<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of an algorithm for forecasting and preventing emergency situations in industrial traffic control systems based on data analysis of multi-code labels</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>A V Astafiev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A A Orlov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>T O Shardin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Vladimir State University</institution>
          ,
          <addr-line>Gorkij str. 87, Vladimir, Russia, 600000</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>214</fpage>
      <lpage>221</lpage>
      <abstract>
        <p>This article proposes a method for controlling the movement of industrial products based on data from multi-code labels using the algorithm for forecasting and preventing extraordinary situations. In the course of the work, possible extraordinary situations arising in the process of displacement were analyzed. Also on the basis of the developed algorithms, simulation modeling was carried out, according to the results of which it was shown the effective use of this method for controlling the movement of products in industrial enterprises.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        At present, for the identification of industrial products, product marking is mainly used with the help
of barcode [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] or radio frequency tags [7-10]. These solutions do allow you to shorten the time of
searching for a product on the territory of the enterprise, however, they are not without shortcomings,
since they are not able to forecast possible supernumerary situations.
      </p>
      <p>For example, when moving a load, the label is not always in the sensor's field of view, so that the
marking is not visible to the reader or person. Although it is worth noting that for security reasons,
people in such jobs are practically not involved. Also, the marking, during transport or movement on
the conveyor belt, may be poorly secured, as a result, it may fall off or fall onto another product.
Proceeding from this, it can be concluded that for reliable product identification, several markings on
one product should be used, the number of which can depend on the geometric parameters of the
object. To accurately control the location of products, you should use the algorithm for finding errors
in the occurrence of abnormal situations (for example: when several labels identify one label from
several possible ones), which will promptly make a decision to the operator and eliminate the
violation.</p>
      <p>The purpose of this work is the development of an algorithm for forecasting and preventing
emergency situations in traffic control systems for industrial products based on the analysis of data of
multi-code labels, during which it is necessary to perform the following tasks:
- conduct a comparative analysis of analogue systems;
- develop a simulation model of the process of moving products;
- to formulate freelance situations;
- develop an algorithm for forecasting and preventing extraordinary situations;
- carry out an experimental study using simulation tools.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Overview of analogues</title>
      <p>At the moment, to implement the goal, there are several similar solutions. We will perform a
comparative analysis of these analogs, as a result of which we can conclude which system is more
profitable to use in the future:</p>
      <p>1. VITRONIC - automatic recognition system is used to read barcodes in various industries. The
results of a comparative analysis of this system are given in Table 1:</p>
      <p>As a result of the comparative analysis of the presented analogs, it can be concluded that these
solutions are not entirely suitable for use, since they basically do not have an algorithm for forecasting
and preventing contingencies. In some cases, there is no support for multi-code reading, as a result of
which a significant amount of funds will be required for the development, which is unprofitable.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Development of a simulation model for the movement of industrial products</title>
      <p>At the enterprise every 100 ± 2s there are applications for receiving products. Then the products are
moved to storage racks. Processing of such applications takes 180 ± 2s. After the work can move to
the neighbouring shelves or the place of shipment. The processing takes 150 ± 2s and 160 ± 4s,
respectively. In the case of accepting applications for participation or the remaining applications do
not have time to process within a specified period of time, they are automatically lost. It is required to
simulate the work by moving industrial goods during one working shift. The scheme of this simulation
model is shown in Figure 1.</p>
      <p>It should be noted that during the operation of the simulation model, the following contingencies
may arise during the transportation of products, which must be taken into account:
1. Supernumerary situation 1 – during the movement of the product, the same marking is read.
2. Supernumerary situation 2 – in the process of identification, a non-existent marking fell into the
field of view of the reader.</p>
      <p>3. Supernumerary situation 3 – During the transfer to the product, the marking of another object, by
mechanical action (marking off) or deliberate action of personnel (intentional re-gluing of the
marking) fell on the product.
4. Development of an algorithm for forecasting and preventing emergency situations during the
movement of products
Consider the algorithm for predicting and preventing emergency situations by steps:</p>
      <p>1. When goods arrive at the place of reception, we fix the identified product markings, the time of
arrival, and its location.</p>
      <p>2. When moving, the time, the current location and location of the rack, to which the product
enters, is fixed.</p>
      <p>3. Receipt on the rack is the same as in paragraph 1 with the comparison of marks.</p>
      <p>4. Moving between the shelves and when entering the place of shipment occurs, in accordance with
paragraphs 1-3.</p>
      <p>5. If during the movement of the product from the storage areas the same marking is received in the
field of view of the reader, the system generates a warning for its verification, which corresponds to an
abnormal situation 1.</p>
      <p>6. If a non-existent marking has appeared in the field of view of the reader or from another product,
we generate a warning, which corresponds to abnormal situations 2, 3.</p>
      <p>The flowchart of the algorithm is shown in Figure 2:</p>
    </sec>
    <sec id="sec-4">
      <title>5. Experimental study with barcodes</title>
      <sec id="sec-4-1">
        <title>5.1. Description of the experiment</title>
        <p>Before the implementation of the algorithm and model, an experiment was conducted to collect all the
necessary input data.</p>
        <p>The experiment consisted of the following:
1. We took an object of a cylindrical shape, placed on it 4 barcodes. There can be several items,
since in real production when moving products with a crane or a conveyor belt, several products are
simultaneously received in the field of the reading sensor.</p>
        <p>2. With the help of any technical device that allows you to capture an image (for example: a mobile
phone camera or a camera), you took a few pictures, on which the products were imaged in different
positions (different positions are meant).</p>
        <p>3. On the basis of the collected images, a representative sample of the read barcodes was made and
all the data entered into the table.</p>
        <p>4. As a result of the collected information, the probability of identified markings was calculated,
which later allowed modeling and implementing the necessary algorithms:</p>
      </sec>
      <sec id="sec-4-2">
        <title>5.2. Image analysis</title>
        <p>During the experiment, 3 cylindrical objects were taken, on each of which 4 barcodes were attached.
For multi-code labeling, a Code-11 bar code was used, as shown in Figure 3:</p>
        <p>In order to get a more accurate result, you need to photograph as many different cases as possible.
The result is shown in Figure 4:</p>
        <p>As can be seen from Figure 4, with different positioning of the object, in most cases 1 or 2
barcodes are identified. It is worth noting that on some images, there were recognized 3 marks on one
product, but this result is extremely rare and can be neglected, since the label is practically not visible.
Based on the images received, a sample was taken, the results of which are summarized in Table 3:
Imag
e No.</p>
        <p>1
2
3
4
…
1597</p>
        <p>Pipe 1
Barcode number on the pipe
0000 0000 0000 0000
0001 0002 0003 0004</p>
        <p>1
1
1
…</p>
        <p>Unreco
gnized
barcod
es
1
0
0
2
…
1
1598
1599
1600</p>
        <p>According to the information presented in Table 3, you can find out the numeric data on the
recognition of only 1 barcode, 2 or more:
1
1
400</p>
        <p>1
320
1
2
1
1840
1840
280</p>
        <p>1720
Pipe 3
1020
580
0
1 barcode recognized
2 barcodes
recognized
3 or more barcodes
recognized</p>
        <p>As a result, from the presented tables it is possible to calculate the probability of barcode
identification on the product:
1. Probability of recognition of 1 barcode: 66,67%
2. The probability of recognizing 2 barcodes: 33.33%</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Experimental study with RFID technology</title>
      <sec id="sec-5-1">
        <title>6.1 Description of the experiment</title>
        <p>This experiment allowed us to determine the angle at which RFID readers should be installed for
optimal recognition for different forms of products.</p>
        <p>The experiment consisted of the following:
1. We took a cylindrical object.
2. Was pasted with RFID tags from different sides.
3. Next, the object was placed arbitrarily on a flat surface.</p>
        <p>4. Using RFID reader determined how many labels are considered at a certain angle, namely: at an
angle of 0 degrees, 45 degrees (vertical), and 45+45 degrees (vertical and horizontal), for two seconds.</p>
        <p>5. The obtained data were entered in tables for further plotting.</p>
      </sec>
      <sec id="sec-5-2">
        <title>6.2 Results of the experiment</title>
        <p>Figure 5 shows the process of reading RFID tags by the reader:</p>
        <p>The data of the read marks from the cylindrical object are shown in table 5:
№
1
2
3
4
5
…
97
98
99
100
1
2
3
4
5
..
97
98
99
100
1
2
3
4
5
…
97
98
99
100</p>
        <p>According to the information presented in table 5, you can find the average number of each read
mark, depending on the position of the RFID reader:</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>7. Results of the simulation model work</title>
      <p>Based on the scheme of the developed simulation model, presented in Figure 1, it can be seen that
each movement of the object is controlled by reading the markings with the help of the handler of
applications from the place of receipt of the product to its shipment. In this handler there is a
comparison of the markings and further decision-making on the output of messages in the event of
abnormal situations during transportation (Figure 6, 7):</p>
      <p>The figures show the work of the algorithm for predicting and preventing extraordinary situations.
For example, if you take the product number 21, then during the move it can be noticed that on arrival
in the rack 1 the reader identified only one marking (barcode number: 2055596). After receipt of the
product at the place of shipment, the same marking is observed, resulting in the generation of a
message and notification of a possible violation in the marking of the product for the purpose of
checking it. An example of a general simulation result report is shown in Figure 7:</p>
    </sec>
    <sec id="sec-7">
      <title>8. Conclusion</title>
      <p>On the basis of the work done, it can be concluded that when using several labels for product
identification, the probability of recognition increases, since regardless of positioning in any case, 1
mark will be visible to the reader. Based on the results of the input data, an imitation of the operating
model was developed using the algorithm for predicting and preventing extraordinary situations. The
results of simulation have shown effective use for business and implementation in the enterprise.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Parikh</surname>
            <given-names>D</given-names>
          </string-name>
          and
          <string-name>
            <surname>Jancke</surname>
            <given-names>G 2008</given-names>
          </string-name>
          <article-title>Localization and segmentation of a 2D high capacity color barcode</article-title>
          <source>Proceeding of IEEE Workshop on Applications of Computer Vision 1-6</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Astafiev</surname>
            <given-names>A V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orlov</surname>
            <given-names>A A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Popov D P 2017</surname>
          </string-name>
          <article-title>Development the algorithm of positioning industrial wares in-plant based on radio frequency identification for the products tracking systems</article-title>
          <source>CEUR Workshop Proceeding</source>
          <volume>1901</volume>
          <fpage>23</fpage>
          -
          <lpage>27</lpage>
          [3]
          <string-name>
            <surname>Astafiev</surname>
            <given-names>A V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orlov</surname>
            <given-names>A A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Privezencev D G 2016</surname>
          </string-name>
          <article-title>Method of controlling the movement of large metal products with the use of algorithms for localization and recognition of bar code markings Dynamics of Systems, Mechanisms</article-title>
          and Machines, Dynamics 7819046 DOI: 10.1109/Dynamics.
          <year>2016</year>
          .7818969 Orlov
          <string-name>
            <given-names>A A</given-names>
            ,
            <surname>Provotorov</surname>
          </string-name>
          <string-name>
            <surname>A V</surname>
          </string-name>
          and
          <article-title>Astafiev A V 2016 Methods and algorithms of automated twostage visual recognition of metal-rolling billets Automation</article-title>
          and
          <source>Remote Control</source>
          <volume>1099</volume>
          -1105 DOI: 10.1134/S000511791606014X Zhiznyakov A
          <string-name>
            <given-names>L</given-names>
            ,
            <surname>Privezentsev D G and Zakharov</surname>
          </string-name>
          <string-name>
            <surname>A A</surname>
          </string-name>
          <year>2015</year>
          <article-title>Using fractal features of digital images for the detection of surface defects Pattern Recognition</article-title>
          and
          <source>Image Analysis</source>
          <volume>25</volume>
          (
          <issue>1</issue>
          )
          <fpage>122</fpage>
          -
          <lpage>131</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Nhat D D 2015</surname>
          </string-name>
          <article-title>Researches and application of RFID technology (radio frequency identification</article-title>
          )
          <source>International Research Journal</source>
          <volume>5</volume>
          <fpage>34</fpage>
          -
          <lpage>37</lpage>
          Kamozin D
          <string-name>
            <surname>Y</surname>
          </string-name>
          <year>2013</year>
          <article-title>Comparison of the effectiveness of bar-code technology and RFID technology's application in logistics processes</article-title>
          <source>Bulletin of Baikal State University</source>
          <volume>3</volume>
          <fpage>71</fpage>
          -75
          <string-name>
            <surname>Kazanskiy N L and Popov S B 2012</surname>
          </string-name>
          <article-title>The distributed vision system of the registration of the railway train</article-title>
          <source>Computer Optics</source>
          <volume>36</volume>
          (
          <issue>3</issue>
          )
          <fpage>419</fpage>
          -428
          <string-name>
            <surname>Morozov</surname>
            <given-names>A A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sushkova O S 2016</surname>
          </string-name>
          <article-title>Analysis of real-time video images using the means of the</article-title>
          <source>Actor Prologue Computer Optics</source>
          <volume>40</volume>
          (
          <issue>6</issue>
          )
          <fpage>947</fpage>
          -
          <lpage>957</lpage>
          DOI: 10.18287 /
          <fpage>2412</fpage>
          -6179-2016-40-6-
          <fpage>947</fpage>
          -957
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Epifantsev B N</surname>
            , Pyatkov
            <given-names>A A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kopeikin</surname>
            <given-names>S A</given-names>
          </string-name>
          <year>2016</year>
          <article-title>Multisensory systems for monitoring restricted areas: the capabilities of a video analytics channel for intrusion detection</article-title>
          <source>Computer Optics</source>
          <volume>40</volume>
          (
          <issue>1</issue>
          )
          <fpage>121</fpage>
          -
          <lpage>129</lpage>
          DOI: 10.18287/
          <fpage>2412</fpage>
          -6179-2016-40-1-
          <fpage>121</fpage>
          -129
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>