امروز: دوشنبه 31 اردیبهشت 1403
عنوان عکس اسلایدر عنوان عکس اسلایدر عنوان عکس اسلایدر
نویسنده:
تاریخ: چهارشنبه 21 آذر 1397
بازدید: 71

Card recognition is divided into two categories: the first one is a magnetic card, but the magnetic card is low in security, easy to wear and requires frequent magnetization; the second is an RFID card, which is cheap, easy to use, highly secure and can use a database. It is well managed, its cost performance is extremely high, and it has a good promotion prospect.

The working principle of the whole access control system is: one person and one card, and establish corresponding personal information in the database management system according to the serial number of the card. When the door is to be opened, the card is brushed on the lower computer, and the RFID gate reader transmits the serial number to the upper computer server. The server queries the corresponding personal information in the database according to the serial number and transmits it to the lower computer.

At the same time, the lower computer reads the data of the fixed sector block of the card (reading the card), compares the read data with the data sent by the upper computer, and opens the door exactly the same, otherwise the LCD displays an error and does not open the door.

The overall software design of the access control system includes the software design of the lower computer reader and the software design of the database management system of the upper computer. The access control system of the access control system is mainly to realize the reading of the card and the communication with the host computer management system, and is implemented by C language programming in the Keil4 environment.

Through the physical test many times, the RFID access control system designed by this scheme is safe and reliable, and easy to use. And it has a high price/performance ratio compared to other access control systems. With the rapid development of the Internet of Things technology and the promotion of China's gold card project, it is believed that RFID technology will be increasingly applied to all walks of life.

 

نویسنده:
تاریخ: دوشنبه 19 آذر 1397
بازدید: 79

Based on the RFID device and the tableware with the RFID chip, a checkout counter with sensing function is added in the cashier area to complete the intelligent settlement of the meal checkout. Compared with the traditional queuing checkout, the billing time is shortened to the utmost, the work efficiency of the restaurant is improved, the number of labor is saved, the operating cost is reduced, the management performance is improved, the service quality is improved, and the human-machine interaction is realized.

The RFID chip is packaged into widely used canteen tableware by package compression technology. A small amount of necessary information can be stored in the RFID chip, thereby giving the identity information unique to the general tableware.

 

 

 

Working principle: 1. Data acquisition part. The UHF RFID reader reads the information of the packaged tableware and transmits it to the host for data processing. 2. Data processing part. The host screens and matches the received information, and displays the selected variety of the user and the corresponding nutritional analysis on the display. 3. Users can use a variety of settlement methods. Such as IC card, 6C card, Alipay, WeChat, face recognition and so on.

 

The information of the packaged tableware is obtained by the RFID reader writer and written into the price of the meal at that time, so that the settlement can be settled at the later settlement. The display shows the amount written.

نویسنده:
تاریخ: پنجشنبه 15 آذر 1397
بازدید: 75

With the continuous improvement of people's living standards, it has become an intimate partner of many urban residents' leisure life. Keeping dogs and cats has become a modern lifestyle. In the morning of the flood, some people will walk around with their love dogs. After dinner, some people will take a dog for a walk.

 

The RFID pet dog vaccine management system fundamentally solves the problem of pet loss, abandonment and supervision. The pet electronic chip with a global unique identification number (UID) will be used as a pet's electronic ID card, and it will be stored in the pet chip for the rest of its life. The basic information of the pet is transmitted to the computer application software through the Ethernet RFID reader, thereby realizing automatic identification and analysis of the pet identity, the owner, and the information of reproduction, health and epidemic prevention throughout the life, and realizing the information of the pet management.

The chip can record basic information about pets, such as name, gender, date of birth, etc. Information such as the type and time of the vaccine received by the pet will be stored in the pet chip or database and will be stored in the pet chip or database. Only authorized personnel can pass the management software or the Internet.

If a pet is lost, as long as it has an RFID pet chip, it can quickly get the information of the pet owner, effectively preventing the increase of stray dogs.

Due to the openness of the pet chip user data area, as long as the RFID reader device conforms to the chip protocol, the pet's open information can be read, so that the pet supervision department, the epidemic prevention department, the pet hospital, etc. can easily share the pet information. The management of pets brings great convenience.

نویسنده:
تاریخ: چهارشنبه 14 آذر 1397
بازدید: 85

Photovoltaic (PV) Panel make electricity from sunlight, and are marvelously simple, effective, and durable. They sit in the sun and, with no moving parts, can run your appliances, charge your batteries, or make energy for the utility grid.


A solar panel array is the energy collector—the solar “generator” and does so via the photovoltaic effect. Discovered in 1839 by French physicist Alexandre-Edmund Becquerel, the photovoltaic effect describes the way in which solar cells create electricity from the energy residing in photons of sunlight. When sunlight hits a solar cell, the cell absorbs some of the photons and the photons’ energy is transferred to an electron in the semiconductor material. With the energy from the photon, the electron can escape its usual position in the semiconductor atom to become part of the current in an electrical circuit.


Most solar cells fall into one of two basic categories: crystalline silicon or thin-film. Crystalline silicon modules can be fashioned from either monocrystalline and polycrystalline.


To use the energy from the array, you may also need other components, such as inverters, charge controllers and batteries, which make up a solar-electric system. The components required are dependent on the system type designed. System types include:


Off-Grid Solar Systems : Although they are most common in remote locations without utility service, off-grid solar-electric systems can work anywhere. These systems operate independently from the grid to provide all of a household’s electricity. These systems require a battery bank to store the solar electricity for use during nighttime or cloudy weather, a charge controller to protect the battery bank from overcharge, an inverter to convert the DC PV array power to AC for use with AC household appliances, and all the required disconnects, monitoring, and associated electrical safety gear.


Grid-Tied Solar Systems : A grid-tied solar system is dependent upon your municipality’s electrical grid. The DC electricity generated by the photovoltaic (PV) panels is sent through a grid-tied inverter, which converts it to AC power that’s compatible with the grid.

نویسنده:
تاریخ: دوشنبه 12 آذر 1397
بازدید: 75

With the development of information technology, colleges and universities have adopted information technology to strengthen management according to their own needs. In view of the problems in digital campus management, the use of non-contact RFID electronic tag proximity card to achieve "one card" management, and cost-effective.

The UHF RFID readers are installed at the entrance of the school, at the stairs, and at the entrance of the classroom to realize real-time positioning and identification of students. All reader connections form a bus type network connection to the controller. Analyze student attendance by analyzing the raw data collected by students. The attendance of each class will be sent to the teacher's mobile phone in real time for easy check.

As a new technology for fast, real-time and accurate acquisition and processing of information, radio frequency identification (RFID) electronic tags, as an upgrade and supplement to traditional vehicle management methods, meet today's vehicle management requirements. The vehicle electronic tag is installed on the windshield of the vehicle or the campus "one card", and a vehicle RFID reader is installed at the vehicle passage or the parking lot entrance and exit.

The degree of informationization and construction of digital campus is an important indicator to measure the comprehensive ability of school management, scientific research and application, and is an important factor reflecting the core competitiveness of the school. Therefore, digital smart campus has become the trend of campus management development. The application of Internet of Things technology can actively promote the development of intelligent digital campus system, and can effectively solve the difficulties encountered in the construction of traditional campuses, thus providing more efficient and high-quality services for the daily learning and life of teachers and students.

نویسنده:
تاریخ: جمعه 09 آذر 1397
بازدید: 65

The security industry and RFID technology are inextricably linked. RFID technology plays an important role in the application of products and solutions such as intelligent transportation, smart parking, smart access control, and radio frequency anti-theft.

 

The barcode technology attaches the barcode information to the article, and scans the barcode on the article through the scanner to obtain the information of the article. The RFID technology attaches the RFID tag to the article, and reads the information in the tag into the RFID reader through the radio frequency signal, thereby obtaining the unique information of the article.

Overall, the main markets for domestic RFID applications are in the areas of identification, traffic management, military and security, asset management, and logistics and warehousing. And in the application of RFID in foreign countries, the absolute main force of retail and transportation logistics. The sum of the two is about 40% of the entire market. Garment applications have been fully deployed in apparel and retail outlets such as Wal-Mart, Metro and Zara.

Specifically, companies need to affix printed RFID tags to each item that needs to be identified, and also need to be equipped with relevant identification devices such as channel machines, handheld terminal, and the like. In addition, enterprises need to integrate RFID with the original ERP system, and the business process will be more complicated than before, and production, transportation and warehousing should be coordinated.

In the short term, “unmanned retail stores” are still hard to become the next explosion point of RFID technology, but it is a new attempt of RFID technology in the field of consumer retail. Of course, RFID technology is just one of the many reasons for the “unmanned retail store” to attract attention. The value of this new retail form is also the collection of big data for offline consumer spending.

نویسنده:
تاریخ: چهارشنبه 07 آذر 1397
بازدید: 49

The inspection of the equipment is an important measure to ensure the smooth operation of the equipment. The inspection is a time-sensitive work, and the on-duty personnel must periodically inspect each inspection point.

The use of RFID technology and wireless local area network for equipment and pipeline inspection, usually used in power, manufacturing-type enterprise equipment inspection, petrochemical pipeline inspection. Cover the seamless wireless network along the inspection route in the factory area, install an RIFD label at each inspection monitoring point, and record the basic information of the inspection monitoring point.

 

 

Each time the inspection personnel first reads the contents of the label with the handheld RFID scanner at a patrol inspection point, the equipment and pipeline are inspected, and the detection information is transmitted to the management office through the wireless network. A patrol management system is established in the background to realize the inspection quality of the inspection personnel through the system, improve the management level of the equipment being inspected, improve the inspection efficiency, and gain insight into the entire inspection work.

The equipment inspection system based on RFID technology mainly includes inspection and dispatch management, inspection line management, inspection information download management, inspection information upload management, inspection information query management, and inspection information report management. The hardware device is mainly composed of an RFID handheld terminal, an RFID electronic tag, and a wireless access point.

The inspection equipment system fully utilizes the physical advantages of RFID technology, mainly utilizing the characteristics of UHF RFID without contact and long reading distance, without manual intervention, thus improving the convenience of inspection personnel and greatly reducing the inspection. The workload of the inspectors. Long reading distance can realize long-distance data collection, and better remote equipment inspection.

نویسنده:
تاریخ: دوشنبه 26 شهریور 1397
بازدید: 71

At present, the pharmaceutical industry is currently facing the problem of the proliferation of counterfeit and inferior drugs. Some lawless elements are driven by interests to create counterfeit drugs, which threaten people's lives when they take them. With the rapid development of RFID technology, the medical industry in many cities has begun to apply RFID technology. Many hospitals have begun to use RFID handheld reader for ward inspections, and most importantly, RFID technology and handheld terminal products are It has also played a huge role in drug anti-counterfeiting, tracking and supply chain management.

 

Using RFID technology, when the drug is shipped from the factory, the RFID tag is attached to the drug package, which becomes an inseparable part of the drug. The RFID tag carries all the information. The principle of RFID used for anti-counterfeiting in commodity anti-counterfeiting is to identify the product (The ID), ie the security code (which is encrypted by hardware or software algorithms) is traced and managed through the system management platform, from the supply chain process that the drug subsequently undergoes, and finally to the patient through the retailer or hospital.

Each Ethernet RFID reader can be connected to the server via GPRS or network, and can effectively record and monitor in production, warehousing, logistics and final sales. The RFID tag is the identity card of the drug, and the product identification number (ID), that is, the security code (encrypted by software or hardware algorithm) is written in the RFID chip. This ID is unique in production and storage. In the warehousing and logistics links, including the final sale, although the number of times to collect information is large, the remote RFID reader can be used for non-contact remote identification, so that data can be collected efficiently. Reduce the complexity of manual statistics and queries. Through RFID technology, we can prevent counterfeiting and sales, and improve the handling capacity of accidents. The application of RFID and handheld terminals in drug management supervision still has a large market space.

نویسنده:
تاریخ: سه شنبه 20 شهریور 1397
بازدید: 77

RFID radio frequency identification technology uses radio frequency for non-contact two-way communication to exchange data for identification purposes. Compared with the traditional magnetic card, IC card or barcode recognition method, RFID has the characteristics of long-distance and non-contact identification, and has strong adaptability to the environment. Through reasonable design, it can work in various harsh environments and has excellent recognition effect. RFID identification work does not require manual intervention, and is suitable for realizing automatic data collection of the system. At the same time, it can recognize high-speed moving objects and recognize multiple electronic tags at the same time, and the operation is quick and convenient. RFID truck frame management application technology is precisely using RFID technology to manage these points.

 

The RFID truck frame management system is based on RFID technology. The Sinotrans container truck control system will be based on the successful application of RFID in other fields, combined with the needs of Sinotrans Container Line Management, with automation, advanced, Based on the principle of stability and expandability, the automatic identification and tracking of the container frame is realized around the core business requirements. The core of the system is to install RFID readers and RFID antennas on the front of the container truck, install RFID electronic tags on the frame, and identify the electronic tags through the readers to achieve monitoring and management of the frames. The RFID electronic tag is installed near the front of the frame, and the appropriate mounting position is selected according to the structural characteristics of the frame. At the same time, the frame is made of metal and requires an anti-metal electronic tag. In order to ensure that the electronic tag is not damaged during the use and storage of the frame, the protection of the electronic tag is achieved by making full use of the structure of the frame itself. For a frame that does not have a protective position, the protection of the label is formed by installing a metal baffle or a cushion rubber under the premise of taking into account the reading performance.

نویسنده:
تاریخ: جمعه 16 شهریور 1397
بازدید: 77

Smart retail cabinets can be opened and taken, that is, take away, each layer is replaced by an UHF RFID antenna, and an RFID electronic tag is attached to each product for automatic real-time reading. The quantity and attributes of the goods in the vending machine.

The specific shopping process is: Step 1: The user downloads the APP (or WeChat, Alipay applet) with the smart phone. After registration, the user has the right to open the vending cabinet door lock by scanning the QR code. After opening the door, the user can directly take the smart. Goods in the vending cabinet. The second step: the selection of goods, not much to say here, the selection process is no different from ordinary supermarkets or ordinary sales containers. The third step: closing the door payment, closing the door after the purchase of the goods, the smart retail cabinet starts the internal inventory program, using fixed RFID reader to identify the RFID electronic tag inside the cabinet, the end of the inventory can know what the user is taking, on the mobile phone the settlement is completed on the APP.

HL7206C12 & HL7206C24 is new designed fixed UHF RFID reader with 12/24 ports for antennas. With Impinj R2000 chispet, support multiple tags reading up to 500 times/second, 0-15 meters long range reading. Widely use for asset management, inventory/warehouse management, vehicle ETC management etc. CL7205D is circular polarization 8dBi UHF RFID antenna, could be installed and integrated in cabinet, cupboard etc. It's ver convenient for projects like document management, library materials management, smart retail.

ليست صفحات

تعداد صفحات : 25