ImageVerifierCode 换一换
格式:DOC , 页数:14 ,大小:68.50KB ,
资源ID:22796      下载积分:10 金币
验证码下载
登录下载
邮箱地址:
验证码: 获取验证码
温馨提示:
支付成功后,系统会自动生成账号(用户名为邮箱地址,密码是验证码),方便下次登录下载和查询订单;
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝   
验证码:   换一换

 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.thwenku.com/down/22796.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  
下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(外文翻译-关于煤矿安全监控系统技术的研究.doc)为本站会员主动上传,图海文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知图海文库(发送邮件至admin@thwenku.com或直接QQ联系客服),我们立即给予删除!

外文翻译-关于煤矿安全监控系统技术的研究.doc

1、Study on the Technology of the Coal Mining Safety Monitoring SystemAbstractNew development and application of the wireless radio frequency make the application of the RFID (Radio Frequency Identification) technology become more and more extensively, and combining the characteristics of RFID technolo

2、gy with the mine, we established an underground safety monitoring system with integrality, real-time and flexibility, which could automatically alarm when dangers happen and enhance the search and rescue efficiency. The system could manage the harm-gas concentration, planning arrangement of workers,

3、 access control for the works passing in and out laneway, distribution of laneway personnel and workers data, realize the informationization and visualization of the underground management, and enhance the mining production management level and the work safety level of the mine.Keywords: RFID, Safet

4、y monitoring system, E-tag, Reader-writerMining accidents often happened in China in recent years, and except for mine owners weak safety and legal consciousness, the lagged safety establishments and the imperfect managements of the mining personnel and equipments were the important causes. Through

5、analyzing several extra serious accidents in the near period, following common problems generally existed (Qiu, 2007, P.28-29), (1) the information communication between the ground personnel and the underground was not timely, (2) ground personnel could not dynamically grasp the underground personne

6、ls distribution and operation situation, and could not exactly position underground personnel, (3) once the mine accident happened, the efficiency of rescue was low, and the effect was worse. Therefore, it is very important and urgent to exactly and quickly carry out the coal mining safety monitorin

7、g function (Liu, 2004, P.22-25 & Guo, 2005), effectively manage the miners, and ensure the high-efficiency operation of the rescue.The coal mining personnel and vehicle safety monitoring system proposed in the article can track, monitor and position the harmful gases, personnel and vehicles in the m

8、ine real time, and offer dynamic information about the mine laneway network, personal position, vehicle position, dangerous region and corresponding clews for ground personnel. If the accident happens, the system also can inquire about the personnel distribution, the personnel quantity, the personne

9、l withdrawal line to offer scientific references for the accident rescue from the monitoring computer. At the same time, the mangers can utilize the daily attendance function in the system to implement attendance management for miners.1. Introduction of the RFID technologyRFID (Zhou, 2006 & Nadeem R

10、aza, 1999) is a sort of non-contact automatic identification technology, and it can automatically identify the objective by the radio frequency signals, quickly track the goods and exchange data. The identification work needs not human operation, and can work under various severe environments. RFID

11、technology can identify high-speed objects and identify multiple tags simultaneously, and the operation is quick and simple. RFID technology was generated in the Second World War, and it is the successor of the traditional code technology, and its major core part is the E-tag, and the identification

12、 system could read the information stored in the E-tag through the radio waves emitted by the reader-writer from a few centimeters to a few meters, and identify the identity of the goods, people and objects represented by the E-tag.1.1 Composing of RFID systemRFID systemis generally composed by E-ta

13、g, reader-writer and computer communication network(Simson Garfinekel, 2005).1.1.1 E-tagE-tag stores correlative information of the identified objects, and it is usually put on the identified objects, and the information stored by it can be read and written by the radio frequency reader-writer throu

14、gh the non-contact mode.1.1.2 Reader-writerThe reader-writer is the equipment which can be used to read and write the information of the E-tag by the radio frequency technology. The tag information read by the reader-writer can be managed and transmitted by the computer network system.1.1.3 Computer

15、 communication networkIn the RFID system, the computer communication network is generally used to manage the data and complete the function of communication transmission. The reader-writer can connect with the computer communication network by the standard interface to realize the communication and

16、data transmission.1.2 Work principle of RFID systemRFID technology is a sort of non-contact information transfer mode realized by the radio frequency signals through space coupling (alternating magnetic field or electromagnetic field), and it identifies the objective through the transferred information. Its work principle can be described as follows (Klaus Finkenzeller, 2003): reader-writer emits energy in one region, form the electromagnetic field, a

网站客服QQ:2356858848

  客服联系电话:18503783681

copyright@ 2008-2022 thwenku网站版权所有

ICP备案:豫ICP备2022023751号-1


>


客服