RFID Application articles

The Method of Improving the Data Reading Rate of RFID System

As we all know, RFID technology is the English abbreviation of radio frequency identification technology, which is to carry out non-contact two-way data communication through radio frequency, and use radio frequency to read and write RFID electronic tags (or radio frequency cards), so as to achieve identification goals and data exchange. Purpose. In the identification system, the reading, writing and communication of RFID electronic tags are realized through electromagnetic waves. According to the communication distance, it can be divided into near-field and far-field. For this reason, the data exchange mode between RFID read-write equipment and RFID tags is also divided into load modulation and backscatter modulation.

RFID technology can update existing data more conveniently and make work more convenient under the premise of reducing manpower, material and financial resources. However, at present, there are still many bottlenecks in the development of RFID, among which the low data reading rate is one of the main bottlenecks.

Below we combine the problems encountered in the actual application of the RFID system and the fact that there are blind spots in the reading range of the RFID Reader, redundant data at different reading points, mutual interference between RFID readers and other factors, which lead to the low reading rate of the system. To analyze the method of improving the data reading rate of the RFID system.

The main reasons for the low reading rate of the RFID system are: there is a blind area in the reading range of the reader, redundant data is Stored at different reading points, and the readers interfere with each other. In view of the above problems, we analyze from the following aspects.

1. Perfect software design

At present, the hardware facilities of the RFID system through optimized configuration can basically meet the needs of the data reading rate, and as the price of RFID readers drops, end users can easily deploy a large number of RFID readers in their application places, which It not only solves the problem of missed reading, but also can obtain more useful information from these systems.

However, the new problem that follows is: redundant data read-in or cross-data read-in (simple description: that is, 'a tag that should not be read at a certain position is read by an RFID that should not read this tag The reader reads '). Then, the LV positioning logic is more necessary in the RFID system.

The core of the LV positioning logic is based on 'picking out the required readout data from the spatial position while filtering out the unnecessary readout data'. The result is that the correct and precise tag position is extracted from the results obtained by all RFID readers. In short, LV positioning logic is a software algorithm based on eliminating 'redundant' read data based on the data set resident in the entire RFID reader system. The problem of conflicts caused by overlapping working ranges between multiple readers is well resolved.

For electronic tag collisions, in the high-frequency band, the anti-collision algorithm of tags generally adopts the classic ALOHA protocol. Tags using the ALOHA protocol avoid conflicts by choosing a method of transmitting information to the reader after a random time; in the UHF frequency band, the tree bifurcation algorithm is mainly used to avoid conflicts.

In addition, other optimization settings can be made to the software. For example, in the electronic ticket system, the scanning time interval of the RFID reader can be designed to work in a way of adaptively adjusting the scanning time through software. In the case of a large flow of people, the scanning frequency of the RFID reader can be accelerated through software control to prevent missed reading; while in the case of a small flow of people, the scanning frequency can be relatively reduced to avoid redundant data appear.

2. Reasonably optimize the hardware configuration

In terms of RFID hardware, a problem must first be clarified. That's what your real 'needs' are. Don't blindly think that 'the price is expensive, the larger the reading range, and the higher the frequency, the better'. As the so-called "tailoring clothes" and "suiting" yourself is the best. Based on this cognition, you can choose hardware devices that match your actual needs. It is very necessary to properly listen to the advice of professionals.

At the same time, consider all RFID tags and RFID readers as a complete 'data network', so as to optimize the hardware configuration reasonably, so that the entire system can maximize its effectiveness. Taking the Access Control system as an example, in order to prevent the blind area in the reading range of the RFID reader, resulting in missed readings, it is possible to compensate for the blind area in the reading range of the reader by increasing the number of RFID readers or RFID Antennas. defects or directly purchase the RFID channel access control that has been integrated with the equipment; in order to prevent mutual interference between readers, the method of relatively isolating RFID readers or RFID antennas in space can be adopted to avoid mutual interference. In addition, according to actual needs, the data reading rate of the RFID system can also be improved by properly adjusting the antenna layout and antenna transmission power.

3. Integrating other technologies

a. Integration with WIMAX, 4G, GPS, Beidou and other communication technologies

The integration of WIMAX, 4G, GPS, Beidou and RFID technology is constantly advancing with the active participation of all parties. RFID tags have the characteristics of small size, large capacity, long life, and reusability, and can support fast reading and writing, non-contact identification, mobile identification, multi-target identification, positioning and long-term tracking management. Cost savings and efficiency improvements have made RFID technology an important entry point for various industries to realize informatization. They will build a wireless broadband network that can meet the needs of various application environments and generate rich applications, expanding the application field of RFID technology.

b. Fusion with sensor technology

In the next few years, an important application trend of RFID technology is the combination of RFID and sensors, which has already begun to be implemented (such as RFID temperature measurement labels, RFID sound and light labels...). Due to the poor anti-interference ability of RFID, and the effective distance is generally less than several 10m, this is a limitation for its application. Combining WSN (wireless sensor network) with RFID and using the former's effective radius of up to 100m to form a WSID network will greatly make up for the shortcomings of the RFID system itself.

c. Fusion with biometric recognition

Biometric identification technology is a solution that uses automatic technology to measure its physical characteristics or personal behavior characteristics for identity verification, and compares these characteristics or characteristics with the template data in the database to complete the authentication. The biometric system captures a sample of biometrics, and unique features are extracted and converted into digital symbols, which are stored as an individual's signature template. People interact through identification systems, authenticating their identities, to determine a match or a mismatch. Currently commonly used biometric identification technologies include fingerprint, palmprint, face, voice, retina, signature recognition and so on.

In short, the integration of RFID system and other technologies is imperative, and great results have been achieved so far. Solving the problem of low reading rate of RFID system data will definitely make RFID technology widely adopted, and eventually it will be as deep as barcode technology and gradually extended to all aspects of various industries, which will play a key role in improving the operating efficiency and economic benefits of the industry sexual effect.


Scan the qr codeclose
the qr code