Presented by:Presented by:
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Dr Dr SaharudinSaharudin HamzahHamzah
Senior Researcher / Senior ConsultantSenior Researcher / Senior Consultant
SIRIM BerhadSIRIM Berhad. .
SIRIM Training Services Sdn. Bhd. Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
OVERVIEW OF
AIDC
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
AIDC
TECHNOLOGIES
Introduction (Automatic Identification Data Capture)
BarBarCodeCode
BiometricBiometric
FingerFingerPrintPrint
VoiceVoice
RetinaRetina
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
AutoAuto--IDID
RFiDRFiDSmartSmartCardsCards
OCROCRRetinaRetina
.?.?
AIDC is everywhere☼ Retail☼ Manufacturing☼ Distribution☼ Healthcare☼ Financial☼ Military
Introduction (Automatic Identification Data Capture)
is the impact of the AIDC technologies?Business
- Industry sectors- Commerce sectors- Service sectors
IT- Network infrastructure
WHAT
WHERE
WHY
HOW
WHEN
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
- Network infrastructure- Database structure and storage- Data processing- Data communication
Track & Trace of products (traceability)
Business Effectiveness & Profitability
Increased demand on IT related products (PC & peripherals)
WHAT
WHERE
WHY
HOW
WHEN
Introduction (Automatic Identification Data Capture)
the technologies are used- Tracking and traceability- Escort information- Product and item identification- Transaction and services support- Access control- Sortation
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
- Sortation- Automation support
The AIDC technologies are used in the areas thatrequires automation or semi-auto in handling the products or services.
WHAT
WHERE
WHY
HOW
WHEN
Introduction (Automatic Identification Data Capture)
using AIDC (the benefits)- Accuracy
effectiveness of data captured
- Speed and immediacy of datadata transfer to information management system
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
system
- Economicsfast return of investmentcustomers satisfaction & confidence
- Versatility convenient
WHAT
WHERE
WHY
HOW
WHEN
Introduction (Automatic Identification Data Capture)
Identifying opportunities for applying the technologies- Efficient solution- Management of information- Capacity to handle goods- Throughput - Inventory space- Personnel
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
- Personnel- Reliability- Security- Transportation- Sortation
Analysis of data-handling processes is a significant key to identifying appropriate applications and to establishing the requirements that have to be fulfilled in realising an effective AIDC approach
WHAT
WHERE
WHY
HOW
WHEN
Introduction (Automatic Identification Data Capture)
should you use the technologies?- Basic principles and technologies of AIDC
to acquire data for use in computer based processing- The scope and opportunities for applying AIDC
to gather data for use in computer based processing- Identify, through process assessment, opportunities within your company
consideration for improvement by applying new technology- Identify needs for open systems development and numbering, including attention to EAN.UCC numbering system and support standards for data carriers
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
carrierslegally protection
- Identify relevant standards that are necessary or can assist in defining effective solutions
is it relevant to the applications- Develop or acquire expertise with in your company to prioritize opportunities and determine feasibility and economic justification for using AIDC
understanding of the process requirements and technology- Select suppliers
capabilities to handle your requirements- Develop or acquire expertise to apply and use AIDC systems
effective integration into existing system
Astep-by-stepguideto gettingstartedusingAIDC
Introduction (Automatic Identification Data Capture)
BarBarCodeCode
BiometricBiometric
FingerFingerPrintPrint
VoiceVoice
RetinaRetina
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
AutoAuto--IDID
RFiDRFiDSmartSmartCardsCards
OCROCRRetinaRetina
.?.?
AIDC is everywhere☼ Retail☼ Manufacturing☼ Distribution☼ Healthcare☼ Financial☼ Military
Local
Server
(PC)
Central
Database
StandaloneStandaloneLANLANWANWAN
Typical AIDC System
Scanner
SIRIM Training Services Sdn. Bhd. Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
• Normally is a PC• Store database for a specific
regions
• Able to TX/RX information to/from central database
• Communication media:
• Cable• Wireless
• Support multiple scanners• RFiD
• Smartcard• Magnetic Card
• Barcode• Etc
• High performance PC
• Centralized Database• Able to TX/RX information to/from central database
• Communication media:
• Cable• Wireless
• Standalone/Network system• Embedded system
• Industrial PC• uController based hardware
• Control other devices such as;
• LCD• Keypad• Communication devices• etc
• Temporarily store small database
Barcode
• The oldest (past 20 yrs) and be the best known and most successful to date of the AIDC technology. The most common examples in use today are: UPC/EAN, Code 128, Code 39, Code 93, and Interleaved 2 of 5.
• Typical data content capacity varies from 8 to 30 characters with some barcodes restricted to numerals only, and others using full alpha-numericinformation.
• Linear barcodes are used in many applications where the use of a simple
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
• Linear barcodes are used in many applications where the use of a simple numeric or alpha-numeric code can provide the key to a database of "products".
• The most obvious limitation is the amount of data that can be stored in a linear barcode.
Barcode StructureQuite Zone• Non-printed zones immediately before and after the
barcode. • Quiet zone be at least 10 times the narrow bar width
(< 10 x, barcode become unreadable)
Start/Stop characterA pattern of bars and spaces that provides the scanner with start and stop reading instructions
Data (Message)The bar patterns which are represented as data by numbers or letters are placed from the left. ("0", "1", & "2“ represent the data "012".
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Check DigitA digit included within a barcode whose value is used to perform a mathematical check that ensures the accuracy of the read. It is placed immediately after the barcode data
Label LengthLength of label including left and right quiet zones. A read cannot be made if the quiet zones are not large enough
Label HeightThe height must be at least 2 mm (0.08") for a single line option and at least 5 mm (0.20") for a raster option
Specification Standard of Bar Code Barcodes consist of bars and spaces of different width. The standard ratio is:NB:WB = NS:WS = 1:2.5
Modulo – 10 (ECC)
Country Code Manufacturer Code Item Code Check Digit
1 0 1 2 3 4 5 1 3 5 6 0 5
2 digits 5 digits 5 digits 1 digit
MAL CADBURY CHOCOLATE x
The check digit is calculated by a modulo 10 algorithm from all the other digits in the Global Trade Item Number (GTIN) and its applicable to GTIN-13, GTIN-8, GTIN-12 and Interleaved Two-of-Five (ITF) or GTIN-14 barcode.
The type of barcode used by the supplier must be registered with GS1 Malaysia and before
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Modulo-10 (error check character) calculation. Assume the barcode data is 1 01234 51356 01. 2 + 4 + 6 = 122. 12 * 3 = 363. 1 + 1 + 3 + 5 + 1 + 3 + 5 = 194. 36 + 19 = 555. 55 + X = 60 (the nearest equal or higher multiple of 10)Therefore X = 5 (checksum)
The type of barcode used by the supplier must be registered with GS1 Malaysia and before ordering film masters or barcode stickers, the suppliers must check the check digit number.
Barcode Implementation
1. Get a GS1 Company Prefix
2. Assign Numbers
3. Select a Bar Code Printing Method
4. Select a 'Primary' Scanning Environment
5. Select a Bar Code
6. Pick a Bar Code Size
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
6. Pick a Bar Code Size
7. Format the Bar Code Text
8. Pick a Bar Code Colour
9. Pick the Bar Code Placement
10. Build a Bar Code Quality Plan
Barcode Encoding
ASCIICHARACTER
WIDTHENCODING
BARCODEENCODING
0 0000 100100100100
1 0001 100100100110
2 0010 100100110100
3 0011 100100110110
4 0100 100110100100
5 0101 100110100110
6 0110 100110110100
RulesRules0 � Narrow Bar
Wide Space
= 100
1 � Wide Bar
SIRIM Training Services Sdn. Bhd. Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
6 0110 100110110100
7 0111 100110110110
8 1000 110100100100
9 1001 110100100110
Start - 110
Stop - 1001
1 � Wide Bar
Narrow Space
= 110
RESULT =
Advantages & Disadvantages
SpeedA bar code label of twelve characters can be read in approximately the time it takes a keyboard operator to make two keystrokes
AccuracyBarcode systems approach one error in every 3,000,000 characters, and with laser technology, they approach one error in 70 million entries.
Data IntegrityKeyboard Entry 10,000OCR Scanning 300Barcode scanning (Code 39) 1
DuplicateA bar code label can be easily duplicated
Line-of-sight
Cannot work in harsh environment• Oily,• Moisture,• Dirty, • Corrosive,• Vibration, • etc
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Barcode scanning (Code 39) 1
Ease of ImplementationOperators of bar code scanners can learn to use the equipment effectively in less than 15 minutes. System costs are lower than other means of data entry because of the existence of interfacing hardware and software. Barcode labels can cost less than a penny apiece, are easily read by thousands of commonly available devices, and can be printed universally.
Cost EffectivenessBarcode systems create value not only by saving time, but also by preventing costly errors.
2D Barcode• A new growth area in the world of barcode is
the two-dimensional versions.
• Examples of the three types of 2D barcodes include PDF417, Code 49 Code 16K (stacked), Code One, MaxiCode, Data Matrix, Aztec Code, QR Code (matrix), and Super Code (packet).
• 2D barcodes have a major advantage over linear barcodes, they can store vast amounts of
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
linear barcodes, they can store vast amounts of data in a very small space.
• For example; symbols can store as much as 7000 numeric only or 4200 alpha-numeric characters.
• The disadvantage of the 2D barcodes is that a special scanner is needed such as a vision based scanner or a rastering laser scanner to read the data.
Example: PDF417
Data is encoded in both
the horizontal and
vertical dimensions. A
special barcode
generation software is
needed to generate the
2D barcode.
Magnetic Card• The first magnetic stripe cards were used in the early 1960s on transit tickets
and in the 1970s for bank cards. Since then the use of magnetic stripes continues to grow.
• Credit cards were first issued in 1951, but it wasn't until the establishment of standards in 1970 that the magnetic stripe became a factor in the use of the cards. The uses for magnetic stripe technology have grown considerably.
• Credit card sized plastic card, a thin paper ticket or an airline boarding card
• Today with an infra-structure that encompasses every store in the high street giving them an ability to read the information on the magnetic stripe, the
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
giving them an ability to read the information on the magnetic stripe, the technology is everywhere.
• The limitations is, the amount of information that can be stored.
• Magnetic stripe technology provides the ideal solution to many aspects of our life. It is very inexpensive and readily adaptable to many functions. The standardization of high co-activity for the financial markets has provided the industry with a new lease on life. This coupled with the advent of the security techniques now available means that many applications can expect to be using magnetic stripe technology for the next ten to twenty years.
Magnetic Card
3 tracks for magnetic cards
Track 1 holds the cardholder’s name, account
Track 2 is most commonly used – ATM, and credit card
Track 3 for data read and written data on it
Data in magnetic stripes is in digital format
Bit DensityCharacter encoding(including Parity bit)
Information Content(inc. control character)
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Track 1
Track 2
Track 3
210 bits/inch
75 bits/inch
210 bits/inch
7 bits/char
5 bit/char
5 bit/char
79 alpha numeric char
40 alpha numeric char
107 alpha numeric char
• It doesn't work in a distance, thus requiring close contact to the reader
• Data can be damaged by stray magnetic fields
• Since it's not in human readable form can be a
• Data can be modified or rewritten• High data capacity in relation to bar
codes• Add security since it is not in
human readable form• Immune to contamination with dirt,
water, oil, moisture, etc• No moving components, physically
robust
Advantages & Disadvantages
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
readable form can be a disadvantage in some applications
robust• Well established standards – ISO
7811• No consumables required for
writing or rewriting
Definition:
OCR is the process of using computer systems to translate images of typewritten text into machine-editable text, converts
texts in image form into its digital equivalent
For example, OCR Enables you to scan a book or a magazine article; feed the text in the scanned image into an electronic file;
and edit the file using a word processor.
Optical Character Recognition (OCR)
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
and edit the file using a word processor.
Optical Character Recognition (OCR)• OCR was first used in 1960s• Special fonts were developed – readable by both people & machine.• The advantages: high density of information and the possibility of reading data
visually.• OCR is used in production, service, bank (cheque) and administrative.• The disadvantages: high price of readers
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
OCR - Procedures
1. Learning - (from an image file and corresponding text file or learning interactively
2. Extraction and isolation of individual characters from an image
3. Determination of the properties of the extracted characters 4. Comparison of the properties of the learned and extracted
characters 5. Additional operations on extracted characters if no good
match is found
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
match is found
OCR - Common Problems
OCR is commonly accurate when the text is sharply printed. The accuracy ranging from 90 – 99%.
OCR typically fails to recognize the text when;
• The characters are broken or not properly printed,.
• Pages with complex formatting, smudges, and unusual fonts
• Mixing character sets
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
• Mixing character sets
• The character sets of certain languages
• Spelling mistakes • Low resolutions or the original physical documents are
stained• Mathematic symbols• Boxes
Advantages & Disadvantages of OCR
• Image processing gives users immediate access to a copy of an original document.
• Image processing eliminates the cost of time spent searching for lost documents.
• OCR generally reduces cost and
• No OCR product is perfect. Non-English text, mathematical or chemical symbols, and other special characters often unsuccessfully translated
• Good OCR software packages, and good hardware, such as scanners, can be very expensive.
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
• OCR generally reduces cost and error-prone manual data entry.
• Image processing eliminates the need for physical storage
scanners, can be very expensive.
• Expanding an application's dictionary to include specialized terms can become difficult, time consuming, slower production time, higher costs, and the need for more staff
Smart Card – Definition
What is smart card ?
� A plastic card with an embedded
microprocessor chip
What is the essence of a smart card ?
� Authentication
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
� Authentication
� Data storage
� Validation
� Self-lock mechanism
Smart Card• First patent was filed in France in 1974 and the first cards were used in France in 1982.
• The smart card provided the mechanism to move that verification off line, reducing the cost without sacrificing any of the security.
• Smart cards are credit card-sized plastic cards that contain relatively large amounts of information in an imbedded micro-chip.
• There are two types of smart card: Memory card - used to store information. Microprocessor card or true "smart" card where a microprocessor is embedded in the card along with memory.
• Secure environment.
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
• The smart card comes in two flavors - the contact version and the contactless version. Both types of card have the microprocessor embedded in the card.
• The advantage of the contactless system is there are no contacts to wear out, no chance of an electric shock coming through the contacts and destroying the integrated circuit, and the knowledge that the components are completely embedded in the plastic with no external connections. The disadvantage to this is that the card and reader are more sophisticated and hence are more expensive.
• The biggest disadvantage today with smart cards is the cost to create a smart card system. The biggest advantage is of course the amount of data that can be stored and the security that can be built into the card.
Memory Card
Memory cards have no sophisticated processing power and cannot manage files dynamically. In all memory cards you read and write to a fixed address on the card. There are three primary types of memory cards:
1) Straight • Store data and have no data processing capabilities. • Lowest cost per bit for user memory – like a floppy disks• Easily duplicated and cannot be tracked by on-card identifiers.
2) Protected
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
2) Protected• Have built-in logic to control the access to the memory of the card. • Referred to as Intelligent Memory cards - write protect some or all of the memory array. • Not easily duplicated but can possibly be impersonated by hackers.
3) Stored Value• Is designed for the specific purpose of storing value - disposable or rechargeable. • Permanent security measures at the point of manufacture (password keys/hard-coded)• Memory arrays on these devices are set-up as decrements or counters – application
such as a telephone card.
Smart Card - Block
ContactSECURMicroprocessorMicroprocessor
Data and / or Program StorageData and / or Program Storage
SECUR
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
ITY
MicroprocessorMicroprocessor
OperatingSystem
OperatingSystem
ITYContactless
Antenna
Smart Card - Physical
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Smart Card
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Smart Card
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Smart Card – Memory Structure
Manufacturer code(Serial number)
Data Block(read/write area)
Security Block
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Security Block- key A or B
Smart Card - BenefitsSmart card contain unique features that bring many benefits to both
consumers and issuing organizations.Security
• Chip is tamper-resistant, physical protection* It is hard to open a smart card and access data in it* It is not impossible, but is much harder than tempering workstations or PC
• Information stored on the card can be PIN code and/or read-write protected• Capable of performing encryption• Each smart card has its own, unique serial number
Intelligence• Capable of processing, not just storing information
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
• Capable of processing, not just storing information• Smart cards can communicate with computing devices through a smart card reader• Information and applications on smart card can be updated without having to issue
new cards• Flexible Open Platform – support different types of applications
Convenience• Smart cards provide a potable• A user can carry a smart card, physically separating it from the outside world• Insert/swipe smart card to the reader for payment• No counting and balancing cash receipts, it directly to the bank
Biometrics
What is a biometrics ?Biometrics is the authentication of a person identity by verifying his unique physiological or behavioral characteristic.
Why biometrics ?- Card can be stolen, lost, duplicated and left at home- Password or Pins No can be forgotten and shared- Biometrics can authenticate you as you
15% 3% FingerSignature Scan
Facial Scan
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
50%12%
10%
15%
2%
6%
10%
Finger
Hand ScanRetina Scan
Iris Scan
Voice Scan
45%
20%
Biometrics – Fingerprint In Brief
Fingerprint Sensor
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Information to beEXTRACTED
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Summary of AIDCBarcode OCR Voice Biometric Smart Card RFiD
Data (bytes) 1-100 1-100 - - 16-64 k 16-64 k
Data Density Low Low High High Very High Very High
Readability Good Good Expensive Expensive Good Good
Readability by people
Limited Simple Simple Difficult Impossible Impossible
Dirt/Damp Very High Very High - - Possible No Influence
Cover Total Failure Total Failure Total Failure Total Failure Total Failure No Influence
SIRIM Training Services Sdn. Bhd. ▲ Phone : 03 – 5544 6228 ▲ Fax : 03 – 5544 5969 ▲ Email ID : [email protected] ▲ skype ID : shamzah
EXIT SHOW
Direction or Position
Low Low - - Unidirectional No Influence
Degradation Limited Limited - - Contacts No Influence
Purchase Cost Very Low Medium Very High Very High Low Medium
Operating Cost Low Low - - Medium -
Modification Slight Slight Possible Impossible Impossible Impossible
Speed Low ~4s Low ~3s Very Low >5sVery Low >5-10s
Low ~4msVery Fast <
3ms
Read Distance 0-50 cm <1 cm 0-50 cm Direct Contact *Direct Contact 0-5 m
Top Related