-
It can monitor the dangerous area in an all-round way, and once the personnel are detected to break into the prohibited area, the alarm will be issued immediately, and the system will actively trigger the alarm prompt, and notify the safety production intrusion monitoring and early warning system through SMS, **, alarm voice, etc.
-
The Third Plenary Session of the 18th Central Committee of the Communist Party of China pointed out that enterprises should deepen the reform of the safety production management system, establish a hidden danger investigation and management system and a safety prevention and control system, curb major safety accidents, and organize and develop a safety production early warning system organized by Huasheng Henghui to ensure the safety of enterprises.
The Internet is a magical network, big data development and software customization is also a model, here is the most detailed **, if you really want to do, you can come here, the beginning of this mobile phone is a Wu Chop in the middle is one one three three three and the last is Si Qi Si Si, you can find it in order to combine, I want to say that unless you want to do or understand this aspect of the content, if you just join in the fun, don't come.
1. The hazard source management module refers to the establishment of a set of hazard identification and evaluation process that meets the requirements of the system standard and the requirements of Document 23, mainly including the tree-shaped hazard identification and evaluation, form approval, expert group review, monthly risk assessment and other main functions, it can output the hazard list to establish a unified hazard source file, and the management personnel and on-site operators can understand and view the hazard management situation at any time. The system can also establish a connection with other modules, and use the hazard source as the basic file of the company's safety production management.
2. Mobile hidden danger investigation and management module is a dynamic form of safety management, using handheld terminal PDA to carry out hidden danger investigation and management related work anytime and anywhere, record the hidden danger information found in a timely manner, upload it, and transmit it to the information platform to transfer to the rectification process to understand the real-time information of hidden dangers. In the later stage of project construction, these functions can also be implemented on mobile phones and related handheld terminals.
3. Hazardous operation permit management is used to realize online filing and online approval of dangerous operations within the enterprise, such as hot work, groundbreaking operation, temporary electricity operation, high-altitude operation, etc., and establish a complete hazardous operation implementation file to achieve effective control of temporary dangerous operations and reduce operation risks. With the popularization of big data technology and the upgrading of Internet of Things technology, factory intelligence has become an innovative way for modern manufacturing enterprises to face, and the concept of "smart factory" has also been born. In order to meet the needs of large and medium-sized manufacturing enterprises for safety production management, comprehensively improve the level of enterprise safety production information application, timely and accurately transmit safety management data, and improve the efficiency of safety production management, the special solution of "safety production early warning system" meets the needs of large and medium-sized manufacturing enterprises for safety production informatization.
Intelligent monitoring system for coal mine safety production risks. >>>More
Over the years, the traditional perimeter security solutions (infrared radiation program, monitoring program, microwave radiation program, leakage cable program, vibration cable program, electronic fence, power grid, etc.) have made due contributions to social security, but limited by some objective technical conditions and other factors, there are still some commonalities or personality deficiencies, as follows: Infrared and other traditional programs, the level of protection is low, for the deliberate intruder, it is easy to cross or avoid; At the same time, they are susceptible to environmental restrictions such as high and low, twists, turns, and bends in terrain conditions, and they are not suitable for harsh climates, and are easily affected by natural climates such as high temperature, low temperature, strong light, dust, rain, snow, fog, frost, etc., and have a high false alarm rate; Leaking cable and vibration cable alarm belong to cable sensing, and the sensing part is active, and the system power consumption is very large; Electronic fences, power grids and other schemes are also harmful. The distance that can be monitored by the above scheme is short, and the unit distance cost is high, and the system cost is high under the condition that long-distance monitoring is required. >>>More
There are many rules and regulations for enterprise safety production, and according to the requirements of the national standard specification (AQT9006-2010), at least the following contents should be included: >>>More
Safety culture, safety legal system, safety responsibility, safety responsibility, safety technology, safety investment.
Meeting content:
1. The company's safety work goal should be to achieve no safety accidents and zero accidents throughout the year. >>>More