University Valuable Instrument Management System
[ad_1]
I. Overview
Universities and colleges across the country are investing more and more in valuable instruments. On average, an institution of higher Stealing is a problem in the minds of many university administrators.
Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. uses wireless anti-theft monitoring technology to realize remote management of laboratory instruments and solve the problems of managers.
2. Introduction to application requirements
Figure 1 Product introduction
As shown in Figure 1, the monitoring base station is installed at the entrance and exit of the laboratory, and the anti-theft label is bound to the valuable instrument by pasting, and the inventory can be carried out through the handheld PDA. The cabinet label is installed in the dangerous goods cabinet.
1. Equipment anti-theft
When the equipment is stolen or taken away without authorization, when it arrives at the laboratory door, the system will upload alarm information. In addition, the sound and light alarm in the laboratory will immediately give sound and light reminders, and the system will send at the same time SMS notification to management personnel.
2. Instrument inventory
The system will count the instruments and equipment in the laboratory once a day. If there is a tag that fails to count continuously for 24 hours, an alarm will be displayed on the system to notify the manager to inspect the item.
If you need to count the instruments after finishing the lab class, teachers can also count the instruments through the handheld device.
3. Borrow equipment for repair
When it is necessary to borrow laboratory equipment temporarily, or the equipment needs to be delivered for warranty, etc., the borrower can identify and confirm the instrument that needs to be loaned through the handheld computer of the laboratory, and then follow the prompts to swipe the teacher’s work card. The instrument can be taken away, and the system will not warn. When returning the equipment, the storage operation can also be performed again through the handheld device.
4. Dangerous Drug Supervision
To open the dangerous goods cabinet, you need to wear a personnel card to open the cabinet safely. When a person who does not wear a personnel tag card opens the cabinet, the monitoring base station will alarm and upload the alarm information to the system, and automatically send text messages to remind relevant management personnel.
3. System introduction
The system topology is shown in Figure 2. The monitoring base station is responsible for receiving the signal sent by the tag and uploading it to the server through the 3G network. No matter when and where, the administrator can access the server via computer or mobile phone to realize remote monitoring.
Figure 2 System topology diagram
1. Anti-theft label
As shown in Figure 3, the anti-theft label is used to bind valuable instruments and is fixed with strong foam double-sided tape. When the bound item is illegally taken away from the entrance of the laboratory, the system will give an alarm. The anti-theft tag has an anti-disassembly function. When it is violently removed, the anti-theft tag will prompt the system to alarm. Label appearance size: 70mm×44mm×9mm.
Figure 3 Anti-theft label
2. Monitoring the base station
As shown in Figure 4, the monitoring base station is installed at the entrance of the laboratory to determine the received tag information and specify acousto-optic feedback. The items in the laboratory can be counted regularly, and the data can be uploaded to the back-end system through the 3G network. The appearance size of the monitoring base station: 204mm (diameter) × 52mm (height).
Figure 4 Monitoring base station
3. Handheld PDA
Figure 5 Handheld PDA
As shown in Figure 5, the laboratory is equipped with a handheld PDA as standard, which has two main functions. One is to check all the instruments in the training room; the other is to operate as a staff member.
4. Cabinet label
Figure 6 Cabinet label
The cabinet label is used to bind to the cabinet storing dangerous goods. When the dangerous goods cabinet is opened illegally, the cabinet label will send an alarm signal to the monitoring base station. As shown in Figure 6, the cabinet label is triggered by the door magnetic switch and is installed inside the cabinet.
5. Teacher Card
Figure 7 Teacher Card
The teacher card is worn by the teacher or other management personnel. It serves as the teacher’s “electronic identity card”, which is mainly used to identify the teacher’s identity, and can be used to authorize the borrowing of equipment and opening the dangerous goods cabinet. The teacher card is shown in Figure 7, the size: 86mm×54mm×5mm.
6. Active card issuer
Figure 8 Active card issuer
As shown in Figure 8, the card issuer is connected to the computer through the USB interface, and the ID number of the anti-theft tag is read by non-contact. After the label shell is marked, the card issuance is completed. The card issuer can repeatedly issue the anti-theft label, which is convenient for repeated use. Appearance size: 145mm×93mm×35mm.
Four, background system software
1. Login interface
Figure 9 login interface
2. Instrument Management
Figure 10 Instrument Management
3. Chemical Management
Figure 11 Chemical Management
4. Inventory query
Figure 12 Inventory query
5. Video surveillance
Figure 13 Video surveillance
6. To-do list
Figure 14 To-do list
7. Classroom Management
Figure 15 Classroom management
8. Alarm reminder
Figure 16 Alarm prompt
9. User Management
Figure 17 User Management
10. Equipment Management
Figure 18 Device Management
Five, APP effect
1. Instrument inventory
Figure 19 Handheld APP instrument inventory
2. Loan equipment
Figure 20 Handheld APP loan instrument for repair
6. Advantages and highlights
1. Cover the dead spots
The anti-theft base station accurately covers every position in the laboratory, fully reduces the situation that the dead corner cannot communicate, and makes the anti-theft alarm more sensitive.
2. Tag anti-disassembly
The tag has a strong binding to valuables, and if it is violently dismantled by thieves, an alarm will be issued.
3. Remote management
The management system is connected to the Internet through the 3G network, and the management personnel can log in to the management system through a computer or mobile phone APP anytime and anywhere for remote management and remote monitoring.
4. Low radiation impact
Relative to passive tags, active tags can provide energy by themselves, and the transmission power of anti-theft base stations and anti-theft tags can be made very small, which is about one-tenth of the radiation of mobile phones.
5. Long working hours
The anti-theft tag uses wireless technology with low data volume and low power consumption, which can work for a long time, and the working time can be as long as 2 years.
[ad_2]