Patent classifications
G08B29/20
SECURITY ECOSYSTEM, DEVICE AND METHOD FOR DISTRIBUTING PHYSICAL RESOURCES BASED ON WORKFLOW INTERACTIONS
A security ecosystem, device and method for distributing physical resources based on workflow interactions is provided. A computing device determines that a trigger, of a safety-workflow, has occurred, comprising: determining, from distribution-tracking data, that distribution of physical resources in a region meets a suboptimal-distribution condition. In response, the computing device implement a first responsive action, of the safety-workflow, comprising generating an indication of the distribution of the physical resources in the region at an electronic map. The computing device implements an analysis component, of the safety-workflow, comprising: determining whether the distribution of the physical resources meeting the suboptimal-distribution condition meets a predetermined exemption condition. In response to the predetermined exemption condition not being met, the computing device implements a second responsive action, of the safety workflow, comprising: providing an alert to one or more notification devices identifying that the distribution of the physical resources meets the suboptimal-distribution condition.
SECURITY ECOSYSTEM, DEVICE AND METHOD FOR DISTRIBUTING PHYSICAL RESOURCES BASED ON WORKFLOW INTERACTIONS
A security ecosystem, device and method for distributing physical resources based on workflow interactions is provided. A computing device determines that a trigger, of a safety-workflow, has occurred, comprising: determining, from distribution-tracking data, that distribution of physical resources in a region meets a suboptimal-distribution condition. In response, the computing device implement a first responsive action, of the safety-workflow, comprising generating an indication of the distribution of the physical resources in the region at an electronic map. The computing device implements an analysis component, of the safety-workflow, comprising: determining whether the distribution of the physical resources meeting the suboptimal-distribution condition meets a predetermined exemption condition. In response to the predetermined exemption condition not being met, the computing device implements a second responsive action, of the safety workflow, comprising: providing an alert to one or more notification devices identifying that the distribution of the physical resources meets the suboptimal-distribution condition.
Smoke detection
Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.
Smoke detection
Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.
SELF-CONFIGURING SENSING DEVICE
A self-configuring sensor and method of operation of the sensor is described. In one embodiment, the self-configuring sensor comprises a first sub-sensor for determining a first status of a door or window, a second sub-sensor for determining a second status of the door or window, a wireless transmitter, a memory for storing processor-executable instructions, and a processor coupled to the first sub-sensor, the second sub-sensor, the wireless transmitter and the memory for executing the processor-executable instructions that cause the sensor to monitor the first and second sub-sensors for detecting changes in a first sub-sensor state and a second sub-sensor state, respectively, and determine an installation configuration based on the changes in the first sub-sensor state and the second sub-sensor state, the installation configuration comprising a type of hardware where the self-configuring sensor has been installed.
Sensor apparatuses and methods
Aspects of the present disclosure are directed to sensing apparatuses and methods. As may be implemented in accordance with one or more embodiments, analog signals are obtained from a plurality of sensors and used to provide an output for particular ones of the sensors as follows. Analog signals are obtained from a particular sensor and one or more adjacent sensors. Different weighting factors are applied to the analog signals, based on the position of the sensor or sensors. The signals with the weighting factors applied thereto are combined to provide an output signal.
INTELLIGENT MEDICAL ESCALATION PROCESS
A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking service. The medical network service in certain embodiments can provide networking services via software as a service technologies, platform as a service technologies, and/or infrastructure as a service technologies. The medical network service can provide these services to large existing clinical facilities such as metropolitan hospitals as well as to smaller clinical facilities such as specialized surgical centers. The medical network service can replace and/or supplement existing IT networks in hospitals and other clinical facilities and can therefore reduce costs and increase security and reliability of those networks. In addition, the medical network service can provide synergistic benefits that can improve patient outcomes and patient care. In addition, a medical edge router can provide redundant communications features for transmitting patient data to the medical network service.
INTELLIGENT MEDICAL ESCALATION PROCESS
A medical network service can replace or supplement some or all of an expensive internally staffed clinical facility network with a cloud-based networking service. The medical network service in certain embodiments can provide networking services via software as a service technologies, platform as a service technologies, and/or infrastructure as a service technologies. The medical network service can provide these services to large existing clinical facilities such as metropolitan hospitals as well as to smaller clinical facilities such as specialized surgical centers. The medical network service can replace and/or supplement existing IT networks in hospitals and other clinical facilities and can therefore reduce costs and increase security and reliability of those networks. In addition, the medical network service can provide synergistic benefits that can improve patient outcomes and patient care. In addition, a medical edge router can provide redundant communications features for transmitting patient data to the medical network service.
Audio monitoring and sound identification process for remote alarms
In a method for remote monitoring of alarms, first and second audio test signals, generated by first and second alarm devices at first and second locations, respectively, are sensed, with both alarm devices corresponding to the same alarm type. For each alarm device, the respective audio test signal is processed to generate alarm identification data. An audio signal that the first alarm device generated in response to detecting an alarm condition (e.g., a fire, smoke, etc.) is sensed, and processed according to an audio recognition technique, and using the generated alarm identification data, to identify the alarm device that generated the audio signal. A notification is then caused to be sent to a user. The notification includes the location of the first alarm device.
CONTACT SENSOR WITH MASKING DETECTION FEATURE
A contact sensor includes a permanent magnet, first and second magnetic field sensors, and a computing device in communication with the first and second magnetic field sensors and configured to execute an “Open/Close” function to generate an “Open/Close” decision, and a “Masking” function to generate a “Masking” decision, based on at least one of a first measurement from the first magnetic field sensor or a second measurement from and the second magnetic field sensor.