SlideShare ist ein Scribd-Unternehmen logo
1 von 29
2.
Automatic Identification and
Data Capture
1
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28
Automatic Identification and Data
Capture
Sections:
1. Overview of Automatic Identification Methods
2. Bar Code Technology
3. Radio Frequency Identification
4. Other AIDC Technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28
Automatic Identification
and Data Capture
A family of technologies that provide direct entry of data
into a computer or other microprocessor controlled
system without using a keyboard
 Reasons for using AIDC:
1. Data accuracy
2. Timeliness
3. Labor reduction
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28
Alternative to AIDC: Manual Methods
of Data Collection and Entry
Problems with manual collection and data entry:
1. Human errors
 When data are collected and entered manually
2. Time factor
 Time delay between occurrence of activities and events
and entry of associated data
 Manual methods are inherently time consuming
3. Labor cost
 Cost of full-time attention of human worker
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28
AIDC Applications
 Retail sales and inventory control
 Material handling
 Shipping and receiving, sortation, order picking, mail
and parcel handling
 Factory operations
 Order processing, WIP tracking, machine utilization,
worker attendance
 Other
 Patient identification in hospitals, check processing in
banks, security system
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28
Components of AIDC
Nearly all AIDC technologies consist of three principal
components, which are the sequential steps in AIDC:
1. Data encoding - alphanumeric characters are translated
to machine-readable form
2. Machine reading or scanning - scanner reads the
encoded data and converts it to alternative form, usually
an electrical signal
3. Data decoding - electrical signal is transformed into digital
data and finally back into original alphanumeric
characters
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28
AIDC Technologies
1. Optical
 Bar codes (linear and 2-D), optical character
recognition, machine vision
2. Electromagnetic
 Radio frequency identification (RFID)
3. Magnetic
 Data are encoded magnetically, similar to magnetic
tape (e.g., plastic credit cards, bank checks), and
magnetic ink character recognition
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28
AIDC Technologies
4. Smart card
 Small plastic cards imbedded with microchips
(integrated circuits)
5. Touch techniques
 Touch screens
6. Biometric
 Voice recognition, fingerprint analysis, retinal eye
scans
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28
Measures of AIDC Reading Accuracy
1. First read rate (FRR)
 Probability of a successful (correct) reading by the
scanner in its initial attempt
2. Substitution error rate (SER)
 Probability of scanner incorrectly reading the encoded
character as some other character
 In a given set of encoded data containing n
characters, the expected number of errors = SER * n
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28
Bar Code Technology
 Bar codes are of two basic types:
1. Linear
 Encoded data are read using a linear sweep of the
scanner
2. Two-dimensional
 Encoded data must be read in both directions
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28
Linear (One-Dimensional) Bar Codes
Two forms of linear bar codes:
1. Width-modulated
 Symbol consists of bars and spaces of varying width
 Most widely used (e.g., Universal Product Code)
2. Height-modulated
 Symbol consists of bars and spaces of varying height
 Used only by U.S. Postal Service for ZIP code
identification
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28
Two Forms of Bar Codes
(a) (b)
(a) Width-modulated bar code, exemplified here by the Universal
Product Code (UPC), and
(b) (b) height-modulated bar code, exemplified by Postnet, used by
the U.S. Postal Service
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28
SOS Distress Signal in
"Morse" Bar Codes
Fig. 12.2
Difficulties with the "Morse" bar codes:
(1) only the dark bars are used, thus increasing the length of the
coded symbol, and
(2) (2) the number of bars making up the alphanumeric characters
differs, making decoding more difficult
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28
Reading the Bar Code
(a)
(b)
Conversion of bar code into a electrical signal pulse train :
(a) bar code and,
(b) (b) corresponding electrical signal
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28
Code 39
A typical grouping of
characters to form a
bar code in Code 39.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28
USD-2
Character Set
USD-2 is a subset
of Code 39
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28
Linear Bar Code Readers
Usually classified as:
1. Contact
 Hand-held wands or light pens operated by moving
the tip quickly past the bar code
2. Noncontact
 Readers focus a light beam on the bar code and a
photodetector reads the reflected signal
1. Fixed beam - stationary readers used fixed beam
2. Moving beam - light beam (lasers) traverse an
angular sweep to search for the bar code
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28
Bar Code Scanner
Stationary moving beam bar code scanner located along a moving
conveyor
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28
Bar-Coded Route Sheet
Bar-coded
production order
and route sheet
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28
Two-Dimensional Bar Codes
 First 2-D bar code introduced in 1987
 Two basic types of 2-D bar code symbols
1. Stacked bar codes
 Consists of multiple rows of conventional bar
codes stacked on top of each other
2. Matrix symbologies
 Consists of 2-D patterns of data cells that are
usually square and are colored dark or white
 Advantage over stacked bar codes is capability to
contain more data
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28
2-D Stacked Bar Code (PDF417)
Fig 12.8
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28
2-D Matrix Bar Code (Data Matrix)
Fig. 12.9
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28
Radio Frequency Identification
RFID uses an identification tag containing electronically
coded data that is attached to the subject item.
 The tag consists of a memory microchip and an antenna,
usually encased in a plastic container
 The tag is a transponder - a device capable of emitting
a signal of its own when it receives a signal from an
external source
 The tag communicates the encoded data by RF as
the item passes a reader and is activated by a low-
level RF magnetic field transmitted by the reader.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28
Radio Frequency Identification
 RFID represents the biggest challenge to the
predominance of bar codes
 Wal-Mart, Target, Metro AG (Germany) and U.S. DoD
have mandated their suppliers use RFID on incoming
materials
 According to a study of Wal-Mart, "RFID stores are 63
percent more effective in replenishing out-of-stock
items than traditional stores"
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28
Types of RFID Tags
1. Passive tags
 Have no internal power source
 They derive their electrical power from the external
signal transmitted by the reader
 Smaller, less expensive, longer lasting
2. Active tags
 Have their own battery power packs
 Possess a larger memory capacity and longer
communication range
 Higher cost and used for higher value items
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28
Industrial Applications of RFID
 Inventory management
 Supply chain management
 Tracking systems
 Warehouse control
 Location identification
 Work-in-progress
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28
RFID Advantages and Disadvantages
 Advantages
 Identification does not depend on physical contact or
direct line of sight
 Much more data can be contained in the identification
tag than with most AIDC technologies
 Data in read/write tags can be altered for historical
usage purposes or to reuse the tag
 Disadvantages
 More expensive than most other AIDC technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28
Bar Codes vs. RFID
Comparison Bar Codes RFID
Technology Optical Radio frequency
Read-write capability Read only Read-write available
Memory capacity 14 to 16 digits (linear) 96 to 256 digits
Line-of-sight reading Required Not required
Reusability One-time use Reusable
Cost Very low cost per label Approx 10X cost of bar
code
Durability Susceptible to dirt Mode durable in plant
and scratches environment
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28
Other AIDC Technologies
 Magnetic stripes
 Used for credit cards and money access cards
 More expensive than bar codes
 Must contact scanner to obtain a reading
 Optical character recognition (OCR)
 Can be read by humans and machine readers
 Low first read rate
 Machine vision
 Principal application is inspection
 Used with 2-D optical symbols

Weitere ähnliche Inhalte

Was ist angesagt?

Group Technology, coding and cell design
Group Technology, coding and cell designGroup Technology, coding and cell design
Group Technology, coding and cell designNauman khan
 
Adaptive control System
Adaptive control SystemAdaptive control System
Adaptive control SystemSUMIT ATTRI
 
Wire Arc Additive Manufacturing
Wire Arc Additive ManufacturingWire Arc Additive Manufacturing
Wire Arc Additive ManufacturingBatuhan Özçalık
 
FLEXIBLE MANUFACTURING SYSTEM
FLEXIBLE MANUFACTURING SYSTEMFLEXIBLE MANUFACTURING SYSTEM
FLEXIBLE MANUFACTURING SYSTEMAnand Khare
 
GROUP TECHNOLOGY AND CAPP
GROUP TECHNOLOGY AND CAPPGROUP TECHNOLOGY AND CAPP
GROUP TECHNOLOGY AND CAPPmanimaran m
 
Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...
Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...
Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...kiran555555
 
Additive MANAUFACTURING
Additive MANAUFACTURINGAdditive MANAUFACTURING
Additive MANAUFACTURINGDaniel raj
 
Computer aided quality control
Computer aided quality controlComputer aided quality control
Computer aided quality controlAhmad Bajwa
 
Interchangeability & selective assembly
Interchangeability & selective assemblyInterchangeability & selective assembly
Interchangeability & selective assemblyKumar Chirra
 
NC CNC DNC - A K Mansuri
NC CNC DNC - A K MansuriNC CNC DNC - A K Mansuri
NC CNC DNC - A K MansuriMansuriak
 
Flexible manufacturing systems (FMS)
Flexible manufacturing systems (FMS)Flexible manufacturing systems (FMS)
Flexible manufacturing systems (FMS)jntuhcej
 
Automated storage and retrieval systems
Automated storage and retrieval systemsAutomated storage and retrieval systems
Automated storage and retrieval systemsRAJA GAUTAM
 
cad design process VS conventional design process
cad design process VS conventional design processcad design process VS conventional design process
cad design process VS conventional design processJagilam Kumar
 
Layout of FMS
Layout of FMSLayout of FMS
Layout of FMSsgrsoni45
 
Maintenance and material handling methods (1)
Maintenance and material handling methods (1)Maintenance and material handling methods (1)
Maintenance and material handling methods (1)Harpreet Singh Grover
 
COORDINATE MEASURING MACHINE
COORDINATE MEASURING MACHINECOORDINATE MEASURING MACHINE
COORDINATE MEASURING MACHINEarunkumar6836
 
Coordinate Measuring Machine(CMM)
Coordinate Measuring Machine(CMM)Coordinate Measuring Machine(CMM)
Coordinate Measuring Machine(CMM)Tushar Makvana
 
Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).Nitin Patil
 

Was ist angesagt? (20)

Group Technology, coding and cell design
Group Technology, coding and cell designGroup Technology, coding and cell design
Group Technology, coding and cell design
 
Adaptive control System
Adaptive control SystemAdaptive control System
Adaptive control System
 
Wire Arc Additive Manufacturing
Wire Arc Additive ManufacturingWire Arc Additive Manufacturing
Wire Arc Additive Manufacturing
 
CIM Unit 1
CIM Unit 1CIM Unit 1
CIM Unit 1
 
FLEXIBLE MANUFACTURING SYSTEM
FLEXIBLE MANUFACTURING SYSTEMFLEXIBLE MANUFACTURING SYSTEM
FLEXIBLE MANUFACTURING SYSTEM
 
GROUP TECHNOLOGY AND CAPP
GROUP TECHNOLOGY AND CAPPGROUP TECHNOLOGY AND CAPP
GROUP TECHNOLOGY AND CAPP
 
Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...
Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...
Automation in manufacturing five unit vtu, mechanical engineering notes pdf d...
 
Additive MANAUFACTURING
Additive MANAUFACTURINGAdditive MANAUFACTURING
Additive MANAUFACTURING
 
Computer aided quality control
Computer aided quality controlComputer aided quality control
Computer aided quality control
 
Interchangeability & selective assembly
Interchangeability & selective assemblyInterchangeability & selective assembly
Interchangeability & selective assembly
 
NC CNC DNC - A K Mansuri
NC CNC DNC - A K MansuriNC CNC DNC - A K Mansuri
NC CNC DNC - A K Mansuri
 
Flexible manufacturing systems (FMS)
Flexible manufacturing systems (FMS)Flexible manufacturing systems (FMS)
Flexible manufacturing systems (FMS)
 
Automated storage and retrieval systems
Automated storage and retrieval systemsAutomated storage and retrieval systems
Automated storage and retrieval systems
 
cad design process VS conventional design process
cad design process VS conventional design processcad design process VS conventional design process
cad design process VS conventional design process
 
Layout of FMS
Layout of FMSLayout of FMS
Layout of FMS
 
Maintenance and material handling methods (1)
Maintenance and material handling methods (1)Maintenance and material handling methods (1)
Maintenance and material handling methods (1)
 
Rapid tooling (rt)
Rapid tooling (rt)Rapid tooling (rt)
Rapid tooling (rt)
 
COORDINATE MEASURING MACHINE
COORDINATE MEASURING MACHINECOORDINATE MEASURING MACHINE
COORDINATE MEASURING MACHINE
 
Coordinate Measuring Machine(CMM)
Coordinate Measuring Machine(CMM)Coordinate Measuring Machine(CMM)
Coordinate Measuring Machine(CMM)
 
Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).Flexible manufacturing system(FMS).
Flexible manufacturing system(FMS).
 

Ähnlich wie Automatic Identification and Data Capture Techniques

IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
 
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAbhishekChavan77
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesIRJET Journal
 
introduction to the services and manufacturing systems
introduction to the services and manufacturing systemsintroduction to the services and manufacturing systems
introduction to the services and manufacturing systemsMohamedAlSaeed15
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior CitizensIRJET Journal
 
IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired PeopleIRJET Journal
 
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET Journal
 
Automated Production Lines.ppt
Automated Production Lines.pptAutomated Production Lines.ppt
Automated Production Lines.pptAbhishekChavan77
 
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging SystemIRJET Journal
 

Ähnlich wie Automatic Identification and Data Capture Techniques (20)

67042 ch09
67042 ch0967042 ch09
67042 ch09
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
Automated Assembly Systems
Automated Assembly SystemsAutomated Assembly Systems
Automated Assembly Systems
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.ppt
 
automation method.ppt
automation method.pptautomation method.ppt
automation method.ppt
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
 
introduction to the services and manufacturing systems
introduction to the services and manufacturing systemsintroduction to the services and manufacturing systems
introduction to the services and manufacturing systems
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
 
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry Pi
 
Automated Production Lines.ppt
Automated Production Lines.pptAutomated Production Lines.ppt
Automated Production Lines.ppt
 
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging System
 

Mehr von Nafis Ahmad

Introduction CIM
Introduction CIMIntroduction CIM
Introduction CIMNafis Ahmad
 
Safety management
Safety management Safety management
Safety management Nafis Ahmad
 
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)Nafis Ahmad
 
Flexible Manufacturing System
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing SystemNafis Ahmad
 
Decision making considering multi-attributes
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributesNafis Ahmad
 
Breakeven & sensitivity analysis
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysisNafis Ahmad
 
Replacement analysis
Replacement analysisReplacement analysis
Replacement analysisNafis Ahmad
 
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisNafis Ahmad
 
Depreciation and income taxes
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxesNafis Ahmad
 
Comparison and selection among alternatives
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternativesNafis Ahmad
 
CADCAM: Data exchange standards
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standardsNafis Ahmad
 
Industrial Robots
Industrial RobotsIndustrial Robots
Industrial RobotsNafis Ahmad
 
Evaluating a Single Project
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single ProjectNafis Ahmad
 
Entity Manipulation
Entity ManipulationEntity Manipulation
Entity ManipulationNafis Ahmad
 
Evaluating a single project
Evaluating a single projectEvaluating a single project
Evaluating a single projectNafis Ahmad
 
Computer graphics
Computer graphicsComputer graphics
Computer graphicsNafis Ahmad
 
Failure Mode & Effect Analysis
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect AnalysisNafis Ahmad
 
Reliability Centered Maintenance
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered MaintenanceNafis Ahmad
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenanceNafis Ahmad
 

Mehr von Nafis Ahmad (20)

Introduction CIM
Introduction CIMIntroduction CIM
Introduction CIM
 
Safety management
Safety management Safety management
Safety management
 
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)
 
Flexible Manufacturing System
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing System
 
CAD-CAM-CIM
CAD-CAM-CIMCAD-CAM-CIM
CAD-CAM-CIM
 
Decision making considering multi-attributes
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributes
 
Breakeven & sensitivity analysis
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysis
 
Replacement analysis
Replacement analysisReplacement analysis
Replacement analysis
 
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysis
 
Depreciation and income taxes
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxes
 
Comparison and selection among alternatives
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternatives
 
CADCAM: Data exchange standards
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standards
 
Industrial Robots
Industrial RobotsIndustrial Robots
Industrial Robots
 
Evaluating a Single Project
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single Project
 
Entity Manipulation
Entity ManipulationEntity Manipulation
Entity Manipulation
 
Evaluating a single project
Evaluating a single projectEvaluating a single project
Evaluating a single project
 
Computer graphics
Computer graphicsComputer graphics
Computer graphics
 
Failure Mode & Effect Analysis
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect Analysis
 
Reliability Centered Maintenance
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered Maintenance
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenance
 

Kürzlich hochgeladen

Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxRashidFaridChishti
 
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...jiyav969
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineJulioCesarSalazarHer1
 
BORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfBORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfomarzaboub1997
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoninghotman30312
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdfKamal Acharya
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxalijaker017
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...Roi Lipman
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineAftabkhan575376
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdftawat puangthong
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...ShivamTiwari995432
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 

Kürzlich hochgeladen (20)

Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
Vip ℂall Girls Karkardooma Phone No 9999965857 High Profile ℂall Girl Delhi N...
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
BORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdfBORESCOPE INSPECTION for engins CFM56.pdf
BORESCOPE INSPECTION for engins CFM56.pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 

Automatic Identification and Data Capture Techniques

  • 2. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28 Automatic Identification and Data Capture Sections: 1. Overview of Automatic Identification Methods 2. Bar Code Technology 3. Radio Frequency Identification 4. Other AIDC Technologies
  • 3. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28 Automatic Identification and Data Capture A family of technologies that provide direct entry of data into a computer or other microprocessor controlled system without using a keyboard  Reasons for using AIDC: 1. Data accuracy 2. Timeliness 3. Labor reduction
  • 4. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28 Alternative to AIDC: Manual Methods of Data Collection and Entry Problems with manual collection and data entry: 1. Human errors  When data are collected and entered manually 2. Time factor  Time delay between occurrence of activities and events and entry of associated data  Manual methods are inherently time consuming 3. Labor cost  Cost of full-time attention of human worker
  • 5. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28 AIDC Applications  Retail sales and inventory control  Material handling  Shipping and receiving, sortation, order picking, mail and parcel handling  Factory operations  Order processing, WIP tracking, machine utilization, worker attendance  Other  Patient identification in hospitals, check processing in banks, security system
  • 6. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28 Components of AIDC Nearly all AIDC technologies consist of three principal components, which are the sequential steps in AIDC: 1. Data encoding - alphanumeric characters are translated to machine-readable form 2. Machine reading or scanning - scanner reads the encoded data and converts it to alternative form, usually an electrical signal 3. Data decoding - electrical signal is transformed into digital data and finally back into original alphanumeric characters
  • 7. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28 AIDC Technologies 1. Optical  Bar codes (linear and 2-D), optical character recognition, machine vision 2. Electromagnetic  Radio frequency identification (RFID) 3. Magnetic  Data are encoded magnetically, similar to magnetic tape (e.g., plastic credit cards, bank checks), and magnetic ink character recognition
  • 8. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28 AIDC Technologies 4. Smart card  Small plastic cards imbedded with microchips (integrated circuits) 5. Touch techniques  Touch screens 6. Biometric  Voice recognition, fingerprint analysis, retinal eye scans
  • 9. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28 Measures of AIDC Reading Accuracy 1. First read rate (FRR)  Probability of a successful (correct) reading by the scanner in its initial attempt 2. Substitution error rate (SER)  Probability of scanner incorrectly reading the encoded character as some other character  In a given set of encoded data containing n characters, the expected number of errors = SER * n
  • 10. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28 Bar Code Technology  Bar codes are of two basic types: 1. Linear  Encoded data are read using a linear sweep of the scanner 2. Two-dimensional  Encoded data must be read in both directions
  • 11. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28 Linear (One-Dimensional) Bar Codes Two forms of linear bar codes: 1. Width-modulated  Symbol consists of bars and spaces of varying width  Most widely used (e.g., Universal Product Code) 2. Height-modulated  Symbol consists of bars and spaces of varying height  Used only by U.S. Postal Service for ZIP code identification
  • 12. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28 Two Forms of Bar Codes (a) (b) (a) Width-modulated bar code, exemplified here by the Universal Product Code (UPC), and (b) (b) height-modulated bar code, exemplified by Postnet, used by the U.S. Postal Service
  • 13. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28 SOS Distress Signal in "Morse" Bar Codes Fig. 12.2 Difficulties with the "Morse" bar codes: (1) only the dark bars are used, thus increasing the length of the coded symbol, and (2) (2) the number of bars making up the alphanumeric characters differs, making decoding more difficult
  • 14. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28 Reading the Bar Code (a) (b) Conversion of bar code into a electrical signal pulse train : (a) bar code and, (b) (b) corresponding electrical signal
  • 15. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28 Code 39 A typical grouping of characters to form a bar code in Code 39.
  • 16. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28 USD-2 Character Set USD-2 is a subset of Code 39
  • 17. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28 Linear Bar Code Readers Usually classified as: 1. Contact  Hand-held wands or light pens operated by moving the tip quickly past the bar code 2. Noncontact  Readers focus a light beam on the bar code and a photodetector reads the reflected signal 1. Fixed beam - stationary readers used fixed beam 2. Moving beam - light beam (lasers) traverse an angular sweep to search for the bar code
  • 18. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28 Bar Code Scanner Stationary moving beam bar code scanner located along a moving conveyor
  • 19. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28 Bar-Coded Route Sheet Bar-coded production order and route sheet
  • 20. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28 Two-Dimensional Bar Codes  First 2-D bar code introduced in 1987  Two basic types of 2-D bar code symbols 1. Stacked bar codes  Consists of multiple rows of conventional bar codes stacked on top of each other 2. Matrix symbologies  Consists of 2-D patterns of data cells that are usually square and are colored dark or white  Advantage over stacked bar codes is capability to contain more data
  • 21. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28 2-D Stacked Bar Code (PDF417) Fig 12.8
  • 22. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28 2-D Matrix Bar Code (Data Matrix) Fig. 12.9
  • 23. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28 Radio Frequency Identification RFID uses an identification tag containing electronically coded data that is attached to the subject item.  The tag consists of a memory microchip and an antenna, usually encased in a plastic container  The tag is a transponder - a device capable of emitting a signal of its own when it receives a signal from an external source  The tag communicates the encoded data by RF as the item passes a reader and is activated by a low- level RF magnetic field transmitted by the reader.
  • 24. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28 Radio Frequency Identification  RFID represents the biggest challenge to the predominance of bar codes  Wal-Mart, Target, Metro AG (Germany) and U.S. DoD have mandated their suppliers use RFID on incoming materials  According to a study of Wal-Mart, "RFID stores are 63 percent more effective in replenishing out-of-stock items than traditional stores"
  • 25. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28 Types of RFID Tags 1. Passive tags  Have no internal power source  They derive their electrical power from the external signal transmitted by the reader  Smaller, less expensive, longer lasting 2. Active tags  Have their own battery power packs  Possess a larger memory capacity and longer communication range  Higher cost and used for higher value items
  • 26. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28 Industrial Applications of RFID  Inventory management  Supply chain management  Tracking systems  Warehouse control  Location identification  Work-in-progress
  • 27. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28 RFID Advantages and Disadvantages  Advantages  Identification does not depend on physical contact or direct line of sight  Much more data can be contained in the identification tag than with most AIDC technologies  Data in read/write tags can be altered for historical usage purposes or to reuse the tag  Disadvantages  More expensive than most other AIDC technologies
  • 28. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28 Bar Codes vs. RFID Comparison Bar Codes RFID Technology Optical Radio frequency Read-write capability Read only Read-write available Memory capacity 14 to 16 digits (linear) 96 to 256 digits Line-of-sight reading Required Not required Reusability One-time use Reusable Cost Very low cost per label Approx 10X cost of bar code Durability Susceptible to dirt Mode durable in plant and scratches environment
  • 29. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28 Other AIDC Technologies  Magnetic stripes  Used for credit cards and money access cards  More expensive than bar codes  Must contact scanner to obtain a reading  Optical character recognition (OCR)  Can be read by humans and machine readers  Low first read rate  Machine vision  Principal application is inspection  Used with 2-D optical symbols