KEYPOINT Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer.
|
|
- Rolf Lamb
- 8 years ago
- Views:
Transcription
1 Unit 10 Automatic Identification 10.1 Unit Introduction 10.2 Unit Objectives 10.3 Overview of Automatic Identification Methods 10.4 Barcode Technology 10.5 Two-Dimensional Bar Codes 10.6 Radio Frequency Identification 10.7 Other AIDC Technologies 10.8 Case Study 10.9 Unit Review Self Assessment Self Assessment Answers 10.1 Unit Introduction Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer, or other micro-processor controlled system, without resorting to manual methods of data-entry. Data collection and retention has increasingly been automated to the point where AIDC systems can operate without relying upon human operators for basic data identification and capture. The following applications are regularly operated in AIDC mode: material handling, storage, sorting, order picking, kitting of parts for assembly; monitoring work order status, work-in-process, machine utilisation, worker attendance, and other measures of factory operation and performance. Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer. The alternative to AIDC is manual data collection and retention; this suffers from higher rates of error, greater requirements on time, and higher labour costs than AIDC. This unit investigates AIDC with a primary emphasis on bar code technology and radio frequency identification (RFID). Other AIDC technologies, including magnetic stripes, optical character recognition, and machine vision 10.2 Unit Learning Objectives After completing this unit you will be able to: BULLET LIST Identify the concept of Automatic Identification and Data Capture Specify the types of barcode technology that can be identified
2 Name the major barcode standard that informs the use of barcodes made by most of contemporary industry Outline the two basic types of two-dimensional barcodes List advantages of Radio Frequency Identification (RFID) technology Identify the principal elements of an RFID system Explain how RFID middleware acts in the RFID system List other AIDC technologies ENDLIST 10.3 Overview of Automatic Identification Methods There are three specific components that comprise technologies for Automatic Identification and Data Capture (AIDC) (see Figure 10.1); these are: NUMLIST Data encoder data must be coded into a machine-readable format compatible to the requirements of AIDC. A label or tag containing the encoded data is attached to the item to be identified Machine reader or scanner this is used to read the encoded data, typically converting it into the form of an electrical analogue signal Data decoder this transforms the electrical signal into digital data and finally back into the original alphanumeric characters ENDLIST AIDC technologies consist of three principal technologies that are applied sequentially; these are data encoding, machine reading, and data decoding.
3 Figure 10.1: Data encoding, reading and decoding using bar codes AIDC technologies can be categorised into the six types outlined in Table Technology Optical Table 10.1: Categories of AIDC technology Description Uses an optical scanner for the reading of high-contrast graphical symbols. Can include one- and two-dimensional barcodes, optical character recognition, and machine vision. Electromagnetic l Best known application of these technologies is radio frequency identification (RFID), which is substantially encroaching upon optical technology markets, such as barcode usage. RFID technology deploys a tag capable of holding significantly more data than traditional barcodes. Magnetic Data is encoded magnetically, either by means of a magnetic strip (for example as used in credit cards), or by means of magnetic ink character recognition (used in the banking industry for cheque processing). Smart card Cards with embedded microchips that are capable of holding large amounts of information; also known as chip cards, or integrated circuit cards. Touch techniques These technologies include touch screens and button
4 memory. Biometric Technologies used to identify humans, or to interpret vocal commands of humans. They include voice recognition, fingerprint analysis, and retinal eye scans. AIDC can be categorised into optical, electromagnetic, magnetic, smart card, touch technique, and biometric technology types. AIDC technologies may be applied in receiving, shipping, order picking, finished goods storage, manufacturing processing, work-in-process storage, assembly, and sorting. Some techniques of AIDC are semi-automatic, in that they still require personnel to operate some of the identification equipment in the application. Other applications may be fully automated. AIDC provides high levels of data accuracy, in real time, and at reduced labour costs. The error rate of barcode technology is approximately 10,000 times lower than in manual keyboard data entry. While other technology cannot achieve the same levels of accuracy as barcode technology, they are still significantly better than manual techniques, where we are reliant upon human workers to make the data entry. A second reason for the success of AIDC techniques is the reduction of time required for the input of data: the speed of data entry for handwritten documents is approximately 5-7 characters per second, and at best characters per second for keyboard entry. AIDC methods can accomplish hundreds of characters per second. AIDC provides high levels of data accuracy in real time, and at reduced labour costs. Errors, however, can occur with AIDC technology; and these are measured by two parameters: NUMLIST
5 First Read Rate (FRR) the probability of a successful, or correct, reading by the scanner in its initial attempt. Substitution Error Rate (SER) the probability or frequency with which the scanner incorrectly reads the encoded character as some other character. The expected number of errors is given by: Exp. SER( n) where Exp. Is the expected number of errors; SER is the Substitution Error Rate; and n is the data set with that numbers of characters. ENDLIST The aim of the system is, of course, to have a high FRR, and thus not require an SER reading. Errors with AIDC technology are measured by two parameters: First Read Rate, and the Substitution Error Rate Barcode Technology There are two basic types of barcode technology, linear and two-dimensional. Two types of barcode technology can be identified: linear barcode technology, and two-dimensional barcode technology. Linear or one dimensional bar code technology is the most widely used AIDC technique. There are two forms of linear barcode: width-modulated barcodes, and height-modulated barcodes. These are outlined in some detail in Table Type Width-modulated barcode Table 10.2: Linear barcode forms Description Used widely in retailing and manufacturing, the barcode consists of bars and spaces of varying width, with the bars and spaces being in highly-contrasting colours, such as black and white. The pattern of bars and spaces is coded to represent numeric or alphanumeric characters. This code is subsequently interpreted by a barcode reader; this reading action is done by scanning and decoding the sequence in which the bars fall. The barcode reader itself consists of a scanner and decoder. The scanner emits a beam of light that is either automatically or manually swept over the barcode to be read, thus allowing the reader to sense light reflections from the barcode that
6 Height-modulated barcode distinguishes between bars and spaces. A photodetector coverts the resultant reflections into an electrical signal, where spaces represent the signal, and bars represent its absence. Bar-width is thus converted into electrical signal duration. The decoder analyses the pulse train to validate and interpret the corresponding data. Niche-industry barcode technology, operative in the US Postal service, where it is deployed for ZIP code identification. The barcode in question is distinguished by a series of evenly-spaced bars of varying height. Operative principles are similar to those outlined for width-modulated barcodes. There are two forms of linear, or one-dimensional, barcode: width-modulated barcodes, and height-modulated barcodes. The growth and industrial acceptance of barcodes (width-modulated barcodes in particular) occurred in the 1970s, when retailers started to rely upon the technology for product identification, and to aid storage management techniques. In 1973, the grocery industry adopted the Universal Product Code (UPC) as its standard for item identification. UPC uses a 12-digit barcode where six digits identify the manufacturer and five digits the product, and one digit acts as a check character. Another major endorsement of this technology came from its acceptance as the standard product identifier by the US Department of Defence in 1982, compelling its vendors to adopt the technology Bar Code Symbols The barcode standard adopted by most major industries is a subset of Code 39, known as AIM USD-2 (Automatic Identification Manufacturers Uniform Symbol Description-2). Code 39 uses a series of bars and spaces to represent alphanumeric and other characters, where, in binary terms, the bars are equivalent to 1 and the spaces are equivalent to 0 (see Figure 10.2). Bars and spaces can differ in width by as much as 3 times their conventional size, which has a corresponding effect upon reading produced. However, the width-to-narrow ratio, whatever it is set-to, must be consistent across the barcode to facilitate accurate interpretation of the pulse train produced.
7 Figure 10.2: Code 39 Most major industries use a barcode standard that is based upon a subset of Code 39, known as AIM USD-2. The name Code 39 comes from the physical appearance of the barcode, which consists of nine elements (bars and spaces) used for each character, while three of these elements are wide. It is the placement of the wide spaces and wide bars that uniquely designates the character. Each code begins and ends with either a wide or narrow bar. In addition to the character set in the barcode, there is also a quiet-zone that precedes and succeeds the barcode; this ensures that the decoder is not confused by the absence of bars and spaces in regions outside of the barcode field. Barcodes in Code 39 consist of an arrangement of nine bars and spaces, which form a unique character for each arrangement; and a quiet-zone, consisting of empty space, which both precedes and succeeds the barcode in its presentation.
8 Bar Code Readers There are different types of barcode readers, generally classified as either contact or non-contact readers. These are outlined further in Table Type Contact readers Non-contact readers Table 10.3: Barcode reader types Description Consist of hand-held devices, such as wands or light pens, which are operated by moving the tip of the wand quickly past the barcode on the object or document. They are contact devices because the wand or pen must touch the barcode surface, or be in very close proximity, for effective reading. They can be mounted as well as hand-held, such that they form part of a keyboard entry terminal; in such situations the reader is stationary and the object s barcode is swept-past the device so that it may be read. Portable reading units are also available, which makes them suitable to be carried-around the factory or warehouse by a worker. These are typically battery-powered and include a solid-state memory device capable of storing data acquired during operation. They may also include a keypad so that non-barcode data may be manually entered. These focus a light beam on the barcode to scan and decode the barcode in the conventional way, but at a distance of from several inches to several feet. They can be classified as fixed beam and moving beam scanners. Fixed beam readers are stationary units that use a fixed beam of light. They can be mounted beside a conveyor to scan items as they pass, and thus record what is being placed upon the conveyor. Typical applications occur in warehousing and material handling operations. Moving beam readers use a highly focused beam of light to search for the barcode upon an object. A particular scan is defined as a single sweep of the light beam through an angular path specified by a rotating mirror used to project the beam on to the object. Typically the mirror rotates at very high scan rates up to 1440 scans/sec; thus, when a barcode is located, it may be read more than once, permitting verification of the reading. Typical applications include being mounted alongside conveyors, just like fixed beam readers, or as portable devices that the user points at objects, in the same manner as a pistol. Again these applications occur in warehousing and material handling operations. Barcode readers may be classified as either contact or non-contact devices. LEARNING ACTIVITY 10.1 Visit and look up videos that illustrate the design and operation of various types of bar code equipment outlined in Table 10.1 and Table Make a note of the manufacturers names. Visit the web site of the most common names and evaluate their product and service offerings.
9 END LEARNING ACTIVITY Two-Dimensional Bar Codes Two-dimensional (2-D) barcode schemes were introduced in 1987, and have grown into more than a dozen symbol classifications, with more expected to be produced. 2-D barcodes can store greater amounts of data at higher area densities than their one-dimensional counterparts; their disadvantage is the requirement for special scanning apparatuses to read the codes, and the associated expense of purchasing such equipment. Two-dimensional barcodes store greater amounts of data at higher area densities than their one-dimensional counterparts. The two basic types of 2-D barcodes are: stacked barcodes, and matrix symbologies. These are outlined in some detail in Table Type Stacked barcode Matrix barcode Table 10.5: Two-dimensional barcode types Description Consists of multiple rows of conventional linear barcodes stacked on top of each other. The data density of stacked barcodes is typically five to seven times that of the linear barcode 39. Various stacking schemes may be applied to achieve the build-up of barcodes one on top of the other, and still allow them to be read. Decoding in a stacked barcode is done by using a laser-type scanner that reads the lines sequentially. Issues with barcode-reading include: keeping track of the different rows during scanning; dealing with scanning swaths that cross between rows; and detecting and correcting localised errors. There can also be printing defects, similar to one-dimensional barcodes. Consists of 2-D patterns of data cells that are usually square and are coloured dark (usually black) or white. Introduced around 1990, they can contain more data than stacked barcodes, and also have the potential for higher data densities (up to 30 times more dense than code 39). However they are more complex than stacked barcodes, and they require more sophisticated printing and reading equipment. The symbols must be produced and interpreted both horizontally and vertically, which is referred to as area symbologies. Recent advances have seen considerable improvements in data matrix readers, which are easier to set up and use, as well as being more robust, and reliably operating under a range of conditions. The two basic types of 2-D barcodes are stacked barcodes, and matrix symbologies.
10 10.6 Radio Frequency Identification Radio Frequency Identification (RFID) tags and their associated RFID technology is currently a much-discussed concept, and represents the greatest threat to conventional barcode dominance as a data-capture mechanism. RFID technology has been available since the 1940s, but real interest in the concept as a commercial entity was only sparked in the 1980s and early 1990s, when miniaturisation made the concept feasible for individual product-related issues, and with the development of both passive (i.e. battery-free) tags, and read/write tags that furthered the technology s potential flexibility. Since the mid-1990s the growth and use of RFID technology has grown exponentially to include all sorts of applications in niche markets, and also applications that integrate and increase efficiency across the supply chain. The advantages of RFID technology include: BULLETLIST Identification does not depend on physical contact or direct line of sight observation by the reader Much more data can be contained in the RFID tag than with most AIDC technologies Data in read/write tags can be altered for historical usage purposes or reuse of the tag ENDLIST RFID technology advantages include non-contact and non-direct identification, greater data-containment opportunities, and the ability to re-write to some tags, if necessary. One disadvantage of RFID technology is its expense: it is only recently that the cost of producing RFID tags, as well as associated RFID readers and middleware, has dropped sufficiently to make it a viable alternative to barcode technology General Infrastructure An RFID system consists of an infrastructure of tags and readers. The tag, or transponder, contains a microchip, capacitors and antenna coil embedded into an encapsulation material (such as the product). This tag infrastructure communicates via radio signals with a specialised reader, either a peripheral or handheld device, which can subsequently send the collected data to a backend application system. Powered tags contain batteries that operate the tag s electronics; un-powered tags rely, not on batteries, but power derived from the
11 RFID reader. Figure 10.3 depicts a typical RFID tag, with microchip and capacitor set-up at the centre, while the antenna-coil encircles it. Figure 10.3: Passive and Active RFID tags respectively An RFID tag consists of an infrastructure that contains a microchip, capacitors, and antenna-coil. Depending on the tag type, it may or may not contain a battery. Each tag has a certain amount of internal memory where information about the object is stored, such as its unique ID number, or in some cases more detailed data including the date of manufacture, product composition, etc. The communication process between the reader and tag is managed and controlled by one of several protocols, such as ISO 15693, ISO , ISO , and Electronic Product Code (EPC) for different radio frequencies. In addition, different types of anti-collision algorithms are defined as part of these protocol standards, so that many tags presenting to one reader at the same time can be sorted and individually selected. Once the reader is on, it starts emitting a signal at a selected frequency. Any corresponding tag in the vicinity of the reader will detect the signal and use the energy from it to wake-up and supply operating power to its internal circuits. Once the tag has decoded the signal as valid, it replies with information to the reader thereby identifying the object. This information, called a notification, is then sent to RFID middleware. To deal with huge volumes of data (or notifications) from RFID tags, RFID middleware has been developed to act as a buffer between the RFID tag and the computing systems of the plant. RFID middleware has the ability to handle data operations, such as filtering, aggregation, and enrichment etc., as well as ensuring that data is processed into an appropriate format for application in the middleware. A reverse communication from the middleware to the RFID tag is also possible, which is called commands. Commands for RFID readers may be reading or writing commands which are emitted from the middleware based upon certain implemented rules.
12 A RFID system consists of a number of RFID tags, RFID middleware, and the systems back-end computing systems RFID Tags There are two types of RFID tag: Active tags that is, they contain and are independently powered by a battery; Passive tags (or unpowered tags) which rely on power drawn from the reader to be activated. Active tags are larger, more expensive and, owing to the presence of the battery, have a limited life. Passive tags, on the other hand, are lighter, smaller, cheaper and have an unlimited life; however, they are inhibited by their relatively short read ranges, the requirement for high-powered readers, and by the fact that they can only be written to once (i.e. they are read-only). In contrast, active tags can use greater variability in readers and can be read at significantly longer distances, while they usually contain facilities to read and write a multiple number of times. There are two types of RFID tag: active tags, which are battery-powered; and passive tags, which rely on power drawn from the reader to be activated. There also exist hybrids called semi-passive tags that use small batteries to operate the RFID chip s circuitry, but rely on reader-power for communication. Table 10.6 summarizes some general aspects of RFID tag performance across a range of environments. Table 10.6: RFID tag performance Frequencies Low Frequency High Frequency Ultra-High Frequency General Long antennas, more expensive. Less prone to interference from metals and liquids. Largely installed but will be overtaken by higher frequencies. Shorter antennas, less expensive than low freq. tags. This frequency has the widest application scope. Best suited for applications that do not require long range reading of large amounts of tags. Smaller, Cheaper. Higher frequency means these tags are potentially more powerful and have greater range. More susceptible to interference by metals and liquids. Different frequencies and power allocated by different countries. Microwave Similar to ultrahigh freq. but faster read rates. Much more susceptible to interference by metals and liquids. This frequency band is shared by other technologies, including bluetooth and many other shortrange radio devices.
13 Standards Specifications ISO/IEC ISO/IEC , AutoID HFclass1, ISO 14443, ISO ISO/IEC AutoID class0, AutoID class 1 ISO/IEC Typical Read Range (typical values in metres) Typical Applications < 0.5metres 1metre 4~5metres for unlicensed readers and 10metres for site license in the US; 2metres in Europe as power emissions increase to 2 watts. Access Control, Animal tagging Smart cards, Access Control, Payment, Baggage control, Biometrics, Libraries, Transport Pallet and box tagging, Baggage handling, Electronic toll collection 1metre Electronic toll collection, Tracking the real time location of goods Tag Read Rate Slowest Slow Medium Fast RFID tag performance depends upon the frequency under which it operates, as well as the RFID tag type. Current memory configurations on RFID tags tend to favour low-cost, memorylight, read-only tags that may only contain a unique serial number of the item, which, in this guise, operates in much the same way as a one-dimensional barcode. However, there are methods that can increase the memory capacity of an individual RFID tag, albeit with a consequent increase in its production cost. Vendors are regularly offering prospective customers ever-greater memory capacities, some as much as 128 kilobytes on high frequency, passive RFID applications RFID Memory There are three different types of RFID memory: NUMLIST ROM (read only memory) that stores security data, a unique device identifier and operating systems instructions, with electrically erasable programmable read only memory (EEPROM) being a specific type of ROM that has the ability to save tag data in its non-operative, power-saving state
14 RAM (random access memory) that stores data accrued during transponder interrogation and response WORM (write once / read many memory) that is similar in functionality to RAM. ENDLIST There are three different types of RFID memory: read only memory; random access memory; and write once / read many memory. LEARNING ACTIVITY 10.2 Search the internet for videos, slides, articles and vendors for RFID technology used in industry. Write a short note of your findings. END LEARNING ACTIVITY RFID Readers RFID readers communicate with the RFID tags via radio waves and pass information to the backend computer system in digital form. Readers can be configured in many formats including handheld devices, portals, or they may be conveyor-mounted. The user can change or customise the reader s operations to suit a specific requirement by issuing commands through the RFID middleware. The purpose of an RFID reader is not to store data; rather it transfers data to and from the RFID tags, though short-term data storage is still required. The configuration information of a reader (e.g., the reader address, and configuration for filtering) is stored consistently during the entire operation of the RFID reader. Furthermore, in some cases, data acquired from the tags needs to be stored for short-term processing and forwarding to the middleware.
15 Figure 10.4: RFID tags and reader/sensor RFID readers communicate with the RFID tags via radio waves and pass information to the backend computer system in digital form. When large numbers of RFID tags are presented to the RFID reader, data processing utilities are required to capture the high-volume data flows that occur. A reader can either process the field data from the tags, or the command data from the middleware (e.g., read/write commands). Pre-processing (e.g., filtering and aggregation) is used to relieve the middleware from processing too many notifications at any one time. Commands provided by the middleware (e.g., invoking a write operation on a tag) need to be stored for a short while and translated into internal RFID reader commands RFID Middleware RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end. It is responsible for handling notifications, such as filtering, aggregation, enrichment, etc., according to specific rules implemented in the middleware.
16 RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end. Data processing in the middleware is similar to pre-processing in the RFID reader. Notifications that are irrelevant for the business process are filtered-out and faulty information is eliminated. The filtered notifications are then processed further to develop business events that are sent to enterprise computing backend systems. This information can either be held locally in the middleware, or come from external devices, which are connected to the middleware (e.g., sensors, field databases, human user interfaces). Connections may also be developed to external information systems so that supplementation of the existing information by external sources can occur. For external information systems to operate successfully with RFID systems, automatic identification infrastructures are needed, such as the Object Naming Service (ONS) or the use of external WWAI network nodes (see Figure 10.5). Figure 10.5: RFID Middleware RFID middleware acts as an effective data-filter, and subsequently develops business events from the processed data that are sent to enterprise computing back-end systems.
17 10.7 Other AIDC technologies Other AIDC technologies that may occasionally be used in automation environments are summarised in Table Technology Magnetic Strips Optical Character Recognition Machine vision Table 10.7: Other AIDC technologies Description These strips are attached to products or containers in warehouse and factory settings, and are used for product identification. The magnetic strip consists of a thin plastic film with small magnetic particles whose pole orientations are used to encode bits of data onto the film. The plastic film is usually mounted onto a plastic card (such as a credit card), or paper ticket to provide a robust infrastructure, and as means of automatic identification. Advantages include: the ability to hold large amounts of data, and the ability to alter data held, if necessary. Disadvantages, from a manufacturing point-of-view, include: the need to have the strip in contact with the scanning equipment for correct reading; the absence of shop-floor methods that can readily encode data to magnetic strips; and the expense of the technology. Here specially designed alphanumeric characters that are machine readable by an optical reading device are deployed in factory and warehouse applications. Optical character recognition is a 2-D symbology, and scanning involves interpretation of both the vertical and horizontal features of each character during decoding. The use of hand-held operators, therefore, may require a certain level of skill on the part of human operators, to ensure that characters are read correctly; often this requires multiple scans of the code. The benefit of optical character recognition is that both machines and humans can read the same text. Disadvantages include: the need for near-contact scanning; lower scanning rates; and higher error rates compared to barcode scanning. Used principally for automated inspection tasks, machine vision read 2-D matrix symbols, such as data matrix, or stacked barcodes. Applications of machine vision also include other types of automatic identification problems, and these applications may grow in number as the technology advances. Other AIDC technologies that may occasionally be used include: magnetic strips, optical character recognition, and machine vision technologies.
18 10.8 Case Study At its factory in Galway, Thermo King employees press a button to alert management whenever parts need to be replenished, thereby preventing work stoppages and part overstocks. Using AeroScout tags, the system is built onto the company's existing Wi-Fi system and was integrated by IMEC Technologies. This year, the firm is also in the process of expanding its usage of RFID at the Galway facility to include to asset tracking. The immediate challenge for Thermo King involved the development of what it calls its e-kanban system (a signaling system to trigger an action such as inventory replenishment) that enables it to better manage the number of parts available at all assembly stations. The manual part-replenishment system employed prior to adopting RFID had several shortcomings. If workers discover they are running out of parts they must contact management, either by phone or by walking to the person in charge of ordering replenishment. If the company's on-floor inventory of parts runs out, work is stopped until additional components can be brought in from the warehouse. To avoid such problems in the past, companies typically store a high level of inventory at assembly stations. When space is tight companies need to establish a kanban system in which they only pull inventory [from the warehouse] when it is required. Thermo King first began discussing an automated solution with IMEC and AeroScout in early 2008 and the group conducted a proof-of-concept trial in April of that year, in which it tested the hardware to ensure proper read rates, then deployed the system throughout the entire factory in August. With the system, Ben-Assa says, the firm has installed approximately 100 AeroScout 2.4 GHz T2 tags, with a tag mounted next to each container of parts. When a container of parts runs low, an employee presses a button on its tag, which transmits its ID number to the Wi-Fi access points already installed throughout the facility to allow wireless laptop connectivity. The tag transmits not only its unique ID number, but also the assembly part serial number previously encoded when that tag was first installed. AeroScout Mobile View software links the ID number with the location at which the tag was installed, then transmits an alert to staff members in charge of replenishment, with the station number and the part number required, as well as the time at which the order was sent Unit Review BULLETLIST Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer, or other micro-processor controlled
19 system, without resorting to manual methods of data-entry, such as via a keyboard. AIDC technologies consist of three principal technologies that are applied sequentially; these are data encoding, machine reading, and data decoding. AIDC can be categorised into optical, electromagnetic, magnetic, smart card, touch technique, and biometric technology types. Errors with AIDC technology are measured by two parameters: First Read Rate, and the Substitution Error Rate. Two types of barcode technology can be identified: linear barcode technology, and two-dimensional barcode technology. Barcodes in Code 39 consist of an arrangement of nine bars and spaces, which form a unique character for each arrangement; and a quiet-zone, consisting of empty space, which both precedes and succeeds the barcode in its presentation. The two basic types of 2-D barcodes are stacked barcodes, and matrix symbologies. Radio Frequency Identification technology represents the greatest threat to conventional barcode dominance as a data-capture mechanism. RFID technology advantages include non-contact and non-direct identification, greater data-containment opportunities, and the ability to re-write to some tags, if necessary. A RFID system consists of a number of RFID tags, RFID middleware, and the plant s back-end computing systems. Communication can occur in both directions, both from the RFID tag backwards, and from the computing systems forwards. There are two types of RFID tag: active tags, which are battery-powered; and passive tags, which rely on power drawn from the reader to be activated. There are three different types of RFID memory: read only memory; random access memory; and write once / read many memory. RFID readers communicate with the RFID tags via radio waves and pass information to the backend computer system in digital form. RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end.
20 Other AIDC technologies that may occasionally be used include: magnetic strips, optical character recognition, and machine vision technologies. ENDLIST Self-Assessment Questions NUMLIST List the principal types of AIDC technologies, and the categories that these technologies can take. What are the types of barcode technology that can be identified? What is the major barcode standard that informs the use of barcodes made by most of contemporary industry? What are the two basic types of two-dimensional barcodes? What are the advantages that are associated with Radio Frequency Identification (RFID) technology? What are the major constituents of an RFID tag? How does RFID middleware act in the RFID system? Specify some other AIDC technologies. ENDLIST Answers to Self-Assessment Questions NUMLIST AIDC technologies consist of three principal technologies that are applied sequentially; these are data encoding, machine reading, and data decoding. AIDC can be categorised into optical, electromagnetic, magnetic, smart card, touch technique, and biometric technology types. Two types of barcode technology can be identified: linear barcode technology, and two-dimensional barcode technology. Most major industries use a barcode standard that is based upon a subset of Code 39, known as AIM USD-2. The two basic types of two-dimensional barcodes are stacked barcodes, and matrix symbologies.
21 RFID technology advantages include non-contact and non-direct identification, greater data-containment opportunities, and the ability to re-write to some tags, if necessary. An RFID tag consists of an infrastructure that contains a microchip, capacitors, and antenna-coil. Depending on the tag type, it may or may not contain a battery. RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end. It works as an effective data-filter, and subsequently develops business events from the processed data that are sent to enterprise computing back-end systems. Other AIDC technologies that may occasionally be used include: magnetic strips, optical character recognition, and machine vision technologies. END LIST
To effectively manage and control a factory, we need information. How do we collect it?
Auto-ID 321 Auto-ID Data-collection needs: What is our WIP? What is productivity or assignment of employees? What is utilization of machines? What is progress of orders? What is our inventory? What must
More informationEvolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
More informationRadio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
More informationWHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationChapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
More informationRFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.
RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers
More informationA Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation
A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation Introduction This document is an introduction to the principles and practice of barcode scanning as it relates to a manufacturing
More informationAutomated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
More informationentigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200
entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 Understanding RFID and Barcode Differences Don t misuse RFID with applications built for Barcodes Radio Frequency
More informationThe Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
More informationNOT ALL CODES ARE CREATED EQUAL
NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 info@verifybrand.com (763) 235-1400 EXECUTIVE SUMMARY Serial numbers
More informationWarehouse Management System
Warehouse Management System Solvo's WMS is an application suite designed to optimize warehouse operations. Solvo's solutions manage the entire warehouse operation cycle in a real time mode. The System
More informationSelecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application
Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Have camera/image-based code readers replaced traditional laser scanners? Has
More informationQR Codes and Other Symbols Seen in Mobile Commerce
QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,
More informationIndustrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about
More informationwhite paper JANUARY 2011 The Next- Warehouse Scanning and the Emergence of 2D Bar Codes
JANUARY 2011 The Next- Generation Warehouse Long Range Scanning and the Emergence of 2D Bar Codes Table of Contents Introduction...3 Bar coding basics...4 Bar coding in the warehouse...4 Warehouse application
More informationCHAPTER I INTRODUCTION
CHAPTER I INTRODUCTION 1.1 Introduction Barcodes are machine readable symbols made of patterns and bars. Barcodes are used for automatic identification and usually are used in conjunction with databases.
More informationActive RFID Solutions for Asset Tracking and Inventory Management
Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.
More informationRFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008
RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationRFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
More informationTime & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
More informationWhite paper. Guide to Scanning Technologies
White paper Guide to Scanning Technologies Introduction Scanning technology has been changing dramatically. Laser scan engines, once considered the workhorses for most scanning applications, have been
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationRadio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
More informationRadio Frequency Identification (RFID) Vs Barcodes
Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want
More informationSATO RFID White Paper
SATO RFID White Paper Rev_0710 1 Overview This white paper describes the basic components of a Radio Frequency Identification (RFID) system and explores the technology, applications, and competitive advantages
More informationThe process to convert a computer message into a bar code symbol is a fourstep
Bar Code Symbologies A bar code symbology is a system for representing data in the bars and spaces of a bar code. A bar code consists of a number of printed bars and intervening spaces. The width of the
More informationA study of comparing RFID and 2D barcode tag technologies for pervasive mobile applications Ernest Arendarenko
A study of comparing RFID and 2D barcode tag technologies for pervasive mobile applications Ernest Arendarenko March 23, 2009 Department of Computer Science and Statistics University of Joensuu Master
More informationWHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?
WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why
More informationDetermining The Right Lift Truck Navigation System. For Your Very Narrow Aisle (VNA) Warehouse
Determining The Right Lift Truck Navigation System For Your Very Narrow Aisle (VNA) Warehouse Determining The Right Lift Truck Navigation System For Your Very Narrow Aisle (VNA) Warehouse Today s pressures
More informationWhy Has the Development in RFID Technology Made Asset Management More Urgent?
E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,
More informationNAIT DEVICE STANDARD FOR CATTLE 25 SEPTEMBER 2014
NAIT DEVICE STANDARD FOR CATTLE 25 SEPTEMBER 2014 CONTENTS 1. INTRODUCTION... 1 2. UPDATES TO THIS STANDARD... 1 3. REQUIRED PHYSICAL STANDARDS... 1 4. REQUIRED PERFORMANCE STANDARDS... 2 5. LICENSEE
More informationLaser Scanner Programming Guide (SE923 laser engine)
Laser Scanner Programming Guide (SE923 laser engine) CONTENT Technical note... 5 How to recognise the type of the laser barcode engine... 5 How to program the laser barcode reader into default value...
More information1 Introduction. 1.1 Overview of barcode technology. 1.1.1 Definition of barcode
1 Introduction 1.1 Overview of barcode technology First of all, it is important to know the relationship between a code and a symbol in this context: The shorthand used to represent the verbal description
More informationBarcoding 101 for Manufacturers: What You Need to Know to Get Started
Barcoding 101 for Manufacturers: What You Need to Know to Get Started Plex Online White Paper At a Glance This paper highlights what manufacturers need to know to take advantage of barcoding to improve
More informationASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
More information915MHz RFID State of the Art RFID
915MHz RFID State of the Art RFID LIBRARY BOOK / MEDIA MANAGEMENT and RFID TRACKING SYSTEM Executive Overview More and more libraries worldwide are utilizing RFID to automate the issue and return of books,
More information1 PERSONAL COMPUTERS
PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers
More informationThe Place of Emerging RFID Technology in National Security and Development
The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationCloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
More informationFINDING THE POSSIBLE ADVANTAGES IN RECEIVING, WAREHOUSING AND PICKING UP GOODS
LAPPEENRANNAN TEKNILLINEN YLIOPISTO Teknillinen tiedekunta Konetekniikan osasto BK10A0400 Kandidaatintyö ja seminaari FINDING THE POSSIBLE ADVANTAGES IN RECEIVING, WAREHOUSING AND PICKING UP GOODS LAPPEENRANNASSA
More informationPerformance Evaluation of a UWB-RFID System for Potential Space Applications Abstract
Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract This talk presents a brief overview of the ultra-wideband (UWB) RFID system with emphasis on the performance evaluation
More informationMay 2001. Prepared: Product version: Keyword: Accelio Present Central 5.4. Original value:
: Page 1 : : ANSI/AIM BC2-1995, Uniform Symbology Specification - Interleaved 2 of 5 0 2 of 5 Industrial Interleaved 2 of 5 (also called I-2/5 and ITF) is suitable for encoding general purpose all-numeric
More informationThe use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.
Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways
More informationRF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
More informationREAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
More information10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES
FORM 4 COMPUTER STUDIES Chapter 10: Input and Output Devices March, 01 10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES The main function of an input device is to The main function of an output device is to
More informationSE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9
SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 Learning Goals: At the end of this lab, the student should have basic familiarity with the DataMan
More informationProgramming Reference Guide HP USB Barcode Scanner
Programming Reference Guide HP USB Barcode Scanner Document Part Number: 430944-002 August 2006 Print this document before setting up the HP USB Barcode Scanner. The document provides the programming bar
More informationThe Barcode Printing option may be purchased for an additional cost. You will receive a CD that you will use to activate this feature.
27 BARCODE PRINTING Barcode Printing takes your museum to the next level of inventory control and tracking. Barcoding is a proven technology that can eliminate keyboard data entry errors. There are many
More informationGetting Started with TraSer from Requirements to a Solution
Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for
More informationCOMPUTER - INPUT DEVICES
COMPUTER - INPUT DEVICES http://www.tutorialspoint.com/computer_fundamentals/computer_input_devices.htm Copyright tutorialspoint.com Following are few of the important input devices which are used in a
More informationHow 2D Scanning Can Benefit your Business
How 2D Scanning Can Benefit your Business BarcodesInc www.barcodesinc.com 1.800.351.9962 What You'll Learn in this ebook 2D scanning vs. traditional laser scanning - what are the advantages? How 2D scanners
More informationA whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading
A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading Important technical considerations that are the key to successful implementations Version 1.03 P a g e 2 OVERVIEW Background: Inks
More informationAutomotive Applications of 3D Laser Scanning Introduction
Automotive Applications of 3D Laser Scanning Kyle Johnston, Ph.D., Metron Systems, Inc. 34935 SE Douglas Street, Suite 110, Snoqualmie, WA 98065 425-396-5577, www.metronsys.com 2002 Metron Systems, Inc
More informationHARTING Auto-ID System Integration
HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader
More informationDiscovering Computers. Technology in a World of Computers, Mobile Devices, and the Internet. Chapter 7. Input and Output
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 7 Input and Output Objectives Overview Differentiate among various types of keyboards: standard, compact,
More informationMaking Multiple Code Reading Easy. Webinar
Making Multiple Code Reading Easy Webinar Today s Agenda Introduction How DataMan Makes Multiple Code Reading Easy Multiple Code Reading Applications Product Demonstration Videos Q&A 2 Introduction Introduction
More informationAnalysis of identification technologies and an automatic lock for school lockers
EUROPEAN JOURNAL FOR YOUNG SCIENTISTS AND ENGINEERS Analysis of identification technologies and an automatic lock for school lockers David Marn Abstract The main objective of the project was the improvement
More informationMilitary Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
More informationThe Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers.
Standard Methods of Input Keyboard Mouse Input device enables you to input information and commands into the computer. The Keyboard One of the first peripherals to be used with a computer and is still
More informationChapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard
Chapter 5 Objectives Chapter 5 Input Define input List characteristics of of a keyboard Describe different mouse types and how they work Summarize how pointing devices work Explain how a digital camera
More informationWireless Laser Barcode Scanner ils 6300BU. User s Manual
Wireless Laser Barcode Scanner ils 6300BU User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.
More informationBack to Basics: Introduction to Industrial Barcode Reading
Back to Basics: Introduction to Industrial Barcode Reading 1 Agenda What is a barcode? History 1 D codes Types and terminology 2 D codes Types and terminology Marking Methods Laser Scanning Image Based
More informationManagement Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
More informationAsset Management Services. White Paper
Asset Management Services White Paper Asset Management Solutions provide a comprehensive and systematic method for managing equipment and intelligence in complex IT infrastructure environments. Through
More informationData Capture Solutions for Manufacturing Applications
Manufacturing Data Capture Solutions for Manufacturing Applications Create a Non-Stop Production Line and Cost-Effective Solutions for Manufacturing The growing complexity of manufacturing requires an
More informationAn Introductory and Elementary Study on RFID & Its Applications
An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationOI-TECH Asset Management
OI-TECH Asset Management Service Today with the Solutions for Tomorrow www.oi-tech.com OI Tech Asset Management RFID Technology - Overview RFID (Radio Frequency Identification) is a technology for identifying
More informationBest Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail
Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,
More informationImplementing RFID in Library: Methodologies, Advantages and Disadvantages
Implementing RFID in Library: Methodologies, Advantages and Disadvantages Narayanan A., Sanjay Singh and Somasekharan M. Abstract A library is a growing organism. As it grows in size the problems associated
More informationPackaging Identification Standard
Packaging Identification Standard The attached document provides the Amtex Inc. supplier packaging identification standard for all raw materials to be received. Many references have been made to the Automotive
More informationWhite Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now
Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking
More informationPrinted Circuit Board Tracking with RFID: Speed, Efficiency and Productivity Made Simple
RFID February 2008 White Paper Printed Circuit Board Tracking with RFID: Speed, Efficiency and Productivity Made Simple Chris Cook and Hank Tomarelli Texas Instruments Executive Summary Tracking goods
More informationBARCODE PRINTING SET UP BARCODE PRINTING
21 BARCODE PRINTING The Barcode Printing option can be purchased for an additional cost. You will receive a floppy disk or CD that you can use to activate this feature. SET UP BARCODE PRINTING To start,
More information1-9 August 2003, Berlin
World Library and Information Congress: 69th IFLA General Conference and Council 1-9 August 2003, Berlin Code Number: 132-E Meeting: 113. Information Technology Simultaneous Interpretation: - Experiences
More informationSimplification and enhanced accuracy of order processing and receipt
Foreword Project background: Coding for Success The GS1 System of standards is an integrated system of global standards that provides unique accurate identification using bar codes and other data carriers
More informationEfficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
More informationDevelopment of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
More informationRFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
More informationRFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
More informationANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
More informationSimplifying IT Management and Data Security with RFID
Simplifying IT Management and Data Security with RFID IT asset management is a fundamental discipline to contribute to the growth and sustainability of the enterprise. Chief information officers have to
More informationPortable adapter for barcode scanners
Microprocessors and Microsystems 23 (1999) 217 223 Portable adapter for barcode scanners I.Y. Soon a, *, C.K. Yeo b, Y.H. Sng a a School of Electrical and Electronics Engineering, Nanyang Technological
More informationINFINEA TAB USER MANUAL. INFINEA ipad TAB
INFINEA TAB USER MANUAL INFINEA ipad TAB CONTACT INFORMATION National Sales Headquarters: Infinite Peripherals, Inc. 1124 Main Street Suite B Irvine, CA 92614 Toll Free: (866) 278-7860 Office: (949) 222-0300
More informationF2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop
F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop 1 Park, Yang Ho, 1 Lee, Sang Seok, 1 Kim, Jong Hwan, 1 Joung, Youn-kyoung, 2 Noh, Sang Do 1 Department of Industrial Engineering,
More informationRFID System Description for Logistics & Inventory
RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.
More informationA Mechatronic Marvel: The Barcode Scanner
A Mechatronic Marvel: The Barcode Scanner Dr. Kevin Craig & Dr. Mark Nagurka Professors of Mechanical Engineering Marquette University Bar Code Scanner K. Craig & M. Nagurka 1 Design News Web Cast Web
More informationPower over Ethernet technology for industrial Ethernet networks
Power over Ethernet technology for industrial Ethernet networks Introduction Ethernet networking has grown beyond office and home usage to become a very successful protocol suite used in many industrial
More informationBetter Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail
Better Data Center IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail IT asset managers and facilities managers for Data Centers worldwide are being
More informationUsing RFID for Supply Chain Management
DÉPARTEMENT D INFORMATIQUE / DEPARTEMENT FÜR INFORMATIK Information Systems Research Group Electronic Business course Using RFID for Supply Chain Management Project work Written by Fabien Ropraz Student
More informationWhite Paper. An Analysis of Active RFID for Asset Tracking
White Paper An Analysis of Active RFID for Asset Tracking January 2010 Description of RFID Radio frequency identification (RFID) technology uses radio waves to identify objects. A radio transmitter is
More informationUnderstanding barcodes. www.brightpearl.com/ca101
Understanding barcodes This ebook gives an overview of product codes, barcodes, scanners and describes where barcode management could fit in your business. www.brightpearl.com/ca0 to Understanding barcodes
More informationRFID IN ASSOCIATION WITH ERP SYSTEMS WITHIN THE MANUFACTURING INDUSTRY TO IMPROVE DATA TRANSFER RELIABILITY
International Journal of Automated Identification Technology, 3(2), July-December 2011, pp. 81-88 RFID IN ASSOCIATION WITH ERP SYSTEMS WITHIN THE MANUFACTURING INDUSTRY TO IMPROVE DATA TRANSFER RELIABILITY
More informationLaser Barcode Scanner
Laser Barcode Scanner User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
More information