Unlock instant, AI-driven research and patent intelligence for your innovation.

Binary logic digitalization method for safety monitoring

A binary logic and security monitoring technology, applied in data processing applications, collaborative devices, instruments, etc., can solve the problems of inability to perceive state information, high measurement costs, high communication costs, etc., to improve communication and processing efficiency, high efficiency Binary logic measurement, the effect of improving timeliness

Inactive Publication Date: 2018-05-18
HUAZHONG UNIV OF SCI & TECH +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still deficiencies in the application of existing RFID electronic tags, mainly including: 1) RFID electronic tags can only identify the identity information of the object, but cannot perceive the state information of the object. High; 2) The centralized management mode of the server requires a large number of RFID electronic tags to upload parameter values ​​of various data types concurrently, and the communication cost is high; 3) The server processes the received data, judges the security status, and feeds back to the process of on-site management. It is time-consuming and cannot well meet the timeliness requirements of security evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary logic digitalization method for safety monitoring
  • Binary logic digitalization method for safety monitoring
  • Binary logic digitalization method for safety monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0027] The content of this embodiment is the application of the present invention in the safety monitoring of construction projects, and its steps are as follows figure 2 As shown, the specific implementation is as follows.

[0028] Step 1: Decompose the work content, identify and code the monitoring parameters.

[0029] The WBS (Work Breakdown Structure) method can be used to decompose the project work tasks layer by layer in chronological order and from top to bottom, and the minimum deliverables can be obtained as a work package, and the work package is defined as NP i , i is the number of the work package; identify various security risk factors involved in the process of completing the work package, and define the security risk factor as NW ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of safety monitoring, and discloses a binary logic digitalization method for safety monitoring. A value domain sub-region corresponding to each safety grade of the monitoring parameter and a corresponding safety grade and a safety state are determined through decomposition, work packet and safety risk factor obtaining and parameter monitoring and encoding. The safety states of the monitoring parameters are acquired through the internet-of-things elements and uploaded. A safety state of a binary logic vector is adopted, and a safety level state where the monitoring parameter is located is digitally expressed. In order to achieve binary measurement and safe state expression of specific monitoring parameters, and hardware of the value-domain sub-interval limit values corresponding to different safety levels of the monitoring parameters is performed in a corresponding internet-of-things elements, is used as a preset judgment rules, so that the safety state of the front end can be judged. The two-value logic measurement of the safety state of the monitoring parameters can be completed more efficiently.

Description

technical field [0001] The invention relates to the field of safety monitoring, in particular to a binary logic digitization method for safety monitoring. Background technique [0002] The construction environment of the construction project is complicated, the process is various, the operation time is long after completion, the aging process is obvious, and there are many safety risk factors in each stage of the whole life cycle. The traditional manual inspection and evaluation method is time-consuming and labor-intensive, and it is difficult to meet the safety risk factor monitoring Comprehensiveness and timeliness requirements. The Internet of Things technology has the characteristics of comprehensive perception, real-time transmission and intelligent processing, and has significant advantages in the field of security monitoring, which provides support for solving the shortcomings of traditional security monitoring methods. [0003] Electronic tags based on radio frequen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00G06Q10/06G06Q50/08
CPCG06K17/0022G06Q10/0639G06Q50/08
Inventor 赵挺生徐凯贺凌云张淼蒋灵周炜陈露江倩唐菁菁杜婷张伟
Owner HUAZHONG UNIV OF SCI & TECH