US20240191894A1 - Controlling fire suppression based on occupancy data - Google Patents

Controlling fire suppression based on occupancy data Download PDF

Info

Publication number
US20240191894A1
US20240191894A1 US18/528,218 US202318528218A US2024191894A1 US 20240191894 A1 US20240191894 A1 US 20240191894A1 US 202318528218 A US202318528218 A US 202318528218A US 2024191894 A1 US2024191894 A1 US 2024191894A1
Authority
US
United States
Prior art keywords
building
threat
occupant
occupancy information
sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/528,218
Inventor
Paul Fee
Jason M. Ouellette
Frederick Michael McBride
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Johnson Controls Tyco IP Holdings LLP
Original Assignee
Johnson Controls Tyco IP Holdings LLP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Johnson Controls Tyco IP Holdings LLP filed Critical Johnson Controls Tyco IP Holdings LLP
Priority to US18/528,218 priority Critical patent/US20240191894A1/en
Assigned to Johnson Controls Tyco IP Holdings LLP reassignment Johnson Controls Tyco IP Holdings LLP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FEE, PAUL, MCBRIDE, Frederick Michael, OUELLETTE, Jason M.
Publication of US20240191894A1 publication Critical patent/US20240191894A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F11/00Control or safety arrangements
    • F24F11/30Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
    • F24F11/32Responding to malfunctions or emergencies
    • F24F11/33Responding to malfunctions or emergencies to fire, excessive heat or smoke
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F2120/00Control inputs relating to users or occupants
    • F24F2120/10Occupancy

Definitions

  • Deployment of chemical suppression is typically limited to areas with critical equipment, such as data centers. More populated areas of a building, such as generic office floor spaces, may not be equipped with chemical suppression means, but may have conventional Heating, Ventilation and Air Conditioning (HVAC) facilities.
  • HVAC Heating, Ventilation and Air Conditioning
  • a system for responding to a threat detected in a building includes one or more hardware processors, individually or in combination, configured to acquire sensor data from one or more sensor devices located within the building.
  • the one or more hardware processors, individually or in combination, are further configured to calculate, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building.
  • the one or more hardware processors, individually or in combination are further configured to send a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
  • FIG. 1 illustrates a schematic view of an example building control system in accordance with aspects of the present disclosure
  • HVAC Heating, Ventilation and Air Conditioning
  • the building control system 100 may include a surveillance system 106 having one or more occupancy sensors 102 and one or more threat sensors 104 , a controller 110 , an access control system 124 , and one or more threat mitigators 134 .
  • One of the threat mitigators 134 may include an HVAC control system 130 having one or more HVAC components 132 .
  • the building control system 100 may provide directions to occupants inside a building during an emergency event or other event that requires partial or full evacuation of the building.
  • the building control system 100 may provide real-time decision control utilizing parameters received from the occupancy sensors 102 and the threat sensors 104 .
  • the building control system 100 includes the surveillance system 106 having one or more occupancy sensors 102 and one or more threat sensors 104 .
  • the surveillance system 106 may be configured to use computer vision and pattern recognition technologies to analyze information from situated occupancy sensors 102 , such as video-based occupancy sensors. The analysis of the sensor data by the surveillance system 106 may generate events of interest in the environment.
  • occupancy sensors 102 may be mounted at different zones within the building and/or may be deployable sensors mounted on mobile platforms, such as, but not limited to, robots, drones, and the like, that may be deployed to various locations as needed.
  • data from the threat sensors 104 and occupancy sensors 102 may be combined by the controller 110 to form data with increased accuracy.
  • the threat sensors 104 may be defined and categorized by local zones of a building.
  • the controller 110 may model emergency events and evacuation scenarios utilizing real-time modeling utilizing reduced-order models.
  • the controller 110 may utilize predictive models by first determining an objective and optimizing control strategies accordingly.
  • such strategies may be dynamically altered and updated (for example, updating a strategy in response to a blockage of a path due to fire, falling debris, and the like).
  • the controller 110 may reduce or minimize risk to building occupants. Further, the controller 110 may further reduce risk to first responders and/or property. In an example aspect, the controller 110 may identify portions of the building as zones to determine emergency strategies. Zones may include, but are not limited to, a floor or a subset of a floor. Closed stairwells may comprise separate zones. In an aspect, the controller 110 may utilize a risk model to evaluate the risk in each zone of the building (e.g., risk of fire is high in a zone where many heat and smoke sensors are activated).
  • the controller 110 may include an occupant sensing module 112 , an occupancy flow planner 114 , an HVAC controller 116 , a threat predictor module 118 , and a threat mitigation module 120 .
  • an HVAC controller 116 may be configured to determine operation of the HVAC control system 130 in accordance with strategies created by the occupancy flow planner 114 .
  • the HVAC controller 116 may determine airflow in various zones of a building. For example, the HVAC controller 116 may maintain, shut off, or, if possible, reverse the airflow.
  • the occupancy flow planner 114 may utilize load balancing methods to optimize use of the access control system 124 .
  • the occupancy flow planner 114 may balance the load on the principal bottlenecks (e.g., stairs).
  • the occupancy flow planner 114 may utilize risk measure values to determine a preferred evacuation path based on real-time occupancy data.
  • a risk measure value may be defined for each floor of a building based on factors such as the number of people in that floor, the monetary or non-monetary value of assets/property on that floor (e.g., sensitive documents), to what extent the property on that floor is flammable or fire-retardant, etc.
  • the occupancy flow planner 114 may also prioritize some occupants over the others. For example, if the occupants in a zone are firefighters with fire protection attire (e.g., fire-protective cloths, hard hats, fire-protective gloves, oxygen masks, etc.), while the occupants in another zone are regular people, the occupancy flow planner 114 may assign a higher risk value to the zone that includes regular people and thereby determine a preferred evacuation path that prioritizes evacuation of regular people over the firefighters.
  • fire protection attire e.g., fire-protective cloths, hard hats, fire-protective gloves, oxygen masks, etc.
  • the controller 110 may calculate occupancy information for the one or more zones in a building.
  • the controller 110 may be configured to analyze parameters provided by the occupancy sensors 102 to calculate the occupancy information. For example, the controller 110 may calculate one or more of: an occupant count, an occupant location, an occupant movement pattern, or an occupant mobility level.
  • the controller 110 may obtain the occupancy information based on the data provided by the access control system 124 .
  • the controller 110 may calculate occupancy information for each zone and/or for the entire building.
  • the controller 110 may determine to shut off the HVAC or reverse it in the entire building. In some additional aspects, the controller 110 may repeat the steps of occupancy calculation and threat mitigation to account for the changes in the occupancy information over time. For example, after the occupants leave a zone, the controller 110 may take a different, more drastic, action compared to when the zone is occupied.
  • the controller 110 may send a control instruction to a threat mitigator based on the occupancy information.
  • the controller 110 may control the threat mitigators 134 to reduce threats directly.
  • One of the threat mitigators 134 may include an HVAC system.
  • the controller 110 may control the airflow in one or more particular zones of a building or in the entire building.
  • the HVAC components 132 may include a Programmable Logic Controller (PLC) that may support one of the following actions: maintain airflow, stop airflow or reverse airflow, if possible.
  • PLC Programmable Logic Controller
  • a method for responding to a threat detected in a building includes acquiring sensor data from one or more sensor devices located within the building. Occupancy information of occupants within the building is calculated, based on the sensor data, in response to detecting the threat in the building. A control instruction is sent to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
  • calculating the occupancy information includes calculating one or more of: an occupant count, an occupant location, an occupant movement pattern, or an occupant mobility level.
  • FIG. 3 is a block diagram illustrating various hardware components and other features of an example computer system 300 which may implement a threat response system or one or more components of a threat response system, in accordance with aspects of the present disclosure.
  • the computer system 300 may implement all or at least a portion of building control system 100 , surveillance system 106 , occupancy sensor 102 , threat sensor 104 , controller 110 , occupant sensing module 112 , occupancy flow planner 114 , HVAC controller 116 , threat predictor module 118 , threat mitigation module 120 , access control system 124 , threat mitigator 134 , HVAC control system 130 , or HVAC component 132 , in accordance with aspects of the present disclosure.
  • Computer system 300 includes one or more processors 304 .
  • a processor, at least one processor, and/or one or more processors, individually or in combination, configured to perform or operable for performing a plurality of actions is meant to include at least two different processors able to perform different, overlapping or non-overlapping subsets of the plurality actions, or a single processor able to perform all of the plurality of actions.
  • a description of a processor, at least one processor, and/or one or more processors configured or operable to perform actions X, Y, and Z may include at least a first processor configured or operable to perform a first subset of X, Y, and Z (e.g., to perform X) and at least a second processor configured or operable to perform a second subset of X, Y, and Z (e.g., to perform Y and Z).
  • a first processor, a second processor, and a third processor may be respectively configured or operable to perform a respective one of actions X, Y, and Z. It should be understood that any combination of one or more processors each may be configured or operable to perform any one or any combination of a plurality of actions.
  • the one or more processors 304 are connected to a communication infrastructure 306 (e.g., a communications bus, cross-over bar, or network).
  • a communication infrastructure 306 e.g., a communications bus, cross-over bar, or network.
  • the one or more processors 304 process signals and perform general computing and arithmetic functions. Signals processed by the processors may include digital signals, data signals, computer instructions, processor instructions, messages, a bit, a bit stream, or other computing that may be received, transmitted and/or detected.
  • Communication infrastructure 306 such as a bus (or any other use of “bus” herein), refers to an interconnected architecture that is operably connected to transfer data between computer components within a singular system or multiple systems.
  • the bus may be a memory bus, a memory controller, a peripheral bus, an external bus, a crossbar switch, and/or a local bus, among others.
  • the bus may also be a bus that interconnects components inside an access control system using protocols, such as Controller Area network (CAN), Local Interconnect Network (LIN), Wiegand and Open Supervised Device Protocol (OSDP), among others.
  • CAN Controller Area network
  • LIN Local Interconnect Network
  • OSDP Open Supervised Device Protocol
  • connection between components of computer system 300 can be referred to as an operable connection, and can include a connection by which entities are operably connected, such that signals, physical communications, and/or logical communications can be sent and/or received.
  • An operable connection can include a physical interface, a data interface and/or an electrical interface.
  • Computer system 300 can include a display interface 302 that forwards graphics, text, and other data from the communication infrastructure 306 (or from a frame buffer not shown) for display on a display unit 330 (e.g., to provide visual guidance to evacuates occupants of a building).
  • Computer system 300 also includes one or more main memories 308 , preferably random access memory (RAM), and can also include one or more secondary memories 310 .
  • main memories 308 preferably random access memory (RAM)
  • a memory at least one memory, and/or one or more memories, individually or in combination, configured to store or having stored thereon instructions executable by one or more processors for performing a plurality of actions is meant to include at least two different memories able to store different, overlapping or non-overlapping subsets of the instructions for performing different, overlapping or non-overlapping subsets of the plurality actions, or a single memory able to store the instructions for performing all of the plurality of actions.
  • a description of a memory, at least one memory, and/or one or more memories configured or operable to store or having stored thereon instructions for performing actions X, Y, and Z may include at least a first memory configured or operable to store or having stored thereon a first subset of instructions for performing a first subset of X, Y, and Z (e.g., instructions to perform X) and at least a second memory configured or operable to store or having stored thereon a second subset of instructions for performing a second subset of X, Y, and Z (e.g., instructions to perform Y and Z).
  • a first memory, and second memory, and a third memory may be respectively configured to store or have stored thereon a respective one of a first subset of instructions for performing X, a second subset of instruction for performing Y, and a third subset of instructions for performing Z.
  • any combination of one or more memories each may be configured or operable to store or have stored thereon any one or any combination of instructions executable by one or more processors to perform any one or any combination of a plurality of actions.
  • one or more processors may each be coupled to at least one of the one or more memories and configured or operable to execute the instructions to perform the plurality of actions.
  • a first processor may be coupled to a first memory storing instructions for performing action X
  • at least a second processor may be coupled to at least a second memory storing instructions for performing actions Y and Z
  • the first processor and the second processor may, in combination, execute the respective subset of instructions to accomplish performing actions X, Y, and Z.
  • three processors may access one of three different memories each storing one of instructions for performing X, Y, or Z, and the three processor may in combination execute the respective subset of instruction to accomplish performing actions X, Y, and Z.
  • a single processor may execute the instructions stored on a single memory, or distributed across multiple memories, to accomplish performing actions X, Y, and Z.
  • the one or more secondary memories 310 can include, for example, a hard disk drive 312 and/or a removable storage drive 314 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc.
  • the removable storage drive 314 reads from and/or writes to a removable storage unit 318 in a well-known manner.
  • Removable storage unit 318 represents a floppy disk, magnetic tape, optical disk, etc., which is read by and written to removable storage drive 314 .
  • the removable storage unit 318 includes a computer-usable storage medium having stored therein computer software and/or data.
  • the one or more secondary memories 310 can include other similar devices for allowing computer programs or other instructions to be loaded into computer system 300 .
  • Such devices can include, for example, a removable storage unit 322 and an interface 320 .
  • Examples of such can include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an erasable programmable read only memory (EPROM), or programmable read only memory (PROM)) and associated socket, and other removable storage units 322 and interfaces 320 , which allow software and data to be transferred from the removable storage unit 322 to computer system 300 .
  • a program cartridge and cartridge interface such as that found in video game devices
  • EPROM erasable programmable read only memory
  • PROM programmable read only memory
  • Non-volatile memory can include, for example, ROM (read only memory), PROM (programmable read only memory), EPROM (erasable PROM) and EEPROM (electrically erasable PROM).
  • Volatile memory can include, for example, RAM (random access memory), synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), and/or direct RAM bus RAM (DRRAM).
  • RAM random access memory
  • SRAM synchronous RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • DRRAM direct RAM bus RAM
  • Computer system 300 can also include a communications interface 324 .
  • Communications interface 324 allows software and data to be transferred between computer system 300 and external devices.
  • Examples of communications interface 324 can include a modem, a network interface (such as an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc.
  • Software and data transferred via communications interface 324 are in the form of signals 328 , which can be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 324 . These signals 328 are provided to communications interface 324 via a communications path (e.g., channel) 326 .
  • a communications path e.g., channel
  • This path 326 carries signals 328 and can be implemented using wire or cable, fiber optics, a telephone line, a cellular link, a radio frequency (RF) link, and/or other communications channels.
  • RF radio frequency
  • the terms “computer program medium” and “computer-usable medium” are used to refer generally to media such as a removable storage drive 314 , a hard disk installed in hard disk drive 312 , and signals 328 . These computer program products provide software to the computer system 300 . Aspects of the disclosure are directed to such computer program products.
  • Computer programs are stored in the one or more main memories 308 and/or the one or more secondary memories 310 . Computer programs can also be received via communications interface 324 . Such computer programs, when executed, enable the computer system 300 to perform various features in accordance with aspects of the present disclosure, as discussed herein. In particular, the computer programs, when executed, enable the one or more processors 304 , individually or in combination, to perform such features. Accordingly, such computer programs represent controllers of the computer system 300 .
  • the software can be stored in a computer program product and loaded into computer system 300 using removable storage drive 314 , hard disk drive 312 , or communications interface 320 .
  • the control logic when executed by the one or more processors 304 , causes the one or more processors 304 , individually or in combination, to perform the functions in accordance with aspects of the disclosure as described herein.
  • aspects are implemented primarily in hardware using, for example, hardware components, such as application specific integrated circuits (ASICs). Implementation of the hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant art(s).
  • aspects of the disclosure are implemented using a combination of both hardware and software.
  • Computer-readable storage media includes computer storage media and communication media.
  • Computer-readable storage media can include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, modules or other data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Chemical & Material Sciences (AREA)
  • Combustion & Propulsion (AREA)
  • Mechanical Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Air Conditioning Control Device (AREA)

Abstract

A method for responding to a threat detected in a building includes acquiring sensor data from one or more sensor devices located within the building. Occupancy information of occupants within the building is calculated, based on the sensor data, in response to detecting the threat in the building. A control instruction is sent to a threat mitigator to reduce or eliminate the threat based on the occupancy information.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • The present application claims priority to U.S. Provisional Application No. 63/386,782, entitled “CONTROLLING FIRE SUPPRESSION BASED ON OCCUPANCY DATA” and filed on Dec. 9, 2022, which is assigned to the assignee hereof and incorporated by reference herein in the entirety.
  • FIELD
  • The present disclosure relates generally to fire protection systems. More particularly, the present disclosure relates to controlling fire suppression based on occupancy data.
  • BACKGROUND
  • Current fire suppression systems employ water, chemical agents, gaseous agents (such as Halon 1301, carbon dioxide, or heptafluoropropane) or a combination thereof. Virtually all of them are ozone depleting, toxic, environmentally unfriendly, and may be dangerous if people are present. Deployment of such measures may be highly regulated due to risks associated with these measures. Building fires are often spreading through openings and channels containing or being adjacent to combustible elements or materials. At least in some cases, the spread of a fire may also be influenced, or reduced, by less dramatic actions such as closing doors and/or windows. By closing doors and/or windows, the oxygen available to the fire is reduced. Reduction of oxygen may, in and of itself, extinguish a fire. If the fire is not extinguished, the oxygen reduction may reduce the intensity, and hence temperature, of the fire. By reducing the temperature of the fire, fire responders may more successfully apply water or other retardants to the fire and extinguish it.
  • Deployment of chemical suppression is typically limited to areas with critical equipment, such as data centers. More populated areas of a building, such as generic office floor spaces, may not be equipped with chemical suppression means, but may have conventional Heating, Ventilation and Air Conditioning (HVAC) facilities.
  • Evacuation and threat response plans often include predetermined building system responses. Building control systems may provide individual control of building systems, but may not be integrated with fire suppression systems to provide a comprehensive response in accordance with dynamic threats and occupant behavior. Therefore, there is a need in the art to improve comprehensive fire threat response based on occupancy data, e.g., presence of people in or near a fire.
  • SUMMARY
  • The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
  • In an example aspect, a method for responding to a threat detected in a building includes acquiring sensor data from one or more sensor devices located within the building. The method further includes calculating, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building. The method further includes sending a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
  • In another example aspect, a system for responding to a threat detected in a building includes one or more hardware processors, individually or in combination, configured to acquire sensor data from one or more sensor devices located within the building. The one or more hardware processors, individually or in combination, are further configured to calculate, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building. The one or more hardware processors, individually or in combination, are further configured to send a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
  • In a further example aspect, one or more non-transitory computer-readable media have instructions stored thereon that when executed by one or more processors cause the one or more processors, individually or in combination, to respond to a threat detected in a building. The instructions, when executed by the one or more processors, cause the one or more processors, individually or in combination, to acquire sensor data from one or more sensor devices located within the building. The instructions, when executed by the one or more processors, further cause the one or more processors, individually or in combination, to calculate, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building. The instructions, when executed by the one or more processors, further cause the one or more processors, individually or in combination, to send a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
  • To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed, and this description is intended to include all such aspects and their equivalents.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The disclosed aspects will hereinafter be described in conjunction with the appended drawings, provided to illustrate and not to limit the disclosed aspects, wherein like designations denote like elements, wherein dashed lines may indicate optional elements, and in which:
  • FIG. 1 illustrates a schematic view of an example building control system in accordance with aspects of the present disclosure;
  • FIG. 2 is a flowchart of an example method for responding to a threat detected in a building based on occupancy information, in accordance with some aspects of the present disclosure; and
  • FIG. 3 is a block diagram illustrating various hardware components and other features of an example threat response system in accordance with aspects of the present disclosure.
  • DETAILED DESCRIPTION
  • Various aspects are now described with reference to the drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects. It may be evident, however, that such aspect(s) may be practiced without these specific details.
  • It is well known that fire requires fuel and oxygen to propagate. When a fire is detected, there may be a conflict between saving lives and fire suppression. Occupancy sensing is used for various applications such as surveillance, video conferencing, smart rooms, building automation, and the like. For example, a surveillance system may gain knowledge of building/room/location occupancy. Heating, Ventilation and Air Conditioning (HVAC) systems may provide optimal amounts of fresh and conditioned air to different rooms or offices in the same building. In an aspect, a HVAC system may influence the supply of air to a building or to individual rooms/areas. Combining functionalities of surveillance and HVAC systems during early fire detection may enable the HVAC system to remove air and/or to stop the supply of fresh air to effectively suppress a fire.
  • Referring to FIG. 1 , an example aspect of a building control system 100 is shown. In an example aspect, the building control system 100 may include a surveillance system 106 having one or more occupancy sensors 102 and one or more threat sensors 104, a controller 110, an access control system 124, and one or more threat mitigators 134. One of the threat mitigators 134 may include an HVAC control system 130 having one or more HVAC components 132. In an example aspect, the building control system 100 may provide directions to occupants inside a building during an emergency event or other event that requires partial or full evacuation of the building. In an example aspect, the building control system 100 may provide real-time decision control utilizing parameters received from the occupancy sensors 102 and the threat sensors 104.
  • In an example aspect, the building control system 100 includes the surveillance system 106 having one or more occupancy sensors 102 and one or more threat sensors 104. In an aspect, the surveillance system 106 may be configured to use computer vision and pattern recognition technologies to analyze information from situated occupancy sensors 102, such as video-based occupancy sensors. The analysis of the sensor data by the surveillance system 106 may generate events of interest in the environment. In certain aspects, occupancy sensors 102 may be mounted at different zones within the building and/or may be deployable sensors mounted on mobile platforms, such as, but not limited to, robots, drones, and the like, that may be deployed to various locations as needed. Occupancy sensors 102 may include, but are not limited to, a video sensor, a light detection and ranging (LIDAR) sensor, an infrared sensor, a mobile device sensor, a radio frequency identification (RFID) sensor, and the like. The occupancy sensors 102 may provide occupancy parameters to controller 110. Occupancy parameters may include, but are not limited to, an occupant count, an occupant location, an occupant flow pattern, an occupant mobility level, and the like.
  • In an aspect, the surveillance system 106 may include one or more threat sensors 104. In certain aspects, the threat sensors 104 may include fixed sensors and/or may be deployable sensors mounted on mobile platforms, such as robots and drones, that may be deployed as needed. The threat sensors 104 may include, but are not limited to, a general threat trigger, a fire detector, a smoke detector, a heat detector, and the like. The threat sensors 104 may provide threat parameters to the controller 110. Threat parameters may include, but are not limited to, a threat type, a threat scope, a threat propagation, and a threat pattern.
  • In certain aspects, data from the threat sensors 104 and occupancy sensors 102 may be combined by the controller 110 to form data with increased accuracy. Further, in certain aspects, the threat sensors 104 may be defined and categorized by local zones of a building.
  • In certain aspects, data from the occupancy sensors 102 and threat sensors 104 may be combined by the surveillance system 106 to form data with increased accuracy. Further, in certain aspects, the occupancy sensors 102 may be defined and categorized by local zones of a building.
  • In an example aspect, the controller 110 may provide real-time control of building functions. Advantageously, the controller 110 may provide emergency and threat responses based on numerous parameters, including sensed parameters and known parameters. Known parameters may include, but are not limited to, building design, such as design of stairways and corridors, location of door access control devices, location of occupancy sensors 102, location of threat sensors 104, and the like. As an example, a door access control device may include a reader that requires a code to open a door. The code may be based on biometric data, card data, RFID data, or electronic key data. The code may be transmitted via Bluetooth, RFID, Wi-Fi, or any other electronic signal. In an example aspect, the controller 110 may model emergency events and evacuation scenarios utilizing real-time modeling utilizing reduced-order models. In certain aspects, the controller 110 may utilize predictive models by first determining an objective and optimizing control strategies accordingly. In an example aspect, such strategies may be dynamically altered and updated (for example, updating a strategy in response to a blockage of a path due to fire, falling debris, and the like).
  • In an example aspect, the controller 110 may reduce or minimize risk to building occupants. Further, the controller 110 may further reduce risk to first responders and/or property. In an example aspect, the controller 110 may identify portions of the building as zones to determine emergency strategies. Zones may include, but are not limited to, a floor or a subset of a floor. Closed stairwells may comprise separate zones. In an aspect, the controller 110 may utilize a risk model to evaluate the risk in each zone of the building (e.g., risk of fire is high in a zone where many heat and smoke sensors are activated).
  • In an example aspect, the controller 110 may include an occupant sensing module 112, an occupancy flow planner 114, an HVAC controller 116, a threat predictor module 118, and a threat mitigation module 120.
  • In an example aspect, the occupant sensing module 112 may process and interpret occupancy data (parameters regarding building occupants) provided by the occupancy sensors 102. In certain aspects, the occupant sensing module 112 may utilize information provided by the threat sensors 104. The occupant sensing module 112 may determine and process occupant parameters, including, but not limited to, occupant locations, occupant mobility levels, occupant flow patterns, occupant flow predictions, the number of occupants in a zone, and the like. In certain aspects, the occupant sensing module 112 may provide occupant locations and occupant flow predictions.
  • In an example aspect, an occupancy flow planner 114 may utilize the output from the occupant sensing module 112 to determine occupant flow strategies in response to fire or other emergency events. In an example aspect, the occupancy flow planner 114 may determine occupant flow strategies to direct occupants out of a building or into refuge areas. In an aspect, the occupancy flow planner 114 may utilize people flow models that predict the flow rate in all possible egress paths, such as corridors, stairways, doorways, and the like.
  • For example, the occupancy flow planner 114 may determine escape path selection to minimize impact on risk exposure time or other factors. In certain aspects, the occupancy flow planner 114 may determine the optimal escape path based on the occupancy information, a building plan, and a zone in the building associated with the threat. In certain aspects, the occupancy flow planner 114 may utilize models for human behavior under stress, such as compliance with instructions, and the like. In certain aspects, the occupancy flow planner 114 may utilize models to determine exposure and duration of exposure to hazards for occupants. In certain aspects, the occupancy flow planner 114 may utilize predictive models of building equipment to predict performance of building equipment for metrics such as, but not limited to, controlling airflow for attenuating airborne risks such as smoke and contaminants.
  • Advantageously, the use of real-time, predictive models and fusion of data provided by various sensors may allow the controller 110 to determine an egress strategy that is adaptable to actual conditions rather than a fixed strategy that may have been optimized for a single condition. With predictive models, alternative strategies may be evaluated to select an optimal strategy. In certain aspects, pathway risk measures along a number of possible pathways may be evaluated until a preferred evacuation plan (e.g., preferred escape path) is determined. In some aspects, the preferred evacuation plan may be an optimal evacuation plan that minimizes risk. In some other aspects, more than one possible evacuation plan may minimize risk (e.g., two identical paths on two different sides of a symmetric building), in which case one of those evacuation plans may be selected as the preferred evacuation plan.
  • In certain aspects, the occupancy flow planner 114 may direct occupants to refuge spaces instead of, or in addition to, exiting a building. A refuge space in a building may be an area with protection from spread of fire, special facilities, emergency power, and the like. In certain aspects, the occupancy flow planner 114 may determine suitable refuge areas for evacuation purposes.
  • In an aspect, an HVAC controller 116 may be configured to determine operation of the HVAC control system 130 in accordance with strategies created by the occupancy flow planner 114. In an example aspect, the HVAC controller 116 may determine airflow in various zones of a building. For example, the HVAC controller 116 may maintain, shut off, or, if possible, reverse the airflow.
  • In case of fire, the HVAC controller 116 may evaluate operating conditions and threats relevant to the operation of the HVAC control system 130 (e.g., fire, chemical, biological agents, or smoke) to determine if HVAC-assisted fire suppression is possible or recommended in one or more zones of a building, based on occupancy data received from the occupancy flow planner 114. In an aspect, the HVAC control system 130 may include a plurality of controllable HVAC components 132, such as, but not limited to, boilers, fans, and the like.
  • In an aspect, the occupancy flow planner 114 may be communicatively coupled with the access control system 124. The access control system 124 may include access control devices (e.g., card readers coupled to door locking mechanisms), and components for managing the operation of such devices. For example, the occupancy flow planner 114 may send instructions to the access control system 124 to selectively lock and/or unlock one or more access points at one or more zones of the building based on the occupancy information. Further, if no one is in a secured room (e.g., a top secret lab), the occupancy flow planner 114 may send instructions to the access control system 124 to indicate that the doors can remain locked.
  • In certain aspects, the occupancy flow planner 114 may utilize load balancing methods to optimize use of the access control system 124. For example, the occupancy flow planner 114 may balance the load on the principal bottlenecks (e.g., stairs). In certain aspects, the occupancy flow planner 114 may utilize risk measure values to determine a preferred evacuation path based on real-time occupancy data. For example, in some aspects, a risk measure value may be defined for each floor of a building based on factors such as the number of people in that floor, the monetary or non-monetary value of assets/property on that floor (e.g., sensitive documents), to what extent the property on that floor is flammable or fire-retardant, etc. In these aspects, the occupancy flow planner 114 may define a total risk measure value by multiplying the time (in minutes) that a last evacuee spent at each floor in the building by the risk measure value of that floor and summing over all floors. The occupancy flow planner 114 may then determine a preferred evacuation path that minimizes the total risk measure value. In certain aspects, the occupancy flow planner 114 may change parameters including changing the speed and direction of an escalator or moving walkway to facilitate rapid evacuation.
  • In some aspects, the occupancy flow planner 114 may also prioritize some occupants over the others. For example, if the occupants in a zone are firefighters with fire protection attire (e.g., fire-protective cloths, hard hats, fire-protective gloves, oxygen masks, etc.), while the occupants in another zone are regular people, the occupancy flow planner 114 may assign a higher risk value to the zone that includes regular people and thereby determine a preferred evacuation path that prioritizes evacuation of regular people over the firefighters.
  • In some aspects, as people are evacuated from the building and the occupancy changes, the occupancy flow planner 114 may repeat the above steps to determine a new/updated preferred evacuation path based on the new occupancy data representative on the number of people remaining in the building. If there are no people left in the building, the occupancy flow planner 114 may take more drastic fire control measures, such as completely shutting down the HVAC system, releasing chemical fire suppression material, etc.
  • In an aspect, the controller 110 includes threat predictor module 118 configured to utilize inputs from threat sensors 104 to determine and predict threats and threat propagation. For example, the threat predictor module 118 may determine and predict the presence of smoke and may predict fire propagation, fire direction, and the like.
  • Advantageously, the threat predictor module 118 may utilize a sensor fusion module to receive inputs from a plurality of sensors, such as occupancy sensors 102 and threat sensors 104, to obtain a cohesive set of parameters. The threat predictor module 118 may infer conditions based on such sensor data.
  • In an example aspect, the threat predictor module 118 may account for the threat as the threat evolves over time via one or more threat prediction models. In certain aspects, the threat prediction models may allow the controller 110 to preemptively prioritize evacuating certain zones before imminent and emerging threats may put occupants in danger. These models may include combustion models in the case of fire, air flow dynamics based on temperature, stack effect, status of door opening, and the like.
  • In an aspect, the controller 110 may utilize the threat mitigation module 120 to provide active mitigation to threats within the building. For example, the threat mitigation module 120 may control threat mitigators 134 to reduce threats directly. In certain aspects, the threat mitigation module 120 may control threat mitigators 134 to remove smoke, close and/or lock doors to control air flow, and the like.
  • In an aspect, the threat mitigation module 120 may identify a threat mitigation plan based on the propagation assessment via the threat predictor 118. In certain aspects, the threat mitigation module 120 may utilize building information such as available equipment and equipment capability (e.g., max/min airflow achieved in a particular zone by HVAC, ability to deploy fire suppressant without contaminating adjacent zones/ducts, etc.) to determine an optimal response. In certain aspects, the threat predictor 118 may provide information to occupancy flow planner 114 to selectively direct occupants away from threats and towards desired egress points.
  • FIG. 2 is a flowchart of an example method for responding to a threat detected in a building based on occupancy information, in accordance with some aspects of the present disclosure.
  • At 202, the controller 110 may acquire sensor data. In an aspect, the controller 110 may utilize sensor fusion to receive inputs from a plurality of sensors, such as occupancy sensors 102 and threat sensors 104 to obtain a cohesive set of parameters. In an aspect, the controller 110 may utilize inputs from threat sensors 104 to determine and predict threats (e.g., fire) and threat propagation.
  • At 204, the controller 110 may determine whether a threat (such as fire or smoke) is detected/predicted, for example, based on analyzing threat sensor data.
  • At 206, in response to detecting/predicting a fire/smoke threat in one or more zones of a building (step 204, yes branch), the controller 110 may calculate occupancy information for the one or more zones in a building. In other words, the controller 110 may be configured to analyze parameters provided by the occupancy sensors 102 to calculate the occupancy information. For example, the controller 110 may calculate one or more of: an occupant count, an occupant location, an occupant movement pattern, or an occupant mobility level. In an aspect, the controller 110 may obtain the occupancy information based on the data provided by the access control system 124. In some aspects, the controller 110 may calculate occupancy information for each zone and/or for the entire building. If the entire building is empty, then the controller 110 may determine to shut off the HVAC or reverse it in the entire building. In some additional aspects, the controller 110 may repeat the steps of occupancy calculation and threat mitigation to account for the changes in the occupancy information over time. For example, after the occupants leave a zone, the controller 110 may take a different, more drastic, action compared to when the zone is occupied.
  • At 208, the controller 110 may send a control instruction to a threat mitigator based on the occupancy information. For example, the controller 110 may control the threat mitigators 134 to reduce threats directly. One of the threat mitigators 134 may include an HVAC system. In one aspect, the controller 110 may control the airflow in one or more particular zones of a building or in the entire building. For example, the HVAC components 132 may include a Programmable Logic Controller (PLC) that may support one of the following actions: maintain airflow, stop airflow or reverse airflow, if possible.
  • In some aspects, at 208, the controller 110 may also selectively direct occupants away from threats and towards desired egress points based on the calculated occupancy information, as described above. In fire threat situations, the controller 110 may determine an optimal response on how to suppress a fire. In addition, at step 208, the controller 110 may close/lock certain doors from entering (if a particular room is not used as a pathway out of the building) within one or more zones (for example, within an unoccupied zone) to suppress a fire. In an aspect, the threat mitigators 134 may include a guiding lighting system that may be used to dynamically guide the flow of people (e.g., by illuminating a path to a safe zone, etc.). Additionally, the threat mitigators 134 may include, but are not limited to, a display, a mobile device notification, an audio announcement device, or the access control system 124.
  • In an aspect, the controller 110 may send information, such as, but not limited to, current occupant status and threat status to first responders. First responders may receive building control authority or other suitable access as required. In an aspect, if the controller 110 determines that all occupants of a building are out of danger, more drastic threat mitigation (e.g., fire suppression) measures may be taken, such as, but not limited to, stopping the airflow, deployment of chemical suppression, and the like.
  • In other words, a method for responding to a threat detected in a building includes acquiring sensor data from one or more sensor devices located within the building. Occupancy information of occupants within the building is calculated, based on the sensor data, in response to detecting the threat in the building. A control instruction is sent to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
  • In an alternative or additional aspect, the threat includes a fire and the threat mitigator includes a Heating, Ventilation, and Air Conditioning (HVAC) system.
  • In an alternative or additional aspect, the control instruction reduces or stops the air flow into a zone in the building associated with the threat based on the occupancy information indicating an absence of the occupants in the zone.
  • In an alternative or additional aspect, the method further includes directing a movement of an occupant of the building via the threat mitigator, for example, by providing audio and/or visual guidance via one or more audio and/or visual output devices and/or by locking/unlocking certain entrances/exits.
  • In an alternative or additional aspect, directing the movement of the occupant of the building via the threat mitigator further includes directing the occupant along an exit path away from a zone in the building associated with the threat, and the control instruction reduces or stops the airflow into the zone in the building based on the occupancy information indicating the occupant has moved out of the zone.
  • In an alternative or additional aspect, the one or more sensor devices include: a video sensor, a light detection and ranging (LIDAR) sensor, an infrared sensor, a mobile device sensor, or a radio frequency identification (RFID) sensor.
  • In an alternative or additional aspect, the threat mitigator includes a display, a guiding lighting system, a mobile device notification, an audio announcement device, or an access control system, for example, to provide audio and/or visual guidance and/or to lock/unlock certain entrances/exits.
  • In an alternative or additional aspect, the method further includes sending (e.g., by the occupancy flow planner 114) instructions to the access control system to selectively lock and/or unlock one or more access points at one or more zones of the building based on the occupancy information.
  • In an alternative or additional aspect, calculating the occupancy information includes calculating one or more of: an occupant count, an occupant location, an occupant movement pattern, or an occupant mobility level.
  • Aspects of the present disclosure may be implemented using hardware, software, or a combination thereof and may be implemented in one or more computer systems or other processing systems. In one aspect, the disclosure is directed toward one or more computer systems capable of carrying out the functionality described herein. FIG. 3 is a block diagram illustrating various hardware components and other features of an example computer system 300 which may implement a threat response system or one or more components of a threat response system, in accordance with aspects of the present disclosure. For example, the computer system 300 may implement all or at least a portion of building control system 100, surveillance system 106, occupancy sensor 102, threat sensor 104, controller 110, occupant sensing module 112, occupancy flow planner 114, HVAC controller 116, threat predictor module 118, threat mitigation module 120, access control system 124, threat mitigator 134, HVAC control system 130, or HVAC component 132, in accordance with aspects of the present disclosure.
  • Computer system 300 includes one or more processors 304. As used herein, a processor, at least one processor, and/or one or more processors, individually or in combination, configured to perform or operable for performing a plurality of actions is meant to include at least two different processors able to perform different, overlapping or non-overlapping subsets of the plurality actions, or a single processor able to perform all of the plurality of actions. In one non-limiting example of multiple processors being able to perform different ones of the plurality of actions in combination, a description of a processor, at least one processor, and/or one or more processors configured or operable to perform actions X, Y, and Z may include at least a first processor configured or operable to perform a first subset of X, Y, and Z (e.g., to perform X) and at least a second processor configured or operable to perform a second subset of X, Y, and Z (e.g., to perform Y and Z). Alternatively, a first processor, a second processor, and a third processor may be respectively configured or operable to perform a respective one of actions X, Y, and Z. It should be understood that any combination of one or more processors each may be configured or operable to perform any one or any combination of a plurality of actions.
  • The one or more processors 304 are connected to a communication infrastructure 306 (e.g., a communications bus, cross-over bar, or network). Various software aspects are described in terms of this example computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement aspects of the disclosure using other computer systems and/or architectures.
  • The one or more processors 304, or any other “processor,” as used herein, process signals and perform general computing and arithmetic functions. Signals processed by the processors may include digital signals, data signals, computer instructions, processor instructions, messages, a bit, a bit stream, or other computing that may be received, transmitted and/or detected.
  • Communication infrastructure 306, such as a bus (or any other use of “bus” herein), refers to an interconnected architecture that is operably connected to transfer data between computer components within a singular system or multiple systems. The bus may be a memory bus, a memory controller, a peripheral bus, an external bus, a crossbar switch, and/or a local bus, among others. The bus may also be a bus that interconnects components inside an access control system using protocols, such as Controller Area network (CAN), Local Interconnect Network (LIN), Wiegand and Open Supervised Device Protocol (OSDP), among others.
  • Further, the connection between components of computer system 300, or any other type of connection between computer-related components described herein can be referred to as an operable connection, and can include a connection by which entities are operably connected, such that signals, physical communications, and/or logical communications can be sent and/or received. An operable connection can include a physical interface, a data interface and/or an electrical interface.
  • Computer system 300 can include a display interface 302 that forwards graphics, text, and other data from the communication infrastructure 306 (or from a frame buffer not shown) for display on a display unit 330 (e.g., to provide visual guidance to evacuates occupants of a building). Computer system 300 also includes one or more main memories 308, preferably random access memory (RAM), and can also include one or more secondary memories 310. As used herein, a memory, at least one memory, and/or one or more memories, individually or in combination, configured to store or having stored thereon instructions executable by one or more processors for performing a plurality of actions is meant to include at least two different memories able to store different, overlapping or non-overlapping subsets of the instructions for performing different, overlapping or non-overlapping subsets of the plurality actions, or a single memory able to store the instructions for performing all of the plurality of actions. In one non-limiting example of one or more memories, individually or in combination, being able to store different subsets of the instructions for performing different ones of the plurality of actions, a description of a memory, at least one memory, and/or one or more memories configured or operable to store or having stored thereon instructions for performing actions X, Y, and Z may include at least a first memory configured or operable to store or having stored thereon a first subset of instructions for performing a first subset of X, Y, and Z (e.g., instructions to perform X) and at least a second memory configured or operable to store or having stored thereon a second subset of instructions for performing a second subset of X, Y, and Z (e.g., instructions to perform Y and Z). Alternatively, a first memory, and second memory, and a third memory may be respectively configured to store or have stored thereon a respective one of a first subset of instructions for performing X, a second subset of instruction for performing Y, and a third subset of instructions for performing Z. It should be understood that any combination of one or more memories each may be configured or operable to store or have stored thereon any one or any combination of instructions executable by one or more processors to perform any one or any combination of a plurality of actions. Moreover, one or more processors may each be coupled to at least one of the one or more memories and configured or operable to execute the instructions to perform the plurality of actions. For instance, in the above non-limiting example of the different subset of instructions for performing actions X, Y, and Z, a first processor may be coupled to a first memory storing instructions for performing action X, and at least a second processor may be coupled to at least a second memory storing instructions for performing actions Y and Z, and the first processor and the second processor may, in combination, execute the respective subset of instructions to accomplish performing actions X, Y, and Z. Alternatively, three processors may access one of three different memories each storing one of instructions for performing X, Y, or Z, and the three processor may in combination execute the respective subset of instruction to accomplish performing actions X, Y, and Z. Alternatively, a single processor may execute the instructions stored on a single memory, or distributed across multiple memories, to accomplish performing actions X, Y, and Z.
  • The one or more secondary memories 310 can include, for example, a hard disk drive 312 and/or a removable storage drive 314, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. The removable storage drive 314 reads from and/or writes to a removable storage unit 318 in a well-known manner. Removable storage unit 318, represents a floppy disk, magnetic tape, optical disk, etc., which is read by and written to removable storage drive 314. As will be appreciated, the removable storage unit 318 includes a computer-usable storage medium having stored therein computer software and/or data.
  • In alternative aspects, the one or more secondary memories 310 can include other similar devices for allowing computer programs or other instructions to be loaded into computer system 300. Such devices can include, for example, a removable storage unit 322 and an interface 320. Examples of such can include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an erasable programmable read only memory (EPROM), or programmable read only memory (PROM)) and associated socket, and other removable storage units 322 and interfaces 320, which allow software and data to be transferred from the removable storage unit 322 to computer system 300.
  • It should be understood that a memory as used herein can include volatile memory and/or non-volatile memory. Non-volatile memory can include, for example, ROM (read only memory), PROM (programmable read only memory), EPROM (erasable PROM) and EEPROM (electrically erasable PROM). Volatile memory can include, for example, RAM (random access memory), synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), and/or direct RAM bus RAM (DRRAM).
  • Computer system 300 can also include a communications interface 324. Communications interface 324 allows software and data to be transferred between computer system 300 and external devices. Examples of communications interface 324 can include a modem, a network interface (such as an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc. Software and data transferred via communications interface 324 are in the form of signals 328, which can be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 324. These signals 328 are provided to communications interface 324 via a communications path (e.g., channel) 326. This path 326 carries signals 328 and can be implemented using wire or cable, fiber optics, a telephone line, a cellular link, a radio frequency (RF) link, and/or other communications channels. As used herein, the terms “computer program medium” and “computer-usable medium” are used to refer generally to media such as a removable storage drive 314, a hard disk installed in hard disk drive 312, and signals 328. These computer program products provide software to the computer system 300. Aspects of the disclosure are directed to such computer program products.
  • Computer programs (also referred to as computer control logic) are stored in the one or more main memories 308 and/or the one or more secondary memories 310. Computer programs can also be received via communications interface 324. Such computer programs, when executed, enable the computer system 300 to perform various features in accordance with aspects of the present disclosure, as discussed herein. In particular, the computer programs, when executed, enable the one or more processors 304, individually or in combination, to perform such features. Accordingly, such computer programs represent controllers of the computer system 300.
  • In variations where aspects of the disclosure are implemented using software, the software can be stored in a computer program product and loaded into computer system 300 using removable storage drive 314, hard disk drive 312, or communications interface 320. The control logic (software), when executed by the one or more processors 304, causes the one or more processors 304, individually or in combination, to perform the functions in accordance with aspects of the disclosure as described herein. In another variation, aspects are implemented primarily in hardware using, for example, hardware components, such as application specific integrated circuits (ASICs). Implementation of the hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant art(s).
  • In yet another example variation, aspects of the disclosure are implemented using a combination of both hardware and software.
  • The aspects of the disclosure discussed herein can also be described and implemented in the context of computer-readable storage medium storing computer-executable instructions. Computer-readable storage media includes computer storage media and communication media. For example, flash memory drives, digital versatile discs (DVDs), compact discs (CDs), floppy disks, and tape cassettes. Computer-readable storage media can include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, modules or other data.
  • It will be appreciated that various implementations of the above-disclosed and other features and functions, or alternatives or varieties thereof, can be desirably combined into many other different systems or applications. Also, that various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein can be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.

Claims (21)

What is claimed is:
1. A method for responding to a threat detected in a building, comprising:
acquiring sensor data from one or more sensor devices located within the building;
calculating, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building; and
sending a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
2. The method of claim 1, wherein the threat comprises a fire and wherein the threat mitigator comprises a Heating, Ventilation, and Air Conditioning (HVAC) system.
3. The method of claim 2, wherein the control instruction reduces, stops, or reverses an airflow into the building or into a zone in the building associated with the threat based on the occupancy information indicating an absence of the occupants in the zone.
4. The method of claim 1, further comprising directing a movement of an occupant of the building via the threat mitigator.
5. The method of claim 4, wherein directing the movement of the occupant of the building via the threat mitigator further comprises directing the occupant along an exit path away from a zone in the building associated with the threat, and wherein the control instruction reduces, stops, or reverses an airflow into the zone in the building based on the occupancy information indicating the occupant has moved out of the zone.
6. The method of claim 1, wherein the one or more sensor devices comprise: a video sensor, a light detection and ranging (LIDAR) sensor, an infrared sensor, a mobile device sensor, or a radio frequency identification (RFID) sensor.
7. The method of claim 5, wherein the threat mitigator comprises a display, a guiding lighting system, a mobile device notification, an audio announcement device, or an access control system.
8. The method of claim 7, further comprising sending instructions to the access control system to selectively lock and/or unlock one or more access points at one or more zones of the building based on the occupancy information.
9. The method of claim 1, wherein calculating the occupancy information comprises calculating one or more of: an occupant count, an occupant location, an occupant movement pattern, or an occupant mobility level.
10. The method of claim 4, further comprising calculating an exit path for the occupant of the building based on the occupancy information, a building plan, and a zone in the building associated with the threat and directing the movement of the occupant based on the exit path.
11. A system for responding to a threat detected in a building comprising:
one or more hardware processors, individually or in combination, configured to:
acquire sensor data from one or more sensor devices located within the building;
calculate, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building; and
send a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
12. The system of claim 11, wherein the threat comprises a fire and wherein the threat mitigator comprises a Heating, Ventilation, and Air Conditioning (HVAC) system.
13. The system of claim 12, wherein the control instruction reduces, stops, or reverses an airflow into the building or into a zone in the building associated with the threat based on the occupancy information indicating an absence of the occupants in the zone.
14. The system of claim 11, wherein the one or more hardware processors, individually or in combination, are further configured to direct a movement of an occupant of the building via the threat mitigator.
15. The system of claim 14, wherein the one or more hardware processors, individually or in combination, configured to direct the movement of the occupant of the building via the threat mitigator are further configured to direct the occupant along an exit path away from a zone in the building associated with the threat, and wherein the control instruction reduces or stops an airflow into the zone in the building based on the occupancy information indicating the occupant has moved out of the zone.
16. The system of claim 11, wherein the one or more sensor devices comprise: a video sensor, a light detection and ranging (LIDAR) sensor, an infrared sensor, a mobile device sensor, or a radio frequency identification (RFID) sensor.
17. The system of claim 15, wherein the threat mitigator comprises a display, a guiding lighting system, a mobile device notification, an audio announcement device, or an access control system.
18. The system of claim 17, wherein the one or more hardware processors, individually or in combination, are further configured to send instructions to the access control system to selectively lock and/or unlock one or more access points at one or more zones of the building based on the occupancy information.
19. The system of claim 11, wherein the one or more hardware processors, individually or in combination, configured to calculate the occupancy information are further configured to calculate one or more of: an occupant count, an occupant location, an occupant movement pattern, or an occupant mobility level.
20. The system of claim 11, wherein the one or more hardware processors, individually or in combination, are further configured to calculate an exit path for an occupant of the building based on the occupancy information, a building plan, and a zone in the building associated with the threat and configured to direct a movement of the occupant based on the exit path.
21. One or more non-transitory computer-readable media having instructions stored thereon that when executed by one or more processors cause the one or more processors, individually or in combination, to respond to a threat detected in a building by:
acquiring sensor data from one or more sensor devices located within the building;
calculating, based on the sensor data, occupancy information of occupants within the building, in response to detecting the threat in the building; and
sending a control instruction to a threat mitigator to reduce or eliminate the threat based on the occupancy information.
US18/528,218 2022-12-09 2023-12-04 Controlling fire suppression based on occupancy data Pending US20240191894A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/528,218 US20240191894A1 (en) 2022-12-09 2023-12-04 Controlling fire suppression based on occupancy data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263386782P 2022-12-09 2022-12-09
US18/528,218 US20240191894A1 (en) 2022-12-09 2023-12-04 Controlling fire suppression based on occupancy data

Publications (1)

Publication Number Publication Date
US20240191894A1 true US20240191894A1 (en) 2024-06-13

Family

ID=91381566

Family Applications (1)

Application Number Title Priority Date Filing Date
US18/528,218 Pending US20240191894A1 (en) 2022-12-09 2023-12-04 Controlling fire suppression based on occupancy data

Country Status (1)

Country Link
US (1) US20240191894A1 (en)

Similar Documents

Publication Publication Date Title
US20170100609A1 (en) Occupant evacuation control system
US7683793B2 (en) Time-dependent classification and signaling of evacuation route safety
CN102165500A (en) Fire protection device, method for protecting against fire, and computer program
US20120276517A1 (en) Model-based egress support system
KR102277968B1 (en) Early fire detection system, server and method using image processing and artificial intelligence based on deep learning
CN201832302U (en) System for evaluating building fire situation and indicating personnel evacuation
CN110925696A (en) BIM-based fire escape system and route calculation factor confirmation method
US8281901B2 (en) Elevator door emergency opening control system
KR102226183B1 (en) Monitoring system for building occupant density using cctv, and method for the same
AU2016345066A1 (en) A control system for optimising emergency multi-storey building stairwell evacuation
US11847898B2 (en) Adaptive fire detection
JPWO2008107952A1 (en) Elevator control device and control method
KR20200134651A (en) System and method for alarming indoor fire prevention
US20240191894A1 (en) Controlling fire suppression based on occupancy data
EP3163521A1 (en) Method and system of adaptive building layout/efficiency optimization
WO2009038557A1 (en) Model-based egress support system
KR20220151490A (en) Emergency evacuation control method
CN114694339A (en) Fire prevention and control method and system for rail transit
JP6868436B2 (en) Air conditioning controller
CN109779445B (en) Fire door control method and device, computer equipment and storage medium
KR102200410B1 (en) Method, apparatus and computer-readable recording medium for composition of evacuation scenarios in the event of fire in high-rise buildings
JP2019212020A (en) Evacuation guide server, evacuation guide system and evacuation guide method
KR20210073102A (en) Disaster management system using two-dimensional floor plans
KR102461776B1 (en) Smart fire monitoring system using intelligent cctv and smoke control system
KR102300101B1 (en) Apparatus and system for fire detection and ventilation of road tunnels

Legal Events

Date Code Title Description
AS Assignment

Owner name: JOHNSON CONTROLS TYCO IP HOLDINGS LLP, WISCONSIN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FEE, PAUL;OUELLETTE, JASON M.;MCBRIDE, FREDERICK MICHAEL;SIGNING DATES FROM 20221205 TO 20221206;REEL/FRAME:065868/0681

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION