SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
ANALYSIS OF DAMAGED BARCODES
Jennifer Das, Steven Hostetler, Faisal Al-Khalidi, Christopher White, Michael Brockly, Mathias Sutton, Stephen Elliott
Overview
A study on the assessment of two-dimensional barcodes on soil sample bags was conducted by former graduate student
Jodi M. Gessner. We used the data she collected to further investigate what is the best bar code label to be used on soil
samples so it is still able to be read through different damaging environments. The data that has been previously presented
on correction levels 4,5 and 6 and was analyzed on 765 samples.
Problem
Determining whether symbology, error correction, location or a combination of the three affects the failure rate of the
barcode’s ability to be scanned.
Initial Data
SYMBOLOGY
ERROR
CORRECTION
LOCATION
TOTAL
ATTEMPT
TOTAL
PASS
TOTAL
FAIL
% PASS % FAIL
LABEL 1 QR CODE LOW FRONT 145 133 12 91.72% 8.28%
LABEL 2 QR CODE LOW SIDE 145 105 40 72.41% 27.59%
LABEL 3 QR CODE MEDIUM FRONT 150 141 9 94.00% 6.00%
LABEL 4 QR CODE MEDIUM SIDE 150 136 14 90.67% 9.33%
LABEL 5 QR CODE HIGH FRONT 140 123 17 87.86% 12.14%
LABEL 6 QR CODE HIGH SIDE 150 117 33 78.00% 22.00%
LABEL 7 PDF417 4 FRONT 150 145 5 96.67% 3.33%
LABEL 8 PDF417 4 SIDE 145 136 9 93.79% 6.21%
LABEL 9 PDF417 5 FRONT 145 145 0 100.00% 0.00%
LABEL 10 PDF417 5 SIDE 150 141 9 94.00% 6.00%
LABEL 11 PDF417 6 FRONT 140 140 0 100.00% 0.00%
LABEL 12 PDF417 6 SIDE 145 131 14 90.34% 9.66%
LABEL 13 DATA MATRIX NONE FRONT 145 130 15 89.66% 10.34%
LABEL 14 DATA MATRIX NONE SIDE 140 128 12 91.43% 8.57%
Procedures
 Null hypothesis
 The proportion of defects for each label is
equal.
 Alternate hypothesis
 At least one proportion is not equal to the rest of
the data.
 From the initial data, the chi-square test was used to
accept or reject the null hypothesis.
Chi-square test:
Chi-square (Observed value) 129.492
Chi-square (Critical value) 22.362
DF 13
p-value < 0.0001
alpha 0.05
 As the computed p-value is lower than the
significance level alpha=0.05, we rejected the null
hypothesis and accepted the alternative hypothesis.
 The Marascuillo procedure was performed to
compare each of the barcodes to one another.
 The p-values were contrasted and then compared to
the critical range to find out if there is a significant
difference in the proportion of failed scans to total
scans for each barcode.
 There were 91 different comparisons
performed, 9 of which showed significance.
p1 0.082759
p2 0.275862
p3 0.06
p4 0.093333
p5 0.121429
p6 0.22
p7 0.033333
p8 0.062069
p9 0
p10 0.06
p11 0
p12 0.096552
p13 0.103448
p14 0.085714
P-values
Conclusion
After performing the Marscuillo procedure, we found nine
different combinations of symbology, error correction, and
locations that are significant. These combinations each
show a higher proportions of defects. We can’t state that p2
and p6 are problematic independently, but when contrasted
with other variables, they seem to negatively affect the
barcode readability.
Contrast Value Critical value Significant
|p(p2) - p(p3)| 0.216 0.198 Yes
|p(p2) - p(p7)| 0.243 0.189 Yes
|p(p2) - p(p8)| 0.214 0.199 Yes
|p(p2) - p(p9)| 0.276 0.176 Yes
|p(p2) - p(p10)| 0.216 0.198 Yes
|p(p2) - p(p11)| 0.276 0.176 Yes
|p(p6) - p(p7)| 0.187 0.174 Yes
|p(p6) - p(p9)| 0.220 0.160 Yes
|p(p6) - p(p11)| 0.220 0.160 Yes
Significant Comparisons
QR Code PDF417 Data Matrix

Mais conteúdo relacionado

Semelhante a (Spring 2013) Analysis of Damaged Barcodes

6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final
6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final
6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final
Lawrence Hwang
 
An evaluation of computer based color vision deficiency test egypt as a stu...
An evaluation of computer based color vision deficiency test   egypt as a stu...An evaluation of computer based color vision deficiency test   egypt as a stu...
An evaluation of computer based color vision deficiency test egypt as a stu...
Aboul Ella Hassanien
 
Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031
Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031
Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031
Thermo Fisher Scientific
 
Summer 2015 Internship
Summer 2015 InternshipSummer 2015 Internship
Summer 2015 Internship
Taylor Martell
 
Genomica - Microarreglos de DNA
Genomica - Microarreglos de DNAGenomica - Microarreglos de DNA
Genomica - Microarreglos de DNA
Ulises Urzua
 
Cytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paper
Cytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paperCytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paper
Cytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paper
Andrea Ujvari
 

Semelhante a (Spring 2013) Analysis of Damaged Barcodes (20)

6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final
6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final
6-23-2015 AACC Poster HIV Incidence Assay - Stengelin_Final
 
An evaluation of computer based color vision deficiency test egypt as a stu...
An evaluation of computer based color vision deficiency test   egypt as a stu...An evaluation of computer based color vision deficiency test   egypt as a stu...
An evaluation of computer based color vision deficiency test egypt as a stu...
 
Hypothesis and Test
Hypothesis and TestHypothesis and Test
Hypothesis and Test
 
Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031
Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031
Limit of Detection of Rare Targets Using Digital PCR | ESHG 2015 Poster PS14.031
 
Mitigating genotyping application note
Mitigating genotyping application noteMitigating genotyping application note
Mitigating genotyping application note
 
Business Research Methods PPT - III
Business Research Methods PPT - IIIBusiness Research Methods PPT - III
Business Research Methods PPT - III
 
Deep learning methods applied to physicochemical and toxicological endpoints
Deep learning methods applied to physicochemical and toxicological endpointsDeep learning methods applied to physicochemical and toxicological endpoints
Deep learning methods applied to physicochemical and toxicological endpoints
 
Thesigntest
ThesigntestThesigntest
Thesigntest
 
Summer 2015 Internship
Summer 2015 InternshipSummer 2015 Internship
Summer 2015 Internship
 
Quantifiler® Trio kit and forensic samples management: a matter of degradation
Quantifiler® Trio kit and forensic samples management: a matter of degradationQuantifiler® Trio kit and forensic samples management: a matter of degradation
Quantifiler® Trio kit and forensic samples management: a matter of degradation
 
High Sensitivity Sanger Sequencing for Minor Variant Detection
High Sensitivity Sanger Sequencing for Minor Variant DetectionHigh Sensitivity Sanger Sequencing for Minor Variant Detection
High Sensitivity Sanger Sequencing for Minor Variant Detection
 
Genomica - Microarreglos de DNA
Genomica - Microarreglos de DNAGenomica - Microarreglos de DNA
Genomica - Microarreglos de DNA
 
Part 5 of RNA-seq for DE analysis: Detecting differential expression
Part 5 of RNA-seq for DE analysis: Detecting differential expressionPart 5 of RNA-seq for DE analysis: Detecting differential expression
Part 5 of RNA-seq for DE analysis: Detecting differential expression
 
Cytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paper
Cytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paperCytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paper
Cytoscan_Copy_Number_Confirmation_with_SYBR_Green_qPCR_white_paper
 
Test of hypotheses part ii
Test of hypotheses part iiTest of hypotheses part ii
Test of hypotheses part ii
 
FUNCTION OF RIVAL SIMILARITY IN A COGNITIVE DATA ANALYSIS
FUNCTION OF RIVAL SIMILARITY IN A COGNITIVE DATA ANALYSISFUNCTION OF RIVAL SIMILARITY IN A COGNITIVE DATA ANALYSIS
FUNCTION OF RIVAL SIMILARITY IN A COGNITIVE DATA ANALYSIS
 
The Effect of Genetic Algorithm Parameters Tuning for Route Optimization in T...
The Effect of Genetic Algorithm Parameters Tuning for Route Optimization in T...The Effect of Genetic Algorithm Parameters Tuning for Route Optimization in T...
The Effect of Genetic Algorithm Parameters Tuning for Route Optimization in T...
 
uses of statistics in experimental plant pathology
uses of statistics in experimental plant pathologyuses of statistics in experimental plant pathology
uses of statistics in experimental plant pathology
 
Data analysis in artificial intelligence
Data analysis in artificial intelligenceData analysis in artificial intelligence
Data analysis in artificial intelligence
 
Linearity cochran test
Linearity cochran testLinearity cochran test
Linearity cochran test
 

Mais de International Center for Biometric Research

Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
International Center for Biometric Research
 

Mais de International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

(Spring 2013) Analysis of Damaged Barcodes

  • 1. ANALYSIS OF DAMAGED BARCODES Jennifer Das, Steven Hostetler, Faisal Al-Khalidi, Christopher White, Michael Brockly, Mathias Sutton, Stephen Elliott Overview A study on the assessment of two-dimensional barcodes on soil sample bags was conducted by former graduate student Jodi M. Gessner. We used the data she collected to further investigate what is the best bar code label to be used on soil samples so it is still able to be read through different damaging environments. The data that has been previously presented on correction levels 4,5 and 6 and was analyzed on 765 samples. Problem Determining whether symbology, error correction, location or a combination of the three affects the failure rate of the barcode’s ability to be scanned. Initial Data SYMBOLOGY ERROR CORRECTION LOCATION TOTAL ATTEMPT TOTAL PASS TOTAL FAIL % PASS % FAIL LABEL 1 QR CODE LOW FRONT 145 133 12 91.72% 8.28% LABEL 2 QR CODE LOW SIDE 145 105 40 72.41% 27.59% LABEL 3 QR CODE MEDIUM FRONT 150 141 9 94.00% 6.00% LABEL 4 QR CODE MEDIUM SIDE 150 136 14 90.67% 9.33% LABEL 5 QR CODE HIGH FRONT 140 123 17 87.86% 12.14% LABEL 6 QR CODE HIGH SIDE 150 117 33 78.00% 22.00% LABEL 7 PDF417 4 FRONT 150 145 5 96.67% 3.33% LABEL 8 PDF417 4 SIDE 145 136 9 93.79% 6.21% LABEL 9 PDF417 5 FRONT 145 145 0 100.00% 0.00% LABEL 10 PDF417 5 SIDE 150 141 9 94.00% 6.00% LABEL 11 PDF417 6 FRONT 140 140 0 100.00% 0.00% LABEL 12 PDF417 6 SIDE 145 131 14 90.34% 9.66% LABEL 13 DATA MATRIX NONE FRONT 145 130 15 89.66% 10.34% LABEL 14 DATA MATRIX NONE SIDE 140 128 12 91.43% 8.57% Procedures  Null hypothesis  The proportion of defects for each label is equal.  Alternate hypothesis  At least one proportion is not equal to the rest of the data.  From the initial data, the chi-square test was used to accept or reject the null hypothesis. Chi-square test: Chi-square (Observed value) 129.492 Chi-square (Critical value) 22.362 DF 13 p-value < 0.0001 alpha 0.05  As the computed p-value is lower than the significance level alpha=0.05, we rejected the null hypothesis and accepted the alternative hypothesis.  The Marascuillo procedure was performed to compare each of the barcodes to one another.  The p-values were contrasted and then compared to the critical range to find out if there is a significant difference in the proportion of failed scans to total scans for each barcode.  There were 91 different comparisons performed, 9 of which showed significance. p1 0.082759 p2 0.275862 p3 0.06 p4 0.093333 p5 0.121429 p6 0.22 p7 0.033333 p8 0.062069 p9 0 p10 0.06 p11 0 p12 0.096552 p13 0.103448 p14 0.085714 P-values Conclusion After performing the Marscuillo procedure, we found nine different combinations of symbology, error correction, and locations that are significant. These combinations each show a higher proportions of defects. We can’t state that p2 and p6 are problematic independently, but when contrasted with other variables, they seem to negatively affect the barcode readability. Contrast Value Critical value Significant |p(p2) - p(p3)| 0.216 0.198 Yes |p(p2) - p(p7)| 0.243 0.189 Yes |p(p2) - p(p8)| 0.214 0.199 Yes |p(p2) - p(p9)| 0.276 0.176 Yes |p(p2) - p(p10)| 0.216 0.198 Yes |p(p2) - p(p11)| 0.276 0.176 Yes |p(p6) - p(p7)| 0.187 0.174 Yes |p(p6) - p(p9)| 0.220 0.160 Yes |p(p6) - p(p11)| 0.220 0.160 Yes Significant Comparisons QR Code PDF417 Data Matrix