Method for rapidly inputting and discovering hidden danger of underground coal mine

A technology for hidden dangers and coal mines, which is applied in the field of information management of underground safety, can solve the problems of inability to collect hidden dangers, slow entry speed, delayed processing speed of hidden dangers, etc., and achieve the effect of shortening the entry of hidden dangers.

Inactive Publication Date: 2013-09-11
CHONGQING SONGZAO COAL & ELECTRICITY CO LTD +2
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It has the following deficiencies: 1. The number of hidden danger data is too large, typos and typos in the entered content cannot be avoided, and the input speed is slow; 2. Different inspectors have different descriptions of the same hidden danger, and it is impossible to make statistics on hidden dangers; 3. Some forensics methods cannot be automatically associated with the hidden dangers currently being investigated, and need to be manually associated when entering hidden dangers; 4. Only have the function of entering hidden danger content, and the hidden danger information needs to be determined three times and five times on the ground computer before entering the hidden danger processing process , artificially delaying the hidden danger processing speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for rapidly inputting and discovering hidden danger of underground coal mine
  • Method for rapidly inputting and discovering hidden danger of underground coal mine
  • Method for rapidly inputting and discovering hidden danger of underground coal mine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings, but the present invention is not limited to the scope of the described embodiments.

[0036] Such as figure 1 As shown, a hidden danger management system for coal mine safety production includes multiple servers such as a ground computer host, an environmental monitoring server, a security quantification server, and other servers, as well as a handheld terminal for underground inspection, and a local area network is constructed between the computer host and the multiple servers; A Wifi communication ring network is built underground to realize network connection with the local area network, and the handheld terminal can realize data transmission through the Wifi communication ring network and the local area network; the management system can automatically enter the hidden danger treatment management process based on the inspection results.

[0037] Such as figure 2 wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for rapidly inputting and discovering hidden danger of an underground coal mine. The method includes the steps of preparation, information updating and hidden danger judging and hidden danger inputting and uploading. The preparation step includes the steps: building a hidden danger primitive library; building a hidden danger hierarchical menu; and initializing a handheld terminal. The information updating and hidden danger judging step includes the steps: updating site information; judging the hidden danger; and supplementing and judging the location information. The hidden danger inputting and uploading step includes the steps: inputting the hidden danger; judging and supplementing hidden danger content remarks; generating rectified information; and uploading a result. Hidden danger inputting is normalized description that hidden danger primitives are selected by the aid of the hierarchical menu or a keyword search mode and are automatically associated with hidden danger contents, information data, discovery sites and time data of the hidden danger primitives are bound, and the rectified information is automatically generated. The method has the advantages that hidden danger inputting and discovering time can be effectively shortened, accidental operation caused by human factors is eliminated, so that hidden danger treatment is accelerated, and hidden danger treatment accuracy and efficiency are improved.

Description

technical field [0001] The invention relates to underground safety information management, in particular to a computer-managed coal mine safety production management system, relying on an underground WiFi communication network, and a method for fast entry and evidence collection of hidden dangers in closed management of hidden dangers. Background technique [0002] With the rapid development of computer IT technology, electronic information management is accepted and applied by more and more enterprises, which directly brings about the reduction of management costs and the improvement of management efficiency. For coal mine enterprises, it is of great significance for coal mine safety production to integrate management related to safety production into information construction and to rapidly apply and develop it. Accident hazard investigation is an important link to ensure the safety of coal mine production. Computer software systems such as "Coal Mine Safety Crisis Managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q50/02
Inventor 黄吉伟龙建明李文树邓希伦许刚王伟陈军刘建庆黎建张忠谨李克伦唐冲任芝林李才林周声才徐印覃乐张正辉
Owner CHONGQING SONGZAO COAL & ELECTRICITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products