Application of RFID technology in coal mine safety

2022-10-18
  • Detail

The application of RFID technology in coal mine safety production management

when analyzing the recent catastrophic accidents in several coal mines, several common problems were found: the information communication between ground and underground personnel was not timely; It is difficult for ground personnel to dynamically grasp the distribution and operation of underground personnel in time and accurately locate personnel; Once a coal mine accident occurs, the efficiency of rescue and relief and safety rescue is low, and the search and rescue effect is poor. Therefore, how to correctly deal with the relationship between safety and production, safety and benefit, how to accurately, real-time and quickly perform the function of coal mine safety monitoring, effectively manage miners, and ensure the efficient operation of emergency rescue and disaster relief, safety rescue. The drop hammer impact tester has a compact structure, which is particularly important and urgent. Facing the new situation, new opportunities and new challenges, higher requirements and expectations are put forward for work safety. Therefore, improving the information management level of work safety and strengthening the long-term mechanism of work safety with disaster prevention and efficient search and rescue as the main objectives are the only way for work safety in China

rf ID technology is a new automatic identification technology that directly inherits the principle of radar and develops from it. The use of reflected power for communication lays the theoretical foundation of RFID. RFID standardization has been paid more and more attention. The variety of RFID products is richer, and the scale application industry is expanding. In particular, the use of Wal Mart and the U.S. military has greatly promoted the research and application of RFID. In South Africa, RFID technology has been successfully used in mine management, and has successfully solved the problems of mine management such as mine attendance, theft prevention and safety. In China, the combination of mining area management and computer is mainly limited to the above well part, including daily enterprise process management, accounting management and transportation management. The underground management of coal mines still takes experience management as the core. With the development of informatization and networking in the coal industry, most coal mining enterprises basically adopt a variety of coal mine management systems in the actual process of production. The successful development of the first 9-meter super large aluminum alloy integral ring for a new carrier rocket developed by Southwest Aluminum and Tianjin special steel precision forging Co., Ltd. has played an important role in practical application. With the introduction of RF ID technology, domestic coal mines also began to use RFID technology for management. Such as Xishan Mining Bureau and Datong Mining Bureau

2 basic composition and working principle

rf ID technology is a non-contact automatic identification technology. Its basic principle is to use the RF signal and spatial coupling transmission characteristics to realize the automatic identification of the identified object. The system is generally composed of three parts, namely electronic tag, reader and application interface. The spatial coupling of RF signals is realized between the electronic tag and the reader through the coupling element. In the coupling channel, the energy transmission and data exchange are realized according to the time sequence relationship

in the working process of RF ID system, data exchange is always based on energy and realized through a certain time sequence. The reader provides working energy to the electronic tag. When the electronic tag enters the RFID field, the RF wave emitted by the reader activates the tag circuit to interact and complete the data exchange. For simultaneous reading of multiple tags, it can be in the form of reader first issue or tag first issue. In order to realize the simultaneous reading of multiple tags without conflict, for the reader first sending method, the reader first sends an isolation command to a batch of tags, so that multiple electronic tags within the reader's reading range are isolated, and finally only one tag is kept in the active state to establish a conflict free communication with the reader. After the end of communication, command the tag to enter the body sleep, and specify a new tag to execute the conflict free communication command. Repeat this to read multiple labels at the same time. As for the first issue method of tags, tags were officially introduced at the beginning of this year. They randomly send their own identification ID repeatedly. Different tags can be correctly read by readers in different periods of time to complete the simultaneous reading of multiple tags. For any electronic tag, it has a unique ID number, which cannot be changed for a tag. In most applications, the data attributes of tags are supported by using the background database, which is easy to identify. Generally, the recognition system composed of electronic tags and readers serves the application, and the requirements of the application are diverse and different. The interface between reader and application system is represented by standard functions called by development tools. The functions roughly include the following aspects. The application system sends configuration commands and other instructions to the reader as required. The reader returns its current configuration status and the execution results of various instructions to the application system

Copyright © 2011 JIN SHI