36:
185:
151:
is employed which converts the actual image or a sound into a digital file. The file is then stored and at a later time, it can be analyzed by a computer, or compared with other files in a database to verify identity or to provide authorization to enter a secured system. Capturing data can be done in
339:
Advocates for the growth of AIDC systems argue that AIDC has the potential to greatly increase industrial efficiency and general quality of life. If widely implemented, the technology could reduce or eliminate counterfeiting, theft, and product waste, while improving the efficiency of supply chains.
438:
is a professional organization for the automatic identification and data capture (AIDC) industry. This group is composed of individuals who made substantial contributions to the advancement of the industry. Increasing business's understanding of AIDC processes and technologies are the primary goals
410:
The Auto-ID Labs suggests a concept of a future supply chain that is based on the
Internet of objects, i.e., a global application of RFID. They try to harmonize technology, processes, and organization. Research is focused on miniaturization (aiming for a size of 0.3 mm/chip), reduction in the
249:
Data encoder. A code is a set of symbols or signals that usually represent alphanumeric characters. When data are encoded, the characters are translated into machine-readable code. A label or tag containing the encoded data is attached to the item that is to be
265:
One of the most useful application tasks of data capture is collecting information from paper documents and saving it into databases (CMS, ECM, and other systems). There are several types of basic technologies used for data capture according to the data type:
155:
In biometric security systems, capture is the acquisition of or the process of acquiring and identifying characteristics such as finger image, palm image, facial image, iris print, or voiceprint which involves audio data, and the rest all involve video data.
319:(questionnaires, tests, insurance forms, tax returns, ballots, etc.) have completely the same structure and appearance. It is the easiest type for data capture because every data field is located at the same place for all documents.
325:(invoices, purchase orders, waybills, etc.) have the same structure, but their appearance depends on several items and other parameters. Capturing data from these documents is a complex, but solvable task.
206:
171:(AVI) systems because of its capability to track moving objects. These automated wireless AIDC systems are effective in manufacturing environments where barcode labels could not survive.
534:
Automatic
Identification and Data Capture (Barcodes, Magnetic Stripe Cards, Smart Cards, OCR Systems, RFID Products & Biometric Systems) Market - Global Forecast to 2023
832:
340:
However, others have voiced criticisms of the potential expansion of AIDC systems into everyday life, citing concerns over personal privacy, consent, and security.
57:
159:
Radio-frequency identification is relatively a new AIDC technology, which was first developed in the 1980s. The technology acts as a base in automated
411:
price per single device (aiming at around $ 0.05 per unit), the development of innovative applications such as payment without any physical contact (
847:
852:
768:
298:
These basic technologies allow extracting information from paper documents for further processing in the enterprise information systems such as
605:
245:
Nearly all the automatic identification technologies consist of three principal components, which also comprise the sequential steps in AIDC:
725:
384:
253:
Machine reader or scanner. This device reads the encoded data, converting them to an alternative form, typically an electrical analog signal.
256:
Data decoder. This component transforms the electrical signal into digital data and finally back into the original alphanumeric characters.
459:
454:
276:
232:
449:
303:
168:
842:
682:
210:
270:
121:
299:
163:, identification, and analysis systems worldwide. RFID has found its importance in a wide range of markets, including
742:
113:
48:
489:
404:
282:
195:
657:
Proceedings of the Sixth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining – KDD '00
499:
388:
214:
199:
132:. AIDC is also commonly referred to as "Automatic Identification", "Auto-ID" and "Automatic Data Capture".
660:
594:
Palmer, Roger C. (1989, Sept) The Basics of
Automatic Identification . Canadian Datasystems, 21 (9), 30-33
392:
706:
423:(clothes equipped with radio tags and intelligent washing machines), and sporting events (timing at the
376:
164:
383:, Alien, Sun as well as five academic research centers. These are based at the following Universities;
805:
717:
509:
360:
772:
665:
609:
514:
368:
837:
688:
504:
129:
721:
678:
494:
474:
435:
310:
309:
The documents for data capture can be divided into 3 groups: structured, semi-structured, and
92:
systems, without human involvement. Technologies typically considered as part of AIDC include
670:
569:
545:
484:
479:
356:
109:
85:
533:
424:
396:
160:
117:
347:
was founded in 1999 and is made up of 100 of the largest companies in the world such as
35:
136:
331:(letters, contracts, articles, etc.) could be flexible with structure and appearance.
826:
655:
Yi, Jeonghee; Sundaresan, Neel (2000). "A classifier for semi-structured documents".
692:
469:
464:
344:
135:
AIDC is the process or means of obtaining external data, particularly through the
184:
125:
400:
148:
105:
352:
97:
17:
674:
714:
420:
372:
348:
89:
84:) refers to the methods of automatically identifying objects, collecting
416:
93:
364:
144:
140:
412:
101:
27:
Methods of automatically identifying objects by computer system
802:
AIDC 100: Professionals Who Excel in
Serving the AIDC Industry
631:
380:
178:
29:
743:"Biometrics Are Coming, Along With Serious Security Concerns"
797:
379:, companies working in the sector of technology such as
53:
152:
various ways; the best method depends on application.
546:"Automatic Identification and Data Collection (AIDC)"
570:"What is Optical Character Recognition (OCR)?"
8:
175:Overview of automatic identification methods
88:about them, and entering them directly into
213:. Unsourced material may be challenged and
833:Automatic identification and data capture
664:
233:Learn how and when to remove this message
78:Automatic identification and data capture
526:
632:"Optical recognition and data-capture"
385:Massachusetts Institute of Technology
261:Capturing data from printed documents
102:radio frequency identification (RFID)
7:
711:Nanocomputers and Swarm Intelligence
294:DLR – for document layer recognition
211:adding citations to reliable sources
279:– for hand-printed text recognition
460:Automatic number-plate recognition
455:Automatic equipment identification
25:
808:from the original on 24 July 2011
450:Automated species identification
183:
169:Automated Vehicle Identification
34:
853:Radio-frequency identification
741:Glaser, April (9 March 2016).
604:Rouse, Margaret (2009-10-01).
291:BCR – for bar code recognition
288:OBR – for barcodes recognition
273:– for printed text recognition
1:
122:optical character recognition
608:. TechTarget. Archived from
630:Technologies, Recogniform.
335:The Internet and the future
47:to comply with Knowledge's
869:
848:Human–computer interaction
323:Semi-structured documents
114:facial recognition system
490:Field Service Management
405:University of St. Gallen
165:livestock identification
60:may contain suggestions.
45:may need to be rewritten
606:"bar code (or barcode)"
500:Mobile Asset Management
389:University of Cambridge
343:The global association
285:– for marks recognition
843:Multimodal interaction
707:Waldner, Jean-Baptiste
393:University of Adelaide
329:Unstructured documents
718:John Wiley & Sons
675:10.1145/347090.347164
439:of the organization.
361:Johnson & Johnson
147:. To capture data, a
720:. pp. 205–214.
659:. pp. 340–344.
510:Ubiquitous computing
369:Procter & Gamble
317:Structured documents
207:improve this section
636:www.recogniform.com
574:www.ukdataentry.com
515:Ubiquitous Commerce
505:Smart data capture
137:analysis of images
769:"The New Network"
727:978-1-84704-002-2
495:Mobile Enterprise
475:Device management
403:, as well as the
243:
242:
235:
130:voice recognition
75:
74:
49:quality standards
16:(Redirected from
860:
818:
817:
815:
813:
794:
788:
787:
785:
783:
778:on 22 March 2016
777:
771:. Archived from
767:Auto-ID Center.
764:
758:
757:
755:
753:
738:
732:
731:
703:
697:
696:
668:
652:
646:
645:
643:
642:
627:
621:
620:
618:
617:
601:
595:
592:
586:
585:
583:
581:
566:
560:
559:
557:
556:
542:
536:
531:
485:Face recognition
480:Digital Mailroom
407:in Switzerland.
387:in the USA, the
238:
231:
227:
224:
218:
187:
179:
118:magnetic stripes
70:
67:
61:
38:
30:
21:
868:
867:
863:
862:
861:
859:
858:
857:
823:
822:
821:
811:
809:
796:
795:
791:
781:
779:
775:
766:
765:
761:
751:
749:
740:
739:
735:
728:
705:
704:
700:
685:
654:
653:
649:
640:
638:
629:
628:
624:
615:
613:
603:
602:
598:
593:
589:
579:
577:
568:
567:
563:
554:
552:
544:
543:
539:
532:
528:
524:
519:
445:
433:
425:Berlin Marathon
397:Keio University
391:in the UK, the
337:
263:
239:
228:
222:
219:
204:
188:
177:
161:data collection
71:
65:
62:
52:
39:
28:
23:
22:
15:
12:
11:
5:
866:
864:
856:
855:
850:
845:
840:
835:
825:
824:
820:
819:
789:
759:
733:
726:
698:
683:
666:10.1.1.87.2662
647:
622:
596:
587:
561:
537:
525:
523:
520:
518:
517:
512:
507:
502:
497:
492:
487:
482:
477:
472:
467:
462:
457:
452:
446:
444:
441:
432:
429:
399:in Japan, and
395:in Australia,
336:
333:
306:, and others.
296:
295:
292:
289:
286:
280:
274:
262:
259:
258:
257:
254:
251:
241:
240:
191:
189:
182:
176:
173:
73:
72:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
865:
854:
851:
849:
846:
844:
841:
839:
836:
834:
831:
830:
828:
807:
803:
799:
793:
790:
774:
770:
763:
760:
748:
747:www.wired.com
744:
737:
734:
729:
723:
719:
716:
712:
708:
702:
699:
694:
690:
686:
680:
676:
672:
667:
662:
658:
651:
648:
637:
633:
626:
623:
612:on 2017-08-10
611:
607:
600:
597:
591:
588:
575:
571:
565:
562:
551:
547:
541:
538:
535:
530:
527:
521:
516:
513:
511:
508:
506:
503:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
447:
442:
440:
437:
430:
428:
426:
422:
418:
414:
408:
406:
402:
398:
394:
390:
386:
382:
378:
374:
370:
366:
362:
358:
354:
350:
346:
341:
334:
332:
330:
326:
324:
320:
318:
314:
312:
307:
305:
301:
293:
290:
287:
284:
281:
278:
275:
272:
269:
268:
267:
260:
255:
252:
248:
247:
246:
237:
234:
226:
216:
212:
208:
202:
201:
197:
192:This section
190:
186:
181:
180:
174:
172:
170:
166:
162:
157:
153:
150:
146:
142:
138:
133:
131:
127:
123:
119:
115:
111:
107:
103:
99:
95:
91:
87:
83:
79:
69:
59:
55:
50:
46:
43:This article
41:
37:
32:
31:
19:
810:. Retrieved
801:
792:
780:. Retrieved
773:the original
762:
750:. Retrieved
746:
736:
710:
701:
656:
650:
639:. Retrieved
635:
625:
614:. Retrieved
610:the original
599:
590:
578:. Retrieved
576:. 2016-07-22
573:
564:
553:. Retrieved
549:
540:
529:
470:Data privacy
465:Auto-ID Labs
434:
409:
345:Auto-ID Labs
342:
338:
328:
327:
322:
321:
316:
315:
311:unstructured
308:
297:
264:
244:
229:
220:
205:Please help
193:
158:
154:
134:
81:
77:
76:
63:
54:You can help
44:
18:Data capture
550:www.mhi.org
250:identified.
126:smart cards
827:Categories
798:"AIDC 100"
713:. London:
684:1581132336
641:2015-01-15
616:2017-03-09
555:2021-04-11
522:References
401:ETH Zurich
149:transducer
106:biometrics
838:Encodings
661:CiteSeerX
353:Coca-Cola
223:July 2021
194:does not
98:bar codes
66:July 2021
58:talk page
812:2 August
806:Archived
709:(2008).
443:See also
436:AIDC 100
431:AIDC 100
421:domotics
373:Unilever
357:Gillette
94:QR codes
90:computer
782:23 June
693:2154084
580:22 July
417:Philips
349:Walmart
215:removed
200:sources
124:(OCR),
752:5 July
724:
691:
681:
663:
365:Pfizer
145:videos
141:sounds
128:, and
108:(like
56:. The
776:(PDF)
689:S2CID
143:, or
814:2011
784:2011
754:2021
722:ISBN
715:ISTE
679:ISBN
582:2016
413:Sony
198:any
196:cite
167:and
112:and
110:iris
86:data
82:AIDC
671:doi
427:).
419:),
381:SAP
377:UPS
304:CRM
300:ERP
283:OMR
277:ICR
271:OCR
209:by
116:),
829::
804:.
800:.
745:.
687:.
677:.
669:.
634:.
572:.
548:.
375:,
371:,
367:,
363:,
359:,
355:,
351:,
313:.
302:,
139:,
120:,
104:,
100:,
96:,
816:.
786:.
756:.
730:.
695:.
673::
644:.
619:.
584:.
558:.
415:/
236:)
230:(
225:)
221:(
217:.
203:.
80:(
68:)
64:(
51:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.