CN108053003A - A kind of two-valued function digitizing solution of security monitoring - Google Patents

A kind of two-valued function digitizing solution of security monitoring Download PDF

Info

Publication number
CN108053003A
CN108053003A CN201711374960.4A CN201711374960A CN108053003A CN 108053003 A CN108053003 A CN 108053003A CN 201711374960 A CN201711374960 A CN 201711374960A CN 108053003 A CN108053003 A CN 108053003A
Authority
CN
China
Prior art keywords
monitoring
monitoring parameter
codomain
parameter
subinterval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711374960.4A
Other languages
Chinese (zh)
Inventor
赵挺生
徐凯
贺凌云
张淼
蒋灵
周炜
陈露
江倩
唐菁菁
杜婷
张伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway Shanghai Group Co Ltd
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201711374960.4A priority Critical patent/CN108053003A/en
Publication of CN108053003A publication Critical patent/CN108053003A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/08Construction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • General Engineering & Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention belongs to security monitoring field, a kind of two-valued function digitizing solution of security monitoring is disclosed.By decomposing, obtaining saddlebag, security risk factor and monitoring parameter and encoding;Determine the monitoring corresponding codomain subinterval of each safe class of parameter and corresponding safe class and safe condition;Safe condition and the upload of monitoring parameter are obtained by Internet of Things mesh element.The present invention uses the safe condition of two-valued function vector, digitally safe class state residing for expression monitoring parameter.In order to realize that the measurement of the binaryzation of specifically monitored parameter and safe condition are expressed, by the corresponding codomain subinterval boundary value of monitoring parameter different safety class Hardware in corresponding Internet of Things mesh element, as default judgment rule, differentiate so as to fulfill the safe condition of front end, the two-valued function measurement of monitoring parameter safe condition can be more efficiently completed.

Description

A kind of two-valued function digitizing solution of security monitoring
Technical field
The present invention relates to security monitoring fields, and in particular to a kind of two-valued function digitizing solution of security monitoring.
Background technology
Construction project construction environment is complicated, procedure technology is various, builds up that the rear service time is long, ageing process is apparent, The security risk factor in life cycle management each stage is numerous, and traditional hand inspection appraisal procedure takes time and effort, it is difficult to meet peace The comprehensive and promptness requirement of full risk factors monitoring.Technology of Internet of things has complete perception, real-time Transmission and Intelligent treatment Characteristic, security monitoring field have significant advantage, for solve conventional security monitoring method deficiency provide support.
Electronic tag based on radio frequency discrimination RFID (Radio Frequency Identification) technology is Internet of Things One of net core equipment, the development of companion chip technology, RFID electronic label have become cheap and good-quality intelligent element.In safety Using RFID electronic label technology in monitoring, non-contactly real-time, synchronous multiple smart objects can be perceived, can effectively aided in The overall management of Field Force, equipment and goods and materials.But the application of existing RFID electronic label still has deficiency, mainly includes: 1) RFID electronic label be only capable of identification object identity information, and can not perceptive object status information, it is necessary to coordinate all kinds of biographies Sensor could monitor specific parameter value, and measurement cost is high;2) pattern of server centered management, it is desirable that a large amount of RFID electronics marks Label concurrently upload the parameter value of various different types of data, and communications cost is high;3) server process receives data, judges safe shape State, and the process of field management is fed back to, it is time-consuming, it is impossible to meet the promptness requirement of safety evaluation well.
The content of the invention
For overcome the deficiencies in the prior art, the object of the present invention is to provide a kind of two-valued function digitlization sides of security monitoring Method.Two-valued function sensing type Internet of Things mesh element can be utilized to realize security monitoring.
A kind of two-valued function digitizing solution of security monitoring, comprises the following steps:
Step 1 decomposes project work task, obtains each saddlebag NP of project work taski, i is the volume of saddlebag Number;It determines to complete saddlebag NPiCorresponding security risk factor is NWi,j, j is the number of security risk factor;Determine monitoring Monitoring parameter needed for security risk factor, the identity code for monitoring parameter are IDi,j,k, k is the number of monitoring parameter;
Step 2, division identity code are IDi,j,kThe codomain section of monitoring parameter obtain each codomain subinterval so that body Part code is IDi,j,kEach codomain subinterval of monitoring parameter correspond to different safe classes, and it is corresponding to set each safe class Safety scoring;Codomain subinterval, the corresponding safe class in codomain subinterval and the corresponding safety scoring of safe class are made It is ID for identity codei,j,kMonitoring parameter additional information AXi,j,k
Step 3, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things network element Part RFIDi,j,kIt is detected, the safe condition ST of two-valued function vectori,j,kIn each element corresponding monitoring parameter respectively IDi,j,kEach codomain subinterval;By safe condition STi,j,kIn with monitor parameter IDi,j,kCodomain subinterval where actual value Corresponding element is arranged to 1, and other elements are arranged to 0, and acquisition identity code is IDi,j,kThe corresponding safe condition of monitoring parameter STi,j,k
Step 4, the identity code ID that parameter will be monitoredi,j,k, additional information AXi,j,k, Internet of Things mesh element RFIDi,j,k, safe shape State STi,j,kAs feature vector [IDi,j,k,AXi,j,k,RFIDi,j,k,STi,j,k], by feature vector [IDi,j,k,AXi,j,k, RFIDi,j,k,STi,j,k] data item as safety monitoring information database.
Internet of Things mesh element RFID as described abovei,j,k, perceived including power supply T1, memory T2, controller T3, logic state Switch T4, indicating module T5, radio-frequency module T6, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval lead to Cross corresponding Internet of Things mesh element RFIDi,j,kIt is detected and includes the following steps:
Step 3.1, power supply T1 are to memory T2, controller T3, logic state aware switch T4, indicating module T5, radio frequency Module T6 powers;
Step 3.2, controller T2 initialization logics state aware switch T4;
It is ID that step 3.3, logic state aware switch T4, which perceive identity code,i,j,kMonitoring parameter actual value, and according to Identity code is IDi,j,kMonitoring parameter each codomain subinterval, control logic state aware switch T4 in actual value where The corresponding switch in codomain subinterval is logical state, and it is disconnected state that control logic state aware, which switchs other switches in T4,;
Step 3.4, controller T3 switch on-off state in logic state aware switch T4, and forming identity code is IDi,j,kMonitoring parameter safe condition STi,j,k
Step 3.5, controller T3 control indicating module T5 to show that identity code is IDi,j,kMonitoring parameter safe condition STi,j,kCorresponding safe class;
Step 3.6, controller T3 control memories T2 deposit identity codes are IDi,j,kMonitoring parameter safe condition STi,j,k
For step 3.7 controller T3 according to predetermined period, it is ID that radio-frequency module T6 is controlled, which to send identity code to server,i,j,k's Monitor the safety state information [ID of parameteri,j,k,STi,j,k]。
The present invention overcomes deficiencies present in previous security monitoring, and specifically, advantage is as follows:
First, the accurate value of monitoring parameter need not be measured, it is only necessary to judge monitoring parameter and the relativeness in codomain subinterval, The safe condition of i.e. evaluable monitoring parameter, reduces measurement cost, has unified upload data type, improved communication and processing Efficiency.
2nd, monitoring point can directly acquire safe class at the scene, without calculating safe class by server, realize Front end safety evaluation, improves promptness.
3rd, using the safe condition of two-valued function vector, digitally expression monitors safe class state residing for parameter.
4th, in order to realize that the measurement of the binaryzation of specifically monitored parameter and safe condition are expressed, by the monitoring parameter not TongAn The corresponding codomain subinterval boundary value Hardware in corresponding Internet of Things mesh element of congruent grade, as default judgment rule, so as to It realizes that the safe condition of front end differentiates, the two-valued function measurement of monitoring parameter safe condition can be more efficiently completed.
Description of the drawings
Fig. 1 is the implementation steps schematic diagram of inventive method;
Fig. 2 is that parameter identification and coding flow chart are monitored in example;
Fig. 3 is the structure diagram of Internet of Things mesh element in example.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.
The content of the present embodiment is application of the present invention in construction-engineering project security monitoring, step as shown in Fig. 2, Specific embodiment is as follows.
Step 1:Disintegration content, identification monitoring parameter simultaneously encode.
WBS (Work Breakdown Structure) method can be utilized, is successively decomposed in chronological order, from top to bottom Project work task obtains minimum deliverable achievement as saddlebag, and definition saddlebag is NPi, i is the number of saddlebag;Know All kinds of security risk factors that Wan Cheng be involved by saddlebag this process, it is NW to define security risk factori,j, j is safety wind The number of dangerous factor;Monitoring parameter needed for analysis monitoring security risk factor, the identity code of definition monitoring parameter is IDi,j,k, k is The number of parameter is monitored, as shown in Figure 3.
Parameter is monitored described in step 1, can be physical quantity or non-physical quantities.
In the present embodiment, identify:
1) Projects during Construction Stage has saddlebag for " safety management ", and the security risk factor being related to is " safety responsibility System ", the monitoring parameter comprising non-physical quantities are " formulating each work post safe practice operating instruction ", and the identity code for monitoring parameter is IDi1,j1,k1, i1 be saddlebag " safety management " number, j1 be security risk factor " system of responsibility in safe production " number, k1 For the number of monitoring parameter " formulating each work post safe practice operating instruction ".
2) Project in Operation maintenance phase has saddlebag for " component security authentication ", and the security risk factor being related to is " steel Structural elements security ", the monitoring parameter comprising physical quantity are the " load effect and section resistance that steel structural rod piece section is subjected to Ratio ", monitor parameter identity code be IDi2,j2,k2, i2 is the number of saddlebag " component security authentication ", and j2 is safety wind The number of dangerous factor " steel structure member security ", k2 are that " load effect that steel structural rod piece section is subjected to is with cutting for monitoring parameter The number of the ratio of face drag ".
3) Project in Operation maintenance phase separately has a saddlebag for " identification of component usability ", and the security risk factor being related to is " concrete structure member usability ", the monitoring parameter comprising physical quantity is " the stress crack of armored concrete main member is wide Spend (mm) ", the identity code for monitoring parameter is IDi3,j3,k3, i3 is the number of saddlebag " identification of component usability ", and j3 is safety wind The number of dangerous factor " concrete structure member usability ", k3 are monitoring parameter " the stress crack of armored concrete main member The number of width (mm) ".
Step 2:It is ID to determine identity codei,j,kThe corresponding additional information AX of monitoring parameteri,j,k
The codomain section for determining and dividing monitoring parameter obtains each codomain subinterval of monitoring parameter so that monitoring parameter Each codomain subinterval correspond to different safe classes, and provide that each safe class scores safely accordingly;By codomain sub-district Between, the corresponding safe class in codomain subinterval and safe class it is corresponding safety scoring as monitor parameter additional information AXi,j,k
The corresponding safe class in each codomain subinterval of monitoring parameter in step 2, can be divided into two-stage or more grade. In the present embodiment:
Identity code is IDi1,j1,k1Monitoring parameter be " formulating each work post safe practice operating instruction " each codomain sub-district Between be respectively [(1), (0)], the corresponding safe class in each codomain subinterval is:[meeting, do not meet], corresponding safety scoring For [0, -10];
Identity code is IDi2,j2,k2Monitoring parameter be " load effect that steel structural rod piece section is subjected to and section resistance Each codomain subinterval of ratio " be respectively [[1 ,+∞), [0.95,1), [0.9,0.95), (0,0.9]], each codomain The corresponding safe class in section is [security is met the requirements of the standard, and security is slightly below standard requirement, and security does not meet mark Alignment request, security pole are not inconsistent standardization requirement], corresponding safety scoring is [0, -3, -8, -10];
Identity code is IDi3,j3,k3Monitoring parameter it is each for " the stress fracture width (mm) of armored concrete main member " A codomain subinterval is respectively [(0,0.15], (0.15,0.2), [0.2 ,+∞)], corresponding safety in each codomain subinterval etc. Grade:[meeting code requirement, slightly below code requirement, do not meet code requirement], corresponding safety scoring is [0, -3, -10];To obtain the final product It arrives:
AXi1,j1,k1={ [(1), (0)], [0, -10] };
AXi2,j2,k2=[[1 ,+∞), [0.95,1), [0.9,0.95), (0,0.9]], [0, -3, -8, -10] };
AXi3,j3,k3=[(0,0.15], (0.15,0.2), [0.2 ,+∞)], [0, -3, -10] }.
Step 3:Acquisition identity code is IDi,j,kThe corresponding safe condition ST of monitoring parameteri,j,k, safe condition STi,j,kIn Each element represented with 1/0, the safe condition ST of two-valued function vectori,j,kIn each element corresponding monitoring parameter respectively IDi,j,kEach codomain subinterval;Monitoring obtains monitoring parameter IDi,j,kCodomain subinterval where actual value, identity code are IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things mesh element RFIDi,j,kIt is detected, it will Safe condition STi,j,kIn with monitor parameter IDi,j,kThe corresponding element in codomain subinterval where actual value is arranged to 1, others Element is arranged to 0.
Two-valued function sensing type Internet of Things mesh element is set, and acquisition identity code is IDi,j,kMonitoring parameter safe condition STi,j,kAnd it is uploaded to server.
Internet of Things mesh element RFIDi,j,kAware switch RFID electronic label can be used, including power supply T1, memory T2, control Device T3, logic state aware switch T4, indicating module T5, radio-frequency module T6.Using Internet of Things mesh element RFIDi,j,kObtain identity code For IDi,j,kMonitoring parameter safe condition STi,j,k, include the following steps:
Step 3.1, power supply T1 are to memory T2, controller T3, logic state aware switch T4, indicating module T5, radio frequency Module T6 powers;
Step 3.2, controller T2 initialization logics state aware switch T4;
It is ID that step 3.3, logic state aware switch T4, which perceive identity code,i,j,kMonitoring parameter actual value, and according to Identity code is IDi,j,kMonitoring parameter each codomain subinterval, control logic state aware switch T4 in actual value where The corresponding switch in codomain subinterval is logical state, and it is disconnected state that control logic state aware, which switchs other switches in T4,;
Step 3.4, controller T3 switch on-off state according to logic state aware switch T4's, and forming identity code is IDi,j,kMonitoring parameter safe condition STi,j,k
Step 3.5, controller T3 control indicating module T5 to show that identity code is IDi,j,kMonitoring parameter safe condition STi,j,kCorresponding safe class;
Step 3.6, controller T3 control memories T2 deposit identity codes are IDi,j,kMonitoring parameter safe condition STi,j,k
For step 3.7 controller T3 according to predetermined period, it is ID that radio-frequency module T6 is controlled, which to send identity code to server,i,j,k's Monitor the safety state information [ID of parameteri,j,k,STi,j,k]。
Definition RFID electronic label is RFIDi,j,k, it is that monitoring identity code is IDi,j,kMonitoring parameter actual value residing for The element in codomain subinterval is ID according to the identity code of acquisitioni,j,kMonitoring parameter actual value residing for codomain subinterval, phase It is ID to answer ground adjustment identity codei,j,kMonitoring parameter safe condition STi,j,kIn element corresponding with each codomain subinterval, Safe condition STi,j,kIn element represented with 1/0 logical value, so as to fulfill to identity code be IDi,j,kSafe condition STi,j,k Two-valued function digital monitoring with expression.
According to monitoring parameter classification, corresponding RFID electronic label RFID is seti,j,k, it is ID for identity codei1,j1,k1's Monitor the monitoring parameter of parameter, a kind of corresponding RFID electronic label RFID for perceiving file and whetheing there isi1,j1,k1;It is for identity code IDi2,j2,k2Monitoring parameter, a kind of corresponding RFID electronic label RFID for perceiving stress intensityi2,j2,k2;It is for identity code IDi3,j3,k3Monitoring parameter, a kind of corresponding RFID electronic label RFID for perceiving fracture widthi3,j3,k3
In the present embodiment, if identity code is IDi1,j1,k1Monitoring parameter " formulating each work post safe practice operating instruction " Monitoring result for " having ", then its safe condition STi1,j1,k1=[1,0];Identity code is IDi2,j2,k2Monitoring parameter " steel construction The monitoring result of the load effect and the ratio of section resistance that bar cross section is subjected to " be in [0.9,0.95) section, then its safety State STi2,j2,k2=[0,0,1,0];Identity code is IDi3,j3,k3Monitoring parameter " stress of armored concrete main member is split Slit width degree (mm) " is in (0.15,0.2) section, then its safe condition STi3,j3,k3=[0,1,0].
Identity code is ID by step 4, Internet of Things mesh elementi,j,kMonitoring parameter safety state information safety state information [IDi,j,k,STi,j,k] be uploaded to server after, can with identity code be IDi,j,kThe corresponding additional information AX of monitoring parameteri,j,k、 RFID electronic label RFIDi,j,kCombination forms the identity code as IDi,j,kThe corresponding feature vector [ID of monitoring parameteri,j,k, AXi,j,k,RFIDi,j,k,STi,j,k], a data item as safety monitoring information database;All monitoring parameters features to Amount forms safety monitoring information database.According to the safety monitoring information database, live each monitoring parameter can be fully understanded Safe condition, also can periodically computational item purpose general safety condition grading;In the present embodiment, parameter is monitored IDi2,j2,k2Safe condition it is worst, it is necessary to field management intervenes, monitoring parameter IDi3,j3,k3Safe condition then need to cause note Meaning;The overall safety scoring of three monitoring parameters is -11 points.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to The limitation present invention, all any modification, equivalent and improvement made within the spirit and principles of the invention etc., should all include Within protection scope of the present invention.

Claims (2)

1. the two-valued function digitizing solution of a kind of security monitoring, which is characterized in that comprise the following steps:
Step 1 decomposes project work task, obtains each saddlebag NP of project work taski, i is the number of saddlebag;Really Surely saddlebag NP is completediCorresponding security risk factor is NWi,j, j is the number of security risk factor;Determine monitoring safety wind Monitoring parameter needed for dangerous factor, the identity code for monitoring parameter are IDi,j,k, k is the number of monitoring parameter;
Step 2, division identity code are IDi,j,kThe codomain section of monitoring parameter obtain each codomain subinterval so that identity code For IDi,j,kEach codomain subinterval of monitoring parameter correspond to different safe classes, and set each safe class and pacify accordingly Full scoring;Using codomain subinterval, the corresponding safe class in codomain subinterval and the corresponding safety scoring of safe class as body Part code is IDi,j,kMonitoring parameter additional information AXi,j,k
Step 3, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things mesh element RFIDi,j,kIt is detected, the safe condition ST of two-valued function vectori,j,kIn each element corresponding monitoring parameter ID respectivelyi,j,k Each codomain subinterval;By safe condition STi,j,kIn with monitor parameter IDi,j,kCodomain subinterval where actual value corresponds to Element be arranged to 1, other elements are arranged to 0, and acquisition identity code is IDi,j,kThe corresponding safe condition of monitoring parameter STi,j,k
Step 4, the identity code ID that parameter will be monitoredi,j,k, additional information AXi,j,k, Internet of Things mesh element RFIDi,j,k, safe condition STi,j,kAs feature vector [IDi,j,k,AXi,j,k,RFIDi,j,k,STi,j,k], by feature vector [IDi,j,k,AXi,j,k, RFIDi,j,k,STi,j,k] data item as safety monitoring information database.
A kind of 2. two-valued function digitizing solution of security monitoring according to claim 1, which is characterized in that the object Networking elements RFIDi,j,k, including power supply T1, memory T2, controller T3, logic state aware switch T4, indicating module T5, penetrate Frequency module T6, identity code IDi,j,kMonitoring parameter actual value where codomain subinterval pass through corresponding Internet of Things mesh element RFIDi,j,kIt is detected and includes the following steps:
Step 3.1, power supply T1 are to memory T2, controller T3, logic state aware switch T4, indicating module T5, radio-frequency module T6 powers;
Step 3.2, controller T2 initialization logics state aware switch T4;
It is ID that step 3.3, logic state aware switch T4, which perceive identity code,i,j,kMonitoring parameter actual value, and according to identity Code is IDi,j,kMonitoring parameter each codomain subinterval, control logic state aware switch T4 in actual value where codomain The corresponding switch in subinterval is logical state, and it is disconnected state that control logic state aware, which switchs other switches in T4,;
Step 3.4, controller T3 switch on-off state in logic state aware switch T4, and forming identity code is IDi,j,kMonitoring parameter safe condition STi,j,k
Step 3.5, controller T3 control indicating module T5 to show that identity code is IDi,j,kMonitoring parameter safe condition STi,j,k Corresponding safe class;
Step 3.6, controller T3 control memories T2 deposit identity codes are IDi,j,kMonitoring parameter safe condition STi,j,k
For step 3.7 controller T3 according to predetermined period, it is ID that radio-frequency module T6 is controlled, which to send identity code to server,i,j,kMonitoring Safety state information [the ID of parameteri,j,k,STi,j,k]。
CN201711374960.4A 2017-12-19 2017-12-19 A kind of two-valued function digitizing solution of security monitoring Pending CN108053003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711374960.4A CN108053003A (en) 2017-12-19 2017-12-19 A kind of two-valued function digitizing solution of security monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711374960.4A CN108053003A (en) 2017-12-19 2017-12-19 A kind of two-valued function digitizing solution of security monitoring

Publications (1)

Publication Number Publication Date
CN108053003A true CN108053003A (en) 2018-05-18

Family

ID=62130000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711374960.4A Pending CN108053003A (en) 2017-12-19 2017-12-19 A kind of two-valued function digitizing solution of security monitoring

Country Status (1)

Country Link
CN (1) CN108053003A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102722634A (en) * 2012-04-20 2012-10-10 湖南省防雷中心 Regional lightning disaster risk evaluation method
CN105160383A (en) * 2015-09-02 2015-12-16 华中科技大学 Safety-state-monitoring early-warning type active electronic tag and method for detecting to-be-detected object by using the same
CN106096838A (en) * 2016-06-14 2016-11-09 广州市恒迅技防系统有限公司 Building fire safety evaluation method based on model of fuzzy synthetic evaluation and system
EP3098673A1 (en) * 2015-05-27 2016-11-30 PHOENIX CONTACT GmbH & Co. KG Method and device for automated validation of security features on a modular security system
CN106406200A (en) * 2016-09-23 2017-02-15 华中科技大学 Monitoring system for cascade logic gate control type active electronic tag
CN106897812A (en) * 2016-09-07 2017-06-27 佛山市顺德区美的电热电器制造有限公司 The assessment method and device of electric rice cooker cooking quality

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102722634A (en) * 2012-04-20 2012-10-10 湖南省防雷中心 Regional lightning disaster risk evaluation method
EP3098673A1 (en) * 2015-05-27 2016-11-30 PHOENIX CONTACT GmbH & Co. KG Method and device for automated validation of security features on a modular security system
CN105160383A (en) * 2015-09-02 2015-12-16 华中科技大学 Safety-state-monitoring early-warning type active electronic tag and method for detecting to-be-detected object by using the same
CN106096838A (en) * 2016-06-14 2016-11-09 广州市恒迅技防系统有限公司 Building fire safety evaluation method based on model of fuzzy synthetic evaluation and system
CN106897812A (en) * 2016-09-07 2017-06-27 佛山市顺德区美的电热电器制造有限公司 The assessment method and device of electric rice cooker cooking quality
CN106406200A (en) * 2016-09-23 2017-02-15 华中科技大学 Monitoring system for cascade logic gate control type active electronic tag

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
赵挺生: "基于施工流程的安全管理方法研究", 《中国安全科学学报》 *
赵挺生: "工程建设安全风险动态跟踪监控实证研究", 《施工技术》 *

Similar Documents

Publication Publication Date Title
CN103871132A (en) Internet management system for real-time number and positions of prison inmates and implementation method of system
CN105320123A (en) Measurement and control equipment health state evaluating system and method based on online monitored data
CN104484909A (en) Method and device for routing inspection point determination, interaction method and interaction device
CN111539563A (en) Energy consumption safety state prediction method, device, server and storage medium
CN113592019A (en) Fault detection method, device, equipment and medium based on multi-model fusion
CN107194823A (en) A kind of mobile terminal agricultural monitoring method for early warning and system
CN112001669A (en) Engineering material control method, system and computer storage medium
CN109857782A (en) A kind of Monitor of Logging Data Processing System
CN115395657A (en) Smart city monitoring method based on cloud computing
CN104462855A (en) Underground structure monitoring data processing and analyzing method and device
CN205375178U (en) Utilize real -time quality management system of RFID to steel pipe circulation process
CN107169627A (en) A kind of electric energy meter quality management-control method and system based on augmented reality
CN116975990B (en) Management method and system for three-dimensional model of oil-gas chemical engineering wharf
CN108053003A (en) A kind of two-valued function digitizing solution of security monitoring
CN102682212B (en) Reliability measurement method for mechanical and electrical product
CN204116620U (en) Static electricity on human body's tester
CN109901502A (en) Measurement method, device and the PLC for measuring work station of car body component
DE112016007105T9 (en) Device and method for detecting a mileage of a tire
CN102928122B (en) Equipment index information verification method and device for automatic calibration of industrial thermometer
KR102126954B1 (en) Method for measuring smart sewing works and system for performing the same
CN104933529B (en) Discarded tobacco shred analysis system and analysis method to cigarette list case energy consumption
CN103074645A (en) Electrolytic cell detection control device
CN116050781A (en) Enterprise intelligent management system based on industrial Internet
CN104091236A (en) Network-based management method for chemical product quality analysis and inspection
CN108052995A (en) Intelligent weighing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20181225

Address after: 430074 Hubei Province, Wuhan city Hongshan District Luoyu Road No. 1037

Applicant after: Huazhong University of Science and Technology

Applicant after: China Railway Shanghai Bureau Group Co., Ltd.

Address before: 430074 Hubei Province, Wuhan city Hongshan District Luoyu Road No. 1037

Applicant before: Huazhong University of Science and Technology

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20180518

RJ01 Rejection of invention patent application after publication