SlideShare a Scribd company logo
1 of 4
Download to read offline
System of Detection and Scanning Bar Codes
from Raspberry Pi Web Camera
Roman Diachok, Roman Dunets, Halyna Klym
Lviv Polytechnic National University, 12 S. Bandery Str., Lviv, 79013, Ukraine, E – mail: klymha@yahoo.com
Abstract— This work is focuses on the problem of
detecting and scanning bar codes in video stream. The block
diagram of a system identifying bar codes in panoramic
images using Raspberry Pi 2 Model B was developed. The
program algorithm of the system detection and scanning bar
codes video stream for Raspberry Pi was proposed. It is
established that systems can be used in industry, medicine,
and in the control system.
Keywords—Raspberry Pi; bar code; structural scheme;
algorithm; OpenCv
I. INTRODUCTION
Using bar codes are dictated by the extremely large
volume of supplies, territorial scattering of interconnected
organizations and enterprises, insufficient information on
the properties of the product on its packaging and in the
accompanying documentation, the lack of reliable and
timely information on the receipt of goods to the buyer [1-
4]. The most commonly used today are linear bar codes
for reading information, the disadvantage of which is that
they can submit only small volumes of relational (several
dozen characters). To represent larger volumes of
information, it is necessary to construct bar code with a
two-dimensional structure, for reading it is necessary to
apply a two-axis scan - horizontally and vertically. When
working with linear bar codes a computer database is
needed. The use of two-dimensional barcode allows us to
abandon such a base, since the code capacity is sufficient
to store complete information about the object [5-8]. In
view of this, two-dimensional bar codes should be the
subject of a solid scientific research to build effective
systems for controlling the movement of objects in a
particular system.
Bar code is a sequence of black and white stripes
containing certain information in a suitable form for
reading by technical equipment. Requirements of
introducing bar codes dictated by the extremely high
volume of deliveries, territorial dispersion of
interdependent organizations and enterprises lack
information about product features on the packaging and
accompanying documents. Today the most commonly in
using are linear barcodes for reading information [9,10].
Panoramic photography can take pictures from 180o
and
more, so it can capture at this frame a large number of
products with bar codes. Then, these images will be
scanned and recorded in the database. Then it’s possible to
run other bar codes in the frame [10,11].
II. GRAPHIC DIAGRAM AND STRUCTURAL SCHEME
Taking into account all the requirements and physical
structure of the work, a graph-diagram the algorithm of
program working was created (Fig. 1.). After running the
system, connection is established between Raspberry Pi
and monitor, in particular, whether there was a connection
of ports. If the connection does not successfully complete,
the user will be notified about it. Raspberry Pi 2 Model B
receives data from the camera, after which the data is
analyzed. These data are transmitted to Raspberry Pi via
USB interface. Immediately checks were data transmitted
and received, if an error occurred somewhere, it will be
reported. After the transfer of packets occurred, the basic
algorithm of the system executes. The system performs its
basic function, transmits data via Ethernet interface. The
packets are transmitted and the verification is again
performed, or the packets are converted (transferred).
Then results, must be shown on the screen. After that, the
cycle will repeat until the verification, connection of ports
and connection to the monitor. The cycle continues until
the power is turned off. According to the graph-diagram
of the algorithm of the program was written program for
the system working (Fig.1).
Data from Raspberry Pi screens are transmitted using a
special program VNC Viewer. Raspberry Pi is a hardware
platform on which was installed operating system Linux.
Therefore, for programming and reprogramming any
system the monitor to unicameral computer, or laptop/
computer with the installed program VNC Viewer and log
into the system using IP - address that's
assigned Raspberry PI is needed [12,13].
After starting work the microcontroller is turned on.
After the initialization of USB to work with its protocol
and data transmission (bytes, bits). The camera sends start
readiness messages to Raspberry Pi. The central processor
that works with the USB adapter and the Ethernet adapter.
Raspberry Pi works with these adapters via USB protocol.
The image is taken from a USB camera, then this picture
turns black and white (Math Grey) to search for BAR
codes, checks are made if there has been a conversion, it
will be informed about the user and the system will stop
working.
The 9th
IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2018
24-27 May, 2018, Kyiv, Ukraine
978-1-5386-5903-8/18/$31.00 ©2018 IEEE 184
Start
Receive data from Raspberry Pi
Connection between monitor and
system is established
Connection happened
Transfer Raspberry Pi data via USB
interface
"Connection failed, try
again"
Transfer happend
Implementation of the basic
algorithm of the bar-code scanning
system
Transmitted data via Ethernet
YES
NO
YES
NO
Output results
Packages
delivered
NO
YES
Power off
YES
NO
End
Fig. 1. Graphic diagram of the main algorithm of the device
The next step is to look for BAR codes on a black and
white (symbol), and again check whether the BAR code
was found, if it was found, then the program work
continues, if no then the system notifies that nothing is
found and it’s work stop. The next stage for the system is
the recognition of bar - codes (symbol <- get _ type;
symbol <- get _ data;) at this stage starts Library Zbar. h,
which works by dividing the image into black and white
contrasts, looks for the beginning of the bar code, then
defines the lines by their thickness and decodes the image
and outputs the result by pre-writing it into the database.
In case of not storing an image, it will be reported. It is
possible that the image is not clear and the system is
difficult to detect BAR is the code, in this case, the system
of actions is as follows, a screenshot of the image is made,
which on the screen and then the user determines
independently what this BAR -code is and whether it is
there at all. (Fig. 2.) [13].
Start
USB initialization
Give start signals
Output results
YES
NO
YES
End
Barcode search on images
(symbol)
NO
NO
YES
YES
Convert an image to black
and white
(Math Grey)
Barcode recognition
(symbol<-get_type;
symbol<-get_data)
Saving results
NO
Convert happened
Search happened
Recognition happened Making screenshot
Saving happened
Fig..2. Graphic diagram of the main algorithm of the system
185
BCM2837
Processor
DDR2
SDRAM
RAM
PAM2306
DC converter 5V
Raspberry Pi 2 Model B
USB 2.0
Port
USB 2.0
Port
USB 2.0
Port
Ethernet
Port
LAN9514
USB 2.0 Router and
Ethernet
Power supply 5V
Supply 5V
Micro USB
WEB Camera
(Reading device)
Mouse
Keyboard
Monitor
(Laptop)
Supply 5В
Supply 5В
Supply 5В
Interface USB
Interface USB
Interface USB
Interface
Ethernet
Fig. 3. General view of the structural scheme
For the correct operation of this system it is necessary
to implement the structural scheme of the device. The
block diagram of the device includes (Fig. 3):
1) Unicameral Raspberry Computer Pi;
2) Power supply 5V;
3) WEB camera (it is also a device recognition bar
code);
4) Mouse and keyboard to control the input;
5) Output and control of this system;
6) Monitor (or laptop screen) for outputting
information.
III. RESULTS
After the system was implemented according to the
algorithm and the block diagram. was conducted the
experiment on cameras with different resolutions, namely
the 3 megapixels camera (Logitech C920-C), 5
megapixels (CBR CW-835M Black / Silver) and 12
megapixels (Genius WideCam F100 Full HD) camera.
The experimental data of this experiment are listed in the
Table 1.
The results of the study are shown in this picture. The
chart shows that for cameras with different resolution the
most optimal scanning distance of 30 cm. This is a scan
resolution of 3 megapixels camera is 6 ms for 5
megapixels - 3 ms for 12 megapixels - 2 ms. The speed
depends on the resolution of the camera. Graph of
dependencies on Fig. 4. where is depicted as with different
cameras, in which different resolution scan time is
changed. Results of program’s is on Fig. 5.
Results of research in various resolutions are presented
in Table 1. Performed studies showed the robustness of
the main device management system, and also confirmed
the feasibility of its use. Two-dimensional bar coding of
information as one of the most promising computer
technologies is increasingly used in production and
everyday life of a person. The main advantage of this
technology is the rapid, accurate and reliable input of
information into the computer system by scanning bar
code images.
Table 1. RESULTS OF RESEARCH IN VARIOUS RESOLUTIONS
3
megapixels
Distance
to the
object
Time for
scanning
5
megapixels
Distance to
the object
Time for
scanning
12
megapixels
Distance
to the
object
Time for
scanning
0 1,6 0 1,6 0 1,6
10 1,5 10 1,2 10 0,9
20 0,8 20 0,7 20 0,5
30 0,5 30 0,3 30 0,2
40 0,6 40 0,3 40 0,3
50 0,7 50 0,5 50 0,35
60 0,9 60 0,75 60 0,5
70 1,1 70 0,8 70 0,8
80 1,2 80 0,85 80 0,8
90 1,3 90 1,1 90 0,9
100 1,5 100 1,2 100 1
186
Fig. 4. Graph of dependencies
Fig.5. Results of program’s work
IV. CONCLUSIONS
The structural scheme of detection and scanning bar
codes in images for Raspberry Pi, and the algorithm of the
program is the best option for proper system work, the
optimal distance is 30 cm for identification and
recognition, speed depends on the resolution of the
camera.
REFERENCES
[1] S. Preradovic, and N. C. Karmakar, “Chipless RFID: Bar code of
the future”, IEEE microwave magazine, vol. 11(7), 2010, pp. 87-
97.
[2] M. J. Zilliox, and R. A. Irizarry, “A gene expression bar code for
microarray data”, Nature methods, vol. 4(11),2007, pp. 911.
[3] R. D. Paoletti, T. M. Suess, M. G. Lesko, A. A. Feroli, J. A.
Kennel, J. M. Mahler, and T. Sauders, “Using bar-code technology
and medication observation methodology for safer medication
administration”, American journal of health-system pharmacy,
vol. 64(5), 2007, pp. 536-543.
[4] Z. Chen, H. Li, and C. T. Wong, “An application of bar-code
system for reducing construction wastes”, Automation in
Construction, vol. 11(5), 2002, pp. 521-533.
[5] T. Falas, and H. Kashani, “Two-dimensional bar-code decoding
with camera-equipped mobile phones”, Fifth Annual IEEE
International Conference on Pervasive Computing and
Communications Workshops, 2007 (PerCom Workshops' 07),
2007, pp. 597-600.
[6] C. S. Hwang, “A comparative study of tax-filing methods: manual,
Internet, and two-dimensional bar code”, Journal of Government
Information, vol. 27(2), 2000, pp. 113-127.
[7] C. N. Yang, T. S. Chen, and M. H. Ching, “Embed additional
private information into two-dimensional bar codes by the visual
secret sharing scheme’, Integrated Computer-Aided Engineering,
vol. 13(2), 2006, pp. 189-199.
[8] J. Z. Gao, L. Prakash, and R. Jagatesan, “Understanding 2d-
barcode technology and applications in m-commerce-design and
implementation of a 2d barcode processing solution”, 31st Annual
International Computer Software and Applications Conference
COMPSAC 2007. vol. 2, 2007, pp. 49-56.
[9] L. Chen, H. Man, and H. Jia, “On scanning linear barcodes from
out-of-focus blurred images: a spatial domain dynamic template
matching approach”, IEEE Transactions on Image Processing,
vol. 23(6), 2014, pp. 2637-2650.
[10] E. Joseph, T. Pavlidis, “Bar code waveform recognition using
peaklocations”, IEEE Trans. PAMI, vol. 16(6) 1994, pp. 630-640.
[11] W. Turin, and R. A. Boie, “Bar code recovery via EM algorithm”,
IEEE Trans. PAMI, vol. 46 (2), 1998, pp. 354-363.
[12] K. Q. Wang, “Barcode reading from images captured by
cameraphones”, IEEE MobilityConference, 2005.
[13] R. Dyachok, O. Hrytsyshyn, and S. Salamaha, “System of
Detection and Scanning Bar Codes in Panoramic Images on
Raspberry Pi, 7th International Youth Science Forum LITTERIS
ET ARTIBUS 2017: Computer Science & Engineering (CSE-
2017), 2017, pp. 430-431.
187

More Related Content

What's hot

Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applicationsijsrd.com
 
The Design of an MVB Communication Controller Based on an FPGA
The Design of an MVB Communication Controller Based on an FPGAThe Design of an MVB Communication Controller Based on an FPGA
The Design of an MVB Communication Controller Based on an FPGAIJRESJOURNAL
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Yazeed Khalid
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformIRJET Journal
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoringsweta dargad
 
On-chip debugging for microprocessor design
On-chip debugging for microprocessor designOn-chip debugging for microprocessor design
On-chip debugging for microprocessor designTELKOMNIKA JOURNAL
 
Cs160 chapter 2
Cs160 chapter 2Cs160 chapter 2
Cs160 chapter 2Joe Paris
 
“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...
“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...
“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...Design World
 
IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...
IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...
IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...IRJET Journal
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...journalBEEI
 
Overview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devicesOverview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone deviceseSAT Publishing House
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring systemsweta dargad
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer securityDeepak John
 

What's hot (16)

Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
 
The Design of an MVB Communication Controller Based on an FPGA
The Design of an MVB Communication Controller Based on an FPGAThe Design of an MVB Communication Controller Based on an FPGA
The Design of an MVB Communication Controller Based on an FPGA
 
Bm36382385
Bm36382385Bm36382385
Bm36382385
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
On-chip debugging for microprocessor design
On-chip debugging for microprocessor designOn-chip debugging for microprocessor design
On-chip debugging for microprocessor design
 
Ethercat twincat e
Ethercat twincat eEthercat twincat e
Ethercat twincat e
 
Cs160 chapter 2
Cs160 chapter 2Cs160 chapter 2
Cs160 chapter 2
 
“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...
“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...
“eXtending” the Automation Toolbox: Introduction to TwinCAT 3 Software and eX...
 
IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...
IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...
IRJET-Design of ARM Based Data Acquisition and Control System for Engine Asse...
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...
 
Overview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devicesOverview of wireless network control protocol in smart phone devices
Overview of wireless network control protocol in smart phone devices
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 

Similar to IEEE projects in IOT for B.E / B.Tech Students at SLN Technologies

A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PIIRJET Journal
 
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...INFOGAIN PUBLICATION
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIRJET Journal
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using PythonIRJET Journal
 
IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
IRJET- Portable Camera based Assistive Text and Label Reading for Blind PersonsIRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
IRJET- Portable Camera based Assistive Text and Label Reading for Blind PersonsIRJET Journal
 
IRJET- Information Logging and Investigation of Control Framework Utilizing D...
IRJET- Information Logging and Investigation of Control Framework Utilizing D...IRJET- Information Logging and Investigation of Control Framework Utilizing D...
IRJET- Information Logging and Investigation of Control Framework Utilizing D...IRJET Journal
 
Design of a usb based data acquisition system
Design of a usb based data acquisition systemDesign of a usb based data acquisition system
Design of a usb based data acquisition systemeSAT Publishing House
 
Design of a usb based data acquisition system
Design of a usb based data acquisition systemDesign of a usb based data acquisition system
Design of a usb based data acquisition systemeSAT Journals
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaIRJET Journal
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
IoT Based Advertising System
IoT Based Advertising SystemIoT Based Advertising System
IoT Based Advertising SystemIRJET Journal
 
Raspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate RecognitionRaspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate RecognitionIRJET Journal
 
IRJET-Raspberry Pi Based Reader for Blind People
IRJET-Raspberry Pi Based Reader for Blind PeopleIRJET-Raspberry Pi Based Reader for Blind People
IRJET-Raspberry Pi Based Reader for Blind PeopleIRJET Journal
 
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4
IRJET- Face Detection based on Image Processing using Raspberry Pi 4IRJET Journal
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNNIRJET Journal
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
 

Similar to IEEE projects in IOT for B.E / B.Tech Students at SLN Technologies (20)

A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
IRJET-  	  Recognition of Vehicle Number Plate using Raspberry PIIRJET-  	  Recognition of Vehicle Number Plate using Raspberry PI
IRJET- Recognition of Vehicle Number Plate using Raspberry PI
 
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...
Ijaems apr-2016-17 Raspberry PI Based Artificial Vision Assisting System for ...
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using Python
 
IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
IRJET- Portable Camera based Assistive Text and Label Reading for Blind PersonsIRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
 
IRJET- Information Logging and Investigation of Control Framework Utilizing D...
IRJET- Information Logging and Investigation of Control Framework Utilizing D...IRJET- Information Logging and Investigation of Control Framework Utilizing D...
IRJET- Information Logging and Investigation of Control Framework Utilizing D...
 
Design of a usb based data acquisition system
Design of a usb based data acquisition systemDesign of a usb based data acquisition system
Design of a usb based data acquisition system
 
Design of a usb based data acquisition system
Design of a usb based data acquisition systemDesign of a usb based data acquisition system
Design of a usb based data acquisition system
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social Media
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
IoT Based Advertising System
IoT Based Advertising SystemIoT Based Advertising System
IoT Based Advertising System
 
Raspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate RecognitionRaspberry Pi Vehicles Number Plate Recognition
Raspberry Pi Vehicles Number Plate Recognition
 
IRJET-Raspberry Pi Based Reader for Blind People
IRJET-Raspberry Pi Based Reader for Blind PeopleIRJET-Raspberry Pi Based Reader for Blind People
IRJET-Raspberry Pi Based Reader for Blind People
 
LOW COST SCADA SYSTEM FOR EDUCATION
LOW COST SCADA SYSTEM FOR EDUCATIONLOW COST SCADA SYSTEM FOR EDUCATION
LOW COST SCADA SYSTEM FOR EDUCATION
 
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 

More from SLN Technologies - Chennai

Embedded with IOT project titles 2018 - 2019 in Chennai
Embedded with IOT project titles 2018  - 2019 in ChennaiEmbedded with IOT project titles 2018  - 2019 in Chennai
Embedded with IOT project titles 2018 - 2019 in ChennaiSLN Technologies - Chennai
 
Final Year Projects Free Abstract in SLN Technologies
Final Year Projects Free Abstract in SLN TechnologiesFinal Year Projects Free Abstract in SLN Technologies
Final Year Projects Free Abstract in SLN TechnologiesSLN Technologies - Chennai
 
Final Year Project Titles 2018 2019 from SLN Technologies
Final Year Project Titles 2018   2019 from SLN TechnologiesFinal Year Project Titles 2018   2019 from SLN Technologies
Final Year Project Titles 2018 2019 from SLN TechnologiesSLN Technologies - Chennai
 
Io t based electricity energy meter using esp12 and arduino at sln technologies
Io t based electricity energy meter using esp12 and arduino at sln technologiesIo t based electricity energy meter using esp12 and arduino at sln technologies
Io t based electricity energy meter using esp12 and arduino at sln technologiesSLN Technologies - Chennai
 
IOT Based projects for ECE/CSE/IT Students at SLN Technologies Chennai
IOT Based projects for ECE/CSE/IT Students at SLN Technologies ChennaiIOT Based projects for ECE/CSE/IT Students at SLN Technologies Chennai
IOT Based projects for ECE/CSE/IT Students at SLN Technologies ChennaiSLN Technologies - Chennai
 

More from SLN Technologies - Chennai (8)

final year projects in chennai
final year projects in chennaifinal year projects in chennai
final year projects in chennai
 
Embedded with IOT project titles 2018 - 2019 in Chennai
Embedded with IOT project titles 2018  - 2019 in ChennaiEmbedded with IOT project titles 2018  - 2019 in Chennai
Embedded with IOT project titles 2018 - 2019 in Chennai
 
Final Year Projects 2019 in Chennai
Final Year Projects 2019 in ChennaiFinal Year Projects 2019 in Chennai
Final Year Projects 2019 in Chennai
 
OCR Projects using Python for CSE/IT Students
OCR Projects using Python for CSE/IT StudentsOCR Projects using Python for CSE/IT Students
OCR Projects using Python for CSE/IT Students
 
Final Year Projects Free Abstract in SLN Technologies
Final Year Projects Free Abstract in SLN TechnologiesFinal Year Projects Free Abstract in SLN Technologies
Final Year Projects Free Abstract in SLN Technologies
 
Final Year Project Titles 2018 2019 from SLN Technologies
Final Year Project Titles 2018   2019 from SLN TechnologiesFinal Year Project Titles 2018   2019 from SLN Technologies
Final Year Project Titles 2018 2019 from SLN Technologies
 
Io t based electricity energy meter using esp12 and arduino at sln technologies
Io t based electricity energy meter using esp12 and arduino at sln technologiesIo t based electricity energy meter using esp12 and arduino at sln technologies
Io t based electricity energy meter using esp12 and arduino at sln technologies
 
IOT Based projects for ECE/CSE/IT Students at SLN Technologies Chennai
IOT Based projects for ECE/CSE/IT Students at SLN Technologies ChennaiIOT Based projects for ECE/CSE/IT Students at SLN Technologies Chennai
IOT Based projects for ECE/CSE/IT Students at SLN Technologies Chennai
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

IEEE projects in IOT for B.E / B.Tech Students at SLN Technologies

  • 1. System of Detection and Scanning Bar Codes from Raspberry Pi Web Camera Roman Diachok, Roman Dunets, Halyna Klym Lviv Polytechnic National University, 12 S. Bandery Str., Lviv, 79013, Ukraine, E – mail: klymha@yahoo.com Abstract— This work is focuses on the problem of detecting and scanning bar codes in video stream. The block diagram of a system identifying bar codes in panoramic images using Raspberry Pi 2 Model B was developed. The program algorithm of the system detection and scanning bar codes video stream for Raspberry Pi was proposed. It is established that systems can be used in industry, medicine, and in the control system. Keywords—Raspberry Pi; bar code; structural scheme; algorithm; OpenCv I. INTRODUCTION Using bar codes are dictated by the extremely large volume of supplies, territorial scattering of interconnected organizations and enterprises, insufficient information on the properties of the product on its packaging and in the accompanying documentation, the lack of reliable and timely information on the receipt of goods to the buyer [1- 4]. The most commonly used today are linear bar codes for reading information, the disadvantage of which is that they can submit only small volumes of relational (several dozen characters). To represent larger volumes of information, it is necessary to construct bar code with a two-dimensional structure, for reading it is necessary to apply a two-axis scan - horizontally and vertically. When working with linear bar codes a computer database is needed. The use of two-dimensional barcode allows us to abandon such a base, since the code capacity is sufficient to store complete information about the object [5-8]. In view of this, two-dimensional bar codes should be the subject of a solid scientific research to build effective systems for controlling the movement of objects in a particular system. Bar code is a sequence of black and white stripes containing certain information in a suitable form for reading by technical equipment. Requirements of introducing bar codes dictated by the extremely high volume of deliveries, territorial dispersion of interdependent organizations and enterprises lack information about product features on the packaging and accompanying documents. Today the most commonly in using are linear barcodes for reading information [9,10]. Panoramic photography can take pictures from 180o and more, so it can capture at this frame a large number of products with bar codes. Then, these images will be scanned and recorded in the database. Then it’s possible to run other bar codes in the frame [10,11]. II. GRAPHIC DIAGRAM AND STRUCTURAL SCHEME Taking into account all the requirements and physical structure of the work, a graph-diagram the algorithm of program working was created (Fig. 1.). After running the system, connection is established between Raspberry Pi and monitor, in particular, whether there was a connection of ports. If the connection does not successfully complete, the user will be notified about it. Raspberry Pi 2 Model B receives data from the camera, after which the data is analyzed. These data are transmitted to Raspberry Pi via USB interface. Immediately checks were data transmitted and received, if an error occurred somewhere, it will be reported. After the transfer of packets occurred, the basic algorithm of the system executes. The system performs its basic function, transmits data via Ethernet interface. The packets are transmitted and the verification is again performed, or the packets are converted (transferred). Then results, must be shown on the screen. After that, the cycle will repeat until the verification, connection of ports and connection to the monitor. The cycle continues until the power is turned off. According to the graph-diagram of the algorithm of the program was written program for the system working (Fig.1). Data from Raspberry Pi screens are transmitted using a special program VNC Viewer. Raspberry Pi is a hardware platform on which was installed operating system Linux. Therefore, for programming and reprogramming any system the monitor to unicameral computer, or laptop/ computer with the installed program VNC Viewer and log into the system using IP - address that's assigned Raspberry PI is needed [12,13]. After starting work the microcontroller is turned on. After the initialization of USB to work with its protocol and data transmission (bytes, bits). The camera sends start readiness messages to Raspberry Pi. The central processor that works with the USB adapter and the Ethernet adapter. Raspberry Pi works with these adapters via USB protocol. The image is taken from a USB camera, then this picture turns black and white (Math Grey) to search for BAR codes, checks are made if there has been a conversion, it will be informed about the user and the system will stop working. The 9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2018 24-27 May, 2018, Kyiv, Ukraine 978-1-5386-5903-8/18/$31.00 ©2018 IEEE 184
  • 2. Start Receive data from Raspberry Pi Connection between monitor and system is established Connection happened Transfer Raspberry Pi data via USB interface "Connection failed, try again" Transfer happend Implementation of the basic algorithm of the bar-code scanning system Transmitted data via Ethernet YES NO YES NO Output results Packages delivered NO YES Power off YES NO End Fig. 1. Graphic diagram of the main algorithm of the device The next step is to look for BAR codes on a black and white (symbol), and again check whether the BAR code was found, if it was found, then the program work continues, if no then the system notifies that nothing is found and it’s work stop. The next stage for the system is the recognition of bar - codes (symbol <- get _ type; symbol <- get _ data;) at this stage starts Library Zbar. h, which works by dividing the image into black and white contrasts, looks for the beginning of the bar code, then defines the lines by their thickness and decodes the image and outputs the result by pre-writing it into the database. In case of not storing an image, it will be reported. It is possible that the image is not clear and the system is difficult to detect BAR is the code, in this case, the system of actions is as follows, a screenshot of the image is made, which on the screen and then the user determines independently what this BAR -code is and whether it is there at all. (Fig. 2.) [13]. Start USB initialization Give start signals Output results YES NO YES End Barcode search on images (symbol) NO NO YES YES Convert an image to black and white (Math Grey) Barcode recognition (symbol<-get_type; symbol<-get_data) Saving results NO Convert happened Search happened Recognition happened Making screenshot Saving happened Fig..2. Graphic diagram of the main algorithm of the system 185
  • 3. BCM2837 Processor DDR2 SDRAM RAM PAM2306 DC converter 5V Raspberry Pi 2 Model B USB 2.0 Port USB 2.0 Port USB 2.0 Port Ethernet Port LAN9514 USB 2.0 Router and Ethernet Power supply 5V Supply 5V Micro USB WEB Camera (Reading device) Mouse Keyboard Monitor (Laptop) Supply 5В Supply 5В Supply 5В Interface USB Interface USB Interface USB Interface Ethernet Fig. 3. General view of the structural scheme For the correct operation of this system it is necessary to implement the structural scheme of the device. The block diagram of the device includes (Fig. 3): 1) Unicameral Raspberry Computer Pi; 2) Power supply 5V; 3) WEB camera (it is also a device recognition bar code); 4) Mouse and keyboard to control the input; 5) Output and control of this system; 6) Monitor (or laptop screen) for outputting information. III. RESULTS After the system was implemented according to the algorithm and the block diagram. was conducted the experiment on cameras with different resolutions, namely the 3 megapixels camera (Logitech C920-C), 5 megapixels (CBR CW-835M Black / Silver) and 12 megapixels (Genius WideCam F100 Full HD) camera. The experimental data of this experiment are listed in the Table 1. The results of the study are shown in this picture. The chart shows that for cameras with different resolution the most optimal scanning distance of 30 cm. This is a scan resolution of 3 megapixels camera is 6 ms for 5 megapixels - 3 ms for 12 megapixels - 2 ms. The speed depends on the resolution of the camera. Graph of dependencies on Fig. 4. where is depicted as with different cameras, in which different resolution scan time is changed. Results of program’s is on Fig. 5. Results of research in various resolutions are presented in Table 1. Performed studies showed the robustness of the main device management system, and also confirmed the feasibility of its use. Two-dimensional bar coding of information as one of the most promising computer technologies is increasingly used in production and everyday life of a person. The main advantage of this technology is the rapid, accurate and reliable input of information into the computer system by scanning bar code images. Table 1. RESULTS OF RESEARCH IN VARIOUS RESOLUTIONS 3 megapixels Distance to the object Time for scanning 5 megapixels Distance to the object Time for scanning 12 megapixels Distance to the object Time for scanning 0 1,6 0 1,6 0 1,6 10 1,5 10 1,2 10 0,9 20 0,8 20 0,7 20 0,5 30 0,5 30 0,3 30 0,2 40 0,6 40 0,3 40 0,3 50 0,7 50 0,5 50 0,35 60 0,9 60 0,75 60 0,5 70 1,1 70 0,8 70 0,8 80 1,2 80 0,85 80 0,8 90 1,3 90 1,1 90 0,9 100 1,5 100 1,2 100 1 186
  • 4. Fig. 4. Graph of dependencies Fig.5. Results of program’s work IV. CONCLUSIONS The structural scheme of detection and scanning bar codes in images for Raspberry Pi, and the algorithm of the program is the best option for proper system work, the optimal distance is 30 cm for identification and recognition, speed depends on the resolution of the camera. REFERENCES [1] S. Preradovic, and N. C. Karmakar, “Chipless RFID: Bar code of the future”, IEEE microwave magazine, vol. 11(7), 2010, pp. 87- 97. [2] M. J. Zilliox, and R. A. Irizarry, “A gene expression bar code for microarray data”, Nature methods, vol. 4(11),2007, pp. 911. [3] R. D. Paoletti, T. M. Suess, M. G. Lesko, A. A. Feroli, J. A. Kennel, J. M. Mahler, and T. Sauders, “Using bar-code technology and medication observation methodology for safer medication administration”, American journal of health-system pharmacy, vol. 64(5), 2007, pp. 536-543. [4] Z. Chen, H. Li, and C. T. Wong, “An application of bar-code system for reducing construction wastes”, Automation in Construction, vol. 11(5), 2002, pp. 521-533. [5] T. Falas, and H. Kashani, “Two-dimensional bar-code decoding with camera-equipped mobile phones”, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007 (PerCom Workshops' 07), 2007, pp. 597-600. [6] C. S. Hwang, “A comparative study of tax-filing methods: manual, Internet, and two-dimensional bar code”, Journal of Government Information, vol. 27(2), 2000, pp. 113-127. [7] C. N. Yang, T. S. Chen, and M. H. Ching, “Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme’, Integrated Computer-Aided Engineering, vol. 13(2), 2006, pp. 189-199. [8] J. Z. Gao, L. Prakash, and R. Jagatesan, “Understanding 2d- barcode technology and applications in m-commerce-design and implementation of a 2d barcode processing solution”, 31st Annual International Computer Software and Applications Conference COMPSAC 2007. vol. 2, 2007, pp. 49-56. [9] L. Chen, H. Man, and H. Jia, “On scanning linear barcodes from out-of-focus blurred images: a spatial domain dynamic template matching approach”, IEEE Transactions on Image Processing, vol. 23(6), 2014, pp. 2637-2650. [10] E. Joseph, T. Pavlidis, “Bar code waveform recognition using peaklocations”, IEEE Trans. PAMI, vol. 16(6) 1994, pp. 630-640. [11] W. Turin, and R. A. Boie, “Bar code recovery via EM algorithm”, IEEE Trans. PAMI, vol. 46 (2), 1998, pp. 354-363. [12] K. Q. Wang, “Barcode reading from images captured by cameraphones”, IEEE MobilityConference, 2005. [13] R. Dyachok, O. Hrytsyshyn, and S. Salamaha, “System of Detection and Scanning Bar Codes in Panoramic Images on Raspberry Pi, 7th International Youth Science Forum LITTERIS ET ARTIBUS 2017: Computer Science & Engineering (CSE- 2017), 2017, pp. 430-431. 187