SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
UNDERSTANDING
BAR CODES
TABLE OF CONTENTS
UPC Bar Code
How They Are Commonly Used … 4
Anatomy of A UPC (A) Bar Code … 5
UPC (A) Bar Code Glossary … 6
How It All Works … 7
Testing The Algorithm … 8

QR Code
How They Are Commonly Used … 16
The Anatomy Of A QR Code … 17
QR Code Glossary … 18
How It All Works … 19

2D Bar Code / Data Matrix
How They Are Commonly Used … 10
Anatomy Of A Data Matrix … 12
Data Matrix Bar Code Glossary … 13
Benefits of The Data Matrix … 14

2	
  
UPC BAR CODE 
The UPC ( A ) bar code symbol, is one of the most
common applications of bar code technology and is
seen on products everywhere.
3	
  
HOW THEY ARE
COMMONLY USED
Bar codes are everywhere and they are used to identify
everything from auto parts to hospital patients. The
Universal Product Code is used to identify retail items in
virtually every store and market in the country.

4	
  
THE ANATOMY OF A UPC (A) BAR CODE 
95 MODULES WIDE!

LEFT GUARD!

CENTER GUARD!

THE	
  FIRST	
  SIX	
  
	
  FIGURES	
  DEFINE	
  THE	
  	
  
MANUFACTURER’S	
  
	
  IDENTIFICATION	
  NUMBER	
  

RIGHT GUARD!

THE	
  NEXT	
  FIVE	
  	
  
DIGITS	
  ARE	
  THE	
  	
  
ITEM	
  NUMBER	
  	
  

MANUFACTURER	
  	
  
IDENTIFICATION	
  	
  
NUMBER	
  

CHECKSUM	
  	
  
DIGIT	
  	
  

MANUFACTURER	
  ID	
  CODE	
  

ITEM	
  NUMBER	
  

5	
  
UPC (A) BAR CODE GLOSSARY
UPC: Universal Product Code 

MODULES: The vertical bars that make up the bar code symbol. Numbers are created by patterns of filled
and unfilled modules. 84 modules are used for digits, and 11 are used for the guards that define the symbols
boundaries.
GUARDS: Left and right guards mark the beginning and end of the symbol and the center guard marks the
division between the manufacturer and product codes.
MANUFACTURER CODE: Is made up of the first six digits and is distributed and managed by the UCC
(Uniform Code Council).
MANUFACTURER IDENTIFICATION NUMBER: Used to identify the particular numbering system used by the
manufacturer.
ITEM NUMBER: Assigned to each product and is defined by the last five digits.

CHECKSUM: A single digit used for error checking.


6	
  
HOW IT ALL WORKS 
First, the scanner flashes a laser across the
code reading the lines and spaces across. !

1+3+5+7+9=25

In a fraction of a second the scanner makes
several calculations to determine the
orientation of the code and then error checks
to make certain that the scan was valid. !
!
It does this by testing an algorithm against
the checksum digit.!

7	
  
TESTING THE ALGORITHM

0+2+4+6+8=20	
  

20x3=60	
  

1+3+5+7+9=25	
  

First the scanner sums the
digits in the odd positions !

Then it multiplies that !
result by three!

Next, it sums the even !
place digits !

60+25=85	
  

85/10=8R5	
  

10-­‐5=5	
  

And adds the two sums!

That result is divided by ten!

The remainder is subtracted from
ten to verify the checksum. If the
checksum doesn’t match, the
scanner reports an error and the
code must be re-scanned.!

8	
  
2D BAR CODE / DATA MATRIX
Two dimensional bar codes are called so because the reader
scans both horizontally and vertically across the symbol,
unlike linear barcodes.
9	
  
HOW THEY ARE
COMMONLY USED
Along with the less popular PDF417 (actually stacked linear)
and Aztec symbologies, Data Matrix is commonly used in
healthcare. Because of its accuracy, efficiency and small
size, it works particularly well on patient wristbands and
medication labels, as it is less likely to distort around curves
and takes up less space, in addition to being highly
readable and accurate.

10	
  
2D symbologies, like Data Matrix,
provide a consistent and reliable
means of labeling small objects.
	
  	
  

11	
  
THE ANATOMY OF A DATA MATRIX 
TIMING	
  PATTERN	
  

QUIET	
  ZONE	
  

MODULE	
  

DATA	
  REGION	
  

FINDER	
  PATTERN	
  

12	
  
DATA MATRIX BAR CODE GLOSSARY

MODULES: Small square cells that make up the bar code symbol. Usually, dark modules
represent a digital 1 and light represent 0.
FINDER PATTERN: Two adjacent, solid borders are designated the finder pattern. These borders
are used by the scanner to locate and orient the symbol and to correct distortion.
TIMING PATTERN: Two opposite adjacent pair of borders are constructed with alternating dark
and light cells and are designated as the timing pattern. This component gives the scanner
information about the symbol’s size.
DATA REGION: The actual data and error correction information is divided into regions in the
symbol which contain a pattern of modules in a consistent array.
QUIET ZONE: A clear space around the symbol.

13	
  
BENEFITS OF THE
DATA MATRIX


VERY EFFICIENT: Misread probability of 1/10.5 million (for the 3 of 9 symbol the probability
drops to 1/1.7 million).
SMALL: Almost 40X smaller than a 3 of 9 carrying the same data.
DEPENDABLE: Error correction capabilities (ECC200 method) allows accurate reads on symbols
with up to 60% damage.
FAXABLE: Data Matrix is also one of the few codes that are faxable. The outstanding capabilities
of ECC200 error correction allows even poorly resolved faxed images to be reliably scanned.
STORAGE CAPACITY: They are designed to encode up to 2335 alphanumeric characters,
though they have a recommended limit of 800 characters, actual best case is around 1200.
14	
  
QR CODE
The Quick Response or QR code is a trademarked two-dimensional
barcode first designed for the automotive industry in Japan in 1994
by Denso Wave, a Toyota subsidiary. Almost a decade ago, it was
introduced to enable high-speed component scanning during the
manufacturing process.
15	
  
HOW THEY ARE
COMMONLY USED
Since then QR codes have become ubiquitous, showing
up on product packaging, billboards and bumper
stickers, in magazines and just about any place where
a consumer with a smartphone is likely to seek more
information about any topic, item or idea.

16	
  
THE ANATOMY OF A QR CODE

TIMING	
  PATTERN	
  
MODULES	
  

ENCODING	
  PORTION	
  

ALIGNMENT	
  PATTERN	
  

FINDER	
  PATTERN	
  

17	
  
QR CODE GLOSSARY

MODULES: square modules arranged on a grid. These modules form the components of the
code. Within the code the modules fall into two categories:	
  functional and encoding.
FUNCTIONAL MODULES: referring to those pieces that enable accessing the data
ENCODING MODULES: pieces used to store actual data
FINDER PATTERN: These are made up of alternating black and empty modules used to indicate
the position of the symbol’s internal components.
ALIGNMENT PATTERNS: looking much like smaller versions of the positional detection
indicators may occur in several places in the code depending on the code version.
ENCODING PORTION: consists of the information formatting areas and the data and error
correction space.
QUIET ZONE: A clear space around the symbol
18	
  
HOW IT ALL WORKS 
Data is divided up into code blocks within the data
area, and each code block is sized so that it can
contain no more than 15 errors. This strategy
simplifies the algorithm, and interleaving the data in
the code blocks minimizes the possibility of an
unreadable code due to partial damage to symbol.
This also allows for some artistic license with adding
logos and other simple graphics to QR Codes.
QR Codes can contain four basic types of information:
numeric, alphanumeric, binary and Kanji.
The key to the success of QR Codes lies in the
use of Reed-Solomon error correction.

19	
  
The QR Code bridges the gap between
the physical and virtual worlds.
	
  	
  
20	
  
About NEPS:
NEPS is a Business-Process-Automation Software and Services company. We
deliver the technology platform and services for personalized communications
between our clients and their customers with data-driven hosted and installed
software solutions.
Our mission-critical business solutions operate in highly complex, data-intensive,
regulated environments for the financial services, insurance, healthcare and other
select industries.
 

© NEPS, LLC. All rights reserved.

Contact NEPS:
www.neps.com
@nepsllc
(866)636-6377

21	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr codeCoder Tech
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1dhananajay95
 
seminar-on-barcodes
seminar-on-barcodesseminar-on-barcodes
seminar-on-barcodesalibefkani
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBadshah34
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readersadil529
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationZachary Moore
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeRehan Guha
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Rohan Sawant
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminarUmsh23
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareMuhammed Afsal Villan
 

Was ist angesagt? (20)

Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
 
Barcode latest technology1
Barcode latest technology1Barcode latest technology1
Barcode latest technology1
 
seminar-on-barcodes
seminar-on-barcodesseminar-on-barcodes
seminar-on-barcodes
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
Qr codes
Qr codesQr codes
Qr codes
 
Qr codes
Qr codesQr codes
Qr codes
 
Barcode Decoder
Barcode DecoderBarcode Decoder
Barcode Decoder
 
Qr codes
Qr codesQr codes
Qr codes
 
Qr code
Qr codeQr code
Qr code
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
 
QR Code - Mobile readable Barcode
QR Code - Mobile readable BarcodeQR Code - Mobile readable Barcode
QR Code - Mobile readable Barcode
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
Smart Shopping System
Smart Shopping SystemSmart Shopping System
Smart Shopping System
 
QR-CODE presentation slide
QR-CODE presentation slideQR-CODE presentation slide
QR-CODE presentation slide
 
QR codes
QR codesQR codes
QR codes
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and Hardware
 

Andere mochten auch

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14NEPSLLC
 
BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.Gauri Agrawal
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationAkshay Shelake
 
Operational Amplifiers And Logic Gates
Operational Amplifiers And Logic GatesOperational Amplifiers And Logic Gates
Operational Amplifiers And Logic Gatesdheva B
 
An introduction to QR Codes.
An introduction to QR Codes.An introduction to QR Codes.
An introduction to QR Codes.Pieter Ardinois
 
SAP Advanced Track and Trace
SAP Advanced Track and TraceSAP Advanced Track and Trace
SAP Advanced Track and TraceRyan Sonnenberg
 
Bar code-technology in tire industry
Bar code-technology in tire industryBar code-technology in tire industry
Bar code-technology in tire industryhemanth102030
 
Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR) Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR) Abhijit Patil
 
Transistor as an amplifier
Transistor as an amplifierTransistor as an amplifier
Transistor as an amplifierAnshu Kumar
 
finfet & dg-fet technology
finfet & dg-fet technologyfinfet & dg-fet technology
finfet & dg-fet technologyKritika Ramesh
 
ground penetrating radar
ground penetrating radarground penetrating radar
ground penetrating radarGauravate
 
Fin Fet Technology by SAMRA
Fin Fet  Technology by SAMRAFin Fet  Technology by SAMRA
Fin Fet Technology by SAMRABal Partap Singh
 

Andere mochten auch (20)

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14
 
BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its application
 
Operational Amplifiers And Logic Gates
Operational Amplifiers And Logic GatesOperational Amplifiers And Logic Gates
Operational Amplifiers And Logic Gates
 
Barcode
BarcodeBarcode
Barcode
 
Operational amplifiers
Operational amplifiersOperational amplifiers
Operational amplifiers
 
An introduction to QR Codes.
An introduction to QR Codes.An introduction to QR Codes.
An introduction to QR Codes.
 
SAP Advanced Track and Trace
SAP Advanced Track and TraceSAP Advanced Track and Trace
SAP Advanced Track and Trace
 
Bar code-technology in tire industry
Bar code-technology in tire industryBar code-technology in tire industry
Bar code-technology in tire industry
 
Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR) Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR)
 
Transistor as an amplifier
Transistor as an amplifierTransistor as an amplifier
Transistor as an amplifier
 
Qr code power point
Qr code power pointQr code power point
Qr code power point
 
finfet & dg-fet technology
finfet & dg-fet technologyfinfet & dg-fet technology
finfet & dg-fet technology
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Bar Code
Bar CodeBar Code
Bar Code
 
Nano solar cells
Nano solar cellsNano solar cells
Nano solar cells
 
ground penetrating radar
ground penetrating radarground penetrating radar
ground penetrating radar
 
Fin Fet Technology by SAMRA
Fin Fet  Technology by SAMRAFin Fet  Technology by SAMRA
Fin Fet Technology by SAMRA
 
Television Receiver
Television ReceiverTelevision Receiver
Television Receiver
 

Ähnlich wie Understanding Bar Codes

Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology pptVyakhayaYadav
 
Barcodes & Your Business
Barcodes & Your BusinessBarcodes & Your Business
Barcodes & Your BusinessLabelValue.com
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technologyDeveshDRA
 
Quick Response Code (QR code)
Quick Response Code (QR code)Quick Response Code (QR code)
Quick Response Code (QR code)Aditya Jha ✅
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology pptNeeta Chavare
 
The Definitive Guide to Barcoding
The Definitive Guide to BarcodingThe Definitive Guide to Barcoding
The Definitive Guide to BarcodingADCBarcode
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
 
How do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode KnowledgeHow do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode KnowledgeBarcode Live
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.RakibulIslam268
 
Barcode printing presentation lgi
Barcode printing presentation lgiBarcode printing presentation lgi
Barcode printing presentation lgiVan Chiang
 

Ähnlich wie Understanding Bar Codes (20)

QR code
QR codeQR code
QR code
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
Barcodes
BarcodesBarcodes
Barcodes
 
Barcodes & Your Business
Barcodes & Your BusinessBarcodes & Your Business
Barcodes & Your Business
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technology
 
Quick Response Code (QR code)
Quick Response Code (QR code)Quick Response Code (QR code)
Quick Response Code (QR code)
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 
The Definitive Guide to Barcoding
The Definitive Guide to BarcodingThe Definitive Guide to Barcoding
The Definitive Guide to Barcoding
 
Silchar paper final
Silchar paper finalSilchar paper final
Silchar paper final
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
How do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode KnowledgeHow do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode Knowledge
 
Bar code technology
Bar code technologyBar code technology
Bar code technology
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.
 
14 571
14 57114 571
14 571
 
Barcode printing presentation lgi
Barcode printing presentation lgiBarcode printing presentation lgi
Barcode printing presentation lgi
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Understanding Bar Codes

  • 2. TABLE OF CONTENTS UPC Bar Code How They Are Commonly Used … 4 Anatomy of A UPC (A) Bar Code … 5 UPC (A) Bar Code Glossary … 6 How It All Works … 7 Testing The Algorithm … 8 QR Code How They Are Commonly Used … 16 The Anatomy Of A QR Code … 17 QR Code Glossary … 18 How It All Works … 19 2D Bar Code / Data Matrix How They Are Commonly Used … 10 Anatomy Of A Data Matrix … 12 Data Matrix Bar Code Glossary … 13 Benefits of The Data Matrix … 14 2  
  • 3. UPC BAR CODE The UPC ( A ) bar code symbol, is one of the most common applications of bar code technology and is seen on products everywhere. 3  
  • 4. HOW THEY ARE COMMONLY USED Bar codes are everywhere and they are used to identify everything from auto parts to hospital patients. The Universal Product Code is used to identify retail items in virtually every store and market in the country. 4  
  • 5. THE ANATOMY OF A UPC (A) BAR CODE 95 MODULES WIDE! LEFT GUARD! CENTER GUARD! THE  FIRST  SIX    FIGURES  DEFINE  THE     MANUFACTURER’S    IDENTIFICATION  NUMBER   RIGHT GUARD! THE  NEXT  FIVE     DIGITS  ARE  THE     ITEM  NUMBER     MANUFACTURER     IDENTIFICATION     NUMBER   CHECKSUM     DIGIT     MANUFACTURER  ID  CODE   ITEM  NUMBER   5  
  • 6. UPC (A) BAR CODE GLOSSARY UPC: Universal Product Code MODULES: The vertical bars that make up the bar code symbol. Numbers are created by patterns of filled and unfilled modules. 84 modules are used for digits, and 11 are used for the guards that define the symbols boundaries. GUARDS: Left and right guards mark the beginning and end of the symbol and the center guard marks the division between the manufacturer and product codes. MANUFACTURER CODE: Is made up of the first six digits and is distributed and managed by the UCC (Uniform Code Council). MANUFACTURER IDENTIFICATION NUMBER: Used to identify the particular numbering system used by the manufacturer. ITEM NUMBER: Assigned to each product and is defined by the last five digits. CHECKSUM: A single digit used for error checking. 6  
  • 7. HOW IT ALL WORKS First, the scanner flashes a laser across the code reading the lines and spaces across. ! 1+3+5+7+9=25 In a fraction of a second the scanner makes several calculations to determine the orientation of the code and then error checks to make certain that the scan was valid. ! ! It does this by testing an algorithm against the checksum digit.! 7  
  • 8. TESTING THE ALGORITHM 0+2+4+6+8=20   20x3=60   1+3+5+7+9=25   First the scanner sums the digits in the odd positions ! Then it multiplies that ! result by three! Next, it sums the even ! place digits ! 60+25=85   85/10=8R5   10-­‐5=5   And adds the two sums! That result is divided by ten! The remainder is subtracted from ten to verify the checksum. If the checksum doesn’t match, the scanner reports an error and the code must be re-scanned.! 8  
  • 9. 2D BAR CODE / DATA MATRIX Two dimensional bar codes are called so because the reader scans both horizontally and vertically across the symbol, unlike linear barcodes. 9  
  • 10. HOW THEY ARE COMMONLY USED Along with the less popular PDF417 (actually stacked linear) and Aztec symbologies, Data Matrix is commonly used in healthcare. Because of its accuracy, efficiency and small size, it works particularly well on patient wristbands and medication labels, as it is less likely to distort around curves and takes up less space, in addition to being highly readable and accurate. 10  
  • 11. 2D symbologies, like Data Matrix, provide a consistent and reliable means of labeling small objects.     11  
  • 12. THE ANATOMY OF A DATA MATRIX TIMING  PATTERN   QUIET  ZONE   MODULE   DATA  REGION   FINDER  PATTERN   12  
  • 13. DATA MATRIX BAR CODE GLOSSARY MODULES: Small square cells that make up the bar code symbol. Usually, dark modules represent a digital 1 and light represent 0. FINDER PATTERN: Two adjacent, solid borders are designated the finder pattern. These borders are used by the scanner to locate and orient the symbol and to correct distortion. TIMING PATTERN: Two opposite adjacent pair of borders are constructed with alternating dark and light cells and are designated as the timing pattern. This component gives the scanner information about the symbol’s size. DATA REGION: The actual data and error correction information is divided into regions in the symbol which contain a pattern of modules in a consistent array. QUIET ZONE: A clear space around the symbol. 13  
  • 14. BENEFITS OF THE DATA MATRIX VERY EFFICIENT: Misread probability of 1/10.5 million (for the 3 of 9 symbol the probability drops to 1/1.7 million). SMALL: Almost 40X smaller than a 3 of 9 carrying the same data. DEPENDABLE: Error correction capabilities (ECC200 method) allows accurate reads on symbols with up to 60% damage. FAXABLE: Data Matrix is also one of the few codes that are faxable. The outstanding capabilities of ECC200 error correction allows even poorly resolved faxed images to be reliably scanned. STORAGE CAPACITY: They are designed to encode up to 2335 alphanumeric characters, though they have a recommended limit of 800 characters, actual best case is around 1200. 14  
  • 15. QR CODE The Quick Response or QR code is a trademarked two-dimensional barcode first designed for the automotive industry in Japan in 1994 by Denso Wave, a Toyota subsidiary. Almost a decade ago, it was introduced to enable high-speed component scanning during the manufacturing process. 15  
  • 16. HOW THEY ARE COMMONLY USED Since then QR codes have become ubiquitous, showing up on product packaging, billboards and bumper stickers, in magazines and just about any place where a consumer with a smartphone is likely to seek more information about any topic, item or idea. 16  
  • 17. THE ANATOMY OF A QR CODE TIMING  PATTERN   MODULES   ENCODING  PORTION   ALIGNMENT  PATTERN   FINDER  PATTERN   17  
  • 18. QR CODE GLOSSARY MODULES: square modules arranged on a grid. These modules form the components of the code. Within the code the modules fall into two categories:  functional and encoding. FUNCTIONAL MODULES: referring to those pieces that enable accessing the data ENCODING MODULES: pieces used to store actual data FINDER PATTERN: These are made up of alternating black and empty modules used to indicate the position of the symbol’s internal components. ALIGNMENT PATTERNS: looking much like smaller versions of the positional detection indicators may occur in several places in the code depending on the code version. ENCODING PORTION: consists of the information formatting areas and the data and error correction space. QUIET ZONE: A clear space around the symbol 18  
  • 19. HOW IT ALL WORKS Data is divided up into code blocks within the data area, and each code block is sized so that it can contain no more than 15 errors. This strategy simplifies the algorithm, and interleaving the data in the code blocks minimizes the possibility of an unreadable code due to partial damage to symbol. This also allows for some artistic license with adding logos and other simple graphics to QR Codes. QR Codes can contain four basic types of information: numeric, alphanumeric, binary and Kanji. The key to the success of QR Codes lies in the use of Reed-Solomon error correction. 19  
  • 20. The QR Code bridges the gap between the physical and virtual worlds.     20  
  • 21. About NEPS: NEPS is a Business-Process-Automation Software and Services company. We deliver the technology platform and services for personalized communications between our clients and their customers with data-driven hosted and installed software solutions. Our mission-critical business solutions operate in highly complex, data-intensive, regulated environments for the financial services, insurance, healthcare and other select industries.   © NEPS, LLC. All rights reserved. Contact NEPS: www.neps.com @nepsllc (866)636-6377 21