SlideShare a Scribd company logo
1 of 29
2.
Automatic Identification and
Data Capture
1
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28
Automatic Identification and Data
Capture
Sections:
1. Overview of Automatic Identification Methods
2. Bar Code Technology
3. Radio Frequency Identification
4. Other AIDC Technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28
Automatic Identification
and Data Capture
A family of technologies that provide direct entry of data
into a computer or other microprocessor controlled
system without using a keyboard
 Reasons for using AIDC:
1. Data accuracy
2. Timeliness
3. Labor reduction
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28
Alternative to AIDC: Manual Methods
of Data Collection and Entry
Problems with manual collection and data entry:
1. Human errors
 When data are collected and entered manually
2. Time factor
 Time delay between occurrence of activities and events
and entry of associated data
 Manual methods are inherently time consuming
3. Labor cost
 Cost of full-time attention of human worker
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28
AIDC Applications
 Retail sales and inventory control
 Material handling
 Shipping and receiving, sortation, order picking, mail
and parcel handling
 Factory operations
 Order processing, WIP tracking, machine utilization,
worker attendance
 Other
 Patient identification in hospitals, check processing in
banks, security system
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28
Components of AIDC
Nearly all AIDC technologies consist of three principal
components, which are the sequential steps in AIDC:
1. Data encoding - alphanumeric characters are translated
to machine-readable form
2. Machine reading or scanning - scanner reads the
encoded data and converts it to alternative form, usually
an electrical signal
3. Data decoding - electrical signal is transformed into digital
data and finally back into original alphanumeric
characters
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28
AIDC Technologies
1. Optical
 Bar codes (linear and 2-D), optical character
recognition, machine vision
2. Electromagnetic
 Radio frequency identification (RFID)
3. Magnetic
 Data are encoded magnetically, similar to magnetic
tape (e.g., plastic credit cards, bank checks), and
magnetic ink character recognition
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28
AIDC Technologies
4. Smart card
 Small plastic cards imbedded with microchips
(integrated circuits)
5. Touch techniques
 Touch screens
6. Biometric
 Voice recognition, fingerprint analysis, retinal eye
scans
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28
Measures of AIDC Reading Accuracy
1. First read rate (FRR)
 Probability of a successful (correct) reading by the
scanner in its initial attempt
2. Substitution error rate (SER)
 Probability of scanner incorrectly reading the encoded
character as some other character
 In a given set of encoded data containing n
characters, the expected number of errors = SER * n
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28
Bar Code Technology
 Bar codes are of two basic types:
1. Linear
 Encoded data are read using a linear sweep of the
scanner
2. Two-dimensional
 Encoded data must be read in both directions
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28
Linear (One-Dimensional) Bar Codes
Two forms of linear bar codes:
1. Width-modulated
 Symbol consists of bars and spaces of varying width
 Most widely used (e.g., Universal Product Code)
2. Height-modulated
 Symbol consists of bars and spaces of varying height
 Used only by U.S. Postal Service for ZIP code
identification
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28
Two Forms of Bar Codes
(a) (b)
(a) Width-modulated bar code, exemplified here by the Universal
Product Code (UPC), and
(b) (b) height-modulated bar code, exemplified by Postnet, used by
the U.S. Postal Service
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28
SOS Distress Signal in
"Morse" Bar Codes
Fig. 12.2
Difficulties with the "Morse" bar codes:
(1) only the dark bars are used, thus increasing the length of the
coded symbol, and
(2) (2) the number of bars making up the alphanumeric characters
differs, making decoding more difficult
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28
Reading the Bar Code
(a)
(b)
Conversion of bar code into a electrical signal pulse train :
(a) bar code and,
(b) (b) corresponding electrical signal
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28
Code 39
A typical grouping of
characters to form a
bar code in Code 39.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28
USD-2
Character Set
USD-2 is a subset
of Code 39
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28
Linear Bar Code Readers
Usually classified as:
1. Contact
 Hand-held wands or light pens operated by moving
the tip quickly past the bar code
2. Noncontact
 Readers focus a light beam on the bar code and a
photodetector reads the reflected signal
1. Fixed beam - stationary readers used fixed beam
2. Moving beam - light beam (lasers) traverse an
angular sweep to search for the bar code
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28
Bar Code Scanner
Stationary moving beam bar code scanner located along a moving
conveyor
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28
Bar-Coded Route Sheet
Bar-coded
production order
and route sheet
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28
Two-Dimensional Bar Codes
 First 2-D bar code introduced in 1987
 Two basic types of 2-D bar code symbols
1. Stacked bar codes
 Consists of multiple rows of conventional bar
codes stacked on top of each other
2. Matrix symbologies
 Consists of 2-D patterns of data cells that are
usually square and are colored dark or white
 Advantage over stacked bar codes is capability to
contain more data
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28
2-D Stacked Bar Code (PDF417)
Fig 12.8
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28
2-D Matrix Bar Code (Data Matrix)
Fig. 12.9
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28
Radio Frequency Identification
RFID uses an identification tag containing electronically
coded data that is attached to the subject item.
 The tag consists of a memory microchip and an antenna,
usually encased in a plastic container
 The tag is a transponder - a device capable of emitting
a signal of its own when it receives a signal from an
external source
 The tag communicates the encoded data by RF as
the item passes a reader and is activated by a low-
level RF magnetic field transmitted by the reader.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28
Radio Frequency Identification
 RFID represents the biggest challenge to the
predominance of bar codes
 Wal-Mart, Target, Metro AG (Germany) and U.S. DoD
have mandated their suppliers use RFID on incoming
materials
 According to a study of Wal-Mart, "RFID stores are 63
percent more effective in replenishing out-of-stock
items than traditional stores"
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28
Types of RFID Tags
1. Passive tags
 Have no internal power source
 They derive their electrical power from the external
signal transmitted by the reader
 Smaller, less expensive, longer lasting
2. Active tags
 Have their own battery power packs
 Possess a larger memory capacity and longer
communication range
 Higher cost and used for higher value items
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28
Industrial Applications of RFID
 Inventory management
 Supply chain management
 Tracking systems
 Warehouse control
 Location identification
 Work-in-progress
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28
RFID Advantages and Disadvantages
 Advantages
 Identification does not depend on physical contact or
direct line of sight
 Much more data can be contained in the identification
tag than with most AIDC technologies
 Data in read/write tags can be altered for historical
usage purposes or to reuse the tag
 Disadvantages
 More expensive than most other AIDC technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28
Bar Codes vs. RFID
Comparison Bar Codes RFID
Technology Optical Radio frequency
Read-write capability Read only Read-write available
Memory capacity 14 to 16 digits (linear) 96 to 256 digits
Line-of-sight reading Required Not required
Reusability One-time use Reusable
Cost Very low cost per label Approx 10X cost of bar
code
Durability Susceptible to dirt Mode durable in plant
and scratches environment
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28
Other AIDC Technologies
 Magnetic stripes
 Used for credit cards and money access cards
 More expensive than bar codes
 Must contact scanner to obtain a reading
 Optical character recognition (OCR)
 Can be read by humans and machine readers
 Low first read rate
 Machine vision
 Principal application is inspection
 Used with 2-D optical symbols

More Related Content

What's hot

Unit ii Process Planning
Unit ii Process PlanningUnit ii Process Planning
Unit ii Process PlanningAsha A
 
Deburring processes
Deburring  processesDeburring  processes
Deburring processesNakul Agwan
 
Computer generated time standards
Computer  generated time standardsComputer  generated time standards
Computer generated time standardsVenu Yadav
 
introduction to process planning murugananthan
introduction to process planning murugananthanintroduction to process planning murugananthan
introduction to process planning murugananthanMurugananthan K
 
CIM Computer Integrated Manufacturing
CIM Computer Integrated ManufacturingCIM Computer Integrated Manufacturing
CIM Computer Integrated ManufacturingTanuVerma39
 
Presentation Study on CMM And Application
Presentation Study on CMM And ApplicationPresentation Study on CMM And Application
Presentation Study on CMM And Applicationsandeepbags2004
 
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Pratik Gandhi
 
manufacturing support system
manufacturing support systemmanufacturing support system
manufacturing support systemsantan chaurasiya
 
Unit V CNC Machining
Unit V CNC MachiningUnit V CNC Machining
Unit V CNC Machininglaxtwinsme
 
Non traditional machining processes
Non traditional machining processesNon traditional machining processes
Non traditional machining processesMECHV
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineeringananya0122
 
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&MFUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&MBalamurugan Subburaj
 
Mechanical element of a CNC Machine
Mechanical element of a CNC MachineMechanical element of a CNC Machine
Mechanical element of a CNC Machinetjunicornfx
 
Computer Integrated Manufacturing
Computer Integrated Manufacturing  Computer Integrated Manufacturing
Computer Integrated Manufacturing suraj_21
 

What's hot (20)

Unit ii Process Planning
Unit ii Process PlanningUnit ii Process Planning
Unit ii Process Planning
 
Dfma ppt
Dfma pptDfma ppt
Dfma ppt
 
1. cad fundamental
1. cad fundamental1. cad fundamental
1. cad fundamental
 
CIM
CIMCIM
CIM
 
Deburring processes
Deburring  processesDeburring  processes
Deburring processes
 
Computer generated time standards
Computer  generated time standardsComputer  generated time standards
Computer generated time standards
 
introduction to process planning murugananthan
introduction to process planning murugananthanintroduction to process planning murugananthan
introduction to process planning murugananthan
 
3 numerical control
3 numerical control3 numerical control
3 numerical control
 
CIM Computer Integrated Manufacturing
CIM Computer Integrated ManufacturingCIM Computer Integrated Manufacturing
CIM Computer Integrated Manufacturing
 
Lecture 3 Computer - Aided Manufacturing (CAM)
Lecture 3 Computer - Aided Manufacturing (CAM)Lecture 3 Computer - Aided Manufacturing (CAM)
Lecture 3 Computer - Aided Manufacturing (CAM)
 
Presentation Study on CMM And Application
Presentation Study on CMM And ApplicationPresentation Study on CMM And Application
Presentation Study on CMM And Application
 
Electrochemical honing
Electrochemical honingElectrochemical honing
Electrochemical honing
 
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
 
manufacturing support system
manufacturing support systemmanufacturing support system
manufacturing support system
 
Unit V CNC Machining
Unit V CNC MachiningUnit V CNC Machining
Unit V CNC Machining
 
Non traditional machining processes
Non traditional machining processesNon traditional machining processes
Non traditional machining processes
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&MFUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
FUNDAMENTALS OF CNC & PART PROGRAMMING - UNIT - 4 CAD&M
 
Mechanical element of a CNC Machine
Mechanical element of a CNC MachineMechanical element of a CNC Machine
Mechanical element of a CNC Machine
 
Computer Integrated Manufacturing
Computer Integrated Manufacturing  Computer Integrated Manufacturing
Computer Integrated Manufacturing
 

Similar to Automatic Identification and Data Capture Techniques

IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
 
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAbhishekChavan77
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesIRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior CitizensIRJET Journal
 
IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired PeopleIRJET Journal
 
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET Journal
 
Automated Production Lines.ppt
Automated Production Lines.pptAutomated Production Lines.ppt
Automated Production Lines.pptAbhishekChavan77
 
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging SystemIRJET Journal
 

Similar to Automatic Identification and Data Capture Techniques (20)

67042 ch09
67042 ch0967042 ch09
67042 ch09
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
Automated Assembly Systems
Automated Assembly SystemsAutomated Assembly Systems
Automated Assembly Systems
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.ppt
 
automation method.ppt
automation method.pptautomation method.ppt
automation method.ppt
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
 
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry Pi
 
Automated Production Lines.ppt
Automated Production Lines.pptAutomated Production Lines.ppt
Automated Production Lines.ppt
 
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging System
 
Production System-1.ppt
Production System-1.pptProduction System-1.ppt
Production System-1.ppt
 

More from Nafis Ahmad

Introduction CIM
Introduction CIMIntroduction CIM
Introduction CIMNafis Ahmad
 
Safety management
Safety management Safety management
Safety management Nafis Ahmad
 
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)Nafis Ahmad
 
Flexible Manufacturing System
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing SystemNafis Ahmad
 
Decision making considering multi-attributes
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributesNafis Ahmad
 
Breakeven & sensitivity analysis
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysisNafis Ahmad
 
Replacement analysis
Replacement analysisReplacement analysis
Replacement analysisNafis Ahmad
 
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisNafis Ahmad
 
Depreciation and income taxes
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxesNafis Ahmad
 
Comparison and selection among alternatives
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternativesNafis Ahmad
 
CADCAM: Data exchange standards
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standardsNafis Ahmad
 
Industrial Robots
Industrial RobotsIndustrial Robots
Industrial RobotsNafis Ahmad
 
Evaluating a Single Project
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single ProjectNafis Ahmad
 
Entity Manipulation
Entity ManipulationEntity Manipulation
Entity ManipulationNafis Ahmad
 
Evaluating a single project
Evaluating a single projectEvaluating a single project
Evaluating a single projectNafis Ahmad
 
Computer graphics
Computer graphicsComputer graphics
Computer graphicsNafis Ahmad
 
Failure Mode & Effect Analysis
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect AnalysisNafis Ahmad
 
Reliability Centered Maintenance
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered MaintenanceNafis Ahmad
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenanceNafis Ahmad
 

More from Nafis Ahmad (20)

Introduction CIM
Introduction CIMIntroduction CIM
Introduction CIM
 
Safety management
Safety management Safety management
Safety management
 
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)
 
Flexible Manufacturing System
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing System
 
CAD-CAM-CIM
CAD-CAM-CIMCAD-CAM-CIM
CAD-CAM-CIM
 
Decision making considering multi-attributes
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributes
 
Breakeven & sensitivity analysis
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysis
 
Replacement analysis
Replacement analysisReplacement analysis
Replacement analysis
 
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysis
 
Depreciation and income taxes
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxes
 
Comparison and selection among alternatives
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternatives
 
CADCAM: Data exchange standards
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standards
 
Industrial Robots
Industrial RobotsIndustrial Robots
Industrial Robots
 
Evaluating a Single Project
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single Project
 
Entity Manipulation
Entity ManipulationEntity Manipulation
Entity Manipulation
 
Evaluating a single project
Evaluating a single projectEvaluating a single project
Evaluating a single project
 
Computer graphics
Computer graphicsComputer graphics
Computer graphics
 
Failure Mode & Effect Analysis
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect Analysis
 
Reliability Centered Maintenance
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered Maintenance
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenance
 

Recently uploaded

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Automatic Identification and Data Capture Techniques

  • 2. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28 Automatic Identification and Data Capture Sections: 1. Overview of Automatic Identification Methods 2. Bar Code Technology 3. Radio Frequency Identification 4. Other AIDC Technologies
  • 3. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28 Automatic Identification and Data Capture A family of technologies that provide direct entry of data into a computer or other microprocessor controlled system without using a keyboard  Reasons for using AIDC: 1. Data accuracy 2. Timeliness 3. Labor reduction
  • 4. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28 Alternative to AIDC: Manual Methods of Data Collection and Entry Problems with manual collection and data entry: 1. Human errors  When data are collected and entered manually 2. Time factor  Time delay between occurrence of activities and events and entry of associated data  Manual methods are inherently time consuming 3. Labor cost  Cost of full-time attention of human worker
  • 5. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28 AIDC Applications  Retail sales and inventory control  Material handling  Shipping and receiving, sortation, order picking, mail and parcel handling  Factory operations  Order processing, WIP tracking, machine utilization, worker attendance  Other  Patient identification in hospitals, check processing in banks, security system
  • 6. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28 Components of AIDC Nearly all AIDC technologies consist of three principal components, which are the sequential steps in AIDC: 1. Data encoding - alphanumeric characters are translated to machine-readable form 2. Machine reading or scanning - scanner reads the encoded data and converts it to alternative form, usually an electrical signal 3. Data decoding - electrical signal is transformed into digital data and finally back into original alphanumeric characters
  • 7. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28 AIDC Technologies 1. Optical  Bar codes (linear and 2-D), optical character recognition, machine vision 2. Electromagnetic  Radio frequency identification (RFID) 3. Magnetic  Data are encoded magnetically, similar to magnetic tape (e.g., plastic credit cards, bank checks), and magnetic ink character recognition
  • 8. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28 AIDC Technologies 4. Smart card  Small plastic cards imbedded with microchips (integrated circuits) 5. Touch techniques  Touch screens 6. Biometric  Voice recognition, fingerprint analysis, retinal eye scans
  • 9. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28 Measures of AIDC Reading Accuracy 1. First read rate (FRR)  Probability of a successful (correct) reading by the scanner in its initial attempt 2. Substitution error rate (SER)  Probability of scanner incorrectly reading the encoded character as some other character  In a given set of encoded data containing n characters, the expected number of errors = SER * n
  • 10. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28 Bar Code Technology  Bar codes are of two basic types: 1. Linear  Encoded data are read using a linear sweep of the scanner 2. Two-dimensional  Encoded data must be read in both directions
  • 11. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28 Linear (One-Dimensional) Bar Codes Two forms of linear bar codes: 1. Width-modulated  Symbol consists of bars and spaces of varying width  Most widely used (e.g., Universal Product Code) 2. Height-modulated  Symbol consists of bars and spaces of varying height  Used only by U.S. Postal Service for ZIP code identification
  • 12. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28 Two Forms of Bar Codes (a) (b) (a) Width-modulated bar code, exemplified here by the Universal Product Code (UPC), and (b) (b) height-modulated bar code, exemplified by Postnet, used by the U.S. Postal Service
  • 13. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28 SOS Distress Signal in "Morse" Bar Codes Fig. 12.2 Difficulties with the "Morse" bar codes: (1) only the dark bars are used, thus increasing the length of the coded symbol, and (2) (2) the number of bars making up the alphanumeric characters differs, making decoding more difficult
  • 14. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28 Reading the Bar Code (a) (b) Conversion of bar code into a electrical signal pulse train : (a) bar code and, (b) (b) corresponding electrical signal
  • 15. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28 Code 39 A typical grouping of characters to form a bar code in Code 39.
  • 16. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28 USD-2 Character Set USD-2 is a subset of Code 39
  • 17. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28 Linear Bar Code Readers Usually classified as: 1. Contact  Hand-held wands or light pens operated by moving the tip quickly past the bar code 2. Noncontact  Readers focus a light beam on the bar code and a photodetector reads the reflected signal 1. Fixed beam - stationary readers used fixed beam 2. Moving beam - light beam (lasers) traverse an angular sweep to search for the bar code
  • 18. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28 Bar Code Scanner Stationary moving beam bar code scanner located along a moving conveyor
  • 19. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28 Bar-Coded Route Sheet Bar-coded production order and route sheet
  • 20. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28 Two-Dimensional Bar Codes  First 2-D bar code introduced in 1987  Two basic types of 2-D bar code symbols 1. Stacked bar codes  Consists of multiple rows of conventional bar codes stacked on top of each other 2. Matrix symbologies  Consists of 2-D patterns of data cells that are usually square and are colored dark or white  Advantage over stacked bar codes is capability to contain more data
  • 21. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28 2-D Stacked Bar Code (PDF417) Fig 12.8
  • 22. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28 2-D Matrix Bar Code (Data Matrix) Fig. 12.9
  • 23. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28 Radio Frequency Identification RFID uses an identification tag containing electronically coded data that is attached to the subject item.  The tag consists of a memory microchip and an antenna, usually encased in a plastic container  The tag is a transponder - a device capable of emitting a signal of its own when it receives a signal from an external source  The tag communicates the encoded data by RF as the item passes a reader and is activated by a low- level RF magnetic field transmitted by the reader.
  • 24. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28 Radio Frequency Identification  RFID represents the biggest challenge to the predominance of bar codes  Wal-Mart, Target, Metro AG (Germany) and U.S. DoD have mandated their suppliers use RFID on incoming materials  According to a study of Wal-Mart, "RFID stores are 63 percent more effective in replenishing out-of-stock items than traditional stores"
  • 25. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28 Types of RFID Tags 1. Passive tags  Have no internal power source  They derive their electrical power from the external signal transmitted by the reader  Smaller, less expensive, longer lasting 2. Active tags  Have their own battery power packs  Possess a larger memory capacity and longer communication range  Higher cost and used for higher value items
  • 26. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28 Industrial Applications of RFID  Inventory management  Supply chain management  Tracking systems  Warehouse control  Location identification  Work-in-progress
  • 27. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28 RFID Advantages and Disadvantages  Advantages  Identification does not depend on physical contact or direct line of sight  Much more data can be contained in the identification tag than with most AIDC technologies  Data in read/write tags can be altered for historical usage purposes or to reuse the tag  Disadvantages  More expensive than most other AIDC technologies
  • 28. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28 Bar Codes vs. RFID Comparison Bar Codes RFID Technology Optical Radio frequency Read-write capability Read only Read-write available Memory capacity 14 to 16 digits (linear) 96 to 256 digits Line-of-sight reading Required Not required Reusability One-time use Reusable Cost Very low cost per label Approx 10X cost of bar code Durability Susceptible to dirt Mode durable in plant and scratches environment
  • 29. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28 Other AIDC Technologies  Magnetic stripes  Used for credit cards and money access cards  More expensive than bar codes  Must contact scanner to obtain a reading  Optical character recognition (OCR)  Can be read by humans and machine readers  Low first read rate  Machine vision  Principal application is inspection  Used with 2-D optical symbols