RFID mine personnel positioning and attendance management solutions

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

 1. System overview

Due to the peculiarities of mine production, natural disasters such as water, fire, gas, coal dust, roof and other natural disasters threaten the lives of mine workers at all times, and major mine disasters and casualties may occur at any time. At present, it is generally difficult to manage personnel entering the mine underground, and it is difficult to grasp the dynamic distribution and operation of underground personnel in a timely manner. Once an accident occurs, there is a lack of reliable information for the rescue of underground personnel, and the efficiency of emergency rescue and safety rescue is low. Therefore, the mining industry urgently needs a tracking and positioning management system for underground personnel to grasp the location and activity trajectory of each person in the underground in real time, which will have a positive effect on the safety of mine production and reduce casualties to a certain extent. At the same time, the uploaded location information can also be used as staff attendance records. When we analyzed some major accidents in mines, we found that:

1) The information communication between the ground and underground personnel is not timely;

2) It is difficult for surface personnel to dynamically grasp the distribution and operation of underground personnel in time, and it is difficult to accurately locate personnel;

3) Once a mine accident occurs, the efficiency of emergency rescue and safety rescue is low, and the search and rescue effect is poor.

4) Failure to accurately grasp the presence of safety supervisors.

The underground mine personnel positioning attendance and management system is based on the integration of the existing more advanced mine monitoring facilities, tracking, positioning, attendance and two-way communication for underground personnel, so as to realize the safety production management function of the underground personnel. This system is supported by the main computer of the mine ground monitoring center under the support of server software, through the transmission interface and the wired transmission system of the roadway laying, the data inspection and signal acquisition of the underground communication base station are carried out regularly. After the software data processing, the underground personnel ( The dynamic distribution (including locomotives and other moving targets) can be reflected in real-time in the monitoring center on the well, so as to achieve the purpose of real-time monitoring and two-way communication management of the personnel in the well. The underground personnel positioning system can reflect the personnel situation to the underground roadway map through the electronic map.


RFID mine personnel positioning and attendance management solutions

 2. System principle

The underground personnel location tracking management and attendance management system is supported by the main computer of the ground monitoring center under the support of the system software, through the data transmission interface and the communication light/cable laid along the roadway, the wireless data collector is installed in the underground without interruption and in real time. For data information collection, the wireless data collector will automatically collect the information of the identification card within the effective recognition distance, and transmit the relevant data to the ground center station through the transmission network without interruption and instant. After data information is analyzed and processed, the dynamic distribution of downhole personnel (or moving targets such as locomotives) can be reflected in real-time on the main computer interface, so as to achieve the purpose of digital management of downhole safety status on the well.

According to mine monitoring requirements, wireless data collectors are installed in underground tunnels, tunnels, working surfaces and other locations, and they are connected to each other as underground high-speed industrial Ethernet through cable/fiber data transmission interfaces to form a complete communication line.

After the mine production unit enters the relevant information of the staff, the staff in the downhole will issue and equip the identification card.

The system database records the basic information of the person corresponding to the identification card, including basic information such as name, age, gender, team, type of work, position, photo, and validity period.

Workers entering the tunnel must carry identification cards with them, and the cardholders will be recognized by the system when they pass the location where the identification system is set up.The system will read the card number information, and send the cardholder’s road section, time and other information through the system transmission network

Workers entering the tunnel must carry identification cards with them, and the cardholders will be recognized by the system when they pass the location where the identification system is set up. The system will read the card number information, and transmit the road section, time and other information passed by the cardholder to the ground monitoring center through the system transmission network for data management. At the same time, a prompt message will appear on the large geographic information screen to show the passing personnel. ‘S name. If the detected wireless identification card number is invalid or enters a restricted channel, the system will automatically alarm, and the security monitoring center staff on duty receives the alarm signal and immediately executes the relevant safety work management procedures.

The production unit can authorize the management of the identification card according to the production plan. The scope of authorization includes: tunnels or work surfaces that the employee can enter. In order to prevent irrelevant and illegal persons from entering the tunnel or work surface, the system is equipped with a time management module for access to the tunnel or work surface of the card, as well as card failure and loss reporting.

Once a safety accident occurs in the tunnel, the monitoring center can know the basic situation of the trapped person in the first time. The rescue team uses a mobile long-distance identification device to facilitate the detection of the location of the person in distress within a range of 80 meters, which is convenient for safety Efficient ambulance and rescue work) The safe and efficient operation of ambulance work facilitates the development of accident rescue work.

After going down the well, turn on the employee identification card switch, and then start to wirelessly transmit its own ID number to the receiving station. After the receiving station receives the above signal, it is stored in its own CPU. When the central station is inspected, it will be transmitted through the transmission system and the transmission interface. To the central station database, the central station discriminates, analyzes, and processes the data in the database to realize various management functions.

 Three, system function

  3.1. Distribution management of underground personnel

1) Real-time distribution: The IOT management system can display the real-time dynamic distribution of the current underground personnel in the roadway and the number of personnel at all times.

2) Real-time tracking: It can track and monitor the location of underground personnel in real time. Intuitively reflect the distribution location of specific personnel underground.

3) Historical distribution: It can display the distribution location of underground personnel at a certain time in the past.

4) Track playback: The movement process of any person in a certain historical period can be displayed through animation.

3.2, restricted area management function

The IOT management software can set the restricted area, and give audible and visual alarms to those who enter the restricted area in violation of regulations. The Inoue management department also alarms, records and evaluates at the same time. Divided into single-station restricted area management and regional restricted area management. You can set a certain type of work or a certain type of card number personnel to be prohibited from entering a set forbidden area, or you can set a specific person to prohibit entering the set forbidden area. In the single-station restricted area management, if there is a setting that does not allow personnel to enter the restricted area base station signal range, an alarm will be given to the entering personnel; the system saves records for inquiries. In the area restricted area management, the alarm can be automatically turned on and off according to the number of people entering and leaving the area. It is mainly applicable to the safety management of the lanes where vehicles are not pedestrians and the places where entry is prohibited. It can also be used to realize the supervision of important areas.

3.3. Statistics function of mine truck operation management

The IOT management software can realize vehicle access management, operation statistics, and dynamic tracking according to needs.

3.4. Attendance and reports

It can assess the attendance of employees and generate attendance reports. It can perform statistical summary of various data and generate various reports required for mine management. It can generate the attendance information report of underground personnel with any date range and any personnel attributes (work type, card number, position, etc.), and can be flexibly customized according to the needs of the mine’s internal management. Can generate daily, monthly, quarterly, and annual reports. The generated report can be printed or saved as an electronic document.

3.5, emergency management function

In the event of various accidents, the distribution, names, and specific locations of people in distress can be found immediately. It can also collect real-time data from uninterrupted base stations to improve rescue efficiency and rescue effectiveness.

3.6. Alarm function

The system has complete monitoring and identification capabilities, can dynamically alarm a variety of pre-set prohibited behaviors, and save records.

3.7, two-way call function

The system can make individual and collective calls to the underground staff according to needs (especially in emergency situations); the underground personnel can also call the ground host through the RFID card that they carry with them. (Note that this function refers to a handheld positioning chip. If it is placed in a miner’s lamp, it is not easy to implement if there is no external switch in the miner’s lamp)

3.8, overtime alarm

Downhole personnel working time overtime alarm, can be classified or individually set the upper limit of the working time of the downhole personnel, if the working time exceeds the set working time, the system will automatically send an alarm signal to himself, and the system will also pop up a prompt dialog box and save Record for query.

3.9. Alarm for overcrowding

Real-time monitoring of the number of workers going down the well, the system automatically monitors whether the current number of people going down the well meets the set number of people going down the well, if it exceeds the preset number of people going down the well, the system will give an alarm.

3.10. Ranging function

According to needs, the system can automatically measure the distance between any two points, this distance is the actual distance of the mine.

 Four, system characteristics

1) Highly automated.

The system can automatically detect the time and location information of the underground tunnel personnel passing the monitoring point, and automatically realize the personnel’s attendance operation, statistics and monitoring management.

2) Advanced communication system.

The wireless information collection equipment installed in the various channels of the mine underground transmits the collected information to the underground dedicated processing and transmission substation in real time, and transmits the data passed by the relevant personnel to the network server on the ground in real time through the underground field bus. The whole process does not require human intervention. .

3) Complete data statistics and information query software.

The system software is equipped with a dedicated database management system, including information collection and statistical analysis system for workers passing through tunnels, statistical and management analysis system for attendance operations, display and printing of various statistical reports, and provide a full range of queries and management for senior management Serve.

4) The system is designed for safety, stability and reliability.

The system product adopts a tunnel wall-mounted design to ensure that the system can continue to operate normally in harsh environments and provide power supply for 2 hours after power failure.

5) Perfect abnormal situation alarm function.

The system can automatically identify illegal entry, including illegal entry without a card, invalid card, invalid card, and blacklist card entry.

6) Flexible monitoring range.

The distance and number of communication base stations can be determined according to the actual situation of the mine, technical requirements, and the scope and area of ​​key monitoring.

7) Multifunctional.

Real-time monitoring and positioning of downhole personnel, trajectory playback, paging and alarming from underground to underground, alarming from underground to underground, attendance, overtime, overcrowding and restricted area management, and many other management functions.

8) Security.

All equipment used in this system are products that comply with national safety standards, explosion-proof, flame-retardant, and anti-interference.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare