MASTER'S THESIS. A Concept of Using 2D Bar Codes in Retail Environments. Per Jonsson. Luleå University of Technology

Size: px
Start display at page:

Download "MASTER'S THESIS. A Concept of Using 2D Bar Codes in Retail Environments. Per Jonsson. Luleå University of Technology"

Transcription

1 MASTER'S THESIS 2008:062 CIV A Concept of Using 2D Bar Codes in Retail Environments Per Jonsson Luleå University of Technology MSc Programmes in Engineering Computer Science and Engineering Department of Computer Science and Electrical Engineering Division of Computer Science 2008:062 CIV - ISSN: ISRN: LTU-EX--08/062--SE

2 A Concept Study of Using 2D Bar Codes in Retail Environments Per Jonsson March 10, 2008

3 Abstract The recent popularity of camera equipped mobile phones have sparked a new field of use for machine-readable 2D bar codes. A code can be printed on everyday items and be interacted with using a camera phone. The interaction is initiated by scanning the 2D bar code with the phone s camera. And the reaction can be anything from simply retrieving information to triggering some action. Because of the low cost of printing 2D bar codes, there many possible applications that could be based on this. One such application is examined in this thesis and aims to improve the usefulness of normal cash register receipts. The idea is to print a 2D bar code on receipts that contains the purchase information in digital form. This is assumed to help customers with managing their receipts or with more detailed book-keeping. This assumption is evaluated by developing a prototype implementation of a receipt reader. This prototype is based on two Java libraries for decoding DataMatrix and Quick Response codes. The main conclusion from this evaluation is that the libraries used were able to store an estimate of 42 purchase items in a 2D bar code. There are trade-offs that can be implemented to increase the capacity when needed which helps to make the assumption valid.

4 Acknowledgments I would like to thank Ericsson Research in Luleå for the opportunity to write this master thesis. Especially my supervisor at Ericsson, John Sandberg and also Jakob Saros for their help and guidance. Tommy Arngren, Angelina Frediksson, Xiaolei Hu and Simon Persson deserves a big acknowledgment for their inputs and for the participation in the brainstorming session. Furthermore, I would like to thank the interview respondents and finally my supervisor at the University, Jingsen Chen. Per Jonsson March 2008 Luleå University of Technology ii

5 Contents 1 Introduction Objectives and Scope Related Work Outline Background Bar codes D bar codes D bar codes Examples of 2D Symbologies ColorCode ShotCode Quick response code DataMatrix Methods Implementation Generator Reader Evaluation Performance tests Interviews Selection of Feasible Symbologies Concept Problem Proposed solution Analysis of Requirements Variables Concept requirements Delimitations Final requirements Selection Data capacity and density Error correction Color print Available software Result iii

6 5 Implementation D Bar Code Generator Serialization Compression Visualization Receipt Reader Prototype Recognition Decompression Unserialization User interaction Evaluation of Concept Performance Tests Resolution test Capacity test Interviews Interview Interview Interview Interview summary Discussion Feasibility Interview Input Conclusions Future Work References 35 A Format Specification 37 B Tables 39 iv

7 Chapter 1 Introduction Bar codes are often associated with the scanning of items at the cash register in most stores. These bar codes encode data using several vertical lines with varying widths. But only using one dimension leaves a large part of the symbol unused. This thesis examines a variation called 2D bar codes. These codes are, unlike 1D bar codes, able to make use of the height of the symbol. As illustrated in Figure 1.1. Figure 1.1: (a) A 1D bar code only stores data in one direction while (b) 2D bar codes can utilize both dimensions. This is possible because of a change in the scanning process. 1D bar code scanners are based on only capturing a horizontal scan line. The 2D bar codes are designed to instead be processed from complete 2D camera images. The increasing availability if camera phones allows users to interact with 2D bar codes in a way that was not possible before. This introduces several opportunities for new applications. A concept of such an application is explored further in this study. The idea of this concept is to allow customers read receipts with their mobile phone. This is done by printing a 2D bar code on the receipt containing the information in digital form. As an example, having the receipt information in digital form could serve useful for personal book-keeping. 1.1 Objectives and Scope This thesis will study a concept with the goal of gaining greater knowledge of applications based upon the use of 2D bar codes. The main objective is to 1

8 2 CHAPTER 1. INTRODUCTION determine if the studied concept is feasible. This is done by examining the concept from a technical viewpoint and also by receiving input from potential providers of service. The feasibility is estimated on the basis of a prototype implementation illustrating the concept. To limit this thesis to the relevant parts of the previous paragraph, the scope have to be slightly narrowed to not include: A comparison between implementations of decoding libraries. The selection of 2D bar codes only depends on requirements posed on the capabilities in specifications and no further selection will be made on basis of performance. The results will only tell that there exists libraries so that at least those results could be reached. Tests, surveys or interviews with users. This is a subject of later evaluation and not included in this introductory assessment. Furthermore, the implementation is dependent on the available hardware, in this case a Java enabled mobile phone. This restricts the software used to the Java ME 1 platform. 1.2 Related Work Kato and Tan did a study[1] on 2D bar codes in Their study tried to determine which bar code was the most suitable for mobile phone applications in general. Based on a set of requirements, they selected the VS Code specification as the most flexible. This study is more specific toward a certain concept and also have to take construction of a prototype into consideration and will lead to a different end-result than Kato and Tan s. Even though many of the requirements concurs, no Java ME decoding library was found for the VS Code. This is seen as required in this study. 1.3 Outline This introduction is followed by a background chapter introducing bar codes. Chapter 3 describes the methods used. Chapter 4 provides the concept and also the analysis and selection of two feasible bar codes. With the help of these results, the implementation process is described in Chapter 5 where a prototype bar code reader is described. The evaluation of the prototype is presented in Chapter 6 before the discussion and some concluding points in Chapters 7 and 8. Two appendices follows the report and lists additional information about implementation details and tables. 1 Micro Edition. A subset of Java for resource-constrained devices, such as mobile phones.

9 Chapter 2 Background This chapter will begin by introducing bar codes in general and will then continue focusing on describing 2D bar codes. The background will also present some examples of what different 2D bar codes are capable of. 2.1 Bar codes Bar codes are basically a way of cheaply printing machine readable information on objects. There are many different kinds of bar codes, ranging from only being able to store a small number to several thousand bytes. The terms symbology and symbol will be used extensively in this report. Even though the terms in some cases can be used interchangeably, there is a subtle difference. The symbology is the bar code specification and the symbol is the, often printed, bar code itself. The symbology specifies a symbol s appearance, how it store its data and other attributes. This section will continue to briefly introduce 1D bar code symbologies and then move on to explain the properties of 2D bar code symbologies D bar codes 1D, or linear, bar codes is the code type most people are familiar with. These symbologies are based on multiple side-by-side vertical bars of different widths. As an example, many retail products are labeled with a number according to the European Article Numbering[2]. This number is represented by a 13 digit 1D bar code as illustrated in Figure 2.1. Figure 2.1: EAN-13 bar code encoding with check digit 8. 1D bar codes are not very space efficient since the bars do not carry any data 3

10 4 CHAPTER 2. BACKGROUND along the height of the symbol[3]. This is due to the scanning process based on horizontal scan lines. The redundancy in the height of the symbol compensates for slightly misaligned scans D bar codes Even if 2D bar codes are not necessarily made up of bars, the term bar code is still widely used for the 2D version. The scanning process for 2D bar codes are different from the one for 1D bar codes. Instead of a horizontal scan line, 2D bar codes uses complete 2D images for decoding[4]. This study classifies the 2D bar code types into three distinct categories: matrix, circular and arbitrarily shaped. Matrix shaped The majority of 2D bar code symbologies are built up by several modules arranged in a matrix. One module can represent log 2 (c) bits, where c is the number of colors that are supported by the symbology. Most common is that a module can have one of two colors, which renders each module equal to one bit. This kind of code is represented in Figure 2.2. Figure 2.2: A schematic illustration of a typical matrix shaped 2D bar code. The black and white squares inside the data area are modules. Different symbologies defines different amount of quiet zone around the data area, typically a margin of about two to four times the module width. This area should be empty to allow the reader to find and read the code more quickly. Circular shaped Circular symbols has the advantage of being more easily recalled by humans since they are not just perceived as a matrix of random blocks. Because of the lower density, these symbologies do not typically aim at handling large amounts of data. They are rather focused on storing a small identifier that is quick to read. The modules of a circular 2D bar code is parts of the circle segments composing the symbol. Figure 2.3 depicts this module arrangement.

11 2.2. EXAMPLES OF 2D SYMBOLOGIES 5 Figure 2.3: A schematic illustration of a circular shaped 2D bar code. Arbitrarily shaped Symbologies that have have some other structure than those above are classified as arbitrarily shaped. 2.2 Examples of 2D Symbologies There are two different approaches taken by the 2D symbologies, here called online and offline. 1. Online symbologies stores a small identifier representing the content. The identifier is used to retrieve the content from a remote database when read. This is also the same strategy employed by the earlier mentioned EAN-13 symbols. In the case of applications involving mobile phones, this does in practice mean that a Internet connection have to be established to retrieve content. 2. Offline symbologies are designed to store the actual content into the code itself. It should be noted that nothing restricts an application to use offline symbologies in an online fashion but the intention of offline code types is to support a greater variety of content. This is done mainly by allowing larger storage capacity but also other content types, such as numbers, text and raw binary data. The symbologies studied in this thesis are summarized in Table 2.1. A smaller subset of these will be presented in more detail below. The first two, ColorCode and ShotCode, are online symbologies and the other two, Quick Response code and DataMatrix, are offline ColorCode The standard ColorCode[5] symbol consists of 5 5 modules. This symbol have a 4 4 field of data and the last row and column are parity values for error detection (ED). With each module being one of four colors (red, blue, green or black), the number of combinations are = 2 32 which equals a width of 32 bits. ColorCode content retrieval is based on a central index where the decoded identifier is looked up. The information received is a pointer to the content server. This should enable a company to host its own content server. The

12 6 CHAPTER 2. BACKGROUND Table 2.1: List of available 2D symbologies that were studied. 3-DI ArrayTag Atom tag Aztec Code Small Aztec Code bcode BeeTagg Bullseye Code 1 Color code CP Code DataGlyphs DataMatrix Datastrip Code Dot Code A EZcode HCCB HueCode INTACTA.CODE InterCode MaxiCode mcode MiniCode PDMark PaperDisk Optar QR Code Quickmark SmartCode Snowflake Code ShotCode SuperCode Trillcode UltraCode VeriCode VSCode WaterCode parity modules can detect errors, but there is no known mechanism for correcting errors. ColorCode s properties are summarized in Table 2.2. Table 2.2: A summary of ColorCode s properties and an example symbol. The symbol is available at Name Company Data capacity Error detection Error correction Standard Domain ColorCode ColorZip Media 32 bits excl. ED Parity. None No Proprietary ShotCode The known variation of ShotCode[6] consists of one outer ring with the code s name. The two rings inside of the outer ring contains data, and the rings in the center are used as a finder pattern. By inspecting a ShotCode, it seems that each data ring can contain 24 modules which gives a total data capacity of 48 bits for both rings. Other variations may also exist. Because ShotCode is closed, there is no information on how many of the data bits that are devoted to error detection and correction or used as control bits. ShotCode s properties are summarized in Table Quick response code A Quick Response code (also known as QR code) is constructed as a matrix of modules and is characterized by its three large squares, each one located in a separate corner. These squares are used as a finder pattern. The smallest size defined in the standard[7] is modules while the bigger codes can be as large as modules. There are four levels of error

13 2.2. EXAMPLES OF 2D SYMBOLOGIES 7 Table 2.3: A summary of ShotCode s properties and an example symbol. The symbol is available at Name Company Data capacity Error detection Standard Domain ShotCode OP3 48 bits incl. ED Unknown No Proprietary detection and correction (EDAC) capability using Reed-Solomon code as listed in Table 2.4. Table 2.4: Error correction levels for Quick Response code. Error correction level Max data capacity L (7 %) M (15 %) Q (25 %) H (30 %) According to the standard, the recommended error correction level is M for a good capacity reliability ratio. QR code s properties are summarized in Table 2.5. QR code symbols are not defined for non-square versions. Table 2.5: A summary of QR code s properties and an example symbol. Name Quick Response code Company Denso Wave Data capacity bytes (Level M) Error correction Reed-Solomon Standards AIM ITS/97/001 ISO/IEC Domain Public

14 8 CHAPTER 2. BACKGROUND DataMatrix A DataMatrix symbol is recognized by the solid bars at the left and bottom edge and the dotted bars at the top and right edges. According to the standard for DataMatrix[8], these bars are used to detect the size and any distortions of the symbol. The minimum number of modules are and the maximum are The data capacity for the largest code size is bytes including error correction data. The error correction code is Reed-Solomon. The non-square versions of DataMatrix are defined for sizes up to a maximum of which equals a data capacity of 47 bytes. DataMatrix s properties are summarized in Table 2.6. Table 2.6: A summary of DataMatrix s properties and an example symbol. Name DataMatrix Company Siemens Data capacity bytes incl. EDAC Error correction Reed-Solomon Standards ANSI/AIM BC11 ISO/IEC Domain Public

15 Chapter 3 Methods This chapter will present the methods used during the thesis work. 3.1 Implementation The implementation done in this study consists of two main parts, a 2D bar code generator and a prototype for a 2D bar code reader. This section will present the materials used for both of these parts Generator The generator is developed using the Java SE release 2[9] Developers Kit running on a Microsoft Windows environment. The 2D bar codes are generated using these two publicly available encoding libraries: com.idautomation.datamatrix[10] V DEMO. com.java4less.qrcode[11] Evaluation Version. The generator does not have any requirements other than being able to produce the desired 2D bar code according to the symbology standards. As far as the implementation done in this study is concerned, these two encoding libraries manages that Reader The reader is developed for a Sony Ericsson K800i camera phone[12]. The K800i has a 3.2 mega pixels camera and is equipped with auto-focus. The Sony Ericsson SDK for the Java ME Platform[13] is used during development and emulation. The libraries used for the decoding of 2D bar codes are: jp.sourceforge.qrcode[14] 0.8. org.semacode[15] 1.6. Additionally, the recently released com.google.zxing[16] library is used in the reader as a complement. These three libraries are picked on the basis that they are easily available and manages the platform and symbology standard 9

16 10 CHAPTER 3. METHODS requirements. They can thus not be guaranteed to be the most competent libraries for decoding 2D bar codes. 3.2 Evaluation The concept is evaluated with the help of the prototype. The evaluation consists of two main parts, performance tests and interviews Performance tests All tests are performed in a typical office environment containing a single ceilingmounted fluorescent light armature. The receipts are printed using a HP Laser- Jet DPI on standard white printer paper. A receipt is assumed to be 8.0 cm wide which is a common format in Sweden and supported by HP Receipt Printers[17] among others. The performance tests tries to determine the smallest module width possible using resolution tests, and the maximum amount of items using capacity tests. The resolution tests are conducted by scanning increasingly smaller module widths until it fails. A failure is defined as not being able to scan the symbol successfully once using five tries. The capacity test are based on the results from the resolution tests and also uses the same scan criterion with at least one successful scan in five tries. This criterion is an estimate of how many times an actual user can be expected to re-scan the symbol on unsuccessful scans. As a reference, the Tasman[18] demo application version 3.50 is used in conjunction with the prototype reader during the evaluation. This is a commercial demo application which is not supported on Java ME CLDC/MIDP 1. This means that the Tasman library can not be used on the Sony Ericsson K800i. Instead, the prototype is able to store images taken with the camera for later processing on a supported platform. In this case the Tasman application is executed in a Microsoft Windows environment Interviews A series of three interviews are used to generate input on the concept developed. All of the interviews are conducted in a semi-structured manner, as proposed by Seaman[19], with representatives from local retail stores. The interviews are performed at the location of the store. The interviewee is presented with a short introduction of the concept and the prototype. After the interviewee understood the concept, he or she is encouraged to answer a number of questions. These questions are pre-written but several of them are open-ended to allow room for discussion. All interviewees are ensured that their names and the stores names would remain anonymous to not have any influence on the answers. Each respondent is briefly introduced below. Interview 1 This first respondent is a manager at a discount department store that is a part of a chain of stores in Sweden. This store have customers of mixed age with a 1 Connected Limited Device Configuration (CLDC), Mobile Information Device Profile (MIDP)

17 3.2. EVALUATION 11 slight bias toward adults and elders. Interview 2 The respondent in interview 2 is a store manager for a small grocery store in Sweden. Their customers are of mixed age. Interview 3 Interviewee 3 is a store manager at a clothing company that is well established with a chain of stores located in the north of Europe. Their stores have youths as their typical customers.

18 Chapter 4 Selection of Feasible Symbologies The main goal for this chapter is to describe the election of two symbologies that fulfills a certain set of requirements. These requirements are found with the help of the concept examined in this thesis. This concept is presented next. 4.1 Concept By looking at current problems that might be solved by 2D bar codes and feedback from the brainstorming session, a concept is developed. The concept is motivated by a problem description Problem Paper receipts are used to record many retail business transactions today. For a customer, a receipt is often only used as a proof of purchase and it is hard to gain any additional advantage of the detailed information available. It is difficult to replace physical receipts with some other method. Mainly because there is currently no existing feasible alternative for every user to store that information at the time of purchase. The alternate way is to store the information from the purchase in a central database and later let the customer access the information via the Internet. This will entirely exclude the customers that do not have the possibility to do so on the Internet, but might be a viable option for the future. Having established that paper receipt will at least remain until every customer feels comfortable enough with accessing the information using the Internet, are there improvements to be done to an actual paper receipt? Proposed solution Printing a 2D bar code on each receipt containing detailed information about the purchase enables customers to easily access the information with their camera phone. The receipt can still be used as ordinarily, but extra functionality is provided to those who prefer to use it. The 2D bar code should contain the 12

19 4.2. ANALYSIS OF REQUIREMENTS 13 same purchase information as written on the receipt, but it is possible to store additional information as well. As soon as the information is in digital form, it can automatically be categorized or used in different statistics. One example is to transfer the information to a desktop computer, where detailed book-keeping could be held. This example is illustrated in Figure 4.1. Figure 4.1: Example usage. (a) Purchase the items and receive a receipt. (b) Scan the 2D bar code on the receipt with the camera phone. (c) The information can later be transfered to, for instance, computer book-keeping. 4.2 Analysis of Requirements For a symbology to be able to support the concept introduced in the previous section, it has to be able to handle the requirements inflicted by it. This section aims to find these requirements Variables The analysis is based on the set of variables listed in Table 4.1. These variables are factors that are identified as varying between different symbologies. Table 4.1: The variables that forms the basis for the analysis. Variable Description Data capacity The maximum amount of storage capacity. Data density The ratio between data capacity and print size. Error correction The ability to restore damaged symbols. Available software Available decoding libraries. Color print The need for color to represent a symbol. Character encodings The ability to support multiple languages. Security If the symbology supports any security aspects.

20 14 CHAPTER 4. SELECTION OF FEASIBLE SYMBOLOGIES Concept requirements These are the requirements inflicted by the concept presented in Section 4.1. Data capacity and density Two ways of storing the receipt information in a 2D bar code are considered, as illustrated by Figure 4.2. Figure 4.2: Information retrieval process for (a) an offline solution, and (b) an online solution. One way is to do it in an offline fashion. That is, to store all of the information into the symbol itself. Another approach is to only store an identifier. This identifier is later looked up in a remote database to retrieve the actual content. Both solutions have advantages and disadvantages: Symbol size Offline symbols are highly restricted by the symbol size. The amount of information that can be stored into the symbol is limited, which causes problems with receipts containing many items. In an online solution, the symbol size is not dependent on the total number of items. It will always have the same symbol size. Privacy The online solution causes issues with privacy that the users might fell less comfortable with. Mainly in having all of their purchase information in a remote database. Because the information can be retreived using only the identifier, it has to be protected by a password. This adds another step in the scanning process and can still not be guaranteed to be safe. The offline way do not have this issue since it do not have any worse privacy concerns than a normal receipt. Life-time How long should a user s information be stored? The online solution will not work as soon as the information in the database is purged while the offline solution works as long as the receipt can be scanned. Scalability With the online solution, the database infrastructure have to be extended as the system gains more customers. The offline solution is entirely independent from the number of simultaneous customers.

21 4.2. ANALYSIS OF REQUIREMENTS 15 Availability An online solution requires access to a database, which in practice means access to the Internet, to function. This might introduce costs for the customer and thus affect the desire to use it. The offline solution have all the necessary information inside the symbol itself. When weighing the advantages against the disadvantages it is clear that the offline solution have many advantages. The only real advantage for the online solution is the constant symbol size. Which, as will be described, can be solved for the offline solution without never being worse than the online. As mentioned earlier, an offline symbology can always act in an online fashion, but not necessarily the reverse. For the analysis, choosing the offline solution means that the symbol have to handle as large amounts of data on as small area as possible. Error correction Error correction is the ability to reconstruct data from a damaged symbol. Assuming that a symbology do not implement error correction, the consequence would be that one single damaged bit on a symbol would cause it to be unusable. The advantage is that the total data capacity will be larger since there is no need for the data redundancy, but this extra data capacity is useless if the data gets damaged. Considering that receipts are in a very exposed environment due to folds and creases, error correction is seen as required for this concept. Color print Receipt printers are generally not able to print multiple colors. The reason being that it would cause the printer to be more expensive for a functionality that is not really needed. Because of this, symbologies that rely on other colors than black and white for encoding will not be used. Character encodings and security Character encodings and security are not considered to be required. An implementation of the concept will have to be proprietary since there is no standard for encoding receipt information into 2D bar codes. This means that the data can be encoded 1 or encrypted in any way desirable, it only depends on how the 2D bar code reader choses to interpret the data. Summary Table 4.2 summarizes the requirements the concept poses on the reader Delimitations The Java ME delimitation introduced in Section 1.1 will affect the selection of symbologies. To be able to implement a prototype for a Java enabled mobile phone, there have to exist a publicly available Java ME decoding library for the selected symbology. According to a press release[21] from Sun Microsystems the Java platform was already in 2004 supported by 250 million mobile phones. 1 Using for instance UTF-8[20] for encoding text.

22 16 CHAPTER 4. SELECTION OF FEASIBLE SYMBOLOGIES Table 4.2: Requirements introduced by the concept. Variable Requirement Data capacity High. Data density High. Error correction Requires error correction. Color print Requires non-color print. Which means that this requirement does not automatically imply a limited customer base. Summary The delimitations poses one real requirement on the reader, listed in Table 4.3. Table 4.3: Requirements introduced by the delimitations. Variable Requirement Available software Public Java ME decoding library Final requirements When inspecting the results from the previous sections, there are no conflicting requirements. Therefore, the list of final requirements in Table 4.4 can directly be compiled from the Tables Table 4.4: Tables compiled into the final requirements list. Variable Requirement Data capacity High. Data density High. Error correction Requires error correction. Available software Public Java ME decoding library. Color print Requires non-color print. Character encodings Advantageous but not required. Security Advantageous but not required. This list will assist in the selection process of feasible symbologies presented in the following section. 4.3 Selection The task in this section is to combine the requirements from Table 4.4 with the available symbologies studied in Section 2.2 to exclude all unfeasible symbologies. The result will be the symbologies that fulfills all the criteria.

23 4.3. SELECTION Data capacity and density The first variables are the data capacity and the data density of a symbology. According to the final requirements list, both the data capacity and data density should be high. This effectively excludes all online symbologies because of their limited storage capabilities. Determining exactly where the limit for high data capacity lies is difficult at this stage, therefore all symbologies that could be classified as offline are included. The exclusion of all online symbologies leaves the symbologies listed in Table 4.5. Table 4.5: Symbologies which passed the data capacity requirement. Aztec Code Quickmark DataMatrix Quick Response Code Datastrip Code SmartCode EZcode Snowflake Code HCCB SuperCode INTACTA.CODE Trillcode MaxiCode UltraCode mcode VeriCode Optar VS Code Error correction Error correction is important for the user experience as discussed in the analysis. Some symbologies could not be classified with certainty due to problem of finding detailed specifications for the non-standardized symbologies. Only the symbologies that have confirmed error correction capabilities can be accepted and are listed in Table 4.6. Table 4.6: Which of the remaining symbologies that passed the error correction requirement. Aztec Code DataMatrix MaxiCode Quickmark Quick Response Code Snowflake Code SuperCode UltraCode VS Code Color print Symbologies relying on color or different shades of gray are excluded because of receipt printer s inability to produce color prints. The two remaining sym-

24 18 CHAPTER 4. SELECTION OF FEASIBLE SYMBOLOGIES bologies left that requires color are UltraCode and HCCB. Table 4.7 lists the symbologies that passed this requirement. Table 4.7: Which of the remaining symbologies that passed the non-color requirement. Aztec Code DataMatrix MaxiCode Quickmark Quick Response Code Snowflake Code SuperCode VS Code Available software The symbologies that have passed all requirements thus far, including having easily available Java ME compatible libraries for download, are listed in Table 4.8. Table 4.8: Which of the remaining symbologies that passed the Java ME library requirement. DataMatrix Quick Response Code Result According the selection process based on the analysis of the requirements, two symbologies passed all criteria. Their main properties are summarized in Table 4.9. Table 4.9: Symbologies that passes all the requirements. Quick Response DataMatrix Data capacity bytes (level M) bytes (incl. EDAC) Data density High High Error correction Reed-Solomon Reed-Solomon Color print No No Available software Java ME library Java ME library The Quick Response and DataMatrix symbologies are very similar. Both are standardized, widely supported and are visually resembling to each other. The largest differences are that Quick Response code have higher capacity and DataMatrix is slightly more dense. Visually they can be distinguished by the

25 4.3. SELECTION 19 three square finder patterns located only on the Quick Response code. Both of these two symbologies will be used when implementing the prototype.

26 Chapter 5 Implementation The implementation is done in two separate parts, a 2D bar code generator and a 2D bar code reader. As illustrated by Figure 5.1, the generator encodes receipt information into a symbol while the reader is able to decode the symbol back to the original information. The generator and reader implementations will later serve as tools for the evaluation. Figure 5.1: High level schematic of the system. The 2D bar code symbol is used as a medium to digitally store the receipt information. A common format specification of how the information is structured in a 2D bar code symbol is necessary for the reader to be able to interpret symbols created by the generator. The specification is located in Appendix A D Bar Code Generator In order to facilitate for the evaluation, the generator is written to be able to create symbols containing custom receipt information with any module width and margin size. The basic steps of the generation process are shown in Figure

27 5.2. RECEIPT READER PROTOTYPE 21 Figure 5.2: The process of generating a 2D bar code symbol from receipt information Serialization The purpose of serialization is to efficiently flatten an object structure into a stream of bytes. The serialization is done according to the format specification which allows the reader to interpret the data correctly. The serialization is necessary for the next steps which operate on bytes and not on the object structure Compression The serialized data is then compressed with a simple prefix code scheme algorithm introduced by Huffman[22]. Compression of smaller amounts of data do not typically save any space because there is some overhead storing the frequency table. When larger amounts of data are compressed, enough space can be earned to both fit the frequency table and to save space. Compression is only used if the total compressed size is smaller than the original data, otherwise compression is skipped Visualization As a last step, the 2D bar code is generated using the encoding library for the specified symbology. The encoding libraries are hidden behind a common interface which simplifies the adding and changing of encoding routines. 5.2 Receipt Reader Prototype The reader, which is designed to run on a camera phone, does the opposite of the work done by the generator. This way, the camera phone is able to reconstruct the receipt information from a 2D bar code symbol Recognition This step recognizes and extracts the byte data from the scanned 2D bar code. The first byte in the data sequence is tested against a pre-defined signature byte. If it is a match, it is assumed to contain receipt information. Otherwise

28 22 CHAPTER 5. IMPLEMENTATION Figure 5.3: Reversing the generation process to transform a 2D bar code back to receipt information. the reader skips the next two steps in the decoding process and shows the data as plain text. That allows the reader to read normal plain text content as well. Similarly to the generator, the reader also hides the decoding libraries behind an interface which makes it possible to add or change decoders without any rewriting Decompression If the data was compressed by the generator, the frequency table is read and the payload data is decompressed before further processing. Otherwise, this step is skipped Unserialization At this stage, all the data is ready for unserialization. By following the format specification, the reader is now capable of completely recreate all of the necessary receipt information User interaction An example usage is visualized in Figure 5.4. A customer have purchased three items at the local food store. After scanning the receipt it is stored and organized in the phone.

29 5.2. RECEIPT READER PROTOTYPE 23 Figure 5.4: Prototype running in a mobile phone emulator. (1) Find and scan a bar code through the camera s viewfinder, (2) view the purchase information, (3) pick a category and (4) see the categorized receipts.

30 Chapter 6 Evaluation of Concept This chapter provides an evaluation of the concept, using the prototype described in Chapter 5 as the main tool. Performance tests are used for the evaluation of the technical capabilities and interviews are conducted to get input from a few actual retailers. 6.1 Performance Tests The performance tests are used to evaluate the technical aspect of the concept. The purpose is to study what such an application could handle in terms of capacity, on a prototype level. This will later help to make a better estimate of what can be expected from a concrete implementation. To help the reasoning, three variables are defined in Equation 6.1 to represent the different measurements of a symbol. x module width, w symbol width (excluding margin), and (6.1) n number of modules on the x-axis. Only the width is discussed but the argument applies to both the width and the height since all symbols are considered to be square. Non-square versions are, according to Sections , only defined for small data sizes or not at all, and are thus not studied Resolution test The goal of this first test is to determine how small module widths the decoders can handle and make an estimation of how important auto-focus is. The symbols were generated with 100 bytes of data with increasingly smaller module widths. The results for scanning these symbols is presented in Table 6.1 for DataMatrix, and in Table 6.2 for Quick Response code. The results suggests that the decoding libraries chosen can perform down to 700 µm for DataMatrix and 600 µm for Quick Response code using 100 bytes of data. Repeating the resolution test but with the phone s auto-focus option turned off yields the results listed in Table 6.3 and Table 6.4. Turning auto-focus off severely increases the module width needed. In all of the cases, the module width is at least doubled. This means that for 100 bytes 24

31 6.1. PERFORMANCE TESTS 25 Table 6.1: Resolution test results for DataMatrix with 100 bytes of data. Using auto-focus. Module Width (µm) semacode Tasman Passed Passed 900 Passed Passed 800 Passed Passed 700 Passed Passed 600 Passed 500 Passed 400 Passed Table 6.2: Resolution test results for Quick Response code with 100 bytes of data. Using auto-focus. Module Width (µm) qrcode zxing Tasman Passed Passed Passed 900 Passed Passed Passed 800 Passed Passed 700 Passed Passed 600 Passed Passed 500 Passed 400 Passed of data, turning off auto-focus increases the surface area needed for a symbol with at least four times. Table B.1 and Table B.2 in Appendix B illustrates how the width of the symbol relates to the amount of data it contains. These tables are constructed with the module widths found in Table 6.1 and Table 6.2 and by using the relationship in Equation 6.2. w = x n (6.2) Assuming that a receipt, leaving room for the margins, is 7.5 centimeters wide. It is clear from Tables B.1 B.2 how large amount of data each symbology can handle with the specified module width. According to the tables, a Data- Matrix symbol can handle 813 bytes while a Quick Response symbol is able to store up to bytes Capacity test In the worst case, the 2D bar code generator is not able to compress the payload data stored in a receipt symbol. By following to the format specification in Table A.1 the total storage size (in bytes) is calculated with the expression in Equation

32 26 CHAPTER 6. EVALUATION OF CONCEPT Table 6.3: Resolution test results for DataMatrix with 100 bytes of data. Not using auto-focus. Module Width (µm) semacode Tasman Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Table 6.4: Resolution test results for Quick Response code with 100 bytes of data. Not using auto-focus. Module Width (µm) qrcode zxing Tasman Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed Passed size(code) = size(signature) + size(f lags) + size(p ayloada) = 2 + size(p ayloada) = 2 + size(storename) + size(date) + + size(n umitems) + size(itementries) = 2 + size(storename) N umitems (avgsize(itemn ame) + size(itemp rice)) = 10 + size(storename) + NumItems (4 + avgsize(itemname)) (6.3) Where size is a function that maps a field to the size in bytes of that field and avgsize(itemname) is the average size of all ItemNames. An expression for the number of items can be derived by simply rearranging Equation 6.3 into Equation 6.4. NumItems = size(code) 10 size(storename) 4 + avgsize(itemn ame) (6.4) The number of items that can be stored in a specified amount of space thus depends on the length of Storename and ItemNames. An item name on a paper

33 6.2. INTERVIEWS 27 receipt is seldom longer than that it can be fitted on one line, including the price. Considering this, assuming 20 characters as an average length for item names is not unreasonable. A store name can also typically be stored using 20 characters. The format specification defines the size of a string to be size(string) = 2+ Length, which directly allows the number of items to be calculated in Equation 6.5 for size(code) = bytes as indicated by the resolution test NumItems = = 42 (6.5) Rephrased, this means that when using a Quick Response code on 7.5 cm wide area with a module width of 600 µm it should be possible to read a receipt containing 42 average sized items with the jp.sourceforge.qrcode library. To confirm these calculations, a symbol with the specifications mentioned above is constructed. The symbol can be read correctly using the prototype. Figure 6.1 shows such a successful scan. Figure 6.1: Image representing an actual picture from a successful scan of a QR code containing bytes. When examining Table B.2, the next code size level modules which on 7.5 cm gives an effective module width of approximately 581 µm. Repeating the test with this size failed, which indicates that 42 average sized items is the theoretical upper limit under these conditions. Trying to scan a 813 bytes large code with the DataMatrix decoding library failed. Even sizes that this decoder should handle seems to fail which indicates that this decoding library malfunctions for some unknown reason at larger data sizes. Thus only the Quick Response code s capacity results are valid. 6.2 Interviews The other part of the evaluation is to present the concept and the prototype to local store managers. Their input is a complement to the performance tests and provides suggestions on the service as a whole. The important parts of each interview are briefly described below.

34 28 CHAPTER 6. EVALUATION OF CONCEPT Interview 1 Interview 1 was conducted with a store manager at a discount department store. This respondent did not see too much use for their customers to be able to read the receipt with their phones. Many of the customers did not seem to save the receipts, and the store manager did not expect that to change drastically with this system. Mainly because of reading every receipt seemed to be a bit cumbersome. Other types of stores was mentioned to possibly benefit more from such a system, such as durables stores and clothing stores, where the purchases are less frequent. In general, for reading bar codes with a camera phone on objects such as business cards, the respondent was positive Interview 2 This respondent is a store manager of a small grocery store. The respondent believed that reading bar codes with a phone was good, but was not certain if this application would suit the store. The respondent suggested that the bar code could be printed on the back of the receipt, which would not generate any loss of space or larger paper area. Another point mentioned was that informing the customers about the benefits could be hard which might lead slower user adaptation. If the customers do not see why or how to use it, such a system is useless Interview 3 The respondent in interview 3 is a store manager at a clothing store. The respondent was overall positive to reading bar codes with camera phones, including receipts. Concerning the concept, the respondent felt that the book-keeping example is not very interesting for most people. One service that were mentioned as more relevant is to simply store the receipt in the phone. This would free the customer from keeping track of all paper receipts when returning an item. Customers are now allowed to make the return without a receipt. This can cause dissatisfaction if the receipt was lost. Storing the receipt in their mobile phone could help to relieve this issue. The respondent also stated that some additional services was needed to increase the value for the store and also for the customer. These additional services might include advertisement, special offers, product returns and coupons Interview summary The most important inputs from the interviews are: 1. Stores with infrequent purchases might benefit more from such as system. 2. Additional services are necessary to generate any surplus value for the store, such as: Advertisement and special offers Include some advertisement or special offers into the symbol. Warranty and returns Store the receipt information in a safe way to enable the customer to use it for warranty claims and product returns.

35 6.2. INTERVIEWS 29 Coupons Coupon offers to help attract customers to the store. 3. Informing and adapting the customers to the scanning might be difficult. 4. The respondents seems to be generally positive toward reading bar codes with camera phones.

36 Chapter 7 Discussion This study has looked at using camera phones and 2D bar codes as an enabler for new kinds of services. The main focus is on the concept presented in Section 4.1. This concept augments normal paper receipts with a 2D bar code to provide additional services to such a common objects as receipts. The implementation part produced a prototype version of a reader for symbols containing receipt information. This prototype is used during the evaluation to help make an estimation of how such a service would perform. 7.1 Feasibility When looking at the prototype introduced in Chapter 5, it is clear that the prototype can scan and interpret receipt information stored in a 2D bar code. The prototype thus works as a proof of concept. If it is feasible from a practical viewpoint is, however, not clear without examining the results from the evaluation. The evaluation establishes that the Quick Response decoding library used for the prototype can read 42 average sized items from a 8.0 cm receipt. If the prototype would be good enough to read the symbols containing the largest possible amount of data, it would be enough to store 82 average sized items. Having this hard upper limit is a problem since there could in theory be a huge number of items on a receipt. There are at least five solutions to apply when all of the items can not fit in one symbol: Combine several items of the same product into one single item. No real loss, should always be done by the receipt generator. Store only product categories instead of every single product. Loses the specific product information. Extend the receipt with one or more additional symbols. Might increase the paper receipt size and the time spent scanning. Store only the total sum. Removes the upper limit but loses all product information. Delay the lookup of the product names until after the scan of the receipt. Saves space but needs online access. 30

QR Codes and Other Symbols Seen in Mobile Commerce

QR Codes and Other Symbols Seen in Mobile Commerce QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,

More information

Barcodes principle. Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague

Barcodes principle. Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague Barcodes principle Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague Contents How does it work? Bulls eye code PostNet 1D Bar code 2D

More information

Masterclass 2D codes - market applications. Kenniscentrum Papier en Karton Bumaga BV - Kennis in Productie

Masterclass 2D codes - market applications. Kenniscentrum Papier en Karton Bumaga BV - Kennis in Productie Masterclass 2D codes - market applications Maja Stanic, Sanne Tiekstra 1 April 2011 Outline Technology/Design 2D codes technology Types of 2D codes Design of 2D codes and Integration in production/design

More information

The ID Technology. Introduction to GS1 Barcodes

The ID Technology. Introduction to GS1 Barcodes The ID Technology Introduction to GS1 Barcodes Contents GS1 - The Basics 2 Starting Point - GTIN 3 GTIN Labels for Cases - ITF-14 5 Adding More Data - GS1 128 6 GS1 Application Identifiers 7 Logistics

More information

Use of 2D Codes and Mobile Technology for Monitoring of Machines in Manufacturing Systems

Use of 2D Codes and Mobile Technology for Monitoring of Machines in Manufacturing Systems Use of 2D Codes and Mobile Technology for Monitoring of Machines in Manufacturing Systems Boleslaw Fabisiak 1 1 West Pomeranian University of Technology in Szczecin, Poland Abstract - Monitoring of machines,

More information

SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9

SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 Learning Goals: At the end of this lab, the student should have basic familiarity with the DataMan

More information

Demonstration of Barcodes to QR Codes through Text Using Document Software

Demonstration of Barcodes to QR Codes through Text Using Document Software Demonstration of Barcodes to QR Codes through Text Using Document Software Dr. Neeraj Bhargava 1, Anchal kumawat 2, Dr. Ritu Bhargava 3 Associate Professor, Department of Computer Science, School of Engineering

More information

Enhanced Bar Code Engine

Enhanced Bar Code Engine Enhanced Bar Code Engine Introduction Access to the Kofax Standard bar code recognition engine is provided through ImageControls-based applications and ISIS-based applications. In addition to the standard

More information

Technical guide 1. june 2011

Technical guide 1. june 2011 Technical guide 1. june 2011 Bar code labelling on primary and secondary packages for pharmaceutical products patient safety Preface This technical guide is designed to help companies put bar code labels

More information

2D Mobile Barcodes A Definitive Guide

2D Mobile Barcodes A Definitive Guide 2D Mobile Barcodes A Definitive Guide White Paper December 2010 White Paper 2D Barcodes 2 2010 has already proven to be a very exciting year for mobile barcodes. More and more major players such as Sony

More information

ELFRING FONTS UPC BAR CODES

ELFRING FONTS UPC BAR CODES ELFRING FONTS UPC BAR CODES This package includes five UPC-A and five UPC-E bar code fonts in both TrueType and PostScript formats, a Windows utility, BarUPC, which helps you make bar codes, and Visual

More information

CHAPTER I INTRODUCTION

CHAPTER I INTRODUCTION CHAPTER I INTRODUCTION 1.1 Introduction Barcodes are machine readable symbols made of patterns and bars. Barcodes are used for automatic identification and usually are used in conjunction with databases.

More information

Achieving 5 Nines Business Process Reliability With Barcodes. Michael Salzman, VP Marketing (408) 737-7092 sales@inliteresearch.

Achieving 5 Nines Business Process Reliability With Barcodes. Michael Salzman, VP Marketing (408) 737-7092 sales@inliteresearch. Achieving 5 Nines Business Process Reliability With Barcodes Michael Salzman, VP Marketing (408) 737-7092 sales@inliteresearch.com Introduction All workflows rely on critical data to trigger and direct

More information

LEAR Corporation Sweden. Odette Transport Label Guideline Vers. 1 Rev. 4

LEAR Corporation Sweden. Odette Transport Label Guideline Vers. 1 Rev. 4 LEAR Corporation Sweden Odette Transport Label Guideline Vers. 1 Rev. 4 Contents 1. Introduction... 3 2. Paper, Size and Materials... 4 3. Printers and Software... 5 4. Data Area Layout... 6 4.1 Data Area

More information

Identification of products that require activation at the Pointof-sale. www.gs1.eu The global language of business. in Europe

Identification of products that require activation at the Pointof-sale. www.gs1.eu The global language of business. in Europe in Europe Identification of products that require activation at the Pointof-sale Technical specifications for GS1 DataBar Version 1.0, November 2014 www.gs1.eu The global language of business Contents

More information

Session 7 Bivariate Data and Analysis

Session 7 Bivariate Data and Analysis Session 7 Bivariate Data and Analysis Key Terms for This Session Previously Introduced mean standard deviation New in This Session association bivariate analysis contingency table co-variation least squares

More information

LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK

LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK vii LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK LIST OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF NOTATIONS LIST OF ABBREVIATIONS LIST OF APPENDICES

More information

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith

More information

GS1 QR Code. GS1 US Guideline

GS1 QR Code. GS1 US Guideline QR Code US Guideline June 2012 V1.2 9 May 2012, Issue #1 All contents copyright 2009 Page 1 of 15 Document Summary Document Item Current Value Document Title QR CODE Date Last Modified 14 May 2012 Current

More information

Simplified Machine Vision Verification of 1D and 2D Barcodes

Simplified Machine Vision Verification of 1D and 2D Barcodes Simplified Machine Vision Verification of 1D and 2D Barcodes 1 Presented by Steven J. King Machine Vision Product Manager at Microscan 2 About Microscan Founded in 1982, technology innovator and leader

More information

ELFRING FONTS BAR CODES EAN 8, EAN 13, & ISBN / BOOKLAND

ELFRING FONTS BAR CODES EAN 8, EAN 13, & ISBN / BOOKLAND ELFRING FONTS BAR CODES EAN 8, EAN 13, & ISBN / BOOKLAND This package includes ten EAN bar code fonts in scalable TrueType and PostScript formats, a Windows utility (BarEAN) to help you make bar codes,

More information

WHITE PAPER DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION

WHITE PAPER DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION TABLE OF CONTENTS 1 Introduction...3 2 Printed bar codes vs. mobile bar codes...3 3 What can go wrong?...5 3.1 Bar code Quiet Zones...5

More information

Back to Basics: Introduction to Industrial Barcode Reading

Back to Basics: Introduction to Industrial Barcode Reading Back to Basics: Introduction to Industrial Barcode Reading 1 Agenda What is a barcode? History 1 D codes Types and terminology 2 D codes Types and terminology Marking Methods Laser Scanning Image Based

More information

THE VALSPAR CORPORATION

THE VALSPAR CORPORATION THE VALSPAR CORPORATION LABELING REQUIREMENTS FOR RAW MATERIALS SENT TO ALL VALSPAR CORPORATION LOCATIONS IN NORTH AMERICA January 2004 TABLE OF CONTENTS 1 Introduction...4 2 Compliance...4 3 Rationale...4

More information

Creating Interactive PDF Forms

Creating Interactive PDF Forms Creating Interactive PDF Forms Using Adobe Acrobat X Pro Information Technology Services Outreach and Distance Learning Technologies Copyright 2012 KSU Department of Information Technology Services This

More information

May 2001. Prepared: Product version: Keyword: Accelio Present Central 5.4. Original value:

May 2001. Prepared: Product version: Keyword: Accelio Present Central 5.4. Original value: : Page 1 : : ANSI/AIM BC2-1995, Uniform Symbology Specification - Interleaved 2 of 5 0 2 of 5 Industrial Interleaved 2 of 5 (also called I-2/5 and ITF) is suitable for encoding general purpose all-numeric

More information

About Data Matrix Symbology

About Data Matrix Symbology About Data Matrix Symbology Developed in 1989 by I.D. Matrix (now CI Matrix) Historically read using expensive, complicated, modified vision systems (hindering its adoption) AIMI specification released

More information

Ten steps to GS1 barcode implementation. User Manual

Ten steps to GS1 barcode implementation. User Manual Ten steps to GS1 barcode implementation User Manual Issue 2, Final, January 2015 Document Summary Document Item Document Title Current Value Ten steps to GS1 barcode implementation User Manual Date Last

More information

Frequently Asked Questions

Frequently Asked Questions Advanced Function Presentation Consortium Bar Code Object Content Architecture Frequently Asked AFPC-0011-02 Questions Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecturee

More information

HTML Code Generator V 1.0 For Simatic IT Modules CP 443-1 IT, 343-1 IT, 243-1 IT

HTML Code Generator V 1.0 For Simatic IT Modules CP 443-1 IT, 343-1 IT, 243-1 IT HTML Code Generator V 1.0 For Simatic IT Modules CP 443-1 IT, 343-1 IT, 243-1 IT Manual This manual and program are freeware. Every user can use, copy or forward this program and documentation FREE OF

More information

All V7 registers support barcode printing, except the Sharp 410/420 1A ROM and that limitation is based upon the register.

All V7 registers support barcode printing, except the Sharp 410/420 1A ROM and that limitation is based upon the register. Tools Section Barcode Printing These are basic instructions for Version 7 Polling barcode printing. Users will need to have a PLU/UPC file containing either UPC-A, UPC-E, EAN 13 or EAN 8 numbers, label

More information

Application of Data Matrix Verification Standards

Application of Data Matrix Verification Standards Data Matrix symbol verification at its most basic level eliminates the subjective quality determination that causes discord between marking and reading suppliers, and replaces those subjective opinions

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia

More information

An Implementation of a High Capacity 2D Barcode

An Implementation of a High Capacity 2D Barcode An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development

More information

Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application

Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Have camera/image-based code readers replaced traditional laser scanners? Has

More information

What s the Power behind 2D Barcodes? Are they the Foundation of the Revival of Print Media?

What s the Power behind 2D Barcodes? Are they the Foundation of the Revival of Print Media? What s the Power behind 2D Barcodes? Are they the Foundation of the Revival of Print Media? Paul Schmidmayr (Graz University of Technology, Graz, Austria paul.schmidmayr@gmx.at) Martin Ebner (Graz University

More information

Learn about OCR: Optical Character Recognition Track, Trace & Control Solutions

Learn about OCR: Optical Character Recognition Track, Trace & Control Solutions : Optical Character Recognition Track, Trace & Control Solutions About Your Presenter Learn about OCR Presenting today: Juan Worle Technical Training Coordinator Microscan Corporate Headquarters Renton,

More information

Let s talk symbology. A guide to decoding barcodes

Let s talk symbology. A guide to decoding barcodes Let s talk symbology A guide to decoding barcodes Symbology in barcodes Barcode technologies provide fast reliable data collection to ensure part or product traceability, error-proof assembly processes,

More information

OCR and 2D DataMatrix Specification for:

OCR and 2D DataMatrix Specification for: OCR and 2D DataMatrix Specification for: 2D Datamatrix Label Reader OCR & 2D Datamatrix Standard (Multi-read) Camera System Auto-Multi Reading Camera System Auto-Multi Reading Camera System (Hi-Res) Contents

More information

To effectively manage and control a factory, we need information. How do we collect it?

To effectively manage and control a factory, we need information. How do we collect it? Auto-ID 321 Auto-ID Data-collection needs: What is our WIP? What is productivity or assignment of employees? What is utilization of machines? What is progress of orders? What is our inventory? What must

More information

Elliott NWSM Laser Form Technical Information

Elliott NWSM Laser Form Technical Information Introduction Elliott NWSM Laser Form Technical Information Elliott NWSM Laser Form supports form printing on blank paper with professional output. Elliott Business Software supports user definable form

More information

Paper-based Document Authentication using Digital Signature and QR Code

Paper-based Document Authentication using Digital Signature and QR Code 2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department

More information

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

What Resolution Should Your Images Be?

What Resolution Should Your Images Be? What Resolution Should Your Images Be? The best way to determine the optimum resolution is to think about the final use of your images. For publication you ll need the highest resolution, for desktop printing

More information

Tips for optimizing your publications for commercial printing

Tips for optimizing your publications for commercial printing Tips for optimizing your publications for commercial printing If you need to print a publication in higher quantities or with better quality than you can get on your desktop printer, you will want to take

More information

Support Guide for Codification of Medicines

Support Guide for Codification of Medicines Support Guide for Codification of Medicines To comply with RDC 54/2013 (Version 2) Support: Introduction... 3 Expected Benefits... 3 Applications... 4 Secondary Packaging:... 4 Identification: GTIN Codification:

More information

Layman's Guide to ANSI X3.182

Layman's Guide to ANSI X3.182 Layman's Guide to ANSI X3.182 This Guideline was developed by AIM USA, an affiliate of AIM International, the world-wide trade association for manufacturers and providers of automatic data collection

More information

BAR CODE 39 ELFRING FONTS INC.

BAR CODE 39 ELFRING FONTS INC. ELFRING FONTS INC. BAR CODE 39 This package includes 18 versions of a bar code 39 font in scalable TrueType and PostScript formats, a Windows utility, Bar39.exe, that helps you make bar codes, and Visual

More information

Base Conversion written by Cathy Saxton

Base Conversion written by Cathy Saxton Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,

More information

Johannes Sametinger. C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria

Johannes Sametinger. C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria OBJECT-ORIENTED DOCUMENTATION C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria Abstract Object-oriented programming improves the reusability of software

More information

6.4 Normal Distribution

6.4 Normal Distribution Contents 6.4 Normal Distribution....................... 381 6.4.1 Characteristics of the Normal Distribution....... 381 6.4.2 The Standardized Normal Distribution......... 385 6.4.3 Meaning of Areas under

More information

1 Introduction. 1.1 Overview of barcode technology. 1.1.1 Definition of barcode

1 Introduction. 1.1 Overview of barcode technology. 1.1.1 Definition of barcode 1 Introduction 1.1 Overview of barcode technology First of all, it is important to know the relationship between a code and a symbol in this context: The shorthand used to represent the verbal description

More information

Digital Versus Analog Lesson 2 of 2

Digital Versus Analog Lesson 2 of 2 Digital Versus Analog Lesson 2 of 2 HDTV Grade Level: 9-12 Subject(s): Science, Technology Prep Time: < 10 minutes Activity Duration: 50 minutes Materials Category: General classroom National Education

More information

McKinsey Problem Solving Test Practice Test A

McKinsey Problem Solving Test Practice Test A McKinsey Problem Solving Test Practice Test A 2013 APTMetrics, Inc. 1 Instructions McKinsey Problem Solving Test Practice Test Overview and Instructions This practice test has been developed to provide

More information

Quantitative vs. Categorical Data: A Difference Worth Knowing Stephen Few April 2005

Quantitative vs. Categorical Data: A Difference Worth Knowing Stephen Few April 2005 Quantitative vs. Categorical Data: A Difference Worth Knowing Stephen Few April 2005 When you create a graph, you step through a series of choices, including which type of graph you should use and several

More information

NOT ALL CODES ARE CREATED EQUAL

NOT ALL CODES ARE CREATED EQUAL NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 info@verifybrand.com (763) 235-1400 EXECUTIVE SUMMARY Serial numbers

More information

Data Visualization. Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004

Data Visualization. Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004 Data Visualization Prepared by Francisco Olivera, Ph.D., Srikanth Koka Department of Civil Engineering Texas A&M University February 2004 Contents Brief Overview of ArcMap Goals of the Exercise Computer

More information

BAR CODE 2 OF 5 INTERLEAVED

BAR CODE 2 OF 5 INTERLEAVED ELFRING FONTS INC BAR CODE 2 OF 5 INTERLEAVED This package includes 25 bar code 2 of 5 interleaved fonts in TrueType and PostScript formats, a Windows utility, Bar25i.exe, to help make your bar codes,

More information

Elfring Fonts, Inc. PCL MICR Fonts

Elfring Fonts, Inc. PCL MICR Fonts Elfring Fonts, Inc. PCL MICR Fonts This package contains five MICR fonts (also known as E-13B), to print magnetic encoding on checks, and six Secure Number fonts, to print check amounts. These fonts come

More information

If you know exactly how you want your business forms to look and don t mind

If you know exactly how you want your business forms to look and don t mind appendix e Advanced Form Customization If you know exactly how you want your business forms to look and don t mind detail work, you can configure QuickBooks forms however you want. With QuickBooks Layout

More information

http://barcoderesource.com/datamatrixbarcode.shtml

http://barcoderesource.com/datamatrixbarcode.shtml 2D Barcode Fonts http://barcoderesource.com/datamatrixbarcode.shtml Copyright (c) 2009-2013, ConnectCode All Rights Reserved. ConnectCode accepts no responsibility for any adverse affect that may result

More information

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections

More information

Common 16:9 or 4:3 aspect ratio digital television reference test pattern

Common 16:9 or 4:3 aspect ratio digital television reference test pattern Recommendation ITU-R BT.1729 (2005) Common 16:9 or 4:3 aspect ratio digital television reference test pattern BT Series Broadcasting service (television) ii Rec. ITU-R BT.1729 Foreword The role of the

More information

Microsoft Excel 2010 Tutorial

Microsoft Excel 2010 Tutorial 1 Microsoft Excel 2010 Tutorial Excel is a spreadsheet program in the Microsoft Office system. You can use Excel to create and format workbooks (a collection of spreadsheets) in order to analyze data and

More information

ELECTRONIC DOCUMENT IMAGING

ELECTRONIC DOCUMENT IMAGING AIIM: Association for Information and Image Management. Trade association and professional society for the micrographics, optical disk and electronic image management markets. Algorithm: Prescribed set

More information

Version of Barcode Toolbox adds support for Adobe Illustrator CS

Version of Barcode Toolbox adds support for Adobe Illustrator CS Introduction Traditionally the printing industry has used manual design paste up and stripping for the implementation of barcode symbols but today the computer is used more often to generate barcode symbols

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

GAP CLOSING. 2D Measurement GAP CLOSING. Intermeditate / Senior Facilitator s Guide. 2D Measurement

GAP CLOSING. 2D Measurement GAP CLOSING. Intermeditate / Senior Facilitator s Guide. 2D Measurement GAP CLOSING 2D Measurement GAP CLOSING 2D Measurement Intermeditate / Senior Facilitator s Guide 2-D Measurement Diagnostic...4 Administer the diagnostic...4 Using diagnostic results to personalize interventions...4

More information

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading Important technical considerations that are the key to successful implementations Version 1.03 P a g e 2 OVERVIEW Background: Inks

More information

Excel 2007: Basics Learning Guide

Excel 2007: Basics Learning Guide Excel 2007: Basics Learning Guide Exploring Excel At first glance, the new Excel 2007 interface may seem a bit unsettling, with fat bands called Ribbons replacing cascading text menus and task bars. This

More information

INVENTION DISCLOSURE

INVENTION DISCLOSURE 1. Invention Title. Utilizing QR Codes within ETV Applications 2. Invention Summary. By combining QR codes with ETV applications, a number of obstacles can be overcome. Placing QR codes in the graphics

More information

Microsoft Windows Overview Desktop Parts

Microsoft Windows Overview Desktop Parts Microsoft Windows Overview Desktop Parts Icon Shortcut Icon Window Title Bar Menu Bar Program name Scroll Bar File Wallpaper Folder Start Button Quick Launch Task Bar or Start Bar Time/Date function 1

More information

Web Editing Tutorial. Copyright 1995-2010 Esri All rights reserved.

Web Editing Tutorial. Copyright 1995-2010 Esri All rights reserved. Copyright 1995-2010 Esri All rights reserved. Table of Contents Tutorial: Creating a Web editing application........................ 3 Copyright 1995-2010 Esri. All rights reserved. 2 Tutorial: Creating

More information

Digitisation Disposal Policy Toolkit

Digitisation Disposal Policy Toolkit Digitisation Disposal Policy Toolkit Glossary of Digitisation Terms August 2014 Department of Science, Information Technology, Innovation and the Arts Document details Security Classification Date of review

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

designed and prepared for california safe routes to school by circle design circledesign.net Graphic Standards

designed and prepared for california safe routes to school by circle design circledesign.net Graphic Standards Graphic Standards Table of Contents introduction...2 General Usage...2 Logo lockups: color...3 LOGO LOCKUPS: GRAYSCALE...4 Minimum Staging Area...5 Minimum Logo Size...6 Type Family...7 Color Palettes...8

More information

STATGRAPHICS Online. Statistical Analysis and Data Visualization System. Revised 6/21/2012. Copyright 2012 by StatPoint Technologies, Inc.

STATGRAPHICS Online. Statistical Analysis and Data Visualization System. Revised 6/21/2012. Copyright 2012 by StatPoint Technologies, Inc. STATGRAPHICS Online Statistical Analysis and Data Visualization System Revised 6/21/2012 Copyright 2012 by StatPoint Technologies, Inc. All rights reserved. Table of Contents Introduction... 1 Chapter

More information

2D Barcode Sub-Coding Density Limits

2D Barcode Sub-Coding Density Limits 2D Barcode Sub-Coding Density Limits Guy Adams, Steven Simske,Stephen Pollard HP Laboratories HPL-2-74 Keyword(s): 2D barcodes; sub-coding; high resolution; Abstract: The use of 2D barcodes is becoming

More information

MassArt Studio Foundation: Visual Language Digital Media Cookbook, Fall 2013

MassArt Studio Foundation: Visual Language Digital Media Cookbook, Fall 2013 INPUT OUTPUT 08 / IMAGE QUALITY & VIEWING In this section we will cover common image file formats you are likely to come across and examine image quality in terms of resolution and bit depth. We will cover

More information

Detailed Specifications

Detailed Specifications 1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for

More information

EPSON SCANNING TIPS AND TROUBLESHOOTING GUIDE Epson Perfection 3170 Scanner

EPSON SCANNING TIPS AND TROUBLESHOOTING GUIDE Epson Perfection 3170 Scanner EPSON SCANNING TIPS AND TROUBLESHOOTING GUIDE Epson Perfection 3170 Scanner SELECT A SUITABLE RESOLUTION The best scanning resolution depends on the purpose of the scan. When you specify a high resolution,

More information

WHAT You SHOULD KNOW ABOUT SCANNING

WHAT You SHOULD KNOW ABOUT SCANNING What You should Know About Scanning WHAT You SHOULD KNOW ABOUT SCANNING If you re thinking about purchasing a scanner, you may already know some of the ways they can add visual interest and variety to

More information

Matt Cabot Rory Taca QR CODES

Matt Cabot Rory Taca QR CODES Matt Cabot Rory Taca QR CODES QR codes were designed to assist in the manufacturing plants of the automotive industry. These easy to scan codes allowed for a rapid way to identify parts and made the entire

More information

Archival Data Format Requirements

Archival Data Format Requirements Archival Data Format Requirements July 2004 The Royal Library, Copenhagen, Denmark The State and University Library, Århus, Denmark Main author: Steen S. Christensen The Royal Library Postbox 2149 1016

More information

2D COLOR BARCODES FOR MOBILE PHONES

2D COLOR BARCODES FOR MOBILE PHONES International Journal of Computer Science and Applications c Technomathematics Research Foundation Vol. 8 No. 1, pp. 136-155, 2011 2D COLOR BARCODES FOR MOBILE PHONES M. QUERINI, A. GRILLO, A. LENTINI

More information

2D symbols in distribution and logistics

2D symbols in distribution and logistics 2D symbols in distribution and logistics Two new position papers September 2015 Two-dimensional (2D) symbols are becoming increasingly popular. Besides mobile scanning applications for consumers also more

More information

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be

More information

Test Automation Architectures: Planning for Test Automation

Test Automation Architectures: Planning for Test Automation Test Automation Architectures: Planning for Test Automation Douglas Hoffman Software Quality Methods, LLC. 24646 Heather Heights Place Saratoga, California 95070-9710 Phone 408-741-4830 Fax 408-867-4550

More information

National Scenic Byways Program Image Style Guide

National Scenic Byways Program Image Style Guide National Scenic Byways Program Image Style Guide The National Scenic Byways Program (NSBP) wants to make sure that its online digital image library includes media ready photos for all designated byways.

More information

Contents. Bar code data transmission specifications...b-1. A-61099 October 1997 i

Contents. Bar code data transmission specifications...b-1. A-61099 October 1997 i Contents Bar Code Made Easy 1 What is a bar code?.......................................... 1 Which bar code type should I use?............................... 2 How are bar codes read?.......................................

More information

White Paper April 2006

White Paper April 2006 White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5

More information

User Tutorial on Changing Frame Size, Window Size, and Screen Resolution for The Original Version of The Cancer-Rates.Info/NJ Application

User Tutorial on Changing Frame Size, Window Size, and Screen Resolution for The Original Version of The Cancer-Rates.Info/NJ Application User Tutorial on Changing Frame Size, Window Size, and Screen Resolution for The Original Version of The Cancer-Rates.Info/NJ Application Introduction The original version of Cancer-Rates.Info/NJ, like

More information

Integrated Invoicing and Debt Management System for Mac OS X

Integrated Invoicing and Debt Management System for Mac OS X Integrated Invoicing and Debt Management System for Mac OS X Program version: 6.3 110401 2011 HansaWorld Ireland Limited, Dublin, Ireland Preface Standard Invoicing is a powerful invoicing and debt management

More information

Barcoding 101 for Manufacturers: What You Need to Know to Get Started

Barcoding 101 for Manufacturers: What You Need to Know to Get Started Barcoding 101 for Manufacturers: What You Need to Know to Get Started Plex Online White Paper At a Glance This paper highlights what manufacturers need to know to take advantage of barcoding to improve

More information

NovaBACKUP Storage Server User Manual NovaStor / April 2013

NovaBACKUP Storage Server User Manual NovaStor / April 2013 NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change

More information

Determine If An Equation Represents a Function

Determine If An Equation Represents a Function Question : What is a linear function? The term linear function consists of two parts: linear and function. To understand what these terms mean together, we must first understand what a function is. The

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

The Layman's Guide to ANSI, CEN, and ISO Bar Code Print Quality Documents

The Layman's Guide to ANSI, CEN, and ISO Bar Code Print Quality Documents The Layman's Guide to ANSI, CEN, and ISO Bar Code Print Quality Documents AIM, Inc. 634 Alpha Drive Pittsburgh, PA 15238-2802 Phone: +1 412 963 8588 Fax: +1 412 963 8753 Web: www.aimglobal.org This Guideline

More information

Adobe Acrobat 6.0 Professional

Adobe Acrobat 6.0 Professional Adobe Acrobat 6.0 Professional Manual Adobe Acrobat 6.0 Professional Manual Purpose The will teach you to create, edit, save, and print PDF files. You will also learn some of Adobe s collaborative functions,

More information

How to recover a failed Storage Spaces

How to recover a failed Storage Spaces www.storage-spaces-recovery.com How to recover a failed Storage Spaces ReclaiMe Storage Spaces Recovery User Manual 2013 www.storage-spaces-recovery.com Contents Overview... 4 Storage Spaces concepts and

More information