CN110717731A - Safety inspection problem tracking closed loop system - Google Patents
Safety inspection problem tracking closed loop system Download PDFInfo
- Publication number
- CN110717731A CN110717731A CN201910944412.3A CN201910944412A CN110717731A CN 110717731 A CN110717731 A CN 110717731A CN 201910944412 A CN201910944412 A CN 201910944412A CN 110717731 A CN110717731 A CN 110717731A
- Authority
- CN
- China
- Prior art keywords
- module
- auditing
- verification
- rectification
- inspection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 40
- 238000012795 verification Methods 0.000 claims abstract description 47
- 238000000034 method Methods 0.000 claims abstract description 41
- 230000006872 improvement Effects 0.000 claims abstract description 10
- 238000007619 statistical method Methods 0.000 claims abstract description 10
- 230000005540 biological transmission Effects 0.000 claims abstract description 7
- 238000012545 processing Methods 0.000 claims abstract description 7
- 238000012986 modification Methods 0.000 claims abstract description 6
- 230000004048 modification Effects 0.000 claims abstract description 6
- 230000009189 diving Effects 0.000 claims abstract description 4
- 238000005065 mining Methods 0.000 claims abstract description 4
- 230000008569 process Effects 0.000 claims description 19
- 238000007726 management method Methods 0.000 claims description 17
- 238000012937 correction Methods 0.000 claims description 15
- 238000012550 audit Methods 0.000 claims description 9
- 239000003999 initiator Substances 0.000 claims description 6
- 230000007547 defect Effects 0.000 claims description 4
- 230000005856 abnormality Effects 0.000 claims description 3
- 238000009412 basement excavation Methods 0.000 claims description 3
- 238000004880 explosion Methods 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 claims description 3
- 239000000463 material Substances 0.000 claims description 3
- 230000000737 periodic effect Effects 0.000 claims description 3
- 238000013461 design Methods 0.000 abstract description 3
- 230000008859 change Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Economics (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a safety inspection problem tracking closed loop system, which is characterized in that: the system comprises an inspection module, a registration module, an auditing module, a division module, an rectification module, a verification module, an external remote transmission reporting module, a data processing module, an auditing module, a sharing module, a statistical analysis module and a mining and diving efficiency improvement module. According to the invention, each module is independent, so that the accuracy of data is ensured; the system background modification authority and other actions are recorded and can be checked; the verifier is independently arranged, so that the verification information is guaranteed to be just and accurate; the statistical scoring formula in the auditing link is uniformly set and cannot be changed, so that the fair and objective scoring is ensured; by combining the existing reward and punishment and assessment methods, the working enthusiasm can be further improved, and the safety management is promoted to be developed well; the two ends of the operation flow of the system are discovery and verification links, and the middle is a parallel and parallel rectification link, so that the control of each link is facilitated; the method is suitable for the role design of the existing enterprises, is convenient for problem reporting, tracking and closing, and improves the working efficiency.
Description
Technical Field
The invention relates to the technical field of Internet of things and big data, in particular to a security inspection problem tracking closed-loop system based on the Internet of things and big data technology.
Background
Most of the existing similar enterprises still check and track the hidden danger checking work in a safety check table form. The existing similar systems are required to be re-developed based on a whole set of systems, and the system only needs to integrate the existing OA platform of the enterprise. The existing patent does not combine the actual conditions of enterprises and organizational structure design, and the practicability is not outstanding.
Disclosure of Invention
The invention aims to solve the technical problem of providing a safety inspection problem tracking closed-loop system aiming at the defects of the prior art.
The technical problem to be solved by the present invention is achieved by the following technical means.
The invention provides a safety inspection problem tracking closed loop system, which is characterized in that: the system comprises an inspection module, a registration module, an auditing module, a division module, an rectification module, a verification module, an external remote transmission reporting module, a data processing module, an auditing module, a sharing module, a statistical analysis module and a mining and diving efficiency improvement module;
the inspection module collects potential safety hazards through inspection; the registration module registers the collected potential safety hazard data; the auditing module is used for auditing the potential safety hazard; the division module automatically distributes the correction specialties and the responsible persons by utilizing each speciality and responsible person set by the system, and the system sends out a correction notice; the rectification module is used for uploading rectification information to each rectification professional and recording the rectification information; the verification module is used for sending a verification prompt to a verifier and recording the verification condition of the verifier; the external remote transmission reporting module is used for disclosing and reporting hidden troubles and rectification and modification conditions of an enterprise to a superior department, and data is transmitted by the host in real time and is used for ensuring notarization credibility of the whole process; the data processing module is used as a database of the system and used for recording information of all nodes in the whole process and rules among all processes, has a plurality of backups, cannot be modified and is used for ensuring the reality and reliability of data; the auditing module is independent of all modules, is used for auditing the work of all role personnel, auditing a team and auditing the operation condition of the system, and leads out data to a related performance assessment system: the sharing module utilizes the internet to disclose hidden danger discovery, tracking completion conditions and audit records on an OA platform for public notice; the statistical analysis module: the existing data in the system is subjected to statistical analysis, the trend and the defects of the safety state are analyzed from the aspects of human, machine, material, method and ring, and data support is provided for the improvement of all aspects; the potential excavation and synergy module is combined with data analyzed by the system, and corresponding corrective measures and improvement methods are analyzed by using HAZOP or JHA combined with actual experience of managers and operators aiming at typical hidden dangers or frequent hidden dangers.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: the inspection module comprises an inspection part and a special inspection part, the special inspection part comprises problems randomly found in daily work, the special inspection part comprises inspection and periodic inspection, and inspection personnel can wear the anti-explosion mobile phone for recording and positioning hidden dangers.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: the registration module is divided into a mobile terminal and a PC terminal, and the specific use method is as follows: the problem found by each employee in daily work and examination is logged in the OA management platform through the PC end or the mobile end to be recorded into the system, and after the problem is submitted, the system can record the information completely and form a unique code, so that the problem is convenient to distinguish.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: the auditing module is divided into a mobile terminal and a PC terminal, and the specific use method comprises the following steps: after the initiator submits, the initiator carries out examination and approval by a linear leader: team member-team leader; engineer/technician-master engineer; the linear leader conducts the examination and verification on whether the problems are real or not, whether the filling is correct or not and the like, the problems are submitted to the second examination and verification after agreement, the owner and the master engineers of the location of each device are responsible for the second examination and verification of the device and the severity (general and important) of the problems, and if the problems are important, the examination and verification processes are automatically collected to the general manager for examination and approval; and (5) carrying out third-step auditing after the rectification is finished, wherein a master engineer or a responsible person of the place where the problem is located receives a reminder to be dealt with: the problem is rectified and a verifier needs to be assigned.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: the specific use method of the rectification module comprises the following steps: after receiving the reminding of finishing to be done, the professional in charge of finishing logs on an OA management platform through a PC end or a mobile end to check the problem condition, inputs a problem finishing scheme in the system according to the actual condition and predicts finishing time; after the correction is completed, the correction completion condition and the related data of the correction are uploaded to the system.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: the specific use method of the verification module comprises the following steps: the presenter directly receives the verification to-be-handled prompt and directly verifies the prompt or a home master engineer designates another verifier different from the truer in the system; and (4) verifying the on-site verification by a verifier, and logging in the OA management platform to submit the verification condition through the PC end or the mobile end if no problem exists.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: after the whole rectification process is finished, the system automatically judges that the hidden danger is closed; if the examination in the second step or the examination in the third step is judged to be 'disagreement', the hidden danger of the vocabulary entry is rejected, and the system directly judges to be closed; if any link in the process is not finished, the system judges the hidden trouble as going on.
The invention further discloses a safety hidden danger closed-loop management system, which adopts the following preferable technical scheme: in the audit of each role personnel work, the role personnel have: discovery and verification personnel, professional rectification personnel and auditors; setting a grading formula: the number of the discovered and reported articles of the discovery personnel is scored so as to improve the number of the discovered and reported articles; the closed loop verification quantity is scored, and a discoverer is encouraged to actively track the progress of completion of the hidden danger reported by the discoverer; each professional rectification personnel counts the number and completion rate of rectification completed by each professional responsible person, and encourages each professional to rectify the hidden danger; the auditor counts the auditing accuracy of the auditor, encourages correct auditing and improves the working efficiency; in the auditing of the team, the working conditions of each professional team are analyzed in combination with the auditing of personnel, and the auditing of the team is scored; in the audit of the system operation condition, whether the system operation condition is normal or not is efficiently audited, the number and frequency of the system abnormality occurrence are counted and scored, and the system reliability and the maintenance efficiency are improved.
The invention further preferably adopts the following technical scheme:
compared with the prior art, the invention has the following advantages: (1) the safety characteristics of each module are as follows: each module is an independent system, and manual data modification and flow intervention are forbidden; in order to protect the legal accuracy of system data, each user account is independently set and bound with private accounts such as WeChat to prevent generation and random filling. The system background only has the authority to enter the company information department administrator, and the actions of system modification authority change and the like are all checked by process records; the verifier is independently arranged, so that the verifier is different from the rectification professional, and the verification information is fair and accurate; the statistical scoring formula in the auditing link is uniformly set and cannot be changed, so that the interference of subjective factors of artificial scoring is prevented, and the fair and objective scoring is ensured; by combining the existing reward and punishment and assessment methods, the working enthusiasm can be further improved, and the safety management is promoted to be developed well. (2) The operation flow is characterized in that: the two ends of the operation flow of the system are a discovery and verification link, and the middle is a parallel and parallel rectification link; the olive-shaped distribution is adopted, and the two sides are tightened, so that the control of each link is facilitated; the method is suitable for the role design of the existing enterprises, is convenient for problem reporting, tracking and closing, and improves the working efficiency.
Drawings
FIG. 1 is a schematic structural view of the present invention;
FIG. 2 is a flow chart of the system of the present invention.
Detailed Description
The following further describes particular embodiments of the present invention to facilitate further understanding of the present invention by those skilled in the art, and does not constitute a limitation to the right thereof.
Embodiment 1, the present invention provides a security check problem tracking closed-loop system, which is characterized in that: the system comprises an inspection module, a registration module, an auditing module, a division module, an rectification module, a verification module, an external remote transmission reporting module, a data processing module, an auditing module, a sharing module, a statistical analysis module and a mining and diving efficiency improvement module;
the inspection module collects potential safety hazards through inspection; the registration module registers the collected potential safety hazard data; the auditing module is used for auditing the potential safety hazard; the division module automatically distributes the correction specialties and the responsible persons by utilizing each speciality and responsible person set by the system, and the system sends out a correction notice; the rectification module is used for uploading rectification information to each rectification professional and recording the rectification information; the verification module is used for sending a verification prompt to a verifier and recording the verification condition of the verifier; the external remote transmission reporting module is used for disclosing and reporting hidden troubles and rectification and modification conditions of an enterprise to a superior department, and data is transmitted by the host in real time and is used for ensuring notarization credibility of the whole process; the data processing module is used as a database of the system and used for recording information of all nodes in the whole process and rules among all processes, has a plurality of backups, cannot be modified and is used for ensuring the reality and reliability of data; the auditing module is independent of all modules, is used for auditing the work of all role personnel, auditing a team and auditing the operation condition of the system, and leads out data to a related performance assessment system: the sharing module utilizes the internet to disclose hidden danger discovery, tracking completion conditions and audit records on an OA platform for public notice; the statistical analysis module: the existing data in the system is subjected to statistical analysis, the trend and the defects of the safety state are analyzed from the aspects of human, machine, material, method and ring, and data support is provided for the improvement of all aspects; the potential excavation and synergy module is combined with data analyzed by the system, and corresponding corrective measures and improvement methods are analyzed by using HAZOP or JHA combined with actual experience of managers and operators aiming at typical hidden dangers or frequent hidden dangers.
The inspection module comprises an inspection part and a special inspection part, the special inspection part comprises problems randomly found in daily work, the special inspection part comprises inspection and periodic inspection, and inspection personnel can wear the anti-explosion mobile phone for recording and positioning hidden dangers.
The registration module is divided into a mobile terminal and a PC terminal, and the specific use method is as follows: the problem found by each employee in daily work and examination is logged in the OA management platform through the PC end or the mobile end to be recorded into the system, and after the problem is submitted, the system can record the information completely and form a unique code, so that the problem is convenient to distinguish.
The auditing module is divided into a mobile terminal and a PC terminal, and the specific use method comprises the following steps: after the initiator submits, the initiator carries out examination and approval by a linear leader: team member-team leader; engineer/technician-master engineer; the linear leader conducts the examination and verification on whether the problems are real or not, whether the filling is correct or not and the like, the problems are submitted to the second examination and verification after agreement, the owner and the master engineers of the location of each device are responsible for the second examination and verification of the device and the severity (general and important) of the problems, and if the problems are important, the examination and verification processes are automatically collected to the general manager for examination and approval; and (5) carrying out third-step auditing after the rectification is finished, wherein a master engineer or a responsible person of the place where the problem is located receives a reminder to be dealt with: the problem is rectified and a verifier needs to be assigned.
The specific use method of the rectification module comprises the following steps: after receiving the reminding of finishing to be done, the professional in charge of finishing logs on an OA management platform through a PC end or a mobile end to check the problem condition, inputs a problem finishing scheme in the system according to the actual condition and predicts finishing time; after the correction is completed, the correction completion condition and the related data of the correction are uploaded to the system.
The specific use method of the verification module comprises the following steps: the presenter directly receives the verification to-be-handled prompt and directly verifies the prompt or a home master engineer designates another verifier different from the truer in the system; and (4) verifying the on-site verification by a verifier, and logging in the OA management platform to submit the verification condition through the PC end or the mobile end if no problem exists.
After the whole rectification process is finished, the system automatically judges that the hidden danger is closed; if the examination in the second step or the examination in the third step is judged to be 'disagreement', the hidden danger of the vocabulary entry is rejected, and the system directly judges to be closed; if any link in the process is not finished, the system judges the hidden trouble as going on.
In the audit of each role personnel work, the role personnel have: discovery and verification personnel, professional rectification personnel and auditors; setting a grading formula: the number of the discovered and reported articles of the discovery personnel is scored so as to improve the number of the discovered and reported articles; the closed loop verification quantity is scored, and a discoverer is encouraged to actively track the progress of completion of the hidden danger reported by the discoverer; each professional rectification personnel counts the number and completion rate of rectification completed by each professional responsible person, and encourages each professional to rectify the hidden danger; the auditor counts the auditing accuracy of the auditor, encourages correct auditing and improves the working efficiency; in the auditing of the team, the working conditions of each professional team are analyzed in combination with the auditing of personnel, and the auditing of the team is scored; in the audit of the system operation condition, whether the system operation condition is normal or not is efficiently audited, the number and frequency of the system abnormality occurrence are counted and scored, and the system reliability and the maintenance efficiency are improved.
Claims (8)
1. A security check problem tracking closed loop system, comprising: the system comprises an inspection module, a registration module, an auditing module, a division module, an rectification module, a verification module, an external remote transmission reporting module, a data processing module, an auditing module, a sharing module, a statistical analysis module and a mining and diving efficiency improvement module;
the inspection module collects potential safety hazards through inspection; the registration module registers the collected potential safety hazard data; the auditing module is used for auditing the potential safety hazard; the division module automatically distributes the correction specialties and the responsible persons by utilizing each speciality and responsible person set by the system, and the system sends out a correction notice; the rectification module is used for uploading rectification information to each rectification professional and recording the rectification information; the verification module is used for sending a verification prompt to a verifier and recording the verification condition of the verifier; the external remote transmission reporting module is used for disclosing and reporting hidden troubles and rectification and modification conditions of an enterprise to a superior department, and data is transmitted by the host in real time and is used for ensuring notarization credibility of the whole process; the data processing module is used as a database of the system and used for recording information of all nodes in the whole process and rules among all processes, has a plurality of backups, cannot be modified and is used for ensuring the reality and reliability of data; the auditing module is independent of all modules, is used for auditing the work of all role personnel, auditing a team and auditing the operation condition of the system, and leads out data to a related performance assessment system: the sharing module utilizes the internet to disclose hidden danger discovery, tracking completion conditions and audit records on an OA platform for public notice; the statistical analysis module: the existing data in the system is subjected to statistical analysis, the trend and the defects of the safety state are analyzed from the aspects of human, machine, material, method and ring, and data support is provided for the improvement of all aspects; the potential excavation and synergy module is combined with data analyzed by the system, and corresponding corrective measures and improvement methods are analyzed by using HAZOP or JHA combined with actual experience of managers and operators aiming at typical hidden dangers or frequent hidden dangers.
2. The security check problem tracking closed loop system according to claim 1, wherein: the inspection module comprises an inspection part and a special inspection part, the special inspection part comprises problems randomly found in daily work, the special inspection part comprises inspection and periodic inspection, and inspection personnel can wear the anti-explosion mobile phone for recording and positioning hidden dangers.
3. The security check problem tracking closed loop system according to claim 1, wherein: the registration module is divided into a mobile terminal and a PC terminal, and the specific use method is as follows: the problem found by each employee in daily work and examination is logged in the OA management platform through the PC end or the mobile end to be recorded into the system, and after the problem is submitted, the system can record the information completely and form a unique code, so that the problem is convenient to distinguish.
4. The security check problem tracking closed loop system according to claim 1, wherein: the auditing module is divided into a mobile terminal and a PC terminal, and the specific use method comprises the following steps: after the initiator submits, the initiator carries out examination and approval by a linear leader: team member-team leader; engineer/technician-master engineer; the linear leader conducts the examination and verification on whether the problems are real or not, whether the filling is correct or not and the like, the problems are submitted to the second examination and verification after agreement, the owner and the master engineers of the location of each device are responsible for the second examination and verification of the device and the severity (general and important) of the problems, and if the problems are important, the examination and verification processes are automatically collected to the general manager for examination and approval; and (5) carrying out third-step auditing after the rectification is finished, wherein a master engineer or a responsible person of the place where the problem is located receives a reminder to be dealt with: the problem is rectified and a verifier needs to be assigned.
5. The security check problem tracking closed loop system according to claim 1, wherein: the specific use method of the rectification module comprises the following steps: after receiving the reminding of finishing to be done, the professional in charge of finishing logs on an OA management platform through a PC end or a mobile end to check the problem condition, inputs a problem finishing scheme in the system according to the actual condition and predicts finishing time; after the correction is completed, the correction completion condition and the related data of the correction are uploaded to the system.
6. The security check problem tracking closed loop system according to claim 1, wherein: the specific use method of the verification module comprises the following steps: the presenter directly receives the verification to-be-handled prompt and directly verifies the prompt or a home master engineer designates another verifier different from the truer in the system; and (4) verifying the on-site verification by a verifier, and logging in the OA management platform to submit the verification condition through the PC end or the mobile end if no problem exists.
7. The security check problem tracking closed loop system according to claim 1, wherein: after the whole rectification process is finished, the system automatically judges that the hidden danger is closed; if the examination in the second step or the examination in the third step is judged to be 'disagreement', the hidden danger of the vocabulary entry is rejected, and the system directly judges to be closed; if any link in the process is not finished, the system judges the hidden trouble as going on.
8. The security check problem tracking closed loop system according to claim 1, wherein: in the audit of each role personnel work, the role personnel have: discovery and verification personnel, professional rectification personnel and auditors; setting a grading formula: the number of the discovered and reported articles of the discovery personnel is scored so as to improve the number of the discovered and reported articles; the closed loop verification quantity is scored, and a discoverer is encouraged to actively track the progress of completion of the hidden danger reported by the discoverer; each professional rectification personnel counts the number and completion rate of rectification completed by each professional responsible person, and encourages each professional to rectify the hidden danger; the auditor counts the auditing accuracy of the auditor, encourages correct auditing and improves the working efficiency; in the auditing of the team, the working conditions of each professional team are analyzed in combination with the auditing of personnel, and the auditing of the team is scored; in the audit of the system operation condition, whether the system operation condition is normal or not is efficiently audited, the number and frequency of the system abnormality occurrence are counted and scored, and the system reliability and the maintenance efficiency are improved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910944412.3A CN110717731A (en) | 2019-09-30 | 2019-09-30 | Safety inspection problem tracking closed loop system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910944412.3A CN110717731A (en) | 2019-09-30 | 2019-09-30 | Safety inspection problem tracking closed loop system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110717731A true CN110717731A (en) | 2020-01-21 |
Family
ID=69211257
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910944412.3A Pending CN110717731A (en) | 2019-09-30 | 2019-09-30 | Safety inspection problem tracking closed loop system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110717731A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111428139A (en) * | 2020-04-08 | 2020-07-17 | 中国石油化工股份有限公司 | Safety supervision and inspection method and system |
CN113191721A (en) * | 2021-04-07 | 2021-07-30 | 杭州玖欣物联科技有限公司 | Hierarchical nuclear examination electronic management method |
CN113537744A (en) * | 2021-07-06 | 2021-10-22 | 国网福建省电力有限公司经济技术研究院 | BIM platform of multi-subtask model and use method |
CN114331126A (en) * | 2021-12-28 | 2022-04-12 | 中车成都机车车辆有限公司 | Rail transit vehicle manufacturing process defect tracking management method and system |
CN114663050A (en) * | 2022-03-09 | 2022-06-24 | 华能国际电力股份有限公司大连电厂 | Closed-loop intelligent management and control system for problems of power enterprises |
CN114841521A (en) * | 2022-04-12 | 2022-08-02 | 山东莱钢永锋钢铁有限公司 | On-line problem rectification transmission system |
CN117114619A (en) * | 2023-09-07 | 2023-11-24 | 深圳叮当科技技术有限公司 | Project security management system based on big data analysis |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104636884A (en) * | 2015-03-05 | 2015-05-20 | 中国石油化工股份有限公司 | HSE (Health Safety And Environment) examination method |
CN107767118A (en) * | 2017-10-20 | 2018-03-06 | 泸州北方化学工业有限公司 | Potential safety hazard makes a report on system, potential safety hazard makes a report on method, storage medium |
CN108717604A (en) * | 2018-05-21 | 2018-10-30 | 西安科技大学 | A kind of production safety hidden danger closed loop management system |
CN110111082A (en) * | 2019-05-14 | 2019-08-09 | 青岛奥利普自动化控制系统有限公司 | A kind of shooting method conveniently for on-site verification work |
-
2019
- 2019-09-30 CN CN201910944412.3A patent/CN110717731A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104636884A (en) * | 2015-03-05 | 2015-05-20 | 中国石油化工股份有限公司 | HSE (Health Safety And Environment) examination method |
CN107767118A (en) * | 2017-10-20 | 2018-03-06 | 泸州北方化学工业有限公司 | Potential safety hazard makes a report on system, potential safety hazard makes a report on method, storage medium |
CN108717604A (en) * | 2018-05-21 | 2018-10-30 | 西安科技大学 | A kind of production safety hidden danger closed loop management system |
CN110111082A (en) * | 2019-05-14 | 2019-08-09 | 青岛奥利普自动化控制系统有限公司 | A kind of shooting method conveniently for on-site verification work |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111428139A (en) * | 2020-04-08 | 2020-07-17 | 中国石油化工股份有限公司 | Safety supervision and inspection method and system |
CN113191721A (en) * | 2021-04-07 | 2021-07-30 | 杭州玖欣物联科技有限公司 | Hierarchical nuclear examination electronic management method |
CN113537744A (en) * | 2021-07-06 | 2021-10-22 | 国网福建省电力有限公司经济技术研究院 | BIM platform of multi-subtask model and use method |
CN114331126A (en) * | 2021-12-28 | 2022-04-12 | 中车成都机车车辆有限公司 | Rail transit vehicle manufacturing process defect tracking management method and system |
CN114663050A (en) * | 2022-03-09 | 2022-06-24 | 华能国际电力股份有限公司大连电厂 | Closed-loop intelligent management and control system for problems of power enterprises |
CN114841521A (en) * | 2022-04-12 | 2022-08-02 | 山东莱钢永锋钢铁有限公司 | On-line problem rectification transmission system |
CN117114619A (en) * | 2023-09-07 | 2023-11-24 | 深圳叮当科技技术有限公司 | Project security management system based on big data analysis |
CN117114619B (en) * | 2023-09-07 | 2024-05-14 | 深圳叮当科技技术有限公司 | Project security management system based on big data analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110717731A (en) | Safety inspection problem tracking closed loop system | |
US20160350872A1 (en) | System and Method for Coordinating the Collection, Analysis and Storage of Payroll Information Provided to Government Agencies by Government Contractors | |
US20090076969A1 (en) | System and method for deployment and financing of a security system | |
CN107967569A (en) | A kind of method for optimizing on-site examination tasks carrying effect | |
US20050065839A1 (en) | Methods, systems and computer program products for generating an aggregate report to provide a certification of controls associated with a data set | |
CN109615324A (en) | One kind being based on the project management method of " wisdom management " system | |
CN111598411A (en) | Intelligent safety control system for operation site of transformer substation | |
CN110533789A (en) | A kind of equipment routing inspection management method and device based on block chain | |
CN108197779A (en) | Build service management | |
CN112837195A (en) | Block chain-based environment monitoring system and method | |
CN110189102A (en) | A kind of business policy redemption system based on cloud database | |
CN103745362A (en) | Method and system for automatically generating building project credit system | |
CN114155118A (en) | Highway engineering safety gridding management method and system | |
JP2008027272A (en) | Site information management system | |
CN109345396B (en) | Intelligent injury claim settlement management system | |
CN112381494B (en) | Intelligent supervision system and method for urban construction | |
CN115759864A (en) | Engineering supervision system based on quality safety detection | |
CN114757556A (en) | Automobile industry information security system credibility assessment method and assessment system | |
Tarigan et al. | Operational risk analysis of network Operation Center Division pt. IO | |
CN107248061A (en) | A kind of intelligent fire detection method and its system | |
CN113592268A (en) | On-site operation safety monitoring system and method | |
CN105930968A (en) | Passenger line construction risk control and early warning system | |
Nsenkyiere et al. | Comparative study on the auditing systems of sustainable forest management | |
CN116739498B (en) | Tax data checking system | |
CN117593155B (en) | Block chain-based land yielding contract management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200121 |
|
RJ01 | Rejection of invention patent application after publication |