Инженерно-строительный журнал, № 1, 2017 Шарманов В.В., Симанкина Т.Л., Мамаев А.Е. BIM технологии в оценке уровня охраны труда // Инженерно-
строительный журнал. 2017. № 1(69). С. 77–88.
All parameters of control are checked according to the regulating documentation.
In the PLUGIN there is also an opportunity to take pictures of the revealed violation and to attach
them to the accounting card on which filming (Fig. 5) was made. At the same time the photo receives the
same ID code, as the accounting card.
Figure 5. The accounting card with the photo attached to it The number of accounting cards is appointed from accounting of at most 100 m
2
of the checked
area (the elementary site), however in the reviewed example one card was appointed to one room. Each
accounting card creates control data on all criteria according to which the assessment of actual state of
the checked elementary site is carried out. The assessment of actual state of the checked site is noted as
"right" and "wrong". To assess an objective situation on the checked site, it is necessary to expose both
marks. Each of the checked parameters shall conform to requirements of the regulating documentation,
Construction Rules and Regulations, Design and Construction Specifications, otherwise the mark
"Wrong" is given.
To form the security index the borders of danger areas are determined:
70
– 100% – safe level of occupational health and safety;
50
– 70% – satisfactory level;
- 0
– 50% – unsatisfactory level.
In the reviewed example 2711 accounting cards are processed, at the same time 3206
measurements are performed (in one bypass of the engineer). The accounting cards which aren't
participating for any reasons in measurements and entering of data weren't taken into consideration
respectively. From 3206 measurements: 1359 yielded positive result, 1847 were negative - that shows
the availability of dangerous actions when implementing installation and construction works which can
lead to an injury rate.
Third step. For handling and calculation of the security index the PLUGIN can unload the bypass
data in a text format. In the reviewed example results of a bypass were unloaded in the MicrosoftExcel
program as it is shown in the Table 2.
83