In schools, a safety and security challenge is to ensure that students with adversarial relationships do not get into adversarial incidents, such as fights and the like.
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.
The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
In schools, a safety and security challenge is to ensure that students with adversarial relationships do not get into adversarial incidents, such as fights, bullying, arguments and the like. Such adversarial relationships may be determined from school records, analysis of video, and the like. Furthermore, schedule data of the students may be used to determine where and when students with adversarial relationships are most likely to cross paths, for example during a school day, by determining previous and next classroom locations of the students and a path therebetween. However, previous and next locations of the students may not be classrooms, but any suitable location associated with a school; for example, the schedule data may be a class schedule of the students and/or include locations of the students at particular times during school hours (e.g., determined via video surveillance of the school, and the like). Monitors, such as teachers, may be assigned to move to the locations, and times, where the students with adversarial relationships are most likely to cross paths to prevent the students from fighting, and the like. A combination of a crosspath location and time is referred to herein as a spatiotemporal crosspath, as a crosspath location may be associated with both an estimated location and estimated time that the students may cross paths. Indeed, a given spatiotemporal crosspath may identify a respective location and a respective time at the school where two or more of the students having an adversarial relationship are predicted and/or estimated to cross paths. For example, students may cross paths during passing periods; for example, a passing period may be a time period that students change classes and/or locations, and a non-passing period may be a time period in which students (e.g., and teachers) are in class.
An aspect of the present specification provides a method comprising: accessing, at a computing device, adversarial relationship data identifying adversarial relationships between students at a school; accessing, at the computing device, schedule data indicative of spatiotemporal locations of the students having the adversarial relationships; determining, at the computing device, based on the schedule data, spatiotemporal crosspaths at the school of the students having the adversarial relationships; determining, at the computing device, a ranking of the spatiotemporal crosspaths; assigning, based on the ranking, one or more monitors to one or more of the spatiotemporal crosspaths; and transmitting, at the computing device, notifications to communication devices associated with the one or more monitors, the notifications to instruct the one or more monitors to move to a respective assigned spatiotemporal crosspath.
Another aspect of the present specification provides a device comprising: a communication unit; and a controller in communication with the communication unit and having access to one or more memories storing: adversarial relationship data identifying adversarial relationships between students at a school; and schedule data indicative of spatiotemporal locations of the students having the adversarial relationships, the controller configured to: access the adversarial relationship data and the schedule data; determine, based on the schedule data, spatiotemporal crosspaths at the school of the students having the adversarial relationships; determine a ranking of the spatiotemporal crosspaths; assign one or more monitors to one or more of the spatiotemporal crosspaths; and transmit, via the communication unit, notifications to communication devices associated with the one or more monitors, the notifications to instruct the one or more monitors to move to a respective assigned spatiotemporal crosspath.
Attention is directed to
As depicted, the database 103 further stores monitor data 115 indicating schedules, locations, and types of monitors associated with the school (e.g., teacher, other school staff such as an administrator and/or principal and/or a vice-principal, a nurse and/or guidance counselor, a volunteer, a hall monitor, a security guard and/or anyone else who may perform a monitoring function at the school). While as depicted the monitor data 115 is separate from the schedule data 113, in other examples, the monitor data 115 may be incorporated into the schedule data 113.
As depicted, the database 103 further stores a map 117 of the school (e.g., including, but not limited, to a map of the school building and/or grounds of the school such as floorplans, network path graphs between classrooms, or other digitally stored representations).
While a particular database structure is depicted in
A location included in or referenced by the adversarial relationship data 111, the schedule data 113, the monitor data 115 and/or the map 117 may comprise one or more of: Global Positioning System (GPS) coordinates, indoor location coordinates, map or floorplan coordinates (e.g., of the map 117) and/or a map and/or textual descriptive school locations (e.g., “Class A”, “Gym” and the like). In some examples, map and/or school locations may be associated with locations of the map 117 and/or associated GPS coordinates and/or map coordinates.
In
The adversarial relationship data 111 may generally comprise one or more of:
The schedule data 113 may comprise one or more of:
The monitor data 115 may include one or more of:
The adversarial relationship data 111, the schedule data 113 and the monitor data 115 may be updated periodically, for example as adversarial relationships and/or schedules of the students change, and/or as schedules and/or classroom locations of the monitors 121 change and/or are updated and/or are generated, and the like.
The map 117 of the school is understood to comprise an electronic map of the school and may include identifiers of the various locations of the schedule data 113 and/or the monitor data 115. While as depicted the map 117 is separate from the schedule data 113 and/or the monitor data 115, in other examples, the map 117 may be incorporated into the schedule data 113 and/or the monitor data 115. Regardless, spatiotemporal crosspaths at the school of the students having the adversarial relationships may be determined via the map 117, for example to determine paths between locations.
As depicted, the device 101 is in communication with communication devices 131 via respective communication links. While the communication devices 131 are depicted as mobile communication devices (e.g., such as a mobile radio and/or a cellphone and the like), one or more of the communication devices 131 may comprise a fixed position communication device, such as personal computer at a teacher's classroom, and the like.
Furthermore, the device 101 may generally communicate with the communication devices 131 to cause the monitors 121 to move to a respective assigned spatiotemporal crosspath, for example via notifications, as described below.
Attention is next directed to
As depicted, the device 101 comprises: a communication unit 202, a processing unit 203, a Random-Access Memory (RAM) 204, one or more wireless transceivers 208, one or more wired and/or wireless input/output (I/O) interfaces 209, a combined modulator/demodulator 210, a code Read Only Memory (ROM) 212, a common data and address bus 217, a controller 220, and a static memory 222 storing at least one application 223. Hereafter, the at least one application 223 will be interchangeably referred to as the application 223. In some examples, the memory 222 may also store the database 103 and/or a portion of the database 103 and/or a portion of one or more of the adversarial relationship data 111, the schedule data 113, the monitor data 115, and the map 117.
While not depicted, the device 101 may include one or more of an input device and a display screen and the like, a microphone (e.g., to receive voice commands) such that a user may interact with the device 101.
As shown in
The processing unit 203 may include the code Read Only Memory (ROM) 212 coupled to the common data and address bus 217 for storing data for initializing system components. The processing unit 203 may further include the controller 220 coupled, by the common data and address bus 217, to the Random-Access Memory 204 and the static memory 222.
The communication unit 202 may include one or more wired and/or wireless input/output (I/O) interfaces 209 that are configurable to communicate with the communication devices 131. For example, the communication unit 202 may include one or more transceivers 208 and/or wireless transceivers for communicating with the communication devices 131. Hence, the one or more transceivers 208 may be adapted for communication with one or more communication networks used to communicate with the communication devices 131. For example, the one or more transceivers 208 may be adapted for communication with one or more of the Internet, a Bluetooth network, a Wi-Fi network, for example operating in accordance with an IEEE 802.11 standard (e.g., 802.11a, 802.11b, 802.11g), an LTE (Long-Term Evolution) network and/or other types of GSM (Global System for Mobile communications) networks, a Worldwide Interoperability for Microwave Access (WiMAX) network, for example operating in accordance with an IEEE 802.16 standard, and/or another similar type of wireless network. Hence, the one or more transceivers 208 may include, but are not limited to, a cell phone transceiver, a Bluetooth transceiver, a Wi-Fi transceiver, a WiMAX transceiver, and/or another similar type of wireless transceiver configurable to communicate via a wireless radio network.
The communication unit 202 may optionally include one or more wireline transceivers 208, such as an Ethernet transceiver, a USB (Universal Serial Bus) transceiver, or similar transceiver configurable to communicate via a twisted pair wire, a coaxial cable, a fiber-optic link, or a similar physical connection to a wireline network. The transceiver 208 is also coupled to a combined modulator/demodulator 210.
The controller 220 may include ports (e.g., hardware ports) for coupling to other hardware components.
The controller 220 includes one or more logic circuits, one or more processors, one or more microprocessors, one or more ASIC (application-specific integrated circuits) and one or more FPGA (field-programmable gate arrays), and/or another electronic device. In some examples, the controller 220 and/or the device 101 is not a generic controller and/or a generic device, but a device specifically configured to implement functionality for positioning monitors in schools. For example, in some examples, the device 101 and/or the controller 220 specifically comprises a computer executable engine configured to implement functionality for positioning monitors in schools.
The static memory 222 is a non-transitory machine readable medium that stores machine readable instructions to implement one or more programs or applications. Example machine readable media include a non-volatile storage unit (e.g., Erasable Electronic Programmable Read Only Memory (“EEPROM”), Flash Memory) and/or a volatile storage unit (e.g., random-access memory (“RAM”)). In the example of
In particular, the memory 222 stores instructions corresponding to the at least one application 223 that, when executed by the controller 220, enables the controller 220 to implement functionality for positioning monitors in schools including, but not limited to, the blocks of the method set forth in
The application 223 may include numerical algorithms to one or more of: determine (e.g., based on the schedule data 113), spatiotemporal crosspaths at the school of students having the adversarial relationships; determine a ranking of the spatiotemporal crosspaths; and assign, based on the ranking, one or more monitors 121 to one or more of the spatiotemporal crosspaths.
Alternatively, the application 223 may include machine learning and/or deep-learning based algorithms and/or neural networks, and the like, which have been trained to one or more of: determine (e.g., based on the schedule data 113), spatiotemporal crosspaths at the school of students having the adversarial relationships; determine a ranking of the spatiotemporal crosspaths; and assign, based on the ranking, one or more monitors 121 to one or more of the spatiotemporal crosspaths, and/or any other suitable function. Furthermore, in these examples, the application 223 may initially be operated by the controller 220 in a training mode to train the machine learning and/or deep-learning based algorithms and/or neural networks of the application 223 to one or more of: determine (e.g., based on the schedule data 113), spatiotemporal crosspaths at the school of students having the adversarial relationships; determine a ranking of the spatiotemporal crosspaths; and assign, based on the ranking, one or more monitors 121 to one or more of the spatiotemporal crosspaths; and/or any other suitable function. Furthermore, training of the machine learning and/or deep-learning based algorithms and/or neural networks, and the like may continue as adversarial relationship data 111, the schedule data 113 and/or the monitor data 115 is updated.
The one or more machine learning algorithms and/or deep learning algorithms and/or neural networks of the application 223 may include, but are not limited to: a generalized linear regression algorithm; a random forest algorithm; a support vector machine algorithm; a gradient boosting regression algorithm; a decision tree algorithm; a generalized additive model; neural network algorithms; deep learning algorithms; evolutionary programming algorithms; Bayesian inference algorithms, reinforcement learning algorithms, and the like. However, generalized linear regression algorithms, random forest algorithms, support vector machine algorithms, gradient boosting regression algorithms, decision tree algorithms, generalized additive models, and the like may be preferred over neural network algorithms, deep learning algorithms, evolutionary programming algorithms, and the like, in some public-safety environments; for example, while a school may not be a public safety environment, data generated by the one or more machine learning algorithms and/or deep learning algorithms and/or neural networks may later be used to file charges if an adversarial incident occurs. However, any suitable machine learning algorithm and/or deep learning algorithm and/or neural network is within the scope of present examples.
While details of the communication devices 131 are not depicted, the communication devices 131 may have components similar to the device 101 adapted, however, for the functionality of the communication devices 131. For example, the communication devices 131 may include respective display screens, speakers, microphones, location determining devices (e.g., GPS devices), and the like.
Attention is now directed to
The method 300 of
At a block 302, the controller 220 and/or the device 101 accesses the adversarial relationship data 111.
At a block 304, the controller 220 and/or the device 101 accesses the schedule data 113. For example, at the block 302 and the block 304, the controller 220 and/or the device 101 may access the database 103 to retrieve the adversarial relationship data 111 and the schedule data 113. The block 302 and the block 304 may further comprise accessing the monitor data 115 and/or the map 117.
At a block 306, the controller 220 and/or the device 101 determines, based on the schedule data 113, spatiotemporal crosspaths at the school of the students having the adversarial relationships.
As indicated above, a given spatiotemporal crosspath generally identifies a respective time and a respective location at the school where two or more of the students having an adversarial relationship are predicted and/or estimated to cross paths. A location of the spatiotemporal crosspath may comprise any suitable location data including, but not limited to, GPS coordinates, map coordinates (e.g., of the map 117) and or a map and/or school location (e.g., “Hallway Between Class I and Class K” and the like. A crosspath may be a specific point location (e.g., specific longitude and latitude), a specific hallway or intersection of hallways, or a defined sub-portion of an entire path from a source classroom to a destination classroom over which the identified adversarial students would likely overlap.
A specific spatiotemporal crosspath may be determined by: estimating respective paths, from the schedule data 113, for two or more students having adversarial relationships, as identified from the adversarial relationship data 111 from respective first locations to respective second locations, and times therefor; and estimating a respective location and a respective time, that the respective paths of the two or more students, having adversarial relationships, intersect (and/or cross and/or overlap).
For example, respective paths of the students may be determined and/or estimated from the schedule data 113. The schedule data 113 may indicate respective source/starting locations (e.g., a first location, such as a first classroom location) and destination/ending locations (e.g., a second location, such as a second classroom location) of students which may be used to determine an estimated path. The schedule data 113 may further indicate respective starting times (e.g., a time a first class at the first classroom location ends) and ending times (e.g., a time a second class, following the first class, at the second classroom location begins) of the estimated path. An estimated path may comprise a shortest path, and the like, between a respective starting and ending location, though any type of estimated path is within the scope of the present specification. A crosspath location may comprise an intersection between two estimated paths, and an estimated spatiotemporal crosspath may comprise the crosspath location and a time that the students having the adversarial relationship may be at the crosspath location.
However, an estimated path may be modified or may instead be based on known and/or determined historical behavior of a student. For example, the schedule data 113 may indicate that a given student visits their locker and/or a washroom between classes, and the estimated path may be determined and/or modified accordingly, as well as the respective starting and ending times of the estimated path.
Furthermore, a buffer time, and the like, may be used to estimate and/or modify, respective starting and ending times of an estimated path for example to account for a student being let out early from a class, and/or arriving late to a class and/or moving slowly and/or quickly. In some examples, the buffer time may be a predetermined buffer time, such as 5 minutes. In other examples, the buffer time may further be determined based on video data of the students as they move between classes and/or locations, and/or the schedule data 113 may indicate historical instances of students being let out early from a class, and/or arriving late to a class and/or moving slowly and/or quickly. Regardless, a spatiotemporal crosspath location may indicate a time period over which two or more students are estimated to cross paths at a given location.
At a block 308, the controller 220 and/or the device 101 determines a ranking of the spatiotemporal crosspaths. For example, the controller 220 and/or the device 101 may determine the ranking of the spatiotemporal crosspaths based on one or more of: the adversarial relationship data 111; and a number of the students having the adversarial relationships crossing paths at a given spatiotemporal crosspath.
For example, the ranking may indicate a severity level of a possible adversarial incident occurring at a given spatiotemporal crosspath, for example based on severity levels of past adversarial incidents indicated by the adversarial relationship data 111. For example, when a first spatiotemporal crosspath is for two students who previously engaged in a physical fight, and a second spatiotemporal crosspath is for two students who previously engaged in an argument, but without physically fighting, the first spatiotemporal crosspath may be ranked higher than the second spatiotemporal crosspath. Put another way, a severity level of a physical fight may be higher than a severity level of an argument. Put yet another way, severity levels may be assigned (e.g., manually and/or electronically) to adversarial relationships indicated by the adversarial relationship data 111, using any suitable criteria, and given spatiotemporal crosspaths may be ranked accordingly. Similarly, severity levels may be assigned to the spatiotemporal crosspaths, for example based on the severity levels of the associated adversarial relationships. Such severity levels of spatiotemporal crosspaths may be assigned based on any suitable criteria and using any suitable scale (e.g., 1 to 10, and the like, with higher severity levels indicating a higher severity (e.g., more violent) of a possible adversarial incident occurring, and lower severity levels indicating a lower severity (e.g., less violent) of a possible adversarial incident occurring). However, rankings of spatiotemporal crosspaths based on adversarial relationship data 111 may occur using machine learning algorithms, and the like.
In further examples, a number of the students having the adversarial relationships crossing paths at a given spatiotemporal crosspath may additionally or alternatively be used to rank the spatiotemporal crosspaths. For example, a first spatiotemporal crosspath may have more students having adversarial relationships crossing paths than a second spatiotemporal crosspath; the first spatiotemporal crosspath may hence be ranked higher than the second spatiotemporal crosspath.
However, rankings of spatiotemporal crosspaths may occur in any suitable manner, for example using machine learning algorithms, and the like.
At a block 310, the controller 220 and/or the device 101 assigns one or more monitors 121 to one or more of the spatiotemporal crosspaths. For example, the assigning may comprise assigning the one or monitors 121 to a higher ranked spatiotemporal crosspath before assigning the one or monitors 121 to a lower ranked spatiotemporal crosspath. Hence, higher ranked spatiotemporal crosspaths are given preference over lower ranked spatiotemporal crosspaths. Indeed, when there are fewer monitors 121 available than there are spatiotemporal crosspaths, the higher ranked spatiotemporal crosspaths may be monitored, but the lower ranked spatiotemporal crosspaths may not be monitored.
Furthermore, more than one monitor 121 may be assigned to a spatiotemporal crosspath, for example as based on the ranking. For example, assigning more than one monitor 121 to a spatiotemporal crosspath may be threshold based. In such examples, when a spatiotemporal crosspath is associated with a severity level above a threshold severity level (e.g., “5” on a scale of 1 to 10), two or more monitors 121 may be assigned to the spatiotemporal crosspath (e.g., when available). Similarly, when a spatiotemporal crosspath is associated with a number of students having an adversarial relationship above a threshold number of students (e.g., three students), two or more monitors 121 may be assigned to the spatiotemporal crosspath (e.g., when available). However, any suitable threshold severity level and/or threshold number of students is within the scope of the present specification.
The controller 220 and/or the device 101 may assign one or more monitors 121 to one or more of the spatiotemporal crosspaths using any suitable criteria, for example as indicated by the monitor data 115 as described above. In particular, the assigning may be based on one or more of:
In specific examples, the one or more monitors 121 may comprise teachers, and the assigning, based on the ranking, the one or more monitors 121 to one or more of the spatiotemporal crosspaths, may be based on a distance between respective teacher classroom locations and spatiotemporal crosspath locations. For example, a teacher at a classroom location closest to spatiotemporal crosspath location may be assigned to the associated spatiotemporal crosspath.
At a block 312, the controller 220 and/or the device 101 transmits, via the communication unit 202, notifications to communication devices 131 associated with the one or more monitors 121, the notifications to instruct the one or more monitors 121 to move to a respective assigned spatiotemporal crosspath.
For example, the notification may comprise a location and time of a spatiotemporal crosspath to which a monitor 121 is assigned. The notification may be provided at a display screen and/or a speaker of a communication device 131. Hence, the monitor 121 may move to the location of an assigned spatiotemporal crosspath for the time and/or time period of the assigned spatiotemporal crosspath.
Alternatively, a notification may comprise a name and/or an image one or more of the students having the adversarial relationships, which may be provided at a display screen of a communication device 131 (and/or the name may be provided at a speaker of the communication device 131), such that a monitor 121 may identify the one or more of the students having the adversarial relationships and proactively position themselves to prevent the students from interacting with each other.
In some alternative examples, the method 300 may further comprise the controller 220 and/or the device 101 transmitting an instruction, to a respective communication device 131 of a respective monitor 121, at a starting location of a first student having an adversarial relationship with a second student, the instruction to instruct the respective monitor 121 to hold back the first student at the starting location to prevent the first student from crossing paths with the second student on route to an ending location. Hence, for example, an instruction may be transmitted to a communication device 131 of a teacher at a classroom of the first student, for example prior to an end of a class, to instruct the teacher to hold back the first student for a given period of time after the end of the class, to reduce a possibility of the first student crossing paths with the second student when the first student moves to a next class (e.g., an ending location).
In some of these examples, the method 300 may further comprise the controller 220 and/or the device 101 transmitting another instruction, to another respective communication device 131 of another respective monitor 121 at the ending location of the first student to instruct the another respective monitor 121 that the first student may be late to arrive at the ending location. For example, the another respective monitor 121 may be a teacher of the next class of the first student being held back, and the instruction transmitted to their communication device 131 may be to inform them that there is a reason the first student may be late (e.g., and/or so the teacher of the next class does not punish the first student for being late).
In yet further examples, the method 300 may comprise the controller 220 and/or the device 101 controlling a camera device to monitor a given spatiotemporal crosspath. For example the map 117, and the like, may indicate locations of camera devices at the school and, when the map 117 indicates that a camera device is positioned to acquire images and/or video of a given spatiotemporal crosspath, the controller 220 and/or the device 101 may control the camera device to acquire images of the crosspath location at the time and/or time period associated with the given spatiotemporal crosspath and store the captured images and/or video for future access when an incident occurs and/or transmit the images and/or video to a configured monitoring station, such as the computing device 101, for simultaneous monitoring of a plurality of crosspaths. In some examples, assigning a monitor to a crosspath may include assigning a capable mechanical, optical, and/or digital pan, tilt, and/or zoom (e.g., PTZ) camera to a crosspath, and transmitting a notification in such an example may include transmitting an instruction to PTZ to the identified crosspath record and transmit video of the identified crosspath to the monitoring station. In some examples, controlling a camera device to monitor a given spatiotemporal crosspath may include deploying a mobile camera device to the given spatiotemporal crosspath (e.g., which may include assigning a monitor 121 to manually carry a mobile camera device to the given spatiotemporal crosspath and/or controlling the mobile camera device automatically move to the given spatiotemporal crosspath).
In yet further examples, the method 300 may include the controller 220 and/or the device 101 changing a class schedule of one or more of the students based on the rankings. For example, the controller 220 and/or the device 101 may determine that given students having adversarial relationships may regularly cross paths at given locations and times, and that the associated spatiotemporal crosspaths are relatively highly ranked. Hence, to prevent the students from regularly crossing paths at given locations and times, the class schedule (e.g., as stored in the schedule data 113) of one or more of the students may be changed (and/or may be suggested and/or prompted to be changed) to reduce the likelihood of their crossing paths, for example to assign the students to different classes in different locations. Indeed, at a beginning of a term and/or a school year, the controller 220 and/or the device 101 implement block 302, 304, block 306 and block 308 of the method 300 to determine one or more lists of spatiotemporal crosspaths of students having adversarial relationships, and adjust class schedules (e.g., as stored in the schedule data 113) iteratively, and the like to reduce severity and/or number of occurrences of spatiotemporal crosspaths for the term and/or the school year. Similarly, the controller 220 and/or the device 101 implement block 302, 304, block 306 and block 308 of the method 300 periodically and/or as the adversarial relationship data 111 changes and/or is updated, to determine one or more lists of spatiotemporal crosspaths of students having adversarial relationships, and adjust class schedules (e.g., as stored in the schedule data 113) iteratively, and the like to reduce severity and/or number of occurrences of spatiotemporal crosspaths.
An example of the method 300 is next described with respect to
In particular,
In the depicted example of
In the depicted example of
Similarly,
As depicted, the device 101 further ranks (e.g., at the block 308 of the method 300) the spatiotemporal crosspaths 401. For example, the spatiotemporal crosspath 401-1 is ranked “1”, and the spatiotemporal crosspath 401-2 is ranked “2”. For example, the spatiotemporal crosspath 401-1 may be ranked higher than the spatiotemporal crosspath 401-2, as the students associated with the spatiotemporal crosspath 401-1 were involved in a fight (e.g., a higher severity adversarial incident relative to an argument) while the students associated with the spatiotemporal crosspath 401-2 were involved in an argument (e.g., a lower severity adversarial incident relative to a fight). Other types of relative and/or absolute rankings could be used as well and/or instead.
As depicted, the device 101 further assigns (e.g., at the block 310 of the method 300), based on the rankings, monitors 121 to the spatiotemporal crosspaths 401. In the depicted example, there are two monitors 121 available to be assigned to the two spatiotemporal crosspaths 401; however, when only one monitor 121 is available to be assigned, the one monitor 121 is assigned to the higher ranked spatiotemporal crosspath 401-1.
Locations of the monitors 121 are also depicted on the map 117. Indeed, from the map 117 it is understood that the monitor 121-2 could be assigned to either spatiotemporal crosspath 401 based only on distance from a classroom location of the monitor 121-2 to the spatiotemporal crosspaths 401. For example, the monitor 121-2 in “Class K” is about equidistant from each of the spatiotemporal crosspaths 401. However the capabilities and/or training and/or skills of the monitors 121 may also be used to assign the monitors 121 to the spatiotemporal crosspaths 401.
For example, as depicted, the device 101 uses the monitor data 115 to assign the monitor 121-1 to the higher ranked spatiotemporal crosspath 401-1 as the monitor 121-1 (e.g., “Teacher Bill”) may be closest to the spatiotemporal crosspath 401-1 (e.g., in “Class B”) and has martial arts training. Hence, the monitor 121-1 may be capable of getting to the spatiotemporal crosspath 401-1 fastest and/or preventing (and/or breaking up) a fight between the students “Tom” and “Jerry”. Similarly, as depicted, the device 101 uses the monitor data 115 to assign the monitor 121-2 to the lower ranked spatiotemporal crosspath 401-2 as the monitor 121-2 (e.g., “Teacher Sally”) is closest to the spatiotemporal crosspath 401-2 (e.g., in “Class K”) has conflict resolution training. Hence, the monitor 121-2 may be capable of getting to the spatiotemporal crosspath 401-2 fastest and/or preventing (and/or breaking up) an argument between the students “Bob” and “Doug”.
Attention is next directed to
In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes may be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.
The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
In this document, language of “at least one of X, Y, and Z” and “one or more of X, Y and Z” may be construed as X only, Y only, Z only, or any combination of two or more items X, Y, and Z (e.g., XYZ, XY, YZ, XZ, and the like). Similar logic may be applied for two or more items in any occurrence of “at least one . . . ” and “one or more . . . ” language.
Moreover, in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.
Moreover, an embodiment may be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it may be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/PL2019/050062 | 11/6/2019 | WO |