abelo robles group edited
TRANSCRIPT
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 1/28
CHAPTER I
INTRODUCTION
Rationale of the Study
Don Bosco Technology Center opened its Electronics and
Communications Engineering program in 2003 and has housed its requisite
laboratory and workshop courses under the ELEX Building. The building holds
the Analog, Digital, Automation, Energy Conversion, Communication and
Chemistry laboratories among others. These laboratories, along with other
workshops, provide equipments and tools necessary for the students’ use.
However, the researchers observed that during the course of the school
year, some equipment are rendered to be in bad working condition due to
breakage or some other defect not present at the beginning of the term. This,
together with a particular problem identified by Mr. Raul Francis Cambaya, ELEX
Laboratories In-Charge, regarding the lack of monitoring capability of the current
borrowing system of equipments and tools wherein student ID’s are left upon the
time of borrowing of an equipment, accidentally left and claimed at a later date—
without properly recorded confirmation if the borrowed equipment was returned in
a good condition or not, prompted the interest of the researchers to design a new
system for borrowing and monitoring of tools and equipments.
Conceptual Background
The study focused on the borrowing and monitoring system of equipments
and tools from the ELEX Analog laboratory of the College Department of Don
Bosco Technology Center.
The study will utilize the existing databases of both the students of the
College Department and the inventory of equipments and tools on the ELEX
Analog laboratory.
1
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 2/28
After gathering the necessary information for the functionality of the
system to be designed, Bar Codes will be generated for the equipments and
tools with designated RFID tags—the student ID’s having existing barcodes in
them. Then the installation of suitable scanning equipment and sensor detector
equipment follows, together with the design of the output report for the
borrowing/returning transaction.
Finally, testing and evaluation will be the final step for the completion of
the study.
FIGURE 1-1 The Conceptual Framework
2
Student IDWITH BARCODE
Borrowed EquipmentWITH BARCODE AND RFID TAG
BARCODE SCANNER RFID READER
COMPUTER SYSTEM
- Check the destination of theborrowed equipment
- Identify the borrowingdetails
- If the equipment is limitedto the Analog Laboratoryonly, report unauthorized
transfer of equipment
- Utilize existing student andequipment database
- Identify the following:
Borrower’s Name
Program and Year Level
Items Borrowed
Time and Date Borrowed
Destination of Equipment
- Once all items are successfully returned, the Borrower willbe clear of any pending transactions
- Time and Date Returned will also be identified
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 3/28
Theoretical Background
Bar Code Technology
A Barcode (or Bar Code) is an optical machine-readable representation of
data, which shows certain data on certain products. Originally, barcodes
represented data in the widths (lines) and the spacings of parallel lines, and may
be referred to as linear or 1D (1 dimensional) barcodes or symbologies. They
(now) also come in patterns of squares, dots, hexagons and other geometric
patterns within images termed 2D (2 dimensional) matrix codes or symbologies.
Although 2D systems use symbols other than bars, they are generally referred to
as barcodes as well. Barcodes can be read by optical scanners called barcode
readers, or scanned from an image by special software.
(http://en.wikipedia.org/wiki/Barcode)
Bar Code Technology is an automatic identification technology structured
to contain a specific piece of information that allows real-time data to be collected
accurately and rapidly.
Bar Code Symbology
The mapping between messages and barcodes is called a symbology.
The specification of a symbology includes the encoding of the single
digits/characters of the message as well as the start and stop markers into bars
and space, the size of the quiet zone required to be before and after the barcode
as well as the computation of a checksum.
Linear symbologies can be classified mainly by two properties:
•
Continuous vs. Discrete: Characters in continuous symbologies usuallyabut, with one character ending with a space and the next beginning with a
bar, or vice versa. Characters in discrete symbologies begin and end with
bars; the intercharacter space is ignored, as long as it is not wide enough to
look like the code ends.
3
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 4/28
FIGURES 1-2A and 1-2B show the Bar Code Discrete Symbology and the
Bar Code Continuous Symbology, respectively.
• Two-width vs. Many-width: Bars and spaces in two-width symbologies are
wide or narrow; how wide a wide bar is exactly has no significance as long as
the symbology requirements for wide bars are adhered to (usually two to
three times wider than a narrow bar). Bars and spaces in many-width
symbologies are all multiples of a basic width called the module.
(http://en.wikipedia.org/wiki/Barcode)
FIGURE 1-2A Bar Code Discrete Symbology
FIGURE 1-2B Bar Code Continuous Symbology
4
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 5/28
Bar Code Scanners
A barcode reader (or barcode scanner) is an electronic device for reading
printed barcodes. Like a flatbed scanner (or an ordinary image scanner), it
consists of a light source, a lens and a light sensor translating optical impulses
into electrical ones. Additionally, nearly all barcode readers contain decoder
circuitry analyzing the barcode's image data provided by the sensor and sending
the barcode's content to the scanner's output port.
Types of Scanners (or Readers):
• Contact Readers: This type of reader must touch or come in close proximity
of symbol being scanned. These come in the forms of normally hand-
held/stationary units. A common type of contact reader is pen/wand reader.
FIGURE 1-3 Contact Readers
• Non-contact Readers: This type of reader need not come in contact with the
symbol. The scan distance may be from 6” to several feet depending upon
symbol size and scanner design. It usually comprises of hand-held, fixed
beam readers. FIGURES 1-4A and 1-4B show examples of non-contact
readers.
5
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 6/28
FIGURE 1-4A Hand-Held Moving Beam Readers
FIGURE 1-4B Fixed Beam Slot Scanner
Radio Frequency Identification
Radio frequency identification (RFID) is an identification system that uses
radio waves to send data, and RFID tags or transponders. The first patented
RFID device was a passive radio transponder with an integrated memory by
Mario Cardullo. At present, the technology has many applications, particularly in
the retail industry because of its small size, low power demands and high levels
of efficiency offered. A figure of a basic RFID system is featured in FIGURE 1-5.
Radio-frequency identification involves interrogators (also known as
readers), and tags (also known as labels).
6
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 7/28
Most RFID tags contain at least two parts. One is an integrated circuit for
storing and processing information, modulating and demodulating a radio-
frequency (RF) signal, and other specialized functions. The second is an antenna
for receiving and transmitting the signal.
There are generally three types of RFID tags: active RFID tags, which
contain a battery and can transmit signals autonomously, passive RFID tags,
which have no battery and require an external source to provoke signal
transmission, and battery assisted passive (BAP) RFID tags, which require an
external source to wake up but have significant higher forward link capability
providing greater range.
FIGURE 1-5 An RFID System
7
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 8/28
THE PROBLEM
Statement of the Problem
The lack of monitoring capability of the currently used borrowing system of
laboratory equipments and tools constitute the general problem of the project.
This study was conducted to come up with a new borrowing system with the use
of Bar Code Technology and monitoring system with the use of Detector.
Specifically, the study will answer the following questions:
1. How will the in and out flow of the laboratory equipments and tools be
monitored in the Analog Laboratory?
2. What will be the roles of the identified technologies in the flow of the whole
system?
3. What will be the flow of the process of borrowing and returning of
equipments and tools?
Significance of the Study
This study hopes to make a contribution to the following:
College students
This study will introduce a new and more efficient borrowing system of
equipment and tools in the ELEX Analog laboratory. It will also provide the
students more use of their ID other than for mere identification purposes.
Laboratory In-Charge / Personnel
This study will help provide a more accurate, efficient and proper
monitoring of the laboratory equipments and tools; giving involved personnel less
liability towards any untoward incident to the borrowed items.
8
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 9/28
DBTC College Department
This study will help to properly monitor the laboratory tools and
equipments, which are part of school property. It will also help in monitoring
damage done to the items.
Fund of Knowledge
This study will recognize the ability of the Bar Code Technology with a
designated RFID tag as an efficient agent in the monitoring of school property—
in terms of laboratory equipments and tools.
Scope and Limitations
Scope
This research study is limited and conducted only at Don Bosco
Technology Center College Department – ELEX Analog laboratory for the year
2010. The study includes the designing and installation of the Bar Code System
and sensor detector.
The respondents of the study are the college students and the workshop
in-charge / personnel. The study will apply new technology for a more efficient
borrowing system and monitoring system for equipments and tools in the ELEX
Analog laboratory. The study will only be applied on the monitoring of the
equipments and tools within the Analog laboratory.
Limits
However, the study does not include the monitoring or tracking of the
presence of the borrowed equipments and tools within the allowable vicinity. The
designing and the making of the equipments and tools to be borrowed is also not
included in the scope of this study. The software that will manipulate the
available database is not included in this study. The study only limits the
9
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 10/28
monitoring of the presence of the borrowed equipments and tools within the
Analog laboratory. The monitoring will not include the unauthorized transfer of
the equipments and tools done through any means except through the main door
way of the Analog Laboratory.
Definition of Terms
These are the terms used by the researchers as basis for the formulation
of the study:
Bar - is the darker, non reflective element of a Bar Code.
Bar Code - (or Barcode) is a predefined format of dark bars and white spaces
structured to contain a specific piece of information.
Bar Code Technology - is an automatic identification technology that makes use
of Bar Codes.
Bi-directional Symbol - is a Bar Code symbol format which permits reading in
either direction across the bars and spaces.
Check Digit - is a calculated character included within the Bar Code for error
detection.
Fixed Beam Scanner - A stationary Bar Code Scanner. The symbol must be
moved through the light beam to be read.
Hand-held Scanner - is a scanner held and operated by a human operator.
Inter-character Gap - is the space between the bars or spaces.
Moving Beam Scanner - is a Bar Code scanner that uses a moving light beam
to dynamically scan and decode a Bar Code symbol.
Space - is the lighter, reflective element of a Bar Code.
10
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 11/28
Start Character - is a special pattern of bars and spaces used to identify the
beginning of a Bar Code symbol.
Stop Character - is a special pattern of bars and spaces used to identify the end
of a Bar Code symbol.
Radio-frequency identification (RFID) - is the use of an object applied to or
incorporated into a product, animal, or person for the purpose of identification
and tracking using radio waves.
11
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 12/28
CHAPTER II
RELATED LITERATURE
This study is concerned with the borrowing system of tools and
equipments of the ELEX laboratories and workshops. L. McCathie (2004) in his
thesis entitled “The advantages and disadvantages of barcodes and radio
frequency identification in supply chain management” conducted in the University
of Wollongong, identified the history, standards and application of Bar Code
Technology(http://ro.uow.edu.au/cgi/viewcontent.cgi?
article=1009&context=thesesinfo). The study is related to implementation of Bar
Code System in the laboratories and workshops, this study helps to overview the
advantages and disadvantages of the Bar Code Technology.
Barcodes are “printed horizontal strips of vertical bars used for identifying
specific items”. A “scanning device reads the barcode by moving a beam across
the symbol”. The first barcode system was developed around the 1940s and
1950s, since then people have become very accustomed to their use, through
common applications such as in retail and grocery markets.
Barcode Standards
As with the history of barcodes, most works provide, to some degree,
background information regarding the development of barcode standards. While
most sources examine a number of standards, there is a common facet among
all works in that they discuss the importance of the UPC (Universal Product
Code) standard.
Palmer offers a broad range of technical information on barcode standards
and symbologies. A symbology is “the term used to describe how information is
encoded into the physical attributes of the bars and spaces”, and, as such, it is of
significant importance to barcodes. In the article EAN/UCC create new item
marking symbologies, a new family of linear barcodes, reduced space symbology
12
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 13/28
(RSS), and is explained. This symbology “will allow for the co-existence of
symbologies already being used and can be supported by [existing barcode
equipment]”.
Barcode applications
Barcode technology has been used for decades and during this time has
proved itself as a reliable performer when supporting SCM. Testament to this is
the versatility in which the technology can be adapted to suit specific
applications. There is a plethora of case studies which examine the role of
barcodes within a particular SCM scenario such as Auto Group hits high notes
with new inventory management system and RF cuts processing time for Lexus
car and parts deliveries. The articles provide a snapshot of specific barcode
implementations and, as with most works of this time, both case studies provide
an analysis of how barcode technology is helping the company improve their
SCM processes.
Another work that cites a brief overview of Bar Code Technology is that of
Stefan Hofmayr (2005) in his master thesis entitled “Analysis and comparison of
the potential of RFID-technology in European and U.S. retail supply chains”
(http://www-sre.wu-wien.ac.at/neurus/Stefan_Hofmayr.pdf). The study related to
the Bar Code System, this study had discussed the binary code and the symbols
used in a Bar Code Technology.
Barcode systems
The barcode is a binary code with bars and gaps specifically arranged to a
predetermined pattern. The sequence of these wide and narrow bars and gaps
refers to an associated symbol that can be interpreted numerically andalphanumerically. An optical laser scanner reads the barcode by the reflection of
a laser beam from the black bars and white gaps. There are different kinds of
barcodes with the EAN code (European Article Number) being the most popular
one designed in 1976 specifically for the grocery industry. It is a development of
the UPC (Universal Product Code) from the United States.
13
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 14/28
The EAN code consists of 13 digits. The first two or three numbers identify
the country where the EAN code was assigned. This does not necessarily mean
that the product was manufactured in this country. The next five numbers identify
the company, then the 5 numbers manufacturer’s item number and a one
number check digit (Finkenzeller 2003: 3).
The negative aspects of barcodes are the limited storage capacity and
that they cannot be reprogrammed. Furthermore, the use in a dirty or dusty
environment such as manufacturing plants might make it impossible to read the
barcode. Nevertheless the barcode is still widely used and shows similarities to
RFID from the protests when it was launched to the applications in today’s
business environment.
Another work that cites a brief overview of Bar Code Technology that
relate to Bar Code System, the study relate on the barcode reader used in the
RFID system. S.F.G. Verdonkschot(2007) in his master thesis University of
Twente(http://www.utwente.nl/ewi/dacs/assignments/completed/master/reports/v
erdonkschot_01_07.pdf).
Radio frequency Identification (RFID) is in the broadest sense a
technology that allows unique identification of objects by the use of radio signals.
If we use this general definition for RFID we can see that many RFID systems
are already in use today, for example in access control cards for admission to
buildings and cars, payment systems on toll roads and gas stations, the tracking
of library books and with skiers using ski lifts.
RFID works according to this same basic concept. A signal is sent by a
reader to a transponder or tag, which wakes up and either reflects back a signal
(passive system) or broadcasts a signal (active system) using its own power
source, for example an onboard battery, back to the reader.
An example of borrowing system in library that is related to the borrowing
system implemented in the Don Bosco College laboratories. The system was
14
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 15/28
conducted Education Department of Western Australia(1998).
(http://www.det.wa.edu.au/education/cmis/cat/libprocmanual/chapter9.pdf).
Borrower’s Records:
Borrowing via an automated system relies on matching barcode numbers
allocated to resources with user barcode numbers allocated to borrowers.
Information or data about each borrower is entered onto the automated system
and matched with a barcode or other unique identifier.
Sources of Borrower Information:
The barcode is a binary code with bars and gaps specifically arranged to a
predetermined.
Borrower information can be entered:
1. Manually;
2. Downloaded from the school administration system, or
3. Downloaded by the software supplier from another database.
Download from the School Administration system
Student and staff data from the school administration system is
loaded onto the automated system. This borrower information: is loaded
without changing circulation information, and remains up-to-date if regular
downloads are made.
Download from another database
Schools may already have student and staff data on a separate
database. This data may be able to be loaded onto the system. For
specific information, contact the software supplier.
15
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 16/28
Borrower Identification
Borrowers entered onto the system may be identified by the use of a
barcode, by using a version of their name, or by their Personal Identification
Number (PIN).
Using barcodes
Barcodes may be attached to class lists or individual cards. The
class lists of students can have barcodes attached adjacent to each name.
These lists can be placed inside plastic sheets and stored in ring binders
at the issue desk. Individual student cards are used with commercial
barcodes attached. These may be:
1. given to students;
2. stored in boxes at circulation desk;
3. stored in photo albums, or
4. stored in slide borders.
16
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 17/28
CHAPTER III
METHODOLOGY
Introduction
This study was conducted in order to apply the Bar Code Technology and
RFID gate pedestal antenna for easy monitoring of borrowing of equipments and
tools in the DBTC Analog laboratory. The researchers conducted research to
utilize and gather the necessary data to solve the problem.
Research environment
A barcode system is a network of hardware and software, consisting
primarily of mobile computers, printers, handheld scanners, infrastructure, and
supporting software. Barcode systems are used to automate data collection
where hand recording is either timely or cost effective. Bar coding systems are
not radio-frequency identification (RFID) systems even though the companies
that provide barcode equipment will often also provide RFID equipment and
many companies use both technologies as part of larger resource management
systems.
Radio-frequency identification (RFID) is the use of an object (typically
referred to as an RFID tag) applied to or incorporated into a product, animal, or
person for the purpose of identification and tracking using radio waves. Some
tags can be read from several meters away and beyond the line of sight of the
reader.
Don Bosco Technology Center is an institution that mainly offers Basic,
Secondary, Technical-Vocational and Tertiary education. The CollegeDepartment of the institution likewise offers the programs Bachelor of Science in
Technical Education, Bachelor of Science in Mechanical Engineering, Bachelor
of Science in Electronics Engineering, Bachelor of Science in Industrial
Engineering and Bachelor of Arts in Religious Education, which is mainly held in
the Don Bosco Seminary - Lawaan.
17
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 18/28
The Bachelor of Science in Electronics Engineering (BSECE) program
holds most of its laboratory and workshop courses at the ELEX Building, a two-
storey building which holds the Analog, Digital, Communications, Automation,
Energy Conversion, and Chemistry Laboratories among others; together with the
Basic Mechanical, Electrical, and Electronics Workshops.
The main locale of the study is in the main Tool Room of the ELEX; a
small room adjacent to the Analog and Digital Laboratories on the second floor of
the building. The room holds the necessary tools and equipments to be used on
electronics-related experiments necessary for the BSECE program such as
multitesters, oscilloscopes, function generators, analog and digital trainers,
power supplies, etc.
FIGURE 3-1 The Second Floor Layout of the ELEX Building
18
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 19/28
The barcode system will then be applied to the aforementioned
equipments, or basically, it is to be implemented on the equipments and tools in
the Tool Room itself. Barcodes can be used to track inventory, luggage, and
even mail. Warehouses can use barcodes for organizing and providing accurate
status reports for individual packages or shipments. Post-production companies
use barcodes to track videotapes, film reels, as well as other products. In
monitoring the tools and equipments borrowed by the student, a barcode system
saves information into the computer to gather the input data.
Research procedure
The main goal of the researcher is to solve the main problem of an
insufficient borrowing and monitoring system of equipments. Below are the
procedures followed by the researchers over the course of the study:
FIGURE 3-2 The Research Procedure
19
IDENTIFYING THE GENERAL PROBLEM
CONDUCTING AN INTERVIEW TO SUPPORTPROBLEM
IDENTIFYING THE SPECIFIC PROBLEMS
FORMULATING POSSIBLE WAYS TO SOLVE THEGENERAL PROBLEM
IDENTIFYING AND GATHERING DATA ONTECHNOLOGIES TO BE USED FOR THE
SOLUTION
TESTING AND INSTALLING OF THE SYSTEM
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 20/28
Identifying the general problem: This is considered to be the start of the
study, where the researchers identify a general problem based from their own
observations and experiences.
Conducting an interview to support the problem: In order to support
the details observed by the researchers, they conduct an interview with the
person directly related to the identified problem. Having an affirmative response
from the person in-charge will support the need for the study to be conducted.
Identifying the specific problems: After gaining supporting details from
the interview conducted, the researchers then identify the specific problems that
when solved, will eventually equate with the resolution of the general problem.
Formulating possible ways to solve the general problem: The
researchers then think of ways to solve the general problem. For this particular
study, the persons indentified the need for a more efficient borrowing and
monitoring system other than the currently used, borrowing slip system.
Identifying and gathering data on technologies to be used for the
solution: After identifying the general system that will be needed to solve the
problem, the researchers then identify the technologies that can be used for the
system in mind. For this particular study, the researchers have identified
technologies commonly used for different monitoring systems used in
commercial establishments and on school systems. These technologies are the
Barcode and the RFID technologies.
After the identification of such technologies, further data gathering is then
undertaken. The role of each technology on the flow of the entire system is then
identified and the limits of their application are drawn.
Testing and installing of the system: After the general flow of the
system is finalized and each technology to be used has finally identified their
roles and limits, what will follow will be the testing and the installation of the
system.
20
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 21/28
Problem
The researcher conducted an interview to the Laboratory and workshop in
charge Mr. Francis Raul Cambaya. In the interview, Mr. Cambaya stated the lack
of monitoring capability of the current borrowing system of the equipments and
tools. The proposed system will also make use of the current barcodes printed on
each student I.D. As a solution to problem, the researchers conducted a research
and implementation of the Bar Code Technology.
Literature Review
After determining the problem, the researchers gathered all the data,
theories and relevant information from the internet, the Don Bosco College
Library, and within the experience of individuals in an automation data gathering.
Most of the information gathered by the researchers were from different countries
since they were originally designed by foreigners. In order to understand the
functionality of the system the researchers studied and gather more information
of Bar Code Technology.
Method of Analysis
After identifying the problem and gathering sufficient data, the researchers
decided on the steps upon by which the proposed Bar Code Technology would
make a sufficient technology to be applied on a new system of borrowing
laboratory tools and equipment.
The Borrowing System
For the borrowing system to function effectively, the researchers have
identified the two main sources of information that will be processed upon theactual borrowing transaction:
1. The College Students’ Records – This database classification includes the
name of the student, the program to which the student is enrolled, and the
student’s ID number with corresponding barcode.
21
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 22/28
2. Inventory of ELEX Equipments and Tools – This database classification
includes the name of the item, its functionality, and its corresponding barcode.
Barcode Generation and Scanning
The type of barcode to be generated for the equipments will follow the
type of barcode already generated for the ID of the college students, known as
Code 39 (see FIGURE 3-3)
FIGURE 3-3 Code 39 Symbol
The type of scanner that will be installed and used for the projects
application be hand-held (see FIGURE 3-4 for an example):
FIGURE 3-4 Zebex Z-3010 Barcode Scanner
Equipment Monitoring
In addition to the borrowing system, the study also includes the monitoring
of the presence of the borrowed equipment at the Analog Laboratory. It means
22
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 23/28
that if the equipment was borrowed to be used within the Analog Laboratory, it
should remain in there unless authorized to be transferred to another working
area.
Since the equipments are tagged with designated barcodes and RFID
tags, a functional RFID monitoring system should be placed within the research
environment. This includes an RFID Antenna Gate (with an example pictured
above on FIGURE 3-5) to be placed on the main doorway of the Analog
Laboratory and a Reader and Computer System which will be housed on the
Tool Room of the ELEX Building.
FIGURE 3-5 L-SP3 Clear Antenna Gate
The L-SP3 Clear Antenna Gate is designed for environments where
aesthetics are a key factor, the clear L-SP3 version couples a sleek profile and
high quality acrylic panel with high performance electronics to achieve a best in
breed RFID security system.
23
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 24/28
The Procedures
The following pages will feature figures and discussions on the different
procedures that will be involved in the borrowing and monitoring system as
proposed in the study.
It will include an overview of the actual scanning procedure (see FIGURE
3-6), where the scanning of a bar coded item is presented, illustrating what the
flow of the process for the actual scanning of equipments will be. What will follow
will be the actual borrowing and returning procedures to be followed presented in
full text and in a block diagram (see FIGURE 3-7).
The process of borrowing follows the following steps:
1. The borrower identifies what tools and equipments that he/she will borrow
2. The borrower has his/her I.D barcode scanned. The name of the borrower is
then recorded. The time borrowed and destination of the borrowed items will also
be identified and recorded accordingly.
3. The laboratory in-charge scans the barcode for each tool or equipment
borrowed, recording them to be borrowed by the identified borrower that was
recorded earlier.
4. Thus, the recorded data includes: the name of the borrower, the time and date
that the equipments were borrowed, the destination of the borrowed items, and
the list of borrowed tools and equipments.
5. Upon the return of the borrowed items, provided that they are returned on
good working condition, the laboratory in-charge therefore records the items as
returned and closing any pending transaction from the borrower.
24
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 25/28
The Actual Scanning Procedure
Scanner Bar Code
Item Record Display Computer Item RecordBar Code
Software System
Item Record Display
FIGURE 3-6 The Actual Scanning Process (Pictorial Diagram)
25
Borrowers identify theequipment and tools to
be use.
The borrower hashis/her I.D barcode
scanned
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 26/28
FIGURE 3-7 The Borrowing/Returning Procedure (Block Diagram)
GANTT CHART
TABLE 3-1 Gantt chart
Tasks June July August September October
Research
Canvassingof materials
Designing
Constructing
Testing
Task description (based on the tasks itemized in Table 3-2):
26
The laboratory in-charge scans the
barcode for each tool or equipment borrows.
Recording Data
Upon the return of the borrowed items,
Records the items as returned and closes
any pending transaction from the
borrower.
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 27/28
Research – the gathering of all the data information of the Bar Code Technology.
Canvassing of materials – the canvassing of all materials to be used in Bar
Code System.
Designing – designing of the construction of the Bar Code system on the ELEX
Building.
Construction – constructing the equipments of the Bar Code System in the
ELEX laboratories. This include the software and hardware installation.
Testing – testing and practicing the use of the Bar Code System.
BIBLIOGRAPHY
www.icast.org.in/staff/barcode.ppt
27
8/8/2019 Abelo Robles Group Edited
http://slidepdf.com/reader/full/abelo-robles-group-edited 28/28
Accessed on July 15, 2010, 12:00AM
http://en.wikipedia.org/wiki/Barcode_systemAccessed on July 15, 2010, 1:00PM
http://www.barcodesoftwaresystems.com/
Accessed on July 15, 2010, 1:00PMhttp://en.wikipedia.org/wiki/Barcode
Accessed on July 25, 2010, 10:00PM
http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1009&context=thesesinfoAccessed on August 3, 2010, 9:00PM
http://www-sre.wu-wien.ac.at/neurus/Stefan_Hofmayr.pdf Accessed on August 3, 2010, 10:00PM
http://www.utwente.nl/ewi/dacs/assignments/completed/master/reports/ver Donkschot_01_07.pdf Accessed on August 5, 2010, 10:00PM
http://www.det.wa.edu.au/education/cmis/cat/libprocmanual/chapter9.pdf Accessed on August 5, 2010, 10:00PM
http://www.ers-online.co.uk/p1487/zebex-z-3010-barcode-scanner-multi-interface-ccd Accessed on September 23, 2010, 1:00 PM
http://en.wikipedia.org/wiki/Radio-frequency_identificationAccessed on September 23, 2010, 2:00PM