
One,
Complete models. Brand models of
solar high-power inverters are very complete, especially some big brands will introduce new products every year, in order to enable their brands to occupy the market advantage, and the practicability of high-quality equipment will certainly be stronger. Moreover, the models of major brands are very complete. We need inverters of any style, which can be purchased directly without worrying about shortage.
fiberisolator 發表在 痞客邦 留言(0) 人氣(0)
fiberisolator 發表在 痞客邦 留言(0) 人氣(2)

RFID is a non-contact automatic identification technology. This technology was born during the Second World War and is mainly used to identify aircraft.
fiberisolator 發表在 痞客邦 留言(0) 人氣(0)
1: The core function of the solar controller is to charge and discharge the battery in the solar power system. One is to prevent the battery from overcharging, causing the battery to be overfilled and damaged or exploding. The second is to prevent the battery from being over-discharged, so that the battery can not be charged, resulting in failure to be damaged or invalid.
fiberisolator 發表在 痞客邦 留言(0) 人氣(2)

The bank belongs to the state's key security and prevention units, and has the characteristics of various scales, numerous important facilities, complicated personnel, and a wide range of management areas. As the main circulation place of today's social currency and an important part of the national economic operation, the bank's business involves a large amount of cash, securities and valuables.
fiberisolator 發表在 痞客邦 留言(0) 人氣(1)

Newborn babies are born every day in the hospital, and this new life is the most precious property for every family and parent. According to the statistics report of the medical department, the incidents of baby miscarriage and theft in the maternity hospital have occurred.
RFID baby identification anti-theft system is safe and reliable, not only has comprehensive regional monitoring, including real-time positioning and tracking of tags and regional positioning of events, but also has a fast response rate of alarm events.
Baby and mother wear wristbands, baby wristbands contain active
long-range RFID tags, and mother wristbands contain source short-range RFID tags. The baby's active RFID is used by the system to identify its range of activity, and the close-up examination of the infant and mother uses a
handheld RFID reader to visually identify the pairing relationship.
A card reader is arranged in the activity space for collecting information about the baby. A
fixed RFID reader (adjustable distance, 3-8 m) is installed in each room where the baby is located, and a long-distance card reader (distance is 20 m) is installed in the aisle corridor. Each baby wristband information is automatically uploaded to the application management subsystem for data processing; at important peripheral channels, it is designed to be accessible only to authorized personnel. Maximize the elimination of unrelated people in and out.
In terms of neonatal management, the hospital can not only monitor the position of the baby wearing the anti-theft tag in real time, track and record the movement of the baby, but also implement monitoring and protection more effectively, and can immediately locate the event when an alarm event occurs and stop the theft incident in time.
fiberisolator 發表在 痞客邦 留言(0) 人氣(0)

When using the existing
RFID Demo software, the length of the read operation cannot exceed 255 words, which is 510 bytes. This is also the upper limit of the amount of data read by Gen2. Reading too much data at a time will also cause the performance of the reading to be unstable. In fact, reading 128 words at a time is not stable. This is related to the performance of the specific label. When actually doing the project, it should be sufficient. After testing, choose an appropriate value as the number of single reads and writes.
There are a lot of UHF RFID tags in the user area, such as 1K bytes, how to read the large-capacity data area? There are two ways to read 1K bytes of data as an example:
Call the readWait SYNC API 4 times, reading 128 words each time;
ReadWait offset=0, size=128 words;
ReadWait offset=128, size=128 words;
ReadWait offset=256, size=128 words;
ReadWait offset=384, size=128 words;
Call the “Actions.TagAccess.Operation Sequence.performSequence” ASYNC API multiple times (recommended this way - good performance)
fiberisolator 發表在 痞客邦 留言(0) 人氣(9)

By putting the license plate number of the transport vehicle into the RFID electronic tag, when the transport vehicle enters various transport nodes such as intersections, unloading yards, yards, warehouses, etc., it can be carried out by an
RFID card reader installed above the road. Reading, completely out of manual intervention, improves the speed and accuracy of vehicle traffic counting.
Compared with the license plate recognition technology of video and image processing, RFID-based vehicle recognition has high accuracy and is not easily affected by the environment, and can accurately and comprehensively acquire vehicle information.
The electronic tag is pre-written with the basic information of the vehicle through the card issuing management system, such as the vehicle ID, the license plate number, the owner, the fleet, and the like. The RFID tags are installed on the vehicle windshield of all the entrances and exits, and the vehicle has a unique ID card. The
UHF RFID antenna system is installed at all intersections, roads, etc. where it is necessary to identify the electronic license plate.
Electronic license plate (R F I D tag) The passive card in the U H F (902 ~ 928MHz) frequency band can be used for long-term maintenance and repeated use. The electronic license plate is mounted on the front windshield of the vehicle by anti-disassembly technology, which forms a unique correspondence with the vehicle and becomes the only electronic identity mark of the vehicle. The identity information of the vehicle is strictly fixed in the vehicle.
fiberisolator 發表在 痞客邦 留言(0) 人氣(0)

From the perspective of technological development, high-frequency technology is relatively mature than UHF technology. Through continuous improvement and improvement, a learning curve model for high-frequency tag production, data protocol sharing, and the basis for constructing RFID applications has also been established.
Both high frequency and ultra high frequency RFID systems rely heavily on the communication environment between the
RFID reader and the tag. UHF uses the principle of electromagnetic emission and is therefore more susceptible to electromagnetic interference. At the same time, the metal will reflect the signal, and the water will absorb the signal, all of which will interfere with the normal function of the tag.
The International Organization for Standardization/International Electrotechnical Commission established the ISO/IEC, 15693 standard in 1999 to regulate the implementation of high frequency radio frequency identification technology. The standards for UHF are not so uniform, and the frequencies used in different countries are not the same. The UHF designated by the EU is 865~868MHz, the United States is 902~928MHz, India is 865~867MHz, Australia is 920~926MHz, Japan is 952~954MHz.
The European Telecommunications Standards Institute (ETSI) EN300-220 specification has two main provisions that are less favorable for UHF. One is about the power limitation, which stipulates that the effective radiated power is 500 mW; the second is about the bandwidth limitation, and as a result, the reader cannot be frequency hopped.
fiberisolator 發表在 痞客邦 留言(0) 人氣(3)

Radio Frequency Identification (RFID) is a non-contact, automatic identification technology. The car security anti-theft system uses radio frequency identification technology to automatically identify the target object and obtain relevant data through the radio frequency signal. RFID technology uses RF transmission to read chip data through external materials for non-contact operation.
Communication data uses an encryption algorithm to encrypt data for secure data storage, management, and communication. With the rapid development of electronic technology, the integration of electronic chips has increased, and the cost of
RFID systems has been continuously reduced, accelerating the promotion and application of intelligence in the automotive electronics industry.
Taking a four-tire car as an example, the system consists of four tire modules, one
RFID reader module and one base station module. The base station module includes an RF receiver, an LF transceiver, a central control part, a human-machine interface, and is used for transmission. Ignition, gated command of the Automotive Area Interconnect Network (LIN) bus.
The four tire modules are installed in the four tires of the car, and the pressure, temperature and battery voltage parameters of each tire are measured in real time, and the measured data is sent to the base station module for processing by RF communication. The base station module receives RF data from the tire module on the one hand, and further determines whether the tire parameters are normal, and performs real-time alarm if an abnormality is found.
fiberisolator 發表在 痞客邦 留言(0) 人氣(0)