[go: up one dir, main page]

CN118897522B - A control method for intelligent alarm information management terminal based on virtual keyboard - Google Patents

A control method for intelligent alarm information management terminal based on virtual keyboard Download PDF

Info

Publication number
CN118897522B
CN118897522B CN202410930100.8A CN202410930100A CN118897522B CN 118897522 B CN118897522 B CN 118897522B CN 202410930100 A CN202410930100 A CN 202410930100A CN 118897522 B CN118897522 B CN 118897522B
Authority
CN
China
Prior art keywords
equipment
preset
risk level
fluctuation
monitoring area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410930100.8A
Other languages
Chinese (zh)
Other versions
CN118897522A (en
Inventor
韩旭
张希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tianhe Diyuan Safety Technology Service Co ltd
Original Assignee
Beijing Tianhe Diyuan Safety Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tianhe Diyuan Safety Technology Service Co ltd filed Critical Beijing Tianhe Diyuan Safety Technology Service Co ltd
Priority to CN202410930100.8A priority Critical patent/CN118897522B/en
Publication of CN118897522A publication Critical patent/CN118897522A/en
Application granted granted Critical
Publication of CN118897522B publication Critical patent/CN118897522B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • G05B19/4184Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by fault tolerance, reliability of production system
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • G05B2219/31From computer integrated manufacturing till monitoring
    • G05B2219/31088Network communication between supervisor and cell, machine group

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of monitoring and early warning, and discloses an intelligent alarm information management terminal control method based on a virtual keyboard, which comprises the steps of identifying the running state of equipment and generating an anti-theft button according to the running state; when the equipment is started, equipment operation data are collected to establish an operation database, equipment operation time is recorded, the fluctuation condition of the data in the database is monitored in real time, equipment influence factors are obtained according to fluctuation range and fluctuation time when the data fluctuation occurs, whether the equipment is abnormal or not is judged according to the equipment influence factors, when the equipment is judged to be abnormal, equipment operation temperature is collected and compared with a preset temperature threshold value, equipment risk level is determined according to the comparison result, and disarming, maintenance or early warning buttons are generated according to the risk level. According to the invention, through a virtual keyboard interaction mode, real-time data monitoring, intelligent anomaly detection and risk assessment, the performance and user experience of an alarm system are improved, and the running safety of equipment is improved.

Description

Intelligent alarm information management terminal control method based on virtual keyboard
Technical Field
The invention relates to the technical field of monitoring and early warning, in particular to an intelligent alarm information management terminal control method based on a virtual keyboard.
Background
In modern manufacturing, industrial facilities often contain large numbers of production equipment and complex workflows, and any equipment failure or abnormal situation may lead to serious safety accidents. Therefore, the method is extremely important for early warning and monitoring of equipment faults.
However, at present, the alarm device depends on a physical key or an external controller to operate, and the interaction mode lacks in convenience, so that a user often needs to go through a multi-step manual process when performing operations such as arming and disarming, which results in long operation time consumption and poor intuitiveness, and cannot adapt to the operation habit of a modern user pursuing simplicity and rapidness. And the function setting of the traditional alarm system is relatively solidified, and the traditional alarm system lacks enough custom space, so that the requirements of different users on system flexibility and personalized configuration are difficult to meet.
Therefore, it is necessary to design a control method of an intelligent alarm information management terminal based on a virtual keyboard to solve the problems existing in the current technology.
Disclosure of Invention
In view of the above, the invention provides a control method of an intelligent alarm information management terminal based on a virtual keyboard, which aims to solve the problems that the current alarm equipment is complex to operate, can not customize buttons, and lacks personalized configuration.
The invention provides an intelligent alarm information management terminal control method based on a virtual keyboard, which comprises the following steps:
identifying the running state of equipment and generating a defense setting button according to the running state;
When equipment is opened for defense setting, collecting equipment operation data to establish an operation database, recording equipment operation time, monitoring the fluctuation condition of the data in the database in real time, and when data fluctuation is generated, acquiring equipment influence factors according to the fluctuation range and the fluctuation time, and judging whether the equipment is abnormal or not according to the equipment influence factors;
When the equipment is judged to be abnormal, acquiring the running temperature of the equipment, comparing the running temperature with a preset temperature threshold value, and determining the risk level of the equipment according to a comparison result;
And generating disarming, maintaining or early warning buttons according to the risk level.
Further, when the running state of the equipment is identified and the defense setting button is generated according to the running state, the method further comprises the following steps:
Collecting the running number of the equipment, and comparing the running number with a first preset running number and a second preset running number which are preset respectively, wherein the first preset running number is smaller than the second preset running number, and determining the defense arrangement monitoring area according to a comparison result;
when the running number is smaller than or equal to the first preset running number, determining the defense arrangement monitoring area as a first preset monitoring area;
When the operation number is larger than the first preset operation number and smaller than or equal to the second preset operation number, determining the defense arrangement monitoring area as a second preset monitoring area;
When the operation number is larger than the second preset operation number, determining that the defense arrangement monitoring area is a third preset monitoring area;
The first preset monitoring area is smaller than the second preset monitoring area, and the second preset monitoring area is smaller than the third preset monitoring area.
Further, when the device is opened for defense, collecting device operation data to establish an operation database, and recording the device operation time, the method further comprises the following steps:
setting a cycle maintenance time, and generating a maintenance button every time the cycle maintenance time passes, wherein the cycle maintenance time is in a direct proportion relation with the defense arrangement monitoring area;
When the defense deployment monitoring area is a first preset monitoring area, the cycle maintenance time is a first preset cycle maintenance time;
When the defense deployment monitoring area is a second preset monitoring area, the cycle maintenance time is a second preset cycle maintenance time;
When the defense deployment monitoring area is a third preset monitoring area, the cycle maintenance time is a third preset cycle maintenance time;
The first preset cycle maintenance time is smaller than the second preset cycle maintenance time, and the second preset cycle maintenance time is smaller than the third preset cycle maintenance time.
Further, when the data fluctuation condition in the database is monitored in real time, the method comprises the following steps:
Calculating a fluctuation value according to the data in the database, comparing the fluctuation value with a standard fluctuation value, and judging whether fluctuation exists according to the comparison result;
when the fluctuation value is larger than the standard fluctuation value, judging that the data in the database fluctuates;
When the fluctuation value is smaller than or equal to the standard fluctuation value, judging that the data in the database do not generate fluctuation;
the fluctuation value is the absolute value of the difference between the equipment operation data at the current moment and the equipment operation data at the previous moment, and the operation data comprises equipment operation voltage, operation current and operation rotating speed.
Further, when the fluctuation of the data is generated, obtaining the device influence factor according to the fluctuation range and the fluctuation time includes:
The device impact factor is calculated by:
wherein Y represents a device influence factor, N represents a type of operation data, deltaVi represents a fluctuation value of an i-th type operation parameter, vi represents a standard value of the i-th type operation parameter, wi represents a weight coefficient of the i-th type operation parameter, beta is a time factor adjustment coefficient, T0 represents a fluctuation time sum, and T represents a time period.
Further, the sum of fluctuation times is obtained by the following formula:
wherein t i denotes the sum of the times when the i-th class of operating parameters deviate from the normal range.
Further, when judging whether the device has an abnormality according to the device influence factor, the method includes:
comparing the equipment influence factor with a preset influence threshold value, and judging whether abnormality exists according to a comparison result;
When the equipment influence factor is larger than an influence threshold value, judging that the equipment is abnormal;
and when the device influence factor is smaller than or equal to the influence threshold value, judging that the device is not abnormal.
Further, when determining the equipment risk level according to the comparison result, the method comprises the following steps:
Obtaining a temperature difference value according to the equipment operation temperature and a temperature threshold, wherein the temperature difference value is a difference value between the equipment operation temperature and the temperature threshold, comparing the temperature difference value with a first preset temperature difference value and a second preset temperature difference value which are preset respectively, and determining an equipment risk level according to a comparison result;
when the temperature difference is smaller than or equal to a first preset temperature difference, determining that the equipment risk level is a third risk level;
When the temperature difference is larger than the first preset temperature difference and smaller than or equal to the second preset temperature difference, determining that the equipment risk level is a second risk level;
when the temperature difference value is larger than a second preset temperature difference value, determining that the equipment risk level is a third risk level;
the third risk level indicates that the abnormal condition of the device is lower than the second risk level, and the second risk level indicates that the abnormal condition of the device is lower than the first risk level.
Further, when the disarming, maintaining or early warning button is generated according to the risk level, the method includes:
when the risk level is a first preset risk level, generating a disarming button and an early warning button;
When the risk level is a second preset risk level, generating an early warning button;
and when the risk level is a third preset risk level, generating a maintenance button.
Compared with the prior art, the invention has the beneficial effects that the virtual keyboard is adopted for interaction, a user can rapidly complete operations such as arming and disarming through a touch screen or other intelligent input modes (such as voice control), the traditional multi-step manual process is simplified, the operation time is shortened, and the intuitiveness of operation and the user experience are improved. The alarm operation is automatically configured according to the real-time running state of the equipment, instead of depending on fixed physical keys or an external controller. The self-adaptive mode meets the requirements of modern users on system flexibility and personalized configuration, and is suitable for different application scenes and user preferences. And after the equipment is protected, collecting and monitoring the operation data of the equipment in real time, and establishing an operation database. And calculating the device influence factors through real-time analysis of the data fluctuation conditions in the database, and evaluating whether the running state of the device is normal or not. And the potential abnormality is found in time, so that the equipment fault is effectively prevented, and the risk of equipment damage or safety accidents is reduced. After detecting the abnormality of the equipment, the running temperature of the equipment is further collected and compared with a preset temperature threshold. According to the comparison result, the risk level of the equipment is determined, the accurate assessment of the equipment risk is ensured, and according to the risk level, an adaptive disarming, maintaining or early warning button is automatically generated. The device can quickly respond to the abnormal condition of the device, and can take the most appropriate action according to the prompt, such as immediately maintaining or starting an early warning mechanism.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
fig. 1 is a flowchart of a control method for an intelligent alarm information management terminal based on a virtual keyboard according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. The invention will be described in detail below with reference to the drawings in connection with embodiments.
In modern manufacturing, equipment and workflows within an industrial plant are highly complex and often involve large numbers of production equipment, such as automated machinery, conveyor systems, robots, control systems, and the like. Stable operation of these devices is critical to ensure production efficiency and safety of the plant. Any equipment malfunction or abnormality may cause production interruption, even causing serious safety accidents or economic losses. Therefore, the operation state of the equipment is monitored timely and accurately, potential faults are early-warned, and the method becomes a key task in industrial management.
However, many current alarm systems used in factories rely primarily on physical keys or external controls for operation. This conventional manner of interaction has limitations in several respects. When a user performs operations such as arming and disarming, the operations are usually required to be completed manually through a plurality of steps, and the process is not only long in time consumption, but also is not intuitive in operation experience. The fixed configuration of the physical keys and the controller cannot flexibly adapt to different scenes and requirements of users, and particularly when facing complex and changeable industrial environments, the fixed configuration is complex in operation and low in efficiency. And the functions of the traditional alarm system are usually fixed in advance, and lack of enough custom space, so that the requirements of different users on the flexibility and personalized configuration of the system are difficult to meet. In a factory, the equipment is of a wide variety and the operating state is diverse, and each equipment and process flow may require specific monitoring and alarm strategies. Therefore, the existing setting of the curing function cannot fully cope with the actual requirements of various equipment operation, and cannot provide accurate and efficient alarm and management services.
In some embodiments of the present application, referring to fig. 1, a method for controlling an intelligent alarm information management terminal based on a virtual keyboard includes:
and S100, identifying the running state of the equipment, and generating a defense setting button according to the running state.
And S200, collecting equipment operation data to establish an operation database when equipment is opened for defense arrangement, recording equipment operation time, monitoring the fluctuation condition of the data in the database in real time, obtaining equipment influence factors according to the fluctuation range and the fluctuation time when data fluctuation is generated, and judging whether the equipment is abnormal according to the equipment influence factors.
And S300, when the equipment is judged to be abnormal, acquiring the running temperature of the equipment, comparing the running temperature with a preset temperature threshold value, and determining the risk level of the equipment according to the comparison result.
And S400, generating disarming, maintaining or early warning buttons according to the risk level.
Specifically, the operation state of the current device is identified in S100. This can be achieved by real-time analysis of the multiple sensor data of the device, such as key parameters of current, vibration, etc. Based on this data, it is automatically determined whether the device is in standby, running, suspended, or other particular state. The arming button is dynamically generated according to the running state of the device so that a user can quickly start the monitoring mode of the device. The virtual keyboard provides a flexible interaction mode, and a user can complete the defense arrangement operation through simple clicking, so that the traditional manual setting of multiple steps is avoided. In S200, after the user enables the device monitoring through the arming button, the operation data of the device is collected, and the data is stored in an operation database. The database records various parameters and changes of the equipment in real time. These data are continuously monitored and analyzed for fluctuation range and fluctuation time. Specifically, the fluctuation range refers to the difference between the device parameter and the standard parameter, and the fluctuation time is the duration for which the device parameter is out of the normal range. Based on the fluctuation data, calculating an equipment influence factor for comprehensively evaluating the operation stability of the equipment and the severity of potential abnormality, and judging whether the equipment has an abnormal condition or not. In S300, if an abnormality is detected in the device, operating temperature data of the device is further collected. And comparing the acquired temperature data with a preset temperature threshold. These thresholds are set according to the technical specifications of the device or historical operating data. By comparing the temperature data with a threshold, the current risk level of the device is assessed. For example, if the temperature is significantly outside of the normal range, this indicates that the device is in a high risk state. And determining the risk level of the equipment according to the comparison result. And dynamically generating corresponding operation buttons according to the risk level. By clicking the disarming button, the monitoring mode is turned off. Clicking the maintenance button initiates a maintenance procedure to remove the potential failure. Clicking the early warning button informs the relevant personnel or system to take emergency countermeasures.
It can be understood that the operations such as arming and disarming are simplified through the virtual keyboard, and a user can quickly complete related operations through the touch screen or other intelligent input devices, so that the operation convenience and intuitiveness of the system are improved. The operation buttons are dynamically generated according to the real-time running state of the equipment, so that the solidification setting of the traditional physical keys is avoided, a larger custom space is provided, and the personalized requirements of different users are met. Based on the real-time monitoring of the equipment operation data and the calculation of the equipment influence factors, the abnormal condition and the potential risk of the equipment can be accurately identified, and the more accurate abnormality detection capability is provided compared with the traditional method. By comparing the temperature data with a preset threshold value, the risk level of the equipment can be accurately estimated, and an adaptive operation button is dynamically generated, so that a user is helped to quickly make the most appropriate response. Through a comprehensive monitoring and intelligent management mode, the occurrence of equipment faults is effectively prevented and reduced, and the safety and reliability of equipment operation are improved
In some embodiments of the application, when the equipment operation state is identified and the defense distribution button is generated according to the operation state, the method further comprises the steps of collecting the equipment operation quantity, comparing the operation quantity with a preset first preset operation quantity and a preset second preset operation quantity respectively, wherein the first preset operation quantity is smaller than the second preset operation quantity, and determining the defense distribution monitoring area according to the comparison result.
Specifically, when the operation number is smaller than or equal to the first preset operation number, the defense arrangement monitoring area is determined to be the first preset monitoring area. And when the operation number is greater than the first preset operation number and less than or equal to the second preset operation number, determining the defense arrangement monitoring area as a second preset monitoring area. And when the running number is greater than the second preset running number, determining the defense arrangement monitoring area as a third preset monitoring area. The first preset monitoring area is smaller than the second preset monitoring area, and the second preset monitoring area is smaller than the third preset monitoring area.
It will be appreciated that the number of operations of the plant will generally reflect the current production load and operating strength. And comparing the running number acquired in real time with different preset thresholds, and dynamically adjusting the coverage range of the defense deployment monitoring according to the actual load condition. The comprehensive monitoring under the condition of high load is ensured, and the risks of missing report and false report are reduced. When the number of the devices is increased, the monitoring area is enlarged to cover more potential fault points, so that the reliability and the effectiveness of safety monitoring are improved
In some embodiments of the application, when equipment is opened for defense, equipment operation data are collected to establish an operation database, and equipment operation time is recorded, the method further comprises the steps of setting cycle maintenance time, generating a maintenance button every time the cycle maintenance time passes, and the cycle maintenance time is in direct proportion to the defense deployment monitoring area.
Specifically, when the defense-setting monitoring area is a first preset monitoring area, the cycle maintenance time is a first preset cycle maintenance time. And when the defense-setting monitoring area is a second preset monitoring area, the cycle maintenance time is the second preset cycle maintenance time. When the defense-setting monitoring area is a third preset monitoring area, the cycle maintenance time is the third preset cycle maintenance time. The first preset cycle maintenance time is smaller than the second preset cycle maintenance time, and the second preset cycle maintenance time is smaller than the third preset cycle maintenance time.
It can be appreciated that the cycle maintenance time is intelligently adjusted according to the size of the arming monitoring area, so that the maintenance period is closely related to the actual monitoring requirement. When the monitoring area is larger, a longer maintenance period is set, and when the monitoring area is smaller, the maintenance period is correspondingly shortened. And when the load is heavy, unnecessary maintenance interference is reduced, and the resources are concentrated to monitor a key area. By reasonably setting the cycle maintenance time, the user is reminded to carry out equipment maintenance at proper time, and the equipment is prevented from being failed or performance is prevented from being reduced due to long-time maintenance.
In some embodiments of the application, the real-time monitoring of the fluctuation of the data in the database comprises calculating a fluctuation value according to the data in the database, comparing the fluctuation value with a standard fluctuation value, and judging whether the fluctuation exists according to the comparison result.
Specifically, when the fluctuation value is larger than the standard fluctuation value, it is determined that the data in the database fluctuates. And when the fluctuation value is smaller than or equal to the standard fluctuation value, judging that the data in the database does not generate fluctuation. The fluctuation value is the absolute value of the difference between the equipment operation data at the current moment and the equipment operation data at the previous moment, and the operation data comprise equipment operation voltage, operation current and operation rotating speed.
It can be understood that whether the equipment operation data has abnormal fluctuation or not is accurately judged by comparing the fluctuation value calculated in real time with a preset standard fluctuation value. When the fluctuation value exceeds the standard fluctuation value, the data is immediately judged to generate fluctuation, so that further risk assessment or alarm measures are triggered. The response speed and the sensitivity of the system to abnormal conditions are improved, and the equipment abnormality can be timely found and processed.
In some embodiments of the present application, when generating data fluctuations, obtaining device influence factors from the fluctuation range and the fluctuation time includes:
The device impact factor is calculated by:
wherein Y represents a device influence factor, N represents a type of operation data, deltaVi represents a fluctuation value of an i-th type operation parameter, vi represents a standard value of the i-th type operation parameter, wi represents a weight coefficient of the i-th type operation parameter, beta is a time factor adjustment coefficient, T0 represents a fluctuation time sum, and T represents a time period.
In some embodiments of the application, the sum of the fluctuation times is calculated by:
wherein t i denotes the sum of the times when the i-th class of operating parameters deviate from the normal range.
It will be appreciated that the fluctuation conditions, standard values, weight coefficients and fluctuation durations of various operating parameters are combined. By integrating these factors, the overall operation state of the apparatus and the degree of abnormality influence are accurately evaluated. Attention is paid not only to the amplitude of the fluctuation but also to the duration of the fluctuation. The dynamic adjustment mechanism can evaluate the influence of long-term abnormality on the equipment more accurately, so that the accuracy of risk evaluation is improved. And a plurality of different abnormal conditions are integrated into a quantized index, so that the risk level and the abnormal severity of the equipment can be judged quickly.
In some embodiments of the present application, when judging whether the device has an abnormality according to the device influence factor, the method includes comparing the device influence factor with a preset influence threshold, and judging whether the device has an abnormality according to a comparison result.
Specifically, when the device influence factor is greater than the influence threshold, it is determined that there is an abnormality in the device. When the device influence factor is less than or equal to the influence threshold, it is determined that there is no abnormality in the device.
In some embodiments of the application, when determining the equipment risk level according to the comparison result, the method comprises the steps of obtaining a temperature difference value according to the equipment operation temperature and a temperature threshold, wherein the temperature difference value is the difference value between the equipment operation temperature and the temperature threshold, comparing the temperature difference value with a first preset temperature difference value and a second preset temperature difference value which are preset respectively, and determining the equipment risk level according to the comparison result.
Specifically, when the temperature difference is less than or equal to the first preset temperature difference, determining that the equipment risk level is a third risk level. And when the temperature difference is larger than the first preset temperature difference and smaller than or equal to the second preset temperature difference, determining that the equipment risk level is the second risk level. And when the temperature difference is larger than the second preset temperature difference, determining that the equipment risk level is a third risk level. The third risk level indicates that the abnormal condition of the device is lower than the second risk level, and the second risk level indicates that the abnormal condition of the device is lower than the first risk level.
In some embodiments of the application, the disarming, maintaining or early warning buttons are generated according to the risk level, including generating the disarming and early warning buttons when the risk level is a first preset risk level. And when the risk level is a second preset risk level, generating an early warning button. And when the risk level is a third preset risk level, generating a maintenance button.
It can be appreciated that whether the device is abnormal or not is primarily determined by comparing the device influence factor with a preset influence threshold. And the potential abnormal equipment is rapidly screened out. And a risk level classification method based on a temperature difference value is further introduced, so that the risk level is accurately estimated and classified according to the actual running temperature of the equipment. And generating corresponding operation buttons (disarming, maintaining or early warning buttons) according to the risk level of the equipment. Appropriate operational advice can be provided based on the real-time risk assessment results. For example, when the risk level is high, a disarming and early warning button is generated to remind the user to take action immediately, while in the case of low risk, a maintenance button is generated to prompt the user to conduct routine inspection. The dynamic response function based on the risk level improves the emergency processing capability, also provides clear operation guidance for the user, and simplifies the decision making process of the user.
In the embodiment, the virtual keyboard is adopted for interaction, and a user can rapidly complete operations such as arming and disarming through a touch screen or other intelligent input modes (such as voice control), so that the traditional multi-step manual process is simplified, the operation time is shortened, and the operation intuitiveness and user experience are improved. The alarm operation is automatically configured according to the real-time running state of the equipment, instead of depending on fixed physical keys or an external controller. The self-adaptive mode meets the requirements of modern users on system flexibility and personalized configuration, and is suitable for different application scenes and user preferences. And after the equipment is protected, collecting and monitoring the operation data of the equipment in real time, and establishing an operation database. And calculating the device influence factors through real-time analysis of the data fluctuation conditions in the database, and evaluating whether the running state of the device is normal or not. And the potential abnormality is found in time, so that the equipment fault is effectively prevented, and the risk of equipment damage or safety accidents is reduced. After detecting the abnormality of the equipment, the running temperature of the equipment is further collected and compared with a preset temperature threshold. According to the comparison result, the risk level of the equipment is determined, the accurate assessment of the equipment risk is ensured, and according to the risk level, an adaptive disarming, maintaining or early warning button is automatically generated. The device can quickly respond to the abnormal condition of the device, and can take the most appropriate action according to the prompt, such as immediately maintaining or starting an early warning mechanism.
It will be appreciated by those skilled in the art that embodiments of the application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flowchart and/or block of the flowchart illustrations and/or block diagrams, and combinations of flowcharts and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the specific embodiments of the present invention without departing from the spirit and scope of the present invention, and any modifications and equivalents are intended to be included in the scope of the claims of the present invention.

Claims (4)

1. The intelligent alarm information management terminal control method based on the virtual keyboard is characterized by comprising the following steps of:
identifying the running state of equipment and generating a defense setting button according to the running state;
When equipment is opened for defense setting, collecting equipment operation data to establish an operation database, recording equipment operation time, monitoring the fluctuation condition of the data in the database in real time, and when data fluctuation is generated, acquiring equipment influence factors according to the fluctuation range and the fluctuation time, and judging whether the equipment is abnormal or not according to the equipment influence factors;
When the equipment is judged to be abnormal, acquiring the running temperature of the equipment, comparing the running temperature with a preset temperature threshold value, and determining the risk level of the equipment according to a comparison result;
Generating disarming, maintaining or early warning buttons according to the risk level;
and when the running state of the equipment is identified and the defense setting button is generated according to the running state, the method further comprises the following steps:
Collecting the running number of the equipment, and comparing the running number with a first preset running number and a second preset running number which are preset respectively, wherein the first preset running number is smaller than the second preset running number, and determining the defense arrangement monitoring area according to a comparison result;
when the running number is smaller than or equal to the first preset running number, determining the defense arrangement monitoring area as a first preset monitoring area;
When the operation number is larger than the first preset operation number and smaller than or equal to the second preset operation number, determining the defense arrangement monitoring area as a second preset monitoring area;
When the operation number is larger than the second preset operation number, determining that the defense arrangement monitoring area is a third preset monitoring area;
the first preset monitoring area is smaller than the second preset monitoring area, and the second preset monitoring area is smaller than the third preset monitoring area;
collecting equipment operation data to establish an operation database when equipment is opened for defense arrangement, and recording equipment operation time, and further comprising:
setting a cycle maintenance time, and generating a maintenance button every time the cycle maintenance time passes, wherein the cycle maintenance time is in a direct proportion relation with the defense arrangement monitoring area;
When the defense deployment monitoring area is a first preset monitoring area, the cycle maintenance time is a first preset cycle maintenance time;
When the defense deployment monitoring area is a second preset monitoring area, the cycle maintenance time is a second preset cycle maintenance time;
When the defense deployment monitoring area is a third preset monitoring area, the cycle maintenance time is a third preset cycle maintenance time;
the first preset cycle maintenance time is smaller than the second preset cycle maintenance time, and the second preset cycle maintenance time is smaller than the third preset cycle maintenance time;
When data fluctuation is generated, obtaining a device influence factor according to a fluctuation range and a fluctuation time, comprising:
The device impact factor is calculated by:
wherein Y represents an equipment influence factor, N represents the type of operation data, deltaVi represents the fluctuation value of the i-th type operation parameter, vi represents the standard value of the i-th type operation parameter, wi represents the weight coefficient of the i-th type operation parameter, beta is a time factor adjustment coefficient, T0 represents the sum of fluctuation time, and T represents a time period;
when determining the equipment risk level according to the comparison result, the method comprises the following steps:
Obtaining a temperature difference value according to the equipment operation temperature and a temperature threshold, wherein the temperature difference value is a difference value between the equipment operation temperature and the temperature threshold, comparing the temperature difference value with a first preset temperature difference value and a second preset temperature difference value which are preset respectively, and determining an equipment risk level according to a comparison result;
when the temperature difference is smaller than or equal to a first preset temperature difference, determining that the equipment risk level is a third risk level;
When the temperature difference is larger than the first preset temperature difference and smaller than or equal to the second preset temperature difference, determining that the equipment risk level is a second risk level;
when the temperature difference value is larger than a second preset temperature difference value, determining that the equipment risk level is a third risk level;
The third risk level indicates that the abnormal condition of the equipment is lower than a second risk level, and the second risk level indicates that the abnormal condition of the equipment is lower than the first risk level;
When the disarming, maintaining or early warning buttons are generated according to the risk level, the method comprises the following steps:
when the risk level is a first preset risk level, generating a disarming button and an early warning button;
When the risk level is a second preset risk level, generating an early warning button;
and when the risk level is a third preset risk level, generating a maintenance button.
2. The control method of the intelligent alarm information management terminal based on the virtual keyboard according to claim 1, wherein when the fluctuation condition of the data in the database is monitored in real time, the method comprises the following steps:
Calculating a fluctuation value according to the data in the database, comparing the fluctuation value with a standard fluctuation value, and judging whether fluctuation exists according to the comparison result;
when the fluctuation value is larger than the standard fluctuation value, judging that the data in the database fluctuates;
When the fluctuation value is smaller than or equal to the standard fluctuation value, judging that the data in the database do not generate fluctuation;
the fluctuation value is the absolute value of the difference between the equipment operation data at the current moment and the equipment operation data at the previous moment, and the operation data comprises equipment operation voltage, operation current and operation rotating speed.
3. The virtual keyboard-based intelligent alarm information management terminal control method according to claim 1, wherein the fluctuation time sum is obtained by calculating:
where ti represents the sum of the times when the i-th class of operating parameters deviate from the normal range.
4. The virtual keyboard-based intelligent alarm information management terminal control method according to claim 3, wherein when judging whether the device has an abnormality according to the device influence factor, comprising:
comparing the equipment influence factor with a preset influence threshold value, and judging whether abnormality exists according to a comparison result;
When the equipment influence factor is larger than an influence threshold value, judging that the equipment is abnormal;
and when the device influence factor is smaller than or equal to the influence threshold value, judging that the device is not abnormal.
CN202410930100.8A 2024-07-11 2024-07-11 A control method for intelligent alarm information management terminal based on virtual keyboard Active CN118897522B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410930100.8A CN118897522B (en) 2024-07-11 2024-07-11 A control method for intelligent alarm information management terminal based on virtual keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410930100.8A CN118897522B (en) 2024-07-11 2024-07-11 A control method for intelligent alarm information management terminal based on virtual keyboard

Publications (2)

Publication Number Publication Date
CN118897522A CN118897522A (en) 2024-11-05
CN118897522B true CN118897522B (en) 2025-03-28

Family

ID=93267395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410930100.8A Active CN118897522B (en) 2024-07-11 2024-07-11 A control method for intelligent alarm information management terminal based on virtual keyboard

Country Status (1)

Country Link
CN (1) CN118897522B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114723274A (en) * 2022-04-02 2022-07-08 北京新兴科遥信息技术有限公司 System for monitoring ecological factors
CN116189399A (en) * 2022-12-22 2023-05-30 北京天河地塬安防技术服务有限公司 Alarm information management method and device, storage medium and electronic equipment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4249995B2 (en) * 2003-02-05 2009-04-08 東京海上日動火災保険株式会社 Vehicle operation status monitoring system and components thereof, operation status monitoring method, and computer program
US9753796B2 (en) * 2013-12-06 2017-09-05 Lookout, Inc. Distributed monitoring, evaluation, and response for multiple devices
CN104578121B (en) * 2014-12-22 2017-07-14 国家电网公司 A kind of method and system of mixed energy storage system power distribution
CN116320832B (en) * 2023-05-23 2023-08-15 常州指尖互动网络科技有限公司 Monitoring equipment fault monitoring method and device
CN117079428A (en) * 2023-10-16 2023-11-17 合肥航谱时代科技有限公司 Regional early warning system for monitoring leakage of dangerous chemical gas in factory
CN117634874A (en) * 2023-11-21 2024-03-01 深圳市众安安全培训咨询服务有限公司 An enterprise security management risk dynamic monitoring system
CN117610591B (en) * 2024-01-22 2024-04-26 深圳市友恺通信技术有限公司 Operation monitoring method suitable for intelligent code scanning terminal
CN118040889A (en) * 2024-02-01 2024-05-14 南京奥途信息技术有限公司 Intelligent monitoring method and system for power distribution room

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114723274A (en) * 2022-04-02 2022-07-08 北京新兴科遥信息技术有限公司 System for monitoring ecological factors
CN116189399A (en) * 2022-12-22 2023-05-30 北京天河地塬安防技术服务有限公司 Alarm information management method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN118897522A (en) 2024-11-05

Similar Documents

Publication Publication Date Title
JP7282184B2 (en) Systems and methods for detecting and measuring anomalies in signals originating from components used in industrial processes
CN109001649B (en) Intelligent power supply diagnosis system and protection method
JP6140331B1 (en) Machine learning device and machine learning method for learning failure prediction of main shaft or motor driving main shaft, and failure prediction device and failure prediction system provided with machine learning device
JP6364800B2 (en) Monitoring device and monitoring method
EP3500896B1 (en) Method of monitoring and controlling an industrial process, and a process control system
US20180017959A1 (en) Methods and systems for context based operator assistance for control systems
CN101676559B (en) Method of alarm mask generation and condition monitoring of wind turbines
CA2540336A1 (en) Equipment component monitoring and replacement management system
US7289935B1 (en) Statistical quality control of alarm occurrences
JP6655926B2 (en) Fault diagnosis system
CN118921366B (en) Circuit breaker control system based on cloud data
JP4635194B2 (en) Anomaly detection device
US20220179402A1 (en) Method and device for analyzing a sequential process
US20200385141A1 (en) Data driven machine learning for modeling aircraft sensors
US9720015B2 (en) Intelligent visualization in the monitoring of process and/or system variables
CN119444177A (en) A risk management system for equipment based on model predictive control
KR102006436B1 (en) Method for detecting false alarm
US20110178963A1 (en) system for the detection of rare data situations in processes
US11665193B2 (en) Method for managing plant, plant design device, and plant management device
You et al. Benefits from condition monitoring techniques: a case study on maintenance scheduling of ball grid array solder joints
CN119885106A (en) Bolt type capacitor fault detection and repair method, device and medium
CN120145137A (en) Ultrasonic vibrator group intelligent predictive maintenance system and method
CN118897522B (en) A control method for intelligent alarm information management terminal based on virtual keyboard
CN112579665A (en) Energy equipment control method and device and energy equipment
KR20180073273A (en) Method and apparatus for reducing false alarm based on statics analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant