Automatic Identification and Data Capturing (AIDC) Technology Data Capturing through AIDC Technology Automatic Identification and Data Capturing (AIDC) is a technology that automatically identifies the objects, collects the related data, stores and enters the data directly into computer systems. AIDC is also known as Automatic Identification or Auto-ID or Automated Data Capture. In the majority of cases Automatic Identification and Data Capture (AIDC) systems work without the interference of human and if in case it requires human involvement then that may be a user scanning an AIDC equipped item that is barcoded and it will have the ability to enter data electronically into computer systems. The information associated with the object is called identification data. This data may be in different forms like images, voice or finger prints. This data will be converted into a digital file before typing the data into computer system. Hence, a transducer is used in order accomplish this task means for converting the original data into digital file. The stored data file is analyzed by a computer or is compared with other files in a database after entering the database into computer system in order to provide access for entering into a secured system. Data Capturing Structure AIDC technologies consist of three principal components. They are as below- AIDC Components Data encoding – In this, the alphanumeric characters will be translated into the form that can be read by a machine. Machine scanning – The machine scanner reads the encoded data and converts the data into electric signals. Data decoding – The electrical signals will be transformed into digital data which later converted into alphanumeric characters. Different Types of AIDC Technologies for Data Capturing: Various Automatic Identification and Data Capturing (AIDC) technologies are as follows: Barcodes Radio Frequency Identification (RFID) Biometrics Magnetic Stripes Optical Character Recognition (OCR) Smart Cards Voice Recognition Electronic Article Surveillance (EAS) Real-Time Locating Systems (RTLS) Barcodes: Barcode Technology Barcodes will be scanned originally by special optical scanners called barcode readers. A Barcode is an optical machine that is a readable representation of data or information and the information which the Barcode contains is about the object which is attached to the barcode. We will see bar-coded items in Supermarkets. Barcode reader uses a laser beam and the reader translates information from the image to digital data and sends it to the computer. Barcode is called as UPN/EAN. The very first scanning of the Universal Product Code (UPC) Barcode back in 1974. Barcodes consist of small images of lines or bars affixed on many items in order to identify a particular product number, person or location. Examples of Barcode in use today are UPC/EAN, Code 39, Code 93, Code 128 and Interleaved 2 of 5. Barcode System Barcode technology standards define: Reading and decoding techniques Rules for measuring the quality of printed/marked symbols Rules and techniques for printing or marking Rules for representing data in an optically readable format Radio Frequency Identification (RFID): Radio Frequency Identification Radio Frequency Identification (RFID) is a technology that uses radio waves to transfer data between a reader and an electronic tag that is attached to a particular object. This technology used in data collection and identification. Radio Frequency Identification (RFID) is mainly used for object identification and tracking. Without making direct contact with the item, the RFID obtains information on an item. An RFID system consists of three components – an antenna, a transceiver and a transponder (the tag). Biometrics: Biometric Technology Biometrics is typically involved in the identification of a person and it compares captured biological data with the stored data of that individual. The biometrics system consists of a scanning device or a reader with software that converts the scanned biological data like fingerprints into digital format. If an individual uses a biometric system for the first time they have to enroll the biometric information. This biometric information is detected and compared with the information stored at the time they enrolled in the system. Fingerprint recognition, face recognition, Palm print recognition, and iris recognition are the typical types of Biometric systems used within the world of AIDC. Magnetic Stripes: Magnetic Stripes Data Capture The magnetic stripe is also known as swipe card and it is read by swiping magnetic reading head. Magnetic stripe technology will be used for security purposes. Magnetic Strips were found on a Magnetic Stripe Card and it is capable of storing data by modifying the magnetism of small iron-based magnetic particles on a strip of magnetic material. They provide standards for bank cards, credit cards, IDs, ATM cards, etc including the allocation of card numbers. These magnetic stripes contain information about the owner of the respective card. The information in magnetic stripes is read by a magnetic stripe reader. The first magnetic stripe cards were used in the early 1960s on transit tickets and in the year 1970s for bank cards. Optical Character Recognition (OCR): Optical Character Recognition (OCR) Optical character recognition uses technology similar to the one used for CD ROMs. Optical Card Panel is gold-colored laser sensitive material that is laminated in the card and the material reacts when laser light is directed at them. Optical Card is the electronic or mechanical translation of scanned images of text which were typewritten or handwritten or printed into machine-encoded text and it is used to convert books or documents into electronic files. The standards for optical cards can be obtained from ISO. It checks mail-based payments by credit cards to computerize and text on the website. It is also used to digitize documents. OCR helps in pattern recognition and artificial intelligence. The optical card stores 4 and 6.6 MB of data that gives the ability to store graphical images such as photographs, logos, x-rays, fingerprints, etc. Smart Cards: A smart card is an integrated circuit card (ICC) and it is a pocket-sized plastic card that has a small chip attached and contains an integrated circuit. It is an electronic recording device. Smart cards provide strong security authentication in large organizations, they stores data and when necessary those records can be transmitted to a central computer. Most smart cards look like credit or debit card, but smart cards can function on at least three levels (credit-debit-personal information). These smart cards are capable of data storing, for providing identification and application processing. Smart Card Voice Recognition: Voice Recognition Voice Recognition or Speech Recognition is simply a task of translating the spoken words of that particular person and it converts the spoken words to text. It is a technology that can recognize speech. Voice recognition includes voice user interfaces such as voice dialing, call routing, search, simple data entry, preparation of structured documents, domestic appliance control, speech-to-text processing, etc. Electronic Article Surveillance (EAS): Electronic Article Surveillance (EAS) is a technology used to identify items as they pass through a gated area when you enter into any showroom in malls or libraries. This technology is used to alert the unauthorized persons from taking the items from a store, library or museum, and other important places. Theft can be encountered with this technology. RFID and some other types of Electronic Article Surveillance (EAS) systems are used inside the technology of Electronic Article Surveillance. Electronic Article Surveillance (EAS) Real-Time Locating Systems (RTLS): Real-Time Locating Systems (RTLS) are fully automated systems with wireless radio frequency solution that continuously monitors the positions and reports real-time locations of tracked resources. It always transmits information at frequent intervals via low power radio signals to a central processor. The locating system is deployed as a matrix of locating devices installed at a spacing of anywhere from 50 to 1000 feet and these locating devices determine the locations of the RFID tags. RTLS system uses battery-operated RFID tags and mobile networks based locating system to detect the location of RTLS tags. Real Time Locating Systems (RTLS) Sensors: The sensor is a device that measures a physical quantity and converts it into a signal and they can be easily read by the instrument. The various applications of sensors included in aerospace, medicine, manufacturing, robotics, machine, and cars. Sensors play an important role in the automation and control systems. Newly designed sensors are wireless which collects more information than the capability of traditional sensors and they utilize an advanced technique whereas the traditional sensors were wired. Different Types of Sensors Benefits of AIDC: One can save valuable time and resources by reducing dependency on manual labor. With the use of AIDC technologies, the identification of objects or people has become much more efficient and accurate. Used in industries, banking, and insurance. With the automation of the documents, accurate processing of paperwork is achieved. Utilizing the biometric data in the AIDC system will ensure access to restricted facilities and provide access to the right persons. Therefore, an Automatic Identification and Data Capture technology comprises a wide range of data carrier technologies including barcodes, magnetic stripe cards, smart cards, and the RFIDs and these systems which make users around the world to interact with millions of business processes and systems using AIDC equipped electronic devices and also captures the related data. Other technologies like biometric techniques such as fingerprint scanning, retinal scanning, face recognition, or voice recognition techniques can be used to identify individuals. AIDC is most important because it saves a great amount of time when entering digital data. This article gives the reader a basic understanding of technology and its limitations along with its benefits. What information this does stripe contain? Is the information only being read or the encoded information is copied? Why are these technologies cropping up in the most routine tasks of our everyday lives? To get the answers for such questions, comment us below and contact us. Photo Credits: jtc1info lockheedmartin imimg vitechgroup engineering garage Share This Post: Facebook Twitter Google+ LinkedIn Pinterest Post navigation ‹ Previous Understanding about Tilt Sensor, Types and Working with ApplicationsNext › Know About Operation of 8051 Microcontroller based Pendulum Related Content Kogge Stone Adder : Circuit, Working, Advantages, Disadvantages & Its Applications Brent Kung Adder : Circuit, Working, Advantages, Disadvantages & Its Applications Inverting Summing Amplifier : Circuit, Working, Derivation, Transfer Function & Its Applications Active Band Pass Filter : Circuit, Types, Frequency Response, Q Factor, Advantages & Its Applications