SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
  INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME
       ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
                                                                        IJARET
Volume 4, Issue 1, January- February (2013), pp. 01-08
© IAEME: www.iaeme.com/ijaret.asp                                      ©IAEME
Journal Impact Factor (2012): 2.7078 (Calculated by GISI)
www.jifactor.com




       CREATION OF AUTOMATIC IDENTIFICATION AND DATA
          CAPTURE INFRASTRUCTURE VIA DATAMATRIX

                       Mr.Lokesh S. Khedekar 1, Dr.A.S.Alvi 2
               PRMIT&R,Badnera,Amravati,India,lokeshkhedekar@gmail.com 1
                 PRMIT&R,Badnera,Amravati,India,abrar_alvi@gmail.com 2

 ABSTRACT

         Automatic Identification data capture technologies are becoming increasingly
 important in the management of supply chain, manufacturing flow management mobile asset
 tracking inventory management, warehousing, and any application where physical items
 move through location in time. Tracking these items has historically been done by the use of
 bar-code technologies, which suffer from lack of efficiency, robustness, difficulty in
 automation, inability to have secure or dynamic data, etc., whereas the 2D Data matrix has
 the ability to overcome several of these limitations over barcode. This paper presents a
 comparative basis for the creation of Automatic Identification and Data Capture (AIDC)
 infrastructure via 2D Data matrix versus other technologies such as bar-code.

 Keywords: ADIC, Barcode, Data matrix, RFID, Sensor.

 I.      INTRODUCTION

         As the communication and computational technologies have started to become
 commonplace within enterprise operations, the computer-aided/managed Enterprise
 Information Systems (EIS) such as Enterprise Resource Planning (ERP) [1], Supply Chain
 Management (SCM) [2] [3], Product Lifecycle Management (PLM) [4] [5], Customer
 Relationship Management (CRM) [6] [7], Manufacturing Execution System (MES) [8],
 Warehouse Management System (WMS) [9], and Enterprise Asset Management (EAM) [10]
 etc are significantly improving the enterprise operational efficiency and reducing the
 operational cost [11]. The EIS processes information such as history, current status, location,
 relationships, and, destination of enterprise resources such as materials, equipments,
 personnel, cash, etc.
         The stock level of products at various stages within a supply chain can significantly
 affect the operations of supply chain. optimum stock levels result in requiring less storage

                                               1
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME

space, faster processing, quicker cash flow, better customer satisfaction and sale, etc. the
stock level can be monitored and predicted by tracking the movement of the on-shelf
products, or the incoming shipments. as the real-time stock levels are identified, decisions
such as replenish or reorder can be made timely and correctly. this is called visibility and
predictability in the enterprise information system.
        To achieve visibility and predictability of the movement of these business objects, the
information associated with the object, which is called identification data in this research,
should be identified and monitored along the enterprise operation flows. The identification
data should automatically be captured and integrated into the different enterprise process
applications in real-time. Usually, the identification data capture process and the integration
of the identification data with enterprise application are performed by the Automatic
Identification and Data Capture (AIDC) technologies. The identification data associated with
a particular business object (such as raw material, products, equipments, shipments, and
personnel etc.) is collected by the data capture devices at each processing location where the
business object is processed. Barcode is the most commonly used identification data capture
technology in today’s enterprise operations. However, traditional bar-coding approach cannot
achieve the real-time visibility because of the low speed of reading, the needs of line-of-sight,
and unavoidable involvement of humans. The more advanced AIDC technology of 2D Data
matrix is becoming the promising technology to achieve real-time visibility of enterprise
operations. It has several obvious advantages such as non-line-of-sight reading, high-speed
reading, multiple reading and writing simultaneously, minimal human intervention etc. that
make it close to ideal for providing real-time visibility of enterprise operations.

II.     IDENTIFICATION AUTOMATION TECHNOLOGY

       Barcode, Radio Frequency Identification (RFID), Sensor, Magnetic Strip, IC card,
Optic Character Recognition (OCR), Voice Recognition, Fingerprint and Optical Strip etc
[12] are identification technologies that have been used in the enterprise environment.
Among these identification technologies, barcode is the most widely used technology. The
RFID and sensor hold a promise of significantly improving business operational efficiencies
and increasing the visibility of the business objects. The other technologies are either lack of
automation capability or lack of ability to attach to business objects. Thus, we do not
categorize them as the automatic identification technology for enterprise application. Barcode
and 2D data matrix technologies are addressed and discussed in this paper.

III.    BARCODE TECHNOLOGY

3.1       History
          The first barcode was developed by Bernard Silver and Norman Joseph Woodland
in the late 1940’s and early 1950’s [13]. It was a “bull’s eye” symbol that consisted of a
series of concentric circles. The first commercial use of barcodes was by the RCA/Kroger
system installed in Cincinnati on the call of the National Association of Food Chains
(NAFC). However it was not widely used until the Universal Product Code (UPC) [14] was
introduced into America and adopted by the U.S. Supermarket Ad Hoc Committee. Today’s
barcodes have two forms: one dimensional (1D) barcode and two dimensional (2D) barcode.
The 1D barcodes use bars and gaps to encode identification information such as serial
numbers. The 2D barcodes consist of more complicated patterns and may encode up to 4K
                                               2
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME

bytes of data. Figure 1 shows the 1D barcodes. Although 1D is the more prevalent barcode
used in daily life.
        Barcodes can be printed from most printers. 1D barcodes usually have coded
readable ID printed along with the barcode. Barcodes can be read by barcode scanners which
we see at a typical Point of Sale (POS) in retail stores.




                                    Figure 1. 1D Barcode

       Figure 2 illustrates a basic barcode system. Barcodes are read or scanned by a barcode
reader and the reader is connected to a computer. The operator has to physically align/point
the barcode reader with/to the barcode to read the identification information. The software
running on the computer processes the identification information picked up by the scanner.
Programmable Logic Controller (PLC) is usually used to control the scanner in more
automated process such as production line. The primary scanning technology for barcode is
LED (Light-Emitting Diode). More advanced scanning such as CCD (Charge-Coupled
Device), Laser, and Imager are used in industry automatic processing [37].




                              Figure 2 A Basic Barcode System

3.2       Advantages and Disadvantages of Barcode
            Compared to manual data entry, the barcode is fast and accurate. The barcode can
be printed from any black/white printer. Since the barcode can be directly printed on an
object or on paper label, the cost for a barcode is typically less than 1 cent [15]. Even after
including the hardware cost, the barcode data collection system reduces the operation cost,
labor cost, and the revenue loss caused by data entry errors, while improving the business
process and productivity [16]. However, several weaknesses exist. Firstly, barcode label is
easy to be damaged in harsh environments such as careless handling, external factors such as
rain/low temperatures. Second, to read the barcode, the barcode scanner needs to be line of
sight with the label. It means that the manual movement of the objects or scanner is
necessary. Thirdly, barcode technology does not have ability of scanning object inside a
container or a case. Thus, the operator has to open the container and scan the objects one by
one, thereby involving intensive labor. Obviously, the barcode is incapable of fast processing.


                                              3
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME

IV.      SENSORE TECHNOLOGY

            The sensor is a device that can measure and collect environmental parameters (such as
temperature, humidity, chemicals, vibration, density, etc.) or system runtime parameters (such as
position, location, speed, acceleration, etc.) [17]. Sensors have been used in a variety of applications,
especially for automation and control in industries such as aerospace, automotive, healthcare,
environment, transportation, etc. As the smallest unit of an automation system, a single sensor could
be used for fulfilling certain functions. But in most cases, a sensor system consists of a large number
of sensors normally that must work together to achieve awareness of the physical world.
           Recently, new technologies including wireless sensors, MEMS sensors, smart sensors, bio
sensors, etc., have changed the type of sensors that can be made. Sensors made today with advanced
techniques are smaller and can measure and collect information that is beyond the capability of
traditional sensors. New sensor system infrastructures such as sensor network [18] with wireless
connection capability are gradually replacing the traditional wire-connected sensors.
           In an enterprise environment, sensor technologies combined with ID technologies would
significantly improve the enterprise resource visibility and thus improve the enterprise operation
efficiency. For example, along the supply chain flow, a GPS sensor could help the enterprise system
track and monitor the location of the raw material at real times [39]. A better decision on the related
enterprise operations could then be made based on information of not only on the location of an asset,
but also its condition, and potentially the condition of the asset could itself alter where the asset was
being sent next (example if ice-cream being shipped sees high temperatures, then perhaps it may be
disposed instead of continuing to be shipped to the final destination).

V.      DATA MATRIX

         2-D bar code consists of a certain white and black geometric modules that alternately arrange
in the vertical and horizontal directions according to certain rules see Figure, and it is a symbol with
large capacity for storing information. As the 2-D bar code with smallestsize in the world, data matrix
code is widely applied to electronic product components. 2-Dbar code recognition technology shows
great commercial value, and at present, most COTS (commercial of the shell) recognition algorithms
are proprietary and protected by patents, so the 2-D bar code recognition technology is in a great
demand for researching. Figure Datamatrix structure shows the principle of a Datamatrix barcode.
 The Figure 3 shows an annotated Datamatrix where the finder and synchronization patterns have
been highlighted.




                                      Figure 3. Datamatrix structure.


                                                   4
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME


VI.     BASIC DATAMATRIX SYSTEM




                                       2                             1

                                   Figure 4.Basic Data matrix System

 Figure 4 represent a data matrix system which contain two steps 1.take a picture of object and
2.upload an image into the computer you will get the all information related to the system.
      Code readers operate on the principle of contrast between the code (printing ink) and the
background (printing substrate). For code decoding various code readers are used and, in addition to
readers, 2D codes can be decoded also with certain types of mobile phones.
       Camera-based readers are the newest type of code readers. This type of readers uses a small
video camera to capture an image of the code. Sophisticated digital image processing techniques are
then used to decode the code. Video cameras are equipped with the same CCD (Charge Coupled
Device) technology as in a CCD code readers except that instead of having a single row of sensors, a
video camera has hundreds of rows of sensors arranged in a two-dimensional array so that they can
generate an image(Taltech, n.d.). Camera-based reader is the one used in capturing the codes with
mobile phone camera.[21]

VII.      ADIC INFRASTRUCTURE

          The advantages identification technologies can potentially improve the enterprise operation
efficiency and reduce the operation cost. However, simply deploying data capturing devices,
assigning identification data to the business object, and capturing the data from the business object
can not bring the value to enterprise operations. A set of software components which assist the
devices management, identification data preparing, capturing, formatting, and associating with
physical objects are required. The software components and devices together are called identification
resources. Further, these identification resources are networked and collaborated with each other to
form the AIDC infrastructure.

VIII.     DEFINATION AND COMPONENTS

       The Automatic Identification Data Capture (AIDC) infrastructure is defined as a set of
networked devices and software components which include:

                1 Devices. Devices include various identification technologies such as RFID reader,
RFID printer, barcode scanner, sensors, and Programmable Logic Controller (PLC) etc.
                2 Services. Services are software components that enabling the data preparation,
capturing, and processing.
Essential components of an AIDC infrastructure are identified [19] [20] and illustrated in Figure 5. It
contains the following components

                                                  5
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME

                3 Data matrix, Tags, and Sensors: Data matrix, tags and sensors are the smallest units
that are attached to an enterprise entity or resource to be identified.

Device Controller or Edge Server: A device controller is used to manage and control identification
hardware (Readers, Scanners, Sensors and other Manageable Devices), aggregate, pre-process and
cache the identification information. It is difficult to manage a device in a planer space. Putting all the
functions such as capture, process, and representation of identification data into a single server could
increase the burden of the server. Hierarchical, layered and distributed architecture is an effective way
to balance the load and deliver the best overall performance. Using the Edge Servers, the devices can
be clustered and distributed. Functional roles can be separated so that the Edge Servers could be
dedicated to the data capture requirements, where the core/central servers can be used for data
intelligence.
                4.Identification Network: The identification network is the infrastructure that connects
all the hardware resources and enterprise information systems together.
                5.Enterprise Information Servers: Enterprise information server provides enterprise
activities related data which can be used along with the identification information for business
operations. It provides real-time, aggregated identification data and events to client applications. As
discussed earlier, the identification data capture process may contain business events. The Enterprise
Information System provides interfaces so that the application can define, register and look up events.
It also provides interfaces that the end application can register and lookup production information,
business information, and transaction information that is associated with a particular identification
data.
                 6.Enterprise Application: Enterprise applications are functional modules that fulfill
certain enterprise activities. For example, a Warehouse Management System uses the data captured by
the Edge Server to monitoring the inventory level; an Asset Management System uses the data to look
up a particular asset; etc.




                                 Figure 5. The ADIC Infrastructure

                                                    6
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME

IX.       CONCLUSION

       A variety of identification technologies have been used in the enterprise systems to
improve the enterprise operation efficiency and reduce the overall operation cost. Barcodes,
RFID, sensors and datamatrix are the most commonly used and important technologies that
have been addressed. Because of its low cost, today, the barcode is the major identification
technology used by most enterprises.

X.       ACKNOWLEDGMENT

         First & foremost, I would like to express my sincere gratitude towards Dr.A.S.Alvi
for his valuable guidance, encouragement, and optimism. I feel proud of his eminence and
vast knowledge, which will guide me throughout my life.        I wish to acknowledge with
thanks to all the faculty members of Information Technology Department who has directly or
indirectly helped me in the research paper work.
Last but not the least; I would like to express my sincere thanks to my institute Prof. Ram
Meghe Institute of Technology & Research, Badnera. For providing me all the needful
facilities during the research paper work.

REFERENCES

[1] Christina Soh, Sia Siew Kien, Joanne Tay-Yap, Enterprise resource planning: cultural fits
and misfits: is ERP a universal solution? Communications of ACM, Vol. 43, 2000, pp47-51
 [2] Benita M. Beamon, Supply chain design and analysis: Models and methods, International
Journal of Production Economics, Vol. 55 pp. 281-294, 1998
[3] Lambert, D.M. and M.C. Cooper 2000, Issues in Supply Chain Management, Industrial
Marketing Management, Vol. 29, pp. 65-83.
[4] Valerie Thomas, Wolfgang Neckel, Siguad Wagner, Information Technology and Product
Lifecycle Management, In Proceeding of the 1999 IEEE International Symposium on
Electronics and the Environment.
[5] Ioannis Komninos, Production Life Cycle Management,
http://www.urenio.org/tools/en/Product_Life_Cycle_Management.pdf
[6] M. Stone, N. Woodcock, M. Wilson, Managing the Change from Marketing Planning to
Customer Relationship Management, International Journal of Strategic Management: Long
Range Planning, Volume 29, Number 5, October 1996, pp. 675-683(9)
[7] Russell S. Winer, Customer Relationship Management: A Framework, Research director
and the future http://groups.haas.berkeley.edu/fcsuit/PDF-papers/CRM%20paper.pdf
[8] Ronelle Russell, Manufacturing Execution Systems: Moving to the Next Level,
Pharmaceutical Technology, January 2004, pp 38-50
[9] Ben Worthen, The ABCs of Supply Chain Management,
http://www.cio.com/research/scm/edit/012202_scm.html
[10] IBM, Enterprise Asset Management: Optimizing Business Operation with Leading-edge
Enterprise Asset Management Services,
http://www-935.ibm.com/services/us/index.wss/offering/bcs/a1002719
[11] Diane M., Olga Volkoff, A Roadmap for Enterprise System Implementation, Computer,
June 2004, pp22-29

                                              7
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME

[12] Cambridge Consultant, Description of Technologies and Example of Application in
Other Industries,
http://www.npsa.nhs.uk/site/media/documents/811_Cambridge%20Consultants%20Report%
20Section%202.pdf
[13] Mery Bellis, Bar Codes, http://inventors.about.com/library/inventors/blbar_code.htm
[14] GS1 US, The Universal Product Code, http://www.uc-council.org/upc_background.html
[15] J. Abernethy, Widener Liberary: Book Identification – Bar Codes & RFID, An
Engineering Science 96 Report, M17, 1995,
http://www.deas.harvard.edu/courses/es96/spring1995/barcodes_rfid/abernethy.html
[16] Alexander Brewer, Nancy Sloan, Thomas L. Landers, Intelligent Tracking in
Manufacturing, Journal of Intelligent Manufacturing, Vol. 10, 1999, pp245-250
[17] Ljubisa Ristic, Sensor Technology and Devices, Artech House Publishers, 1994
[18] Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister,
“System architecture directions for networked sensors,” in Proceedings of the 9th
International Conference on Architectural Support for Programming Languages and
Operating Systems, Cambridge, MA, USA, Nov. 2000, pp. 93–104, ACM.
[19] B. S. Prabhu, Xiaoyong Su, Harish Ramamurthy, Chi-Cheng Chu, Rajit Gadh,
“WinRFID – A Middleware for the enablement of Radio Frequency Identification (RFID)
based Applications”, Invited chapter in Mobile , Wireless and Sensor Networks: Technology,
Applications and Future Directions, Rajeev Shorey, Chan Mun Choon, Ooi Wei Tsang, A.
Ananda (eds.), John Wiley, December 2005.
[20] B.S. Prabhu, Xiaoyong Su, Charlie Qiu, Harish Ramamurthy, Peter Chu, Rajit Gadh,
"WinRFID – Middleware for Distributed RFID Infrastructure", International Workshop on
Radio Frequency Identification (RFID) and Wireless Sensors, Indian Institute of Technology,
Kanpur, India, November 11-13, 2005.
[21]An Effective Technique to Protecting Sensetive Information Using 2D datamatrix.
International Journal of Scient ific and Research Publications, Volume 2, Issue 12, December
2012 1 ISSN 2250-3153 1.L.S.Khedekar 2.Dr.A.S.Alvi
[22]Smart Credential Cum Unique Identification and Recognition System Volume 2, Issue 6,
November-December 2012 Available Online at www.gpublication.com/jcer ISSN No.: 0976-
8324 ©Genxcellence Publication 2011, All Rights Reserved 1.L.S.Khedekar 2.Dr.A.S.Alvi
[23] Mala Mitra, “A Random Number Generator For Rfid Tags” International journal of
Electronics and Communication Engineering &Technology (IJECET), Volume1, Issue1,
2010, pp. 71 - 87, Published by IAEME
[24] Gurudatt Kulkarni, Rani Waghmare, Nikita Chavan and Sandhya Mandhare, “Security
In Rfid Technology” International journal of Computer Engineering & Technology (IJCET),
Volume3, Issue2, 2012, pp. 337 - 343, Published by IAEME
[25] Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks:
Limitation, Layerwise Security Threats, Intruder Detection” International journal of
Electronics and Communication Engineering &Technology (IJECET), Volume3, Issue2,
2012, pp. 22 - 31, Published by IAEME.
[26] Shashank Bholane and Devendrasingh Thakore, “Sender To Receiver Synchronization
In Wireless Sensor Networks – A Simulation Study” International journal of Computer
Engineering & Technology (IJCET), Volume3, Issue2, 2012, pp. 265 - 270, Published by
IAEME



                                              8

Contenu connexe

Tendances

Barcode & smart cards
Barcode & smart cardsBarcode & smart cards
Barcode & smart cards
Muhammad Ali
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
Lal Sivaraj
 
Adding barcode to report (cr)
Adding barcode to report (cr)Adding barcode to report (cr)
Adding barcode to report (cr)
Hwang Waisen
 
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
IJET - International Journal of Engineering and Techniques
 
Century longmai m card cpk contactless pki white paper deploy contactless d...
Century longmai m card cpk contactless pki white paper   deploy contactless d...Century longmai m card cpk contactless pki white paper   deploy contactless d...
Century longmai m card cpk contactless pki white paper deploy contactless d...
Century Longmai Technology
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
TELKOMNIKA JOURNAL
 

Tendances (19)

IQ-R_catalog
IQ-R_catalogIQ-R_catalog
IQ-R_catalog
 
Barcode & smart cards
Barcode & smart cardsBarcode & smart cards
Barcode & smart cards
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Smartphone Authentication
Smartphone AuthenticationSmartphone Authentication
Smartphone Authentication
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
 
Barcode Educational Guide - IDAutomation.com
Barcode Educational Guide - IDAutomation.com Barcode Educational Guide - IDAutomation.com
Barcode Educational Guide - IDAutomation.com
 
Adding barcode to report (cr)
Adding barcode to report (cr)Adding barcode to report (cr)
Adding barcode to report (cr)
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
 
IRJET - Organisation Automation Using Android Mobile Application
IRJET - Organisation Automation Using Android Mobile ApplicationIRJET - Organisation Automation Using Android Mobile Application
IRJET - Organisation Automation Using Android Mobile Application
 
Proven Methods of Data Collection in Data Processing
Proven Methods of Data Collection in Data ProcessingProven Methods of Data Collection in Data Processing
Proven Methods of Data Collection in Data Processing
 
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
 
IRJET- A Survey on Technologies used in Mall Assistant
IRJET- A Survey on Technologies used in Mall AssistantIRJET- A Survey on Technologies used in Mall Assistant
IRJET- A Survey on Technologies used in Mall Assistant
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Century longmai m card cpk contactless pki white paper deploy contactless d...
Century longmai m card cpk contactless pki white paper   deploy contactless d...Century longmai m card cpk contactless pki white paper   deploy contactless d...
Century longmai m card cpk contactless pki white paper deploy contactless d...
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalPublished pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
 

En vedette

Supersonic particle deposition as potential corrosion
Supersonic particle deposition as potential corrosionSupersonic particle deposition as potential corrosion
Supersonic particle deposition as potential corrosion
IAEME Publication
 
Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...
IAEME Publication
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
IAEME Publication
 
Venture capital in karnataka
Venture capital in karnatakaVenture capital in karnataka
Venture capital in karnataka
IAEME Publication
 
Ecg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseasesEcg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseases
IAEME Publication
 
A random number generator for rfid tags
A random number generator for rfid tagsA random number generator for rfid tags
A random number generator for rfid tags
IAEME Publication
 
Comparative study of defected ground structures harmonics rejection ability i...
Comparative study of defected ground structures harmonics rejection ability i...Comparative study of defected ground structures harmonics rejection ability i...
Comparative study of defected ground structures harmonics rejection ability i...
IAEME Publication
 
Optimizing chemical process through robust taguchi design a case study
Optimizing chemical process through robust taguchi design a case studyOptimizing chemical process through robust taguchi design a case study
Optimizing chemical process through robust taguchi design a case study
IAEME Publication
 
An approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttpAn approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttp
IAEME Publication
 
Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...
IAEME Publication
 
Smart home systems using wireless sensor network a comparative analysis
Smart home systems using wireless sensor network a comparative analysisSmart home systems using wireless sensor network a comparative analysis
Smart home systems using wireless sensor network a comparative analysis
IAEME Publication
 
Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential users
IAEME Publication
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
IAEME Publication
 
An empirical study of the investigation of green
An empirical study of the investigation of greenAn empirical study of the investigation of green
An empirical study of the investigation of green
IAEME Publication
 
Durability studies on high strength high performance concrete
Durability studies on high strength high performance concreteDurability studies on high strength high performance concrete
Durability studies on high strength high performance concrete
IAEME Publication
 
Governance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service qualityGovernance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service quality
IAEME Publication
 
To manage age a challenge for albanian enterprises
To manage age   a challenge for albanian enterprisesTo manage age   a challenge for albanian enterprises
To manage age a challenge for albanian enterprises
IAEME Publication
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
IAEME Publication
 

En vedette (20)

Supersonic particle deposition as potential corrosion
Supersonic particle deposition as potential corrosionSupersonic particle deposition as potential corrosion
Supersonic particle deposition as potential corrosion
 
Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
 
Venture capital in karnataka
Venture capital in karnatakaVenture capital in karnataka
Venture capital in karnataka
 
Ecg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseasesEcg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseases
 
A random number generator for rfid tags
A random number generator for rfid tagsA random number generator for rfid tags
A random number generator for rfid tags
 
Comparative study of defected ground structures harmonics rejection ability i...
Comparative study of defected ground structures harmonics rejection ability i...Comparative study of defected ground structures harmonics rejection ability i...
Comparative study of defected ground structures harmonics rejection ability i...
 
Optimizing chemical process through robust taguchi design a case study
Optimizing chemical process through robust taguchi design a case studyOptimizing chemical process through robust taguchi design a case study
Optimizing chemical process through robust taguchi design a case study
 
An approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttpAn approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttp
 
Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...
 
Smart home systems using wireless sensor network a comparative analysis
Smart home systems using wireless sensor network a comparative analysisSmart home systems using wireless sensor network a comparative analysis
Smart home systems using wireless sensor network a comparative analysis
 
Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential users
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
An empirical study of the investigation of green
An empirical study of the investigation of greenAn empirical study of the investigation of green
An empirical study of the investigation of green
 
Durability studies on high strength high performance concrete
Durability studies on high strength high performance concreteDurability studies on high strength high performance concrete
Durability studies on high strength high performance concrete
 
Governance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service qualityGovernance of fuzzy systems to predict driver perception of service quality
Governance of fuzzy systems to predict driver perception of service quality
 
To manage age a challenge for albanian enterprises
To manage age   a challenge for albanian enterprisesTo manage age   a challenge for albanian enterprises
To manage age a challenge for albanian enterprises
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
 
Seres vivos
Seres vivosSeres vivos
Seres vivos
 
El renacimiento
El  renacimientoEl  renacimiento
El renacimiento
 

Similaire à Creation of automatic identification and data

Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
IAEME Publication
 

Similaire à Creation of automatic identification and data (20)

Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
IRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFIDIRJET- Smart Cart Using Arduino and RFID
IRJET- Smart Cart Using Arduino and RFID
 
20320130406009
2032013040600920320130406009
20320130406009
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
IRJET- Fast Detection Method of Quick Response Code by Comparing Run-Length C...
 
Advancements in Supply Chain Management Using IoT
Advancements in Supply Chain Management Using IoTAdvancements in Supply Chain Management Using IoT
Advancements in Supply Chain Management Using IoT
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
On-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time ApplicationOn-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time Application
 
On-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time ApplicationOn-line IDACS for Embedded Real Time Application
On-line IDACS for Embedded Real Time Application
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
 
A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...
 
IRJET-RFID Based Smart Shopping Kart
IRJET-RFID Based Smart Shopping KartIRJET-RFID Based Smart Shopping Kart
IRJET-RFID Based Smart Shopping Kart
 
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
IRJET- Document Digitization
IRJET- Document DigitizationIRJET- Document Digitization
IRJET- Document Digitization
 
Development and implementation of a miniature RFID system in a shopping mall ...
Development and implementation of a miniature RFID system in a shopping mall ...Development and implementation of a miniature RFID system in a shopping mall ...
Development and implementation of a miniature RFID system in a shopping mall ...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
Honeywell aerospace launches rfid rollout
Honeywell aerospace launches rfid rolloutHoneywell aerospace launches rfid rollout
Honeywell aerospace launches rfid rollout
 
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET-  	  A Quality Watch Android Based Application for Monitoring Robotic A...IRJET-  	  A Quality Watch Android Based Application for Monitoring Robotic A...
IRJET- A Quality Watch Android Based Application for Monitoring Robotic A...
 

Plus de IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Creation of automatic identification and data

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) IJARET Volume 4, Issue 1, January- February (2013), pp. 01-08 © IAEME: www.iaeme.com/ijaret.asp ©IAEME Journal Impact Factor (2012): 2.7078 (Calculated by GISI) www.jifactor.com CREATION OF AUTOMATIC IDENTIFICATION AND DATA CAPTURE INFRASTRUCTURE VIA DATAMATRIX Mr.Lokesh S. Khedekar 1, Dr.A.S.Alvi 2 PRMIT&R,Badnera,Amravati,India,lokeshkhedekar@gmail.com 1 PRMIT&R,Badnera,Amravati,India,abrar_alvi@gmail.com 2 ABSTRACT Automatic Identification data capture technologies are becoming increasingly important in the management of supply chain, manufacturing flow management mobile asset tracking inventory management, warehousing, and any application where physical items move through location in time. Tracking these items has historically been done by the use of bar-code technologies, which suffer from lack of efficiency, robustness, difficulty in automation, inability to have secure or dynamic data, etc., whereas the 2D Data matrix has the ability to overcome several of these limitations over barcode. This paper presents a comparative basis for the creation of Automatic Identification and Data Capture (AIDC) infrastructure via 2D Data matrix versus other technologies such as bar-code. Keywords: ADIC, Barcode, Data matrix, RFID, Sensor. I. INTRODUCTION As the communication and computational technologies have started to become commonplace within enterprise operations, the computer-aided/managed Enterprise Information Systems (EIS) such as Enterprise Resource Planning (ERP) [1], Supply Chain Management (SCM) [2] [3], Product Lifecycle Management (PLM) [4] [5], Customer Relationship Management (CRM) [6] [7], Manufacturing Execution System (MES) [8], Warehouse Management System (WMS) [9], and Enterprise Asset Management (EAM) [10] etc are significantly improving the enterprise operational efficiency and reducing the operational cost [11]. The EIS processes information such as history, current status, location, relationships, and, destination of enterprise resources such as materials, equipments, personnel, cash, etc. The stock level of products at various stages within a supply chain can significantly affect the operations of supply chain. optimum stock levels result in requiring less storage 1
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME space, faster processing, quicker cash flow, better customer satisfaction and sale, etc. the stock level can be monitored and predicted by tracking the movement of the on-shelf products, or the incoming shipments. as the real-time stock levels are identified, decisions such as replenish or reorder can be made timely and correctly. this is called visibility and predictability in the enterprise information system. To achieve visibility and predictability of the movement of these business objects, the information associated with the object, which is called identification data in this research, should be identified and monitored along the enterprise operation flows. The identification data should automatically be captured and integrated into the different enterprise process applications in real-time. Usually, the identification data capture process and the integration of the identification data with enterprise application are performed by the Automatic Identification and Data Capture (AIDC) technologies. The identification data associated with a particular business object (such as raw material, products, equipments, shipments, and personnel etc.) is collected by the data capture devices at each processing location where the business object is processed. Barcode is the most commonly used identification data capture technology in today’s enterprise operations. However, traditional bar-coding approach cannot achieve the real-time visibility because of the low speed of reading, the needs of line-of-sight, and unavoidable involvement of humans. The more advanced AIDC technology of 2D Data matrix is becoming the promising technology to achieve real-time visibility of enterprise operations. It has several obvious advantages such as non-line-of-sight reading, high-speed reading, multiple reading and writing simultaneously, minimal human intervention etc. that make it close to ideal for providing real-time visibility of enterprise operations. II. IDENTIFICATION AUTOMATION TECHNOLOGY Barcode, Radio Frequency Identification (RFID), Sensor, Magnetic Strip, IC card, Optic Character Recognition (OCR), Voice Recognition, Fingerprint and Optical Strip etc [12] are identification technologies that have been used in the enterprise environment. Among these identification technologies, barcode is the most widely used technology. The RFID and sensor hold a promise of significantly improving business operational efficiencies and increasing the visibility of the business objects. The other technologies are either lack of automation capability or lack of ability to attach to business objects. Thus, we do not categorize them as the automatic identification technology for enterprise application. Barcode and 2D data matrix technologies are addressed and discussed in this paper. III. BARCODE TECHNOLOGY 3.1 History The first barcode was developed by Bernard Silver and Norman Joseph Woodland in the late 1940’s and early 1950’s [13]. It was a “bull’s eye” symbol that consisted of a series of concentric circles. The first commercial use of barcodes was by the RCA/Kroger system installed in Cincinnati on the call of the National Association of Food Chains (NAFC). However it was not widely used until the Universal Product Code (UPC) [14] was introduced into America and adopted by the U.S. Supermarket Ad Hoc Committee. Today’s barcodes have two forms: one dimensional (1D) barcode and two dimensional (2D) barcode. The 1D barcodes use bars and gaps to encode identification information such as serial numbers. The 2D barcodes consist of more complicated patterns and may encode up to 4K 2
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME bytes of data. Figure 1 shows the 1D barcodes. Although 1D is the more prevalent barcode used in daily life. Barcodes can be printed from most printers. 1D barcodes usually have coded readable ID printed along with the barcode. Barcodes can be read by barcode scanners which we see at a typical Point of Sale (POS) in retail stores. Figure 1. 1D Barcode Figure 2 illustrates a basic barcode system. Barcodes are read or scanned by a barcode reader and the reader is connected to a computer. The operator has to physically align/point the barcode reader with/to the barcode to read the identification information. The software running on the computer processes the identification information picked up by the scanner. Programmable Logic Controller (PLC) is usually used to control the scanner in more automated process such as production line. The primary scanning technology for barcode is LED (Light-Emitting Diode). More advanced scanning such as CCD (Charge-Coupled Device), Laser, and Imager are used in industry automatic processing [37]. Figure 2 A Basic Barcode System 3.2 Advantages and Disadvantages of Barcode Compared to manual data entry, the barcode is fast and accurate. The barcode can be printed from any black/white printer. Since the barcode can be directly printed on an object or on paper label, the cost for a barcode is typically less than 1 cent [15]. Even after including the hardware cost, the barcode data collection system reduces the operation cost, labor cost, and the revenue loss caused by data entry errors, while improving the business process and productivity [16]. However, several weaknesses exist. Firstly, barcode label is easy to be damaged in harsh environments such as careless handling, external factors such as rain/low temperatures. Second, to read the barcode, the barcode scanner needs to be line of sight with the label. It means that the manual movement of the objects or scanner is necessary. Thirdly, barcode technology does not have ability of scanning object inside a container or a case. Thus, the operator has to open the container and scan the objects one by one, thereby involving intensive labor. Obviously, the barcode is incapable of fast processing. 3
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME IV. SENSORE TECHNOLOGY The sensor is a device that can measure and collect environmental parameters (such as temperature, humidity, chemicals, vibration, density, etc.) or system runtime parameters (such as position, location, speed, acceleration, etc.) [17]. Sensors have been used in a variety of applications, especially for automation and control in industries such as aerospace, automotive, healthcare, environment, transportation, etc. As the smallest unit of an automation system, a single sensor could be used for fulfilling certain functions. But in most cases, a sensor system consists of a large number of sensors normally that must work together to achieve awareness of the physical world. Recently, new technologies including wireless sensors, MEMS sensors, smart sensors, bio sensors, etc., have changed the type of sensors that can be made. Sensors made today with advanced techniques are smaller and can measure and collect information that is beyond the capability of traditional sensors. New sensor system infrastructures such as sensor network [18] with wireless connection capability are gradually replacing the traditional wire-connected sensors. In an enterprise environment, sensor technologies combined with ID technologies would significantly improve the enterprise resource visibility and thus improve the enterprise operation efficiency. For example, along the supply chain flow, a GPS sensor could help the enterprise system track and monitor the location of the raw material at real times [39]. A better decision on the related enterprise operations could then be made based on information of not only on the location of an asset, but also its condition, and potentially the condition of the asset could itself alter where the asset was being sent next (example if ice-cream being shipped sees high temperatures, then perhaps it may be disposed instead of continuing to be shipped to the final destination). V. DATA MATRIX 2-D bar code consists of a certain white and black geometric modules that alternately arrange in the vertical and horizontal directions according to certain rules see Figure, and it is a symbol with large capacity for storing information. As the 2-D bar code with smallestsize in the world, data matrix code is widely applied to electronic product components. 2-Dbar code recognition technology shows great commercial value, and at present, most COTS (commercial of the shell) recognition algorithms are proprietary and protected by patents, so the 2-D bar code recognition technology is in a great demand for researching. Figure Datamatrix structure shows the principle of a Datamatrix barcode. The Figure 3 shows an annotated Datamatrix where the finder and synchronization patterns have been highlighted. Figure 3. Datamatrix structure. 4
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME VI. BASIC DATAMATRIX SYSTEM 2 1 Figure 4.Basic Data matrix System Figure 4 represent a data matrix system which contain two steps 1.take a picture of object and 2.upload an image into the computer you will get the all information related to the system. Code readers operate on the principle of contrast between the code (printing ink) and the background (printing substrate). For code decoding various code readers are used and, in addition to readers, 2D codes can be decoded also with certain types of mobile phones. Camera-based readers are the newest type of code readers. This type of readers uses a small video camera to capture an image of the code. Sophisticated digital image processing techniques are then used to decode the code. Video cameras are equipped with the same CCD (Charge Coupled Device) technology as in a CCD code readers except that instead of having a single row of sensors, a video camera has hundreds of rows of sensors arranged in a two-dimensional array so that they can generate an image(Taltech, n.d.). Camera-based reader is the one used in capturing the codes with mobile phone camera.[21] VII. ADIC INFRASTRUCTURE The advantages identification technologies can potentially improve the enterprise operation efficiency and reduce the operation cost. However, simply deploying data capturing devices, assigning identification data to the business object, and capturing the data from the business object can not bring the value to enterprise operations. A set of software components which assist the devices management, identification data preparing, capturing, formatting, and associating with physical objects are required. The software components and devices together are called identification resources. Further, these identification resources are networked and collaborated with each other to form the AIDC infrastructure. VIII. DEFINATION AND COMPONENTS The Automatic Identification Data Capture (AIDC) infrastructure is defined as a set of networked devices and software components which include: 1 Devices. Devices include various identification technologies such as RFID reader, RFID printer, barcode scanner, sensors, and Programmable Logic Controller (PLC) etc. 2 Services. Services are software components that enabling the data preparation, capturing, and processing. Essential components of an AIDC infrastructure are identified [19] [20] and illustrated in Figure 5. It contains the following components 5
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME 3 Data matrix, Tags, and Sensors: Data matrix, tags and sensors are the smallest units that are attached to an enterprise entity or resource to be identified. Device Controller or Edge Server: A device controller is used to manage and control identification hardware (Readers, Scanners, Sensors and other Manageable Devices), aggregate, pre-process and cache the identification information. It is difficult to manage a device in a planer space. Putting all the functions such as capture, process, and representation of identification data into a single server could increase the burden of the server. Hierarchical, layered and distributed architecture is an effective way to balance the load and deliver the best overall performance. Using the Edge Servers, the devices can be clustered and distributed. Functional roles can be separated so that the Edge Servers could be dedicated to the data capture requirements, where the core/central servers can be used for data intelligence. 4.Identification Network: The identification network is the infrastructure that connects all the hardware resources and enterprise information systems together. 5.Enterprise Information Servers: Enterprise information server provides enterprise activities related data which can be used along with the identification information for business operations. It provides real-time, aggregated identification data and events to client applications. As discussed earlier, the identification data capture process may contain business events. The Enterprise Information System provides interfaces so that the application can define, register and look up events. It also provides interfaces that the end application can register and lookup production information, business information, and transaction information that is associated with a particular identification data. 6.Enterprise Application: Enterprise applications are functional modules that fulfill certain enterprise activities. For example, a Warehouse Management System uses the data captured by the Edge Server to monitoring the inventory level; an Asset Management System uses the data to look up a particular asset; etc. Figure 5. The ADIC Infrastructure 6
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME IX. CONCLUSION A variety of identification technologies have been used in the enterprise systems to improve the enterprise operation efficiency and reduce the overall operation cost. Barcodes, RFID, sensors and datamatrix are the most commonly used and important technologies that have been addressed. Because of its low cost, today, the barcode is the major identification technology used by most enterprises. X. ACKNOWLEDGMENT First & foremost, I would like to express my sincere gratitude towards Dr.A.S.Alvi for his valuable guidance, encouragement, and optimism. I feel proud of his eminence and vast knowledge, which will guide me throughout my life. I wish to acknowledge with thanks to all the faculty members of Information Technology Department who has directly or indirectly helped me in the research paper work. Last but not the least; I would like to express my sincere thanks to my institute Prof. Ram Meghe Institute of Technology & Research, Badnera. For providing me all the needful facilities during the research paper work. REFERENCES [1] Christina Soh, Sia Siew Kien, Joanne Tay-Yap, Enterprise resource planning: cultural fits and misfits: is ERP a universal solution? Communications of ACM, Vol. 43, 2000, pp47-51 [2] Benita M. Beamon, Supply chain design and analysis: Models and methods, International Journal of Production Economics, Vol. 55 pp. 281-294, 1998 [3] Lambert, D.M. and M.C. Cooper 2000, Issues in Supply Chain Management, Industrial Marketing Management, Vol. 29, pp. 65-83. [4] Valerie Thomas, Wolfgang Neckel, Siguad Wagner, Information Technology and Product Lifecycle Management, In Proceeding of the 1999 IEEE International Symposium on Electronics and the Environment. [5] Ioannis Komninos, Production Life Cycle Management, http://www.urenio.org/tools/en/Product_Life_Cycle_Management.pdf [6] M. Stone, N. Woodcock, M. Wilson, Managing the Change from Marketing Planning to Customer Relationship Management, International Journal of Strategic Management: Long Range Planning, Volume 29, Number 5, October 1996, pp. 675-683(9) [7] Russell S. Winer, Customer Relationship Management: A Framework, Research director and the future http://groups.haas.berkeley.edu/fcsuit/PDF-papers/CRM%20paper.pdf [8] Ronelle Russell, Manufacturing Execution Systems: Moving to the Next Level, Pharmaceutical Technology, January 2004, pp 38-50 [9] Ben Worthen, The ABCs of Supply Chain Management, http://www.cio.com/research/scm/edit/012202_scm.html [10] IBM, Enterprise Asset Management: Optimizing Business Operation with Leading-edge Enterprise Asset Management Services, http://www-935.ibm.com/services/us/index.wss/offering/bcs/a1002719 [11] Diane M., Olga Volkoff, A Roadmap for Enterprise System Implementation, Computer, June 2004, pp22-29 7
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 1, January- February (2013), © IAEME [12] Cambridge Consultant, Description of Technologies and Example of Application in Other Industries, http://www.npsa.nhs.uk/site/media/documents/811_Cambridge%20Consultants%20Report% 20Section%202.pdf [13] Mery Bellis, Bar Codes, http://inventors.about.com/library/inventors/blbar_code.htm [14] GS1 US, The Universal Product Code, http://www.uc-council.org/upc_background.html [15] J. Abernethy, Widener Liberary: Book Identification – Bar Codes & RFID, An Engineering Science 96 Report, M17, 1995, http://www.deas.harvard.edu/courses/es96/spring1995/barcodes_rfid/abernethy.html [16] Alexander Brewer, Nancy Sloan, Thomas L. Landers, Intelligent Tracking in Manufacturing, Journal of Intelligent Manufacturing, Vol. 10, 1999, pp245-250 [17] Ljubisa Ristic, Sensor Technology and Devices, Artech House Publishers, 1994 [18] Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister, “System architecture directions for networked sensors,” in Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, Nov. 2000, pp. 93–104, ACM. [19] B. S. Prabhu, Xiaoyong Su, Harish Ramamurthy, Chi-Cheng Chu, Rajit Gadh, “WinRFID – A Middleware for the enablement of Radio Frequency Identification (RFID) based Applications”, Invited chapter in Mobile , Wireless and Sensor Networks: Technology, Applications and Future Directions, Rajeev Shorey, Chan Mun Choon, Ooi Wei Tsang, A. Ananda (eds.), John Wiley, December 2005. [20] B.S. Prabhu, Xiaoyong Su, Charlie Qiu, Harish Ramamurthy, Peter Chu, Rajit Gadh, "WinRFID – Middleware for Distributed RFID Infrastructure", International Workshop on Radio Frequency Identification (RFID) and Wireless Sensors, Indian Institute of Technology, Kanpur, India, November 11-13, 2005. [21]An Effective Technique to Protecting Sensetive Information Using 2D datamatrix. International Journal of Scient ific and Research Publications, Volume 2, Issue 12, December 2012 1 ISSN 2250-3153 1.L.S.Khedekar 2.Dr.A.S.Alvi [22]Smart Credential Cum Unique Identification and Recognition System Volume 2, Issue 6, November-December 2012 Available Online at www.gpublication.com/jcer ISSN No.: 0976- 8324 ©Genxcellence Publication 2011, All Rights Reserved 1.L.S.Khedekar 2.Dr.A.S.Alvi [23] Mala Mitra, “A Random Number Generator For Rfid Tags” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume1, Issue1, 2010, pp. 71 - 87, Published by IAEME [24] Gurudatt Kulkarni, Rani Waghmare, Nikita Chavan and Sandhya Mandhare, “Security In Rfid Technology” International journal of Computer Engineering & Technology (IJCET), Volume3, Issue2, 2012, pp. 337 - 343, Published by IAEME [25] Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks: Limitation, Layerwise Security Threats, Intruder Detection” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume3, Issue2, 2012, pp. 22 - 31, Published by IAEME. [26] Shashank Bholane and Devendrasingh Thakore, “Sender To Receiver Synchronization In Wireless Sensor Networks – A Simulation Study” International journal of Computer Engineering & Technology (IJCET), Volume3, Issue2, 2012, pp. 265 - 270, Published by IAEME 8