20 years manufacturer of hospital furniture
In an effort to provide a high quality basic hospital equipment, we have joined together some of the best and the brightest people in our company. We mainly concentration on the quality assurance and every team member is responsible for it. Quality assurance is more than just checking the parts and components of the product. From the design process to testing and volume production, our dedicated people try their best to ensure the high quality product through obeying standards.
Made of the well-selected raw materials from our reliable long-term suppliers, our medical equipment manufacturer is of superior quality assurance. Produced by our sophisticated craftsmanship, the product has the advantages of good durability and high economic value, as well as scientific design. By utilizing state-of-the-art production concepts and technologies, we have successfully saved manpower and resources through rational planning, therefore, it is also very competitive in its price.
Through qtjadx3f, we offer responsive service and cost-effective basic hospital equipment. Our priority is to build a relationship with each customer by listening and responding to their individual needs. We have experienced professionals consistently striving to deliver exceptional value on every product on this website.
Application of DICOM standard in portable medical equipment1 IntroductionRadio frequency refers to the electromagnetic wave with a certain wavelength that can be used for radio communication. Radio frequency identification technology is a non-contact automatic identification technology rising in the 1990s. It uses the transmission characteristics of radio frequency signal and spatial coupling (inductive or electromagnetic coupling) or radar reflection to realize the automatic identification of the identified object. However, at present, there are still many bottlenecks in the development of RFID, and the low data reading rate is one of the main bottlenecks.
This paper will analyze the RFID system by introducing the basic composition and working principle of the RFID system. Combined with the problems encountered in the practical application of RFID system and the reasons for the low reading rate of the system due to the blind area in the reading range of readers, redundant data in different reading points, mutual interference of readers and other factors, this paper puts forward from the following aspects: reasonably optimizing the hardware configuration, perfecting the software design Play the role of middleware and integrate other technologies to improve the data reading rate of RFID system.
2. Basic composition of RFID systemRFID system at least consists of electronic tag (e-tag / transponder, also known as smart tag) and reader (reader / interleaver, also known as reader / writer).Electronic tag is the data carrier of RFID system. Electronic tag is composed of tag antenna and tag special chip. Electronic tags are divided into active tag, passive tag and semi passive tag according to different power supply modes; It can be divided into low-frequency electronic tag, high-frequency electronic tag, UHF electronic tag and microwave electronic tag according to different frequencies; It is divided into * label, linear label, paper label, glass tube label, circular label and special-purpose special-shaped label according to different packaging forms; According to their different working modes, they are divided into active tags and passive tags.
Reader is a device used to read or write electronic tag information. It can be designed into many kinds of products according to specific use environment and requirements. The reader communicates with the electronic tag wirelessly through the antenna, which can read or write the electronic tag identification code and memory data.A typical reader consists of a high frequency module (transmitter and receiver), a control unit, and a reader antenna. Of course, RFID system needs the support of computer and other hardware equipment and software in practical application. Figure 1 shows the composition of a typical RFID system.3 basic model of RFID system
The basic model of RFID system is shown in Figure 2. As the radio frequency carrier, the electronic tag and the reader realize the spatial (contactless) coupling of the radio frequency signal through the coupling element. In the coupling channel, the energy transmission and data exchange are realized according to the timing relationship.Discussion on reading rate of RFID systemThrough the introduction of RFID system, we believe that the main reasons for the low reading rate of RFID system are: there are blind areas in the reading range of readers, redundant data in different reading points, mutual interference of readers, etc. In view of the above problems, we discuss them from the following four aspects.
4.1 reasonably optimize hardware configurationIn terms of hardware, we must first clarify a problem. That's what you really need. Don't blindly think that "the price is expensive, the larger the reading range and the higher the frequency, the better". It is the so-called "tailor-made" that "what suits you" is the best. Based on this understanding, you can choose hardware devices that meet the actual needs.
At the same time, consider all RFID tags and readers as a complete "data network", so as to reasonably optimize the hardware configuration, so as to maximize the efficiency of the whole system. Taking the access control system as an example, in order to prevent the blind area in the reading range of the reader, resulting in missing reading, the number of readers or antennas can be increased to compensate for the defect of blind area in the reading range of the reader; In order to prevent mutual interference between readers, the method of relatively isolating readers or antennas in space can be adopted to avoid mutual interference. In addition, according to the actual needs, the data reading rate of RFID system can also be improved by properly adjusting the antenna layout and antenna transmission power.
4.2 improve software designAt present, the hardware facilities of the optimized RFID system can basically meet the needs of data reading rate. With the decline of reader price, end users can easily deploy a large number of readers in their application sites, which not only solves the problem of missing reading, but also obtains more useful information from these systems. But the new problem is: redundant data reading or cross data reading. A simple description of this problem is that "a tag that should not be read in a certain position is read by a reader that should not read this tag".The core of LV positioning logic is based on "picking out the required readout data from the spatial location and filtering out the unnecessary readout data". The result is that the correct and accurate tag position is extracted from the results obtained by all RFID readers. In short, LV positioning logic is a software algorithm based on eliminating "redundant" readout data according to the data set resident in the whole reader system. Colorwave algorithm gives a good solution to the conflict between multiple readers due to overlapping work ranges.
For electronic tag collision, in the high frequency band, the classical ALOHA protocol is generally used as the tag anti-collision algorithm. The tag of ALOHA protocol is used to avoid conflict by selecting the method of transmitting information to the reader after a random time; In UHF band, tree bifurcation algorithm is mainly used to avoid conflict. In addition, other optimization settings can be made for the software. For example, in the e-ticket system, the scanning time interval of the reader can be designed by software to adaptively adjust the scanning time. In case of large traffic, the scanning frequency of the reader can be accelerated through software control to prevent missing reading; In the case of less traffic, the scanning frequency can be relatively reduced, so as to avoid the emergence of redundant data.
4.3 play the role of MiddlewareRFID middleware is the nerve center in various RFID industrial applications. RFID middleware is a message oriented middleware (MOM). Information is transmitted from one program to another or more programs in the form of messages. RFID middleware plays an intermediary role between RFID tags and applications. From the application side, it uses a set of general application program interfaces (APIs) provided by the middleware, that is, it can connect to the reader and read tag data.Therefore, even if the database software or back-end application program storing RFID tag information is added or replaced by other software, or even the type of RFID reader is increased, the application end does not need to be modified. This not only effectively solves the problem of data reading rate, but also saves other problems such as the maintenance complexity of many to many connections. RFID middleware will have very good development prospects in service-oriented architecture (SOA) and business information security applications in the future.
4.4 integration of other technologiesIntegration with sensor technologyIn the next few years, an important application trend of RFID is the equipment that combines RFID with sensors (such as sensors for measuring temperature and pressure). At present, it has been implemented abroad. Because RFID has poor anti-interference and the effective distance is generally less than 10m, its application is limited. Combining WSN (Wireless Sensor Network) with RFID and using the effective radius of the former up to 100m to form wsid network will greatly make up for the shortcomings of RFID system itself.
Integration with WiMAX, 3G, GPS and other communication technologiesWiMax (global interoperability for microwave access) is simply defined as a wireless broadband data transmission system. The wireless service range of WiMAX can be as far as several kilometers under the condition of maintaining high data traffic in urban areas. Its performance far exceeds the existing wireless network technology. In directional communication connection, the service range can reach 50 km under the condition of maintaining certain data traffic. Due to its extremely high performance, WiMAX technology is considered to be the best backup scheme for DSL UMTS connection.
The integration of WiMAX, 3G, GPS and RFID is moving forward with the active participation of all parties. RFID tag has the characteristics of small volume, large capacity, long service life and reusable. It can support fast reading and writing, non visual identification, mobile identification, multi-target identification, positioning and long-term tracking management. The cost saving and efficiency improvement promote RFID technology to become an important entry point for various industries to realize informatization. They will build a wireless broadband network that can meet the needs of a variety of application environments and generate rich applications, expanding the application field of RFID technology.
Fusion with biometricsBiometric recognition technology is a solution to complete authentication by using automatic technology to measure their physical characteristics or personal behavior characteristics, and comparing these characteristics with the template data in the database. The biometric recognition system captures the samples of biometrics, and the unique features will be extracted and transformed into digital symbols, which are stored as personal feature templates. People interact with the identification system to authenticate their identity to determine whether they match or do not match. At present, the commonly used biometric recognition technologies include fingerprint, palmprint, face, voice, retina, signature recognition and so on.In short, the integration of RFID system with other technologies is imperative, and great achievements have been made. It solves the problem of low data reading rate of RFID system, which will inevitably make RFID technology widely used. Finally, it will go deep as bar code technology and slowly extend to all aspects of various industries, which plays a key role in improving operation efficiency and economic benefits of the industry, so as to promote a new leap in the global economy and have a far-reaching impact on human society.
5 Conclusion
On the whole, the development of RFID system will be better and better in the future. Although there are still some technical and application problems such as low reading rate, we believe that it is not difficult to overcome the current problems of RFID through a series of measures such as optimizing hardware configuration, improving software design, playing the role of middleware and integrating other technologies. Under the strong market orientation, RFID technology will cause a major change all over the world. It will become a new economic growth point in the future, and will eventually become the largest information technology support for the development direction of Chinese enterprises. It can be predicted that in the near future, as a global manufacturing base, China will be the world's largest RFID application market in the future. This will be a rare opportunity for domestic scientific research institutions and enterprises.
With the rapid development of hospitals, the demand for medical equipment in hospitals is increasing. Modern medical equipment has become a medical equipmentIt is an important symbol of hospital modernization and a powerful means for major hospitals to participate in market competition. In order to improve the medical level and market competitiveness, more and more high-quality, precision and advanced medical equipment have been put into use, which has continuously promoted the development of advanced medical technology.However, the use of high-end medical equipment also brings new challenges to doctors due to complex operation. In the use of equipment, doctors often need the technical personnel of the equipment manufacturer to give operation guidance. Moreover, the manufacturer may have to send technical personnel to the hospital site for equipment update and maintenance, which will not only consume a lot of time and labor cost, but also affect the normal use of the hospital and delay the timely treatment of patients.
Facing the needs of real-time operation guidance and efficient operation and maintenance of medical equipment, aiming at the hospital private network environment and domestic well-known remote control brand sunflower, a physical layer remote control solution - control A2 is given.
The deployment of control A2 is simple and easy to use. Just connect the power supply to the control, connect one end of the USB data cable provided by the control to the control usb-b interface, and the other end to the medical equipment (virtual mouse and keyboard function), connect the HDMI adapter line to the control and medical equipment (output the master image of the controlled equipment), and then connect it to the control A2 through the hospital external network special line or 4G network card, After the medical equipment end is ready, the manufacturer's technicians only need to install the sunflower remote control software and remotely connect the control through the functions of [desktop control], [camera], [SSH] to realize the efficient remote operation and maintenance and operation guidance of the medical equipment.
Flexible Internet access, not limited by the hospital's private networkSunflower control A2 supports three networking modes: wired, WiFi and 4G network card, which does not change the network environment of medical equipment. Whether it is connected to the network cable or connected to the Internet through WiFi or network card, it is control A2 that receives the network signal, which is independent of the medical equipment network and gets rid of the problem of limited hospital network.Plug and play, the hospital controls the use right
As a pure hardware external remote control tool, control A2 is small and exquisite, plug and play. If doctors need operation and maintenance troubleshooting in case of operation problems or equipment faults, they only need to connect control A2 to the medical equipment and notify the manufacturer's technicians for remote connection. After use, the hospital can unplug the control in time. The whole process is led by the hospital to ensure the safety of medical information.High compatibility, not limited by equipment systemControl A2 is the physical layer link of intelligent hardware. It does not need to install any software and is compatible with a variety of operating systems. No matter what operating system is used for medical equipment, it is not limited by the system and can quickly realize intelligent remote control.
With camera and whiteboard, remote guidance is more convenientThe USB interface of control A2 supports an external camera. In the remote operation guidance, the camera can help the technicians of the equipment manufacturer understand the operation details of the doctor in real time and help the technicians better carry out remote guidance; In particular, with the sunflower remote control software, the "whiteboard" function can be opened in the remote control, and the operation demonstration can be carried out through the whiteboard, so that technicians can solve the operation problems more conveniently and intuitively when guiding doctors to operate the equipment remotely.Cross platform use, mobile phone / tablet / PC remote operation anytime, anywhere
Sunflower supports flexible login on mobile phones, iPads, PCs and other platforms. No matter where the technicians are, they can quickly log in to the sunflower control terminal through their portable devices as long as they have a network, so as to provide doctors with remote operation guidance and equipment operation and maintenance in real time.It is worth mentioning that the sunflower data transmission adopts AES / RSA 256 bit asymmetric algorithm encryption and double authentication of user information, which realizes the encryption protection of user information and session, and comprehensively ensures the information security of the hospital.Through the sunflower control A2 solution, medical equipment manufacturers have perfectly solved the problems of remote operation and maintenance and operation guidance of medical equipment. Control A2 is simple and easy to use, with low cost, greatly saving operation and maintenance cost, and the deployment is flexible and highly controllable, meeting the strict requirements of the hospital for safety problems and realizing mutual benefit and win-win.
Moreover, as a powerful physical layer remote control hardware, sunflower control A2 has been successfully practiced in the fields of remote consultation, remote operation live broadcast, remote operation and maintenance of medical information management system, and provides a simple, easy-to-use, safe and reliable low-cost solution for telemedicine.About sunflower remote control
Sunflower is the only remote control service provider with integrated software and hardware in China. It has been deeply engaged in the remote industry for more than 10 years. It has independently developed sunflower remote control software and a variety of intelligent hardware such as start-up stick, start-up socket and control. It crosses the mainstream operating system and penetrates all kinds of complex network environment to provide safe, efficient and Stable customized full surround remote control solution; With a high degree of technological innovation ability, it has pressed similar products at home and abroad, provided high-quality remote control services for 120 million hosts, 30 million users and 50000 enterprises, and reached cooperation with well-known government and enterprise institutions such as Changhong, Huawei, Midea, China Communications, Chinese Academy of Sciences, Peking University and Shanghai Jiaotong University, which has been highly recognized by the majority of users.
Application of DICOM standard in portable medical equipment1 IntroductionRadio frequency refers to the electromagnetic wave with a certain wavelength that can be used for radio communication. Radio frequency identification technology is a non-contact automatic identification technology rising in the 1990s. It uses the transmission characteristics of radio frequency signal and spatial coupling (inductive or electromagnetic coupling) or radar reflection to realize the automatic identification of the identified object. However, at present, there are still many bottlenecks in the development of RFID, and the low data reading rate is one of the main bottlenecks.
This paper will analyze the RFID system by introducing the basic composition and working principle of the RFID system. Combined with the problems encountered in the practical application of RFID system and the reasons for the low reading rate of the system due to the blind area in the reading range of readers, redundant data in different reading points, mutual interference of readers and other factors, this paper puts forward from the following aspects: reasonably optimizing the hardware configuration, perfecting the software design Play the role of middleware and integrate other technologies to improve the data reading rate of RFID system.
2. Basic composition of RFID systemRFID system at least consists of electronic tag (e-tag / transponder, also known as smart tag) and reader (reader / interleaver, also known as reader / writer).Electronic tag is the data carrier of RFID system. Electronic tag is composed of tag antenna and tag special chip. Electronic tags are divided into active tag, passive tag and semi passive tag according to different power supply modes; It can be divided into low-frequency electronic tag, high-frequency electronic tag, UHF electronic tag and microwave electronic tag according to different frequencies; It is divided into * label, linear label, paper label, glass tube label, circular label and special-purpose special-shaped label according to different packaging forms; According to their different working modes, they are divided into active tags and passive tags.
Reader is a device used to read or write electronic tag information. It can be designed into many kinds of products according to specific use environment and requirements. The reader communicates with the electronic tag wirelessly through the antenna, which can read or write the electronic tag identification code and memory data.A typical reader consists of a high frequency module (transmitter and receiver), a control unit, and a reader antenna. Of course, RFID system needs the support of computer and other hardware equipment and software in practical application. Figure 1 shows the composition of a typical RFID system.3 basic model of RFID system
The basic model of RFID system is shown in Figure 2. As the radio frequency carrier, the electronic tag and the reader realize the spatial (contactless) coupling of the radio frequency signal through the coupling element. In the coupling channel, the energy transmission and data exchange are realized according to the timing relationship.Discussion on reading rate of RFID systemThrough the introduction of RFID system, we believe that the main reasons for the low reading rate of RFID system are: there are blind areas in the reading range of readers, redundant data in different reading points, mutual interference of readers, etc. In view of the above problems, we discuss them from the following four aspects.
4.1 reasonably optimize hardware configurationIn terms of hardware, we must first clarify a problem. That's what you really need. Don't blindly think that "the price is expensive, the larger the reading range and the higher the frequency, the better". It is the so-called "tailor-made" that "what suits you" is the best. Based on this understanding, you can choose hardware devices that meet the actual needs.
At the same time, consider all RFID tags and readers as a complete "data network", so as to reasonably optimize the hardware configuration, so as to maximize the efficiency of the whole system. Taking the access control system as an example, in order to prevent the blind area in the reading range of the reader, resulting in missing reading, the number of readers or antennas can be increased to compensate for the defect of blind area in the reading range of the reader; In order to prevent mutual interference between readers, the method of relatively isolating readers or antennas in space can be adopted to avoid mutual interference. In addition, according to the actual needs, the data reading rate of RFID system can also be improved by properly adjusting the antenna layout and antenna transmission power.
4.2 improve software designAt present, the hardware facilities of the optimized RFID system can basically meet the needs of data reading rate. With the decline of reader price, end users can easily deploy a large number of readers in their application sites, which not only solves the problem of missing reading, but also obtains more useful information from these systems. But the new problem is: redundant data reading or cross data reading. A simple description of this problem is that "a tag that should not be read in a certain position is read by a reader that should not read this tag".The core of LV positioning logic is based on "picking out the required readout data from the spatial location and filtering out the unnecessary readout data". The result is that the correct and accurate tag position is extracted from the results obtained by all RFID readers. In short, LV positioning logic is a software algorithm based on eliminating "redundant" readout data according to the data set resident in the whole reader system. Colorwave algorithm gives a good solution to the conflict between multiple readers due to overlapping work ranges.
For electronic tag collision, in the high frequency band, the classical ALOHA protocol is generally used as the tag anti-collision algorithm. The tag of ALOHA protocol is used to avoid conflict by selecting the method of transmitting information to the reader after a random time; In UHF band, tree bifurcation algorithm is mainly used to avoid conflict. In addition, other optimization settings can be made for the software. For example, in the e-ticket system, the scanning time interval of the reader can be designed by software to adaptively adjust the scanning time. In case of large traffic, the scanning frequency of the reader can be accelerated through software control to prevent missing reading; In the case of less traffic, the scanning frequency can be relatively reduced, so as to avoid the emergence of redundant data.
4.3 play the role of MiddlewareRFID middleware is the nerve center in various RFID industrial applications. RFID middleware is a message oriented middleware (MOM). Information is transmitted from one program to another or more programs in the form of messages. RFID middleware plays an intermediary role between RFID tags and applications. From the application side, it uses a set of general application program interfaces (APIs) provided by the middleware, that is, it can connect to the reader and read tag data.Therefore, even if the database software or back-end application program storing RFID tag information is added or replaced by other software, or even the type of RFID reader is increased, the application end does not need to be modified. This not only effectively solves the problem of data reading rate, but also saves other problems such as the maintenance complexity of many to many connections. RFID middleware will have very good development prospects in service-oriented architecture (SOA) and business information security applications in the future.
4.4 integration of other technologiesIntegration with sensor technologyIn the next few years, an important application trend of RFID is the equipment that combines RFID with sensors (such as sensors for measuring temperature and pressure). At present, it has been implemented abroad. Because RFID has poor anti-interference and the effective distance is generally less than 10m, its application is limited. Combining WSN (Wireless Sensor Network) with RFID and using the effective radius of the former up to 100m to form wsid network will greatly make up for the shortcomings of RFID system itself.
Integration with WiMAX, 3G, GPS and other communication technologiesWiMax (global interoperability for microwave access) is simply defined as a wireless broadband data transmission system. The wireless service range of WiMAX can be as far as several kilometers under the condition of maintaining high data traffic in urban areas. Its performance far exceeds the existing wireless network technology. In directional communication connection, the service range can reach 50 km under the condition of maintaining certain data traffic. Due to its extremely high performance, WiMAX technology is considered to be the best backup scheme for DSL UMTS connection.
The integration of WiMAX, 3G, GPS and RFID is moving forward with the active participation of all parties. RFID tag has the characteristics of small volume, large capacity, long service life and reusable. It can support fast reading and writing, non visual identification, mobile identification, multi-target identification, positioning and long-term tracking management. The cost saving and efficiency improvement promote RFID technology to become an important entry point for various industries to realize informatization. They will build a wireless broadband network that can meet the needs of a variety of application environments and generate rich applications, expanding the application field of RFID technology.
Fusion with biometricsBiometric recognition technology is a solution to complete authentication by using automatic technology to measure their physical characteristics or personal behavior characteristics, and comparing these characteristics with the template data in the database. The biometric recognition system captures the samples of biometrics, and the unique features will be extracted and transformed into digital symbols, which are stored as personal feature templates. People interact with the identification system to authenticate their identity to determine whether they match or do not match. At present, the commonly used biometric recognition technologies include fingerprint, palmprint, face, voice, retina, signature recognition and so on.In short, the integration of RFID system with other technologies is imperative, and great achievements have been made. It solves the problem of low data reading rate of RFID system, which will inevitably make RFID technology widely used. Finally, it will go deep as bar code technology and slowly extend to all aspects of various industries, which plays a key role in improving operation efficiency and economic benefits of the industry, so as to promote a new leap in the global economy and have a far-reaching impact on human society.
5 Conclusion
On the whole, the development of RFID system will be better and better in the future. Although there are still some technical and application problems such as low reading rate, we believe that it is not difficult to overcome the current problems of RFID through a series of measures such as optimizing hardware configuration, improving software design, playing the role of middleware and integrating other technologies. Under the strong market orientation, RFID technology will cause a major change all over the world. It will become a new economic growth point in the future, and will eventually become the largest information technology support for the development direction of Chinese enterprises. It can be predicted that in the near future, as a global manufacturing base, China will be the world's largest RFID application market in the future. This will be a rare opportunity for domestic scientific research institutions and enterprises.