CN104573971A - Metal mine underground safety digital management system based on radio frequency and WIFI technology - Google Patents
Metal mine underground safety digital management system based on radio frequency and WIFI technology Download PDFInfo
- Publication number
- CN104573971A CN104573971A CN201510032058.9A CN201510032058A CN104573971A CN 104573971 A CN104573971 A CN 104573971A CN 201510032058 A CN201510032058 A CN 201510032058A CN 104573971 A CN104573971 A CN 104573971A
- Authority
- CN
- China
- Prior art keywords
- rectification
- hidden danger
- hidden
- safety
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 16
- 239000002184 metal Substances 0.000 title claims abstract description 9
- 229910052751 metal Inorganic materials 0.000 title claims abstract description 9
- 238000000034 method Methods 0.000 claims abstract description 64
- 230000008569 process Effects 0.000 claims abstract description 56
- 238000012790 confirmation Methods 0.000 claims abstract description 26
- 238000007726 management method Methods 0.000 claims abstract description 23
- 238000012544 monitoring process Methods 0.000 claims abstract description 15
- 238000004364 calculation method Methods 0.000 claims abstract description 3
- 238000012795 verification Methods 0.000 claims description 77
- 230000000875 corresponding effect Effects 0.000 claims description 30
- 238000011835 investigation Methods 0.000 claims description 16
- 238000007689 inspection Methods 0.000 claims description 15
- 238000012423 maintenance Methods 0.000 claims description 10
- 238000012552 review Methods 0.000 claims description 7
- 238000012546 transfer Methods 0.000 claims description 7
- 238000009472 formulation Methods 0.000 claims description 6
- 239000000203 mixture Substances 0.000 claims description 6
- 230000033228 biological regulation Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000002596 correlated effect Effects 0.000 claims description 4
- 230000015572 biosynthetic process Effects 0.000 claims description 3
- 238000013024 troubleshooting Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 4
- 238000012549 training Methods 0.000 description 3
- 229940123361 Quorum sensing inhibitor Drugs 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 206010000372 Accident at work Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 150000002739 metals Chemical class 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/02—Agriculture; Fishing; Forestry; Mining
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Life Sciences & Earth Sciences (AREA)
- Primary Health Care (AREA)
- Animal Husbandry (AREA)
- General Health & Medical Sciences (AREA)
- Mining & Mineral Resources (AREA)
- Marine Sciences & Fisheries (AREA)
- Agronomy & Crop Science (AREA)
- Development Economics (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides a metal mine underground safety digital management system based on radio frequency and WIFI technology. The system involves a safety confirmation process and a hidden danger identification process, wherein the safety confirmation process includes a safety confirmation procedure, safety confirmation schedule and completion rate monitoring, rectification incompletion rate calculation, confirmation slip comprehensive monitoring and working plane team appointing situation displaying; the hidden danger identification process involves a hidden danger identification procedure and hidden danger situation monitoring.
Description
Technical field
The present invention relates to computer, radio frequency and WiFi technology to confirm safely mining production and a kind of management system of hidden troubles removing.
Background technology
Realizing the intellectuality of metal mine production safety management, informationization, integration, scientific, is the emphasis of mine safety development.Part metals mine has employed underground safety monitoring equipment and underground communication equipment, but this kind equipment can only detect the index with quantitative parameter, for the potential safety hazard needing artificial investigation, does not still have systematic digital management system.
Radio-frequency technique utilizes the radio wave energy of scanner transmitted characteristic frequency to receiver, and drive acceptor circuit to be sent by the code of inside, scanner receives a kind of technology of code.Electronic tag is with the label of spreadsheet format storaging mark object code, is also radio-frequency card.Radio RF recognition technology (Radio Frequency Identification, RFID) be a kind of non-contacting automatic identification technology, its ultimate principle is the transport property utilizing radiofrequency signal and Space Coupling (inductance or electromagnetic coupled) or radar reflection, realizes the automatic identification to being identified object.Rfid system at least comprises electronic tag and reader two parts, and RFID reader (read write line) carries out radio communication by antenna and RFID, can realize the reading to tag recognition code and internal storage data or write operation.
WiFi refers generally to Wi-Fi, and be the technology that the terminals such as PC, handheld terminal (as pad, mobile phone) can wirelessly be connected to each other by one, in fact it is a kind of high frequency radio signal.
Wireless network refers to " Wireless Fidelity " at the category of WLAN (wireless local area network), is in fact a kind of commercial verification, and be also a kind of Wireless networking technologies, connected computer by netting twine in the past, Wireless Fidelity is then networked by radiowave simultaneously; Common is exactly a wireless router, the effective range so covered at the electric wave of this wireless router can adopt Wireless Fidelity connected mode to network, if wireless router is connected to an adsl line or other online circuit, be then otherwise known as focus.
Summary of the invention
The present invention is intended to invent a kind of metal mine downhole safety digital management system based on radio frequency and WiFi technology, technical matters to be solved is, set up the workbench and the information transfer system that relate to Mine Safety in Production, downhole safety situation is reported by the timely specification of handheld terminal, to play the effect of accident early warning and information sharing, and realize the result queries of safety verification and hidden troubles removing.
Technical scheme of the present invention is as follows:
Based on the metal mine downhole safety digital management system of radio frequency and WiFi technology, it is characterized in that this system comprises safety verification process and hidden troubles removing process; Wherein safety verification process comprises the monitoring of safety verification flow process, safety verification progress and completion rate, rectifies and improves that non-completion rate calculates, confirmation form overall monitor and the scope of operation sends class's situation to show; Hidden troubles removing process comprises hidden troubles removing flow process and the monitoring of hidden danger situation;
One, safety verification process
(1), safety verification flow process
The first step, safety verification standard configuration: set up safety standard database, typing needs the entry checked, this entry comprises the content the need of check, and the safety standard of respective entries;
Second step, operation safety verification standard care: when safeguarding, is first maintained into formation process information bank in system operation title, and from safety standard database, then select the safety verification standard that this operation is corresponding, each operation is enabled, forbidden two states;
3rd step, the scope of operation is safeguarded: for the scope of operation newly opened, and by comprising scope of operation title, affiliated operation field positional information, radio-frequency card be coded in interior maintenance of information in scope of operation information bank; Scope of operation information bank also comprises the scope of operation title of the scope of operation in hot work in progress, affiliated operation field positional information and radio-frequency card coded message;
4th step, safety verification process flow:
1, safety verification list is assigned: after the concrete scope of operation of selection and concrete operation, and server is enumerated out by needing the project checked, downloads to handheld terminal for security official there being WIFI signal place;
2, safe task list accepts and makes a report on: security official enters safety verification region, and to regulation radio-frequency (RF) tag place reading operation face positional information and register, fill in the security situation of detected operation with handheld terminal collection simultaneously, to be confirmed whether the standard meeting the setting of safety standard database, standard according to the setting of safety standard database judges, the content if needed rectified and improved then selects the rectification personnel name of this content, permission operation is then filled in as do not needed the content rectified and improved, security official also obtains photo site or video information, the photo site or video information that judge conclusion and acquisition are sent to server by WIFI signal, the information whether system is qualified according to projects, automatic generation confirms completion status, Rechecking List or rectification list, security official is after down-hole transmission information, be correlated with responsible official aboveground by singly making a report on interface checks the situation that downhole safety confirms safely,
3, the class of group: if security official fills in permission operation, then safe team leader carries out according to the short message prompt received from server the class of group, if security official fills in do not allow operation, then spread superintendent receives the short message prompt not allowing operation;
If security official's initial examination entry results is qualified, and safety standard database is when specifying the attribute of security item for " need check ", system generates Rechecking List automatically, and by server SMS notification safety manager to field review, through check qualified after the class of group again;
Ore deposit level security person, ore deposit level technician or the chief of a pit from server lookup to rectification item after, the rectification personnel specified by server SMS notification are rectified and improved to scene, field notes rectification situation after rectification personnel rectification, and obtain photo site or videograph, and uploaded onto the server by down-hole WIFI, issue rectification informant person by server short message prompt after rectifying and improving complete confirmation;
4, ore deposit level managerial personnel check: ore deposit level managerial personnel recall the result of site safety person's inspection from server, therefrom select the entry oneself be responsible for as check content, the scene of entering is checked, and typing real time data, if find the entry needing rectification in addition, select the rectification personnel of this entry, system automatic short message notifies that corresponding rectification personnel carry out rectification operation to scene;
(2), safety verification completion rate monitoring
Document various state completion rate computing method are, are multiplied by 100% with often kind of state document number again divided by the total number of document;
(3) rectify and improve non-completion rate to calculate
Rectification singly assign after, document can be divided into four kinds of states, be respectively and do not carry report, download, carried report and processed, wherein, do not carry form and show that the rectification list of generation does not do any process; Download and represented that rectification list downloads to handheld terminal, prepared to rectify and improve; Carried form and shown that rectification document been has has been rectified and improved, carry server of reporting for work, Rechecking List generates, and rectification enters treats check state; The processed check work representing that rectification list is corresponding completes;
If the single total number of rectification is N, not carrying declaration form according to number is n
1, having downloaded document number is n
2, having carried declaration form according to number is n
3, processed document number is n
4, then rectify and improve non-completion rate=
× 100%;
(4), confirmation form overall monitor
Confirmation form overall monitor: system is at whole detail of same showing interface safety verification list and all processes;
(5), the scope of operation sends the display of class situation: show each scope of operation and the concrete class's of the group situation of each operation;
Two, hidden troubles removing
(1), hidden troubles removing flow process
The first step, set up accident potential's database, and by accident potential's data and hidden danger level maintenance thereof in accident potential's database, all hidden danger of investigation that needs is maintained in accident potential's database according to hidden danger position, and by hidden danger level maintenance in accident potential's database, and hidden danger rank is described; What in accident potential's database, arrange potential safety hazard, the different stage of dangerous matter sources and corresponding harmful grade reports rank; The project of setting comprises: rank title, this level security hidden danger should report to where, potential safety hazard process responsible department;
Second step, in the setting hidden troubles removing cycle, set up office worker's database, in the post information of office worker's database, add proof cycle, differentiated control supervisory personnel post information, arranges cycle supervision time of every one-level supervisory personnel; Automatically responsible person concerned is reminded to report incipient fault data when server is set to cycle prompting according to this, if there is no reported data on time, record examination data;
3rd step, setting hidden danger report flow: according to different hidden danger ranks, define different report flows, the hidden danger of investigation is notified corresponding supvr;
4th step, hidden troubles removing: server assigns hidden danger job order automatically according to the hidden troubles removing cycle in post, and SMS notification rectifies and improves people accordingly, rectification people logs in handheld terminal, in the region having WIFI signal, scan the scope of operation with radio-frequency card, download hidden danger job order, and investigate one by one according to the position of hidden danger instruction, typing handheld terminal, if there is hidden danger, then report hidden danger according to hidden danger report flow, after flow process senior author receives Rectification of hidden dangers list, if rectification scheme and rectification people can be specified, then Rectification of hidden dangers list is transferred to corresponding rectification people rectification, if cannot specify rectification scheme and rectification people, then rectification singly continued to report, transfer to senior author's specified scheme and rectification people, rectification people, when logging in handheld terminal, receives Rectification of hidden dangers list, so that the rectification scheme rectification hidden danger of specifying according to supvr,
(2), hidden danger situation monitoring
Hidden danger task do not carry ratio shared by report situation=
× 100%,
Hidden danger task downloaded ratio shared by situation=
× 100%,
Rectification of hidden dangers list treat ratio shared by rectification situation=
× 100%,
Rectification of hidden dangers list treat ratio shared by check situation=
× 100%,
Ratio shared by Rectification of hidden dangers list confirmation performance=
× 100%,
In formula, a represents that hidden danger task is not carried and reports a time: adding up all hidden danger not carrying report from tabling look-up, representing newly-increased in system, but do not carry out hidden troubles removing document number; B represents that hidden danger task downloads situation b time: statistics has downloaded to the hidden danger job order number of handheld terminal, represents that hidden danger enters the investigation stage; C represents that Rectification of hidden dangers list treats rectification situation c time: add up and there is hidden danger in troubleshooting procedure, has formed the number of Rectification of hidden dangers list, represents that hidden danger is waited to rectify and improve; D represents that Rectification of hidden dangers list treats check situation d time: statistics confirms hidden troubles removing for the first time, does not meet safety standard, needs the document number again checked; E represents that Rectification of hidden dangers list confirms performance e time: statistics has completed the document number of hidden troubles removing, and it is complete that all hidden danger has investigated rectification.
Wherein, the hidden danger rank described in hidden troubles removing flow process () step is described below:
A level hidden danger is especially big hidden danger: can not solve immediately in firm-wide, and relevant expert need be asked to study the hidden danger of discussion formulation solution, responsible department: company leader, department head;
B level hidden danger is major hidden danger: refer to that branch and subsidiaries' impotentia solves the hidden danger needing relevant department of company formulation rectification scheme to help solve, responsible department: branch office leader, division director;
C level hidden danger is larger hidden danger: referring to that workshop impotentia solves needs branch office can solve the hidden danger of rectification within certain time limit, responsible department: the managerial personnel of each business department room (section office);
D level hidden danger is general incipient faults: what refer to that operation field exists can the hidden danger of timely rectification on duty in plant area, responsible department: full-time Security Officer.
The beneficial effect that the present invention has is:
The present invention establishes science, specification, the normalization management system of industrial accident hidden troubles removing, make full use of production safety management Network Information platform, achieve accident potential's investigation and administer dynamic management, and investigate by the accident potential continued, rectify and improve, progressively can improve the safety production condition of manufacturing enterprise, take precautions against all kinds of accident to occur, set up Long-Term Effective Mechanism of Safe Production, General Promotion essential safety.
The present invention utilizes Information Sharing Technology that process information is presented to level correlation, add the concertedness of work, utilize simple and quick SMS business and other information reminding modes, carry out pressing prompting, avoid negligent supervision and manage delayed, emergency is directly delivered on the important management position such as group, the chief of a pit, allows potential safety hazard event not become security incident as far as possible.
In safety verification management process with safety verification entry for source index, in potential safety hazard management process, be encoded to source index with potential safety hazard, all implementation status relevant to this security information and document information can be inquired by safety verification entry with potential safety hazard coding.
By the enforcement of safety verification and hidden troubles removing management system, all departments related personnel can grasp the security situation at each scene in real time.
To be managed by safety verification and the data of potential safety hazard management each several part form various safety statistics analytical statement and corresponding warning reports.
Facilitate safety training management standardization, training information bank and training scheme informationization, allow supvr and staff carry out the work in unified standard;
Facilitate safety management and hidden danger process management standardization, wireless transmission technology is utilized to solve the slow problem with transmitting dispersion of information acquisition, change traditional processing mode, from group, ore deposit, regulatory authorities, person liable's every aspect to the grasp of information rapidly and comprehensively.Consulting in time of hidden danger process prediction scheme, guidance of faulf handling person at the scene normative operation does not make a slip-up.
Accompanying drawing explanation
Fig. 1 is safety verification control flow chart of the present invention.
Fig. 2 is potential safety hazard control flow chart of the present invention.
Fig. 3 is the displaying interface schematic diagram of safety verification list of the present invention.
Embodiment
one, safety verification process
(1), safety verification flow process
The first step, safety verification standard configuration: set up safety standard database, typing needs the entry (entry contents comprises the need of check) checked, and the safety standard of respective entries, and entry can carry out increasing newly, revise and forbidding.
Second step, operation safety verification standard care: when safeguarding, is first maintained into formation process information bank in system operation title, from safety standard database, then select the safety verification standard that this operation is corresponding.In order to strengthen system flexibility, each operation can enable, forbid two states.
3rd step, the scope of operation is safeguarded: for the scope of operation newly opened, must by maintenances of information such as the title of the scope of operation, affiliated operation field positional information, radio-frequency card codings in scope of operation information bank.Newly open the scope of operation at every turn, just can come into force after needing the leader of setting to audit.
Scope of operation information bank also comprises the information such as the title of the scope of operation of the scope of operation in hot work in progress, affiliated operation field positional information, radio-frequency card coding.
4th step, safety verification process flow:
1, safety verification list is assigned: enter before down-hole carries out safety verification, first assigning of safety verification list is carried out, in the concrete scope of operation of selection, after concrete operation, system will need the project checked to enumerate out automatically, security official is having WIFI signal place, and safety verification list is downloaded to handheld terminal.
2, safe task list accepts and makes a report on: security official enters safety verification region, and to regulation radio-frequency (RF) tag place reading operation face positional information and register, fill in the security situation of detected operation with handheld terminal collection simultaneously, to be confirmed whether the standard meeting the setting of safety standard database, standard according to the setting of safety standard database judges, the content if needed rectified and improved then selects the rectification personnel name of this content, then fills in permission operation as do not needed the content rectified and improved.Security official also obtains photo site or video information, and the photo site or video information that judge conclusion and acquisition are sent to server by WIFI signal.The information whether system is qualified according to projects, automatically generates and confirms that completion status, Rechecking List or rectification are single, and security official is after down-hole transmission information, and relevant responsible official singly makes a report on interface by safety and checks aboveground the situation that downhole safety confirms.
3, the class of group: if security official fills in permission operation, then safe team leader carries out according to the short message prompt received from server the class of group.If security official fills in do not allow operation, then spread superintendent receives the short message prompt not allowing operation.
If security official's initial examination entry results is qualified, and when safety standard database specifies the attribute of security item for " needing check ", system generates Rechecking List automatically, and by server SMS notification safety manager to field review.Through check qualified after the class of group again.
Ore deposit level security person, ore deposit level technician or the chief of a pit from server lookup to rectification item after, the rectification personnel specified by server SMS notification are rectified and improved to scene.Field notes rectification situation after rectification personnel rectification, and obtain photo site or videograph, and uploaded onto the server by down-hole WIFI.Rectification informant person is issued by server short message prompt after rectifying and improving complete confirmation.
4, ore deposit level managerial personnel check: ore deposit level managerial personnel recall the result of site safety person's inspection from server, therefrom select the entry oneself be responsible for as check content, the scene of entering is checked, and typing real time data.If find the entry needing rectification in addition, select the rectification personnel of this entry, system automatic short message notifies that corresponding rectification personnel carry out rectification operation to scene.
(2), safety verification progress and completion rate monitoring
Safety verification situation is monitored: monitoring downhole safety confirmation form accepts situation, check situation and treats rectification situation, and the concrete detail of often kind of document.The particular contents such as the scope of operation of each action and operation are shown by the detailed viewing area of document in table 1.
Table 1
1), safety verification do not assign x time: statistics be all newly-increased after, the document number of the safety verification list also do not assigned, these data are not also downloaded at handheld terminal.
2), safety verification has been assigned and has not been downloaded y time: but statistics is all having assigned also not at individual number of safety verification that handheld terminal is downloaded.
3), safety verification assigned and downloaded z time: statistics be all by the safety verification list that handheld terminal is downloaded, expression work has entered the safety verification stage.
4), safety verification is waited to check m time: add up all document numbers needing check.Wherein, need the entry of check to comprise all initial examination and pass through, and security item " whether to check " attribute be the entry of "Yes".
5), safety verification is waited to rectify and improve n time: statistics be that individual are several for all safety verifications not meeting standard.Represent the security item existing in document and need rectification.
6), safety verification completes q time: add up all individual numbers of safety verification having completed safety verification, represent that safety verification work completes.
7), document various state completion rate (%) account form is, with often kind of state document number divided by the total number of document.Such as, need computationally secure confirmation form do not assign x shared ratio=
× 100%, represent and do not assign the ratio that document accounts for all safety verifications.
(3) rectify and improve non-completion rate to calculate
After rectification is singly assigned, document can be divided into four kinds of states to be respectively not carrying report, download, carried and to have reported and processed, wherein, does not carry form and shows that the rectification list of generation does not do any process; Download and represented that rectification list downloads to handheld terminal, prepared to rectify and improve; Carried form and shown that rectification document been has has been rectified and improved, carry server of reporting for work, Rechecking List generates, and rectification enters treats check state; The processed check work representing that rectification list is corresponding completes.
The single total number of hypothesis rectification is herein N, and not carrying declaration form according to number is n
1, having downloaded document number is n
2, having carried declaration form according to number is n
3, processed document number is n
4,
Then rectify and improve non-completion rate=
× 100%.
(4), confirmation form overall monitor
Confirmation form overall monitor: system is at whole detail of same showing interface safety verification list and all processes, system display is divided into four interfaces, as Fig. 3, upper left corner interface display safety verification list, the detail of upper right corner interface display safety verification list, the rectification list that lower left corner interface display safety verification list is corresponding, the security review list that lower right corner interface display safety verification list is corresponding.
(5), the scope of operation sends class's situation: show each scope of operation and the concrete class's of the group situation of each operation
Table 2
The scope of operation | Operation | State |
Workplace | Operation | The class of group |
Workplace | Operation | The class of group |
Send class's situation according to the scope of operation, operation, status poll, grasp the progress of each scope of operation and operation with convenient and safe supvr in real time.
two, hidden troubles removing
(1), hidden troubles removing flow process
The first step, sets up accident potential's database, and by accident potential's data and hidden danger level maintenance thereof in accident potential's database.All hidden danger of investigation that needs is maintained in accident potential's database according to hidden danger position, and by hidden danger level maintenance in accident potential's database, hidden danger rank comprises especially big hidden danger, major hidden danger, larger hidden danger and general incipient faults four class, and is described hidden danger rank.
What in accident potential's database, arrange potential safety hazard, the different stage of dangerous matter sources and corresponding harmful grade reports rank; The project of setting comprises: rank title, this level security hidden danger should report to where, potential safety hazard process responsible department.
Described hidden danger rank is described below:
A level hidden danger is especially big hidden danger: can not solve immediately in firm-wide, and relevant expert need be asked to study the hidden danger of discussion formulation solution.Responsible department: company leader, department head.
B level hidden danger is major hidden danger: refer to that branch and subsidiaries' impotentia solves the hidden danger needing relevant department of company formulation rectification scheme to help solve, responsible department: branch office leader, division director.
C level hidden danger is larger hidden danger: referring to that workshop impotentia solves needs branch office can solve the hidden danger of rectification within certain time limit.Responsible department: the managerial personnel of each business department room (section office).
D level hidden danger is general incipient faults: what refer to that operation field exists can the hidden danger of timely rectification on duty in plant area.Responsible department: full-time Security Officer.
Second step, the setting hidden troubles removing cycle.Set up office worker's database, in the post information of office worker's database, add proof cycle, differentiated control supervisory personnel post information.Cycle supervision time of every one-level supervisory personnel is set.As: arrange ore deposit level person liable and monthly at least report an incipient fault data, production foreman is at least weekly, arranges team leader squad leader once a day, arranges security official at least once a day.System is arranged according to above, when the cycle points out, automatically remind responsible person concerned to report incipient fault data.If there is no reported data on time, record examination data.
3rd step, setting hidden danger report flow.According to different hidden danger ranks, define different report flows, the hidden danger of investigation is notified corresponding supvr, system can customize approval process neatly, selects personnel information, when there is post and transferring, can change approving person arbitrarily.Approval process adopts post system, namely in approval process, does not define concrete personnel, but defines corresponding post.
4th step, hidden troubles removing.Server assigns hidden danger job order automatically according to the hidden troubles removing cycle in post, and SMS notification rectifies and improves people accordingly.Rectification people logs in handheld terminal, in the region having WIFI signal, scans the scope of operation with radio-frequency card, downloads hidden danger job order, and investigates one by one according to the position of hidden danger instruction, typing handheld terminal.If there is hidden danger, then report hidden danger according to hidden danger report flow, after flow process senior author receives Rectification of hidden dangers list, if rectification scheme and rectification people can be specified, then Rectification of hidden dangers list is transferred to corresponding rectification people rectification; If rectification scheme and rectification people cannot be specified, then need rectification singly to be continued report, transfer to senior author's specified scheme and rectification people.Rectification people, when logging in handheld terminal, can receive Rectification of hidden dangers list, the rectification scheme of specifying according to supvr, rectification hidden danger.
In addition, except system is periodically assigned except hidden troubles removing list, system by manually assigning hidden troubles removing list, can also carry out comprehensive investigation of hidden danger.The hidden troubles removing list processing procedure that hidden danger processing procedure and system are assigned automatically is consistent.
(2), hidden danger situation monitoring
Hidden danger situation is monitored: as shown in table 3, shows the implementation status of hidden danger job order and hidden troubles removing list, and the concrete detail of often kind of document, specific to the scope of operation and operation, facilitates supvr to carry out overall monitor.
Table 3
1), hidden danger task do not carry and reporting a time: adding up all hidden danger not carrying report from tabling look-up, representing newly-increased in system, but do not carry out hidden troubles removing document number.
Hidden danger task do not carry ratio shared by report situation=
× 100%,
Represent that the hidden danger job order not carrying report accounts for the ratio of all hidden danger job orders.
2), hidden danger task downloads situation b time: statistics has downloaded to the hidden danger job order number of handheld terminal, represents hidden danger
Enter the investigation stage.
Hidden danger task downloaded ratio shared by situation=
× 100%,
Represent that the hidden danger job order downloaded accounts for the ratio of whole hidden danger job order.
3), Rectification of hidden dangers list treats rectification situation c time: add up and there is hidden danger in troubleshooting procedure, formed the number of Rectification of hidden dangers list, represent that hidden danger is waited to rectify and improve.
Rectification of hidden dangers list treat ratio shared by rectification situation=
× 100%,
Represent that Rectification of hidden dangers list to be rectified and improved accounts for the ratio of all Rectification of hidden dangers lists.
4), Rectification of hidden dangers list treats check situation d time: statistics confirms hidden troubles removing for the first time, does not meet safety standard, needs
The document number that will again check.
Rectification of hidden dangers list treat ratio shared by check situation=
× 100%,
Represent that hidden danger Rechecking List to be rectified and improved accounts for the ratio of all Rectification of hidden dangers lists.
5), Rectification of hidden dangers list confirms performance e time: statistics has completed the document number of hidden troubles removing, and all hidden danger
Investigation rectification is complete.
Ratio shared by Rectification of hidden dangers list confirmation performance=
× 100%,
Represent that the document of Rectification of hidden dangers accounts for the ratio of all hidden danger job orders assigned.
Below in conjunction with drawings and Examples, the present invention is described further.
Shown in process flow diagram, first each basic data is safeguarded in systems in which, comprising: user, role, department, hidden danger rank, scope of operation maintenance, safety verification standard, operation safety verification standard, hidden danger report flow etc.After basic data has been safeguarded, for the scope of operation newly opened, carry out trouble free service confirmation.
Relate to the embodiment that safety verification controls, as Fig. 1, need the scope of operation, the operation of carrying out safety verification, form safety verification list and assign, only need select corresponding operation when assigning a task, the safety verification entry of having bound in operation can show by system.
Confirm that safety in production checks operation according to the production operation in this place at the construction field (site) by security official, download safety inspection entry, and confirm according to the safety inspection entry of this operation situation on the spot of carrying out, check result is carried out the typing of field data by handheld terminal, for some special circumstances, directly can to take pictures or recorded video uploads annex, to carry out the confirmation of actual field situation for the ground responsible official that is correlated with.
Safety in production is on-the-spot confirm to carry report after system be "Yes" by whether checking option in security item detail automatically, and do not need the record rectified and improved to extract generation Rechecking List, and SMS notification is correlated with, check personnel come check.If kept the safety in production, the information having rectification of report is put forward in on-the-spot confirmation, then corresponding generation rectification is single, and notifies that rectification personnel come to rectify and improve.
Ore deposit level security person logs in the system of b/s framework with webpage, checks the up-to-date safety verification situation in each working-yard.Handheld terminal can be held as needed the working-yard of security review and go field review.
Ore deposit level security person holds handheld terminal and enters working-yard, to there being wifi quorum sensing inhibitor place, downloads the safety inspection operation of this working-yard, and chooses the concrete safety inspection entry wherein oneself be responsible for, as the particular content of security review.
Ore deposit level security person holds handheld terminal and enters safety inspection scene, typing site safety checks detailed content and data, the safety inspection entry if needed rectified and improved is typing rectification people after this entry, and the result of contrast first time safety inspection typing, whether final typing allows the option of operation.
Ore deposit level security person's return signal covering place, filled out information is carried report upload onto the server, whether processed data by server, need rectify and improve and allow the information such as operation to reach SMS platform, being sent short messages by SMS platform notifies that related personnel is for further processing.If any the safety inspection entry that need rectify and improve then SMS notification rectification personnel to come rectification, on-the-spot whether allow the information SMS notification of operation to send class personnel to carry out respective handling.
According to the result that security official's site safety confirms, server is reached for undesirable entry, automatically form rectification document, rectify and improve personnel to on-the-spot rectification by SMS platform short message prompt.Rectification personnel receive rectification note, carry corresponding tool and handheld terminal is rectified and improved to scene.
Rectification personnel hold handheld terminal to wifi quorum sensing inhibitor place, working-yard, download the up-to-date safety inspection in this scene and confirm situation information, indicate the safety inspection entry of the need rectification of oneself name, as the content of rectification after selecting.
Rectification personnel hold handheld terminal to rectifying and improving at the scene of rectifying and improving, and rectification terminates the site inspection situation after the rectification of this security item of rear typing.
Covering place of rectification personnel return signal, puies forward the site safety situation of this security item of report, and clicks rectification ACK button.System is by up-to-date for real-time update site safety situation, and the safety inspection data before record, and the litigant (security official/ore deposit level security person) pointing out typing to rectify and improve information by SMS platform reaffirms to scene.
According to the on-the-spot confirmation situation of the safety management reported, check entry contents for defective safety in production, system is automatically sent short messages and is notified corresponding rectification personnel.Rectification personnel receive corresponding rectification entry and enter scene and rectify and improve, rectification terminates the field condition after rear typing rectification, report is carried in click, then the staff (security official, ore deposit level security person, ore deposit level technician, the chief of a pit) that system automatic short message reminding sends rectification personnel to come to rectify and improve comes to reaffirm.
Rectification personnel enter rectification management, and system lists the security item that this rectification personnel need rectify and improve, and rectification personnel click and recall recalling button and can see the data (measured value, photo site/video, remarks etc.) checked last time inside former data.Whether fill in after rectification completes and meet, what have measured value, typing photo site/video if filling in measured value, fill in other remarks, the complete ACK button confirming the inside of finally click rectification, now system automatic short message notice notified the litigant of rectification at that time, reaffirmed.
After safe team leader receives the confirmation object command of underground site, carry out Pai Ban and by the class's of the group data entry system for scene.For underproof operating location, Operation system setting can not carry out the class of group.
Relate to the embodiment that hidden troubles removing controls, as Fig. 2, potential safety hazard list generates from two paths: a paths is by system, according to different posies and different proof cycles, automatically generates potential safety hazard list; Another paths specifies rectification people by special messenger, irregularly assigns rectification single.After rectification people receives potential safety hazard list, according to the investigation inventory on hidden danger list, go to investigate hidden danger one by one, and rectify and improve hidden danger, after having rectified and improved, check Rectification of hidden dangers situation by relevant leader, give corresponding rewards and punishments measure for the qualified hidden danger of rectification, will notify to continue rectification until qualified for underproof Rectification of hidden dangers.
Safeguard potential safety hazard task, the hidden danger task safeguarded can be assigned according to duty cycle and carry out hidden troubles removing task to the personnel specified.
What hidden danger job placement was shown is the hidden danger list that current login people needs to investigate, and this document is that system generates automatically on the one hand, is the potential safety hazard list that special messenger assigns on the other hand.Two aspects generate document, only have tasks carrying people be active user just display this page.Namely log in people and can only check the potential safety hazard list being issued to oneself.
The Rectification of hidden dangers list that approver is current login people is listed in hidden danger job placement, as the corresponding levels can't resolve, cannot determine the information such as rectification people rectification scheme, then also need to report, then click and report button to report, transfer to upper level to continue process, if the corresponding levels can process, then fill in first time and rectify and improve people.If hidden troubles removing need of work subordinate personnel complete investigation, then choose rectification roster, click and transfer button, transfer the work of potential safety hazard investigation.
Log in handheld terminal, when there being network to connect, clicking Rectification of hidden dangers management, Rectification of hidden dangers list being downloaded to terminal, fills in rectification situation, upload photo site, clicking and carry report button, carry and reporting for work in B/S program.
Rectification personnel receive short message prompt has potential safety hazard to need rectification, then scene of arriving is rectified and improved, and report is carried in the click of result input system.
After hidden danger list carries out first time Rectification of hidden dangers, click and carry report button, namely produce hidden danger Rechecking List, and by inform by short message, initial hidden danger system is single carries out hidden danger check.
After check personnel receive note, arrive hidden danger check on-the-spot, download safety post and indicate thin content, fill in whether satisfied, detailed content such as rectification people, rewards and punishments information etc., and carry out carrying report.
By repeatedly checking, repeatedly rectifying and improving, until hidden danger is eliminated.Till all entries all meet the safety in production entry of regulation.
Claims (2)
1., based on the metal mine downhole safety digital management system of radio frequency and WiFi technology, it is characterized in that this system comprises safety verification process and hidden troubles removing process; Wherein safety verification process comprises the monitoring of safety verification flow process, safety verification progress and completion rate, rectifies and improves that non-completion rate calculates, confirmation form overall monitor and the scope of operation sends class's situation to show; Hidden troubles removing process comprises hidden troubles removing flow process and the monitoring of hidden danger situation;
One, safety verification process
(1), safety verification flow process
The first step, safety verification standard configuration: set up safety standard database, typing needs the entry checked, this entry comprises the content the need of check, and the safety standard of respective entries;
Second step, operation safety verification standard care: when safeguarding, is first maintained into formation process information bank in system operation title, and from safety standard database, then select the safety verification standard that this operation is corresponding, each operation is enabled, forbidden two states;
3rd step, the scope of operation is safeguarded: for the scope of operation newly opened, and by comprising scope of operation title, affiliated operation field positional information, radio-frequency card be coded in interior maintenance of information in scope of operation information bank; Scope of operation information bank also comprises the scope of operation title of the scope of operation in hot work in progress, affiliated operation field positional information and radio-frequency card coded message;
4th step, safety verification process flow:
1, safety verification list is assigned: after the concrete scope of operation of selection and concrete operation, and server is enumerated out by needing the project checked, downloads to handheld terminal for security official there being WIFI signal place;
2, safe task list accepts and makes a report on: security official enters safety verification region, and to regulation radio-frequency (RF) tag place reading operation face positional information and register, fill in the security situation of detected operation with handheld terminal collection simultaneously, to be confirmed whether the standard meeting the setting of safety standard database, standard according to the setting of safety standard database judges, the content if needed rectified and improved then selects the rectification personnel name of this content, permission operation is then filled in as do not needed the content rectified and improved, security official also obtains photo site or video information, the photo site or video information that judge conclusion and acquisition are sent to server by WIFI signal, the information whether system is qualified according to projects, automatic generation confirms completion status, Rechecking List or rectification list, security official is after down-hole transmission information, be correlated with responsible official aboveground by singly making a report on interface checks the situation that downhole safety confirms safely,
3, the class of group: if security official fills in permission operation, then safe team leader carries out according to the short message prompt received from server the class of group, if security official fills in do not allow operation, then spread superintendent receives the short message prompt not allowing operation;
If security official's initial examination entry results is qualified, and safety standard database is when specifying the attribute of security item for " need check ", system generates Rechecking List automatically, and by server SMS notification safety manager to field review, through check qualified after the class of group again;
Ore deposit level security person, ore deposit level technician or the chief of a pit from server lookup to rectification item after, the rectification personnel specified by server SMS notification are rectified and improved to scene, field notes rectification situation after rectification personnel rectification, and obtain photo site or videograph, and uploaded onto the server by down-hole WIFI, issue rectification informant person by server short message prompt after rectifying and improving complete confirmation;
4, ore deposit level managerial personnel check: ore deposit level managerial personnel recall the result of site safety person's inspection from server, therefrom select the entry oneself be responsible for as check content, the scene of entering is checked, and typing real time data, if find the entry needing rectification in addition, select the rectification personnel of this entry, system automatic short message notifies that corresponding rectification personnel carry out rectification operation to scene;
(2), safety verification completion rate monitoring
Document various state completion rate computing method are, are multiplied by 100% with often kind of state document number again divided by the total number of document;
(3) rectify and improve non-completion rate to calculate
Rectification singly assign after, document can be divided into four kinds of states, be respectively and do not carry report, download, carried report and processed, wherein, do not carry form and show that the rectification list of generation does not do any process; Download and represented that rectification list downloads to handheld terminal, prepared to rectify and improve; Carried form and shown that rectification document been has has been rectified and improved, carry server of reporting for work, Rechecking List generates, and rectification enters treats check state; The processed check work representing that rectification list is corresponding completes;
If the single total number of rectification is N, not carrying declaration form according to number is n
1, having downloaded document number is n
2, having carried declaration form according to number is n
3, processed document number is n
4, then non-completion rate=× 100% is rectified and improved;
(4), confirmation form overall monitor
Confirmation form overall monitor: system is at whole detail of same showing interface safety verification list and all processes;
(5), the scope of operation sends the display of class situation: show each scope of operation and the concrete class's of the group situation of each operation;
Two, hidden troubles removing
(1), hidden troubles removing flow process
The first step, set up accident potential's database, and by accident potential's data and hidden danger level maintenance thereof in accident potential's database, all hidden danger of investigation that needs is maintained in accident potential's database according to hidden danger position, and by hidden danger level maintenance in accident potential's database, and hidden danger rank is described; What in accident potential's database, arrange potential safety hazard, the different stage of dangerous matter sources and corresponding harmful grade reports rank; The project of setting comprises: rank title, this level security hidden danger should report to where, potential safety hazard process responsible department;
Second step, in the setting hidden troubles removing cycle, set up office worker's database, in the post information of office worker's database, add proof cycle, differentiated control supervisory personnel post information, arranges cycle supervision time of every one-level supervisory personnel; Automatically responsible person concerned is reminded to report incipient fault data when server is set to cycle prompting according to this, if there is no reported data on time, record examination data;
3rd step, setting hidden danger report flow: according to different hidden danger ranks, define different report flows, the hidden danger of investigation is notified corresponding supvr;
4th step, hidden troubles removing: server assigns hidden danger job order automatically according to the hidden troubles removing cycle in post, and SMS notification rectifies and improves people accordingly, rectification people logs in handheld terminal, in the region having WIFI signal, scan the scope of operation with radio-frequency card, download hidden danger job order, and investigate one by one according to the position of hidden danger instruction, typing handheld terminal, if there is hidden danger, then report hidden danger according to hidden danger report flow, after flow process senior author receives Rectification of hidden dangers list, if rectification scheme and rectification people can be specified, then Rectification of hidden dangers list is transferred to corresponding rectification people rectification, if cannot specify rectification scheme and rectification people, then rectification singly continued to report, transfer to senior author's specified scheme and rectification people, rectification people, when logging in handheld terminal, receives Rectification of hidden dangers list, so that the rectification scheme rectification hidden danger of specifying according to supvr,
(2), hidden danger situation monitoring
Hidden danger task do not carry ratio shared by report situation=
× 100%,
Hidden danger task downloaded ratio shared by situation=
× 100%,
Rectification of hidden dangers list treat ratio shared by rectification situation=
× 100%,
Rectification of hidden dangers list treat ratio shared by check situation=
× 100%,
Ratio shared by Rectification of hidden dangers list confirmation performance=
× 100%,
In formula, a represents that hidden danger task is not carried and reports a time: adding up all hidden danger not carrying report from tabling look-up, representing newly-increased in system, but do not carry out hidden troubles removing document number; B represents that hidden danger task downloads situation b time: statistics has downloaded to the hidden danger job order number of handheld terminal, represents that hidden danger enters the investigation stage; C represents that Rectification of hidden dangers list treats rectification situation c time: add up and there is hidden danger in troubleshooting procedure, has formed the number of Rectification of hidden dangers list, represents that hidden danger is waited to rectify and improve; D represents that Rectification of hidden dangers list treats check situation d time: statistics confirms hidden troubles removing for the first time, does not meet safety standard, needs the document number again checked; E represents that Rectification of hidden dangers list confirms performance e time: statistics has completed the document number of hidden troubles removing, and it is complete that all hidden danger has investigated rectification.
2., as claimed in claim 1 based on the metal mine downhole safety digital management system of radio frequency and WiFi technology, it is characterized in that: the hidden danger rank described in hidden troubles removing flow process () step is described below:
A level hidden danger is especially big hidden danger: can not solve immediately in firm-wide, and relevant expert need be asked to study the hidden danger of discussion formulation solution, responsible department: company leader, department head;
B level hidden danger is major hidden danger: refer to that branch and subsidiaries' impotentia solves the hidden danger needing relevant department of company formulation rectification scheme to help solve, responsible department: branch office leader, division director;
C level hidden danger is larger hidden danger: referring to that workshop impotentia solves needs branch office can solve the hidden danger of rectification within certain time limit, responsible department: the managerial personnel of each business department room (section office);
D level hidden danger is general incipient faults: what refer to that operation field exists can the hidden danger of timely rectification on duty in plant area, responsible department: full-time Security Officer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510032058.9A CN104573971A (en) | 2015-01-22 | 2015-01-22 | Metal mine underground safety digital management system based on radio frequency and WIFI technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510032058.9A CN104573971A (en) | 2015-01-22 | 2015-01-22 | Metal mine underground safety digital management system based on radio frequency and WIFI technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104573971A true CN104573971A (en) | 2015-04-29 |
Family
ID=53089980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510032058.9A Pending CN104573971A (en) | 2015-01-22 | 2015-01-22 | Metal mine underground safety digital management system based on radio frequency and WIFI technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104573971A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105116851A (en) * | 2015-07-20 | 2015-12-02 | 深圳市华威世纪科技股份有限公司 | Hidden danger investigation CPS (hdiCPS) |
CN106096872A (en) * | 2016-08-10 | 2016-11-09 | 中国东方电气集团有限公司 | A kind of factory's substandard product report processing system and method |
CN106548436A (en) * | 2016-09-29 | 2017-03-29 | 河南中烟工业有限责任公司许昌卷烟厂 | Dangerous matter sources risk management and control method and control device |
CN107451732A (en) * | 2017-07-31 | 2017-12-08 | 华腾软科(北京)信息技术有限公司 | A kind of enterprise safety operation total management system and method |
CN107464053A (en) * | 2017-07-31 | 2017-12-12 | 华腾软科(北京)信息技术有限公司 | A kind of enterprise security hidden danger management system and method |
CN107609765A (en) * | 2017-09-01 | 2018-01-19 | 中国东方电气集团有限公司 | A kind of factory's hidden troubles removing method and system |
CN107993014A (en) * | 2017-12-07 | 2018-05-04 | 重庆天府矿业有限责任公司 | A kind of procedural style goes into operation safely management-control method and system |
CN108038809A (en) * | 2017-12-07 | 2018-05-15 | 重庆天府矿业有限责任公司 | A kind of intellectual accident potential's investigation administering method and system |
CN108364111A (en) * | 2017-12-25 | 2018-08-03 | 石雷 | Information system is administered in hidden troubles removing |
CN108921515A (en) * | 2018-07-04 | 2018-11-30 | 江苏南通三建集团股份有限公司 | A kind of construction site method of controlling security |
CN109726207A (en) * | 2019-01-03 | 2019-05-07 | 华腾软科(北京)信息技术有限公司 | A kind of identification of dangerous source and management system |
CN110135705A (en) * | 2019-04-24 | 2019-08-16 | 徐昊 | Security management indicatorization executes system |
CN110428112A (en) * | 2019-08-09 | 2019-11-08 | 烟台东方纵横科技股份有限公司 | A kind of dual prevention mechanism management system of enterprise based under internet+mode |
CN112365235A (en) * | 2020-11-12 | 2021-02-12 | 中建水务环保有限公司 | Management system and management method for before-class speech |
CN112488376A (en) * | 2020-11-25 | 2021-03-12 | 航天信息股份有限公司 | Method and system for managing and controlling potential safety hazards of operation site |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364104A (en) * | 2008-09-23 | 2009-02-11 | 西部矿业股份有限公司 | Multi entity monitoring decision support system and method for downhole entironment |
CN203118056U (en) * | 2013-03-05 | 2013-08-07 | 西安科技大学 | Coal mine potential safety hazard inspection system based on radio-frequency technology |
CN103295161A (en) * | 2013-07-03 | 2013-09-11 | 重庆松藻煤电有限责任公司 | Method for rapidly inputting and discovering hidden danger of underground coal mine |
CN103726881A (en) * | 2014-01-23 | 2014-04-16 | 安徽理工大学 | System and method for acquiring and processing safety hidden trouble signals of coal mine |
-
2015
- 2015-01-22 CN CN201510032058.9A patent/CN104573971A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364104A (en) * | 2008-09-23 | 2009-02-11 | 西部矿业股份有限公司 | Multi entity monitoring decision support system and method for downhole entironment |
CN203118056U (en) * | 2013-03-05 | 2013-08-07 | 西安科技大学 | Coal mine potential safety hazard inspection system based on radio-frequency technology |
CN103295161A (en) * | 2013-07-03 | 2013-09-11 | 重庆松藻煤电有限责任公司 | Method for rapidly inputting and discovering hidden danger of underground coal mine |
CN103726881A (en) * | 2014-01-23 | 2014-04-16 | 安徽理工大学 | System and method for acquiring and processing safety hidden trouble signals of coal mine |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105116851A (en) * | 2015-07-20 | 2015-12-02 | 深圳市华威世纪科技股份有限公司 | Hidden danger investigation CPS (hdiCPS) |
CN106096872A (en) * | 2016-08-10 | 2016-11-09 | 中国东方电气集团有限公司 | A kind of factory's substandard product report processing system and method |
CN106548436A (en) * | 2016-09-29 | 2017-03-29 | 河南中烟工业有限责任公司许昌卷烟厂 | Dangerous matter sources risk management and control method and control device |
CN107451732A (en) * | 2017-07-31 | 2017-12-08 | 华腾软科(北京)信息技术有限公司 | A kind of enterprise safety operation total management system and method |
CN107464053A (en) * | 2017-07-31 | 2017-12-12 | 华腾软科(北京)信息技术有限公司 | A kind of enterprise security hidden danger management system and method |
CN107609765A (en) * | 2017-09-01 | 2018-01-19 | 中国东方电气集团有限公司 | A kind of factory's hidden troubles removing method and system |
CN107993014A (en) * | 2017-12-07 | 2018-05-04 | 重庆天府矿业有限责任公司 | A kind of procedural style goes into operation safely management-control method and system |
CN108038809A (en) * | 2017-12-07 | 2018-05-15 | 重庆天府矿业有限责任公司 | A kind of intellectual accident potential's investigation administering method and system |
CN108364111A (en) * | 2017-12-25 | 2018-08-03 | 石雷 | Information system is administered in hidden troubles removing |
CN108921515A (en) * | 2018-07-04 | 2018-11-30 | 江苏南通三建集团股份有限公司 | A kind of construction site method of controlling security |
CN109726207A (en) * | 2019-01-03 | 2019-05-07 | 华腾软科(北京)信息技术有限公司 | A kind of identification of dangerous source and management system |
CN110135705A (en) * | 2019-04-24 | 2019-08-16 | 徐昊 | Security management indicatorization executes system |
CN110428112A (en) * | 2019-08-09 | 2019-11-08 | 烟台东方纵横科技股份有限公司 | A kind of dual prevention mechanism management system of enterprise based under internet+mode |
CN112365235A (en) * | 2020-11-12 | 2021-02-12 | 中建水务环保有限公司 | Management system and management method for before-class speech |
CN112488376A (en) * | 2020-11-25 | 2021-03-12 | 航天信息股份有限公司 | Method and system for managing and controlling potential safety hazards of operation site |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104573971A (en) | Metal mine underground safety digital management system based on radio frequency and WIFI technology | |
US20200193049A1 (en) | Lockout-tagout and safety compliance systems and methods | |
CN108921461A (en) | Warehousing system and control method based on RFID technique | |
CN104331790A (en) | Intelligent management system for tool based on radio frequency technology | |
CN108898360A (en) | A kind of power engineering wisdom building site integrated control information system | |
KR101754753B1 (en) | Smart system for safety factory based on Information technology facilities, and method for smart safety process using the same | |
CN103726881B (en) | Safety of coal mines hidden danger signal acquiring processing system and method | |
CN107133776A (en) | A kind of mobile security supervisory systems | |
CN105260857A (en) | Intelligent management system and method thereof for rural migrant workers | |
CN106485298A (en) | A kind of equipment routing inspection maintaining method based on Quick Response Code | |
CN104700192A (en) | Aided intelligent management and control system for power transmission and transformation project and management and control method thereof | |
CN106874974A (en) | A kind of Work tool Mobile solution implementation method based on technology of Internet of things | |
KR102438757B1 (en) | Smart Safety Platform | |
CN102360459A (en) | Safety monitoring system for underground operating personnel | |
CN104076767A (en) | Railway signal equipment overhauling control system and method | |
CN112288282A (en) | Safety production supervision and management system and management method thereof | |
EP3156857B1 (en) | Device and method for monitoring a building | |
CN105184519A (en) | Standardized safety operation tracing management system | |
CN114257607B (en) | Intelligent dangerous chemical full life cycle management system | |
CN201548988U (en) | Warehouse network electronic checking scheduling device | |
US20150186896A1 (en) | System and method of relatime inpsection of remote facility | |
CN107633308A (en) | Thermal power plant's cruising inspection system based on Internet of Things | |
CN111626670A (en) | Weather modification ammunition tracking and monitoring system based on Internet of things | |
CN204883348U (en) | Cement produced with dry method production line safety monitoring system | |
CN203942549U (en) | Data acquisition cloud service platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150429 |