RFID attendance monitoring system for mine personnel
[ad_1]
1. System overview
In recent years, the number of high gas mines has been increasing. How to strengthen safe production and improve the efficiency of search and rescue work has been put in front of the competent authorities and leaders at all levels of the country. With the country’s increasing emphasis on coal mine safety and the continuous strengthening of supervision, large and medium-sized coal mines and the vast number of small and medium-sized coal mines in my country have been equipped with coal mine safety production monitoring systems. The promotion and application of these safety equipment has greatly improved the safety production status of coal mines in my country. However, there are still general difficulties in the management of personnel entering the mine underground.
RFIDThe personnel attendance monitoring system adopts passive identification cards and applies information automatic identification technology to conduct real-time attendance, tracking and positioning, and management of coal mine personnel. It can grasp the detailed information, attendance, work area, and movement trajectory of underground personnel in real time. Non-contact identification and tracking display of the moving target in the tunnel, and drawing the person’s whereabouts route, while displaying on the ground host, can be remotely transmitted to the data center of the superior management department. This system can correctly handle the relationship between safety and production, safety and efficiency, and improve the accuracy, real-time, and rapid performance of coal mine safety monitoring functions by staff. It can effectively manage miners and ensure the efficient operation of emergency rescue and safety rescue.
2. System principle and structure
Install radio frequency antennas and underground sub-stations in the passages through which personnel enter the well and the tunnels that need to be monitored. When the personnel pass the radio frequency antenna, the passive identification card encapsulated in the mine cap induces the magnetic field energy of the radio frequency antenna and emits a unique ID number in the world. At the same time, the personal information stored by itself is immediately uploaded to the radio frequency antenna. The radio frequency antenna sends the read information to the underground substation through the data transmission cable, and the underground substation will receive the employee information corresponding to the passive identification card and the time of detection. It is stored in the data storage. When the server of the monitoring center is to be inspected, it is uploaded to the server of the monitoring center through the data transmission interface for display and query.
Figure 1 System diagram
Figure 2 System structure diagram
Three, system design process
This system follows the principle of “unified card issuance, unified equipment, and unified management”, and implements the “one person, one card” system for personnel and teams permitted on duty. The identification card can be regarded as an “entry permit” or a “tunnel access permit”. The specific plan is:
(1) Coal production units install underground substation equipment at the intersection of underground tunnels and work surfaces.
(2) The coal mine production unit issues and equips identification cards to the underground workers.
(3) The system database records the basic information of the person corresponding to the identification card, including name, age, gender, class
Basic information such as group, type of work, position, personal photo, validity period, etc.
(4) The identification card becomes effective after the production unit authorizes it.The scope of authorization includes: tunnels or tunnels that the employee can enter
Operating surface.In order to prevent irrelevant and illegal persons from entering the tunnel or work surface, the system sets the card to allow access to the tunnel or work surface.
Time management module and card invalidation, report loss, etc.
(5) Workers entering the tunnel must carry identification cards with them. When the cardholders pass the location where the identification system is set up, they will be recognized by the system. The system will read the card number information. The time and other data are transmitted to the ground monitoring center for data management; if the collected card number is invalid or enters a restricted channel, the system will automatically alarm, and the personnel on duty in the monitoring center receive the alarm signal and immediately execute the relevant safety work management procedures.
(6) Once a safety accident occurs in the tunnel, the monitoring center can know the basic situation of the trapped person in the first time, which is convenient for the development of accident rescue work.
(7) The system can automatically generate report data on the statistics and management of attendance operations to improve management efficiency.
Figure 3 Data processing flow
Four, system function
4.1 Attendance function
It can count the names, time, position, quantity, etc. of the personnel entering the well in real time, and timely count the number of shifts, shifts, late arrivals, and early leave information of the personnel of each unit; perform statistics, query, summary, generate reports, prints, etc. on the attendance data.
4.2 Tracking function
Downhole personnel real-time dynamic tracking, position display, running track playback, real-time dynamic query of the distribution of underground personnel in a certain area at a certain time.
4.3 Alarm function
The system can automatically display and alarm for the number of people entering the well exceeding the plan, entering the restricted area, overtime of the well rise and system failure.
4.4 Ambulance search
Can provide location information to facilitate timely rescue.
4.5 Networking function
The system has a powerful networking function. According to user needs, the monitoring center and various mine-level systems can be networked in a local area network, so that all networked mine-level systems can share attendance tracking data within the scope of use rights, which is convenient for remote query and management .
4.6 Extended functions
The system provides a powerful expansion space, and can expand the vehicle management system and the access control recognition and attendance system according to the needs.
Figure 4 Schematic diagram of network structure
Figure 5 Schematic diagram of positioning and monitoring of underground personnel
[ad_2]