RFID NEWS

Application of RFID technology in coal mine safety production

When analyzing recent major accidents in several coal mines, several common problems were discovered: the information communication between ground and underground personnel is not timely; it is difficult for ground personnel to dynamically grasp the distribution and operation conditions of underground personnel in a timely manner and accurately locate personnel; once a coal mine accident occurs , the efficiency of emergency rescue, disaster relief and safety rescue is low, and the search and rescue effect is poor.


To this end, how to correctly handle the relationship between safety and production, safety and efficiency, how to accurately, real-time and quickly perform coal mine safety monitoring functions, effectively manage miners, and ensure the efficient operation of rescue, disaster relief, and safety rescue is particularly important and urgent.


Facing new situations, new opportunities and new challenges, higher requirements and expectations have been put forward for safety production work. Therefore, improving the level of production safety information management and strengthening the long-term mechanism for production safety with disaster prevention and efficient search and rescue as the main goals is the only way for my country's production safety work.


Overview


RFID technology is a new automatic identification technology that directly inherits the principle of radar and is developed from it. The use of reflected power for communication lays the theoretical foundation of RFID. The issue of RFID standardization has attracted increasing attention. The types of RFID products have become more abundant, and the scale of application industries has continued to expand. In particular, the use of Wal-Mart and the US military has greatly promoted the research and application of RFID.


In South Africa, RFID technology has been successfully used in mine management, successfully solving problems in mine management such as mine attendance, anti-theft, and safety. In China, the degree of integration of mining area management with computers is mainly limited to the above-ground part, including daily enterprise process management, financial management, and transportation management. The core of coal mine underground management is experience management. With the development of informatization and networking in the coal industry, most coal mine enterprises have basically adopted various coal mine management systems in the actual production process, and in practical applications played an important role. With the introduction of RF ID technology, domestic coal mines have also begun to use RFID technology for management. Such as: Xishan Mining Bureau, Datong Mining Bureau.


Basic composition and working principle


RFID technology is a non-contact automatic identification technology. Its basic principle is to use radio frequency signals and spatial coupling transmission characteristics to achieve automatic identification of identified objects. The system generally consists of three parts, namely electronic tags, readers and application interfaces. The spatial coupling of radio frequency signals is realized between the electronic tag and the reader through coupling elements. In the coupling channel, energy transfer and data exchange are realized according to the timing relationship. The basic model of the system is shown in Figure 1.


As can be seen from Figure 1, in the working process of the RFID system, data exchange is always realized based on energy and through a certain timing method. The reader provides working energy to the electronic tag. When the electronic tag enters the radio frequency identification field, the radio frequency waves emitted by the reader activate the tag circuit, interact with each other, and complete the exchange of data.


For simultaneous reading of multiple tags, the reader can be sent first or the tag can be sent first. In order to achieve conflict-free simultaneous reading of multiple tags, for the reader-first method, the reader first issues an isolation command to a batch of tags, so that multiple electronic tags within the reading range of the reader are isolated, and finally only one tag is left in The active state establishes a conflict-free communication link with the reader. After the communication is completed, the tag is instructed to enter physical sleep, and a new tag is designated to execute conflict-free communication instructions. Repeat this to complete simultaneous reading of multiple tags.


For the tag-first method, the tag randomly and repeatedly sends its own identification ID. Different tags can be correctly read by the reader at different time periods, completing the simultaneous reading of multiple tags. For any electronic tag, it has a unique ID number. This ID number cannot be changed for a tag. In most applications, the data attributes of tags are supported by using a backend database.


The identification system usually composed of electronic tags and readers serves applications, and the requirements of applications are diverse and different. The interface between the reader and the application system is represented by standard functions called by development Tools. The functions roughly include the following aspects. The application system issues configuration commands and other instructions to the reader as needed. The reader returns its current configuration status and execution results of various instructions to the application system.


Application in underground personnel positioning management


Realize the effective identification and monitoring of the entry and exit of underground coal mine workers, so that the management system fully embodies "humanization, informationization and high automation" to achieve the goal of digital mining. The basic functions implemented in coal mine underground personnel positioning management include:


①How many people are there underground or in a certain place at any time, and who are these people?


②The trajectory of each person’s activities underground at any time;


③ Query the current actual location of one or more personnel (underground personnel positioning), so that the dispatch center can quickly and accurately contact the person by phone, query the arrival time and total working time of the relevant personnel at any location, and a series of information, which can supervise And ensure whether important inspection personnel (such as gas detectors, temperature detectors, wind detectors, etc.) conduct the testing and processing of various data on time and on point, so as to fundamentally eliminate related accidents caused by human factors.


The plan is to install several readers in various tunnels underground and in the passages that people may pass through. The specific number and location are determined according to the actual conditions of the tunnels on site and the functional requirements to be achieved, and connect them to the computer in the ground monitoring center through communication lines. Perform data exchange. At the same time, an electronic tag is placed on the miner's lamp or other equipment worn by each underground person. After the underground personnel enter the underground, as long as they pass or approach any reader placed in the tunnel, the reader will sense the signal and immediately upload it to On the computer in the monitoring center, the computer can determine the specific information (such as who it is, where it is, the specific time), and display it on the large screen or computer display of the monitoring center and back it up. The manager can also Click on a certain location underground on the distribution diagram on the large screen or computer, and the computer will count and display the personnel in this area.


At the same time, the computer in the control center will sort out various attendance reports for each underground person during this period based on the personnel entry and exit information for this period (such as: attendance rate, total attendance time, late arrival and withdrawal records, non-attendance time, etc.). In addition, once an accident occurs underground, the personnel at the accident site can be immediately identified based on the personnel positioning and distribution information in the computer, and then the detector can be used to further determine the precise location of the personnel at the accident site to help rescuers rescue them in an accurate and rapid manner. Trapped people. The schematic diagram of underground personnel positioning monitoring is shown in Figure 2.


Application in tunnel safety, statistical attendance and equipment management


Personnel at different levels have different access rights to tunnels. The readers installed at the exit of the tunnel can automatically identify the people who want to pass through. According to the information set in the background database, the revolving door at the tunnel is controlled accordingly. When people are allowed to enter, it will automatically open. When people are not allowed to enter, the revolving door will be closed. At the same time, the people who come to the tunnel entrance are automatically recorded and saved for easy query and report generation. In terms of attendance, the exact time of each person going down the well and the time they went up are displayed. And according to the type of work (stipulated full shift time), it is judged whether different categories of personnel have full shifts, so as to determine whether their trip to the mine is valid. In the monthly statistical report, the time of going down the well, the number of times going down the well (effective times), etc. are classified and counted to facilitate assessment. Print monthly attendance reports, downhole statistics at any time period and other related reports. The specific real-time location of the mine car and other important equipment is recorded, and the daily transportation times and frequency of entry and exit of each mine car are calculated for easy management. The setting and application principles of the equipment are basically the same as those of personnel positioning.


Conclusion


The application of RFID in mines is based on underground safety supervision, and can be classified and applied in terms of personnel safety management, tunnel safety management, and safety material management. Use RFID technology to establish information collection and processing solutions to achieve information transmission and sharing, provide support for enterprise management, and realize informatization, standardization and visualization of underground management. Ensure personnel safety to the greatest extent.


CATEGORIES

CONTACT US

Contact: Adam

Phone: +86 18205991243

E-mail: sale1@rfid-life.com

Add: No.987,Innovation Park,Huli District,Xiamen,China

Scan the qr codeclose
the qr code