RFID intelligent community management solution
[ad_1]
In recent years, it has been found that theft safety accidents have some similar problems in some areas. The safety of the area and the communication between people and vehicles entering the area are not timely. Therefore, how to process and accurately locate vehicle information is critical for improving the safety factor. At this stage, the area protection system cannot maintain the monitor and quasi-positioning of all personnel and vehicles entering the area. This article clearly proposes the use of RFID technology in the area protection system to maintain the access to the area. Accurate positioning and information resolution of all personnel and vehicles ensure the safety of the area. This article explores the feasibility analysis of the application of RFID technology in the area protection system from the perspective of precise positioning. Radio Frequency Identification (RFID) is a kind of wireless communication technology, which can distinguish special overall targets and data information related to reading and writing capabilities based on wireless communication data signals, instead of using identification technology and special overall targets to create mechanical equipment or electro-optical touches. The wireless communication data signal is transmitted from the tag attached to the object according to the magnetic field that adjusts the wireless communication frequency to automatically retrieve and track the object. Some tags can get kinetic energy from the magnetic field transmitted by the recognizer when distinguishing, instead of rechargeable batteries; there are also some tags that have kinetic energy and can cause electromagnetic waves (magnetic fields for wireless communication frequencies). The label includes information stored in an electronic device method and can be distinguished within a few meters. Unlike barcodes, RFID tags do not need to be in the line of sight of the identifier or placed in the tracking target.
1. Key components and working principles
1. The system software component is divided into three parts
(1) RFID electronic tags
The label is equal to the bar code mark in the bar code technology, which can store the information that must be distinguished for easy transmission.
(2) RFID handset
According to the types of signs used and the functions implemented, the diversity of readers is obviously different. The basic element of the reader is to show a way of transmitting data with tags. In addition, readers also show very complicated data signal condition manipulation and regular check and correction of odd and even deviations.
(3) RFID antenna
The wireless antenna is the transmitting and receiving device between the tag and the reader.
2. Working Principles
RFID technology is the use of radio frequency signals to transmit non-touch information according to indoor space coupling (alternating electromagnetic field or magnetic field), and to maintain automatic retrieval technology based on information transmission. The basic principle is to use the characteristics of wireless communication frequency data signals and gas coupling transmission to maintain automatic retrieval of the overall target. The whole process of work: When the new item with electronic device label is within the reader’s readable range, the reader will send out electromagnetic field, the inquiry data signal will activate the label, the label will be based on the received inquiry data signal reflecting surface data signal, the reader accepts With the data signal on the reflective surface of the label, the reader can load and distinguish the electronic data stored in the label of the electronic device according to the whole process of encoding and decoding of the internal power circuit, and then automatically retrieve the target. Then according to the electronic computer and computer network to maintain the purpose of the collection, resolution of information and remote control transmission management methods.
Current status of safe production technology in residential quarters
At this stage, the key role of the regional safety management system is safety protection. In order to create a safe and comfortable living environment for the residents, people must have a standardized and fully intelligent protection system. At this stage, most areas still use security personnel inspection methods, which are high in efficiency, low in efficiency, large in human capital, and inefficient. Security and other elements. Even some high-rise residential areas are excellent espionage, but they are also equipped with high-quality security personnel. However, this kind of equipment is expensive and easy to be destroyed by human factors. In short, the actual effect of security is not significant.
3. The overall design and the whole process of work
1. Overall design
Taking full account of the diversity and diversity of the building and personnel in the region, it is necessary to install some readers, and exchange data and information based on the communication optical cable and the electronic computer of the monitoring terminal. In addition, an electronic device tag is installed on each vehicle of the personnel entering the area to detect and accurately locate the tag. In the whole process of the work of RFID system software, kinetic energy has been used as the basis, and data transmission is maintained according to a certain time sequence. Readers show the kinetic energy at work for the electronic device label. When electronic device tags enter the RFID industry, readers activate the tag power circuit based on the transmitted RF waves and interact with each other for data transmission. For loading several tags in addition, you can apply pre-launched reader mode or tag pre-launch.
In order to maintain multi-label and non-contradictory reading of the article, the reader first sends an independent instruction to a group of labels, so that the reader is protected in the category of several electronic device labels, and finally only one label is kept in the active state. Create conflict-free communication. For the label pre-sale method, labels are arbitrary and continuously push their own label covers, different labels can be properly loaded by readers, and multiple labels can be loaded separately at different times. For all electronic device tags, there is often a unique ID number. In most programs, the data information characteristics of the tags are queried and applied by a background image database. The socket between the reader and the software system is expressed by the standard function enabled by the development environment. This function includes the following multiple levels: the software system must push the equipment instructions and other orders to the reader; the reader returns to the current equipment situation of the software system and the implementation results of various orders.
2. Procedures at work
Every personnel vehicle entering the prison must be accompanied by an identity document (including a personnel card and a vehicle card)-rf label, which includes a unique real identity code and customer-specific information, readers (readers) can be Read articles within space. According to the technical dynamic detection system of radio frequency identification technology, it can additionally track and distinguish several overall target objects with frequency radio tags within a certain range, without touching, high speed and precise parallel planes, if it is in the area A radio frequency identification technology label (usually packaged into a card, also called a radio frequency card) is placed on the vehicle. When the vehicle enters the reader’s reasonable loading category, the reader will automatically load the ld number of the RFID tag owned by the vehicle. The tags are then transferred to the back-end system for resolution.
Fourth, the feasibility plan
After the detailed introduction, it can be said that the potential safety hazards have already been dealt with at a considerable level. It can reasonably distinguish, monitor and accurately locate vehicles, so that the protection system can focus on individualization, informatization and high-aspect ratio automation technology, and maintain In addition to the overall goal of the digital community, the production and manufacturing of RFIDid cards are low-cost, and the project investment is low. Therefore, the key technology and the protection system of the region are feasible.
5. Community RFID technology, detailed design of protection system
The basic elements of RFID technology in personnel precise positioning management methods include:
(1) Distinguish: How many addresses or vehicles can be completely distinguished at all times or at all addresses;
(2) Record: All vehicles entering the area can be recorded in the database query in the area anytime and anywhere;
(3) Precise positioning: The district monitoring station can remotely control and detect vehicles entering the district; query a series of information, such as the arrival/consideration time and total waiting time of personnel and vehicles at all addresses, and can promote and execute key patrol personnel on time And punctual data processing and resolution.
[ad_2]