煤矿安全专业外文文献(中英文对照)_第1页
煤矿安全专业外文文献(中英文对照)_第2页
煤矿安全专业外文文献(中英文对照)_第3页
煤矿安全专业外文文献(中英文对照)_第4页
煤矿安全专业外文文献(中英文对照)_第5页
已阅读5页,还剩7页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、精选优质文档-倾情为你奉上关于煤矿安全监控系统技术的研究无线射频的新的发展和运用使得RFID(射频识别)技术的应用越来越广泛。同时结合矿山与RFID技术的特点,我们建立了一个地下的安全完整的、实时灵活的监测系统。这套系统能在发生危险时自动报警并且提高搜索和救援的效率。该系统可以管理危害气体的浓度、规划工人的安排、进出巷道通过工作的访问控制、巷道人员的分布和工人的资料,实现地下管理的信息化和可视化,提高矿业生产管理水平和矿井安全生产水平。关键词:射频识别,安全监控系统,电子标签,读写器煤矿事故往往发生在中国近几年,除了矿业主的安全和法律意识薄弱,滞后的安全机构和采矿的人员和设备的不完善管理人员是

2、重要原因。通过分析近期内一些十分严重的事故,一般存在以下常见问题:(1)地面人员和地下人员之间的信息沟通不及时;(2)地面人员不能动态地掌握井下人员的分布和操作情况,并且不能掌握地下人员的确切位置;(3)一旦煤矿事故发生,救援效率低,效果较差。因此,准确、迅速实施煤矿安全监控职能非常重要和紧迫,有效管理矿工,并确保救援高效率的运作。 文章中提出的煤炭采矿人员和车辆安全监测系统可以跟踪、监视和定位在矿井实时的有害气体,人员和车辆以及提供有关网络的矿井巷道,个人的定位,车辆的位置,危险区域的动态信息和地面人员相应线索。如果发生意外,该系统还可以查询有关人员的分配,人员数量,人员撤离路线,以提供从事

3、故救援监视计算机科学依据。同时,管理人员可以利用系统的日常考勤功能实施矿工考勤管理。 一、RFID技术简介 射频识别是一种非接触式自动识别技术进行排序,可以自动识别的无线电频率信号的目标,迅速跟踪货物和交换数据。身份查验工作无须人工操作,并能在各种严峻的环境下工作。RFID技术可识别高速对象和多个标签同时识别,操作简单快捷。RFID技术是产生于第二次世界大战,它是在继承传统的编码技术,其主要的核心部分是电子标签,识别系统可以读取电子标签存储通过无线电波的资料排放的读者从几厘米到数米的作家,并确定货物的身份,人民和电子标签代表的对象。1.1 RFID的系统组成 射频识别系统(见图1)通常由电子标

4、签,读写器和计算机通讯网络组成。1.1.1电子标签 电子标签存储相关信息确定的对象,它通常是在确定的目标付诸表决,并通过它储存的信息可以读取和射频读写器写入通过非接触模式。1.1.2读写器 读写器是一个可以用来读取和写入射频技术的电子标签信息的设备。标签上的信息的读写器读取都可以处理,由计算机网络系统传输。1.1.3计算机通信网络 在RFID系统,计算机通信网络一般是用来管理数据和完整的通信传输功能。该读写器可以通过连接标准接口的计算机通信网络,实现通讯和数据传输。1.2 RFID的工作原理系统 RFID技术是一种非接触式信息传递的通过空间耦合交变磁场或电磁场(射频信号实现方式排序),并通过传

5、输的信息确定的目标。它的工作原理可描述如下:在一个区域读写器发出的能量,形成电磁场,以及区域的大小取决于工作频率和天线尺寸,当电子标签通过此区域,系统检查了读写器和存储电磁波由读写器发出的信号能量是由标记电能需要,和标记的内部信息传递给读者,作家的对无线电波的形式,读者,作家接受了电子标签的数据,编码并实施故障检查判断数据的有效性,并传送数据,为数据处理计算机通信网络。标签进入磁场后,接收解读器发出的射频信号,凭借感应电流所获得的能量发送出存储在芯片中的产品信息(Passive Tag,无源标签或被动标签),或者主动发送某一频率的信号(Active Tag,有源标签或主动标签);解读器读取信息

6、并解码后,送至中央信息系统进行有关数据处理。一套完整的RFID系统, 是由阅读器(Reader)与电子标签(TAG)也就是所谓的应答器(Transponder)及应用软件系统三个部份所组成, 其工作原理是Reader发射一特定频率的无线电波能量给Transponder, 用以驱动 Transponder电路将内部的数据送出,此时 Reader便依序接收解读数据, 送给应用程序做相应的处理。以RFID卡片阅读器及电子标签之间的通讯及能量感应方式来看大致上可以分成, 感应偶合(Inductive Coupling) 及后向散射偶合(Backscatter Coupling)两种, 一般低频的RFI

7、D大都采用第一种式, 而较高频大多采用第二种方式。阅读器根据使用的结构和技术不同可以是读或读/写装置,是RFID系统信息控制和处理中心。阅读器通常由耦合模块、收发模块、控制模块和接口单元组成。阅读器和应答器之间一般采用半双工通信方式进行信息交换,同时阅读器通过耦合给无源应答器提供能量和时序。 在实际应用中,可进一步通过Ethernet或WLAN等实现对物体识别信息的采集、处理及远程传送等管理功能。应答器是RFID系统的信息载体,目前应答器大多是由耦合原件(线圈、微带天线等)和微芯片组成无源单元。1.3 RFID的技术特点1.3.1数据读取和写入 RFID读取器可以读取数据到数据库中没有接触,一

8、旦和处理多个标签,并写入了下一阶段物流处理标签的物流处理的状态。1.3.2小型化和多样化的形式 RFID将不会受到大小或形式时,它读取数据有限,因此无须使用固定大小的文件或打印质量以适应精度。此外,电子标签的RFID可以应用在不同产品体积小,所以我们可以更灵活地控制生产线产品的生产,特别是应用程序。1.3.3反污染 RFID技术具有强大的抗水,污染性质,石油或毒品。而在黑暗或污染环境,RFID还可以读取数据。1.3.4重复使用 由于RFID是电子数据,可重复写入,所以标签可以重复使用。1.3.5渗透性 如果RFID是由纸张,木材,塑料或非金属或非透明材料覆盖,它可以进行交流,除了为这些铁杆或其

9、他金属材料。1.3.6数据存储容量大 数据容量将扩大与记忆力的开发,以及由所运货物的材料质量越大,该卷的容量的要求,标签也增加,RDID不会受到限制。1.3.7系统安全 该系统由中央计算机存储的数据,工件将在很大程度上提高系统的安全。1.3.8数据安全 结帐方式或循环冗余校验方法将被用于确保数据的准确性在无线电频率标签储存。二、总的设计和工作原理监测系统2.1系统设计 除履行的功能需求,设计项目应充分考虑稳定性,可靠性,抗干扰能力,容错能力和异常保护,因此该系统的总设计应体现在以下几个方面。(1)设计可以有效地识别和监测地下人员,实现人性化,信息化和自动化。(2)设计可以有效地提供人员的传递和

10、输出,出勤和监测及相关管理信息,一旦事故发生,设计可确保救援的正常实施。(3)该系统的设计可具有本质安全,维护和扩展。(4)设计可以有效地测试了有害气体的浓度,并迅速作出反应。2.2系统工作原理 地铁站设备发射的加密信息到外部的天线,形成一定的信号发射区。这种RFID卡由工人将被激活时,将进入发射区,并与目标识别加密携带的信息是由发射模块发射和变电站设备将接收这些信号,抽象的目标识别代码,发送代码到地面计算机系统完成系统的功能。当有害气体的浓度达到一定值时,对变电站设备的气体传感器的信息传输到A / D转换器,转换后的信息,他们传送到监测网络,实现了测试和监测。三、该系统的组成和结构 安全监测

11、系统包括地面部分和地下部分(见图2)。 该系统采用了SAP的产品挂设计,以确保为13小时后正常,在不断的恶劣环境并提供电源系统运行断电。 地下部分和地上部分采用了RS - 485串行接口标准的通信与RS - 232标准的串行交互连接与传输网络。数据转换接口,主要是由组成的电源板,信号转换板和安全螺栓,它是在矿井口的人选,而主要是用来确保监测点之间的地下和地面监测信息交流中心,因此系统并不需要RFID技术和A / D转换器。图3是与地面和地下的通信信号交流。3.1地下部分 地下部分是监测系统的核心部分,它包括现场总线和一组用于监测和控制人员变电站系列。现场总线是变电站网络的连接和传递信息。一些变

12、电站是用于定位的地下工作者和设备的实时性。人事定位模式和设备是信号强度监测方法,当电子标签由一个工人站附近进行一定的定位是,通过该站获得的信号是强烈的,所以我们可以判断标签的位置,而当电子标签中的两站叠加区域,两站的信号强度会有所不同,我们可以通过比较判断信号的强度,标记的位置。其他变电站主要组成由传感器,A / D转换器,微控制器和RFID模块,它们可以监视有害气体的实时性和获取信息的传输,当有害气体浓度超过安全值,在当地的工作平台和地下固定监测点同时发出警报。在地下部分变电站采用有线通信,串行接口与RS - 232串行数据接口标准,传输总线和串行接口是为将来扩展系统的功能使用。3.2地面部

13、分 地面部分主要包括管理运作体系,它是整个安全监测系统的基础,其主要职能是完成信息获取,实时处理和检查点存储。从地下不仅包括对有害气体的浓度,但对地下的人员和设备的信息,而这些大尺寸的数据都存储在数据库中通过诸如监测和控制基地的压缩信息。四、结论 在这篇文章中,我们应用在煤炭开采管理的RFID技术,并设立了一个地下的安全与完整性监测系统,实时性和灵活性,这可能发生危险时自动报警,提高了搜索和救援效率。该系统可以管理的危害气体浓度,规划安排的工人,为进出巷道工程通过访问控制,巷道支护人员和工人的数据分布,实现信息化和可视化管理的地下,并在很大程度上提高采矿生产管理水平和矿井安全生产水平。安全监测

14、系统是基于对煤矿安全生产,以及RFID模块是主要的设备,以及有线通信网络是韧带,以及监测中心PC计算机为中心的计算机管理系统。该系统可以改善矿工的安全机制,降低管理成本,该技术将是采矿安全生产监管的新趋势。参考资料Guo, Yanli. (2005). Mine Application Example of South Africa Mining Industry. Automatic Identification Technology & Application. No. 5.Klaus Finkenzeller. (2003). RFID Handbook: Fundamental

15、s and Applications in Contactless Smart Cards and Identification (second Edition). John wiley & Sons, 2003.Liu, Lili & Yao, Meng. (2004). Coal Mine Security Intelligent Control System Based on RFID. Global Electronics China. No.9. P.22-25.Nadeem Raza, Viv Bradshaw, Matthew Hague, et al. (199

16、9). Application of Technology. The Institution of Electrical Engineer, 1999.Qiu, Like. (2007). The Principle of Staff Positioning System for Those Working in Underground Coalmine and Its Application in Xinglongzhuang Coalmine. Coal Mine Modernization. No.1. P.28-29.Simson Garfinekel, Beth Rosenberg.

17、 (2005). RFID, Applications, Security and Privacy. Addison-wesley, 2005.Tan, Min & Liu, Yu. (2007). RFID Technical System Engineering and Application Directory. Beijing: China Machine Press. April of 2007.Zhou, Xiaoguang & Wang, Xiaohua. (2006). Technical Principle and Application Example of

18、 RFID. Beijing: Posts & Telecom Press. Dec. of 2006.附录 BStudy on the Technology of the Coal Mining Safety Monitoring SystemZhi Chang, Zhangeng Sun & Junbao GuSchool of Mechanical and Electronic Engineering, Tianjin Polytechnic UniversityTianjin , ChinaE-mail: changzhi2007.coolAbstractNew dev

19、elopment and application of the wireless radio frequency make the application of the RFID (Radio Frequency Identification) technology become more and more extensively, and combining the characteristics of RFID technology with the mine, we established an underground safety monitoring system with inte

20、grality, real-time and flexibility, which could automatically alarm when dangers happen and enhance the search and rescue efficiency. The system could manage the harm-gas concentration, planning arrangement of workers, access control for the works passing in and out laneway, distribution of laneway

21、personnel and workers data, realize the informationization and visualization of the underground management, and enhance the mining production management level and the work safety level of the mine.Keywords: RFID, Safety monitoring system, E-tag, Reader-writerMining accidents often happened in China

22、in recent years, and except for mine owners weak safety and legal consciousness, the lagged safety establishments and the imperfect managements of the mining personnel and equipments were the important causes. Through analyzing several extra serious accidents in the near period, following common pro

23、blems generally existed (Qiu, 2007, P.28-29), (1) the information communication between the ground personnel and the underground was not timely, (2) ground personnel could not dynamically grasp the underground personnels distribution and operation situation, and could not exactly position undergroun

24、d personnel, (3) once the mine accident happened, the efficiency of rescue was low, and the effect was worse. Therefore, it is very important and urgent to exactly and quickly carry out the coal mining safety monitoring function (Liu, 2004, P.22-25 & Guo, 2005), effectively manage the miners, an

25、d ensure the high-efficiency operation of the rescue.The coal mining personnel and vehicle safety monitoring system proposed in the article can track, monitor and position the harmful gases, personnel and vehicles in the mine real time, and offer dynamic information about the mine laneway network, p

26、ersonal position, vehicle position, dangerous region and corresponding clews for ground personnel. If the accident happens, the system also can inquire about the personnel distribution, the personnel quantity, the personnel withdrawal line to offer scientific references for the accident rescue from

27、the monitoring computer. At the same time, the mangers can utilize the daily attendance function in the system to implement attendance management for miners.1. Introduction of the RFID technologyRFID (Zhou, 2006 & Nadeem Raza, 1999) is a sort of non-contact automatic identification technology, a

28、nd it can automatically identify the objective by the radio frequency signals, quickly track the goods and exchange data. The identification work needs not human operation, and can work under various severe environments. RFID technology can identify high-speed objects and identify multiple tags simu

29、ltaneously, and the operation is quick and simple. RFID technology was generated in the Second World War, and it is the successor of the traditional code technology, and its major core part is the E-tag, and the identification system could read the information stored in the E-tag through the radio w

30、aves emitted by the reader-writer from a few centimeters to a few meters, and identify the identity of the goods, people and objects represented by the E-tag.1.1 Composing of RFID systemRFID system (seen in Figure 1) is generally composed by E-tag, reader-writer and computer communication network(Si

31、mson Garfinekel, 2005).1.1.1 E-tagE-tag stores correlative information of the identified objects, and it is usually put on the identified objects, and the information stored by it can be read and written by the radio frequency reader-writer through the non-contact mode.1.1.2 Reader-writerThe reader-

32、writer is the equipment which can be used to read and write the information of the E-tag by the radio frequency technology. The tag information read by the reader-writer can be managed and transmitted by the computer network system.1.1.3 Computer communication networkIn the RFID system, the computer

33、 communication network is generally used to manage the data and complete the function of communication transmission. The reader-writer can connect with the computer communication network by the standard interface to realize the communication and data transmission.1.2 Work principle of RFID systemRFI

34、D technology is a sort of non-contact information transfer mode realized by the radio frequency signals through space coupling (alternating magnetic field or electromagnetic field), and it identifies the objective through the transferred information. Its work principle can be described as follows (K

35、laus Finkenzeller, 2003): reader-writer emits energy in one region, form the electromagnetic field, and the size of the region is decided by the work frequency and antenna size, and when the E-tag passes this region, the system checks the signal of the reader-writer and stores the electromagnetic wa

36、ve energies emitted by the reader-writer to be the electric energy needed by the tag, and the tag transmits the interior information to the reader-writer by the form of the radio wave, and the reader-writer accepts the data of the E-tag, encodes and implement fault check to judge the validity of the

37、 data, and transfers the data to the computer communication network for the data processing.1.3 Technical characteristics of RFID1.3.1 Data read and writeRFID reader can read the data to the database without contact, and process multiple tags once, and write the logistic processing state into the ta

38、g for the logistic processing in the next stage.1.3.2 Miniaturized and diverse formRFID will not be limited by the size or form when it reads data, so it needs not to use the paper with fixed size or print quality to fit for the precision. In addition, E-tag of RFID can be applied in different produ

39、cts by small size, so we can more flexibly control the production of the products, especially the application on the production line.1.3.3 Anti-pollutionRFID possesses strong anti-pollution nature for water, oil or drugs. And in the dark or polluted environment, RFID also can read data.1.3.4 Repetit

40、ive useBecause RFID is electric data which can be written repetitively, so the tag can be used repetitively.1.3.5 PenetrabilityIf RFID is covered by the paper, wood, plastics or non-metal or non-transparent materials, it can communicate through these materials except for the irons or other metals.1.

41、3.6 Big memory capacity of dataThe data capacity will be extended with the development of the memory scale, and the quality of the material carried by the goods is larger, the requirement of the capacity for the volume label also increase, and RDID will not be restrained.1.3.7 System safetyThe syste

42、m stores the data from the central computer to the work piece which will largely enhance the safety of the system.1.3.8 Data safetyThe checkout method or the cycle redundancy checkout method will be used to ensure the data veracity stored in the radio frequency tag.2. Total design and work principle

43、 of the monitoring system2.1 System designExcept for fulfilling the function requirements, the design project should fully consider the stability,reliability,anti-jamming ability, fault-tolerance ability and abnormity protection, so the total design of the system should be embodied in following aspe

44、cts.(1) The design could effectively identify and monitor underground personnel, and realize the humanization,informationization and automatization.(2) The design could effectively offer personnels passing in and out, attendance and monitoring and relative management information, and once the accide

45、nt happens, the design could ensure the normal implementation of the rescue.(3) The design of the system could possess the natures of safety, maintenance and expansion.(4) The design could effectively test the concentration of harmful gases and quickly react.2.2 System work principleThe underground

46、station equipment emits the encrypted information to the exterior by the antenna and forms certain signal emission region. The RFID cards carried by the workers will be activated when they enter into the emission region, and the information carried with the encrypted objective identification are emi

47、tted by the emission module, and the substation equipment will receive these signals and abstract the objective identification code, and transmit the code to the ground computer system to complete the function of the system. When the concentration of the harmful gases achieves certain value, the gas

48、 sensor of the substation equipment transmits the information to the A/D converter, and after the information are converted, they are transmitted to the monitoring network to realize the test and monitoring.3. Composing and structure of the systemThe safety monitoring system includes the ground part

49、 and the underground part (seen in Figure 2).The products in the system adopt the sap hanging design (Tan, 2007) to ensure the normally and continually running of the system in the severe environment and offer power supply for 13 hours after power-down.The underground part and the ground part adopt

50、the RS-485 serial interface standard communication and the RS-232 standard serial interaction to connect with the transmission network. The data conversion interface is mainly composed by the power supply board, signal conversion board and safety bolt, and it is placed on the mouth of the mine, and

51、it is mainly used to ensure the information exchange between the underground monitoring points and the ground monitoring center, so the system needs not the RFID and A/D converter. Figure 3 is the exchange of the communication signals between the ground and the underground.3.1 Underground partThe un

52、derground part is the core part of the monitoring system, and it includes the fieldbus and a series of substations which are used to monitor and control the personnel. The fieldbus is the network which connects the substation and transmits information. Some substations are used to position the under

53、ground workers and equipments real time. The positioning mode of the personnel and equipments is the signal strength monitoring method, and when the E-tag carried by one worker is near certain positioning station, the signals acquired by the station are strong, so we can judge the position of the ta

54、g, and when the E-tag is in the superposition region of two stations, the signal strengths of two station will be different, and we can judge the position of the tag by comparing the strengths of the signals. Other substations are mainly composed by sensor, A/D converter, micro-controller and RFID m

55、odule, and they can monitor the harmful gases real time and acquire the transmission of the information, and when the concentration of the harmful gases exceeds the safety value, the ground work platform and the underground fixed monitor point emit the alarm simultaneously. The substation in the und

56、erground part adopts the wire communication, the serial interface and the RS-232 serial data interface standard, and the bus transmission and the serial interface are used for the future expansion of the system function.3.2 Ground partThe ground part mainly includes the management operation system,

57、and it is the base of the whole safety monitoring system, and its main functions are to complete the information acquirement, real-time processing and storage of the check point. The information from the underground include not only the concentration of the harmful gases, but the information about t

58、he underground personnel and equipment, and these large-size data are all stored in the database through compression as the base of the monitoring and controlling.4. ConclusionsIn this article, we applied the RFID technology in the coal mining management, and established an underground safety monitoring system with integrality, real-time and flexibility, which could automatically alarm when dangers happened and enhanced the search and rescue efficiency. The system could manag

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论