Beijing Landwell Electron Technology Co. LTD LW19990824 Manuel D’Utilisation
checkpoint tag stands for a patrol point, which is placed
at the patrol site or equipment. Through software the
information tag can be setup as different checkpoint
name which it relates to.
1.3)b
personnel tag: this is the patrol man‘s ID tag.
Some tasks are carried out according to group of patrol
man. Every group shares one reader. Every patrol man
carries his own personnel tag so a reasonable patrol
performance check is attainable.
1.4)
Software management system ──── it analyzes
the related data uploaded and after data processing, it
offers detailed patrol report. The software will match the
patrol report with plan, and correctly process the patrol
result data.
2. Hardware Directions
2.1) Patrol reader: when patrol man reaches the
planned site, he presents the reader head to the
checkpoint tag within 5cm distance (the tag frequency
decides the distance).When the reader sends out
"beep" sound and the LED lights 3 times(the same tag
cannot be reread continuously with the same reader.
One minute is the minimum interval before reread. The
LED will light once when reread without proper time
interval ),it means the data is collected to the reader
successfully.
2.2) Communication line: connect communication line
USB head to the computer USB port, the other side to
the reader corresponding port.
2.3) Information tag: first stir super glue(like AB glue)
evenly at the rate of 1:1,spread it on the back of the
patrol tag. Paste the patrol tag to the patrol point(like the
surface of cement ,hard brick wall or other strong object.
Choose flat surface before pasting the tag. If the surface
is coarse, use sand paper to polish it.)
3. Software Setup and Usage
Please read the software manual carefully before
software installation. Familiarize with the software step
by step. The software
administer’s access is Admin, the
default pin is 333.
3.1) Information tag setup: operate according to
software requirement and the client demands :patrol
record upload
——first clear the old data in the reader
through communication line.(by transmitting the data to
computer after connecting reader with computer ,the
reader's stored data is cleared. The data can be
retransmitted to software if the reader does not read
new tag. If new tag is read, the new data will cover all
the old data and it becomes the first new data
record).Then use this reader to read all the checkpoint
tags in order. Now upload these data to the related
checkpoint setup or personnel setup.
Specific operation method is as follows
a Plan setup: According to the client's situation, setup
the patrol route points, where the patrol tags will be
fixed.
b Tag reading: after checkpoint tag is installed, use the
reader without data to read all the tags once, then
upload the data to the checkpoint setup from software.
Edit the checkpoint name following the reading order.
Another way is before checkpoint tag installation, use
reader to collect all the tags’ ID number. It is better to
reader to collect all the tags’ ID number. It is better to
write down the ID number by its last 5 to 6 digits
together with the point name it stands for. This is to
link the tag ID number in the software with the
checkpoint tag.
System Installation and Usage Considerations
1) Let the reader's LED face you. Hold the reader like
a pen with hand and arm at a 90 degree angle.
2) Place the patrol reader with the checkpoint tag
surface at a 45 degree angle. When the reader's LED
lights 3 times and the beeper sounds, data collection is
done. (If it is noisy on site, you can reread the tag to
make sure data is collected. If the LED lights once, it
shows the first time reading is successful.)
3) Please transmit correct tag ID number for
checkpoint and personnel setup, and input correct name
for each checkpoint and personnel. Each tag number
and related checkpoint or personnel is unique. One
information tag can only be setup as a checkpoint or
personnel tag, it cannot be both at the same time.
4) If the data collected are less than 10,000 pieces
after patrol, all the data can be uploaded through the
communication line. The data will automatically be
cleared during transmittance. The reader can transmit
the data again if it does not read new data. This function
avoids data loss if problem occurs.
5) Do not read data more than the reader's capacity