[0022] Next, the technical solutions in the embodiments of the present invention will be apparent from the embodiment of the present invention, and it is clearly described, and it is understood that the described embodiments are merely embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, there are all other embodiments obtained without making creative labor without making creative labor premises.
[0023] See figure 1 The present invention provides a technical solution: the infrastructure site safety monitoring system, including display layers, application layers, data layers and network layers;
[0024] Among them, the display layer mainly passes the data display through the PC side, the mobile terminal and the large data center, the application layer is mainly reflected in the headquarters and power plants, the network layer includes access control modules, positioning modules, video surveillance modules, QR code modules and intelligent wear modules;
[0025] The access control module limits the three-dimensional code module to the construction personnel to enter the construction site. The smart wear module mainly wears the construction personnel, and the location of the construction personnel is mainly monitored through its internal positioning module. The video surveillance module is mainly set to the access control. Modules and construction sites and corners for real-time monitoring of construction site and access control, and stored through its communication coupled, while sending to hidden dangers investigation and governance modules and anti-illegal management modules.
[0026] Through the above scheme: can be collected from the operation risk management data and hidden dangers, and realize the implementation of examination and evaluation, double supervision, and implementing supervision - rectification - acceptance closed-loop management, can effectively reduce personnel violation operation, accurate point of hidden dangers Personnel violations, and conduct fast rectification, forming early discovery and early elimination, before, affairs and three stages of risks, hidden dangers, accidents;
[0027] Headquarters includes risk analysis modules, monitoring evaluation modules, hidden dangers, supervision modules, and system regulations modules, power plants include construction plan modules, hidden dangers, hidden dangers, construction equipment management modules, infrastructure responsibility modules, anti-illegal management modules, infrastructure emergency management Module, Branch Supervision Management Module, Field Safety Evaluation Module, Personal Management Module and Infrastructure Comprehensive Evaluation Module;
[0028] Among them, the specific implementation steps of the application layer are:
[0029] S1, the construction party develops a detailed construction plan A through the construction plan module, and investigates and controls the hidden dangers in the construction plan through hidden dangers.
[0030] S2, through the informed management module supervise the construction schemes of construction plan B, the construction party management module is used to manage the various matters in the construction:
[0031] S3, the risk analysis module is used to conduct risk analysis according to the security assessment report in SS2, and list the corresponding risk factors, and the monitoring evaluation module is used to monitor the corresponding evaluation reports in various power plants, and the hidden dangers are used for statistics of various power plants. Hidden dangers, supervision modules are used for supervision of various power plants, implementation - the implementation - acceptance closure process for standardization and strengthening, and formulates corresponding institutional regulations through the system regulatory module, and passed the PC side, mobile or large The data center is sent to various power plants.
[0032] The transactions in step S2 are mainly reflected in:
[0033] SS1, anti-illegal management module to monitor illegal personnel through illegal management, set too many people with too many violations into unqualified personnel, and carry out the re-examination, the person management module is used to statistically through safety person, and import into the system The supervision, engineering department and the subsidiary department were approved by the staff.
[0034] SS2, on-site safety assessment module, through the establishment of a staff on-site construction, and made safety assessment reports, the corresponding emergency channels have been developed through the infrastructure emergency management module, and it is clear through the infrastructure responsibility module. Responsibility attribute;
[0035] SS3, the infrastructure comprehensive evaluation module is used to comprehensively evaluate it according to the construction plan B construction, and a comprehensive evaluation report is made.
[0036]The data layer is used to accept the data information obtained by the application layer, and send it to the display layer, and the display layer receives various data information through the PC side, the mobile terminal, or the large data center, and the construction personnel will be displayed through security training. .
[0037] Construction Plan A and Construction Planb include construction planning tables and construction worklists, and data information includes laws, regulations, dual-control data, evaluation data, performance data, and external interfaces.
[0038] Working principle: For this type of infrastructure on-site security monitoring system, first, the construction party develops a detailed construction plan A through the construction plan module, and investigated and governed the hidden dangers in the construction plan through hidden dangers. The construction plan B, Through the informed management module, the construction schedule of the construction plan B is supervised, and the construction party management module is used to manage various matters in the construction, and the risk analysis module is used to conduct risk analysis according to the security assessment report in SS2. List the corresponding risk factors, the monitoring evaluation module is used to monitor the corresponding evaluation reports of each power plant, hidden danger statistics modules are used to count the hidden dangers of various power plants, and the supervision module is used for supervision and implementation of various power plants. - Execution-acceptance closed loop process for specification and strengthening, and develop corresponding institutional regulations through the system regulatory module, and transmitted to various power plants through the PC side, mobile or large data center, which is set by each of the access control modules and construction sites and corner settings. Video monitoring module, can collect job risk management data and hidden dangers, easy to monitor, followed by illegal management modules to monitor violations, and set too many people in violations into training unqualified personnel, and re-examine The personnel management module is used to count the safety person, and in batches into the system, and the staff shall enter the factory batch number by the supervision, engineering department and the safety department. The on-site safety assessment module passes the construction plan B through the establishment of the staff. All constructions conduct on-site inspection, and make safety assessment reports. According to the security issues, the corresponding emergency channels have been developed through the infrastructure emergency management module. At the same time, through the infrastructure responsibility module, the responsible information is clear, and the implementation of the results, the implementation of the results, the evaluation, double supervision, Implementation of oversight - rectification - closed-loop management of acceptance, can effectively reduce personnel violation operation, accurately pointing out the hidden dangerous position and personnel violation, and carry out rapid rectification, forming early discovery and early elimination, before, things, three stages Risk, hidden dangers, accidents for effective control and processing, the infrastructure comprehensive evaluation module is used to comprehensively evaluate it according to the construction plan B construction, and make comprehensive evaluation reports, data layers are used to accept application layer analysis. Item data, and send it to the display layer, and finally the display layer receives data information through the PC side, the mobile terminal, or the large data center, and the construction personnel will be displayed through the form of security training, and through the examination by the supervision, Engineering Department and The safety of the safety of the safety department is approved by the factory, which greatly improves the safety awareness of construction staff.
[0039] While the embodiments of the invention have been shown and described, these examples may be made to make a variety of changes, modifications, and replacement without departing from the principles and spirit of the present invention, without departing from the spirit and spirit of the present invention. And variations, the scope of the invention is defined by the appended claims and their equivalents.