Infrastructure site safety monitoring system

A safety monitoring and infrastructure technology, applied in transmission systems, closed-circuit television systems, and services based on location information, etc., can solve the problem that construction workers are prone to illegal operations, have low awareness of safety precautions, and cannot collect operation risk control data and hidden danger data and other issues to achieve the effect of reducing illegal operations and improving safety awareness

Pending Publication Date: 2021-03-09
フアネングチンメイルイジンパワージェネレーションカンパニーリミテッド
0 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an infrastructure site safety monitoring system to solve the problem that the existing infrastructure site safety monitoring system proposed in the above background technology cannot rec...
View more

Abstract

The invention discloses an infrastructure site safety monitoring system which comprises a display layer, an application layer, a data layer and a network layer. The display layer performs data displaymainly through a PC terminal, a mobile terminal and a big data center, the application layer is mainly embodied in a headquarters and a power plant, and the network layer comprises an access controlmodule, a positioning module, a video monitoring module, a two-dimensional code module and an intelligent wearing module. The infrastructure site safety monitoring system can acquire operation risk management and control data and hidden danger data, realizes inspection and evaluation of a working result, double supervision and closed-loop management of supervision, rectification and acceptance, can effectively reduce personnel violation operation, accurately points out a hidden danger position and personnel violation conditions, performs quick rectification, and improves the safety of the infrastructure site. Early discovery and early elimination are formed, and risks, hidden dangers and accidents are effectively controlled and handled in the three stages before, during and after the event; and the safety protection consciousness of construction personnel is improved.

Application Domain

Co-operative working arrangementsClosed circuit television systems +5

Technology Topic

Mobile endEngineering +10

Image

  • Infrastructure site safety monitoring system

Examples

  • Experimental program(1)

Example Embodiment

[0022] Next, the technical solutions in the embodiments of the present invention will be apparent from the embodiment of the present invention, and it is clearly described, and it is understood that the described embodiments are merely embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, there are all other embodiments obtained without making creative labor without making creative labor premises.
[0023] See figure 1 The present invention provides a technical solution: the infrastructure site safety monitoring system, including display layers, application layers, data layers and network layers;
[0024] Among them, the display layer mainly passes the data display through the PC side, the mobile terminal and the large data center, the application layer is mainly reflected in the headquarters and power plants, the network layer includes access control modules, positioning modules, video surveillance modules, QR code modules and intelligent wear modules;
[0025] The access control module limits the three-dimensional code module to the construction personnel to enter the construction site. The smart wear module mainly wears the construction personnel, and the location of the construction personnel is mainly monitored through its internal positioning module. The video surveillance module is mainly set to the access control. Modules and construction sites and corners for real-time monitoring of construction site and access control, and stored through its communication coupled, while sending to hidden dangers investigation and governance modules and anti-illegal management modules.
[0026] Through the above scheme: can be collected from the operation risk management data and hidden dangers, and realize the implementation of examination and evaluation, double supervision, and implementing supervision - rectification - acceptance closed-loop management, can effectively reduce personnel violation operation, accurate point of hidden dangers Personnel violations, and conduct fast rectification, forming early discovery and early elimination, before, affairs and three stages of risks, hidden dangers, accidents;
[0027] Headquarters includes risk analysis modules, monitoring evaluation modules, hidden dangers, supervision modules, and system regulations modules, power plants include construction plan modules, hidden dangers, hidden dangers, construction equipment management modules, infrastructure responsibility modules, anti-illegal management modules, infrastructure emergency management Module, Branch Supervision Management Module, Field Safety Evaluation Module, Personal Management Module and Infrastructure Comprehensive Evaluation Module;
[0028] Among them, the specific implementation steps of the application layer are:
[0029] S1, the construction party develops a detailed construction plan A through the construction plan module, and investigates and controls the hidden dangers in the construction plan through hidden dangers.
[0030] S2, through the informed management module supervise the construction schemes of construction plan B, the construction party management module is used to manage the various matters in the construction:
[0031] S3, the risk analysis module is used to conduct risk analysis according to the security assessment report in SS2, and list the corresponding risk factors, and the monitoring evaluation module is used to monitor the corresponding evaluation reports in various power plants, and the hidden dangers are used for statistics of various power plants. Hidden dangers, supervision modules are used for supervision of various power plants, implementation - the implementation - acceptance closure process for standardization and strengthening, and formulates corresponding institutional regulations through the system regulatory module, and passed the PC side, mobile or large The data center is sent to various power plants.
[0032] The transactions in step S2 are mainly reflected in:
[0033] SS1, anti-illegal management module to monitor illegal personnel through illegal management, set too many people with too many violations into unqualified personnel, and carry out the re-examination, the person management module is used to statistically through safety person, and import into the system The supervision, engineering department and the subsidiary department were approved by the staff.
[0034] SS2, on-site safety assessment module, through the establishment of a staff on-site construction, and made safety assessment reports, the corresponding emergency channels have been developed through the infrastructure emergency management module, and it is clear through the infrastructure responsibility module. Responsibility attribute;
[0035] SS3, the infrastructure comprehensive evaluation module is used to comprehensively evaluate it according to the construction plan B construction, and a comprehensive evaluation report is made.
[0036]The data layer is used to accept the data information obtained by the application layer, and send it to the display layer, and the display layer receives various data information through the PC side, the mobile terminal, or the large data center, and the construction personnel will be displayed through security training. .
[0037] Construction Plan A and Construction Planb include construction planning tables and construction worklists, and data information includes laws, regulations, dual-control data, evaluation data, performance data, and external interfaces.
[0038] Working principle: For this type of infrastructure on-site security monitoring system, first, the construction party develops a detailed construction plan A through the construction plan module, and investigated and governed the hidden dangers in the construction plan through hidden dangers. The construction plan B, Through the informed management module, the construction schedule of the construction plan B is supervised, and the construction party management module is used to manage various matters in the construction, and the risk analysis module is used to conduct risk analysis according to the security assessment report in SS2. List the corresponding risk factors, the monitoring evaluation module is used to monitor the corresponding evaluation reports of each power plant, hidden danger statistics modules are used to count the hidden dangers of various power plants, and the supervision module is used for supervision and implementation of various power plants. - Execution-acceptance closed loop process for specification and strengthening, and develop corresponding institutional regulations through the system regulatory module, and transmitted to various power plants through the PC side, mobile or large data center, which is set by each of the access control modules and construction sites and corner settings. Video monitoring module, can collect job risk management data and hidden dangers, easy to monitor, followed by illegal management modules to monitor violations, and set too many people in violations into training unqualified personnel, and re-examine The personnel management module is used to count the safety person, and in batches into the system, and the staff shall enter the factory batch number by the supervision, engineering department and the safety department. The on-site safety assessment module passes the construction plan B through the establishment of the staff. All constructions conduct on-site inspection, and make safety assessment reports. According to the security issues, the corresponding emergency channels have been developed through the infrastructure emergency management module. At the same time, through the infrastructure responsibility module, the responsible information is clear, and the implementation of the results, the implementation of the results, the evaluation, double supervision, Implementation of oversight - rectification - closed-loop management of acceptance, can effectively reduce personnel violation operation, accurately pointing out the hidden dangerous position and personnel violation, and carry out rapid rectification, forming early discovery and early elimination, before, things, three stages Risk, hidden dangers, accidents for effective control and processing, the infrastructure comprehensive evaluation module is used to comprehensively evaluate it according to the construction plan B construction, and make comprehensive evaluation reports, data layers are used to accept application layer analysis. Item data, and send it to the display layer, and finally the display layer receives data information through the PC side, the mobile terminal, or the large data center, and the construction personnel will be displayed through the form of security training, and through the examination by the supervision, Engineering Department and The safety of the safety of the safety department is approved by the factory, which greatly improves the safety awareness of construction staff.
[0039] While the embodiments of the invention have been shown and described, these examples may be made to make a variety of changes, modifications, and replacement without departing from the principles and spirit of the present invention, without departing from the spirit and spirit of the present invention. And variations, the scope of the invention is defined by the appended claims and their equivalents.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products