Automated storage system ,types of material handling systems, AS&R ,ASRS - Automated Storage/Retrieval System ,AS/R system Structures/Components,Automatic Identification and Data Capturing (AIDC)
Automated Storage/Retrieval System and Automatic Identification and Data Capturing
1.
2. Professor, Mechanical Engineering
Future of Automated Factory
Dr. Vishaldatt V Kohir
Subject: Computer Integrated Manufacturing
Module 3 Topic :
Automated storage and retrieval system
3. Automated Storage and Retrieval Systems,
AS/RSand Automatic parts identification
systems and data capture.
4. Part 2 Components of AS/R system
Part 1 Need for storage system
Part 3 Categories of AS/R system
6. There are various material handling systems,
1. Manual System
2. Mechanized System
3. Semiautomatic System
4. Automatic System
Material handling can not be avoided in logistics, but can
certainly be reduced to a minimum level. The productivity
potential in logistics can be exploited by selecting right type
of handling equipment.
7. There are various material handling systems in use, right
from fully manual to the fully automatic ones. However, the
selection of a particular system depends on factors such as:
• Volumes to be handled
• Speed in handling
• Product Characteristics (weight, size, shape)
• Nature of the product (hazardous, perishable, crushable)
8.
9. o To increase storage capacity
o To increase storage density
o To utilize maximum floor space
o To recover factory floor space currently used for WIP
o To improve security and reduce pilferage
o To reduce labor cost and/or increase productivity
o To improve safety
o To improve stock rotation
o To improve customer service
o To increase throughput
o To improve inventory control
WHY INSTALL ASRS ? Or OBJECTIVES OF ASRS
10. “Automated storage system is a mechanized and automated
storage equipment to reduce the human resources required to
operate a storage facility.”
o Level of automation varies
In mechanized systems, an operator participates in each
storage/retrieval
transactions.
In highly automated systems, loads are entered or retrieved
under computer control.
o It requires a significant investment.
o Types of automated storage system –
o Automated Storage/Retrieval System (AS/RS) or (ASRS)
o Carousel Storage System
11.
12.
13.
14.
15.
16. “ASRS - Automated Storage/Retrieval System is defined as a storage
system that performs storage and retrieval operations with speed and
accuracy under a defined degree of automation.”
o Degree of automation - At the most sophisticated level the operations
are totally automated, computer controlled, and fully integrated with
factory and/or warehouse operations.
o At the other extreme human workers control the equipment and
perform the storage/retrieval transactions.
o The ASRS system is custom-designed to fit the requirements of the
plant in which it is installed.
WHAT IS ASRS ?
17. AS/R system Structures/Components
1) Storage structure
2) S/R machine (Storage
/ Retrieval)
3) Storage modules (e.g.,
pallets for unit loads)
4) Pickup-and-deposit
stations
18. 1) Storage structure
oMade of Fabricated steel
oRack framework
oSupports the load contained in the ASRS
oTo store Inventory items.
19.
20.
21.
22.
23. https://www.youtube.com/watch?v=VYcqVPCVPFc
Automated Storage & Retrieval System ( ASRS )
https://www.youtube.com/watch?v=80pcjgUmcXY&t=148s
Mini Load Automated Storage and Retrieval System Using NI sbRIO-9642X
https://www.youtube.com/watch?v=YYdgLAlogpY
AS/RS Automated Storage and Retrieval Systems- Warehousing Technology
https://www.youtube.com/watch?v=S8zDRu72HD0
Automated Guided Vehicles, Storage and Retrieval Machines, 2XL N.V., Warehouse
Automation
28. Automatic Identification and Data Capturing (AIDC) is a technology that
automatically identifies the objects, collects the related data, stores and
enters the data directly into computer systems.
(AIDC) systems work without the interference of human
AIDC systems are used to manage inventory, delivery, assets, security
and documents. Sectors that use AIDC systems include distribution,
manufacturing, transportation, medicine, government and retail, among
many others.
29. Information
associated with the
object is called
identification data.
This data may
be in different
forms like
images, voice
or finger
prints.
This data will
be converted
into a digital
file before
typing the data
into computer
system.
A transducer
is used in to
convert the
original data
into digital
file.
Data entered is
compared with
other files in a
database with
secured
system.
30. AIDC technologies consist of three principle components.
AIDC Components
•Data encoding – In this the alphanumeric characters will be
translated into the form that can be read by machine.
•Machine scanning – The machine scanner reads the encoded data
and converts the data into electric signals.
•Data decoding – The electrical signals will be transformed into
digital data which later converted into alphanumeric characters.
31. Barcodes
Radio Frequency Identification (RFID)
Biometrics
Magnetic Stripes
Optical Character Recognition (OCR)
Smart Cards
Voice Recognition
Electronic Article Surveillance (EAS)
Real Time Locating Systems (RTLS)
Different Types of AIDC Technologies for Data
Capturing:
32. Barcodes:
1. Barcodes will be scanned originally by special optical
scanners called barcode readers. .
2. Barcodes consist of small images of lines or bars affixed
on many items in order to identify a particular product
number, person or location.
3. A Barcode is an optical machine which is a readable
representation of data or information and the information
which the Barcode contains is about the object which is
attached to the barcode.
4. Barcode reader uses a laser beam and the reader
translates information from the image to digital data and
sends it to the computer.
Barcode technology standards define:
•Reading and decoding techniques
•Rules for measuring the quality of printed/marked symbols
•Rules and techniques for printing or marking
•Rules for representing data in an optically readable format
33. Radio Frequency Identification (RFID):
1. Radio Frequency identification (RFID) is a
technology that uses radio waves to transfer data
between a reader and an electronic tag which is
attached to a particular object.
2. This technology used in data collection and
identification.
3. A Radio Frequency identification (RFID) is mainly
used for object identification and tracking. Without
making direct contact with the item, the RFID
obtains information on an item.
4. An RFID system consists of three components –
an antenna,
a transceiver
and a transponder (the tag).
34. The magnetic stripe
The magnetic stripe is also known as swipe card and it is
read by swiping magnetic reading head. Magnetic stripe
technology will be used for security purposes. Magnetic
Strips were found on a Magnetic Stripe Card and it is
capable of storing data by modifying the magnetism of
small iron-based magnetic particles on a strip of magnetic
material. They provide standards for bank cards, credit
cards, IDs, ATM cards etc including the allocation of card
numbers. These magnetic stripes contain information about
the owner of the respective card. The information in
magnetic stripes is read by magnetic stripe reader.
A smart card is an integrated circuit card (ICC) and it is a pocket-sized plastic
card which has a small chip attached and contains an integrated circuit. It is an
electronic recording device. Smart cards provide strong security
authentication in large organizations, they stores data and when necessary
those records can be transmitted to a central computer. Most smart cards looks
like a credit or debit card, but smart cards can function on at least three levels
(credit-debit-personal information). These smart cards are capable of data
storing, for providing identification and application processing
smart card
35. Electronic Article Surveillance (EAS):
Electronic Article Surveillance (EAS) is a
technology used to identify items as they
pass through a gated area when you enter
into any showroom in malls or library.
This technology is used to alert the
unauthorized persons from taking the
items from a store, library or museum and
other important places.
Theft can be encountered with this
technology. RFID and some other types of
Electronic Article Surveillance (EAS)
systems are used inside the technology of
Electronic Article Surveillance.
36. Real Time Locating Systems (RTLS):
Real Time Locating Systems (RTLS) are fully
automated systems with wireless radio
frequency solution that continuously monitors
the positions and reports real time locations of
tracked resources. It always transmits
information at frequent intervals via low power
radio signal to a central processor. The locating
system is deployed as a matrix of locating
devices installed at a spacing of anywhere from
50 to 1000 feet and these locating devices
determine the locations of the RFID tags. RTLS
system uses battery operated RFID tags and
mobile networks based locating system to
detect the location of RTLS tags.
37. Sensors:
Sensor is a device which measures a
physical quantity and converts it into a
signal and they can be easily read by the
instrument. The various applications of
sensors included in aerospace, medicine,
manufacturing, robotics, machine and cars.
Sensors play an important role in
automation and control systems. Newly
designed sensors are wireless which
collects more information than the
capability of traditional sensors and they
utilize advanced technique where as the
traditional sensors were wired.
38. Benefits of AIDC:
One can save valuable time and resources by reducing dependency on
manual labor.
With the use of AIDC technologies, identification of objects or people
has become much more efficient and accurate.
Used in industries, banking and insurance.
With the automation of the documents, accurate processing of
paperwork is achieved.
Utilizing the biometric data in AIDC system will ensure access to
restricted facilities and provide access to right persons.
Therefore, an Automatic Identification and Data Capture technology
comprises a wide range of data carrier technologies including
barcodes, magnetic stripe cards, smart cards and the RFIDs and these
systems which make users around the world to interact with millions
of business processes and systems using AIDC equipped electronic
devices and also captures the related data.
Other technologies like biometric techniques such as finger print
scanning, retinal scanning, face recognition or voice recognition
techniques can be used to identify individuals. AIDC is most
important because it saves great amount of time when entering digital
data.