Abstract:
A device, system and method for crowd control is provided. An aural command is detected at a location using a microphone at the location. A computing device determines, based on video data received from one or more multimedia devices, whether one or more persons at the location are not following the aural command. The computing device modifies the aural command to generate a second version of the aural command based on one or more of the video data and multimedia data associated with the location. The computing device causes the second version of the aural command to be provided, to the one or more persons who are not following the aural command at the location, using one or more notification devices.
Abstract:
A user, such as an elderly person, may be assisted by an assistance device in his or her caregiving environment that operates in conjunction with one or more server computers. The assistance device may execute a schedule of assistance actions where each assistance action is associated with a time and is executed at that time to assist the user. An assistance action may present an input request to a user, process a voice input of the user, and analyze the voice input to determine that the voice input corresponds to a negative response event, a positive response event, or a non-response event. Based on the categorization of one or more voice inputs as negative response events, positive response events, or non-response events, it may be determined to notify a caregiver of the user, for example where the user has not responded to a number of assistance actions.
Abstract:
Disclosed are a system and method for developing computational models of the behavior of a building's occupants using data acquired from sensor-equipped connected luminaires. The models are then used to develop an optimized evacuation plan for safe and timely egress of the occupants without requiring mock evaluation drills.
Abstract:
Building safety systems, methods, and mediums are provided. A method includes receiving a voice input by the building safety system. The method includes receiving voice data produced by a speech recognition process performed on the voice input. The method includes determining a response to the voice input based on the voice data. The method includes producing the response by the building safety system.
Abstract:
A networked visual and audible alarm apparatus and method of synchronized alerting provides audible and visual alerts upon detection of events, such as smoke, carbon monoxide and gas. The apparatus adapts to a light bulb socket to provide normal lighting when no event is detected. The apparatuses are systematically disposed through different sections of a structure. Each apparatus independently emits an audible signal, dependent on the type of event detected in the respective section for the apparatus. Further, each alarm apparatus provides a colored high strobe light that illuminates at a color and intensity that varies, dependent on the type of event detected in the section of the alarm apparatus. A microphone enables the alarm apparatus to initiate the audible signal and the high strobe light upon detecting an audible signal from an adjacent alarm apparatus. Also, voice commands can be used to power off the alarming apparatus.
Abstract:
Examples are directed towards providing a set of hub devices for providing per-room monitoring of an area associated with a structure. A set of hub devices monitors movements of a user through the monitored area to generate user traffic data. A dynamic map of the monitored area is generated based on the user traffic data. The set of hub devices detects sounds occurring within the monitored area. The detected sounds are identified. Some of the detected sounds are amplified and replayed on speaker(s) within the monitored area. Notifications of some detected sounds are provided to user device(s) to notify at least one user of the occurrence of the detected sounds. If a detected sound indicates a safety issue, a safe route leading from a current location of the user to a different potentially safer location is generated and provided to the user to facilitate an evacuation.
Abstract:
A system for monitoring a previously travelled pathway. The system comprises a user device comprising means for interacting with a user and node devices arranged to be deployed on a pathway as a user travels. The nodes are arranged to communicate with at least one other node device or the user device or a device external to the system to reflect a change in a predetermined factor in the region of the deployed node device on the pathway.
Abstract:
Beschreibung von Methoden einer gemeinschaftlich-sozialen Anwendung mit Nutzung technischer Komponenten, bei der nach Gebäuden getrennt ein Feuerwarnsystem unter Nutzung des mobilen Internets und/oder Telefonverbindungen aufgesetzt werden kann, zur Lokalisierung von sich bei einem Brand potenziell im Haus befindlichen Personen, frühzeitiger Vorwarnung von Personen im Gebäude, Information von gewöhnlich nicht im Haus befindlichen Personen, und mehrere Kommunikationsvarianten zwischen Rettungskräften und Personen im und außerhalb des Hauses und einer Anzeige für Rettungskräften über sicher oder vermutlich oder sicher nicht im Gebäude befindliche Personen und die Ausbreitung eines Brands.
Abstract:
An access control system comprising a reader configured to authenticate a primary mobile device only if the primary mobile device communicates with the reader via a required communication path that includes a secondary mobile device is described. Alternatively, the reader may be configured to evaluate credentials presented to the reader from a primary mobile device only if the primary mobile device communicates the credentials to the reader via a required communication path that includes a secondary mobile device.
Abstract:
An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. If the secondary credential device is lost, misplaced, or stolen, it cannot be used to gain illicit access to the protected resource, and it can be easily replaced by providing a different secondary credential device with another key derived from the master key.