CN116668954A - Personnel management method, device, terminal and storage medium based on electronic fence - Google Patents

Personnel management method, device, terminal and storage medium based on electronic fence Download PDF

Info

Publication number
CN116668954A
CN116668954A CN202310618779.2A CN202310618779A CN116668954A CN 116668954 A CN116668954 A CN 116668954A CN 202310618779 A CN202310618779 A CN 202310618779A CN 116668954 A CN116668954 A CN 116668954A
Authority
CN
China
Prior art keywords
personnel
electronic fence
fence area
target electronic
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310618779.2A
Other languages
Chinese (zh)
Inventor
张玉从
秦建淞
吴浩然
赵航程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shijiazhuang Enn Environmental Protection Technology Co ltd
Original Assignee
Shijiazhuang Enn Environmental Protection Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shijiazhuang Enn Environmental Protection Technology Co ltd filed Critical Shijiazhuang Enn Environmental Protection Technology Co ltd
Priority to CN202310618779.2A priority Critical patent/CN116668954A/en
Publication of CN116668954A publication Critical patent/CN116668954A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a personnel management method, a device, a terminal and a storage medium based on electronic fence. The method comprises the following steps: acquiring personnel positioning information monitored by each personnel positioning base station in the target electronic fence area; based on the positioning information of each person, determining the position and the state of the person of each person; judging whether abnormal personnel exist in the target electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules corresponding to the target electronic fence area; wherein the management rules are determined based on the device status within the target electronic fence area. The application can ensure the accuracy and timeliness of safety monitoring, improve the safety of personnel in a target area, dynamically adjust the management rules according to the dangers in the electronic fence area, ensure the safety of personnel, and simultaneously adopt looser management rules for the electronic fence area with lower dangers, thereby avoiding inconvenience to personnel.

Description

Personnel management method, device, terminal and storage medium based on electronic fence
Technical Field
The application relates to the technical field of security protection, in particular to a personnel management method, device, terminal and storage medium based on electronic fence.
Background
In factory production activities, dangerous areas such as dangerous raw material storage areas, areas where large-scale equipment is located and the like exist, and workers and foreign personnel should follow site safety regulations when entering the dangerous areas, so that self safety is guaranteed.
However, the number of personnel in the factory is large, mobility is large, safety consciousness is not uniform, and good safety operation effect is difficult to achieve only through safety training; if special personnel are arranged to monitor the whereabouts of all the personnel and the personnel states in each dangerous area, larger workload exists, and whether the personnel entering the dangerous area have corresponding permission or not and whether all the personnel entering the dangerous area leave in time or not is difficult to accurately judge. Therefore, there is a problem that personnel safety in factories is poor at present.
Disclosure of Invention
The embodiment of the application provides a personnel management method, a device, a terminal and a storage medium based on an electronic fence, which are used for solving the problem of poor personnel security in a factory.
In a first aspect, an embodiment of the present application provides a personnel management method based on an electronic fence, which is applied to a personnel management system based on an electronic fence, where the system includes a plurality of personnel positioning base stations and a plurality of personnel positioning tags, and the personnel positioning tags are in one-to-one correspondence with personnel; the system is arranged in a target area, the target area comprises at least one electronic fence area, and each electronic fence area comprises at least one industrial production device and at least one personnel positioning base station;
the method comprises the following steps:
acquiring personnel positioning information monitored by each personnel positioning base station in the target electronic fence area;
based on the positioning information of each person, determining the position and the state of the person of each person;
judging whether abnormal personnel exist in the target electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules corresponding to the target electronic fence area; wherein the management rules are determined based on the device status within the target electronic fence area.
In one possible implementation, before determining whether an abnormal person exists in the electronic fence area based on the personnel location, the personnel status, and the management rule of the target electronic fence area, the method further includes:
determining a security level of the target electronic fence area based on a device state within the target electronic fence area;
and determining a management rule of the target electronic fence area based on the security level of the target electronic fence area.
In one possible implementation, when the device in the target electronic fence area is a hazardous waste repository, determining the security level of the target electronic fence area based on the device status in the target electronic fence area includes:
if dangerous wastes are stored in the dangerous waste temporary storage warehouse, the security level of the target electronic fence area is high;
and if the dangerous wastes are not stored in the dangerous waste temporary storage, the security level of the target electronic fence area is low.
In one possible implementation, determining the security level of the target electronic fence area based on the device status within the target electronic fence area includes:
and determining an operation period and a stop period of the equipment based on the operation plan of the equipment in the target electronic fence area, wherein the security level of the target electronic fence area is high in the operation period and low in the stop period.
In one possible implementation, the personnel status includes personnel movement speed, personnel rest duration, and personnel rights;
determining a management rule of the target electronic fence area based on the security level of the target electronic fence area includes:
when the security level of the target electronic fence area is high, the management rule comprises one or more of the first personnel entering quantity, the first personnel static time length, the first personnel moving speed and the first personnel entering authority;
when the security level of the target electronic fence area is low, the management rule comprises one or more of the second personnel entering quantity, the second personnel static time length, the second personnel moving speed and the second personnel entering authority; the first personnel entering quantity is smaller than the second personnel entering quantity, the static time length of the first personnel is smaller than the static time length of the second personnel, the moving speed of the first personnel is smaller than the moving speed of the second personnel, and the first personnel entering authority is larger than the second personnel entering authority.
In one possible implementation, the system further comprises a plurality of cameras, each electronic fence area comprising at least one camera;
the method further comprises the steps of:
acquiring shooting data of a camera in a target electronic fence area, and determining identity information of each person in the shooting data through face recognition to serve as first identity information data;
identifying identity information corresponding to each personnel positioning tag in the target electronic fence area as second identity information data;
determining identity information of personnel in the target electronic fence area through a shift plan, and taking the identity information as third identity information data;
and comparing the identity information data to determine abnormal personnel in the target electronic fence area.
In one possible implementation, the method further includes:
identifying identity information of people entering a target electronic fence area and identity information of people leaving the target electronic fence area;
and comparing the identity information, and judging whether the unoccupied personnel exist in the target electronic fence area.
In a second aspect, an embodiment of the present application provides a personnel management device based on an electronic fence, which is applied to a personnel management system based on the electronic fence, where the system includes a plurality of personnel positioning base stations and a plurality of personnel positioning tags, and the personnel positioning tags are in one-to-one correspondence with personnel; the system is arranged in a target area, the target area comprises at least one electronic fence area, and each electronic fence area comprises at least one industrial production device and at least one personnel positioning base station;
the device comprises:
the acquisition module is used for acquiring personnel positioning information monitored by each personnel positioning base station in the target electronic fence area;
the determining module is used for determining the personnel position and the personnel state of each personnel based on the positioning information of each personnel;
the management module is used for judging whether abnormal personnel exist in the target electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules of the target electronic fence area; wherein the management rules are determined based on the device status within the target electronic fence area.
In a third aspect, embodiments of the present application provide a terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to the first aspect or any one of the possible implementations of the first aspect, when the computer program is executed.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method as described above in the first aspect or any one of the possible implementations of the first aspect.
The personnel management method, the device, the terminal and the storage medium based on the electronic fence provided by the application have the beneficial effects that:
according to the application, the personnel positioning information is monitored through the base station and the personnel positioning card, the personnel position and personnel state of each personnel are determined, the number of the personnel existing in each electronic fence area is judged, the personnel state in the electronic fence area can be safely monitored without manual work, the accuracy and timeliness of the safety monitoring are ensured, and the safety of the personnel in the target area is improved; according to the management rule, the management rule is determined according to the equipment states in the electronic fence areas, and dangers in the electronic fence areas are possibly different when the equipment states are different.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an implementation of a method for electronic fence-based personnel management provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of a personnel management device based on an electronic fence according to an embodiment of the present application;
fig. 3 is a schematic diagram of a terminal according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the following description will be made by way of specific embodiments with reference to the accompanying drawings.
The personnel management method and the personnel management device based on the electronic fence are applied to a personnel management system based on the electronic fence, and the system comprises a plurality of personnel positioning base stations and a plurality of personnel positioning labels, wherein the personnel positioning labels correspond to personnel one by one; the system is disposed in a target area, the target area including at least one electronic fence area, each electronic fence area including at least one industrial production facility and at least one personnel positioning base station.
Referring to fig. 1, a flowchart of an implementation of a personnel management method based on electronic fence according to an embodiment of the present application is shown, and details are as follows:
and step 101, acquiring personnel positioning information monitored by each personnel positioning base station in the target electronic fence area.
In this embodiment, the personnel positioning base station may use bluetooth or UWB technology to establish communication with the personnel positioning card, and obtain personnel positioning information. The personnel positioning information can comprise information such as personnel identity, a base station where the personnel is located and the like, and the working state of the personnel can be judged through the information, so that the personnel is managed.
Step 102, determining personnel positions and personnel states of all personnel based on the personnel positioning information.
In this embodiment, if a certain personnel positioning base station can identify a certain personnel positioning card, it is indicated that the personnel positioning card is within the detection range of the personnel positioning base station, and then the personnel position associated with the personnel positioning card can be determined to be within the detection range of the personnel positioning base station. If a plurality of adjacent personnel positioning base stations sequentially identify a personnel positioning card, the personnel associated with the personnel positioning card can be determined to move in the detection range of the plurality of personnel positioning base stations.
Step 103, judging whether abnormal personnel exist in the target electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules corresponding to the target electronic fence area; wherein the management rules are determined based on the device status within the target electronic fence area.
In this embodiment, the management rule may include information such as the number of people in the target electronic fence area, the stay time of the people, and the identities of the people, and may specifically be determined according to the own characteristics and the equipment status of the target electronic fence area. For example, when the smelting equipment is in a starting state, the ambient temperature is extremely high, and when people approach, life safety is threatened, and at the moment, the management rule of an electronic fence area where the smelting equipment is located is that people are not allowed to enter; for example, the live interval can be operated in the power-off state, but personnel irrelevant to operation should be avoided from entering, at the moment, the management rule of the electronic fence area where the live interval is located is to only allow the operators to enter, the residence time of the operators can be regulated according to specific operation contents, if the residence time of the operators is monitored to be too long, accidents can occur, and rescue can be performed in time.
In one possible implementation, before determining whether an abnormal person exists in the electronic fence area based on the personnel location, the personnel status, and the management rule of the target electronic fence area, the method further includes:
determining a security level of the target electronic fence area based on a device state within the target electronic fence area;
and determining a management rule of the target electronic fence area based on the security level of the target electronic fence area.
In this embodiment, the equipment in the target electronic fence area may include a high-pressure pry, an incineration pit, a waste water discharge main port, an online total volatile organic compound (Total Volatile Organic Compounds, TVOC) detection station, a wagon balance, a hazardous waste temporary storage, a waste gas discharge port, liquid oxygen, a liquid nitrogen tank area, a loading and unloading platform, a hazardous waste tank area, a pump house, a comprehensive pretreatment workshop, a materialization workshop, a supercritical oxidation workshop, a hazardous waste material beating room, a sorting area, a sludge storage, a ash warehouse, a diaphragm pump house, a sewage treatment station, a comprehensive treatment workshop, a power station of a distribution room, a car unloading platform, an incineration workshop, a drying workshop, an auxiliary material room and the like, and the equipment, the workshop and the workshop have different degrees of dangers for personnel in the area under different operation states, so the security level of the electronic fence area can be determined according to the specific state of the equipment, the management rule for moderately managing the personnel can be determined according to the security level, and the personnel security is avoided being excessively strict while the personnel security is ensured.
In one possible implementation, when the device in the target electronic fence area is a hazardous waste repository, determining the security level of the target electronic fence area based on the device status in the target electronic fence area includes:
if dangerous wastes are stored in the dangerous waste temporary storage warehouse, the security level of the target electronic fence area is high;
and if the dangerous wastes are not stored in the dangerous waste temporary storage, the security level of the target electronic fence area is low.
In this embodiment, a high security level indicates that the security of the person entering the target electronic fence area is more compromised, and a low security level indicates that the security of the person entering the target electronic fence area is less compromised. The hazardous waste stored in the hazardous waste temporary storage warehouse may comprise corrosive liquid, toxic gas and radioactive solid, and the threat degree of various hazardous waste to personnel safety is different, so that the safety level of the target electronic fence area can be further subdivided according to the type of the hazardous waste, the treatment state of the hazardous waste and the storage amount of the hazardous waste.
In one possible implementation, determining the security level of the target electronic fence area based on the device status within the target electronic fence area includes:
and determining an operation period and a stop period of the equipment based on the operation plan of the equipment in the target electronic fence area, wherein the security level of the target electronic fence area is high in the operation period and low in the stop period.
In this embodiment, when the target area is a factory, the factory will usually determine a production plan in advance, each device in the factory may have a fixed operation period, and according to the operation period of the device, the security level of the target electronic fence area in each period may be determined in advance, so that the device state in the target electronic fence area does not need to be monitored in real time, and the data processing capacity of the system is reduced.
In one possible implementation, the personnel status includes personnel movement speed, personnel rest duration, and personnel rights;
determining a management rule of the target electronic fence area based on the security level of the target electronic fence area includes:
when the security level of the target electronic fence area is high, the management rule comprises one or more of the first personnel entering quantity, the first personnel static time length, the first personnel moving speed and the first personnel entering authority;
when the security level of the target electronic fence area is low, the management rule comprises one or more of the second personnel entering quantity, the second personnel static time length, the second personnel moving speed and the second personnel entering authority; the first personnel entering quantity is smaller than the second personnel entering quantity, the static time length of the first personnel is smaller than the static time length of the second personnel, the moving speed of the first personnel is smaller than the moving speed of the second personnel, and the first personnel entering authority is larger than the second personnel entering authority.
In this embodiment, the moving speed of the personnel may be determined by the change of the communication relationship between the personnel locator card and the base station, and if the base station communicating with a personnel locator card changes multiple times in a shorter time, the moving speed of the personnel associated with the personnel locator card may be abnormal, and the personnel may perform dangerous behavior in the electronic fence area.
For a key area, an entrance statistical method can be adopted to determine the number of people entering a target electronic fence area, a camera can be specifically combined to judge whether the people enter the target electronic fence area, a plurality of base stations can be densely arranged at the entrance of the target electronic fence area, if the monitoring result of each entrance base station accords with the condition of people entering, the entrance of the people is judged, and the number of the people entering the target electronic fence area is accurately counted; for non-key areas, a base station and a statistical method can be adopted, namely, the total number of people in the target electronic fence is obtained by adding the number of people detected by each base station in the target electronic fence area.
In some electronic fence areas, the electronic fence areas can be divided into a plurality of security levels, and the higher the security level is, the greater the risk that personnel are injured/have accidents in the electronic fence areas is, the more strict the corresponding management rules should be, for example, the higher the security level is, the smaller the personnel entering quantity is, the shorter the personnel resting time is, the higher the personnel entering permission is, and the like in the corresponding management rules are.
In some electronic fence areas, the entering sequence of personnel can be monitored, for example, some areas need high-authority personnel to take foreign personnel to visit, and if the high-authority personnel first enter the electronic fence areas, the other personnel do not alarm after entering; if the external personnel directly enter, danger can occur, and personnel abnormality warning should be carried out.
In one possible implementation, the system further comprises a plurality of cameras, each electronic fence area comprising at least one camera;
the method further comprises the steps of:
acquiring shooting data of a camera in a target electronic fence area, and determining identity information of each person in the shooting data through face recognition to serve as first identity information data;
identifying identity information corresponding to each personnel positioning tag in the target electronic fence area as second identity information data;
determining identity information of personnel in the target electronic fence area through a shift plan, and taking the identity information as third identity information data;
and comparing the identity information data to determine abnormal personnel in the target electronic fence area.
In this embodiment, each identity information data is compared, so that the situation that the identities of the personnel locating card and the personnel wearing the locating card are inconsistent can be identified, and if the personnel are identified, an alarm can be sent out, so that the situation that the correct victim is difficult to determine after the personnel are unexpected is avoided.
In one possible implementation, the method further includes:
identifying identity information of people entering a target electronic fence area and identity information of people leaving the target electronic fence area;
and comparing the identity information, and judging whether the unoccupied personnel exist in the target electronic fence area.
In this embodiment, the person in the abnormally-retained electronic fence area may be unexpected, and the identity of the person entering and the identity of the person leaving may be compared to determine which persons have not left all the time after entering the target electronic fence area, so as to further determine whether the person is unexpected.
According to the embodiment of the application, the personnel positioning information is monitored through the base station and the personnel positioning card, the personnel position and the personnel state of each personnel are determined, the number of the personnel existing in each electronic fence area is judged, the personnel state in the electronic fence area can be safely monitored without manual work, the accuracy and timeliness of the safety monitoring are ensured, and the safety of the personnel in the target area is improved; according to the management rule, the management rule is determined according to the equipment states in the electronic fence areas, and dangers in the electronic fence areas are possibly different when the equipment states are different.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
The following are device embodiments of the application, for details not described in detail therein, reference may be made to the corresponding method embodiments described above.
Fig. 2 shows a schematic structural diagram of a personnel management device based on an electronic fence according to an embodiment of the present application, and for convenience of explanation, only the parts related to the embodiment of the present application are shown, which is described in detail below:
as shown in fig. 2, the electronic fence-based person management device 2 includes:
the acquiring module 21 is configured to acquire personnel positioning information monitored by each personnel positioning base station in the target electronic fence area;
a determining module 22, configured to determine a personnel position and a personnel status of each personnel based on the positioning information of each personnel;
a management module 23, configured to determine whether an abnormal person exists in the target electronic fence area based on the positions of the persons, the states of the persons, and the management rules of the target electronic fence area; wherein the management rules are determined based on the device status within the target electronic fence area.
In one possible implementation, the determining module 22 is further configured to:
before judging whether abnormal personnel exist in the electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules of the target electronic fence area, determining the security level of the target electronic fence area based on the equipment states in the target electronic fence area;
and determining a management rule of the target electronic fence area based on the security level of the target electronic fence area.
In one possible implementation, when the device in the target electronic fence area is a hazardous waste temporary repository, the determining module 22 is specifically configured to:
if dangerous wastes are stored in the dangerous waste temporary storage warehouse, determining that the security level of the target electronic fence area is high;
and if the dangerous wastes are not stored in the dangerous waste temporary storage, determining that the security level of the target electronic fence area is low.
In one possible implementation, the determining module 22 is specifically configured to:
and determining an operation period and a stop period of the equipment based on the operation plan of the equipment in the target electronic fence area, wherein the security level of the target electronic fence area is high in the operation period and low in the stop period.
In one possible implementation, the personnel status includes personnel movement speed, personnel rest duration, and personnel rights;
the determining module 22 is specifically configured to:
when the security level of the target electronic fence area is high, the management rule comprises one or more of the first personnel entering quantity, the first personnel static time length, the first personnel moving speed and the first personnel entering authority;
when the security level of the target electronic fence area is low, the management rule comprises one or more of the second personnel entering quantity, the second personnel static time length, the second personnel moving speed and the second personnel entering authority; the first personnel entering quantity is smaller than the second personnel entering quantity, the static time length of the first personnel is smaller than the static time length of the second personnel, the moving speed of the first personnel is smaller than the moving speed of the second personnel, and the first personnel entering authority is larger than the second personnel entering authority.
In one possible implementation, the system further comprises a plurality of cameras, each electronic fence area comprising at least one camera;
the management module 23 is further configured to:
acquiring shooting data of a camera in a target electronic fence area, and determining identity information of each person in the shooting data through face recognition to serve as first identity information data;
identifying identity information corresponding to each personnel positioning tag in the target electronic fence area as second identity information data;
determining identity information of personnel in the target electronic fence area through a shift plan, and taking the identity information as third identity information data;
and comparing the identity information data to determine abnormal personnel in the target electronic fence area.
In one possible implementation, the management module 23 is further configured to:
identifying identity information of people entering a target electronic fence area and identity information of people leaving the target electronic fence area;
and comparing the identity information, and judging whether the unoccupied personnel exist in the target electronic fence area.
According to the embodiment of the application, the personnel positioning information is monitored through the base station and the personnel positioning card, the personnel position and the personnel state of each personnel are determined, the number of the personnel existing in each electronic fence area is judged, the personnel state in the electronic fence area can be safely monitored without manual work, the accuracy and timeliness of the safety monitoring are ensured, and the safety of the personnel in the target area is improved; according to the management rule, the management rule is determined according to the equipment states in the electronic fence areas, and dangers in the electronic fence areas are possibly different when the equipment states are different.
Fig. 3 is a schematic diagram of a terminal according to an embodiment of the present application. As shown in fig. 3, the terminal 3 of this embodiment includes: a processor 30, a memory 31 and a computer program 32 stored in said memory 31 and executable on said processor 30. The steps of the various embodiments of the electronic fence based personnel management method described above, such as steps 101 through 103 shown in fig. 1, are implemented by the processor 30 when executing the computer program 32. Alternatively, the processor 30 may perform the functions of the modules/units of the apparatus embodiments described above, such as the functions of the modules/units 21 to 23 shown in fig. 2, when executing the computer program 32.
Illustratively, the computer program 32 may be partitioned into one or more modules/units that are stored in the memory 31 and executed by the processor 30 to complete the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions for describing the execution of the computer program 32 in the terminal 3. For example, the computer program 32 may be split into modules/units 21 to 23 shown in fig. 2.
The terminal 3 may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, etc. The terminal 3 may include, but is not limited to, a processor 30, a memory 31. It will be appreciated by those skilled in the art that fig. 3 is merely an example of the terminal 3 and does not constitute a limitation of the terminal 3, and may include more or less components than illustrated, or may combine certain components, or different components, e.g., the terminal may further include an input-output device, a network access device, a bus, etc.
The processor 30 may be a central processing unit (Central Processing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 31 may be an internal storage unit of the terminal 3, such as a hard disk or a memory of the terminal 3. The memory 31 may be an external storage device of the terminal 3, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal 3. Further, the memory 31 may also include both an internal storage unit and an external storage device of the terminal 3. The memory 31 is used for storing the computer program as well as other programs and data required by the terminal. The memory 31 may also be used for temporarily storing data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal and method may be implemented in other manners. For example, the apparatus/terminal embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the above-described methods, or may be implemented by a computer program for instructing related hardware, where the computer program may be stored on a computer readable storage medium, and the computer program may implement the steps of each of the above-described embodiments of the electronic fence-based personnel management method when executed by a processor. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium may include content that is subject to appropriate increases and decreases as required by jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is not included as electrical carrier signals and telecommunication signals.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (10)

1. The personnel management method based on the electronic fence is characterized by being applied to a personnel management system based on the electronic fence, wherein the system comprises a plurality of personnel positioning base stations and a plurality of personnel positioning labels, and the personnel positioning labels are in one-to-one correspondence with the personnel; the system is arranged in a target area, the target area comprises at least one electronic fence area, and each electronic fence area comprises at least one industrial production device and at least one personnel positioning base station;
the method comprises the following steps:
acquiring personnel positioning information monitored by each personnel positioning base station in the target electronic fence area;
based on the positioning information of each person, determining the position and the state of the person of each person;
judging whether abnormal personnel exist in the target electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules corresponding to the target electronic fence area; wherein the management rule is determined based on a device state within the target electronic fence area.
2. The electronic fence based personnel management method of claim 1, wherein before the determining whether an abnormal person exists in the electronic fence area based on the individual person position, individual person status, and the management rule of the target electronic fence area, the method further comprises:
determining a security level of the target electronic fence area based on a device status within the target electronic fence area;
and determining a management rule of the target electronic fence area based on the security level of the target electronic fence area.
3. The method of claim 2, wherein when the equipment in the target electronic fence area is a hazardous waste temporary repository, the determining the security level of the target electronic fence area based on the equipment status in the target electronic fence area comprises:
if dangerous wastes are stored in the dangerous waste temporary storage warehouse, the security level of the target electronic fence area is high;
and if the dangerous wastes are not stored in the dangerous waste temporary storage, the security level of the target electronic fence area is low.
4. The electronic fence based personnel management method of claim 2, wherein the determining a security level of the target electronic fence area based on a device status within the target electronic fence area comprises:
and determining an operation period and a stop period of the equipment based on the operation plan of the equipment in the target electronic fence area, wherein the security level of the target electronic fence area is high in the operation period and is low in the stop period.
5. The electronic fence based personnel management method of claim 3 or 4 wherein the personnel status includes personnel movement speed, personnel stationary time period and personnel rights;
the determining the management rule of the target electronic fence area based on the security level of the target electronic fence area comprises:
when the security level of the target electronic fence area is high, the management rule comprises one or more of the first personnel entering quantity, the first personnel static time length, the first personnel moving speed and the first personnel entering authority;
when the security level of the target electronic fence area is low, the management rule comprises one or more of the second personnel entering quantity, the second personnel static time length, the second personnel moving speed and the second personnel entering authority; the first personnel access quantity is smaller than the second personnel access quantity, the first personnel static time length is smaller than the second personnel static time length, the first personnel moving speed is smaller than the second personnel moving speed, and the first access personnel permission is larger than the second access personnel permission.
6. The method of electronic fence based personnel management of claim 1 wherein the system further comprises a plurality of cameras, each electronic fence area comprising at least one camera;
the method further comprises the steps of:
acquiring shooting data of a camera in the target electronic fence area, and determining identity information of each person in the shooting data through face recognition to serve as first identity information data;
identifying identity information corresponding to each personnel positioning tag in the target electronic fence area as second identity information data;
determining identity information of people in the target electronic fence area through a shift plan, and taking the identity information as third identity information data;
and comparing the identity information data to determine abnormal personnel in the target electronic fence area.
7. The electronic fence based personnel management method of claim 6, further comprising:
identifying identity information of people entering the target electronic fence area and identity information of people leaving the target electronic fence area;
and comparing the identity information, and judging whether the unoccupied personnel exist in the target electronic fence area.
8. The personnel management device based on the electronic fence is characterized by being applied to a personnel management system based on the electronic fence, wherein the system comprises a plurality of personnel positioning base stations and a plurality of personnel positioning labels, and the personnel positioning labels are in one-to-one correspondence with the personnel; the system is arranged in a target area, the target area comprises at least one electronic fence area, and each electronic fence area comprises at least one industrial production device and at least one personnel positioning base station;
the device comprises:
the acquisition module is used for acquiring personnel positioning information monitored by each personnel positioning base station in the target electronic fence area;
the determining module is used for determining the personnel position and the personnel state of each personnel based on the positioning information of each personnel;
the management module is used for judging whether abnormal personnel exist in the target electronic fence area or not based on the positions of all the personnel, the states of all the personnel and the management rules of the target electronic fence area; wherein the management rule is determined based on a device state within the target electronic fence area.
9. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of the preceding claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any of the preceding claims 1 to 7.
CN202310618779.2A 2023-05-29 2023-05-29 Personnel management method, device, terminal and storage medium based on electronic fence Pending CN116668954A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310618779.2A CN116668954A (en) 2023-05-29 2023-05-29 Personnel management method, device, terminal and storage medium based on electronic fence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310618779.2A CN116668954A (en) 2023-05-29 2023-05-29 Personnel management method, device, terminal and storage medium based on electronic fence

Publications (1)

Publication Number Publication Date
CN116668954A true CN116668954A (en) 2023-08-29

Family

ID=87709117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310618779.2A Pending CN116668954A (en) 2023-05-29 2023-05-29 Personnel management method, device, terminal and storage medium based on electronic fence

Country Status (1)

Country Link
CN (1) CN116668954A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117078022A (en) * 2023-10-16 2023-11-17 中钢集团武汉安全环保研究院有限公司 Steel plant personnel risk early warning system and method based on multi-source data fusion

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117078022A (en) * 2023-10-16 2023-11-17 中钢集团武汉安全环保研究院有限公司 Steel plant personnel risk early warning system and method based on multi-source data fusion
CN117078022B (en) * 2023-10-16 2024-02-23 中钢集团武汉安全环保研究院有限公司 Steel plant personnel risk early warning system and method based on multi-source data fusion

Similar Documents

Publication Publication Date Title
CN116668954A (en) Personnel management method, device, terminal and storage medium based on electronic fence
CN115730815B (en) Industrial production safety risk early warning system and method based on Internet of things perception
CN111383128A (en) Method and system for monitoring running state of power grid embedded terminal equipment
CN116822715A (en) Safety production monitoring and early warning system based on artificial intelligence
CN115296933B (en) Industrial production data risk level assessment method and system
CN112966993A (en) Storage warehouse safety control method, system and computer readable storage medium
CN111222830A (en) System and method for intelligently managing and monitoring pledge objects based on block chain of Internet of things
CN116389235A (en) Fault monitoring method and system applied to industrial Internet of things
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN117879961A (en) Threat early warning analysis model of situation awareness system
CN111381567B (en) Safety detection system and method for industrial control system
CN113822394B (en) Visual intelligent emergency command platform for medical waste disposal under epidemic situation
CN116798199A (en) Early warning method, electronic equipment and early warning system for industrial park
CN116187705A (en) Wisdom environmental protection housekeeper system
CN114611857A (en) Supervision control method and system for non-coal mine enterprises
CN212749901U (en) Dangerous waste storage management system
CN112612676A (en) Equipment monitoring method and device
CN112966924A (en) Data management system and method based on risk map
CN112560773A (en) Image analysis method and system for operation safety
CN118445581B (en) Sewage treatment process monitoring system and method based on data identification
RU172827U1 (en) A device for generating and transmitting to a ground-based recorder an emergency development video file at a hazardous production facility
CN116739223B (en) Enterprise pollution discharge real-time supervision method and device, storage medium and electronic equipment
CN111122809A (en) Water environment treatment management and control system and use method
CN111325955A (en) Intelligent well lid monitoring method, system, device and storage medium
CN113723725B (en) Risk early warning method and device for operation process of chemical device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination