The present disclosure relates generally to building control systems and more particularly to a Fire Detection System (FDS) for a building. A FDS is, in general, a system of devices configured to control, monitor, and manage equipment in or around a building or building area to detect and suppress fires. An FDS can include, for example, a fire alerting system, a fire suppression system, and any other system that is capable of managing building fire safety functions or devices, or any combination thereof. The present disclosure relates more particularly to security platforms for handling alarms for the building, risk analytics, and risk mitigation.
Typically, a fire detection system is the first line of defense in protecting building occupants from possible fire dangers. An example of a conventional fire detection system 500 is illustrated in
Although, the conventional fire detection systems such as the first detection system 500 illustrated in
Conventionally, security, operation and maintenance centers are required to handle high volume of event and alarm (threat) data generated by technologies connected to complex site-monitoring systems. Such technologies may include PCs, virtual memory systems, operating systems, and applications in a composite application management platform, IoT-based sensors, controllers, and other site-monitoring devices and systems including fire monitoring and detection systems. However, prioritizing such numerous events and alarms in a timely fashion can be a challenging task.
Focusing on fire detection, alarms and alerts, at best, have a static severity score. More commonly, they do not have any supporting severity score. However, the static severity score generated by the conventional fire detection systems and/or risk assessment systems are reliable only up to an extent as the volume of alerts and alarms tend to impact the response time and lead to ineffective allocation of resources for providing timely and required assistance.
There is, therefore, felt a need to provide methods and systems for software defined fire detection and risk assessment which alleviates the abovementioned drawbacks.
One implementation of the present disclosure is one or more non-transitory computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to implement a software defined alarm control unit (SDACU) to augment an existing fire panel, the SDACU configured to receive, from one or more sensors distributed within a building via the existing fire panel, a fire detection signal, generate, based on the fire detection signal, an operating command for one or more fire response devices associated with the building, and generate a graphical representation of the building, the graphical representation including a status of at least one of the one or more fire response devices.
In various embodiments, the fire detection signal is received from at least one of a glass break sensor, a pull-down sensor, a hose reel sensor, a smoke detector, a fire detector, a sprinkler sensor, or a heat detector. In various embodiments, the software defined alarm control unit (SDACU) is configured to continuously monitor at least one of the one or more sensors or the one or more fire response devices to determine the status. In various embodiments, continuously monitoring at least one of the one or more sensors or the one or more fire response devices includes monitoring a pipe mounted sensor to determine at least one of a water flow associated with the pipe, a debris accumulation associated with the pipe, a water temperature of water flowing through the pipe, or leakage associated with the pipe. In various embodiments, the operating command is configured to control at least one of a sprinkler, a window shutter, a door, an alarm, or an HVAC component. In various embodiments, the status indicates at least one of device removal, tampering, or unauthorized usage. In various embodiments, the graphical representation of the building includes an indication of one or more fire zones associated with the building.
Another implementation of the present disclosure is a method for fire detection in one or more zones of a building comprising receiving, by a software defined alarm control unit (SDACU) operating on a processing device from an existing fire panel, a fire detection signal, generating, by the SDACU, an operating command for one or more fire response devices associated with the building based on the fire detection signal, and generating, by the SDACU, a graphical representation of the building comprising a status of at least one of the one or more fire response devices.
In various embodiments, the software defined alarm control unit (SDACU) receives the fire detection signal from at least one of a glass break sensor, a pull-down sensor, a hose reel sensor, a smoke detector, a fire detector, a sprinkler, or a heat detector. In various embodiments, the software defined alarm control unit (SDACU) is configured to continuously monitor at least one of the one or more sensors or the one or more fire response devices to determine the status. In various embodiments, continuously monitoring at least one of the one or more sensors or the one or more fire response devices includes monitoring a pipe mounted sensor to determine at least one of a water flow associated with the pipe, a debris accumulation associated with the pipe, a water temperature of water flowing through the pipe, or leakage associated with the pipe. In various embodiments, the operating command controls at least one of a sprinkler, a window shutter, a door, an alarm, or an HVAC component. In various embodiments, the status indicates at least one of device removal, tampering, or unauthorized usage. In various embodiments, the graphical representation of the building includes an indication of the one or more zones.
Another implementation of the present disclosure is a fire detection system comprising a hard logic device configured to couple to an existing fire panel of a building and provide integration therewith and a software defined alarm control unit (SDACU) operating on a processing device that is communicably coupled to the hard logic device and configured to receive, from one or more sensors distributed within the building from the hard logic device, a fire detection signal, generate, based on the fire detection signal, an operating command for one or more fire response devices associated with the building, and generate a graphical representation of the building, the graphical representation including a status of at least one of the one or more fire response devices.
In various embodiments, the software defined alarm control unit (SDACU) receives the fire detection signal from at least one of a glass break sensor, a pull-down sensor, a hose reel sensor, a smoke detector, a fire detector, a sprinkler sensor, or a heat detector. In various embodiments, the software defined alarm control unit (SDACU) is configured to continuously monitor at least one of the one or more sensors or the one or more fire response devices to determine the status. In various embodiments, the operating command is configured to control at least one of a sprinkler, a window shutter, a door, an alarm, or an HVAC component. In various embodiments, the status indicates at least one of device removal, tampering, or unauthorized usage. In various embodiments, the graphical representation of the building includes an indication of one or more fire zones associated with the building.
Another implementation of the present disclosure is a fire detection system for a building having a plurality of zones defined therewithin, said system comprising a plurality of sensors spatially distributed within each of said zones, wherein each of said sensors is configured to periodically monitor a parameter indicative of detection of fire, and is further configured to generate one or more fire detection signals, wherein the fire detection signal comprises zone information indicating the zone in which the fire is detected, a plurality of fire suppression devices and a plurality of fire response devices associated with each of said zones, wherein each of said fire response devices and said fire suppression devices are configured to be operated in an actuation state or a de-actuated state, a fire panel comprising a hard logic device communicatively coupled with the plurality of sensors, the plurality of fire response devices, and the plurality of fire suppression devices, a software defined alarm control unit (SDACU) implemented using a server, said software defined alarm control unit is configured to perform a plurality of supervisory and management related tasks, and is further configured to generate an alert data, subsequent to reception of at least one fire detection signal via the hard logic device, generate an operating command to selectively operate one or more of said fire suppression devices and fire response devices, subsequent to reception of at least one fire detection signal via the hard logic device, and provide a graphical user interface to display the present status of each zones, the plurality of sensors, the fire response devices, and the fire suppression devices based on the outcome of the supervisory and management related tasks.
In various embodiments, said plurality of sensors is selected from the group consisting of break glass sensors, pull-down sensors, hose reel sensors, smoke detectors, fire detectors, sprinkler sensor, and heat detectors. In various embodiments, the fire detection system includes a diagnostic sensor mounted on a pipe connected to each of said fire suppression sensors respectively, and is configured to monitor the flow of water within the pipe, and generate an error signal if the flow of water is below a pre-defined threshold, detect the level of water flowing through the pipe, and generate said error signal if the level of water indicates empty of partially filled condition, detect the accumulation of debris in proximity of the sensor, and generate said error signal upon detection of debris, detect the temperature of water flowing through the pipe, and generate error signal when the temperature of water is low indicating risk of freezing, and detect the leakage of water from the pipe, and generate error signal if the leakage is detected.
In various embodiments, the software defined alarm control unit is configured to receive the error signal from the diagnostic sensor via the hard logic device, and is further configured to generate one or more notification signals to enable the hard logic device to actuate one or more said fire response devices, wherein the actuation of said fire response devices provide audio and/or visual notifications. In various embodiments, said fire suppression devices are selected from the group consisting of sprinklers, water hose reels, and fire extinguishers. In various embodiments, said software defined alarm control unit (SDACU) comprises a presentation layer to provide graphical user interface to display the present status of each zones, the plurality of sensors, the fire response devices, and the fire suppression devices, wherein the present status of each zones is defined based on at least one of said supervisory and management related tasks performed by the software defined alarm control unit, said notification signals, and said alert data, and a soft logic layer, implemented using one or more processor(s), is configured to perform the plurality of supervisory and management related tasks, and is further configured to operate one or more fire suppression devices and fire response devices based on the fire detection signal.
In various embodiments, the plurality of supervisory and management related tasks performed by the soft logic layer comprises detecting faulty or subpar performing sensors or devices by enabling the at least one of said sensors, said fire suppression devices, and said fire response devices to operate in a self-diagnosis mode, probing indicators associated with at least one of said sensors, said fire suppression devices, and said fire response devices, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of said sensors, said fire suppression devices, and said fire response devices, logging the current status of said sensors, said fire suppression devices, and said fire response devices periodically or upon detecting change in the status of at least one of said sensors, said fire suppression devices, and said fire response devices, periodically sending command signals at a pre-defined intervals of time to relay devices that are enabled to either actuate or de-actuate the fire suppression devices or fire response devices, re-defining the zones of at least one of said sensors, said fire suppression devices, and said fire response devices, establishing connection of the at least one of said sensors, said fire suppression devices, and said fire response devices with peer fire detection systems, and enrolling at least one additional sensors, additional fire suppression devices, and additional fire response devices in the system.
In various embodiments, the soft logic layer comprises a detection module, implemented using one or more processor(s), said detection module is configured to receive the fire detection signal from the hard logic device, and is further configured to identify the zone of the one or more sensors reporting said fire detection signal, identify the plurality of fire suppression devices and the plurality of fire response devices associated with the zone identified based on the received fire detection signal, and generate operating commands to actuate the fire suppression devices and fire response devices associated with the identified zone, via the hard logic device. In various embodiments, the plurality of fire response devices being operated based on the operating commands generated by the software defined alarm control unit are selected from the group consisting of shutters, doors, sirens, hooters, annunciators, HVAC fans and dampers. In various embodiments, the plurality of fire response devices being operated based on the generation of at least one notification signal are selected from the group consisting of sirens, hooters, display devices, and annunciators.
In various embodiments, the fire detection system includes a display console communicatively coupled with said software defined alarm control unit, wherein said display console is configured to display the present status of the fire detection system, wherein the present status includes the state of each of said zones, said plurality of fire suppression devices and said plurality of responsive devices. In various embodiments, the software defined alarm control unit is communicatively coupled to a cloud storage to facilitate supplementary monitoring, supervision, software provisioning, and firmware updates. In various embodiments, the software defined alarm control unit is configured to generate fire alert data by performing contextual based analysis on the received actuation signal.
Another implementation of the present disclosure is a method for detecting fire in one or more zones defined within a building, said method comprising the steps of receiving, by a hard logic device, at least one fire detection signal generated by a plurality of sensors, wherein said sensors are spatially distributed within each of the pre-defined zones and the fire detection signal comprises zone information indicating the zone in which the fire is detected, receiving, by a server having a software defined alarm control unit, the fire detection signal from the hard logic device, generating, by the server, one or more operating commands to selectively actuate one or more fire suppression devices and one or more fire response devices, and analyzing, by the server, the received fire detection signal to generate a fire alert data indicating the detection of fire.
In various embodiments, the method includes the steps of performing a plurality of supervisory and management related tasks, by the server, wherein the steps comprise detecting, faulty or subpar performing sensors and devices by enabling the at least one of said sensors, said fire suppression devices, and said fire response devices to operate in a self-diagnosis mode, probing, indicators associated with at least one of said sensors, said fire suppression devices, and said fire response devices, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of said sensors, said fire suppression devices, and said fire response devices, logging, the current status of said sensors, said fire suppression devices, and said fire response devices at a pre-defined interval of time or upon detecting change in the status of at least one of said sensors, said fire suppression devices, and said fire response devices, periodically sending command signals at a pre-defined intervals of time to relay devices that are enabled to either switch on or off the fire suppression devices or fire response devices, re-defining the zones of at least one of said sensors, said fire suppression devices, and said fire response devices, establishing connection of the at least one of said sensors, said fire suppression devices, and said fire response devices of said system with at least one peer fire detection system, enrolling at least one additional sensors, an additional fire suppression devices, and an additional fire response devices in the system, and displaying the present status of each of said zones, said plurality of sensors, said fire response devices, and said fire suppression devices based on the outcome of the supervisory and management related tasks.
In various embodiments, said plurality of sensors is selected from the group consisting of break glass sensors, pull-down sensors, hose reel sensors, smoke detectors, fire detectors, sprinkler sensor, and heat detectors. In various embodiments, the fire suppression devices being operated by the software defined alarm control unit corresponds to the fire suppression devices deployed in the zone from which fire is detected by the one or more sensors.
Another implementation of the present disclosure is a fire panel for a fire detection system of a building having a plurality of zones defined therewithin, wherein each of said zones is associated with a plurality of input devices, a plurality of fire suppression devices, and a plurality of fire response devices, said fire panel comprising a software defined alarm control unit (SDACU), implemented using one or more processor(s), configured to perform a plurality of supervisory and management related tasks, and is further configured to generate an operating command to selectively operate one or more of said fire suppression devices and said fire response devices based on a fire detection signal generated by at least one of said input devices, generate a notification signal to operate one or more of said fire response devise based on an error signal generated by at least one of said input devices, and generate an alert data based on at least one of or combination of said fire detection signal and error signal, a hard logic device communicatively coupled with said software defined alarm control unit, the plurality of input devices, the plurality of fire suppression devices and the plurality of fire response devices, wherein the hard logic is configured to facilitate communication of the software defined alarm control unit with the plurality of input devices, the plurality of fire suppression devices and the plurality of fire response device.
In various embodiments, the hard logic device comprises an initiating device circuit configured to facilitate communication between the input devices and the software defined alarm control unit, said initiating device circuit is configured to enable reception of one or more fire detection signals generated by the input devices, wherein the input devices are selected from the group consisting of break glass sensors, pull-down sensors, hose reel sensors, smoke detectors, fire detectors, sprinkler sensor, and heat detectors, enable reception of one or more error signals generated by the input devices, wherein the input device is a diagnostic sensor mounted on a pipe connected to each of the fire suppression sensors, and a notification appliance circuit configured to facilitate connection of the software defined alarm control unit with the plurality of fire suppression devices and the plurality of fire response devices, said notification appliance circuit is further configured to enable the transmission of one or more operating commands to at least one of or combination of fire suppression devices and fire response devices.
In various embodiments, the hard logic device includes a power supply unit configured to draw power from the mains supply, and is further configured to supply power to the software defined alarm control unit, and an auxiliary power supply unit having at least one battery configured to supply power to the software defined alarm control unit in an event when the power supplied by the power supply unit is nil. In various embodiments, the software defined alarm control unit is configured to transmit the alert data to one or more remote servers associated with at least one emergency response team, wherein the alert data is transmitted by the software defined alarm control unit via a city circuit housed within the hard logic device. In various embodiments, the plurality of supervisory and management related tasks performed by the software defined alarm control unit are detecting faulty or subpar performing devices by enabling the at least one of said input devices, said fire suppression devices, and said fire response devices to operate in a self-diagnosis mode, probing indicators associated with at least one of said input devices, said fire suppression devices, and said fire response devices, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of said input devices, said fire suppression devices, and said fire response devices, logging the current status of said input devices, said fire suppression devices, and said fire response devices at a pre-defined interval of time or upon detecting change in the status of at least one of said input devices, said fire suppression devices, and said fire response devices, periodically sending command signals at pre-defined intervals of time to relay devices that are enabled to switch either on or off the fire suppression devices or fire response devices, re-defining the zones of at least one of said input devices, said fire suppression devices, and said fire response devices, disabling or enabling, the function or state of said input devices, said fire suppression devices, and said fire response devices, wherein the state corresponds to enabled state or disabled state, establishing connection of the at least one of said input devices, said fire suppression devices, and said fire response devices of said system with peer fire detection systems, enrolling at least one of an additional input device, an additional fire suppression device, and an additional fire response device in the system, and generating operating commands or notification signals to actuate at least one of or combination of the fire suppression devices and fire response devices associated with the identified zone, via the hard logic device.
In various embodiments, the hard logic device is configured to be connected with a communication interface to facilitate a user to provide user-defined commands, wherein the user-defined command provided by the user correspond to rules for performing supervisory and management related tasks.
Another implementation of the present disclosure is a computer implemented fire risk assessment system comprising a plurality of fire detection units, implemented using one or more processor(s), wherein each of the fire detection unit is associated with a building, and is configured to generate a fire alert data having a building identifier and an event type data, and a server configured to receive at least one fire alert data from one or more of said fire detection units, said server comprising a repository configured to store a lookup table having a list of building identifiers, and a location coordinate corresponding to each of the building identifier, and a processing circuit, implemented using one or more processor(s), configured to cooperate with the repository, and is further configured to identify the location of the building based on the building identifier contained within the fire alert data, contextually analyze the fire alert data with any one of or combination of the identified location of building and event type data based on a plurality of pre-defined risk assessment parameters to generate a risk score corresponding to each of the risk assessment parameters, aggregate the risk score of each of the risk assessment parameters to generate an aggregated risk score, normalize the aggregated risk score to generate a normalized risk score, and determine a contextual risk score by evaluating the normalized risk score with historical data, and subsequently classify the received fire alert data as any one of a low risk event, a moderate risk event, and a high risk event.
In various embodiments, the risk assessment parameters are selected from the group consisting of social media feeds, event type, life safety impact, local time and date, and business value. In various embodiments, the server is communicatively coupled with a display console which is configured to display the contextual risk score. In various embodiments, the contextual risk score is time stamped and stored in the repository and in a historical database by the processing circuit. In various embodiments, the processing circuit is configured to periodically perform the contextual analysis on the pre-defined risk assessment parameters to re-calculate the risk score for each of the pre-defined risk assessment parameters and thereby update the contextual risk score. In various embodiments, the processing circuit is configured to classify the received fire alert data as low risk event if the contextual risk score is below a first pre-defined risk score, moderate risk event if the contextual risk score is above a first pre-defined risk score and below a second pre-defined risk score, and high risk event if the contextual risk score is above the second pre-defined risk score, wherein the first pre-defined risk score and the second pre-defined risk score is stored in the repository of the server.
In various embodiments, said processing circuit is configured to crawl through the lookup table to identify the received building identifier and extract the location coordinates corresponding to the identified building identifier, wherein the extracted location coordinates corresponds to the location of the building reporting fire alert data.
Another implementation of the present disclosure is a method for performing fire risk assessment comprises the steps of receiving, by a server, a fire alert data from a fire detection unit, wherein the fire detection unit is associated with a building and the fire alert data comprises a building identifier and an event type data, identifying, by the server, the location of the building based on the building identifier contained within the fire alert data, contextually analyzing, by the server, the fire alert data with any one of or combination of the identified location of building and event type data based on a plurality of pre-defined risk assessment parameters to generate a risk score corresponding to each of the risk assessment parameter, generating by the server, an aggregated risk score by aggregating the risk score corresponding to each of the risk assessment parameter, generating by the server, a normalized risk score by normalizing the aggregated risk score, and determining by the server, a contextual risk score by analyzing the normalized risk score with historical data to classify the received fire alert data as a low risk event, a moderate risk event, or a high risk event.
In various embodiments, the step of identifying the location of the building comprises the following sub-steps of crawling through a lookup table having a list of building identifiers, and extracting a location coordinate corresponding to the received building identifier from the lookup table, wherein the lookup table having a list of building identifiers and a location coordinate corresponding to each of the building identifier is stored in a repository of the server. In various embodiments, the method includes the step of displaying the contextual risk score on a display console communicatively coupled to the server. In various embodiments, the step of classifying the received fire alert data as a low risk event, a moderate risk event, or a high risk event include the steps of comparing the contextual risk score with pre-defined risk scores, wherein the pre-defined risk scores include a first pre-defined risk score and a second pre-defined risk score stored in the repository of the server, determining a low risk event when the contextual risk score is less than or equal to the first pre-defined risk score, determining a medium risk event when the contextual risk score is in between the first pre-defined risk score and the second pre-defined risk score, and determining a high risk event when the contextual risk score is greater than or equal to the second pre-defined risk score.
In various embodiments, the method includes the step of periodically performing the contextual analysis to re-calculate the risk score for each of the predefined risk assessment parameters and thereby update the contextual risk score.
Another implementation of the present disclosure is a system for performing contextual based risk assessment, said system comprising a repository configured to store a lookup table having a list of building identifiers, and a location coordinate corresponding to each of the building identifier, a historical database configured to store historical risk score pertaining to each of the buildings, and a processing circuit, implemented using one or more processor(s), configured to cooperate with the repository and the historical database, and further configured to receive one or more fire alert data having a building identifier and an event type data from a fire detection unit, said processing circuit comprising a social media feed analyzer configured to determine a first risk score by performing social media feed analysis, an event type analyzer configured to determine a second risk score by performing event type data analysis, a life safety impact analyzer configured to determine a third risk score by identifying the presence of people in the vicinity of the building, a time and date analyzer configured to determine a fourth risk score by identifying the time and date of receiving the fire alert data, a business value analyzer configured to determine a fifth risk score by identifying the value of assets under threat, an aggregator configured to cooperate with the social media feed analyzer, the event type analyzer, the life safety impact analyzer, the time and date analyzer, and the business value analyzer to receive and aggregate the first, second, third, fourth and fifth risk scores to generate an aggregated risk score, a data normalizer configured to cooperate with the aggregator to receive the aggregated risk score, and further configured to normalize the aggregated risk score to generate a normalized risk score, and a risk score generator configured to cooperate with the data normalizer to determine contextual risk score by analyzing the normalized risk score with historical data, and further configured to classify the received fire alert data as any one of a low risk event, a moderate risk event, and a high risk event.
In various embodiments, said social media feed analyzer is configured to determine a first risk score by performing social media feed analysis to identify the sources of risk in proximity of the location of the building reporting fire alert data, wherein the value of said first risk score is directly proportional to the number of identified sources of risk, said event type analyzer is configured to determine a second risk score by performing event type data analysis, wherein the second risk score is based on the type of said event, said life safety impact analyzer is configured to determine a third risk score by identifying the presence of people in the vicinity of the building, wherein the value of said third risk score is directly proportional to human density in the vicinity of the building, said time and date analyzer is configured to determine a fourth risk score by identifying the time and date of receiving the fire alert data, wherein the value of the fourth risk score is higher for the time and date when human density is expected to be at peak, and said business value analyzer is configured to determine a fifth risk score by identifying the value of assets under threat, wherein the value of fifth risk score is directly proportional to the value of assets under threat.
In various embodiments, the repository is configured to store a pre-defined first risk score and a pre-defined second risk score. In various embodiments, the risk score generator is configured to receive the normalized risk score from the data normalizer, and the first and the second pre-defined risk scores from the repository, said risk score generator is configured to determine the contextual risk score by analyzing the normalized risk score with historical data received from the historical database, and is further configured to compare the contextual risk score with the first and second pre-defined risk score to classify the received fire alert data as any one of low risk event, moderate risk event, and high risk event. In various embodiments, the risk score generator is configured to classify the received fire alert data as low risk event when the contextual risk score is below the first pre-defined risk score, classify the received fire alert data as moderate risk event when the contextual risk score is between the first pre-defined risk score and the second pre-defined risk score, and classify the received fire alert data as high risk event when the contextual risk score is greater than the second pre-defined risk score.
In various embodiments, the risk score generator is configured to store the contextual risk score in the repository, and is further communicatively coupled to a display console to display the determined contextual risk score along with the classification of the fire alert data as any one of said low risk event, said moderate risk event, and said high risk event. In various embodiments, the display console is communicatively coupled with the processing circuit by means of an application programming interface (API). In various embodiments, the processing circuit is configured to periodically perform contextual analysis and generate an updated risk scores, and subsequently update contextual risk score and the risk classification.
Another implementation of the present disclosure is a method for performing contextual based risk assessment, said method comprising the steps of receiving by a processing circuit implemented using one or more processor(s), one or more fire alert data having a building identifier and an event type data from a fire detection unit, performing contextual analysis, by the processing circuit, on the received fire alert data based on any one of or combination of the identified location of building and an event type data to generate a plurality of risk scores, wherein the location coordinates of each building corresponds to a building identifier is stored in a repository, aggregating by the processing circuit, the risk score corresponding to each of the risk assessment parameter to generate an aggregated risk score, normalizing by the processing circuit, the aggregated risk score to generate a normalized risk score, determining by the processing circuit, contextual risk score by analyzing the normalized risk score with historical data, wherein the historical data is stored in the repository, and classifying by the processing circuit, the received fire alert data as one of a low risk event, a moderate risk event, and a high risk event is based on the value of the contextual risk score.
In various embodiments, the step of performing contextual analysis, by the processing circuit, based on any one of or combination of the location of building and event type data to generate the plurality of risk scores is performed by the following steps of determining a first risk score by performing social media feed analysis to identify the sources of risk in proximity of the location of the building reporting fire alert data, wherein the value of said first risk score is directly proportional to the number of identified sources of risk, determining a second risk score by performing event type data analysis, wherein the second risk score is based on the type of said event, determining a third risk score by identifying the presence of people in the vicinity of the building, wherein the value of said third risk score is directly proportional to human density in the vicinity of the building, determining a fourth risk score by identifying the time and date of receiving the fire alert data, wherein the value of the fourth risk score is higher for the time and date when human density is expected to be at peak, and determining, a fifth risk score by identifying the value of assets under threat, wherein the value of the fifth risk score is directly proportional to the value of assets under threat.
In various embodiments, the repository is configured to store a first pre-defined risk score and a second pre-defined risk score, and wherein the step of classifying, the received fire alert data as one of the low risk event, the moderate risk event, and the high risk event based on the value of the contextual risk score is performed by the steps of receiving the first and second pre-defined risk score from the repository, comparing the contextual risk score with the first and second pre-defined risk scores, classifying the received fire alert data as low risk event when the contextual risk score is below a first pre-defined risk score, classifying the received fire alert data as moderate risk event when the contextual risk score is between the first pre-defined risk score and a second pre-defined risk score, and classifying the received fire alert data as high risk event when the contextual risk score is greater than the second pre-defined risk score.
In various embodiments, the step of displaying the determined contextual risk score along with the classification of the fire alert data as any one of a low risk event, a moderate risk event, and a high risk event on a dashboard of a display console.
Another implementation of the present disclosure is a fire detection and risk assessment system for a building having a plurality of input devices, a plurality of fire suppression devices, and a plurality of fire response devices, wherein each of the plurality of input devices is configured to generate at one of a fire detection signal and an error signal, said system comprising a fire panel having a hard logic device communicatively coupled with the plurality of input devices, the plurality of fire response devices, and a plurality of fire suppression devices, and a software defined alarm control unit (SDACU), implemented using a virtual server, said software defined alarm control unit is configured to perform a plurality of supervisory and management related tasks, and subsequent to reception of at least one fire detection signal via the hard logic device, the SDACU is configured to generate an operating command to selectively operate one or more of said fire suppression devices and fire response devices in actuated state, generate an alert data indicating the detection of fire, wherein the fire alert data comprises a building identifier and an event type data, generate a notification signal to selectively operate one or more of said fire response devices based on the error signals generated by at least one of said input devices, and a risk assessment unit, implemented using a remote server, communicatively coupled to the fire panel, and comprises a repository configured to store a lookup table having a list of building identifiers, and a location coordinate corresponding to each of the building identifiers, a processing circuit, implemented using one or more processor(s), configured to cooperate with the repository, and is further configured to identify the location of the building based on the building identifier contained within the fire alert data, contextually analyze the fire alert data with any one of or combination of the identified location of building and event type data based on a plurality of pre-defined risk assessment parameters to generate a risk score corresponding to each of the risk assessment parameters, aggregate the risk score of each of the risk assessment parameters to generate an aggregated risk score, normalize the aggregated risk score to generate a normalized risk score, and determine a contextual risk score by evaluating the normalized risk score with historical data, and subsequently classify the received fire alert data as a low risk event, a moderate risk event, or a high risk event.
In various embodiments, the software defined alarm control unit includes a presentation layer configured to provide a graphical user interface to display the present status of each zones, the plurality of sensors, the fire response devices, and the fire suppression devices, wherein the present status of each zones is defined based on at least one of said supervisory and management related tasks performed by the software defined alarm control unit, said notification signals, and said alert data. In various embodiments, the hard logic device comprises an initiating device circuit configured to facilitate communication between the input devices and the software defined alarm control unit, said initiating device circuit is configured to enable the reception of one or more fire detection signals generated by the input devices, wherein the input devices are selected from the group consisting of break glass sensors, pull-down sensors, hose reel sensors, smoke detectors, fire detectors, sprinkler sensor, and heat detectors, and enable the reception of one or more error signals from the input devices, wherein the input device includes one or more diagnostic sensors mounted on a pipe connected to one or more of the fire suppression sensors, and a notification appliance circuit configured to facilitate the communication of said software defined alarm control unit with the plurality of fire suppression devices and the plurality of fire response devices, said notification appliance circuit is further configured to enable the transmission of one or more operating commands to actuate one or more of said fire suppression devices and fire response devices, and enable the transmission of one or more notification signals to actuate at least one of said plurality of response devices.
In various embodiments, said diagnostic sensor is configured to monitor the flow of water within the pipe, and generate the error signal if the flow of water is below a pre-defined threshold, monitor the level of water flowing through the pipe, and generate the error signal if the level of water indicates empty of partially filled condition, detect accumulation of debris in proximity of the sensor, and generate the error signal upon detection of debris, monitor the temperature of water flowing through the pipe; and generate control signal when the temperature of water is low indicating risk of freezing, and detect the leakage of water from the pipe, and generate the error signal if the leakage is detected. In various embodiments, the software defined alarm control unit (SDACU) comprises a soft logic layer configured to perform the plurality of supervisory and management related tasks, and is further configured to operate one or more fire suppression devices and fire response devices based on the fire detection signal, and one or more of said fire response devices based on the error signal.
In various embodiments, the plurality of supervisory and management related tasks performed by the software defined alarm control unit (SDACU) comprises detecting faulty or subpar performing devices by enabling the at least one of said input devices, said fire suppression devices, and said fire response devices to operate in a self-diagnosis mode, probing indicators associated with said devices, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of said input devices, said fire suppression devices, and said fire response devices, logging the current status of said devices at a pre-defined interval of time or upon detecting change in the status of at least one of said input devices, said fire suppression devices, and said fire response devices, periodically sending command signals to relay devices that are enabled to switch either actuate or de-actuate the fire suppression devices or fire response devices, re-defining the zones of at least one of said input devices, said fire suppression devices, and said fire response devices, establishing connection of the at least one of said input devices, said fire suppression devices, and said fire response devices said system with peer fire detection systems, and enrolling at least one additional sensors, fire suppression devices, and fire response devices in the system.
In various embodiments, the processing circuit is configured to crawl through the lookup table to identify the received building identifier and extract the location coordinates corresponding to the identified building identifier, wherein the extracted location coordinates corresponds to the location of the building reporting said fire alert data. In various embodiments, the risk assessment parameters are selected from the group consisting of social media feed, event type, life safety impact, local time and date, and business value. In various embodiments, the risk assessment unit is communicatively coupled with a display console which is configured to display the contextual risk score. In various embodiments, the processing circuit is configured to periodically perform the contextual analysis on the pre-defined risk assessment parameters to re-calculate the risk score for each of the pre-defined risk assessment parameters and thereby update the contextual risk score. In various embodiments, the processing circuit is configured to classify the received fire alert data as a low risk event if the contextual risk score is below a first pre-defined risk score, a moderate risk event if the contextual risk score is above a first pre-defined risk score and below a second pre-defined risk score, and a high risk event if the contextual risk score is above the second pre-defined risk score, wherein the first pre-defined risk score and the second pre-defined risk score is stored in the repository of the server.
In various embodiments, the soft logic layer comprises a detection module, implemented using one or more processor(s), said detection module is configured to receive the fire detection signal from the hard logic device, and is further configured to identify the zone of the one or more sensors reporting said fire detection signal, identify the plurality of fire suppression devices and the plurality of fire response devices associated with the zone identified based on the received fire detection signal, and generate operating commands or notification signals to actuate any one of or combination of the fire suppression devices and fire response devices associated with the identified zone, via the hard logic device.
Various objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the detailed description taken in conjunction with the accompanying drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
Overview
Before turning to the Figures, it should be understood that the disclosure is not limited to the details or methodology set forth in the description or illustrated in the figures. It should also be understood that the terminology is for the purpose of description only and should not be regarded as limiting.
Referring generally to the FIGURES, a software defined fire detection system and a fire risk assessment system is described. The fire detection system of the present disclosure employs a fire panel having a software defined alarm control unit (SDACU) and a low power hard logic device. The fire detection system of the present disclosure is more centralized, flexible, cost-effective, and fault-tolerant solution. The SDACU solution replaces existing fire panels with a server that includes software architecture supporting a soft logic layer and a presentation layer. The solution also includes a low powered hardware device that maintains any of the functions of a traditional fire panel that cannot be virtualized (hard logic and IO). In the context of this invention, an example of an application of the hard logic layer is the control of sounders and alarms linked to fire detection events. An example of an application the soft logic layer is a complex event process that alerts specific personnel based on the contextual information surrounding a fire detection event.
Building Management System and Fire System
Referring now to
The BMS that serves building 10 includes a fire system 100 (e.g., a fire detection and/or fire suppression system), according to some embodiments. Fire system 100 can include fire safety devices (e.g., notification devices such as fire detectors and pull stations, sprinklers, fire alarm control panels, fire extinguishers, water systems etc.) configured to provide fire detection, fire suppression, fire notification to building occupants 150, or other fire suppression-related services for building 10. Fire system 100 includes water system 130, according to some embodiments. Water system 130 provides water from a city line 102 through a building line 104 to building 10 to suppress fires within one or more rooms/spaces of building 10, according to some embodiments. In some embodiments, a main water line 106 is the dominant piping system that distributes water throughout one or more of the building floors in building 10. The water is distributed to the one or more building floors of building 10 via a piping system 108, according to some embodiments.
Referring still to
Fire notification devices 114 can be any devices capable of relaying audible, visible, or other stimuli to alert building occupants of a fire or other emergency condition. In some embodiments, fire notification devices 114 are powered by Initiating Device Notification Alarm Circuit (IDNAC) power from fire alarm control panel 112. In some embodiments, fire notification devices 114 may be powered by a DC power source (e.g. a battery). In some embodiments, fire notification devices 114 are powered by an external AC power source. Fire notification devices 114 can include a light notification device (e.g., a visual alert device) and a sound notification device (e.g., an aural alert device). The light notification device can be implemented as any component in fire notification devices 114 that alerts occupants 150 of an emergency by emitting visible signals. In some embodiments, fire notification devices 114 include a strobe light configured to emit strobe flashes (e.g., at least 60 flashes per minute) to alert occupants 150 of building 10 of an emergency situation or regarding the presence of a fire 180. A sound notification device can be any component in fire notification devices 114 that alerts occupants of an emergency by providing an aural alert/alarm. In some embodiments, fire notification devices 114 emit signals ranging from approximately 500 Hz (low frequency) to approximately 3 kHz (high frequency).
Fire alarm control panel 112 can be any computer capable of collecting and analyzing data from the fire notification system (e.g., building controllers, conventional panels, addressable panels, etc.). In some embodiments, fire alarm control panel 112 is directly connected to fire notification device 114 through IDNAC power. In some embodiments, fire alarm control panel 112 can be communicably connected to a network for furthering the fire suppression process, including initiating corrective action in response to detection of a fire.
In some embodiments, fire detection devices 118 are configured to detect a presence of fire in an associated room 160. Fire detection devices 118 may include any temperature sensors, light sensors, smoke detectors, etc., or any other sensors/detectors that detect fire. In some embodiments, fire detection devices 118 provide any of the sensed information to fire alarm control panel 112.
Referring particularly to
In some embodiments, fire alarm control panel 112 is configured to provide a BMS controller 366 (see
Fire Detection System
Referring particularly to
In some embodiments, fire alarm control panel 112 also receives pull station status information from any of pull stations 119 throughout building 10. In some embodiments, fire alarm control panel 112 is configured to receive a unique pull station ID (e.g., an identification number, an identification name, a unique ID code, etc.) from each of pull stations 119. In some embodiments, fire alarm control panel 112 is configured to perform a fire detection process based on any of the pull station status information received from pull stations 119 and the fire detection data received from fire detection devices 118. Fire alarm control panel 112 can also determine an approximate location of a fire based on the received device IDs of fire detection devices 118 and the received pull station IDs from pull stations 119.
In some embodiments, fire alarm control panel 112 is configured to cause fire notification devices 114 and/or fire suppression devices 116 to activate in response to determining that a fire is present in building 10. In some embodiments, fire alarm control panel 112 uses a database of locations corresponding to each of the unique device IDs of fire detection devices 118 and pull stations 119. In some embodiments, fire alarm control panel 112 is configured to determine an approximate location in building 10 of the fire. In some embodiments, fire alarm control panel 112 is configured to cause particular fire notification devices 114 and particular fire suppression devices 116 to activate in response to determining that a fire is present in a particular room 160 of building 10.
For example, fire alarm control panel 112 may cause all of fire notification devices 114 to activate in response to determining that a fire is present in any room 160 of building 10. In some embodiments, fire alarm control panel 112 is configured to cause only fire suppression devices 116 that are proximate the location of the detected fire to activate. For example, fire alarm control panel 112 may cause all fire notification devices 114 to activate in response to determining a fire is present in one room 160 of building 10 (to cause occupants 150 to evacuate building 10) but may only activate fire suppression devices 116 that are in the particular room where the fire is present.
In some embodiments, fire detection devices 118 are configured to perform a fire detection process locally and are communicably connected with fire notification devices 114. In some embodiments, fire detection devices 118 are configured to provide fire alarm control panel 112 with an indication of whether a fire is present nearby fire detection devices 118. In some embodiments, fire detection devices 118 are configured to cause fire notification devices 114 to activate in response to determining that a fire is present nearby. In some embodiments, fire detection devices 118 are configured to control an operation of fire suppression devices 116. In some embodiments, fire detection devices 118 are configured to cause one or more (e.g., the nearest) of fire suppression devices 116 to activate in response to detecting a fire.
In some embodiments, fire alarm control panel 112 is configured to provide a status of fire system 100 to network 446 and/or BMS controller 366. For example, fire alarm control panel 112 may provide a status of each of fire suppression devices 116 (e.g., activated or dormant), a status of each of fire notification devices 114 (e.g., activated or dormant), a status of each of fire detection devices 118 (e.g., fire detected, no fire detected), and a status of each of pull stations 119 (e.g., activated). In some embodiments, fire alarm control panel 112 also provides network 446 and/or BMS controller 366 with a location of each of fire notification devices 114, fire suppression devices 116, fire detection devices 118, and pull stations 119. In some embodiments, the location includes a floor, room, and relative location within the room of each of fire notification devices 114, each of fire suppression devices 116, each of fire detection devices 118, and each of pull stations 119. For example, fire alarm control panel 112 may provide BMS controller 366 with a status of a particular fire detection device 118, as well as what floor the particular fire detection device 118 is on, as well as a room 160 that the particular fire detection device 118 is in and what wall of the room (e.g., north wall, west wall, etc.) 160 the particular fire detection device 118 is located on. In some embodiments, fire alarm control panel 112 is configured to provide BMS controller 366 with any of the received information from any or all of fire detection devices 118, any or all of pull stations 119, etc. For example, fire alarm control panel 112 may provide BMS controller 366 with any of the smoke detection data, the temperature sensor data, the light intensity data, etc., of each of fire detection devices 118 as well as the corresponding room 160 within which each of fire detection devices 118 are located.
Software Defined Fire Detection System
Referring to
In an embodiment, the plurality of sensors (608-611) is spatially distributed within each of the zones of the building 10. Each of the plurality of sensors (608-611) is configured to periodically monitor a parameter indicative of the detection of fire, and is further configured to generate one or more fire detection signals, wherein the fire detection signal comprises zone information indicating the zone in which the fire is detected. In an exemplary embodiment, the plurality of sensors (608-611) is selected from the group consisting of, but is not limited to, break glass sensors 608, pull-down sensors 608, hose reel sensors 610, smoke detectors 611, fire detectors, sprinkler sensor 610, and heat detectors.
In an exemplary embodiment, the pull-down sensors 608 are configured to receive a manual input from an occupant 150 of building 10 to indicate the presence of a fire. Each pull-down sensor 608 may include a lever, a button, etc., configured to receive a user input indicating that a fire has occurred in building 10. In some embodiments, the pull-down sensors 608 are configured to provide a signal to the fire panel 601 regarding a status of the lever, button, etc. When an occupant 150 pulls the lever or pushes the button (or more generally inputs to any of pull-down sensors 608 that there is an emergency situation in the building 10), the pull-down sensors 608 provides the fire panel 601 with an indication that an occupant 150 of building 10 has actuated one of the pull-down sensor 608. In some embodiments, the indication which is the fire detection signal includes an identification of the particular pull-down sensor 608 that has been actuated and a location of the particular pull-down sensors 608, i.e., the zone information.
Further, the plurality of fire suppression devices 616 and the plurality of fire response devices 704 are associated with each of the zones of the building 10, wherein each of the fire response devices 704 and the fire suppression devices 616 are configured to be operated in either an actuation state or a de-actuated state. In an exemplary embodiment, the plurality of fire suppression devices 616 are selected from the group consisting of, but is not limited to, sprinklers, water hose reels, and fire extinguishers. In yet another exemplary embodiment, the plurality of fire response devices 704 are selected from the group consisting of, but is not limited to, shutters 606, doors 607, sirens 605, hooters, annunciators, HVAC fans and dampers. In another exemplary embodiment, one or more of the fire response devices 704 are enabled to provide audio and/or visual notifications upon actuation.
In accordance with an embodiment of the present disclosure, the fire panel 601 comprises a hard logic device 602b and a software defined alarm control unit 602a. The hard logic device 602b is communicatively coupled with the plurality of sensors (608-611), the plurality of fire response devices 704, and the plurality of fire suppression devices 616. The software defined alarm control unit (SDACU) 602a is implemented using a server, which may be a virtual server. The software defined alarm control unit 602a is configured to perform a plurality of supervisory and management related tasks, and is also configured to generate an alert data, subsequent to reception of at least one fire detection signal via the hard logic device 602b; generate an operating command to selectively operate one or more of the fire suppression devices 616 and fire response devices 704, subsequent to the reception of at least one fire detection signal via the hard logic device 602b; and provide a graphical user interface to display the present status of each zones, the plurality of sensors (608704-611), the fire response devices, and the fire suppression devices 616 based on the outcome of the supervisory and management related tasks.
In an embodiment of the present disclosure, the system 600 includes a diagnostic sensor mounted on a pipe connected to each of the fire suppression sensors respectively. Each of the diagnostic sensor (not specifically shown in the figures) is configured to: monitor the flow of water within the pipe, and generate an error signal if the flow of water is below a pre-defined threshold; detect the level of water flowing through the pipe, and generate the error signal if the level of water indicates empty of partially filled condition; detect the accumulation of debris in proximity of the sensor, and generate the error signal upon detection of debris; detect the temperature of water flowing through the pipe, and generate the error signal when the temperature of water is low indicating risk of freezing; and detect the leakage of water from the pipe, and generate the error signal if the leakage is detected. In an embodiment, each of the diagnostic sensor may be enabled to perform one or more of the abovementioned functions to generate the error signal. Further, the diagnostic sensor is configured to transmit the error signal towards the fore panel 601. In another embodiment, the diagnostic sensor may comprise one or more sensing units which may be configured to collectively perform the abovementioned functions to generate error signal(s).
The software defined alarm control unit 602a, of the fire panel 601 is configured to receive the error signal(s) from the diagnostic sensor via the hard logic device 602b. Subsequent to the reception of the error signal(s), the software defined alarm control unit 602a is configured to generate one or more notification signals to enable the hard logic device 602b to actuate one or more of the fire response devices 704.
In accordance with an embodiment of the present disclosure, the software defined alarm control unit 602a comprises a presentation layer 702 and a soft logic layer 705 both being implemented using one or more processor(s). In an embodiment, the processor implementing the soft logic layer 705 may be different than the processor implementing the presentation layer 702. Alternatively, same processor may be enabled to implement the soft logic layer 705 and the presentation layer 702.
The presentation layer 702 is enabled to provide a graphical user interface to display the present status of each of the zones of the building 10, the plurality of sensors 608-611), the fire response devices 704, and the fire suppression devices 616. Specifically, the present status of each zones may be defined based on at least one of the supervisory and management related tasks performed by the software defined alarm control unit 602a, the notification signals generated by the software defined alarm control unit 602a, and the alert data generated by the software defined alarm control unit 602a. Further, the soft logic layer 705 is configured to perform the plurality of supervisory and management related tasks, and is further configured to operate one or more fire suppression devices 616 and fire response devices 704 based on the received fire detection signal.
In one embodiment of the present implementation, the supervisory and management related tasks performed by soft logic layer 705 comprises: detecting (at step 902), faulty or subpar performing sensors (608-611) or devices (704, 616) by enabling the at least one of the sensors (608-611), the fire suppression devices 616, and the fire response devices 704 to operate in a self-diagnosis mode; probing (at step 904), indicators associated with at least one of the sensors (608-611), the fire suppression devices 616, and the fire response devices 704, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of the sensors (608-611), the fire suppression devices 616, and the fire response devices 704; logging (at step 906), the current status of the sensors (608-611), the fire suppression devices 616, and the fire response devices 704 periodically or upon detecting change in the status of at least one of the sensors (608-611), the fire suppression devices 616, and the fire response devices; periodically sending (at step 908), command signals at a pre-defined intervals of time to relay devices, i.e., AUX relay (as shown in
In an embodiment, the order in which the steps 902 to 916 affiliated to the supervisory and management related tasks may be performed by the soft logic layer in a varied order. In another embodiment, the soft logic layer may be configured to execute one or more steps (902 to 916), in any order, to perform the supervisory and management related tasks.
In one embodiment, the soft logic layer 705 comprises a detection module 722. The detection module 722 is configured to receive the fire detection signal from the hard logic device 602b, and is further configured to: identify, the zone of the one or more sensors (608-611) reporting said fire detection signal; identify, the plurality of fire suppression devices 616 and the plurality of fire response devices 704 associated with the zone identified based on the received fire detection signal; and generate, operating commands to actuate the fire suppression devices 616 and the fire response devices 704 associated with the identified zone, via the hard logic device. In an alternate embodiment, the detection module 722 may be enabled to actuate the fire response devices 704 associated with another zones.
Additionally, at step 916, soft logic layer 705 is configured to display the present status of each of the zones, sensors, fire suppression devices, and fire response devices. In an embodiment, the fire detection system includes a display console 614 that is communicatively coupled with the software defined alarm control unit 602a of the fire panel 601. The display console 614 is configured to display the present status of the fire detection system 600, wherein the present status includes the state of each of the zones, the plurality of fire suppression devices 616, and the plurality of fire response devices 704. In one embodiment, the presentation layer 702 may enable the display console to selectively display the status of the zones reporting fire detection signal by means of one or more sensors (608-611).
In another embodiment, the fire panel 601 and specifically the software defined alarm control unit 602a is communicatively coupled to a cloud storage 615, thereby facilitating supplementary monitoring, supervision, software provisioning, and firmware updates.
In an embodiment, the system 600 includes a communication interface 726 configured to facilitate a user to provide user-defined commands, wherein the user-defined command provided by the user correspond to rules for performing supervisory and management related tasks.
In one embodiment, the software defined alarm control unit 602a is configured to generate fire alert data by performing contextual based analysis on the received actuation signal. In still another embodiment of the present disclosure, the hard logic device 602b is provided with a city circuit (not specifically labelled) that is configured to provide the alert data to at least one emergency response team for taking necessary preventive actions. In one embodiment, the alert data may be transmitted towards a portable electronic device associated with one or more users to provide alerts.
Referring to
In some embodiments, the method includes a process 900 of performing a plurality of supervisory and management related tasks, by the server. The steps include: detecting (at step 902), faulty or subpar performing sensors or devices. In an embodiment, the server is configured to enable the sensors, the fire suppression devices, and the fire response devices to operate in a self-diagnosis mode to detect faulty sensor(s) and/or device(s). Further, steps of performing supervisory and management related tasks include probing (at step 904), indicators associated with at least one of the sensors, the fire suppression devices, and the fire response devices, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of the sensors, the fire suppression devices, and the fire response devices; and logging (at step 906), the current status of the sensors, the fire suppression devices, and the fire response devices at a pre-defined interval of time or upon detecting change in the status of at least one of the sensors, the fire suppression devices, and the fire response devices.
Still further, the steps of performing supervisory and management related tasks include periodically sending (at step 908), command signals at a pre-defined intervals of time to relay devices that are enabled to either switch on or off the fire suppression devices 616 or fire response devices 704; re-defining (at step 910), the zones of at least one of the sensors, the fire suppression devices, and the fire response devices; establishing connection (at step 912) of the at least one of the sensors, the fire suppression devices, and the fire response devices of the system with at least one peer fire detection systems; enrolling (at step 914), at least one additional sensors, additional fire suppression devices, and additional fire response devices in the system 600; and displaying (at step 916) the present status of each of the zones, the plurality of sensors, the fire response devices, and the fire suppression devices based on the outcome of the supervisory and management related tasks.
In an embodiment, the plurality of sensors is selected from the group consisting of break glass sensors, pull-down sensors, hose reel sensors, smoke detectors, fire detectors, sprinkler sensor, and heat detectors.
In some embodiments, the fire suppression devices being operated by the software defined alarm control unit correspond to the fire suppression devices deployed in the zone from which fire is detected by the one or more sensors.
Fire Panel
In one operative configuration of the present disclosure, a fire panel 601 for a fire detection system 600 of a building 10 having a plurality of zones defined therewithin is envisaged. Each zone is associated with a plurality of input devices 701, and at least one of or combination of a plurality of fire suppression devices 616 and a plurality of fire response devices 704. The fire panel 601 comprises a software defined alarm control unit 602a and a hard logic device 602b, wherein the hard logic device 602b is communicatively coupled with the software defined alarm control unit 602a, the plurality of input devices 701, the plurality of fire suppression devices 616, and the plurality of response devices 704. Specifically, the hard logic device 602b is configured to facilitate the communication of the software defined alarm control unit 602a with the input devices 701, the fire suppression devices 616, and the fire response devices 704.
The hard logic devices 602b comprises an initiating devices circuit (IDC), a notification appliance circuit (NAC), a power supply unit, an auxiliary power supply unit, relays, and a city circuit.
In an embodiment, the initiating device circuit is configured to enable the reception of one or more fire detection signals generated by the input devices 701, wherein the input devices are selected from the group consisting of, but is not limited to, break glass sensors, pull-down sensors 608, hose reel sensors 610, smoke detectors 611, fire detectors, sprinkler sensors 609, and heat detectors. In another embodiment, the initiating device circuit is configured to enable the reception of one or more error signals generated by the input devices 701, wherein the input devices 701 generating error signals are diagnostic sensors. These diagnostic sensors are mounted on a pipe connected to each of the fire suppression sensors 616. In an embodiment, the diagnostics sensors may be, but is not limited to, a sprinkler supervisory switch and a water flow switch.
In some embodiments, the notification appliance circuit is configured to facilitate the connection of the software defined alarm control unit 602a with the plurality of fire suppression devices 616 and the plurality of fire response devices 704. The notification appliance circuit is further configured to enable the transmission of one or more operating commands, generated by the software defined alarm control unit 602a, to at least one of or combination of the fire suppression devices 616 and fire response devices 704. In an embodiment, selective actuation of the fire suppression devices 616 and the fire response devices 704 may be determined based on the type of signal generated and reported by the input devices 701. For an instance, if error signal is received from the input devices 701 then only fire response devices 704 may be actuated. Similarly, if fire detection signal is being received from the input devices 701 then both of the fire response devices 704 and fire suppression devices 616 may be actuated.
In an embodiment, the fire response devices 704 may be audible devices 605, visible devices (not specifically labelled), HVAC fans and dampers (not specifically labelled), doors 607, shutters 606, and the like. The audible devices 605 may be configured to provide audio notification indicating detection of fire or error. The visible devices may be enabled to provide visual indication to indicate the detection of fire or error. Similarly, upon detection of fire, the doors 607 and shutters 606 may be laid open to facilitate quick evacuation of individuals those who may otherwise be trapped in the zone where fire is detected.
In an embodiment, the power supply unit, of the hard logic device 602b, is configured to draw power from the mains supply, and is further configured to supply power to the software defined alarm control unit 602a. In one embodiment, the input devices 701 may be enabled to draw power from the power supply unit of the hard logic device 602b. In some embodiments, the auxiliary power supply unit is provided within the hard logic device 602b to facilitate the supply of power to the software defined alarm control unit 602a in an event when the power supplied by the power supply unit is nil. The auxiliary power supply unit may contain one or more batteries, from which the auxiliary power may be supplied. Typically, during normal mode of operations, the battery of the auxiliary power supply unit may be enabled to receive the power from the power supply unit for charging, wherein one or more signal conditioning circuits may be provided within the auxiliary power supply unit to condition the power supplied by the power supply unit.
In some embodiments of the present disclosure, the software defined alarm control unit 602a is configured to perform a plurality of supervisory and management related tasks. The software defined alarm control unit 602a may be implemented using one or more processor(s). In a preferred embodiment, the software defined alarm control unit 602a is implemented using a virtual server. The software defined alarm control unit 602a is configured to generate one or more operating commands to selectively operate one or more fire suppression devices 616 and the fire response devices 704 based on the fire detection signal generated by at least one of the input devices.
In one implementation, the operating commands generated by the software defined alarm control unit 602a may be enabled to operate one or more fire suppression devices 616 and the fire response devices 704 associated with the zone from which the fire detection signal is being reported. Alternatively, in another implementation, the software defined alarm control unit 602a may be enabled to operate at least one of or combination of the fire suppression devices and the fire response devices associated with one or more zones. Further, the software defined alarm control unit (SDACU) is configured to generate a notification signal to actuate one or more of the fire response devices 704 based on the reception of error signal(s) generated by at least one of the input devices 701. In an embodiment, the notification signal is enabled to actuate the one or more fire response devices irrespective of their association with different zones. Still further, the software defined alarm control unit (SDACU) is configured to generate an alert data based on at least one of or combination of the fire detection signal and error signal. In some embodiments, the software defined alarm control unit 602a is configured to transmit the alert data to one or more remote servers associated with at least one emergency response team, wherein the alert data is transmitted by the software defined alarm control unit via the city circuit housed within the hard logic device 602b. In an embodiment, the emergency response team may be a fire department. In one embodiment, the alert data may be transmitted towards a portable electronic device associated with one or more users to provide alerts.
In an embodiment of the present disclosure, the software defined alarm control unit 602a includes a presentation layer 702 and a soft logic 705. The soft logic 705 is implemented using one or more processor(s), and includes a health check module 706, a device security module 708, a logging module 710, a relay control module 712, a zone management module 714, a disable/enable module 716, a peer-to-peer connectivity module 718, an enrolment module 720, and a detection module 722.
The health check module 706 is configured to detect faulty or subpar performing devices by enabling the at least one of the input devices 701, the fire suppression devices 616, and the fire response devices 704 to operate in a self-diagnosis mode.
The device security module 708 is configured to probe indicators associated with at least one of the input devices 701, the fire suppression devices 616, and the fire response devices 704, wherein the indicators correspond to the indication of either removal, tempering, or unauthorized usage of at least one of the input devices 701, the fire suppression devices 616, and the fire response devices 704.
The logging module 710 is configured to monitor and maintain a log of the current status or state of the input devices 701, the fire suppression devices 616, and the fire response devices 704 at a pre-defined interval of time or upon detecting change in the status of at least one of the input devices 701, the fire suppression devices 616, and the fire response devices 704.
The relay control module 712 is configured to periodically send command signals at pre-defined intervals of time to the relay devices that are enabled to switch either on or off the fire suppression devices 616 or fire response devices 704.
The zone management module 714 is configured facilitate re-defining of the zones of at least one of the input devices 701, the fire suppression devices 616, and the fire response devices 704. Typically, in ambit of the present disclosure, a single input devices 701 can be associated with more than one zone. Similarly, a single fire suppression device 616 or a single fire response device 704 may be associated with more than one zone.
The enable/disable module 716 is configured to set a state of the input devices 701, the fire suppression devices 616, and the fire response devices 704 as enabled state or disabled state.
The peer-to-peer connectivity module 718 is configured to facilitate communication by establishing connection of at least one of the input devices 701, the fire suppression devices 616, and the fire response devices 704 of the system 600 with one or more peer fire detection systems.
The enrolment module 720 is configured to facilitate addition of at least one of an additional input device, an additional fire suppression device, and an additional fire response device in the system.
In an embodiment, the detection module 722 is implemented using one or more processor(s), and is configured to receive the fire detection signal from the hard logic device 602b, and is further configured to:
In another embodiment, the detection module 722 is also enabled to perform the following tasks of:
Referring to
In accordance with the present disclosure, each of the input devices 701 is configured to generate at least one of a fire detection signal or an error signal. In an embodiment, the input devices configured to generate fire detections signals are plurality of sensors (608-611) configured to periodically monitor parameter indicative of the detection of fire, and subsequent to detection of fire they are enabled to generate the fire detection signal. In an exemplary embodiment, the plurality of sensors is selected from the group consisting of break glass sensors, pull-down sensors, hose reel sensors, smoke detectors, fire detectors, sprinkler sensor, and heat detectors. In some embodiments, the plurality of sensors are configured to generate the fire detection signal based on an action performed of an individual, i.e., breaking the glass of the break glass sensor, or maneuvering the level or switch of the pull down sensor. In other embodiments, the plurality of sensors are configured to monitor the ambient conditions, i.e., generation of smoke, rising temperature, and the like. In an embodiment, the sprinkler sensor may be configured to detect the actuation of an associated sprinkler, and generate fire detection signal. In another embodiment, the hose reel sensor may be configured to detect the unwinding of the hose reel and subsequent to complete unwinding of the hose reel, the fire detection signal may be generated.
In another embodiment, the input devices configured to generate error signals are diagnostic sensors. A diagnostic sensor is mounted on a pipe connected to each of the fire suppression sensors respectively. The diagnostic sensors are configured to: monitor the flow of water within the pipe connection the fire suppression sensor, and generate the error signal if the flow of water thorough the pipe is below a pre-defined threshold; detect the level of water flowing through the pipe, and generate the error signal if the level of water indicates empty or partially filled condition; detect the accumulation of debris in proximity of the sensor, and generate the error signal upon detection of debris; detect the temperature of water flowing through the pipe, and generate the error signal when the detected temperature of water is low indicating risk of freezing; and detect the leakage of water from the pipe, and generate the error signal if the leakage from the pipe is detected.
In an embodiment, the fire suppression devices may be selected from the group consisting of sprinklers, water hose reels, and fire extinguishers. In another embodiment, the fire response devices may be selected from the group consisting of shutters, doors, sirens, hooters, annunciators, HVAC fans and dampers.
The fire detection and risk assessment system of the present disclosure comprises a fire panel 601 and a risk assessment unit 1004. The fire panel 601 comprises a hard logic device 602b and a software defined alarm control unit (SDACU) 602a. The hard logic device 602b is communicatively coupled with the plurality of input devices 701, the plurality of fire response devices 704, and the plurality of fire suppression devices 616.
In some embodiments, the hard logic device 602b comprises an initiating device circuit (IDC). The initiating device circuit is an input circuit or a detection circuit that is configured to carry the signals generated by the input devices 701. Alternatively, the initiating device circuit is enabled to determine the change of state of the input devices 701, wherein upon detecting the change of state the software defined alarm control unit (SDACU) is notified by the initiating device circuit. In still another alternate embodiment, the initiating device circuit is enabled to perform self-diagnostics, wherein the health of the initiating device circuit's connection with the input devices 701 and the software defined alarm control unit (SDACU) 602a is evaluated and determined.
In accordance with an embodiment of the present disclosure, the initiating device is configured to: enable the reception of one or more fire detection signals generated by the plurality of sensors, i.e., input devices, and enable the reception of one or more error signals from the diagnostic sensors, i.e., input devices.
The notification application circuit, of the hard logic device 602b, is configured to facilitate the communication of the software defined alarm control unit 602a with the plurality of fire suppression devices 616 and the plurality of fire response devices 704. Additionally, the notification application circuit is configured to enable the transmission of one or more operating commands to one or more fire suppression devices 616 and fire response devices 704, and is further configured to enable the transmission of notification signals, generated by the SDACU 602a, to one or more fire response devices 704.
In accordance with the present disclosure, the software defined alarm control unit (SDACU) is implemented using a virtual server and specifically by one or more processor(s) of the virtual server. The software defined alarm control unit 602a is configured to perform a plurality of supervisory and management related tasks. Additionally, subsequent to reception of at least one fire detection signal, via the hard logic device, the SDACU 602a may be configured to: generate an operating command to selectively operate one or more of the fire suppression devices and fire response devices in actuated state; generate an alert data indicating the detection of fire, wherein the fire alert data comprises a building identifier and an event type data; and generate a notification signal based on the error signals generated by at least one of said input devices.
In an embodiment, the risk assessment unit 1004 of the present disclosure is implemented using a remote server having one or more processor(s) and/or controller(s). The risk assessment unit 1004 is communicatively coupled to the fire panel 601 of the fire detection units. In some embodiments, the risk assessment unit 1004 comprises a repository 1110 and a processing circuit 1005. The repository 1110 is configured to store a lookup table having a list of building identifiers, and a location coordinate corresponding to each of the building identifiers. In an embodiment, the processing circuit 1005 is implemented using one or more processor(s). The processing circuit 1005 is configured to cooperate with the repository to access the lookup table stored within the repository 1110. In an embodiment, the processing circuit 1005 is configured to identify the location of the building 1010 based on the building identifier contained within the fire alert data 1002. In a preferred embodiment, the processing circuit 1005 includes a crawler and extractor. The crawler and extractor is configured crawl through the lookup table to identify the received building identifier and extract the location coordinates corresponding to the identified building identifier, wherein the extracted location coordinates corresponds to the location of the building 1010 reporting fire alert data 1002. Further, the processing circuit 1005 is configured to contextually analyze the fire alert data 1002 with any one of or combination of the identified location of the building 1010 and the event type data, and is based on a plurality of pre-defined risk assessment parameters to generate a risk score corresponding to each of the risk assessment parameters. Still further, the processing circuit 1005 is configured to aggregate the risk score of each of the risk assessment parameters to generate an aggregated risk score and subsequently, normalize the aggregated risk score to generate a normalized risk score. The processing circuit 1005 is also configured to determine a contextual risk score by evaluating the normalized risk score with historical data thereby classifying the received fire alert data as any one of a low risk event, a moderate risk event, and a high risk event.
In an embodiment, the risk assessment parameters are selected from the group consisting of, but is not limited to, social media feeds, event type, life safety impact, local time and date, and business value.
Risk Assessment System
In one implementation of the present disclosure, a computer implemented fire risk assessment system 1000 is disclosed. The fire risk assessment system 1000 comprises a plurality of fire detection units, and a server 1004. In an embodiment, the server 1004 is a remote server associated with one or more emergency response team. In another embodiment, the fire detection units may correspond to the fire detection system 600 described hereinabove.
In some embodiments, the fire detection units are implemented using one or more processor(s). Each of the fire detection unit is associated with a building 1010, and is configured to generate a fire alert data 1002 having a building identifier and an event type data.
In an embodiment, the server 1004 is communicatively coupled with the fire detection units of each of the building 1010, and is configured to receive at least one fire alert data 1002 from one or more fire detection units. The server 1004 may be communicatively coupled with the fire detection units by means of a communication interface which may include wired or wireless communications interfaces (e.g., jacks, antennas, transmitters, receivers, transceivers, wire terminals, etc.) for conducting data communications. In various embodiments, the communication interface can be direct (e.g., local wired or wireless communications) or via a communications network (e.g., a WAN, the Internet, a cellular network, etc.). For example, communication interface can include an Ethernet card and port for sending and receiving data via an Ethernet-based communications link or network. In another example, the communication interface can include a Wi-Fi transceiver for communicating via a wireless communications network. In another example, the communication interface can include cellular or mobile phone communications transceivers.
In some embodiments, the server 1004 comprises a repository 1110 and a processing circuit 1005. The repository 1110 may be enabled to store a lookup table having a list of building identifiers, and a location coordinate corresponding to each of the building identifiers. In an embodiment, the repository 1110 may be configured to store a pre-defined first risk score and a pre-defined second risk score. The processing circuit 1005 may be enabled to cooperate with the repository 1110 to access the stored lookup table.
The processing circuit 1005 may be configured to identify the location of the building 1010 based on the building identifier contained within the fire alert data 1002. In an embodiment, the processing circuit 1005 may be configured to crawl through the lookup table to identify the received building identifier and extract the location coordinates corresponding to the identified building identifier, wherein the extracted location coordinates corresponds to the location of the building 1010 reporting the fire alert data 1002. Further, the processing circuit 1005 is configured to: contextually analyze the fire alert data 1002 with any one of or combination of the identified location of the building and the event type data based on a plurality of pre-defined risk assessment parameters to generate a risk score corresponding to each of the risk assessment parameters; aggregate the risk score of each of the risk assessment parameters to generate an aggregated risk score; normalize the aggregated risk score to generate a normalized risk score; and a contextual risk score by evaluating the normalized risk score with historical data, and subsequently classify the received fire alert data as any one of a low risk event, a moderate risk event, and a high risk event.
In an operative configuration of the present implementation, the processing circuit 1005 includes a social media feed analyzer 1101, an event type analyzer 1102, a life safety impact analyzer 1103, a time and date analyzer 1104, and a business value analyzer 1105. The social media feed analyzer 1101 is configured to determine a first risk score by performing social media feed analysis to identify the sources of risk in proximity of the location of the building 1010 reporting fire alert data 1002, wherein the value of the first risk score is directly proportional to the number of identified sources of risk. The event type analyzer 1102 is configured to determine a second risk score by performing event type data analysis, wherein the second risk score is based on the type of the event.
The life safety impact analyzer 1103 is configured to determine a third risk score by identifying the presence of people in the vicinity of the building 1010, wherein the value of the third risk score is directly proportional to human density in the vicinity of the building 1010. The time and date analyzer 1104 is configured to determine a fourth risk score by identifying the time and date of receiving the fire alert data, wherein the value of the fourth risk score is higher for the time and date when human population is expected to be at peak. The business value analyzer 1105 is configured to determine a fifth risk score by identifying the value of assets under threat, wherein the value of fifth risk score is directly proportional to the value of assets under threat. In an embodiment, each of the social media feed analyzer 1101, the event type analyzer 1102, the life safety impact analyzer 1103, the time and date analyzer 1104, and the business value analyzer 1105 may be implemented using one or more processor(s).
In one embodiment, the processing circuit 1005 may further include an aggregator 1106, a data normalizer 1107, and a risk score generator 1109. In an alternate embodiment, the aggregator 1106, the data normalizer 1107, and the risk score generator 1109 may be enabled using a separate processing circuit having one or more processor(s). The aggregator 1106 may be configured to cooperate with a social media feed analyzer 1101, an event type analyzer 1102, a life safety impact analyzer 1103, a time and date analyzer 1104, and a business value analyzer 1105 to receive and aggregate the first, second, third, fourth and fifth risk scores respectively to generate an aggregated risk score. The data normalizer 1107 may be configured to cooperate with the aggregator 1106 to receive the aggregated risk score, and may be further configured to normalize the aggregated risk score to generate a normalized risk score.
Further, the risk score generator 1109 may be configured to cooperate with the data normalizer 1107 to determine contextual risk score by analyzing the normalized risk score with historical data retrieved from a historical database 1108, and further configured to classify the received fire alert data as any one of the low risk event, the moderate risk event, and the high risk event. In an embodiment, the risk score generator 1109 is configured to receive the normalized risk score from the data normalizer 1107, and the first and the second pre-defined risk scores from the repository 1110. The risk score generator 1109 is configured to determine the contextual risk score by analyzing the normalized risk score with historical data received from the historical database 1108, and is further configured to compare the contextual risk score with the first and second pre-defined risk score to classify the received fire alert data 1002 as any one of low risk event, moderate risk event, and high risk event.
Specifically, the risk score generator 1109 is configured to: classify the received fire alert data as the low risk event when the contextual risk score is below the first pre-defined risk score; classify the received fire alert data as moderate risk event when the contextual risk score is between the first pre-defined risk score and the second pre-defined risk score; and classify the received fire alert data as high risk event when the contextual risk score is greater than the second pre-defined risk score.
In an embodiment, the processing circuit 1005 is configured to periodically perform the contextual analysis on the pre-defined risk assessment parameters to re-calculate the risk score for each of the pre-defined risk assessment parameters and thereby update the contextual risk score and risk classification. Further, the processing circuit 1005 may be configured to periodically time stamp the contextual risk score, and store the time stamped contextual risk score in the repository 1110 and the historical database 1108.
In another embodiment, the risk score generator 1109, of the processing circuit 1005, is configured to store the contextual risk score in the repository 1110, and is further communicatively coupled to a display console 1006 to display the determined contextual risk score along with the classification of the fire alert data as any one of the low risk event, the moderate risk event, and the high risk event. In an exemplary embodiment, the display console 1006 is communicatively coupled with the processing circuit 1005 and specifically with the risk score generator by means of an application programming interface (API) 1111.
In another embodiment, the risk assessment parameters are selected from the group consisting of social media feeds, event type, life safety impact, local time and date, and business value.
Referring to
In one embodiment, the step of performing contextual analysis based on any one of or combination of the location of the building and event type data to generate the plurality of risk sores is performed by the following sub steps. The sub steps include: determining a first risk score by performing social media feed analysis to identify the sources of risk in proximity of the location of the building reporting fire alert data, wherein the value of said first risk score is directly proportional to the number of identified sources of risk; determining a second risk score by performing event type data analysis, wherein the second risk score is based on the type of said event; determining a third risk score by identifying the presence of people in the vicinity of the building, wherein the value of said third risk score is directly proportional to human density in the vicinity of the building; determining a fourth risk score by identifying the time and date of receiving the fire alert data, wherein the value of the fourth risk score is higher for the time and date when human density is expected to be at peak; and determining a fifth risk score by identifying the value of assets under threat, wherein the value of the fifth risk score is directly proportional to the value of assets under threat.
In still another embodiment, the repository is configured to store a fire pre-defined risk score and a second pre-defined risk score, and wherein the step of classifying, the received fire alert data as one of the low risk event, the moderate risk event, and the high risk event based on the value of the contextual risk score is performed by the following sub steps. The sub steps include: receiving the first and second pre-defined risk score from the repository; comparing the contextual risk score with the first and second pre-defined risk scores; and classifying the received fire alert data as low risk event, moderate risk event, and high risk event, wherein the fire alert data is classified as low risk event when the contextual risk score is below the first pre-defined risk score, the received fire alert data is classified as the moderate risk event when the contextual risk score is between the first pre-defined risk score and a second pre-defined risk score, and the received fire alert data is classified as the high risk event when the contextual risk score is greater than the second pre-defined risk score.
Additionally, in an embodiment, the method includes the step of displaying the determined contextual risk score along with the classification of the fire alert data as any one of a low risk event, a moderate risk event, and a high risk event on a dashboard of the display console 1006.
Technical Advancement
The fire panel having SDACU and hard logic device which is low powered, as disclosed in the present disclosure replaces conventional fire panels. The SDACU is implemented using a server that includes software architecture supporting a soft logic layer and a presentation layer. The hard logic device is enabled to perform any of the functions of a traditional fire panel that cannot be virtualized (hard logic and IO). In the context of this invention, an example of an application of the hard logic layer is the control of sounders and alarms linked to fire detection events. An example of an application the soft logic layer is a complex event process that alerts specific personnel based on the contextual information surrounding a fire detection event.
As compared to the conventional fire panels/fire control panels, present disclosure envisages the fire detection system with a fire panel, having following advantages, but is not limited to, that:
Additionally, the risk assessment of the present disclosure determines a fire specific risk score that is automatically calculated from contextual data surrounding an alarm or alert event that can be used to prioritize events.
Configuration of Exemplary Embodiments
The construction and arrangement of the systems and methods as shown in the various exemplary embodiments are illustrative only. Although only a few embodiments have been described in detail in this disclosure, many modifications are possible (e.g., variations in sizes, dimensions, structures, shapes and proportions of the various elements, values of parameters, mounting arrangements, use of materials, colors, orientations, etc.). For example, the position of elements can be reversed or otherwise varied and the nature or number of discrete elements or positions can be altered or varied. Accordingly, all such modifications are intended to be included within the scope of the present disclosure. The order or sequence of any process or method steps can be varied or re-sequenced according to alternative embodiments. Other substitutions, modifications, changes, and omissions can be made in the design, operating conditions and arrangement of the exemplary embodiments without departing from the scope of the present disclosure.
The present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing various operations. The embodiments of the present disclosure can be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwired system. Embodiments within the scope of the present disclosure include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
Although the figures show a specific order of method steps, the order of the steps may differ from what is depicted. Also two or more steps can be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen and on designer choice. All such variations are within the scope of the disclosure. Likewise, software implementations could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various connection steps, processing steps, comparison steps and decision steps.
This application claims the benefit and priority of U.S. Provisional Patent Application No. 62/969,957 filed on Feb. 4, 2020, the entire disclosure of which is incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
5301109 | Landauer et al. | Apr 1994 | A |
5446677 | Jensen et al. | Aug 1995 | A |
5581478 | Cruse et al. | Dec 1996 | A |
5812962 | Kovac | Sep 1998 | A |
5960381 | Singers et al. | Sep 1999 | A |
5973662 | Singers et al. | Oct 1999 | A |
6014612 | Larson et al. | Jan 2000 | A |
6031547 | Kennedy | Feb 2000 | A |
6134511 | Subbarao | Oct 2000 | A |
6157943 | Meyer | Dec 2000 | A |
6285966 | Brown et al. | Sep 2001 | B1 |
6363422 | Hunter et al. | Mar 2002 | B1 |
6385510 | Hoog et al. | May 2002 | B1 |
6389331 | Jensen et al. | May 2002 | B1 |
6401027 | Xu et al. | Jun 2002 | B1 |
6437691 | Sandelman et al. | Aug 2002 | B1 |
6477518 | Li et al. | Nov 2002 | B1 |
6487457 | Hull et al. | Nov 2002 | B1 |
6493755 | Hansen et al. | Dec 2002 | B1 |
6577323 | Jamieson et al. | Jun 2003 | B1 |
6626366 | Kayahara et al. | Sep 2003 | B2 |
6646660 | Patty | Nov 2003 | B1 |
6704016 | Oliver et al. | Mar 2004 | B1 |
6732540 | Sugihara et al. | May 2004 | B2 |
6764019 | Kayahara et al. | Jul 2004 | B1 |
6782385 | Natsumeda et al. | Aug 2004 | B2 |
6813532 | Eryurek et al. | Nov 2004 | B2 |
6816811 | Seem | Nov 2004 | B2 |
6823680 | Jayanth | Nov 2004 | B2 |
6826454 | Sulfstede | Nov 2004 | B2 |
6865511 | Frerichs et al. | Mar 2005 | B2 |
6925338 | Eryurek et al. | Aug 2005 | B2 |
6986138 | Sakaguchi et al. | Jan 2006 | B1 |
7031880 | Seem et al. | Apr 2006 | B1 |
7401057 | Eder | Jul 2008 | B2 |
7552467 | Lindsay | Jun 2009 | B2 |
7627544 | Chkodrov et al. | Dec 2009 | B2 |
7818249 | Lovejoy et al. | Oct 2010 | B2 |
7889051 | Billig et al. | Feb 2011 | B1 |
7996488 | Casabella et al. | Aug 2011 | B1 |
8078330 | Brickfield et al. | Dec 2011 | B2 |
8104044 | Scofield et al. | Jan 2012 | B1 |
8229470 | Ranjan et al. | Jul 2012 | B1 |
8401991 | Wu et al. | Mar 2013 | B2 |
8495745 | Schrecker et al. | Jul 2013 | B1 |
8516016 | Park et al. | Aug 2013 | B2 |
8532808 | Drees et al. | Sep 2013 | B2 |
8532839 | Drees et al. | Sep 2013 | B2 |
8600556 | Nesler et al. | Dec 2013 | B2 |
8635182 | Mackay | Jan 2014 | B2 |
8682921 | Park et al. | Mar 2014 | B2 |
8731724 | Drees et al. | May 2014 | B2 |
8737334 | Ahn et al. | May 2014 | B2 |
8738334 | Jiang et al. | May 2014 | B2 |
8751487 | Byrne et al. | Jun 2014 | B2 |
8788097 | Drees et al. | Jul 2014 | B2 |
8805995 | Oliver | Aug 2014 | B1 |
8843238 | Wenzel et al. | Sep 2014 | B2 |
8874071 | Sherman et al. | Oct 2014 | B2 |
8941465 | Pineau et al. | Jan 2015 | B2 |
8990127 | Taylor | Mar 2015 | B2 |
9070113 | Shafiee et al. | Jun 2015 | B2 |
9116978 | Park et al. | Aug 2015 | B2 |
9185095 | Moritz et al. | Nov 2015 | B1 |
9189527 | Park et al. | Nov 2015 | B2 |
9196009 | Drees et al. | Nov 2015 | B2 |
9229966 | Aymeloglu et al. | Jan 2016 | B2 |
9286582 | Drees et al. | Mar 2016 | B2 |
9311807 | Schultz et al. | Apr 2016 | B2 |
9344751 | Ream et al. | May 2016 | B1 |
9354968 | Wenzel et al. | May 2016 | B2 |
9507686 | Horn et al. | Nov 2016 | B2 |
9524594 | Ouyang et al. | Dec 2016 | B2 |
9558196 | Johnston et al. | Jan 2017 | B2 |
9652813 | Gifford et al. | May 2017 | B2 |
9753455 | Drees | Sep 2017 | B2 |
9811249 | Chen et al. | Nov 2017 | B2 |
9838844 | Emeis et al. | Dec 2017 | B2 |
9886478 | Mukherjee | Feb 2018 | B2 |
9948359 | Horton | Apr 2018 | B2 |
10055114 | Shah et al. | Aug 2018 | B2 |
10055206 | Park et al. | Aug 2018 | B2 |
10116461 | Fairweather et al. | Oct 2018 | B2 |
10169454 | Ait-Mokhtar et al. | Jan 2019 | B2 |
10171586 | Shaashua et al. | Jan 2019 | B2 |
10187258 | Nagesh et al. | Jan 2019 | B2 |
10514963 | Shrivastava et al. | Dec 2019 | B2 |
10515098 | Park et al. | Dec 2019 | B2 |
10534326 | Sridharan et al. | Jan 2020 | B2 |
10536295 | Fairweather et al. | Jan 2020 | B2 |
10705492 | Harvey | Jul 2020 | B2 |
10708078 | Harvey | Jul 2020 | B2 |
10845771 | Harvey | Nov 2020 | B2 |
10854194 | Park et al. | Dec 2020 | B2 |
10862928 | Badawy et al. | Dec 2020 | B1 |
10921760 | Harvey | Feb 2021 | B2 |
10921972 | Park et al. | Feb 2021 | B2 |
10969133 | Harvey | Apr 2021 | B2 |
10986121 | Stockdale et al. | Apr 2021 | B2 |
11016998 | Park et al. | May 2021 | B2 |
11024292 | Park et al. | Jun 2021 | B2 |
11038709 | Park et al. | Jun 2021 | B2 |
11070390 | Park et al. | Jul 2021 | B2 |
11073976 | Park et al. | Jul 2021 | B2 |
11108587 | Park et al. | Aug 2021 | B2 |
11113295 | Park et al. | Sep 2021 | B2 |
11229138 | Harvey et al. | Jan 2022 | B1 |
11284544 | Lingle | Mar 2022 | B1 |
11314726 | Park et al. | Apr 2022 | B2 |
11314788 | Park et al. | Apr 2022 | B2 |
20020010562 | Schleiss et al. | Jan 2002 | A1 |
20020016639 | Smith et al. | Feb 2002 | A1 |
20020059229 | Natsumeda et al. | May 2002 | A1 |
20020123864 | Eryurek et al. | Sep 2002 | A1 |
20020147506 | Eryurek et al. | Oct 2002 | A1 |
20020177909 | Fu et al. | Nov 2002 | A1 |
20030005486 | Ridolfo et al. | Jan 2003 | A1 |
20030014130 | Grumelart | Jan 2003 | A1 |
20030073432 | Meade, II | Apr 2003 | A1 |
20030158704 | Triginai et al. | Aug 2003 | A1 |
20030171851 | Brickfield et al. | Sep 2003 | A1 |
20030200059 | Ignatowski et al. | Oct 2003 | A1 |
20040068390 | Saunders | Apr 2004 | A1 |
20040128314 | Katibah et al. | Jul 2004 | A1 |
20040133314 | Ehlers et al. | Jul 2004 | A1 |
20040199360 | Friman et al. | Oct 2004 | A1 |
20050055308 | Meyer et al. | Mar 2005 | A1 |
20050108262 | Fawcett et al. | May 2005 | A1 |
20050154494 | Ahmed | Jul 2005 | A1 |
20050278703 | Lo et al. | Dec 2005 | A1 |
20050283337 | Sayal | Dec 2005 | A1 |
20060095521 | Patinkin | May 2006 | A1 |
20060140207 | Eschbach et al. | Jun 2006 | A1 |
20060184479 | Levine | Aug 2006 | A1 |
20060200476 | Gottumukkala et al. | Sep 2006 | A1 |
20060265751 | Cosquer et al. | Nov 2006 | A1 |
20060271589 | Horowitz et al. | Nov 2006 | A1 |
20070028179 | Levin et al. | Feb 2007 | A1 |
20070203693 | Estes | Aug 2007 | A1 |
20070261062 | Bansal et al. | Nov 2007 | A1 |
20070273497 | Kuroda et al. | Nov 2007 | A1 |
20070273610 | Baillot | Nov 2007 | A1 |
20080034425 | Overcash et al. | Feb 2008 | A1 |
20080094230 | Mock et al. | Apr 2008 | A1 |
20080097816 | Freire et al. | Apr 2008 | A1 |
20080186160 | Kim et al. | Aug 2008 | A1 |
20080249756 | Chaisuparasmikul | Oct 2008 | A1 |
20080252723 | Park | Oct 2008 | A1 |
20080281472 | Podgorny et al. | Nov 2008 | A1 |
20090195349 | Frader-Thompson et al. | Aug 2009 | A1 |
20100045439 | Tak et al. | Feb 2010 | A1 |
20100058248 | Park | Mar 2010 | A1 |
20100131533 | Ortiz | May 2010 | A1 |
20100274366 | Fata et al. | Oct 2010 | A1 |
20100281387 | Holland et al. | Nov 2010 | A1 |
20100286937 | Hedley et al. | Nov 2010 | A1 |
20100324962 | Nesler et al. | Dec 2010 | A1 |
20110015802 | Imes | Jan 2011 | A1 |
20110047418 | Drees et al. | Feb 2011 | A1 |
20110061015 | Drees et al. | Mar 2011 | A1 |
20110071685 | Huneycutt et al. | Mar 2011 | A1 |
20110077950 | Hughston | Mar 2011 | A1 |
20110087650 | Mackay et al. | Apr 2011 | A1 |
20110087988 | Ray et al. | Apr 2011 | A1 |
20110088000 | Mackay | Apr 2011 | A1 |
20110125737 | Pothering et al. | May 2011 | A1 |
20110137853 | Mackay | Jun 2011 | A1 |
20110153603 | Adiba et al. | Jun 2011 | A1 |
20110154363 | Karmarkar | Jun 2011 | A1 |
20110157357 | Weisensale et al. | Jun 2011 | A1 |
20110178977 | Drees | Jul 2011 | A1 |
20110191343 | Heaton et al. | Aug 2011 | A1 |
20110205022 | Cavallaro et al. | Aug 2011 | A1 |
20110218777 | Chen et al. | Sep 2011 | A1 |
20120011126 | Park et al. | Jan 2012 | A1 |
20120011141 | Park et al. | Jan 2012 | A1 |
20120022698 | Mackay | Jan 2012 | A1 |
20120062577 | Nixon | Mar 2012 | A1 |
20120064923 | Imes et al. | Mar 2012 | A1 |
20120083930 | Ilic et al. | Apr 2012 | A1 |
20120100825 | Sherman et al. | Apr 2012 | A1 |
20120101637 | Imes et al. | Apr 2012 | A1 |
20120135759 | Imes et al. | May 2012 | A1 |
20120136485 | Weber et al. | May 2012 | A1 |
20120158633 | Eder | Jun 2012 | A1 |
20120259583 | Noboa et al. | Oct 2012 | A1 |
20120272228 | Marndi et al. | Oct 2012 | A1 |
20120278051 | Jiang et al. | Nov 2012 | A1 |
20130007063 | Kalra et al. | Jan 2013 | A1 |
20130038430 | Blower et al. | Feb 2013 | A1 |
20130038707 | Cunningham et al. | Feb 2013 | A1 |
20130060820 | Bulusu et al. | Mar 2013 | A1 |
20130085917 | Agarwal | Apr 2013 | A1 |
20130086497 | Ambuhl et al. | Apr 2013 | A1 |
20130097276 | Sridhar | Apr 2013 | A1 |
20130097706 | Titonis et al. | Apr 2013 | A1 |
20130103221 | Raman et al. | Apr 2013 | A1 |
20130167035 | Imes et al. | Jun 2013 | A1 |
20130170710 | Kuoch et al. | Jul 2013 | A1 |
20130204836 | Choi et al. | Aug 2013 | A1 |
20130246916 | Reimann et al. | Sep 2013 | A1 |
20130247205 | Schrecker et al. | Sep 2013 | A1 |
20130262035 | Mills | Oct 2013 | A1 |
20130275174 | Bennett et al. | Oct 2013 | A1 |
20130275908 | Reichard | Oct 2013 | A1 |
20130297050 | Reichard et al. | Nov 2013 | A1 |
20130298244 | Kumar et al. | Nov 2013 | A1 |
20130304508 | Shah | Nov 2013 | A1 |
20130331995 | Rosen | Dec 2013 | A1 |
20140031082 | Zishaan | Jan 2014 | A1 |
20140032506 | Hoey et al. | Jan 2014 | A1 |
20140059483 | Mairs et al. | Feb 2014 | A1 |
20140081652 | Klindworth | Mar 2014 | A1 |
20140135952 | Maehara | May 2014 | A1 |
20140152651 | Chen et al. | Jun 2014 | A1 |
20140172184 | Schmidt et al. | Jun 2014 | A1 |
20140189861 | Gupta et al. | Jul 2014 | A1 |
20140207282 | Angle et al. | Jul 2014 | A1 |
20140258052 | Khuti et al. | Sep 2014 | A1 |
20140269614 | Maguire et al. | Sep 2014 | A1 |
20140277765 | Karimi et al. | Sep 2014 | A1 |
20140278461 | Artz | Sep 2014 | A1 |
20140327555 | Sager et al. | Nov 2014 | A1 |
20150019174 | Kiff et al. | Jan 2015 | A1 |
20150042240 | Aggarwal et al. | Feb 2015 | A1 |
20150105917 | Sasaki et al. | Apr 2015 | A1 |
20150145468 | Ma et al. | May 2015 | A1 |
20150156031 | Fadell et al. | Jun 2015 | A1 |
20150168931 | Jin | Jun 2015 | A1 |
20150172300 | Cochenour | Jun 2015 | A1 |
20150178421 | Borrelli et al. | Jun 2015 | A1 |
20150185261 | Frader-Thompson et al. | Jul 2015 | A1 |
20150186777 | Lecue et al. | Jul 2015 | A1 |
20150202962 | Habashima et al. | Jul 2015 | A1 |
20150204563 | Imes et al. | Jul 2015 | A1 |
20150235267 | Steube et al. | Aug 2015 | A1 |
20150241895 | Lu et al. | Aug 2015 | A1 |
20150244730 | Vu et al. | Aug 2015 | A1 |
20150244732 | Golshan et al. | Aug 2015 | A1 |
20150261863 | Dey et al. | Sep 2015 | A1 |
20150263900 | Polyakov et al. | Sep 2015 | A1 |
20150286969 | Warner et al. | Oct 2015 | A1 |
20150295796 | Hsiao et al. | Oct 2015 | A1 |
20150304193 | Ishii et al. | Oct 2015 | A1 |
20150316918 | Schleiss et al. | Nov 2015 | A1 |
20150324422 | Elder | Nov 2015 | A1 |
20150341212 | Hsiao et al. | Nov 2015 | A1 |
20150348417 | Ignaczak et al. | Dec 2015 | A1 |
20150379080 | Jochimski | Dec 2015 | A1 |
20160011753 | McFarland et al. | Jan 2016 | A1 |
20160033946 | Zhu et al. | Feb 2016 | A1 |
20160035246 | Curtis | Feb 2016 | A1 |
20160065601 | Gong et al. | Mar 2016 | A1 |
20160070736 | Swan et al. | Mar 2016 | A1 |
20160078229 | Gong et al. | Mar 2016 | A1 |
20160090839 | Stolarczyk | Mar 2016 | A1 |
20160119434 | Dong et al. | Apr 2016 | A1 |
20160127712 | Alfredsson et al. | May 2016 | A1 |
20160139752 | Shim et al. | May 2016 | A1 |
20160163186 | Davidson et al. | Jun 2016 | A1 |
20160170390 | Xie et al. | Jun 2016 | A1 |
20160171862 | Das et al. | Jun 2016 | A1 |
20160173816 | Huenerfauth et al. | Jun 2016 | A1 |
20160179315 | Sarao et al. | Jun 2016 | A1 |
20160179342 | Sarao et al. | Jun 2016 | A1 |
20160179990 | Sarao et al. | Jun 2016 | A1 |
20160195856 | Spero | Jul 2016 | A1 |
20160212165 | Singla et al. | Jul 2016 | A1 |
20160239660 | Azvine et al. | Aug 2016 | A1 |
20160239756 | Aggour et al. | Aug 2016 | A1 |
20160313751 | Risbeck et al. | Oct 2016 | A1 |
20160313752 | Przybylski | Oct 2016 | A1 |
20160313902 | Hill et al. | Oct 2016 | A1 |
20160350364 | Anicic et al. | Dec 2016 | A1 |
20160357828 | Tobin et al. | Dec 2016 | A1 |
20160358432 | Branscomb et al. | Dec 2016 | A1 |
20160363336 | Roth et al. | Dec 2016 | A1 |
20160370258 | Perez | Dec 2016 | A1 |
20160378306 | Kresl et al. | Dec 2016 | A1 |
20160379326 | Chan-Gove et al. | Dec 2016 | A1 |
20170006135 | Siebel | Jan 2017 | A1 |
20170011318 | Vigano et al. | Jan 2017 | A1 |
20170017221 | Lamparter et al. | Jan 2017 | A1 |
20170039255 | Raj et al. | Feb 2017 | A1 |
20170052536 | Warner et al. | Feb 2017 | A1 |
20170053441 | Nadumane et al. | Feb 2017 | A1 |
20170061747 | Christianson | Mar 2017 | A1 |
20170063894 | Muddu et al. | Mar 2017 | A1 |
20170068409 | Nair | Mar 2017 | A1 |
20170070775 | Taxier et al. | Mar 2017 | A1 |
20170075984 | Deshpande et al. | Mar 2017 | A1 |
20170084168 | Janchookiat | Mar 2017 | A1 |
20170090437 | Veeramani et al. | Mar 2017 | A1 |
20170093700 | Gilley et al. | Mar 2017 | A1 |
20170098086 | Hoernecke et al. | Apr 2017 | A1 |
20170103327 | Penilla et al. | Apr 2017 | A1 |
20170103403 | Chu et al. | Apr 2017 | A1 |
20170123389 | Baez et al. | May 2017 | A1 |
20170134415 | Muddu et al. | May 2017 | A1 |
20170177715 | Chang et al. | Jun 2017 | A1 |
20170180147 | Brandman et al. | Jun 2017 | A1 |
20170188216 | Koskas et al. | Jun 2017 | A1 |
20170212482 | Boettcher et al. | Jul 2017 | A1 |
20170212668 | Shah et al. | Jul 2017 | A1 |
20170220641 | Chi et al. | Aug 2017 | A1 |
20170230930 | Frey | Aug 2017 | A1 |
20170235817 | Deodhar et al. | Aug 2017 | A1 |
20170251182 | Siminoff et al. | Aug 2017 | A1 |
20170270124 | Nagano et al. | Sep 2017 | A1 |
20170277769 | Pasupathy et al. | Sep 2017 | A1 |
20170278003 | Liu | Sep 2017 | A1 |
20170294132 | Colmenares | Oct 2017 | A1 |
20170315522 | Kwon et al. | Nov 2017 | A1 |
20170315697 | Jacobson et al. | Nov 2017 | A1 |
20170322534 | Sinha et al. | Nov 2017 | A1 |
20170323389 | Vavrasek | Nov 2017 | A1 |
20170329289 | Kohn et al. | Nov 2017 | A1 |
20170336770 | Macmillan | Nov 2017 | A1 |
20170345287 | Fuller et al. | Nov 2017 | A1 |
20170351957 | Lecue et al. | Dec 2017 | A1 |
20170357225 | Asp et al. | Dec 2017 | A1 |
20170357490 | Park et al. | Dec 2017 | A1 |
20170357908 | Cabadi et al. | Dec 2017 | A1 |
20180012159 | Kozloski et al. | Jan 2018 | A1 |
20180013579 | Fairweather et al. | Jan 2018 | A1 |
20180024520 | Sinha et al. | Jan 2018 | A1 |
20180039238 | Gartner et al. | Feb 2018 | A1 |
20180048485 | Pelton et al. | Feb 2018 | A1 |
20180069932 | Tiwari et al. | Mar 2018 | A1 |
20180114140 | Chen et al. | Apr 2018 | A1 |
20180137288 | Polyakov | May 2018 | A1 |
20180157930 | Rutschman et al. | Jun 2018 | A1 |
20180162400 | Abdar | Jun 2018 | A1 |
20180176241 | Manadhata et al. | Jun 2018 | A1 |
20180198627 | Mullins | Jul 2018 | A1 |
20180200552 | Wertsberger | Jul 2018 | A1 |
20180203961 | Aisu et al. | Jul 2018 | A1 |
20180239982 | Rutschman et al. | Aug 2018 | A1 |
20180275625 | Park et al. | Sep 2018 | A1 |
20180276962 | Butler et al. | Sep 2018 | A1 |
20180292797 | Lamparter et al. | Oct 2018 | A1 |
20180336785 | Ghannam et al. | Nov 2018 | A1 |
20180343562 | Nalukurthy | Nov 2018 | A1 |
20180359111 | Harvey | Dec 2018 | A1 |
20180364654 | Locke et al. | Dec 2018 | A1 |
20190005025 | Malabarba | Jan 2019 | A1 |
20190013023 | Pourmohammad et al. | Jan 2019 | A1 |
20190025771 | Park et al. | Jan 2019 | A1 |
20190037135 | Hedge | Jan 2019 | A1 |
20190042988 | Brown et al. | Feb 2019 | A1 |
20190043351 | Yang | Feb 2019 | A1 |
20190088106 | Grundstrom | Mar 2019 | A1 |
20190094824 | Xie et al. | Mar 2019 | A1 |
20190096214 | Pourmohammad | Mar 2019 | A1 |
20190096217 | Pourmohammad | Mar 2019 | A1 |
20190102840 | Perl et al. | Apr 2019 | A1 |
20190138512 | Pourmohammad et al. | May 2019 | A1 |
20190147883 | Mellenthin et al. | May 2019 | A1 |
20190158309 | Park et al. | May 2019 | A1 |
20190163152 | Worrall et al. | May 2019 | A1 |
20190259112 | Siegman | Aug 2019 | A1 |
20190268178 | Fairweather et al. | Aug 2019 | A1 |
20190310979 | Masuzaki et al. | Oct 2019 | A1 |
20190370089 | Patton | Dec 2019 | A1 |
20200029220 | Chao | Jan 2020 | A1 |
20200226156 | Borra et al. | Jul 2020 | A1 |
20200285203 | Thakur et al. | Sep 2020 | A1 |
20210042299 | Migliori | Feb 2021 | A1 |
20210381711 | Harvey et al. | Dec 2021 | A1 |
20210381712 | Harvey et al. | Dec 2021 | A1 |
20210382445 | Harvey et al. | Dec 2021 | A1 |
20210383041 | Harvey et al. | Dec 2021 | A1 |
20210383042 | Harvey et al. | Dec 2021 | A1 |
20210383200 | Harvey et al. | Dec 2021 | A1 |
20210383219 | Harvey et al. | Dec 2021 | A1 |
20210383235 | Harvey et al. | Dec 2021 | A1 |
20210383236 | Harvey et al. | Dec 2021 | A1 |
20220019186 | De Andrade | Jan 2022 | A1 |
20220028235 | Saldin | Jan 2022 | A1 |
20220066402 | Harvey et al. | Mar 2022 | A1 |
20220066405 | Harvey | Mar 2022 | A1 |
20220066432 | Harvey et al. | Mar 2022 | A1 |
20220066434 | Harvey et al. | Mar 2022 | A1 |
20220066528 | Harvey et al. | Mar 2022 | A1 |
20220066722 | Harvey et al. | Mar 2022 | A1 |
20220066754 | Harvey et al. | Mar 2022 | A1 |
20220066761 | Harvey et al. | Mar 2022 | A1 |
20220067226 | Harvey et al. | Mar 2022 | A1 |
20220067227 | Harvey et al. | Mar 2022 | A1 |
20220067230 | Harvey et al. | Mar 2022 | A1 |
20220069863 | Harvey et al. | Mar 2022 | A1 |
20220070293 | Harvey et al. | Mar 2022 | A1 |
20220138684 | Harvey | May 2022 | A1 |
20220215264 | Harvey et al. | Jul 2022 | A1 |
20220366769 | Sprakel | Nov 2022 | A1 |
20230010757 | Preciado | Jan 2023 | A1 |
Number | Date | Country |
---|---|---|
101415011 | Apr 2009 | CN |
102136099 | Jul 2011 | CN |
102136100 | Jul 2011 | CN |
102650876 | Aug 2012 | CN |
104040583 | Sep 2014 | CN |
104603832 | May 2015 | CN |
104919484 | Sep 2015 | CN |
106204392 | Dec 2016 | CN |
106406806 | Feb 2017 | CN |
106960269 | Jul 2017 | CN |
107147639 | Sep 2017 | CN |
107598928 | Jan 2018 | CN |
109829625 | May 2019 | CN |
2 528 033 | Nov 2012 | EP |
3 324 306 | May 2018 | EP |
H10-049552 | Feb 1998 | JP |
2003-162573 | Jun 2003 | JP |
2007-018322 | Jan 2007 | JP |
4073946 | Apr 2008 | JP |
2008-107930 | May 2008 | JP |
2013-152618 | Aug 2013 | JP |
2014-044457 | Mar 2014 | JP |
20160102923 | Aug 2016 | KR |
101914554 | Nov 2018 | KR |
WO-2009020158 | Feb 2009 | WO |
WO-2011100255 | Aug 2011 | WO |
WO-2013050333 | Apr 2013 | WO |
WO-2015106702 | Jul 2015 | WO |
WO-2015145648 | Oct 2015 | WO |
WO-2017035536 | Mar 2017 | WO |
WO-2017192422 | Nov 2017 | WO |
WO-2017194244 | Nov 2017 | WO |
WO-2017205330 | Nov 2017 | WO |
WO-2017213918 | Dec 2017 | WO |
Entry |
---|
Author/Publisher: IBM.com, Title: Cloud Server, Date: Jan. 4, 2020, Pertinent Pages: whole document (Year: 2020). |
Author/Publisher: Web Archive, Title: Crawled Calender; Captured Date: Dec. 16, 2022; Pertinent Pages: whole document (Year: 2022). |
Balaji et al, “Brick: Metadata schema for portable smart building applications,” Applied Energy, 2018 (20 pages). |
Balaji et al, “Brick: Metadata schema for portable smart building applications,” Applied Energy, Sep. 15, 2018, 3 pages, (Abstract). |
Balaji et al, “Demo Abstract: Portable Queries Using the Brick Schema for Building Applications,” BuildSys '16, Palo Alto, CA, USA, Nov. 16-17, 2016 (2 pages). |
Balaji, B et al., “Brick: Towards a Unified Metadata Schema For Buildings.” BuildSys '16, Palo Alto, CA, USA, Nov. 16-17, 2016 (10 pages). |
Bhattacharya et al., “Short Paper: Analyzing Metadata Schemas for Buildings—The Good, The Bad and The Ugly,” BuildSys '15, Seoul, South Korea, Nov. 4-5, 2015 (4 pages). |
Bhattacharya, A., “Enabling Scalable Smart-Building Analytics,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2016-201, Dec. 15, 2016 (121 pages). |
Brick, “Brick Schema: Building Blocks for Smart Buildings,” URL: chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.memoori.com/wp-content/uploads/2016/06/Brick_Schema_Whitepaper.pdf, Mar. 2019 (17 pages). |
Brick, “Brick: Towards a Unified Metadata Schema For Buildings,” URL: chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://brickschema.org/papers/Brick_BuildSys_Presentation.pdf, Presented at BuildSys '16, Nov. 2016 (46 pages). |
Brick, “Metadata Schema for Buildings,” URL: https://brickschema.org/docs/Brick-Leaflet.pdf, retrieved from internet Dec. 24, 2019 (3 pages). |
Chinese Office Action on CN Appl. No. 201780003995.9 dated Apr. 8, 2021 (21 pages with English language translation). |
Chinese Office action on CN Appl. No. 201780043400.2 dated Apr. 25, 2021 (15 pages with English language translation). |
Curry, E. et al., “Linking building data in the cloud: Integrating cross-domain building data using linked data.” Advanced Engineering Informatics, 2013, 27 (pp. 206-219). |
Digital Platform Litigation Documents Part 1, includes cover letter, dismissal of case DDE-1-21-cv-01796, IPR2023-00022 (documents filed Jan. 26, 2023-Oct. 7, 2022), and IPR2023-00085 (documents filed Jan. 26, 2023-Oct. 20, 2022) (748 pages total). |
Digital Platform Litigation Documents Part 10, includes DDE-1-21-cv-01796 (documents filed Nov. 1, 2022-Dec. 22, 2021 (1795 pages total). |
Digital Platform Litigation Documents Part 2, includes IPR2023-00085 (documents filed Oct. 20, 22) (172 pages total). |
Digital Platform Litigation Documents Part 3, includes IPR2023-00085 (documents filed Oct. 20, 2022) and IPR2023-00170 (documents filed Nov. 28, 2022-Nov. 7, 2022) (397 pages total). |
Digital Platform Litigation Documents Part 4, includes IPR2023-00170 (documents filed Nov. 7, 2022) and IPR2023-00217 (documents filed Jan. 18, 2023-Nov. 15, 2022) (434 pages total). |
Digital Platform Litigation Documents Part 5, includes IPR2023-00217 (documents filed Nov. 15, 2022) and IPR2023-00257 (documents filed Jan. 25, 2023-Nov. 23, 2022) (316 pages total). |
Digital Platform Litigation Documents Part 6, includes IPR2023-00257 (documents filed Nov. 23, 2022) and IPR 2023-00346 (documents filed Jan. 3, 2023-Dec. 13, 2022) (295 pages total). |
Digital Platform Litigation Documents Part 7, includes IPR 2023-00346 (documents filed Dec. 13, 2022) and IPR2023-00347 (documents filed Jan. 3, 2023-Dec. 13, 2022) (217 pages total). |
Digital Platform Litigation Documents Part 8, includes IPR2023-00347 (documents filed Dec. 13, 2022), EDTX-2-22-cv-00243 (documents filed Sep. 20, 2022-Jun. 29, 2022), and DDE-1-21-cv-01796 (documents filed Feb. 3, 2023-Jan. 10, 2023 (480 pages total). |
Digital Platform Litigation Documents Part 9, includes DDE-1-21-cv-01796 (documents filed Jan. 10, 2023-Nov. 1, 2022 (203 pages total). |
EL Kaed, C. et al., “Building management insights driven by a multi-system semantic representation approach,” 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Dec. 12-14, 2016, (pp. 520-525). |
Ellis, C. et al., “Creating a room connectivity graph of a building from per-room sensor units.” BuildSys '12, Toronto, ON, Canada, Nov. 6, 2012 (7 pages). |
Extended European Search Report on EP Application No. 18196948.6 dated Apr. 10, 2019 (9 pages). |
Fierro et al., “Beyond a House of Sticks: Formalizing Metadata Tags with Brick,” BuildSys '19, New York, NY, USA, Nov. 13-14, 2019 (10 pages). |
Fierro et al., “Dataset: An Open Dataset and Collection Tool for BMS Point Labels,” DATA'19, New York, NY, USA, Nov. 10, 2019 (3 pages). |
Fierro et al., “Design and Analysis of a Query Processor for Brick,” ACM Transactions on Sensor Networks, Jan. 2018, vol. 1, No. 1, art. 1 (25 pages). |
Fierro et al., “Design and Analysis of a Query Processor for Brick,” BuildSys '17, Delft, Netherlands, Nov. 8-9, 2017 (10 pages). |
Fierro et al., “Mortar: An Open Testbed for Portable Building Analytics,” BuildSys '18, Shenzhen, China, Nov. 7-8, 2018 (10 pages). |
Fierro et al., “Why Brick is a Game Changer for Smart Buildings,” URL: https://brickschema.org/papers/Brick_Memoori_Webinar_Presentation.pdf, Memoori Webinar, 2019 (67 pages). |
Fierro, “Writing Portable Building Analytics with the Brick Metadata Schema,” UC Berkeley, ACM E-Energy, 2019 (39 pages). |
Fierro, G., “Design of an Effective Ontology and Query Processor Enabling Portable Building Applications,” Electrical Engineering and Computer Sciences, University of California at Berkeley, Technical Report No. UCB/EECS-2019-106, Jue 27, 2019 (118 pages). |
File History for U.S. Appl. No. 12/776,159, filed May 7, 2010 (722 pages). |
Final Conference Program, ACM BuildSys 2016, Stanford, CA, USA, Nov. 15-17, 2016 (7 pages). |
Gao et al., “A large-scale evaluation of automated metadata inference approaches on sensors from air handling units,” Advanced Engineering Informatics, 2018, 37 (pp. 14-30). |
Harvey, T., “Quantum Part 3: The Tools of Autonomy, How PassiveLogic's Quantum Creator and Autonomy Studio software works,” URL: https://www.automatedbuildings.com/news/jan22/articles/passive/211224010000passive.html, Jan. 2022 (7 pages). |
Harvey, T., “Quantum: The Digital Twin Standard for Buildings,” URL: https://www.automatedbuildings.com/news/feb21/articles/passivelogic/210127124501passivelogic.html, Feb. 2021 (6 pages). |
Hu, S. et al., “Building performance optimisation: A hybrid architecture for the integration of contextual information and time-series data,” Automation in Construction, 2016, 70 (pp. 51-61). |
International Search Report and Written Opinion for PCT Appl. Ser. No. PCT/US2017/013831 dated Mar. 31, 2017 (14 pages). |
International Search Report and Written Opinion for PCT Appl. Ser. No. PCT/US2017/035524 dated Jul. 24, 2017 (14 pages). |
International Search Report and Written Opinion on PCT/US2017/052060, mailed Oct. 5, 2017, 11 pages. |
International Search Report and Written Opinion on PCT/US2017/052633, mailed Oct. 23, 2017, 9 pages. |
International Search Report and Written Opinion on PCT/US2017/052829, mailed Nov. 27, 2017, 24 pages. |
International Search Report and Written Opinion on PCT/US2018/024068, mailed Jun. 15, 2018, 22 pages. |
International Search Report and Written Opinion on PCT/US2018/052971, dated Mar. 1, 2019, 19 pages. |
International Search Report and Written Opinion on PCT/US2018/052974, mailed Dec. 19, 2018, 13 pages. |
International Search Report and Written Opinion on PCT/US2018/052975, mailed Jan. 2, 2019, 13 pages. |
International Search Report and Written Opinion on PCT/US2018/052994, mailed Jan. 7, 2019, 15 pages. |
International Search Report and Written Opinion on PCT/US2019/015481, dated May 17, 2019, 78 pages. |
International Search Report and Written Opinion on PCT/US2020/058381, dated Jan. 27, 2021, 30 pages. |
Japanese Office Action on JP Appl. No. 2018-534963 dated May 11, 2021 (16 pages with English language translation). |
Koh et al., “Plaster: An Integration, Benchmark, and Development Framework for Metadata Normalization Methods,” BuildSys '18, Shenzhen, China, Nov. 7-8, 2018 (10 pages). |
Koh et al., “Scrabble: Transferrable Semi-Automated Semantic Metadata Normalization using Intermediate Representation,” BuildSys '18, Shenzhen, China, Nov. 7-8, 2018 (10 pages). |
Koh et al., “Who can Access What, and When?” BuildSys '19, New York, NY, USA, Nov. 13-14, 2019 (4 pages). |
Li et al., “Event Stream Processing with Out-of-Order Data Arrival,” International Conferences on Distributed Computing Systems, 2007, (8 pages). |
Nissin Electric Co., Ltd., “Smart power supply system (SPSS),” Outline of the scale verification plan, Nissin Electric Technical Report, Japan, Apr. 23, 2014, vol. 59, No. 1 (23 pages). |
Passivelogic, “Explorer: Digital Twin Standard for Autonomous Systems. Made interactive.” URL: https://passivelogic.com/software/quantum-explorer/, retrieved from internet Jan. 4, 2023 (13 pages). |
Passivelogic, “Quantum: The Digital Twin Standard for Autonomous Systems, A physics-based ontology for next-generation control and AI.” URL: https://passivelogic.com/software/quantum-standard/, retrieved from internet Jan. 4, 2023 (20 pages). |
Quantum Alliance, “Quantum Explorer Walkthrough,” 2022, (7 pages) (screenshots from video). |
Results of the Partial International Search for PCT/US2018/052971, dated Jan. 3, 2019, 3 pages. |
Sinha, Sudhi and Al Huraimel, Khaled, “Reimagining Businesses with AI” John Wiley & Sons, Inc., Hoboken, NJ, USA, 2021 (156 pages). |
Sinha, Sudhi R. and Park, Youngchoon, “Building an Effective IoT Ecosystem for Your Business,” Johnson Controls International, Springer International Publishing, 2017 (286 pages). |
Sinha, Sudhi, “Making Big Data Work For Your Business: A guide to effective Big Data analytics,” Impackt Publishing LTD., Birmingham, UK, Oct. 2014 (170 pages). |
The Virtual Nuclear Tourist, “Calvert Cliffs Nuclear Power Plant,” URL: http://www.nucleartourist.com/us/calvert.htm, Jan. 11, 2006 (2 pages). |
University of California at Berkeley, EECS Department, “Enabling Scalable Smart-Building Analytics,” URL: https://www2.eecs.berkeley.edu/Pubs/TechRpts/2016/EECS-2016-201.html, retrieved from internet Feb. 15, 2022 (7 pages). |
Van Hoof, Bert, “Announcing Azure Digital Twins: Create digital replicas of spaces and infrastructure using cloud, AI and IoT,” URL: https://azure.microsoft.com/en-us/blog/announcing-azure-digital-twins-create-digital-replicas-of-spaces-and-infrastructure-using-cloud-ai-and-iot/, Sep. 24, 2018 (11 pages). |
W3C, “SPARQL: Query Language for RDF,” located on The Wayback Machine, URL: https://web.archive.org/web/20l61230061728/http://www.w3.org/TR/rdf-sparql-query/), retrieved from internet Nov. 15, 2022 (89 pages). |
Wei et al., “Development and Implementation of Software Gateways of Fire Fighting Subsystem Running on EBI,” Control, Automation and Systems Engineering, IITA International Conference on, IEEE, Jul. 2009 (pp. 9-12). |
Zhou, Q. et al., “Knowledge-infused and Consistent Complex Event Processing over Real-time and Persistent Streams,” Further Generation Computer Systems, 2017, 76 (pp. 391-406). |
Number | Date | Country | |
---|---|---|---|
20210241595 A1 | Aug 2021 | US |
Number | Date | Country | |
---|---|---|---|
62969957 | Feb 2020 | US |