امروز: یکشنبه 30 اردیبهشت 1403
عنوان عکس اسلایدر عنوان عکس اسلایدر عنوان عکس اسلایدر
نویسنده:
تاریخ: سه شنبه 25 دی 1397
بازدید: 81

From the perspective of technological development, high-frequency technology is relatively mature than UHF technology. Through continuous improvement and improvement, a learning curve model for high-frequency tag production, data protocol sharing, and the basis for constructing RFID applications has also been established.

Both high frequency and ultra high frequency RFID systems rely heavily on the communication environment between the RFID reader and the tag. UHF uses the principle of electromagnetic emission and is therefore more susceptible to electromagnetic interference. At the same time, the metal will reflect the signal, and the water will absorb the signal, all of which will interfere with the normal function of the tag.

The International Organization for Standardization/International Electrotechnical Commission established the ISO/IEC, 15693 standard in 1999 to regulate the implementation of high frequency radio frequency identification technology. The standards for UHF are not so uniform, and the frequencies used in different countries are not the same. The UHF designated by the EU is 865~868MHz, the United States is 902~928MHz, India is 865~867MHz, Australia is 920~926MHz, Japan is 952~954MHz.

The European Telecommunications Standards Institute (ETSI) EN300-220 specification has two main provisions that are less favorable for UHF. One is about the power limitation, which stipulates that the effective radiated power is 500 mW; the second is about the bandwidth limitation, and as a result, the reader cannot be frequency hopped.

RFID tags have received a lot of praise from users in practical applications. Although the price is relatively high, UHF RFID technology has obvious unique advantages in automatic identification and security of products, and the production efficiency and management of enterprises will be has seen an increase.

 

نویسنده:
تاریخ: جمعه 21 دی 1397
بازدید: 75

Radio Frequency Identification (RFID) is a non-contact, automatic identification technology. The car security anti-theft system uses radio frequency identification technology to automatically identify the target object and obtain relevant data through the radio frequency signal. RFID technology uses RF transmission to read chip data through external materials for non-contact operation.

Communication data uses an encryption algorithm to encrypt data for secure data storage, management, and communication. With the rapid development of electronic technology, the integration of electronic chips has increased, and the cost of RFID systems has been continuously reduced, accelerating the promotion and application of intelligence in the automotive electronics industry.

Taking a four-tire car as an example, the system consists of four tire modules, one RFID reader module and one base station module. The base station module includes an RF receiver, an LF transceiver, a central control part, a human-machine interface, and is used for transmission. Ignition, gated command of the Automotive Area Interconnect Network (LIN) bus.

The four tire modules are installed in the four tires of the car, and the pressure, temperature and battery voltage parameters of each tire are measured in real time, and the measured data is sent to the base station module for processing by RF communication. The base station module receives RF data from the tire module on the one hand, and further determines whether the tire parameters are normal, and performs real-time alarm if an abnormality is found.

The RFID security-based anti-theft system greatly improves the flexibility and security of the system, saves system space, and reduces production costs. It has broad application prospects in the automotive electronics field.

نویسنده:
تاریخ: چهارشنبه 19 دی 1397
بازدید: 66

The personal multi-modal biometrics recognition system mainly collects fingerprints, facial images and DNA, and text information into the microprocessor through computer terminals, and then integrates the information into the background and records the individual biometric information database management system through the network. And can be related to other military information about military information, political information, medical care, clothing, wages, housing and other supply relationship information.

 

 

At the same time, a unique ID serial number is generated and written into the RFID card by the RFID reader and its biometric auxiliary information. Then, only the RFID reader writer is used to read the ID and the biometric auxiliary information, and after inputting into the computer terminal, the matching query is performed in the individual biometric information database via the wireless communication network or the local area network.

The computer terminal can be applied with a microcomputer based on the Windows.net operating system, and the Linux RFID reader is internally configured, and the extended interface is connected to the biometric collector. In addition to the DNA, other features can be collected and read and written in real time. The information in the RFID card needs to be encrypted while being written. Finally, an individual biometric information database is established.

RFI D radio frequency identification is a non-contact automatic identification technology that automatically identifies target objects and acquires relevant data through radio frequency signals. The identification work requires no human intervention. Compared with traditional barcodes, it has non-contact, rewritable, fast scanning, good penetrability, high security, large data storage capacity, waterproof, anti-magnetic, high temperature resistance, long service life and large reading distance. It can adapt to the complex environmental requirements of modern high-tech local warfare.

نویسنده:
تاریخ: جمعه 14 دی 1397
بازدید: 78

Based on a simple RFID system, combined with existing network technology, database technology, middleware technology, etc., build a "Internet of Things" consisting of a large number of networked readers and numerous mobile tags, which are larger than Internet. ) has become a trend in the development of RFID technology.

The logistics warehousing management system uses RFID technology to capture information, connects it to an open network system through wireless data communication and other technologies, and automatically identifies and tracks the information in each link of the supply chain, thereby building a huge logistics system. A highly intelligent, physical Internet that covers everything between the items on the warehouse and even between objects and people.

The RFID-based Internet of Things will fundamentally change the management level of flow monitoring for all aspects of production, transportation, and warehousing within the scope of global logistics and warehousing. A product with an electronic tag. The electronic tag has a unique code for the product. When the tagged product passes through a passive RFID reader, the information of the product is transmitted to the designated computer via the Internet. This is a Fully automated product flow monitoring network.

Nowadays, the “Internet of Things” is seen as an important driving force for the recovery of the world economy, and its core technology, RFID, has also received much attention. RFID technology has the advantages of non-contact and automatic identification, and has a wide range of applications in logistics management. However, the development of RFID still faces many problems, and technical standards, implementation costs, and information security all constitute major obstacles to the full application of RFID.

نویسنده:
تاریخ: شنبه 08 دی 1397
بازدید: 109

With advances in materials technology, RFID tags are becoming smaller and smaller, and can even be washed without damage, making RFID applications more widely available. Hopeland has developed a number of unique RFID tags, RFID UHF readers and software that can help solve problems or increase the efficiency of customer operations. Applications include retail, medical and healthcare, smart factories, laundries and entertainment.

Retail is the primary application area for RFID solutions, and Hopeland's RFID tags are small, helping to prevent counterfeit goods by embedding RFID tags in luxury branded products or jewelry to verify the source of the product.

Hopeland also introduced a smart factory RFID solution for Industry 4.0 that connects things in the plant (products, production equipment, etc.) to the Internet of Things (IoT) to increase industry efficiency and innovate. In addition, RFID can also be used in the production process. When a worker holds an IC card with a built-in RFID tag, the work instructions for the worker are automatically displayed on the screen.

In the toy industry, RFID also has a very interesting application, embedding RFID tags in cards or character dolls and then interacting with smartphone apps, arcade games or home video game consoles.

In addition, you can also install the RFID tag on the mini car and install the reader on the race track. When the mini car passes the position of the fixed RFID reader, you can perform various sound and light actions, and you can accurately measure the mini car from The time from the start to the end, and time competition with other netizens through the Internet.

نویسنده:
تاریخ: چهارشنبه 05 دی 1397
بازدید: 79

The application of Internet of Things technology has brought about the possibility of product innovation, solving product anti-counterfeiting, distribution and after-sales problems, and the realization of purification effect requires deep professional experience and huge industry data.

 

 

 

Consumer products, as a huge market in life, are essential for anti-counterfeiting, distribution management or after-sales in sales, and RFID is applied to these links to improve product safety and quality while saving costs and helping To solve two major problems in the retail industry: goods out of stock and loss - products lost due to theft and supply chain disruption. The following is an example of printer toner cartridge management:

1. The built-in RFID tag on the toner cartridge is written by the RFID reader writer.

2. Install an RFID card reader on a specific part of the printer. When replacing the toner cartridge, you can only use the RFID-enabled label, otherwise the printer will not work properly.

3. The RFID tag has a unique UID and a large capacity user data area. It has an independent management key, which can be used to trace the source and correctly find a specific provider. When the product fails, it can also quickly seek after-sales service.

4. It can prevent suppliers or distributors in different regions from crossing each other.

5. Protect and maintain the good integrity brand effect of the product

نویسنده:
تاریخ: دوشنبه 03 دی 1397
بازدید: 76

With the improvement of people's living standards, the number of liquefied petroleum gas cylinders has also increased dramatically. Liquefied petroleum gas has many problems, such as wide use, large quantity, large liquidity, harsh use environment and lagging regulatory measures, which cause huge safety hazards.

Under this background, it is urgent to strengthen the government safety supervision of liquefied petroleum gas cylinders, implement the policy of cylinder construction, fixed-point filling, and regular inspection, and establish a networked dynamic gas cylinder safety management system.

RFID technology has played a key role in this management system. Through RFID technology, the identity of the gas cylinder can be quickly and accurately identified, the production efficiency can be improved, and the gas cylinder to be inspected can be prevented from flowing into the production process, resulting in quality hazards.

Specific process:

1. First, establish a computer resume file database of gas cylinders.

2. Use the RFID handheld reader to read the electronic label of the gas cylinder, and the on-site operation data of the process of sending and receiving the gas cylinder, pre-charge inspection, filling and filling, re-inspection, and periodic inspection are collected and registered.

3. Alarms and prompts for abnormal and bad cylinders.

4. At the gas station, register the gas cylinders entering and leaving the gas supply station to prevent other gas cylinders from entering the enterprise through the gas station channel.

نویسنده:
تاریخ: پنجشنبه 29 آذر 1397
بازدید: 80

RFID technology can effectively integrate the daily management activities of medical assets with the medical asset management system, so as to achieve the real-time synchronization of physical information and system information, and quickly find various medical assets in an emergency.

 

 

Each medical asset is attached with an electronic tag with a unique ID number. When the item with the electronic tag enters the identification area of the reader, the information that the electronic tag keeps issuing will be received by the long distance RFID reader. The writer passes the information to the computer, and the computer system performs corresponding format conversion, filtering, and subsequent statistical processing to determine whether the item should be stored here and other related information.

The outer packaging of the drug is affixed with a barcode, and the drug and barcode information is registered in the background. When the nurse distributes the medicine to the patient, the scanner scans the barcode of the medicine, and then checks the patient's wrist label information, and distributes the medicine to the patient after confirming that the photos, names, and medical names in the hand are consistent. At the same time, the handheld terminal wirelessly transmits the distributed information to the background management center for information storage.

The temperature sensor can be used to continuously monitor the internal temperature for 24 hours to prevent unnecessary loss due to temperature changes. The temperature tag transmits the temperature change signal to the reader, and the reader transmits the signal to the background operating system. When the temperature exceeds the acceptable range, an audible and visual alarm is issued, and the detailed alarm freezer or thermostat location, storage items, etc. are clearly indicated. information.

نویسنده:
تاریخ: سه شنبه 27 آذر 1397
بازدید: 73

In 2002, Metro announced the "Future Store" program, which announced the adoption of RFID technology throughout its supply chain. The program has attracted more than 50 partner companies to jointly develop and test applications for IoT RFID technology, covering all aspects of the retail supply chain, including inventory, transportation, logistics, warehousing, and even the retail in-store customer buying experience.

Metro has built a comprehensive tracking system for RFID pallets and deployed multiple RFID applications. Pallet tracking is the basis of the distribution center RFID system. More than 100 Metro's suppliers use RFID tags in their warehouses, logistics, distribution containers and pallets.

A fixed RFID reader device is installed on the warehouse door. When the pallet passes through the warehouse door, the data on the container label can be automatically identified, collected, and transmitted to the enterprise system through automatic finishing; the system will provide this information. Check with the electronic data of the delivery notice, the pallets that meet the system order will be approved by Metro, and the inventory system of the supply chain will be updated as soon as the goods are put into storage. This process does not require manual intervention, which greatly reduces labor costs.

From ordering, date of manufacture, storage time, transportation, receiving, warehousing, sales, settlement, and reordering, the accuracy of delivery and labor cost reduction are ensured. UHF RFID readers have high accuracy and can scan accurately and quickly. Containers and goods; RFID electronic tags have a large amount of information and are highly resistant to interference. They can be used repeatedly and have high security and confidentiality. They can be reused and are more environmentally friendly while saving costs.

نویسنده:
تاریخ: دوشنبه 26 آذر 1397
بازدید: 81

The RFID chip is used to establish an identity card for the construction site personnel. By setting a long range RFID card reader in the floor, the RFID chip information can be read out instantly, and the location and personal information of the construction site personnel can be known. At the same time, the information is uploaded to the network cloud through the computer host, and the information is viewed through the network platform or the mobile APP to realize remote monitoring. Provide a convenient and reliable solution in the real-name system and security management of labor services.

A base station is installed on each door of the entrance and exit. When the tag is worn with the helmet through the entrance and exit, it can be recognized by the fixed RFID reader, with nearly 100% accuracy and extremely fast response speed.

 

When the staff loses the construction hat, the system can know which layer the hat is on, and then the floor search can be performed through the handheld terminal. When the handheld PDA is closer to the hat, the stronger the signal strength displayed on the APP, the target search.

The method can theoretically realize the functions of real-time positioning, historical track playback, information query, map monitoring, personnel distribution viewing, personnel real-time positioning, and historical information query.

The user can locate the personnel through the corresponding functions, add, delete, modify and query the basic information, play back the historical track of the personnel, print out the reports, and add and modify the users who use the system. , delete and query, statistics on the distribution of people. Users can manage each site and each area on the computer and mobile phone through simple operation.

ليست صفحات

تعداد صفحات : 25