University Valuable Instrument Management System

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

 1. Overview National universities and colleges are investing more and more in valuable instruments. On average, an institution of higher learning has about 10,000 valuable instruments, while ordinary instruments can reach about 20,000. How to manage these equipment systematically? Preventing the theft of instruments is a problem in the minds of many university administrators. Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. uses wireless anti-theft monitoring technology to realize remote management of laboratory instruments and solve the problems of managers. 2. Introduction to application requirements Figure 1 Product introduction is shown in Figure 1. The monitoring base station is installed at the entrance and exit of the laboratory. The anti-theft label is bound to the valuable instrument by pasting, and the inventory can be carried out through the handheld PDA. The cabinet label is installed in the dangerous goods cabinet.  1. Equipment anti-theft. When the equipment is stolen or taken away without authorization, when it reaches the laboratory door, the system will upload alarm information, and the sound and light alarm in the laboratory will immediately give sound and light reminders. At the same time, the system will send a short message to notify the management staff.  2. The instrument inventory system will inventory the instruments and equipment in the laboratory once a day. If there is a tag that fails to inventory for 24 consecutive hours, an alarm will be displayed on the system to notify the manager to inspect the item. If you need to count the instruments after finishing the lab class, teachers can also count the instruments through the handheld device.  3. If you need to borrow a laboratory instrument for repair, or the instrument needs to be delivered for warranty, etc., the borrower can identify the instrument that needs to be loaned through the hand-held computer in the laboratory, and then follow the prompts to swipe the teacher's work card , The maintenance personnel can take the instrument away, and the system will not warn. When returning the equipment, the storage operation can also be performed again through the handheld device.  4. Hazardous Drugs Supervision Opening the dangerous goods cabinet requires wearing a personnel card to safely open the cabinet. When a person who does not wear a personnel tag card opens the cabinet, the monitoring base station will alarm and upload the alarm information to the system, and automatically send text messages to remind relevant management personnel. 3. System introduction The system topology diagram is shown in Figure 2. The monitoring base station is responsible for receiving the signal sent by the tag and uploading it to the server through the 3G network. No matter when and where, the administrator can access the server via computer or mobile phone to realize remote monitoring. Figure 2 System topology diagram 1. Anti-theft label As shown in Figure 3, the anti-theft label is used to bind valuable instruments and is fixed with strong foam double-sided tape. When the bound item is illegally taken away from the entrance of the laboratory, the system will give an alarm. The anti-theft tag has an anti-disassembly function. When it is violently removed, the anti-theft tag will prompt the system to alarm. Label appearance size: 70mm×44mm×9mm. Figure 3 Anti-theft label 2. Monitoring base station As shown in Figure 4, the monitoring base station is installed at the entrance of the laboratory to determine the received label information and specify sound and light feedback. The items in the laboratory can be counted regularly, and the data can be uploaded to the back-end system through the 3G network. The appearance size of the monitoring base station: 204mm (diameter) × 52mm (height). Figure 4 Monitoring base station 3. Hand-held PDA Figure 5 Hand-held PDA As shown in Figure 5, the laboratory is equipped with a hand-held PDA, which has two main functions. One is to check all the instruments in the training room; the other is to borrow as a staff member. Repair operation.  4. Cabinet label Figure 6 Cabinet label The cabinet label is used to bind to the cabinet storing dangerous goods. When the dangerous goods cabinet is opened illegally, the cabinet label will send an alarm signal to the monitoring base station. As shown in Figure 6, the cabinet label is triggered by the door magnetic switch and is installed inside the cabinet.  5. Teacher card Figure 7 Teacher card The teacher card is worn by teachers or other management personnel. It serves as the teacher's

I. Overview

Universities and colleges across the country are investing more and more in valuable instruments. On average, an institution of higher Stealing is a problem in the minds of many university administrators.

Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. uses wireless anti-theft monitoring technology to realize remote management of laboratory instruments and solve the problems of managers.

2. Introduction to application requirements

 1. Overview National universities and colleges are investing more and more in valuable instruments. On average, an institution of higher learning has about 10,000 valuable instruments, while ordinary instruments can reach about 20,000. How to manage these equipment systematically? Preventing the theft of instruments is a problem in the minds of many university administrators. Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. uses wireless anti-theft monitoring technology to realize remote management of laboratory instruments and solve the problems of managers. 2. Introduction to application requirements Figure 1 Product introduction is shown in Figure 1. The monitoring base station is installed at the entrance and exit of the laboratory. The anti-theft label is bound to the valuable instrument by pasting, and the inventory can be carried out through the handheld PDA. The cabinet label is installed in the dangerous goods cabinet.  1. Equipment anti-theft. When the equipment is stolen or taken away without authorization, when it reaches the laboratory door, the system will upload alarm information, and the sound and light alarm in the laboratory will immediately give sound and light reminders. At the same time, the system will send a short message to notify the management staff.  2. The instrument inventory system will inventory the instruments and equipment in the laboratory once a day. If there is a tag that fails to inventory for 24 consecutive hours, an alarm will be displayed on the system to notify the manager to inspect the item. If you need to count the instruments after finishing the lab class, teachers can also count the instruments through the handheld device.  3. If you need to borrow a laboratory instrument for repair, or the instrument needs to be delivered for warranty, etc., the borrower can identify the instrument that needs to be loaned through the hand-held computer in the laboratory, and then follow the prompts to swipe the teacher's work card , The maintenance personnel can take the instrument away, and the system will not warn. When returning the equipment, the storage operation can also be performed again through the handheld device.  4. Hazardous Drugs Supervision Opening the dangerous goods cabinet requires wearing a personnel card to safely open the cabinet. When a person who does not wear a personnel tag card opens the cabinet, the monitoring base station will alarm and upload the alarm information to the system, and automatically send text messages to remind relevant management personnel. 3. System introduction The system topology diagram is shown in Figure 2. The monitoring base station is responsible for receiving the signal sent by the tag and uploading it to the server through the 3G network. No matter when and where, the administrator can access the server via computer or mobile phone to realize remote monitoring. Figure 2 System topology diagram 1. Anti-theft label As shown in Figure 3, the anti-theft label is used to bind valuable instruments and is fixed with strong foam double-sided tape. When the bound item is illegally taken away from the entrance of the laboratory, the system will give an alarm. The anti-theft tag has an anti-disassembly function. When it is violently removed, the anti-theft tag will prompt the system to alarm. Label appearance size: 70mm×44mm×9mm. Figure 3 Anti-theft label 2. Monitoring base station As shown in Figure 4, the monitoring base station is installed at the entrance of the laboratory to determine the received label information and specify sound and light feedback. The items in the laboratory can be counted regularly, and the data can be uploaded to the back-end system through the 3G network. The appearance size of the monitoring base station: 204mm (diameter) × 52mm (height). Figure 4 Monitoring base station 3. Hand-held PDA Figure 5 Hand-held PDA As shown in Figure 5, the laboratory is equipped with a hand-held PDA, which has two main functions. One is to check all the instruments in the training room; the other is to borrow as a staff member. Repair operation.  4. Cabinet label Figure 6 Cabinet label The cabinet label is used to bind to the cabinet storing dangerous goods. When the dangerous goods cabinet is opened illegally, the cabinet label will send an alarm signal to the monitoring base station. As shown in Figure 6, the cabinet label is triggered by the door magnetic switch and is installed inside the cabinet.  5. Teacher card Figure 7 Teacher card The teacher card is worn by teachers or other management personnel. It serves as the teacher's

Figure 1 Product introduction

As shown in Figure 1, the monitoring base station is installed at the entrance and exit of the laboratory, and the anti-theft label is bound to the valuable instrument by pasting, and the inventory can be carried out through the handheld PDA. The cabinet label is installed in the dangerous goods cabinet.

 1. Equipment anti-theft

When the equipment is stolen or taken away without authorization, when it arrives at the laboratory door, the system will upload alarm information. In addition, the sound and light alarm in the laboratory will immediately give sound and light reminders, and the system will send at the same time SMS notification to management personnel.

 2. Instrument inventory

The system will count the instruments and equipment in the laboratory once a day. If there is a tag that fails to count continuously for 24 hours, an alarm will be displayed on the system to notify the manager to inspect the item.

If you need to count the instruments after finishing the lab class, teachers can also count the instruments through the handheld device.

 3. Borrow equipment for repair

When it is necessary to borrow laboratory equipment temporarily, or the equipment needs to be delivered for warranty, etc., the borrower can identify and confirm the instrument that needs to be loaned through the handheld computer of the laboratory, and then follow the prompts to swipe the teacher’s work card. The instrument can be taken away, and the system will not warn. When returning the equipment, the storage operation can also be performed again through the handheld device.

 4. Dangerous Drug Supervision

To open the dangerous goods cabinet, you need to wear a personnel card to open the cabinet safely. When a person who does not wear a personnel tag card opens the cabinet, the monitoring base station will alarm and upload the alarm information to the system, and automatically send text messages to remind relevant management personnel.

 3. System introduction

The system topology is shown in Figure 2. The monitoring base station is responsible for receiving the signal sent by the tag and uploading it to the server through the 3G network. No matter when and where, the administrator can access the server via computer or mobile phone to realize remote monitoring.

University Valuable Instrument Management System

Figure 2 System topology diagram

 1. Anti-theft label

As shown in Figure 3, the anti-theft label is used to bind valuable instruments and is fixed with strong foam double-sided tape. When the bound item is illegally taken away from the entrance of the laboratory, the system will give an alarm. The anti-theft tag has an anti-disassembly function. When it is violently removed, the anti-theft tag will prompt the system to alarm. Label appearance size: 70mm×44mm×9mm.

University Valuable Instrument Management System

Figure 3 Anti-theft label

 2. Monitoring the base station

As shown in Figure 4, the monitoring base station is installed at the entrance of the laboratory to determine the received tag information and specify acousto-optic feedback. The items in the laboratory can be counted regularly, and the data can be uploaded to the back-end system through the 3G network. The appearance size of the monitoring base station: 204mm (diameter) × 52mm (height).

University Valuable Instrument Management System

Figure 4 Monitoring base station

 3. Handheld PDA

University Valuable Instrument Management System

Figure 5 Handheld PDA

As shown in Figure 5, the laboratory is equipped with a handheld PDA as standard, which has two main functions. One is to check all the instruments in the training room; the other is to operate as a staff member.

 4. Cabinet label

University Valuable Instrument Management System

Figure 6 Cabinet label

The cabinet label is used to bind to the cabinet storing dangerous goods. When the dangerous goods cabinet is opened illegally, the cabinet label will send an alarm signal to the monitoring base station. As shown in Figure 6, the cabinet label is triggered by the door magnetic switch and is installed inside the cabinet.

 5. Teacher Card

University Valuable Instrument Management System

Figure 7 Teacher Card

The teacher card is worn by the teacher or other management personnel. It serves as the teacher’s “electronic identity card”, which is mainly used to identify the teacher’s identity, and can be used to authorize the borrowing of equipment and opening the dangerous goods cabinet. The teacher card is shown in Figure 7, the size: 86mm×54mm×5mm.

 6. Active card issuer

University Valuable Instrument Management System

Figure 8 Active card issuer

As shown in Figure 8, the card issuer is connected to the computer through the USB interface, and the ID number of the anti-theft tag is read by non-contact. After the label shell is marked, the card issuance is completed. The card issuer can repeatedly issue the anti-theft label, which is convenient for repeated use. Appearance size: 145mm×93mm×35mm.

 Four, background system software

1. Login interface

University Valuable Instrument Management System

Figure 9 login interface

2. Instrument Management

University Valuable Instrument Management System

Figure 10 Instrument Management

 3. Chemical Management

University Valuable Instrument Management System

Figure 11 Chemical Management

 4. Inventory query

University Valuable Instrument Management System

Figure 12 Inventory query

 5. Video surveillance

University Valuable Instrument Management System

Figure 13 Video surveillance

6. To-do list

University Valuable Instrument Management System

Figure 14 To-do list

7. Classroom Management

University Valuable Instrument Management System

Figure 15 Classroom management

 8. Alarm reminder

University Valuable Instrument Management System

Figure 16 Alarm prompt

 9. User Management

University Valuable Instrument Management System

Figure 17 User Management

10. Equipment Management

University Valuable Instrument Management System

Figure 18 Device Management

 Five, APP effect

 1. Instrument inventory

University Valuable Instrument Management System

Figure 19 Handheld APP instrument inventory

 2. Loan equipment

University Valuable Instrument Management System

Figure 20 Handheld APP loan instrument for repair

6. Advantages and highlights

University Valuable Instrument Management System

 1. Cover the dead spots

The anti-theft base station accurately covers every position in the laboratory, fully reduces the situation that the dead corner cannot communicate, and makes the anti-theft alarm more sensitive.

 2. Tag anti-disassembly

The tag has a strong binding to valuables, and if it is violently dismantled by thieves, an alarm will be issued.

  3. Remote management

The management system is connected to the Internet through the 3G network, and the management personnel can log in to the management system through a computer or mobile phone APP anytime and anywhere for remote management and remote monitoring.

 4. Low radiation impact

Relative to passive tags, active tags can provide energy by themselves, and the transmission power of anti-theft base stations and anti-theft tags can be made very small, which is about one-tenth of the radiation of mobile phones.

  5. Long working hours

The anti-theft tag uses wireless technology with low data volume and low power consumption, which can work for a long time, and the working time can be as long as 2 years.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare