CN108053003A - A kind of two-valued function digitizing solution of security monitoring - Google Patents
A kind of two-valued function digitizing solution of security monitoring Download PDFInfo
- Publication number
- CN108053003A CN108053003A CN201711374960.4A CN201711374960A CN108053003A CN 108053003 A CN108053003 A CN 108053003A CN 201711374960 A CN201711374960 A CN 201711374960A CN 108053003 A CN108053003 A CN 108053003A
- Authority
- CN
- China
- Prior art keywords
- monitoring
- monitoring parameter
- codomain
- parameter
- subinterval
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 120
- 230000006870 function Effects 0.000 claims description 14
- 230000015654 memory Effects 0.000 claims description 9
- 230000006855 networking Effects 0.000 claims 1
- 238000005259 measurement Methods 0.000 abstract description 6
- 238000000034 method Methods 0.000 description 10
- 229910000831 Steel Inorganic materials 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 239000010959 steel Substances 0.000 description 6
- 238000010276 construction Methods 0.000 description 4
- 230000007812 deficiency Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000011022 operating instruction Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000035882 stress Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 208000010392 Bone Fractures Diseases 0.000 description 1
- 206010017076 Fracture Diseases 0.000 description 1
- 208000013201 Stress fracture Diseases 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 239000012467 final product Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/08—Construction
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- General Engineering & Computer Science (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention belongs to security monitoring field, a kind of two-valued function digitizing solution of security monitoring is disclosed.By decomposing, obtaining saddlebag, security risk factor and monitoring parameter and encoding;Determine the monitoring corresponding codomain subinterval of each safe class of parameter and corresponding safe class and safe condition;Safe condition and the upload of monitoring parameter are obtained by Internet of Things mesh element.The present invention uses the safe condition of two-valued function vector, digitally safe class state residing for expression monitoring parameter.In order to realize that the measurement of the binaryzation of specifically monitored parameter and safe condition are expressed, by the corresponding codomain subinterval boundary value of monitoring parameter different safety class Hardware in corresponding Internet of Things mesh element, as default judgment rule, differentiate so as to fulfill the safe condition of front end, the two-valued function measurement of monitoring parameter safe condition can be more efficiently completed.
Description
Technical field
The present invention relates to security monitoring fields, and in particular to a kind of two-valued function digitizing solution of security monitoring.
Background technology
Construction project construction environment is complicated, procedure technology is various, builds up that the rear service time is long, ageing process is apparent,
The security risk factor in life cycle management each stage is numerous, and traditional hand inspection appraisal procedure takes time and effort, it is difficult to meet peace
The comprehensive and promptness requirement of full risk factors monitoring.Technology of Internet of things has complete perception, real-time Transmission and Intelligent treatment
Characteristic, security monitoring field have significant advantage, for solve conventional security monitoring method deficiency provide support.
Electronic tag based on radio frequency discrimination RFID (Radio Frequency Identification) technology is Internet of Things
One of net core equipment, the development of companion chip technology, RFID electronic label have become cheap and good-quality intelligent element.In safety
Using RFID electronic label technology in monitoring, non-contactly real-time, synchronous multiple smart objects can be perceived, can effectively aided in
The overall management of Field Force, equipment and goods and materials.But the application of existing RFID electronic label still has deficiency, mainly includes:
1) RFID electronic label be only capable of identification object identity information, and can not perceptive object status information, it is necessary to coordinate all kinds of biographies
Sensor could monitor specific parameter value, and measurement cost is high;2) pattern of server centered management, it is desirable that a large amount of RFID electronics marks
Label concurrently upload the parameter value of various different types of data, and communications cost is high;3) server process receives data, judges safe shape
State, and the process of field management is fed back to, it is time-consuming, it is impossible to meet the promptness requirement of safety evaluation well.
The content of the invention
For overcome the deficiencies in the prior art, the object of the present invention is to provide a kind of two-valued function digitlization sides of security monitoring
Method.Two-valued function sensing type Internet of Things mesh element can be utilized to realize security monitoring.
A kind of two-valued function digitizing solution of security monitoring, comprises the following steps:
Step 1 decomposes project work task, obtains each saddlebag NP of project work taski, i is the volume of saddlebag
Number;It determines to complete saddlebag NPiCorresponding security risk factor is NWi,j, j is the number of security risk factor;Determine monitoring
Monitoring parameter needed for security risk factor, the identity code for monitoring parameter are IDi,j,k, k is the number of monitoring parameter;
Step 2, division identity code are IDi,j,kThe codomain section of monitoring parameter obtain each codomain subinterval so that body
Part code is IDi,j,kEach codomain subinterval of monitoring parameter correspond to different safe classes, and it is corresponding to set each safe class
Safety scoring;Codomain subinterval, the corresponding safe class in codomain subinterval and the corresponding safety scoring of safe class are made
It is ID for identity codei,j,kMonitoring parameter additional information AXi,j,k;
Step 3, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things network element
Part RFIDi,j,kIt is detected, the safe condition ST of two-valued function vectori,j,kIn each element corresponding monitoring parameter respectively
IDi,j,kEach codomain subinterval;By safe condition STi,j,kIn with monitor parameter IDi,j,kCodomain subinterval where actual value
Corresponding element is arranged to 1, and other elements are arranged to 0, and acquisition identity code is IDi,j,kThe corresponding safe condition of monitoring parameter
STi,j,k;
Step 4, the identity code ID that parameter will be monitoredi,j,k, additional information AXi,j,k, Internet of Things mesh element RFIDi,j,k, safe shape
State STi,j,kAs feature vector [IDi,j,k,AXi,j,k,RFIDi,j,k,STi,j,k], by feature vector [IDi,j,k,AXi,j,k,
RFIDi,j,k,STi,j,k] data item as safety monitoring information database.
Internet of Things mesh element RFID as described abovei,j,k, perceived including power supply T1, memory T2, controller T3, logic state
Switch T4, indicating module T5, radio-frequency module T6, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval lead to
Cross corresponding Internet of Things mesh element RFIDi,j,kIt is detected and includes the following steps:
Step 3.1, power supply T1 are to memory T2, controller T3, logic state aware switch T4, indicating module T5, radio frequency
Module T6 powers;
Step 3.2, controller T2 initialization logics state aware switch T4;
It is ID that step 3.3, logic state aware switch T4, which perceive identity code,i,j,kMonitoring parameter actual value, and according to
Identity code is IDi,j,kMonitoring parameter each codomain subinterval, control logic state aware switch T4 in actual value where
The corresponding switch in codomain subinterval is logical state, and it is disconnected state that control logic state aware, which switchs other switches in T4,;
Step 3.4, controller T3 switch on-off state in logic state aware switch T4, and forming identity code is
IDi,j,kMonitoring parameter safe condition STi,j,k;
Step 3.5, controller T3 control indicating module T5 to show that identity code is IDi,j,kMonitoring parameter safe condition
STi,j,kCorresponding safe class;
Step 3.6, controller T3 control memories T2 deposit identity codes are IDi,j,kMonitoring parameter safe condition
STi,j,k;
For step 3.7 controller T3 according to predetermined period, it is ID that radio-frequency module T6 is controlled, which to send identity code to server,i,j,k's
Monitor the safety state information [ID of parameteri,j,k,STi,j,k]。
The present invention overcomes deficiencies present in previous security monitoring, and specifically, advantage is as follows:
First, the accurate value of monitoring parameter need not be measured, it is only necessary to judge monitoring parameter and the relativeness in codomain subinterval,
The safe condition of i.e. evaluable monitoring parameter, reduces measurement cost, has unified upload data type, improved communication and processing
Efficiency.
2nd, monitoring point can directly acquire safe class at the scene, without calculating safe class by server, realize
Front end safety evaluation, improves promptness.
3rd, using the safe condition of two-valued function vector, digitally expression monitors safe class state residing for parameter.
4th, in order to realize that the measurement of the binaryzation of specifically monitored parameter and safe condition are expressed, by the monitoring parameter not TongAn
The corresponding codomain subinterval boundary value Hardware in corresponding Internet of Things mesh element of congruent grade, as default judgment rule, so as to
It realizes that the safe condition of front end differentiates, the two-valued function measurement of monitoring parameter safe condition can be more efficiently completed.
Description of the drawings
Fig. 1 is the implementation steps schematic diagram of inventive method;
Fig. 2 is that parameter identification and coding flow chart are monitored in example;
Fig. 3 is the structure diagram of Internet of Things mesh element in example.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right
The present invention is further elaborated.
The content of the present embodiment is application of the present invention in construction-engineering project security monitoring, step as shown in Fig. 2,
Specific embodiment is as follows.
Step 1:Disintegration content, identification monitoring parameter simultaneously encode.
WBS (Work Breakdown Structure) method can be utilized, is successively decomposed in chronological order, from top to bottom
Project work task obtains minimum deliverable achievement as saddlebag, and definition saddlebag is NPi, i is the number of saddlebag;Know
All kinds of security risk factors that Wan Cheng be involved by saddlebag this process, it is NW to define security risk factori,j, j is safety wind
The number of dangerous factor;Monitoring parameter needed for analysis monitoring security risk factor, the identity code of definition monitoring parameter is IDi,j,k, k is
The number of parameter is monitored, as shown in Figure 3.
Parameter is monitored described in step 1, can be physical quantity or non-physical quantities.
In the present embodiment, identify:
1) Projects during Construction Stage has saddlebag for " safety management ", and the security risk factor being related to is " safety responsibility
System ", the monitoring parameter comprising non-physical quantities are " formulating each work post safe practice operating instruction ", and the identity code for monitoring parameter is
IDi1,j1,k1, i1 be saddlebag " safety management " number, j1 be security risk factor " system of responsibility in safe production " number, k1
For the number of monitoring parameter " formulating each work post safe practice operating instruction ".
2) Project in Operation maintenance phase has saddlebag for " component security authentication ", and the security risk factor being related to is " steel
Structural elements security ", the monitoring parameter comprising physical quantity are the " load effect and section resistance that steel structural rod piece section is subjected to
Ratio ", monitor parameter identity code be IDi2,j2,k2, i2 is the number of saddlebag " component security authentication ", and j2 is safety wind
The number of dangerous factor " steel structure member security ", k2 are that " load effect that steel structural rod piece section is subjected to is with cutting for monitoring parameter
The number of the ratio of face drag ".
3) Project in Operation maintenance phase separately has a saddlebag for " identification of component usability ", and the security risk factor being related to is
" concrete structure member usability ", the monitoring parameter comprising physical quantity is " the stress crack of armored concrete main member is wide
Spend (mm) ", the identity code for monitoring parameter is IDi3,j3,k3, i3 is the number of saddlebag " identification of component usability ", and j3 is safety wind
The number of dangerous factor " concrete structure member usability ", k3 are monitoring parameter " the stress crack of armored concrete main member
The number of width (mm) ".
Step 2:It is ID to determine identity codei,j,kThe corresponding additional information AX of monitoring parameteri,j,k。
The codomain section for determining and dividing monitoring parameter obtains each codomain subinterval of monitoring parameter so that monitoring parameter
Each codomain subinterval correspond to different safe classes, and provide that each safe class scores safely accordingly;By codomain sub-district
Between, the corresponding safe class in codomain subinterval and safe class it is corresponding safety scoring as monitor parameter additional information
AXi,j,k
The corresponding safe class in each codomain subinterval of monitoring parameter in step 2, can be divided into two-stage or more grade.
In the present embodiment:
Identity code is IDi1,j1,k1Monitoring parameter be " formulating each work post safe practice operating instruction " each codomain sub-district
Between be respectively [(1), (0)], the corresponding safe class in each codomain subinterval is:[meeting, do not meet], corresponding safety scoring
For [0, -10];
Identity code is IDi2,j2,k2Monitoring parameter be " load effect that steel structural rod piece section is subjected to and section resistance
Each codomain subinterval of ratio " be respectively [[1 ,+∞), [0.95,1), [0.9,0.95), (0,0.9]], each codomain
The corresponding safe class in section is [security is met the requirements of the standard, and security is slightly below standard requirement, and security does not meet mark
Alignment request, security pole are not inconsistent standardization requirement], corresponding safety scoring is [0, -3, -8, -10];
Identity code is IDi3,j3,k3Monitoring parameter it is each for " the stress fracture width (mm) of armored concrete main member "
A codomain subinterval is respectively [(0,0.15], (0.15,0.2), [0.2 ,+∞)], corresponding safety in each codomain subinterval etc.
Grade:[meeting code requirement, slightly below code requirement, do not meet code requirement], corresponding safety scoring is [0, -3, -10];To obtain the final product
It arrives:
AXi1,j1,k1={ [(1), (0)], [0, -10] };
AXi2,j2,k2=[[1 ,+∞), [0.95,1), [0.9,0.95), (0,0.9]], [0, -3, -8, -10] };
AXi3,j3,k3=[(0,0.15], (0.15,0.2), [0.2 ,+∞)], [0, -3, -10] }.
Step 3:Acquisition identity code is IDi,j,kThe corresponding safe condition ST of monitoring parameteri,j,k, safe condition STi,j,kIn
Each element represented with 1/0, the safe condition ST of two-valued function vectori,j,kIn each element corresponding monitoring parameter respectively
IDi,j,kEach codomain subinterval;Monitoring obtains monitoring parameter IDi,j,kCodomain subinterval where actual value, identity code are
IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things mesh element RFIDi,j,kIt is detected, it will
Safe condition STi,j,kIn with monitor parameter IDi,j,kThe corresponding element in codomain subinterval where actual value is arranged to 1, others
Element is arranged to 0.
Two-valued function sensing type Internet of Things mesh element is set, and acquisition identity code is IDi,j,kMonitoring parameter safe condition
STi,j,kAnd it is uploaded to server.
Internet of Things mesh element RFIDi,j,kAware switch RFID electronic label can be used, including power supply T1, memory T2, control
Device T3, logic state aware switch T4, indicating module T5, radio-frequency module T6.Using Internet of Things mesh element RFIDi,j,kObtain identity code
For IDi,j,kMonitoring parameter safe condition STi,j,k, include the following steps:
Step 3.1, power supply T1 are to memory T2, controller T3, logic state aware switch T4, indicating module T5, radio frequency
Module T6 powers;
Step 3.2, controller T2 initialization logics state aware switch T4;
It is ID that step 3.3, logic state aware switch T4, which perceive identity code,i,j,kMonitoring parameter actual value, and according to
Identity code is IDi,j,kMonitoring parameter each codomain subinterval, control logic state aware switch T4 in actual value where
The corresponding switch in codomain subinterval is logical state, and it is disconnected state that control logic state aware, which switchs other switches in T4,;
Step 3.4, controller T3 switch on-off state according to logic state aware switch T4's, and forming identity code is
IDi,j,kMonitoring parameter safe condition STi,j,k;
Step 3.5, controller T3 control indicating module T5 to show that identity code is IDi,j,kMonitoring parameter safe condition
STi,j,kCorresponding safe class;
Step 3.6, controller T3 control memories T2 deposit identity codes are IDi,j,kMonitoring parameter safe condition
STi,j,k;
For step 3.7 controller T3 according to predetermined period, it is ID that radio-frequency module T6 is controlled, which to send identity code to server,i,j,k's
Monitor the safety state information [ID of parameteri,j,k,STi,j,k]。
Definition RFID electronic label is RFIDi,j,k, it is that monitoring identity code is IDi,j,kMonitoring parameter actual value residing for
The element in codomain subinterval is ID according to the identity code of acquisitioni,j,kMonitoring parameter actual value residing for codomain subinterval, phase
It is ID to answer ground adjustment identity codei,j,kMonitoring parameter safe condition STi,j,kIn element corresponding with each codomain subinterval,
Safe condition STi,j,kIn element represented with 1/0 logical value, so as to fulfill to identity code be IDi,j,kSafe condition STi,j,k
Two-valued function digital monitoring with expression.
According to monitoring parameter classification, corresponding RFID electronic label RFID is seti,j,k, it is ID for identity codei1,j1,k1's
Monitor the monitoring parameter of parameter, a kind of corresponding RFID electronic label RFID for perceiving file and whetheing there isi1,j1,k1;It is for identity code
IDi2,j2,k2Monitoring parameter, a kind of corresponding RFID electronic label RFID for perceiving stress intensityi2,j2,k2;It is for identity code
IDi3,j3,k3Monitoring parameter, a kind of corresponding RFID electronic label RFID for perceiving fracture widthi3,j3,k3。
In the present embodiment, if identity code is IDi1,j1,k1Monitoring parameter " formulating each work post safe practice operating instruction "
Monitoring result for " having ", then its safe condition STi1,j1,k1=[1,0];Identity code is IDi2,j2,k2Monitoring parameter " steel construction
The monitoring result of the load effect and the ratio of section resistance that bar cross section is subjected to " be in [0.9,0.95) section, then its safety
State STi2,j2,k2=[0,0,1,0];Identity code is IDi3,j3,k3Monitoring parameter " stress of armored concrete main member is split
Slit width degree (mm) " is in (0.15,0.2) section, then its safe condition STi3,j3,k3=[0,1,0].
Identity code is ID by step 4, Internet of Things mesh elementi,j,kMonitoring parameter safety state information safety state information
[IDi,j,k,STi,j,k] be uploaded to server after, can with identity code be IDi,j,kThe corresponding additional information AX of monitoring parameteri,j,k、
RFID electronic label RFIDi,j,kCombination forms the identity code as IDi,j,kThe corresponding feature vector [ID of monitoring parameteri,j,k,
AXi,j,k,RFIDi,j,k,STi,j,k], a data item as safety monitoring information database;All monitoring parameters features to
Amount forms safety monitoring information database.According to the safety monitoring information database, live each monitoring parameter can be fully understanded
Safe condition, also can periodically computational item purpose general safety condition grading;In the present embodiment, parameter is monitored
IDi2,j2,k2Safe condition it is worst, it is necessary to field management intervenes, monitoring parameter IDi3,j3,k3Safe condition then need to cause note
Meaning;The overall safety scoring of three monitoring parameters is -11 points.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to
The limitation present invention, all any modification, equivalent and improvement made within the spirit and principles of the invention etc., should all include
Within protection scope of the present invention.
Claims (2)
1. the two-valued function digitizing solution of a kind of security monitoring, which is characterized in that comprise the following steps:
Step 1 decomposes project work task, obtains each saddlebag NP of project work taski, i is the number of saddlebag;Really
Surely saddlebag NP is completediCorresponding security risk factor is NWi,j, j is the number of security risk factor;Determine monitoring safety wind
Monitoring parameter needed for dangerous factor, the identity code for monitoring parameter are IDi,j,k, k is the number of monitoring parameter;
Step 2, division identity code are IDi,j,kThe codomain section of monitoring parameter obtain each codomain subinterval so that identity code
For IDi,j,kEach codomain subinterval of monitoring parameter correspond to different safe classes, and set each safe class and pacify accordingly
Full scoring;Using codomain subinterval, the corresponding safe class in codomain subinterval and the corresponding safety scoring of safe class as body
Part code is IDi,j,kMonitoring parameter additional information AXi,j,k;
Step 3, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things mesh element
RFIDi,j,kIt is detected, the safe condition ST of two-valued function vectori,j,kIn each element corresponding monitoring parameter ID respectivelyi,j,k
Each codomain subinterval;By safe condition STi,j,kIn with monitor parameter IDi,j,kCodomain subinterval where actual value corresponds to
Element be arranged to 1, other elements are arranged to 0, and acquisition identity code is IDi,j,kThe corresponding safe condition of monitoring parameter
STi,j,k;
Step 4, the identity code ID that parameter will be monitoredi,j,k, additional information AXi,j,k, Internet of Things mesh element RFIDi,j,k, safe condition
STi,j,kAs feature vector [IDi,j,k,AXi,j,k,RFIDi,j,k,STi,j,k], by feature vector [IDi,j,k,AXi,j,k,
RFIDi,j,k,STi,j,k] data item as safety monitoring information database.
A kind of 2. two-valued function digitizing solution of security monitoring according to claim 1, which is characterized in that the object
Networking elements RFIDi,j,k, including power supply T1, memory T2, controller T3, logic state aware switch T4, indicating module T5, penetrate
Frequency module T6, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things mesh element
RFIDi,j,kIt is detected and includes the following steps:
Step 3.1, power supply T1 are to memory T2, controller T3, logic state aware switch T4, indicating module T5, radio-frequency module
T6 powers;
Step 3.2, controller T2 initialization logics state aware switch T4;
It is ID that step 3.3, logic state aware switch T4, which perceive identity code,i,j,kMonitoring parameter actual value, and according to identity
Code is IDi,j,kMonitoring parameter each codomain subinterval, control logic state aware switch T4 in actual value where codomain
The corresponding switch in subinterval is logical state, and it is disconnected state that control logic state aware, which switchs other switches in T4,;
Step 3.4, controller T3 switch on-off state in logic state aware switch T4, and forming identity code is
IDi,j,kMonitoring parameter safe condition STi,j,k;
Step 3.5, controller T3 control indicating module T5 to show that identity code is IDi,j,kMonitoring parameter safe condition STi,j,k
Corresponding safe class;
Step 3.6, controller T3 control memories T2 deposit identity codes are IDi,j,kMonitoring parameter safe condition STi,j,k;
For step 3.7 controller T3 according to predetermined period, it is ID that radio-frequency module T6 is controlled, which to send identity code to server,i,j,kMonitoring
Safety state information [the ID of parameteri,j,k,STi,j,k]。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711374960.4A CN108053003A (en) | 2017-12-19 | 2017-12-19 | A kind of two-valued function digitizing solution of security monitoring |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711374960.4A CN108053003A (en) | 2017-12-19 | 2017-12-19 | A kind of two-valued function digitizing solution of security monitoring |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108053003A true CN108053003A (en) | 2018-05-18 |
Family
ID=62130000
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711374960.4A Pending CN108053003A (en) | 2017-12-19 | 2017-12-19 | A kind of two-valued function digitizing solution of security monitoring |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108053003A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722634A (en) * | 2012-04-20 | 2012-10-10 | 湖南省防雷中心 | Regional lightning disaster risk evaluation method |
CN105160383A (en) * | 2015-09-02 | 2015-12-16 | 华中科技大学 | Safety-state-monitoring early-warning type active electronic tag and method for detecting to-be-detected object by using the same |
CN106096838A (en) * | 2016-06-14 | 2016-11-09 | 广州市恒迅技防系统有限公司 | Building fire safety evaluation method based on model of fuzzy synthetic evaluation and system |
EP3098673A1 (en) * | 2015-05-27 | 2016-11-30 | PHOENIX CONTACT GmbH & Co. KG | Method and device for automated validation of security features on a modular security system |
CN106406200A (en) * | 2016-09-23 | 2017-02-15 | 华中科技大学 | Monitoring system for cascade logic gate control type active electronic tag |
CN106897812A (en) * | 2016-09-07 | 2017-06-27 | 佛山市顺德区美的电热电器制造有限公司 | The assessment method and device of electric rice cooker cooking quality |
-
2017
- 2017-12-19 CN CN201711374960.4A patent/CN108053003A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722634A (en) * | 2012-04-20 | 2012-10-10 | 湖南省防雷中心 | Regional lightning disaster risk evaluation method |
EP3098673A1 (en) * | 2015-05-27 | 2016-11-30 | PHOENIX CONTACT GmbH & Co. KG | Method and device for automated validation of security features on a modular security system |
CN105160383A (en) * | 2015-09-02 | 2015-12-16 | 华中科技大学 | Safety-state-monitoring early-warning type active electronic tag and method for detecting to-be-detected object by using the same |
CN106096838A (en) * | 2016-06-14 | 2016-11-09 | 广州市恒迅技防系统有限公司 | Building fire safety evaluation method based on model of fuzzy synthetic evaluation and system |
CN106897812A (en) * | 2016-09-07 | 2017-06-27 | 佛山市顺德区美的电热电器制造有限公司 | The assessment method and device of electric rice cooker cooking quality |
CN106406200A (en) * | 2016-09-23 | 2017-02-15 | 华中科技大学 | Monitoring system for cascade logic gate control type active electronic tag |
Non-Patent Citations (2)
Title |
---|
赵挺生: "基于施工流程的安全管理方法研究", 《中国安全科学学报》 * |
赵挺生: "工程建设安全风险动态跟踪监控实证研究", 《施工技术》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103871132A (en) | Internet management system for real-time number and positions of prison inmates and implementation method of system | |
CN105320123A (en) | Measurement and control equipment health state evaluating system and method based on online monitored data | |
CN104484909A (en) | Method and device for routing inspection point determination, interaction method and interaction device | |
CN111539563A (en) | Energy consumption safety state prediction method, device, server and storage medium | |
CN113592019A (en) | Fault detection method, device, equipment and medium based on multi-model fusion | |
CN107194823A (en) | A kind of mobile terminal agricultural monitoring method for early warning and system | |
CN112001669A (en) | Engineering material control method, system and computer storage medium | |
CN109857782A (en) | A kind of Monitor of Logging Data Processing System | |
CN115395657A (en) | Smart city monitoring method based on cloud computing | |
CN104462855A (en) | Underground structure monitoring data processing and analyzing method and device | |
CN205375178U (en) | Utilize real -time quality management system of RFID to steel pipe circulation process | |
CN107169627A (en) | A kind of electric energy meter quality management-control method and system based on augmented reality | |
CN116975990B (en) | Management method and system for three-dimensional model of oil-gas chemical engineering wharf | |
CN108053003A (en) | A kind of two-valued function digitizing solution of security monitoring | |
CN102682212B (en) | Reliability measurement method for mechanical and electrical product | |
CN204116620U (en) | Static electricity on human body's tester | |
CN109901502A (en) | Measurement method, device and the PLC for measuring work station of car body component | |
DE112016007105T9 (en) | Device and method for detecting a mileage of a tire | |
CN102928122B (en) | Equipment index information verification method and device for automatic calibration of industrial thermometer | |
KR102126954B1 (en) | Method for measuring smart sewing works and system for performing the same | |
CN104933529B (en) | Discarded tobacco shred analysis system and analysis method to cigarette list case energy consumption | |
CN103074645A (en) | Electrolytic cell detection control device | |
CN116050781A (en) | Enterprise intelligent management system based on industrial Internet | |
CN104091236A (en) | Network-based management method for chemical product quality analysis and inspection | |
CN108052995A (en) | Intelligent weighing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181225 Address after: 430074 Hubei Province, Wuhan city Hongshan District Luoyu Road No. 1037 Applicant after: Huazhong University of Science and Technology Applicant after: China Railway Shanghai Bureau Group Co., Ltd. Address before: 430074 Hubei Province, Wuhan city Hongshan District Luoyu Road No. 1037 Applicant before: Huazhong University of Science and Technology |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180518 |
|
RJ01 | Rejection of invention patent application after publication |