KEYPOINT
Automatic identification and data capture (AIDC) is the use of technology to
provide direct data entry to a computer.
END KEYPOINT
The alternative to AIDC is manual data collection and retention; this suffers from
higher rates of error, greater requirements on time, and higher labour costs than
AIDC. This unit investigates AIDC with a primary emphasis on bar code
technology and radio frequency identification (RFID). Other AIDC technologies,
including magnetic stripes, optical character recognition, and machine vision
BULLET LIST
Identify the concept of Automatic Identification and Data Capture
There are three specific components that comprise technologies for Automatic
Identification and Data Capture (AIDC) (see Figure 10.1); these are:
NUMLIST
Data encoder—data must be coded into a machine-readable format compatible
to the requirements of AIDC. A label or tag containing the encoded data is
attached to the item to be identified
Data decoder—this transforms the electrical signal into digital data and finally
back into the original alphanumeric characters
ENDLIST
KEYPOINT
AIDC technologies consist of three principal technologies that are applied
sequentially; these are data encoding, machine reading, and data decoding.
END KEYPOINT
Figure 10.1: Data encoding, reading and decoding using bar codes
AIDC technologies can be categorised into the six types outlined in Table 10.1.
l
Electromagnetic Best known application of these technologies is radio
frequency identification (RFID), which is substantially
encroaching upon optical technology markets, such as
barcode usage. RFID technology deploys a tag capable of
holding significantly more data than traditional barcodes.
Smart card Cards with embedded microchips that are capable of holding
large amounts of information; also known as chip cards, or
integrated circuit cards.
KEYPOINT
AIDC can be categorised into optical, electromagnetic, magnetic, smart card,
touch technique, and biometric technology types.
END KEYPOINT
AIDC provides high levels of data accuracy, in real time, and at reduced labour
costs. The error rate of barcode technology is approximately 10,000 times lower
than in manual keyboard data entry. While other technology cannot achieve the
same levels of accuracy as barcode technology, they are still significantly better
than manual techniques, where we are reliant upon human workers to make the
data entry. A second reason for the success of AIDC techniques is the reduction
of time required for the input of data: the speed of data entry for handwritten
documents is approximately 5-7 characters per second, and—at best—10-15
characters per second for keyboard entry. AIDC methods can accomplish
hundreds of characters per second.
KEYPOINT
AIDC provides high levels of data accuracy in real time, and at reduced labour
costs.
END KEYPOINT
Errors, however, can occur with AIDC technology; and these are measured by
two parameters:
NUMLIST
First Read Rate (FRR)—the probability of a successful, or correct, reading by the
scanner in its initial attempt.
Exp. SER ( n)
where Exp. Is the expected number of errors; SER is the Substitution Error Rate;
and n is the data set with that numbers of characters.
ENDLIST
The aim of the system is, of course, to have a high FRR, and thus not require an
SER reading.
KEYPOINT
Errors with AIDC technology are measured by two parameters: First Read Rate,
and the Substitution Error Rate.
END KEYPOINT
There are two basic types of barcode technology, linear and two-dimensional.
KEYPOINT
Two types of barcode technology can be identified: linear barcode technology,
and two-dimensional barcode technology.
END KEYPOINT
Linear or one dimensional bar code technology is the most widely used AIDC
technique. There are two forms of linear barcode: width-modulated barcodes,
and height-modulated barcodes. These are outlined in some detail in Table 10.2.
KEYPOINT
There are two forms of linear, or one-dimensional, barcode: width-modulated
barcodes, and height-modulated barcodes.
END KEYPOINT
The barcode standard adopted by most major industries is a subset of Code 39,
known as AIM USD-2 (Automatic Identification Manufacturers Uniform Symbol
Description-2). Code 39 uses a series of bars and spaces to represent
alphanumeric and other characters, where, in binary terms, the bars are
equivalent to 1 and the spaces are equivalent to 0 (see Figure 10.2). Bars and
spaces can differ in width by as much as 3 times their conventional size, which
has a corresponding effect upon reading produced. However, the width-to-narrow
ratio, whatever it is set-to, must be consistent across the barcode to facilitate
accurate interpretation of the pulse train produced.
Figure 10.2: Code 39
KEYPOINT
Most major industries use a barcode standard that is based upon a subset of
Code 39, known as AIM USD-2.
END KEYPOINT
The name ‘Code 39’ comes from the physical appearance of the barcode, which
consists of nine elements (bars and spaces) used for each character, while three
of these elements are wide. It is the placement of the wide spaces and wide bars
that uniquely designates the character. Each code begins and ends with either a
wide or narrow bar. In addition to the character set in the barcode, there is also a
‘quiet-zone’ that precedes and succeeds the barcode; this ensures that the
decoder is not confused by the absence of bars and spaces in regions outside of
the barcode field.
KEYPOINT
Barcodes in Code 39 consist of an arrangement of nine bars and spaces, which
form a unique character for each arrangement; and a quiet-zone, consisting of
empty space, which both precedes and succeeds the barcode in its presentation.
END KEYPOINT
KEYPOINT
Barcode readers may be classified as either contact or non-contact devices.
END KEYPOINT
KEYPOINT
Two-dimensional barcodes store greater amounts of data at higher area
densities than their one-dimensional counterparts.
END KEYPOINT
The two basic types of 2-D barcodes are: stacked barcodes, and matrix
symbologies. These are outlined in some detail in Table 10.5.
KEYPOINT
The two basic types of 2-D barcodes are stacked barcodes, and matrix
symbologies.
END KEYPOINT
10.6 Radio Frequency Identification
Radio Frequency Identification (RFID) tags and their associated RFID technology
is currently a much-discussed concept, and represents the greatest threat to
conventional barcode dominance as a data-capture mechanism. RFID
technology has been available since the 1940s, but real interest in the concept
as a commercial entity was only sparked in the 1980s and early 1990s, when
miniaturisation made the concept feasible for individual product-related issues,
and with the development of both “passive” (i.e. battery-free) tags, and read/write
tags that furthered the technology’s potential flexibility. Since the mid-1990s the
growth and use of RFID technology has grown exponentially to include all sorts
of applications in niche markets, and also applications that integrate and increase
efficiency across the supply chain. The advantages of RFID technology include:
BULLETLIST
Identification does not depend on physical contact or direct line of sight
observation by the reader
Much more data can be contained in the RFID tag than with most AIDC
technologies
Data in read/write tags can be altered for historical usage purposes or reuse of
the tag
ENDLIST
KEYPOINT
RFID technology advantages include non-contact and non-direct identification,
greater data-containment opportunities, and the ability to re-write to some tags, if
necessary.
END KEYPOINT
One disadvantage of RFID technology is its expense: it is only recently that the
cost of producing RFID tags, as well as associated RFID readers and
middleware, has dropped sufficiently to make it a viable alternative to barcode
technology.
KEYPOINT
An RFID tag consists of an infrastructure that contains a microchip, capacitors,
and antenna-coil. Depending on the tag type, it may or may not contain a battery.
END KEYPOINT
Each tag has a certain amount of internal memory where information about the
object is stored, such as its unique ID number, or in some cases more detailed
data including the date of manufacture, product composition, etc. The
communication process between the reader and tag is managed and controlled
by one of several protocols, such as ISO 15693, ISO 18000-3, ISO 18000-6, and
Electronic Product Code (EPC) for different radio frequencies. In addition,
different types of anti-collision algorithms are defined as part of these protocol
standards, so that many tags presenting to one reader at the same time can be
sorted and individually selected.
Once the reader is on, it starts emitting a signal at a selected frequency. Any
corresponding tag in the vicinity of the reader will detect the signal and use the
energy from it to “wake-up” and supply operating power to its internal circuits.
Once the tag has decoded the signal as valid, it replies with information to the
reader thereby identifying the object. This information, called a notification, is
then sent to RFID middleware. To deal with huge volumes of data (or
notifications) from RFID tags, RFID middleware has been developed to act as a
buffer between the RFID tag and the computing systems of the plant. RFID
middleware has the ability to handle data operations, such as filtering,
aggregation, and enrichment etc., as well as ensuring that data is processed into
an appropriate format for application in the middleware. A reverse
communication from the middleware to the RFID tag is also possible, which is
called commands. Commands for RFID readers may be reading or writing
commands which are emitted from the middleware based upon certain
implemented rules.
KEYPOINT
A RFID system consists of a number of RFID tags, RFID middleware, and the
systems back-end computing systems.
END KEYPOINT
There are two types of RFID tag: Active tags—that is, they contain and are
independently powered by a battery; Passive tags (or unpowered tags)—which
rely on power drawn from the reader to be activated.
Active tags are larger, more expensive and, owing to the presence of the battery,
have a limited life. Passive tags, on the other hand, are lighter, smaller, cheaper
and have an unlimited life; however, they are inhibited by their relatively short
read ranges, the requirement for high-powered readers, and by the fact that they
can only be written to once (i.e. they are read-only). In contrast, active tags can
use greater variability in readers and can be read at significantly longer
distances, while they usually contain facilities to read and write a multiple number
of times.
KEYPOINT
There are two types of RFID tag: active tags, which are battery-powered; and
passive tags, which rely on power drawn from the reader to be activated.
END KEYPOINT
There also exist hybrids called semi-passive tags that use small batteries to
operate the RFID chip’s circuitry, but rely on reader-power for communication.
Table 10.6 summarizes some general aspects of RFID tag performance across a
range of environments.
KEYPOINT
RFID tag performance depends upon the frequency under which it operates, as
well as the RFID tag type.
END KEYPOINT
NUMLIST
ROM (read only memory) that stores security data, a unique device identifier and
operating systems instructions, with electrically erasable programmable read only
memory (EEPROM) being a specific type of ROM that has the ability to save tag
data in its non-operative, power-saving state
RAM (random access memory) that stores data accrued during transponder
interrogation and response
WORM (write once / read many memory) that is similar in functionality to RAM.
ENDLIST
KEYPOINT
There are three different types of RFID memory: read only memory; random
access memory; and write once / read many memory.
END KEYPOINT
RFID readers communicate with the RFID tags via radio waves and pass
information to the backend computer system in digital form. Readers can be
configured in many formats including handheld devices, portals, or they may be
conveyor-mounted. The user can change or customise the reader’s operations to
suit a specific requirement by issuing commands through the RFID middleware.
The purpose of an RFID reader is not to store data; rather it transfers data to and
from the RFID tags, though short-term data storage is still required. The
configuration information of a reader (e.g., the reader address, and configuration
for filtering) is stored consistently during the entire operation of the RFID reader.
Furthermore, in some cases, data acquired from the tags needs to be stored for
short-term processing and forwarding to the middleware.
Figure 10.4: RFID tags and reader/sensor
KEYPOINT
RFID readers communicate with the RFID tags via radio waves and pass
information to the backend computer system in digital form.
END KEYPOINT
When large numbers of RFID tags are presented to the RFID reader, data
processing utilities are required to capture the high-volume data flows that occur.
A reader can either process the field data from the tags, or the command data
from the middleware (e.g., read/write commands). Pre-processing (e.g., filtering
and aggregation) is used to relieve the middleware from processing too many
notifications at any one time. Commands provided by the middleware (e.g.,
invoking a write operation on a tag) need to be stored for a short while and
translated into internal RFID reader commands.
RFID middleware acts as mediation between the RFID tag and the enterprise
systems back-end. It is responsible for handling notifications, such as filtering,
aggregation, enrichment, etc., according to specific rules implemented in the
middleware.
KEYPOINT
RFID middleware acts as mediation between the RFID tag and the enterprise
systems back-end.
END KEYPOINT
KEYPOINT
RFID middleware acts as an effective data-filter, and subsequently develops
business events from the processed data that are sent to enterprise computing
back-end systems.
END KEYPOINT
10.7 Other AIDC technologies
KEYPOINT
Other AIDC technologies that may occasionally be used include: magnetic strips,
optical character recognition, and machine vision technologies.
END KEYPOINT
10.8 Case Study
Using AeroScout tags, the system is built onto the company's existing Wi-Fi
system and was integrated by IMEC Technologies. This year, the firm is also in
the process of expanding its usage of RFID at the Galway facility to include to
asset tracking. The immediate challenge for Thermo King involved the
development of what it calls its e-Kanban system (a signaling system to trigger
an action such as inventory replenishment) that enables it to better manage the
number of parts available at all assembly stations.
Thermo King first began discussing an automated solution with IMEC and
AeroScout in early 2008 and the group conducted a proof-of-concept trial in April
of that year, in which it tested the hardware to ensure proper read rates, then
deployed the system throughout the entire factory in August. With the system,
Ben-Assa says, the firm has installed approximately 100 AeroScout 2.4 GHz T2
tags, with a tag mounted next to each container of parts.
When a container of parts runs low, an employee presses a button on its tag,
which transmits its ID number to the Wi-Fi access points already installed
throughout the facility to allow wireless laptop connectivity. The tag transmits not
only its unique ID number, but also the assembly part serial number previously
encoded when that tag was first installed. AeroScout Mobile View software links
the ID number with the location at which the tag was installed, then transmits an
e-mail alert to staff members in charge of replenishment, with the station number
and the part number required, as well as the time at which the order was sent.
BULLETLIST
Automatic identification and data capture (AIDC) is the use of technology to
provide direct data entry to a computer, or other micro-processor controlled
system, without resorting to manual methods of data-entry, such as via a
keyboard.
Errors with AIDC technology are measured by two parameters: First Read Rate,
and the Substitution Error Rate.
The two basic types of 2-D barcodes are stacked barcodes, and matrix
symbologies.
A RFID system consists of a number of RFID tags, RFID middleware, and the
plant’s back-end computing systems. Communication can occur in both
directions, both from the RFID tag backwards, and from the computing systems
forwards.
There are two types of RFID tag: active tags, which are battery-powered; and
passive tags, which rely on power drawn from the reader to be activated.
There are three different types of RFID memory: read only memory; random
access memory; and write once / read many memory.
RFID readers communicate with the RFID tags via radio waves and pass
information to the backend computer system in digital form.
RFID middleware acts as mediation between the RFID tag and the enterprise
systems back-end.
Other AIDC technologies that may occasionally be used include: magnetic strips,
optical character recognition, and machine vision technologies.
ENDLIST
NUMLIST
List the principal types of AIDC technologies, and the categories that these
technologies can take.
What is the major barcode standard that informs the use of barcodes made by
most of contemporary industry?
What are the advantages that are associated with Radio Frequency Identification
(RFID) technology?
NUMLIST
AIDC technologies consist of three principal technologies that are applied
sequentially; these are data encoding, machine reading, and data decoding.
AIDC can be categorised into optical, electromagnetic, magnetic, smart card,
touch technique, and biometric technology types.
Most major industries use a barcode standard that is based upon a subset of
Code 39, known as AIM USD-2.
The two basic types of two-dimensional barcodes are stacked barcodes, and
matrix symbologies.
RFID technology advantages include non-contact and non-direct identification,
greater data-containment opportunities, and the ability to re-write to some tags, if
necessary.
RFID middleware acts as mediation between the RFID tag and the enterprise
systems back-end. It works as an effective data-filter, and subsequently develops
business events from the processed data that are sent to enterprise computing
back-end systems.
Other AIDC technologies that may occasionally be used include: magnetic strips,
optical character recognition, and machine vision technologies.
END LIST