Disclosure of Invention
The invention relates to a laboratory safety access system and a laboratory safety access method based on big data analysis in an experimental process. The laboratory safety access system based on the experimental process big data analysis comprises an experimental application module, an experimental safety evaluation module, an experimental approval module and a data management module. The invention solves the problems of insufficient or unknown security protection consciousness of experimenters to the experimental process, the mastering degree of the operation of experimental instruments and the security risk of dangerous chemicals, the emergency plan processing capability of sudden accidents and the like in the prior laboratory safety work.
The invention provides a laboratory safety access system based on big data analysis in an experimental process, which comprises:
the experimental application module is used for applying for laboratories and experimental projects by experimenters;
the experimental safety evaluation module comprises an experimental content and process risk evaluation module, an instrument and equipment operation safety evaluation module, a dangerous chemical safety evaluation module and a personal protection safety evaluation module;
the experiment approval module comprises an experiment application approval module, an experiment delay module and an experiment termination approval module;
and the data management module comprises a safety data source and data storage, cleaning and analysis.
According to the embodiment of the invention, the experiment application module is used for the experimenter to fill in basic information, including the experimenter basic information, the direct responsible person information, the laboratory and the experiment period time, to confirm whether to learn and master the basic laboratory accident emergency management learning file and confirm whether to read the safety notification information.
According to an embodiment of the invention, the experimental content and process risk assessment is used for experimenters to fill out experimental content, goals, detailed method steps.
According to the embodiment of the invention, the operation safety evaluation of the instrument and the equipment is used for filling out the instrument and the equipment with potential risks, effective precautionary measures of the instrument and the equipment and emergency plans after the occurrence of the risks by experimenters.
According to the embodiment of the invention, the dangerous chemical safety assessment is used for filling of experimenters for various chemicals and reagents which are involved in experiments and have potential dangers, effective precautionary measures of the chemicals and reagents and emergency plans after the dangers occur.
According to an embodiment of the invention, the personal protective safety assessment is used for filling out personal wearing protective articles before the experiment is carried out by an experimenter.
According to the embodiment of the invention, the experiment approval module is approved by experiment managers, and the experiment managers comprise an experiment direct responsible person teacher or instructor and/or a safety manager.
According to the embodiment of the invention, the safety data source comprises a laboratory accident emergency management learning file and a data source related in a safety admission application process.
The invention also provides a laboratory safety access method based on the big data analysis in the experimental process, which comprises the following steps:
(1) the experimental personnel fills in and submits application information of laboratories and experimental projects in an experimental application module of the user terminal;
(2) the experimental personnel fills in and submits experimental contents and process risk assessment, instrument and equipment operation safety assessment, dangerous chemical safety assessment and personal protection safety assessment contents in an experimental safety assessment module of the user terminal;
(3) the data management module stores and classifies the information to generate a report;
(4) and the experiment administrator carries out experiment application approval, experiment delay and experiment termination approval in an experiment approval module of the user terminal.
According to the embodiment of the invention, the laboratory safety access method based on the experimental process big data analysis can also perform data analysis and safety grade classification through the data management module, and automatically feed back and perfect the system danger source database.
Compared with the prior art, the method has the advantages that the system strengthens the cognition of the laboratory staff on the safety of the experimental process, equipment and instruments and dangerous chemicals, further strengthens the learning of the laboratory staff on safety knowledge, and strengthens the mastering of the laboratory safety management system, the safety education manual, the safety emergency plan, the laboratory safety informing information and the like by the laboratory staff; the method is beneficial to the control of a safety manager on the experimental safety, strengthens multi-level audit, reduces the experimental safety risk, and is convenient for accident reason analysis, responsibility pursuit and the like. Meanwhile, by sorting, classifying and analyzing the collected data, the experiment risk analysis, the high-frequency hazard source automatic feedback prompt and the like are realized, and a built-in hazard source database of the system can be perfected according to the function.
Detailed Description
The present invention will be described in detail with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a laboratory security access system based on big data analysis in an experimental process according to the present invention. The laboratory safety access system based on the experimental process big data analysis comprises an experimental application module, an experimental safety evaluation module, an experimental approval module and a data management module.
Fig. 2 is a schematic diagram of a specific structure of a laboratory security access system based on big data analysis in an experimental process according to the present invention.
In the laboratory safety access system based on the analysis of big data in the experimental process, an experimental application module is used for applying for laboratories and experimental projects by experimenters. The system is characterized in that firstly, experimenters fill in application information, the application information mainly comprises personal information of the experimenters, the experimenters directly take charge of information of teachers and instructors, and the like, and the specific places of experiments can be further detailed to laboratories, the time of experiment periods and the like. After the application information is filled in, reading and confirming related safety education manuals, accident safety emergency plans, safety notification books and the like, mastering basic laboratory accident emergency management learning files and confirming whether safety notification information is read or not. Through this application experimenter can know the danger factor that probably exists in the laboratory to there is emergency treatment ability to the incident.
In the laboratory safety access system based on the big data analysis of the experimental process, the experimental safety evaluation module comprises evaluation on experimental content and process danger, evaluation on operation safety of instruments and equipment, evaluation on safety of dangerous chemicals and evaluation on personal protection safety. The contents of the safety assessment module are filled in by the experimenter, so that whether the experimenter fully knows the contents of the experiment or not and whether the experimenter grasps the risks possibly occurring in the experiment and the corresponding protective measures and the emergency processing capacity or not can be judged.
The experimenter uses a lot of instruments and equipment in the experiment process, and the illegal operation of the equipment not only affects the experiment result and the service life of the instruments and equipment, but also easily causes potential safety hazards. In the evaluation of the experiment content and the process, through filling in the experiment target, the experiment content, the detailed operation steps of the experiment and the like, on one hand, the proficiency degree of experimenters in all links of the experiment content is favorably acquired, and on the other hand, a basis is provided for examining and approving whether the examination passes the admission, the delay and the termination in the subsequent procedures.
In the experiment process, experimenters can use various chemicals, and common chemical reagents have corrosivity of different degrees, including concentrated sulfuric acid, concentrated hydrochloric acid, glacial acetic acid and the like. These chemicals can burn when they come into contact with the skin and for similar chemicals and organic solvents, effective control schemes are needed to avoid various safety problems due to chemical safety. In dangerous chemical safety assessment, safety data of a chemical safety technical specification (MSDS) are combined, safety precaution information of dangerous chemicals is obtained from the safety precaution information, an experimenter selects the required dangerous chemicals, the system automatically gives risk assessment of related dangers of the dangerous chemicals, the experimenter provides safety precaution measures and emergency plans through the risk assessment, and if the precaution measures and the emergency plans of the selected dangerous chemicals cannot be effectively answered, the experimenter needs to give answers through learning. After the application is submitted, the safety of the experiment is guaranteed through the judgment of direct responsible persons such as teachers, instructors and the like of the experiment and safety management personnel.
In the process of experiment, harmful gas and liquid can be generated, and the safety of experimenters can be harmed no matter how much the dosage and the toxicity degree are. Personal protection security assessment is also important since inadequate protection may affect security or even be life threatening. In personal protection safety evaluation, wearing protective articles related to experiments are selected according to the system, and personal safety is guaranteed. The experiment direct responsible persons such as teachers, instructors and the like and/or safety management personnel also judge whether the required protective equipment meets the personal protection safety or not by the content of the module.
And the experiment approval module comprises an experiment application permission, an experiment delay and an experiment termination approval. The direct person in charge of experiment such as mr, leading teacher etc. and the application file that security administrator submitted through consulting the application personnel, carry out security assessment according to the file content, if the security approval fails, the application file is automatic to be withdrawn and is the experimenter, and the application personnel revises once more according to the reason that the approval fails and perfects until meeting security administrator's safety requirement. If the approved experimenter has potential safety hazards in the experimental process, the direct responsible person and/or the manager of the experiment can stop the experiment. If the experiment time of the experimenter exceeds the application experiment time and passes the examination and approval in the earlier stage, the direct responsible person and/or the manager of the experiment can stop the experiment. If the experiment time of the experimenter exceeds the application experiment time but the application for prolonging the experiment time is made, the experiment is directly responsible for and/or the administrator to prolong the experiment period according to the situation.
The data management module comprises a safety data source, data storage, cleaning and analysis. Safety data sources including but not limited to relevant safety education manuals, accident safety emergency plans, safety notices, chemical safety technical specifications (MSDS), safety assessment reports, etc. are stored in the central database of the system of the invention, and the types of information obtained by different personnel can be determined according to the classification design of the database information. For example, relevant safety education manuals, accident safety emergency plans, safety notices, chemical safety technical specifications (MSDS) can be known by persons logging in the system, and safety assessment report experiments can be obtained by persons directly responsible for and managers. The experiment direct responsible person and the manager can clean and analyze the data through the terminal, namely, the collected data is extracted in real time or at regular time according to the system design, and the extracted data is deeply cleaned to remove useless information, including but not limited to actual cleaning requirements such as noise elimination (such as repeated words, nonsense auxiliary words, person-named pronouns and the like). The cleaned data is analyzed by the system according to the functional requirements, the analysis result corresponds to the key word segmentation to establish a data source, and a corresponding database table is calculated and established according to the connection relation, so that the data is convenient to retrieve and extract.
A laboratory safety access system based on big data analysis of an experimental process is designed according to the characteristics of laboratory safety access, provides a solution for laboratory safety inspection by a distributed architecture, and mainly comprises the following contents:
1) the method comprises the steps of constructing a local area network in a laboratory, installing a special management system and a special database in the laboratory, and establishing a laboratory information management system platform which integrates automatic acquisition of networking data of a detection instrument, automation of detection business processing and automation of management according to management systems and specific requirements of the laboratories. The safe, stable, fast and good data mining and data analysis of the laboratory internal business operation are ensured.
2) A central database is built and interconnected with an industry private network, the central database stores data information shared by laboratories, and the issuing and receiving of experimental tasks, accurate and timely summary reporting and analysis of detection data, communication and sharing of information such as related detection technologies and detection results and the like are realized by using a WebService platform based on XML of a system, so that data information and stage working conditions in the laboratories are comprehensively and timely mastered.
3) And the special management system of the laboratory uploads the shared information to the central database without errors and acquires and downloads the shared information from the central database. According to the requirement, the access authority of the local laboratory user, the monitoring center other department users and the external clients to the local database and the central database can be set, and an application program mode or a Web mode for accessing the local database and the central database can also be set.
A laboratory safety access system based on big data analysis of experimental process is laboratory safety management software, and the system is not only computer application software for controlling and integrating laboratory safety resources, but also can utilize profound thought and means for processing problems contained therein and advanced management thought thereof, and reasonable management means improves the efficiency of laboratory safety management.
Fig. 3 is a schematic diagram of a logical structure of a laboratory security admission system based on big data analysis of an experimental process according to the present invention. The design of the laboratory management system platform is developed and completed on the basis of B/S mode and MVC model.
The laboratory safety access system based on the big data analysis in the experimental process is mainly divided into three layers:
1) presentation layer
The presentation layer is located in the outermost part of the overall system, being the part directly facing the user. The server is responsible for interacting with the interface of the user, sending a data request to the server address through an HTTP protocol, and returning logic and data results to the browser to be presented to the user after responding to the request of the browser.
2) Business logic layer
The service logic layer is positioned between the presentation layer and the data layer, mainly realizes the service logic function of the system, and controls the judgment of the logic and the data transmission. According to different functions, the logic layer can be divided into four parts, namely a page container layer, a business object layer, a basic service layer and a database access layer. The system is respectively responsible for processing the navigation of the page, generating the interactive response with the page by the page, defining the basic service object of the system and realizing the service logic function, providing the basic service of the system for the service object layer and providing the database access service for the service object layer and the basic service layer.
3) Database layer
The database layer is composed of a database management system and realizes the storage and management of system data.
As shown in fig. 3, the present invention further provides a laboratory security access method based on big data analysis of an experimental process, the method includes the following steps:
(1) the experimental personnel fills in and submits application information of laboratories and experimental projects in an experimental application module of the user terminal;
(2) the experimental personnel fills in and submits experimental contents and process risk assessment, instrument and equipment operation safety assessment, dangerous chemical safety assessment and personal protection safety assessment contents in an experimental safety assessment module of the user terminal;
(3) the data management module stores and classifies the information to generate a report;
(4) and the experiment administrator carries out experiment application approval, experiment delay and experiment termination approval in an experiment approval module of the user terminal.
The laboratory safety access method based on the experimental process big data analysis can also perform data analysis and safety grade classification through the data management module, and automatically feed back and perfect the system danger source database.
Those of ordinary skill would further appreciate that the various illustrative modules, devices, and steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
A general purpose processor (CPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein may be used to implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the present disclosure. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a number of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. Of course, the processor and the storage medium may reside as discrete components in a user terminal.
The present application is susceptible to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and have been described in detail herein. However, the application is not intended to be limited to the particular forms disclosed. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the application, which is defined by the appended claims and their legal equivalents.