SlideShare a Scribd company logo
AN INTRODUCTION TO
          BARCODE

     Presented By: Van Chiang
1.   Brief History of Barcode
2.   Why barcode? Advantages.
3.   Symbologies.
     - Types, Differences between 1D and 2D
4.   Composition of a barcode.
     - check digit, silent zone, human readable
5.   What affect scannability of barcode?
     - scan method, environment, print quality,
        print surface, color combination
6.   Q&A
Cost Integrity
Ease of Setup
Data Effectiveness
Accuracy
 Learn use the
SPEED to operator -equipment characters typed,COST
                                effectively in less
Speed
 Barcode systems have a demonstrated payback
 Keyboard
than 15 minutes.
                    every 1,000                  an
average of ten keying errors. months.
period of six to eighteen
 System are easier to setup than other means of
A bar code label of reads, there is one error. a wide
 Provide the highesttwelve characters can be
data ACCURACY of level of reliability in
                                   EASY SETUP
 (OCR) - every 10,000 the existence of interfacing
      entry because
wanded in approximately the time it takes a
variety of datasoftware. 3 million reads, one error.
hardware and application.
 BC normal scanner – every
 Barcode operator easilyvalue by keystrokes.
keyboardscanner - every 70 million notcommonly
             labels are to make two only by saving
 Barcode of data loss.create read reads, one error.
             systems
 BCin term
*error laser     DATA INTEGRITY
time, but devices,preventing costly errors.
available also by and can be printed universally.
LINEAR/1D BARCODE   2D BARCODE
o Code 39           o Code Aztec
o Code 128          o Code PDF417
o Code UPC          o Code Datamatrix
o Code EAN          o Code QR
o Code ITF          o Code Maxicode
o Code POSTNET      o etc…
o etc…
Most common coding for custom usage.
Can be decoded by virtually any barcode scanner.
One of the oldest modern barcode.
Encodes 44 characters only
Each character is composed of nine elements:
five bars and four spaces.
Three of the nine elements are wide (binary value 1),
and six elements are narrow (binary value 0).
An additional common character (*) is used for both
start and stop delimiters.
No checksum required.
Drawback is low data density, require more space to
encode data.
High density barcode. Suitable for small products.
Common for custom usage.
Encode all 128 characters available in ASCII format.
Have a mandatory check character maximizes data integrity.
The major drawback is the barcode must be printed by higher
resolution printer to be scanned correctly.
For use in the retail grocery industry – point of sales application.
 Has several good features such as check digit and good density.
 A limited number of characters (numeric characters only).
 In UPC, 1 digit for a system number,
5 digits for the manufacturer number,
5 digits for the product number, and one checksum digit.
In EAN/JAN, 2 numbers for the country code,
10 numbers for the data characters, and one checksum digit.
Store up to about 1,800 printable ASCII characters
    or 1,100 binary characters per symbol.
   Has three different encoding schemes that repeat every
    three rows.
   Enables the symbol to sustain considerable damage and
   still be readable.
PDF stands for Portable Data File.
 A unique start and stop pattern which identifies the format as PDF417.
 All rows have the same number of codewords.
 Every codeword contains four bars and four spaces.
 The total width of a codeword is 17 times the width of the narrowest allowed
vertical bar
Encode up to 3750 characters .
Built on a square grid with a bullseye pattern at its center.
Data is encoded in a series of "layers" that circle around
the bullseye pattern.
Each additional layer completely surrounds the previous layer
thus causing the symbol to grow in size as more data is encoded.
Orientation independent scanning.
Commonly used as a electronic boarding pass which is send to the
handphone, or printed out as hardcopy ticket.
Resemble a checkerboard pattern. Low contrast possible.
Primarily used for its small size (50 characters in 2 – 3mm2)
Exceptional data capacity, capable of encoding up to
2335 alphanumeric characters.
Consist of two solid adjacent borders in an "L" shape
(called the "finder pattern") and two other borders consisting
of alternating dark and light "cells“ (called the "timing pattern").
The EIA recommends using Data Matrix for labeling
small electronic components.
            Engraved on PCB                        Printed on Label
QR is the short form for Quick Response.
Can encode numeric only, alphanumeric, binary, kanji/kana.
 used in a much broader context, aimed at mobile phone users
 (known as mobile tagging).
The usage?




               QR Code to be read with a mobile phone.
LINEAR/1D                  2D
DATA STORAGE     HORIZONTAL ONLY       HORIZONTAL AND VERTICAL

DATA CAPACITY    UP TO 20 CHARACTERS   UP TO SEVERAL
                                       THOUSANDS CHARACTERS

DATA INTEGRITY   DATA LOSS WHEN ANY    DATA REMAINED INTACT
                 AREA OF BARCODE       ALTHOUGH UP TO 20%
                 DAMAGED               AREA OF BARCODE
                                       DAMAGED
Inadequate Quiet Zone
Shiny background
Scanning angle
External lighting
Defect Printing
Incorrect scanning distance
Wrong color combination
Q&A

More Related Content

What's hot

Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
JASON WOODHOUSE
 
Understanding Bar Codes
Understanding Bar Codes  Understanding Bar Codes
Understanding Bar Codes
NEPSLLC
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
Neeta Chavare
 
Barcode technology
Barcode  technologyBarcode  technology
Barcode technology
Vidya Sagar
 
Barcode
BarcodeBarcode
Barcode
Shahabaj786
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
Badshah34
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation
sh94880
 
Types and Applications of Linear Barcode
Types and Applications of Linear BarcodeTypes and Applications of Linear Barcode
Types and Applications of Linear Barcode
priyankadrpu
 
Bar code technology
Bar code technologyBar code technology
Bar code technology
bhupathi vikas
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technology
bhupathi vikas
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
adil529
 
Automatic data capture
Automatic data captureAutomatic data capture
Automatic data capture
Lavakush Verma
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
Subhash Vadadoriya
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technology
DeveshDRA
 
Barcode Reader(Scanner)
Barcode Reader(Scanner)Barcode Reader(Scanner)
Barcode Reader(Scanner)
Prashant Ballal
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 
Bar Code
Bar CodeBar Code
Bar Code
nayakslideshare
 
Barcode history and Future
Barcode history and Future Barcode history and Future
Barcode history and Future
Maruf Alom
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
guest561f62
 
Bar code-technology in tire industry
Bar code-technology in tire industryBar code-technology in tire industry
Bar code-technology in tire industry
hemanth102030
 

What's hot (20)

Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Understanding Bar Codes
Understanding Bar Codes  Understanding Bar Codes
Understanding Bar Codes
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 
Barcode technology
Barcode  technologyBarcode  technology
Barcode technology
 
Barcode
BarcodeBarcode
Barcode
 
Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation
 
Types and Applications of Linear Barcode
Types and Applications of Linear BarcodeTypes and Applications of Linear Barcode
Types and Applications of Linear Barcode
 
Bar code technology
Bar code technologyBar code technology
Bar code technology
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technology
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
 
Automatic data capture
Automatic data captureAutomatic data capture
Automatic data capture
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technology
 
Barcode Reader(Scanner)
Barcode Reader(Scanner)Barcode Reader(Scanner)
Barcode Reader(Scanner)
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
 
Bar Code
Bar CodeBar Code
Bar Code
 
Barcode history and Future
Barcode history and Future Barcode history and Future
Barcode history and Future
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
 
Bar code-technology in tire industry
Bar code-technology in tire industryBar code-technology in tire industry
Bar code-technology in tire industry
 

Similar to Barcode printing presentation lgi

Barcode Introduction.pdf
Barcode Introduction.pdfBarcode Introduction.pdf
Barcode Introduction.pdf
MSetiawanHidayat1
 
Workshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KITWorkshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KIT
Edwin Rojas
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
 
bar coding
bar codingbar coding
bar coding
ayoolatruth
 
Barcode Decoder
Barcode DecoderBarcode Decoder
Barcode Decoder
ArijitDhali
 
Silchar paper final
Silchar paper finalSilchar paper final
Silchar paper final
Kishor Satpathy
 
2 d barcodes(NSM)
 2 d barcodes(NSM) 2 d barcodes(NSM)
2 d barcodes(NSM)
selva1090
 
Qr codes
Qr codesQr codes
Qr codes
jaiksolanki
 
Workshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print BarcodeWorkshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print Barcode
Edwin Rojas
 
Barcoding & RFID
Barcoding & RFIDBarcoding & RFID
Barcoding & RFID
Navindu Munidasa
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
VyakhayaYadav
 
The Definitive Guide to Barcoding
The Definitive Guide to BarcodingThe Definitive Guide to Barcoding
The Definitive Guide to Barcoding
ADCBarcode
 
Qr code
Qr codeQr code
Qr code
Ajay Verma
 
Tdp 225 www.trridevlabelss.com
Tdp 225 www.trridevlabelss.comTdp 225 www.trridevlabelss.com
Tdp 225 www.trridevlabelss.com
Trridev Labelss Mfg Co
 
May doc ma_vach_opticon_h25_2_d
May doc ma_vach_opticon_h25_2_dMay doc ma_vach_opticon_h25_2_d
May doc ma_vach_opticon_h25_2_d
OPTICON VIETNAM LLC
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
mrudula14
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
Unitedworld School Of Business
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]
dherendra dev
 
Smart Card Personalization Machine PTA-8500B
Smart Card Personalization Machine PTA-8500BSmart Card Personalization Machine PTA-8500B
Smart Card Personalization Machine PTA-8500B
default RSID SOLUTIONS
 
Bosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data SheetBosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data Sheet
JMAC Supply
 

Similar to Barcode printing presentation lgi (20)

Barcode Introduction.pdf
Barcode Introduction.pdfBarcode Introduction.pdf
Barcode Introduction.pdf
 
Workshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KITWorkshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KIT
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
bar coding
bar codingbar coding
bar coding
 
Barcode Decoder
Barcode DecoderBarcode Decoder
Barcode Decoder
 
Silchar paper final
Silchar paper finalSilchar paper final
Silchar paper final
 
2 d barcodes(NSM)
 2 d barcodes(NSM) 2 d barcodes(NSM)
2 d barcodes(NSM)
 
Qr codes
Qr codesQr codes
Qr codes
 
Workshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print BarcodeWorkshop 2016 Genebank IT - Print Barcode
Workshop 2016 Genebank IT - Print Barcode
 
Barcoding & RFID
Barcoding & RFIDBarcoding & RFID
Barcoding & RFID
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
 
The Definitive Guide to Barcoding
The Definitive Guide to BarcodingThe Definitive Guide to Barcoding
The Definitive Guide to Barcoding
 
Qr code
Qr codeQr code
Qr code
 
Tdp 225 www.trridevlabelss.com
Tdp 225 www.trridevlabelss.comTdp 225 www.trridevlabelss.com
Tdp 225 www.trridevlabelss.com
 
May doc ma_vach_opticon_h25_2_d
May doc ma_vach_opticon_h25_2_dMay doc ma_vach_opticon_h25_2_d
May doc ma_vach_opticon_h25_2_d
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]
 
Smart Card Personalization Machine PTA-8500B
Smart Card Personalization Machine PTA-8500BSmart Card Personalization Machine PTA-8500B
Smart Card Personalization Machine PTA-8500B
 
Bosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data SheetBosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data Sheet
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Barcode printing presentation lgi

  • 1. AN INTRODUCTION TO BARCODE Presented By: Van Chiang
  • 2. 1. Brief History of Barcode 2. Why barcode? Advantages. 3. Symbologies. - Types, Differences between 1D and 2D 4. Composition of a barcode. - check digit, silent zone, human readable 5. What affect scannability of barcode? - scan method, environment, print quality, print surface, color combination 6. Q&A
  • 3.
  • 4. Cost Integrity Ease of Setup Data Effectiveness Accuracy  Learn use the SPEED to operator -equipment characters typed,COST effectively in less Speed  Barcode systems have a demonstrated payback  Keyboard than 15 minutes. every 1,000 an average of ten keying errors. months. period of six to eighteen  System are easier to setup than other means of A bar code label of reads, there is one error. a wide  Provide the highesttwelve characters can be data ACCURACY of level of reliability in EASY SETUP  (OCR) - every 10,000 the existence of interfacing entry because wanded in approximately the time it takes a variety of datasoftware. 3 million reads, one error. hardware and application.  BC normal scanner – every  Barcode operator easilyvalue by keystrokes. keyboardscanner - every 70 million notcommonly labels are to make two only by saving  Barcode of data loss.create read reads, one error. systems  BCin term *error laser DATA INTEGRITY time, but devices,preventing costly errors. available also by and can be printed universally.
  • 5. LINEAR/1D BARCODE 2D BARCODE o Code 39 o Code Aztec o Code 128 o Code PDF417 o Code UPC o Code Datamatrix o Code EAN o Code QR o Code ITF o Code Maxicode o Code POSTNET o etc… o etc…
  • 6. Most common coding for custom usage. Can be decoded by virtually any barcode scanner. One of the oldest modern barcode. Encodes 44 characters only Each character is composed of nine elements: five bars and four spaces. Three of the nine elements are wide (binary value 1), and six elements are narrow (binary value 0). An additional common character (*) is used for both start and stop delimiters. No checksum required. Drawback is low data density, require more space to encode data.
  • 7. High density barcode. Suitable for small products. Common for custom usage. Encode all 128 characters available in ASCII format. Have a mandatory check character maximizes data integrity. The major drawback is the barcode must be printed by higher resolution printer to be scanned correctly.
  • 8. For use in the retail grocery industry – point of sales application. Has several good features such as check digit and good density. A limited number of characters (numeric characters only). In UPC, 1 digit for a system number, 5 digits for the manufacturer number, 5 digits for the product number, and one checksum digit. In EAN/JAN, 2 numbers for the country code, 10 numbers for the data characters, and one checksum digit.
  • 9. Store up to about 1,800 printable ASCII characters or 1,100 binary characters per symbol. Has three different encoding schemes that repeat every three rows. Enables the symbol to sustain considerable damage and still be readable. PDF stands for Portable Data File.  A unique start and stop pattern which identifies the format as PDF417.  All rows have the same number of codewords.  Every codeword contains four bars and four spaces.  The total width of a codeword is 17 times the width of the narrowest allowed vertical bar
  • 10. Encode up to 3750 characters . Built on a square grid with a bullseye pattern at its center. Data is encoded in a series of "layers" that circle around the bullseye pattern. Each additional layer completely surrounds the previous layer thus causing the symbol to grow in size as more data is encoded. Orientation independent scanning. Commonly used as a electronic boarding pass which is send to the handphone, or printed out as hardcopy ticket.
  • 11. Resemble a checkerboard pattern. Low contrast possible. Primarily used for its small size (50 characters in 2 – 3mm2) Exceptional data capacity, capable of encoding up to 2335 alphanumeric characters. Consist of two solid adjacent borders in an "L" shape (called the "finder pattern") and two other borders consisting of alternating dark and light "cells“ (called the "timing pattern"). The EIA recommends using Data Matrix for labeling small electronic components. Engraved on PCB Printed on Label
  • 12. QR is the short form for Quick Response. Can encode numeric only, alphanumeric, binary, kanji/kana. used in a much broader context, aimed at mobile phone users (known as mobile tagging). The usage? QR Code to be read with a mobile phone.
  • 13. LINEAR/1D 2D DATA STORAGE HORIZONTAL ONLY HORIZONTAL AND VERTICAL DATA CAPACITY UP TO 20 CHARACTERS UP TO SEVERAL THOUSANDS CHARACTERS DATA INTEGRITY DATA LOSS WHEN ANY DATA REMAINED INTACT AREA OF BARCODE ALTHOUGH UP TO 20% DAMAGED AREA OF BARCODE DAMAGED
  • 14.
  • 15. Inadequate Quiet Zone Shiny background Scanning angle External lighting Defect Printing Incorrect scanning distance Wrong color combination
  • 16. Q&A