The iPhone 6 will be available soon, and the super fingerprint identification function will be exposed in advance. The fingerprint recognition technology is no longer just a lens in science fiction films, and it is being used more and more in life. Fingerprint recognition technology, from security to mobile phone applications, indirectly reflects the application of fingerprint recognition technology from professional to civilian. In the future, the application of fingerprint recognition technology in the civilian field will continue to expand.
Principle of fingerprint recognition technology
Fingerprint recognition refers to the identification by comparing the detailed feature points of different fingerprints. Because each person's fingerprint is different, there is a clear difference between the fingers of the same person, so the fingerprint can be used for identification.
The fingerprint recognition system is a typical pattern recognition system, including modules for fingerprint image acquisition, processing, feature extraction and comparison.
Fingerprint image acquisition: Fingerprint images can be acquired by a special fingerprint collector. The fingerprint sensor used in the fingerprint collection device is mainly divided into two types: scratch type and push type according to the collection mode. According to the signal acquisition principle, there are optical type, pressure sensitive type, capacitive type, inductive type, thermal type and ultrasonic type. In addition, fingerprint images can also be acquired by a scanner, a digital camera, or the like. For technical indicators such as resolution and collection area, the public security industry has formed international and domestic standards, but other industries still lack uniform standards. According to the area of ​​fingerprint collection, it can be divided into rolling fingerprint and plane fingerprint. The public security industry generally uses rolling fingerprints.
(1) Fingerprint image compression
Large-capacity fingerprint databases must be compressed and stored to reduce storage space. The main methods include JPEG, WSQ, EZW, and so on.
(2) Fingerprint image processing
Fingerprint image processing includes fingerprint area detection, image quality judgment, pattern and frequency estimation, image enhancement, fingerprint image binarization and refinement, and the like. Preprocessing refers to the processing of fingerprint images containing noise and pseudo features by a certain algorithm, which makes the structure of the lines clear and the feature information prominent. Its purpose is to improve the quality of fingerprint images and improve the accuracy of feature extraction. Generally, the preprocessing process includes normalization, image segmentation, enhancement, binarization, and refinement, but the steps of preprocessing are also different depending on the specific situation.
(3) Fingerprint feature extraction
Fingerprint feature extraction: Extract the feature point information (endpoint, bifurcation point, . . . ) of the fingerprint from the pre-processed image. The information mainly includes parameters such as type, coordinates and direction. The detailed features in the fingerprint usually include endpoints, bifurcation points, isolated points, short forks, rings, and so on. The line endpoints and bifurcation points are the most likely, most stable, and easily available in the fingerprint. These two types of feature points can match the fingerprint features: calculating the similarity between the feature extraction results and the stored feature templates.
(4) Fingerprint matching
Fingerprint matching is to compare the fingerprint features collected in the field with the fingerprint features saved in the fingerprint database to determine whether they belong to the same fingerprint. There are two ways to compare fingerprints: 1) One-to-one comparison: the user fingerprints to be compared are retrieved from the fingerprint database according to the user ID, and then compared with the newly collected fingerprints; 2) One-to-many comparison: newly acquired Fingerprints and all fingerprints in the fingerprint library are compared one by one.
China's fingerprint identification technology is relatively mature in the field of access control, examination, identification, and safe, but it is still less used in other products. However, with the development of fingerprint recognition technology, the application range of fingerprint recognition is very wide, and the price is low, and more and more users accept this technology. The application of fingerprint recognition in attendance and access control will continue to expand.
Application field of fingerprint recognition technology
1. Corporate attendance still dominates
Attendance is the basis of modern enterprise management and an important indicator of corporate management. Based on fingerprint identification, the enterprise employee attendance system can completely solve the problem of the generation of punching cards in the traditional time of card and IC card attendance, ensure the authenticity of the attendance data, and truly reflect the openness, fairness and fairness, thus further improving the efficiency of enterprise management. Level. Moreover, since fingerprint identification products are currently the most convenient, reliable and cheapest biometric products, they are the first choice for most SMEs. At present, the sales volume of attendance products in the Chinese market accounts for more than 40% of the total sales of biometric products, ranking first.
2. Intelligent community has become a popular hotspot
Since the intelligent community should be comprehensively considered in terms of functions, performance, cost, etc. in design and selection, products with more mature technology, high reliability, and better cost performance are usually selected. Fingerprint recognition technology is the most mature in many biometric identification technologies, with stable performance and low cost. It is especially suitable for promotion and popularization in intelligent communities. The application of fingerprint identification technology in the intelligent community is mainly reflected in the realization of daily activities such as parking charges, supermarket shopping, book borrowing, and building access in the community. Effectively solve the many problems of residents' use of certificates, which are easy to lose, bring a lot of inconvenience to life, improve the management level of the community, and promote the modernization of management methods. Nowadays fingerprint identification technology has been widely used in intelligent communities and is moving towards a broader civilian market.
3. The fingerprint lock market is developing rapidly
Applying fingerprint recognition technology to traditional door locks is the best choice for biometrics from the professional market to the civilian market. The emergence of fingerprint lock products has announced the advent of a new generation of door locks, and fingerprint locks will gradually change the way people used to open their doors. The convenient, safe and low-cost features of the fingerprint lock will bring a very optimistic market prospect. The new round of door lock competition will promote the rapid development of the fingerprint lock market.
In addition to applications in enterprise attendance and smart communities, fingerprint recognition technology is currently widely used in large public projects such as the judicial and financial sectors. In addition, fingerprint identification technology has been innovatively applied to passports, visas, ID cards and other important management systems to undertake automatic identification based on large-scale databases.
Fingerprint access control common problem solving method
With the popularity of fingerprint access control, more and more enterprises have installed fingerprint access control systems, but often encounter some problems in the application, how to solve it? Here are the solutions to the seven common problems.
Many companies have encountered a lot of questions about the fingerprint access control system during the use of the fingerprint access control system. The following is a list of seven common questions for your reference:
1. What should I do if I can't enter the management program due to personnel changes?
A: First of all, the computer must be installed OFFICE2000 or above, and the Access software is installed, then enter the management program installation directory, find the Att2000.mdb file, double-click to open, and then find the USERINFO table in the interface that appears, double-click to open, find SECURITYFLAGS In this field, the identifier with the value "158" under this field is deleted.
2, can not enter the menu mode of the device, what should I do?
A: You can use the computer to communicate with each other. After the communication is successful, enter the device management. Click Clear Administrator Rights to clear the administrator on the device. After disconnecting, you can enter the menu mode of the device.
3. Why is the data saved when downloading all the records less than the downloaded data?
A: When downloading records, the management program will judge the downloaded record data, the duplicate records will be deleted automatically, and the saved records will not be saved again.
4. Why do I have normal attendance, but I have shown that I am absent from work?
A: First check your time period settings, confirm that your attendance record is within the time limit of check-in, for example, the check-out time you set is from 17:00--18:00, and your attendance record is 16 : 30, then the record is an invalid record, the system will determine that you should be completed in the afternoon (the attendance rule is set to be completed when there is no sign-off record). Second, check if your attendance record time is correct.
5. How to delete an existing shift?
A: You can add a new empty shift first, then replace the shift that will be deleted with the empty shift in the employee shift, and then delete the corresponding shift in the shift management.
6. Why is there a late/early leave in the attendance statistics summary table, and there is no early leave record in the record query?
A: Please check the settings in the attendance calculation in the attendance rules, and check whether the “late/early return when logging in to the record†is checked. If the item is selected, the system will judge to be late/early.
7. The company leader does not need to sign in and return, but to calculate attendance, how to set up?
Answer: (1) Enter the attendance setting under the employee maintenance, and effectively remove the attendance;
(2) Set a time period without signing in and return, and generate a shift, and apply the shift to the corresponding personnel.
Navigator speaker is a kind of micro speaker unit which uses a diaphragm made of Mylar material. Mylar speakers are of ultrathin design and lightweight and clear voice. It is widely used in car electronics (GPS navigator, digital video recorder, radar detector-).
There are two types of Mylar speakers from the shapes:
1) Round shapes, we have products from 10mm to 57mm in diameter.
2) Oblong shape, we have products in sizes of 1510/1712/1813-..
FAQ
Q1. What is the MOQ?
XDEC: 2000pcs for one model.
Q2. What is the delivery lead time?
XDEC: 15 days for normal orders, 10 days for urgent orders.
Q3. What are the payment methods?
XDEC: T/T, PayPal, Western Union, Money Gram.
Q4. Can you offer samples for testing?
XDEC: Yes, we offer free samples.
Q5. How soon can you send samples?
XDEC: We can send samples in 3-5 days.
Navigator Speaker
Navigator Speaker,Gps Speaker,Radar Speaker,Vehicle Navigation Speakers
Shenzhen Xuanda Electronics Co., Ltd. , https://www.xdecspeaker.com