The systems, apparatuses, devices and methods described herein can facilitate enhanced worksite safety.
Conventional worksites present hazards for workers, often involving items of equipment such as elevated working implements.
In accordance with one embodiment, a method comprises detecting, with a sensor of an item of monitored equipment, use of the item of monitored equipment by an operator. The method further comprises wirelessly transmitting, via a short-range communication protocol, information associated with the use, as determined by the detecting, from the item of monitored equipment to a mobile communications device in possession of the operator. The method additionally comprises wirelessly transmitting data over a communications network, by the mobile communications device, to a scoring computing system. The data comprises an identity of the operator and a characteristic of operation. The characteristic of operation has been determined based upon the information and represents a manner by which the operator has used the item of monitored equipment. The method also comprises generating a score representing the operator's behavior for safety based upon the data.
In accordance with yet another embodiment, a workplace safety system comprises an item of monitored equipment and a scoring computing system. The item of monitored equipment comprises a sensor, a transmitter, and a computing unit. The sensor is configured to generate signals. The computing unit is electrically coupled with each of the sensor and the transmitter. The scoring computing system is in networked communication with the item of monitored equipment and is configured to receive data. The data reflects an identity of an operator of the item of monitored equipment. The data further reflects information concerning a manner by which the operator has used the item of monitored equipment. The information is at least partially based upon the signals. The scoring computing system is configured to determine a characteristic of operation of the item of monitored equipment based upon the information. The scoring computing system is further configured, based upon the characteristic of operation, to generate a safety score associated with the operator.
In accordance with another embodiment, a workplace safety system comprises an item of monitored equipment, a mobile communications device, and a scoring computing system. The item of monitored equipment comprises a sensor, a transmitter, and a computing unit. The sensor is configured to generate signals. The computing unit is electrically coupled with each of the sensor and the transmitter. The mobile communications device is in wireless communication with the transmitter via a short-range communication protocol. The scoring computing system is in networked communication with the mobile communications device and is configured to receive data. The data comprises an identity of an operator of the item of monitored equipment and a characteristic of operation. The characteristic of operation has been determined based upon the signals from the sensor and represents a manner by which the operator has used the item of monitored equipment. The scoring computing system is configured to generate a safety score associated with the operator based upon the data.
It is believed that certain embodiments will be better understood from the following description taken in conjunction with the accompanying drawings in which:
Various non-limiting embodiments of the present disclosure will now be described to provide an overall understanding of the principles of the structure, function, and use of systems, apparatuses, devices, and methods disclosed. One or more examples of these non-limiting embodiments are illustrated in the selected examples disclosed and described with reference made to
The examples discussed herein are examples only and are provided to assist in the explanation of the apparatuses, devices, systems and methods described herein. None of the features or components shown in the drawings or discussed below should be taken as mandatory for any specific implementation of any of these apparatuses, devices, systems or methods unless specifically designated as mandatory. For ease of reading and clarity, certain components, modules, or methods may be described solely in connection with a specific figure. In this disclosure, any identification of specific techniques, arrangements, etc. are either related to a specific example presented or are merely a general description of such a technique, arrangement, etc. Identifications of specific details or examples are not intended to be, and should not be, construed as mandatory or limiting unless specifically designated as such. Any failure to specifically describe a combination or sub-combination of components should not be understood as an indication that any combination or sub-combination is not possible. It will be appreciated that modifications to disclosed and described examples, arrangements, configurations, components, elements, apparatuses, devices, systems, methods, etc. can be made and may be desired for a specific application. Also, for any methods described, regardless of whether the method is described in conjunction with a series of steps or a flow diagram, it should be understood that unless otherwise specified or required by context, any explicit or implicit ordering of steps performed in the execution of a method does not imply that those steps must be performed in the order presented but instead may be performed in a different order or in parallel.
Reference throughout the specification to “various embodiments,” “some embodiments,” “one embodiment,” “some example embodiments,” “one example embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with any embodiment is included in at least one embodiment. Thus, appearances of the phrases “in various embodiments,” “in some embodiments,” “in one embodiment,” “some example embodiments,” “one example embodiment, or “in an embodiment” in places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
Throughout this disclosure, references to components or modules generally refer to items that logically can be grouped together to perform a function or group of related functions. Like reference numerals are generally intended to refer to the same or similar components. Components and modules can be implemented in software, hardware, or a combination of software and hardware. The term “software” is used expansively to include not only executable code, for example machine-executable or machine-interpretable instructions, but also data structures, data stores and computing instructions stored in any suitable electronic format, including firmware, and embedded software. The terms “information” and “data” are used expansively and include a wide variety of electronic information, including executable code; content such as text, video data, and audio data, among others; and various codes or flags. The terms “information,” “data,” and “content” are sometimes used interchangeably when permitted by context. It should be noted that, although for clarity and to aid in understanding, some examples discussed herein might describe specific features or functions as part of a specific component or module, or as occurring at a specific layer of a computing device (for example, a hardware layer, operating system layer, or application layer), those features or functions may be implemented as part of a different component or module or operated at a different layer of a communication protocol stack. Those of ordinary skill in the art will recognize that the systems, apparatuses, devices, and methods described herein can be applied to, or easily modified for use with, other types of equipment, can use other arrangements of computing systems, and can use other protocols, or operate at other layers in communication protocol stacks, than are described.
As described in more detail below, the present disclosure generally relates to worksite safety systems, apparatuses, devices, and methods, selected embodiments of which are hereinafter described in connection with the views and examples of
In accordance with another embodiment, within such an ecosystem, another type of equipment to be monitored is a scaffold, such as scaffolds 60 and 80 shown in
Baker scaffolds are particularly useful when working at the interior of buildings, such as for accessing high ceilings or upper portions of walls, painting large ceiling areas where ladders would need to be repeatedly repositioned, and handling larger materials such as full sheets of drywall or long sections of ductwork. Baker scaffolds accordingly tend to be often used by masons, carpenters, tile and stone setters, cement and brick masons, concrete finishers, dry wall and ceiling installers, electricians, plumbers and pipefitters, insulation installers, painters, plasterers, HVAC/sheet metal workers, building maintenance personnel and construction helpers. Baker scaffolds are also useful for exterior work and general building maintenance.
Baker scaffolds differ in their use from ladders (step ladder or A-frame, extension, and platform ladders) in a number of ways. The user has significantly more freedom to move around on the deck of a Baker scaffold than they would have on a ladder. In addition, a Baker scaffold is designed for movement and for optimum stability and relies upon a level, smooth and firm ground surface for its four wheels/casters/feet to rest on. The user's ascent to the deck, whether via a ladder or otherwise, can present its own set of safety hazards and unique dynamics. Consequently, the Baker scaffold can be significantly unstable if it rests on an inappropriate surface, such as muddy or loose soil, and can present dangers to a user if the user's positioning and motions on the deck are not appropriately constrained, especially if the deck is placed at a substantial height relative to the ground surface, e.g., in a stacked version.
In addition, Baker scaffolds are frequently misused, such as when workers lift too much, lose balance, trip, lean too far, roll wheel(s) off an edge, fall off the deck, or assemble the unit improperly. Elevated risk of accidents has been attributed to such factors as increased fatigue as the workday continues, budget and schedule overruns, high frequency of disputes, contract changes and litigation, intense competition for work, poor performance evaluations, low profit margins and high insolvency risk, and the pressure to deliver projects quickly and with high quality. As a result, at any moment during use of a Baker scaffold, a worker can be at risk of falling and thus suffering a debilitating injury or death. While some workers are chronically careless, even the most responsible workers can fall or sustain other injury due to momentary lapse of judgement or mere accident.
Creating even more risk of injury, Baker scaffolds can be assembled and functional without all their components and safety features being installed or being installed correctly. This characteristic enables additional unintentional and intentional behaviors that can lead to accidents and injuries. Safe assembly and use of conventional Baker scaffolds is thus presently entirely at the discretion of the user.
Structure and operation of scaffold assemblies is herein described in reference to
More particularly, disclosed herein are systems and methods for monitoring the use and behaviors of scaffolds such as Baker scaffolds, anticipating boundaries of stability that can lead to tip-over, monitoring conditions of use and misuse, alerting the user of the risky behaviors in an effort to prevent accidents and inform proper usage, reporting risky behavior to responsible managers, and warning emergency personnel if an accident condition is detected. These systems and methods retain the basic purpose of conventional Baker scaffolds but additionally embed the capability of preventing falls. Through effective implementation and use of this innovative technology, Baker scaffolds can be less prone to tipping, rolling off edges or into holes or being moved in inappropriate ways or at inappropriate velocities, resulting in reduction of fatalities and injuries resulting from falls. The systems and methods disclosed herein can accordingly facilitate monitoring, predicting and alerting of unsafe use, unsafe set-up and operation of Baker scaffolding in the construction trades and other uses.
A smart Baker scaffold can include integrated low-powered, embedded electronics. For example,
More particularly, in the example of
A sensor can either be provided as an integral part of a scaffold component, or instead can be provided as an auxiliary component which is suitable for selective attachment to a scaffold component. A Baker scaffold typically has a kit-style design which can be assembled by a user from components at a job site. Sensors and/or other features of the present monitoring system can be integrated into one or more of those components of the kit-style design. As scaffolds are conventionally provided as a kit of parts (e.g., wheels, legs, deck, pins), it will be appreciated that implementation of a smart Baker scaffold can be accomplished either by adding some additional parts (e.g., sensor units) to the conventional kit, or replacing some of the conventional parts of the conventional kit with new parts (i.e., including sensors). The number, type and location of sensors can be selected based upon the type and configuration of the scaffold to be monitored, the type of data desired to be collected, and the type of alerting that is desired to the user.
It will be appreciated that the sensors and other electronics can be integrated into a Baker scaffold in a small, reliable and cost-effective way. Sensing and instrumentation can be configured to collect information related to the scaffold stability, user behaviors, etc. In one embodiment, priorities for sensors and electronics integration can involve components that are deemed to be critical-to-function and critical-to-safe-use of a Baker scaffold. In one embodiment, the sensors and other electronics can be configured to detect whether: spring pins that secure the deck supports onto the scaffolding uprights are fully engaged; outriggers are required and/or are present for stability, particularly when the scaffold is more than one unit high; scaffold deck railings are installed; the scaffold remains stable when being climbed; primary scaffolding segments are adequately engaged; wheels are adequately secured in scaffold frame tube (e.g., wheel locking pins are appropriately secured); and/or wheel brakes are engaged.
As one example, force transducers can be provided to monitor load distribution at the base of the Baker scaffold (e.g., see
It will be appreciated that sensors and electronics integrated into a Baker scaffold can be configured to have low energy requirements and/or constant or variable sampling rates to facilitate desired monitoring and warnings while preserving battery life. The sensors and other electronics can be configured to minimize battery power consumption for sensing, computation, and data communication. In one embodiment, energy harvesting can be provided such as by incorporating a vibration energy harvesting system onto the frame of the scaffold and/or by incorporating a roller energy harvesting system into the wheels of the scaffold or by harvesting energy from deck deformation. Such systems can convert the energy from vibration, displacement and/or the rotational kinetic energy into electrical energy to recharge batteries or capacitors of sensors and other electronics installed on the scaffold. Piezoelectric or induction-based energy capture or conversion technologies can additionally or alternatively be employed. In other embodiments, such sensors or electronics can include replaceable batteries.
Unlike ladders, where manufacturing volumes for professional and consumer markets have led to an industry structure where there are several large dominant players, Baker scaffolding volumes are much lower because they are primarily limited to professional users. As a result, there is no clear market dominance and imports of off brands/knock-offs can be common. Fortunately, the design of the scaffolding structures is relatively simple and relatively little variation exists between designs, making them ideal candidates for a “safety kit” model for integration of smart technology as described herein. Baker scaffolding can be designed as a geometrically regular structure (a frame structure forming a rectangle with a deck of adjustable height) with wheels/castors at the four corners. Although the structure might be considered simpler than the complexity of other work-at-height options like ladders, the assembly conditions can nevertheless be considered by the safety monitoring system. Examples of such assembly conditions can include scaffold loading and load distribution, velocity and direction of movement, movement tracking, wheel security (lock/unlock), deck position and locking mechanism security, number of decks, total assembled height and stacking of the scaffolding, presence or absence of outriggers, presence or absence of deck railings/guards, and rolling surface characteristics.
Regardless of the type and quantity of sensors on a Baker scaffold, it will be appreciated that each of them can be provided in communication with a computing unit. Some or all of the sensors can be wired to the computing unit, though in other embodiments some or all of the sensors can be wirelessly coupled with the computing unit. The computing unit can be provided with an awareness of the assembly-related status/set-up of a Baker scaffold, either through programming or otherwise, to facilitate its effective discernment of scaffold operation. By monitoring feedback from the sensors, the computing unit can assess status of operation of the Baker scaffold and can then provide or facilitate provision of alerts to users and possibly others. For example, the electronics can communicate via any of a variety of suitable pathways such as Bluetooth for local communication of warnings, as well as existing and emerging cellular communication modalities for communication to data aggregation and storage facilities and notification of emergency and responsible authorities.
In one embodiment, the computing unit can comprise a smartphone. Smartphones, already in use by virtually all construction workers, can be wirelessly coupled with the system of sensors and communication electronics on Baker scaffolds to promptly detect and issue alerts of risky conditions and worker behavior. In addition to providing alerts to a user, a smartphone can transmit data to a backend server where the data can later be reviewed by the user, supervisors, scaffold manufacturers, insurance companies, and others, both on an individualized basis and in aggregation with other data. Wireless communication technologies can be employed to transmit signals from a scaffold in its usage environment, directly or through a smartphone, to a responsible emergency response authority in case of an accident and/or to infinitely scalable repository services for anonymous, aggregated data storage for further analysis and extraction of actionable insights. For example, in one embodiment, the wireless communication can involve use of Bluetooth for communication of data between scaffold-mounted sensors and electronics with a smartphone, and the smartphone can then use cellular-enabled, satellite, LoRa, or Wi-Fi communications to facilitate transmission of that data remotely from the worksite, such as to emergency and responsible personnel.
By employing a smartphone as part of a smart Baker scaffold system and method, it will be appreciated that use of the system and method by a user can be simple and inexpensive, and is thus likely to be more readily adopted and used in the field. Implementation of this technology can accordingly be relatively inexpensive and need not require large investments in purchasing or learning operation of new equipment by end users. It will be appreciated, however, that in other embodiments, scaffold-mounted electronics can incorporate cellular-enabled, satellite, LoRa or Wi-Fi communications capabilities for directly transmitting data remotely from the worksite, such as to emergency and responsible personnel.
A warning, such as by a smartphone or provided directly by electronics integrated into the scaffold (e.g., lights, displays, audible indicators, and/or vibrators), can effectively communicate the presence of danger to the user and guide the user to produce the desired behavioral outcome. For example, the success of the warning can be influenced by a myriad of perceptual factors including the modality, intensity, and the temporal structure of the signal, contextual factors including noise and potential distractors in the environment, as well as cognitive factors such as load and other constraints produced by the working task demands. The warning signal can accordingly reliably alert workers to the possibility of an impending fall, thereby reducing the likelihood of accidents across a myriad of contexts and working environments. Visual, auditory and/or tactile feedback signals can accordingly be provided. It will be appreciated that multimodal warnings (i.e., delivered via multiple perceptual channels) can be more readily detected, elicit greater compliance, elicit faster response times and fewer false responses than warnings delivered through any single modality alone. However, because multimodal warnings may demand active monitoring across several perceptual sensory channels, they may induce increased subjective workload and perhaps may produce startle responses from the user, both of which can prove overly distracting for a worker engaged in some activity while balancing on a scaffold. The mode and type of warning signal(s) can be selected to achieve maximum effectiveness of reducing risk and promoting worker compliance to safe behaviors.
The smart Baker scaffold system and method can accordingly have capability to detect and differentiate among risky behaviors on Baker scaffolds (e.g., see examples in FIGS. 5A-5F), and then alert workers before falls occur, in ways that do not distract workers and cause greater risk. Data can then be provided to a backend analytics platform so that near accidents can be identified, accidents can be reconstructed, and an accident prevention dashboard can be presented for use by construction managers to prevent future accidents. For example, such data can be useful to improve safety training, supervision, scaffold design, and maintenance. In this way, the smart Baker scaffold system and method can help prevent injuries, deaths, and financial losses. When combined with other data streams including work schedules, weather, traffic, etc., analysis in accordance with the present disclosure can reveal or predict deteriorating scaffold safety behavior such as when work falls behind schedule, fatigue is predicted based upon length of the workday or hours worked during workday(s), etc.
In one embodiment, a sensor-based alarming system (i.e., alarming when sensor readings exceed a pre-defined alarm threshold, such as an over-loading condition) can be implemented in edge electronics located on the scaffold and can be configured for wireless communication with a smartphone, artificial intelligence (AI) computation, alarm triggering, and powering of low-energy sensors. A smartphone app can communicate with edge electronics and generate alarms to alert workers to potential hazards.
It will be appreciated that foundational analytics can be employed for detecting primary use/misuse behaviors of the Baker scaffold, based upon signals received from the sensors and electronics, and further based upon prior modeling and AI/machine learning (“ML”). In one embodiment, edge computing can be provided on the Baker scaffold structure, wherein sufficient local computational power can promptly interpret conditions or actions of the Baker scaffold (using analytical and stochastic models and/or AI), and can facilitate alerting of workers in real time or near real time of unsafe setup or usage of the Baker scaffold, or progressing toward an unsafe condition. In one embodiment, ML can be used as a form of AI to aid in data interpretation, beyond what can be characterized via closed-form analytics. Closed-form analytical models can describe the load-carrying characteristics of a Baker scaffold for a range of configurations (platform height, stacked scaffolds, etc.). In addition to functional models, at all as-designed setup conditions, analytical solutions can also support surface conditions that are non-ideal. Physics-based analytical models can accordingly be used as part of a scaffold's on-board analytics and can facilitate effective monitoring of the scaffold's setup configurations and support surface characteristics, both of which can be important to enable safe use of the scaffold.
Predictive non-linear computational models can employ explicit dynamics finite element methods. These models can account for factors such as base stability, scaffold configurations, and user behaviors on a scaffold's impact stability. Setup conditions, such as those with potential to upset scaffold equilibrium and result in a platform moving or tipping and a worker falling, can also be accounted for in recognizing or predicting scaffold instability.
AI/ML analytics can be employed to perform onboard computations and/or alarm unsafe conditions of a Baker scaffold that cannot be effectively captured by simple sensor-based or threshold-based diagnostics or alarms, or as conditions are considered to trend toward being unsafe. The AI/ML analytics can retain knowledge from computational models and closed-form analytical models while significantly improving computation efficiency. Data from a human-in-the-loop engineering study can be collected for AI/ML algorithm training, and simulation data from computational models and closed-form analytical models can be used to generate data for falling incidents or other dangerous situations. Scaffold assemblies, systems and methods as described herein can include one or more of the features and functionalities described in U.S. Pat. No. 11,499,370, the entire disclosure of which is hereby incorporated by reference herein in its entirety.
While step ladders and scaffolds are examples of elevated working implements, in still further embodiments, within an ecosystem, other type of elevated working implements can additionally or alternatively be monitored such as, for example, straight or extension ladders such as extension ladder 30 as shown in
In the case of a platform ladder (e.g., 40 in
In the case of an extension ladder (e.g., 30 in
In the case of a safety harness (e.g., 76 in
In the case of pump jacks with raised walkboards (e.g., 50 in
In the case of an aerial work platform (e.g., the scissor lift 70 of
In one embodiment, monitored equipment present within a worksite (e.g., ladders, scaffolds, safety harnesses) can be configured to communicate data directly with one or more nearby smartphones (e.g., via Bluetooth) such as may be carried by the individual workers. In such an arrangement, the smartphones can be provided with an app or other software which facilitates provision of notifications to the user (e.g., in real time of unsafe working conditions) and/or transmission of data to a remote destination. In another embodiment, monitored equipment present within a worksite (e.g., ladders, scaffolds, safety harnesses) can be configured to communicate data directly with a dedicated communication hub, which itself may then communicate data directly with one or more nearby smartphones (e.g., via Bluetooth) such as may be carried by the individual workers, and/or directly (e.g., via cellular, satellite, LoRa or Wi-Fi) to a remote destination (e.g., a supervisor, data center, or emergency services organization).
In one embodiment, a dedicated communication hub can be provided within or integrally with a job box 12, as shown for example in
When integrated into a job box, it will be appreciated that a dedicated communication hub can additionally be configured to monitor the occasion and timing of opening and closing of the job box, as well as to identify operators in the vicinity of the job box, items placed within or removed from the job box, and the location of the job box. Awareness of such monitoring can help deter undesired moving of the job box to an unauthorized location and/or taking items from the job box without authorization. If a job box is so moved or items are so taken, such monitoring can help to facilitate subsequent location thereof and/or identification of such operators. The dedicated communication hub can also monitor internal temperature of the job box to ensure suitable conditions for items stored therein. A dedicated communication hub can additionally or alternatively monitor other ambient environmental conditions such as temperature, vibration, humidity, light, and noise, for example to verify suitability for operators working at a worksite.
A dedicated communication hub (e.g., 114 in
It will be appreciated that each of the monitored equipment present within a worksite (e.g., ladders, scaffolds, safety harnesses) can include integrated low-powered, sensor structures and associated electronics. For example, a sensor structure can include a suitable mechanical configuration allowing for predetermined deflection under force along with one or more associated strain gauges, Hall effect sensors and/or other electronic transducers suitable to facilitate measurement of such force or deflection. It will be appreciated that one or more sensors can employ a Hall effect sensor such as of a type described in U.S. Pat. Nos. 11,486,772, 11,536,782, and 11,635,307, the entire disclosures of which are hereby incorporated by reference herein in their entireties. A sensor structure can alternatively or additionally include an accelerometer, an inclinometer, and/or any of a variety of other suitable measurement devices.
It will be appreciated that sensors and electronics integrated into equipment can be configured to have low energy requirements and/or constant or variable sampling rates, to facilitate desired monitoring and warnings but while preserving battery life. The sensors and other electronics can be configured to minimize the battery power consumption for sensing, computation, and data communication. In one embodiment, energy harvesting can be provided such as by incorporating a vibration or movement energy harvesting system into such equipment. Such systems can convert the energy from vibration, displacement and/or the rotational kinetic energy into electrical energy to recharge batteries or capacitors of sensors and other electronics installed. Piezoelectric or induction-based energy capture or conversion technologies can additionally or alternatively be employed. In other embodiments, such sensors or electronics can include replaceable batteries.
Regardless of the type and quantity of sensors on a particular piece of monitored equipment, it will be appreciated that each of them can be provided in communication with a computing unit. Some or all of the sensors can be wired to the computing unit, though in other embodiments some or all of the sensors can be wirelessly coupled with the computing unit. The computing unit can be provided with an awareness of the assembly-related status/set-up of the piece of equipment, either through programming or otherwise, to facilitate its effective discernment of operation of the piece of equipment. By monitoring feedback from the sensors, the computing unit can assess status of operation of the equipment and can then provide or facilitate provision of alerts to users and possibly others. For example, the electronics can communicate via any of a variety of suitable pathways such as Bluetooth for local communication of warnings, as well as existing and emerging cellular, satellite, LoRa or other communication modalities for communication to data aggregation and storage facilities and notification of emergency and responsible authorities. Upon occurrence of an alert, the electronics can capture and record data such as the time, date, location, operator identity, identification of the item of equipment, and the type and duration of the misuse or hazardous condition.
It will be appreciated that a computing unit can comprise one or more processors or computers and can be configured to execute firmware or other software. In one embodiment, the entirety of a computing unit can be physically attached or integrated with a piece of equipment and, in such a configuration, can be provided with cellular-enabled, Wi-Fi, satellite, LoRa or other communications capabilities for directly transmitting data remotely from the worksite, such as to emergency and responsible personnel. However, in another embodiment, a first portion of a computing unit can be physically attached or integrated with a piece of equipment (e.g., wired to each of the sensors provided on the piece of equipment, and comprising a processor, memory, Bluetooth or other near field wireless communication capability, a power supply, and alerting indicia), while a second portion of the computing unit can be provided by a dedicated communication hub and/or a worker's smartphone provided remotely from the piece of equipment but in wireless communication with the first portion of the computing unit. In this latter configuration, smartphones, already in use by virtually all construction workers, can be wirelessly coupled with the system of sensors and communication electronics on the equipment to promptly detect and issue alerts of risky conditions and worker behavior. In addition to providing alerts to a user, a smartphone can transmit data to a backend server where the data can later be reviewed by the user, supervisors, equipment manufacturers, insurance companies, and others, both on an individualized basis and in aggregation with other data.
Wireless communication technologies can be employed to transmit signals from the equipment in its usage environment, directly or through a smartphone or dedicated communication hub, to a responsible emergency response authority in case of an accident and/or to infinitely scalable repository services for anonymous, aggregated data storage for further analysis and extraction of actionable insights. For example, in one embodiment, the wireless communication can involve use of Bluetooth for communication of data between equipment-mounted sensors and electronics with a smartphone, and the smartphone can then use cellular-enabled, Wi-Fi, satellite, LoRa or other communications to facilitate transmission of that data remotely from the worksite, such as to emergency and responsible personnel. By employing a smartphone as part of worksite safety systems, apparatuses, devices, and methods, it will be appreciated that use thereof by a user can be simple and inexpensive and can thus likely be more readily adopted and used in the field. Implementation of this technology can accordingly be relatively inexpensive and need not require large investments in purchasing or learning operation of new equipment by end users. It will be appreciated, however, that in other embodiments, equipment-mounted electronics can incorporate cellular-enabled, Wi-Fi, satellite, Lora or other communications capabilities for directly transmitting data remotely from the worksite, such as to emergency and responsible personnel.
A warning, such as by a smartphone or provided directly by electronics integrated into the monitored equipment (e.g., lights, displays, audible indicators, and/or vibrators), can effectively communicate the presence of danger to the user and guide the user to produce the desired behavioral outcome. For example, the success of the warning can be influenced by a myriad of perceptual factors including the modality, intensity, and temporal structure of the signal; contextual factors including noise and potential distractors in the environment; as well as cognitive factors such as load and other constraints produced by the working task demands. The warning signal can accordingly reliably alert workers to the possibility of an impending injury, thereby reducing the likelihood of accidents across a myriad of contexts and working environments. Visual, auditory and/or tactile feedback signals can accordingly be provided. It will be appreciated that multimodal warnings (i.e., delivered via multiple perceptual channels) can be more readily detected, elicit greater compliance, elicit faster response times and fewer false responses than warnings delivered through any single modality alone. However, because multimodal warnings may demand active monitoring across several perceptual sensory channels, they may induce increased subjective workload and perhaps may produce startle responses from the user, both of which can prove overly distracting for a worker. The mode and type of warning signal(s) can be selected to achieve maximum effectiveness of reducing risk and promoting worker compliance to safe behaviors. In one embodiment, a sensor-based alarming system (i.e., alarming when sensor readings exceed a pre-defined alarm threshold, such as an over-loading condition) can be implemented in edge electronics located on the equipment and can be configured for wireless communication with a smartphone, artificial intelligence (AI) computation, alarm triggering, and powering of low-energy sensors. A smartphone app can communicate with the edge electronics and generate alarms to alert workers to potential hazards.
As an example, and in particular with respect to a scaffold serving as an item of monitored equipment,
The electronic vision system can include, for example, one or more cameras, laser vision systems, sonar systems, and/or motion detectors. For example, a building can have a mix of video gateways, e.g., located in higher consequence spaces (measured by risk or activity), and non-video gateways. The electronic vision system can be configured to detect hazards or potentially unsafe working conditions such as a hole (e.g., 190) in a wall, a stairwell (e.g., 192), a hole (e.g., 194) in a floor, tools or materials (e.g., 196), and/or any of a variety of other possible trip, fall or other safety concerns on a worksite. The present systems and methods can, in one embodiment, assess a level of risk presented by various conditions on a worksite, classify such events based upon the perceived risk level, and choose whether or not to generate an alert to a worker or supervisor based upon the classified risk level. For example, in the illustrated example, the methods and systems can generate an alert upon detection of an operator 122 climbing the step ladder 120 near the hole 194 in the floor; but may not generate an alert upon detection of a less significant safety risk (e.g., a hammer lying in the middle of the floor).
Equipment at the worksite can be capable of measuring and tracking usage and misusage data for individual pieces of equipment, such as when an item of equipment is being used unsafely and by whom. It can also give a picture of the activities across the whole worksite at any given time. For example, in the arrangement of
It will be appreciated that classification of the hazards can account for the perceived nature of the hazard, likelihood of interaction therewith, and likelihood of resulting injury. For example, risk may be deemed high if a wheel of a scaffold (e.g., 180) approaches stairs (e.g., 192 in
It will be appreciated that the methods and systems can become apprised of worksite conditions and can assess safety concerns though use of programming, artificial intelligence, and/or machine learning. In one embodiment, the methods and systems can continually recalibrate themselves based upon new information, with an objective to consistently and reliably present warnings upon detection of unsafe worksite conditions or that are trending unsafe, but avoid providing unnecessary warnings or false alarms. While in one embodiment such systems and methods can perform such monitoring on a continuous basis, in other embodiments such monitoring (or certain types of such monitoring) can be performed periodically such as to limit power consumption, data processing requirements, and/or frequency of warnings.
Upon detection, data can then be provided to a backend analytics platform so that near accidents can be identified, accidents can be reconstructed, and an accident prevention dashboard can be presented for use by construction managers to prevent future accidents. For example, such data can be useful to improve safety training, supervision, equipment design, and maintenance. In this way, the worksite safety systems, apparatuses, devices, and methods can help prevent injuries, deaths, and financial losses. When combined with other data streams including work schedules, weather, traffic, etc., analysis in accordance with the present disclosure can reveal or predict deteriorating conditions or behavior such as when work falls behind schedule or when fatigue is predicted based upon length of the workday or hours worked during workday(s), etc.
Collection and analysis of this data can facilitate tracking of worker behavior and identification of behavioral differences among groups of workers. Customized training tools can therefore be prepared and delivered to particular workers or groups based upon their actual detected behaviors. Such training can thus be targeted to particular workers based upon their actual demonstrated behavioral deficiencies. For example, as part of this training, workers can be shown how often they nearly fell and which of their behaviors require modification. By facilitating customized training in this way, workers can get more value from the training they attend (because it is training they have demonstrated that they actually need), while spending less time in training overall (because they needn't be forced to attend training in subjects they have actually demonstrated safety proficiency), thereby achieving significant efficiencies. In one embodiment, the training can include a gamification component to track and reward improvements in worker behavior. Families and friends can even be involved in the training experience and gamification in order to further reinforce safe behavior, since it is those families and friends who would share in the suffering of an injured worker. Involving them in preventing accidents creates an additional incentive for encouraging worker use of the technology. In one embodiment, components of the training, gamification, and involvement by others can be facilitated through use of smartphones.
In accordance with the present disclosure, worksite safety systems, apparatuses, devices, and methods can accordingly serve to provide an automated system that monitors, records and reports user actions that may produce unsafe conditions through operation of equipment at a worksite. The technology described herein can provide building and maintenance contractors and other employers a powerful new tool to prevent accidents, as well as documentation of accidents that have occurred or been avoided. More particularly, the described technology can provide information on how equipment is used and abused minute by minute, how workers behave before falls, and when accidents are narrowly missed. The gathered data can inform every aspect of equipment safety from training and supervision to designs and maintenance, and can result in improved worker safety behavior, reduced workplace injuries, and reduced insurance costs. Users can be alerted of risky behaviors in an effort to prevent accidents and inform proper usage. Risky behavior can be reported to responsible managers, as well as to emergency personnel if an accident condition is detected. In one embodiment, the worksite safety systems, apparatuses, devices, and methods disclosed herein, based upon determination of an unsafe condition involving use of the item of equipment, can facilitate disablement of another item of equipment. For example, if it is determined that a worker is excessively leaning on a ladder while operating a hammer drill, the present systems can facilitate a communication to the hammer drill resulting in disablement of the hammer drill, at least until the leaning condition is resolved.
The worksite safety systems, apparatuses, devices, and methods disclosed herein can accordingly facilitate monitoring, predicting and alerting of unsafe use, unsafe set-up and operation of equipment in the construction trades and other uses. It will be appreciated that the worksite safety systems, apparatuses, devices, and methods disclosed herein, based upon processing of information from sensors on an item of equipment, can additionally or alternatively identify the “health” of a particular item of equipment, such as whether it is broken, requires maintenance, or is in an unsafe working condition. Upon determination that an item of equipment is unhealthy or requires maintenance, the present systems and methods can inform an operator thereof and advise them against use thereof.
While use of a smartphone is described herein, it will be appreciated that any suitable networked device can be used in place of a smartphone such as, for example, a tablet, a gaming device, a headset computing device, a wearable computing device, and so forth. In one embodiment, a dedicated communications device can be provided in place of a smartphone, namely to serve as a repeater by receiving information through near field transmissions (e.g., involving Bluetooth) and transmitting that information through longer distance communications (e.g., involving cellular or satellite). While Bluetooth is discussed herein, it will be appreciated that any of a variety of suitable alternative near field or short range networking protocols can instead be used in other embodiments.
Upon gathering of signals from the sensors, the edge gateway 263 can process the signals using AI or other processing to determine if an unsafe condition exists, if conditions are trending toward an unsafe condition, and/or if an alert should be generated. As a result of this processing, the edge gateway 263 can employ near field communications, such as Bluetooth and shown as 265, to communicate data, information and/or warnings to a mobile communications device such as a smartphone 245 in the possession of an operator on the scaffold 260. The smartphone 245 can provide alerts to the operator in the form of audible and/or visual notifications, and can communicate data, information and/or warnings via longer range communication 267 to a remote monitoring source such as a supervisor or emergency call center 277. It will be appreciated with reference to
In one embodiment, in addition to an item of monitored equipment such as an elevated working implement (e.g., a ladder or a scaffold) and a mobile communications device, a workplace safety system and method can further include a scoring computing system. Such an arrangement will now be described with respect to
The item of monitored equipment 315 is further shown to comprise a transmitter 319 which is electrically coupled with the computing unit 317 and an antenna 321. In one embodiment, the transmitter 319 can be configured to wirelessly transmit (e.g., via a short-range communication protocol such as Bluetooth) information associated with the use of the item of monitored equipment 315, as determined by the computing unit 317 from signals received from one or more associated sensor(s) (e.g., 325, 327, 329). This wireless transmission can convey data and/or information from the item of monitored equipment 315 to a mobile communications device in possession of the operator, such as a smartphone 345. In response to receipt of data and/or information from the item of monitored equipment 315, the mobile communications device (e.g., smartphone 345) can wirelessly transmit data over a communications network (e.g., involving tower 365) to a scoring computing system schematically represented by computer 375 in
The data transmitted to the scoring computing system can comprise both an identity of the operator of the item of monitored equipment 315, as well as a characteristic of operation of the item of monitored equipment 315. The identity of the operator can be recognized or determined by the computing unit 317 or other component of the item of monitored equipment 315, by the mobile communication device (e.g., smartphone 345), by some other device or system (e.g., a dedicated communication hub 114 in
In one embodiment, the item of monitored equipment 315 can comprise an alerting device, such as speaker 323, that is electrically coupled with the computing unit 317 and configured to generate alerting indicia in response to the computing unit 317 determining that the characteristic of operation is unsafe or progressing to an unsafe condition. In another embodiment, the mobile communications device (e.g., smartphone 345) can provide alerting indicia in response to a determination by either the computing unit 317 or the mobile communications device that the characteristic of operation is unsafe or progressing toward an unsafe condition. As shown in
The characteristic of operation can, in one embodiment, be determined or have been determined based upon the signals from the sensor(s) (e.g., 325, 327, and/or 329) and can represent a manner by which the operator has used the item of monitored equipment 315. In one example, the characteristic of operation can be determined by processing accomplished by the computing unit 317 based upon signals from the sensor(s) (e.g., 325, 327, and/or 329), and then be transmitted by the transmitter 319 to the mobile communications device (e.g., smartphone 345) for subsequent transmission thereby to the scoring computing system. In another embodiment, the characteristic of operation can be determined by processing accomplished on the mobile communications device (e.g., smartphone 345), and then be transmitted to the scoring computing system by the mobile communications device (e.g., smartphone 345). In still another embodiment, the characteristic of operation of the item of monitored equipment 315 can be determined by the scoring computing system itself based upon the signals from the sensor(s), such as through processing of those signals accomplished by the scoring computing system itself.
The scoring computing system can be configured to generate a score or safety score associated with the operator based upon the characteristic of operation. The score can represent an operator's behavior for safety based upon the signals, data and/or information received by the scoring computing system. In one embodiment, the scoring computing system can receive data from each of a plurality of distinct sessions of use of an item of monitored equipment by the operator and can calculate the score for the operator based upon the data received for each of the plurality of distinct sessions. The data received by the scoring computing system can include an identification of the item of monitored equipment. The data received by the scoring computing system can include geolocation information associated with the item of monitored equipment during its use by the operator, wherein in some cases, the geolocation information can differ among at least some of the plurality of distinct sessions of use thereof. The data received by the scoring computing system can additionally or alternatively include temporal information associated with the item of monitored equipment during its use by the operator. It will thus be appreciated that the score can be based upon multiple instances of the data, with each instance of the data relating to a respective distinct session of use of the item of monitored equipment by the operator and, in some cases, with the geolocation information differing among at least some of the multiple instances.
In one embodiment, the score can relate to the operator's usage of a single item of equipment. However, in alternative embodiments, the score can relate to an operator's usage of multiple items of equipment, whether of the same type or differing types. For example, such as to facilitate this latter embodiment, the scoring computing system can consider additional data in its generation of the score. The additional data can include a second characteristic of operation, such as representing a manner by which the operator has used a second item of monitored equipment. For example, the score can provide a composite score representing an operator's use of both a step ladder and a scaffold based upon data separately received by the scoring computing system relating to each.
In one embodiment, the score can fall within a predetermined range extending between a first limit and a second limit, for example between 0 and 100. The score can demonstrate an increasingly safe level of behavior by the operator as the score more nearly approaches one of the limits. For example, an increasingly safe level of behavior by the operator can be indicated as the score more nearly approaches 100, such as may reflect “100% safe behavior.” In another example, an increasingly safe level of behavior by the operator can be indicated as the score more nearly approaches 0, such as may reflect “0% accident prone.” It will be appreciated that, in other embodiments, a score can fall within a different predetermined range, may not be bounded to a range, may alternatively comprise an alphanumeric representation (e.g., involving a letter grade like A, B, C, D, and F), or a non-alphanumeric symbolic representation (e.g., thumbs-up or thumbs-down).
An operator, supervisor, employer, or insurance company can view an operator's score to assess an employee's propensity for safety when using one or more items of equipment, or generally. In addition, an operator, supervisor, employer, or insurance company can recognize increases or decreases in an operator's score over time to assess an employee's propensity to learn and implement safety skills. An operator can be rewarded as a result of an increased score or penalized as a result of a decreased score. Such reward can take the form of a monetary reward, benefit, favorable recognition, opportunities to perform future desirable work, or promotions, for example. Such penalty can result in loss of bonus opportunity, loss of benefit, reprimand, loss of opportunity to perform future desirable work, demotion or termination. Likewise, an employer of an operator can be rewarded as a result of an increased score of a worker or penalized as a result of a decreased score of a worker. Such reward can take the form of a monetary reward, benefit, favorable recognition, or opportunities to perform future desirable work, for example. Such penalty can result in loss of bonus opportunity, loss of benefit, reprimand, loss of opportunity to perform future desirable work, or termination. A potential customer can review the scores of individual workers of a company (e.g., construction company), or an aggregated or averaged score thereof, in deciding whether to hire the company to complete a project. Likewise, an insurance company can review the scores of an individual worker, individual workers of a company, or an aggregated or averaged score thereof, in deciding whether to provide insurance and at what rate (e.g., with a higher rate being charged as score(s) reflect lower safety compliance). Employers, supervisors or insurance companies can implement gamification techniques in an effort to motivate workers to improve their scores.
In one embodiment, the score can comprise an individual dynamic safety score or an individual safety modification score. The score can comprise a cumulative score for the user for each type of equipment operated by the user, or as a composite taking into account multiple types of equipment operated by the user. The score can accordingly serve as a proprietary and individualized user metric, enabling the user to be characterized or rated based upon the user's determined propensity for safe use of equipment. In other words, a user's propensity for unsafe behavior and relative likelihood of workplace injury can be ascertained from the user's score. In one embodiment, the score can be calculated according to the following equation:
In the foregoing equation, a first factor, “Setup,” can reflect the quality of pre-check activities undertaken by an operator in a particular session of use of an item of equipment, as measured or determined by the associated electronics. A second factor, “Use,” can reflect the behavior of the operator in then using the item of equipment to perform a work function during that session, as measured or determined by the associated electronics. A third factor, “Response,” can reflect measurable changes in the behavior of the operator in the using of the item of equipment to perform a work function during that session, as determined based upon changes relative to one or more prior sessions of use of the item of equipment or other items of equipment by the operator. The “Σ” can reflect a summation or composite of the consideration of such prior factors over a period including multiple sessions. In one embodiment, each of the three factors (i.e., Setup, Use and Response) can be individually weighted with differing weight factors to account for relative importance of the factors. For example, in one embodiment, Setup can be provided with the lowest factor, while Use and Response can have higher factors and thus be more heavily weighted to facilitate a highly dynamic nature of the score.
A user of a piece of equipment can improve his or her safety score, for example, by (a) minimizing alarms and (b) being responsive to alarms in the immediate session as well as on a cumulative, time-dependent basis. The following equation can reflect such a calculation:
In the foregoing equation, respective weights (i.e., η, β, γ, λ) are shown for each of the factors. The Use includes sessions corresponding with tn through t∞.
More particularly, the following series of equations can account for interaction between the Use and Response:
In the above equations, γ accounts for corrections to alarm situations that occur within a predetermined time (e.g., 3-5 minutes) of a use violation, while n can account for an interval/window (e.g., 1-2 minutes).
A real time or near real time component of the score involves where a user is warned, or an alarm or critical alarm is initiated. The following are four weighted examples of situations in which Use and Response interact within a predetermined time period (e.g., 3 minutes):
Use warning violation(+)→Positive measured Response: Σ=0
Use warning violation(−)→No measured Response/change or progress to alarm: Σ=−2
Critical Use violation(+)→Positive measured Response: Σ=−2
Critical Use violation(−)→No measured Response/change or progress to alarm: Σ=−4
These situations can be accumulated over a period of time for a particular user. The period of time can be short such as, for example, a working shift of the user. Or, the period of time can be longer such as, for example, a week, a month, a year, or during the course of a job, employment or career. It will be appreciated that U∞ and R∞ can be trending behaviors which can be intended to reflect long-term changes in behavior of the user. Either or both of these values can include some form of gamification or training to provide another mechanism to influence score, provided it or they are not overly weighted to reverse/hide daily trends in bad behavior. For that reason, in one embodiment, β1 and γ1 can influence score much more than β2 and γ2. In one example, β1 and γ1 can be ten times greater than β2 and γ2. In another example, β1 and γ1 can be one hundred times greater than β2 and γ2 (e.g., β1=10, γ1=10, β2=0.1 and γ2=0.1). It will be appreciated that, in one embodiment, in order for a score to fully recover following a single instance of detected unsafe behavior, a disproportionately high number (e.g., ten such instances) of safe behaviors may be required, thereby reducing likelihood of a user to have been successful in intentionally manipulating his score.
Ut
In another embodiment, the score can be calculated for a particular user according to the following equation:
In the foregoing equation, “ISMS” is an Individual Safety Modification Score, and the “Σ” can reflect capture of the number and frequency of uses of a particular piece of equipment (e.g., a ladder) by a user. The “Setup Score” can account for the frequency of setup corrections, for example. The “Near Miss Score” can account for the number of serious warnings, including possible weighting thereof. For example, when the unit of equipment comprises a step ladder, hopping of the step ladder or climbing too high on the step ladder can result in a very high Near Miss Score due to the relatively high severity of the safety offense by the user, while moderately excessive leaning can result in a low Near Miss Score due to the relatively low severity of the safety offense by the user. The “Compliance Score” can reflect a user's tendency to play by rules, namely by reflecting how often or the number of times a correction is used. One or more “Additional Factor(s)” can optionally be included in such a calculation. Examples of such “Additional Factor(s)” can include a “Maintenance Score” which can reflect whether and to what extent a user regularly performs a battery check and connectivity verification for the item of monitored equipment. The “Additional Factor(s)” can additionally or alternatively take into account to what extent a user's performance with the equipment is (1) uniform in nature across the user's uses thereof, (2) more or less safe relative to uses of the equipment by other users (e.g., at the worksite, regionally, of a particular employer, of a particular collective trade group, or nationally). In this equation, the “B Rate of Change Score” can reflect to what extent a user's behavior increases or decreases in safety, and thus can serve as a positive or negative modifier to the ISMS. It will be appreciated that any of a variety of additional or alternative factors can be considered in calculating a safety score.
Notwithstanding any of the foregoing, it will be appreciated that any or all of the communications described herein, including for example to, from or with any of the items of monitored equipment described herein, can involve cellular, Wi-Fi, satellite, LoRa, Bluetooth or any of a variety of other wireless protocols and technologies. Further, in the case of cellular, such communications can occur via a public or private network, in either instance such as a 5G network. In still another embodiment, an item of monitored equipment might not include a transmitter and/or might not be configured to wirelessly transmit information associated with the use of the item of monitored equipment, but instead can be configured to store such information or data until such time that such can be offloaded or retrieved therefrom, such as on a manual basis, during a periodic download or other physical electrical interface with the item of monitored equipment.
Any element expressed herein as a means for performing a specified function is intended to encompass any way of performing that function including, for example, a combination of elements that performs that function. Furthermore the invention, as may be defined by such means-plus-function claims, resides in the fact that the functionalities provided by the various recited means are combined and brought together in a manner as defined by appended claims. Therefore, any means that can provide such functionalities may be considered equivalents to the means shown herein.
Moreover, the processes associated with the present embodiments may be executed by programmable equipment, such as computers. Software or other sets of instructions that may be employed to cause programmable equipment to execute the processes may be stored in any storage device, such as, for example, a computer system (non-volatile) memory, an optical disk, magnetic tape, or magnetic disk. Furthermore, some of the processes may be programmed when the computer system is manufactured or via a computer-readable memory medium.
It can also be appreciated that certain process aspects described herein may be performed using instructions stored on a computer-readable memory medium or media that direct a computer or computer system to perform process steps. A computer-readable medium may include, for example, memory devices such as diskettes, compact discs of both read-only and read/write varieties, optical disk drives, and hard disk drives. A non-transitory computer-readable medium may also include memory storage that may be physical, virtual, permanent, temporary, semi-permanent and/or semi-temporary.
A “computer,” “computer system,” “host,” “engine,” or “processor” may be, for example and without limitation, a processor, microcomputer, minicomputer, server, mainframe, laptop, personal data assistant (PDA), wireless e-mail device, cellular phone, pager, processor, fax machine, scanner, or any other programmable device configured to transmit and/or receive data over a network. Computer systems and computer-based devices disclosed herein may include memory for storing certain software applications used in obtaining, processing, and communicating information. It can be appreciated that such memory may be internal or external with respect to operation of the disclosed embodiments. The memory may also include any means for storing software, including a hard disk, an optical disk, floppy disk, ROM (read only memory), RAM (random access memory), PROM (programmable ROM), EEPROM (electrically erasable PROM) and/or other computer-readable memory media.
In various embodiments of the present disclosure, a single component may be replaced by multiple components, and multiple components may be replaced by a single component, to perform a given function or functions. Except where such substitution would not be operative to practice embodiments of the present disclosure, such substitution is within the scope of the present disclosure. Any of the servers described herein, for example, may be replaced by a “server farm” or other grouping of networked servers (e.g., a group of server blades) that are located and configured for cooperative functions. It can be appreciated that a server farm may serve to distribute workload between/among individual components of the farm and may expedite computing processes by harnessing the collective and cooperative power of multiple servers. Such server farms may employ load-balancing software that accomplishes tasks such as, for example, tracking demand for processing power from different machines, prioritizing and scheduling tasks based on network demand, and/or providing backup contingency in the event of component failure or reduction in operability.
The examples presented herein are intended to illustrate potential and specific implementations. It can be appreciated that the examples are intended primarily for purposes of illustration for those skilled in the art. No particular aspect or aspects of the examples are necessarily intended to limit the scope of the present disclosure. For example, no particular aspect or aspects of the examples of system architectures, table layouts, or report formats described herein are necessarily intended to limit the scope of the disclosure.
In general, it will be apparent to one of ordinary skill in the art that various embodiments described herein, or components or parts thereof, may be implemented in many different embodiments of software, firmware, and/or hardware, or modules thereof. The software code or specialized control hardware used to implement some of the present embodiments is not limiting of the present disclosure. Such software may be stored on any type of suitable computer-readable medium or media such as, for example, a magnetic or optical storage medium. Thus, the operation and behavior of the embodiments are described without specific reference to the actual software code or specialized hardware components. The absence of such specific references is feasible because it is clearly understood that artisans of ordinary skill would be able to design software and control hardware to implement the embodiments of the present disclosure based on the description herein with only a reasonable effort and without undue experimentation.
The systems, apparatuses, devices, and methods can include one or more processors and one or more memory units, and in particular can be facilitated through use of any suitable processor-based device or system, such as a personal computer, laptop, server, mainframe, mobile computer, other processor-based device, or a collection (e.g. network) of multiple computers, for example. The processor can execute software instructions stored on the memory unit(s). The processor can be implemented as an integrated circuit (IC) having one or multiple cores. The memory unit(s) can include volatile and/or non-volatile memory units. Volatile memory units can include random access memory (RAM), for example. Non-volatile memory units can include read-only memory (ROM) as well as mechanical non-volatile memory systems, such as a hard disk drive, optical disk drive, or other non-volatile memory. The RAM and/or ROM memory units can be implemented as discrete memory ICs. The memory unit can store executable software and data. When the processor executes the software instructions of various modules, the processor can be caused to perform the various operations of the systems, apparatuses, devices, and methods, such as described herein.
The systems, apparatuses, devices, and methods can store and access data in a variety of databases. The data stored in the databases can be stored in a non-volatile computer memory, such as a hard disk drive, read only memory (e.g. a ROM IC), or other types of non-volatile memory. In some embodiments, one or more databases of the databases can be stored on a remote electronic computer system and can be accessed via a network. As will be appreciated, a variety of other databases or other types of memory storage structures can be utilized or otherwise associated with the systems, apparatuses, devices, and methods.
The systems, apparatuses, devices, and methods can include one or more computer servers, which can include one or more web servers, one or more application servers, and/or other types of servers. The servers can cause content to be sent between or among monitored equipment, one or more dedicated communication hubs, smartphones, and/or remote computing devices, via a network in any of a number of formats. The servers can be comprised of processors (e.g. CPUs), memory units (e.g. RAM, ROM), non-volatile storage systems (e.g. hard disk drive systems), and other elements. The servers can use one or more operating systems including, but not limited to, Solaris, Linux, Windows Server, or other server operating systems.
In some embodiments, a web server can provide a graphical web user interface through which, for example, various users can visualize data captured by the monitored equipment. The graphical web user interface can also be referred to as a graphical user interface, user portal, user interface, graphical client interface, and so forth. The web server can accept requests, such as HTTP requests, from clients and serve the client's responses, such as HTTP responses, along with optional data content, such as web pages (e.g. HTML documents) and linked objects (such as images, video, documents, data, and so forth). The application server can provide a user interface for users who do not use a web browser to view data captured by the monitored equipment. Such users can have special software installed on their computing device to allow the user to communicate with the application server via a network.
In various embodiments, the systems, apparatuses, devices, and methods described herein may be configured and/or programmed to include one or more of the above-described electronic, computer-based elements and components. In addition, these elements and components may be particularly configured to execute the various rules, algorithms, programs, processes, and method steps described herein.
The foregoing description of embodiments and examples of the disclosure has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the forms described. Numerous modifications are possible in light of the above teachings. Some of those modifications have been discussed and others will be understood by those skilled in the art. The embodiments were chosen and described in order to best illustrate the principles of the disclosure and various embodiments as are suited to the particular use contemplated. The scope of the disclosure is, of course, not limited to the examples or embodiments set forth herein, but can be employed in any number of applications and equivalent devices by those of ordinary skill in the art. Rather it is hereby intended the scope of the invention be defined by the claims appended hereto. Also, for any methods claimed and/or described, regardless of whether the method is described in conjunction with a flow diagram, it should be understood that unless otherwise specified or required by context, any explicit or implicit ordering of steps performed in the execution of a method does not imply that those steps must be performed in the order presented and may be performed in a different order or in parallel.
This application is a continuation of U.S. patent application Ser. No. 18/221,041 filed Jul. 12, 2023, which claims priority of U.S. provisional patent application Ser. No. 63/388,666 filed Jul. 13, 2022, Ser. No. 63/391,339 filed Jul. 22, 2022, and Ser. No. 63/400,154 filed Aug. 23, 2022, and hereby incorporates each of these patent applications by reference herein in its respective entirety.
Number | Name | Date | Kind |
---|---|---|---|
11164134 | Barak | Nov 2021 | B2 |
20060032704 | Chandra | Feb 2006 | A1 |
20180033279 | Chong | Feb 2018 | A1 |
20200347674 | Haynes | Nov 2020 | A1 |
20220341263 | Sakai | Oct 2022 | A1 |
Number | Date | Country | |
---|---|---|---|
20240212085 A1 | Jun 2024 | US |
Number | Date | Country | |
---|---|---|---|
63400154 | Aug 2022 | US | |
63391339 | Jul 2022 | US | |
63388666 | Jul 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 18221041 | Jul 2023 | US |
Child | 18598387 | US |