SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
UNDERSTANDING
BAR CODES
TABLE OF CONTENTS
UPC Bar Code
How They Are Commonly Used … 4
Anatomy of A UPC (A) Bar Code … 5
UPC (A) Bar Code Glossary … 6
How It All Works … 7
Testing The Algorithm … 8

QR Code
How They Are Commonly Used … 16
The Anatomy Of A QR Code … 17
QR Code Glossary … 18
How It All Works … 19

2D Bar Code / Data Matrix
How They Are Commonly Used … 10
Anatomy Of A Data Matrix … 12
Data Matrix Bar Code Glossary … 13
Benefits of The Data Matrix … 14

2	
  
UPC BAR CODE 
The UPC ( A ) bar code symbol, is one of the most
common applications of bar code technology and is
seen on products everywhere.
3	
  
HOW THEY ARE
COMMONLY USED
Bar codes are everywhere and they are used to identify
everything from auto parts to hospital patients. The
Universal Product Code is used to identify retail items in
virtually every store and market in the country.

4	
  
THE ANATOMY OF A UPC (A) BAR CODE 
95 MODULES WIDE!

LEFT GUARD!

CENTER GUARD!

THE	
  FIRST	
  SIX	
  
	
  FIGURES	
  DEFINE	
  THE	
  	
  
MANUFACTURER’S	
  
	
  IDENTIFICATION	
  NUMBER	
  

RIGHT GUARD!

THE	
  NEXT	
  FIVE	
  	
  
DIGITS	
  ARE	
  THE	
  	
  
ITEM	
  NUMBER	
  	
  

MANUFACTURER	
  	
  
IDENTIFICATION	
  	
  
NUMBER	
  

CHECKSUM	
  	
  
DIGIT	
  	
  

MANUFACTURER	
  ID	
  CODE	
  

ITEM	
  NUMBER	
  

5	
  
UPC (A) BAR CODE GLOSSARY
UPC: Universal Product Code 

MODULES: The vertical bars that make up the bar code symbol. Numbers are created by patterns of filled
and unfilled modules. 84 modules are used for digits, and 11 are used for the guards that define the symbols
boundaries.
GUARDS: Left and right guards mark the beginning and end of the symbol and the center guard marks the
division between the manufacturer and product codes.
MANUFACTURER CODE: Is made up of the first six digits and is distributed and managed by the UCC
(Uniform Code Council).
MANUFACTURER IDENTIFICATION NUMBER: Used to identify the particular numbering system used by the
manufacturer.
ITEM NUMBER: Assigned to each product and is defined by the last five digits.

CHECKSUM: A single digit used for error checking.


6	
  
HOW IT ALL WORKS 
First, the scanner flashes a laser across the
code reading the lines and spaces across. !

1+3+5+7+9=25

In a fraction of a second the scanner makes
several calculations to determine the
orientation of the code and then error checks
to make certain that the scan was valid. !
!
It does this by testing an algorithm against
the checksum digit.!

7	
  
TESTING THE ALGORITHM

0+2+4+6+8=20	
  

20x3=60	
  

1+3+5+7+9=25	
  

First the scanner sums the
digits in the odd positions !

Then it multiplies that !
result by three!

Next, it sums the even !
place digits !

60+25=85	
  

85/10=8R5	
  

10-­‐5=5	
  

And adds the two sums!

That result is divided by ten!

The remainder is subtracted from
ten to verify the checksum. If the
checksum doesn’t match, the
scanner reports an error and the
code must be re-scanned.!

8	
  
2D BAR CODE / DATA MATRIX
Two dimensional bar codes are called so because the reader
scans both horizontally and vertically across the symbol,
unlike linear barcodes.
9	
  
HOW THEY ARE
COMMONLY USED
Along with the less popular PDF417 (actually stacked linear)
and Aztec symbologies, Data Matrix is commonly used in
healthcare. Because of its accuracy, efficiency and small
size, it works particularly well on patient wristbands and
medication labels, as it is less likely to distort around curves
and takes up less space, in addition to being highly
readable and accurate.

10	
  
2D symbologies, like Data Matrix,
provide a consistent and reliable
means of labeling small objects.
	
  	
  

11	
  
THE ANATOMY OF A DATA MATRIX 
TIMING	
  PATTERN	
  

QUIET	
  ZONE	
  

MODULE	
  

DATA	
  REGION	
  

FINDER	
  PATTERN	
  

12	
  
DATA MATRIX BAR CODE GLOSSARY

MODULES: Small square cells that make up the bar code symbol. Usually, dark modules
represent a digital 1 and light represent 0.
FINDER PATTERN: Two adjacent, solid borders are designated the finder pattern. These borders
are used by the scanner to locate and orient the symbol and to correct distortion.
TIMING PATTERN: Two opposite adjacent pair of borders are constructed with alternating dark
and light cells and are designated as the timing pattern. This component gives the scanner
information about the symbol’s size.
DATA REGION: The actual data and error correction information is divided into regions in the
symbol which contain a pattern of modules in a consistent array.
QUIET ZONE: A clear space around the symbol.

13	
  
BENEFITS OF THE
DATA MATRIX


VERY EFFICIENT: Misread probability of 1/10.5 million (for the 3 of 9 symbol the probability
drops to 1/1.7 million).
SMALL: Almost 40X smaller than a 3 of 9 carrying the same data.
DEPENDABLE: Error correction capabilities (ECC200 method) allows accurate reads on symbols
with up to 60% damage.
FAXABLE: Data Matrix is also one of the few codes that are faxable. The outstanding capabilities
of ECC200 error correction allows even poorly resolved faxed images to be reliably scanned.
STORAGE CAPACITY: They are designed to encode up to 2335 alphanumeric characters,
though they have a recommended limit of 800 characters, actual best case is around 1200.
14	
  
QR CODE
The Quick Response or QR code is a trademarked two-dimensional
barcode first designed for the automotive industry in Japan in 1994
by Denso Wave, a Toyota subsidiary. Almost a decade ago, it was
introduced to enable high-speed component scanning during the
manufacturing process.
15	
  
HOW THEY ARE
COMMONLY USED
Since then QR codes have become ubiquitous, showing
up on product packaging, billboards and bumper
stickers, in magazines and just about any place where
a consumer with a smartphone is likely to seek more
information about any topic, item or idea.

16	
  
THE ANATOMY OF A QR CODE

TIMING	
  PATTERN	
  
MODULES	
  

ENCODING	
  PORTION	
  

ALIGNMENT	
  PATTERN	
  

FINDER	
  PATTERN	
  

17	
  
QR CODE GLOSSARY

MODULES: square modules arranged on a grid. These modules form the components of the
code. Within the code the modules fall into two categories:	
  functional and encoding.
FUNCTIONAL MODULES: referring to those pieces that enable accessing the data
ENCODING MODULES: pieces used to store actual data
FINDER PATTERN: These are made up of alternating black and empty modules used to indicate
the position of the symbol’s internal components.
ALIGNMENT PATTERNS: looking much like smaller versions of the positional detection
indicators may occur in several places in the code depending on the code version.
ENCODING PORTION: consists of the information formatting areas and the data and error
correction space.
QUIET ZONE: A clear space around the symbol
18	
  
HOW IT ALL WORKS 
Data is divided up into code blocks within the data
area, and each code block is sized so that it can
contain no more than 15 errors. This strategy
simplifies the algorithm, and interleaving the data in
the code blocks minimizes the possibility of an
unreadable code due to partial damage to symbol.
This also allows for some artistic license with adding
logos and other simple graphics to QR Codes.
QR Codes can contain four basic types of information:
numeric, alphanumeric, binary and Kanji.
The key to the success of QR Codes lies in the
use of Reed-Solomon error correction.

19	
  
The QR Code bridges the gap between
the physical and virtual worlds.
	
  	
  
20	
  
About NEPS:
NEPS is a Business-Process-Automation Software and Services company. We
deliver the technology platform and services for personalized communications
between our clients and their customers with data-driven hosted and installed
software solutions.
Our mission-critical business solutions operate in highly complex, data-intensive,
regulated environments for the financial services, insurance, healthcare and other
select industries.
 

© NEPS, LLC. All rights reserved.

Contact NEPS:
www.neps.com
@nepsllc
(866)636-6377

21	
  

Más contenido relacionado

La actualidad más candente

Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBadshah34
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013JASON WOODHOUSE
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology pptNeeta Chavare
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Likan Patra
 
Technical Report On Barcode
Technical Report On BarcodeTechnical Report On Barcode
Technical Report On BarcodeSuryadip Basu
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminarUmsh23
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessArnab Roy Chowdhury
 
Barcode technology
Barcode technologyBarcode technology
Barcode technologyPRANJAL SONI
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technologybhupathi vikas
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readersadil529
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationAkshay Shelake
 
Barcodes (WHW) What ? How ? Why ?
Barcodes (WHW) What ? How ? Why ?Barcodes (WHW) What ? How ? Why ?
Barcodes (WHW) What ? How ? Why ?Arie Terner
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationZachary Moore
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareMuhammed Afsal Villan
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation sh94880
 

La actualidad más candente (20)

Bar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPTBar code- Techlogogy : Seminar PPT
Bar code- Techlogogy : Seminar PPT
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Barcode technology ppt
Barcode technology pptBarcode technology ppt
Barcode technology ppt
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
BARCODE TECHNOLOGY
 BARCODE TECHNOLOGY BARCODE TECHNOLOGY
BARCODE TECHNOLOGY
 
Technical Report On Barcode
Technical Report On BarcodeTechnical Report On Barcode
Technical Report On Barcode
 
QR Codes seminar
QR Codes seminarQR Codes seminar
QR Codes seminar
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of Business
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
QR Codes: What, Why, How & Where
QR Codes: What, Why, How & WhereQR Codes: What, Why, How & Where
QR Codes: What, Why, How & Where
 
Bar code technology
Bar code technologyBar code technology
Bar code technology
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technology
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
 
Qr codes
Qr codesQr codes
Qr codes
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its application
 
Barcodes (WHW) What ? How ? Why ?
Barcodes (WHW) What ? How ? Why ?Barcodes (WHW) What ? How ? Why ?
Barcodes (WHW) What ? How ? Why ?
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and Hardware
 
"The Barcode" Presentation
 "The Barcode" Presentation  "The Barcode" Presentation
"The Barcode" Presentation
 
QR code
QR codeQR code
QR code
 

Destacado

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14NEPSLLC
 
BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.Gauri Agrawal
 
Operational Amplifiers And Logic Gates
Operational Amplifiers And Logic GatesOperational Amplifiers And Logic Gates
Operational Amplifiers And Logic Gatesdheva B
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Rohan Sawant
 
An introduction to QR Codes.
An introduction to QR Codes.An introduction to QR Codes.
An introduction to QR Codes.Pieter Ardinois
 
SAP Advanced Track and Trace
SAP Advanced Track and TraceSAP Advanced Track and Trace
SAP Advanced Track and TraceRyan Sonnenberg
 
Bar code-technology in tire industry
Bar code-technology in tire industryBar code-technology in tire industry
Bar code-technology in tire industryhemanth102030
 
Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR) Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR) Abhijit Patil
 
Transistor as an amplifier
Transistor as an amplifierTransistor as an amplifier
Transistor as an amplifierAnshu Kumar
 
finfet & dg-fet technology
finfet & dg-fet technologyfinfet & dg-fet technology
finfet & dg-fet technologyKritika Ramesh
 
ground penetrating radar
ground penetrating radarground penetrating radar
ground penetrating radarGauravate
 
Fin Fet Technology by SAMRA
Fin Fet  Technology by SAMRAFin Fet  Technology by SAMRA
Fin Fet Technology by SAMRABal Partap Singh
 

Destacado (20)

RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14Agile the right methodology delivers phenomenal results - Xploration 14
Agile the right methodology delivers phenomenal results - Xploration 14
 
BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.BAR CODE AND R.F.I.D.
BAR CODE AND R.F.I.D.
 
Operational Amplifiers And Logic Gates
Operational Amplifiers And Logic GatesOperational Amplifiers And Logic Gates
Operational Amplifiers And Logic Gates
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
Barcode
BarcodeBarcode
Barcode
 
Operational amplifiers
Operational amplifiersOperational amplifiers
Operational amplifiers
 
An introduction to QR Codes.
An introduction to QR Codes.An introduction to QR Codes.
An introduction to QR Codes.
 
SAP Advanced Track and Trace
SAP Advanced Track and TraceSAP Advanced Track and Trace
SAP Advanced Track and Trace
 
Bar code-technology in tire industry
Bar code-technology in tire industryBar code-technology in tire industry
Bar code-technology in tire industry
 
QR-CODE presentation slide
QR-CODE presentation slideQR-CODE presentation slide
QR-CODE presentation slide
 
Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR) Ground Penetrating Radar (GPR)
Ground Penetrating Radar (GPR)
 
Transistor as an amplifier
Transistor as an amplifierTransistor as an amplifier
Transistor as an amplifier
 
Qr code power point
Qr code power pointQr code power point
Qr code power point
 
finfet & dg-fet technology
finfet & dg-fet technologyfinfet & dg-fet technology
finfet & dg-fet technology
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Bar Code
Bar CodeBar Code
Bar Code
 
Nano solar cells
Nano solar cellsNano solar cells
Nano solar cells
 
ground penetrating radar
ground penetrating radarground penetrating radar
ground penetrating radar
 
Fin Fet Technology by SAMRA
Fin Fet  Technology by SAMRAFin Fet  Technology by SAMRA
Fin Fet Technology by SAMRA
 

Similar a Understanding Bar Codes

Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology pptVyakhayaYadav
 
Barcodes & Your Business
Barcodes & Your BusinessBarcodes & Your Business
Barcodes & Your BusinessLabelValue.com
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technologyDeveshDRA
 
Quick Response Code (QR code)
Quick Response Code (QR code)Quick Response Code (QR code)
Quick Response Code (QR code)Aditya Jha ✅
 
The Definitive Guide to Barcoding
The Definitive Guide to BarcodingThe Definitive Guide to Barcoding
The Definitive Guide to BarcodingADCBarcode
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
 
How do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode KnowledgeHow do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode KnowledgeBarcode Live
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.RakibulIslam268
 

Similar a Understanding Bar Codes (20)

QR code
QR codeQR code
QR code
 
Barcode Decoder
Barcode DecoderBarcode Decoder
Barcode Decoder
 
Qr codes
Qr codesQr codes
Qr codes
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
 
Qr codes
Qr codesQr codes
Qr codes
 
Qr codes web
Qr codes webQr codes web
Qr codes web
 
Barcodes
BarcodesBarcodes
Barcodes
 
Barcodes & Your Business
Barcodes & Your BusinessBarcodes & Your Business
Barcodes & Your Business
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technology
 
Quick Response Code (QR code)
Quick Response Code (QR code)Quick Response Code (QR code)
Quick Response Code (QR code)
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
The Definitive Guide to Barcoding
The Definitive Guide to BarcodingThe Definitive Guide to Barcoding
The Definitive Guide to Barcoding
 
Silchar paper final
Silchar paper finalSilchar paper final
Silchar paper final
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
How do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode KnowledgeHow do barcodes work? A Complete Guide Barcode Knowledge
How do barcodes work? A Complete Guide Barcode Knowledge
 
Presentation on QR code.
Presentation on QR code.Presentation on QR code.
Presentation on QR code.
 
14 571
14 57114 571
14 571
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Understanding Bar Codes

  • 2. TABLE OF CONTENTS UPC Bar Code How They Are Commonly Used … 4 Anatomy of A UPC (A) Bar Code … 5 UPC (A) Bar Code Glossary … 6 How It All Works … 7 Testing The Algorithm … 8 QR Code How They Are Commonly Used … 16 The Anatomy Of A QR Code … 17 QR Code Glossary … 18 How It All Works … 19 2D Bar Code / Data Matrix How They Are Commonly Used … 10 Anatomy Of A Data Matrix … 12 Data Matrix Bar Code Glossary … 13 Benefits of The Data Matrix … 14 2  
  • 3. UPC BAR CODE The UPC ( A ) bar code symbol, is one of the most common applications of bar code technology and is seen on products everywhere. 3  
  • 4. HOW THEY ARE COMMONLY USED Bar codes are everywhere and they are used to identify everything from auto parts to hospital patients. The Universal Product Code is used to identify retail items in virtually every store and market in the country. 4  
  • 5. THE ANATOMY OF A UPC (A) BAR CODE 95 MODULES WIDE! LEFT GUARD! CENTER GUARD! THE  FIRST  SIX    FIGURES  DEFINE  THE     MANUFACTURER’S    IDENTIFICATION  NUMBER   RIGHT GUARD! THE  NEXT  FIVE     DIGITS  ARE  THE     ITEM  NUMBER     MANUFACTURER     IDENTIFICATION     NUMBER   CHECKSUM     DIGIT     MANUFACTURER  ID  CODE   ITEM  NUMBER   5  
  • 6. UPC (A) BAR CODE GLOSSARY UPC: Universal Product Code MODULES: The vertical bars that make up the bar code symbol. Numbers are created by patterns of filled and unfilled modules. 84 modules are used for digits, and 11 are used for the guards that define the symbols boundaries. GUARDS: Left and right guards mark the beginning and end of the symbol and the center guard marks the division between the manufacturer and product codes. MANUFACTURER CODE: Is made up of the first six digits and is distributed and managed by the UCC (Uniform Code Council). MANUFACTURER IDENTIFICATION NUMBER: Used to identify the particular numbering system used by the manufacturer. ITEM NUMBER: Assigned to each product and is defined by the last five digits. CHECKSUM: A single digit used for error checking. 6  
  • 7. HOW IT ALL WORKS First, the scanner flashes a laser across the code reading the lines and spaces across. ! 1+3+5+7+9=25 In a fraction of a second the scanner makes several calculations to determine the orientation of the code and then error checks to make certain that the scan was valid. ! ! It does this by testing an algorithm against the checksum digit.! 7  
  • 8. TESTING THE ALGORITHM 0+2+4+6+8=20   20x3=60   1+3+5+7+9=25   First the scanner sums the digits in the odd positions ! Then it multiplies that ! result by three! Next, it sums the even ! place digits ! 60+25=85   85/10=8R5   10-­‐5=5   And adds the two sums! That result is divided by ten! The remainder is subtracted from ten to verify the checksum. If the checksum doesn’t match, the scanner reports an error and the code must be re-scanned.! 8  
  • 9. 2D BAR CODE / DATA MATRIX Two dimensional bar codes are called so because the reader scans both horizontally and vertically across the symbol, unlike linear barcodes. 9  
  • 10. HOW THEY ARE COMMONLY USED Along with the less popular PDF417 (actually stacked linear) and Aztec symbologies, Data Matrix is commonly used in healthcare. Because of its accuracy, efficiency and small size, it works particularly well on patient wristbands and medication labels, as it is less likely to distort around curves and takes up less space, in addition to being highly readable and accurate. 10  
  • 11. 2D symbologies, like Data Matrix, provide a consistent and reliable means of labeling small objects.     11  
  • 12. THE ANATOMY OF A DATA MATRIX TIMING  PATTERN   QUIET  ZONE   MODULE   DATA  REGION   FINDER  PATTERN   12  
  • 13. DATA MATRIX BAR CODE GLOSSARY MODULES: Small square cells that make up the bar code symbol. Usually, dark modules represent a digital 1 and light represent 0. FINDER PATTERN: Two adjacent, solid borders are designated the finder pattern. These borders are used by the scanner to locate and orient the symbol and to correct distortion. TIMING PATTERN: Two opposite adjacent pair of borders are constructed with alternating dark and light cells and are designated as the timing pattern. This component gives the scanner information about the symbol’s size. DATA REGION: The actual data and error correction information is divided into regions in the symbol which contain a pattern of modules in a consistent array. QUIET ZONE: A clear space around the symbol. 13  
  • 14. BENEFITS OF THE DATA MATRIX VERY EFFICIENT: Misread probability of 1/10.5 million (for the 3 of 9 symbol the probability drops to 1/1.7 million). SMALL: Almost 40X smaller than a 3 of 9 carrying the same data. DEPENDABLE: Error correction capabilities (ECC200 method) allows accurate reads on symbols with up to 60% damage. FAXABLE: Data Matrix is also one of the few codes that are faxable. The outstanding capabilities of ECC200 error correction allows even poorly resolved faxed images to be reliably scanned. STORAGE CAPACITY: They are designed to encode up to 2335 alphanumeric characters, though they have a recommended limit of 800 characters, actual best case is around 1200. 14  
  • 15. QR CODE The Quick Response or QR code is a trademarked two-dimensional barcode first designed for the automotive industry in Japan in 1994 by Denso Wave, a Toyota subsidiary. Almost a decade ago, it was introduced to enable high-speed component scanning during the manufacturing process. 15  
  • 16. HOW THEY ARE COMMONLY USED Since then QR codes have become ubiquitous, showing up on product packaging, billboards and bumper stickers, in magazines and just about any place where a consumer with a smartphone is likely to seek more information about any topic, item or idea. 16  
  • 17. THE ANATOMY OF A QR CODE TIMING  PATTERN   MODULES   ENCODING  PORTION   ALIGNMENT  PATTERN   FINDER  PATTERN   17  
  • 18. QR CODE GLOSSARY MODULES: square modules arranged on a grid. These modules form the components of the code. Within the code the modules fall into two categories:  functional and encoding. FUNCTIONAL MODULES: referring to those pieces that enable accessing the data ENCODING MODULES: pieces used to store actual data FINDER PATTERN: These are made up of alternating black and empty modules used to indicate the position of the symbol’s internal components. ALIGNMENT PATTERNS: looking much like smaller versions of the positional detection indicators may occur in several places in the code depending on the code version. ENCODING PORTION: consists of the information formatting areas and the data and error correction space. QUIET ZONE: A clear space around the symbol 18  
  • 19. HOW IT ALL WORKS Data is divided up into code blocks within the data area, and each code block is sized so that it can contain no more than 15 errors. This strategy simplifies the algorithm, and interleaving the data in the code blocks minimizes the possibility of an unreadable code due to partial damage to symbol. This also allows for some artistic license with adding logos and other simple graphics to QR Codes. QR Codes can contain four basic types of information: numeric, alphanumeric, binary and Kanji. The key to the success of QR Codes lies in the use of Reed-Solomon error correction. 19  
  • 20. The QR Code bridges the gap between the physical and virtual worlds.     20  
  • 21. About NEPS: NEPS is a Business-Process-Automation Software and Services company. We deliver the technology platform and services for personalized communications between our clients and their customers with data-driven hosted and installed software solutions. Our mission-critical business solutions operate in highly complex, data-intensive, regulated environments for the financial services, insurance, healthcare and other select industries.   © NEPS, LLC. All rights reserved. Contact NEPS: www.neps.com @nepsllc (866)636-6377 21