System, method, and recording medium for power tool accident prevention

ABSTRACT

A power tool accident prevention method, system, and non-transitory computer readable medium receiving images from a static camera of a setup or operation of a power tool, include a danger identification circuit configured to: analyze the images to identify inherent dangers in the setup or the operation of the power tool, and identify at least one potential cause of an accident based on the identified inherent dangers, and a power tool disabling circuit configured to activate an emergency safety measure of the power tool to avoid the at least one potential cause of the accident.

BACKGROUND

The present invention relates generally to a power tool accidentprevention system, and more particularly, but not by way of limitation,to a system for preventing power tool accidents based on inputs receivedfrom any one or more of a static camera, a wearable camera, and usercognitive data from wearables.

There has been an increasing number of power tool accidents, themajority of which being caused by ineptitude, distraction, tiredness,fatigue, and haste. That is, accidents due to a failure of a power toolare rare and instead the accidents are generally caused by an incorrectuse of the tool, an incorrect setup, a failure to wear protective gear,a failure of wearing the correct attire, a failure to follow safetyprecautions, failure to properly operate the equipment in a rested,alert state, etc.

Conventional safety techniques for power tools have considered detectingflesh within a proximity of a rotating blade and thereby stopping thepower tool when the flesh is detected.

However, there is a technical problem in the conventional techniques inthat the conventional techniques do not consider preventing accidentswith power tools prior to the accident nearly occurring (i.e., nearcontact with flesh) or having occurred.

SUMMARY

In view of the technical problem in the art, the inventors haveconsidered the technical solution to the technical problem by combiningat least one of visual information obtained from a static camera andwearable cameras, and measurements of the user's cognitive state (e.g.,using wearables), to provide an assessment of the risk of injuries dueto power tools and thereby taking action to prevent an accident by, forexample, cutting power to the tool, providing alerts to the user,providing a visualization of the hazard if the user's face protectivedevice has head-mounted display capability, or the user is wearing ahead mounted display, etc.

In an exemplary embodiment, the present invention can provide a powertool accident prevention system receiving images from a static camera ofa setup or operation of a power tool, the system including a dangeridentification circuit configured to: analyze the images to identifyinherent dangers in the setup or the operation of the power tool, andidentify at least one potential cause of an accident based on theidentified inherent dangers, and a power tool disabling circuitconfigured to activate an emergency safety measure of the power tool toavoid the at least one potential cause of the accident.

Further, in another exemplary embodiment, the present invention canprovide a power tool accident prevention method, including receivingimages from a static camera of a setup or operation of a power tool,analyzing the images to identify inherent dangers in the setup or theoperation of the power tool, identifying at least one potential cause ofan accident based on the identified inherent danger, and activating anemergency safety measure of the power tool to avoid the at least onepotential cause of the accident.

Even further, in another exemplary embodiment, the present invention canprovide a non-transitory computer-readable recording medium recording apower tool accident prevention program, the program causing a computerto perform: receiving images from a static camera of a setup oroperation of a power tool, analyzing the images to identify inherentdangers in the setup or the operation of the power tool, identifying atleast one potential cause of an accident based on the identifiedinherent danger, and activating an emergency safety measure of the powertool to avoid the at least one potential cause of the accident.

There has thus been outlined, rather broadly, an embodiment of theinvention in order that the detailed description thereof herein may bebetter understood, and in order that the present contribution to the artmay be better appreciated. There are, of course, additional exemplaryembodiments of the invention that will be described below and which willform the subject matter of the claims appended hereto.

It is to be understood that the invention is not limited in itsapplication to the details of construction and to the arrangements ofthe components set forth in the following description or illustrated inthe drawings. The invention is capable of embodiments in addition tothose described and of being practiced and carried out in various ways.Also, it is to be understood that the phraseology and terminologyemployed herein, as well as the abstract, are for the purpose ofdescription and should not be regarded as limiting.

As such, those skilled in the art will appreciate that the conceptionupon which this disclosure is based may readily be utilized as a basisfor the designing of other structures, methods and systems for carryingout the several purposes of the present invention. It is important,therefore, that the claims be regarded as including such equivalentconstructions insofar as they do not depart from the spirit and scope ofthe present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The exemplary aspects of the invention will be better understood fromthe following detailed description of the exemplary embodiments of theinvention with reference to the drawings.

FIG. 1 exemplarily shows a block diagram illustrating a configuration ofa power tool accident prevention system 100.

FIG. 2 exemplarily shows a high level flow chart for a power toolaccident prevention method 200.

FIG. 3 depicts a cloud computing node 10 according to an exemplaryembodiment of the present invention.

FIG. 4 depicts a cloud computing environment 50 according to anotherexemplary embodiment of the present invention.

FIG. 5 depicts abstraction model layers according to an exemplaryembodiment of the present invention.

DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

The invention will now be described with reference to FIGS. 1-5, inwhich like reference numerals refer to like parts throughout. It isemphasized that, according to common practice, the various features ofthe drawing are not necessarily to scale. On the contrary, thedimensions of the various features can be arbitrarily expanded orreduced for clarity. Exemplary embodiments are provided below forillustration purposes and do not limit the claims.

With reference now to FIG. 1, the power tool accident prevention system100 includes a danger identification circuit 101, a cognitive stateidentification circuit 102, a user notifying circuit 103, and a powertool disabling circuit 104. The power tool accident prevention system100 includes a processor 180 and a memory 190, with the memory 190storing instructions to cause the processor 180 to execute each circuitof power tool accident prevention system 100. The processor and memorymay be physical hardware components, or a combination of hardware andsoftware components.

Although the power tool accident prevention system 100 includes variouscircuits, it should be noted that a power tool accident preventionsystem can include modules in which the memory 190 stores instructionsto cause the processor 180 to execute each module of power tool accidentprevention system 100.

Also, each circuit can be a stand-alone device, unit, module, etc. thatcan be interconnected to cooperatively produce a transformation to aresult.

With the use of these various circuits, the power tool accidentprevention system 100 may act in a more sophisticated and usefulfashion, and in a cognitive manner while giving the impression of mentalabilities and processes related to knowledge, attention, memory,judgment and evaluation, reasoning, and advanced computation. That is, asystem is said to be “cognitive” if it possesses macro-scaleproperties—perception, goal-oriented behavior, learning/memory andaction—that characterize systems (i.e., humans) that all agree arecognitive.

Cognitive states are defined as functions of measures of a user's totalbehavior collected over some period of time from at least one personalinformation collector (e.g., including musculoskeletal gestures, speechgestures, eye movements, internal physiological changes, measured byimaging circuits, microphones, physiological and kinematic sensors in ahigh dimensional measurement space, etc.) within a lower dimensionalfeature space. In one exemplary embodiment, certain feature extractiontechniques are used for identifying certain cognitive and emotionaltraits. Specifically, the reduction of a set of behavioral measures oversome period of time to a set of feature nodes and vectors, correspondingto the behavioral measures' representations in the lower dimensionalfeature space, is used to identify the emergence of a certain cognitivestate(s) over that period of time. One or more exemplary embodiments usecertain feature extraction techniques for identifying certain cognitivestates. The relationship of one feature node to other similar nodesthrough edges in a graph corresponds to the temporal order oftransitions from one set of measures and the feature nodes and vectorsto another. Some connected subgraphs of the feature nodes are hereinalso defined as a “cognitive state”. The present application alsodescribes the analysis, categorization, and identification of thesecognitive states further feature analysis of subgraphs, includingdimensionality reduction of the subgraphs, for example graphicalanalysis, which extracts topological features and categorizes theresultant subgraph and its associated feature nodes and edges within asubgraph feature space.

Although as shown in FIGS. 3-5 and as described later, the computersystem/server 12 is exemplarily shown in cloud computing node 10 as ageneral-purpose computing circuit which may execute in a layer the powertool accident prevention system 100 (FIG. 5), it is noted that thepresent invention can be implemented outside of the cloud environment.

Referring to FIG. 1, the power tool accident prevention system 100receives images (video) from a static camera 120 or a camera mounted ona wearable (wearable camera 130 that the user has (e.g., wearableglasses) monitoring the use of the power tool by a user. The staticcamera 120 can be any type of camera (e.g., video camera) capable ofcapturing images or a plurality of cameras disposed at differentpositions in a room to map together an image. The wearable camera 130including the camera can be any type of wearable capable of capturingvideo and transmitting video.

Further, the power tool accident prevention system 100 receivescognitive state data from wearables 140. Cognitive state data monitoredby the wearables 140 can include, for example, heart rate, emotion,distraction, eye gaze, indications of impaired judgment, stress, or thelike. That is, the cognitive state data monitored by the wearables 140includes data about the cognitive state of the user that is notdetectable from an image captured by the static camera 120 and thewearable camera 130.

The danger identification circuit 101 identifies potential causes of anaccident using images (video) captured by the static camera 120 and/orthe wearable camera 130 using image (e.g., video) analysis technology.The danger identification circuit 101 identifies the potential causes ofan accident by analyzing for inherent dangers in the setup or theoperation of the power tool 150.

The danger identification circuit 101 can identify inherent dangers in asetup when using the power tool like, for example, if the safety deviceson the tool are correctly in place, if the user is using safety devicessuch as push sticks, push pads, etc. when appropriate, if the user iswearing the appropriate protective gear such as eye gear, gloves,protective aprons when appropriate, face masks when appropriate, hearprotection always, dust mask, etc., if the user is wearing unsafeclothing (e.g., loosely fitting clothing, neckties, long-sleeved garbs,clothing with draw strings, gloves when not appropriate, jewelry,watches, rings, etc.), if the workpiece has been safely set up beforeoperating the tool, if the user is using a correct posture, if the useris in the correct place with respect to the tool and the workpiece(e.g., not directly behind a planer, and not in the kickback path whenusing a table saw, if there is clutter/debris/other tools that could bein the way, that could be ignited by hot tools, that could be caught bythe power tool, if the illumination of the work area is appropriate, ifthe power tool is off before the user plugs it in, or the like.

Also, the danger identification circuit 101 can identify if the user ismaking a mistake while using the tool by analyzing the image (e.g.,video) to determine, for example, if the user is overreaching oroverbalancing, if the workpiece is shifting or clamps become loose, theuser has a body part in the path of the tool, a power chord becomestangled while operating the tool or is moved in the path of the tool,etc.

That is, the danger identification circuit 101 analyzes the imagescaptured by the static camera 120 and the wearable camera 130 toidentify a mistake while using or inherent dangers in the setup of thepower tool 150 (e.g., “a danger”) and thereby an accident is likely tooccur when using the power tool 150.

The cognitive state identification circuit 102 receives cognitive statedata of the user of the power tool 150 via the wearables 140 anddetects, for example, if the user is tired, if the user is distracted(e.g., by other people, by some external influence, or the like), if theuser is under the influence of alcohol or other substance that mightimpair judgment (e.g., pain medications), etc. In other words, thecognitive state identification circuit 102 detects a “cognitive danger”of the user that would likely cause an accident should the power tool150 be operated while the user is under the “cognitive danger” state.

Based on the danger identified by the danger identification circuit 101and the cognitive danger identified by the cognitive stateidentification circuit 102, the user notifying circuit 103 sends anotification 160 to the user alerting the user of the dangerouscondition (i.e., the likely accident as a result of the danger or thecognitive danger). Further, the notification also could be sent to athird party with some control or association with the user (e.g., theuser's supervisor, spouse, etc.) for their intervention or action.

That is, the user notifying circuit 103 notifies the user (andoptionally a third part) of a possibly dangerous condition by, forexample, flashing an intermittent red or orange light, or byhighlighting with a light emitting device at the area where the hazardis concentrated (i.e., the static camera 120 or the wearable camera 130can include a light emitting device to emit light onto the work space toalert the user of the danger), by a sound, which could be incorporatedin the ear protection device if the user is using one, by a vibrationthat can be delivered through the wearable camera 130 or the wearables140, by a visualization such as if the user eye protection hashead-mounted display capabilities by showing overlays on the area wherethe danger is concentrated or by emitting an image on the wearables 140.

In other words, when either one of the danger identification circuit 101or the cognitive state identification circuit 102 identifies the dangeror cognitive danger, respectively, the user notifying circuit 103 canissue a notification 160 to the user (and optionally the third party)such that the user can fix the issue causing the danger (and/orcognitive danger), stop using the power tool 150, make an adjustment,etc.

Based on the danger identified by the danger identification circuit 101and the cognitive danger identified by the cognitive stateidentification circuit 102, the power tool disabling circuit 104 canremotely activate emergency safety measure on the power tool 150. Forexample, the power tool 150 can be equipped with a technology forallowing the power tool to receive a signal from the power tool accidentprevention system such that the power tool 150 is enabled to receive anemergency signal from an external source. Thereby, the power tooldisabling circuit 104 can activate an emergency safety measure on thepower 150 such as, dropping a safety clip over a saw blade, causing anail gun to not load a nail into the hammer, or the like.

Alternatively, the power tool disabling circuit 104 can cut power (e.g.,turn off the power tool 150) to the power tool 150 if it is safe to doso according to manufacturer's instructions based on the danger(cognitive danger) being detected. For example, the power tool 150 canbe equipped with an adapter with a remotely operated emergency switchthat can be wirelessly triggered by the power tool disabling circuit 104to cut power to the power tool 150. Or, since many power tools 150 havebrakes that quickly stop the action as soon as the power is cut, theseunits can be adapted to include the power cut off feature.

Further, the power tool disabling circuit 104 can be triggered based onthe user not obeying the notification 160 sent by the user notifyingcircuit 103. For example, if the user notifying circuit 103 notifies theuser of a danger and the user does not change the situation to mitigatethe danger, the power tool disabling circuit 104 can cut the power apredetermined amount of time after the user has not obeyed thenotification 160. Also, a notification could be sent to a third partyregarding the users disregard of the danger.

The predetermined amount of time to cut the power by the power tooldisabling circuit 104 can be based on the type of danger (cognitivedanger) identified by the danger identification circuit 101 or thecognitive state identification circuit 102. For example, if the dangerdetected is the user's thumb in the way of a saw path, the power tooldisabling circuit 104 can be set up to cut the power within a second ofthe user being notified. Or, if the cognitive danger detected is theuser being tired but the user is not currently using the power tool 150(i.e., the user is still setting up the work space while the power toolis powered on), the power tool disabling circuit can wait a longerperiod of time to cut off the power.

In other words, the power tool disabling circuit 104 can be set up todisable power to the power tool 150 at the predetermined time after theuser has been notified by the user notifying circuit 103 based on anassessment of a risk that the identified danger (cognitive danger)creates and the immediacy of the risk.

FIG. 2 shows a high level flow chart for a method 200 of power toolaccident prevention.

Step 201 identifies potential causes of an accident using images (video)captured by the static camera 120 and/or the wearable camera 130 usingimage (video) analysis technology. That is, Step 201 identifies thepotential causes of an accident by analyzing for inherent dangers in thesetup or the operation of the power tool 150.

Step 202 receives cognitive state data of the user of the power tool 150via the wearables 140 and detects, for example, if the user is tired, ifthe user is distracted (e.g., by other people, by some externalinfluence, or the like), if the user is under the influence of alcoholor other substance that might impair judgment (e.g., pain medications),etc. In other words, the Step 202 detects a “cognitive danger” of theuser that would likely cause an accident should the power tool 150 beoperated while the user is under the “cognitive danger” state.

Based on the danger identified by Step 201 and the cognitive dangeridentified by Step 202, Step 203 sends a notification 160 to the useralerting the user of the dangerous condition (i.e., the likely accidentas a result of the danger or the cognitive danger).

Based on the danger identified by Step 201 and the cognitive dangeridentified by Step 202, Step 204 remotely activates emergency safetymeasure on the power tool 150 or turns off the power (i.e., disables thepower tool 150).

Exemplary Hardware Aspects, Using a Cloud Computing Environment

It is understood in advance that although this disclosure includes adetailed description on cloud computing, implementation of the teachingsrecited herein are not limited to a cloud computing environment. Rather,embodiments of the present invention are capable of being implemented inconjunction with any other type of computing environment now known orlater developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Service Models are as follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client circuits through athin client interface such as a web browser (e.g., web-based e-mail) Theconsumer does not manage or control the underlying cloud infrastructureincluding network, servers, operating systems, storage, or evenindividual application capabilities, with the possible exception oflimited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

Referring now to FIG. 3, a schematic of an example of a cloud computingnode is shown. Cloud computing node 10 is only one example of a suitablecloud computing node and is not intended to suggest any limitation as tothe scope of use or functionality of embodiments of the inventiondescribed herein. Regardless, cloud computing node 10 is capable ofbeing implemented and/or performing any of the functionality set forthhereinabove.

In cloud computing node 10, there is a computer system/server 12, whichis operational with numerous other general purpose or special purposecomputing system environments or configurations. Examples of well-knowncomputing systems, environments, and/or configurations that may besuitable for use with computer system/server 12 include, but are notlimited to, personal computer systems, server computer systems, thinclients, thick clients, hand-held or laptop circuits, multiprocessorsystems, microprocessor-based systems, set top boxes, programmableconsumer electronics, network PCs, minicomputer systems, mainframecomputer systems, and distributed cloud computing environments thatinclude any of the above systems or circuits, and the like.

Computer system/server 12 may be described in the general context ofcomputer system-executable instructions, such as program modules, beingexecuted by a computer system. Generally, program modules may includeroutines, programs, objects, components, logic, data structures, and soon that perform particular tasks or implement particular abstract datatypes. Computer system/server 12 may be practiced in distributed cloudcomputing environments where tasks are performed by remote processingcircuits that are linked through a communications network. In adistributed cloud computing environment, program modules may be locatedin both local and remote computer system storage media including memorystorage circuits.

As shown in FIG. 3, computer system/server 12 in cloud computing node 10is shown in the form of a general-purpose computing circuit. Thecomponents of computer system/server 12 may include, but are not limitedto, one or more processors or processing units 16, a system memory 28,and a bus 18 that couples various system components including systemmemory 28 to processor 16.

Bus 18 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. By way of example, and not limitation,such architectures include Industry Standard Architecture (ISA) bus,Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, VideoElectronics Standards Association (VESA) local bus, and PeripheralComponent Interconnects (PCI) bus.

Computer system/server 12 typically includes a variety of computersystem readable media. Such media may be any available media that isaccessible by computer system/server 12, and it includes both volatileand non-volatile media, removable and non-removable media.

System memory 28 can include computer system readable media in the formof volatile memory, such as random access memory (RAM) 30 and/or cachememory 32. Computer system/server 12 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 34 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, DVD-ROM or other optical media can be provided.In such instances, each can be connected to bus 18 by one or more datamedia interfaces. As will be further depicted and described below,memory 28 may include at least one program product having a set (e.g.,at least one) of program modules that are configured to carry out thefunctions of embodiments of the invention.

Program/utility 40, having a set (at least one) of program modules 42,may be stored in memory 28 by way of example, and not limitation, aswell as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, may include an implementation of a networkingenvironment. Program modules 42 generally carry out the functions and/ormethodologies of embodiments of the invention as described herein.

Computer system/server 12 may also communicate with one or more externalcircuits 14 such as a keyboard, a pointing circuit, a display 24, etc.;one or more circuits that enable a user to interact with computersystem/server 12; and/or any circuits (e.g., network card, modem, etc.)that enable computer system/server 12 to communicate with one or moreother computing circuits. Such communication can occur via Input/Output(I/O) interfaces 22. Still yet, computer system/server 12 cancommunicate with one or more networks such as a local area network(LAN), a general wide area network (WAN), and/or a public network (e.g.,the Internet) via network adapter 20. As depicted, network adapter 20communicates with the other components of computer system/server 12 viabus 18. It should be understood that although not shown, other hardwareand/or software components could be used in conjunction with computersystem/server 12. Examples, include, but are not limited to: microcode,circuit drivers, redundant processing units, external disk drive arrays,RAID systems, tape drives, and data archival storage systems, etc.

Referring now to FIG. 4, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 comprises one or morecloud computing nodes 10 with which local computing circuits used bycloud consumers, such as, for example, personal digital assistant (PDA)or cellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. Nodes 10 maycommunicate with one another. They may be grouped (not shown) physicallyor virtually, in one or more networks, such as Private, Community,Public, or Hybrid clouds as described hereinabove, or a combinationthereof. This allows cloud computing environment 50 to offerinfrastructure, platforms and/or software as services for which a cloudconsumer does not need to maintain resources on a local computingcircuit. It is understood that the types of computing circuits 54A-Nshown in FIG. 4 are intended to be illustrative only and that computingnodes 10 and cloud computing environment 50 can communicate with anytype of computerized circuit over any type of network and/or networkaddressable connection (e.g., using a web browser).

Referring now to FIG. 5, a set of functional abstraction layers providedby cloud computing environment 50 (FIG. 4) is shown. It should beunderstood in advance that the components, layers, and functions shownin FIG. 5 are intended to be illustrative only and embodiments of theinvention are not limited thereto. As depicted, the following layers andcorresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include: mainframes 61; RISC(Reduced Instruction Set Computer) architecture based servers 62;servers 63; blade servers 64; storage circuits 65; and networks andnetworking components 66. In some embodiments, software componentsinclude network application server software 67 and database software 68.

Virtualization layer 70 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers71; virtual storage 72; virtual networks 73, including virtual privatenetworks; virtual applications and operating systems 74; and virtualclients 75.

In one example, management layer 80 may provide the functions describedbelow. Resource provisioning 81 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 82provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 83 provides access to the cloud computing environment forconsumers and system administrators. Service level management 84provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 85 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 90 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 91; software development and lifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; and, more particularly relative to thepresent invention, the power tool accident prevention system 100described herein.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

Further, Applicant's intent is to encompass the equivalents of all claimelements, and no amendment to any claim of the present applicationshould be construed as a disclaimer of any interest in or right to anequivalent of any element or feature of the amended claim.

What is claimed is:
 1. A power tool accident prevention system receivingimages from a static camera of a setup or operation of a power tool, thesystem comprising: a danger identification circuit configured to:analyze the images to identify inherent dangers in the setup or theoperation of the power tool; and identify at least one potential causeof an accident based on the identified inherent dangers; and a powertool disabling circuit configured to activate an emergency safetymeasure of the power tool to avoid the at least one potential cause ofthe accident.
 2. The system of claim 1, wherein the dangeridentification circuit further analyzes at least one image captured by awearable camera to identify the inherent dangers in the setup or theoperation of the power tool.
 3. The system of claim 1, furthercomprising a user notifying circuit configured to send a notification tothe user alerting a user of the at least one potential cause of theaccident of the accident.
 4. The system of claim 1, wherein the at leastone potential cause of the accident includes a lack of use of a safetydevice by the user, and wherein the at least one potential cause of theaccident includes an improper use of a safety device by the user.
 5. Thesystem of claim 1, wherein the at least one potential cause of theaccident includes identifying, via the image, a hazard in a work areasetup.
 6. The system of claim 5, wherein the hazard includes clutter dueto any one of: debris; a work piece; a power cord; and a work tool. 7.The system of claim 1, wherein the at least one potential cause of theaccident includes a mistake while using the power tool or an inherentdanger in the setup or operation for using the power tool.
 8. The systemof claim 1, wherein the at least one potential cause of the accidentincludes an improper setup for using the power tool.
 9. The system ofclaim 1, wherein the at least one potential cause of the accidentincludes a part of the user being in an operational path of the powertool.
 10. The system of claim 1, wherein the at least one potentialcause of the accident includes a work piece being improperly placed orimproperly secured for operation by the power tool.
 11. The system ofclaim 1, further comprising a cognitive state identification circuitconfigured to identify a cognitive danger as the potential cause of theaccident for the user using the power tool based on cognitive state datareceived from a wearable.
 12. The system of claim 11, wherein thecognitive danger includes the user being tired.
 13. The system of claim11, wherein the cognitive danger includes a distraction level of theuser.
 14. The system of claim 11, wherein the cognitive danger includesa measurement to determine if the user is under an influence of asubstance.
 15. The system of claim 3, wherein the notification includesat least one of: a sound alert; a light emitted in a work space visibleto the user; a visual cue to the user; and an alert image displayed on ascreen of a wearable.
 16. The system of claim 1, wherein the emergencysafety measure includes activating a kill switch to turn off the powertool.
 17. The system of claim 3, wherein the power tool disablingcircuit activates the emergency safety measure at a predetermined timeafter the user notifying circuit sends the notification to the user. 18.The system of claim 3, wherein the power tool disabling circuitactivates the emergency safety measure at a predetermined time after auser has ignored the notification sent by the user notifying circuit,and wherein the predetermined time is set based on an immediacy of theaccident if the user continues to ignore the notification.
 19. A powertool accident prevention method, comprising: receiving images from astatic camera of a setup or operation of a power tool; analyzing theimages to identify inherent dangers in the setup or the operation of thepower tool; identifying at least one potential cause of an accidentbased on the identified inherent danger; and activating an emergencysafety measure of the power tool to avoid the at least one potentialcause of the accident.
 20. A non-transitory computer-readable recordingmedium recording a power tool accident prevention program, the programcausing a computer to perform: receiving images from a static camera ofa setup or operation of a power tool; analyzing the images to identifyinherent dangers in the setup or the operation of the power tool;identifying at least one potential cause of an accident based on theidentified inherent danger; and activating an emergency safety measureof the power tool to avoid the at least one potential cause of theaccident.