US 12,271,851 B2
Computer-based risk analysis and mitigation
Fang Lu, Billerica, MA (US); Jeremy R. Fox, Georgetown, TX (US); Tushar Agrawal, West Fargo, ND (US); and Sarbajit K. Rakshit, Kolkata (IN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Jun. 7, 2022, as Appl. No. 17/805,703.
Prior Publication US 2023/0394410 A1, Dec. 7, 2023
Int. Cl. G06Q 10/0635 (2023.01); G06N 5/022 (2023.01); G06Q 10/0639 (2023.01)
CPC G06Q 10/0635 (2013.01) [G06N 5/022 (2013.01); G06Q 10/0639 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for risk assessment and management within a predetermined area, the computer-implemented method comprising:
monitoring the predetermined area, wherein monitoring comprises:
collecting, by one or more sensing devices, data related to environmental conditions and spatial relationships between one or more objects in the predetermined area; and
retrieving a preestablished object list from one or more databases or one or more data repositories;
determining, based on a model, the preestablished object list and the monitoring, that an accidental event is likely to occur within a predetermined distance or within the predetermined area, wherein determining that an accidental event is likely to occur comprises:
executing, by one or more processors, a computer risk-based analysis to identify potential threats;
estimating a degree of potential energy of objects from the preestablished object list based on the risk based analysis and predetermined data received from a database;
identifying a required time of exposure to the identified potential threats required to release the degree of potential energy and a degree of impact from the exposure to the identified potential threats based on the risk based analysis and predetermined data received from a knowledge corpus;
identifying, by the one or more processors, a predetermined mitigation action from the knowledge corpus to apply to the accidental event and the objects from the preestablished object list based on the risk based analysis based on the identified potential threats and the identified degree of potential energy of the objects; and
proactively implementing the identified predetermined mitigation action to prevent or manage the accidental event, wherein the proactive implementation comprises:
initiating, by the one or more processors, a robotic system and computer-based control settings; and
utilizing the robotic arm to isolate the objects from the preestablished object list from the predetermined area to prevent the identified potential threats, wherein isolating the objects comprises:
utilizing the robotic arm to load the objects onto an automated guided vehicle; and
utilizing the automated guided vehicle to transport the objects to a predetermined location that is a predetermined distance from the identified potential threats.