CPC G16H 40/40 (2018.01) [A61B 5/0002 (2013.01); A61B 5/7221 (2013.01); A61B 5/7267 (2013.01); A61B 5/746 (2013.01); G06F 11/3072 (2013.01); G06F 11/327 (2013.01); G06Q 10/063 (2013.01); G06Q 10/105 (2013.01); G08B 7/06 (2013.01); G08B 29/02 (2013.01); G16H 10/60 (2018.01); G16H 15/00 (2018.01); G16H 40/20 (2018.01); G16H 40/63 (2018.01); G16H 40/67 (2018.01)] | 27 Claims |
1. A computer-implemented method, executed on a computing device, comprising:
monitoring a bedside monitoring device to detect an occurrence of alarms, thus defining detected alarms;
processing the detected alarms to determine their authenticity, including:
defining volume information for the detected alarms, including comparing signal measures of the bedside monitoring device relative to one or more monitoring criteria over a first time span to signal measures of the bedside monitoring device relative to the one or more monitoring criteria over a second time span, the second time span being longer than the first time span, and
utilizing the volume information to determine the authenticity of the detected alarms; and
if a detected alarm is determined to be non-authentic, adjusting the one or more monitoring criteria that was instrumental in producing the non-authentic detected alarm.
|