版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、<p><b> 附錄 A</b></p><p> 關(guān)于煤礦安全監(jiān)控系統(tǒng)技術(shù)的研究</p><p> Zhi Chang, Zhangeng Sun & Junbao Gu</p><p> School of Mechanical and Electronic Engineering, Tianjin Polyte
2、chnic University</p><p> Tianjin 300160, China</p><p> 前言:無線射頻的新的發(fā)展和運(yùn)用使得RFID(射頻識(shí)別)技術(shù)的應(yīng)用越來越廣泛。同時(shí)結(jié)合礦山與RFID技術(shù)的特點(diǎn),我們建立了一個(gè)地下的安全完整的、實(shí)時(shí)靈活的監(jiān)測(cè)系統(tǒng)。這套系統(tǒng)能在發(fā)生危險(xiǎn)時(shí)自動(dòng)報(bào)警并且提高搜索和救援的效率。該系統(tǒng)可以管理危害氣體的濃度、規(guī)劃工人的安排、進(jìn)出巷道通
3、過工作的訪問控制、巷道人員的分布和工人的資料,實(shí)現(xiàn)地下管理的信息化和可視化,提高礦業(yè)生產(chǎn)管理水平和礦井安全生產(chǎn)水平。</p><p> 關(guān)鍵詞:射頻識(shí)別,安全監(jiān)控系統(tǒng),電子標(biāo)簽,讀寫器</p><p> 煤礦事故往往發(fā)生在中國(guó)近幾年,除了礦業(yè)主的安全和法律意識(shí)薄弱,滯后的安全機(jī)構(gòu)和采礦的人員和設(shè)備的不完善管理人員是重要原因。通過分析近期內(nèi)一些十分嚴(yán)重的事故,一般存在以下常見問題:(1)
4、地面人員和地下人員之間的信息溝通不及時(shí);(2)地面人員不能動(dòng)態(tài)地掌握井下人員的分布和操作情況,并且不能掌握地下人員的確切位置;(3)一旦煤礦事故發(fā)生,救援效率低,效果較差。因此,準(zhǔn)確、迅速實(shí)施煤礦安全監(jiān)控職能非常重要和緊迫,有效管理礦工,并確保救援高效率的運(yùn)作。 文章中提出的煤炭采礦人員和車輛安全監(jiān)測(cè)系統(tǒng)可以跟蹤、監(jiān)視和定位在礦井實(shí)時(shí)的有害氣體,人員和車輛以及提供有關(guān)網(wǎng)絡(luò)的礦井巷道,個(gè)人的定位,車輛的位置,危險(xiǎn)區(qū)域的動(dòng)態(tài)信息和地
5、面人員相應(yīng)線索。如果發(fā)生意外,該系統(tǒng)還可以查詢有關(guān)人員的分配,人員數(shù)量,人員撤離路線,以提供從事故救援監(jiān)視計(jì)算機(jī)科學(xué)依據(jù)。同時(shí),管理人員可以利用系統(tǒng)的日常考勤功能實(shí)施礦工考勤管理。</p><p> RFID技術(shù)簡(jiǎn)介 射頻識(shí)別是一種非接觸式自動(dòng)識(shí)別技術(shù)進(jìn)行排序,可以自動(dòng)識(shí)別的無線電頻率信號(hào)的目標(biāo),迅速跟蹤貨物和交換數(shù)據(jù)。身份查驗(yàn)工作無須人工操作,并能在各種嚴(yán)峻的環(huán)境下工作。RFID技術(shù)可識(shí)別高速對(duì)象和多
6、個(gè)標(biāo)簽同時(shí)識(shí)別,操作簡(jiǎn)單快捷。RFID技術(shù)是產(chǎn)生于第二次世界大戰(zhàn),它是在繼承傳統(tǒng)的編碼技術(shù),其主要的核心部分是電子標(biāo)簽,識(shí)別系統(tǒng)可以讀取電子標(biāo)簽存儲(chǔ)通過無線電波的資料排放的讀者從幾厘米到數(shù)米的作家,并確定貨物的身份,人民和電子標(biāo)簽代表的對(duì)象。1.1 RFID的系統(tǒng)組成 射頻識(shí)別系統(tǒng)(見圖1)通常由電子標(biāo)簽,讀寫器和計(jì)算機(jī)通訊網(wǎng)絡(luò)組成。1.1.1電子標(biāo)簽 電子標(biāo)簽存儲(chǔ)相關(guān)信息確定的對(duì)象,它通常是在確定的目標(biāo)付諸表決,并
7、通過它儲(chǔ)存的信息可以讀取和射頻讀寫器寫入通過非接觸模式。1.1.2讀寫器 讀寫器是一個(gè)可以用來讀取和寫入射頻技術(shù)的電子標(biāo)簽信息的設(shè)備。標(biāo)簽上的信息的讀寫器讀取都可以處理,由計(jì)算機(jī)網(wǎng)絡(luò)系統(tǒng)傳輸。1.1.3計(jì)算機(jī)通信網(wǎng)絡(luò) 在RFID系統(tǒng),計(jì)算機(jī)通信網(wǎng)絡(luò)一般是用來管理數(shù)據(jù)和完整的通信傳輸功能。該讀寫器可以通過連接標(biāo)準(zhǔn)接口的計(jì)算機(jī)通</p><p> Klaus Finkenzeller. (200
8、3). RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification (second Edition). John wiley & Sons, 2003.</p><p> Liu, Lili & Yao, Meng. (2004). Coal Mine Security In
9、telligent Control System Based on RFID. Global Electronics China. No.9. P.22-25.</p><p> Nadeem Raza, Viv Bradshaw, Matthew Hague, et al. (1999). Application of Technology. The Institution of Electrical Eng
10、ineer, 1999.</p><p> Qiu, Like. (2007). The Principle of Staff Positioning System for Those Working in Underground Coalmine and Its Application in Xinglongzhuang Coalmine. Coal Mine Modernization. No.1. P.2
11、8-29.</p><p> Simson Garfinekel, Beth Rosenberg. (2005). RFID, Applications, Security and Privacy. Addison-wesley, 2005.</p><p> Tan, Min & Liu, Yu. (2007). RFID Technical System Engineeri
12、ng and Application Directory. Beijing: China Machine Press. April of 2007.</p><p> Zhou, Xiaoguang & Wang, Xiaohua. (2006). Technical Principle and Application Example of RFID. Beijing: Posts & Tele
13、com Press. Dec. of 2006.</p><p><b> 附錄 B</b></p><p> Study on the Technology of the Coal Mining Safety Monitoring System</p><p> Zhi Chang, Zhangeng Sun & Junbao
14、Gu</p><p> School of Mechanical and Electronic Engineering, Tianjin Polytechnic University</p><p> Tianjin 300160, China</p><p> E-mail: changzhi2007.cool@163.com</p><
15、p><b> Abstract</b></p><p> New development and application of the wireless radio frequency make the application of the RFID (Radio Frequency Identification) technology become more and more e
16、xtensively, and combining the characteristics of RFID technology with the mine, we established an underground safety monitoring system with integrality, real-time and flexibility, which could automatically alarm when dan
17、gers happen and enhance the search and rescue efficiency. The system could manage the harm-gas concentration, plannin</p><p> Keywords: RFID, Safety monitoring system, E-tag, Reader-writer</p><p&
18、gt; Mining accidents often happened in China in recent years, and except for mine owners’ weak safety and legal consciousness, the lagged safety establishments and the imperfect managements of the mining personnel and e
19、quipments were the important causes. Through analyzing several extra serious accidents in the near period, following common problems generally existed (Qiu, 2007, P.28-29), (1) the information communication between the g
20、round personnel and the underground was not timely, (2) ground pe</p><p> The coal mining personnel and vehicle safety monitoring system proposed in the article can track, monitor and position the harmful g
21、ases, personnel and vehicles in the mine real time, and offer dynamic information about the mine laneway network, personal position, vehicle position, dangerous region and corresponding clews for ground personnel. If the
22、 accident happens, the system also can inquire about the personnel distribution, the personnel quantity, the personnel withdrawal line to offer scie</p><p> 1. Introduction of the RFID technology</p>
23、<p> RFID (Zhou, 2006 & Nadeem Raza, 1999) is a sort of non-contact automatic identification technology, and it can automatically identify the objective by the radio frequency signals, quickly track the goods
24、and exchange data. The identification work needs not human operation, and can work under various severe environments. RFID technology can identify high-speed objects and identify multiple tags simultaneously, and the ope
25、ration is quick and simple. RFID technology was generated in the Second Worl</p><p> 1.1 Composing of RFID system</p><p> RFID system (seen in Figure 1) is generally composed by E-tag, reader-
26、writer and computer communication network(Simson Garfinekel, 2005).</p><p> 1.1.1 E-tag</p><p> E-tag stores correlative information of the identified objects, and it is usually put on the ide
27、ntified objects, and the information stored by it can be read and written by the radio frequency reader-writer through the non-contact mode.</p><p> 1.1.2 Reader-writer</p><p> The reader-writ
28、er is the equipment which can be used to read and write the information of the E-tag by the radio frequency technology. The tag information read by the reader-writer can be managed and transmitted by the computer network
29、 system.</p><p> 1.1.3 Computer communication network</p><p> In the RFID system, the computer communication network is generally used to manage the data and complete the function of communica
30、tion transmission. The reader-writer can connect with the computer communication network by the standard interface to realize the communication and data transmission.</p><p> 1.2 Work principle of RFID syst
31、em</p><p> RFID technology is a sort of non-contact information transfer mode realized by the radio frequency signals through space coupling (alternating magnetic field or electromagnetic field), and it ide
32、ntifies the objective through the transferred information. Its work principle can be described as follows (Klaus Finkenzeller, 2003): reader-writer emits energy in one region, form the electromagnetic field, and the size
33、 of the region is decided by the work frequency and antenna size, and when the E-tag </p><p> 1.3 Technical characteristics of RFID</p><p> 1.3.1 Data read and write</p><p> RFID
34、 reader can read the data to the database without contact, and process multiple tags once, and write the logistic processing state into the tag for the logistic processing in the next stage.</p><p> 1.3.2 M
35、iniaturized and diverse form</p><p> RFID will not be limited by the size or form when it reads data, so it needs not to use the paper with fixed size or print quality to fit for the precision. In addition,
36、 E-tag of RFID can be applied in different products by small size, so we can more flexibly control the production of the products, especially the application on the production line.</p><p> 1.3.3 Anti-pollu
37、tion</p><p> RFID possesses strong anti-pollution nature for water, oil or drugs. And in the dark or polluted environment, RFID also can read data.</p><p> 1.3.4 Repetitive use</p><
38、p> Because RFID is electric data which can be written repetitively, so the tag can be used repetitively.</p><p> 1.3.5 Penetrability</p><p> If RFID is covered by the paper, wood, plastics
39、 or non-metal or non-transparent materials, it can communicate through these materials except for the irons or other metals.</p><p> 1.3.6 Big memory capacity of data</p><p> The data capacity
40、 will be extended with the development of the memory scale, and the quality of the material carried by the goods is larger, the requirement of the capacity for the volume label also increase, and RDID will not be restrai
41、ned.</p><p> 1.3.7 System safety</p><p> The system stores the data from the central computer to the work piece which will largely enhance the safety of the system.</p><p> 1.3.8
42、 Data safety</p><p> The checkout method or the cycle redundancy checkout method will be used to ensure the data veracity stored in the radio frequency tag.</p><p> 2. Total design and work pr
43、inciple of the monitoring system</p><p> 2.1 System design</p><p> Except for fulfilling the function requirements, the design project should fully consider the stability,reliability,anti-jamm
44、ing ability, fault-tolerance ability and abnormity protection, so the total design of the system should be embodied in following aspects.</p><p> (1) The design could effectively identify and monitor underg
45、round personnel, and realize the humanization,informationization and automatization.</p><p> (2) The design could effectively offer personnel’s passing in and out, attendance and monitoring and relative man
46、agement information, and once the accident happens, the design could ensure the normal implementation of the rescue.</p><p> (3) The design of the system could possess the natures of safety, maintenance and
47、 expansion.</p><p> (4) The design could effectively test the concentration of harmful gases and quickly react.</p><p> 2.2 System work principle</p><p> The underground station
48、equipment emits the encrypted information to the exterior by the antenna and forms certain signal emission region. The RFID cards carried by the workers will be activated when they enter into the emission region, and the
49、 information carried with the encrypted objective identification are emitted by the emission module, and the substation equipment will receive these signals and abstract the objective identification code, and transmit th
50、e code to the ground computer system</p><p> 3. Composing and structure of the system</p><p> The safety monitoring system includes the ground part and the underground part (seen in Figure 2).
51、</p><p> The products in the system adopt the sap hanging design (Tan, 2007) to ensure the normally and continually running of the system in the severe environment and offer power supply for 1~3 hours after
52、 power-down.</p><p> The underground part and the ground part adopt the RS-485 serial interface standard communication and the RS-232 standard serial interaction to connect with the transmission network. Th
53、e data conversion interface is mainly composed by the power supply board, signal conversion board and safety bolt, and it is placed on the mouth of the mine, and it is mainly used to ensure the information exchange betwe
54、en the underground monitoring points and the ground monitoring center, so the system needs not </p><p> 3.1 Underground part</p><p> The underground part is the core part of the monitoring sys
55、tem, and it includes the fieldbus and a series of substations which are used to monitor and control the personnel. The fieldbus is the network which connects the substation and transmits information. Some substations are
56、 used to position the underground workers and equipments real time. The positioning mode of the personnel and equipments is the signal strength monitoring method, and when the E-tag carried by one worker is near certain
57、p</p><p> 3.2 Ground part</p><p> The ground part mainly includes the management operation system, and it is the base of the whole safety monitoring system, and its main functions are to compl
58、ete the information acquirement, real-time processing and storage of the check point. The information from the underground include not only the concentration of the harmful gases, but the information about the undergroun
59、d personnel and equipment, and these large-size data are all stored in the database through compression as the base of the</p><p> 4. Conclusions</p><p> In this article, we applied the RFID t
60、echnology in the coal mining management, and established an underground safety monitoring system with integrality, real-time and flexibility, which could automatically alarm when dangers happened and enhanced the search
61、and rescue efficiency. The system could manage the harm-gas concentration, planning arrangement of workers, access control for the works passing in and out laneway, distribution of laneway personnel and workers’ data, re
62、alize the informationi</p><p> The safety monitoring system is based on the safe production of the mine, and the module of RFID is the major equipment, and the wire communication network is the ligament, an
63、d the monitoring central PC computer is the central computer management system. The system could improve the safety mechanism for the miners and reduce the cost of the management, and the technology will be the new trend
64、 of the mining safe production monitoring.</p><p> References</p><p> Guo, Yanli. (2005). Mine Application Example of South Africa Mining Industry. Automatic Identification Technology & Ap
65、plication. No. 5.</p><p> Klaus Finkenzeller. (2003). RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification (second Edition). John wiley & Sons, 2003.</p><
66、;p> Liu, Lili & Yao, Meng. (2004). Coal Mine Security Intelligent Control System Based on RFID. Global Electronics China. No.9. P.22-25.</p><p> Nadeem Raza, Viv Bradshaw, Matthew Hague, et al. (199
67、9). Application of Technology. The Institution of Electrical Engineer, 1999.</p><p> Qiu, Like. (2007). The Principle of Staff Positioning System for Those Working in Underground Coalmine and Its Applicatio
68、n in Xinglongzhuang Coalmine. Coal Mine Modernization. No.1. P.28-29.</p><p> Simson Garfinekel, Beth Rosenberg. (2005). RFID, Applications, Security and Privacy. Addison-wesley, 2005.</p><p>
69、 Tan, Min & Liu, Yu. (2007). RFID Technical System Engineering and Application Directory. Beijing: China Machine Press. April of 2007.</p><p> Zhou, Xiaoguang & Wang, Xiaohua. (2006). Technical Prin
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 煤礦安全監(jiān)控系統(tǒng)外文翻譯
- 煤礦安全管理要素探討外文文獻(xiàn)翻譯
- 基于wsn的煤礦安全監(jiān)控系統(tǒng)的研究外文翻譯
- 煤礦安全監(jiān)控系統(tǒng)記錄-全
- 煤礦安全監(jiān)控聯(lián)網(wǎng)方案
- 煤礦安全監(jiān)控—實(shí)習(xí)報(bào)告
- 煤礦安全監(jiān)控各種表格
- 煤礦安全監(jiān)控系統(tǒng)的信息集成研究.pdf
- 安全監(jiān)控系統(tǒng)在煤礦安全生產(chǎn)中的作用
- 煤礦安全規(guī)程
- 煤礦安全監(jiān)測(cè)監(jiān)控系統(tǒng)畢業(yè)設(shè)計(jì)
- 煤礦安全監(jiān)控系統(tǒng)升級(jí)改造方案
- 環(huán)形網(wǎng)絡(luò)煤礦安全監(jiān)控系統(tǒng)設(shè)計(jì).pdf
- 煤礦安全技術(shù)審批制度
- 煤礦安全監(jiān)測(cè)監(jiān)控系統(tǒng)畢業(yè)設(shè)計(jì)
- 煤礦安全監(jiān)測(cè)監(jiān)控系統(tǒng)設(shè)計(jì)方案
- 煤礦安全監(jiān)測(cè)監(jiān)控系統(tǒng)操作規(guī)程
- 煤礦安全監(jiān)控系統(tǒng)安裝竣工驗(yàn)收資料
- 煤礦安全倫理研究
- 煤礦安全規(guī)程專家解讀--通風(fēng)安全監(jiān)控
評(píng)論
0/150
提交評(píng)論