Application scheme of FID technology in community security system

Several common problems have been found in recent theft incidents in several communities: the community security and the communication of personnel vehicles entering the community are not timely; the handling of accidents after the incident is inefficient and the effect of obtaining evidence is poor. To this end, how to properly handle and locate the information of personnel vehicles entering the community is crucial to improving the safety of the community.

At present, the security system of the community cannot realize the monitoring and positioning of all the personnel vehicles entering the community. This paper is aimed at this problem and proposes to apply the RFID technology in the security system of the community, so as to realize the entry into each community. The personnel vehicles carry out positioning and information processing to provide security for the community. This paper mainly demonstrates the feasibility of RFID technology in the community security system from the perspective of "positioning".

RFID技术在小区安防系统中的应用方案

Radio Frequency Identification (RFID) is a wireless communication technology that uses radio signals to identify specific targets and read and write related data without the need to identify mechanical or optical contact between the system and a particular target. The radio's signal is transmitted from the tag attached to the item by an electromagnetic field that is modulated into a radio frequency to automatically identify and track the item. Some tags receive energy from the electromagnetic field emitted by the recognizer when they are recognized, and do not require a battery. The tag itself has a power source and can actively emit radio waves (electromagnetic fields that are modulated into radio frequencies). The tag contains electronically stored information that can be identified within a few meters. Unlike barcodes, RF tags do not need to be within the line of sight of the recognizer, but can also be embedded within the object being tracked.

I. RFID composition and working principle

1. The system consists of three parts

(1) Label (Tas)

The tag is equivalent to a bar code symbol in the bar code technology and is used to store information that needs to be identified for transmission.

(2) Reader (Reader)

The complexity of the reader is significantly different depending on the type of tag supported and the function being completed. The basic function of the reader is to provide a way to transfer data with the tag. In addition, the reader provides fairly complex signal state control, parity error checking and correction functions.

(3) Antenna (Antenna)

The antenna is a transmitting and receiving device that transmits data between the tag and the reader.

2. Working principle

RFID technology is a technology that uses the RF signal to transmit contactless information through spatial coupling (alternating magnetic field or electromagnetic field) and automatically recognizes the transmitted information. The working principle is as follows: the radio frequency signal and the space-coupling transmission characteristic are used to realize automatic recognition of the recognized object. Working process: When the item with the electronic tag is within the readable range of the reader, the reader sends a magnetic field, the inquiry signal will activate the tag, and the tag requests the reflected signal according to the received inquiry signal, and the reader receives the signal. After the signal reflected back by the tag, the electronic data stored in the electronic tag is read and recognized by the decoding process of the internal circuit without contact, thereby achieving the purpose of automatically recognizing the object. Then, through the computer and computer network, management functions such as collection, processing and remote transmission of object identification information are realized.

RFID技术在小区安防系统中的应用方案

2. Status of community security technology

At present, the main function of the community security system is security. In order to create a safe and comfortable living environment for the residents of the community, it is necessary to have a high-standard and intelligent security system. Now most of the communities still use the patrol and duty mode of security personnel. This traditional method is inefficient and personnel. The amount of labor is large, and the factors of insecurity are not well controlled. Even if some advanced communities use advanced intelligence, they are equipped with high-quality security personnel, but these devices have the disadvantages of high price and easy man-made damage. In short, the security effect is not obvious.

3. Structural design and working process

1. Structural design

Considering the diversity and complexity of the sections through which buildings and people in the cell may pass, it is necessary to install several readers and exchange them with the computers of the monitoring center via communication lines. At the same time, an electronic tag is placed on each vehicle entering the community to monitor and locate it.

In the working process of the RFID system, data is always exchanged through a certain time series based on energy. The reader provides working energy to the electronic tag. When the electronic tag enters the RFID field, the RF wave emitted by the reader activates the tag circuit, interacts, and completes the exchange of data. For multi-tag simultaneous reading, you can use the form of the reader first, or the form of the label first.

In order to realize multi-tag conflict-free simultaneous reading, the reader first issues an isolation command to a batch of tags, so that multiple electronic tags within the reading range of the reader are isolated, and finally only one tag is kept active and the reader establishes no conflict. Communication link. For the label first-issue method, the label randomly sends its own identification lID repeatedly, and different labels can be correctly read by the reader in different time periods, and the multi-tag is read at the same time. For any electronic tag, it has a unique ID number. In most applications, the data attribute of the tag is supported by using a back-end database. The interface between the reader and the application system is represented by standard functions called by the development tool. The function roughly includes the following aspects: the application system issues configuration commands and other instructions to the reader as needed; the reader returns its current configuration state and execution results of various instructions to the application system.

RFID技术在小区安防系统中的应用方案

2. Working process

Each personnel vehicle entering the community must wear a security-issued identity card (including a personnel card and a vehicle card) when passing through the community gate. The RFID tag has a unique identification code and a user-specified designation. Information, which can be read by the reader (Reader) in a non-contact manner within a certain distance. The dynamic monitoring system based on radio frequency identification technology can perform non-contact, high-speed and accurate parallel tracking and identification of multiple target objects with radio frequency tags in a certain range at the same time, so as long as the radio frequency identification tag is placed on the personnel vehicle entering the community (usually packaged as a card, so also known as a radio frequency card), when the vehicle entering the community travels within the effective reading range of the placed reader, the reader of the system will automatically read the radio frequency held by the personnel vehicle. The ID number of the tag is identified, and then the system will transmit the lD number of the tag and related information of the personnel vehicle to the background system for processing.

RFID技术在小区安防系统中的应用方案

Feasibility analysis

After the introduction, it can be argued that the security problem that plagues the community has been solved to a large extent, and the vehicle personnel in and out of the community have been effectively identified, monitored, monitored and positioned, so that the security system of the community fully reflects the humanization and information. And highly automated, to achieve the goal of the digital community, at the same time, RFID identity card production costs are lower, less investment. Therefore, the solution of applying this technology in the community security system is feasible.

V. RFID technology in the community

Overall design in security systems

Functional design

The basic functions that RFID technology implements in personnel location management include:

1 Identification: How many people or vehicles are there at any time or in a certain location, who can fully recognize these people or vehicles;

2 Record: All the trajectories of the personnel vehicles entering the cell at any time in the cell can be recorded in the database;

3 Positioning: The community monitoring center can remotely monitor the personnel vehicles entering the community;

4 Inquiring about a series of information such as the arrival/departure time and total stay time of the personnel vehicles at any location, etc., can supervise and implement whether the important patrol personnel conduct testing and processing of various data on time and at the point, and fundamentally eliminate the cause. Related security issues caused by negligence.

5 anti-cheating: the personnel entering the community lost or discarded the identity card while driving, the monitoring center can automatically identify.

2. Design plan

Several readers are installed in the channels of the cell and the channels through which the personnel may pass, and they are exchanged data with the computers of the ground monitoring center through the communication lines. At the same time, an RFID electronic tag ID card is placed on each of the personnel vehicles entering the cell. When the personnel vehicle enters the cell, the reader will sense the signal and upload it immediately as long as it passes or approaches any reader placed in the channel. On the computer in the monitoring center, the computer can determine the specific information (such as: who, at which location, specific time), the administrator can also click on any location in the cell according to the distribution map on the big screen or on the computer. The computer will count and display the personnel situation in this area.

At the same time, once an accident occurs in the community (such as: fire, robbery, etc.), the personnel and vehicles around the accident location can be immediately detected according to the location information of the personnel in the computer, and then the detector can be used to further determine the exact location of the personnel in the accident. In order to help the public security department to rescue the distressed personnel and solve the case in an accurate and rapid manner.

3. System is completed

The information processing system is the core of the entire community security system, and is composed of a database system and a response application software system. The system can complete the functions of recording, querying and processing related information of the travel route of the personnel vehicle. For example, the travel route information of the personnel and vehicles entering the community on March 15th, 2007 can be inquired.

VI. Prospects for RFID technology

Radio Frequency Identification (RrID) has become a hot topic. According to industry insiders, the RFID technology market will bring about $30 billion to $10 billion in new products and services over the next five years. There are also huge demands for servers, data storage systems, database programs, business management software, consulting services, and other computer infrastructure. Many high-tech companies are stepping up the development of RFID-specific software and hardware, and have invested heavily in the development of this technology and solutions, including Intel, Microsoft, IBM, Oracle, SUN and other Irr giants. Recently, Wal-Mart, the world's largest retailer, has asked its top 100 suppliers to use RFID technology when sending pallets and boxes to their distribution centers. Therefore, RFID technology is becoming a hot new technology in the world.

Small 600 Puffs

Small 600 Puffs,Small 600 Puffs Reddit,Small 600 Puffs Disposable,Mini Disposable Vape 600 Puffs

Lensen Electronics Co., Ltd , https://www.lensenvape.com