[0021] Hereinafter, the present invention will be described in detail with reference to the drawings and in conjunction with the embodiments. It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict.
[0022] figure 1 It is a schematic diagram of an ancient building monitoring and protection system based on RFID technology provided by a preferred embodiment of the present invention. Such as figure 1 As shown, the ancient building monitoring and protection system based on RFID technology provided by the preferred embodiment of the present invention includes a collection device 1, a reader 2, a server 3, and a client 4. The collection device 1 is connected to the reader 2 in a short-range wireless manner. The reader 2 and the client 4 are connected to the server 3 respectively. Wherein, the collection device 1 is installed on an ancient building and includes a sensor module 11 and an RFID tag 12, and the sensor module 11 is connected to the RFID tag 12.
[0023] Specifically, the sensor module includes a temperature sensor, a humidity sensor, a pressure sensor, and a level sensor. Among them, the temperature sensor refers to a sensor that can sense temperature and convert it into a usable output signal. It is divided into two categories: contact type and non-contact type. The temperature sensor described in this embodiment is a contact type temperature sensor to sense the temperature of ancient buildings. The change. The humidity sensor covers a specific part with a film made of moisture-sensitive material. When water vapor in the air is adsorbed on the moisture-sensitive film, the resistivity and resistance value of the element will change, that is, the output of the sensor will change. When changes occur, this feature can be used to measure the humidity of ancient buildings. In this embodiment, both the pressure sensor and the level sensor adopt existing products, and their working principles are already mature technologies in the industry, so they will not be detailed here.
[0024] In this embodiment, the RFID tag is a passive RFID tag, which has the advantage of being small in size and will not disrupt the harmony and unity of the ancient architectural style, and it has a metal coil that generates electrical energy through electromagnetic induction to supply its own electrical energy consumption. In ancient buildings, an RFID tag is installed every certain distance, which is used as a node to monitor the condition of ancient buildings within a certain range. The RFID tag can accept the physical information collected by the sensor, has a certain on-site storage capacity, and regularly sends the tag ID number and ancient building information to the reader. In addition, in order to protect architectural cultural relics, the reader will be placed outside the ancient building (within the range of 300m to 600m from the ancient building), with a built-in 3G communication interface, which can be connected to the mobile communication network upward.
[0025] figure 2 It is a flowchart of an ancient building monitoring and protection method based on RFID technology provided by a preferred embodiment of the present invention. Such as figure 2 As shown, the method for monitoring and protecting ancient buildings based on RFID technology provided by a preferred embodiment of the present invention includes steps S1 to S3.
[0026] Step S1: The RFID tag stores the ancient building physical data collected by the sensor module and sends the information to the reader.
[0027] Specifically, in this step, the information sent by the RFID tag includes the ID of the RFID tag and the ancient building physical data collected by the sensor module. The physical data includes temperature, humidity, pressure-bearing data and tilt angles of ancient buildings.
[0028] Step S2: The reader forwards the information to the server, and the server parses the information to determine whether the state of the ancient building is abnormal.
[0029] Specifically, the client logs in to the server to set thresholds for various indicators of ancient buildings, and when the server determines that the indicators in the received information exceed the thresholds, an alarm is sent to the client. Here, the thresholds of various indicators include corresponding temperature, humidity, pressure, and tilt angle thresholds. If the server judges that the state of the ancient building is normal, the server continues to wait for the next message sent by the reader.
[0030] Step S3: If yes, the server initiates an alarm to the client.
[0031] Specifically, the client can realize 24-hour uninterrupted monitoring of ancient buildings based on real-time alarms from the server. This avoids a series of serious problems caused by maintenance personnel who ignore the poor drainage of ancient buildings, realizes that no manual intervention is required, and greatly reduces the cost of monitoring and maintenance of ancient buildings.
[0032] In summary, according to the ancient building monitoring and protection system and method based on RFID technology provided by the preferred embodiment of the present invention, the physical data of the ancient building is collected in real time by installing RFID tags and different sensors on the ancient building to be monitored, and It is sent to the server, and when the server judges that the state of the building is abnormal according to its stored threshold, it sends an alarm message to the client. In this way, it solves the problem that the inner cable of the ancient building affects its classical atmosphere and the monitoring and protection cannot have both.
[0033] The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be obvious to those skilled in the art, and the general principles defined in this document can be implemented in other embodiments without departing from the spirit or scope of the present invention. Therefore, the present invention will not be limited to the embodiments shown in this document, but should conform to the widest scope consistent with the principles and novel features disclosed in this document.