 4 comprises a diagram of a system as configured in accordance withvarious embodiments of these teachings;

FIG. 5 comprises a diagram of a system as configured in accordance withvarious embodiments of these teachings.

DETAILED DESCRIPTION

Generally speaking, the present approaches use millimeter wave (or otherwavelength) technology to scan an opaque container to see the contentsof the container and determine how and where to make cuts to remove thetop (or other portions) of the container allowing robotic pickers (orother devices or humans) to easily access the container and/or removethese contents. For example, based on a scan, the system determines whattype of cutting tool to use, the amount of force the tool should use,the locations of cuts and/or the depths of cuts. In aspects, theapproaches described herein are directed to scanning the containerbefore the contents of the container are removed (and before thecontainer is cut and/or opened), and then selecting appropriate cutsettings (e.g., appropriate cutter (blade, laser, etc.) and appropriatelocation, penetration depth, force, shape, etc. of the cut) based uponan analysis of scanned images of the internal contents of the containerand potentially other information.

In some aspects, the approaches provided herein use millimeter wavetechnology to identify the shape and orientation of the products in anopaque container before opened. Once the internal geometry of thecontents of the container is determined, various actions may be takensuch as determining how to open the container and remove the contents.

In one example, the case-opening cut parameters may be determined suchthat the cut does not protrude far enough into the container to damageproducts in the container, but does protrude far enough into thecontainer to cut fully through the container wall. In another example,the cut location(s) may be placed in location where the product surfaceis farthest from the inner container wall, such that the likelihood ofproduct damage is minimized.

In aspects, at least some part of the approaches provided herein occurduring the case opening part of a decantation process (where thecontainer is opened and its contents removed). The automated casecutting process includes stored parameters for the cut action that tookplace. Such parameters include: the type of cutter used (e.g., knifeblade, reciprocal saw blade, circular saw blade, laser), a bladepenetration depth, a blade traversal speed, a saw reciprocation orcirculation rate, a saw reciprocation distance (how far back and forthwhen sawing), laser intensity, and laser distance from surface. Otherexamples are possible.

In many of these embodiments, a system for opening a container includesa scanning surface; a plurality of containers that arrive and aresequentially placed on the scanning surface; a scanning device; asensor; a database that stores a mathematical model; and a containeropening machine that includes at least one cutting tool. The cuttingtool is one or more of a saw blade or a laser, and the cutting tool isapplied to each of the plurality of containers arriving on the scanningsurface to open the container. The system also includes a controlcircuit that is coupled to the database, the scanning device, thesensor, and the container opening machine.

The control circuit is configured to: receive sensor data from thesensor, the sensor data identifying the contents of the container;receive scanned images from the scanning device, the scanned imagesbeing of the contents of the interior of the container; analyze thesensor data and the scanned images to obtain features of the contents ofthe container; apply the features to the mathematical model to produce acutting pattern, the cutting pattern specifying which of the one or morecutting tools to be used and the location of where cuts are to be made;and send the cutting pattern to the container opening machine. Thecontainer opening machine is operated and the container cut and openedby the container opening machine according to the cutting pattern.

In other aspects the cutting pattern further includes the depth of thecuts into the container. In still other examples, the cutting patternfurther includes the speed of the cutting tool.

In examples, the features of the contents include one or more of thedimensions of the contents, the spacing of the contents, the shape ofthe contents, the size of the contents, the number of contents in thecontainer, the monetary value of the contents, and the orientation ofthe contents. Other examples are possible.

In other aspects, the container includes a label or tag that is scannedand the sensor data is sensed from the label or tag. In still otheraspects, the containers include the same type of items. In yet otherexamples, the containers contain different types of items.

In another example, the cutting pattern species that the cutting toolselected is a laser and that the intensity of the laser is adjusted to apredetermined value.

In aspects, the mathematical model is a convolutional neural network(CNN). Other examples are possible.

In other examples, the scanning surface is a conveyor belt. Otherexamples are possible.

In others of these embodiments, a scanning surface, a plurality ofcontainers that arrive and are sequentially placed on the scanningsurface, a scanning device, a sensor and a database that stores amathematical model are provided. A container opening machine thatincludes at least one cutting tool is also provided. The cutting tool isone or more of a saw blade or a laser. The cutting tool is applied toeach of the plurality of containers arriving on the scanning surface toopen the container.

At a control circuit, sensor data is received from the sensor, thesensor data identifying the contents of the container. At the controlcircuit, scanned images are received from the scanning device. Thescanned images are of the contents of the interior of the container.

At the control circuit, the sensor data and the scanned images areanalyzed to obtain features of the contents of the container. At thecontrol circuit, the features are applied to the mathematical model toproduce a cutting pattern. The cutting pattern specifies which of theone or more cutting tools is to be used and the location of where cutsare to be made. The control circuit sends the cutting pattern to thecontainer opening machine. The container opening machine is operated andthe container cut and opened by the container opening machine accordingto the cutting pattern.

Referring now to FIG. 1, a system 100 is configured to open one or morecontainers. The system 100 includes a container opening machine 102, acontrol circuit 104, a database 106, sensors 108, a scanning device 110,a content removal device 112, a first container 114, a second container116, and a scanning surface 118. Some or all of these elements may bedisposed at a warehouse, retail store, or discount center. Otherexamples of locations are possible. In one particular example, theelements are all disposed at a warehouse so that large amounts of datado not have to be moved to or between networks (e.g., the cloud).

The container opening machine 102 is any type of device or combinationof devices that are effective to open (e.g., cut, slash, pierce, and/orremove portions of) the containers 114 and 116. The container openingmachine 102 includes one or more cutting tools (e.g., lasers, circularsaws, reciprocating saws, other saws, drills, blades, knives, or othertypes of tools). The cutting tools may be disposed on a robotic arm thatmoves about the container. The operation of the container openingmachine 102 may be controlled by parameters stored at the containeropening machine 102. For example, the container opening machine 102 mayitself have a control circuit that is operated according to storedparameters or values. One stored value (parameter) may represent thecutting tool (or tools used), another value (parameter) may relate tothe depth of a cut, other parameters may specify the shape of a cut, andstill other parameters may describe other details of the cut or how toobtain the cut. These parameters may be stored at a memory at thecontainer opening machine 102 in any type of data storage format. Itwill be appreciated that the container opening machine 102 may have itsparameters reset upon the opening of each different container.

In other examples, a model (e.g., a convolutional neural network (CNN)model) may represent containers and the cutting patterns. The CNN modelmay be stored in the database 106. In aspects, the CNN model is firsttrained with training data from various containers. The training altersthe layers, weights, and other parameters of the model. After thetraining process is completed, a particular container is scanned toobtain images of its contents, and a label (or other identifier) on theparticular container is scanned (e.g., to obtain information that maynot be determined by image analysis such as the monetary value of itemsin the container). Information obtained from the images and/or the labelis applied to the CNN model to obtain a pattern that can be used by thecontainer opening machine 102 to open the particular container. One ormore CNN models can be used. In other examples, the model may be aseries of equations, a flowchart (implemented as computer code), orother elements.

In aspects, when the containers 114 and 116 are opened, a cuttingpattern is used to perform or make the opening. By pattern, it is meantone or more of: the location of cuts in or at the container, thedimensions (length, width, depth) of the cuts, the amount of forceapplied to the cuts (e.g., when the tool is a saw), the intensity of thelaser beam (when the cutting tool is a laser), and the amount of timethe tool is used. In other aspects, the pattern also includes theidentity of the tool (or tools used), when these tools are used, and howthese tools are used (e.g., one tool may be used to open one portion ofa container and another tool used to open another portion of acontainer). Other examples are possible.

It will be appreciated that as used herein the term “control circuit”refers broadly to any microcontroller, computer, or processor-baseddevice with processor, memory, and programmable input/outputperipherals, which is generally designed to govern the operation ofother components and devices. It is further understood to include commonaccompanying accessory devices, including memory, transceivers forcommunication with other components and devices, etc. Thesearchitectural options are well known and understood in the art andrequire no further description here. The control circuit 104 may beconfigured (for example, by using corresponding programming stored in amemory as will be well understood by those skilled in the art) to carryout one or more of the steps, actions, and/or functions describedherein.

The database 106 is any type of electronic memory storage device orcomputer memory. The sensors 108 are any type of sensors that readinformation from the containers 114 and 116. For example, the sensors108 may be RFID (or label) sensors that read RFID tags (or labels suchas barcodes) on the containers 114 and 116. The tags or labels haveassociated with the containers 114 and 116 have associated information.For example, a label may be encoded with information including the typeof items in a container, the value of items in a container, the numberof items in a container, the dimensions of items in a container, or anyother characteristic of items in a container. The information may alsouniquely identify the container (e.g., the label may be a barcode with acontainer ID). This information may be of the type difficult orimpossible to obtain via image analysis (e.g., information such as aprecise monetary value of the items in a container).

The scanning device 110 is any type of scanning device that obtainsimages of the contents of the container 114 and container 116. Inaspects, the scanning device 110 obtains images using millimeter wavetechnology (obtaining images to identify the shape and orientation ofthe products or items in the container 114 and 116). Other examples(e.g., that obtain images in other radiation frequencies) such as x-raysmay also be use. In examples, the scanning device 110 transmitsmillimeter waves from antennas. The wave energy reflected back from thecontainer and the contents of the containers 114 and 116 is used toconstruct images, which can be analyzed by the control circuit 104.

In other examples, different types of scanning technology and devicescan be used for different purposes (e.g., obtain images or informationabout different aspects and/or contents of a container). In other words,multiple scanning devices using different types of scanning technologycan be deployed. In one example, a camera (a first scanning device)obtains images in the visible light spectrum of the outside of thecontainer, while a second scanning device (using a different scanningtechnology) such as millimeter wave technology is used to obtain imagesof the contents of the container. In this example, a first analysis canbe undertaken of the visible light camera images, while a secondanalysis can be performed on images (or other obtained information)obtained from the scans made by the millimeter technology. In this way,information about the container itself (e.g., damage) and informationabout the contents of the container is obtained. It will be appreciatedthat different types of technology including millimeter, x-ray,acoustic, ultrasound, visible light and combinations of these can beused.

In still other examples, more than two types of technology can be usedto obtain information concerning the container and/or contents of thecontainer. For example a first scanning device is used to obtain visiblelight images of the exterior of the container. A second scanning deviceutilizes millimeter scanning technology to obtain images concerning thecontents of the container. A third scanning device utilizes a differenttype of scanning technology such as x-rays either to obtain additionalinformation about the contents and/or confirm information obtained bythe first and/or scanning devices.

The content removal device 112 is any type of device or combination ofdevices that can removed the contents of the containers 114 and 116. Inexamples, the content removal device 112 may be a robot with arms,levers, and grips that are operated to remove the contents of thecontainers 114 and 116 once the containers are opened.

The first container 114 and the second container 116 are any type ofstructure that holds items, for example, as the items are shipped from afirst location to a second location. The containers 114 and 116 may havewalls that are opaque in that humans or machines cannot see into thecontainers and cannot ascertain the contents of the containers. In otherwords, the contents of the containers are ordinarily hidden withoutusing images obtained by the canning device 110. In examples, thecontainers may be cardboard container, constructed of metal, orconstructed of plastic. Other examples are possible. Various types ofitems may be shipped in the containers. For example, bottles, cans,other boxes, and various other items may be placed in the containers 114and 116.

The scanning surface 118 may be any type of surface such as a flatsurface where the containers 114 and 116 can be disposed as thecontainers are opened. In other aspects, the scanning surface 118 is aconveyor belt that sequentially moves the containers 114 and 116 overtime. For example, the conveyor belt first moves the container 114 to afirst position, and the scanning device 110 obtains an image of thecontents. The sensors 108 also scan a label on the container 114 toobtain product information. Based upon the images and the informationfrom the scanning device 110, a pattern is selected by the controlcircuit 104. The container opening machine 102 then opens the container114 according to the pattern from the same location or after theconveyor moves the container to a new location. Then, the container 114is moved to the content removal machine 112 where the contents of thecontainer 114 are removed from the container 114. Alternatively, thecontainer 114 may stay at the same location. The same procedure isfollowed for the container 116 as the container 116 follows thecontainer 114 sequentially in time on the conveyor belt.

In examples, the various factors applied to the model can be weighted inimportance. For example, the cost of items may be viewed as moreimportant than the tool to be used to do the cutting. The weights canthen be used to influence the selection of the pattern.

In one example of the operation of the system of FIG. 1, the controlcircuit 104 receives sensor data from the sensors 108. The sensor dataidentifies the contents of the containers 114 and 116 and may alsoinclude identifiers that uniquely identify the containers 114 and 116.At the control circuit 104, scanned images are received from thescanning device 110. The scanned images are of the contents of theinterior of the containers 114 and 116 and may also identify thecontainer.

At the control circuit 104, the sensor data and the scanned images areanalyzed to obtain features of the contents of the containers 114 and116. The analysis may include any technique known to those skilled inthe art to obtain the features (e.g., the shape of an item in acontainer, the material a container is constructed, the amount of emptyspace in the container). For instance, obtained images can be comparedto images of known shapes to determine the specific shapes of items in aparticular container.

At the control circuit 104, the features are applied to the mathematicalmodel to produce a cutting pattern. The cutting pattern specifies whichof the one or more cutting tools is to be used and the location of wherecuts are to be made. The control circuit 104 sends the cutting patternto the container opening machine 102. The container opening machine 102is operated and the container cut and opened by the container openingmachine 102 according to the cutting pattern.

Referring now to FIG. 2, one example of an approach for opening andremoving the contents of containers is described. At step 202, ascanning surface, a plurality of containers (that arrive and aresequentially placed on the scanning surface), a scanning device, asensor and a database that stores a mathematical model are provided. Atstep 204, a container opening machine that includes at least one cuttingtool is also provided. The cutting tool is one or more of a saw blade ora laser. The cutting tool is applied to each of the plurality ofcontainers arriving on the scanning surface to open the container.

At step 206 and at a control circuit, sensor data is received from thesensor. The sensor data identifies the contents of the container and/oruniquely identifies the container. At step 208 and at the controlcircuit, scanned images are received from the scanning device. Thescanned images are of the contents of the interior of the container. Inone example, the scanned images are obtained using millimeter sensingtechnology.

At step 210 and at the control circuit, the sensor data and the scannedimages are analyzed to obtain features of the contents of the container.Image processing techniques know to those skilled in the art can be usedto discern from the images features of the container and/or items in thecontainer. These features may include one or more of: the dimensions ofthe contents, the spacing of the contents, the shape of the contents,the size of the contents, the number of contents in the container, themonetary value of the contents, the orientation of the contents, thematerial from which the container or contents is constructed, or othercharacteristics of the contents and/or the container.

At step 212 and at the control circuit, the features are applied to themathematical model to produce a cutting pattern. In one example, themodel is a CNN model. In other examples, the model is an algorithmimplemented as computer code that is executed by a control circuit.Other examples of models are possible. In aspects, the cutting patternspecifies which of the one or more cutting tools is to be used and thelocation of where cuts are to be made. Other types of information andparameters can also be supplied by the pattern.

At step 214, the control circuit sends or transmits the cutting patternto the container opening machine. The sending may be accomplished acrossany wired and/or wireless communication link.

At step 216, the container opening machine is operated and the containercut and opened by the container opening machine according to the cuttingpattern.

Referring now to FIG. 3, one example of a decantation process (how thecontents are opened and removed from a container) is described. It willbe appreciated that the cut method is the method used for cutting oropening as case such as annual, a robotic arm with a blade, or a laserto mention a few examples. It will be understood that the cut type isthe type of cut applied to the case such as a window-type cut (e.g.,such as a window opening on any structure for case replenishment, or a4-sided cut). “Decant method” refers to how the contents of the case areremoved from the case such as dumping. Further, it will be appreciatedthat the terms “container” and “case” are used interchangeably herein.It will be additionally be understood that the various ones of thesesteps may be performed by a control circuit that is analyzing images orprocessing other inputs. Furthermore, the contents of cases may bedisposed in product totes, which are containers that can be used tostore, transport, and/or display products to customers in retail stores.

At step 302, the case or container is identified. In one example, alabel on the container is read and in another example, an RFID tag isread. The information read may include information that identifies thecontainer (e.g., has a container number or other identifier thatuniquely identifies the container and other information such as thecontents of the container or the monetary value of the contents).

At step 304, a computer vison scan of the case or container is made. Thescan obtains images (e.g., in visible light) that shows damage to thecase.

At step 306 and based, for example on the scan of step 304, it isdetermined if the case is damaged. If the answer is affirmative,execution continues at step 308 where the case is physically routed andmoved to a damage processing area, where, for example, a determinationcan be made as to whether to dispose of the case. Execution then ends.

If the answer at step 306 is negative, at step 310 a scanner obtainsimages using millimeter sensing technology to scan through the opaquewalls of the container to identify, for example, the shape, disposition,and other information regarding the contents of the case or container.

At step 312 and based, for example on the scan of step 310, it isdetermined if the contents of the case are damaged. If the answer isaffirmative, execution continues at step 308 as described above. If theanswer is negative, then execution continues with step 314.

At step 314, it is determined if the case associated with a new caseidentifier (a case not processed before). If the answer is affirmative,execution continues at step 326. If the answer is negative, executioncontinues at step 316.

At step 316, it is determined whether the contents appear to be the sameas they were at a previous time. If the answer is negative, executioncontinues with step 326. If the answer is affirmative, executioncontinues with step 318.

At step 318, it is determined whether the decant settings (e.g., allinputs for decanting a case, for instance the type of tote the contentswere placed) appear to be the same as they were at a previous time. Ifthe answer is negative, execution continues with step 326. If the answeris affirmative, execution continues with step 320.

At step 320, it is determined whether the previous decant (removal ofthe contents) at a previous time was successful. If the answer isnegative, execution continues with step 322. If the answer isaffirmative, execution continues with step 324.

At step 322, it is determined if the cause for the unsuccessful decantwas identified and the settings adjusted. If the answer is negative,then execution continues at step 326. If the answer is affirmative, thenexecution continues at step 324.

At step 324, the cutting of the container is made with the previoussettings. Execution continues at step 364.

At step 326, it is determined if the material of the case is compatiblewith the tools used to remove or cut the case. If the answer isnegative, execution continues at step 328 and if the answer isaffirmative, execution continues with step 330.

At step 328, the case is routed to be manually cut and decanted.Execution then ends.

At step 330, it is determined if the position of the contents iscompatible with the cutting tools, cutting pattern, or other cuttingparameter to be used. If the answer is negative, then, step 328 isexecuted as described above. If the answer is affirmative, step 332 isexecuted.

At step 332, it is determined if the case or its contents is of highvalue (e.g., each of the contents or all of the contents together have amonetary value above a threshold). If the answer is affirmative, step328 is executed as described above. If the answer is negative, executioncontinues with step 334.

At step 334, it is determined if the case or contents have a mediumvalue (e.g., each of the contents or all of the contents together have amonetary value between a first and a second threshold). If the answer isaffirmative, step 336 is executed. If the answer is negative, executioncontinues with step 338.

At step 336, the cutting depth is reduced. At step 338, the destinationtype is determined. The destination type specifies whether the case isbeing replenished as a full case or whether the contents are beingremoved to be placed in a tote. If the destination is a tote, step 342is executed. If the destination is not a tote, but to simply use thecase as a full case to display or present the products, then step 340 isexecuted. At step 340, a window cut (to show the products) is made tothe container with a blade. Execution then ends.

At step 342, a determination is made if the case or items in the caseare fragile. If the answer is affirmative, then execution continues withstep 350. If the answer is negative, execution continues with step 344.This information can come from analyzing container images, human input,or from label information from the container.

At step 344, a determination is made as to whether the items in the caseneed to be rearranged. If the answer is affirmative, execution continueswith step 350. If the answer is negative, execution continues with step346.

At step 346, a determination is made as to whether the items in the caseneed to be reoriented. If the answer is affirmative, execution continueswith step 350. If the answer is negative, execution continues with step348.

At step 348, the contents of the case can dumped into a tote (by a humanor a robot) without a special procedure. Next, at step 352, adetermination is made as to whether there is empty space in thecontainer for the cut path of a cutting tool. If the answer is emptyspace exists at the top of the container (above), step 354 is executedwhere a cut from above is selected; if the answer is there is emptyspace at the bottom of the container, at step 356 a cut from below isused is used. Execution continues at step 364.

At step 350, the contents of the case are dumped (by a human or a robot)into a tote individually in a specified manner. At step 358, adetermination is made as to whether there is empty space in thecontainer for the cut path of the cutting tool. If the answer isnegative, step 360 is executed where a default blade cut reduced depthis used; if the answer is affirmative, at step 362 a four-sided cut witha blade at a height within the empty space is used. Execution continuesat step 364.

At step 364, a millimeter wave scan is made of the case and the contentsis made. At step 366, it is determined if damage to the case or contentsexists. If the answer is negative, execution continues with step 368. Ifthe answer is affirmative, execution continues with step 374.

At step 368, it is determined if the case is compatible with dumping thecontents (by a human or a robot) into a tote. If the answer isaffirmative, at step 370, the entire contents of the case are dumpedinto the tote. If the answer is negative, at step 372, the contents ofthe case are put (decanted) into the tote individually, one-by-one.

At step 374, the case is routed to a damage processing area. Next, atstep 376, a determination is made if empty space exists in the case. Ifthe answer is negative, at step 378, the case is flagged for manuallydecanting and execution ends.

If the answer is affirmative at step 376, at step 380 a determination ismade as to whether to cut along the empty space. If the answer isaffirmative, cut depth is reduced and execution ends. If the answer isnegative, the height of the cut is adjusted and execution ends.

Referring now to FIG. 4, one example of determining a cutting pattern isdescribed. The example of FIG. 4 is, in aspects, a model implemented asan algorithm (or a lookup table) but it will be appreciated that itcould also be implemented as a CNN model.

At step 402, image analysis determines that a shape of an item is anon-bottle shape 404 or a bottle shape 406. Image analysis alsoindicates locations 408 and 410 of the items in a container as beingnear the top of the container (labeled as 412 and 416) or distant fromthe top of the container (by a predetermined distance and labeled as 414and 418). Based upon the item shape and location, specific cuttingpatterns (labeled as 420, 422, 424, and 426) are selected.

In one example, a non-bottle shape near the top selects pattern 420(pattern 1). In another example, a non-bottle shape distant from the topselects pattern 422 (pattern 2). In yet another example, bottle shapenear the top selects pattern 424 (pattern 3). In still another example,a bottle shape distant from the top selects pattern 426 (pattern 2). Thepatterns 1, 2, and 3 are unique combination of parameters that set theoperation of the container opening machine (e.g., the container openingmachine 102) as described elsewhere herein.

Referring now to FIG. 5, one example of mapping a pattern to parameterson a container opening machine is described. A control circuit 502generates a cutting pattern 504. The cutting pattern 504 has firstfeature 506 (specifying the cutting tool or tools used, e.g., a saw), asecond feature 508 (specifying a cutting depth); and a third feature 510(specifying a cutting shape).

The features 506, 508, and 510 are mapped to container opening machine512. More specifically, the first feature 506 maps to a first parameter514; the second feature 508 maps to a second parameter 516; and thethird feature 510 maps to a third parameter 518. In examples, theparameters 514, 516, and 518 are implemented as memory locations thathave values that are set (and are changed as the patterns change). Inoperation, the container opening machine 512 utilizes these values touse, direct, and control a cutting tool that opens a container.

In some embodiments, one or more of the exemplary embodiments includeone or more localized IoT devices and controllers (e.g., included withor associated with the various scanners, sensors, cameras, or robotsdescribed herein). In another aspect, the sensors, cameras, or robotsmay be seen as an IoT device. As a result, in an exemplary embodiment,the localized IoT devices and controllers can perform most, if not all,of the computational load and associated monitoring and then laterasynchronous uploading of data can be performed by a designated one ofthe IoT devices to a remote server. In this manner, the computationaleffort of the overall system may be reduced significantly. For example,whenever localized monitoring allows remote transmission, secondaryutilization of controllers keeps securing data for other IoT devices andpermits periodic asynchronous uploading of the summary data to theremote server. In addition, in an exemplary embodiment, the periodicasynchronous uploading of data may include a key kernel index summary ofthe data as created under nominal conditions. In an exemplaryembodiment, the kernel encodes relatively recently acquired intermittentdata (“KRI”). As a result, in an exemplary embodiment, KM includes acontinuously utilized near term source of data, but KM may be discardeddepending upon the degree to which such KM has any value based on localprocessing and evaluation of such KM. In an exemplary embodiment, KRImay not even be utilized in any form if it is determined that KM istransient and may be considered as signal noise. Furthermore, in anexemplary embodiment, the kernel rejects generic data (“KRG”) byfiltering incoming raw data using a stochastic filter that provides apredictive model of one or more future states of the system and canthereby filter out data that is not consistent with the modeled futurestates which may, for example, reflect generic background data. In anexemplary embodiment, KRG incrementally sequences all future undefinedcached kernels of data in order to filter out data that may reflectgeneric background data. In an exemplary embodiment, KRG incrementallysequences all future undefined cached kernels having encodedasynchronous data in order to filter out data that may reflect genericbackground data. In a further exemplary embodiment, the kernel willfilter out noisy data (“KRN”). In an exemplary embodiment, KRN, like KM,includes substantially a continuously utilized near term source of data,but KRN may be retained in order to provide a predictive model of noisydata. In an exemplary embodiment, KRN and KRI, also incrementallysequences all future undefined cached kernels having encodedasynchronous data in order to filter out data that may reflect genericbackground data.

Those skilled in the art will recognize that a wide variety ofmodifications, alterations, and combinations can be made with respect tothe above described embodiments without departing from the scope of theinvention, and that such modifications, alterations, and combinationsare to be viewed as being within the ambit of the inventive concept.

What is claimed is:
 1. A system for opening a container, the systemcomprising: a scanning surface; a plurality of containers that arriveand are sequentially placed on the scanning surface; a scanning device;a sensor; a database that stores a mathematical model; a containeropening machine including at least one cutting tool, the at least onecutting tool being one or more of a saw blade or a laser, wherein the atleast one cutting tool is applied to each of the plurality of containersarriving on the scanning surface to open the container; a controlcircuit coupled to the database, the scanning device, the sensor, andthe container opening machine, wherein the control circuit is configuredto: receive sensor data from the sensor, the sensor data identifying thecontents of the container; receive scanned images from the scanningdevice, the scanned images being of the contents of the interior of thecontainer; analyze the sensor data and the scanned images to obtainfeatures of the contents of the container; apply the features to themathematical model to produce a cutting pattern, the cutting patternspecifying which of the one or more cutting tools to be used and thelocation of where cuts are to be made; send the cutting pattern to thecontainer opening machine; wherein the container opening machine isoperated and the container cut and opened by the container openingmachine according to the cutting pattern.
 2. The system of claim 1,wherein the cutting pattern further includes the depth of the cuts intothe container.
 3. The system of claim 1, wherein the cutting patternfurther includes the speed of the cutting tool.
 4. The system of claim1, wherein the features of the contents include one or more of thedimensions of the contents, the spacing of the contents, the shape ofthe contents, the size of the contents, the number of contents in thecontainer, the monetary value of the contents, and the orientation ofthe contents.
 5. The system of claim 1, wherein the container includes alabel or tag that is scanned and the sensor data is sensed from thelabel or tag.
 6. The system of claim 1, wherein the containers includethe same type of items.
 7. The system of claim 1, wherein the cuttingpattern species that cutting tool selected is a laser and that theintensity of the laser is adjusted to a predetermined value.
 8. Thesystem of claim 1, wherein the mathematical model is a convolutionalneural network (CNN).
 9. The system of claim 1, wherein the scanningsurface is a conveyor belt.
 10. A method for opening a container, themethod comprising: providing a scanning surface, a plurality ofcontainers that arrive and are sequentially placed on the scanningsurface, a scanning device, a sensor and a database that stores amathematical model; providing a container opening machine that includesat least one cutting tool, the at least one cutting tool being one ormore of a saw blade or a laser, wherein the at least one cutting tool isapplied to each of the plurality of containers arriving on the scanningsurface to open the container; at a control circuit, receiving sensordata from the sensor, the sensor data identifying the contents of thecontainer; at the control circuit, receiving scanned images from thescanning device, the scanned images being of the contents of theinterior of the container; at the control circuit, analyzing the sensordata and the scanned images to obtain features of the contents of thecontainer; at the control circuit, applying the features to themathematical model to produce a cutting pattern, the cutting patternspecifying which of the one or more cutting tools to be used and thelocation of where cuts are to be made; by the control circuit, sendingthe cutting pattern to the container opening machine; wherein thecontainer opening machine is operated and the container cut and openedby the container opening machine according to the cutting pattern. 11.The method of claim 10, wherein the cutting pattern further includes thedepth of the cuts into the container.
 12. The method of claim 10,wherein the cutting pattern further includes the speed of the cuttingtool.
 13. The method of claim 10, wherein the features of the contentsinclude one or more of the dimensions of the contents, the spacing ofthe contents, the shape of the contents, the size of the contents, thenumber of contents in the container, the monetary value of the contents,and the orientation of the contents.
 14. The method of claim 10, whereinthe container includes a label or tag that is scanned and the sensordata is sensed from the label or tag.
 15. The method of claim 10,wherein the containers include the same type of items.
 16. The method ofclaim 10, wherein the cutting pattern species that cutting tool selectedis a laser and that the intensity of the laser is adjusted to apredetermined value.
 17. The method of claim 10, wherein themathematical model is a convolutional neural network (CNN).
 18. Themethod of claim 10, wherein the scanning surface is a conveyor belt.