Application of the hottest RFID technology in coal

2022-07-25
  • Detail

The application of RFID technology in coal mine safety production; It is difficult for ground personnel to timely and dynamically master the distribution and operation of underground personnel and carry out accurate personnel positioning; Once a coal mine accident occurs, the efficiency of rescue and rescue and safety rescue is low, and the search and rescue effect is poor. For this reason, most MEG and PE manufacturers in the region have indicated that they will reduce the operating rate of devices. How to correctly handle the relationship between safety and production, safety and benefit, how to accurately, real-time and quickly perform the coal mine safety monitoring function, how to effectively manage miners, and how to ensure the efficient operation of emergency relief and safety rescue is particularly important and urgent. Facing the new situation, new opportunities and new challenges, it puts forward higher requirements and expectations for work safety. Therefore, it is the only way to improve the information management level of work safety and strengthen the long-term mechanism of work safety with the main objectives of disaster prevention and efficient search and rescue

1 overview

rf ID technology is a new automatic identification technology that directly inherits the principle of radar. The use of reflected power for communication has laid the theoretical foundation of RFID. RFID standardization has been paid more and more attention by people. The variety of RFID products has become richer and the scale of application industry has been expanding. In particular, the use of Wal Mart and the U.S. military has greatly promoted the research and application of RFID. In South Africa, RFID technology has been successfully used in mine management, successfully solving the problems of mine management such as mine attendance, anti-theft and safety. In China, the combination of mining area management and computer is mainly limited to the above well part, including daily enterprise process management, accounting management and transportation management. Underground coal mine management still takes experience management as the core. With the development of informatization and networking in the coal industry, most coal mining enterprises have basically adopted various coal mine management systems in the actual process of production, and played an important role in practical application. With the introduction of RF ID technology, domestic coal mines also began to use RFID technology for management. Such as Xishan Mining Bureau and Datong Mining Bureau

2 basic composition and working principle

rf ID technology is a non-contact automatic identification technology. Its basic principle is to use the RF signal and spatial coupling transmission characteristics to realize the automatic identification of the identified object. The system is generally composed of three parts, namely, electronic tag, reader and application interface. The spatial coupling of RF signal between the electronic tag and the reader is realized through the coupling element. In the coupling channel, according to the time mm; Order relation, realizing energy transmission and data exchange. The basic model of the system is shown in Figure 1

it can be seen from Figure 1 that during the working process of the RF ID system, the data exchange is always based on energy through a certain time sequence. The reader provides working energy to the electronic tag. When the electronic tag enters the RFID field, the RF wave emitted by the reader activates the tag circuit and interacts with each other to complete the data exchange. For simultaneous reading of multiple tags, it can be in the form of reader first issue or tag first issue. In order to realize the simultaneous reading of multiple tags without conflict, for the reader first sending method, the reader first sends an isolation command to a batch of tags, so that multiple electronic tags within the reader's reading range are isolated, and finally only one tag is kept in the active state to establish a conflict free communication with the reader. After the end of communication, command the tag to enter the body sleep, and specify a new tag to execute the conflict free communication command. Repeat this to read multiple labels at the same time. For the tag first issue method, the tag randomly sends its own identification ID repeatedly. Different tags can be correctly read by the reader in different time periods to complete the simultaneous reading of multiple tags. For any electronic tag, it has a unique ID number, which cannot be changed for a tag. In most applications, the data attributes of labels are supported by the use of background data. There are still many gaps or weak links in the field of instrument and equipment products in China. Generally, the identification system composed of electronic tags and readers serves the application, and the application requirements are diverse and different. The interface between reader and application system is represented by standard functions called by development tools. The functions generally include the following aspects. The application system sends configuration commands and other instructions to the reader as required. The reader returns its current configuration status and the execution results of various instructions to the application system ◆ the test object will automatically return to normal temperature after the experiment to avoid frost and dew formation

Copyright © 2011 JIN SHI