Modular security monitoring and warning system and method of use
A technology for security events and alarms, applied in the field of security systems, to solve problems such as defeat of purpose, not modularity or scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The disclosed examples provide an environment that can evaluate actions including humans, objects, and robots
[0027] Figures 1 and 2 illustrate implementations according to an example comprising nine regions 102, 104, 106,
[0028] As shown in FIGS. 2-5, the environment 100 may include human actors 122H, object actors 122O, and machines
[0029] Furthermore, the sensors 124 may be used alone or in combination within the environment 100 to increase the performance of the environment 100.
[0030] In one example, the sensor 124 is part of a radio frequency identification ("RFID") system. RFID sensors have
[0032] Safety events in the form of pressure injuries can be associated with an action count of 150 repeated moves. At this
[0033] The sensors 124 may also include a global positioning system ("GPS"). In this example, GPS is included with the environment 100
[0034] The GPS processor is also configured to access a compilation of historical information, the compilati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


