Dongguan Hax Electronic RF4200 EAS Alarm System User Manual

June 6, 2024
Dongguan Hax Electronic

Dongguan Hax Electronic RF4200 EAS Alarm System

FCC

This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:

  1. this device may not cause harmful interference, and
  2. this device must accept any interference received, including interference that may cause undesired operation.

Warning:
Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. Notes: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.

However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: –Reorient or relocate the receiving antenna.

  • Increase the separation between the equipment and receiver.
  • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
  • Consult the dealer or an experienced radio/TV technician for help.

Note: If shielded cables or special accessories are required for compliance, a statement
must be included which instructs the user to employ them, for example, Shielded cables must be used with this unit to ensure compliance with the Class B FCC limits.

RF4200 Hardware Connection Instruction

RF4200RX & RF4200TX Connection
RF4201 TX-RX-Extender Connection
Synchronization Connection

Software Tuning Instruction

Working Parameters Reading

One way is usual on-site tuning. Use RS232 cable to connect PC to RF4200 board, install RS232 driver, open the software CardMonitor.exe, click Refresh button, select the correct Port COM, click Open button, then the software will automatically recognize the model number of the board, and shows the factory’s setting parameters as bellow (Figure 1-1). If some parameters are not shown, click the Read button, then all parameters will be shown.

Working Conditions Testing

Put the TX antenna 150cm far from RX antenna, power on, use soft label or hard tag to test until the RF4200 system alarms, the buzzer sounds “di…di…di…..” and also the LEDs on Rx board flashing, then it means the system is working normally. The alarm sound volume is controlled by P201 on the RX board. The volume has low, medium, and high options. The factory setting is medium. Testing the 44 soft label, the detection is 150cm, and 55 soft label, the detection is 160cm, and mini hard tag, the detection is 180cm.

Parameters Reading & Setting

Click the Read button, the software will get all parameters from the RF4200 board that connects to the PC. On the left side of the software, each parameter data could be changed. After changing, click the Save button to save the new data. If the data are not well changed, then cl the ick the Reset button to resume the factory setting.

Parameters Descriptions

  1. Sensitivity one-button setting: 3 is the factory setting, it means the normal sensitivity used in a normal environment. 1 means the sensitivity is very low, the detection is very narrow, but the false alarms will not come easily; 5 means the sensitivity is very high, the detection is very wide, but the false alarms will come easily.

  2. The uid is the Unique ID number of the board. Each board has only one uid. All boards have different uid numbers. The number will not repeat.

  3. The device&address is not used yet. It is spare for thee situation that one serial cable is to connect multiple systems.

  4. The version is the firmware version number, 4200 is the model number of the board, 2018 07111600 is the release date of the firmware.

  5. The customer flows (in) is the record number that customers have passed through the system to come into the shop from the date when the system starts working. This f unction is only used for the system with IR counting sensor.

  6. The customer flows (out) is the record number that customers have passed through the system to go out of the sho p from the date when the system starts working. This function is only used for the system with IR counting sensor.

  7. The lease time is used to limit the effective working time for the system. The factory setting is to disable this function, which means the system can work for unlimited time. The status can show whether the lease time function is enabled: enable is to li mit the working time, while disable is not to limit the working time. The available time is the effective working time that was set for the system, and the elapsed time is the time that has been used since the setting. If you need to reset the effective working time for the system, just put a valid number (not 0) at the available time, and click the Save button to save it. The lease time is based on 1 quarter of the clock, if it is set to 4, it means 4 quarters (1 hour) ). The setting range is 1 30000. If you need to disable it, you can click Enable button, and select Disable, then click the save button to save it.

  8. The filter is set at 32 by the factory, the setting range is 0 1023. Usually, it is not necessary to modify.

  9. The peak pos gated is set at 10 by the factory. The setting range is 0 255, Normally it is not necessary to modify. When this value is smaller, the alarming possibility is very low, and the alarming accuracy is very high. If there are false alarms, change to a smaller value. If the detection is not good, change to a bigger value.

  10. The hit count is set at 8 by the factory. The setting range is 1 8. In one processing cycle, if a suspected tag signal appears 8 times, the system will determine t his signal is a true tag, then decide to alarm. The hit count is related to the detection distance.
    When the hit count is smaller, the alarming possibility is higher, which means the sensitivity is higher. And vice versa. If there is no false alarm, the hit count c a be changed to smaller to make the detection distance wider.

  11. The alarm count is total alarms quantity that counted from the system power on of the last time. When the power off, the number is resume to 0.

  12. The peak gated low value is set at 150 and high value is set at 2047 by factory. The setting range is 0 2047. The range of peak gated i s 2 effective intervals (range_1 and range_2). The characteristic (peak) value of the signal collected by the system is regarded as the label signal as long as it is in any range. The low peak is one of the most important parameters of alarm. The smaller t he parameters, the higher the probability of alarm, otherwise the lower the probability of alarm. If there is no false alarm, the detection distance can be wider by reducing this parameter.

  13. . The signal to noise ratio (snr gated), the low bit (low) default value is 3, the setting range is 0 255, and the high (high) default is 255. The numerical range of snr is expressed by interval. The parameters are 2 effective intervals (range_1 and range_2).
    The signal characteristics (signal to noise ratio threshold) values collected by the system are considered as label signals as long as they are in any range. Low signal to noise ratio (low) is one of the most important alarm parameters. The smaller the parameters, the higher the alarm probability, otherwise the lower the alarm probability. The sm aller the parameters, the higher the alarm probability, otherwise the lower the alarm probability. If there is no false alarm, reduce this parameter, the detection distance will be wider.

  14. . The alarm data is the alarm daily records. Select alarm data, click button to display the new alarm records. The records include alarm id, peak, snr, peak pos min, and peak pos max.

False Alarm Processing Methods

  1.  After power on, if there is false alarms. Firstly, you check whether there is a tag around. If yes, please put it away from the antenna 2 meters away to avoid the system from interference. If no, firstly check if the hit count is 8 and the difference of peak pos max peak pos min is 10, and then according to the data in the software to determine every parameter.
  2. If there is no false alarm, and the detection is not good. First of all, resume to factory setting parameters. Then improve the detection step by step It is better to try the parameters one by one, the modification range is not too much. Modify and test, little by little, to improve the detection.

A: reduce the peak gated low
B: reduce the snr low

C: reduce the hit count
D: reduce the peak pos gated

During the above processing, if there false alarm, please refer to the False Alarm Processing.

Remarks:
Signal to noise ratio (Snr), peak value (peak), peak pos gated (peak pos), and hit count (hit count) are 4 important parameters of identification tags. Reasonable parameter settings can achieve better results. The new modification must be saved,

Special False Alarms Shielding Methods

In the working site, the occasional false alarm of the system is not caused by the full range interference of the label frequency, but by the interference of a certain frequency band. In this case, we can observe the alarm data log, find out the scope of special false alarms, set parameters to avoid these special false alarms.Dongguan Hax Electronic RF4200 EAS Alarm System FIG
13

Click the button to make the alarm data log read in real time. Assuming that there is no tag enter, the alarm data are false alarm data (Figure6 1)1).
From the alarm data, we can see that the peak range of false alarms is basically concentrated between 750 900. Then, we can set peak gated data to (Figure6 2)2):

The main board will collect the R F signal in the range of detection at any time, and analyze the characteristics of the signal collected at present, and give the alarm to the signal that conforms to the feature of the tag. The alarm data log is the comprehensive data record that the mainboard recognizes the characteristics of the label (alarm) every time. In order to be considered as a tag signal, the signal must ultimately meet the criteria of three characteristics (peak, snr, peak pos max peak pos min). The following are the criteria for judging the three characteristics:

The peak (Figure6 3) value must be inside range_1 or range 2

The snr value (Figure6 4) must be inside range_1 or range_2.

The difference between the peak pos. m ax and th e p eak pos. min of the signal must be less than the value set at the peak pos gated (Figure6 5)5). In the above group of alarm data log, only the first 3 records of the p eak pos max p eak pos min difference is effective, so the rest can be ignored, not as the judge of false alarm .

Above, we introduce the method of setting up parameters by observing the peak value in the alarm data log, thus shielding false alarms. But because the signal must be conformed to three characteristics at the same time, then it would be finally identified as a true tag signal. So if the peak value of the signal is more scattered, larger, and can not shield false alarms by setting parameters, then we can also observe the values of snr, peak pos max peak pos min, whether or not in a small range, it is also possible to set corresponding parameters to avoid false alarms. If the values of the three signal features are scattered and average, and even cover the entire range of the tag, the current interference signal is considered to be completely and infinitely similar to a tag, in this case, it is not possible to shield the interference signal to eliminate the false alarm.

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Related Manuals