Invezz.com - Grow your wealth with trading signals
Automatic Data Capture.pptx
1. Supply Chain/ERP
Automatic Data Capture
Harikrishnan Lakshminarayanan
Technology Consultant – Manufacturing and Automotive
Manufacturing Operations and Consulting Solutions
Satyam Computer Services Limited
2. Agenda
• Automatic Identification and Data Capture
– Barcodes
– Radio Frequency Identification (RFID)
– Biometrics
– Magnetic Stripes
– Optical Character Recognition (OCR)
– Smart Cards
– Speech Recognition
• Supply Chain / ERP
– SAP
– ORACLE
• The Internet of Things and supply chain of the future
3. Automatic Identification and Data Capture
• Automatic Identification and Data Capture (AIDC) refers to
the methods of
– automatically identifying objects
– collecting data about them and
– entering that data directly into computer systems
• Technologies typically considered as part of AIDC include
– Bar Codes
– Radio Frequency Identification RFID
– Biometrics
– Magnetic Stripes
– Optical Character Recognition OCR
– Smart Cards and
– Voice Recognition
• AIDC is also commonly referred to as “Automatic
Identification,” “Auto-ID,” and "Automatic Data Capture."
4. Barcodes
• A barcode is a machine-readable representation of information
(usually dark ink on a light background to create high and low
reflectance which is converted to 1s and 0s).
• Originally, barcodes stored data in the widths and spacings of
printed parallel lines, but today they also come in patterns of dots,
concentric circles, and text codes hidden within images.
• Barcodes can be read by optical scanners called barcode readers or
scanned from an image by special software.
• Barcodes are widely used to implement Auto ID Data Capture
(AIDC) systems that improve the speed and accuracy of computer
data entry.
• An advantage over other methods of AIDC is that it is less expensive
to implement. It will cost about US$0.005 to implement a barcode
compared to passive RFID which still costs about US$0.07 to
US$0.30 per tag.
7. Radio Frequency Identification
(RFID)
• Radio-frequency identification (RFID) is an automatic identification method,
relying on storing and remotely retrieving data using devices called RFID tags or
transponders.
• An RFID tag is an object that can be applied to or incorporated into a product,
animal, or person for the purpose of identification using radio waves. Some tags
can be read from several meters away and beyond the line of sight of the reader.
• Most RFID tags contain at least two parts. One is an integrated circuit for storing
and processing information, modulating and demodulating a (RF) signal, and other
specialized functions. The second is an antenna for receiving and transmitting the
signal.
• A technology called chip less RFID allows for discrete identification of tags without
an integrated circuit, thereby allowing tags to be printed directly onto assets at a
lower cost than traditional tags.
• Today, a significant thrust in RFID use is in enterprise supply chain management,
improving the efficiency of inventory tracking and management. However, a threat
is looming that the current growth and adoption in enterprise supply chain market
will not be sustainable. A fair cost-sharing mechanism, rational motives and
justified returns from RFID technology investments are the key ingredients to
achieve long-term and sustainable RFID technology adoption
8. Biometrics
• Biometrics is the method to recognize or verify the identity
of an individual based on its unique physiological or
behavioral characteristics such as Fingerprint, face, palm,
iris, retinal, vein, voice and handwriting.
• Fingerprint verification is the most established and
matured biometrics techniques.
• Biometrics authenticates an individual based on its unique
characteristics.
• One can consider himself as his own password, which can
hardly be forgotten, stolen and forged. Thus, biometrics
provides a securer solution comparing with PIN or Smart
Card identification.
9. Magnetic Stripes
• A magnetic stripe card is a type of card capable of
storing data by modifying the magnetism of tiny iron-
based magnetic particles on a band of magnetic
material on the card.
• The magnetic stripe, sometimes called a magstripe, is
read by physical contact and swiping past a reading
head.
• Magnetic stripe cards are commonly used in credit
cards, identity cards, and transportation tickets.
• They may also contain an RFID tag, a transponder
device and/or a microchip mostly used for business
premises access control or electronic payment.
10. Optical Character Recognition
(OCR)
• Optical character recognition, usually abbreviated to OCR, is the
mechanical or electronic translation of images of handwritten, typewritten
or printed text (usually captured by a scanner) into machine-editable text.
• OCR is a field of research in pattern recognition, artificial intelligence and
machine vision. Though academic research in the field continues, the
focus on OCR has shifted to implementation of proven techniques.
• Optical character recognition (using optical techniques such as mirrors and
lenses) and digital character recognition (using scanners and computer
algorithms) were originally considered separate fields. Because very few
applications survive that use true optical techniques, the OCR term has
now been broadened to include digital image processing as well.
• Early systems required training (the provision of known samples of each
character) to read a specific font. "Intelligent" systems with a high degree
of recognition accuracy for most fonts are now common.
• Some systems are even capable of reproducing formatted output that
closely approximates the original scanned page including images, columns
and other non-textual components.
11. Smart Cards
• A smart card, chip card, or integrated circuit card (ICC), is
defined as any pocket-sized card with embedded integrated
circuits which can process information.
• This implies that it can receive input which is processed - by
way of the ICC applications - and delivered as an output.
• There are two broad categories of ICCs.
– Memory cards contain only non-volatile memory storage
components, and perhaps some specific security logic.
– Microprocessor cards contain volatile memory and
microprocessor components.
• The card is made of plastic, generally PVC, but sometimes
ABS.
• The card may embed a hologram to avoid counterfeiting.
12. Speech Recognition
• Speech recognition converts spoken words to machine-readable input
(for example, to the binary code for a string of character codes).
• The term voice recognition may also be used to refer to speech recognition, but more precisely refers to
speaker recognition, which attempts to identify the person speaking, as opposed to what is being said.
• Speech recognition applications include
– Voice dialing (e.g., "Call home")
– Call routing (e.g., "I would like to make a collect call“)
– Domotic appliance control and content-based spoken audio search (e.g., find a podcast where particular words were
spoken)
– Simple data entry (e.g., entering a credit card number)
– Preparation of structured documents (e.g., a radiology report)
– Speech-to-text processing (e.g., word processors or emails)
– In aircraft cockpits (usually termed Direct Voice Input).
• Speech recognition systems can be trained to recognize specific commands and upon confirmation of
correctness instructions can be given to systems without the use of hands.
• This may be useful while driving or to an inspector or engineer in a factory environment.
• Likewise disabled persons may find hands-free computing important in their everyday lives. Just like
visually impaired have found computers useful in their lives.
• This can range from using the tongue, lips, mouth, movement of the head to voice activated interfaces
utilizing Bluetooth technology.
13. C: Welcome back John. Your choices
are Work Orders, Equipment,
Inventory, or More choices.
P: Work orders
C: Update, Create, Work Order
Details?
P: Update
C: What is the Work Order number?
P: One zero zero one four six
C: What would you like to update.
Say "Choices" to hear a list of
options.
P: Set failure class to pumps
P: Set problem to low volume
P: Set status to approved
silence
C: Are you done with this work
order?
P: Yep
C: Anything else?
P: No
C: Goodbye.
C – Computer, P - Person
John is a maintenance foreman after
inspecting a failed piece of equipment.
Rather than wait until he returns from
the site, his able to call in his
information to the application and
approve the work order for dispatch to
maintenance crew.
15. • Insufficient inventory.
• Incorrect shipments.
• Missed delivery deadlines.
• Interrupted production.
• Above all, it takes reliable, up-to-the minute information.
• The mobile capabilities of the mySAP™ Supply Chain Management
solution provide a quick and easy way to gather data accurately
wherever
• it’s generated, and make it available wherever it’s needed.
• This streamlines processes from the supplier to the factory, to the
• truck, and to the customer – keeping you in the picture and
• your customers satisfied.
16. MOBILE SUPPLY CHAIN MANAGEMENT WITH
mySAP™ SUPPLY CHAIN MANAGEMENT
• Supply Chain Visibility
• Integration of Mobile Devices
• Mobile Applications in the areas of
–Mobile Production
–Mobile Shipment Planning
–Mobile Warehouse Management
–Mobile Process Monitoring
–Mobile Status tracking and Analysis
17.
18.
19.
20.
21. The Internet of Things and Supply
Chain of the future – Auto-ID Initiative
• Things like running out of stock or wasted products will no longer exist as we will
know exactly what is being consumed on the other side of the globe.
• Theft will be a thing of the past as we will know where a product is at all times.
• The global association Auto-ID Center was founded in 1999 and is made up of 100
of the largest companies in the world such as Wal-Mart, Coca-Cola, Gillette,
Johnson & Johnson, Pfizer, Procter & Gamble, Unilever, UPS, companies working in
the sector of technology such as SAP, Aliens, Sun as well as five academic research
centers.
• The Auto-ID Center suggests a concept of a future supply chain that is based on
the Internet of objects, i.e. a global application of RFID. They try to harmonize
technology, processes and organization.
• Research is focused on miniaturization (aiming for a size of 0.3 mm/chip),
reduction in the price per single device (aiming at around $0.05 per unit), the
development of innovative application such as payment without any physical
contact (Sony/Philips), domotics (clothes equipped with radio tags and intelligent
washing machines) and, last but not least, sporting events (timing at the Berlin
marathon).
The mySAP™ Supply Chain Management (mySAP SCM) solution takes supply chain visibility to new levels.
By integrating PDAs, radio frequency devices, and onboard computers with your information systems, mySAP SCM extends the power of enterprise computing to new processes, people, and places.
Robust and intuitive, mobile devices are employed today in all areas of supply chain management, from planning and production to warehouse and transportation.
Logistics today involves managing a wide range of business partners. And passing information from partner to partner in a sequential fashion is simply not good enough. In response, companies are replacing traditional, linear supply chains with adaptive supply chain networks in which partners are given simultaneous, accurate information about demand, supply, and operational activities.
The mobile capabilities of mySAP SCM provide a convenient, time-saving, and highly accurate means of capturing data on movements of goods and other events.
These capabilities simplify checking and monitoring tasks and provide up-to-date information on process status, enabling you to react swiftly to unforeseen events.
And that’s exactly what you need to create and manage a sophisticated adaptive supply network.
The following features show you just how versatile mobile supply chain management with mySAP SCM can be