CN117422425B - On-site potential safety hazard management method and system based on instant messaging - Google Patents
On-site potential safety hazard management method and system based on instant messaging Download PDFInfo
- Publication number
- CN117422425B CN117422425B CN202311734617.1A CN202311734617A CN117422425B CN 117422425 B CN117422425 B CN 117422425B CN 202311734617 A CN202311734617 A CN 202311734617A CN 117422425 B CN117422425 B CN 117422425B
- Authority
- CN
- China
- Prior art keywords
- detection
- node
- route
- monitoring data
- topological
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 37
- 238000001514 detection method Methods 0.000 claims abstract description 317
- 238000012544 monitoring process Methods 0.000 claims abstract description 203
- 238000007689 inspection Methods 0.000 claims abstract description 55
- 230000005856 abnormality Effects 0.000 claims abstract description 41
- 238000013024 troubleshooting Methods 0.000 claims abstract description 35
- 238000000034 method Methods 0.000 claims abstract description 21
- 230000002159 abnormal effect Effects 0.000 claims description 64
- 238000012806 monitoring device Methods 0.000 claims description 58
- 238000011835 investigation Methods 0.000 claims description 38
- 238000004364 calculation method Methods 0.000 claims description 33
- 238000004458 analytical method Methods 0.000 claims description 31
- 238000003745 diagnosis Methods 0.000 claims description 15
- 238000011084 recovery Methods 0.000 claims description 7
- 239000000284 extract Substances 0.000 claims description 5
- 230000008569 process Effects 0.000 claims description 5
- 238000012546 transfer Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 231100001267 hazard identification Toxicity 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000002829 reductive effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 238000009435 building construction Methods 0.000 description 1
- 230000001364 causal effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/243—Classification techniques relating to the number of classes
- G06F18/2433—Single-class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Artificial Intelligence (AREA)
- Computer Security & Cryptography (AREA)
- Operations Research (AREA)
- Educational Administration (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Life Sciences & Earth Sciences (AREA)
- Quality & Reliability (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
本发明公开了一种基于即时通讯的现场安全隐患管理方法及系统:基于第一设备的监测数据判断第一设备是否发生异常,发生异常则识别安全隐患类型,生成隐患排查拓扑路线和每个检测节点的隐患排查内容,随后将安全隐患、隐患排查拓扑路线和每个检测节点的隐患排查内容发送到第一设备所在区域的区域负责人的即时通讯客户端,由区域负责人进行批示,得到肯定批示时,由处理该安全隐患的异常处理人员对安全隐患进行排查,并将排查结果发送到区域负责人的即时通讯客户端,得到否定批示时,计算第一设备的潜在故障风险,并发送到区域负责人的即时通讯客户端。本发明的技术方案降低了安全隐患管理成本,提高了现场隐患排查治理整改效率。
The present invention discloses a method and system for managing on-site safety hazards based on instant messaging: based on the monitoring data of the first device, it is determined whether the first device has an abnormality, if an abnormality occurs, the type of safety hazard is identified, a topological route for troubleshooting and the content of the hidden danger troubleshooting of each detection node are generated, and then the safety hazard, the topological route for troubleshooting and the content of the hidden danger troubleshooting of each detection node are sent to the instant messaging client of the regional person in charge of the area where the first device is located, and the regional person in charge makes an instruction. When a positive instruction is obtained, the abnormality handling personnel who handles the safety hazard will check the safety hazard, and send the inspection result to the instant messaging client of the regional person in charge. When a negative instruction is obtained, the potential failure risk of the first device is calculated and sent to the instant messaging client of the regional person in charge. The technical solution of the present invention reduces the cost of safety hazard management and improves the efficiency of on-site hidden danger troubleshooting, governance and rectification.
Description
技术领域Technical Field
本发明属于通信技术领域,具体涉及一种基于即时通讯的现场安全隐患管理方法及系统。The present invention belongs to the field of communication technology, and in particular relates to an on-site safety hazard management method and system based on instant messaging.
背景技术Background technique
目前,国内房建工程、轨道交通工程、市政工程、道桥工程等建筑工程建设规模较大,对安全质量隐患排查主要依靠安全工作组巡视,或依靠后台人员通过视频监控进行监视,人工进行安全工作检测,不仅工作强度大,且在进行安全隐患排查时人为因素影响大,造成识别效率和准确率较低。At present, the scale of construction projects such as domestic building construction projects, rail transit projects, municipal projects, road and bridge projects is large. The inspection of safety and quality hazards mainly relies on inspections by safety working groups, or monitoring by back-end personnel through video surveillance and manual safety work inspections. Not only is the work intensity high, but the human factor has a great influence when conducting safety hazard inspections, resulting in low identification efficiency and accuracy.
随着数字化、智能化技术发展,通过信息化手段为安全生产保驾护航,提高安全生产效益,降低安全事故风险,是一个重要的研究方向。现有技术中,比如中国专利申请CN112488376A,公开了一种作业现场的安全隐患管控方法及系统,获取存在安全隐患的位置所在的位置区域信息和安全隐患内容数据,根据位置区域信息获取与位置区域信息匹配的作业安全信息,根据安全隐患内容数据的类型,按照预设的识别方法对安全隐患内容数据进行特征提取,获取安全隐患特征数据,将安全隐患特征数据与作业安全信息进行匹配,以确定安全隐患结果。该方法通过对安全隐患特征数据与作业安全信息进行匹配来判断是否存在安全隐患,未根据判断结果对安全隐患原因进行分析、排查,安全隐患管控不够全面。再比如中国申请CN116486343A,公开了一种基建现场安全隐患识别方法,配置所需要监控识别的安全隐患种类及对应匹配的安全隐患识别策略;获取监控区域图像,配置监控区域图像内涉及安全隐患的区域及涉及的安全隐患种类;获取实时监控区域图像,通过安全隐患识别策略对实时监控区域图像内涉及的安全隐患进行匹配分析;将识别出安全隐患的分析结果通讯通知监控预警终端。该方法识别出安全隐患后将结果通知给监控预警终端,会造成管理制度执行效率低,逐层传达时效力递减等问题。With the development of digital and intelligent technology, it is an important research direction to protect production safety through information technology, improve production safety benefits, and reduce the risk of safety accidents. In the prior art, for example, Chinese patent application CN112488376A discloses a method and system for the control of safety hazards at the work site, which obtains the location area information and safety hazard content data of the location where the safety hazard exists, obtains the operation safety information matching the location area information according to the location area information, and extracts the characteristics of the safety hazard content data according to the preset identification method according to the type of the safety hazard content data, obtains the safety hazard characteristic data, and matches the safety hazard characteristic data with the operation safety information to determine the safety hazard result. This method determines whether there is a safety hazard by matching the safety hazard characteristic data with the operation safety information, and does not analyze and investigate the cause of the safety hazard based on the judgment result, so the safety hazard control is not comprehensive enough. Another example is China's application CN116486343A, which discloses a method for identifying safety hazards at infrastructure sites. It configures the types of safety hazards that need to be monitored and identified and the corresponding safety hazard identification strategies; obtains the monitoring area image, configures the areas involved in the monitoring area image and the types of safety hazards involved; obtains the real-time monitoring area image, and uses the safety hazard identification strategy to match and analyze the safety hazards involved in the real-time monitoring area image; and communicates the analysis results of the identified safety hazards to the monitoring and early warning terminal. This method notifies the monitoring and early warning terminal of the results after identifying the safety hazards, which will cause problems such as low efficiency in the implementation of the management system and decreasing effectiveness when communicating layer by layer.
因此,提供一种基于即时通讯的现场安全隐患管理方法及系统,以降低安全隐患整改和管理成本,减少对安全隐患排查治理的不信任,使现场安全隐患处理更加透明便利,建立责任落实机制,提高现场隐患排查治理整改效率,是亟待解决的问题。Therefore, it is an urgent problem to provide an on-site safety hazard management method and system based on instant messaging to reduce the cost of safety hazard rectification and management, reduce distrust in safety hazard investigation and management, make on-site safety hazard handling more transparent and convenient, establish a responsibility implementation mechanism, and improve the efficiency of on-site hazard investigation, management and rectification.
发明内容Summary of the invention
针对上述提出的技术问题,本发明提供一种基于即时通讯的现场安全隐患管理方法及系统。In response to the above-mentioned technical problems, the present invention provides an on-site safety hazard management method and system based on instant messaging.
第一方面,本发明提供了一种基于即时通讯的现场安全隐患管理方法,该方法包括:In a first aspect, the present invention provides a method for managing on-site safety hazards based on instant messaging, the method comprising:
步骤1、现场安全管理平台获取第一设备的监测数据,基于监测数据判断第一设备是否发生异常;Step 1: The on-site safety management platform obtains monitoring data of the first device, and determines whether an abnormality occurs in the first device based on the monitoring data;
步骤2、若第一设备异常,现场安全管理平台识别第一设备的安全隐患,并生成隐患排查拓扑路线和针对每个检测节点的隐患排查内容;Step 2: If the first device is abnormal, the on-site safety management platform identifies the safety hazard of the first device and generates a hazard investigation topology route and hazard investigation content for each detection node;
步骤3、基于第一设备的位置信息查找第一人员信息表,获取第一设备所在区域的区域负责人信息,随后将安全隐患、隐患排查拓扑路线和每个检测节点的隐患排查内容发送到区域负责人的即时通讯客户端,由区域负责人对隐患排查拓扑路线和每个检测节点的隐患排查内容进行批示处理;Step 3: search the first personnel information table based on the location information of the first device, obtain the information of the regional person in charge of the area where the first device is located, and then send the safety hazard, the hazard investigation topological route and the hazard investigation content of each detection node to the instant messaging client of the regional person in charge, and the regional person in charge will issue instructions on the hazard investigation topological route and the hazard investigation content of each detection node;
步骤4、得到肯定的批示回复时,进入步骤5,得到否定的批示回复时,进入步骤6;Step 4: If a positive reply is received, proceed to step 5; if a negative reply is received, proceed to step 6;
步骤5、基于位置信息和安全隐患查找第二人员信息表,获取处理安全隐患的异常处理人员信息,由异常处理人员对安全隐患进行排查,排查结束后,将排查结果发送到区域负责人的即时通讯客户端;Step 5: search the second personnel information table based on the location information and the safety hazard, obtain the information of the exception handling personnel who handles the safety hazard, and have the exception handling personnel check the safety hazard. After the check is completed, send the check result to the instant messaging client of the regional person in charge;
步骤6、计算第一设备的潜在故障风险,并发送到区域负责人的即时通讯客户端。Step 6: Calculate the potential failure risk of the first device and send it to the instant messaging client of the regional manager.
具体地,步骤1中,基于监测数据判断第一设备是否发生异常包括:Specifically, in step 1, judging whether an abnormality occurs in the first device based on the monitoring data includes:
步骤11、获取监测数据中的第n个监测数据,并从监测数据中提取与第n个监测数据相关的M个监测数据,基于M个监测数据计算第n个监测设备的预估监测数值,计算公式为:Step 11: Obtain the nth monitoring data in the monitoring data, extract M monitoring data related to the nth monitoring data from the monitoring data, and calculate the estimated monitoring value of the nth monitoring device based on the M monitoring data. The calculation formula is:
, ,
其中,EVn为第n个监测设备的预估监测数值,为参数权重系数,AVm为M个监测数据中的第m个监测数据,k为自然数,A为常数,n为1~N的正整数,N为监测数据的总数,M为与第n个监测数据相关的监测数据的总数,第n个监测设备为获取第n个监测数据的监测设备;Among them, EV n is the estimated monitoring value of the nth monitoring device, is the parameter weight coefficient, AV m is the mth monitoring data among M monitoring data, k is a natural number, A is a constant, n is a positive integer from 1 to N, N is the total number of monitoring data, M is the total number of monitoring data related to the nth monitoring data, and the nth monitoring device is the monitoring device that obtains the nth monitoring data;
步骤12、基于第n个监测数据和第n个监测设备的预估监测数值计算第n个监测设备当前时刻的监测精准度,计算公式为:Step 12: Calculate the monitoring accuracy of the nth monitoring device at the current moment based on the nth monitoring data and the estimated monitoring value of the nth monitoring device. The calculation formula is:
, ,
其中,ACn为第n个监测设备当前时刻的监测精准度,AVn为第n个监测数据;Wherein, ACn is the monitoring accuracy of the nth monitoring device at the current moment, and AVn is the nth monitoring data;
步骤13、从第一存储模块获取第n个监测设备第一预设时间内的N1个监测精准度,并判断第n个监测数据的数据状态是否为波动,若是,则将第n个监测数据的数据状态判定为波动,随后进入步骤15;若不是,则进入步骤14,其中,N1个监测精准度包括第n个监测设备当前时刻的监测精准度;Step 13, obtaining N1 monitoring accuracies of the nth monitoring device within the first preset time from the first storage module, and determining whether the data state of the nth monitoring data is fluctuating, if so, determining the data state of the nth monitoring data as fluctuating, and then proceeding to step 15; if not, proceeding to step 14, wherein the N1 monitoring accuracies include the monitoring accuracy of the nth monitoring device at the current moment;
步骤14、计算N1个监测精准度中大于等于第一预设值的个数,若个数大于等于第二预设值,则判定第n个监测数据的数据状态为正常,若个数小于第二预设值,则判定第n个监测数据的数据状态为异常;Step 14, calculating the number of N1 monitoring accuracies that are greater than or equal to the first preset value, if the number is greater than or equal to the second preset value, determining that the data state of the nth monitoring data is normal, if the number is less than the second preset value, determining that the data state of the nth monitoring data is abnormal;
步骤15、遍历完所有监测数据,若存在数据状态为异常的监测数据,则判定第一设备异常,若不存在,则判断是否存在数据状态为波动的监测数据,若存在,则判定第一设备存在波动,否则,判定第一设备正常。Step 15, after traversing all monitoring data, if there is monitoring data with abnormal data status, determine that the first device is abnormal; if not, determine whether there is monitoring data with fluctuating data status; if so, determine that there is fluctuation in the first device; otherwise, determine that the first device is normal.
具体地,步骤13中,判断第n个监测数据的数据状态是否为波动包括:Specifically, in step 13, determining whether the data state of the nth monitoring data is fluctuating includes:
步骤131、获取第n个监测设备第一预设时间内的N1个监测数据,其中,N1个监测数据包括第n个监测数据;Step 131, obtaining N1 monitoring data of the nth monitoring device within a first preset time, wherein the N1 monitoring data include the nth monitoring data;
步骤132、分别计算第n个监测数据与N1个监测数据中其他监测数据的差值,并计算第n个监测设备N1个监测精准度的第一均方根误差;Step 132, respectively calculating the difference between the nth monitoring data and other monitoring data in N1 monitoring data, and calculating the first root mean square error of N1 monitoring accuracy of the nth monitoring device;
步骤133、当任一差值均大于第一均方根误差时,判定第n个监测数据的数据状态为波动。Step 133: When any difference is greater than the first root mean square error, it is determined that the data state of the nth monitoring data is fluctuation.
具体地,第二预设时间内第一设备被判定为波动的次数大于等于第三预设值时,判定第一设备存在异常。Specifically, when the number of times the first device is determined to fluctuate within the second preset time is greater than or equal to a third preset value, it is determined that the first device is abnormal.
具体地,基于第一设备出现异常监测数据来判定安全隐患,步骤2中,生成隐患排查拓扑路线包括:Specifically, based on the abnormal monitoring data of the first device, the potential safety hazard is determined. In step 2, generating a potential safety hazard troubleshooting topology route includes:
步骤21、基于安全隐患查找第二存储模块,获取安全隐患对应的异常诊断信息,其中,异常诊断信息为分层的检测项目集合,第一层为安全隐患,第i层与第i-1层任一检测项目连接的检测项目为任一检测项目的异常原因,第i层与第i-1层第p个检测项目连接的检测项目的数量为TIi,p个,其中,i为大于等于2的正整数,p为大于等于1的正整数,TIi,p为大于等于1的正整数;Step 21, searching the second storage module based on the safety hazard, obtaining abnormal diagnosis information corresponding to the safety hazard, wherein the abnormal diagnosis information is a layered set of detection items, the first layer is the safety hazard, the detection item connected to any detection item of the i-th layer and the i-1-th layer is the abnormal cause of any detection item, the number of detection items connected to the i-th layer and the p-th detection item of the i-1-th layer is TI i,p , wherein i is a positive integer greater than or equal to 2, p is a positive integer greater than or equal to 1, and TI i,p is a positive integer greater than or equal to 1;
步骤22、获取异常诊断信息中的所有检测项目,生成包含所有检测步骤的拓扑路线集合,其中,每条拓扑路线中的一个检测节点对应一个检测项目;Step 22: Obtain all detection items in the abnormal diagnosis information, and generate a topological route set including all detection steps, wherein a detection node in each topological route corresponds to a detection item;
步骤23、分别计算每条拓扑路线的排查代价,将排查代价最小的拓扑路线作为隐患排查拓扑路线。Step 23: Calculate the inspection cost of each topological route respectively, and use the topological route with the minimum inspection cost as the hidden danger inspection topological route.
具体地,获取异常处理人员的第一位置,步骤23中,每条拓扑路线的排查代价计算方法为:Specifically, the first position of the exception handling personnel is obtained. In step 23, the troubleshooting cost calculation method of each topological route is:
步骤231、获取拓扑路线集合中的第g条拓扑路线,随后获取第g条拓扑路线中每个检测节点的第二位置,其中,g为1~G的正整数,G为拓扑路线集合中所有拓扑路线的总数;Step 231, obtaining the g-th topological route in the topological route set, and then obtaining the second position of each detection node in the g-th topological route, where g is a positive integer from 1 to G, and G is the total number of all topological routes in the topological route set;
步骤232、计算异常处理人员到第g条拓扑路线的初始节点的距离,并计算第g条拓扑路线中任意两个相连检测节点间的距离;Step 232: Calculate the distance from the exception handling personnel to the initial node of the g-th topological route, and calculate the distance between any two connected detection nodes in the g-th topological route;
步骤233、获取第g条拓扑路线的初始节点,计算初始节点处的路线代价,计算公式为:Step 233: Obtain the initial node of the g-th topological route, and calculate the route cost at the initial node. The calculation formula is:
, ,
其中,和/>为参数权重系数,PCr为初始节点处的路线代价,Dt,r为异常处理人员到初始节点的距离,MCr为初始节点的检测代价;in, and/> is the parameter weight coefficient, PC r is the route cost at the initial node, D t,r is the distance from the abnormality handler to the initial node, and MC r is the detection cost of the initial node;
步骤234、获取第g条拓扑路线的第q个检测节点,计算第q个检测节点处的路线代价,计算公式为:Step 234: Obtain the qth detection node of the gth topological route, and calculate the route cost at the qth detection node. The calculation formula is:
, ,
其中,PCq为第q个检测节点处的路线代价,Dq-1,q为从第q-1个检测节点到第q个检测节点的距离,MCq为第q个检测节点的检测代价,PCq-1为第q-1个检测节点处的路线代价,q为2~Q的正整数,Q为第g条拓扑路线检测节点的总数,第g条拓扑路线的第一个检测节点为初始节点;Wherein, PC q is the route cost at the qth detection node, D q-1,q is the distance from the q-1th detection node to the qth detection node, MC q is the detection cost of the qth detection node, PC q-1 is the route cost at the q-1th detection node, q is a positive integer from 2 to Q, Q is the total number of detection nodes of the gth topological route, and the first detection node of the gth topological route is the initial node;
步骤235、判断第q个检测节点是否是叶子节点,若不是,则使q=q+1,返回步骤234,若是,则获取第q个检测节点发生异常的概率,基于第q个检测节点发生异常的概率和第q个检测节点处的路线代价计算第q个检测节点处的支路排查代价,计算公式为:Step 235: determine whether the qth detection node is a leaf node. If not, set q=q+1 and return to step 234. If yes, obtain the probability of an abnormality occurring at the qth detection node. Calculate the branch inspection cost at the qth detection node based on the probability of an abnormality occurring at the qth detection node and the route cost at the qth detection node. The calculation formula is:
, ,
其中,CIq为第q个检测节点处的支路排查代价,PAq为第q个检测节点发生异常的概率,Where, CI q is the branch inspection cost at the qth detection node, PA q is the probability of an abnormality occurring at the qth detection node,
随后判断q是否等于Q,若不是,则使q=q+1,返回步骤234,若是,则进入步骤236;Then determine whether q is equal to Q. If not, set q=q+1 and return to step 234. If yes, proceed to step 236.
步骤236、遍历完第g条拓扑路线中的所有检测节点后,计算第g条拓扑路线的排查代价,计算公式为:Step 236: After traversing all detection nodes in the g-th topological route, calculate the inspection cost of the g-th topological route. The calculation formula is:
, ,
其中,PCg为第g条拓扑路线的排查代价,j为1~J的正整数,J为第g条拓扑路线中叶子节点的总数,CIj为第j个叶子节点处的支路排查代价。Among them, PC g is the inspection cost of the g-th topological route, j is a positive integer from 1 to J, J is the total number of leaf nodes in the g-th topological route, and CI j is the branch inspection cost at the j-th leaf node.
具体地,步骤5中,由异常处理人员对安全隐患进行排查包括:Specifically, in step 5, the safety hazard investigation by the exception handling personnel includes:
步骤51、获取隐患排查拓扑路线的初始节点,将初始节点定义为分析节点;Step 51: Obtain the initial node of the hidden danger investigation topology route, and define the initial node as an analysis node;
步骤52、判断分析节点是否为叶子节点,若不是,则进入步骤53,若是,进入步骤55;Step 52: determine whether the analysis node is a leaf node. If not, proceed to step 53; if so, proceed to step 55;
步骤53、获取与分析节点处检测项目相对应的第一操作内容,将分析节点的位置和第一操作内容发送到异常处理人员的即时通讯客户端,并获取检测结果;Step 53: Obtain the first operation content corresponding to the detection item at the analysis node, send the location of the analysis node and the first operation content to the instant messaging client of the exception handling personnel, and obtain the detection result;
步骤54、根据检测结果,从与分析节点相连的下层检测节点中选择与检测结果相对应的检测节点作为待分析检测节点,将待分析检测节点定义为分析节点,返回步骤52;Step 54: According to the detection result, a detection node corresponding to the detection result is selected from the lower layer detection nodes connected to the analysis node as the detection node to be analyzed, and the detection node to be analyzed is defined as the analysis node, and the process returns to step 52;
步骤55、判定分析节点处的检测项目是引起安全隐患的原因,获取与分析节点处的检测项目相对应的异常恢复操作内容,将分析节点的位置和异常恢复操作内容发送到异常处理人员的即时通讯客户端。Step 55: determine that the detection item at the analysis node is the cause of the safety hazard, obtain the abnormal recovery operation content corresponding to the detection item at the analysis node, and send the location of the analysis node and the abnormal recovery operation content to the instant messaging client of the abnormality handler.
第二方面,本发明还提供了一种基于即时通讯的现场安全隐患管理系统,该系统包括:第一设备、监测设备、现场安全管理平台和即时通讯客户端,监测设备用于采集第一设备的监测数据,现场安全管理平台包括异常判断模块、路线生成模块、排查批示模块、隐患排查模块和风险计算模块;In a second aspect, the present invention further provides an on-site safety hazard management system based on instant messaging, the system comprising: a first device, a monitoring device, an on-site safety management platform and an instant messaging client, the monitoring device is used to collect monitoring data of the first device, and the on-site safety management platform comprises an abnormality judgment module, a route generation module, a troubleshooting instruction module, a hidden danger troubleshooting module and a risk calculation module;
异常判断模块,用于获取第一设备的监测数据,基于监测数据判断第一设备是否发生异常;An abnormality judgment module, used to obtain monitoring data of the first device, and judge whether an abnormality occurs in the first device based on the monitoring data;
路线生成模块,用于在第一设备异常时,识别第一设备的安全隐患,并生成隐患排查拓扑路线和针对每个检测节点的隐患排查内容;A route generation module, used to identify the safety hazards of the first device when the first device is abnormal, and generate a hazard troubleshooting topology route and hazard troubleshooting content for each detection node;
排查批示模块,用于基于第一设备的位置信息查找第一人员信息表,获取第一设备所在区域的区域负责人信息,随后将安全隐患、隐患排查拓扑路线和每个检测节点的隐患排查内容发送到区域负责人的即时通讯客户端,由区域负责人对隐患排查拓扑路线和每个检测节点的隐患排查内容进行批示处理;The inspection and instruction module is used to search the first personnel information table based on the location information of the first device, obtain the information of the regional person in charge of the area where the first device is located, and then send the safety hazards, the hazard inspection topological route and the hazard inspection content of each detection node to the instant messaging client of the regional person in charge, and the regional person in charge will inspect and handle the hazard inspection topological route and the hazard inspection content of each detection node;
隐患排查模块,用于在得到肯定的批示回复时,基于位置信息和安全隐患查找第二人员信息表,获取处理安全隐患的异常处理人员信息,由异常处理人员对安全隐患进行排查,排查结束后,将排查结果发送到区域负责人的即时通讯客户端;The hidden danger investigation module is used to search the second personnel information table based on the location information and the hidden dangers when a positive reply is received, and obtain the information of the exception handling personnel who handles the hidden dangers. The exception handling personnel will investigate the hidden dangers and send the investigation results to the instant messaging client of the regional person in charge after the investigation is completed;
风险计算模块,用于在得到否定的批示回复时,计算第一设备的潜在故障风险,并发送到区域负责人的即时通讯客户端。The risk calculation module is used to calculate the potential failure risk of the first device when a negative reply is received, and send the calculated risk to the instant messaging client of the regional person in charge.
本发明公开一种基于即时通讯的现场安全隐患管理方法及系统,基于第一设备的监测数据判断第一设备是否发生异常,通过数据分析代替人工监测,提高了隐患分析的效率和准确率,若发生异常,则识别第一设备的安全隐患,并生成隐患排查拓扑路线和针对每个检测节点的隐患排查内容,并将安全隐患、隐患排查拓扑路线和每个检测节点的隐患排查内容发送到第一设备所在区域的区域负责人即时通讯客户端进行批示,批示通过后,使第一设备所在区域负责处理该安全隐患的异常处理人员对安全隐患进行排查,若批示不通过,则通过将第一设备的潜在故障风险发送到区域负责人的即时通讯客户端,再次进行提醒。通过本发明技术方案,可以降低安全隐患整改和管理成本,减少对安全隐患排查治理的不信任,让现场安全隐患处理更加透明便利,建立了很好的责任落实机制,从而提升了现场隐患排查治理整改。The present invention discloses a method and system for managing on-site safety hazards based on instant messaging. Based on the monitoring data of the first device, it is judged whether the first device is abnormal. By replacing manual monitoring with data analysis, the efficiency and accuracy of the hidden danger analysis are improved. If an abnormality occurs, the safety hazard of the first device is identified, and a hidden danger investigation topological route and hidden danger investigation content for each detection node are generated. The safety hazard, the hidden danger investigation topological route and the hidden danger investigation content for each detection node are sent to the instant messaging client of the regional person in charge of the area where the first device is located for approval. After the approval is passed, the abnormality handling personnel responsible for handling the safety hazard in the area where the first device is located are required to investigate the safety hazard. If the approval is not passed, the potential failure risk of the first device is sent to the instant messaging client of the regional person in charge to remind again. Through the technical solution of the present invention, the rectification and management costs of safety hazards can be reduced, the distrust of safety hazard investigation and management can be reduced, the on-site safety hazard handling can be made more transparent and convenient, and a good responsibility implementation mechanism can be established, thereby improving the on-site hidden danger investigation, management and rectification.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图;In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art are briefly introduced below. Obviously, the drawings in the following description are only embodiments of the present invention. For those of ordinary skill in the art, other drawings can be obtained based on the provided drawings without creative work.
图1为本发明的一种基于即时通讯的现场安全隐患管理方法的流程图;FIG1 is a flow chart of an on-site safety hazard management method based on instant messaging according to the present invention;
图2为本发明实施例中异常诊断信息结构示意图;FIG2 is a schematic diagram of the structure of abnormal diagnosis information in an embodiment of the present invention;
图3a为本发明实施例中拓扑线路第一结构示意图;FIG3a is a schematic diagram of a first structure of a topology circuit according to an embodiment of the present invention;
图3b为本发明实施例中拓扑线路第二结构示意图;FIG3b is a schematic diagram of a second structure of a topology circuit according to an embodiment of the present invention;
图4为本发明的一种基于即时通讯的现场安全隐患管理系统的结构示意图。FIG. 4 is a schematic structural diagram of an on-site safety hazard management system based on instant messaging according to the present invention.
具体实施方式Detailed ways
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明经行进一步的详细说明。显然,此处所描述的具体实施例仅仅用于解释本发明,是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术普通人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical scheme and advantages of the present invention more clearly understood, the present invention is further described in detail below in conjunction with the accompanying drawings and embodiments. Obviously, the specific embodiments described herein are only used to explain the present invention and are part of the embodiments of the present invention, rather than all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without making creative work are within the scope of protection of the present invention.
需要说明,若本发明实施例中有涉及“第一”、 “第二”等的描述,则该“第一”、 “第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、 “第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本发明要求的保护范围之内。It should be noted that if there are descriptions involving "first", "second", etc. in the embodiments of the present invention, the descriptions of "first", "second", etc. are only used for descriptive purposes and cannot be understood as indicating or implying their relative importance or implicitly indicating the number of the indicated technical features. Therefore, the features defined as "first" and "second" may explicitly or implicitly include at least one of the features. In addition, the technical solutions between the various embodiments can be combined with each other, but they must be based on the ability of ordinary technicians in the field to implement them. When the combination of technical solutions is contradictory or cannot be implemented, it should be deemed that such combination of technical solutions does not exist and is not within the scope of protection required by the present invention.
图1所示是本发明提供的一种基于即时通讯的现场安全隐患管理方法的一个实施例的流程图,该流程图具体包括:FIG1 is a flow chart of an embodiment of a method for managing potential safety hazards on site based on instant messaging provided by the present invention, and the flow chart specifically includes:
步骤1、现场安全管理平台获取第一设备的监测数据,基于监测数据判断第一设备是否发生异常。Step 1: The on-site safety management platform obtains monitoring data of the first device, and determines whether an abnormality occurs in the first device based on the monitoring data.
示例性地,第一设备是进行安全隐患监测的监测目标,包括电子电器设备、建筑设施等。Exemplarily, the first device is a monitoring target for potential safety hazards monitoring, including electronic and electrical equipment, building facilities, etc.
具体地,步骤1中,基于监测数据判断第一设备是否发生异常包括:Specifically, in step 1, judging whether an abnormality occurs in the first device based on the monitoring data includes:
步骤11、获取监测数据中的第n个监测数据,并从监测数据中提取与第n个监测数据相关的M个监测数据,基于M个监测数据计算第n个监测设备的预估监测数值,计算公式为:Step 11: Obtain the nth monitoring data in the monitoring data, extract M monitoring data related to the nth monitoring data from the monitoring data, and calculate the estimated monitoring value of the nth monitoring device based on the M monitoring data. The calculation formula is:
, ,
其中,EVn为第n个监测设备的预估监测数值,为参数权重系数,AVm为M个监测数据中的第m个监测数据,k为自然数,A为常数,n为1~N的正整数,N为监测数据的总数,M为与第n个监测数据相关的监测数据的总数,第n个监测设备为获取第n个监测数据的监测设备。Among them, EVn is the estimated monitoring value of the nth monitoring device, is the parameter weight coefficient, AVm is the mth monitoring data among M monitoring data, k is a natural number, A is a constant, n is a positive integer from 1 to N, N is the total number of monitoring data, M is the total number of monitoring data related to the nth monitoring data, and the nth monitoring device is the monitoring device that obtains the nth monitoring data.
步骤12、基于第n个监测数据和第n个监测设备的预估监测数值计算第n个监测设备当前时刻的监测精准度,计算公式为:Step 12: Calculate the monitoring accuracy of the nth monitoring device at the current moment based on the nth monitoring data and the estimated monitoring value of the nth monitoring device. The calculation formula is:
, ,
其中,ACn为第n个监测设备当前时刻的监测精准度,AVn为第n个监测数据。Among them, ACn is the monitoring accuracy of the nth monitoring device at the current moment, and AVn is the nth monitoring data.
步骤13、从第一存储模块获取第n个监测设备第一预设时间内的N1个监测精准度,并判断第n个监测数据的数据状态是否为波动,若是,则将第n个监测数据的数据状态判定为波动,随后进入步骤15;若不是,则进入步骤14,其中,N1个监测精准度包括第n个监测设备当前时刻的监测精准度。Step 13, obtain N1 monitoring accuracies of the nth monitoring device within the first preset time from the first storage module, and determine whether the data state of the nth monitoring data is fluctuating. If so, determine the data state of the nth monitoring data as fluctuating, and then enter step 15; if not, enter step 14, wherein the N1 monitoring accuracies include the monitoring accuracy of the nth monitoring device at the current moment.
步骤14、计算N1个监测精准度中大于等于第一预设值的个数,若个数大于等于第二预设值,则判定第n个监测数据的数据状态为正常,若个数小于第二预设值,则判定第n个监测数据的数据状态为异常。Step 14, calculate the number of N1 monitoring accuracies that are greater than or equal to the first preset value. If the number is greater than or equal to the second preset value, the data state of the nth monitoring data is determined to be normal; if the number is less than the second preset value, the data state of the nth monitoring data is determined to be abnormal.
步骤15、遍历完所有监测数据,若存在数据状态为异常的监测数据,则判定第一设备异常,若不存在,则判断是否存在数据状态为波动的监测数据,若存在,则判定第一设备存在波动,否则,判定第一设备正常。Step 15, after traversing all monitoring data, if there is monitoring data with abnormal data status, determine that the first device is abnormal; if not, determine whether there is monitoring data with fluctuating data status; if so, determine that there is fluctuation in the first device; otherwise, determine that the first device is normal.
监测数据的总数N、第一预设时间、第一预设值和第二预设值,根据本领域技术人员的经验或根据实际应用场景进行设置,本申请实施例对此并不限定。The total number N of monitoring data, the first preset time, the first preset value and the second preset value are set according to the experience of technical personnel in this field or according to the actual application scenario, and the embodiments of the present application are not limited to this.
针对同一监测目标存在多个监测设备,从多个角度对监测目标进行监测,因此,各个监测设备获取的监测数据之间存在一定的关联性。根据本发明的技术方案,针对任一监测设备,在考虑其监测数据与其他监测数据的因果关系的基础上,计算该监测设备的预估监测数值,再基于预估监测数值和实际监测数据计算第n个监测设备当前时刻的监测精准度,最后依据第一预设时间内监测精准度大于等于第一预设值的个数来判断该监测设备的监测数据是否出现异常,提高数据异常判定的准确度。在判断监测数据正常、异常之前,先判断该监测数据是否存在波动(即为噪声),若为波动数据,则不进行正常、异常判断,将该监测数据定义为波动,若不为波动数据,则进行正常、异常判断,进一步提高了正常、异常判断的准确性。There are multiple monitoring devices for the same monitoring target, and the monitoring target is monitored from multiple angles. Therefore, there is a certain correlation between the monitoring data obtained by each monitoring device. According to the technical solution of the present invention, for any monitoring device, the estimated monitoring value of the monitoring device is calculated on the basis of considering the causal relationship between its monitoring data and other monitoring data, and then the monitoring accuracy of the nth monitoring device at the current moment is calculated based on the estimated monitoring value and the actual monitoring data. Finally, it is judged whether the monitoring data of the monitoring device is abnormal based on the number of monitoring accuracies greater than or equal to the first preset value within the first preset time, thereby improving the accuracy of data abnormality judgment. Before judging whether the monitoring data is normal or abnormal, first judge whether the monitoring data has fluctuations (i.e., noise). If it is fluctuating data, no normal or abnormal judgment is made, and the monitoring data is defined as fluctuation. If it is not fluctuating data, normal or abnormal judgment is made, further improving the accuracy of normal and abnormal judgment.
示例性地,监测设备为传感器。Exemplarily, the monitoring device is a sensor.
优选地,针对任一监测设备的预估监测数值计算公式是提前训练好的,与该监测设备标识相关联地存储在存储模块中。Preferably, the calculation formula for the estimated monitoring value for any monitoring device is trained in advance and stored in the storage module in association with the identification of the monitoring device.
优选地,获取监测数据后,将任一监测数据、获取该任一监测数据的时间、与该任一监测数据对应的预估监测数值和监测精准度相对应地进行存储。Preferably, after acquiring the monitoring data, any monitoring data, the time when the monitoring data is acquired, the estimated monitoring value corresponding to the monitoring data, and the monitoring accuracy are stored correspondingly.
作为本发明的一种优选技术方案,步骤1中,基于监测数据判断第一设备是否发生异常包括:As a preferred technical solution of the present invention, in step 1, judging whether an abnormality occurs in the first device based on the monitoring data includes:
获取监测数据中的第n个监测数据,并从监测数据中提取与第n个监测数据相关的M个监测数据,基于M个监测数据计算第n个监测设备的预估监测数值,计算公式为:Obtain the nth monitoring data in the monitoring data, extract M monitoring data related to the nth monitoring data from the monitoring data, and calculate the estimated monitoring value of the nth monitoring device based on the M monitoring data. The calculation formula is:
, ,
其中,EVn为第n个监测设备的预估监测数值,为参数权重系数,AVm为M个监测数据中的第m个监测数据,k为自然数,A为常数,n为1~N的正整数,N为监测数据的总数,M为与第n个监测数据相关的监测数据的总数,第n个监测设备为获取第n个监测数据的监测设备;Among them, EVn is the estimated monitoring value of the nth monitoring device, is the parameter weight coefficient, AVm is the mth monitoring data among M monitoring data, k is a natural number, A is a constant, n is a positive integer from 1 to N, N is the total number of monitoring data, M is the total number of monitoring data related to the nth monitoring data, and the nth monitoring device is the monitoring device that obtains the nth monitoring data;
基于第n个监测数据和第n个监测设备的预估监测数值计算第n个监测设备当前时刻的监测精准度,计算公式为:The monitoring accuracy of the nth monitoring device at the current moment is calculated based on the nth monitoring data and the estimated monitoring value of the nth monitoring device. The calculation formula is:
, ,
其中,ACn为第n个监测设备当前时刻的监测精准度,AVn为第n个监测数据;Among them, ACn is the monitoring accuracy of the nth monitoring device at the current moment, and AVn is the nth monitoring data;
从第一存储模块获取第n个监测设备第一预设时间内的N1个监测精准度,计算N1个监测精准度中大于等于第一预设值的个数,若个数大于等于第二预设值,则判定第n个监测数据的数据状态为正常,若个数小于第二预设值,则判定第n个监测数据的数据状态为异常,其中,N1个监测精准度包括第n个监测设备当前时刻的监测精准度;Obtaining N1 monitoring accuracies of the nth monitoring device within the first preset time from the first storage module, calculating the number of the N1 monitoring accuracies that are greater than or equal to the first preset value, and if the number is greater than or equal to the second preset value, determining that the data state of the nth monitoring data is normal; if the number is less than the second preset value, determining that the data state of the nth monitoring data is abnormal, wherein the N1 monitoring accuracies include the monitoring accuracy of the nth monitoring device at the current moment;
遍历完所有监测数据,若存在数据状态为异常的监测数据,则判定第一设备异常,否则判定第一设备正常。After traversing all monitoring data, if there is monitoring data with an abnormal data status, it is determined that the first device is abnormal, otherwise it is determined that the first device is normal.
在该优选技术方案中,不考虑正常波动,仅根据第一预设时间内监测精准度大于等于第一预设值的个数来判断该监测设备的监测数据是否存在异常。In this preferred technical solution, normal fluctuations are not taken into account, and whether the monitoring data of the monitoring device is abnormal is judged only based on the number of monitoring accuracies greater than or equal to the first preset value within the first preset time.
具体地,步骤13中,判断第n个监测数据的数据状态是否为波动包括:Specifically, in step 13, determining whether the data state of the nth monitoring data is fluctuating includes:
步骤131、获取第n个监测设备第一预设时间内的N1个监测数据,其中,N1个监测数据包括第n个监测数据;Step 131, obtaining N1 monitoring data of the nth monitoring device within a first preset time, wherein the N1 monitoring data include the nth monitoring data;
步骤132、分别计算第n个监测数据与N1个监测数据中其他监测数据的差值,并计算第n个监测设备N1个监测精准度的第一均方根误差;Step 132, respectively calculating the difference between the nth monitoring data and other monitoring data in N1 monitoring data, and calculating the first root mean square error of N1 monitoring accuracies of the nth monitoring device;
步骤133、当任一差值均大于第一均方根误差时,判定第n个监测数据的数据状态为波动。Step 133: When any difference is greater than the first root mean square error, it is determined that the data state of the nth monitoring data is fluctuation.
具体地,第二预设时间内第一设备被判定为波动的次数大于等于第三预设值时,判定第一设备存在异常。Specifically, when the number of times the first device is determined to fluctuate within the second preset time is greater than or equal to a third preset value, it is determined that the first device is abnormal.
步骤2、若第一设备异常,现场安全管理平台识别第一设备的安全隐患,并生成隐患排查拓扑路线和针对每个检测节点的隐患排查内容。Step 2: If the first device is abnormal, the on-site safety management platform identifies the safety hazard of the first device and generates a hazard investigation topology route and hazard investigation content for each detection node.
具体地,基于第一设备出现异常监测数据来判定安全隐患,步骤2中,生成隐患排查拓扑路线包括:Specifically, based on the abnormal monitoring data of the first device, the potential safety hazard is determined. In step 2, generating a potential safety hazard troubleshooting topology route includes:
步骤21、基于安全隐患查找第二存储模块,获取安全隐患对应的异常诊断信息,其中,异常诊断信息为分层的检测项目集合,第一层为安全隐患,第i层与第i-1层任一检测项目连接的检测项目为任一检测项目的异常原因,第i层与第i-1层第p个检测项目连接的检测项目的数量为TIi,p个,其中,i为大于等于2的正整数,p为大于等于1的正整数,TIi,p为大于等于1的正整数。Step 21. Search the second storage module based on the safety hazard to obtain abnormal diagnosis information corresponding to the safety hazard, wherein the abnormal diagnosis information is a layered set of detection items, the first layer is the safety hazard, the detection item connected to any detection item of the i-th layer and the i-1-th layer is the abnormal cause of any detection item, and the number of detection items connected to the i-th layer and the p-th detection item of the i-1-th layer is TI i,p , wherein i is a positive integer greater than or equal to 2, p is a positive integer greater than or equal to 1, and TI i,p is a positive integer greater than or equal to 1.
步骤22、获取异常诊断信息中的所有检测项目,生成包含所有检测步骤的拓扑路线集合,其中,每条拓扑路线中的一个检测节点对应一个检测项目。Step 22: Obtain all detection items in the abnormal diagnosis information, and generate a topological route set including all detection steps, wherein a detection node in each topological route corresponds to a detection item.
步骤23、分别计算每条拓扑路线的排查代价,将排查代价最小的拓扑路线作为隐患排查拓扑路线。Step 23: Calculate the inspection cost of each topological route respectively, and use the topological route with the minimum inspection cost as the hidden danger inspection topological route.
如图2所示,以异常诊断信息为3层为例对本发明技术方案进行说明。第一层为安全隐患(安全隐患名称/安全隐患类型/安全隐患种类),第二层包含两个分支,检测项目1和检测项目2,其中,检测项目1包含三个分支,检测项目11、检测项目12和检测项目13(检测项目11、检测项目12和检测项目13位于第三层),检测项目2没有分支。该异常诊断信息中的所有检测项目包括检测项目1、检测项目2、检测项目11、检测项目12和检测项目13。引起上述安全隐患的异常原因有检测项目1和检测项目2,引起检测项目1的异常原因有检测项目11、检测项目12和检测项目13,因此,在生成拓扑线路时,可以对检测项目1进行检测,也可以不对检测项目1进行检测直接对检测项目11、检测项目12和检测项目13进行检测。As shown in Figure 2, the technical solution of the present invention is explained by taking the abnormal diagnosis information as 3 layers as an example. The first layer is the safety hazard (safety hazard name/safety hazard type/safety hazard type), and the second layer contains two branches, detection item 1 and detection item 2, wherein detection item 1 contains three branches, detection item 11, detection item 12 and detection item 13 (detection item 11, detection item 12 and detection item 13 are located in the third layer), and detection item 2 has no branches. All detection items in the abnormal diagnosis information include detection item 1, detection item 2, detection item 11, detection item 12 and detection item 13. The abnormal causes of the above-mentioned safety hazards are detection item 1 and detection item 2, and the abnormal causes of detection item 1 are detection item 11, detection item 12 and detection item 13. Therefore, when generating the topological line, detection item 1 can be detected, or detection item 11, detection item 12 and detection item 13 can be detected directly without detecting detection item 1.
如图3a所示,以初始检测节点为检测项目11为例对拓扑线路的生成进行说明。以检测项目11为初始节点(即第一个检测节点),当初始节点检测项目的检测结果为真时,转移到第二个检测节点(叶子节点),第二个检测节点对应的检测项目是检测项目11(由于第二个检测节点为叶子节点,若初始节点检测项目的检测结果为真,则检测项目11即为引起安全隐患的异常原因),当初始节点检测项目的检测结果为假时,转移到第三个检测节点(非叶子节点),第三个检测节点对应的检测项目为检测项目2;当第三个检测节点检测项目的检测结果为真时,转移到第四个检测节点(叶子节点),第四个检测节点对应的检测项目是检测项目2,当第三个检测节点检测项目的检测结果为假时,转移到第五个检测节点(非叶子节点),第五个检测节点对应的检测项目为检测项目12;当第五个检测节点检测项目的检测结果为真时,转移到第六个检测节点(叶子节点),第六个检测节点对应的检测项目是检测项目12,当第五个检测节点检测项目的检测结果为假时,转移到第七个检测节点(叶子节点),第七个检测节点对应的检测项目是检测项目13。As shown in FIG. 3 a , the generation of the topology line is described by taking the initial detection node as the detection item 11 as an example. Take detection item 11 as the initial node (i.e., the first detection node). When the detection result of the detection item of the initial node is true, the detection node is transferred to the second detection node (leaf node), and the detection item corresponding to the second detection node is detection item 11 (since the second detection node is a leaf node, if the detection result of the detection item of the initial node is true, detection item 11 is the abnormal cause of the safety hazard). When the detection result of the detection item of the initial node is false, the detection node is transferred to the third detection node (non-leaf node), and the detection item corresponding to the third detection node is detection item 2; when the detection result of the detection item of the third detection node is true, the detection node is transferred to the fourth detection node (leaf node), and the detection item corresponding to the fourth detection node is detection item 2; when the detection result of the detection item of the third detection node is false, the detection node is transferred to the fifth detection node (non-leaf node), and the detection item corresponding to the fifth detection node is detection item 12; when the detection result of the detection item of the fifth detection node is true, the detection node is transferred to the sixth detection node (leaf node), and the detection item corresponding to the sixth detection node is detection item 12; when the detection result of the detection item of the fifth detection node is false, the detection node is transferred to the seventh detection node (leaf node), and the detection item corresponding to the seventh detection node is detection item 13.
如图3b所示,以初始检测节点为检测项目1为例对拓扑线路的生成进行说明。以检测项目1为初始节点(即第一个检测节点),当初始节点检测项目的检测结果为真时,转移到第二个检测节点(非叶子节点),第二个检测节点对应的检测项目是检测项目11,当初始节点检测项目的检测结果为假时,转移到第三个检测节点(叶子节点),第三个检测节点对应的检测项目为检测项目2(由于第三个检测节点为叶子节点,若初始节点检测项目的检测结果为真,则检测项目2即为引起安全隐患的异常原因);当第二个检测节点检测项目的检测结果为真时,转移到第四个检测节点(叶子节点),第四个检测节点对应的检测项目是检测项目11,当第二个检测节点检测项目的检测结果为假时,转移到第五个检测节点(非叶子节点),第五个检测节点对应的检测项目为检测项目12;当第五个检测节点检测项目的检测结果为真时,转移到第六个检测节点(叶子节点),第六个检测节点对应的检测项目是检测项目12,当第五个检测节点检测项目的检测结果为假时,转移到第七个检测节点(叶子节点),第七个检测节点对应的检测项目是检测项目13。拓扑线路也可以检测项目2或检测项目12等为初始节点。As shown in FIG. 3 b , the generation of the topology line is described by taking the initial detection node as detection item 1 as an example. Take detection item 1 as the initial node (i.e., the first detection node). When the detection result of the detection item of the initial node is true, transfer to the second detection node (non-leaf node), and the detection item corresponding to the second detection node is detection item 11. When the detection result of the detection item of the initial node is false, transfer to the third detection node (leaf node), and the detection item corresponding to the third detection node is detection item 2 (since the third detection node is a leaf node, if the detection result of the detection item of the initial node is true, detection item 2 is the abnormal cause of the safety hazard); when the detection result of the detection item of the second detection node is true, transfer to the fourth detection node (leaf node), and the detection item corresponding to the fourth detection node is detection item 11. When the detection result of the detection item of the second detection node is false, transfer to the fifth detection node (non-leaf node), and the detection item corresponding to the fifth detection node is detection item 12; when the detection result of the detection item of the fifth detection node is true, transfer to the sixth detection node (leaf node), and the detection item corresponding to the sixth detection node is detection item 12. When the detection result of the detection item of the fifth detection node is false, transfer to the seventh detection node (leaf node), and the detection item corresponding to the seventh detection node is detection item 13. The topological line may also use detection item 2 or detection item 12 as the initial node.
具体地,获取异常处理人员的第一位置,步骤23中,每条拓扑路线的排查代价计算方法为:Specifically, the first position of the exception handling personnel is obtained. In step 23, the troubleshooting cost calculation method of each topological route is:
步骤231、获取拓扑路线集合中的第g条拓扑路线,随后获取第g条拓扑路线中每个检测节点的第二位置,其中,g为1~G的正整数,G为拓扑路线集合中所有拓扑路线的总数。Step 231: obtain the g-th topological route in the topological route set, and then obtain the second position of each detection node in the g-th topological route, where g is a positive integer from 1 to G, and G is the total number of all topological routes in the topological route set.
步骤232、计算异常处理人员到第g条拓扑路线的初始节点的距离,并计算第g条拓扑路线中任意两个相连检测节点间的距离。Step 232: Calculate the distance from the exception handling personnel to the initial node of the g-th topological route, and calculate the distance between any two connected detection nodes in the g-th topological route.
步骤233、获取第g条拓扑路线的初始节点,计算初始节点处的路线代价,计算公式为:Step 233: Obtain the initial node of the g-th topological route, and calculate the route cost at the initial node. The calculation formula is:
, ,
其中,和/>为参数权重系数,PCr为初始节点处的路线代价,Dt,r为异常处理人员到初始节点的距离,MCr为初始节点的检测代价。in, and/> is the parameter weight coefficient, PC r is the route cost at the initial node, D t,r is the distance from the exception handler to the initial node, and MC r is the detection cost of the initial node.
步骤234、获取第g条拓扑路线的第q个检测节点,计算第q个检测节点处的路线代价,计算公式为:Step 234: Obtain the qth detection node of the gth topological route, and calculate the route cost at the qth detection node. The calculation formula is:
, ,
其中,PCq为第q个检测节点处的路线代价,Dq-1,q为从第q-1个检测节点到第q个检测节点的距离,MCq为第q个检测节点的检测代价,PCq-1为第q-1个检测节点处的路线代价,q为2~Q的正整数,Q为第g条拓扑路线检测节点的总数,第g条拓扑路线的第一个检测节点为初始节点。Among them, PC q is the route cost at the qth detection node, D q-1,q is the distance from the q-1th detection node to the qth detection node, MC q is the detection cost of the qth detection node, PC q-1 is the route cost at the q-1th detection node, q is a positive integer from 2 to Q, Q is the total number of detection nodes on the gth topological route, and the first detection node of the gth topological route is the initial node.
步骤235、判断第q个检测节点是否是叶子节点,若不是,则使q=q+1,返回步骤234,若是,则获取第q个检测节点发生异常的概率,基于第q个检测节点发生异常的概率和第q个检测节点处的路线代价计算第q个检测节点处的支路排查代价,计算公式为:Step 235: determine whether the qth detection node is a leaf node. If not, set q=q+1 and return to step 234. If yes, obtain the probability of an abnormality occurring at the qth detection node. Calculate the branch inspection cost at the qth detection node based on the probability of an abnormality occurring at the qth detection node and the route cost at the qth detection node. The calculation formula is:
, ,
其中,CIq为第q个检测节点处的支路排查代价,PAq为第q个检测节点发生异常的概率,Where, CI q is the branch inspection cost at the qth detection node, PA q is the probability of an abnormality occurring at the qth detection node,
随后判断q是否等于Q,若不是,则使q=q+1,返回步骤234,若是,则进入步骤236。Then determine whether q is equal to Q. If not, set q=q+1 and return to step 234. If so, go to step 236.
步骤236、遍历完第g条拓扑路线中的所有检测节点后,计算第g条拓扑路线的排查代价,计算公式为:Step 236: After traversing all detection nodes in the g-th topological route, calculate the inspection cost of the g-th topological route. The calculation formula is:
, ,
其中,PCg为第g条拓扑路线的排查代价,j为1~J的正整数,J为第g条拓扑路线中叶子节点的总数,CIj为第j个叶子节点处的支路排查代价。Among them, PC g is the inspection cost of the g-th topological route, j is a positive integer from 1 to J, J is the total number of leaf nodes in the g-th topological route, and CI j is the branch inspection cost at the j-th leaf node.
在计算每条拓扑路线的排查代价时,考虑了异常处理人员到拓扑路线初始节点的距离、各检测节点间的距离、各检测节点的检测代价和各节点对应的检测项目发生异常的概率,在保证及时快速排查安全隐患的同时降低安全隐患排查代价,降低了安全隐患整改成本。When calculating the inspection cost of each topological route, the distance from the exception handling personnel to the initial node of the topological route, the distance between each detection node, the detection cost of each detection node and the probability of an abnormality in the detection item corresponding to each node are taken into consideration. This ensures that safety hazards are promptly and quickly inspected while reducing the cost of safety hazard inspection and the cost of safety hazard rectification.
步骤3、基于第一设备的位置信息查找第一人员信息表,获取第一设备所在区域的区域负责人信息,随后将安全隐患、隐患排查拓扑路线和每个检测节点的隐患排查内容发送到区域负责人的即时通讯客户端,由区域负责人对隐患排查拓扑路线和每个检测节点的隐患排查内容进行批示处理。Step 3. Search the first personnel information table based on the location information of the first device to obtain the information of the regional person in charge of the area where the first device is located, and then send the safety hazards, hazard inspection topology routes and hazard inspection contents of each detection node to the instant messaging client of the regional person in charge. The regional person in charge will instruct on the hazard inspection topology routes and hazard inspection contents of each detection node.
优选地,根据每条拓扑线路的排查代价对拓扑线路进行排序,选择前N2条拓扑线路,分别标明每条拓扑线路上每个检测节点出现故障的概率以及上次进行检测的时间,将进行标注后的上述前N2条拓扑线路发送给区域负责人,由区域负责人选择隐患排查拓扑线路。Preferably, the topological lines are sorted according to the inspection cost of each topological line, the first N2 topological lines are selected, the probability of failure of each detection node on each topological line and the time of the last inspection are respectively marked, and the marked first N2 topological lines are sent to the regional person in charge, who selects the topological line for hidden danger inspection.
步骤4、得到肯定的批示回复时,进入步骤5,得到否定的批示回复时,进入步骤6。Step 4: If you get a positive response, go to step 5; if you get a negative response, go to step 6.
步骤5、基于位置信息和安全隐患查找第二人员信息表,获取处理安全隐患的异常处理人员信息,由异常处理人员对安全隐患进行排查,排查结束后,将排查结果发送到区域负责人的即时通讯客户端。Step 5: Search the second personnel information table based on the location information and safety hazards to obtain the information of the exception handling personnel who handle the safety hazards. The exception handling personnel will check the safety hazards and send the results to the instant messaging client of the regional manager after the check is completed.
优选地,排查结果包括引起所述安全隐患的原因和异常处理人员的操作结果等。Preferably, the troubleshooting results include the causes of the potential safety hazard and the operation results of the exception handling personnel.
根据本发明技术方案先获取第一设备的位置,基于该位置获取第一设备所在区域的区域负责人信息,由区域负责人对隐患排查拓扑路线和每个检测节点的隐患排查内容进行审批,审批通过后,再由第一设备所在区域处理上述安全隐患的异常处理人员对安全隐患进行排查,建立了很好的责任落实机制,提升了现场隐患排查治理整改。According to the technical solution of the present invention, the location of the first device is first obtained, and based on the location, the information of the regional person in charge of the area where the first device is located is obtained. The regional person in charge approves the hidden danger investigation topological route and the hidden danger investigation content of each detection node. After approval, the abnormal handling personnel who handle the above-mentioned safety hazards in the area where the first device is located will investigate the safety hazards, thereby establishing a good responsibility implementation mechanism and improving the on-site hidden danger investigation, management and rectification.
具体地,步骤5中,由异常处理人员对安全隐患进行排查包括:Specifically, in step 5, the safety hazard investigation by the exception handling personnel includes:
步骤51、获取隐患排查拓扑路线的初始节点,将初始节点定义为分析节点。Step 51: Obtain the initial node of the hidden danger investigation topology route, and define the initial node as an analysis node.
步骤52、判断分析节点是否为叶子节点,若不是,则进入步骤53,若是,进入步骤55。Step 52: determine whether the analysis node is a leaf node. If not, proceed to step 53; if so, proceed to step 55.
步骤53、获取与分析节点处检测项目相对应的第一操作内容,将分析节点的位置和第一操作内容发送到异常处理人员的即时通讯客户端,并获取检测结果。Step 53: Obtain the first operation content corresponding to the detection item at the analysis node, send the location of the analysis node and the first operation content to the instant messaging client of the exception handling personnel, and obtain the detection result.
步骤54、根据检测结果,从与分析节点相连的下层检测节点中选择与检测结果相对应的检测节点作为待分析检测节点,将待分析检测节点定义为分析节点,返回步骤52。Step 54 , according to the detection result, select a detection node corresponding to the detection result from the lower layer detection nodes connected to the analysis node as the detection node to be analyzed, define the detection node to be analyzed as the analysis node, and return to step 52 .
步骤55、判定分析节点处的检测项目是引起安全隐患的原因,获取与分析节点处的检测项目相对应的异常恢复操作内容,将分析节点的位置和异常恢复操作内容发送到异常处理人员的即时通讯客户端。Step 55: determine that the detection item at the analysis node is the cause of the safety hazard, obtain the abnormal recovery operation content corresponding to the detection item at the analysis node, and send the location of the analysis node and the abnormal recovery operation content to the instant messaging client of the abnormality handler.
异常处理人员移动到分析节点处后,根据该分析节点对应的第一操作内容进行检测,并将检测结果(真或假)反馈到现场安全管理平台,现场安全管理平台根据检测结果沿着隐患排查拓扑路线将下一个待分析节点的位置和该待分析节点对应的第一操作内容发送到异常处理人员的即时通讯客户端,如此反复确认,直到排查到引起安全隐患的异常原因,随后根据针对该异常原因处的异常恢复操作内容对安全隐患进行整改恢复。After the exception handling personnel moves to the analysis node, they perform a detection based on the first operation content corresponding to the analysis node and feed back the detection result (true or false) to the on-site safety management platform. The on-site safety management platform sends the location of the next node to be analyzed and the first operation content corresponding to the node to be analyzed to the exception handling personnel's instant messaging client along the hidden danger investigation topology route based on the detection result. This confirmation is repeated until the abnormal cause causing the safety hazard is found. Subsequently, the safety hazard is rectified and restored according to the abnormal recovery operation content at the abnormal cause.
根据本发明技术方案,基于异常处理人员的检测结果分配下一步待检测节点和操作内容,可以实现零距离精细化现场安全隐患处理指导,使现场安全隐患处理更加便利清晰。According to the technical solution of the present invention, the next node to be detected and the operation content are allocated based on the detection results of the exception handling personnel, which can achieve zero-distance and refined guidance on the handling of on-site safety hazards, making the handling of on-site safety hazards more convenient and clear.
步骤6、计算第一设备的潜在故障风险,并发送到区域负责人的即时通讯客户端。Step 6: Calculate the potential failure risk of the first device and send it to the instant messaging client of the regional manager.
示例性地,根据第一设备故障造成的经济损失和影响大小来计算第一设备的潜在故障风险。Exemplarily, the potential failure risk of the first device is calculated according to the economic loss and impact caused by the failure of the first device.
图4所示是本发明提供的一种基于即时通讯的现场安全隐患管理系统的一个实施例的结构示意图。如图4所示,该系统包括:第一设备10、监测设备20、现场安全管理平台30和即时通讯客户端40,监测设备20用于采集第一设备10的监测数据,现场安全管理平台30包括异常判断模块301、路线生成模块302、排查批示模块303、隐患排查模块304和风险计算模块305。Fig. 4 is a schematic diagram of the structure of an embodiment of an on-site safety hazard management system based on instant messaging provided by the present invention. As shown in Fig. 4, the system includes: a first device 10, a monitoring device 20, an on-site safety management platform 30 and an instant messaging client 40, the monitoring device 20 is used to collect monitoring data of the first device 10, and the on-site safety management platform 30 includes an abnormality judgment module 301, a route generation module 302, a troubleshooting instruction module 303, a hidden danger troubleshooting module 304 and a risk calculation module 305.
异常判断模块301,用于获取第一设备10的监测数据,基于监测数据判断第一设备是否发生异常。The abnormality determination module 301 is used to obtain monitoring data of the first device 10 and determine whether an abnormality occurs in the first device based on the monitoring data.
路线生成模块302,用于在第一设备10异常时,识别第一设备10的安全隐患,并生成隐患排查拓扑路线和针对每个检测节点的隐患排查内容。The route generation module 302 is used to identify the safety hazards of the first device 10 when the first device 10 is abnormal, and generate a hazard troubleshooting topology route and hazard troubleshooting content for each detection node.
排查批示模块303,用于基于第一设备10的位置信息查找第一人员信息表,获取第一设备所在区域的区域负责人信息,随后将安全隐患、隐患排查拓扑路线和每个检测节点的隐患排查内容发送到区域负责人的即时通讯客户端40,由区域负责人对隐患排查拓扑路线和每个检测节点的隐患排查内容进行批示处理。The inspection and approval module 303 is used to search the first personnel information table based on the location information of the first device 10, obtain the information of the regional person in charge of the area where the first device is located, and then send the safety hazards, hazard inspection topological routes and hazard inspection contents of each detection node to the instant messaging client 40 of the regional person in charge, who will approve the hazard inspection topological routes and hazard inspection contents of each detection node.
隐患排查模块304,用于在得到肯定的批示回复时,基于位置信息和安全隐患查找第二人员信息表,获取处理安全隐患的异常处理人员信息,由异常处理人员对安全隐患进行排查,排查结束后,将排查结果发送到区域负责人的即时通讯客户端。The hidden danger investigation module 304 is used to search the second personnel information table based on the location information and the safety hazard when a positive reply is received, and obtain the information of the exception handling personnel who handles the safety hazard. The exception handling personnel will investigate the safety hazard. After the investigation is completed, the investigation results will be sent to the instant messaging client of the area manager.
风险计算模块305,用于在得到否定的批示回复时,计算第一设备10的潜在故障风险,并发送到区域负责人的即时通讯客户端40。The risk calculation module 305 is used to calculate the potential failure risk of the first device 10 when a negative reply is received, and send the calculated risk to the instant messaging client 40 of the regional person in charge.
应该理解的是,虽然本发明各实施例的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,各实施例中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that, although each step in the flow chart of each embodiment of the present invention is shown in sequence according to the indication of the arrow, these steps are not necessarily performed in sequence according to the order indicated by the arrow. Unless there is a clear explanation in this article, the execution of these steps does not have strict order restrictions, and these steps can be performed in other orders. Moreover, at least a portion of the steps in each embodiment may include a plurality of sub-steps or a plurality of stages, and these sub-steps or stages are not necessarily performed at the same time, but can be performed at different times, and the execution order of these sub-steps or stages is not necessarily performed in sequence, but can be performed in turn or alternately with at least a portion of other steps or sub-steps or stages of other steps.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,上述的程序可存储于一个非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be completed by instructing the relevant hardware through a computer program, and the above-mentioned program can be stored in a non-volatile computer-readable storage medium. When the program is executed, it can include the processes of the embodiments of the above-mentioned methods. Among them, any reference to memory, storage, database or other media used in the embodiments provided in this application may include non-volatile and/or volatile memory. Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory. Volatile memory may include random access memory (RAM) or external cache memory. As an illustration and not limitation, RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
以上上述的实施例仅表达了本发明的实施优选方式,其描述较为具体和详细,但并不能因此而理解为对本发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。The above-mentioned embodiments only express the preferred implementation mode of the present invention, and the description thereof is relatively specific and detailed, but it cannot be understood as limiting the scope of the patent of the present invention. It should be pointed out that, for ordinary technicians in this field, several variations and improvements can be made without departing from the concept of the present invention, which all belong to the protection scope of the present invention. Therefore, the protection scope of the patent of the present invention shall be subject to the attached claims.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311734617.1A CN117422425B (en) | 2023-12-18 | 2023-12-18 | On-site potential safety hazard management method and system based on instant messaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311734617.1A CN117422425B (en) | 2023-12-18 | 2023-12-18 | On-site potential safety hazard management method and system based on instant messaging |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117422425A CN117422425A (en) | 2024-01-19 |
CN117422425B true CN117422425B (en) | 2024-04-30 |
Family
ID=89528697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311734617.1A Active CN117422425B (en) | 2023-12-18 | 2023-12-18 | On-site potential safety hazard management method and system based on instant messaging |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117422425B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016095718A1 (en) * | 2014-12-17 | 2016-06-23 | 中兴通讯股份有限公司 | Method for detecting communication link, base station, network manager, system and storage medium |
CN108256655A (en) * | 2018-01-24 | 2018-07-06 | 杭州凯达电力建设有限公司 | A kind of electric system hidden danger management system and method |
CN108717604A (en) * | 2018-05-21 | 2018-10-30 | 西安科技大学 | A kind of production safety hidden danger closed loop management system |
CN110533290A (en) * | 2019-07-24 | 2019-12-03 | 清华大学 | Site safety hidden danger management method and system based on instant messaging |
CN110888788A (en) * | 2019-10-16 | 2020-03-17 | 平安科技(深圳)有限公司 | Anomaly detection method and device, computer equipment and storage medium |
CN111260988A (en) * | 2020-03-12 | 2020-06-09 | 国网山东省电力公司威海供电公司 | Troubleshooting method suitable for power system training and courseware system thereof |
CN112151195A (en) * | 2020-10-16 | 2020-12-29 | 云南电网有限责任公司丽江供电局 | Method and device for checking potential safety hazards of power distribution equipment |
WO2021196501A1 (en) * | 2020-03-31 | 2021-10-07 | 佛山科学技术学院 | Big data-based fault monitoring method and system for industrial production line |
CN113642856A (en) * | 2021-07-27 | 2021-11-12 | 杨道合 | Accident prevention and hidden danger investigation interactive management method |
CN114358338A (en) * | 2021-12-30 | 2022-04-15 | 泰豪软件股份有限公司 | Power equipment fault diagnosis method, system, storage medium and equipment |
CN116169793A (en) * | 2023-04-25 | 2023-05-26 | 国网山东省电力公司胶州市供电公司 | Supervision and prediction system for power equipment |
CN116504039A (en) * | 2023-05-08 | 2023-07-28 | 湖北中烟工业有限责任公司 | Abnormality identification method and device for indoor equipment and electronic equipment |
CN116757484A (en) * | 2023-08-23 | 2023-09-15 | 山东全员本安教育咨询有限公司 | Enterprise safety hidden danger monitoring and tracing method, device, equipment and storage medium |
CN116937575A (en) * | 2023-09-14 | 2023-10-24 | 济南高品伟业信息科技有限公司 | Energy monitoring management system for grid system |
-
2023
- 2023-12-18 CN CN202311734617.1A patent/CN117422425B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016095718A1 (en) * | 2014-12-17 | 2016-06-23 | 中兴通讯股份有限公司 | Method for detecting communication link, base station, network manager, system and storage medium |
CN108256655A (en) * | 2018-01-24 | 2018-07-06 | 杭州凯达电力建设有限公司 | A kind of electric system hidden danger management system and method |
CN108717604A (en) * | 2018-05-21 | 2018-10-30 | 西安科技大学 | A kind of production safety hidden danger closed loop management system |
CN110533290A (en) * | 2019-07-24 | 2019-12-03 | 清华大学 | Site safety hidden danger management method and system based on instant messaging |
CN110888788A (en) * | 2019-10-16 | 2020-03-17 | 平安科技(深圳)有限公司 | Anomaly detection method and device, computer equipment and storage medium |
CN111260988A (en) * | 2020-03-12 | 2020-06-09 | 国网山东省电力公司威海供电公司 | Troubleshooting method suitable for power system training and courseware system thereof |
WO2021196501A1 (en) * | 2020-03-31 | 2021-10-07 | 佛山科学技术学院 | Big data-based fault monitoring method and system for industrial production line |
CN112151195A (en) * | 2020-10-16 | 2020-12-29 | 云南电网有限责任公司丽江供电局 | Method and device for checking potential safety hazards of power distribution equipment |
CN113642856A (en) * | 2021-07-27 | 2021-11-12 | 杨道合 | Accident prevention and hidden danger investigation interactive management method |
CN114358338A (en) * | 2021-12-30 | 2022-04-15 | 泰豪软件股份有限公司 | Power equipment fault diagnosis method, system, storage medium and equipment |
CN116169793A (en) * | 2023-04-25 | 2023-05-26 | 国网山东省电力公司胶州市供电公司 | Supervision and prediction system for power equipment |
CN116504039A (en) * | 2023-05-08 | 2023-07-28 | 湖北中烟工业有限责任公司 | Abnormality identification method and device for indoor equipment and electronic equipment |
CN116757484A (en) * | 2023-08-23 | 2023-09-15 | 山东全员本安教育咨询有限公司 | Enterprise safety hidden danger monitoring and tracing method, device, equipment and storage medium |
CN116937575A (en) * | 2023-09-14 | 2023-10-24 | 济南高品伟业信息科技有限公司 | Energy monitoring management system for grid system |
Non-Patent Citations (2)
Title |
---|
事故隐患差异化整治模型及其在军工单位的应用研究;董继业;马参国;王建军;屈战国;李文军;;安全与环境工程(第06期);全文 * |
董继业 ; 马参国 ; 王建军 ; 屈战国 ; 李文军 ; .事故隐患差异化整治模型及其在军工单位的应用研究.安全与环境工程.2016,(第06期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN117422425A (en) | 2024-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106556498A (en) | Damage Identification Methods for Bridge Structures and system | |
CN106198749B (en) | A Data Fusion Method of Multiple Sensors Based on Metal Crack Monitoring | |
CN114997682A (en) | Construction site safety monitoring system and method based on big data | |
CN117421998B (en) | A health status assessment system for overhead transmission lines based on multi-modal data | |
CN109949289A (en) | Concrete surface defect image identification system and method based on artificial intelligence | |
CN117689256B (en) | A quality traceability method for aluminum alloy casting products | |
CN113094244B (en) | Machine room operation intelligent detection system for data center | |
CN115144548A (en) | Harmful gas composition real-time monitoring system and monitoring method thereof | |
CN117422425B (en) | On-site potential safety hazard management method and system based on instant messaging | |
CN116050852A (en) | A risk warning method and system for downhole hot work | |
CN118337599B (en) | Internet of things card operation and maintenance management method based on intelligent power grid equipment | |
CN113657747A (en) | Enterprise safety production standardization level intelligent evaluation system | |
CN102270278B (en) | Method and device for forecasting equipment failure based on infrared temperature measurement | |
CN116681307B (en) | River four-disorder supervision traceability display method and system based on multi-terminal fusion feedback | |
CN112819262A (en) | Memory, process pipeline inspection and maintenance decision method, device and equipment | |
CN114154591B (en) | Intelligent warning method and device for equipment status based on multi-source information | |
CN113110145A (en) | Smart mine data acquisition method based on 5G industrial Internet of things | |
CN114338088A (en) | Evaluation algorithm and evaluation system for network security level of transformer substation power monitoring system | |
CN118780662A (en) | A method and system for safety management of hydropower station equipment operation and maintenance | |
CN104834972A (en) | Residential area security state evaluation method based on evidence theory | |
CN118413562B (en) | Edge computing method, device and system | |
CN119135510A (en) | Distribution network line fault location method based on edge computing and multi-region collaboration | |
CN114913670B (en) | Personnel going out of sea safety management system based on safety code management | |
CN115860154B (en) | A processing method and system for infrared temperature measurement detection of distribution network | |
CN119151212A (en) | A rail transit emergency information generation method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |