RFID for tracking play an important role in asset management nowadays. While the RFID visual asset management system is an informative, intelligent and standardized system. For unified management and analysis not only RFID assets based on mutual 3D technology. But also cloud computing, big data, RFID technology, database technology, AI, and video analysis technology.
Rapaid Development
With the high-tech information industry developing. On one hand, RFID for tracking are improving production methods. On the other hand, Improving operation efficiency, reducing operating costs and improving service quality become the top priority of each company at present. While under the current management model, the account are unable to synchronize and consistent. As a result, factory left and waste a large number of assets, which seriously affected financial reports authenticity.
As a bridge between the physical world and IT system, technology can integrate the asset management activities with system. So as to achieve the synchronization of physical information and system information. Therefore, it has become possible to realize automatic management base on RFID for tracking technology.
Fixed Assets Managenemt
As an important part of corporate assets, fixed assets constitute corporate value together with corporate funds and intangible assets. The fixed assets proportion in the total value of corporate assets varies ranging from 20% to 75%. As a component of enterprise management. Due to the assets high value, long service life, scattered use locations, etc. It is not easy to achieve one-to-one correspondence between accounts, cards, and objects in actual work. More ever, work such as change, replacement, loss, inventory cleanup, etc. brings a certain degree of difficulty. Furthermore, RFID for tracking has important practical significance for the rapid development of enterprises.
Introduction to RFID
RFID is the abbreviation of Radio Frequency Identification, which is a non-contact automatic identification technology. RFID can trace back to the Second World War (around 1940). The main function at that time was for the British army to distinguish between enemy and British aircraft. In recent years, with the network communications, information security and other technologies developing. The RFID quickly applied to not only smart grid, transportation, logistics industry and medical and health. But also precision agriculture and animal husbandry, finance and service industry, industry and automatic control. What is more, in smart home, environment and safety inspection, public safety, national defense and military, smart city and other industries.
Features
Divide by frequency, we may divide RFID technology into low frequency, high frequency, ultra high frequency, active, etc. While according to frequency band, RFID technology has non-contact, fast scanning, high identification efficiency. Since it is hard to damage RFID for tracking. It is suitable for harsh environments, convenient operation, and fast reading and writing speed.
Project goal
Through using RFID technology, realize asset addition, allocation, maintenance, scrap and inventory, etc management. Futher more, improve the accuracy of asset management system data. The main goals are as follows:
Improve the timeliness and accuracy of system data.Many aspects of traditional management use manual registration, which is easy to make mistakes. Due to manual failure to register in time, the system data is not accurate enough.
Quick inventory to improve the efficiency of asset inventory
The data in the process of entering and leaving the library adopts RFID technology, which can be scanned quickly to improve management efficiency.
Provide leaders with a basis for decision-making analysis
RFID equipment monitors the asset location in real time, displays the asset location in real time, and replays the track of the asset location.
IOT
Overall system design
2.1 System application architecture
The RFID for tracking system application architecture divides into three logical levels: acquisition layer, application layer, and presentation layer.
Acquisition layer: Readers read the electronic tag data. And then transmit it to the RFID middleware system through the network and other methods.
Application layer: Base on the RFID middleware system, it build production management, maintenance and query .
Presentation layer: Users can log in to the system through ERP systems, computers, handhelds, display screens, etc.2.2 Electronic label scheme
Since the warehouse is full of metal items, we get to use use RFID anti-metal tags.
System function introduction
3.1 Daily asset management functions
It mainly includes daily work such as adding, modifying, exiting, transferring, deleting, and taking inventory of fixed assets.
3.2 Monthly Fixed Assets Report
Query classified statistical monthly (annual) reports according to conditions such as unit, department, and time. Increase fixed assets monthly report this month, decrease fixed assets monthly report this month. fixed asset depreciation monthly report (annual report), and provide printing functions.
3.3 Comprehensive Query of Fixed Assets
You can query the status of a single or a batch of fixed assets. The query conditions not only include asset cards, custody status, valid asset information, department asset statistics. But also include exit assets, transfer assets, historical assets, name specifications, start and end dates, unit or Department.
3.4 Inventory function
According to the data of the barcode handset and the data in the database. The normal or abnormal data is processed to obtain the actual situation of fixed assets.
3.5 System maintenance function
Fristly, the system administrator will perform the asset classification code table, exit method code table, purchase method code table. And storage place code table, department code table, custodian table, and unit name table. Perform operations such as adding, modifying, and deleting.
Secondly, it provide the operator with the function of modifying his own password;
Last, the system administrator can freely set the operation authority of each subordinate operator on the function.
3.6 Security Management Function
Firstly, Provide various security management methods.
Secondly, Password management function: maintain account numbers and passwords
Finally, authority control function. Divide users into different levels. And to determine the user’s authority.
3.7 Asset theft prevention
Carry out regional alarm for illegally entering and exiting assets to prevent asset loss.
System flow design
4.1 Overall process
This project mainly manages the items in the warehouse. From large items in the warehouse to single items ; And from small items to the category management.The main process is as follows
4.2 Function introduction
4.2.1 New assets
Assets addition is actually the entry of asset information. In the entry process, we use a desktop reader or handheld to initialize the tags. And then we register detailed product information (site name, asset barcode, model, etc.) in the background.
4.2.2 Asset Requisition
When a stuff requisitione an asset, we will use the RFID handheld device to scan the asset tag. And fill in the recipient and the department.
4.2.3 Return of assets
When returning the assets. Again, we simply scan asset tags. and then return the assets to the warehouse.
4.2.4 Asset allocation
The process of asset allocation needs to move the equipment from one place (room A) to another place (room B). In this process, it needs to go through two registrations of the reader. If a fixed reader is installed in the workshop, it can be collected automatically, or a handheld reader can be used. The specific process is as follows:
4.2.5 Asset maintenance
Scan the assets that need to be repaired, and the scanned assets are recorded as assets being repaired. After the repairs are completed, warehousing scans are performed.
4.2.6 Asset retirement
Obsolete assets are found at the asset obsolescence point: prepare the equipment for obsolescence and turn on the switch of the reader to make the reader in the state of reading tags. Take out the end-of-life equipment and confirm that the label is read correctly. Turn off the reader switch, and the scrapped equipment will be removed from the reader.
4.2.7 Inventory management
The general business process of inventory is as follows:
The planning department issues an inventory notice and prepares for an inventory
The warehouse manager receives the order, finds the corresponding location, starts the inventory, turns on the handheld, and scans the product RFID tag information
The scanned data is automatically transmitted to the warehouse system via wireless
After the system receives the collected information, it compares with the book data in the system to determine whether the results are consistent.
If unanimously confirm the inventory is completed
If they are inconsistent, an alarm will prompt to find out the difference between the physical object and the system data, confirm it manually, and process the difference result
4.2.8 Asset theft prevention
When an asset enters or exits the workshop gate illegally, the RFID system automatically collects asset information, generates an alarm, and manually assists in finding the cause.
4.2.9 Asset trajectory tracking
Through real-time tracking of the position of the electronic tag, the movement track of the electronic tag is automatically generated and displayed in a graphical form.
4.2.10 Asset visualization
The large screen displays real-time asset status, utilization, alarm processing, etc.