KEYPOINT Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer.

Size: px
Start display at page:

Download "KEYPOINT Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer."

Transcription

1 Unit 10 Automatic Identification 10.1 Unit Introduction 10.2 Unit Objectives 10.3 Overview of Automatic Identification Methods 10.4 Barcode Technology 10.5 Two-Dimensional Bar Codes 10.6 Radio Frequency Identification 10.7 Other AIDC Technologies 10.8 Case Study 10.9 Unit Review Self Assessment Self Assessment Answers 10.1 Unit Introduction Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer, or other micro-processor controlled system, without resorting to manual methods of data-entry. Data collection and retention has increasingly been automated to the point where AIDC systems can operate without relying upon human operators for basic data identification and capture. The following applications are regularly operated in AIDC mode: material handling, storage, sorting, order picking, kitting of parts for assembly; monitoring work order status, work-in-process, machine utilisation, worker attendance, and other measures of factory operation and performance. Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer. The alternative to AIDC is manual data collection and retention; this suffers from higher rates of error, greater requirements on time, and higher labour costs than AIDC. This unit investigates AIDC with a primary emphasis on bar code technology and radio frequency identification (RFID). Other AIDC technologies, including magnetic stripes, optical character recognition, and machine vision 10.2 Unit Learning Objectives After completing this unit you will be able to: BULLET LIST Identify the concept of Automatic Identification and Data Capture Specify the types of barcode technology that can be identified

2 Name the major barcode standard that informs the use of barcodes made by most of contemporary industry Outline the two basic types of two-dimensional barcodes List advantages of Radio Frequency Identification (RFID) technology Identify the principal elements of an RFID system Explain how RFID middleware acts in the RFID system List other AIDC technologies ENDLIST 10.3 Overview of Automatic Identification Methods There are three specific components that comprise technologies for Automatic Identification and Data Capture (AIDC) (see Figure 10.1); these are: NUMLIST Data encoder data must be coded into a machine-readable format compatible to the requirements of AIDC. A label or tag containing the encoded data is attached to the item to be identified Machine reader or scanner this is used to read the encoded data, typically converting it into the form of an electrical analogue signal Data decoder this transforms the electrical signal into digital data and finally back into the original alphanumeric characters ENDLIST AIDC technologies consist of three principal technologies that are applied sequentially; these are data encoding, machine reading, and data decoding.

3 Figure 10.1: Data encoding, reading and decoding using bar codes AIDC technologies can be categorised into the six types outlined in Table Technology Optical Table 10.1: Categories of AIDC technology Description Uses an optical scanner for the reading of high-contrast graphical symbols. Can include one- and two-dimensional barcodes, optical character recognition, and machine vision. Electromagnetic l Best known application of these technologies is radio frequency identification (RFID), which is substantially encroaching upon optical technology markets, such as barcode usage. RFID technology deploys a tag capable of holding significantly more data than traditional barcodes. Magnetic Data is encoded magnetically, either by means of a magnetic strip (for example as used in credit cards), or by means of magnetic ink character recognition (used in the banking industry for cheque processing). Smart card Cards with embedded microchips that are capable of holding large amounts of information; also known as chip cards, or integrated circuit cards. Touch techniques These technologies include touch screens and button

4 memory. Biometric Technologies used to identify humans, or to interpret vocal commands of humans. They include voice recognition, fingerprint analysis, and retinal eye scans. AIDC can be categorised into optical, electromagnetic, magnetic, smart card, touch technique, and biometric technology types. AIDC technologies may be applied in receiving, shipping, order picking, finished goods storage, manufacturing processing, work-in-process storage, assembly, and sorting. Some techniques of AIDC are semi-automatic, in that they still require personnel to operate some of the identification equipment in the application. Other applications may be fully automated. AIDC provides high levels of data accuracy, in real time, and at reduced labour costs. The error rate of barcode technology is approximately 10,000 times lower than in manual keyboard data entry. While other technology cannot achieve the same levels of accuracy as barcode technology, they are still significantly better than manual techniques, where we are reliant upon human workers to make the data entry. A second reason for the success of AIDC techniques is the reduction of time required for the input of data: the speed of data entry for handwritten documents is approximately 5-7 characters per second, and at best characters per second for keyboard entry. AIDC methods can accomplish hundreds of characters per second. AIDC provides high levels of data accuracy in real time, and at reduced labour costs. Errors, however, can occur with AIDC technology; and these are measured by two parameters: NUMLIST

5 First Read Rate (FRR) the probability of a successful, or correct, reading by the scanner in its initial attempt. Substitution Error Rate (SER) the probability or frequency with which the scanner incorrectly reads the encoded character as some other character. The expected number of errors is given by: Exp. SER( n) where Exp. Is the expected number of errors; SER is the Substitution Error Rate; and n is the data set with that numbers of characters. ENDLIST The aim of the system is, of course, to have a high FRR, and thus not require an SER reading. Errors with AIDC technology are measured by two parameters: First Read Rate, and the Substitution Error Rate Barcode Technology There are two basic types of barcode technology, linear and two-dimensional. Two types of barcode technology can be identified: linear barcode technology, and two-dimensional barcode technology. Linear or one dimensional bar code technology is the most widely used AIDC technique. There are two forms of linear barcode: width-modulated barcodes, and height-modulated barcodes. These are outlined in some detail in Table Type Width-modulated barcode Table 10.2: Linear barcode forms Description Used widely in retailing and manufacturing, the barcode consists of bars and spaces of varying width, with the bars and spaces being in highly-contrasting colours, such as black and white. The pattern of bars and spaces is coded to represent numeric or alphanumeric characters. This code is subsequently interpreted by a barcode reader; this reading action is done by scanning and decoding the sequence in which the bars fall. The barcode reader itself consists of a scanner and decoder. The scanner emits a beam of light that is either automatically or manually swept over the barcode to be read, thus allowing the reader to sense light reflections from the barcode that

6 Height-modulated barcode distinguishes between bars and spaces. A photodetector coverts the resultant reflections into an electrical signal, where spaces represent the signal, and bars represent its absence. Bar-width is thus converted into electrical signal duration. The decoder analyses the pulse train to validate and interpret the corresponding data. Niche-industry barcode technology, operative in the US Postal service, where it is deployed for ZIP code identification. The barcode in question is distinguished by a series of evenly-spaced bars of varying height. Operative principles are similar to those outlined for width-modulated barcodes. There are two forms of linear, or one-dimensional, barcode: width-modulated barcodes, and height-modulated barcodes. The growth and industrial acceptance of barcodes (width-modulated barcodes in particular) occurred in the 1970s, when retailers started to rely upon the technology for product identification, and to aid storage management techniques. In 1973, the grocery industry adopted the Universal Product Code (UPC) as its standard for item identification. UPC uses a 12-digit barcode where six digits identify the manufacturer and five digits the product, and one digit acts as a check character. Another major endorsement of this technology came from its acceptance as the standard product identifier by the US Department of Defence in 1982, compelling its vendors to adopt the technology Bar Code Symbols The barcode standard adopted by most major industries is a subset of Code 39, known as AIM USD-2 (Automatic Identification Manufacturers Uniform Symbol Description-2). Code 39 uses a series of bars and spaces to represent alphanumeric and other characters, where, in binary terms, the bars are equivalent to 1 and the spaces are equivalent to 0 (see Figure 10.2). Bars and spaces can differ in width by as much as 3 times their conventional size, which has a corresponding effect upon reading produced. However, the width-to-narrow ratio, whatever it is set-to, must be consistent across the barcode to facilitate accurate interpretation of the pulse train produced.

7 Figure 10.2: Code 39 Most major industries use a barcode standard that is based upon a subset of Code 39, known as AIM USD-2. The name Code 39 comes from the physical appearance of the barcode, which consists of nine elements (bars and spaces) used for each character, while three of these elements are wide. It is the placement of the wide spaces and wide bars that uniquely designates the character. Each code begins and ends with either a wide or narrow bar. In addition to the character set in the barcode, there is also a quiet-zone that precedes and succeeds the barcode; this ensures that the decoder is not confused by the absence of bars and spaces in regions outside of the barcode field. Barcodes in Code 39 consist of an arrangement of nine bars and spaces, which form a unique character for each arrangement; and a quiet-zone, consisting of empty space, which both precedes and succeeds the barcode in its presentation.

8 Bar Code Readers There are different types of barcode readers, generally classified as either contact or non-contact readers. These are outlined further in Table Type Contact readers Non-contact readers Table 10.3: Barcode reader types Description Consist of hand-held devices, such as wands or light pens, which are operated by moving the tip of the wand quickly past the barcode on the object or document. They are contact devices because the wand or pen must touch the barcode surface, or be in very close proximity, for effective reading. They can be mounted as well as hand-held, such that they form part of a keyboard entry terminal; in such situations the reader is stationary and the object s barcode is swept-past the device so that it may be read. Portable reading units are also available, which makes them suitable to be carried-around the factory or warehouse by a worker. These are typically battery-powered and include a solid-state memory device capable of storing data acquired during operation. They may also include a keypad so that non-barcode data may be manually entered. These focus a light beam on the barcode to scan and decode the barcode in the conventional way, but at a distance of from several inches to several feet. They can be classified as fixed beam and moving beam scanners. Fixed beam readers are stationary units that use a fixed beam of light. They can be mounted beside a conveyor to scan items as they pass, and thus record what is being placed upon the conveyor. Typical applications occur in warehousing and material handling operations. Moving beam readers use a highly focused beam of light to search for the barcode upon an object. A particular scan is defined as a single sweep of the light beam through an angular path specified by a rotating mirror used to project the beam on to the object. Typically the mirror rotates at very high scan rates up to 1440 scans/sec; thus, when a barcode is located, it may be read more than once, permitting verification of the reading. Typical applications include being mounted alongside conveyors, just like fixed beam readers, or as portable devices that the user points at objects, in the same manner as a pistol. Again these applications occur in warehousing and material handling operations. Barcode readers may be classified as either contact or non-contact devices. LEARNING ACTIVITY 10.1 Visit and look up videos that illustrate the design and operation of various types of bar code equipment outlined in Table 10.1 and Table Make a note of the manufacturers names. Visit the web site of the most common names and evaluate their product and service offerings.

9 END LEARNING ACTIVITY Two-Dimensional Bar Codes Two-dimensional (2-D) barcode schemes were introduced in 1987, and have grown into more than a dozen symbol classifications, with more expected to be produced. 2-D barcodes can store greater amounts of data at higher area densities than their one-dimensional counterparts; their disadvantage is the requirement for special scanning apparatuses to read the codes, and the associated expense of purchasing such equipment. Two-dimensional barcodes store greater amounts of data at higher area densities than their one-dimensional counterparts. The two basic types of 2-D barcodes are: stacked barcodes, and matrix symbologies. These are outlined in some detail in Table Type Stacked barcode Matrix barcode Table 10.5: Two-dimensional barcode types Description Consists of multiple rows of conventional linear barcodes stacked on top of each other. The data density of stacked barcodes is typically five to seven times that of the linear barcode 39. Various stacking schemes may be applied to achieve the build-up of barcodes one on top of the other, and still allow them to be read. Decoding in a stacked barcode is done by using a laser-type scanner that reads the lines sequentially. Issues with barcode-reading include: keeping track of the different rows during scanning; dealing with scanning swaths that cross between rows; and detecting and correcting localised errors. There can also be printing defects, similar to one-dimensional barcodes. Consists of 2-D patterns of data cells that are usually square and are coloured dark (usually black) or white. Introduced around 1990, they can contain more data than stacked barcodes, and also have the potential for higher data densities (up to 30 times more dense than code 39). However they are more complex than stacked barcodes, and they require more sophisticated printing and reading equipment. The symbols must be produced and interpreted both horizontally and vertically, which is referred to as area symbologies. Recent advances have seen considerable improvements in data matrix readers, which are easier to set up and use, as well as being more robust, and reliably operating under a range of conditions. The two basic types of 2-D barcodes are stacked barcodes, and matrix symbologies.

10 10.6 Radio Frequency Identification Radio Frequency Identification (RFID) tags and their associated RFID technology is currently a much-discussed concept, and represents the greatest threat to conventional barcode dominance as a data-capture mechanism. RFID technology has been available since the 1940s, but real interest in the concept as a commercial entity was only sparked in the 1980s and early 1990s, when miniaturisation made the concept feasible for individual product-related issues, and with the development of both passive (i.e. battery-free) tags, and read/write tags that furthered the technology s potential flexibility. Since the mid-1990s the growth and use of RFID technology has grown exponentially to include all sorts of applications in niche markets, and also applications that integrate and increase efficiency across the supply chain. The advantages of RFID technology include: BULLETLIST Identification does not depend on physical contact or direct line of sight observation by the reader Much more data can be contained in the RFID tag than with most AIDC technologies Data in read/write tags can be altered for historical usage purposes or reuse of the tag ENDLIST RFID technology advantages include non-contact and non-direct identification, greater data-containment opportunities, and the ability to re-write to some tags, if necessary. One disadvantage of RFID technology is its expense: it is only recently that the cost of producing RFID tags, as well as associated RFID readers and middleware, has dropped sufficiently to make it a viable alternative to barcode technology General Infrastructure An RFID system consists of an infrastructure of tags and readers. The tag, or transponder, contains a microchip, capacitors and antenna coil embedded into an encapsulation material (such as the product). This tag infrastructure communicates via radio signals with a specialised reader, either a peripheral or handheld device, which can subsequently send the collected data to a backend application system. Powered tags contain batteries that operate the tag s electronics; un-powered tags rely, not on batteries, but power derived from the

11 RFID reader. Figure 10.3 depicts a typical RFID tag, with microchip and capacitor set-up at the centre, while the antenna-coil encircles it. Figure 10.3: Passive and Active RFID tags respectively An RFID tag consists of an infrastructure that contains a microchip, capacitors, and antenna-coil. Depending on the tag type, it may or may not contain a battery. Each tag has a certain amount of internal memory where information about the object is stored, such as its unique ID number, or in some cases more detailed data including the date of manufacture, product composition, etc. The communication process between the reader and tag is managed and controlled by one of several protocols, such as ISO 15693, ISO , ISO , and Electronic Product Code (EPC) for different radio frequencies. In addition, different types of anti-collision algorithms are defined as part of these protocol standards, so that many tags presenting to one reader at the same time can be sorted and individually selected. Once the reader is on, it starts emitting a signal at a selected frequency. Any corresponding tag in the vicinity of the reader will detect the signal and use the energy from it to wake-up and supply operating power to its internal circuits. Once the tag has decoded the signal as valid, it replies with information to the reader thereby identifying the object. This information, called a notification, is then sent to RFID middleware. To deal with huge volumes of data (or notifications) from RFID tags, RFID middleware has been developed to act as a buffer between the RFID tag and the computing systems of the plant. RFID middleware has the ability to handle data operations, such as filtering, aggregation, and enrichment etc., as well as ensuring that data is processed into an appropriate format for application in the middleware. A reverse communication from the middleware to the RFID tag is also possible, which is called commands. Commands for RFID readers may be reading or writing commands which are emitted from the middleware based upon certain implemented rules.

12 A RFID system consists of a number of RFID tags, RFID middleware, and the systems back-end computing systems RFID Tags There are two types of RFID tag: Active tags that is, they contain and are independently powered by a battery; Passive tags (or unpowered tags) which rely on power drawn from the reader to be activated. Active tags are larger, more expensive and, owing to the presence of the battery, have a limited life. Passive tags, on the other hand, are lighter, smaller, cheaper and have an unlimited life; however, they are inhibited by their relatively short read ranges, the requirement for high-powered readers, and by the fact that they can only be written to once (i.e. they are read-only). In contrast, active tags can use greater variability in readers and can be read at significantly longer distances, while they usually contain facilities to read and write a multiple number of times. There are two types of RFID tag: active tags, which are battery-powered; and passive tags, which rely on power drawn from the reader to be activated. There also exist hybrids called semi-passive tags that use small batteries to operate the RFID chip s circuitry, but rely on reader-power for communication. Table 10.6 summarizes some general aspects of RFID tag performance across a range of environments. Table 10.6: RFID tag performance Frequencies Low Frequency High Frequency Ultra-High Frequency General Long antennas, more expensive. Less prone to interference from metals and liquids. Largely installed but will be overtaken by higher frequencies. Shorter antennas, less expensive than low freq. tags. This frequency has the widest application scope. Best suited for applications that do not require long range reading of large amounts of tags. Smaller, Cheaper. Higher frequency means these tags are potentially more powerful and have greater range. More susceptible to interference by metals and liquids. Different frequencies and power allocated by different countries. Microwave Similar to ultrahigh freq. but faster read rates. Much more susceptible to interference by metals and liquids. This frequency band is shared by other technologies, including bluetooth and many other shortrange radio devices.

13 Standards Specifications ISO/IEC ISO/IEC , AutoID HFclass1, ISO 14443, ISO ISO/IEC AutoID class0, AutoID class 1 ISO/IEC Typical Read Range (typical values in metres) Typical Applications < 0.5metres 1metre 4~5metres for unlicensed readers and 10metres for site license in the US; 2metres in Europe as power emissions increase to 2 watts. Access Control, Animal tagging Smart cards, Access Control, Payment, Baggage control, Biometrics, Libraries, Transport Pallet and box tagging, Baggage handling, Electronic toll collection 1metre Electronic toll collection, Tracking the real time location of goods Tag Read Rate Slowest Slow Medium Fast RFID tag performance depends upon the frequency under which it operates, as well as the RFID tag type. Current memory configurations on RFID tags tend to favour low-cost, memorylight, read-only tags that may only contain a unique serial number of the item, which, in this guise, operates in much the same way as a one-dimensional barcode. However, there are methods that can increase the memory capacity of an individual RFID tag, albeit with a consequent increase in its production cost. Vendors are regularly offering prospective customers ever-greater memory capacities, some as much as 128 kilobytes on high frequency, passive RFID applications RFID Memory There are three different types of RFID memory: NUMLIST ROM (read only memory) that stores security data, a unique device identifier and operating systems instructions, with electrically erasable programmable read only memory (EEPROM) being a specific type of ROM that has the ability to save tag data in its non-operative, power-saving state

14 RAM (random access memory) that stores data accrued during transponder interrogation and response WORM (write once / read many memory) that is similar in functionality to RAM. ENDLIST There are three different types of RFID memory: read only memory; random access memory; and write once / read many memory. LEARNING ACTIVITY 10.2 Search the internet for videos, slides, articles and vendors for RFID technology used in industry. Write a short note of your findings. END LEARNING ACTIVITY RFID Readers RFID readers communicate with the RFID tags via radio waves and pass information to the backend computer system in digital form. Readers can be configured in many formats including handheld devices, portals, or they may be conveyor-mounted. The user can change or customise the reader s operations to suit a specific requirement by issuing commands through the RFID middleware. The purpose of an RFID reader is not to store data; rather it transfers data to and from the RFID tags, though short-term data storage is still required. The configuration information of a reader (e.g., the reader address, and configuration for filtering) is stored consistently during the entire operation of the RFID reader. Furthermore, in some cases, data acquired from the tags needs to be stored for short-term processing and forwarding to the middleware.

15 Figure 10.4: RFID tags and reader/sensor RFID readers communicate with the RFID tags via radio waves and pass information to the backend computer system in digital form. When large numbers of RFID tags are presented to the RFID reader, data processing utilities are required to capture the high-volume data flows that occur. A reader can either process the field data from the tags, or the command data from the middleware (e.g., read/write commands). Pre-processing (e.g., filtering and aggregation) is used to relieve the middleware from processing too many notifications at any one time. Commands provided by the middleware (e.g., invoking a write operation on a tag) need to be stored for a short while and translated into internal RFID reader commands RFID Middleware RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end. It is responsible for handling notifications, such as filtering, aggregation, enrichment, etc., according to specific rules implemented in the middleware.

16 RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end. Data processing in the middleware is similar to pre-processing in the RFID reader. Notifications that are irrelevant for the business process are filtered-out and faulty information is eliminated. The filtered notifications are then processed further to develop business events that are sent to enterprise computing backend systems. This information can either be held locally in the middleware, or come from external devices, which are connected to the middleware (e.g., sensors, field databases, human user interfaces). Connections may also be developed to external information systems so that supplementation of the existing information by external sources can occur. For external information systems to operate successfully with RFID systems, automatic identification infrastructures are needed, such as the Object Naming Service (ONS) or the use of external WWAI network nodes (see Figure 10.5). Figure 10.5: RFID Middleware RFID middleware acts as an effective data-filter, and subsequently develops business events from the processed data that are sent to enterprise computing back-end systems.

17 10.7 Other AIDC technologies Other AIDC technologies that may occasionally be used in automation environments are summarised in Table Technology Magnetic Strips Optical Character Recognition Machine vision Table 10.7: Other AIDC technologies Description These strips are attached to products or containers in warehouse and factory settings, and are used for product identification. The magnetic strip consists of a thin plastic film with small magnetic particles whose pole orientations are used to encode bits of data onto the film. The plastic film is usually mounted onto a plastic card (such as a credit card), or paper ticket to provide a robust infrastructure, and as means of automatic identification. Advantages include: the ability to hold large amounts of data, and the ability to alter data held, if necessary. Disadvantages, from a manufacturing point-of-view, include: the need to have the strip in contact with the scanning equipment for correct reading; the absence of shop-floor methods that can readily encode data to magnetic strips; and the expense of the technology. Here specially designed alphanumeric characters that are machine readable by an optical reading device are deployed in factory and warehouse applications. Optical character recognition is a 2-D symbology, and scanning involves interpretation of both the vertical and horizontal features of each character during decoding. The use of hand-held operators, therefore, may require a certain level of skill on the part of human operators, to ensure that characters are read correctly; often this requires multiple scans of the code. The benefit of optical character recognition is that both machines and humans can read the same text. Disadvantages include: the need for near-contact scanning; lower scanning rates; and higher error rates compared to barcode scanning. Used principally for automated inspection tasks, machine vision read 2-D matrix symbols, such as data matrix, or stacked barcodes. Applications of machine vision also include other types of automatic identification problems, and these applications may grow in number as the technology advances. Other AIDC technologies that may occasionally be used include: magnetic strips, optical character recognition, and machine vision technologies.

18 10.8 Case Study At its factory in Galway, Thermo King employees press a button to alert management whenever parts need to be replenished, thereby preventing work stoppages and part overstocks. Using AeroScout tags, the system is built onto the company's existing Wi-Fi system and was integrated by IMEC Technologies. This year, the firm is also in the process of expanding its usage of RFID at the Galway facility to include to asset tracking. The immediate challenge for Thermo King involved the development of what it calls its e-kanban system (a signaling system to trigger an action such as inventory replenishment) that enables it to better manage the number of parts available at all assembly stations. The manual part-replenishment system employed prior to adopting RFID had several shortcomings. If workers discover they are running out of parts they must contact management, either by phone or by walking to the person in charge of ordering replenishment. If the company's on-floor inventory of parts runs out, work is stopped until additional components can be brought in from the warehouse. To avoid such problems in the past, companies typically store a high level of inventory at assembly stations. When space is tight companies need to establish a kanban system in which they only pull inventory [from the warehouse] when it is required. Thermo King first began discussing an automated solution with IMEC and AeroScout in early 2008 and the group conducted a proof-of-concept trial in April of that year, in which it tested the hardware to ensure proper read rates, then deployed the system throughout the entire factory in August. With the system, Ben-Assa says, the firm has installed approximately 100 AeroScout 2.4 GHz T2 tags, with a tag mounted next to each container of parts. When a container of parts runs low, an employee presses a button on its tag, which transmits its ID number to the Wi-Fi access points already installed throughout the facility to allow wireless laptop connectivity. The tag transmits not only its unique ID number, but also the assembly part serial number previously encoded when that tag was first installed. AeroScout Mobile View software links the ID number with the location at which the tag was installed, then transmits an alert to staff members in charge of replenishment, with the station number and the part number required, as well as the time at which the order was sent Unit Review BULLETLIST Automatic identification and data capture (AIDC) is the use of technology to provide direct data entry to a computer, or other micro-processor controlled

19 system, without resorting to manual methods of data-entry, such as via a keyboard. AIDC technologies consist of three principal technologies that are applied sequentially; these are data encoding, machine reading, and data decoding. AIDC can be categorised into optical, electromagnetic, magnetic, smart card, touch technique, and biometric technology types. Errors with AIDC technology are measured by two parameters: First Read Rate, and the Substitution Error Rate. Two types of barcode technology can be identified: linear barcode technology, and two-dimensional barcode technology. Barcodes in Code 39 consist of an arrangement of nine bars and spaces, which form a unique character for each arrangement; and a quiet-zone, consisting of empty space, which both precedes and succeeds the barcode in its presentation. The two basic types of 2-D barcodes are stacked barcodes, and matrix symbologies. Radio Frequency Identification technology represents the greatest threat to conventional barcode dominance as a data-capture mechanism. RFID technology advantages include non-contact and non-direct identification, greater data-containment opportunities, and the ability to re-write to some tags, if necessary. A RFID system consists of a number of RFID tags, RFID middleware, and the plant s back-end computing systems. Communication can occur in both directions, both from the RFID tag backwards, and from the computing systems forwards. There are two types of RFID tag: active tags, which are battery-powered; and passive tags, which rely on power drawn from the reader to be activated. There are three different types of RFID memory: read only memory; random access memory; and write once / read many memory. RFID readers communicate with the RFID tags via radio waves and pass information to the backend computer system in digital form. RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end.

20 Other AIDC technologies that may occasionally be used include: magnetic strips, optical character recognition, and machine vision technologies. ENDLIST Self-Assessment Questions NUMLIST List the principal types of AIDC technologies, and the categories that these technologies can take. What are the types of barcode technology that can be identified? What is the major barcode standard that informs the use of barcodes made by most of contemporary industry? What are the two basic types of two-dimensional barcodes? What are the advantages that are associated with Radio Frequency Identification (RFID) technology? What are the major constituents of an RFID tag? How does RFID middleware act in the RFID system? Specify some other AIDC technologies. ENDLIST Answers to Self-Assessment Questions NUMLIST AIDC technologies consist of three principal technologies that are applied sequentially; these are data encoding, machine reading, and data decoding. AIDC can be categorised into optical, electromagnetic, magnetic, smart card, touch technique, and biometric technology types. Two types of barcode technology can be identified: linear barcode technology, and two-dimensional barcode technology. Most major industries use a barcode standard that is based upon a subset of Code 39, known as AIM USD-2. The two basic types of two-dimensional barcodes are stacked barcodes, and matrix symbologies.

21 RFID technology advantages include non-contact and non-direct identification, greater data-containment opportunities, and the ability to re-write to some tags, if necessary. An RFID tag consists of an infrastructure that contains a microchip, capacitors, and antenna-coil. Depending on the tag type, it may or may not contain a battery. RFID middleware acts as mediation between the RFID tag and the enterprise systems back-end. It works as an effective data-filter, and subsequently develops business events from the processed data that are sent to enterprise computing back-end systems. Other AIDC technologies that may occasionally be used include: magnetic strips, optical character recognition, and machine vision technologies. END LIST

To effectively manage and control a factory, we need information. How do we collect it?

To effectively manage and control a factory, we need information. How do we collect it? Auto-ID 321 Auto-ID Data-collection needs: What is our WIP? What is productivity or assignment of employees? What is utilization of machines? What is progress of orders? What is our inventory? What must

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify

More information

RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.

RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium. RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers

More information

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation Introduction This document is an introduction to the principles and practice of barcode scanning as it relates to a manufacturing

More information

Automated Identification Technologies

Automated Identification Technologies Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT

More information

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 Understanding RFID and Barcode Differences Don t misuse RFID with applications built for Barcodes Radio Frequency

More information

The Drug Quality & Security Act

The Drug Quality & Security Act The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply

More information

NOT ALL CODES ARE CREATED EQUAL

NOT ALL CODES ARE CREATED EQUAL NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 info@verifybrand.com (763) 235-1400 EXECUTIVE SUMMARY Serial numbers

More information

Warehouse Management System

Warehouse Management System Warehouse Management System Solvo's WMS is an application suite designed to optimize warehouse operations. Solvo's solutions manage the entire warehouse operation cycle in a real time mode. The System

More information

Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application

Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Have camera/image-based code readers replaced traditional laser scanners? Has

More information

QR Codes and Other Symbols Seen in Mobile Commerce

QR Codes and Other Symbols Seen in Mobile Commerce QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,

More information

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about

More information

white paper JANUARY 2011 The Next- Warehouse Scanning and the Emergence of 2D Bar Codes

white paper JANUARY 2011 The Next- Warehouse Scanning and the Emergence of 2D Bar Codes JANUARY 2011 The Next- Generation Warehouse Long Range Scanning and the Emergence of 2D Bar Codes Table of Contents Introduction...3 Bar coding basics...4 Bar coding in the warehouse...4 Warehouse application

More information

CHAPTER I INTRODUCTION

CHAPTER I INTRODUCTION CHAPTER I INTRODUCTION 1.1 Introduction Barcodes are machine readable symbols made of patterns and bars. Barcodes are used for automatic identification and usually are used in conjunction with databases.

More information

Active RFID Solutions for Asset Tracking and Inventory Management

Active RFID Solutions for Asset Tracking and Inventory Management Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.

More information

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008 RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

Time & Access System An RFID based technology

Time & Access System An RFID based technology Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.

More information

White paper. Guide to Scanning Technologies

White paper. Guide to Scanning Technologies White paper Guide to Scanning Technologies Introduction Scanning technology has been changing dramatically. Laser scan engines, once considered the workhorses for most scanning applications, have been

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

Radio Frequency Identification (RFID) Vs Barcodes

Radio Frequency Identification (RFID) Vs Barcodes Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want

More information

SATO RFID White Paper

SATO RFID White Paper SATO RFID White Paper Rev_0710 1 Overview This white paper describes the basic components of a Radio Frequency Identification (RFID) system and explores the technology, applications, and competitive advantages

More information

The process to convert a computer message into a bar code symbol is a fourstep

The process to convert a computer message into a bar code symbol is a fourstep Bar Code Symbologies A bar code symbology is a system for representing data in the bars and spaces of a bar code. A bar code consists of a number of printed bars and intervening spaces. The width of the

More information

A study of comparing RFID and 2D barcode tag technologies for pervasive mobile applications Ernest Arendarenko

A study of comparing RFID and 2D barcode tag technologies for pervasive mobile applications Ernest Arendarenko A study of comparing RFID and 2D barcode tag technologies for pervasive mobile applications Ernest Arendarenko March 23, 2009 Department of Computer Science and Statistics University of Joensuu Master

More information

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why

More information

Determining The Right Lift Truck Navigation System. For Your Very Narrow Aisle (VNA) Warehouse

Determining The Right Lift Truck Navigation System. For Your Very Narrow Aisle (VNA) Warehouse Determining The Right Lift Truck Navigation System For Your Very Narrow Aisle (VNA) Warehouse Determining The Right Lift Truck Navigation System For Your Very Narrow Aisle (VNA) Warehouse Today s pressures

More information

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Why Has the Development in RFID Technology Made Asset Management More Urgent? E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,

More information

NAIT DEVICE STANDARD FOR CATTLE 25 SEPTEMBER 2014

NAIT DEVICE STANDARD FOR CATTLE 25 SEPTEMBER 2014 NAIT DEVICE STANDARD FOR CATTLE 25 SEPTEMBER 2014 CONTENTS 1. INTRODUCTION... 1 2. UPDATES TO THIS STANDARD... 1 3. REQUIRED PHYSICAL STANDARDS... 1 4. REQUIRED PERFORMANCE STANDARDS... 2 5. LICENSEE

More information

Laser Scanner Programming Guide (SE923 laser engine)

Laser Scanner Programming Guide (SE923 laser engine) Laser Scanner Programming Guide (SE923 laser engine) CONTENT Technical note... 5 How to recognise the type of the laser barcode engine... 5 How to program the laser barcode reader into default value...

More information

1 Introduction. 1.1 Overview of barcode technology. 1.1.1 Definition of barcode

1 Introduction. 1.1 Overview of barcode technology. 1.1.1 Definition of barcode 1 Introduction 1.1 Overview of barcode technology First of all, it is important to know the relationship between a code and a symbol in this context: The shorthand used to represent the verbal description

More information

Barcoding 101 for Manufacturers: What You Need to Know to Get Started

Barcoding 101 for Manufacturers: What You Need to Know to Get Started Barcoding 101 for Manufacturers: What You Need to Know to Get Started Plex Online White Paper At a Glance This paper highlights what manufacturers need to know to take advantage of barcoding to improve

More information

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you

More information

915MHz RFID State of the Art RFID

915MHz RFID State of the Art RFID 915MHz RFID State of the Art RFID LIBRARY BOOK / MEDIA MANAGEMENT and RFID TRACKING SYSTEM Executive Overview More and more libraries worldwide are utilizing RFID to automate the issue and return of books,

More information

1 PERSONAL COMPUTERS

1 PERSONAL COMPUTERS PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers

More information

The Place of Emerging RFID Technology in National Security and Development

The Place of Emerging RFID Technology in National Security and Development The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Cloud RFID UHF Gen 2

Cloud RFID UHF Gen 2 Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system

More information

FINDING THE POSSIBLE ADVANTAGES IN RECEIVING, WAREHOUSING AND PICKING UP GOODS

FINDING THE POSSIBLE ADVANTAGES IN RECEIVING, WAREHOUSING AND PICKING UP GOODS LAPPEENRANNAN TEKNILLINEN YLIOPISTO Teknillinen tiedekunta Konetekniikan osasto BK10A0400 Kandidaatintyö ja seminaari FINDING THE POSSIBLE ADVANTAGES IN RECEIVING, WAREHOUSING AND PICKING UP GOODS LAPPEENRANNASSA

More information

Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract

Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract This talk presents a brief overview of the ultra-wideband (UWB) RFID system with emphasis on the performance evaluation

More information

May 2001. Prepared: Product version: Keyword: Accelio Present Central 5.4. Original value:

May 2001. Prepared: Product version: Keyword: Accelio Present Central 5.4. Original value: : Page 1 : : ANSI/AIM BC2-1995, Uniform Symbology Specification - Interleaved 2 of 5 0 2 of 5 Industrial Interleaved 2 of 5 (also called I-2/5 and ITF) is suitable for encoding general purpose all-numeric

More information

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes. Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways

More information

RF Attendance System Framework for Faculties of Higher Education

RF Attendance System Framework for Faculties of Higher Education RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES

10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES FORM 4 COMPUTER STUDIES Chapter 10: Input and Output Devices March, 01 10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES The main function of an input device is to The main function of an output device is to

More information

SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9

SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 Learning Goals: At the end of this lab, the student should have basic familiarity with the DataMan

More information

Programming Reference Guide HP USB Barcode Scanner

Programming Reference Guide HP USB Barcode Scanner Programming Reference Guide HP USB Barcode Scanner Document Part Number: 430944-002 August 2006 Print this document before setting up the HP USB Barcode Scanner. The document provides the programming bar

More information

The Barcode Printing option may be purchased for an additional cost. You will receive a CD that you will use to activate this feature.

The Barcode Printing option may be purchased for an additional cost. You will receive a CD that you will use to activate this feature. 27 BARCODE PRINTING Barcode Printing takes your museum to the next level of inventory control and tracking. Barcoding is a proven technology that can eliminate keyboard data entry errors. There are many

More information

Getting Started with TraSer from Requirements to a Solution

Getting Started with TraSer from Requirements to a Solution Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for

More information

COMPUTER - INPUT DEVICES

COMPUTER - INPUT DEVICES COMPUTER - INPUT DEVICES http://www.tutorialspoint.com/computer_fundamentals/computer_input_devices.htm Copyright tutorialspoint.com Following are few of the important input devices which are used in a

More information

How 2D Scanning Can Benefit your Business

How 2D Scanning Can Benefit your Business How 2D Scanning Can Benefit your Business BarcodesInc www.barcodesinc.com 1.800.351.9962 What You'll Learn in this ebook 2D scanning vs. traditional laser scanning - what are the advantages? How 2D scanners

More information

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading Important technical considerations that are the key to successful implementations Version 1.03 P a g e 2 OVERVIEW Background: Inks

More information

Automotive Applications of 3D Laser Scanning Introduction

Automotive Applications of 3D Laser Scanning Introduction Automotive Applications of 3D Laser Scanning Kyle Johnston, Ph.D., Metron Systems, Inc. 34935 SE Douglas Street, Suite 110, Snoqualmie, WA 98065 425-396-5577, www.metronsys.com 2002 Metron Systems, Inc

More information

HARTING Auto-ID System Integration

HARTING Auto-ID System Integration HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader

More information

Discovering Computers. Technology in a World of Computers, Mobile Devices, and the Internet. Chapter 7. Input and Output

Discovering Computers. Technology in a World of Computers, Mobile Devices, and the Internet. Chapter 7. Input and Output Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 7 Input and Output Objectives Overview Differentiate among various types of keyboards: standard, compact,

More information

Making Multiple Code Reading Easy. Webinar

Making Multiple Code Reading Easy. Webinar Making Multiple Code Reading Easy Webinar Today s Agenda Introduction How DataMan Makes Multiple Code Reading Easy Multiple Code Reading Applications Product Demonstration Videos Q&A 2 Introduction Introduction

More information

Analysis of identification technologies and an automatic lock for school lockers

Analysis of identification technologies and an automatic lock for school lockers EUROPEAN JOURNAL FOR YOUNG SCIENTISTS AND ENGINEERS Analysis of identification technologies and an automatic lock for school lockers David Marn Abstract The main objective of the project was the improvement

More information

Military Usage of Passive RFID 1

Military Usage of Passive RFID 1 Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third

More information

The Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers.

The Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers. Standard Methods of Input Keyboard Mouse Input device enables you to input information and commands into the computer. The Keyboard One of the first peripherals to be used with a computer and is still

More information

Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard

Chapter 5 Input. Chapter 5 Objectives. What Is Input? What Is Input? The Keyboard. The Keyboard Chapter 5 Objectives Chapter 5 Input Define input List characteristics of of a keyboard Describe different mouse types and how they work Summarize how pointing devices work Explain how a digital camera

More information

Wireless Laser Barcode Scanner ils 6300BU. User s Manual

Wireless Laser Barcode Scanner ils 6300BU. User s Manual Wireless Laser Barcode Scanner ils 6300BU User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.

More information

Back to Basics: Introduction to Industrial Barcode Reading

Back to Basics: Introduction to Industrial Barcode Reading Back to Basics: Introduction to Industrial Barcode Reading 1 Agenda What is a barcode? History 1 D codes Types and terminology 2 D codes Types and terminology Marking Methods Laser Scanning Image Based

More information

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System? Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers

More information

Asset Management Services. White Paper

Asset Management Services. White Paper Asset Management Services White Paper Asset Management Solutions provide a comprehensive and systematic method for managing equipment and intelligence in complex IT infrastructure environments. Through

More information

Data Capture Solutions for Manufacturing Applications

Data Capture Solutions for Manufacturing Applications Manufacturing Data Capture Solutions for Manufacturing Applications Create a Non-Stop Production Line and Cost-Effective Solutions for Manufacturing The growing complexity of manufacturing requires an

More information

An Introductory and Elementary Study on RFID & Its Applications

An Introductory and Elementary Study on RFID & Its Applications An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

OI-TECH Asset Management

OI-TECH Asset Management OI-TECH Asset Management Service Today with the Solutions for Tomorrow www.oi-tech.com OI Tech Asset Management RFID Technology - Overview RFID (Radio Frequency Identification) is a technology for identifying

More information

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,

More information

Implementing RFID in Library: Methodologies, Advantages and Disadvantages

Implementing RFID in Library: Methodologies, Advantages and Disadvantages Implementing RFID in Library: Methodologies, Advantages and Disadvantages Narayanan A., Sanjay Singh and Somasekharan M. Abstract A library is a growing organism. As it grows in size the problems associated

More information

Packaging Identification Standard

Packaging Identification Standard Packaging Identification Standard The attached document provides the Amtex Inc. supplier packaging identification standard for all raw materials to be received. Many references have been made to the Automotive

More information

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking

More information

Printed Circuit Board Tracking with RFID: Speed, Efficiency and Productivity Made Simple

Printed Circuit Board Tracking with RFID: Speed, Efficiency and Productivity Made Simple RFID February 2008 White Paper Printed Circuit Board Tracking with RFID: Speed, Efficiency and Productivity Made Simple Chris Cook and Hank Tomarelli Texas Instruments Executive Summary Tracking goods

More information

BARCODE PRINTING SET UP BARCODE PRINTING

BARCODE PRINTING SET UP BARCODE PRINTING 21 BARCODE PRINTING The Barcode Printing option can be purchased for an additional cost. You will receive a floppy disk or CD that you can use to activate this feature. SET UP BARCODE PRINTING To start,

More information

1-9 August 2003, Berlin

1-9 August 2003, Berlin World Library and Information Congress: 69th IFLA General Conference and Council 1-9 August 2003, Berlin Code Number: 132-E Meeting: 113. Information Technology Simultaneous Interpretation: - Experiences

More information

Simplification and enhanced accuracy of order processing and receipt

Simplification and enhanced accuracy of order processing and receipt Foreword Project background: Coding for Success The GS1 System of standards is an integrated system of global standards that provides unique accurate identification using bar codes and other data carriers

More information

Efficient Asset Tracking: From Manual to Automated

Efficient Asset Tracking: From Manual to Automated White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies

More information

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi

More information

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

Simplifying IT Management and Data Security with RFID

Simplifying IT Management and Data Security with RFID Simplifying IT Management and Data Security with RFID IT asset management is a fundamental discipline to contribute to the growth and sustainability of the enterprise. Chief information officers have to

More information

Portable adapter for barcode scanners

Portable adapter for barcode scanners Microprocessors and Microsystems 23 (1999) 217 223 Portable adapter for barcode scanners I.Y. Soon a, *, C.K. Yeo b, Y.H. Sng a a School of Electrical and Electronics Engineering, Nanyang Technological

More information

INFINEA TAB USER MANUAL. INFINEA ipad TAB

INFINEA TAB USER MANUAL. INFINEA ipad TAB INFINEA TAB USER MANUAL INFINEA ipad TAB CONTACT INFORMATION National Sales Headquarters: Infinite Peripherals, Inc. 1124 Main Street Suite B Irvine, CA 92614 Toll Free: (866) 278-7860 Office: (949) 222-0300

More information

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop 1 Park, Yang Ho, 1 Lee, Sang Seok, 1 Kim, Jong Hwan, 1 Joung, Youn-kyoung, 2 Noh, Sang Do 1 Department of Industrial Engineering,

More information

RFID System Description for Logistics & Inventory

RFID System Description for Logistics & Inventory RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.

More information

A Mechatronic Marvel: The Barcode Scanner

A Mechatronic Marvel: The Barcode Scanner A Mechatronic Marvel: The Barcode Scanner Dr. Kevin Craig & Dr. Mark Nagurka Professors of Mechanical Engineering Marquette University Bar Code Scanner K. Craig & M. Nagurka 1 Design News Web Cast Web

More information

Power over Ethernet technology for industrial Ethernet networks

Power over Ethernet technology for industrial Ethernet networks Power over Ethernet technology for industrial Ethernet networks Introduction Ethernet networking has grown beyond office and home usage to become a very successful protocol suite used in many industrial

More information

Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail

Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail Better Data Center IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail IT asset managers and facilities managers for Data Centers worldwide are being

More information

Using RFID for Supply Chain Management

Using RFID for Supply Chain Management DÉPARTEMENT D INFORMATIQUE / DEPARTEMENT FÜR INFORMATIK Information Systems Research Group Electronic Business course Using RFID for Supply Chain Management Project work Written by Fabien Ropraz Student

More information

White Paper. An Analysis of Active RFID for Asset Tracking

White Paper. An Analysis of Active RFID for Asset Tracking White Paper An Analysis of Active RFID for Asset Tracking January 2010 Description of RFID Radio frequency identification (RFID) technology uses radio waves to identify objects. A radio transmitter is

More information

Understanding barcodes. www.brightpearl.com/ca101

Understanding barcodes. www.brightpearl.com/ca101 Understanding barcodes This ebook gives an overview of product codes, barcodes, scanners and describes where barcode management could fit in your business. www.brightpearl.com/ca0 to Understanding barcodes

More information

RFID IN ASSOCIATION WITH ERP SYSTEMS WITHIN THE MANUFACTURING INDUSTRY TO IMPROVE DATA TRANSFER RELIABILITY

RFID IN ASSOCIATION WITH ERP SYSTEMS WITHIN THE MANUFACTURING INDUSTRY TO IMPROVE DATA TRANSFER RELIABILITY International Journal of Automated Identification Technology, 3(2), July-December 2011, pp. 81-88 RFID IN ASSOCIATION WITH ERP SYSTEMS WITHIN THE MANUFACTURING INDUSTRY TO IMPROVE DATA TRANSFER RELIABILITY

More information

Laser Barcode Scanner

Laser Barcode Scanner Laser Barcode Scanner User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are

More information