CN117422425B - On-site potential safety hazard management method and system based on instant messaging - Google Patents

On-site potential safety hazard management method and system based on instant messaging Download PDF

Info

Publication number
CN117422425B
CN117422425B CN202311734617.1A CN202311734617A CN117422425B CN 117422425 B CN117422425 B CN 117422425B CN 202311734617 A CN202311734617 A CN 202311734617A CN 117422425 B CN117422425 B CN 117422425B
Authority
CN
China
Prior art keywords
detection
node
route
potential safety
monitoring data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311734617.1A
Other languages
Chinese (zh)
Other versions
CN117422425A (en
Inventor
范承宏
刘可龙
董平
何玉涛
杨跃平
张�杰
朱树云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202311734617.1A priority Critical patent/CN117422425B/en
Publication of CN117422425A publication Critical patent/CN117422425A/en
Application granted granted Critical
Publication of CN117422425B publication Critical patent/CN117422425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/243Classification techniques relating to the number of classes
    • G06F18/2433Single-class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Security & Cryptography (AREA)
  • Operations Research (AREA)
  • Educational Administration (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Quality & Reliability (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a field potential safety hazard management method and system based on instant messaging, wherein the method comprises the following steps: judging whether the first equipment is abnormal or not based on the monitoring data of the first equipment, identifying potential safety hazard types if the first equipment is abnormal, generating a potential safety hazard checking topological route and hidden danger checking contents of each detection node, then sending the potential safety hazard, the potential safety hazard checking topological route and the hidden danger checking contents of each detection node to an instant messaging client of an area responsible person in which the first equipment is located, checking the potential safety hazard by an abnormal handler who handles the potential safety hazard when the first equipment is positively checked, sending the checking result to the instant messaging client of the area responsible person, and calculating potential fault risks of the first equipment when the second equipment is negatively checked and sending the potential safety hazard to the instant messaging client of the area responsible person. The technical scheme of the invention reduces the potential safety hazard management cost and improves the efficiency of on-site hidden danger investigation and improvement.

Description

On-site potential safety hazard management method and system based on instant messaging
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a field potential safety hazard management method and system based on instant messaging.
Background
At present, domestic building projects, rail traffic projects, municipal projects, road bridge projects and other building projects are large in construction scale, potential safety hazard investigation mainly depends on a safety working group to patrol, or depends on background personnel to monitor through video monitoring, safety working detection is manually carried out, working intensity is high, human factors influence is large when potential safety hazard investigation is carried out, and recognition efficiency and accuracy are low.
Along with the development of digital and intelligent technologies, the information means is used for protecting the driving of safety production, so that the safety production benefit is improved, and the safety accident risk is reduced, thereby being an important research direction. In the prior art, for example, chinese patent application CN112488376a discloses a method and a system for managing and controlling potential safety hazards in an operation site, which are used for acquiring location area information and potential safety hazard content data of a location where a potential safety hazard exists, acquiring operation safety information matched with the location area information according to the location area information, extracting features of the potential safety hazard content data according to a preset identification method according to the type of the potential safety hazard content data, acquiring potential safety hazard feature data, and matching the potential safety hazard feature data with the operation safety information to determine a potential safety hazard result. According to the method, whether potential safety hazards exist or not is judged by matching the potential safety hazard characteristic data with the operation safety information, and the reasons of the potential safety hazards are not analyzed and checked according to the judging result, so that the potential safety hazards are not fully managed and controlled. For example, chinese application CN116486343a discloses a method for identifying potential safety hazards on a construction site, and configures the type of potential safety hazard to be monitored and identified and the corresponding matched potential safety hazard identification policy; acquiring a monitoring area image, and configuring an area related to potential safety hazards and related potential safety hazard types in the monitoring area image; acquiring a real-time monitoring area image, and carrying out matching analysis on potential safety hazards related in the real-time monitoring area image through a potential safety hazard identification strategy; and communicating the analysis result of the identified potential safety hazard to a monitoring and early warning terminal. The method can be used for informing the monitoring and early-warning terminal of the result after the potential safety hazard is identified, so that the problems of low execution efficiency of a management system, descending efficiency when the potential safety hazard is conveyed layer by layer and the like are caused.
Therefore, the method and the system for managing the potential safety hazards based on instant messaging are provided, so that the potential safety hazard correction and management cost is reduced, the untrustiness of the potential safety hazard investigation and treatment is reduced, the potential safety hazard treatment on the site is more transparent and convenient, a responsibility implementation mechanism is established, the potential safety hazard investigation and treatment correction efficiency on the site is improved, and the method and the system are the problems to be solved urgently.
Disclosure of Invention
Aiming at the technical problems, the invention provides a field potential safety hazard management method and system based on instant messaging.
In a first aspect, the present invention provides a method for managing potential safety hazards on site based on instant messaging, the method comprising:
Step 1, a site safety management platform acquires monitoring data of first equipment, and judges whether the first equipment is abnormal or not based on the monitoring data;
Step 2, if the first equipment is abnormal, the site safety management platform identifies potential safety hazards of the first equipment, and generates a potential hazard troubleshooting topological route and potential hazard troubleshooting contents aiming at each detection node;
Step 3, searching a first personnel information table based on the position information of the first equipment, acquiring information of a regional responsible person in the region where the first equipment is located, then sending potential safety hazards, potential hazard investigation topological routes and potential hazard investigation contents of each detection node to an instant messaging client of the regional responsible person, and carrying out annotation processing on the potential hazard investigation topological routes and the potential hazard investigation contents of each detection node by the regional responsible person;
Step 4, when a positive annotation reply is obtained, entering a step 5, and when a negative annotation reply is obtained, entering a step 6;
step 5, searching a second personnel information table based on the position information and the potential safety hazards, acquiring information of abnormal handling personnel for handling the potential safety hazards, checking the potential safety hazards by the abnormal handling personnel, and after the checking is finished, transmitting the checking result to an instant messaging client of a regional responsible person;
And 6, calculating potential fault risks of the first equipment and sending the potential fault risks to the instant messaging client of the regional responsible person.
Specifically, in step 1, determining whether an abnormality occurs in the first device based on the monitoring data includes:
Step 11, acquiring nth monitoring data in the monitoring data, extracting M monitoring data related to the nth monitoring data from the monitoring data, and calculating an estimated monitoring value of the nth monitoring device based on the M monitoring data, wherein the calculation formula is as follows:
Wherein EV n is the estimated monitoring value of the nth monitoring device, AV m is the mth monitoring data in M monitoring data, k is a natural number, A is a constant, N is a positive integer of 1-N, N is the total number of the monitoring data, M is the total number of the monitoring data related to the nth monitoring data, and the nth monitoring device is the monitoring device for acquiring the nth monitoring data;
Step 12, calculating monitoring accuracy of the nth monitoring device at the current moment based on the nth monitoring data and the estimated monitoring value of the nth monitoring device, wherein a calculation formula is as follows:
wherein, AC n is the monitoring accuracy of the nth monitoring device at the current moment, and AV n is the nth monitoring data;
Step 13, acquiring N1 monitoring accuracy of the nth monitoring device within a first preset time from a first storage module, judging whether the data state of the nth monitoring data is fluctuating, if so, judging the data state of the nth monitoring data as fluctuating, and then entering step 15; if not, entering a step 14, wherein the N1 monitoring precision comprises the monitoring precision of the nth monitoring device at the current moment;
Step 14, calculating the number of the N1 monitoring accuracy which is larger than or equal to a first preset value, if the number is larger than or equal to a second preset value, judging the data state of the nth monitoring data to be normal, and if the number is smaller than the second preset value, judging the data state of the nth monitoring data to be abnormal;
And 15, traversing all the monitoring data, judging that the first equipment is abnormal if the monitoring data with abnormal data state exists, judging whether the monitoring data with fluctuating data state exists if the monitoring data with fluctuating data state does not exist, judging that the first equipment has fluctuation if the monitoring data with fluctuating data state exists, and otherwise, judging that the first equipment is normal.
Specifically, in step 13, determining whether the data state of the nth monitored data is fluctuating includes:
step 131, acquiring N1 monitoring data of the nth monitoring device within a first preset time, wherein the N1 monitoring data comprise the nth monitoring data;
Step 132, respectively calculating the difference value of the nth monitoring data and other monitoring data in the N1 monitoring data, and calculating a first root mean square error of the N1 monitoring accuracy of the nth monitoring device;
And step 133, when any difference is greater than the first root mean square error, determining that the data state of the nth monitored data is fluctuating.
Specifically, when the number of times that the first device is determined to fluctuate within the second preset time is equal to or greater than the third preset value, it is determined that the first device is abnormal.
Specifically, the potential safety hazard is determined based on the abnormal monitoring data of the first device, and in step 2, generating a potential hazard troubleshooting topological route includes:
Step 21, searching a second storage module based on potential safety hazards to obtain abnormality diagnosis information corresponding to the potential safety hazards, wherein the abnormality diagnosis information is a layered detection item set, the first layer is the potential safety hazards, detection items connected with any detection item of the i-1 layer are abnormality reasons of any detection item, the number of detection items connected with the p-th detection item of the i-1 layer is TI i,p, i is a positive integer greater than or equal to 2, p is a positive integer greater than or equal to 1, and TI i,p is a positive integer greater than or equal to 1;
Step 22, obtaining all detection items in the abnormality diagnosis information, and generating a topological route set comprising all detection steps, wherein one detection node in each topological route corresponds to one detection item;
And step 23, respectively calculating the investigation cost of each topological route, and taking the topological route with the minimum investigation cost as the hidden danger investigation topological route.
Specifically, a first position of an exception handler is obtained, and in step 23, the investigation cost calculation method of each topology route is as follows:
Step 231, acquiring a G-th topological route in the topological route set, and then acquiring a second position of each detection node in the G-th topological route, wherein G is a positive integer of 1-G, and G is the total number of all topological routes in the topological route set;
step 232, calculating the distance from the abnormal handler to the initial node of the g-th topological route, and calculating the distance between any two connected detection nodes in the g-th topological route;
step 233, obtaining an initial node of the g-th topological route, and calculating the route cost at the initial node, wherein the calculation formula is as follows:
Wherein, And/>As a parameter weight coefficient, PC r is a route cost at an initial node, D t,r is a distance from an exception handler to the initial node, and MC r is a detection cost of the initial node;
Step 234, acquiring a q-th detection node of the g-th topological route, and calculating the route cost at the q-th detection node, wherein the calculation formula is as follows:
Wherein PC q is the route cost at the Q-th detection node, D q-1,q is the distance from the Q-1 th detection node to the Q-th detection node, MC q is the detection cost of the Q-th detection node, PC q-1 is the route cost at the Q-1 th detection node, Q is a positive integer between 2 and Q, Q is the total number of the g-th topological route detection nodes, and the first detection node of the g-th topological route is the initial node;
Step 235, judging whether the q-th detection node is a leaf node, if not, making q=q+1, returning to step 234, if so, obtaining the probability of the occurrence of abnormality of the q-th detection node, and calculating the branch checking cost at the q-th detection node based on the probability of the occurrence of abnormality of the q-th detection node and the route cost at the q-th detection node, wherein the calculation formula is as follows:
Wherein CI q is the branch investigation cost at the q-th detection node, PA q is the probability of abnormality of the q-th detection node,
Then, judging whether Q is equal to Q, if not, returning q=q+1 to the step 234, and if yes, entering a step 236;
Step 236, after traversing all the detection nodes in the g-th topological route, calculating the investigation cost of the g-th topological route, wherein the calculation formula is as follows:
wherein PC g is the investigation cost of the g-th topological route, J is a positive integer of 1-J, J is the total number of leaf nodes in the g-th topological route, and CI j is the branch investigation cost at the J-th leaf node.
Specifically, in step 5, the checking of the potential safety hazard by the exception handler includes:
Step 51, obtaining an initial node of a hidden trouble shooting topology route, and defining the initial node as an analysis node;
Step 52, judging whether the analysis node is a leaf node, if not, entering step 53, if yes, entering step 55;
step 53, acquiring first operation content corresponding to the detection item at the analysis node, transmitting the position of the analysis node and the first operation content to an instant messaging client of an abnormal handler, and acquiring a detection result;
Step 54, selecting a detection node corresponding to the detection result from lower detection nodes connected with the analysis node as a detection node to be analyzed according to the detection result, defining the detection node to be analyzed as the analysis node, and returning to the step 52;
step 55, determining that the detection item at the analysis node is the cause of the potential safety hazard, acquiring the abnormal recovery operation content corresponding to the detection item at the analysis node, and sending the position of the analysis node and the abnormal recovery operation content to the instant messaging client of the abnormal handler.
In a second aspect, the present invention also provides a field potential safety hazard management system based on instant messaging, which comprises: the system comprises first equipment, monitoring equipment, a site safety management platform and an instant messaging client, wherein the monitoring equipment is used for acquiring monitoring data of the first equipment, and the site safety management platform comprises an abnormality judgment module, a route generation module, an investigation and annotation module, a hidden danger investigation module and a risk calculation module;
The abnormality judging module is used for acquiring monitoring data of the first equipment and judging whether the first equipment is abnormal or not based on the monitoring data;
the route generation module is used for identifying potential safety hazards of the first equipment when the first equipment is abnormal, and generating a potential hazard troubleshooting topological route and potential hazard troubleshooting contents aiming at each detection node;
the investigation and annotation module is used for searching a first personnel information table based on the position information of the first equipment, acquiring information of an area responsible person in the area where the first equipment is located, then sending potential safety hazards, potential hazard investigation topological routes and potential hazard investigation contents of each detection node to an instant messaging client of the area responsible person, and carrying out annotation processing on the potential hazard investigation topological routes and the potential hazard investigation contents of each detection node by the area responsible person;
The hidden danger checking module is used for searching a second personnel information table based on the position information and the potential safety hazards when a positive wholesale reply is obtained, acquiring abnormal handling personnel information for handling the potential safety hazards, checking the potential safety hazards by the abnormal handling personnel, and sending a checking result to an instant messaging client of an area responsible person after the checking is finished;
and the risk calculation module is used for calculating the potential fault risk of the first equipment when a negative wholesale reply is obtained and sending the potential fault risk to the instant messaging client of the regional responsible person.
The invention discloses a field potential safety hazard management method and system based on instant messaging, which are used for judging whether a first device is abnormal or not based on monitoring data of the first device, wherein the data analysis replaces manual monitoring, so that the efficiency and accuracy of potential hazard analysis are improved, if the potential safety hazard analysis is abnormal, the potential safety hazard of the first device is identified, a potential hazard checking topological route and potential hazard checking contents aiming at each detection node are generated, the potential safety hazard, the potential hazard checking topological route and the potential hazard checking contents of each detection node are sent to an instant messaging client of an area responsible person in the area where the first device is located for approval, after the approval is passed, an abnormal processor in the area where the first device is located for processing the potential safety hazard is used for checking the potential safety hazard, and if the approval is not passed, the potential fault risk of the first device is sent to the instant messaging client of the area responsible person for reminding again. According to the technical scheme, the potential safety hazard correction and management cost can be reduced, the distrust on the potential safety hazard investigation and management is reduced, the on-site potential safety hazard treatment is more transparent and convenient, and a good responsibility implementation mechanism is established, so that the on-site potential safety hazard investigation and management correction is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, it will be apparent that the drawings in the following description are only embodiments of the present invention, and other drawings can be obtained according to the provided drawings without inventive effort to a person skilled in the art;
FIG. 1 is a flow chart of a field potential safety hazard management method based on instant messaging according to the invention;
FIG. 2 is a schematic diagram of an abnormality diagnosis information structure according to an embodiment of the present invention;
FIG. 3a is a schematic diagram of a first topology of a topology circuit according to an embodiment of the present invention;
FIG. 3b is a schematic diagram of a second topology of an embodiment of the present invention;
Fig. 4 is a schematic structural diagram of a field potential safety hazard management system based on instant messaging according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be apparent that the particular embodiments described herein are merely illustrative of the present invention and are some, but not all embodiments of the present invention. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on embodiments of the present invention, are within the scope of the present invention.
It should be noted that, if there is a description of "first", "second", etc. in the embodiments of the present invention, the description of "first", "second", etc. is only for descriptive purposes, and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
Fig. 1 is a flowchart of an embodiment of a field potential safety hazard management method based on instant messaging, where the flowchart specifically includes:
Step 1, a site safety management platform acquires monitoring data of first equipment, and judges whether the first equipment is abnormal or not based on the monitoring data.
Illustratively, the first device is a monitoring target for potential safety hazard monitoring, including electronic and electrical equipment, building facilities, and the like.
Specifically, in step 1, determining whether an abnormality occurs in the first device based on the monitoring data includes:
Step 11, acquiring nth monitoring data in the monitoring data, extracting M monitoring data related to the nth monitoring data from the monitoring data, and calculating an estimated monitoring value of the nth monitoring device based on the M monitoring data, wherein the calculation formula is as follows:
wherein EVn is the estimated monitoring value of the nth monitoring device, The parameter weight coefficient AVm is the M-th monitoring data in M monitoring data, k is a natural number, A is a constant, N is a positive integer of 1-N, N is the total number of the monitoring data, M is the total number of the monitoring data related to the N-th monitoring data, and the N-th monitoring device is the monitoring device for acquiring the N-th monitoring data.
Step 12, calculating monitoring accuracy of the nth monitoring device at the current moment based on the nth monitoring data and the estimated monitoring value of the nth monitoring device, wherein a calculation formula is as follows:
Wherein ACn is the monitoring accuracy of the nth monitoring device at the current moment, AVn is the nth monitoring data.
Step 13, acquiring N1 monitoring accuracy of the nth monitoring device within a first preset time from a first storage module, judging whether the data state of the nth monitoring data is fluctuating, if so, judging the data state of the nth monitoring data as fluctuating, and then entering step 15; if not, step 14 is entered, wherein the N1 monitoring resolutions include the monitoring accuracy of the nth monitoring device at the current time.
And 14, calculating the number of the N1 monitoring accuracy which is larger than or equal to a first preset value, judging the data state of the nth monitoring data to be normal if the number is larger than or equal to a second preset value, and judging the data state of the nth monitoring data to be abnormal if the number is smaller than the second preset value.
And 15, traversing all the monitoring data, judging that the first equipment is abnormal if the monitoring data with abnormal data state exists, judging whether the monitoring data with fluctuating data state exists if the monitoring data with fluctuating data state does not exist, judging that the first equipment has fluctuation if the monitoring data with fluctuating data state exists, and otherwise, judging that the first equipment is normal.
The total number N of the monitoring data, the first preset time, the first preset value, and the second preset value are set according to experience of a person skilled in the art or according to an actual application scenario, which is not limited in the embodiment of the present application.
The monitoring target is monitored from multiple angles by a plurality of monitoring devices aiming at the same monitoring target, so that a certain correlation exists between monitoring data acquired by each monitoring device. According to the technical scheme, according to any monitoring device, on the basis of considering the causal relation between the monitoring data and other monitoring data, the estimated monitoring value of the monitoring device is calculated, the monitoring accuracy of the nth monitoring device at the current moment is calculated based on the estimated monitoring value and the actual monitoring data, and finally whether the monitoring data of the monitoring device are abnormal or not is judged according to the number that the monitoring accuracy is greater than or equal to the first preset value in the first preset time, so that the accuracy of data abnormality judgment is improved. Before judging that the monitoring data is normal and abnormal, judging whether the monitoring data has fluctuation (namely noise) or not, if the monitoring data is the fluctuation data, not judging the monitoring data normally and abnormally, defining the monitoring data as fluctuation, and if the monitoring data is not the fluctuation data, judging the monitoring data normally and abnormally, so that the accuracy of judging the monitoring data normally and abnormally is further improved.
Illustratively, the monitoring device is a sensor.
Preferably, the estimated monitoring value calculation formula for any monitoring device is trained in advance and stored in the storage module in association with the monitoring device identification.
Preferably, after the monitoring data is acquired, any monitoring data, the time of acquiring any monitoring data, the estimated monitoring value corresponding to any monitoring data and the monitoring accuracy are stored correspondingly.
As a preferred embodiment of the present invention, in step 1, determining whether an abnormality occurs in the first device based on the monitoring data includes:
Acquiring nth monitoring data in the monitoring data, extracting M monitoring data related to the nth monitoring data from the monitoring data, and calculating an estimated monitoring value of the nth monitoring device based on the M monitoring data, wherein the calculation formula is as follows:
wherein EVn is the estimated monitoring value of the nth monitoring device, The parameter weight coefficient AVm is the M-th monitoring data in M monitoring data, k is a natural number, A is a constant, N is a positive integer of 1-N, N is the total number of the monitoring data, M is the total number of the monitoring data related to the N-th monitoring data, and the N-th monitoring device is the monitoring device for acquiring the N-th monitoring data;
Based on the nth monitoring data and the estimated monitoring value of the nth monitoring equipment, the monitoring accuracy of the current moment of the nth monitoring equipment is calculated, and the calculation formula is as follows:
Wherein ACn is the monitoring accuracy of the nth monitoring device at the current moment, AVn is the nth monitoring data;
Acquiring N1 monitoring precision in a first preset time of the nth monitoring device from a first storage module, calculating the number of the N1 monitoring precision which is larger than or equal to a first preset value, judging that the data state of the nth monitoring data is normal if the number is larger than or equal to a second preset value, and judging that the data state of the nth monitoring data is abnormal if the number is smaller than the second preset value, wherein the N1 monitoring precision comprises the monitoring precision of the nth monitoring device at the current moment;
and traversing all the monitoring data, judging that the first equipment is abnormal if the monitoring data with abnormal data state exists, and otherwise, judging that the first equipment is normal.
In the preferred technical scheme, normal fluctuation is not considered, and whether the monitoring data of the monitoring device are abnormal or not is judged only according to the number of the monitoring accuracy larger than or equal to a first preset value in the first preset time.
Specifically, in step 13, determining whether the data state of the nth monitored data is fluctuating includes:
step 131, acquiring N1 monitoring data of the nth monitoring device within a first preset time, wherein the N1 monitoring data comprise the nth monitoring data;
Step 132, respectively calculating the difference value of the nth monitoring data and other monitoring data in the N1 monitoring data, and calculating a first root mean square error of the N1 monitoring accuracy of the nth monitoring device;
And step 133, when any difference is greater than the first root mean square error, determining that the data state of the nth monitored data is fluctuating.
Specifically, when the number of times that the first device is determined to fluctuate within the second preset time is equal to or greater than the third preset value, it is determined that the first device is abnormal.
And step 2, if the first equipment is abnormal, the site safety management platform identifies potential safety hazards of the first equipment, and generates a potential hazard checking topological route and potential hazard checking contents aiming at each detection node.
Specifically, the potential safety hazard is determined based on the abnormal monitoring data of the first device, and in step 2, generating a potential hazard troubleshooting topological route includes:
Step 21, searching a second storage module based on potential safety hazards to obtain abnormality diagnosis information corresponding to the potential safety hazards, wherein the abnormality diagnosis information is a layered detection item set, the first layer is the potential safety hazards, the detection items connected with any detection item of the i-1 layer are abnormality reasons of any detection item, the number of detection items connected with the p-th detection item of the i-1 layer is TI i,p, i is a positive integer greater than or equal to 2, p is a positive integer greater than or equal to 1, and TI i,p is a positive integer greater than or equal to 1.
Step 22, obtaining all detection items in the abnormality diagnosis information, and generating a topological route set comprising all detection steps, wherein one detection node in each topological route corresponds to one detection item.
And step 23, respectively calculating the investigation cost of each topological route, and taking the topological route with the minimum investigation cost as the hidden danger investigation topological route.
As shown in fig. 2, the technical scheme of the present invention will be described by taking the case that abnormality diagnosis information is 3 layers as an example. The first layer is the potential safety hazard (potential safety hazard name/potential safety hazard type), and the second layer contains two branches, detects item 1 and detects item 2, and wherein, detects item 1 contains three branches, detects item 11, detects item 12 and detects item 13 (detects item 11, detects item 12 and detects item 13 and is located the third layer), detects item 2 and does not have the branch. All the detection items in the abnormality diagnosis information include detection item 1, detection item 2, detection item 11, detection item 12, and detection item 13. Since the above-described potential safety hazards are caused by the detection items 1 and 2 and the detection items 1 are caused by the detection items 11, 12 and 13, the detection items 1 may be detected or the detection items 11, 12 and 13 may be directly detected without detecting the detection items 1 when the topology is generated.
As shown in fig. 3a, the generation of the topology line will be described taking the initial detection node as the detection item 11 as an example. Taking the detection item 11 as an initial node (namely a first detection node), when the detection result of the detection item of the initial node is true, transferring to a second detection node (leaf node), wherein the detection item corresponding to the second detection node is the detection item 11 (because the second detection node is the leaf node, if the detection result of the detection item of the initial node is true, the detection item 11 is an abnormal cause causing potential safety hazard), and when the detection result of the detection item of the initial node is false, transferring to a third detection node (non-leaf node), and the detection item corresponding to the third detection node is the detection item 2; when the detection result of the third detection node detection item is true, the detection method is transferred to a fourth detection node (leaf node), the detection item corresponding to the fourth detection node is detection item 2, when the detection result of the third detection node detection item is false, the detection method is transferred to a fifth detection node (non-leaf node), and the detection item corresponding to the fifth detection node is detection item 12; when the detection result of the detection item of the fifth detection node is true, the detection node is shifted to a sixth detection node (leaf node), the detection item corresponding to the sixth detection node is detection item 12, and when the detection result of the detection item of the fifth detection node is false, the detection node is shifted to a seventh detection node (leaf node), and the detection item corresponding to the seventh detection node is detection item 13.
As shown in fig. 3b, the generation of the topology line will be described taking the initial detection node as the detection item 1 as an example. Taking the detection item 1 as an initial node (namely a first detection node), transferring to a second detection node (a non-leaf node) when the detection result of the detection item of the initial node is true, wherein the detection item corresponding to the second detection node is detection item 11, transferring to a third detection node (a leaf node) when the detection result of the detection item of the initial node is false, and transferring the detection item corresponding to the third detection node to be detection item 2 (because the third detection node is the leaf node, if the detection result of the detection item of the initial node is true, the detection item 2 is an abnormal cause for causing potential safety hazards); when the detection result of the detection item of the second detection node is true, the detection item is transferred to a fourth detection node (leaf node), the detection item corresponding to the fourth detection node is detection item 11, and when the detection result of the detection item of the second detection node is false, the detection item is transferred to a fifth detection node (non-leaf node), and the detection item corresponding to the fifth detection node is detection item 12; when the detection result of the detection item of the fifth detection node is true, the detection node is shifted to a sixth detection node (leaf node), the detection item corresponding to the sixth detection node is detection item 12, and when the detection result of the detection item of the fifth detection node is false, the detection node is shifted to a seventh detection node (leaf node), and the detection item corresponding to the seventh detection node is detection item 13. The topology line may also detect item 2 or item 12 as an initial node.
Specifically, a first position of an exception handler is obtained, and in step 23, the investigation cost calculation method of each topology route is as follows:
Step 231, acquiring a G-th topological route in the topological route set, and then acquiring a second position of each detection node in the G-th topological route, wherein G is a positive integer of 1-G, and G is the total number of all the topological routes in the topological route set.
And 232, calculating the distance from the abnormal handler to the initial node of the g-th topological route, and calculating the distance between any two connected detection nodes in the g-th topological route.
Step 233, obtaining an initial node of the g-th topological route, and calculating the route cost at the initial node, wherein the calculation formula is as follows:
Wherein, And/>As the parameter weight coefficient, PC r is the route cost at the initial node, D t,r is the distance from the exception handler to the initial node, and MC r is the detection cost of the initial node.
Step 234, acquiring a q-th detection node of the g-th topological route, and calculating the route cost at the q-th detection node, wherein the calculation formula is as follows:
Wherein PC q is the route cost at the Q-th detection node, D q-1,q is the distance from the Q-1 th detection node to the Q-th detection node, MC q is the detection cost of the Q-th detection node, PC q-1 is the route cost at the Q-1 th detection node, Q is a positive integer from 2 to Q, Q is the total number of the g-th topological route detection nodes, and the first detection node of the g-th topological route is the initial node.
Step 235, judging whether the q-th detection node is a leaf node, if not, making q=q+1, returning to step 234, if so, obtaining the probability of the occurrence of abnormality of the q-th detection node, and calculating the branch checking cost at the q-th detection node based on the probability of the occurrence of abnormality of the q-th detection node and the route cost at the q-th detection node, wherein the calculation formula is as follows:
Wherein CI q is the branch investigation cost at the q-th detection node, PA q is the probability of abnormality of the q-th detection node,
Then, it is determined whether Q is equal to Q, if not, q=q+1 is returned to step 234, and if yes, step 236 is entered.
Step 236, after traversing all the detection nodes in the g-th topological route, calculating the investigation cost of the g-th topological route, wherein the calculation formula is as follows:
wherein PC g is the investigation cost of the g-th topological route, J is a positive integer of 1-J, J is the total number of leaf nodes in the g-th topological route, and CI j is the branch investigation cost at the J-th leaf node.
When the investigation cost of each topological route is calculated, the distance from an abnormal processor to an initial node of the topological route, the distance between detection nodes, the detection cost of each detection node and the probability of abnormality of detection items corresponding to each node are considered, so that the potential safety hazard is rapidly and timely investigated, the investigation cost of the potential safety hazard is reduced, and the correction cost of the potential safety hazard is reduced.
And 3, searching a first personnel information table based on the position information of the first equipment, acquiring information of a regional responsible person in the region where the first equipment is located, and then sending the potential safety hazards, the potential hazard checking topological route and the potential hazard checking content of each detection node to an instant messaging client of the regional responsible person, wherein the regional responsible person performs annotation processing on the potential hazard checking topological route and the potential hazard checking content of each detection node.
Preferably, the topology lines are ordered according to the investigation cost of each topology line, the front N2 topology lines are selected, the probability of fault occurrence of each detection node on each topology line and the time of last detection are respectively marked, the marked front N2 topology lines are sent to regional responsible persons, and the regional responsible persons select hidden danger investigation topology lines.
Step 4, when a positive annotation reply is obtained, the step 5 is entered, and when a negative annotation reply is obtained, the step 6 is entered.
And 5, searching a second personnel information table based on the position information and the potential safety hazards, acquiring information of abnormal handling personnel for handling the potential safety hazards, checking the potential safety hazards by the abnormal handling personnel, and transmitting the checking result to the instant messaging client of the regional responsible person after the checking is finished.
Preferably, the troubleshooting result includes a cause of the potential safety hazard, an operation result of an abnormality handler, and the like.
According to the technical scheme, the position of the first equipment is firstly obtained, the regional responsible person information of the region where the first equipment is located is obtained based on the position, the regional responsible person examines and approves the hidden danger examination topological route and hidden danger examination contents of each detection node, after the examination and approval pass, abnormal handling personnel for handling the hidden danger in the region where the first equipment is located conduct examination and investigation on the hidden danger, a good responsibility implementation mechanism is established, and on-site hidden danger examination, management and improvement are promoted.
Specifically, in step 5, the checking of the potential safety hazard by the exception handler includes:
and 51, acquiring an initial node of the hidden trouble shooting topology route, and defining the initial node as an analysis node.
Step 52, judging whether the analysis node is a leaf node, if not, proceeding to step 53, if yes, proceeding to step 55.
Step 53, obtaining first operation content corresponding to the detection item at the analysis node, sending the position of the analysis node and the first operation content to the instant messaging client of the abnormal handler, and obtaining the detection result.
And 54, selecting a detection node corresponding to the detection result from lower detection nodes connected with the analysis node as a detection node to be analyzed according to the detection result, defining the detection node to be analyzed as the analysis node, and returning to the step 52.
Step 55, determining that the detection item at the analysis node is the cause of the potential safety hazard, acquiring the abnormal recovery operation content corresponding to the detection item at the analysis node, and sending the position of the analysis node and the abnormal recovery operation content to the instant messaging client of the abnormal handler.
After the exception handling personnel moves to the analysis node, detecting according to the first operation content corresponding to the analysis node, feeding back a detection result (true or false) to the site safety management platform, and sending the position of the next node to be analyzed and the first operation content corresponding to the node to be analyzed to the instant messaging client of the exception handling personnel along the hidden danger checking topological route according to the detection result by the site safety management platform, repeatedly confirming in this way until the exception cause causing the hidden danger is checked, and then rectifying and recovering the hidden danger according to the exception recovering operation content aiming at the exception cause.
According to the technical scheme, the nodes to be detected and the operation content in the next step are distributed based on the detection result of the abnormal handler, so that zero-distance refined on-site potential safety hazard processing guidance can be realized, and the on-site potential safety hazard processing is more convenient and clear.
And 6, calculating potential fault risks of the first equipment and sending the potential fault risks to the instant messaging client of the regional responsible person.
Illustratively, the potential risk of failure of the first device is calculated from the economic loss and impact magnitude caused by the failure of the first device.
Fig. 4 is a schematic structural diagram of an embodiment of an instant messaging-based field security risk management system according to the present invention. As shown in fig. 4, the system includes: the system comprises a first device 10, a monitoring device 20, a site safety management platform 30 and an instant messaging client 40, wherein the monitoring device 20 is used for collecting monitoring data of the first device 10, and the site safety management platform 30 comprises an anomaly judgment module 301, a route generation module 302, an investigation and approval module 303, a hidden danger investigation module 304 and a risk calculation module 305.
The abnormality determination module 301 is configured to obtain monitoring data of the first device 10, and determine whether the first device is abnormal based on the monitoring data.
The route generation module 302 is configured to identify a potential safety hazard of the first device 10 when the first device 10 is abnormal, and generate a potential hazard troubleshooting topology route and a potential hazard troubleshooting content for each detection node.
The troubleshooting and accounting module 303 is configured to search a first personnel information table based on the location information of the first device 10, obtain information of a regional responsible person in the region where the first device is located, and then send the potential safety hazard, the potential troubleshooting topological route and the potential troubleshooting content of each detection node to the instant messaging client 40 of the regional responsible person, where the regional responsible person performs accounting processing on the potential troubleshooting topological route and the potential troubleshooting content of each detection node.
The hidden danger checking module 304 is configured to, when obtaining a positive reply of the wholesale, search the second personnel information table based on the position information and the hidden danger, obtain information of an abnormal handler handling the hidden danger, check the hidden danger by the abnormal handler, and send a checking result to an instant messaging client of the regional responsible person after the checking is finished.
The risk calculation module 305 is configured to calculate a potential failure risk of the first device 10 when a negative wholesale reply is obtained, and send the potential failure risk to the instant messaging client 40 of the regional responsible person.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of computer programs, which may be stored on a non-transitory computer readable storage medium, and which, when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The foregoing examples have shown only the preferred embodiments of the invention, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (6)

1. The field potential safety hazard management method based on instant messaging is characterized by comprising the following steps of:
Step 1, a site safety management platform acquires monitoring data of first equipment, and judges whether the first equipment is abnormal or not based on the monitoring data;
step 2, if the first equipment is abnormal, the site safety management platform identifies potential safety hazards of the first equipment, and generates a potential hazard checking topological route and potential hazard checking contents aiming at each detection node;
Step 3, searching a first personnel information table based on the position information of the first equipment, acquiring information of a regional responsible person in the region where the first equipment is located, and then sending the potential safety hazards, the potential hazard investigation topological route and the potential hazard investigation contents of each detection node to an instant messaging client of the regional responsible person, wherein the regional responsible person carries out wholesale processing on the potential hazard investigation topological route and the potential hazard investigation contents of each detection node;
Step 4, when a positive annotation reply is obtained, entering a step 5, and when a negative annotation reply is obtained, entering a step 6;
Step 5, searching a second personnel information table based on the position information and the potential safety hazards, acquiring information of abnormal handling personnel for handling the potential safety hazards, checking the potential safety hazards by the abnormal handling personnel, and sending the checking result to an instant messaging client of a person responsible for the area after the checking is finished;
step 6, calculating potential fault risks of the first equipment and sending the potential fault risks to an instant messaging client of the regional responsible person;
determining the potential safety hazard based on the first device abnormal monitoring data, wherein in the step 2, generating a potential hazard troubleshooting topological route includes:
Step 21, searching a second storage module based on the potential safety hazard to acquire abnormal diagnosis information corresponding to the potential safety hazard, wherein the abnormal diagnosis information is a layered detection item set, the first layer is the potential safety hazard, the detection items connected with any detection item of the i-1 layer are the abnormal reasons of any detection item, the number of detection items connected with the p-1 layer of the i-1 layer is TI i,p, i is a positive integer greater than or equal to 2, p is a positive integer greater than or equal to 1, and TI i,p is a positive integer greater than or equal to 1;
step 22, obtaining all detection items in the abnormality diagnosis information, and generating a topological route set comprising all detection steps, wherein one detection node in each topological route corresponds to one detection item;
step 23, respectively calculating the investigation cost of each topological route, and taking the topological route with the minimum investigation cost as the hidden danger investigation topological route;
The first position of the exception handler is obtained, and in step 23, the method for calculating the investigation cost of each topology route includes:
Step 231, acquiring a G-th topological route in the topological route set, and then acquiring a second position of each detection node in the G-th topological route, wherein G is a positive integer of 1-G, and G is the total number of all topological routes in the topological route set;
step 232, calculating the distance between the abnormal handler and the initial node of the g-th topological route, and calculating the distance between any two connected detection nodes in the g-th topological route;
Step 233, obtaining an initial node of the g-th topological route, and calculating the route cost at the initial node, wherein the calculation formula is as follows:
Wherein, the sum is a parameter weight coefficient, PC r is a route cost at the initial node, D t,r is a distance from the abnormal handler to the initial node, MC r is a detection cost of the initial node;
Step 234, acquiring a q-th detection node of the g-th topological route, and calculating the route cost at the q-th detection node, wherein the calculation formula is as follows:
Wherein PC q is a route cost at the Q-th detection node, D q-1,q is a distance from the Q-1-th detection node to the Q-th detection node, MC q is a detection cost of the Q-th detection node, PC q-1 is a route cost at the Q-1-th detection node, Q is a positive integer from 2 to Q, Q is a total number of the g-th topology route detection nodes, and a first detection node of the g-th topology route is the initial node;
Step 235, determining whether the q-th detection node is a leaf node, if not, making q=q+1, and returning to step 234, if so, obtaining a probability of abnormality of the q-th detection node, and calculating a branch investigation cost at the q-th detection node based on the probability of abnormality of the q-th detection node and a route cost at the q-th detection node, where a calculation formula is as follows:
Wherein CI q is the branch investigation cost at the q-th detection node, PA q is the probability of abnormality of the q-th detection node,
Then, judging whether Q is equal to Q, if not, returning q=q+1 to the step 234, and if yes, entering a step 236;
step 236, after traversing all the detection nodes in the g-th topological route, calculating the investigation cost of the g-th topological route, wherein the calculation formula is as follows:
Wherein PC g is the investigation cost of the g-th topological route, J is a positive integer of 1-J, J is the total number of leaf nodes in the g-th topological route, and CI j is the branch investigation cost at the J-th leaf node.
2. The method for managing potential safety hazards on site based on instant messaging according to claim 1, wherein in the step 1, the step of judging whether the first device is abnormal based on the monitoring data comprises:
Step 11, acquiring nth monitoring data in the monitoring data, extracting M monitoring data related to the nth monitoring data from the monitoring data, and calculating an estimated monitoring value of nth monitoring equipment based on the M monitoring data, wherein the calculation formula is as follows:
EV n is an estimated monitoring value of the nth monitoring device, which is a parameter weight coefficient, AV m is the mth monitoring data in the M monitoring data, k is a natural number, A is a constant, N is a positive integer of 1-N, N is the total number of the monitoring data, M is the total number of the monitoring data related to the nth monitoring data, and the nth monitoring device is a monitoring device for acquiring the nth monitoring data;
Step 12, calculating the monitoring accuracy of the nth monitoring device at the current moment based on the nth monitoring data and the estimated monitoring value of the nth monitoring device, wherein the calculation formula is as follows:
Wherein, AC n is the monitoring accuracy of the nth monitoring device at the current time, and AV n is the nth monitoring data;
Step 13, acquiring N1 monitoring precision of the nth monitoring device within a first preset time from a first storage module, judging whether the data state of the nth monitoring data is fluctuating, if so, judging the data state of the nth monitoring data as fluctuating, and then entering step 15; if not, step 14 is entered, wherein the N1 monitoring resolutions include the monitoring resolutions of the nth monitoring device at the current time;
Step 14, calculating the number of the N1 monitoring accuracy which is larger than or equal to a first preset value, if the number is larger than or equal to a second preset value, judging that the data state of the nth monitoring data is normal, and if the number is smaller than the second preset value, judging that the data state of the nth monitoring data is abnormal;
And step 15, traversing all the monitoring data, judging that the first equipment is abnormal if the monitoring data with abnormal data state exists, judging whether the monitoring data with fluctuating data state exists if the monitoring data with fluctuating data state does not exist, judging that the first equipment has fluctuation if the monitoring data with fluctuating data state exists, and otherwise, judging that the first equipment is normal.
3. The method for managing potential safety hazards on site based on instant messaging according to claim 2, wherein in the step 13, the determining whether the data state of the nth monitored data is a fluctuation comprises:
step 131, obtaining N1 monitoring data of the nth monitoring device within the first preset time, where the N1 monitoring data includes the nth monitoring data;
Step 132, respectively calculating the difference value between the nth monitoring data and other monitoring data in the N1 monitoring data, and calculating a first root mean square error of the N1 monitoring accuracy of the nth monitoring device;
and step 133, when any of the differences is greater than the first root mean square error, determining that the data state of the nth monitored data is fluctuating.
4. The method for managing potential safety hazards on site based on instant messaging according to claim 2, wherein when the number of times that the first device is judged to fluctuate within a second preset time is greater than or equal to a third preset value, it is judged that abnormality exists in the first device.
5. The method for managing potential safety hazards based on instant messaging according to claim 1, wherein in the step 5, the step of checking the potential safety hazards by the exception handler comprises:
Step 51, obtaining an initial node of the hidden trouble shooting topology route, and defining the initial node as an analysis node;
step 52, judging whether the analysis node is a leaf node, if not, entering step 53, if yes, entering step 55;
Step 53, acquiring first operation content corresponding to the detection item at the analysis node, transmitting the position of the analysis node and the first operation content to an instant messaging client of the exception handler, and acquiring a detection result;
Step 54, selecting a detection node corresponding to the detection result from lower detection nodes connected with the analysis node as a detection node to be analyzed according to the detection result, defining the detection node to be analyzed as the analysis node, and returning to the step 52;
And step 55, judging that the detection item at the analysis node is the cause of the potential safety hazard, acquiring the abnormal recovery operation content corresponding to the detection item at the analysis node, and sending the position of the analysis node and the abnormal recovery operation content to an instant messaging client of the abnormal handler.
6. An instant messaging-based field potential safety hazard management system for implementing the instant messaging-based field potential safety hazard management method as claimed in any one of claims 1 to 5, comprising: the system comprises first equipment, monitoring equipment, a site safety management platform and an instant messaging client, wherein the monitoring equipment is used for collecting monitoring data of the first equipment, and the site safety management platform comprises an abnormality judgment module, a route generation module, an investigation and annotation module, a hidden danger investigation module and a risk calculation module;
the abnormality judging module is used for acquiring the monitoring data of the first equipment and judging whether the first equipment is abnormal or not based on the monitoring data;
the route generation module is used for identifying potential safety hazards of the first equipment when the first equipment is abnormal, and generating a potential hazard investigation topological route and potential hazard investigation contents aiming at each detection node;
the investigation and annotation module is used for searching a first personnel information table based on the position information of the first equipment, acquiring information of a regional responsible person in the region where the first equipment is located, and then sending the potential safety hazards, the potential hazard investigation topological route and the potential hazard investigation contents of each detection node to an instant messaging client of the regional responsible person, and carrying out annotation processing on the potential hazard investigation topological route and the potential hazard investigation contents of each detection node by the regional responsible person;
The hidden danger checking module is used for searching a second personnel information table based on the position information and the potential safety hazards when a positive wholesale reply is obtained, acquiring abnormal handling personnel information for handling the potential safety hazards, checking the potential safety hazards by the abnormal handling personnel, and sending the checking result to an instant messaging client of the regional responsible person after the checking is finished;
The risk calculation module is used for calculating potential fault risks of the first equipment when negative wholesale replies are obtained, and sending the potential fault risks to the instant messaging client of the regional responsible person;
determining the potential safety hazard based on the first device occurrence anomaly monitoring data, the generating a potential hazard troubleshooting topological route comprising:
Step 21, searching a second storage module based on the potential safety hazard to acquire abnormal diagnosis information corresponding to the potential safety hazard, wherein the abnormal diagnosis information is a layered detection item set, the first layer is the potential safety hazard, the detection items connected with any detection item of the i-1 layer are the abnormal reasons of any detection item, the number of detection items connected with the p-1 layer of the i-1 layer is TI i,p, i is a positive integer greater than or equal to 2, p is a positive integer greater than or equal to 1, and TI i,p is a positive integer greater than or equal to 1;
step 22, obtaining all detection items in the abnormality diagnosis information, and generating a topological route set comprising all detection steps, wherein one detection node in each topological route corresponds to one detection item;
step 23, respectively calculating the investigation cost of each topological route, and taking the topological route with the minimum investigation cost as the hidden danger investigation topological route;
The first position of the exception handler is obtained, and in step 23, the method for calculating the investigation cost of each topology route includes:
Step 231, acquiring a G-th topological route in the topological route set, and then acquiring a second position of each detection node in the G-th topological route, wherein G is a positive integer of 1-G, and G is the total number of all topological routes in the topological route set;
step 232, calculating the distance between the abnormal handler and the initial node of the g-th topological route, and calculating the distance between any two connected detection nodes in the g-th topological route;
Step 233, obtaining an initial node of the g-th topological route, and calculating the route cost at the initial node, wherein the calculation formula is as follows:
Wherein, the sum is a parameter weight coefficient, PC r is a route cost at the initial node, D t,r is a distance from the abnormal handler to the initial node, MC r is a detection cost of the initial node;
Step 234, acquiring a q-th detection node of the g-th topological route, and calculating the route cost at the q-th detection node, wherein the calculation formula is as follows:
Wherein PC q is a route cost at the Q-th detection node, D q-1,q is a distance from the Q-1-th detection node to the Q-th detection node, MC q is a detection cost of the Q-th detection node, PC q-1 is a route cost at the Q-1-th detection node, Q is a positive integer from 2 to Q, Q is a total number of the g-th topology route detection nodes, and a first detection node of the g-th topology route is the initial node;
Step 235, determining whether the q-th detection node is a leaf node, if not, making q=q+1, and returning to step 234, if so, obtaining a probability of abnormality of the q-th detection node, and calculating a branch investigation cost at the q-th detection node based on the probability of abnormality of the q-th detection node and a route cost at the q-th detection node, where a calculation formula is as follows:
Wherein CI q is the branch investigation cost at the q-th detection node, PA q is the probability of abnormality of the q-th detection node,
Then, judging whether Q is equal to Q, if not, returning q=q+1 to the step 234, and if yes, entering a step 236;
step 236, after traversing all the detection nodes in the g-th topological route, calculating the investigation cost of the g-th topological route, wherein the calculation formula is as follows:
wherein PC g is the investigation cost of the g-th topological route, J is a positive integer of 1-J, J is the total number of leaf nodes in the g-th topological route, and CI j is the branch investigation cost at the J-th leaf node.
CN202311734617.1A 2023-12-18 2023-12-18 On-site potential safety hazard management method and system based on instant messaging Active CN117422425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311734617.1A CN117422425B (en) 2023-12-18 2023-12-18 On-site potential safety hazard management method and system based on instant messaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311734617.1A CN117422425B (en) 2023-12-18 2023-12-18 On-site potential safety hazard management method and system based on instant messaging

Publications (2)

Publication Number Publication Date
CN117422425A CN117422425A (en) 2024-01-19
CN117422425B true CN117422425B (en) 2024-04-30

Family

ID=89528697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311734617.1A Active CN117422425B (en) 2023-12-18 2023-12-18 On-site potential safety hazard management method and system based on instant messaging

Country Status (1)

Country Link
CN (1) CN117422425B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016095718A1 (en) * 2014-12-17 2016-06-23 中兴通讯股份有限公司 Method for detecting communication link, base station, network manager, system and storage medium
CN108256655A (en) * 2018-01-24 2018-07-06 杭州凯达电力建设有限公司 A kind of electric system hidden danger management system and method
CN108717604A (en) * 2018-05-21 2018-10-30 西安科技大学 A kind of production safety hidden danger closed loop management system
CN110533290A (en) * 2019-07-24 2019-12-03 清华大学 Site safety hidden danger management method and system based on instant messaging
CN110888788A (en) * 2019-10-16 2020-03-17 平安科技(深圳)有限公司 Anomaly detection method and device, computer equipment and storage medium
CN111260988A (en) * 2020-03-12 2020-06-09 国网山东省电力公司威海供电公司 Troubleshooting method suitable for power system training and courseware system thereof
CN112151195A (en) * 2020-10-16 2020-12-29 云南电网有限责任公司丽江供电局 Method and device for checking potential safety hazards of power distribution equipment
WO2021196501A1 (en) * 2020-03-31 2021-10-07 佛山科学技术学院 Big data-based fault monitoring method and system for industrial production line
CN113642856A (en) * 2021-07-27 2021-11-12 杨道合 Accident prevention and hidden danger investigation interactive management method
CN114358338A (en) * 2021-12-30 2022-04-15 泰豪软件股份有限公司 Power equipment fault diagnosis method, system, storage medium and equipment
CN116169793A (en) * 2023-04-25 2023-05-26 国网山东省电力公司胶州市供电公司 Supervision and prediction system for power equipment
CN116504039A (en) * 2023-05-08 2023-07-28 湖北中烟工业有限责任公司 Abnormality identification method and device for indoor equipment and electronic equipment
CN116757484A (en) * 2023-08-23 2023-09-15 山东全员本安教育咨询有限公司 Enterprise safety hidden danger monitoring and tracing method, device, equipment and storage medium
CN116937575A (en) * 2023-09-14 2023-10-24 济南高品伟业信息科技有限公司 Energy monitoring management system for grid system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016095718A1 (en) * 2014-12-17 2016-06-23 中兴通讯股份有限公司 Method for detecting communication link, base station, network manager, system and storage medium
CN108256655A (en) * 2018-01-24 2018-07-06 杭州凯达电力建设有限公司 A kind of electric system hidden danger management system and method
CN108717604A (en) * 2018-05-21 2018-10-30 西安科技大学 A kind of production safety hidden danger closed loop management system
CN110533290A (en) * 2019-07-24 2019-12-03 清华大学 Site safety hidden danger management method and system based on instant messaging
CN110888788A (en) * 2019-10-16 2020-03-17 平安科技(深圳)有限公司 Anomaly detection method and device, computer equipment and storage medium
CN111260988A (en) * 2020-03-12 2020-06-09 国网山东省电力公司威海供电公司 Troubleshooting method suitable for power system training and courseware system thereof
WO2021196501A1 (en) * 2020-03-31 2021-10-07 佛山科学技术学院 Big data-based fault monitoring method and system for industrial production line
CN112151195A (en) * 2020-10-16 2020-12-29 云南电网有限责任公司丽江供电局 Method and device for checking potential safety hazards of power distribution equipment
CN113642856A (en) * 2021-07-27 2021-11-12 杨道合 Accident prevention and hidden danger investigation interactive management method
CN114358338A (en) * 2021-12-30 2022-04-15 泰豪软件股份有限公司 Power equipment fault diagnosis method, system, storage medium and equipment
CN116169793A (en) * 2023-04-25 2023-05-26 国网山东省电力公司胶州市供电公司 Supervision and prediction system for power equipment
CN116504039A (en) * 2023-05-08 2023-07-28 湖北中烟工业有限责任公司 Abnormality identification method and device for indoor equipment and electronic equipment
CN116757484A (en) * 2023-08-23 2023-09-15 山东全员本安教育咨询有限公司 Enterprise safety hidden danger monitoring and tracing method, device, equipment and storage medium
CN116937575A (en) * 2023-09-14 2023-10-24 济南高品伟业信息科技有限公司 Energy monitoring management system for grid system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
事故隐患差异化整治模型及其在军工单位的应用研究;董继业;马参国;王建军;屈战国;李文军;;安全与环境工程(第06期);全文 *
董继业 ; 马参国 ; 王建军 ; 屈战国 ; 李文军 ; .事故隐患差异化整治模型及其在军工单位的应用研究.安全与环境工程.2016,(第06期),全文. *

Also Published As

Publication number Publication date
CN117422425A (en) 2024-01-19

Similar Documents

Publication Publication Date Title
TWI632443B (en) Apparatus for determining importance of abnormal data and method for determining importance of abnormal data
CN105205394B (en) Data detection method and device for intrusion detection
CN112185050B (en) Security level confirmation method and device and fire fighting system
CN113157524B (en) Big data based exception problem solving method, system, equipment and storage medium
CN111506710B (en) Information sending method and device based on rumor prediction model and computer equipment
CN116882722B (en) Intelligent building site management method and system based on Internet of things
CN113094244B (en) Machine room operation intelligent detection system for data center
CN111611991A (en) Fault processing method and device, electronic equipment and computer readable storage medium
CN115841730A (en) Video monitoring system and abnormal event detection method
CN117422425B (en) On-site potential safety hazard management method and system based on instant messaging
CN115240264A (en) Visitor risk value evaluation method and system
CN107895453A (en) Building safety warning system and method
KR102157201B1 (en) System and method for determining disastrous based on image and accident record analysis
CN113449059A (en) Event processing method, device, equipment and storage medium
CN116381419A (en) Transmission line fault processing method, device, computer equipment and storage medium
CN114048346B (en) GIS-based safety production integrated management and control platform and method
CN111368681B (en) Living body screening method, device, equipment and storage medium based on multi-point positioning
US20220207986A1 (en) Monitoring system
CN110751567A (en) Vehicle information processing method, device, computer equipment and storage medium
Volochiy et al. Improvement of fidelity of moving objects classification in guard signaling complexes with seismic sensors
CN117979254B (en) Internet of things networking method and system of gas detector
CN116506482B (en) Remote control method, system and storage medium for data machine room
CN113837703B (en) Automatic check method for quantitative weight prevention of logistics waybill carrying information in real time
CN107818450B (en) Disaster response processing method and device for vehicle insurance, computer equipment and storage medium
CN117668723A (en) Data monitoring method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant