Automatic Identification and Data Capture Techniques

Nafis Ahmad
Nafis AhmadProfessor, Dept. of IPE, BUET um BUET
2.
Automatic Identification and
Data Capture
1
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28
Automatic Identification and Data
Capture
Sections:
1. Overview of Automatic Identification Methods
2. Bar Code Technology
3. Radio Frequency Identification
4. Other AIDC Technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28
Automatic Identification
and Data Capture
A family of technologies that provide direct entry of data
into a computer or other microprocessor controlled
system without using a keyboard
 Reasons for using AIDC:
1. Data accuracy
2. Timeliness
3. Labor reduction
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28
Alternative to AIDC: Manual Methods
of Data Collection and Entry
Problems with manual collection and data entry:
1. Human errors
 When data are collected and entered manually
2. Time factor
 Time delay between occurrence of activities and events
and entry of associated data
 Manual methods are inherently time consuming
3. Labor cost
 Cost of full-time attention of human worker
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28
AIDC Applications
 Retail sales and inventory control
 Material handling
 Shipping and receiving, sortation, order picking, mail
and parcel handling
 Factory operations
 Order processing, WIP tracking, machine utilization,
worker attendance
 Other
 Patient identification in hospitals, check processing in
banks, security system
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28
Components of AIDC
Nearly all AIDC technologies consist of three principal
components, which are the sequential steps in AIDC:
1. Data encoding - alphanumeric characters are translated
to machine-readable form
2. Machine reading or scanning - scanner reads the
encoded data and converts it to alternative form, usually
an electrical signal
3. Data decoding - electrical signal is transformed into digital
data and finally back into original alphanumeric
characters
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28
AIDC Technologies
1. Optical
 Bar codes (linear and 2-D), optical character
recognition, machine vision
2. Electromagnetic
 Radio frequency identification (RFID)
3. Magnetic
 Data are encoded magnetically, similar to magnetic
tape (e.g., plastic credit cards, bank checks), and
magnetic ink character recognition
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28
AIDC Technologies
4. Smart card
 Small plastic cards imbedded with microchips
(integrated circuits)
5. Touch techniques
 Touch screens
6. Biometric
 Voice recognition, fingerprint analysis, retinal eye
scans
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28
Measures of AIDC Reading Accuracy
1. First read rate (FRR)
 Probability of a successful (correct) reading by the
scanner in its initial attempt
2. Substitution error rate (SER)
 Probability of scanner incorrectly reading the encoded
character as some other character
 In a given set of encoded data containing n
characters, the expected number of errors = SER * n
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28
Bar Code Technology
 Bar codes are of two basic types:
1. Linear
 Encoded data are read using a linear sweep of the
scanner
2. Two-dimensional
 Encoded data must be read in both directions
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28
Linear (One-Dimensional) Bar Codes
Two forms of linear bar codes:
1. Width-modulated
 Symbol consists of bars and spaces of varying width
 Most widely used (e.g., Universal Product Code)
2. Height-modulated
 Symbol consists of bars and spaces of varying height
 Used only by U.S. Postal Service for ZIP code
identification
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28
Two Forms of Bar Codes
(a) (b)
(a) Width-modulated bar code, exemplified here by the Universal
Product Code (UPC), and
(b) (b) height-modulated bar code, exemplified by Postnet, used by
the U.S. Postal Service
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28
SOS Distress Signal in
"Morse" Bar Codes
Fig. 12.2
Difficulties with the "Morse" bar codes:
(1) only the dark bars are used, thus increasing the length of the
coded symbol, and
(2) (2) the number of bars making up the alphanumeric characters
differs, making decoding more difficult
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28
Reading the Bar Code
(a)
(b)
Conversion of bar code into a electrical signal pulse train :
(a) bar code and,
(b) (b) corresponding electrical signal
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28
Code 39
A typical grouping of
characters to form a
bar code in Code 39.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28
USD-2
Character Set
USD-2 is a subset
of Code 39
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28
Linear Bar Code Readers
Usually classified as:
1. Contact
 Hand-held wands or light pens operated by moving
the tip quickly past the bar code
2. Noncontact
 Readers focus a light beam on the bar code and a
photodetector reads the reflected signal
1. Fixed beam - stationary readers used fixed beam
2. Moving beam - light beam (lasers) traverse an
angular sweep to search for the bar code
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28
Bar Code Scanner
Stationary moving beam bar code scanner located along a moving
conveyor
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28
Bar-Coded Route Sheet
Bar-coded
production order
and route sheet
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28
Two-Dimensional Bar Codes
 First 2-D bar code introduced in 1987
 Two basic types of 2-D bar code symbols
1. Stacked bar codes
 Consists of multiple rows of conventional bar
codes stacked on top of each other
2. Matrix symbologies
 Consists of 2-D patterns of data cells that are
usually square and are colored dark or white
 Advantage over stacked bar codes is capability to
contain more data
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28
2-D Stacked Bar Code (PDF417)
Fig 12.8
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28
2-D Matrix Bar Code (Data Matrix)
Fig. 12.9
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28
Radio Frequency Identification
RFID uses an identification tag containing electronically
coded data that is attached to the subject item.
 The tag consists of a memory microchip and an antenna,
usually encased in a plastic container
 The tag is a transponder - a device capable of emitting
a signal of its own when it receives a signal from an
external source
 The tag communicates the encoded data by RF as
the item passes a reader and is activated by a low-
level RF magnetic field transmitted by the reader.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28
Radio Frequency Identification
 RFID represents the biggest challenge to the
predominance of bar codes
 Wal-Mart, Target, Metro AG (Germany) and U.S. DoD
have mandated their suppliers use RFID on incoming
materials
 According to a study of Wal-Mart, "RFID stores are 63
percent more effective in replenishing out-of-stock
items than traditional stores"
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28
Types of RFID Tags
1. Passive tags
 Have no internal power source
 They derive their electrical power from the external
signal transmitted by the reader
 Smaller, less expensive, longer lasting
2. Active tags
 Have their own battery power packs
 Possess a larger memory capacity and longer
communication range
 Higher cost and used for higher value items
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28
Industrial Applications of RFID
 Inventory management
 Supply chain management
 Tracking systems
 Warehouse control
 Location identification
 Work-in-progress
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28
RFID Advantages and Disadvantages
 Advantages
 Identification does not depend on physical contact or
direct line of sight
 Much more data can be contained in the identification
tag than with most AIDC technologies
 Data in read/write tags can be altered for historical
usage purposes or to reuse the tag
 Disadvantages
 More expensive than most other AIDC technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28
Bar Codes vs. RFID
Comparison Bar Codes RFID
Technology Optical Radio frequency
Read-write capability Read only Read-write available
Memory capacity 14 to 16 digits (linear) 96 to 256 digits
Line-of-sight reading Required Not required
Reusability One-time use Reusable
Cost Very low cost per label Approx 10X cost of bar
code
Durability Susceptible to dirt Mode durable in plant
and scratches environment
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28
Other AIDC Technologies
 Magnetic stripes
 Used for credit cards and money access cards
 More expensive than bar codes
 Must contact scanner to obtain a reading
 Optical character recognition (OCR)
 Can be read by humans and machine readers
 Low first read rate
 Machine vision
 Principal application is inspection
 Used with 2-D optical symbols
1 von 29

Recomendados

engineering von
engineering engineering
engineering advitya kumar
2.9K views18 Folien
06 group technology von
06 group technology06 group technology
06 group technologyArif Rahman
9.8K views82 Folien
Unit iv Shop floor control and FMS von
Unit iv Shop floor control and FMSUnit iv Shop floor control and FMS
Unit iv Shop floor control and FMSmanimaran m
9.8K views40 Folien
Automated storage and retrieval system and Automatic identification and data ... von
Automated storage and retrieval system and Automatic identification and data ...Automated storage and retrieval system and Automatic identification and data ...
Automated storage and retrieval system and Automatic identification and data ...Prashant Mulge 8095548003
423 views23 Folien
Production Planning and Process Planning von
Production Planning and Process PlanningProduction Planning and Process Planning
Production Planning and Process PlanningPraveenManickam2
756 views103 Folien

Más contenido relacionado

Was ist angesagt?

Group Technology von
Group TechnologyGroup Technology
Group TechnologyPratish Rawat
411 views34 Folien
Cellular manufacturing von
Cellular manufacturingCellular manufacturing
Cellular manufacturingDineshKumar4165
698 views88 Folien
Machine Vision Systems And Applications von
Machine Vision Systems And ApplicationsMachine Vision Systems And Applications
Machine Vision Systems And ApplicationsFrancy Abraham, MSEE, MBA
7.5K views23 Folien
Machine Layout Design and Optimization von
Machine Layout Design and OptimizationMachine Layout Design and Optimization
Machine Layout Design and OptimizationNareshkumar Kannathasan
27.7K views73 Folien
Basics of automation von
Basics of automationBasics of automation
Basics of automationAdarsh M.kalla
1.3K views31 Folien

Was ist angesagt?(20)

Computer integrated production planning von Venu Yadav
Computer integrated production planningComputer integrated production planning
Computer integrated production planning
Venu Yadav6.9K views
Computer Aided Process Planning (CAPP) von Bhushan Tawade
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
Bhushan Tawade3.2K views
selective laser machining in additive manufacturing von Sashi Kumar Nandyala
selective laser machining in additive manufacturingselective laser machining in additive manufacturing
selective laser machining in additive manufacturing
Computer control in process planning Unit 4 (ME CAD/CAM) von Avt Shubhash
Computer control in process planning Unit 4 (ME CAD/CAM)Computer control in process planning Unit 4 (ME CAD/CAM)
Computer control in process planning Unit 4 (ME CAD/CAM)
Avt Shubhash5.8K views
Automation 2018 von vcdas
Automation  2018Automation  2018
Automation 2018
vcdas783 views
Cellular manufacturing von ananya0122
Cellular manufacturingCellular manufacturing
Cellular manufacturing
ananya012226.7K views
Unit iii. automated assemby systems von Kunal mane
Unit iii.  automated assemby systemsUnit iii.  automated assemby systems
Unit iii. automated assemby systems
Kunal mane1K views
Computer application for testing (contact and non-contact) von Ghassan Alshahiri
Computer application for testing (contact and non-contact)Computer application for testing (contact and non-contact)
Computer application for testing (contact and non-contact)
Ghassan Alshahiri3.1K views
COMPUTER AIDED PROCESS PLANNING (CAPP) von Victor Al
COMPUTER AIDED PROCESS PLANNING (CAPP)COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)
Victor Al32.3K views

Similar a Automatic Identification and Data Capture Techniques

67042 ch09 von
67042 ch0967042 ch09
67042 ch09Nilesh Jugurnath
4.7K views22 Folien
IRJET- Real-Time Face Tracking for Password Authentication von
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
12 views4 Folien
Automated Assembly Systems von
Automated Assembly SystemsAutomated Assembly Systems
Automated Assembly SystemsVADLAJAGADEESHWARAAC
368 views28 Folien
IRJET - Dual Verification ATM for Blind People von
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
19 views3 Folien
Automated-Assembly-Systems.ppt von
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAbhishekChavan77
62 views28 Folien
automation method.ppt von
automation method.pptautomation method.ppt
automation method.pptAbhijitBhattacherjee4
3 views28 Folien

Similar a Automatic Identification and Data Capture Techniques(20)

IRJET- Real-Time Face Tracking for Password Authentication von IRJET Journal
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal12 views
IRJET - Dual Verification ATM for Blind People von IRJET Journal
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
IRJET Journal19 views
IRJET- Recognition of Vehicle Number Plate using Raspberry PI von IRJET Journal
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET Journal517 views
IRJET- Recognition of Vehicle Number Plate using Raspberry PI von IRJET Journal
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET Journal159 views
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin... von IRJET Journal
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET Journal60 views
Real Time Character Recognition on FPGA for Braille Devices von IRJET Journal
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
IRJET Journal95 views
IJSRED-V2I2P36 von IJSRED
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36
IJSRED23 views
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ... von IRJET Journal
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET Journal11 views
Face Recognition using Raspberry PI for Door Lock System von IRJET Journal
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal132 views
IRJET - Examination Forgery Avoidance System using Image Processing and IoT von IRJET Journal
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET Journal9 views
IRJET- Smart Machine System for Virtually Impaired People von IRJET Journal
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
IRJET Journal8 views
IRJET- Optical Character Recognition for Blind using Raspberry Pi von IRJET Journal
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET Journal54 views
IRJET- Automatic Vehicle Accident Detection and Messaging System von IRJET Journal
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET Journal32 views

Más de Nafis Ahmad

Introduction CIM von
Introduction CIMIntroduction CIM
Introduction CIMNafis Ahmad
183 views46 Folien
Safety management von
Safety management Safety management
Safety management Nafis Ahmad
262 views44 Folien
IPE-431 Machine Tools (Part-C) von
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)Nafis Ahmad
766 views89 Folien
Flexible Manufacturing System von
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing SystemNafis Ahmad
58 views50 Folien
CAD-CAM-CIM von
CAD-CAM-CIMCAD-CAM-CIM
CAD-CAM-CIMNafis Ahmad
129 views17 Folien
Decision making considering multi-attributes von
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributesNafis Ahmad
345 views27 Folien

Más de Nafis Ahmad(20)

Safety management von Nafis Ahmad
Safety management Safety management
Safety management
Nafis Ahmad262 views
IPE-431 Machine Tools (Part-C) von Nafis Ahmad
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)
Nafis Ahmad766 views
Flexible Manufacturing System von Nafis Ahmad
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing System
Nafis Ahmad58 views
Decision making considering multi-attributes von Nafis Ahmad
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributes
Nafis Ahmad345 views
Breakeven & sensitivity analysis von Nafis Ahmad
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysis
Nafis Ahmad405 views
Replacement analysis von Nafis Ahmad
Replacement analysisReplacement analysis
Replacement analysis
Nafis Ahmad1.3K views
Benefit-Cost (B-C) ratio analysis von Nafis Ahmad
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysis
Nafis Ahmad719 views
Depreciation and income taxes von Nafis Ahmad
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxes
Nafis Ahmad589 views
Comparison and selection among alternatives von Nafis Ahmad
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternatives
Nafis Ahmad809 views
CADCAM: Data exchange standards von Nafis Ahmad
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standards
Nafis Ahmad470 views
Evaluating a Single Project von Nafis Ahmad
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single Project
Nafis Ahmad1.6K views
Entity Manipulation von Nafis Ahmad
Entity ManipulationEntity Manipulation
Entity Manipulation
Nafis Ahmad286 views
Evaluating a single project von Nafis Ahmad
Evaluating a single projectEvaluating a single project
Evaluating a single project
Nafis Ahmad275 views
Failure Mode & Effect Analysis von Nafis Ahmad
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect Analysis
Nafis Ahmad1.8K views
Reliability Centered Maintenance von Nafis Ahmad
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered Maintenance
Nafis Ahmad411 views
Corrective maintenance von Nafis Ahmad
Corrective maintenanceCorrective maintenance
Corrective maintenance
Nafis Ahmad1.2K views

Último

GDSC Mikroskil Members Onboarding 2023.pdf von
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdfgdscmikroskil
51 views62 Folien
Object Oriented Programming with JAVA von
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVADemian Antony D'Mello
140 views28 Folien
What is Unit Testing von
What is Unit TestingWhat is Unit Testing
What is Unit TestingSadaaki Emura
23 views25 Folien
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) von
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
28 views16 Folien
SNMPx von
SNMPxSNMPx
SNMPxAmatullahbutt
17 views12 Folien
Proposal Presentation.pptx von
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptxkeytonallamon
29 views36 Folien

Último(20)

GDSC Mikroskil Members Onboarding 2023.pdf von gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil51 views
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) von Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Advances in micro milling: From tool fabrication to process outcomes von Shivendra Nandan
Advances in micro milling: From tool fabrication to process outcomesAdvances in micro milling: From tool fabrication to process outcomes
Advances in micro milling: From tool fabrication to process outcomes
Control Systems Feedback.pdf von LGGaming5
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdf
LGGaming56 views
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... von AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya1272 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7853 views
Effect of deep chemical mixing columns on properties of surrounding soft clay... von AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli6 views
Design of machine elements-UNIT 3.pptx von gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 views
fakenews_DBDA_Mar23.pptx von deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra814 views
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... von AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli9 views

Automatic Identification and Data Capture Techniques

  • 2. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28 Automatic Identification and Data Capture Sections: 1. Overview of Automatic Identification Methods 2. Bar Code Technology 3. Radio Frequency Identification 4. Other AIDC Technologies
  • 3. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28 Automatic Identification and Data Capture A family of technologies that provide direct entry of data into a computer or other microprocessor controlled system without using a keyboard  Reasons for using AIDC: 1. Data accuracy 2. Timeliness 3. Labor reduction
  • 4. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28 Alternative to AIDC: Manual Methods of Data Collection and Entry Problems with manual collection and data entry: 1. Human errors  When data are collected and entered manually 2. Time factor  Time delay between occurrence of activities and events and entry of associated data  Manual methods are inherently time consuming 3. Labor cost  Cost of full-time attention of human worker
  • 5. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28 AIDC Applications  Retail sales and inventory control  Material handling  Shipping and receiving, sortation, order picking, mail and parcel handling  Factory operations  Order processing, WIP tracking, machine utilization, worker attendance  Other  Patient identification in hospitals, check processing in banks, security system
  • 6. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28 Components of AIDC Nearly all AIDC technologies consist of three principal components, which are the sequential steps in AIDC: 1. Data encoding - alphanumeric characters are translated to machine-readable form 2. Machine reading or scanning - scanner reads the encoded data and converts it to alternative form, usually an electrical signal 3. Data decoding - electrical signal is transformed into digital data and finally back into original alphanumeric characters
  • 7. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28 AIDC Technologies 1. Optical  Bar codes (linear and 2-D), optical character recognition, machine vision 2. Electromagnetic  Radio frequency identification (RFID) 3. Magnetic  Data are encoded magnetically, similar to magnetic tape (e.g., plastic credit cards, bank checks), and magnetic ink character recognition
  • 8. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28 AIDC Technologies 4. Smart card  Small plastic cards imbedded with microchips (integrated circuits) 5. Touch techniques  Touch screens 6. Biometric  Voice recognition, fingerprint analysis, retinal eye scans
  • 9. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28 Measures of AIDC Reading Accuracy 1. First read rate (FRR)  Probability of a successful (correct) reading by the scanner in its initial attempt 2. Substitution error rate (SER)  Probability of scanner incorrectly reading the encoded character as some other character  In a given set of encoded data containing n characters, the expected number of errors = SER * n
  • 10. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28 Bar Code Technology  Bar codes are of two basic types: 1. Linear  Encoded data are read using a linear sweep of the scanner 2. Two-dimensional  Encoded data must be read in both directions
  • 11. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28 Linear (One-Dimensional) Bar Codes Two forms of linear bar codes: 1. Width-modulated  Symbol consists of bars and spaces of varying width  Most widely used (e.g., Universal Product Code) 2. Height-modulated  Symbol consists of bars and spaces of varying height  Used only by U.S. Postal Service for ZIP code identification
  • 12. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28 Two Forms of Bar Codes (a) (b) (a) Width-modulated bar code, exemplified here by the Universal Product Code (UPC), and (b) (b) height-modulated bar code, exemplified by Postnet, used by the U.S. Postal Service
  • 13. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28 SOS Distress Signal in "Morse" Bar Codes Fig. 12.2 Difficulties with the "Morse" bar codes: (1) only the dark bars are used, thus increasing the length of the coded symbol, and (2) (2) the number of bars making up the alphanumeric characters differs, making decoding more difficult
  • 14. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28 Reading the Bar Code (a) (b) Conversion of bar code into a electrical signal pulse train : (a) bar code and, (b) (b) corresponding electrical signal
  • 15. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28 Code 39 A typical grouping of characters to form a bar code in Code 39.
  • 16. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28 USD-2 Character Set USD-2 is a subset of Code 39
  • 17. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28 Linear Bar Code Readers Usually classified as: 1. Contact  Hand-held wands or light pens operated by moving the tip quickly past the bar code 2. Noncontact  Readers focus a light beam on the bar code and a photodetector reads the reflected signal 1. Fixed beam - stationary readers used fixed beam 2. Moving beam - light beam (lasers) traverse an angular sweep to search for the bar code
  • 18. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28 Bar Code Scanner Stationary moving beam bar code scanner located along a moving conveyor
  • 19. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28 Bar-Coded Route Sheet Bar-coded production order and route sheet
  • 20. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28 Two-Dimensional Bar Codes  First 2-D bar code introduced in 1987  Two basic types of 2-D bar code symbols 1. Stacked bar codes  Consists of multiple rows of conventional bar codes stacked on top of each other 2. Matrix symbologies  Consists of 2-D patterns of data cells that are usually square and are colored dark or white  Advantage over stacked bar codes is capability to contain more data
  • 21. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28 2-D Stacked Bar Code (PDF417) Fig 12.8
  • 22. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28 2-D Matrix Bar Code (Data Matrix) Fig. 12.9
  • 23. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28 Radio Frequency Identification RFID uses an identification tag containing electronically coded data that is attached to the subject item.  The tag consists of a memory microchip and an antenna, usually encased in a plastic container  The tag is a transponder - a device capable of emitting a signal of its own when it receives a signal from an external source  The tag communicates the encoded data by RF as the item passes a reader and is activated by a low- level RF magnetic field transmitted by the reader.
  • 24. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28 Radio Frequency Identification  RFID represents the biggest challenge to the predominance of bar codes  Wal-Mart, Target, Metro AG (Germany) and U.S. DoD have mandated their suppliers use RFID on incoming materials  According to a study of Wal-Mart, "RFID stores are 63 percent more effective in replenishing out-of-stock items than traditional stores"
  • 25. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28 Types of RFID Tags 1. Passive tags  Have no internal power source  They derive their electrical power from the external signal transmitted by the reader  Smaller, less expensive, longer lasting 2. Active tags  Have their own battery power packs  Possess a larger memory capacity and longer communication range  Higher cost and used for higher value items
  • 26. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28 Industrial Applications of RFID  Inventory management  Supply chain management  Tracking systems  Warehouse control  Location identification  Work-in-progress
  • 27. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28 RFID Advantages and Disadvantages  Advantages  Identification does not depend on physical contact or direct line of sight  Much more data can be contained in the identification tag than with most AIDC technologies  Data in read/write tags can be altered for historical usage purposes or to reuse the tag  Disadvantages  More expensive than most other AIDC technologies
  • 28. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28 Bar Codes vs. RFID Comparison Bar Codes RFID Technology Optical Radio frequency Read-write capability Read only Read-write available Memory capacity 14 to 16 digits (linear) 96 to 256 digits Line-of-sight reading Required Not required Reusability One-time use Reusable Cost Very low cost per label Approx 10X cost of bar code Durability Susceptible to dirt Mode durable in plant and scratches environment
  • 29. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28 Other AIDC Technologies  Magnetic stripes  Used for credit cards and money access cards  More expensive than bar codes  Must contact scanner to obtain a reading  Optical character recognition (OCR)  Can be read by humans and machine readers  Low first read rate  Machine vision  Principal application is inspection  Used with 2-D optical symbols