abelo robles group edited

28
CHAPTER I INTRODUCTION Rationale of the Study Don Bosco Technology Center opened its Electronics and Commun icat ions Engine erin g program in 200 3 and has hou sed its req uisi te laboratory and workshop courses under the ELEX Building. The building holds the Analo g, Dig ita l, Aut omati on, En erg y Convers ion , Communi catio n and Che mistry laboratories among others. The se labo rat ories , along with other workshops, provide equipments and tools necessary for the students’ use. However, the researchers observed that during the course of the school year, some equip ment are rendere d to be in bad wor ki ng con dit ion due to breakage or some other defect not present at the beginning of the term. This, together with a particular problem identified by Mr. Raul Francis Cambaya, ELEX Laborato ries In-Charge, regardin g the lack of monitor ing capability of the current borrowin g system of equipme nts and tools wherein student ID’s are left upon the time of borrowing of an equipment, accidentally left and claimed at a later date— without properly recorded confirmation if the borrowed equipment was returned in a good condition or not, prompted the interest of the researchers to design a new system for borrowing and monitoring of tools and equipments. Conceptual Background The study focused on the borrowing and monitoring system of equipments and tools from the ELEX Analog laboratory of the College Department of Don Bosco Technology Center. The study will utilize the existing databases of both the students of the College Department and the inventory of equipments and tools on the ELEX Analog laboratory. 1

Upload: carlo-adrian-abelo

Post on 09-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 1/28

CHAPTER I

INTRODUCTION

Rationale of the Study

Don Bosco Technology Center opened its Electronics and

Communications Engineering program in 2003 and has housed its requisite

laboratory and workshop courses under the ELEX Building. The building holds

the Analog, Digital, Automation, Energy Conversion, Communication and

Chemistry laboratories among others. These laboratories, along with other 

workshops, provide equipments and tools necessary for the students’ use.

However, the researchers observed that during the course of the school

year, some equipment are rendered to be in bad working condition due to

breakage or some other defect not present at the beginning of the term. This,

together with a particular problem identified by Mr. Raul Francis Cambaya, ELEX

Laboratories In-Charge, regarding the lack of monitoring capability of the current

borrowing system of equipments and tools wherein student ID’s are left upon the

time of borrowing of an equipment, accidentally left and claimed at a later date—

without properly recorded confirmation if the borrowed equipment was returned in

a good condition or not, prompted the interest of the researchers to design a new

system for borrowing and monitoring of tools and equipments.

Conceptual Background

The study focused on the borrowing and monitoring system of equipments

and tools from the ELEX Analog laboratory of the College Department of Don

Bosco Technology Center.

The study will utilize the existing databases of both the students of the

College Department and the inventory of equipments and tools on the ELEX

Analog laboratory.

1

Page 2: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 2/28

After gathering the necessary information for the functionality of the

system to be designed, Bar Codes will be generated for the equipments and

tools with designated RFID tags—the student ID’s having existing barcodes in

them. Then the installation of suitable scanning equipment and sensor detector 

equipment follows, together with the design of the output report for the

borrowing/returning transaction.

Finally, testing and evaluation will be the final step for the completion of 

the study.

 

FIGURE 1-1 The Conceptual Framework

2

Student IDWITH BARCODE

Borrowed EquipmentWITH BARCODE AND RFID TAG

BARCODE SCANNER RFID READER

COMPUTER SYSTEM

- Check the destination of theborrowed equipment

- Identify the borrowingdetails

- If the equipment is limitedto the Analog Laboratoryonly, report unauthorized

transfer of equipment

- Utilize existing student andequipment database

- Identify the following:

Borrower’s Name

Program and Year Level

Items Borrowed

Time and Date Borrowed

Destination of Equipment

- Once all items are successfully returned, the Borrower willbe clear of any pending transactions

- Time and Date Returned will also be identified

Page 3: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 3/28

Theoretical Background

Bar Code Technology

A Barcode (or Bar Code) is an optical machine-readable representation of 

data, which shows certain data on certain products. Originally, barcodes

represented data in the widths (lines) and the spacings of parallel lines, and may

be referred to as linear or 1D (1 dimensional) barcodes or symbologies. They

(now) also come in patterns of squares, dots, hexagons and other geometric

patterns within images termed 2D (2 dimensional) matrix codes or symbologies.

Although 2D systems use symbols other than bars, they are generally referred to

as barcodes as well. Barcodes can be read by optical scanners called barcode

readers, or scanned from an image by special software.

(http://en.wikipedia.org/wiki/Barcode)

Bar Code Technology is an automatic identification technology structured

to contain a specific piece of information that allows real-time data to be collected

accurately and rapidly.

Bar Code Symbology

The mapping between messages and barcodes is called a symbology.

The specification of a symbology includes the encoding of the single

digits/characters of the message as well as the start and stop markers into bars

and space, the size of the quiet zone required to be before and after the barcode

as well as the computation of a checksum.

Linear symbologies can be classified mainly by two properties:

Continuous vs. Discrete: Characters in continuous symbologies usuallyabut, with one character ending with a space and the next beginning with a

bar, or vice versa. Characters in discrete symbologies begin and end with

bars; the intercharacter space is ignored, as long as it is not wide enough to

look like the code ends.

3

Page 4: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 4/28

FIGURES 1-2A and 1-2B show the Bar Code Discrete Symbology and the

Bar Code Continuous Symbology, respectively.

• Two-width vs. Many-width: Bars and spaces in two-width symbologies are

wide or narrow; how wide a wide bar is exactly has no significance as long as

the symbology requirements for wide bars are adhered to (usually two to

three times wider than a narrow bar). Bars and spaces in many-width

symbologies are all multiples of a basic width called the module.

(http://en.wikipedia.org/wiki/Barcode)

FIGURE 1-2A Bar Code Discrete Symbology

FIGURE 1-2B Bar Code Continuous Symbology

4

Page 5: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 5/28

Bar Code Scanners

A barcode reader (or barcode scanner) is an electronic device for reading

printed barcodes. Like a flatbed scanner (or an ordinary image scanner), it

consists of a light source, a lens and a light sensor translating optical impulses

into electrical ones. Additionally, nearly all barcode readers contain decoder 

circuitry analyzing the barcode's image data provided by the sensor and sending

the barcode's content to the scanner's output port.

Types of Scanners (or Readers):

• Contact Readers: This type of reader must touch or come in close proximity

of symbol being scanned. These come in the forms of normally hand-

held/stationary units. A common type of contact reader is pen/wand reader.

FIGURE 1-3 Contact Readers

• Non-contact Readers: This type of reader need not come in contact with the

symbol. The scan distance may be from 6” to several feet depending upon

symbol size and scanner design. It usually comprises of hand-held, fixed

beam readers. FIGURES 1-4A and 1-4B show examples of non-contact

readers.

5

Page 6: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 6/28

FIGURE 1-4A Hand-Held Moving Beam Readers

FIGURE 1-4B Fixed Beam Slot Scanner 

Radio Frequency Identification

Radio frequency identification (RFID) is an identification system that uses

radio waves to send data, and RFID tags or transponders. The first patented

RFID device was a passive radio transponder with an integrated memory by

Mario Cardullo. At present, the technology has many applications, particularly in

the retail industry because of its small size, low power demands and high levels

of efficiency offered. A figure of a basic RFID system is featured in FIGURE 1-5.

Radio-frequency identification involves interrogators (also known as

readers), and tags (also known as labels).

6

Page 7: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 7/28

Most RFID tags contain at least two parts. One is an integrated circuit for 

storing and processing information, modulating and demodulating a radio-

frequency (RF) signal, and other specialized functions. The second is an antenna

for receiving and transmitting the signal.

There are generally three types of RFID tags: active RFID tags, which

contain a battery and can transmit signals autonomously, passive RFID tags,

which have no battery and require an external source to provoke signal

transmission, and battery assisted passive (BAP) RFID tags, which require an

external source to wake up but have significant higher forward link capability

providing greater range.

FIGURE 1-5 An RFID System

7

Page 8: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 8/28

THE PROBLEM

Statement of the Problem

The lack of monitoring capability of the currently used borrowing system of 

laboratory equipments and tools constitute the general problem of the project.

This study was conducted to come up with a new borrowing system with the use

of Bar Code Technology and monitoring system with the use of Detector.

Specifically, the study will answer the following questions:

1. How will the in and out flow of the laboratory equipments and tools be

monitored in the Analog Laboratory?

2. What will be the roles of the identified technologies in the flow of the whole

system?

3. What will be the flow of the process of borrowing and returning of 

equipments and tools?

Significance of the Study

This study hopes to make a contribution to the following:

College students

This study will introduce a new and more efficient borrowing system of 

equipment and tools in the ELEX Analog laboratory. It will also provide the

students more use of their ID other than for mere identification purposes.

Laboratory In-Charge / Personnel

This study will help provide a more accurate, efficient and proper 

monitoring of the laboratory equipments and tools; giving involved personnel less

liability towards any untoward incident to the borrowed items.

8

Page 9: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 9/28

DBTC College Department

This study will help to properly monitor the laboratory tools and

equipments, which are part of school property. It will also help in monitoring

damage done to the items.

Fund of Knowledge

This study will recognize the ability of the Bar Code Technology with a

designated RFID tag as an efficient agent in the monitoring of school property—

in terms of laboratory equipments and tools.

Scope and Limitations

Scope

This research study is limited and conducted only at Don Bosco

Technology Center College Department – ELEX Analog laboratory for the year 

2010. The study includes the designing and installation of the Bar Code System

and sensor detector.

The respondents of the study are the college students and the workshop

in-charge / personnel. The study will apply new technology for a more efficient

borrowing system and monitoring system for equipments and tools in the ELEX

Analog laboratory. The study will only be applied on the monitoring of the

equipments and tools within the Analog laboratory.

Limits

However, the study does not include the monitoring or tracking of the

presence of the borrowed equipments and tools within the allowable vicinity. The

designing and the making of the equipments and tools to be borrowed is also not

included in the scope of this study. The software that will manipulate the

available database is not included in this study. The study only limits the

9

Page 10: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 10/28

monitoring of the presence of the borrowed equipments and tools within the

Analog laboratory. The monitoring will not include the unauthorized transfer of 

the equipments and tools done through any means except through the main door 

way of the Analog Laboratory.

Definition of Terms

These are the terms used by the researchers as basis for the formulation

of the study:

Bar - is the darker, non reflective element of a Bar Code.

Bar Code - (or Barcode) is a predefined format of dark bars and white spaces

structured to contain a specific piece of information.

Bar Code Technology - is an automatic identification technology that makes use

of Bar Codes.

Bi-directional Symbol - is a Bar Code symbol format which permits reading in

either direction across the bars and spaces.

Check Digit - is a calculated character included within the Bar Code for error 

detection.

Fixed Beam Scanner  - A stationary Bar Code Scanner. The symbol must be

moved through the light beam to be read.

Hand-held Scanner - is a scanner held and operated by a human operator.

Inter-character Gap - is the space between the bars or spaces.

Moving Beam Scanner - is a Bar Code scanner that uses a moving light beam

to dynamically scan and decode a Bar Code symbol.

Space - is the lighter, reflective element of a Bar Code.

10

Page 11: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 11/28

Start Character  - is a special pattern of bars and spaces used to identify the

beginning of a Bar Code symbol.

Stop Character - is a special pattern of bars and spaces used to identify the end

of a Bar Code symbol.

Radio-frequency identification (RFID) - is the use of an object applied to or 

incorporated into a product, animal, or person for the purpose of identification

and tracking using radio waves.

11

Page 12: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 12/28

CHAPTER II

RELATED LITERATURE

This study is concerned with the borrowing system of tools and

equipments of the ELEX laboratories and workshops. L. McCathie (2004) in his

thesis entitled “The advantages and disadvantages of barcodes and radio

frequency identification in supply chain management” conducted in the University

of Wollongong, identified the history, standards and application of Bar Code

Technology(http://ro.uow.edu.au/cgi/viewcontent.cgi?

article=1009&context=thesesinfo). The study is related to implementation of Bar 

Code System in the laboratories and workshops, this study helps to overview the

advantages and disadvantages of the Bar Code Technology.

Barcodes are “printed horizontal strips of vertical bars used for identifying

specific items”. A “scanning device reads the barcode by moving a beam across

the symbol”. The first barcode system was developed around the 1940s and

1950s, since then people have become very accustomed to their use, through

common applications such as in retail and grocery markets.

Barcode Standards

As with the history of barcodes, most works provide, to some degree,

background information regarding the development of barcode standards. While

most sources examine a number of standards, there is a common facet among

all works in that they discuss the importance of the UPC (Universal Product

Code) standard.

Palmer offers a broad range of technical information on barcode standards

and symbologies. A symbology is “the term used to describe how information is

encoded into the physical attributes of the bars and spaces”, and, as such, it is of 

significant importance to barcodes. In the article EAN/UCC create new item

marking symbologies, a new family of linear barcodes, reduced space symbology

12

Page 13: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 13/28

(RSS), and is explained. This symbology “will allow for the co-existence of 

symbologies already being used and can be supported by [existing barcode

equipment]”.

Barcode applications

Barcode technology has been used for decades and during this time has

proved itself as a reliable performer when supporting SCM. Testament to this is

the versatility in which the technology can be adapted to suit specific

applications. There is a plethora of case studies which examine the role of 

barcodes within a particular SCM scenario such as Auto Group hits high notes

with new inventory management system and RF cuts processing time for Lexus

car and parts deliveries. The articles provide a snapshot of specific barcode

implementations and, as with most works of this time, both case studies provide

an analysis of how barcode technology is helping the company improve their 

SCM processes.

Another work that cites a brief overview of Bar Code Technology is that of 

Stefan Hofmayr (2005) in his master thesis entitled “Analysis and comparison of 

the potential of RFID-technology in European and U.S. retail supply chains”

(http://www-sre.wu-wien.ac.at/neurus/Stefan_Hofmayr.pdf). The study related to

the Bar Code System, this study had discussed the binary code and the symbols

used in a Bar Code Technology.

Barcode systems

The barcode is a binary code with bars and gaps specifically arranged to a

predetermined pattern. The sequence of these wide and narrow bars and gaps

refers to an associated symbol that can be interpreted numerically andalphanumerically. An optical laser scanner reads the barcode by the reflection of 

a laser beam from the black bars and white gaps. There are different kinds of 

barcodes with the EAN code (European Article Number) being the most popular 

one designed in 1976 specifically for the grocery industry. It is a development of 

the UPC (Universal Product Code) from the United States.

13

Page 14: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 14/28

The EAN code consists of 13 digits. The first two or three numbers identify

the country where the EAN code was assigned. This does not necessarily mean

that the product was manufactured in this country. The next five numbers identify

the company, then the 5 numbers manufacturer’s item number and a one

number check digit (Finkenzeller 2003: 3).

The negative aspects of barcodes are the limited storage capacity and

that they cannot be reprogrammed. Furthermore, the use in a dirty or dusty

environment such as manufacturing plants might make it impossible to read the

barcode. Nevertheless the barcode is still widely used and shows similarities to

RFID from the protests when it was launched to the applications in today’s

business environment.

Another work that cites a brief overview of Bar Code Technology that

relate to Bar Code System, the study relate on the barcode reader used in the

RFID system. S.F.G. Verdonkschot(2007) in his master thesis University of 

Twente(http://www.utwente.nl/ewi/dacs/assignments/completed/master/reports/v

erdonkschot_01_07.pdf).

Radio frequency Identification (RFID) is in the broadest sense a

technology that allows unique identification of objects by the use of radio signals.

If we use this general definition for RFID we can see that many RFID systems

are already in use today, for example in access control cards for admission to

buildings and cars, payment systems on toll roads and gas stations, the tracking

of library books and with skiers using ski lifts.

RFID works according to this same basic concept. A signal is sent by a

reader to a transponder or tag, which wakes up and either reflects back a signal

(passive system) or broadcasts a signal (active system) using its own power 

source, for example an onboard battery, back to the reader.

An example of borrowing system in library that is related to the borrowing

system implemented in the Don Bosco College laboratories. The system was

14

Page 15: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 15/28

conducted Education Department of Western Australia(1998).

(http://www.det.wa.edu.au/education/cmis/cat/libprocmanual/chapter9.pdf).

Borrower’s Records:

Borrowing via an automated system relies on matching barcode numbers

allocated to resources with user barcode numbers allocated to borrowers.

Information or data about each borrower is entered onto the automated system

and matched with a barcode or other unique identifier.

Sources of Borrower Information:

The barcode is a binary code with bars and gaps specifically arranged to a

predetermined.

Borrower information can be entered:

1. Manually;

2. Downloaded from the school administration system, or 

3. Downloaded by the software supplier from another database.

Download from the School Administration system

Student and staff data from the school administration system is

loaded onto the automated system. This borrower information: is loaded

without changing circulation information, and remains up-to-date if regular 

downloads are made.

Download from another database

Schools may already have student and staff data on a separate

database. This data may be able to be loaded onto the system. For 

specific information, contact the software supplier.

15

Page 16: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 16/28

Borrower Identification

Borrowers entered onto the system may be identified by the use of a

barcode, by using a version of their name, or by their Personal Identification

Number (PIN).

Using barcodes

Barcodes may be attached to class lists or individual cards. The

class lists of students can have barcodes attached adjacent to each name.

These lists can be placed inside plastic sheets and stored in ring binders

at the issue desk. Individual student cards are used with commercial

barcodes attached. These may be:

1. given to students;

2. stored in boxes at circulation desk;

3. stored in photo albums, or 

4. stored in slide borders.

16

Page 17: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 17/28

CHAPTER III

METHODOLOGY

Introduction

This study was conducted in order to apply the Bar Code Technology and

RFID gate pedestal antenna for easy monitoring of borrowing of equipments and

tools in the DBTC Analog laboratory. The researchers conducted research to

utilize and gather the necessary data to solve the problem.

Research environment

A barcode system is a network of hardware and software, consisting

primarily of mobile computers, printers, handheld scanners, infrastructure, and

supporting software. Barcode systems are used to automate data collection

where hand recording is either timely or cost effective. Bar coding systems are

not radio-frequency identification (RFID) systems even though the companies

that provide barcode equipment will often also provide RFID equipment and

many companies use both technologies as part of larger resource management

systems.

Radio-frequency identification (RFID) is the use of an object (typically

referred to as an RFID tag) applied to or incorporated into a product, animal, or 

person for the purpose of identification and tracking using radio waves. Some

tags can be read from several meters away and beyond the line of sight of the

reader.

Don Bosco Technology Center is an institution that mainly offers Basic,

Secondary, Technical-Vocational and Tertiary education. The CollegeDepartment of the institution likewise offers the programs Bachelor of Science in

Technical Education, Bachelor of Science in Mechanical Engineering, Bachelor 

of Science in Electronics Engineering, Bachelor of Science in Industrial

Engineering and Bachelor of Arts in Religious Education, which is mainly held in

the Don Bosco Seminary - Lawaan.

17

Page 18: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 18/28

The Bachelor of Science in Electronics Engineering (BSECE) program

holds most of its laboratory and workshop courses at the ELEX Building, a two-

storey building which holds the Analog, Digital, Communications, Automation,

Energy Conversion, and Chemistry Laboratories among others; together with the

Basic Mechanical, Electrical, and Electronics Workshops.

The main locale of the study is in the main Tool Room of the ELEX; a

small room adjacent to the Analog and Digital Laboratories on the second floor of 

the building. The room holds the necessary tools and equipments to be used on

electronics-related experiments necessary for the BSECE program such as

multitesters, oscilloscopes, function generators, analog and digital trainers,

power supplies, etc.

FIGURE 3-1 The Second Floor Layout of the ELEX Building

18

Page 19: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 19/28

The barcode system will then be applied to the aforementioned

equipments, or basically, it is to be implemented on the equipments and tools in

the Tool Room itself. Barcodes can be used to track inventory, luggage, and

even mail. Warehouses can use barcodes for organizing and providing accurate

status reports for individual packages or shipments. Post-production companies

use barcodes to track videotapes, film reels, as well as other products. In

monitoring the tools and equipments borrowed by the student, a barcode system

saves information into the computer to gather the input data.

Research procedure

The main goal of the researcher is to solve the main problem of an

insufficient borrowing and monitoring system of equipments. Below are the

procedures followed by the researchers over the course of the study: 

FIGURE 3-2 The Research Procedure

19

IDENTIFYING THE GENERAL PROBLEM

CONDUCTING AN INTERVIEW TO SUPPORTPROBLEM

IDENTIFYING THE SPECIFIC PROBLEMS

FORMULATING POSSIBLE WAYS TO SOLVE THEGENERAL PROBLEM

IDENTIFYING AND GATHERING DATA ONTECHNOLOGIES TO BE USED FOR THE

SOLUTION

TESTING AND INSTALLING OF THE SYSTEM

Page 20: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 20/28

Identifying the general problem: This is considered to be the start of the

study, where the researchers identify a general problem based from their own

observations and experiences.

Conducting an interview to support the problem: In order to support

the details observed by the researchers, they conduct an interview with the

person directly related to the identified problem. Having an affirmative response

from the person in-charge will support the need for the study to be conducted.

Identifying the specific problems: After gaining supporting details from

the interview conducted, the researchers then identify the specific problems that

when solved, will eventually equate with the resolution of the general problem.

Formulating possible ways to solve the general problem: The

researchers then think of ways to solve the general problem. For this particular 

study, the persons indentified the need for a more efficient borrowing and

monitoring system other than the currently used, borrowing slip system.

Identifying and gathering data on technologies to be used for the

solution: After identifying the general system that will be needed to solve the

problem, the researchers then identify the technologies that can be used for the

system in mind. For this particular study, the researchers have identified

technologies commonly used for different monitoring systems used in

commercial establishments and on school systems. These technologies are the

Barcode and the RFID technologies.

After the identification of such technologies, further data gathering is then

undertaken. The role of each technology on the flow of the entire system is then

identified and the limits of their application are drawn.

Testing and installing of the system: After the general flow of the

system is finalized and each technology to be used has finally identified their 

roles and limits, what will follow will be the testing and the installation of the

system.

20

Page 21: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 21/28

Problem

The researcher conducted an interview to the Laboratory and workshop in

charge Mr. Francis Raul Cambaya. In the interview, Mr. Cambaya stated the lack

of monitoring capability of the current borrowing system of the equipments and

tools. The proposed system will also make use of the current barcodes printed on

each student I.D. As a solution to problem, the researchers conducted a research

and implementation of the Bar Code Technology.

Literature Review

After determining the problem, the researchers gathered all the data,

theories and relevant information from the internet, the Don Bosco College

Library, and within the experience of individuals in an automation data gathering.

Most of the information gathered by the researchers were from different countries

since they were originally designed by foreigners. In order to understand the

functionality of the system the researchers studied and gather more information

of Bar Code Technology.

Method of Analysis

After identifying the problem and gathering sufficient data, the researchers

decided on the steps upon by which the proposed Bar Code Technology would

make a sufficient technology to be applied on a new system of borrowing

laboratory tools and equipment.

The Borrowing System

For the borrowing system to function effectively, the researchers have

identified the two main sources of information that will be processed upon theactual borrowing transaction:

1. The College Students’ Records – This database classification includes the

name of the student, the program to which the student is enrolled, and the

student’s ID number with corresponding barcode.

21

Page 22: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 22/28

2. Inventory of ELEX Equipments and Tools – This database classification

includes the name of the item, its functionality, and its corresponding barcode.

Barcode Generation and Scanning

The type of barcode to be generated for the equipments will follow the

type of barcode already generated for the ID of the college students, known as

Code 39 (see FIGURE 3-3)

FIGURE 3-3 Code 39 Symbol

The type of scanner that will be installed and used for the projects

application be hand-held (see FIGURE 3-4 for an example):

FIGURE 3-4 Zebex Z-3010 Barcode Scanner 

Equipment Monitoring

In addition to the borrowing system, the study also includes the monitoring

of the presence of the borrowed equipment at the Analog Laboratory. It means

22

Page 23: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 23/28

that if the equipment was borrowed to be used within the Analog Laboratory, it

should remain in there unless authorized to be transferred to another working

area.

Since the equipments are tagged with designated barcodes and RFID

tags, a functional RFID monitoring system should be placed within the research

environment. This includes an RFID Antenna Gate (with an example pictured

above on FIGURE 3-5) to be placed on the main doorway of the Analog

Laboratory and a Reader and Computer System which will be housed on the

Tool Room of the ELEX Building.

FIGURE 3-5 L-SP3 Clear Antenna Gate

The L-SP3 Clear Antenna Gate is designed for environments where

aesthetics are a key factor, the clear L-SP3 version couples a sleek profile and

high quality acrylic panel with high performance electronics to achieve a best in

breed RFID security system.

23

Page 24: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 24/28

The Procedures

The following pages will feature figures and discussions on the different

procedures that will be involved in the borrowing and monitoring system as

proposed in the study.

It will include an overview of the actual scanning procedure (see FIGURE

3-6), where the scanning of a bar coded item is presented, illustrating what the

flow of the process for the actual scanning of equipments will be. What will follow

will be the actual borrowing and returning procedures to be followed presented in

full text and in a block diagram (see FIGURE 3-7).

The process of borrowing follows the following steps:

1. The borrower identifies what tools and equipments that he/she will borrow

2. The borrower has his/her I.D barcode scanned. The name of the borrower is

then recorded. The time borrowed and destination of the borrowed items will also

be identified and recorded accordingly.

3. The laboratory in-charge scans the barcode for each tool or equipment

borrowed, recording them to be borrowed by the identified borrower that was

recorded earlier.

4. Thus, the recorded data includes: the name of the borrower, the time and date

that the equipments were borrowed, the destination of the borrowed items, and

the list of borrowed tools and equipments.

5. Upon the return of the borrowed items, provided that they are returned on

good working condition, the laboratory in-charge therefore records the items as

returned and closing any pending transaction from the borrower.

24

Page 25: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 25/28

The Actual Scanning Procedure

Scanner Bar Code

 

Item Record Display Computer Item RecordBar Code

Software System

Item Record Display

FIGURE 3-6 The Actual Scanning Process (Pictorial Diagram)

25

Borrowers identify theequipment and tools to

be use.

The borrower hashis/her I.D barcode

scanned

Page 26: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 26/28

FIGURE 3-7 The Borrowing/Returning Procedure (Block Diagram)

GANTT CHART

TABLE 3-1 Gantt chart

Tasks June July August September October  

Research

Canvassingof materials

Designing

Constructing

Testing

Task description (based on the tasks itemized in Table 3-2):

26

The laboratory in-charge scans the

barcode for each tool or equipment borrows.

Recording Data

Upon the return of the borrowed items,

Records the items as returned and closes

any pending transaction from the

borrower.

Page 27: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 27/28

Research – the gathering of all the data information of the Bar Code Technology.

Canvassing of materials – the canvassing of all materials to be used in Bar 

Code System.

Designing – designing of the construction of the Bar Code system on the ELEX

Building.

Construction – constructing the equipments of the Bar Code System in the

ELEX laboratories. This include the software and hardware installation.

Testing – testing and practicing the use of the Bar Code System.

BIBLIOGRAPHY

www.icast.org.in/staff/barcode.ppt  

27

Page 28: Abelo Robles Group Edited

8/8/2019 Abelo Robles Group Edited

http://slidepdf.com/reader/full/abelo-robles-group-edited 28/28

Accessed on July 15, 2010, 12:00AM

http://en.wikipedia.org/wiki/Barcode_systemAccessed on July 15, 2010, 1:00PM

http://www.barcodesoftwaresystems.com/

Accessed on July 15, 2010, 1:00PMhttp://en.wikipedia.org/wiki/Barcode

Accessed on July 25, 2010, 10:00PM

http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1009&context=thesesinfoAccessed on August 3, 2010, 9:00PM

http://www-sre.wu-wien.ac.at/neurus/Stefan_Hofmayr.pdf Accessed on August 3, 2010, 10:00PM

http://www.utwente.nl/ewi/dacs/assignments/completed/master/reports/ver Donkschot_01_07.pdf Accessed on August 5, 2010, 10:00PM

http://www.det.wa.edu.au/education/cmis/cat/libprocmanual/chapter9.pdf Accessed on August 5, 2010, 10:00PM

http://www.ers-online.co.uk/p1487/zebex-z-3010-barcode-scanner-multi-interface-ccd Accessed on September 23, 2010, 1:00 PM 

http://en.wikipedia.org/wiki/Radio-frequency_identificationAccessed on September 23, 2010, 2:00PM