Automatic Identification and Data Capture
Automatic Identification and Data Capture
Data Capture
Sections:
1. Overview of Automatic Identification Methods
2. Bar Code Technology
3. Radio Frequency Identification
4. Other AIDC Technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 1/28
Automatic Identification
and Data Capture
A family of technologies that provide direct entry of data
into a computer or other microprocessor controlled
system without using a keyboard
Reasons for using AIDC:
1. Data accuracy
2. Timeliness
3. Labor reduction
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 2/28
Alternative to AIDC: Manual Methods
of Data Collection and Entry
Problems with manual collection and data entry:
1. Human errors
When data are collected and entered manually
2. Time factor
Time delay between occurrence of activities and events
and entry of associated data
Manual methods are inherently time consuming
3. Labor cost
Cost of full-time attention of human worker
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 3/28
AIDC Applications
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 5/28
AIDC Technologies
1. Optical
Bar codes (linear and 2-D), optical character
recognition, machine vision
2. Electromagnetic
Radio frequency identification (RFID)
3. Magnetic
Data are encoded magnetically, similar to magnetic
tape (e.g., plastic credit cards, bank checks), and
magnetic ink character recognition
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 6/28
AIDC Technologies
4. Smart card
Small plastic cards imbedded with microchips
(integrated circuits)
5. Touch techniques
Touch screens
6. Biometric
Voice recognition, fingerprint analysis, retinal eye
scans
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 7/28
Measures of AIDC Reading Accuracy
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 8/28
Bar Code Technology
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 9/28
Linear (One-Dimensional) Bar Codes
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 10/28
Two Forms of Bar Codes
(a) (b)
(a) Width-modulated bar code, exemplified here by the Universal
Product Code (UPC), and
(b) (b) height-modulated bar code, exemplified by Postnet, used by
the U.S. Postal Service
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 11/28
SOS Distress Signal in
"Morse" Bar Codes
Fig. 12.2
(a)
(b)
A typical grouping of
characters to form a
bar code in Code 39.
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 14/28
USD-2
Character Set
USD-2 is a subset
of Code 39
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 15/28
Linear Bar Code Readers
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 17/28
Bar-Coded Route Sheet
Bar-coded
production order
and route sheet
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 18/28
Two-Dimensional Bar Codes
Fig 12.8
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 20/28
2-D Matrix Bar Code (Data Matrix)
Fig. 12.9
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 21/28
Radio Frequency Identification
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 22/28
Radio Frequency Identification
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 23/28
Types of RFID Tags
1. Passive tags
Have no internal power source
They derive their electrical power from the external
signal transmitted by the reader
Smaller, less expensive, longer lasting
2. Active tags
Have their own battery power packs
Possess a larger memory capacity and longer
communication range
Higher cost and used for higher value items
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 24/28
Industrial Applications of RFID
Inventory management
Supply chain management
Tracking systems
Warehouse control
Location identification
Work-in-progress
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 25/28
RFID Advantages and Disadvantages
Advantages
Identification does not depend on physical contact or
direct line of sight
Much more data can be contained in the identification
tag than with most AIDC technologies
Data in read/write tags can be altered for historical
usage purposes or to reuse the tag
Disadvantages
More expensive than most other AIDC technologies
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 26/28
Bar Codes vs. RFID
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 27/28
Other AIDC Technologies
Magnetic stripes
Used for credit cards and money access cards
More expensive than bar codes
Must contact scanner to obtain a reading
Optical character recognition (OCR)
Can be read by humans and machine readers
Low first read rate
Machine vision
Principal application is inspection
Used with 2-D optical symbols
©2008 Pearson Education, Inc., Upper Saddle River, NJ. All rights reserved. This material is protected under all copyright laws as they currently exist.
No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher. For the exclusive use of adopters of the book
Automation, Production Systems, and Computer-Integrated Manufacturing, Third Edition, by Mikell P. Groover. 28/28