AIDC, the standard we called Auto Identification and Data Shoot. The AIDC is the common technologies in the word now and we used frequently inside our life. Using AIDC we can accumulate data and information without needing the keyboard, like smart credit card or visa or mastercard, example when we buy something with a certain huge amount we can using credit to swipe it, the cards consist private information and bank account number so that after per month banker can assess the full total and send to costs to ask the user shell out the dough.
AIDC not only have only smart cards or mastercard and that have magnetic strips. Magnetic strips are common used in company to recognize the individual and let customer enter or leave the business building, that your magnetic strips are made up the non-public information. Some of the restaurant or shop also have their own member credit card which also a AIDC, which the member card keeping the point and personal stats, when customer arrived to buy their product in offer day the system knows discount the purchase price.
There are so much of AIDC technology, such as barcode, optical identity audience, biometrics, radio rate of recurrence identification, voice reputation. In this paper I'll discuss about few type of AIDC systems how these systems may bring effective to your work.
2 Meaning of AIDC
Automatic Identification and Data Shoot (AIDC) is using to identifying items, transfer the data directly into computer without using the computer keyboard, and receive data from the computer. AIDC Systems include bar codes, smart credit cards, and voice acknowledgement, Radio Frequency Recognition (RFID), biometrics, magnetic stripes, Optical Figure Recognition (OCR).
AIDC normally used images may seem or videos to obtain data, a transducer helps converts the image or sound directly into digital file which knows by computer. The computer helps compared the data inside the repository and verify personal information and provide authorization to let individual enter or exit to the secured system.
AIDC also used to identify the items; users not need to enter one at a time manual into computer system, it computerized entering into system it can save lots of time. In biometric security systems, computer system determining the iris printing, facial image, hand image, finger mark to verify the individual, this may perform more reliability and guaranteed because the finger make are unique while others people cannot really copy it.
AIDC systems can prevent data suggestions error and frustrating, manually go into data may cause some input problem and using AIDC the info input are more accuracy and it providing a quick response time to receive and enter the data.
3 Using AIDC
Collecting the info from documentation
Usage of AIDC is helps acquiring the image from branded document or newspaper documents and helps change the image to digital file understands by computer. There are many technology help AIDC for data captured by different doc.
These several types are Optical Personality Reputation (OCR), Intelligent Identity Recognition (ICR), Optical Mark Reputation (OMR), Optical Barcode Recognition (OBR), and Business Cards Acknowledgement (BCR).
OCR typically using for branded text record generate by computer such as Microsoft Term document, Txt data file. ICR typically using in hand writing text record, it can identify human hands writing. OMR similar like barcode audience like can realize some specific symbol design by customer and each make symbolize an information by company. OBR normally used to identify the barcode on the merchandise when OBR check the barcode the purchase price and code amount will generate on the display. BCR typically used in business cards reputation and it stored the customer information. These basic technology allow extracting information from documents and used for information systems such as ERP, CRM as well as others.
Logistic Control System
Figure 1: Coca-cola using AIDC in logistic control system
AIDC used for helps logistics to improve the management quality. The developing history, expiration particular date, product code, and other data are encoded into AIDC technologies. Every container comprise an image similar like barcode to allow worker to scan it. Follow up the expiration night out workers are easily arrange the shipment time to delivered the merchandise and improve traceability based on manufacturing history control.
Using AIDC in logistic control system can prevent shipment mistake because every pot has own unique product code and worker just only shipping and delivery with accurate product code and it'll cause less oversight.
Sales Management System
Figure 2: AIDC found in sales management system
AIDC also common used in sales management system, the product name, product code, product type, make date are all encoded into AIDC solutions and printing on the product. As customer need to be paying the personnel just used the audience device to scan the barcode, the computer system will verify the barcode form repository and retrieve the purchase price and the product detail to an individual.
Using AIDC it is reliability and timely to assemble everything instead to use manual find the product information.
4 Advantage of AIDC
By using AIDC program can keep track the record record by using a label that can read by machine. Without ADIC, company need implement something keep keep track of the data file location of course, if a data file moving to some other place also need update the data in central data source.
However, AIDC can prevent lost files in a corporation and company no need to spend your time find the lost file. Just get a precise picture and printing AIDC image in the picture by arrange the document code, when user need the record just used audience to collect the data from database. It could save time and cost to finding the lose file.
AIDC systems can helps people record his position immediately and no need wait for the central system response in a single day or two day later, because a few of them are using paper handling and it will cause hold off happen and operating process will be slower
AIDC systems let people immediately record their own activities rather than filling out varieties which get came into into a central system a day or two later. Because the paper-handling wait disappears, business operations reliant on information quicken.
Consider an average distribution center. Employees unload trucks on one area, reconcile the materials against purchase orders, determine the correct outbound function and destination, and lastly load the material on outbound vehicles at the other end of the building. If AIDC is not used, material rests idle while people wait for information. People need to know to which purchase order a pack belongs. They have to know in case a package deal should leave through standard delivery channels or whether it needs express handling. In addition they need to know where to deliver the package deal.
However, if you are using AIDC to record immediately a received pallet to the central computer system, in many cases fork truck drivers take the pallet directly to an outbound pickup truck. You merely have to handle the pallet once, you do not need warehouse space to store it, so you decrease the total amount of in-transit inventory required to supply your operation.
AIDC is more accuracy in comparison to manual system because it using processing to collect the info. In real case, human may go into wrong data to data source and occur much more errors than using computerize.
With lowering man vitality and increasing workloads, we have additional time to do others activity. AIDC help company lower the cost and increased work effective to competition with other company in the same time also can offer a exactness data.
Disadvantage of AIDC
Using AIDC consumer many decode data using device or smart phone to get everything. Example like company data store printing like barcode and store in repository room, any people just need scan the barcode and can get all the data and information.
Without the device or smart phone AIDC cannot do anything like have the data or digesting the data. All the AIDC process in control by computer and with these devices, we cannot speak between computer and acquire and decode the info what we want.
2. Pub Code Technology
Bar Code is one of the AIDC systems are common found in our life, barcode data are read by optical barcode machine. Normally we the barcode we found is in the lines and spacing of parallel lines, this type of club code we called it 1D (1 dimensional )barcodes. Now got another type of barcode called 2D (2 dimensional) they in routine of square, 2D pub code use icons others than bars but they are generally refer to as barcodes, 2D barcode can store more data in comparison to 1D and 2D barcode now are receiving more popular in essence they used for advertising campaign purpose.
2. 1 Linear bar code
A linear barcode icon is a sequence of printed lines, or pubs, and intervening spaces normally we called it 1D. The quantity and width of the places depends upon a specification for each and every symbol.
Figure 3 : Universal Product Code is a type of ongoing and many bar width code. Inside the UPC-A barcode, each digit is symbolized with a seven-bit collection, encoded by some alternating pubs and areas.
There are 2 kind of symbol used in linear barcode which is constant and discrete. In constant image usually abut with one character ending with a space and the next you start with a club, or vice versa. People in discrete image commence and end with pubs; the inter figure space is overlooked, so long as it is not wide enough to look like the code ends.
Two-width vs. many-width: Pubs and spots in two-width mark are large or narrow; how wide a broad bar is strictly has no relevance as long as the image requirements for extensive bars are adhered to (usually 2-3 times wider when compared to a narrow pub). Bars and spaces in many-width symbol are all multiples of a simple width called the component; most such rules use four widths of just one 1, 2, 3 and 4 modules.
2. 4 2D Bar code
A two-dimensional code stores information with elevation and length of the image. Since both sizes contain the data and the vertical redundancy is weak so a few of the info will misreads to avoid this problem normally most two dimensional code using check words to guarantee the accurate reading.
Initially, two-dimensional mark consist of bit space. The first program used 2D pub code in professional medical industry, these 2D barcode used to place with small unit-dose deals.
2D Bar rules have become extensively popular for their reading speed, precision, and superior functionality characteristics. As pub rules became popular and their convenience universally recognized, the marketplace began to demand codes capable of storing more information, more character types, and that may be printed in a smaller space.
As an outcome, various initiatives were made to increase the amount of information stored by bar rules, such as increasing the amount of pub code digits or structure multiple bar codes. However, these advancements also triggered problems such as enlarging the bar code area, complicating reading functions, and increasing printing cost.
Multiple pub code layout
2D Code with stacked club codes (stacked pub code type)
2D Code (matrix type)
2D Code is also progressing from the stacked club code method (that stacks pub codes), to the increased information density matrix method. A couple of more than 20 different 2-D symbols available today. The next is the QR code it is the one of 2d are most popular now.
QR Code is a kind of 2-D (two-dimensional) symbology developed by Denso Wave (a division of Denso Company at the time) and released in 1994 with the principal aim of being a image that is easily interpreted by scanner equipment.
QR Code (2D Code) is made up of information in both vertical and horizontal directions, whereas a pub code contains data in a single direction only. QR Code supports a considerably increased level of information when compared to a bar code.
2. 4. 2 Critical Analysis of QR code
We can clearly know the QR code has a lot more better than others barcode because QR code has higher capacity to store the data compare to other barcode so we can store in many data like company record, records or image. QR Code provides the following features weighed against conventional bar rules.
High Capacity Encoding of Data
Linear bar code normally can keeping a maximum 20 digits compared to QR code its can be stored several hundred times more information, up to 7, 089 heroes can be encoded in a single image. QR code can be controlling all kind of data, such as numeric and alphabetic figure, symbols, binary, URL link and etc
Small Printout Size
Due to QR code gather data by both horizontal and vertical so QR code can be encoding the size into much smaller printout size example Micro QR code.
Dirt and Destruction Resistant
QR code has error modification capability so that data has chance to be restored even the mark is filthy or damaged. Maximum no more than 30% damaged the image still can restored.
Readable from any way in 360
QR code can captured of 360 level. QR code allows the positioning detection patterns located at three edges of the symbol. These position diagnosis patterns guarantee circumventing, negative effect of background disturbance, and perform high-speed reading.
Structured Append Feature
A QR code be divided into multiple icon. Conversely, information can be stored in multiple QR code image and combine as a single data icons. One data sign maximum can be divided up to 16 icons, because its allows printing in a narrow area.
Magnetic stripe technology is one of the AIDC technologies Magnetic stripe is common is everywhere you go, such as mastercard, ATM card, security control, member credit card, airline ticket and so on. Magnetic stripe is affordable way on the market and comprise readable ability to numerous functions. Magnetic Stripe is comparable like floppy disk technology. It uses magnetic materials to store data but floppy drive can be store image and audio but magnetic stripe used to store data and printed-out on paper or plastic material. Magnetic stripe cards designed to swiping to the audience and copy data to the computer.
Magnetic stripe have a row of tiny magnets. The data collected to the computer is setting up these polarities of the magnets, audience detect the polarities of the magnets in order to receive data. There are two kind of audience which is swiping cards audience and inserting credit card reader.
Swiping card reader also called swipe visitors have a slot machine game to let magnetic stripe greeting card to pull example in whenever we paying in Jusco hyper market the cashier drag the member greeting card in order to include in the member point it also my consist some problem when the greeting card is dragged too gradual or too fast.
Another audience called inserting audience. Usually the card is "swallow" by the reader and reading the fixed head. This reader is giving the system regular reading and secure speed for reading the information.
Data can be customized or rewritten
High data capacity in relation to bar codes
Add security since it isn't in real human readable form
Immune to contamination with dirt, water, oil, water, etc
No moving components, literally robust
Well established standards
No consumables necessary for writing or rewriting
It doesn't work in a distance, thus demanding close contact to the reader
Data can be broken by stray magnetic fields
Since it isn't in human readable form can be a disadvantage in a few applications
7. Radio Consistency Identification (RFID)
Radio-frequency identification (RFID) is a one technology of AIDC. RFID used electromagnetic waves to gather data between a terminal and an thing, typically RFID used to recognition and tracking a product or person. Some of the RFID label can be read from several meters away. A simple RFID system contains 3 type components which really is a transponder, audience, and computer.
Figure: Basic RFID system used to transfer data
Firstly the audience send the air signals to switch on the label and collect the info. Reader can send radio waves in selection of anywhere form up to 100 feet. Lastly the audience decodes the info encoded in the tag and passed the data to computer handling. FID system enable transmit data by the portable device and to indentify control gain access to, security and etc. Typically an RFID label comprise a microchip that can store as 2 kilobytes of data attach to reader.
Uses of RFID
Nowadays a whole lot company use RFID tags to avoid asset lost, a microchip tags build with the property allow company to keep keep track of the location advantage if the property from the range with reader the computer will send aware of inform company's staff.
Supply Chain Management
RFID technology has been used in supply string company for quite some time essentially they used RFID to keep record the shipment amongst their partner. Merchants such as Jusco, Tesco and Giant are in the forefront of RFID adoption. Without RFID these merchant hard to keep record the stock and decrease the supply chain efficiency.
RFID not only in resource string environment that RFID also play a important role in repayment system. Among the important systems by todays is highway toll repayment system. The automobile driver can pay their road payment without stopping the car example: smart tags.
Security and Access Control
RFID has been used to control that has enter and exit to the building for long time. The features of RFID is convenient in comparison to Magnetic Stripe cards, user can take up and uncover the door alternatively than swiping a greeting card.
Biometric technologies also are made up one for the AIDC and biometric systems has many type such as, side and finger geometry, cosmetic imaging, eye-based method, words, signature, and etc. Biometric systems is composed higher security than other AIDC technologies because of its unique and specific recognition systems and normally you will be charged more expensive than other AIDC solutions.
Figure: Methods of biometric solutions.
Facial images can used to be biometric id, the face reputation are based on the form of face qualities, like the eyes, eyebrows, lip area, nasal area, and chin shape, last the combo of the face analysis break down into lots of canonical faces. Now face recognition device are build-in in our laptop for identify the dog owner, but it has a limitation which is necessitating a simple track record or special illumination, if the positioning of face not in the correct place, it may fail to identify the dog owner.
The face thermogram is using infrared camera to discover vascular system in the real human face. The facial skin thermogram is unique to each individual which is not susceptible to disguises. Although, the face thermogram can be individual but this is no proven that face thermogram are sufficiently discriminative.
The fingerprint recognition has been used for very long time agora fingerprint is the style of ridges and the development has be established through the fetal period. Both palm fingerprints are the same so fingerprint are essential to let authorities to identify the individual associated with criminal investigations.
Hand geometry used individual hand shape, lengths and widths of the finger to assess and identify. The technique is easy and low priced. Specific anomalies such as dried out pores and skin are no influence the identification exactness. But the main down sides are its low discriminative, because our side shape won't be identical to more mature, especially during childhood. Last but not least, because the physical size of a hand geometry-based system is large, it cannot be used in certain program such as laptop computers.
The retinal style created by veins beneath retinal surface within an eyeball, its is stable and unique therefore can be used to id. The retinal design captured by infrared light, to be able to acquired a set part of the retinal, the topic must focus on the location in the visible field. Many program no used retinal design to identify since it scanner are very expensive normally the retinal style used in high security environment example in the prisons.
The iris is the annular region of the attention bounded by the pupil and the sclera. Iris consist of complex structure and very distinctive so its is used for id. Iris is more readable than retina, but iris is not a secure it can make by contract lens and wear by another's people.
Each person has a unique wring style. However, no two signatures is exactly the same. You will find two the personal based acceptance method, static and strong. Static personal verification
use only the personal of the geometry (form) functions and active (online) signature verification using both geometry (condition) characteristics and such as acceleration, speed, pressure strong characteristics, and track profile personal. The inherent features of signature-based bio-system is the signature has been set up as an acceptable form of personal id method can be transparently designed into existing business operations, requires the signature such as credit card transactions.
Voice recognition found the talk we talk, and each individual can produce different sound of speech scheduled to his shape or mouth, sinus cavities, lips. Speech-based verification can based on text-independent or text-dependent. In the sound environment the speech popularity difficult to detected. Speech-based authentication happens to be limited to low-security applications because of high variability in an individual's tone and poor accuracy and reliability performance of the speech-based authentication
Also We Can Offer!
- Argumentative essay
- Best college essays
- Buy custom essays online
- Buy essay online
- Cheap essay
- Cheap essay writing service
- Cheap writing service
- College essay
- College essay introduction
- College essay writing service
- Compare and contrast essay
- Custom essay
- Custom essay writing service
- Custom essays writing services
- Death penalty essay
- Do my essay
- Essay about love
- Essay about yourself
- Essay help
- Essay writing help
- Essay writing service reviews
- Essays online
- Fast food essay
- George orwell essays
- Human rights essay
- Narrative essay
- Pay to write essay
- Personal essay for college
- Personal narrative essay
- Persuasive writing
- Write my essay
- Write my essay for me cheap
- Writing a scholarship essay