SlideShare una empresa de Scribd logo
1 de 29
2.
Automatic Identification and
Data Capture
1
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28
Automatic Identification and Data
Capture
Sections:
1. Overview of Automatic Identification Methods
2. Bar Code Technology
3. Radio Frequency Identification
4. Other AIDC Technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28
Automatic Identification
and Data Capture
A family of technologies that provide direct entry of data
into a computer or other microprocessor controlled
system without using a keyboard
 Reasons for using AIDC:
1. Data accuracy
2. Timeliness
3. Labor reduction
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28
Alternative to AIDC: Manual Methods
of Data Collection and Entry
Problems with manual collection and data entry:
1. Human errors
 When data are collected and entered manually
2. Time factor
 Time delay between occurrence of activities and events
and entry of associated data
 Manual methods are inherently time consuming
3. Labor cost
 Cost of full-time attention of human worker
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28
AIDC Applications
 Retail sales and inventory control
 Material handling
 Shipping and receiving, sortation, order picking, mail
and parcel handling
 Factory operations
 Order processing, WIP tracking, machine utilization,
worker attendance
 Other
 Patient identification in hospitals, check processing in
banks, security system
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28
Components of AIDC
Nearly all AIDC technologies consist of three principal
components, which are the sequential steps in AIDC:
1. Data encoding - alphanumeric characters are translated
to machine-readable form
2. Machine reading or scanning - scanner reads the
encoded data and converts it to alternative form, usually
an electrical signal
3. Data decoding - electrical signal is transformed into digital
data and finally back into original alphanumeric
characters
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28
AIDC Technologies
1. Optical
 Bar codes (linear and 2-D), optical character
recognition, machine vision
2. Electromagnetic
 Radio frequency identification (RFID)
3. Magnetic
 Data are encoded magnetically, similar to magnetic
tape (e.g., plastic credit cards, bank checks), and
magnetic ink character recognition
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28
AIDC Technologies
4. Smart card
 Small plastic cards imbedded with microchips
(integrated circuits)
5. Touch techniques
 Touch screens
6. Biometric
 Voice recognition, fingerprint analysis, retinal eye
scans
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28
Measures of AIDC Reading Accuracy
1. First read rate (FRR)
 Probability of a successful (correct) reading by the
scanner in its initial attempt
2. Substitution error rate (SER)
 Probability of scanner incorrectly reading the encoded
character as some other character
 In a given set of encoded data containing n
characters, the expected number of errors = SER * n
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28
Bar Code Technology
 Bar codes are of two basic types:
1. Linear
 Encoded data are read using a linear sweep of the
scanner
2. Two-dimensional
 Encoded data must be read in both directions
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28
Linear (One-Dimensional) Bar Codes
Two forms of linear bar codes:
1. Width-modulated
 Symbol consists of bars and spaces of varying width
 Most widely used (e.g., Universal Product Code)
2. Height-modulated
 Symbol consists of bars and spaces of varying height
 Used only by U.S. Postal Service for ZIP code
identification
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28
Two Forms of Bar Codes
(a) (b)
(a) Width-modulated bar code, exemplified here by the Universal
Product Code (UPC), and
(b) (b) height-modulated bar code, exemplified by Postnet, used by
the U.S. Postal Service
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28
SOS Distress Signal in
"Morse" Bar Codes
Fig. 12.2
Difficulties with the "Morse" bar codes:
(1) only the dark bars are used, thus increasing the length of the
coded symbol, and
(2) (2) the number of bars making up the alphanumeric characters
differs, making decoding more difficult
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28
Reading the Bar Code
(a)
(b)
Conversion of bar code into a electrical signal pulse train :
(a) bar code and,
(b) (b) corresponding electrical signal
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28
Code 39
A typical grouping of
characters to form a
bar code in Code 39.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28
USD-2
Character Set
USD-2 is a subset
of Code 39
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28
Linear Bar Code Readers
Usually classified as:
1. Contact
 Hand-held wands or light pens operated by moving
the tip quickly past the bar code
2. Noncontact
 Readers focus a light beam on the bar code and a
photodetector reads the reflected signal
1. Fixed beam - stationary readers used fixed beam
2. Moving beam - light beam (lasers) traverse an
angular sweep to search for the bar code
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28
Bar Code Scanner
Stationary moving beam bar code scanner located along a moving
conveyor
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28
Bar-Coded Route Sheet
Bar-coded
production order
and route sheet
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28
Two-Dimensional Bar Codes
 First 2-D bar code introduced in 1987
 Two basic types of 2-D bar code symbols
1. Stacked bar codes
 Consists of multiple rows of conventional bar
codes stacked on top of each other
2. Matrix symbologies
 Consists of 2-D patterns of data cells that are
usually square and are colored dark or white
 Advantage over stacked bar codes is capability to
contain more data
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28
2-D Stacked Bar Code (PDF417)
Fig 12.8
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28
2-D Matrix Bar Code (Data Matrix)
Fig. 12.9
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28
Radio Frequency Identification
RFID uses an identification tag containing electronically
coded data that is attached to the subject item.
 The tag consists of a memory microchip and an antenna,
usually encased in a plastic container
 The tag is a transponder - a device capable of emitting
a signal of its own when it receives a signal from an
external source
 The tag communicates the encoded data by RF as
the item passes a reader and is activated by a low-
level RF magnetic field transmitted by the reader.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28
Radio Frequency Identification
 RFID represents the biggest challenge to the
predominance of bar codes
 Wal-Mart, Target, Metro AG (Germany) and U.S. DoD
have mandated their suppliers use RFID on incoming
materials
 According to a study of Wal-Mart, "RFID stores are 63
percent more effective in replenishing out-of-stock
items than traditional stores"
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28
Types of RFID Tags
1. Passive tags
 Have no internal power source
 They derive their electrical power from the external
signal transmitted by the reader
 Smaller, less expensive, longer lasting
2. Active tags
 Have their own battery power packs
 Possess a larger memory capacity and longer
communication range
 Higher cost and used for higher value items
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28
Industrial Applications of RFID
 Inventory management
 Supply chain management
 Tracking systems
 Warehouse control
 Location identification
 Work-in-progress
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28
RFID Advantages and Disadvantages
 Advantages
 Identification does not depend on physical contact or
direct line of sight
 Much more data can be contained in the identification
tag than with most AIDC technologies
 Data in read/write tags can be altered for historical
usage purposes or to reuse the tag
 Disadvantages
 More expensive than most other AIDC technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28
Bar Codes vs. RFID
Comparison Bar Codes RFID
Technology Optical Radio frequency
Read-write capability Read only Read-write available
Memory capacity 14 to 16 digits (linear) 96 to 256 digits
Line-of-sight reading Required Not required
Reusability One-time use Reusable
Cost Very low cost per label Approx 10X cost of bar
code
Durability Susceptible to dirt Mode durable in plant
and scratches environment
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28
Other AIDC Technologies
 Magnetic stripes
 Used for credit cards and money access cards
 More expensive than bar codes
 Must contact scanner to obtain a reading
 Optical character recognition (OCR)
 Can be read by humans and machine readers
 Low first read rate
 Machine vision
 Principal application is inspection
 Used with 2-D optical symbols

Más contenido relacionado

La actualidad más candente

Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Pratik Gandhi
 
CIM Computer Integrated Manufacturing
CIM Computer Integrated ManufacturingCIM Computer Integrated Manufacturing
CIM Computer Integrated ManufacturingTanuVerma39
 
Automation 2018
Automation  2018Automation  2018
Automation 2018vcdas
 
Computer Integrated Manufacturing System
Computer Integrated Manufacturing SystemComputer Integrated Manufacturing System
Computer Integrated Manufacturing SystemSaif Eye
 
Applications of Additive Manufacturing Technology
Applications of Additive Manufacturing TechnologyApplications of Additive Manufacturing Technology
Applications of Additive Manufacturing TechnologyAshutosh Pandey
 
Abrasive flow machining (afm)
Abrasive flow machining (afm)Abrasive flow machining (afm)
Abrasive flow machining (afm)sagar agarwal
 
Cnc, dnc & adaptive control
Cnc, dnc & adaptive controlCnc, dnc & adaptive control
Cnc, dnc & adaptive controlparabajinkya0070
 
Chapter 2 digital manufacturing
Chapter 2   digital manufacturingChapter 2   digital manufacturing
Chapter 2 digital manufacturingN. A. Sutisna
 
Machine vision
Machine visionMachine vision
Machine visiondjehlke
 
COMPONENTS OF CIM
COMPONENTS OF CIM COMPONENTS OF CIM
COMPONENTS OF CIM manimaran m
 
advanced industrial automation and robotics
advanced industrial automation and roboticsadvanced industrial automation and robotics
advanced industrial automation and roboticsKunal mane
 
CELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & M
CELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & MCELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & M
CELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & MBalamurugan Subburaj
 
Adaptive control System
Adaptive control SystemAdaptive control System
Adaptive control SystemSUMIT ATTRI
 
Automated guided vehicle
Automated guided vehicle Automated guided vehicle
Automated guided vehicle Jagannath12345
 

La actualidad más candente (20)

Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
 
CIM Computer Integrated Manufacturing
CIM Computer Integrated ManufacturingCIM Computer Integrated Manufacturing
CIM Computer Integrated Manufacturing
 
Automation 2018
Automation  2018Automation  2018
Automation 2018
 
Computer Integrated Manufacturing System
Computer Integrated Manufacturing SystemComputer Integrated Manufacturing System
Computer Integrated Manufacturing System
 
Applications of Additive Manufacturing Technology
Applications of Additive Manufacturing TechnologyApplications of Additive Manufacturing Technology
Applications of Additive Manufacturing Technology
 
Abrasive flow machining (afm)
Abrasive flow machining (afm)Abrasive flow machining (afm)
Abrasive flow machining (afm)
 
Cnc, dnc & adaptive control
Cnc, dnc & adaptive controlCnc, dnc & adaptive control
Cnc, dnc & adaptive control
 
Automated Assembly Systems
Automated Assembly SystemsAutomated Assembly Systems
Automated Assembly Systems
 
Chapter 2 digital manufacturing
Chapter 2   digital manufacturingChapter 2   digital manufacturing
Chapter 2 digital manufacturing
 
Robot applications
Robot applicationsRobot applications
Robot applications
 
Inspection metrology
Inspection metrologyInspection metrology
Inspection metrology
 
Machine vision
Machine visionMachine vision
Machine vision
 
COMPONENTS OF CIM
COMPONENTS OF CIM COMPONENTS OF CIM
COMPONENTS OF CIM
 
advanced industrial automation and robotics
advanced industrial automation and roboticsadvanced industrial automation and robotics
advanced industrial automation and robotics
 
CELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & M
CELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & MCELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & M
CELLULAR MANUFACTURING & FLEXIBLE MANUFACTURING SYSTEM - UNIT 5 - CAD & M
 
PROCESS PLANNING AND COST ESTIMATION
PROCESS PLANNING AND COST ESTIMATIONPROCESS PLANNING AND COST ESTIMATION
PROCESS PLANNING AND COST ESTIMATION
 
Adaptive control System
Adaptive control SystemAdaptive control System
Adaptive control System
 
Adaptive Control System
Adaptive Control SystemAdaptive Control System
Adaptive Control System
 
Island of automation
Island of automationIsland of automation
Island of automation
 
Automated guided vehicle
Automated guided vehicle Automated guided vehicle
Automated guided vehicle
 

Similar a Automatic Identification and Data Capture Techniques

IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET Journal
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
 
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAbhishekChavan77
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesIRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior CitizensIRJET Journal
 
IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired PeopleIRJET Journal
 
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET Journal
 
Automated Production Lines.ppt
Automated Production Lines.pptAutomated Production Lines.ppt
Automated Production Lines.pptAbhishekChavan77
 
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging SystemIRJET Journal
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET Journal
 
IRJET- Boat Localization and Warning System for Border Identification
IRJET-  	  Boat Localization and Warning System for Border IdentificationIRJET-  	  Boat Localization and Warning System for Border Identification
IRJET- Boat Localization and Warning System for Border IdentificationIRJET Journal
 

Similar a Automatic Identification and Data Capture Techniques (20)

67042 ch09
67042 ch0967042 ch09
67042 ch09
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Automated-Assembly-Systems.ppt
Automated-Assembly-Systems.pptAutomated-Assembly-Systems.ppt
Automated-Assembly-Systems.ppt
 
automation method.ppt
automation method.pptautomation method.ppt
automation method.ppt
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
IJSRED-V2I2P36
IJSRED-V2I2P36IJSRED-V2I2P36
IJSRED-V2I2P36
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
 
IRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry PiIRJET- Optical Character Recognition for Blind using Raspberry Pi
IRJET- Optical Character Recognition for Blind using Raspberry Pi
 
Automated Production Lines.ppt
Automated Production Lines.pptAutomated Production Lines.ppt
Automated Production Lines.ppt
 
IRJET- Automatic Vehicle Accident Detection and Messaging System
IRJET-  	  Automatic Vehicle Accident Detection and Messaging SystemIRJET-  	  Automatic Vehicle Accident Detection and Messaging System
IRJET- Automatic Vehicle Accident Detection and Messaging System
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
 
IRJET- Boat Localization and Warning System for Border Identification
IRJET-  	  Boat Localization and Warning System for Border IdentificationIRJET-  	  Boat Localization and Warning System for Border Identification
IRJET- Boat Localization and Warning System for Border Identification
 

Más de Nafis Ahmad

Introduction CIM
Introduction CIMIntroduction CIM
Introduction CIMNafis Ahmad
 
Safety management
Safety management Safety management
Safety management Nafis Ahmad
 
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)Nafis Ahmad
 
Flexible Manufacturing System
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing SystemNafis Ahmad
 
Decision making considering multi-attributes
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributesNafis Ahmad
 
Breakeven & sensitivity analysis
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysisNafis Ahmad
 
Replacement analysis
Replacement analysisReplacement analysis
Replacement analysisNafis Ahmad
 
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisNafis Ahmad
 
Depreciation and income taxes
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxesNafis Ahmad
 
Comparison and selection among alternatives
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternativesNafis Ahmad
 
CADCAM: Data exchange standards
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standardsNafis Ahmad
 
Industrial Robots
Industrial RobotsIndustrial Robots
Industrial RobotsNafis Ahmad
 
Evaluating a Single Project
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single ProjectNafis Ahmad
 
Entity Manipulation
Entity ManipulationEntity Manipulation
Entity ManipulationNafis Ahmad
 
Evaluating a single project
Evaluating a single projectEvaluating a single project
Evaluating a single projectNafis Ahmad
 
Computer graphics
Computer graphicsComputer graphics
Computer graphicsNafis Ahmad
 
Failure Mode & Effect Analysis
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect AnalysisNafis Ahmad
 
Reliability Centered Maintenance
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered MaintenanceNafis Ahmad
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenanceNafis Ahmad
 

Más de Nafis Ahmad (20)

Introduction CIM
Introduction CIMIntroduction CIM
Introduction CIM
 
Safety management
Safety management Safety management
Safety management
 
IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)IPE-431 Machine Tools (Part-C)
IPE-431 Machine Tools (Part-C)
 
Flexible Manufacturing System
Flexible Manufacturing SystemFlexible Manufacturing System
Flexible Manufacturing System
 
CAD-CAM-CIM
CAD-CAM-CIMCAD-CAM-CIM
CAD-CAM-CIM
 
Decision making considering multi-attributes
Decision making considering multi-attributesDecision making considering multi-attributes
Decision making considering multi-attributes
 
Breakeven & sensitivity analysis
Breakeven & sensitivity analysisBreakeven & sensitivity analysis
Breakeven & sensitivity analysis
 
Replacement analysis
Replacement analysisReplacement analysis
Replacement analysis
 
Benefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysisBenefit-Cost (B-C) ratio analysis
Benefit-Cost (B-C) ratio analysis
 
Depreciation and income taxes
Depreciation and income taxesDepreciation and income taxes
Depreciation and income taxes
 
Comparison and selection among alternatives
Comparison and selection among alternativesComparison and selection among alternatives
Comparison and selection among alternatives
 
CADCAM: Data exchange standards
CADCAM: Data exchange standardsCADCAM: Data exchange standards
CADCAM: Data exchange standards
 
Industrial Robots
Industrial RobotsIndustrial Robots
Industrial Robots
 
Evaluating a Single Project
Evaluating a Single ProjectEvaluating a Single Project
Evaluating a Single Project
 
Entity Manipulation
Entity ManipulationEntity Manipulation
Entity Manipulation
 
Evaluating a single project
Evaluating a single projectEvaluating a single project
Evaluating a single project
 
Computer graphics
Computer graphicsComputer graphics
Computer graphics
 
Failure Mode & Effect Analysis
Failure Mode & Effect AnalysisFailure Mode & Effect Analysis
Failure Mode & Effect Analysis
 
Reliability Centered Maintenance
Reliability Centered MaintenanceReliability Centered Maintenance
Reliability Centered Maintenance
 
Corrective maintenance
Corrective maintenanceCorrective maintenance
Corrective maintenance
 

Último

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Último (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Automatic Identification and Data Capture Techniques

  • 2. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28 Automatic Identification and Data Capture Sections: 1. Overview of Automatic Identification Methods 2. Bar Code Technology 3. Radio Frequency Identification 4. Other AIDC Technologies
  • 3. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28 Automatic Identification and Data Capture A family of technologies that provide direct entry of data into a computer or other microprocessor controlled system without using a keyboard  Reasons for using AIDC: 1. Data accuracy 2. Timeliness 3. Labor reduction
  • 4. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 4/28 Alternative to AIDC: Manual Methods of Data Collection and Entry Problems with manual collection and data entry: 1. Human errors  When data are collected and entered manually 2. Time factor  Time delay between occurrence of activities and events and entry of associated data  Manual methods are inherently time consuming 3. Labor cost  Cost of full-time attention of human worker
  • 5. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28 AIDC Applications  Retail sales and inventory control  Material handling  Shipping and receiving, sortation, order picking, mail and parcel handling  Factory operations  Order processing, WIP tracking, machine utilization, worker attendance  Other  Patient identification in hospitals, check processing in banks, security system
  • 6. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28 Components of AIDC Nearly all AIDC technologies consist of three principal components, which are the sequential steps in AIDC: 1. Data encoding - alphanumeric characters are translated to machine-readable form 2. Machine reading or scanning - scanner reads the encoded data and converts it to alternative form, usually an electrical signal 3. Data decoding - electrical signal is transformed into digital data and finally back into original alphanumeric characters
  • 7. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28 AIDC Technologies 1. Optical  Bar codes (linear and 2-D), optical character recognition, machine vision 2. Electromagnetic  Radio frequency identification (RFID) 3. Magnetic  Data are encoded magnetically, similar to magnetic tape (e.g., plastic credit cards, bank checks), and magnetic ink character recognition
  • 8. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28 AIDC Technologies 4. Smart card  Small plastic cards imbedded with microchips (integrated circuits) 5. Touch techniques  Touch screens 6. Biometric  Voice recognition, fingerprint analysis, retinal eye scans
  • 9. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28 Measures of AIDC Reading Accuracy 1. First read rate (FRR)  Probability of a successful (correct) reading by the scanner in its initial attempt 2. Substitution error rate (SER)  Probability of scanner incorrectly reading the encoded character as some other character  In a given set of encoded data containing n characters, the expected number of errors = SER * n
  • 10. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28 Bar Code Technology  Bar codes are of two basic types: 1. Linear  Encoded data are read using a linear sweep of the scanner 2. Two-dimensional  Encoded data must be read in both directions
  • 11. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28 Linear (One-Dimensional) Bar Codes Two forms of linear bar codes: 1. Width-modulated  Symbol consists of bars and spaces of varying width  Most widely used (e.g., Universal Product Code) 2. Height-modulated  Symbol consists of bars and spaces of varying height  Used only by U.S. Postal Service for ZIP code identification
  • 12. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 12/28 Two Forms of Bar Codes (a) (b) (a) Width-modulated bar code, exemplified here by the Universal Product Code (UPC), and (b) (b) height-modulated bar code, exemplified by Postnet, used by the U.S. Postal Service
  • 13. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 13/28 SOS Distress Signal in "Morse" Bar Codes Fig. 12.2 Difficulties with the "Morse" bar codes: (1) only the dark bars are used, thus increasing the length of the coded symbol, and (2) (2) the number of bars making up the alphanumeric characters differs, making decoding more difficult
  • 14. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28 Reading the Bar Code (a) (b) Conversion of bar code into a electrical signal pulse train : (a) bar code and, (b) (b) corresponding electrical signal
  • 15. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28 Code 39 A typical grouping of characters to form a bar code in Code 39.
  • 16. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 16/28 USD-2 Character Set USD-2 is a subset of Code 39
  • 17. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28 Linear Bar Code Readers Usually classified as: 1. Contact  Hand-held wands or light pens operated by moving the tip quickly past the bar code 2. Noncontact  Readers focus a light beam on the bar code and a photodetector reads the reflected signal 1. Fixed beam - stationary readers used fixed beam 2. Moving beam - light beam (lasers) traverse an angular sweep to search for the bar code
  • 18. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28 Bar Code Scanner Stationary moving beam bar code scanner located along a moving conveyor
  • 19. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 19/28 Bar-Coded Route Sheet Bar-coded production order and route sheet
  • 20. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28 Two-Dimensional Bar Codes  First 2-D bar code introduced in 1987  Two basic types of 2-D bar code symbols 1. Stacked bar codes  Consists of multiple rows of conventional bar codes stacked on top of each other 2. Matrix symbologies  Consists of 2-D patterns of data cells that are usually square and are colored dark or white  Advantage over stacked bar codes is capability to contain more data
  • 21. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28 2-D Stacked Bar Code (PDF417) Fig 12.8
  • 22. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28 2-D Matrix Bar Code (Data Matrix) Fig. 12.9
  • 23. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28 Radio Frequency Identification RFID uses an identification tag containing electronically coded data that is attached to the subject item.  The tag consists of a memory microchip and an antenna, usually encased in a plastic container  The tag is a transponder - a device capable of emitting a signal of its own when it receives a signal from an external source  The tag communicates the encoded data by RF as the item passes a reader and is activated by a low- level RF magnetic field transmitted by the reader.
  • 24. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28 Radio Frequency Identification  RFID represents the biggest challenge to the predominance of bar codes  Wal-Mart, Target, Metro AG (Germany) and U.S. DoD have mandated their suppliers use RFID on incoming materials  According to a study of Wal-Mart, "RFID stores are 63 percent more effective in replenishing out-of-stock items than traditional stores"
  • 25. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28 Types of RFID Tags 1. Passive tags  Have no internal power source  They derive their electrical power from the external signal transmitted by the reader  Smaller, less expensive, longer lasting 2. Active tags  Have their own battery power packs  Possess a larger memory capacity and longer communication range  Higher cost and used for higher value items
  • 26. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28 Industrial Applications of RFID  Inventory management  Supply chain management  Tracking systems  Warehouse control  Location identification  Work-in-progress
  • 27. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28 RFID Advantages and Disadvantages  Advantages  Identification does not depend on physical contact or direct line of sight  Much more data can be contained in the identification tag than with most AIDC technologies  Data in read/write tags can be altered for historical usage purposes or to reuse the tag  Disadvantages  More expensive than most other AIDC technologies
  • 28. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28 Bar Codes vs. RFID Comparison Bar Codes RFID Technology Optical Radio frequency Read-write capability Read only Read-write available Memory capacity 14 to 16 digits (linear) 96 to 256 digits Line-of-sight reading Required Not required Reusability One-time use Reusable Cost Very low cost per label Approx 10X cost of bar code Durability Susceptible to dirt Mode durable in plant and scratches environment
  • 29. ©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 29/28 Other AIDC Technologies  Magnetic stripes  Used for credit cards and money access cards  More expensive than bar codes  Must contact scanner to obtain a reading  Optical character recognition (OCR)  Can be read by humans and machine readers  Low first read rate  Machine vision  Principal application is inspection  Used with 2-D optical symbols