港股即時

Economic Calendar

Monday, April 24, 2017

歷史記錄: 中共在青海進行的種族滅絕——「循化事件」的真相


我們想讓你知道的是
1958年4月17日,藏人驅逐了中國共產黨的「工作組」,並切斷了用於聯絡的電線。24日,約4000名穆斯林撒拉人包圍了縣政府所在地,進行抗議。人民解放軍認定「反革命分子叛亂了」,並於25日派遣兩個團「剿滅土匪」。人民一旦反抗,不去調查研究原因,而是立即實施虐殺,是中國共產黨的常用手段。

文:楊海英
各民族發起抵抗中共軍隊的武裝起義
君不聞胡笳聲最悲,紫髯綠眼胡人吹。
吹之一曲猶未了,愁殺樓蘭征戎兒。
涼秋八月蕭關道,北風吹斷天山草。
崑崙山南月欲斜,胡人向月吹胡笳。
—— 唐代詩人岑參〈胡笳歌〉
各民族的「叛亂」
與四川省相鄰的甘孜地區被中國人霸占,其影響波及到了位於其北部的安多。如今在日本也被稱作青海省的西藏安多地區,無論在政治還是在文化上都至關重要。如今的十四世達賴喇嘛十世班禪喇嘛都出身安多。達賴喇嘛出生在塔庫策爾(現青海省湟中縣峽峻寺),班禪喇嘛的故鄉是如今的循化撒拉族自治縣。
蒙古人歷來將包括安多在內的高原稱作呼和淖爾,即「藍色的湖」。漢語的青海也來源於蒙古語的呼和淖爾。在呼和淖爾不僅有講突厥語系語言的撒拉人,也有信奉伊斯蘭教回族。他們均對中國共產黨的政策抱有強烈不滿。因此,嚴密地講,對中國共產黨的「和平的民主改革」,不僅僅是西藏人,而是所有各民族都團結一致進行了武裝抵抗。
中國政府將以西藏人為首的西北各民族的武裝起義歪曲為「達賴喇嘛的煽動」,「英美帝國主義企圖分裂中國領土的陰謀」,以及「印度反動派的領土擴張野心」。對此,旅美中國人、西藏現代史學者李江琳表示反對。她指出:
甘孜地區的西藏人在1956年起義時,完全沒有主張獨立。他們只是希望強行改變自己傳統生活的中國人幹部回去。
美國雖然後來透過中情局干預了西藏問題,但在1956年,甘孜地區的西藏人與「帝國主義國家」的外部世界還完全沒有任何聯繫,處於孤立無援的狀態。
在法王廳工作的穆斯林
AP_590418079
Photo Credit: AP/達志影像
1959年流亡印度的第十四世達賴喇嘛丹增嘉措
達賴喇嘛逃離首都拉薩前往印度流亡的隊伍裡有一位撒拉青年,是信奉伊斯蘭教的穆斯林,名叫馬正清。
2010年4月28日傍晚。在台灣台北市內,我和國立政治大學的友人踏進了一家位於羅斯福路上的小店,這是台北市為數不多的清真餐廳之一。不久,虔誠的穆斯林馬正清(2010年當時75歲)精神抖擻地出現了。他和達賴喇嘛一起逃脫了人民解放軍占領下的拉薩,在戰鬥中跨越了喜馬拉雅山,到印度尋求新的生活。
「達賴喇嘛的武裝起義軍隊中,西藏人占大多數,也有很多其他民族的人。我是撒拉人。有蒙古人,也有少數的中國人和回族。」馬正清說道。
馬正清於1935年出生在安多地區循化縣一個叫托壩的地方,是阿訇馬全祿的次子。阿訇是指伊斯蘭的宗教指導者。循化是藏人和撒拉人雜居的地區。撒拉人屬於突厥語系民族,傳說他們在蒙古帝國時代從中亞移居而來,在城市和農村裡主要以買賣和農耕為生。另一方面,藏人也過著半農半牧的生活。撒拉人和藏人關係非常友好。當地也有極少數講蒙古語系語言的「土人」。「土人」並非歧視用語,而是「土生土長的人」的意思。
實際上,在達賴喇嘛的政府中循化縣的撒拉人非常多。或許是因為撒拉人也都會說藏語,而且擅長做生意,料理技術也很好。達賴喇嘛的母親也是現在所說的土族人。土族既講藏語也講蒙古語,法王的母親對信奉伊斯蘭教的我們也特別親切,一視同仁。
馬正清回憶著在循化和拉薩度過的幸福時光。
達賴喇嘛在回憶自己的母親時也這樣描述過:「母親,是我見過的這個世界上最善良的人之一」。當貧窮的「中國人為了乞討食物跨過國境」來到西藏時,從未讓這些「可憐的乞討者」空手而歸。
藏人和土人都信仰佛教,但他們的語言不同。撒拉人是穆斯林,蒙古人是佛教徒,但兩者語言中相同的單詞很多。這是因為突厥語系的語言和蒙古語系的語言有著特殊的親緣關係。總之,在中國共產黨和中國人出現之前,多民族和多宗教的人民混合居住在一起的這些地區,未出現過因意識形態上的衝突所引發的大規模屠殺,平靜的生活持續了數百年之久。
七名親族遭殺害的穆斯林
1958年春,情況突然開始惡化。這是因為中國共產黨和中國人的出現。當時,馬正清在西寧的名校崑崙中學讀書,其父馬全祿阿訇由於被認為抵抗了中國推行的「和平的土地改革」而遭逮捕。父親是伊斯蘭的領導人,所以被誣陷為「披著宗教的外衣,進行反革命活動」。父親和母親被五花大綁地站在結冰的河面上,遭到嚴刑拷打。
受害的不僅是雙親。伯父馬全海也因畢業於國民黨的黃埔軍校,並追隨青海省的統治者馬步芳將軍而被認定為「反革命軍人」。馬步芳自始至終反抗中國共產黨進軍青海省,後來去了台灣。中國共產黨的官方見解認為,效忠於馬步芳的軍人也理所當然地都是「反革命分子」。
Ma_Bufang
Photo Credit: Wikimedia Commons @ public domain
馬步芳將軍
不久,馬正清的父親被絞死,母親也被凍死。父親被殺害時五十九歲。其後不久,哥哥也被帶到西寧市,在一個叫小南關的地方遭槍殺。馬正清指出:「為了威懾民眾,被當作反革命分子子弟的哥哥,遭到50天的曝屍。」
哥哥的遺體被曝曬太久,弟弟決定取回遺體。但是弟弟也被就地逮捕,被判處22年監禁。
馬正清繼續著回憶:「雙親和伯父、哥哥等,我的七個親人遭中國共產黨殺害。」
23歲的馬正清擔心,如果繼續留在循化地區,自己也會遭到政府抹殺,於是逃離這裡開始了流浪生活。他經由青海省的大都市西寧府,輾轉於甘肅省省會蘭州市和陝西省西安市等地。陝西省和甘肅省都在「建設幸福的社會主義」,並非流浪青年可去之處。不願被送進強制收容所,所以一路向西藏高原而去。馬正清混入從甘孜和安多湧來的難民中,進入了西藏首都拉薩,時為1958年秋末。
馬正清從小除了講母語撒拉語以外,還會講藏語和阿拉伯語。他憑藉著聰明才智和流浪各地時練就的隨機應變能力,在達賴喇嘛法王廳獲得了一份打雜的工作。當時有很多撒拉人早已在法王廳工作,同胞們向他伸出了援助之手。
中國共產黨敵視伊斯蘭的原由
藏人和撒拉人已無安身之所,無力再繼續抵抗中國政府的鎮壓和殺戮,法王也逃往了印度。24歲的馬正清手握來福槍,一直和藏人戰士共進退。他的右腿被人民解放軍的子彈擊中,流著鮮血。即使如此,他在零下十幾度的喜馬拉雅山裡繼續前進。
馬正清回憶當時的情景:
達賴喇嘛法王的起義軍中,有很多穆斯林軍人。他們都曾經是馬步芳騎兵隊中的撒拉人和回族。正如當時流行的一句話「師長是循化縣的撒拉人好,營長是化隆縣的穆斯林好」,馬步芳將軍對撒拉人的戰鬥力評價很高。1940年代,在河南省開封市近郊與日軍的一個騎兵營對峙的,也是馬步芳將軍的騎兵部隊。
馬步芳將軍的穆斯林騎兵部隊,在中國西北赫赫有名。1935年,中國共產黨紅軍的西路軍計畫途經甘肅和青海,並穿越新疆省進而逃往蘇聯境內,然而在祁連山麓被馬步芳騎兵部隊全部殲滅。因為穆斯林厭惡遭到共產主義的改造。此次共產黨紅軍西路軍的數萬人被殲滅而結下的仇恨,也成為原由之一,中國政府對西北的穆斯林一直採取極其殘忍的非人道態度。
馬正清在印度東北部的卡林邦滯留時,被錫克教徒的警官誤認為中國人而遭逮捕。印度的穆斯林看到他即使在監獄裡,身邊也一直帶著伊斯蘭聖典《古蘭經》,於是營救他出獄。馬正清前往沙烏地阿拉伯巡禮之後,於1960年末去了台灣,成為國民黨的一員,準備對抗人民解放軍的攻擊。
馬正清憶起回鄉探望的情景:
以前,我家附近有很多胡桃樹,是父親和母親種下的。村落也是典型的中亞田園風景。中國大陸的渡航禁令解禁後,我只在1988年回過一次家鄉。胡桃樹一棵也沒有了。原來的家已面目全非,變成了空地。村裡相識的也只剩下一、兩個人。我再次深深地感受到,失去了祖輩代代創造的所有財富和七個親人的苦痛。
可見,同中國政府和中國人交惡的不只是藏人。馬正清的人生歷程表明,西北各民族跨越了不同宗教間的差異,聯合起來共同反抗共產主義惡魔。
「叛亂」的導火線
學者們將1958年春發生在撒拉人馬正清故鄉的反中國共產黨的政治運動稱作「循化事件」。此次「循化事件」影響深刻,甚至被認為是第二年春達賴喇嘛法王出走印度的先聲。
馬正清的父親等七位親人遭中國共產黨處決的同一時間,中國共產黨以「防叛」,即「預防叛亂」的名義,將青海省各地的藏傳佛教寺院中的高僧監禁在一處,強制他們進行「政治學習」。這種「防叛」措施反而招來了藏人和撒拉人的反感,循化縣爆發了大規模的武裝抵抗。
當然,人們對從1952年開始的如狂濤般的「和平的民主改革」和「和平的土地改革」的不滿情緒,也一直在鬱積。1958年4月17日,藏人驅逐了中國共產黨的「工作組」,並切斷了用於聯絡的電線。24日,約4000名穆斯林撒拉人包圍了縣政府所在地,進行抗議。
人民解放軍認定「反革命分子叛亂了」,並於25日派遣兩個團「剿滅土匪」。人民一旦反抗,不去調查研究原因,而是立即實施虐殺,是中國共產黨的常用手段。在短短四小時內,「射殺了435名『土匪』,俘虜了2499人。其中撒拉人1581名,西藏人537名,穆斯林回族343名,中國人38名」。
這些數字清楚地表明,這是一場跨越民族和宗教的差異,一致反對共產主義化的鬥爭。鎮壓結束後,中國共產黨發出「參加叛亂的宗教相關人員一個不放,判處終身監禁」的嚴厲命令。結果西藏佛教的僧侶和伊斯蘭的聖職者別無選擇,只有繼續抵抗。失去了曾經身為伊斯蘭領導人的父親的馬正清,也背負著這樣悲慘的命運,來到了西藏佛教的聖都拉薩。
數字所顯示的種族滅絕大屠殺的規模
中國人學者李江琳出示了一組數字,證明了中國共產黨所實施的虐殺的規模。
安多地區占中華人民共和國設立的青海省面積的97%。中國人在安多地區設置了海南黃南海北果洛玉樹等「藏族自治州」。1957年,青海省的藏族人口是51萬3415人,到1964年,減少至42萬2662人。李江琳依據的是中國政府的官方統計,即使有人口的自然增減,至少有九萬人被殺害。
我手中雖然沒有能夠表明整個安多地區人口情況的數據,但是有果洛和玉樹兩州的人口統計。其中關於果洛的人口有如下記載:
「1956年的人口是56747人,因平定叛亂和其他原因,1958年減少至54660人。」
經過簡單的計算可以得知,有2087人因「平定叛亂」而消失。此外,還有其他數據。這也是使用中國政府的統計數據進行的研究,有必要在這裡加以引用。從1958年到1961年期間,「果洛的西藏人口減少了35395人,占全人口的35.5%」。
玉樹的情況如下,1953年「解放後的人口是12萬6383人,1964年減少至10萬3661人」。因「平定」而消失的人有22722人。還有其他學者認為,「玉樹的西藏人人口從1958年到1961年期間,減少了69419人。與1957年相比,減少了44%」。這是極其恐怖的種族滅絕。
蒙古人騎兵就是被投入到對果洛和玉樹的鎮壓中的。上述記錄了人口變化的中國政府的文獻中,絲毫沒有提及「叛亂」發生的原因和「平定」的過程。不記錄歷史,其罪惡和虐殺一樣深重,是對文化的滅絕。
Tibetischer_Kulturraum_Karte_2
Photo Credit: Lencer @ CC BY-SA 3.0
西藏的幾個主要區域
作者想再次明確指出,正如達賴喇嘛所主張的那樣,康巴和安多,以及羌塘衛藏都是西藏的固有領土。然而中國政府在推進「社會主義改造運動」的土地改革時,在一九五五年七月三十日,將康巴和安多分別劃分給了四川省、青海省、雲南省及甘肅省。
未將西藏人自古生活的地區劃分為「西藏自治區」,而是分割給了中國人占絕對多數的省分,這源於他們頭腦中自古以來的「分而治之」的思想。所謂共產主義等等只是一個面具而已,事實上,他們實施了比歷史上任何朝代都更為殘酷的專制體制。
書籍介紹
本文摘錄自《蒙古騎兵在西藏揮舞日本刀》,大塊文化出版。
*透過以上連結購書,《關鍵評論網》由此所得將全數捐贈兒福聯盟
作者:楊海英
日本刀揮舞下,藏人的血把白雪染成了黑色。世界最強的騎兵軍團,卻使天罰降臨草原上。頭髮花白的老兵們,還是鼓起勇氣整齊地站在昔日日系教官的面前。或許他們心中認為,在經歷了如「天罰」般的中國人的文化大革命洗禮後,他們的罪孽已經被洗清了。

從日本士兵學會了武士手法和掌握近代軍事戰略的蒙古騎兵,在日本戰敗後夢想著與北蒙古成為統一國家,卻因大國之間擅自簽訂的《雅爾達協議》而遭分裂。1958年,中共號召蒙古騎兵參加青藏「剿匪平叛」,無數西藏人因而遭到屠殺,煽動了兩族對立,落入中國「以夷制夷」的陷阱。文革期間,蒙古騎兵幾乎全部遭到肅清,被殺害的蒙古人超過十萬,這段歷史被他們自視為殲滅西藏人的天罰,亦意味著對民族自決權宣告了死刑。

南蒙古出身的作者,以多視角的歷史觀及實地調查的第一手資料,再現這段以「日本洋刀」和「騎兵」編織的西藏人和蒙古人的時代悲劇。


Reference:

https://hk.thenewslens.com/article/66626?utm_campaign=sharebtn&utm_medium=facebook&utm_source=social2017

Thursday, April 20, 2017

中國債券



http://business.sohu.com/72/71/column200057172.shtml

2017 年 2月中國國債


《中国2017年国债发行中标明细表》--2月6日

以下为2017年发行的各期记账式附息国债中标明细:

 债券名称 招标时间  期限   票面利率  预测利率 边际利率  发行规模  投标倍数  
                    (年)                                 (亿元)
 ==========================================================================
 2016年     1/4      10     3.0956%   3.08%    3.1317%    200       2.14
 第23期续发
 ==========================================================================
 2016年     1/4       1     2.7105%   2.74%    2.7978%    200       2.28
 第24期续发
 ==========================================================================
 2016年     1/18      7     3.1173%   3.14%    3.1943%    200       2.09
 第25期续发  
 ==========================================================================  
 一期       1/11      5     2.88%     2.90%    2.94%      200       2.26
 ==========================================================================
 二期       1/18      3     2.77%     2.77%    2.82%      200       2.41
 ==========================================================================  
  合计                                                  1,000
   
 以下为2017年发行的各期记账式贴现国债中标明细:

 债券名称 招标时间 期限  加权收益率   边际收益率  发行规模  投标倍数
                   (天)                            (亿元)
 ===================================================================
 一期       1/6     91    2.5685%       2.6323%     100      2.44
 ===================================================================
 二期       1/13    91    2.5145%       2.5511%      80      3.27
 ===================================================================
 三期       1/13   182    2.5285%       2.5695%      80      3.45
 ===================================================================
 四期       1/20    91    2.5218%       2.5754%     100      2.75
 ===================================================================
*五期       2/3     91    2.5921%       2.6974%     100      1.69
 ===================================================================  
  合计                                              460

   
  注:1.*代表新增
     2.发行规模和认购额单位均为亿元人民币。
     3.2016年国债发行中标明细表请点选
       2015年国债发行中标明细表请点选 (完)
   
  如欲了解中国债券情况,请在下列代码上按左鼠键点击两次

http://cn.reuters.com/article/idCNL4S1FP05Q

Tuesday, February 14, 2017

CSCP


四大modules
Module1: Supply Chain Management Fundamentals
Module2: Building Competitive Operations Planning and Logistics
Module3: Managing Customer and Supplier Relationships
Module4: Using Information Technology to Enable Supply Chain Management


中國水果市場

中國農業信息網
http://pfsc.agri.cn/


2016年中國水果消費數據

http://www.chyxx.com/industry/201609/448941.html

2015—2025年水果供需平衡表:万吨
 类别
2017
2018
2019
2020
2021
2022
2023
2024
2025
生产量
27 937
28 355
28 762
29 157
29 517
29 844
30 107
30 418
30 705
进口量
 480
 510
 540
 570
 586
 602
 618
 634
 650
消费量
27 624
28 133
28 604
29 061
29 458
29 808
30 142
30 465
30 766
直接食用
13 062
13 301
13 508
13 705
13 857
13 976
14 109
14 213
14 308
加工消费
2 929
3 047
3 163
3 278
3 393
3 505
3 611
3 715
3 815
损耗
11 632
11 785
11 934
12 078
12 209
12 328
12 422
12 536
12 643
出口量
 473
 505
 538
 570
 586
 602
 618
 634
 650
结余变化
 321
 228
 160
 96
 58
 35
-36
-47
-62

Friday, February 10, 2017

Grapes

News on Grapes



Grapes Types


http://internationalfruitgenetics.com/grapes.php

http://www.grapaes.com/?page_id=15


Knowledge of Grape Producion



Australia Fruit Source



Australia Table Grapes Type

Black


Adora Seedless®
  • Developed by Sun World in California
  • released in Australia by Perfection Fresh Australia and Costa Group
  • planted in the Sunraysia region in east Australia, Carnarvon and Swan Valley regions in west Australia.
  • Harvest: March to April
  • Description: Extra-large berry size, sweet flavour and a crisp-juicy texture




Red





White


Autumn CRISP®






  • Developed by Sun World in California
  • released in Australia by Perfection Fresh Australia and Costa Group
  • planted in the Sunraysia region in east Australia, Carnarvon and Swan Valley regions in west Australia.
  • Harvest: March to April
  • Description: Supremely large and plump and seedless with a superbly sweet and refreshing flavour.






  • Sunday, November 27, 2016

    RFID



    Radio-Frequency Identification (RFID) is the use of radio waves to read and capture information stored on a tag attached to an object.  A tag can be read from up to several feet away and does not need to be within direct line-of-sight of the reader to be tracked.




    How does a RFID system work?

    A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are embedded with a transmitter and a receiver. The RFID component on the tags have two parts: a microchip that stores and processes information, and an antenna to receive and transmit a signal. The tag contains the specific serial number for one specific object.

    To read the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator or reader emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank. The interrogator will then transmit the read results to an RFID computer program.



    There are two types of RFID tags: passive and battery powered.  A passive RFID tag will use the interrogator’s radio wave energy to relay its stored information back to the interrogator.  A batter powered RFID tag is embedded with a small battery that powers the relay of information.




    RFID Tags

    RFID tags are classified as Class 0 through Class 5, depending on their functionality:

    Class 0UHFl read-only, preprogrammed passive tag
    Class 1UHF or HF; write once, read many (WORM)
    Class 2Passive read-write tags that can be written to at any point in the supply chain
    Class 3Read-write with onboard sensors capable of recording parameters like temperature, pressure, and motion; can be semipassive or active
    Class 4Read-write active tags with integrated transmitters; can communicate with other tags and readers
    Class 5Similar to Class 4 tags but with additional functionality; can provide power to other tags and communicate with devices other than readers

    Reference above

    Radio Basics for UHF RFID

    Backscatter Radio Links
    Passive and semipassive RFID tags do not use a radio transmitter; instead, they use modulation of the reflected power from the tag antenna. Reflection of radio waves from an object has been a subject of active study since the development of radar began in the 1930s, and the use of backscattered radio for communications since Harry Stockman's work in 1949.

    A very simple way to understand backscatter modulation is shown schematically in Figure 3.14: current flowing on a transmitting antenna leads to a voltage induced on a receiving antenna. If the antenna is connected to a load, which presents little impediment to current flow, it seems reasonable that a current will be induced on the receiving antenna.


    3.14. Simplified Physics of Backscatter Signaling.

    In the figure, the smallest possible load, a short circuit, is illustrated. This induced current is no different from the current on the transmitting antenna that started things out in the first place: it leads to radiation. (A principle of electromagnetic theory almost always valid in the ordinary world, the principle of reciprocity, says that any structure that receives a wave can also transmit a wave.) The radiated wave can make its way back to the transmitting antenna, induce a voltage, and therefore, produce a signal that can be detected: a backscattered signal. On the other hand, if instead a load that permits little current to flow (that is, a load with a large impedance) is placed between the antenna and ground, it seems reasonable that little or no induced current will result. In Figure 3.14, we show the largest possible load, an open circuit (no connection at all). Since it is currents on the antenna that lead to radiation, there will be no backscattered signal in this case. Therefore, the signal on the transmitting antenna is sensitive to the load connected to the receiving antenna.

    To construct a practical communications link using this scheme, we can attach a transistor as the antenna load (Figure 3.15). When the transistor gate contact is held at the appropriate potential to turn the transistor on, current travels readily through the channel, similar to a short circuit. When the gate is turned off, the channel becomes substantially nonconductive. Since the current induced on the antenna, and thus, the backscattered wave received at the reader, depend on the load presented to the antenna, this scheme creates a modulated backscattered wave at the reader.

    Note that the modulating signal presented to the transistor is a baseband signal at a low frequency of a few hundred kHz at most, even though the reflected signal to the reader may be at 915 MHz. The use of the backscatter link means that the modulation switching circuitry in the tag only needs to operate at modest frequencies comparable to the data, not the carrier frequency, resulting in savings of cost and power. (Real RFID tag ICs are not quite this simple and may use a small change in capacitance to modulate the antenna current instead.)


    3.15. Modulated Backscatter Using a Transistor as a Switch.

    Note that in order to implement a backscattered scheme, the reader must transmit a signal. In many radio systems, the transmitter turns off when the receiver is trying to acquire a signal; this scheme is known as half-duplex to distinguish it from the case where the transmitter and receiver may operate simultaneously (known as a full-duplex radio).

    RFID Basics: Backscatter Radio Links and Link Budgets

    In a passive RFID system, the transmitter does not turn itself off but instead, transmits CW during the time the receiver is listening for the tag signal. RFID radios use specialized components known as circulators or couplers to allow only reflected signals to get to the receiver, which might otherwise be saturated by the huge transmitted signal. However, in a single-antenna system, the transmitted signal from the reader bounces off its own antenna back into the receiver, and the transmitted wave from the antenna bounces off any nearby objects such as desks, tables, people, coffee cups, metal boxes, and all the other junk that real environments are filled with, in addition to the poor little tag antenna we're trying to see (Figure 3.16).


    3.16. Realistic Environments Create Many Reflected Waves in Addition to that from the Wanted Tag

    If two antennas are used (one for transmit and one for receive), there is still typically some signal power that leaks directly from one to the other, as well as the aforesaid spurious reflections from objects in the neighborhood. The total signal at the receiver is the vector sum of all these contributions, most of which are much larger than the wanted tag signal, with appropriate amplitudes and phases, most of which are unpredictable a priori. Thus, the actual effect of a given change in the load on the tag antenna on the receiver signal is completely unpredictable and uncontrollable. For example, modulating the size of the tag antenna current (amplitude modulation) may not result in the same kind of change in the reader signal.


    3.17. The Received Signal is not Simply Correlated to the Tag Signal. The AM Case Assumes the Tag Reduces its Scattered Magnitude Without Changing Phase; the Phase Shift Keying (PSK) Case Assumes Phase Inversion Without Amplitude Change.

    In Figure 3.17, we show a case where changing the tag reflection from a large amplitude (HI) to a small amplitude (LO) causes the received signal to increase in magnitude without changing phase (the "AM" case). Changing the phase of the tag signal without changing the size of the reflected signal in order to symbolize a local oscillator (LO) state may change the amplitude of the reader signal at constant phase (Figure 3.17, PSK case). The only thing we can say with any confidence is that when we make a change in the state of the tag antenna, something about the phase or amplitude of the reader signal will change.
    In order to make a backscatter link work, we need to choose a way to code the data that can be interpreted based only on these changes and not on their direction or on whether they are changes in phase or amplitude. As a consequence, all approaches to coding the tag signal are based on counting the number of changes in tag state in a given time interval, or equivalently on changing the frequency of the tag's state changes.
    Therefore, all tag codes are variations of frequency-shift keying (FSK). It is important to note that the frequency being referred to here is not the radio carrier frequency of (say) 900 MHz but the tag (baseband) frequency of perhaps 100 or 200 kHz. A binary '1' might be coded by having the tag flip its state 100 times per millisecond, and a binary '0' might have 50 flips per millisecond.
    Because the frequency being changed is the frequency at which a carrier is being amplitude modulated, techniques like this are sometimes known as subcarrier modulation. Let's look at one specific example of tag coding, usually known as FM0 (Figure 3.18).



    3.18. FM0 Encoding of Tag Data.

    In FM0, the tag state changes at the beginning and end of every symbol. In addition, a binary 0 has an additional state change in the middle of the symbol. Note that, unlike OOK, the actual tag state does not reliably correspond to the binary bit: for example, in the left-hand side of the figure, two of the binary '1' symbols have the tag in the LO state and another '1' symbol has the tag in the HI state. Remember, the reader can't reliably distinguish which state is which but can only count transitions between them. The right side of the figure shows the baseband signal corresponding to a series of identical binary bits to clarify the correspondence of binary '0's with a frequency twice as high as that of binary '1's. Different tag coding schemes can be used to adjust the offset from the carrier frequency at which the signal from the tags is found. Readers have an easier time seeing a tag signal when it is well separated from their own carrier frequency, so higher subcarrier frequencies help improve the ability to read a tag signal. However, if the separation is large compared to the channel size, the tag signal might lie on the signal of another reader in a different channel. Just as with readers, increasing the data rate of a tag signal tends to spread the spectrum out in frequency. To have a flexible choice of tag data rates while minimizing noise, the reader needs to be able to adapt the band of frequencies it tries to receive, adding cost and complexity.

    In real receivers, noise and interference may be present as well as the desired signal. A certain minimum signal-to-noise ratio (S/N) is necessary for each type of modulation in order that it can be reliably decoded by the receiver. The exact (S/N) threshold depends on how accurate you're trying to be and to a lesser extent on the algorithms used for demodulation/decoding. For RFID using FM0, (S/N) of around 10 or better (10 dB or more) is usually sufficient. (Requirements for demodulation of reader symbols, like PIE, in the tag are generally similar.)

    Link Budgets

    Let's summarize the message of the last couple of sections. To transmit to a tag, a reader uses amplitude modulation to send a series of digital symbols. The symbols are coded to ensure that sufficient power is always being transmitted regardless of the data contained within in. The received signal can be demodulated using a very simple power detection scheme to produce a baseband voltage, which is then decoded by the tag logic. The whole scheme is depicted in Figure 3.19.




    3.19. Schematic Depiction of Reader-to-tag Data Link.

    Figure 3.20 shows the corresponding tag-to-reader arrangements. The tag codes the data it wishes to send and then induces changes in the impedance state of the antenna. The reader CW signal bounces off the tag antenna (competing with other reflections) and is demodulated by the reader receiver and then decoded back into the transmitted data.


    3.20. Schematic Depiction of Tag-to-reader Data Link (A Separate Receive Antenna is Shown for Clarity).
    While we have alluded several times to the fact that the reader must power the tag, so far we have avoided coming to grips with the crucial associated question of just how much power the tag needs to get and just how far we can go from the reader and still get it. The amount of power that one needs to deliver to a receiver across a wireless link in order that the transmitted data be successfully received is known as the link budget. Since readers and tags both talk, for an RFID system there are two separate link budgets, one associated with the reader-to-tag communication (the forward link budget) and one with the tag reply to the reader (the reverse link budget).


    Reference above

    Radio Basics for RFID, Part 1



    Generation 2 Protocol Standard

    http://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf


    ST25RU3992 UHF RFID reader kit - using 8dBi antenna


    http://www.soliddepot.com/index.php?main_page=product_info&cPath=38_42&products_id=232

    Cottonwood: USB Long Range UHF RFID reader

    http://learn.linksprite.com/rfid/how-to-program-the-rfid-reader/