Management system of border fence on construction site

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. Demand background

In the process of building construction, border fences are needed to protect the safety of construction personnel. However, some construction operations must be completed outside the fence. For convenience, some construction workers use tools to damage or damage the border fence. This has brought a lot of trouble to the safety and protection management of the construction site. If a safety accident occurs, the contractor will have to bear costs and responsibilities. As a result, construction projects of more than one billion yuan will even be suspended for rectification, resulting in delays in the construction period.

Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. uses ultra-long-distance wireless transmission technology to remotely monitor and manage the border protection fence, regularly inventory the border protection fence, and immediately send out an alarm to remind the management staff when malicious damage occurs, helping to create a safe construction site.

Figure 1 The border fence that was destroyed and removed

2. Introduction to application requirements

Figure 2 Schematic diagram of monitoring range

1. Guard fence movement warning

When the protective fence is illegally moved or destroyed, an alarm is triggered to remind the manager to go to the corresponding protective point for inspection. The alarm information will be displayed on the background system, or it can be pushed to the mobile APP to remind the manager.

2. Timed inventory of the protective fence

The system regularly counts whether the monitoring box bound to the side fence is normal every day. If the monitoring box is not reported for 24 hours, it is considered that the box may be damaged and needs to be inspected.

3. System introduction

The system topology is shown in Figure 3. Each side fence is equipped with a monitoring box, and the monitoring base station is generally installed in the electric room. The monitoring base station is responsible for receiving the signal from the monitoring box and uploading it to the server through the 3G network. Whenever and wherever, managers can access the server via computer or mobile phone to access the server, manage the entire monitoring system, and realize remote monitoring.

Figure 3 System topology diagram

1. Monitoring box

As shown in Figure 4, the monitoring box is pressed against the edge of the protective fence with a mechanical button. When the protective fence is moved, maliciously damaged or disassembled, the mechanical button will be released and an alarm will be triggered.

The monitoring box adopts ultra-long-distance wireless communication technology, which can penetrate 6-10 floors on the construction site (subject to the actual measurement on site).

Figure 4 Schematic diagram of the monitoring box function

The monitoring box is powered by two AA batteries and can be used for about 2 years. When the battery is low, the monitoring box will send an alarm to the background system to remind the administrator to replace the battery.

2. Monitoring the base station

Figure 5 Monitoring base station

The monitoring base station is used to receive the alarm signal sent by the monitoring box and upload it to the server through the 3G network. As shown in Figure 5, the monitoring base station needs 220V mains power supply. It is recommended to install it in the electric room on the floor. It can be installed through a bracket or a hoop, and the electricity can be obtained through the electric box used for construction. The base station shell is made of ABS+PC material, which is waterproof, dustproof and fireproof. The appearance size of the monitoring base station: 26.1cm×18.2cm×13cm.

3. Handheld PDA

Figure 6 Handheld PDA

The handheld PDA is used to confirm on-site whether the box is installed properly. When the box is installed in the wrong place or the box barcode is incorrectly attached, the handheld PDA can confirm the unique ID number of the box on the spot.

4. Active card issuer

Figure 7 Active card issuer

The card issuer is connected to the computer through the USB interface to read the ID number of the monitoring box. The administrator then enters the specific installation location of the monitoring box into the system and binds it to the ID number of the monitoring box. After the box shell is marked, the card issuance is completed. . The card issuer can repeatedly issue cards to the anti-theft box, which is convenient for repeated use. Appearance size: 145mm×93mm×35mm.

Fourth, the software effect

1. Login interface

Figure 8 System login interface

As shown in Figure 8, the user can enter the management system through a browser and enter the account password to log in to the system.

2. Information Entry

Figure 9 Information Entry

As shown in Figure 9, before installing the box, you need to enter relevant information in the system, such as box code, installation location, etc., to bind and identify the box.

3. Equipment Alarm

Figure 10 Alarm information

As shown in Figure 10, when the monitoring box sends out an alarm signal, the background system will immediately sound an alarm, and the position and label of the alarm box will be displayed in the pop-up window at the bottom right corner of the window. The background color is red for unprocessed alarm information, click to handle The background color becomes white afterwards. At the same time, the system will push alarm information to the mobile APP.

4. Equipment inventory


Figure 11 Equipment inventory

As shown in Figure 11, the system can query inventory information records, inventory abnormal monitoring box records, the background color is red.

Five, mobile phone APP function effect

Figure 12 Mobile APP effect

The effect of the mobile phone APP is shown in Figure 12. The system alarm information and inventory information can be viewed and processed remotely through the mobile phone.

6. Advantages and highlights

1. Ultra-long-distance coverage

The monitoring base station accurately covers the location of every side fence installed on the floor, fully reducing the situation that the blind corner cannot communicate, and making the positioning more accurate.

2. Anti-disassembly box

The box has a strong binding with the border guardrail, and it will sound an alarm if it is violently dismantled.

3. Remote management

The management system is connected to the Internet through the 3G network, and the management personnel can log in to the management system through a computer or mobile phone APP anytime and anywhere for remote management and remote monitoring.

4. Low radiation impact

Relative to passive tags, active tags can provide energy by themselves, and the transmission power of monitoring base stations and monitoring boxes can be made very small, which is about one-tenth of the radiation of mobile phones.

5. Long battery life

The monitoring box uses wireless technology with low data volume and low power consumption, and the battery has a longer battery life, with a lifespan of up to 2 years.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare