Design and Implementation of Barcode Management Information System

  • Conference paper
  • pp 1200–1207
  • Cite this conference paper

research paper on barcode technology

  • Daiyun Weng 3 &
  • Li Yang 3  

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 154))

212 Accesses

4 Citations

Barcode technology is an automatic identification technology generated and developed in computer application and an effective means of data collection designed to achieve the automatic scanning of information. It is widely used in the logistics industry and typically used in the goods sale in supermarkets. At present, barcode management and identification system has been widely used in various types of supermarkets in the country. This article first introduces the use of bar code in domestic supermarkets and the technical characteristics and image recognition system of the maximum used EAN barcodes, proposing the corresponding barcode generation and identification methods based on image recognition technology. On this basis, the barcode generation and recognition software is developed. Feature of this study is that the recognition system can simultaneously generate and identify barcodes, so it can be more convenient and efficient for goods management and material circulation of medium, small supermarkets, specialty stores and other users. And it can be widely used in other areas, such as personnel management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Unable to display preview.  Download preview PDF.

Similar content being viewed by others

research paper on barcode technology

Application of Barcode Technology in Warehouse Management of Printing and Packaging Enterprises

research paper on barcode technology

Classification and Decoding of Barcodes: An Image Processing Approach

research paper on barcode technology

Real-Time Barcode Objects Localization by Combining Frequency and Corner Features

Xiaohong Wang, Rongchun Zhao: A New Method of Image Normalization. Computer Applications and Software, 2008.3

Google Scholar  

Article Numbering Centre of China: Barcode Technology and Application. Beijing: Tsinghua University Press, 2007.9

Feng Zhang, Yaoqiu WANG: Barcode Technology and Electronic Data Exchange. Beijing: China Railway Press, 2008

Yongfa Fan, Hongzhuang He: Barcode Image Recognition System, 2006

Yingquan Yang: Design and Implementation of Library Barcode Software. Microcomputer Applications, 2005 01

Ming Wu: The use of Barcode in Large Supermarkets. China’s Retail Network, 2009

Zhijian Huang, Xiangyang Gu, Juntao Dai: Barcode Technology and Application, Beijing: Mechanical Industry Press, 2002

Download references

Author information

Authors and affiliations.

School of Information Engineering, Chongqing City Management College, Chongqing, China

Daiyun Weng & Li Yang

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Daiyun Weng .

Editor information

Editors and affiliations.

South-Central University for Nationaliti, Wuhan, 430074, China, People's Republic

, School of Computer and Information, Chongqing Normal University, Chongqing, 401331, China, People's Republic

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Limited

About this paper

Cite this paper.

Weng, D., Yang, L. (2012). Design and Implementation of Barcode Management Information System. In: Zhu, R., Ma, Y. (eds) Information Engineering and Applications. Lecture Notes in Electrical Engineering, vol 154. Springer, London. https://doi.org/10.1007/978-1-4471-2386-6_158

Download citation

DOI : https://doi.org/10.1007/978-1-4471-2386-6_158

Publisher Name : Springer, London

Print ISBN : 978-1-4471-2385-9

Online ISBN : 978-1-4471-2386-6

eBook Packages : Engineering Engineering (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

sustainability-logo

Article Menu

research paper on barcode technology

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Implementation of barcode technology to logistics processes of a company.

research paper on barcode technology

1. Introduction

  • non-functional RFID equipment and tags;
  • usage errors related to the RFID antenna;
  • errors when scanning the entire stack of plastic trays;
  • incorrect identifiers in the tray (it leads to a warning sound then the operator looks at the screen and stops scanning).
  • missing labels on the outside of the plastic tray;
  • illegible labels on a plastic tray;
  • non-functional scanning device;
  • a usage error in which the operator scans the barcode incorrectly or slowly.
  • Speed—because an RFID reader can read tags faster than a normal barcode scanner can scan barcodes. For example, RFID readers designed for supply chain operations can perform up to 1500 read operations per second;
  • Reading distance—because it is common to read RFID tags at a distance of at least three meters between the tag and the antenna. Reading sizes and ranges are also compared with different RFID chips and the longest reading range in Article [ 14 ] is 14.6 m for a metal mounting antenna. Their passive UHF RFID tag had a range of 26 m for reading using the Higgs 4 RFID chip manufactured by Alien Tech.
  • Simultaneous instead of sequential scanning—because RFID readers can identify multiple tags in a reading field;
  • Direct view—because radio waves can penetrate most materials depending on the frequency used;
  • Durability—as RFID tags can work in extremely demanding working conditions and can be packaged in plastic packaging or even embedded directly into finished products [ 10 , 15 , 16 ].

2. Materials and Methods

  • incorrectly entered balance from the warehouse;
  • ordering the wrong quantity;
  • error when entering data manually;
  • differences between the actual stock balance and the stock level in the SAP system.

2.1. Measuring the Duration of Individual Activities in the Process

  • registration of a request for documentation;
  • picking cables for production ○ picking cables on a pallet; ○ cable transport; ○ placing cables; ○ checking (OK);
  • rewriting the material for ordering and sending the list for operational purchase;
  • copying the list to the cable order and evaluating the order;
  • issuing an order in the SAP system.

2.2. Methodology for Time Measurements

  • original method = (3 min 17 s × 17) + (1 min 11 s × 3) = 59 min 23 s
  • proposed method = (4 min 2 s × 17) + (1 min 11 s × 3) = 1 h 12 min 7 s
  • one week 31 min and 55 s;
  • one month 2 h, 7 min, and 40 s.
  • scan error—incorrectly entered length;
  • scanning error—writing in the wrong field;
  • scan error—no input or output scan;
  • scanning error—the same operation scanned 2 times;
  • incorrectly ordered cable quantity;
  • database error.

4. Discussion

5. conclusions.

  • extending the proposed method to all available items;
  • implementation of the data on the length of the cable on the spool into the barcode;
  • setting up a regular inventory;
  • introducing cable scanning also when receiving cables;
  • regular monitoring and analysis of error rates;
  • automating the database and its checking;
  • introduction of the pulling principle from production.

Author Contributions

Institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Tu, Y.-J.; Zhou, W.; Piramuthu, S. Critical risk considerations in auto-ID security: Barcode vs. RFID. Decis. Support Syst. 2020 , 142 , 113471. [ Google Scholar ] [ CrossRef ]
  • White, G.R.; Gardiner, G.; Prabhakar, G.; Razak, A.A. A Comparison of Barcoding and RFID Technologies in Practice. J. Inf. Inf. Technol. Organ. (Years 1–3) 2007 , 2 , 119–132. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Schmidt, M.; Thoroe, L.; Schumann, M. RFID and Barcode in Manufacturing Logistics: Interface Concept for Concurrent Operation. Inf. Syst. Manag. 2013 , 30 , 100–115. [ Google Scholar ] [ CrossRef ]
  • Chen, J.C.; Cheng, C.H.; Wang, K.J.; Huang, P.T.B.; Chang, C.C.; Huang, C.J.; Ting, T.C. Application of RFID to Warehouse Management. Key Eng. Mater. 2011 , 486 , 297–300. [ Google Scholar ] [ CrossRef ]
  • Duroc, Y.; Tedjini, S. RFID: A key technology for Humanity. Comptes Rendus Phys. 2018 , 19 , 64–71. [ Google Scholar ] [ CrossRef ]
  • Duroc, Y.; Kaddour, D. RFID Potential Impacts and Future Evolution for Green Projects. Energy Procedia 2012 , 18 , 91–98. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Joo, H.-J.; Cho, M.-T.; Jeong, H.-Y. RFID-based scale model freight car system allowing realtime quantity checking. Multimedia Tools Appl. 2015 , 76 , 5985–6002. [ Google Scholar ] [ CrossRef ]
  • Yao, Z.M.; Liu, X.O.; Liu, W. RFID Technology-Based the Railway Package Management Platform Design. Adv. Mater. Res. 2013 , 774–776 , 1653–1656. [ Google Scholar ] [ CrossRef ]
  • Harrop, P. HF RFID—The Great Leap Forward. Available online: http://www.rfidwizards.com.html (accessed on 4 February 2010).
  • Smith-Ditizio, A.A.; Smith, A.D. Barcodes vs. RFID and Its Continued Success in Manufacturing and Services. In Encyclopedia of Information Science and Technology, Fourth Edition ; Khosrow-Pour, D.B.A.M., Ed.; IGI Global: Hershey, PA, USA, 2018; pp. 5273–5284. [ Google Scholar ]
  • Green, H.; Khermouch, G. Bar Codes Better Watch Their Backs BusinessWeek. Available online: http://www.businessweek.com/magazine/content/03_28/b3841063.htm (accessed on 8 January 2016).
  • Smith, A.D. Reverse logistics programs: Gauging their effects on CRM and online behavior. VINE 2005 , 35 , 166–181. [ Google Scholar ] [ CrossRef ]
  • Smith, A.D. Evolution and acceptability of medical applications of RFID implants among early users of technology. Health Mark. Q. 2008 , 24 , 121–155. [ Google Scholar ] [ CrossRef ]
  • Byondi, F.K.; Chung, Y. Longest-Range UHF RFID Sensor Tag Antenna for IoT Applied for Metal and Non-Metal Objects. Sensors 2019 , 19 , 5460. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Choi, Y.; Ha, H.; Park, H.; Kim, H.; NamGung, K. The RFID Effectiveness Statistical Analysis Tool (RESAT) for Comparing RFID and Barcode in Logistics Operations. In Convergence and Hybrid Information Technology ; Lee, G., Howard, D., Ślęzak, D., Hong, Y.S., Eds.; ICHIT 2012. Communications in Computer and Information Science, Volume 310; Springer: Berlin/Heidelberg, Germany, 2012. [ Google Scholar ] [ CrossRef ]
  • Kaakkurivaara, N. Possibilities of using barcode and RFID technology in Thai timber industry. Maejo Int. J. Sci. Technol. 2019 , 13 , 29–41. [ Google Scholar ]
  • Štefancová, V.; Škorupa, M.; Kendra, M. Utilization of six sigma methodology in terms of reducing train delays. In Proceedings of the International Conference Transport Means, Juodkrante, Lithuania, 20–22 September 2017; pp. 373–376. [ Google Scholar ]
  • Jain, V.; Benyoucef, L.; Deshmukh, S.G. What’s the buzz about moving from ‘lean’ to ‘agile’ integrated supply chains? A fuzzy intelligent agent-based approach. Int. J. Prod. Res. 2008 , 46 , 6649–6677. [ Google Scholar ] [ CrossRef ]
  • Kennedy, F.A.; Widener, S.K. A control framework: Insights from evidence on lean accounting. Manag. Account. Res. 2008 , 19 , 301–323. [ Google Scholar ] [ CrossRef ]
  • Scherrer-Rathje, M.; Boyle, T.A.; Deflorin, P. Lean, take two! Reflections from the second attempt at lean implementation. Bus. Horizons 2009 , 52 , 79–88. [ Google Scholar ] [ CrossRef ]
  • Smith, A.D.; Offodile, O.F. Gauging web portals impact on supply chain management concepts. Int. J. Logist. Manag. 2008 , 4 , 184–206. [ Google Scholar ] [ CrossRef ]
  • Smith, A.D.; Offodile, O.F. The perceived importance of major RFID-related technology initiatives among retail store managers. Int. J. Serv. Oper. Manag. 2009 , 5 , 520–547. [ Google Scholar ] [ CrossRef ]
  • Mackey, T.K.; Nayyar, G. A review of existing and emerging digital technologies to combat the global trade in fake medicines. Expert Opin. Drug Saf. 2017 , 16 , 587–602. [ Google Scholar ] [ CrossRef ]
  • Lefebvre, E.; Romero, A.; Lefebvre, L.A.; Krissi, C. Assessing the relatively effectiveness of technological strategies for fighting counterfeit medicines Communication and Management in Technological Innovation and Academic Globalization. In Proceedings of the 2010 International Conference on Communication and Management in Technological Innovation and Academic Globalization, Tenerife, Spain, 30 November–2 December 2010; pp. 62–67, ISBN 978-960-474-254-7. [ Google Scholar ]
  • Wang, C.N. RFID Technology Applied in Medicine Distribution Center. Appl. Mech. Mater. 2014 , 651–653 , 2040–2044. [ Google Scholar ] [ CrossRef ]
  • Yao, W.; Chu, C.-H.; Li, Z. The use of RFID in healthcare: Benefits and barriers. In Proceedings of the 2010 IEEE International Conference on RFID-Technology and Applications, Guangzhou, China, 17–19 June 2010; pp. 128–134. [ Google Scholar ] [ CrossRef ]
  • McCathie, L.; Michael, K. Is it the End of Barcodes in Supply Chain Management? 2005. Available online: https://ro.uow.edu.au/infopapers/380 (accessed on 27 August 2020).
  • Want, R. Enabling ubiquitous sensing with RFID. Computer 2004 , 37 , 84–86. [ Google Scholar ] [ CrossRef ]
  • Krombholz, K.; Frühwirt, P.; Kieseberg, P.; Kapsalis, I.; Huber, M.; Weippl, E. QR Code Security. In Lecture Notes in Computer Science ; Tryfonas, T., Askoxylakis, I., Eds.; Human Aspects of Information Security, Privacy, and Trust. HAS 2014; Springer: Cham, Switzerland, 2014; Volume 8533, pp. 79–90. [ Google Scholar ]
  • Ibrahim, A.; Dalkiliç, G. Review of different classes of RFID authentication protocols. Wirel. Networks 2017 , 25 , 961–974. [ Google Scholar ] [ CrossRef ]
  • Ross, A.D.; Twede, D.; Clarke, R.H.; Ryan, M. A Framework for Developing Implementation Strategies for a Radio Frequency Identification (Rfid) System in a Distribution Center Environment. J. Bus. Logist. 2009 , 30 , 157–183. [ Google Scholar ] [ CrossRef ]
  • Chanchaichujit, J.; Balasubramanian, S.; Charmaine, N.S.M. A systematic literature review on the benefit-drivers of RFID implementation in supply chains and its impact on organizational competitive advantage. Cogent Bus. Manag. 2020 , 7 , 1818408. [ Google Scholar ] [ CrossRef ]
  • Rao, S.; Ellis, S.C.; Goldsby, T.J.; Raju, D. On the “Invisible Inventory Conundrum” in RFID-Equipped Supply Chains: A Data Science Approach to Assessing Tag Performance. J. Bus. Logist. 2019 , 40 , 339–358. [ Google Scholar ] [ CrossRef ]
  • Bhattacharya, M.; Wamba, S.F. A Conceptual Framework of RFID Adoption in Retail Using TOE Framework. In Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications ; Information Resources Management Association, Ed.; IGI Global: Hershey, PA, USA, 2018; pp. 69–102. [ Google Scholar ]
  • Bhattacharya, M. Impact of RFID on the Retail Value Chain: An Exploratory Study Using a Mixed Method Approach. J. Technol. Manag. Innov. 2012 , 7 , 36–49. [ Google Scholar ] [ CrossRef ]
  • Wu, C.; Wang, X.; Chen, M.; Kim, M.J. Differential received signal strength based RFID positioning for construction equipment tracking. Adv. Eng. Inform. 2019 , 42 , 100960. [ Google Scholar ] [ CrossRef ]
  • Ngai, E.W.; Cheung, B.K.; Lam, S.; Ng, C.T. RFID value in aircraft parts supply chains: A case study. Int. J. Prod. Econ. 2014 , 147 , 330–339. [ Google Scholar ] [ CrossRef ]
  • Wang, Y.-M.; Wang, Y.-S.; Yang, Y.-F. Understanding the determinants of RFID adoption in the manufacturing industry. Technol. Forecast. Soc. Chang. 2010 , 77 , 803–815. [ Google Scholar ] [ CrossRef ]
  • Bendavid, Y.; Wamba, S.F.; Barjis, J. Special Issue on RFID—Towards Ubiquitous Computing and the Web of Things: Guest Editors’ Introduction. J. Theor. Appl. Electron. Commer. Res. 2013 , 8 , 15–16. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Keating, B.W.; Coltman, T.R.; Fosso-Wamba, S.; Baker, V. Unpacking the RFID Investment Decision. Proc. IEEE 2010 , 98 , 1672–1680. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Wu, X.-D.; Wang, Y.-F.; Bai, J.-B.; Wang, H.-Y.; Chu, C.-H. RFID application challenges and risk analysis. In Proceedings of the 2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management, Xiamen, China, 29–31 October 2010; pp. 1086–1090. [ Google Scholar ]
  • Costa, F.; Genovesi, S.; Borgese, M.; Michel, A.; Dicandia, F.; Manara, G. A Review of RFID Sensors, the New Frontier of Internet of Things. Sensors 2021 , 21 , 3138. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • RFID Forecasts, Players and Opportunities 2018–2028: IDTechEx. Available online: https://www.idtechex.com/en/research-report/rfid-forecasts-players-and-opportunities-2018-2028/642 (accessed on 27 August 2020).
  • Cui, L.; Zhang, Z.; Gao, N.; Meng, Z.; Li, Z. Radio Frequency Identification and Sensing Techniques and Their Applications-A Review of the State-of-the-Art. Sensors 2019 , 19 , 4012. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Jahani, N.; Sepehri, A.; Vandchali, H.; Tirkolaee, E. Application of Industry 4.0 in the Procurement Processes of Supply Chains: A Systematic Literature Review. Sustainability 2021 , 13 , 7520. [ Google Scholar ] [ CrossRef ]
  • Bag, S.; Dhamija, P.; Gupta, S.; Sivarajah, U. Examining the role of procurement 4.0 towards remanufacturing operations and circular economy. Prod. Plan. Control. 2020 , 32 , 1368–1383. [ Google Scholar ] [ CrossRef ]
  • Bienhaus, F.; Haddud, A. Procurement 4.0: Factors influencing the digitisation of procurement and supply chains. Bus. Process Manag. J. 2018 , 24 , 965–984. [ Google Scholar ] [ CrossRef ]
  • Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C.; Deng, Y.-Y.; Chen, P. A Traceable and Verifiable Tobacco Products Logistics System with GPS and RFID Technologies. Appl. Sci. 2021 , 11 , 4939. [ Google Scholar ] [ CrossRef ]
  • Chen, C.-L.; Deng, Y.-Y.; Weng, W.; Zhou, M.; Sun, H. A blockchain-based intelligent anti-switch package in tracing logistics system. J. Supercomput. 2021 , 77 , 7791–7832. [ Google Scholar ] [ CrossRef ]
  • Kubasáková, I.; Šulgan, M. Logistika pre Zasielateľstvo a Cestnú Dopravu , 1st ed.; EDIS—Vydavateľstvo ŽU, Žilinská univerzita v Žiline: Žilina, Slovakia, 2013. [ Google Scholar ]

Click here to enlarge figure

Day and Used TechnologyNumber of
Scanning
Min. Value (s)Max. Value (s)Average (s)
Sunday—RFID805.015.79.520
Sunday—barcode8018.435.424.895
Monday—RFID605.215.79.182
Monday—barcode6015.331.224.167
Tuesday—RFID605.016.810.357
Tuesday—barcode6018.532.624.237
AdvantagesDisadvantages
Inventory Control (through tracking and essentially error-free readings)Costs (associated equipment and replacement costs)
Accuracy (2D, 3D Barcodes), Error reductionAccuracy (especially with linear barcode)
Time savingsLimitations by line of sight scanning
Easy-to-useSecurity issues, as they are easily read
Responsible WorkplaceActivityNumber of Cables
(in Pcs)
Duration of the ActivityTime Required for 1 CableAverage Duration of Activity *
WarehouseRegistration of a request for documentation265 min 43 s13 s-
Pallet picking3650 min 8 s1 min 24 s-
Cable transport---1 min 11 s
Cable documentation3663 min 30 s1 min 46 s-
Enrollment (OK)414 min 48 s7 s-
Rewriting the material for ordering and sending the list for operational purchase9111 min 16 s8 s-
Operational purchasingCopy the list to the cable order and evaluate the order7418 min15 s-
Issuing an order in the SAP system4447 min1 min 4 s-
Responsible WorkplaceActivityNumber of Cables
(in Pcs)
Duration of Activity
WarehouseRegistration of a request for documentation113 s
Picking cables for production14 min 28 s
Rewriting the material for ordering and sending the list for operational purchase18 s
Operational purchasingCopy the list to the cable order and evaluate the order115 s
Issuing an order in the SAP system11 min 4 s
The total time of the cable ordering process16 min 8 s
Responsible DepartmentActivityNumber
of Cables (pcs)
Activity
Duration (s)
Necessary Time per One Cable (s)Activity Duration * (s)
WarehouseRegistration of a request 265 min 43 s13 s-
Preparation of cables for production3650 min 8 s1 min 24 s-
Scanning (warehouse)207 min 57 s24 s-
Cable transport---1 min 11 s
Scanning (production)207 min21 s-
Cable unloading3663 min 30 s1 min 46 s-
Writing (OK)414 min 48 s7 s-
Download from the scanner and copy to database---57 s
Working with the database701 min 41 s2 s-
Record in the SAP system---30 s
Operational purchasing departmentSending an order in the SAP system---3 min 30 s
Responsible
Department
ActivityNumber of Cables (pcs)Activity Duration (s)
WarehouseRegistration of a request113 s
Preparation of cables for production15 min 13 s
Download from the scanner and copy to database157 s
Working with the database12 s
Record in the SAP system130 s
Operational purchasing departmentSending an order in the SAP system13 min 30 s
Total ordering time (proposal)110 min 25 s
Ordering MethodResponsible
Department
ActivityDuration
1 Cable17 Cables
OriginalWarehouseRegistration of a request13 s3 min 41 s
Preparation of cables for production4 min 28 s59 min 22 s
Download data from the scanner and sending to operational purchase department8 s2 min 16 s
Operational purchasing departmentCopying data list to order and order evaluation15 s4 min 15 s
Sending an order in the SAP system1 min 4 s18 min 8 s
Total time of cable ordering process6 min 8 s1 h 27 min 42 s
ProposedWarehouseRegistration of a request13 s3 min 41 s
Preparation of cables for production5 min 13 s1 h 12 min 7 s
Download from the scanner and copy to database57 s57 s
Working with the database2 s34 s
Record in the SAP system30 s30 s
Operational purchasing departmentSending an order in the SAP system3 min 30 s3 min 30 s
Total time of cable ordering process10 min 25 s1 h 21 min 19 s
Ordering MethodTotal Time of Cable Ordering Process
1 Cable17 Cables
Original6 min 8 s1 h 27 min 42 s
Proposed10 min 25 s1 h 21 min 19 s
Difference4 min 17 s 6 min 23 s
Evaluated PropertiesBarcodeRFID
CodingCoding by color contrast between vertical lines and spacesCoding in electronic form
TimeScanning takes a few minutesScanning takes a few seconds
ScanningMay not load or scanned twiceIt cannot be unloaded or duplicated
InformationInformation on the type of productInformation on the type of product, packaging, production date, origin, price of the product, date of dispatch and consumption
VisibilityDirect visibilityDoes not have to be direct visibility
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

Kubáňová, J.; Kubasáková, I.; Čulík, K.; Štítik, L. Implementation of Barcode Technology to Logistics Processes of a Company. Sustainability 2022 , 14 , 790. https://doi.org/10.3390/su14020790

Kubáňová J, Kubasáková I, Čulík K, Štítik L. Implementation of Barcode Technology to Logistics Processes of a Company. Sustainability . 2022; 14(2):790. https://doi.org/10.3390/su14020790

Kubáňová, Jaroslava, Iveta Kubasáková, Kristián Čulík, and Lukáš Štítik. 2022. "Implementation of Barcode Technology to Logistics Processes of a Company" Sustainability 14, no. 2: 790. https://doi.org/10.3390/su14020790

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Barcode Recognition Techniques: Review & Application

International Journal of Innovative Research in Computer Science & Technology (IJIRCS) 2021

6 Pages Posted: 27 Jul 2021

Nikash Pradhan

Amity University Haryana, Gurugram

Dr. Rajesh Kumar Tyagi

Amity University Haryana

Ms. Pooja Nagpal

Date Written: MAY 20, 2021

Because of the importance of maintaining track of all products in one location, barcodes have become important elements of sales and product services. Many methods have been developed to make the task of reading barcodes more user-friendly. This project aims to use image processing as a technique for recognizing the barcode using the camera. Using this technique, the machines will be able to read the barcode using the camera and can decode the information on the barcode using the software capable of image processing [1]. The platform will be created for the MATLAB software package and will function with a webcam or digital camera as an interface. On the Graphical User Interface, the device can analyse the image and display the barcode type, data, and image size (GUI) [1]. The machine is designed to identify different types of barcodes and display the data if the barcode image is obtained. The machine is also intended to provide a more convenient and cost-effective way of viewing data from barcodes than electronic barcode scanners. An individual who wants to inspect data identified by barcode numbers without having to go to a location that provides barcode scanner services can use this computer at any time and from any location [1]. As a result, the project has gone smoothly and without a hitch. It is advised that the computer have a slider so that the user can change the brightness of the image captured by the webcam for future device enhancement.

Keywords: Barcode, Graphical User Interface, MATLAB, Recognize, Product

Suggested Citation: Suggested Citation

Nikash Pradhan (Contact Author)

Amity university haryana, gurugram ( email ).

Panchgaon, Manesar, Gurugram, Haryana Gurugram, Haryana 122413 India

Amity University Haryana ( email )

Manesar Manesar, 122413 India

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, software engineering ejournal.

Subscribe to this fee journal for more curated articles on this topic

Electrical Engineering eJournal

Mechanical engineering ejournal.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • BMJ Open Access

Logo of bmjgroup

Barcode medication administration technology use in hospital practice: a mixed-methods observational study of policy deviations

1 Department of Pharmacy, Faculty of Mathematics and Natural Sciences, University of Oslo, Oslo, Norway

Liv Mathiesen

Katja taxis.

2 Pharmacotherapy and Pharmaceutical Care, University of Groningen, Groningen, The Netherlands

Anne Gerd Granås

Associated data.

bmjqs-2021-013223supp001.pdf

bmjqs-2021-013223supp002.pdf

bmjqs-2021-013223supp003.pdf

bmjqs-2021-013223supp004.pdf

No data are available. Additional deidentified data from the observational tool or field notes are not available as participants did not agree to share this information with a broad audience.

Introduction

Barcode medication administration (BCMA) can, if poorly implemented, cause disrupted workflow, increased workload and cause medication errors. Further exploration is needed of the causes of BCMA policy deviations.

To gain an insight into nurses’ use of barcode technology during medication dispensing and administration; to record the number and type of BCMA policy deviations, and to investigate their causes.

We conducted a prospective, mixed-methods study. Medication administration rounds on two hospital wards were observed using a digital tool and field notes. The SEIPS (Systems Engineering Initiative for Patient Safety) model was used to analyse the data.

We observed 44 nurses administering 884 medications to 213 patients. We identified BCMA policy deviations for more than half of the observations; these related to the level of tasks, organisation, technology, environment and nurses. Task-related policy deviations occurred with 140 patients (66%) during dispensing and 152 patients (71%) during administration. Organisational deviations included failure to scan 29% of medications and 20% of patient’s wristbands. Policy deviations also arose due to technological factors (eg, low laptop battery, system freezing), as well as environmental factors (eg, medication room location, patient drawer size). Most deviations were caused by policies that interfere with proper and safe BCMA use and suboptimal technology design.

Our findings indicate that adaptations of the work system are needed, particularly in relation to policies and technology, to optimise the use of BCMA by nurses during medication dispensing and administration. These adaptations should lead to enhanced patient safety, as the absolute goal with BCMA implementation.

Barcode medication administration (BCMA) technology is a health information technology credited for preventing medication errors and promoting patient safety when used accurately. 1 BCMA technology automates the process of verification by scanning the barcode on the medication and the patient identification wristband, thus assisting the nurses in confirming the ‘five rights’ of medication administration: right patient, right medication, right dose, right route and right time. 2 In an effort to prevent consequences of medication administration errors to patients, 3 hospitals have strongly encouraged BCMA implementation. 4–7 The BCMA has shown to reduce medication administration errors significantly and to reduce harm from serious medication errors. 8 Previous studies have also reported an increase in patient identity verification rate after implementing BCMA. 9 10

While BCMA has existed for over two decades, hospitals have struggled to adapt and implement it within their existing infrastructure, 5 11–15 and several studies demonstrate that the implementation process for BCMA is important for its overall success. 12 13 Studies have shown increased workload or disrupted workflow with the use of BCMA, resulting in workarounds, 7 12 14 16 17 such as carrying prescanned medications on carts. 18 These workarounds, also described as policy deviations, can lead to new errors created by the use of the technology. 7 12 18

Although previous studies have identified workarounds and policy deviations with BCMA, 7 12 18 there has been limited research to disclose why deviations occur and the impact of the surrounding context to their occurrence. One systematic review that evaluated the impact of BCMA technology to patient safety concluded that human factors and technical issues are standing in way of achieving intended scanning rates and patient safety benefits. 1 Another systematic review came to a similar conclusion and highlighted the importance of analysing whether deviations that are outside the five types of medication errors can have important implications to patient safety. 19 The purpose of this study, therefore, was to investigate nurses’ interaction with the technology and identify policy deviations as potential unsafe practices using a human factors approach. 20 More specifically, the study aimed to (1) gain an in-depth understanding of how nurses actually use the BCMA during medication rounds, (2) to record the number and types of BCMA policy deviations during medication dispensing and administration, and (3) to investigate probable causes of policy deviations in relation to the socio-technical factors of the working environment.

We used a concurrent triangulated, mixed-methods design comprising structured observation (quantitative data) and field notes and nurses’ comments (qualitative data) of BCMA use at two medical wards at a 700-bed hospital in Norway. Structured observation, involving a digital observational tool, was used to quantify policy deviations. Field notes and nurses’ comments contextualised the quantitative data, provided explanations and sometimes cued the causes to policy deviations.

Theoretical framework

We used the SEIPS model (Systems Engineering Initiative for Patient Safety) 16 20 to provide the theoretical underpinning for this study. This model explores interactions between humans, the technology they use and the environment in which they work, and has been successfully applied in the field of medication administration technologies, 16 as well as across healthcare. 20 In our study, we applied the SEIPS model to categorise the integrated qualitative and quantitative data according to the five elements of the SEIPS model 20 : (1) tasks, (2) organisational factors, (3) technology, (4) physical environment, and (5) individuals.

The study hospital was the first to introduce eMAR (electronic Medication Administration Record) and BCMA technology in Norway. The technology was implemented over a 3-year period, from 2017 to 2019. The studied eMAR and BCMA were a part of Metavision, iMDsoft. In addition to the digitalised medication records, the system comprised barcode scanners, patient identification (ID) wristbands, single-dose medication units, and scanning during dispensing and administration. The hospital used a decentralised ward-based dispensing system. The description of the delivery, dispensing and administration process with respective policy descriptions is illustrated in figure 1 . Data were collected on two wards: a cardiac medical ward and a geriatric intensive care ward. Other ward characteristics and dates of observation are summarised in online supplemental appendix 1 .

An external file that holds a picture, illustration, etc.
Object name is bmjqs-2021-013223f01.jpg

Description of the dispensing and administration process. BCMA, barcode medication administration; COW, computer on wheels.

Supplementary data

Definitions.

We defined a policy deviation as the act of dispensing or administering a medicine that was not in accordance with the hospital policy. Task-related deviations were failures with tasks involving use of barcode scanning during dispensing and administration. Organisational policy deviations included violations of hospital medication management policies, for example dispensing the wrong dose of the medication in the patient drawer placed in the computer on wheels (COW). Technology-related factors included problems with the technological equipment (hardware and software) associated with the BCMA. Environmental factors were elements of the physical environment that affected the BCMA. Nurse-related factors were related to the practice or comments of individuals.

Data collection

One registered pharmacist and one fifth-year pharmacy student observed medication administration rounds between October 2019 and January 2020. The observers contacted the assigned nurse on the respective ward prior to the medication round, explained the purpose of the study and obtained written consent. Upon entering the patient room, the nurse informed the patient briefly about the presence of the observer and the purpose of the study. To minimise observation bias, 21 the observers remained silent during observation. No patient-identifiable data were recorded. The observer alerted the nurse if they became aware of a medication error with the potential to cause patient harm.

We used a digital observational tool (described later) to record quantitative data and checked for consistency by the research team. Data were collected using handheld tablets and directly sent to a secured server for storage. After completing the structured observations of the medication rounds, the observers documented additional qualitative field notes of the medication safety environment and any comments made by the nurse.

Data collection stopped when saturation was achieved, and the research team members evaluated that additional data would not lead to new information. 22 The observers periodically met with the research team to review observation data for this determination.

Development and piloting of the data collection tool

A digital observational tool, using secure web-based data survey software, 23 was developed to collect data during medication administration. The tool was piloted for 7 days, by two observers, who observed the administration of medications to 30 patients on two medical wards. While the pilot data were not included in the main study, they were discussed by our inter-professional research team, and each question in the observational tool was evaluated for relevance to the research question and consistency with current evidence. We developed separate data collection tools for oral and parenteral medications because the differences in their administration processes ( online supplemental appendices 2 and 3 ). The 28 questions in the oral and parenteral observational tool (14 questions in each) were aligned with the workflow described in the hospital policies and quantified data on the following:

  • The total number of medications; scannable and scanned medications; number of scanned patient ID wristbands.
  • Policy deviations with dispensing, labelling, storage or scanning.
  • Technological problems with equipment or software.
  • The storage of inpatients’ own medications.
  • A free-text option in the tool was available to register the observers’ comments.

Quantitative data from both observational tools were merged; any string data were converted to numeric values. Scanning rates and frequency of policy deviations were analysed using descriptive statistics with IBM SPSS V.25. Qualitative data were analysed with inductive thematic analysis 24 through an iterative process. Two researchers coded the data assigning utterances to themes which were developed as they emerged from the data. The researchers discussed the manner in which the data fitted in the themes to reach joint consensus. Following the separate analysis of quantitative and qualitative data, we integrated the two data sets using a triangulated approach. 25 26 Key findings from both data sets were identified and complimentary findings were compared to enhance validity and provide a deeper understanding of policy deviations and their causes. The integrated findings were then categorised according to the five elements of the SEIPS model. 20

A total of 44 nurses were observed while preparing and administering medications; 29 during the morning and 15 during the evening medication rounds. We observed the administration of 884 medications (mean per patient, 4.2; range, 0 to 14) to 213 patients ( table 1 ). In total, 133 patients (62%) received oral medications only, 59 patients (28%) received both oral and parenteral, while 21 patients (10%) received only parenteral medications.

Characteristics of the observed barcode medication administration

CharacteristicsWard 1Ward 2Total (%)
Observation duration14 hours 35 min17 hours 48 min32 hours 23 min
Number of observed nurses22 (21 female; 1 male)22 female44
Number of observed medication rounds18 (12 at 8:00; 6 at 20:00)20 (14 at 8:00; 6 at 20:00)38
Total number of observed patients94119213 (100%)
Number of patients with scanned wristband8585170 (80%)
Total number of medications447437884 (100%)
Number of barcoded medications373315688 (78%)
Number of scanned medications319306625 (71%)

Task-related policy deviations

Data source: observational tool.

We registered how nurses used BCMA during dispensing and administration. Task-related policy deviations affected 140 patients (66%) during medication dispensing and 152 patients (71%) during medication administration, illustrated in figure 2 . During administration, we identified three variations in nurses’ BCMA use which resulted in deviations: nurses did not use BCMA; nurses partially used BCMA; nurses used BCMA correctly, but deviations still occurred.

An external file that holds a picture, illustration, etc.
Object name is bmjqs-2021-013223f02.jpg

Task-related policy deviations with barcode medication administration. BCMA, barcode medication administration; COW, computer on wheels.

Organisational policy deviations

Data source: observational tool, field notes and nurses’ comments.

Organisational deviations were deviations from the medication management policies. In terms of medication administration deviations, these arose with not scanning 29% medications and 20% patient ID wristband ( table 1 ).

We identified 10 types of policy deviations during the dispensing process. The most frequent were medication not dispensed (n=80 patients), barcode label missing (n=70 patients) and wrong dose dispensed (n=30 patients). Dispensing deviations and their connection to potential medication errors are listed in table 2 . All data in table 2 are presented as deviations, although three of these deviations also classify as actual medication errors including wrong medication dispensed, wrong dose dispensed, and medication not dispensed and not administered which is a medication omission. These deviations in the COW were often revealed after the nurse had entered the patient room and resulted in a prolonged and frequently interrupted administration, which led to medication omission for 25 patients. For 11 patients, scanning in the eMAR prevented administration of the wrongly dispensed medication. The observer intervened on one occasion when a nurse dispensed a wrong (look-alike) medication from the medication room and intended to give to the patient.

Organisational policy deviations with barcode medication administration and their connection to potential medication errors

Types of policy deviations*NExamples and descriptionsPotential medication errors
Medication not dispensed; obtained and given during observation55Nurse did not check for omission of dispensing before administration round start even though some medications (eg, parenteral injectables) were not expected to be found in the COW at allOmission
Medication not dispensed; not given during observation†25
Barcode label missing70Dispensed tablets without a barcode label, or without primary packagingWrong medication
Wrong dose
Wrong dose dispensed†30Dispensed whole blister pack instead of one tablet (correct dose)Wrong dose
Scanning failure26Barcode on the medication was not readable for the scannerWrong medication
Wrong dose
Wrong route
Barcode label not attached13Barcode label was in the patient drawer but not attached to the medication
Nurses stored expired labels for future administrations to save time from printing new labels
Wrong medication
Wrong medication dispensed†11Dispensed extended-release tablet instead of tablet
Dispensed sound-alike medication, for example, Lescol instead of Losec
Dispensed 2 g Cloxacillin intravenous bag from the storage room instead of 1 g
Errors discovered by scanning in eMAR
Wrong medication
COW deviations due to recent changes in the eMAR7Antithrombotic medication was dispensed in the patient drawer, nurse removed it during administration due to the patient being scheduled for surgery that dayContraindication
Wrong drug
Wrong route
Medication placed in the wrong compartment in the drawer5During dispensing, medication prescribed for morning administration was placed in the compartment in the patient drawer assigned for evening administrationWrong medication
Omission or wrong time
Wrong room number on patient drawer3The patient changed the room, but the room number on the patient drawer was not changedWrong patient
Wrong label attached1Attached ‘metoprolol’ label on a generic substitute Bloxazoc (metoprolol) unit dose. Revealed after failure with scanning the labelWrong medication
Wrong dose
Patients’ own medication stored in the patient room24We observed deviation of this policy for 24 of total 25 patients’ own medications (96%)Wrong dose
Wrong medication

*The number of deviations refers to one deviation of the same type per patient even if more deviations of same type exist with one patient, for example, if one patient had wrong dose dispensed for two medications, this was counted as one deviation.

†Deviations which also classify as actual medication errors.

COW, computer on wheels; eMAR, electronic Medication Administration Record.

We also observed deviations from the storage of patients’ own medication (home-brought). According to policy, patients’ own medication should be stored in the COW or the medication room. We registered a 96% deviation rate from this policy ( table 2 ). Patients’ own medications were not integrated in the BCMA and were not barcoded or scanned.

Technology-related factors

Data source: observational tool and field notes.

Technology-related factors were registered with the observational tool and deviations were found in 38 observations (18%). These included low laptop battery in 28 observations (13%), system freezing in seven observations (3%), malfunctioning barcode scanner in two observations and the barcode scanner was unavailable for administration in one observation ( online supplemental appendix 4 ). Software problems included slow response and the need for multiple clicking after scanning each medication. Nurses used the laptop mousepad to navigate the eMAR, and this extensive clicking was perceived by the nurses as frustrating. The size of the COW was deemed to slow the administration process and lead to deviations.

Environmental factors

Medication rooms were located some distance from the nursing stations and patient rooms. The nurses ran back and forth to the medication room multiple times during an administration round to rectify deviations in the COW. Other disruptive environmental factors affecting the BCMA workflow were the fact that the patient drawers were too small and could not contain all the patient medications. We also observed that the work surface of the COWs and at the nursing stations were often untidy and contained single-dose units from past administrations or falsely dispensed medications.

Nurse-related factors

Several nurses admitted that they did not use the barcode scanning equipment on a daily basis. If the ward was particularly busy, nurses tended to discard BCMA because they perceived it slowed down the medication administration. However, nurses who used BCMA regularly valued the automated medication verification because it confirmed that the right patient would receive the right medication.

Probable causes of BCMA policy deviations

The probable causes of BCMA deviations and their data sources are listed in table 3 . Under task-related deviations, the failure to scan medications during administration occured because scanning was discarded during dispensing; a non-streamlined workflow during administration was caused by a mismatch with the tasks required during administration. Causes for organisational deviations were associated with unclear or poorly described policies, health professionals unaware of policies or the policy was incompatible with workflow. Even when the policy was clear and excluding, deviations occurred; for example, the policy stated that only the prescribed dose should be dispensed, however occasionally whole tablet blisters were dispensed in the COW.

Probable causes to barcode medication administration policy deviations according to the SEIPS categories

Probable causeExample from observation/descriptionData source
Scanning discarded during dispensingMedications which were dispensed without scanning in the eMAR failed to scan during administrationObservational tool
Workflow not adopted to required tasks during administrationNurse makes multiple runs back and forth to the medication room to retrieve not dispensed medications which interrupts the workflow and may affect patient safetyObservational tool
Nurses’ comments
Suboptimal task performanceVoluminous medications (such as infusion bags, inhalers, eye drops) are routinely not scanned during dispensing because they are retrieved during administrationObservational tool
Nurses’ comments
Dispensing practices not adopted to nurse’s workload, resulted in normalising deviationsManual labelling of medications during dispensing on ward was challenging to carry out without workaroundsObservational tool
Non-standardised dispensing process resulted in frequent deviationsMedication not barcode labelled; scanning failure; wrong dose dispensed; wrong medication dispensed; medication not dispensed; wrong label attachedObservational tool
Unclear procedures or task not assignedVarying practice between the wards on updating the dispensed medications in the COW due to recent changes in the eMARObservational tool
Nurses’ comments
Field notes
Poor routines/not followed routines for changing the room number on patient drawerRoom number on patient drawer was another patient’s room number
(Each patient drawer was labelled with room number and this was the first step in identifying the patient’s medications)
Observational tool
Unaware of hospital policiesPatient’s own medications stored in the patient room. Due to policy, patients’ own medication should be stored in the COW or the medication roomObservational tool
Poor charging routines or non-compliance with routineThe laptop battery was low either at the start or during administrationObservational tool
eMAR usability issuesSlow eMAR response and need for multiple clicking after scanning each medicationField notes
The scanners were not wireless and limited the patient ID scanningNurse scanned medications prior to entering the patient room and administered medications while the COW was in the hallway, meaning that the patient ID wristband was not scannedField notes
Suboptimal COW designNurses often avoided to bring the bulky COW into the patient room when administering few or one single medication
The COW design was cumbersome for the desired workflow of entering patient rooms during administration rounds
The COW contained medications for all patients which combined with scanning not being used is a risk for patient safety
Field notes
Nurses’ comments
Medication room location affects task efficiency and time spent administering medicationsThe medication room was located far from the nursing station and most of the patient rooms. This resulted in slower administration and storage of random medications in the nursing station to avoid going back and forth to the medication roomObservational tool
Field notes
Patient drawer size does not allow appropriate BCMA useThe small size patient drawer led to deviations such as not dispensing the medications because only small forms of oral medications and ampoules were dispensed in the patient drawer, whereas voluminous medications were retrieved during administrationObservational tool
Field notes
Nurses’ comments
Non-specific medication storage policyRandom single-unit doses stored on the desk in the nursing station or on the COWs and were obtained from here in case something was missing during administration. Unsafe practice as the single doses are easy to mix up when stored randomly on the COW during administrationField notes
Non-standardised dispensing allows variationsVariations in performance between nurses and inconsistency in dispensing medications for the same nurseObservational tool
Field notes
Nurses’ comments
BCMA slower than manual verification—leading to user dissatisfactionNurse did not use the BCMA at all during the whole medication round
Nurse admitted to not using the BCMA on regular basis but used it during observation period
Observational tool
Field notes
Nurses’ comments

BCMA, barcode medication administration; COW, computer on wheels; eMAR, electronic Medication Administration Record.

Probable causes for deviations associated with technology were poor or unclear charging routines, the scanner was not mobile but attached to the laptop, and software usability issues. In addition, the design of the COW, including its large/bulky size, sometimes prevented nurses from scanning the patient ID wristband at the bedside. Furthermore, the undersized patient drawer led to dispensing omission because there was insufficient capacity to store all the medicines. Nurse-related deviations were caused by the slow BCMA process, which led to refraining from scanning or to skip the technology use. These factors all conflicted with patient safety during medication dispensing and administration.

We observed policy deviations which affected 6 of 10 patients during dispensing and 7 of 10 patients during medication administration. The causes to policy deviations were related to a complex dispensing process, slow or cumbersome BCMA procedure, suboptimal technology design and non-specific policy description. Working with suboptimal solutions in a busy environment, it was hard for the nurses not to deviate from policies, which explains why deviations were normalised in practice.

Despite these imperfections, our findings suggest that when the scanning of medications and ID wristbands was used, it offered benefits to patient safety by preventing the administration of wrong dispensed medication for 5% of the patients.

The lack of standardised delivery of dispensed doses lead to several variations in how the medications were dispensed in the COW. Patterson et al 27 found that BCMA made it easier to anticipate others’ actions and detect erroneous actions. In our study, however, it was difficult for other nurses to take for granted that the medications dispensed by a fellow nurse were correct. To compensate for the uncertainty, the nurses had to manually reconfirm doses before administering to patients. This practice undermines the purpose of BCMA.

The scanning rates in our study, that is, 71% for medications, 91% for scannable doses and 80% for patient ID wristbands, are considerably lower than the 95% standard goal for scanning medications and patients. 28 In a recent observational study of BCMA at a UK hospital, Barakat and Franklin registered scanning rates for medications of 83%, scannable doses of 95% and patient verification of 100%. 29 Although Barakat and Franklin had a smaller sample size, their study was undertaken with a similar ward-stock dispensing process and BCMA technology design to our study, which makes the rates broadly comparable.

A recent national study of medication errors in Norwegian hospitals, where BCMA was not used, found that 70% of all medication errors occurred during the medication administration stage. 3 We suggest that many of these errors, such as wrong dose, wrong patient and wrong medication during administration, could have been avoided if BCMA had been implemented. However, even if the technology is used accurately, hospitals may still fail to achieve the full benefits of BCMA to patient safety and unintended consequences may arise from technology implementation, 18 both demonstrated in our findings. In the current study, the technology was used as intended in only half of medication administrations. These deviations often originated in the dispensing process, such as not dispensed medications, wrong medication dispensed and wrong dose dispensed, and consequentially resulted in new deviations even when the BCMA was used correctly during medication administration.

The availability of functioning hardware is essential for the BCMA to have a preventive effect on errors. We identified a reoccurring problem with laptops not being charged and borrowing of scanners across wards, but these were not the main cause of technology-related deviations. The most important cause was the design of the technology like the bulky COW and the fact that scanners were not wireless. Those design issues limited the staffs’ efficiency during medication administration. This may explain why 20% of patient ID wristbands were not scanned during observation. Others have also described the size of the medication cart getting in way of efficient use of BCMA. 4 18 One observational study concluded that nurses uniformly believed that manually confirming patient identity took less time than wheeling the large medication cart in the patient room. 27

The distant medication rooms indirectly affected patient safety because retrieving of missing medications in the COW took a long time and led to medication omissions. Other environmental factors were in direct conflict with patient safety. Dispensing omissions were unavoidable because medications larger in size (eg, eyedrops, inhalers or syringes) could not fit in the small pocket of the COW patient drawers. Such environmental characteristics have affected medication safety in other studies as well. 30

Our nurses also expressed that BCMA prolonged the time they spent on medication administration. Compared with others that used automated dispensing cabinets, 18 or pharmacy-operated dispensing, 12 it is important to stress that nurses in our study had more tasks to attend to during the dispensing process (eg, packaging, labelling, dispensing in the correct compartment of the patient drawer). This is likely to explain the high proportion of dispensing deviations in the current study.

This study demonstrates variations among nurses in their BCMA use: from not using the BCMA in entire administrations, to partial use, to those who were fully compliant. Much of the variability can be explained by doses lacking barcodes and that the policies allowed for too many variations in the workflow. In the study of Barakat and Franklin, the BCMA led to less variability in how nurses undertake medication administration. 29 Some of this difference may be explained by safety culture differences, for example, if the BCMA technology is not used by all nurses, such as found in our study, it could result in being a burden to the workflow rather than a safety initiative. Lyons et al 31 have also described a similar performance variability among nurses within the use of other medication administration technologies, and addressed that this adaptive behaviour could be a source of resilience, compensating for the weaknesses of the system, but raised concerns that it could also lead to unsatisfactory outcomes.

Implications

Having the advantage of studying the use of BCMA within the actual setting, this study may provide implications to technology implementation and strategies for improvement.

  • Prior to implementation, hospitals should risk-assess policies and make institution-specific decisions on how to properly integrate the technology into their workflow.
  • The scanning rates could be improved if a greater number of medications are scannable. One way to address this is for the pharmaceutical industry to barcode medications on the primary packaging. 32 This could reduce the workload for the nurses and the hospital pharmacy and increase the standardisation of the dispensing process across wards.
  • Ward-based medication dispensing, which is associated with significantly more medication errors than a unit-based system, 33 should be evaluated for efficiency and safety.
  • Redesigning technology to fit the nurses’ workflow, that is, replacing the cumbersome COW with a lightweight cart and mobile eMAR device, could create better experiences for nurses and compensate for the downsides of the currently implemented system.
  • Greater attention to the usability and functionality of BCMA is required: override logs and scanning stats were not available within the BCMA system observed in this study, which limits the monitoring of the technology use significantly.
  • Besides data monitoring, ongoing assessments of the actual use of the BCMA technology are mandatory as changes in policy and technology will lead to new deviations. 16 This could be accomplished through periodical observation of medication rounds, 13 34 which give an insight in the technology use with all the contextual factors in place, but also to involve end-users in making suggestions on improvement.
  • Shared learning of BCMA practices between hospitals with similar systems is an important resource to improve knowledge, implementation, and staff motivation.

Strengths and limitations

The mixed-method approach provided insight into the nurses’ BCMA use and understanding of the context in which deviations occur. The added value of using both the qualitative and quantitative data was that it identified frequency of deviations and their probable causes. Our observational tool allowed the detection of ‘normal’ deviations in practice (eg, dispensing wrong dose of medications) that often remain undetected because they are not identified using standard methods such as incident reports and chart reviews. 35 Previous studies have demonstrated that BCMA can reduce medication error rates. 4 5 7 8 In our study, the identified policy deviations indicate that workarounds occur due to system flaws that produce latent conditions which could ultimately lead to serious medication errors. However, focusing on policy deviations rather than medication errors is also a limitation because there is no direct measure of the impact of BCMA to patient safety.

Other limitations are acknowledged. First, there could be differences among observers, either in their data collection or in their interpretation and knowledge of local policy. Observers were carefully trained in observational techniques 36–38 and familiarised with local medication management policies to minimise such effect. Second, the presence of an observer might have influenced the nurses to consciously or unconsciously modify their behaviour. 39 Nurses were aware of being observed while administering medications, and the expected change in behaviour would have been in the direction of better compliance with BCMA use. Some nurses indicated that they were using the technology because they were being observed. However, the findings associated with the medication dispensing were not affected by the observation because this activity took place prior to the observation period that is, usually undertaken by nurses from the previous shift.

We studied an eMAR paired with BCMA technology in a hospital with a traditional ward-based medication dispensing operated by nurses. It is likely that our data will not be generalisable to organisations that use a pharmacy-operated or automated medication dispensing. On the other hand, hospitals that use a ward-based dispensing system can value from our findings, as there is limited research on the BCMA technology use in a ward-based medication dispensing.

This study provides an in-depth understanding of how the BCMA is used in the clinical environment. We identified policy deviations for over half of the observations, such as not scanning the patients or the medications, omission of dispensing, or wrong dose dispensed. We also identified variations in how nurses used BCMA. Deviations were caused with unclear policies, policies that interfere with appropriate BCMA use, including the labor-intensive dispensing process, as well as problems with technology design. Our findings suggest that several factors in the work system need reassessment and adaptation to nurses’ workflow. Deviations are expected with technology implementation in any complex system. As such, analysing policy deviations in practice is an important method of identifying and addressing system weaknesses in order to achieve the full benefits of BCMA in terms of patient safety.

Acknowledgments

The authors thank the nursing staff for their participation in the study. We also would like to acknowledge the contributions provided by the staff from the Southern and Eastern Norway Pharmaceutical Trust and the Department of Information and Communication Technology at the hospital.

Contributors: AM and AGG conceived of the presented idea. KT, LM and AGG were involved in planning and supervising the work. AM took lead in the data collection, analysis and in writing the manuscript. All authors have read and approved the final version of the manuscript.

Funding: This study was internally funded.

Competing interests: None declared.

Provenance and peer review: Not commissioned; externally peer reviewed.

Supplemental material: This content has been supplied by the author(s). It has not been vetted by BMJ Publishing Group Limited (BMJ) and may not have been peer-reviewed. Any opinions or recommendations discussed are solely those of the author(s) and are not endorsed by BMJ. BMJ disclaims all liability and responsibility arising from any reliance placed on the content. Where the content includes any translated material, BMJ does not warrant the accuracy and reliability of the translations (including but not limited to local regulations, clinical guidelines, terminology, drug names and drug dosages), and is not responsible for any error and/or omissions arising from translation and adaptation or otherwise.

Data availability statement

Ethics statements, patient consent for publication.

Not required.

Ethics approval

The study was approved by the institutional data protection board.

  • INNOVATION FESTIVAL
  • Capital One

research paper on barcode technology

08-20-2024 TECH

How AI tools help students—and their professors—in academic research

New systems can help surface relevant research papers and quickly understand what they have to say.

How AI tools help students—and their professors—in academic research

[Photo: Nikish Hiraman/peopleimages.com/Adobe Stock]

BY  Steven Melendez 7 minute read

For students and professional scholars alike, starting a new research project typically means digging through academic literature to understand what others have already written.

That can take a considerable amount of time, with researchers tracking down and combing through journal articles to begin their research and contextualize their own findings. But a growing collection of AI-powered tools aims to make that process easier. These new tools can help researchers more quickly find relevant papers, pull out relevant information from them, or both.

“It can be a really helpful way to get started with research, especially for students who aren’t familiar with the research process,” says Breanne Kirsch, director of the library at Illinois College. “As long as they’re taught how to use it in an ethical way, and that they can then expand beyond what it does.”

A tool called Elicit can help researchers conduct what are called systematic reviews , which involve going through copious amounts of published research to find an answer to a question, like how a particular drug affects a medical condition. “It’s all very, very manual,” says James Brady, head of engineering at Elicit. “It takes teams of people many months, and you know, costs hundreds of thousands or millions of dollars to do these things.” 

Elicit can make that process much faster, and also help researchers by quickly finding and summarizing published papers related to a particular question. It can also generate tables describing a whole set of relevant papers, with columns for data points like algorithms and statistical techniques used, variables examined, and the number of participants in experiments. 

The company recommends researchers still look at the original papers, and Brady emphasizes that the tool doesn’t replace the human judgment and analysis necessary to scientific research. “It’s not like you take the final step of Elicit and hit the publish button and then it ends up in Nature or something,” he says, but it can still greatly speed the process of sifting through and understanding prior work.

Understanding how AI can help academic research is part of a larger industry question of how and when the technology can replace or supplement traditional web search tools. And since the 1990s , computer scientists have realized that the academic publishing landscape—where scholars cite each other’s papers and publish in journals with a particular reputation in a particular field—isn’t that different from the internet ecosystem . That means techniques for finding relevant materials, minimizing AI errors and hallucinations, and presenting useful and verifiable results to the user may transfer from academia to the broader web.

ABOUT THE AUTHOR

Steven Melendez is an independent journalist living in New Orleans.   More

Explore Topics

  • Artificial Intelligence
  • Tech Zuckerberg says the Biden administration ‘pressured’ Facebook to censor some COVID-19 content during the pandemic
  • Tech Why France’s arrest of Telegram CEO Pavel Durov has divided tech regulation experts
  • Tech TikTok’s ‘hopecore’ trend shows the best—and worst—of internet optimism
  • News Compliance inflation is crushing small businesses
  • News Psychologists have figured out why you get so bored scrolling through TikTok and Instagram
  • News Consumer confidence soars to a 6-month high in August
  • Design Instagram releases new fonts and effects to make every user an amateur graphic designer
  • Design Jeremy Allen White is back and baring it once again for Calvin Klein
  • Design Multidimensional takes brands where omnichannel never could
  • Work Life We need to talk about NVLD, or Non-Verbal Learning Disorder, at work
  • Work Life New Alternative Pathways to Career Success
  • Work Life The FIFA World Cup is coming to the U.S.—who will benefit?

NTRS - NASA Technical Reports Server

Available downloads, related records.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Report on BARCODE TECHNOLOGY

Profile image of Maruf Alom

Related Papers

… (ICSPS), 2010 2nd …

Md Kafiul Islam

research paper on barcode technology

International Journal of Science Technology & Engineering

IJSTE - International Journal of Science Technology and Engineering

Mobile cameras are being used now-a-days to scan barcodes to retrieve the product details. But the drawback is mobile cameras are made by a charge coupled device which is does not have the ability to handle out of focus and blur images. In this project, out of focus and blur images are restored using a dynamic template matching algorithm using directed graphical model. The directed graphical model is used to determine the relationship between state variable from blurred waveform at specific blur level and observation sequence. A varying program based inference algorithm is used to recover the optimal state sequence and hence the system works in real-time.

Proceedings / IEEE Workshop on Applications of Computer Vision. IEEE Workshop on Applications of Computer Vision

Ender Tekin

Most camera-based systems for finding and reading barcodes are designed to be used by sighted users (e.g. the Red Laser iPhone app), and assume the user carefully centers the barcode in the image before the barcode is read. Blind individuals could benefit greatly from such systems to identify packaged goods (such as canned goods in a supermarket), but unfortunately in their current form these systems are completely inaccessible because of their reliance on visual feedback from the user.To remedy this problem, we propose a computer vision algorithm that processes several frames of video per second to detect barcodes from a distance of several inches; the algorithm issues directional information with audio feedback (e.g. "left," "right") and thereby guides a blind user holding a webcam or other portable camera to locate and home in on a barcode. Once the barcode is detected at sufficiently close range, a barcode reading algorithm previously developed by the authors...

Journal of Computer Science IJCSIS , Rizwan Mukati

Barcodes and RFIDs, the two most frequently used " Automatic Identification and Data Capture (AIDC) " techniques based on " Assigned " properties, are being used nearly for the last five decades, in the supply-chain, distribution and manufacturing processes. In this paper, an in-depth look, their pros and cons and their suitability in the given processes, have been presented.

Proceedings / Canadian Conference on Computer and Robot Vision. Canadian Conference on Computer and Robot Vision

The 1D barcode is a ubiquitous labeling technology, with symbologies such as UPC used to label approximately 99% of all packaged goods in the US. It would be very convenient for consumers to be able to read these barcodes using portable cameras (e.g. mobile phones), but the limited quality and resolution of images taken by these cameras often make it difficult to read the barcodes accurately. We propose a Bayesian framework for reading 1D barcodes that models the shape and appearance of barcodes, allowing for geometric distortions and image noise, and exploiting the redundant information contained in the parity digit. An important feature of our framework is that it doesn't require that every barcode edge be detected in the image. Experiments on a publicly available dataset of barcode images explore the range of images that are readable, and comparisons with two commercial readers demonstrate the superior performance of our algorithm.

Yuri Matveev , Kukharev Georgy , Georgy Kukharev

In this paper we propose a simple method for generating standard type linear barcodes from facial images. The method uses the difference in gradients of image brightness. It involves averaging the gradients into a limited number of intervals, quantization of the results into the range of decimal numbers from 0 to 9, and table conversion into the final barcode. The proposed solution is computationally low-cost and does not require the use of any specialized image processing software, which makes it possible to generate facial barcodes in mobile systems. Results of tests conducted on the Face94 database and a database of composite faces at different ages show that the proposed method is a new solution for use in real-world practice. It ensures the stability of the generated barcodes against changes of scale, pose and mirroring of facial images, as well as changes of facial expressions and shadows on faces from local lighting.

IJSRD - International Journal for Scientific Research and Development

In this Review paper discusses about the last few years, Two-Dimensional (2D) codes to get the importance in the industrial sector, and the greater storage capacity information gradually replace many applications of One Dimensional Barcode. Quick response (QR) codes are one of the most popular types of 2D codes. QR Code widely used in many commercial applications due to their highspeed decoding.

International Journal of Latest Technology in Engineering, Management & Applied Science -IJLTEMAS (www.ijltemas.in)

This paper presents designing a Color Barcode for Mobile Applications, 2D barcodes have gained popularity as one of the key pervasive technologies for mobile applications on smart phones. They can be used as shortcuts to URL links, a means to store contact information for easy transfer admission tickets or boarding passes and tokens for retrieving digital information, such as public transportation timetables or fresh produce production information, either directly from the barcode itself or through a networked database server. Most mobile applications use black-and-white 2D barcodes that carry only a limited amount of encoded data. A color barcode framework for mobile phone applications by exploiting the spectral diversity aborted by the cyan (C), magenta (M), and yellow (Y) print colorant channels commonly used for color printing and the complementary red (R),green (G), and blue (B) channels, respectively, used for capturing color images. Specifically, we exploit this spectral diversity to realize a threefold increase in the data rate by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complementary R, G and B channels captured via a mobile phone camera. To mitigate the effect of cross-channel interference among the printcolorant and capture color channels, we develop an algorithm for interference cancellation. To estimate the model parameters required for crosschannel interference cancellation, we propose two alternative methodologies: a pilot block approach that uses suitable selections of colors for the synchronization blocks and an expectation maximization approach that estimates the parameters from regions encoding the data.

Student attendance play significant role in order to justify academic outcome of a student and college as overall. Unfortunately, there is no automated attendance record keeping application available in colleges. There is a need for a tool to systematically keep the students attendance record due to increasing number of college students The project that we are going to make is to help the teachers in our college to avoid maintaining the registry book. This project uses a barcode scanner. B.B.S.A.S uses Barcode scanner to take the attendance of students entering the lab. Each student's ID card will have a barcode at the back side of it. This barcode contains unique data of the student such as roll number, branch and year. Etc. Student will scan their barcode at the end so that the student can't cheat. The display screen will show the attendance of the particular student after scanning his/her barcode. Teachers and administrator will only have access to the system with their respective login ID's and passwords.

International Journals for Researchers [ER Publication, WOAR Journals, IJEAS and IJEART]

 Abstract— Radio frequency identification (RFID) is a rapidly emerging technology which allows productivity and convenience. Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection technology which helps to automate business processes and allows identification of large number of tagged objects like books, using radio waves. This paper proposes RFID Based University Library Management System that would allow fast transaction flow and will make it easy to handle the issue and return of books from the library without much intervention of manual book keeping which benefits by adding properties of traceability and security. The proposed system is based on RFID readers and passive RFID tags that are able to electronically store information that can be read with the help of the RFID reader. This system would be able to issue and return books via RFID tags and also calculates the corresponding fine associated with the time period of the absence of the book from the library database.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Jari Kangas

iaeme iaeme

Rob Kitchin

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Suggestions or feedback?

MIT News | Massachusetts Institute of Technology

  • Machine learning
  • Sustainability
  • Black holes
  • Classes and programs

Departments

  • Aeronautics and Astronautics
  • Brain and Cognitive Sciences
  • Architecture
  • Political Science
  • Mechanical Engineering

Centers, Labs, & Programs

  • Abdul Latif Jameel Poverty Action Lab (J-PAL)
  • Picower Institute for Learning and Memory
  • Lincoln Laboratory
  • School of Architecture + Planning
  • School of Engineering
  • School of Humanities, Arts, and Social Sciences
  • Sloan School of Management
  • School of Science
  • MIT Schwarzman College of Computing

MIT engineers’ new theory could improve the design and operation of wind farms

Press contact :, media download.

Wind turbines in the ocean

*Terms of Use:

Images for download on the MIT News office website are made available to non-commercial entities, press and the general public under a Creative Commons Attribution Non-Commercial No Derivatives license . You may not alter the images provided, other than to crop them to size. A credit line must be used when reproducing images; if one is not provided below, credit the images to "MIT."

Wind turbines in the ocean

Previous image Next image

The blades of propellers and wind turbines are designed based on aerodynamics principles that were first described mathematically more than a century ago. But engineers have long realized that these formulas don’t work in every situation. To compensate, they have added ad hoc “correction factors” based on empirical observations.

Now, for the first time, engineers at MIT have developed a comprehensive, physics-based model that accurately represents the airflow around rotors even under extreme conditions, such as when the blades are operating at high forces and speeds, or are angled in certain directions. The model could improve the way rotors themselves are designed, but also the way wind farms are laid out and operated. The new findings are described today in the journal Nature Communications , in an open-access paper by MIT postdoc Jaime Liew, doctoral student Kirby Heck, and Michael Howland, the Esther and Harold E. Edgerton Assistant Professor of Civil and Environmental Engineering.

“We’ve developed a new theory for the aerodynamics of rotors,” Howland says. This theory can be used to determine the forces, flow velocities, and power of a rotor, whether that rotor is extracting energy from the airflow, as in a wind turbine, or applying energy to the flow, as in a ship or airplane propeller. “The theory works in both directions,” he says.

Because the new understanding is a fundamental mathematical model, some of its implications could potentially be applied right away. For example, operators of wind farms must constantly adjust a variety of parameters, including the orientation of each turbine as well as its rotation speed and the angle of its blades, in order to maximize power output while maintaining safety margins. The new model can provide a simple, speedy way of optimizing those factors in real time.

“This is what we’re so excited about, is that it has immediate and direct potential for impact across the value chain of wind power,” Howland says.

Modeling the momentum

Known as momentum theory, the previous model of how rotors interact with their fluid environment — air, water, or otherwise — was initially developed late in the 19th century. With this theory, engineers can start with a given rotor design and configuration, and determine the maximum amount of power that can be derived from that rotor — or, conversely, if it’s a propeller, how much power is needed to generate a given amount of propulsive force.

Momentum theory equations “are the first thing you would read about in a wind energy textbook, and are the first thing that I talk about in my classes when I teach about wind power,” Howland says. From that theory, physicist Albert Betz calculated in 1920 the maximum amount of energy that could theoretically be extracted from wind. Known as the Betz limit, this amount is 59.3 percent of the kinetic energy of the incoming wind.

But just a few years later, others found that the momentum theory broke down “in a pretty dramatic way” at higher forces that correspond to faster blade rotation speeds or different blade angles, Howland says. It fails to predict not only the amount, but even the direction of changes in thrust force at higher rotation speeds or different blade angles: Whereas the theory said the force should start going down above a certain rotation speed or blade angle, experiments show the opposite — that the force continues to increase. “So, it’s not just quantitatively wrong, it’s qualitatively wrong,” Howland says.

The theory also breaks down when there is any misalignment between the rotor and the airflow, which Howland says is “ubiquitous” on wind farms, where turbines are constantly adjusting to changes in wind directions. In fact, in an  earlier paper in 2022, Howland and his team found that deliberately misaligning some turbines slightly relative to the incoming airflow within a wind farm significantly improves the overall power output of the wind farm by reducing wake disturbances to the downstream turbines.

In the past, when designing the profile of rotor blades, the layout of wind turbines in a farm, or the day-to-day operation of wind turbines, engineers have relied on ad hoc adjustments added to the original mathematical formulas, based on some wind tunnel tests and experience with operating wind farms, but with no theoretical underpinnings.

Instead, to arrive at the new model, the team analyzed the interaction of airflow and turbines using detailed computational modeling of the aerodynamics. They found that, for example, the original model had assumed that a drop in air pressure immediately behind the rotor would rapidly return to normal ambient pressure just a short way downstream. But it turns out, Howland says, that as the thrust force keeps increasing, “that assumption is increasingly inaccurate.”

And the inaccuracy occurs very close to the point of the Betz limit that theoretically predicts the maximum performance of a turbine — and therefore is just the desired operating regime for the turbines. “So, we have Betz’s prediction of where we should operate turbines, and within 10 percent of that operational set point that we think maximizes power, the theory completely deteriorates and doesn’t work,” Howland says.

Through their modeling, the researchers also found a way to compensate for the original formula’s reliance on a one-dimensional modeling that assumed the rotor was always precisely aligned with the airflow. To do so, they used fundamental equations that were developed to predict the lift of three-dimensional wings for aerospace applications.

The researchers derived their new model, which they call a unified momentum model, based on theoretical analysis, and then validated it using computational fluid dynamics modeling. In followup work not yet published, they are doing further validation using wind tunnel and field tests.

Fundamental understanding

One interesting outcome of the new formula is that it changes the calculation of the Betz limit, showing that it’s possible to extract a bit more power than the original formula predicted. Although it’s not a significant change — on the order of a few percent — “it’s interesting that now we have a new theory, and the Betz limit that’s been the rule of thumb for a hundred years is actually modified because of the new theory,” Howland says. “And that’s immediately useful.” The new model shows how to maximize power from turbines that are misaligned with the airflow, which the Betz limit cannot account for.

The aspects related to controlling both individual turbines and arrays of turbines can be implemented without requiring any modifications to existing hardware in place within wind farms. In fact, this has already happened, based on earlier work from Howland and his collaborators two years ago that dealt with the wake interactions between turbines in a wind farm, and was based on the existing, empirically based formulas.

“This breakthrough is a natural extension of our previous work on optimizing utility-scale wind farms,” he says, because in doing that analysis, they saw the shortcomings of the existing methods for analyzing the forces at work and predicting power produced by wind turbines. “Existing modeling using empiricism just wasn’t getting the job done,” he says.

In a wind farm, individual turbines will sap some of the energy available to neighboring turbines, because of wake effects. Accurate wake modeling is important both for designing the layout of turbines in a wind farm, and also for the operation of that farm, determining moment to moment how to set the angles and speeds of each turbine in the array.

Until now, Howland says, even the operators of wind farms, the manufacturers, and the designers of the turbine blades had no way to predict how much the power output of a turbine would be affected by a given change such as its angle to the wind without using empirical corrections. “That’s because there was no theory for it. So, that’s what we worked on here. Our theory can directly tell you, without any empirical corrections, for the first time, how you should actually operate a wind turbine to maximize its power,” he says.

Because the fluid flow regimes are similar, the model also applies to propellers, whether for aircraft or ships, and also for hydrokinetic turbines such as tidal or river turbines. Although they didn’t focus on that aspect in this research, “it’s in the theoretical modeling naturally,” he says.

The new theory exists in the form of a set of mathematical formulas that a user could incorporate in their own software, or as an open-source software package that can be freely downloaded from GitHub . “It’s an engineering model developed for fast-running tools for rapid prototyping and control and optimization,” Howland says. “The goal of our modeling is to position the field of wind energy research to move more aggressively in the development of the wind capacity and reliability necessary to respond to climate change.”

The work was supported by the National Science Foundation and Siemens Gamesa Renewable Energy.

Share this news article on:

Related links.

  • Unified momentum model software
  • Howland Lab
  • Department of Civil and Environmental Engineering

Related Topics

  • Civil and environmental engineering
  • Renewable energy
  • Climate change

Related Articles

Portrait of Michael Howland standing in front of a glass wall

Michael Howland gives wind energy a lift

wind farm flow graphic

A new method boosts wind farms’ energy output, without new equipment

Four panelists sit on a stage. One is speaking and gesturing while the other three watch.

The answer may be blowing in the wind

Previous item Next item

More MIT News

Feyisayo Eweje wears lab coat and gloves while sitting in a lab.

Designing better delivery for medical therapies

Read full story →

Saeed Miganeh poses standing in a hallway. A street scene is visible through windows in the background

Making a measurable economic impact

Jessica Tam headshot

Faces of MIT: Jessica Tam

More than a dozen people sit around shared tables with laptops running App Inventor

First AI + Education Summit is an international push for “AI fluency”

Sally Kornbluth speaking at a podium

President Kornbluth welcomes the Class of 2028

Brain with words around it like "One; word; string of words"

Scientists find neurons that process language on different timescales

  • More news on MIT News homepage →

Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA, USA

  • Map (opens in new window)
  • Events (opens in new window)
  • People (opens in new window)
  • Careers (opens in new window)
  • Accessibility
  • Social Media Hub
  • MIT on Facebook
  • MIT on YouTube
  • MIT on Instagram

COMMENTS

  1. A COMPREHENSIVE REVIEW ON BARCODE TECHNOLOGIES FOR ...

    Abstract. The paper provides an overview of some latest bar code technology, which involves the insertion of a small RFID (radio-frequency identification) tag. This beneath the skin to enable ...

  2. Deep Learning in Barcode Recognition: A Systematic Literature Review

    The use of deep learning (DL) for barcode recognition and analysis has achieved remarkable success and has attracted great attention in various domains. Unlike other barcode recognition methods, DL-based approaches can significantly improve the speed and accuracy of both barcode detection and decoding. However, after almost a decade of progress, the current status of DL-based barcode ...

  3. Barcode Technology and its Application in Libraries

    The main aim of the article is to create awareness among the librarians to use Barcode technology in the library. Barcode is very cost-effective technology can be used by every library. The paper ...

  4. PDF Planning and Execution of the Library's use of Barcode Technology

    Design: This research paper briefly converses the explanation of the application of Barcode technology in libraries, advantages and its working mechanism. It also tried to discover the technical features of Barcode technology in the library. Findings: Barcode technology is mostly used in the motion system of a library and most successful due to ...

  5. Barcode Technology and its Application in Libraries

    Application of Bar-code technology in libraries is a way to process client requests from fast to fastest. Bar-code technology is mostly used in the circulation system of a library and most successful due to its speed, accuracy and reliability. Bar-coding though comparatively an old technology is one of the significant steps in library ...

  6. (PDF) Application of Barcode Technology in Library ...

    The application of barcode technology in circulation system of a library and information centre is most succ essful due to its. speed, accuracy and reliability. Statement of the problem. Library ...

  7. Barcode Technology Research Papers

    This paper desires to explore the role of barcode technology in blood bank information systems via addressing its upgrade and the consequent impact. Firstly, it briefs the application and effect of barcode technology in blood donation and transfusion service.

  8. PDF Design and Implementation of Barcode Management Information ...

    Analyze check code calculation method by the following taking the EAN-13 barcode for example, as follows: Design and Implementation of Barcode Management Information System 579. Set: Any digit of the numerical code in barcodes is Xi(i = 1, 2, ... 13). (1) Take the unknown parity bit as the first, from right to left, line up the data (including ...

  9. Real-Time Barcode Detection in the Wild

    The linear 1D barcode is the main tagging system for billions of products sold each day. Barcodes have many advantages but require a laser scanner for fast and robust scanning. Solutions exist to read barcodes from cell phones but they assume a carefully framed image within the field of view. This undermines the true potential of barcodes in a wide range of scenarios. In this paper we present ...

  10. Sustainability

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

  11. Using Barcode to Track Student Attendance and Assets in Higher

    The use of barcode technology is comparatively cheaper as compared to other AIDC technologies [23]. This work considers the implementation of barcode technology in a public sector university because it is a cheaper and more viable option for attendance monitoring and asset tracking.

  12. Transforming a Traditional Library to Modern Library using Barcode

    Aim: The main aim of this research paper is to create consciousness among the librarians to use Barcode technology in the library. Design: This research paper briefly converses the explanation of the application of Barcode technology in libraries, advantages and its working mechanism.

  13. PDF Raising the Barcode Scanner: National Bureau of Economic Research

    Retail Trade for 1972, 1977, and 1982 in a di erence-in-di erence speci cation and. nd that. productivity increased by an average of 4.5% in stores that installed barcode scanners before 1982. This average e ect masks variation both over time and across stores: gains in the year.

  14. Application of Bar-code Technology in Libraries

    Barcode is an identification tool that provides an accurate and timely support of the data requirement for management system. This paper highlights the applications of bar code technology in university libraries of Tamilnadu and the satisfaction level of the staff. This study discusses the benefits of barcode technology and highlights the ...

  15. Deep Learning in Barcode Recognition: A Systematic Literature Review

    ABSTRACT The use of deep learning (DL) for barcode recognition and analysis has achieved remarkable. success an d h as attracted great attention in various domains. Unlike other b arcode ...

  16. Barcode Recognition Techniques: Review & Application

    The machine is also intended to provide a more convenient and cost-effective way of viewing data from barcodes than electronic barcode scanners. An individual who wants to inspect data identified by barcode numbers without having to go to a location that provides barcode scanner services can use this computer at any time and from any location [1].

  17. Barcode medication administration technology use in hospital practice

    Introduction. Barcode medication administration (BCMA) technology is a health information technology credited for preventing medication errors and promoting patient safety when used accurately. 1 BCMA technology automates the process of verification by scanning the barcode on the medication and the patient identification wristband, thus assisting the nurses in confirming the 'five rights ...

  18. Research Paper On Barcode Technology

    Research Paper on Barcode Technology - Free download as PDF File (.pdf), Text File (.txt) or read online for free. research paper on barcode technology

  19. Study reveals the benefits and downside of fasting

    MIT researchers have discovered how fasting impacts the regenerative abilities of intestinal stem cells, reports Ed Cara for Gizmodo.. "The major finding of our current study is that refeeding after fasting is a distinct state from fasting itself," explain Prof. Ömer Yilmaz and postdocs Shinya Imada and Saleh Khawaled.

  20. (PDF) Barcode Recognition System

    Interface (GUI) the barcode type, da ta and size of the image. System is designed to recognize different types of barcode and. display the data once the barcode image is captured. System. also is ...

  21. These AI tools help students and professors in academic research

    It's part of Ai2, the AI research institute founded by late Microsoft cofounder Paul Allen, and today it includes features to help users understand papers, like surfacing definitions of ...

  22. NTRS

    The search for life signs and potentially habitable bodies in our solar system and beyond is one of NASA's top priorities. The prime destinations for such exploration are bodies containing liquid water, such as Jupiter's moon Europa and Saturn's moon Enceladus. Initial missions to these "ocean worlds" will be robotic, and because of long communication lags and blackouts, harsh ...

  23. Barcode Technology and its Impact on Seminar Library, Department of

    Aim: The main aim of this research paper is to create consciousness among the librarians to use Barcode technology in the library. Design: This research paper briefly converses the explanation of the application of Barcode technology in libraries, advantages and its working mechanism.

  24. (PDF) Barcode Scanning System

    This paper first discusses 2D-barcode concepts, types and classifications, major technology players, and applications in mobile commerce. ... Then, it reports a research project to develop a 2D ...

  25. (DOC) Report on BARCODE TECHNOLOGY

    The barcode scanner illuminates the barcode with red light using the illuminator system. The sensor/convertor part of the scanner then detects the reflected light. Once the light is detected, an analog signal is generated. This signal contains varying voltage based on the intensities of the light reflection.

  26. MIT engineers' new theory could improve the design and operation of

    The new findings are described today in the journal Nature Communications, in an open-access paper by MIT postdoc Jaime Liew, doctoral student Kirby Heck, and Michael Howland, the Esther and Harold E. Edgerton Assistant Professor of Civil and Environmental Engineering. "We've developed a new theory for the aerodynamics of rotors," Howland ...

  27. (PDF) Implementation of Barcode Technology to Logistics ...

    operating with RFID technology was 9.669 s and, when using barcode technology, 24.479 s. Observations of time and motion studies have revealed that many problems affect the timing of RFID and ...