html5-img
1 / 29

Automatic Identification and Data Capture

Automatic Identification and Data Capture. Jordan Greisinger. What’s in this presentation. What Is AIDC? Why should we use AIDC technologies? Overview of different AIDC technologies Some future developments of AIDC. What is AIDC?.

iola
Télécharger la présentation

Automatic Identification and Data Capture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Automatic Identification and Data Capture Jordan Greisinger

  2. What’s in this presentation • What Is AIDC? • Why should we use AIDC technologies? • Overview of different AIDC technologies • Some future developments of AIDC

  3. What is AIDC? • A way to identify and collect information about a particular object • Use the information to perform various actions with a computer system • Main reason is to do all of this without human support

  4. Why have AIDC? • Severely cuts down on human labor • Manage information • Track information • Organize, deliver goods more efficiently • Handle a bigger volume of goods • Better security • Personal ID capabilities

  5. AIDC Technologies • Barcodes • RFID • Biometrics • Magnetic Strips • OCR • Smart Cards • Voice Recognition • EAS • RTLS

  6. Barcodes • Have been around for more than 50 years! • The standard for today’s tracking of products • Two types of barcodes today: • One dimensional • Two dimensional

  7. Radio-Frequency Identification (RFID) • Uses radio waves for communication • Will soon replace barcodes completely • Most RFID tags consist of two parts • Circuit • Antenna • Some require their own power source, some are powered by the scanner. • Example: Protecting babies

  8. Video demonstration of RFID vs Barcode • http://www.youtube.com/watch?v=d0YjNMtEGFM

  9. Biometrics • Used for identifying people • How it works • Two modes for biometrics: • Verification • Identification

  10. Examples of Biometrics • http://www.youtube.com/watch?v=OPwOJbNAB2g&feature=relmfu • The Nigerian Bank savings account ID

  11. Magnetic Strips • Usually found on cards that contain the familiar black stripe • Cards that typically have the black stripe: • Credit/debit cards • ID cards • Library cards • Usage of these cards: • Access badges • ID cards • Key cards

  12. How a Magnetic card reader works • Magnetic card stores information in three separate tracks • Each track contains different bit densities and character sets • Track 1 • 210 bits per inch. 64 bit character data set. • Can hold 79 characters • Track 2 and 3 • 75 and 210 bits per inch respectively. Only numeric data can be stored. • Can hold 40 and 107 characters respectively • Actual usable data stored minimized as the Start Sentinel, End Sentinel, and LRC • Data storage format is as follows: • Leading zero bits are encoded for synchronization purposes for the reader. • The Start Sentinel then presents its actual data • Then the End Sentinel follows with its actual data and then terminates the data portion • The LRC is a byte used for error detection and follows the End Sentinel and zero bits fill the remaining card

  13. How a Magnetic card reader works Continued • The magnetic card reader can read and handle all three tracks simultaneously • The card reader also has an oscillator section that uses timers for enabling and disabling. These timers provide the ability for the reader to lock onto the data and recover individual data bits from the data stream on the card. • Simple card reader programs read the card in a forward direction. More complex programs can read the card in any direction.

  14. Optical Character Recognition (OCR) • Process in which scanned images or text get translated to machine encoded text • Typically used to convert books into electronic files. • OCR abilities: • Edit text in documents • Search for words/phrases in documents • Some OCR systems can also reproduce images or other non-text components like borders

  15. Smart Cards • Smart card = advanced credit card • Contains a microprocessor. Used to replace the magnetic stripe of a card • Widely used in Europe • More secure than ID cards • Have up to 8 kb of RAM • Not self-powered

  16. Why smart cards over magnetic strips or other Identification cards? • The Moroccan Driving licenses

  17. Voice Recognition • Main objective: convert spoken words into text • Uses an analog-to-digital converter • Translates voice vibrations to data • Runs through a database to match phonemes to data • Outputs what the computer thought the person said

  18. Electronic Article Surveillance (EAS) • Most commonly used in department/grocery stores • Think of those gates near the doors of most department/grocery stores • Uses RFID technology

  19. Real Time Locating System (RTLS) • Comes as a fully automated system • Uses RFID tags and a networking system • Multiple systems working together • Continuously sending location data to main server • Example: Luther college in Iowa

  20. Future developments of AIDC • New RFID developments • Becoming less costly and better performance • Memory capacity is being increased • New powering devices • Global positioning tracking sensors being reduced to 10cm across • Using AIDC technologies, University of Michigan has developed a chip for testing for the flu. Other Universities are branching off and developing chips for HIV and cancer screening. • A company in Japan has developed two types of thermal rewritable paper

  21. Laser Surface Authentication (LSA) • Invented by Professor RusselCowburn at the Imperial College in London • Low cost laser data capturing system • Can uniquely identify: • Documents • Currency • Passports • Licenses • Art • Makes counterfeiting products a lot harder to do

  22. Conclusion • Benefits are intangible • Clear signs of growth • Becoming a standard in business today

  23. Questions?

  24. References • Aidc. Retrieved from http://www.aidc.org/ • What is aidc?. (2011). Retrieved from http://www.engineersgarage.com/articles/automatic-identification-and-data-capture-technology-aidc?page=2 • Grabianowski, E. How speech recognition works. Retrieved from http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/speech-recognition1.htm • What is a smart card? Retrieved from http://www.howstuffworks.com/question332.htm • Identifying opportunities for applying aidc technologies. Retrieved from http://www.aimglobal.org/technologies/oppsforaidc.asp • Retrieved from http://www.globalsecurity.org/security/systems/biometrics.htm • Retrieved from http://www.barco.cz/en/?id=produkty&sel=rtls-1 • (2009). Retrieved from http://www.telecomcircle.com/2009/04/mobile-ticketing-opportunites-unlimited/ • Usbswiper credit card reader. [Web Graphic]. Retrieved from http://www.usbswiper.com/categories/magnetic-stripe-credit-card-readers.html

  25. References Continued • Smart cards contain an embedded microchip along with a radio antenna. [Web Graphic]. Retrieved from http://mediascopeinc.wordpress.com/2012/01/05/are-smart-cards-safe/ • Aidceuropeancentre of excellence. (n.d.). Retrieved from http://testsite6.futurate.com/ • Spencer, W. (n.d.). How a magnetic card reader works. Retrieved from http://www.tech-faq.com/how-a-magnetic-card-reader-works.html • Retrieved from http://www.tech-faq.com/how-a-magnetic-card-reader-works.html • Oberman, G. (Performer) (2011). Digitalpersona - pos with biometrics demonstration [Web]. Retrieved from http://www.youtube.com/watch?v=OPwOJbNAB2g&feature=relmfu • Dennison, A. (Performer) (2009). Rfid demonstration - rfis vs. bar codes [Web]. Retrieved from http://www.youtube.com/watch?v=d0YjNMtEGFM

More Related