Submit Search
Upload
Automatic Identification and Data Capture Techniques
•
Download as PPT, PDF
•
0 likes
•
355 views
Nafis Ahmad
Follow
Introduction to aidc techniques.
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 29
Download now
Recommended
Electron beam freeform fabrication process
Electron beam freeform fabrication process
Akhthar Edavanna
Nc Machine
Nc Machine
Satyen Champaneria
Conventional machining vs. non conventional machining
Conventional machining vs. non conventional machining
onlinemetallurgy.com
Lecture # 05 Post processing of AM parts
Lecture # 05 Post processing of AM parts
Solomon Tekeste
Transfer mechanisms in automation by sharath c m
Transfer mechanisms in automation by sharath c m
CIPET | Central Institute of Petrochemicals Engineering & Technology
CNC Machines and its Components
CNC Machines and its Components
Dr.Cartigueyen Srinivasan, Karaikal Govt Polytechnic College, Karaikal, Pondicherry, India
Group Technology
Group Technology
sgrsoni45
Ppce unit 2- PROCESS PLANNING ACTIVITIES
Ppce unit 2- PROCESS PLANNING ACTIVITIES
Aravind Ra
Recommended
Electron beam freeform fabrication process
Electron beam freeform fabrication process
Akhthar Edavanna
Nc Machine
Nc Machine
Satyen Champaneria
Conventional machining vs. non conventional machining
Conventional machining vs. non conventional machining
onlinemetallurgy.com
Lecture # 05 Post processing of AM parts
Lecture # 05 Post processing of AM parts
Solomon Tekeste
Transfer mechanisms in automation by sharath c m
Transfer mechanisms in automation by sharath c m
CIPET | Central Institute of Petrochemicals Engineering & Technology
CNC Machines and its Components
CNC Machines and its Components
Dr.Cartigueyen Srinivasan, Karaikal Govt Polytechnic College, Karaikal, Pondicherry, India
Group Technology
Group Technology
sgrsoni45
Ppce unit 2- PROCESS PLANNING ACTIVITIES
Ppce unit 2- PROCESS PLANNING ACTIVITIES
Aravind Ra
Unit ii Process Planning
Unit ii Process Planning
Asha A
Dfma ppt
Dfma ppt
aman1312
1. cad fundamental
1. cad fundamental
Ratnadeepsinh Jadeja
CIM
CIM
Rahul Patil
Deburring processes
Deburring processes
Nakul Agwan
Computer generated time standards
Computer generated time standards
Venu Yadav
introduction to process planning murugananthan
introduction to process planning murugananthan
Murugananthan K
3 numerical control
3 numerical control
shaikusmanshag
CIM Computer Integrated Manufacturing
CIM Computer Integrated Manufacturing
TanuVerma39
Lecture 3 Computer - Aided Manufacturing (CAM)
Lecture 3 Computer - Aided Manufacturing (CAM)
Amanuel Diriba From Jimma Institute of Technology
Presentation Study on CMM And Application
Presentation Study on CMM And Application
sandeepbags2004
Electrochemical honing
Electrochemical honing
Vaibhav Chhajer
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
Pratik Gandhi
manufacturing support system
manufacturing support system
santan chaurasiya
Unit V CNC Machining
Unit V CNC Machining
laxtwinsme
Non traditional machining processes
Non traditional machining processes
MECHV
Reverse engineering
Reverse engineering
ananya0122
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
Balamurugan Subburaj
Mechanical element of a CNC Machine
Mechanical element of a CNC Machine
tjunicornfx
Computer Integrated Manufacturing
Computer Integrated Manufacturing
suraj_21
67042 ch09
67042 ch09
Nilesh Jugurnath
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
More Related Content
What's hot
Unit ii Process Planning
Unit ii Process Planning
Asha A
Dfma ppt
Dfma ppt
aman1312
1. cad fundamental
1. cad fundamental
Ratnadeepsinh Jadeja
CIM
CIM
Rahul Patil
Deburring processes
Deburring processes
Nakul Agwan
Computer generated time standards
Computer generated time standards
Venu Yadav
introduction to process planning murugananthan
introduction to process planning murugananthan
Murugananthan K
3 numerical control
3 numerical control
shaikusmanshag
CIM Computer Integrated Manufacturing
CIM Computer Integrated Manufacturing
TanuVerma39
Lecture 3 Computer - Aided Manufacturing (CAM)
Lecture 3 Computer - Aided Manufacturing (CAM)
Amanuel Diriba From Jimma Institute of Technology
Presentation Study on CMM And Application
Presentation Study on CMM And Application
sandeepbags2004
Electrochemical honing
Electrochemical honing
Vaibhav Chhajer
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
Pratik Gandhi
manufacturing support system
manufacturing support system
santan chaurasiya
Unit V CNC Machining
Unit V CNC Machining
laxtwinsme
Non traditional machining processes
Non traditional machining processes
MECHV
Reverse engineering
Reverse engineering
ananya0122
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
Balamurugan Subburaj
Mechanical element of a CNC Machine
Mechanical element of a CNC Machine
tjunicornfx
Computer Integrated Manufacturing
Computer Integrated Manufacturing
suraj_21
What's hot
(20)
Unit ii Process Planning
Unit ii Process Planning
Dfma ppt
Dfma ppt
1. cad fundamental
1. cad fundamental
CIM
CIM
Deburring processes
Deburring processes
Computer generated time standards
Computer generated time standards
introduction to process planning murugananthan
introduction to process planning murugananthan
3 numerical control
3 numerical control
CIM Computer Integrated Manufacturing
CIM Computer Integrated Manufacturing
Lecture 3 Computer - Aided Manufacturing (CAM)
Lecture 3 Computer - Aided Manufacturing (CAM)
Presentation Study on CMM And Application
Presentation Study on CMM And Application
Electrochemical honing
Electrochemical honing
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
manufacturing support system
manufacturing support system
Unit V CNC Machining
Unit V CNC Machining
Non traditional machining processes
Non traditional machining processes
Reverse engineering
Reverse engineering
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
Mechanical element of a CNC Machine
Mechanical element of a CNC Machine
Computer Integrated Manufacturing
Computer Integrated Manufacturing
Similar to Automatic Identification and Data Capture Techniques
67042 ch09
67042 ch09
Nilesh Jugurnath
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
Automated Assembly Systems
Automated Assembly Systems
VADLAJAGADEESHWARAAC
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.ppt
AbhishekChavan77
automation method.ppt
automation method.ppt
AbhijitBhattacherjee4
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET Journal
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET Journal
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET Journal
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
IRJET Journal
Smart Home for Senior Citizens
Smart Home for Senior Citizens
IRJET Journal
IJSRED-V2I2P36
IJSRED-V2I2P36
IJSRED
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET Journal
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET Journal
IRJET- Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
IRJET Journal
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET Journal
Automated Production Lines.ppt
Automated Production Lines.ppt
AbhishekChavan77
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET Journal
Production System-1.ppt
Production System-1.ppt
AbhishekChavan77
Similar to Automatic Identification and Data Capture Techniques
(20)
67042 ch09
67042 ch09
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
Automated Assembly Systems
Automated Assembly Systems
IRJET - Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.ppt
automation method.ppt
automation method.ppt
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
Smart Home for Senior Citizens
Smart Home for Senior Citizens
IJSRED-V2I2P36
IJSRED-V2I2P36
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET- Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry Pi
Automated Production Lines.ppt
Automated Production Lines.ppt
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging System
Production System-1.ppt
Production System-1.ppt
More from Nafis Ahmad
Introduction CIM
Introduction CIM
Nafis Ahmad
Safety management
Safety management
Nafis Ahmad
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)
Nafis Ahmad
Flexible Manufacturing System
Flexible Manufacturing System
Nafis Ahmad
CAD-CAM-CIM
CAD-CAM-CIM
Nafis Ahmad
Decision making considering multi-attributes
Decision making considering multi-attributes
Nafis Ahmad
Breakeven & sensitivity analysis
Breakeven & sensitivity analysis
Nafis Ahmad
Replacement analysis
Replacement analysis
Nafis Ahmad
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysis
Nafis Ahmad
Depreciation and income taxes
Depreciation and income taxes
Nafis Ahmad
Comparison and selection among alternatives
Comparison and selection among alternatives
Nafis Ahmad
CADCAM: Data exchange standards
CADCAM: Data exchange standards
Nafis Ahmad
Industrial Robots
Industrial Robots
Nafis Ahmad
Evaluating a Single Project
Evaluating a Single Project
Nafis Ahmad
Entity Manipulation
Entity Manipulation
Nafis Ahmad
Evaluating a single project
Evaluating a single project
Nafis Ahmad
Computer graphics
Computer graphics
Nafis Ahmad
Failure Mode & Effect Analysis
Failure Mode & Effect Analysis
Nafis Ahmad
Reliability Centered Maintenance
Reliability Centered Maintenance
Nafis Ahmad
Corrective maintenance
Corrective maintenance
Nafis Ahmad
More from Nafis Ahmad
(20)
Introduction CIM
Introduction CIM
Safety management
Safety management
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)
Flexible Manufacturing System
Flexible Manufacturing System
CAD-CAM-CIM
CAD-CAM-CIM
Decision making considering multi-attributes
Decision making considering multi-attributes
Breakeven & sensitivity analysis
Breakeven & sensitivity analysis
Replacement analysis
Replacement analysis
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysis
Depreciation and income taxes
Depreciation and income taxes
Comparison and selection among alternatives
Comparison and selection among alternatives
CADCAM: Data exchange standards
CADCAM: Data exchange standards
Industrial Robots
Industrial Robots
Evaluating a Single Project
Evaluating a Single Project
Entity Manipulation
Entity Manipulation
Evaluating a single project
Evaluating a single project
Computer graphics
Computer graphics
Failure Mode & Effect Analysis
Failure Mode & Effect Analysis
Reliability Centered Maintenance
Reliability Centered Maintenance
Corrective maintenance
Corrective maintenance
Recently uploaded
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
somshekarkn64
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Madan Karki
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
JasonTagapanGulla
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
JuanCarlosMorales19600
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Recently uploaded
(20)
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Automatic Identification and Data Capture Techniques
1.
2. Automatic Identification and Data
Capture 1
2.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28 Automatic Identification and Data Capture Sections: 1. Overview of Automatic Identification Methods 2. Bar Code Technology 3. Radio Frequency Identification 4. Other AIDC Technologies
3.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28 Automatic Identification and Data Capture A family of technologies that provide direct entry of data into a computer or other microprocessor controlled system without using a keyboard Reasons for using AIDC: 1. Data accuracy 2. Timeliness 3. Labor reduction
4.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28 Alternative to AIDC: Manual Methods of Data Collection and Entry Problems with manual collection and data entry: 1. Human errors When data are collected and entered manually 2. Time factor Time delay between occurrence of activities and events and entry of associated data Manual methods are inherently time consuming 3. Labor cost Cost of full-time attention of human worker
5.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28 AIDC Applications Retail sales and inventory control Material handling Shipping and receiving, sortation, order picking, mail and parcel handling Factory operations Order processing, WIP tracking, machine utilization, worker attendance Other Patient identification in hospitals, check processing in banks, security system
6.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28 Components of AIDC Nearly all AIDC technologies consist of three principal components, which are the sequential steps in AIDC: 1. Data encoding - alphanumeric characters are translated to machine-readable form 2. Machine reading or scanning - scanner reads the encoded data and converts it to alternative form, usually an electrical signal 3. Data decoding - electrical signal is transformed into digital data and finally back into original alphanumeric characters
7.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28 AIDC Technologies 1. Optical Bar codes (linear and 2-D), optical character recognition, machine vision 2. Electromagnetic Radio frequency identification (RFID) 3. Magnetic Data are encoded magnetically, similar to magnetic tape (e.g., plastic credit cards, bank checks), and magnetic ink character recognition
8.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28 AIDC Technologies 4. Smart card Small plastic cards imbedded with microchips (integrated circuits) 5. Touch techniques Touch screens 6. Biometric Voice recognition, fingerprint analysis, retinal eye scans
9.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28 Measures of AIDC Reading Accuracy 1. First read rate (FRR) Probability of a successful (correct) reading by the scanner in its initial attempt 2. Substitution error rate (SER) Probability of scanner incorrectly reading the encoded character as some other character In a given set of encoded data containing n characters, the expected number of errors = SER * n
10.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28 Bar Code Technology Bar codes are of two basic types: 1. Linear Encoded data are read using a linear sweep of the scanner 2. Two-dimensional Encoded data must be read in both directions
11.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28 Linear (One-Dimensional) Bar Codes Two forms of linear bar codes: 1. Width-modulated Symbol consists of bars and spaces of varying width Most widely used (e.g., Universal Product Code) 2. Height-modulated Symbol consists of bars and spaces of varying height Used only by U.S. Postal Service for ZIP code identification
12.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28 Two Forms of Bar Codes (a) (b) (a) Width-modulated bar code, exemplified here by the Universal Product Code (UPC), and (b) (b) height-modulated bar code, exemplified by Postnet, used by the U.S. Postal Service
13.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28 SOS Distress Signal in "Morse" Bar Codes Fig. 12.2 Difficulties with the "Morse" bar codes: (1) only the dark bars are used, thus increasing the length of the coded symbol, and (2) (2) the number of bars making up the alphanumeric characters differs, making decoding more difficult
14.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28 Reading the Bar Code (a) (b) Conversion of bar code into a electrical signal pulse train : (a) bar code and, (b) (b) corresponding electrical signal
15.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28 Code 39 A typical grouping of characters to form a bar code in Code 39.
16.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28 USD-2 Character Set USD-2 is a subset of Code 39
17.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28 Linear Bar Code Readers Usually classified as: 1. Contact Hand-held wands or light pens operated by moving the tip quickly past the bar code 2. Noncontact Readers focus a light beam on the bar code and a photodetector reads the reflected signal 1. Fixed beam - stationary readers used fixed beam 2. Moving beam - light beam (lasers) traverse an angular sweep to search for the bar code
18.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28 Bar Code Scanner Stationary moving beam bar code scanner located along a moving conveyor
19.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28 Bar-Coded Route Sheet Bar-coded production order and route sheet
20.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28 Two-Dimensional Bar Codes First 2-D bar code introduced in 1987 Two basic types of 2-D bar code symbols 1. Stacked bar codes Consists of multiple rows of conventional bar codes stacked on top of each other 2. Matrix symbologies Consists of 2-D patterns of data cells that are usually square and are colored dark or white Advantage over stacked bar codes is capability to contain more data
21.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28 2-D Stacked Bar Code (PDF417) Fig 12.8
22.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28 2-D Matrix Bar Code (Data Matrix) Fig. 12.9
23.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28 Radio Frequency Identification RFID uses an identification tag containing electronically coded data that is attached to the subject item. The tag consists of a memory microchip and an antenna, usually encased in a plastic container The tag is a transponder - a device capable of emitting a signal of its own when it receives a signal from an external source The tag communicates the encoded data by RF as the item passes a reader and is activated by a low- level RF magnetic field transmitted by the reader.
24.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28 Radio Frequency Identification RFID represents the biggest challenge to the predominance of bar codes Wal-Mart, Target, Metro AG (Germany) and U.S. DoD have mandated their suppliers use RFID on incoming materials According to a study of Wal-Mart, "RFID stores are 63 percent more effective in replenishing out-of-stock items than traditional stores"
25.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28 Types of RFID Tags 1. Passive tags Have no internal power source They derive their electrical power from the external signal transmitted by the reader Smaller, less expensive, longer lasting 2. Active tags Have their own battery power packs Possess a larger memory capacity and longer communication range Higher cost and used for higher value items
26.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28 Industrial Applications of RFID Inventory management Supply chain management Tracking systems Warehouse control Location identification Work-in-progress
27.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28 RFID Advantages and Disadvantages Advantages Identification does not depend on physical contact or direct line of sight Much more data can be contained in the identification tag than with most AIDC technologies Data in read/write tags can be altered for historical usage purposes or to reuse the tag Disadvantages More expensive than most other AIDC technologies
28.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28 Bar Codes vs. RFID Comparison Bar Codes RFID Technology Optical Radio frequency Read-write capability Read only Read-write available Memory capacity 14 to 16 digits (linear) 96 to 256 digits Line-of-sight reading Required Not required Reusability One-time use Reusable Cost Very low cost per label Approx 10X cost of bar code Durability Susceptible to dirt Mode durable in plant and scratches environment
29.
©2008 Pearson Education,
Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28 Other AIDC Technologies Magnetic stripes Used for credit cards and money access cards More expensive than bar codes Must contact scanner to obtain a reading Optical character recognition (OCR) Can be read by humans and machine readers Low first read rate Machine vision Principal application is inspection Used with 2-D optical symbols
Download now