امروز: دوشنبه 31 اردیبهشت 1403
عنوان عکس اسلایدر عنوان عکس اسلایدر عنوان عکس اسلایدر
نویسنده:
تاریخ: چهارشنبه 13 آذر 1398
بازدید: 55

Bar codes and RFID tags are both item information identification technologies, and their essence is to give a special number to an item, through which you can get information about the item.


The bar code is numbered by knowing the change of the image by optical means.


The RFID tag can be considered as the electronic version of the barcode, and its working principle is the radio principle. The number information in the RFID tag chip is obtained through the process of electromagnetic wave carrier and modulation.

RFID tag category:
Low-frequency electronic tags:
Its operating frequency range is 30kHz ~ 300kHz.

Typical operating frequencies are: 125KHz, 133KHz (There are other frequencies close to it, such as TI uses 134.2KHz).


High and medium frequency electronic tags:

The working frequency of mid-to-high frequency electronic tags is generally 3MHz ~ 30MHz. Typical operating frequency is 13.56MHz.


UHF and microwave tags:
Ultra-high frequency electronic tag, its typical working frequency is: 433.92MHz, 862 (902) ~ 928MHz;
Microwave range: above 3GHz

Ultra-high frequency (UHF) ranges from 300MHz to 3GHz, and microwave ranges above 3GHz. RFID systems using UHF and microwave are called UHF RFID systems. Typical operating frequencies are 433MHz, 860 ~ 960MHz, 2.45GHz, 5.8GHz, and the frequency wavelength is around 30cm.


UHF tags can be active or passive, and communicate with the reader through electromagnetic coupling. The communication distance is generally greater than 1m, typically 4-6m, and the maximum can exceed 10m.


Radio waves in the UHF band cannot pass through many materials, especially suspended particulate matter such as water, dust, and fog.


UHF readers have very high data transfer rates and can read a large number of electronic tags in a short period of time.


The reader is generally equipped with a directional antenna, and only tags within the directional wave speed range of the reader antenna can be read and written.


The antenna inside the tag is long and label-like. The antenna has two designs, linear and circular polarization, to meet the needs of different applications.


The data storage capacity of UHF tags is generally limited to 2048bit.


From a technical and application perspective, tags are not suitable as a carrier of large amounts of data. Their main function is to identify items and complete the non-contact identification process. Typical data capacity indicators are 1024bit, 128bit, 64bit, etc.


Typical applications include supply chain management, production line automation, air parcel management, container management, railway parcel management, and logistics management systems.

نویسنده:
تاریخ: سه شنبه 12 آذر 1398
بازدید: 45

Breast pump suction level is measured in mmHg – milimetres of mercury – which is the standard unit of measuring vacuum pressure. When you’re buying a breast vacuum pump, you might see mmHg in the product listing. This number, generally in the range of 220 to 350, is the maximum suction level. Hospital grade pumps generally have maximum suction levels in the 300 range while personal grade pumps are generally in the 200 range. This doesn’t necessarily make a pump better or worse – it’s just symptomatic of hospital grade pumps having bigger, stronger motors since they are designed for more rigorous use. AJK mini vacuum pumps have been well used in the breast pump products for a long time. The different size and parameters of mini vacuum pumps are used for different suction level of breast pump.


Should you have any more questions about the micro vacuum pump, welcome for inquiry!

high flow rate mini vacuum pump

نویسنده:
تاریخ: سه شنبه 05 آذر 1398
بازدید: 37

RFID Electronic Tags are packaged in many forms, are not limited by standard shapes and sizes, and their composition is also very different, and even requires special design according to various requirements. The Transponder has been used in sizes ranging from ¢6mm to 76x45mm, small or even micron-sized chips, including antennas with a size of 0.4×0.4mm; storage capacity from 64-200bit read-only ID numbers. The small-capacity type is a large-capacity type (for example, EEPROM 32Kbit) that can store tens of thousands of bits of data; the package material is from self-adhesive to open-molded plastic.

The material, composition, and the like of the various package forms of the electronic tag are different.

Card type (PVC, paper, other) laminated, both melted and sealed.

The melt pressure is made by heating the INLAY sheet of the center layer and the upper and lower pieces of PVC material. The PVC material is fused with INLAY and then die-cut into the size specified in ISO7816.

When the chip adopts a Transponder, the chip is raised above the antenna plane (the antenna thickness is 0.01 to 0.03 mm), and another lamination method, that is, sealing, can be used. At this time, the substrate is usually PET or paper, and the thickness of the chip is usually 0.20 to 0.38 mm. When the card is packaged, only the PVC is sealed at the periphery of the antenna, and the chip is not fused, and the chip is not pressed, so that the chip can be prevented from being crushed. 

Gluing type, using paper or other materials to make the Transponder upper and lower materials glue together by cold glue, and then die-cut into cards of various sizes.

(1) Label-type paste type, the finished product can be made into the label form of manual or labeling machine, which is the most mainstream product in the application, that is, the electronic label attached to the back of the trademark is directly attached to the object to be marked. Such as aeronautical baggage tags, pallets, etc. Hanging type, which corresponds to clothing and articles using hanging products, is characterized by compact size and can be recycled. (2) Shaped metal surface type, most electronic labels will be affected by metal and will not work properly. These tags are specially treated and can be placed on metal and can be read and written. It is used for the surface of various metal parts such as pressure vessels, boilers and fire-fighting equipment. The wristband type can be used once (eg medical) or reused (eg playground). The animal and plant use type can be an injection type glass tube, a hanging ear tag, a buckle type foot ring, and the like.

With its breakthrough technical features and wide applicability, electronic label technology has been increasingly recognized by the market. With the further improvement of the chip manufacturing process, packaging process, and the maturity of packaging equipment and materials, electronic tags will be more suitable for our needs. At the same time, we have left us with a series of new topics that we need to improve and improve.

نویسنده:
تاریخ: چهارشنبه 01 خرداد 1398
بازدید: 73

RFID is a non-contact automatic identification technology. This technology was born during the Second World War and is mainly used to identify aircraft.


The simplest RFID systems include tags, readers and antennas. Additional hardware and software support is required in the real world.

About RFID Reader

The reader is divided into two types: handheld reader and fixed reader. It consists of a transceiver, an antenna, a receiver, and a control module.

 

Fixed readers generally have multiple antenna ports. Users can have multiple antennas to implement one reader to read and write tags from multiple places at the same time, or configure multiple antennas with different angles for the same tag. To ensure read and write efficiency.

 

 Fixed RFID Reader

 

About RFID Tag

The most common is the passive RF system. When the reader encounters the RFID tag, it emits electromagnetic waves and forms an electromagnetic field around it. The tag obtains the microchip circuit in the energy-activated tag from the electromagnetic field. The chip converts the electromagnetic wave and sends it to the reader. The reader puts It is converted into related data. The control calculator can process this data for administrative control.

Waterproof UHF RFID Tags

نویسنده:
تاریخ: دوشنبه 23 اردیبهشت 1398
بازدید: 61

1: The core function of the solar controller is to charge and discharge the battery in the solar power system. One is to prevent the battery from overcharging, causing the battery to be overfilled and damaged or exploding. The second is to prevent the battery from being over-discharged, so that the battery can not be charged, resulting in failure to be damaged or invalid.

 

2: Because the environment used is different from the region, the operating temperature of the solar controller is also different. In places with large temperature difference, the solar controller should also have the function of temperature compensation.

 

3: Other additional functions such as: light control switch, time control switch, etc. These solar controllers should be optional.

 

A solar charge controller is mainly responsible for regulating the energy which flows between solar modules and batteries used in storing up energy generated from solar panels. And controls the power output of the solar cell module and the battery to the load according to the power demand of the load, which is the core control part of the entire photovoltaic power supply system.

 

When a PV power system is working optimally, there is the likelihood of the battery getting overcharged. This is because the solar panels are built for the purpose of generating higher levels of voltage which if not controlled could lead to damage of the solar power system.

نویسنده:
تاریخ: پنجشنبه 19 اردیبهشت 1398
بازدید: 81

The bank belongs to the state's key security and prevention units, and has the characteristics of various scales, numerous important facilities, complicated personnel, and a wide range of management areas. As the main circulation place of today's social currency and an important part of the national economic operation, the bank's business involves a large amount of cash, securities and valuables.

 


In the process of handing over the cash box of the bank's cash-carrying car, there will always be some cases of misappropriation and misappropriation in the process of depositing the cash box, causing economic losses to the bank and causing negative social impacts and potential safety hazards.

Under such circumstances, the bank-based cash box management system based on RFID technology came into being. This system can provide a powerful and perfect modern management method, and is a good helper for bank financial business management monitoring. In the process of the tail box handover, the handheld RFID reading and writing device can be used for identity authentication of both parties, and the information of the handover tail box is read and automatically checked as the basis for the handover with the bank outlet, and the wireless network is uploaded to the dispatch monitoring center when the tailgate is handed over.

 

 

Through RFID technology system, it can realize the whole process, real-time and automatic management and monitoring of the entire business process, and respond to the first-time response to the problem, prevent the phenomenon of forgery caused by human factors, and ensure the safety and accuracy of the tail box management and so on.

نویسنده:
تاریخ: جمعه 03 اسفند 1397
بازدید: 87

Newborn babies are born every day in the hospital, and this new life is the most precious property for every family and parent. According to the statistics report of the medical department, the incidents of baby miscarriage and theft in the maternity hospital have occurred.

RFID baby identification anti-theft system is safe and reliable, not only has comprehensive regional monitoring, including real-time positioning and tracking of tags and regional positioning of events, but also has a fast response rate of alarm events.

Baby and mother wear wristbands, baby wristbands contain active long-range RFID tags, and mother wristbands contain source short-range RFID tags. The baby's active RFID is used by the system to identify its range of activity, and the close-up examination of the infant and mother uses a handheld RFID reader to visually identify the pairing relationship.

A card reader is arranged in the activity space for collecting information about the baby. A fixed RFID reader (adjustable distance, 3-8 m) is installed in each room where the baby is located, and a long-distance card reader (distance is 20 m) is installed in the aisle corridor. Each baby wristband information is automatically uploaded to the application management subsystem for data processing; at important peripheral channels, it is designed to be accessible only to authorized personnel. Maximize the elimination of unrelated people in and out.

In terms of neonatal management, the hospital can not only monitor the position of the baby wearing the anti-theft tag in real time, track and record the movement of the baby, but also implement monitoring and protection more effectively, and can immediately locate the event when an alarm event occurs and stop the theft incident in time.

نویسنده:
تاریخ: دوشنبه 29 بهمن 1397
بازدید: 79

As one of the key technologies of security and Internet of Things, RFID is currently rich in related products and solutions, and the market application is gradually deepening. The application fields are expanding and expanding, especially in intelligent transportation, smart parking, smart access control, radio frequency security, personnel and Areas such as item positioning and track management have gradually gained very mature applications.

 

Taking jewelry management as an example, the jewelry industry has problems in the exclusive counters of specialty stores. The products that the jewelry industry sells every day are high-value jewellery, which is very important for the daily inventory of goods.

However, the current work of jewellery inventory is basically done by manual manual operation, and the jewellery products have the small size and large number of actual situations. A large number of products are counted by a small number of sales personnel, which results in a huge actual situation of inventory work time.

After adopting the RFID scheme, the target object can be automatically identified by the RFID handheld terminal, and the identification work no longer requires manual intervention. RFID jewelry management is to attach RFID tags to precious jewelry products. Combined with the jewelry counting equipment(fixed RFID reader) installed on the counter, it is used to monitor, control and track the labeling of jewelry accessories, enabling fast inventory and real-time management functions.

In addition to convenience, RFID products have high stability, no mechanical wear and long service life, so the maintenance cost is relatively low. This is an important reason for domestic users to accept and innovate the new RFID technology.

نویسنده:
تاریخ: سه شنبه 02 بهمن 1397
بازدید: 85

When using the existing RFID Demo software, the length of the read operation cannot exceed 255 words, which is 510 bytes. This is also the upper limit of the amount of data read by Gen2. Reading too much data at a time will also cause the performance of the reading to be unstable. In fact, reading 128 words at a time is not stable. This is related to the performance of the specific label. When actually doing the project, it should be sufficient. After testing, choose an appropriate value as the number of single reads and writes.

There are a lot of UHF RFID tags in the user area, such as 1K bytes, how to read the large-capacity data area? There are two ways to read 1K bytes of data as an example:

Call the readWait SYNC API 4 times, reading 128 words each time;

ReadWait offset=0, size=128 words;

ReadWait offset=128, size=128 words;

ReadWait offset=256, size=128 words;

ReadWait offset=384, size=128 words;

Call the “Actions.TagAccess.Operation Sequence.performSequence” ASYNC API multiple times (recommended this way - good performance)

If 128 words is unstable, you can read 64 words, 32 words or less each time, and the number of calls increases accordingly. The read and write performance of different UHF RFID reader is different. According to the actual test, the amount of read and write data of a single sequence is adjusted; the number of calls is increased accordingly.

نویسنده:
تاریخ: جمعه 28 دی 1397
بازدید: 85

By putting the license plate number of the transport vehicle into the RFID electronic tag, when the transport vehicle enters various transport nodes such as intersections, unloading yards, yards, warehouses, etc., it can be carried out by an RFID card reader installed above the road. Reading, completely out of manual intervention, improves the speed and accuracy of vehicle traffic counting.

Compared with the license plate recognition technology of video and image processing, RFID-based vehicle recognition has high accuracy and is not easily affected by the environment, and can accurately and comprehensively acquire vehicle information.

The electronic tag is pre-written with the basic information of the vehicle through the card issuing management system, such as the vehicle ID, the license plate number, the owner, the fleet, and the like. The RFID tags are installed on the vehicle windshield of all the entrances and exits, and the vehicle has a unique ID card. The UHF RFID antenna system is installed at all intersections, roads, etc. where it is necessary to identify the electronic license plate.

Electronic license plate (R F I D tag) The passive card in the U H F (902 ~ 928MHz) frequency band can be used for long-term maintenance and repeated use. The electronic license plate is mounted on the front windshield of the vehicle by anti-disassembly technology, which forms a unique correspondence with the vehicle and becomes the only electronic identity mark of the vehicle. The identity information of the vehicle is strictly fixed in the vehicle.

The RFID electronic license plate automatic counting system does not require manual invoices, which greatly improves the accuracy of counting, reduces the error of counting people, and prevents human cheating. The system can realize bicycle statistics and group statistics, settlement statistics, and engineering materials management.

ليست صفحات

تعداد صفحات : 25