SlideShare a Scribd company logo
1 of 22
Supply Chain/ERP
Automatic Data Capture
Harikrishnan Lakshminarayanan
Technology Consultant – Manufacturing and Automotive
Manufacturing Operations and Consulting Solutions
Satyam Computer Services Limited
Agenda
• Automatic Identification and Data Capture
– Barcodes
– Radio Frequency Identification (RFID)
– Biometrics
– Magnetic Stripes
– Optical Character Recognition (OCR)
– Smart Cards
– Speech Recognition
• Supply Chain / ERP
– SAP
– ORACLE
• The Internet of Things and supply chain of the future
Automatic Identification and Data Capture
• Automatic Identification and Data Capture (AIDC) refers to
the methods of
– automatically identifying objects
– collecting data about them and
– entering that data directly into computer systems
• Technologies typically considered as part of AIDC include
– Bar Codes
– Radio Frequency Identification RFID
– Biometrics
– Magnetic Stripes
– Optical Character Recognition OCR
– Smart Cards and
– Voice Recognition
• AIDC is also commonly referred to as “Automatic
Identification,” “Auto-ID,” and "Automatic Data Capture."
Barcodes
• A barcode is a machine-readable representation of information
(usually dark ink on a light background to create high and low
reflectance which is converted to 1s and 0s).
• Originally, barcodes stored data in the widths and spacings of
printed parallel lines, but today they also come in patterns of dots,
concentric circles, and text codes hidden within images.
• Barcodes can be read by optical scanners called barcode readers or
scanned from an image by special software.
• Barcodes are widely used to implement Auto ID Data Capture
(AIDC) systems that improve the speed and accuracy of computer
data entry.
• An advantage over other methods of AIDC is that it is less expensive
to implement. It will cost about US$0.005 to implement a barcode
compared to passive RFID which still costs about US$0.07 to
US$0.30 per tag.
Usage of Barcodes in Warehouse
Usage of Barcodes in Assembly Line
Radio Frequency Identification
(RFID)
• Radio-frequency identification (RFID) is an automatic identification method,
relying on storing and remotely retrieving data using devices called RFID tags or
transponders.
• An RFID tag is an object that can be applied to or incorporated into a product,
animal, or person for the purpose of identification using radio waves. Some tags
can be read from several meters away and beyond the line of sight of the reader.
• Most RFID tags contain at least two parts. One is an integrated circuit for storing
and processing information, modulating and demodulating a (RF) signal, and other
specialized functions. The second is an antenna for receiving and transmitting the
signal.
• A technology called chip less RFID allows for discrete identification of tags without
an integrated circuit, thereby allowing tags to be printed directly onto assets at a
lower cost than traditional tags.
• Today, a significant thrust in RFID use is in enterprise supply chain management,
improving the efficiency of inventory tracking and management. However, a threat
is looming that the current growth and adoption in enterprise supply chain market
will not be sustainable. A fair cost-sharing mechanism, rational motives and
justified returns from RFID technology investments are the key ingredients to
achieve long-term and sustainable RFID technology adoption
Biometrics
• Biometrics is the method to recognize or verify the identity
of an individual based on its unique physiological or
behavioral characteristics such as Fingerprint, face, palm,
iris, retinal, vein, voice and handwriting.
• Fingerprint verification is the most established and
matured biometrics techniques.
• Biometrics authenticates an individual based on its unique
characteristics.
• One can consider himself as his own password, which can
hardly be forgotten, stolen and forged. Thus, biometrics
provides a securer solution comparing with PIN or Smart
Card identification.
Magnetic Stripes
• A magnetic stripe card is a type of card capable of
storing data by modifying the magnetism of tiny iron-
based magnetic particles on a band of magnetic
material on the card.
• The magnetic stripe, sometimes called a magstripe, is
read by physical contact and swiping past a reading
head.
• Magnetic stripe cards are commonly used in credit
cards, identity cards, and transportation tickets.
• They may also contain an RFID tag, a transponder
device and/or a microchip mostly used for business
premises access control or electronic payment.
Optical Character Recognition
(OCR)
• Optical character recognition, usually abbreviated to OCR, is the
mechanical or electronic translation of images of handwritten, typewritten
or printed text (usually captured by a scanner) into machine-editable text.
• OCR is a field of research in pattern recognition, artificial intelligence and
machine vision. Though academic research in the field continues, the
focus on OCR has shifted to implementation of proven techniques.
• Optical character recognition (using optical techniques such as mirrors and
lenses) and digital character recognition (using scanners and computer
algorithms) were originally considered separate fields. Because very few
applications survive that use true optical techniques, the OCR term has
now been broadened to include digital image processing as well.
• Early systems required training (the provision of known samples of each
character) to read a specific font. "Intelligent" systems with a high degree
of recognition accuracy for most fonts are now common.
• Some systems are even capable of reproducing formatted output that
closely approximates the original scanned page including images, columns
and other non-textual components.
Smart Cards
• A smart card, chip card, or integrated circuit card (ICC), is
defined as any pocket-sized card with embedded integrated
circuits which can process information.
• This implies that it can receive input which is processed - by
way of the ICC applications - and delivered as an output.
• There are two broad categories of ICCs.
– Memory cards contain only non-volatile memory storage
components, and perhaps some specific security logic.
– Microprocessor cards contain volatile memory and
microprocessor components.
• The card is made of plastic, generally PVC, but sometimes
ABS.
• The card may embed a hologram to avoid counterfeiting.
Speech Recognition
• Speech recognition converts spoken words to machine-readable input
(for example, to the binary code for a string of character codes).
• The term voice recognition may also be used to refer to speech recognition, but more precisely refers to
speaker recognition, which attempts to identify the person speaking, as opposed to what is being said.
• Speech recognition applications include
– Voice dialing (e.g., "Call home")
– Call routing (e.g., "I would like to make a collect call“)
– Domotic appliance control and content-based spoken audio search (e.g., find a podcast where particular words were
spoken)
– Simple data entry (e.g., entering a credit card number)
– Preparation of structured documents (e.g., a radiology report)
– Speech-to-text processing (e.g., word processors or emails)
– In aircraft cockpits (usually termed Direct Voice Input).
• Speech recognition systems can be trained to recognize specific commands and upon confirmation of
correctness instructions can be given to systems without the use of hands.
• This may be useful while driving or to an inspector or engineer in a factory environment.
• Likewise disabled persons may find hands-free computing important in their everyday lives. Just like
visually impaired have found computers useful in their lives.
• This can range from using the tongue, lips, mouth, movement of the head to voice activated interfaces
utilizing Bluetooth technology.
C: Welcome back John. Your choices
are Work Orders, Equipment,
Inventory, or More choices.
P: Work orders
C: Update, Create, Work Order
Details?
P: Update
C: What is the Work Order number?
P: One zero zero one four six
C: What would you like to update.
Say "Choices" to hear a list of
options.
P: Set failure class to pumps
P: Set problem to low volume
P: Set status to approved
silence
C: Are you done with this work
order?
P: Yep
C: Anything else?
P: No
C: Goodbye.
C – Computer, P - Person
John is a maintenance foreman after
inspecting a failed piece of equipment.
Rather than wait until he returns from
the site, his able to call in his
information to the application and
approve the work order for dispatch to
maintenance crew.
Supply Chain / ERP
Mobile Supply Chain Applications
• Insufficient inventory.
• Incorrect shipments.
• Missed delivery deadlines.
• Interrupted production.
• Above all, it takes reliable, up-to-the minute information.
• The mobile capabilities of the mySAP™ Supply Chain Management
solution provide a quick and easy way to gather data accurately
wherever
• it’s generated, and make it available wherever it’s needed.
• This streamlines processes from the supplier to the factory, to the
• truck, and to the customer – keeping you in the picture and
• your customers satisfied.
MOBILE SUPPLY CHAIN MANAGEMENT WITH
mySAP™ SUPPLY CHAIN MANAGEMENT
• Supply Chain Visibility
• Integration of Mobile Devices
• Mobile Applications in the areas of
–Mobile Production
–Mobile Shipment Planning
–Mobile Warehouse Management
–Mobile Process Monitoring
–Mobile Status tracking and Analysis
The Internet of Things and Supply
Chain of the future – Auto-ID Initiative
• Things like running out of stock or wasted products will no longer exist as we will
know exactly what is being consumed on the other side of the globe.
• Theft will be a thing of the past as we will know where a product is at all times.
• The global association Auto-ID Center was founded in 1999 and is made up of 100
of the largest companies in the world such as Wal-Mart, Coca-Cola, Gillette,
Johnson & Johnson, Pfizer, Procter & Gamble, Unilever, UPS, companies working in
the sector of technology such as SAP, Aliens, Sun as well as five academic research
centers.
• The Auto-ID Center suggests a concept of a future supply chain that is based on
the Internet of objects, i.e. a global application of RFID. They try to harmonize
technology, processes and organization.
• Research is focused on miniaturization (aiming for a size of 0.3 mm/chip),
reduction in the price per single device (aiming at around $0.05 per unit), the
development of innovative application such as payment without any physical
contact (Sony/Philips), domotics (clothes equipped with radio tags and intelligent
washing machines) and, last but not least, sporting events (timing at the Berlin
marathon).
Q & A

More Related Content

Similar to Automatic Data Capture.pptx

My best effort
My best effortMy best effort
My best effortsujataray
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!Barcoding, Inc.
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationChristopher Pappas
 
BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.Gauri Agrawal
 

Similar to Automatic Data Capture.pptx (20)

RFID PPT
RFID PPTRFID PPT
RFID PPT
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
My best effort
My best effortMy best effort
My best effort
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
Avi solution2
Avi solution2Avi solution2
Avi solution2
 
Card reader
Card readerCard reader
Card reader
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Bar code VS RFID
Bar code VS RFIDBar code VS RFID
Bar code VS RFID
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
Sdfgh
SdfghSdfgh
Sdfgh
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad EscortsCall girls in Ahmedabad High profile
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 

Recently uploaded (20)

Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
(ISHITA) Call Girls Service Hyderabad Call Now 8617697112 Hyderabad Escorts
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 

Automatic Data Capture.pptx

  • 1. Supply Chain/ERP Automatic Data Capture Harikrishnan Lakshminarayanan Technology Consultant – Manufacturing and Automotive Manufacturing Operations and Consulting Solutions Satyam Computer Services Limited
  • 2. Agenda • Automatic Identification and Data Capture – Barcodes – Radio Frequency Identification (RFID) – Biometrics – Magnetic Stripes – Optical Character Recognition (OCR) – Smart Cards – Speech Recognition • Supply Chain / ERP – SAP – ORACLE • The Internet of Things and supply chain of the future
  • 3. Automatic Identification and Data Capture • Automatic Identification and Data Capture (AIDC) refers to the methods of – automatically identifying objects – collecting data about them and – entering that data directly into computer systems • Technologies typically considered as part of AIDC include – Bar Codes – Radio Frequency Identification RFID – Biometrics – Magnetic Stripes – Optical Character Recognition OCR – Smart Cards and – Voice Recognition • AIDC is also commonly referred to as “Automatic Identification,” “Auto-ID,” and "Automatic Data Capture."
  • 4. Barcodes • A barcode is a machine-readable representation of information (usually dark ink on a light background to create high and low reflectance which is converted to 1s and 0s). • Originally, barcodes stored data in the widths and spacings of printed parallel lines, but today they also come in patterns of dots, concentric circles, and text codes hidden within images. • Barcodes can be read by optical scanners called barcode readers or scanned from an image by special software. • Barcodes are widely used to implement Auto ID Data Capture (AIDC) systems that improve the speed and accuracy of computer data entry. • An advantage over other methods of AIDC is that it is less expensive to implement. It will cost about US$0.005 to implement a barcode compared to passive RFID which still costs about US$0.07 to US$0.30 per tag.
  • 5. Usage of Barcodes in Warehouse
  • 6. Usage of Barcodes in Assembly Line
  • 7. Radio Frequency Identification (RFID) • Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. • An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. • Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. • A technology called chip less RFID allows for discrete identification of tags without an integrated circuit, thereby allowing tags to be printed directly onto assets at a lower cost than traditional tags. • Today, a significant thrust in RFID use is in enterprise supply chain management, improving the efficiency of inventory tracking and management. However, a threat is looming that the current growth and adoption in enterprise supply chain market will not be sustainable. A fair cost-sharing mechanism, rational motives and justified returns from RFID technology investments are the key ingredients to achieve long-term and sustainable RFID technology adoption
  • 8. Biometrics • Biometrics is the method to recognize or verify the identity of an individual based on its unique physiological or behavioral characteristics such as Fingerprint, face, palm, iris, retinal, vein, voice and handwriting. • Fingerprint verification is the most established and matured biometrics techniques. • Biometrics authenticates an individual based on its unique characteristics. • One can consider himself as his own password, which can hardly be forgotten, stolen and forged. Thus, biometrics provides a securer solution comparing with PIN or Smart Card identification.
  • 9. Magnetic Stripes • A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron- based magnetic particles on a band of magnetic material on the card. • The magnetic stripe, sometimes called a magstripe, is read by physical contact and swiping past a reading head. • Magnetic stripe cards are commonly used in credit cards, identity cards, and transportation tickets. • They may also contain an RFID tag, a transponder device and/or a microchip mostly used for business premises access control or electronic payment.
  • 10. Optical Character Recognition (OCR) • Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic translation of images of handwritten, typewritten or printed text (usually captured by a scanner) into machine-editable text. • OCR is a field of research in pattern recognition, artificial intelligence and machine vision. Though academic research in the field continues, the focus on OCR has shifted to implementation of proven techniques. • Optical character recognition (using optical techniques such as mirrors and lenses) and digital character recognition (using scanners and computer algorithms) were originally considered separate fields. Because very few applications survive that use true optical techniques, the OCR term has now been broadened to include digital image processing as well. • Early systems required training (the provision of known samples of each character) to read a specific font. "Intelligent" systems with a high degree of recognition accuracy for most fonts are now common. • Some systems are even capable of reproducing formatted output that closely approximates the original scanned page including images, columns and other non-textual components.
  • 11. Smart Cards • A smart card, chip card, or integrated circuit card (ICC), is defined as any pocket-sized card with embedded integrated circuits which can process information. • This implies that it can receive input which is processed - by way of the ICC applications - and delivered as an output. • There are two broad categories of ICCs. – Memory cards contain only non-volatile memory storage components, and perhaps some specific security logic. – Microprocessor cards contain volatile memory and microprocessor components. • The card is made of plastic, generally PVC, but sometimes ABS. • The card may embed a hologram to avoid counterfeiting.
  • 12. Speech Recognition • Speech recognition converts spoken words to machine-readable input (for example, to the binary code for a string of character codes). • The term voice recognition may also be used to refer to speech recognition, but more precisely refers to speaker recognition, which attempts to identify the person speaking, as opposed to what is being said. • Speech recognition applications include – Voice dialing (e.g., "Call home") – Call routing (e.g., "I would like to make a collect call“) – Domotic appliance control and content-based spoken audio search (e.g., find a podcast where particular words were spoken) – Simple data entry (e.g., entering a credit card number) – Preparation of structured documents (e.g., a radiology report) – Speech-to-text processing (e.g., word processors or emails) – In aircraft cockpits (usually termed Direct Voice Input). • Speech recognition systems can be trained to recognize specific commands and upon confirmation of correctness instructions can be given to systems without the use of hands. • This may be useful while driving or to an inspector or engineer in a factory environment. • Likewise disabled persons may find hands-free computing important in their everyday lives. Just like visually impaired have found computers useful in their lives. • This can range from using the tongue, lips, mouth, movement of the head to voice activated interfaces utilizing Bluetooth technology.
  • 13. C: Welcome back John. Your choices are Work Orders, Equipment, Inventory, or More choices. P: Work orders C: Update, Create, Work Order Details? P: Update C: What is the Work Order number? P: One zero zero one four six C: What would you like to update. Say "Choices" to hear a list of options. P: Set failure class to pumps P: Set problem to low volume P: Set status to approved silence C: Are you done with this work order? P: Yep C: Anything else? P: No C: Goodbye. C – Computer, P - Person John is a maintenance foreman after inspecting a failed piece of equipment. Rather than wait until he returns from the site, his able to call in his information to the application and approve the work order for dispatch to maintenance crew.
  • 14. Supply Chain / ERP Mobile Supply Chain Applications
  • 15. • Insufficient inventory. • Incorrect shipments. • Missed delivery deadlines. • Interrupted production. • Above all, it takes reliable, up-to-the minute information. • The mobile capabilities of the mySAP™ Supply Chain Management solution provide a quick and easy way to gather data accurately wherever • it’s generated, and make it available wherever it’s needed. • This streamlines processes from the supplier to the factory, to the • truck, and to the customer – keeping you in the picture and • your customers satisfied.
  • 16. MOBILE SUPPLY CHAIN MANAGEMENT WITH mySAP™ SUPPLY CHAIN MANAGEMENT • Supply Chain Visibility • Integration of Mobile Devices • Mobile Applications in the areas of –Mobile Production –Mobile Shipment Planning –Mobile Warehouse Management –Mobile Process Monitoring –Mobile Status tracking and Analysis
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. The Internet of Things and Supply Chain of the future – Auto-ID Initiative • Things like running out of stock or wasted products will no longer exist as we will know exactly what is being consumed on the other side of the globe. • Theft will be a thing of the past as we will know where a product is at all times. • The global association Auto-ID Center was founded in 1999 and is made up of 100 of the largest companies in the world such as Wal-Mart, Coca-Cola, Gillette, Johnson & Johnson, Pfizer, Procter & Gamble, Unilever, UPS, companies working in the sector of technology such as SAP, Aliens, Sun as well as five academic research centers. • The Auto-ID Center suggests a concept of a future supply chain that is based on the Internet of objects, i.e. a global application of RFID. They try to harmonize technology, processes and organization. • Research is focused on miniaturization (aiming for a size of 0.3 mm/chip), reduction in the price per single device (aiming at around $0.05 per unit), the development of innovative application such as payment without any physical contact (Sony/Philips), domotics (clothes equipped with radio tags and intelligent washing machines) and, last but not least, sporting events (timing at the Berlin marathon).
  • 22. Q & A

Editor's Notes

  1. The mySAP™ Supply Chain Management (mySAP SCM) solution takes supply chain visibility to new levels. By integrating PDAs, radio frequency devices, and onboard computers with your information systems, mySAP SCM extends the power of enterprise computing to new processes, people, and places. Robust and intuitive, mobile devices are employed today in all areas of supply chain management, from planning and production to warehouse and transportation. Logistics today involves managing a wide range of business partners. And passing information from partner to partner in a sequential fashion is simply not good enough. In response, companies are replacing traditional, linear supply chains with adaptive supply chain networks in which partners are given simultaneous, accurate information about demand, supply, and operational activities. The mobile capabilities of mySAP SCM provide a convenient, time-saving, and highly accurate means of capturing data on movements of goods and other events. These capabilities simplify checking and monitoring tasks and provide up-to-date information on process status, enabling you to react swiftly to unforeseen events. And that’s exactly what you need to create and manage a sophisticated adaptive supply network. The following features show you just how versatile mobile supply chain management with mySAP SCM can be