Preliminary Study on the Application of Radio Frequency Technology in the Armed Police Forces
[ad_1]
1 Introduction to radio frequency technology
Radio Frequency Identification (RFID) is an automatic identification technology that began to emerge in the 1990s. Radio Frequency Identification is a technology that uses radio frequency signals through spatial coupling (alternating magnetic or electromagnetic fields) to achieve non-contact information transmission and The technology that achieves the purpose of identification through the information transmitted.
Its working principle is: After the tag enters the magnetic field, if it receives a special radio frequency signal from the reader, it can use the energy obtained by the induced current to send out the product information stored in the chip (ie Passive Tag, passive tag or passive tag) ), or actively send a signal of a certain frequency (ie Active Tag, active tag or active tag), the reader reads and decodes the information, and then sends it to the central information system for relevant data processing.
In the specific application process of the RFID system, the composition of the system will be different according to different application purposes and application environments, but from the perspective of the working principle of the RFID system, the system generally consists of signal transmitters, signal receivers, and transmitters. The antenna consists of several parts.
2 Application of radio frequency technology in foreign military
At present, the most representative foreign military application of RFID technology is the US military. This technology is widely used by the US military in weapons and logistics management systems. During the “Iraq War”, the United States used RFID to allocate weapons and materials very accurately, ensuring the accurate supply of front-line ammunition and materials. Unlike previous “adequate” supply, modern management emphasizes precise supply, that is, supply as much as needed, because excess supply will increase unnecessary management costs.
RFID technology has been widely used by the US military in the field of military logistics support, such as specific item search systems, material visibility systems in transit, individual electronic medical records, physiological status monitors, and clothing distribution devices, which have greatly reformed traditional logistics tracking It has achieved ideal results in actual combat activities such as European withdrawal, peacekeeping in Somalia, the war in Afghanistan and the war in Iraq.
It is also reported that the British and American forces are using radio frequency technology to develop a battlefield target recognition system to prevent accidental injuries. According to statistics, in the first half of the Iraq War, 19 of the 23 British soldiers killed were caused by friendly injuries. In recent years, the US Air Force has participated in several wars, and accidental injuries have accounted for about 15% of all casualties. During the Gulf War alone, the U.S. military had 28 accidental attacks, 11 of which were caused by incorrect target identification, accounting for 40% of the total number of accidental injuries. Of the 146 American soldiers who died in action, 35 were killed by their own misidentification.
3 Application of radio frequency technology in the armed police force
3.1 Vehicle management
The use of radio frequency technology can realize the intelligent dynamic management of vehicles in camps and important departments. The method of realization is:
(1) Each vehicle is equipped with an electronic tag (or embedded in the license plate to make an anti-counterfeiting license plate), and the vehicle’s information such as model, color, engine cylinder number, vehicle license plate number, troop number, driving certificate, etc. are recorded in In the database file (the electronic label card is unique and cannot be counterfeited).
(2) Install long-distance radio frequency identification systems at traffic intersections where troops, gates, entrances and exits and vehicles pass by that need to be monitored.
(3) The long-distance radio frequency identification system at various locations is connected to the headquarters command center through the current communication network (wireless or optical fiber communication network) to achieve computer networking, and the database will completely record the operating status of the vehicle.
(4) Vehicles that are allowed to enter the area (the electronic tag of the vehicle can be set with different permissions according to the confidentiality level) when reaching a certain distance, the gate will automatically open (it can also be displayed with a green light) to realize entry and exit without stopping, speed up traffic, and improve work efficiency And mobility. The gates of vehicles that are not allowed to enter will not open when they arrive (shown by the red light) and must be checked by the guards. Vehicles that have been approved to enter can be issued with temporary cards to let them go.
(5) The vehicle dual-card release system can be implemented, that is, the fixed-installed vehicle card and the personnel card dual card held by the driver can pass through at the same time, which further enhances the security of anti-theft and avoids the loss of the vehicle.
Installing a vehicle remote radio frequency identification monitoring system has the following advantages: (1) Allow vehicles entering the area to enter and exit without stopping, speed up traffic, and improve work efficiency and maneuverability. (2) The RFID tag number is unique in the world. Vehicles without valid cards (tags) cannot enter, and fake cards and certificates cannot be confused to pass the border. (3) One vehicle, one card (tag) system, the system automatically remembers the vehicles that have stayed in the venue. If the vehicle does not leave the venue, the special card of the vehicle will be judged as an invalid card when it enters the venue and it will not be allowed to enter the venue. This effectively prevents accidents involving one card with multiple uses. (4) Realize management automation. The system automatically records the time of entering and exiting each time the vehicle enters and exits (temporary vehicles and vehicle image records automatically captured by the camera system) to achieve dynamic intelligent management and scheduling of vehicles. When an accident (case) occurs, you can check the entry and exit records, and provide important information for the relevant departments. (5) Reduce staff on duty and improve work efficiency.
3.2 Access control
The entry and exit of personnel in important departments needs to be strengthened, and long-distance radio frequency identification systems should be installed in the exit population, with one card per person. The identity information and photos of each person have been registered in the computer when the card was issued. When the cardholder arrives at the access gate, the cardholder’s information will be automatically verified, and the access control will be automatically turned on when it is legal, and the camera will automatically capture images and record the time of entry and exit for future reference. The specific implementation method is:
(1) Important departments install remote radio frequency identification systems at the gates and issue radio frequency identification cards to personnel (required to be carried with them).
(2) The system database records the basic information of the person corresponding to the card, including basic information such as name, age, gender, affiliation, position, personal photo, and validity period.
(3) The card becomes effective after the troops authorize the card. The area or range that cardholders can only enter.
(4) When the cardholder is recognized by the system when passing the location where the identification system is set up, the system will read the card number information, and transmit the location and time of the cardholder’s passage to the ground monitoring center through the system transmission network for data management ; If the collected card number is invalid, there is no card or enter the restricted channel, the system will automatically alarm, and the supervisor on duty in the monitoring center receives the alarm signal and immediately executes the relevant safety work management procedures. This technology can also realize the automatic management of meeting sign-in and attendance.
3.3 Sentinel (personnel) monitoring system
3.3.1 Necessity of application
The characteristics of the armed police force are many points, long lines, and wide coverage. Duty points are relatively scattered, making it relatively difficult to perform duties. In addition, individual sentries are not strong in sense of responsibility, missed their posts and even sleep on their posts from time to time. It is difficult to achieve dynamic management and real-time monitoring of personnel, and there are potential safety hazards. This is also in order to follow the trend of military informatization construction, to equip the troops with modern methods for performing duties, and to improve the informatization level of the troops. In order to ensure the safety of the duty target, the monitoring system (such as the three-level network) can be equipped in the main work area, the key guard area, the storage area, and the key sentinel to have multiple functions such as sentry reporting, inspection and alarm, which is useful for improving Safety precautions have a positive effect.
3.3.2 System function and system model
(1) Real-time and dynamic monitoring of sentry duty status to prevent guns from being stolen, robbed, or lost.
(2) Improve the mobility of the troops in response to emergencies.
(3) Record the situation of superiors’ inspections and sentries.
(4) Record the duty status of the sentry.
3.3.3 Implementation method
(1) Install a radio frequency identification system on the sentry position with an identification distance of 5 meters, which not only gives the sentry a certain amount of free space, but also can quickly alarm when people and guns leave the identification distance in an emergency.
(2) A sentinel is equipped with a dedicated personnel tag, which is carried by the personnel. When the sentry is handed over, it will be transferred to the next one. When the transfer is forgotten, the system will give an alarm; the dedicated tag for firearms on duty is configured, and the performance is basically the same as that of the dedicated tag for personnel.
(3) Equipped with a special tag for inspectors, which will be carried into the sentry area during inspections, and the system will automatically record the situation of the inspectors to prevent collusion between the sentry and the inspectors and sign on behalf of the inspectors.
(4) Set remote real-time dynamic monitoring: The system can be set to automatically detect the sentinel guard area at regular intervals and automatically record the detection status. When the signal of the radio frequency card is not detected, the monitoring system sends out an alarm signal and records it in the database.
(5) The function of manually canceling the alarm can be set. When the sentry and gun return to their positions, the alarm controller will send the canceling alarm command.
After a slight modification, the system can also be used to supervise important materials. As an important automatic identification technology, radio frequency technology will gradually become an application mode that enriches various information systems, automation systems, and security systems, and at the same time promotes the improvement of various systems. With the continuous advancement of technology, radio frequency technology will play an extremely important role in the information society. Due to the many advantages of radio frequency technology, such as large data memory capacity, reusability, penetrating and barrier-free reading, anti-pollution ability and durability, etc., it has broad application prospects in the military field.
3.4 Automatic recognition of the armory
3.4.1 Overview
The automatic identification management system for armed police firearms uses radio frequency technology to realize automatic identification and information management of military firearms. It can provide a digital platform for automatic identification and intelligent management of the issuance, storage, use and maintenance of military firearms. It can effectively, accurately and intelligently automatically identify, collect, record, and upload information about firearms entering and leaving the warehouse, as well as quickly query and count the maintenance information of firearms, thereby establishing a digital information management system for military material management. It provides a digital means for the traditional management method of “one mouthful, one accurate”. The development of an RFID automatic identification management system for ordnance warehouse materials is of far-reaching strategic significance for accelerating the construction of armed police force logistics information, especially the visualization of ordnance materials.
3.4.2 System structure and function
The system is mainly composed of two parts: microwave radio frequency automatic identification equipment and background management system. The back-end management system is divided into several parts, such as the firearms distribution management module, the automatic identification module of firearms in and out of the warehouse, and the automatic identification module of firearms maintenance.
System function: Automatically enter the gun identity information when the gun is issued, such as the gun model, gun number, manufacture year and month, manufacturer, etc.; when the gun is out of the warehouse, it can automatically check whether the model and quantity are consistent with the plan. If they are inconsistent, the alarm will be prompted. Automatically check whether the model and quantity of firearms are consistent with those when they are delivered. If they are inconsistent, an alarm will be prompted; the identity information of the firearms in the maintenance process will be automatically entered, and functions such as query, analysis and statistics will be provided to improve the level of information management; With data network query function, different authorized permissions can understand different information content; identity control: the use of RFID technology can prohibit irrelevant personnel from entering the warehouse, automatically verify whether qualified people enter, and those who do not wear special RFID tags enter the alarm; security Control: Automatically check the special equipment and lead out the identity of the personnel to ensure that the special ordnance equipment can only be led out by a dedicated person to prevent theft and damage.
3.4.3 System Features
The recognition accuracy of this system is as high as 95%, the recognition distance is long, and the recognition speed is fast. The electronic label is unique, has good confidentiality, cannot be copied or changed, has a long service life, and is simple to maintain. It can realize the real-time, accuracy, and objectivity of gun data collection, and achieve the purpose of comprehensive supervision. System design is advanced, equipment performance is stable and reliable; complete firearm distribution, maintenance management records are formed, and the flow direction and distribution, use and maintenance of firearms are mastered for inquiry and decision-making. And it can realize the integration of data collection and application, and upload the collected data to the military material management database, which can be used by the military material management system.
4 Conclusion
Radio frequency technology is widely used in the civilian field, and with its unique advantages, it occupies a place in foreign military applications. At present, our military is in the initial stage of informatization. Compared with developed countries, there is still a significant gap in the level of informatization. The development of radio frequency technology has broad prospects, and it will play an extremely important role in our military’s informatization construction.
Reference materials:
[1] You Zhanqing, Li Sujian, etc. Theory and Application of Wireless Identification Technology.[M].Electronic Industry Press. 2004.10
[2] Klaus Finkenzeller. Chen Dacai Compilation. Radio Frequency Identification Technology.[M].Electronics Industry Press.2001.6
[3] An Zhentao. Ordnance storage and environmental control.[M]. 1998
[4] Cui Binzhou. Armed Police Ordnance Management. [M] Internal Information
[ad_2]