欢迎访问《现代矿业》杂志官方网站,今天是 分享到:

现代矿业 ›› 2019, Vol. 35 ›› Issue (08): 144-146.

• 材料·装备 • 上一篇    下一篇

矿山井下危险区两级门禁监控系统设计

范学峰1,汤剑松2,徐春耕3   

  1. 1.中钢集团马鞍山矿山研究院有限公司;2.黄山市气象局;3.安徽向科化工有限公司
  • 出版日期:2019-08-25 发布日期:2019-09-29

Design on the Two-level Access Control System of Mine Dangerous Area

Fan Xuefeng1,Tang Jiansong2,Xu Chungeng3   

  1. 1.Sinosteel Maanshan Institute of Mining Research Co.,Ltd.;2.Huangshan Meteorological Bureau;3.Anhui Xiangke Chemical Industry Co.,Ltd.
  • Online:2019-08-25 Published:2019-09-29

摘要: 矿山井下危险区工况复杂,人员散乱,时常因为无关人员擅自闯入且不能及时处理而导致事故发生。为了提高危险区管理的智能化程度,解决危险区人员管控的难题,基于某矿山的现场调研和需求,通过建立门禁系统工作流程与整体拓扑关系模型,对系统整体方案进行设计;通过对功能模块的合理分布与安装,实现了对门禁系统功能模块的集成;通过对井上与井下现有的网络架构分析,在原有的网络结构上搭建了系统通讯局域网络;通过对井下管理软件与井上调度中心关联,构造了完整的井上-井下两级监控管理系统。门禁系统在安徽某铁矿试运行2个月,整体功能稳定可靠,现场反馈良好。

关键词: 危险区, 两级门禁监控, 功能模块, 网络架构

Abstract: The dangerous area of underground mines have complicated working conditions and scattered personnel,which often lead to accidents due to the unauthorized intrusion of unrelated personnel and the failure to timely deal with them.In order to improve the intelligent level of dangerous area management and solve the problem of personnel control in dangerous area,based on the field investigation and demand of a mine,through the establishment of access control system workflow and overall topology relationship model,the overall scheme of the system is designed.Through the reasonable distribution and installation of the function modules,the integration of the function modules of the access control system is realized.Through the analysis of the existing network structure,the system communication local area network is built on the original network structure.Through the correlation between downhole management software and downhole dispatching center,a complete downhole and downhole two-level monitoring and management system is constructed.The access control system is tested in an iron mine in Anhui Province for two months.The results show that the overall function of the system is reliable and stable,the on-site feedback results is good.

Key words: Dangerous area, Two-level access control, Function module, Network structure