Internet direct connection of signal transmission ultrasonic inspection
What you need to do: 1) Operators total control to allocate to the group the operators of the cart. Their duties should not be included: definition of the health system, identifying malfunction, preparation of its work, the implementation of standardized plan set for the day, and during execution of work monitoring performance of the cart, as well as the quality of the recording to the Registrar; 2) programmatic (automatic) decoding results of the travel trucks and cars diagnostic path. This will reduce risks associated with human error, and reduce the cost of maintaining the centre of decrypt. When you create the processing program pass defectoscopic carts, analysing the signals of ultrasonic testing of control, and ultimately highlighting the bundle of signals characteristic for the respective defects, analyzing their size, the change in all parameters ( length, depth, ratios of the detection) to the final stage to achieve such a result in which the decryption could only monitor the work of the programme and to analyse the signals issued by the program; 3) all threat signals to verify the operators of the secondary control.
Secondary control as a primary
As the duties of operators of secondary control must include verification: of welded joints, frogs of turnouts, where not possible total control. Creating such a system, we gain a clear responsibility at all levels of monitoring.
Fronds FAI fence truck
And for controlling the operation of devices necessary to create a system of wireless data transmission. This will allow: 1) to carry out the decoding during operation of the apparatus; 2) eliminates the possibility of falsification of the passage of the carts; 3) creating the possibility of fencing the work site without human intervention; 4) eliminate the need for issuance of warnings; 5) improve traffic safety on the railway. What might it look like? If you create a system for wireless transmission of data for vailly Fi technology for example, at arrival to site of works the operator enters the data on the volume of work scheduled (mileage, with some of what the kilometer, or the paths) in the system area. The system then automatically sends messages to the entire fleet, producing work in the area. Waiting for a representative site (foreman, supervisor), operator informs the area Manager about the intended plan and the beginning of the works and commencement of work. During operation, transmit data to the center for decryption: 1) the location of the device ( by means of navigation systems GPS, GLONASS and other); 2) data transmission control. For fencing of the work site must be equipped with rolling stock and employees performing the works in the ways of devices to receive and transmit the signal, and at the approach of rolling stock that emits sound signals. For example, in the area of works should train. At a certain distance trigger signals to all employees that are on the route of the train (employees on the road and drivers). This system will be linked to the network of fronds FAI, and if the work is submitted to the system, analyzes the system, which should be linked to computers Manager. So, when crossing the phase block, analyzing the speed and direction of movement, the system can control the time of termination. In addition, to enhance system reliability the transmission signal in the direction of movement of the train, and from the work site. When entering the coverage area of signals as trigger indicators and drivers and railwaymen. This is in case the work is not registered in the system, or on the way are other persons who have not made themselves into the system. Wearing the transmitters should be mandatory when entering the path.
87) Automation of decryption and removal of batches of suspicious signals automation of decryption and removal of batches of suspicious Data signals from the diagnostic apparatus over a network vailly Fi will be forwarded to the transcripts where the program automatically analyzes the incoming information and, at the end of work on the way ( off of the apparatus by the operator) shall prepare a report about identified deviations, decryptor puts a conclusion on the degree of danger of these deviations produces numbers, and sends data to the distance. Further operators work the secondary controls, and controllers, to confirm and eliminate the identified deviations. To find the coordinates, it is also necessary to make the possibility of finding the location for deployment of the devices at the approach to the place of the revealed deviations. For example, you enter a coordinate where a fault in a portable device, and the system, on a site where there is a deviation, and when passing this place occurs the alarm sounds.