RFID solution for mining

October 2018 Editor's Choice, Asset Management, Mining (Industry)

Aury Africa has introduced a radio-frequency identification (RFID) audit and inspection solution aimed at mining applications. These include inspecting plant equipment, mining machines, pumps, valves and pipes, in fact, most equipment that may require regular inspection and, in some cases, regulatory requirements.

“Aury Africa is currently integrating the RFID solution with our equipment through the assistance of our technical partner, Thembekile Asset Management Solutions, which has many years’ experience in digitising workflow processes. This ensures that customers have access to real-time information, and also cuts down on unnecessary paperwork,” Aury Africa director, Sydney Parkhouse explains.

RFID tags each have their own unique identifier to ensure they can never be duplicated. The system requires a proof of presence, as the person undertaking the inspection has to be within proximity range of the tag with the scanning device to communicate the information securely.

These RFID mobile devices are fit-for-purpose, with apps available for iOS or Android operating systems. One of the key features of the system is that the tag and the scanner do not have to be in direct line of sight for the transfer of communication to occur.

Through the use of the specialised mobile scanning device, one can identify and perform inspections on equipment and conduct in-field certifications. The mobile device has additional features that enable users to capture GPS coordinates of assets, and keep track of where they have been previously deployed.

In addition, fixed readers can be used to create ‘gateways’ whereby tagged equipment passing through the gateway can be read automatically. Typical uses of this functionality would be, for example, the transfer of equipment from one location to another.

Digital images of failures, hazards, and processes can be captured using the device’s digital camera. This allows mines to keep a record of the status of the equipment, while the device allows users to access documentation and equipment manuals. Upon completion of the inspection, the results are synchronised automatically to the cloud for secure capture.

Thembekile Business Development Director, Dean Parkhouse, explains that individual items can be accessed to view the actual asset and all related details. The information contained in the cloud includes images and diagrams. The RFID cloud software system can be integrated into most enterprise resource planning (ERP) systems.

Reporting is carried out in real time. Standard reports are available, while customised reports can be generated upon request. The reports can be emailed, and even delivered according to a defined schedule. Exception reporting functionality is also available. The reports can also be printed out if required, in addition to being stored safely in the cloud. The system generates a summary report that can be sent out after the inspection, or at the end of the shift.

The benefits of the system include that it provides for an effective asset management register, ensures compliance with inspection requirements, and enables skills transfer, while allowing mines to develop both a digital and hard copy logbook.

For more information, contact Aury Africa, +27 11 026 6642, [email protected], www.auryafrica.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
The imperative of real-time environmental monitoring
IoT & Automation Mining (Industry)
Real-time monitoring of various parameters, such as air quality, noise levels, dust particulate matter and air velocity, can provide insights into working conditions and equipment performance.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...