93
IN DEGREE PROJECT MECHANICAL ENGINEERING, SECOND CYCLE, 30 CREDITS , STOCKHOLM SWEDEN 2018 Successful Digital Product identification JESPER SCHRÖDER MIKAEL WARWAS KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF INDUSTRIAL ENGINEERING AND MANAGEMENT

Successful Digital Product identification

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Successful Digital Product identification

IN DEGREE PROJECT MECHANICAL ENGINEERING,SECOND CYCLE, 30 CREDITS

, STOCKHOLM SWEDEN 2018

Successful Digital Product identification

JESPER SCHRÖDER

MIKAEL WARWAS

KTH ROYAL INSTITUTE OF TECHNOLOGYSCHOOL OF INDUSTRIAL ENGINEERING AND MANAGEMENT

Page 2: Successful Digital Product identification

Successful Digital Product identification

Jesper Schröder Mikael Warwas

27 June 2018

MG212X Master Thesis in Production Engineering KTH Industriell teknik och management

Industriell produktion SE-100 44 STOCKHOLM

Page 3: Successful Digital Product identification

i

Abstract The purpose of this master thesis project is to explore the different possibilities available today for Epiroc Rock Drills Tools AB to digitally identify their products, with primary focus on Down-The-Hole drill bits for blast drilling. This report provides a thorough investigation on currently available technologies that could be applied for digital product identification, a benchmark study of the strategies applied by other companies and in other business areas with similar goals and relatable conditions. Also, a review and survey on key performance indicators which could be connected to the product identification process to join data information to increase the potential value for both the customers and the company. Moreover, this project explores the challenges with implementation of such procedures. Based on theoretical research, the benchmarking study, practical learnings from an experimental test

as well as practical understanding and expertise from colleagues and suppliers, the following four

approaches have been identified as having the best feasibility for actual implementation, presented

in priority order from highest to lowest implementation possibility considering all factors:

1) Inserted tags into drill bits

2) Re-attachable tags

3) Printed data matrix labels

4) Surface inscription

A survey was conducted towards business line managers to identify customers current situation and

future needs. The responses revealed interest and motivation for this project.

A field test revealed that Xerafy Dot-iN XS tags placed in a top position of the bits had the best

survivability and chance for further developments of inserted tags into drill bits.

For future work the goal should be to find which approach that can best be implemented to the

entire product range. The best option for one product type might not be applicable for other product

types, therefore a combination of the presented approaches might be considerable to fit all

products.

Page 4: Successful Digital Product identification

ii

Sammanfattning Syftet med detta masterprojekt är att utforska de olika möjligheter som finns tillgängliga för Epiroc

Rock Drills Tools AB för att digitalt identifiera sina produkter, med primärt fokus på borrkronor för

Down-The-Hole för spränghålsborrning. Denna rapport ger en grundlig utredning av nuvarande

tillgänglig teknik som kan användas för digital produktidentifiering, en jämförelsestudie av strategier

som tillämpas av andra företag inom andra affärsområden med liknande mål och relaterade

förhållanden. Även en granskning av nyckeltal som kan kopplas till produktidentifieringsprocessen för

att ansluta datainformation som ökar det potentiella värdet för både kunder och företaget.

Dessutom utforskar projektet utmaningarna med genomförandet av sådana tillvägagångssätt.

Baserat på teoretisk forskning har jämförelsestudien, praktiska lärdomar från ett försöksprov samt

praktisk förståelse och kompetens hos kollegor och leverantörer, har följande fyra tillvägagångssätt

identifierats att ha de bästa möjligheterna för faktisk implementation, presenterat i pri oritetsordning

från högsta till lägsta möjliga implementationsmöjligheter med tanke på alla faktorer:

1) Infogade taggar i borrkronor

2) Avtagbara taggar

3) Utskrivna data matris etiketter

4) Yt-inskription

En undersökning genomfördes med frågeformulär gentemot företagsledare för att identifiera

kundernas nuvarande situation och framtida behov. Svaren gav intresse och motivation för detta

projekt.

Ett fälttest avslöjade att Xerafy Dot-iN XS-taggar placerade i ett övre läge i produkterna hade den

bästa överlevnaden och chansen för vidareutveckling av insatta taggar i borrkronor.

För framtida arbete bör målet vara att hitta den metod som bäst kan genomföras för hela

sortimentet. Det bästa alternativet för en produkttyp kanske inte är tillämpligt för andra

produkttyper. Därför kan en kombination av de presenterade metoderna vara betydande för att

passa alla produkter.

Page 5: Successful Digital Product identification

iii

Acknowledgements This master thesis would not have been possible without the knowledge, support and data received

from the team at Epiroc. Our supervisor of the company Fredrik Gabrielsson has helped us

tremendously to increase our understanding about the mining and rock excavation business as well

as keeping us up to date regarding similar projects conducted at Epiroc. His efforts and dedication

has helped us pinpoint the problem and to get the most out of this thesis.

On the academical part our KTH supervisor Per Johansson has at the same time with his excellent

advising guided us in the right way to produce a high-quality report and thesis project.

Also, big thank you for the commitment and input we received throughout the way from the team at

Epiroc including Alexander Beronius, Anders Carlsson, Anders Hjulström, Göran Stenberg, Joakim

Bergstrand, Johan Wessberg, Johan Zander, Niklas Jakobsson, Richad Johansson, Thomas Greijer,

Victoria Posazhennikova, Örjan Säker and other personnel contacted within the company.

Page 6: Successful Digital Product identification

iv

Abbreviations 3G Third Generation Wireless Systems 5G Fi fth Generation Wireless Systems

AI Arti ficial Intelligence

AIDC Automatic Identification and Data Capture ANN Arti ficial Neural Network

API Appl ication Programming Interface

ATEX Atmosphères Explosibles

BLE Bluetooth Low Energy CEPT European Conference of Postal and Telecommunications Administrations

DTH Down-The-Hole

EASA European Aviation Safety Agency ECC Electronic Communications Committee

EIRP Effective Radiated Power E-ki t Economy-kit (Equipment surrounding the bits)

EPC Electronic Product Code

ERC European Radiocommunications Commitee ETSI European Telecommunications Standards Institute

GSM Global System for Mobile communications

GUI General User Interface HF High Frequency

ID Identification

IEC International Electrotechnical Commission

IOT Internet Of Things IP Ingress Protection rating

ISM Industrial, Scientific and Medical

ISO International Organization for Standardization KPI Key Performance Indicators

LF Low Frequency

mAh Mi l liampere-hours

MIL-STD-810 Mi l i tary Standard MMI Mobi le Machine Integration

MWD Measure While Drilling

NFC Near field communication OCR Optica l Character recognition

PED Portable Electronic Devices POC Proof Of Concept

QR-code Quick Response Code

R&D Research and Development RCS Rig Control System

RFID Radio Frequency Identification RGB Red, Green, Blue

RoHS Restriction of Hazardous Substances ROI Return On Investment ROT Rotary dri lling tools

RPM Revolutions Per Minute RPN Risk Priority Number

THE Tophammer drilling tools

UHF Ultra -High Frequency UPC Universal Product Code

UWB Ultra -wideband

VBA Visual Basic for Applications

Wi-Fi Wireless Fidelity

Page 7: Successful Digital Product identification

v

Contents 1 Introduction ............................................................................................................................... 1

1.1 Background ......................................................................................................................... 1

1.2 Problem description............................................................................................................. 2

1.3 Mission ............................................................................................................................... 2

1.4 Limitations and delimitations................................................................................................ 3

1.5 Method ............................................................................................................................... 3

2 Current frameworks ................................................................................................................... 5

3 Internet of Things ....................................................................................................................... 6

3.1 Industry 4.0 ......................................................................................................................... 6

3.2 Predicted IOT value for Epiroc .............................................................................................. 7

3.3 Regulations ......................................................................................................................... 8

4 Performance monitoring............................................................................................................10

4.1 Certiq .................................................................................................................................10

4.2 Advanced analytics .............................................................................................................11

4.3 Data classification & mining.................................................................................................11

5 Available technologies ...............................................................................................................13

5.1. RFID ..................................................................................................................................13

5.2 NFC ....................................................................................................................................15

5.3 Bluetooth and BLE ..............................................................................................................15

5.4 Matrix barcode ...................................................................................................................16

5.5 Optical character recognition ..............................................................................................18

5.6 Wi-Fi ..................................................................................................................................18

5.7 Ultra-wideband...................................................................................................................19

6 Standards..................................................................................................................................20

7 Benchmarking technologies .......................................................................................................22

7.1 RFID ...................................................................................................................................22

7.2 NFC ....................................................................................................................................23

7.3 Bluetooth ...........................................................................................................................23

7.4 QR .....................................................................................................................................24

7.5 UWB ..................................................................................................................................24

7.6 Wi-Fi ..................................................................................................................................24

8 Positioning ................................................................................................................................25

9 Available products .....................................................................................................................26

9.1 Tags ...................................................................................................................................26

9.2 Printers ..............................................................................................................................29

Page 8: Successful Digital Product identification

vi

9.3 Reading possibilities............................................................................................................30

9.4 Reading methods compared ................................................................................................32

10 Model structures for digital product identification.....................................................................33

10.1 Adhesive labels .................................................................................................................33

10.2 Re-attachable tags ............................................................................................................34

10.3 Inserted tags and surface inscription ..................................................................................36

10.4 Architecture for KPIs and APIs............................................................................................38

10.5 Data Collection model .......................................................................................................39

11. Design of Experiment ..............................................................................................................41

12 Survey outcomes .....................................................................................................................46

13 Flow and model assessment.....................................................................................................55

14. Discussion and conclusion .......................................................................................................58

14.1 Discussion ........................................................................................................................58

14.2 Conclusion ........................................................................................................................61

14.3 Future work ......................................................................................................................62

References...................................................................................................................................64

Appendix .....................................................................................................................................70

1 Tag comparison .....................................................................................................................70

2 Matrix barcode developed .....................................................................................................71

3 Survey...................................................................................................................................75

4. Specification of damping material..........................................................................................81

Page 9: Successful Digital Product identification

1

1 Introduction This chapter is an introduction of the master thesis which has been conducted. Furthermore, the

chapter includes a background, problem description, mission, limitations and method section of the

project.

1.1 Background As Internet of Things (IOT) is entering the industry, businesses compete to accomplish fully

connected product portfolios. The latest trend with increased focus on digitalization of industrial

processes has shown evident benefits to operation efficiency. As competition becomes global so

does the demands. Mining and rock excavation businesses compete and many advertise themselves

upon productivity deliverables.

Epiroc Drilling Tools AB, previously Atlas Copco Secoroc AB, is a company within the Epiroc group

that manufactures and distributes equipment for the mining and construction industry. (Epiroc

2018):

"Epiroc is a leading productivity partner for the mining, infrastructure and natural resources

industries. With cutting-edge technology, Epiroc develops and produces innovative drill rigs, rock

excavation and construction equipment, and provides world-class service and consumables. The

company was founded in Stockholm, Sweden, and has passionate people supporting and

collaborating with customers in more than 150 countries."

Much unlike other sectors, there are particular challenges in mining and rock excavation as the

extreme working environments are problematic for any electronic equipment as they are subjects to

intense vibrations, moist, corrosion, magnetic fields, friction and loss of connectivity to the outside

world. However, those who could successfully achieve smart and connected products would

experience significant advantages as customers can track and respond to real -time working

conditions and product characteristics. Moreover, suppliers would be able to map and predict usage

of their products, allowing precise forecasts for manufacturing and logistics as well as valuable

information for sales and product development. Mining equipment available today is capable of

collecting and providing information regarding drilling parameters such as hole depth, pressure and

time. Any knowledge regarding which tools have been used at what time, their individual

performance to the drilling processes as well as service intervals and other valuable information is

today merely documented with pen and paper which is a time-consuming approach and has a lot of

room for error. An improved method for this should be highly desirable.

The production units in many companies have nowadays a good knowledge and traceability of their

products when they are produced, due to the controlled environment and the closed system which

include few parties. However, when the products pass to the customers, they are more difficult to

trace and evaluate. If detailed monitoring of products throughout the whole life cycle would be

possible and made in an easy and reliable way, the information could be very significant for future

developments of the products, manufacturing, logistics and after-market.

Automatization has in the latest years changed the production industry although in order to help

development, further digitalization is a fundamental part. The combination of automatization and

digitalization is crucial in tomorrow's industry and it will be important for new developing

technologies and tools to be used throughout the whole lifespan of the products. Moreover,

automatic identification and data capture (AIDC) is a common term when designing new improved IT

structure where the purpose is to gather information which will drive further innovation for

Page 10: Successful Digital Product identification

2

companies (Smith & Offodile 2002). This can include everything from managing quality and inventory

levels to development of new improved products from the understanding of the current situation.

Therefore, this project will investigate how better understanding of product related data can be

achieved from the consumers side and how it can prove beneficial for all involved stakeholders.

1.2 Problem description Epiroc drilling tools AB is a leading developer and producer of mining equipment and services. A

recent desire has emerged within the company to digitalize the company's product range. This

master thesis aims to discover the different possibilities and challenges of digitalization and what

value can be created from it for both customers and company. Furthermore, to identify performance

indicators which could be connected to the product identification and develop a data collection

architecture. The product identification part includes some form of tagging of the products to

increase the traceability. The task is especially problematic since the broad product range has an

extensive amount of design variations and the products themselves are subjects to extreme

environments during usage. The utmost challenging obstacle is the immense shock force carried out

on the drill bits during operation, often reaching up to 2 MN as plotted in figure 1.

Figure 1. Forces developed at the front of the drill bit. Negative forces represent compression and

positive forces represent expansion.

1.3 Mission The mission of the project is to find out methods to identify data needed for Epiroc AB and to make

suggestions on how to retrieve it. Moreover, approaches in other areas and of other companies are

explored to provide a view on how identification of products can be performed, what data is

collected and how this data can be beneficial. The project can be determined by five phases listed

below.

1. Investigate the procedures of other companies with similar goals.

2. Propose a method for tool identification.

3. Identify project value for stakeholders.

4. Identify required data to understand product performance.

5. Propose an application for data presentation and interpretation.

Page 11: Successful Digital Product identification

3

To improve the user experience, it is important to adapt the product data to different stakeholders.

In this project the stakeholders are divided into four different categories due to the variety of

information they require. These groups of stakeholders are:

• Clients (high resolution of critical consumer data)

• Marketing and Sales (low resolution of overall data)

• R&D (high resolution of overall performance data)

• Logistics division (high resolution of product transparency data)

The resulting suggested method need a high acceptance level by operators to ensure correct usage.

Since the operator and the customer may not have the same objective, the method should be

designed for minimum amount of extra manual work for operators, and preferably value adding for

the operator as well.

1.4 Limitations and delimitations

The project aims to find a method and develop a fully working model of digitally identifying products

from the time when the products have been produced throughout their whole lifetime. The focus of

the project is primarily aimed towards drill bits for blast hole drilling in order to find a viable solution

for the most challenging and valuable scenarios. Therefore, the project limits to investigate the

possibility of automatic identification of down-the-hole (DTH) drilling bits. Since this may be the

hardest product line to find a feasible solution for, the chosen method should be feasible for the

major part of the product range.

The most suitable method should be selected based on the following criterions:

1. It must have a reasonable ROI and not be too expensive to implement in initial investments.

2. It must not be too expensive in terms of purchasing, manufacturing or operational costs.

3. It must withstand the extreme environments that the products are likely to suffer

throughout their lifecycles. These include: extreme vibrations, water, dust, heat, cold,

corrosion, scratches, magnetism, radioactivity and blasting.

4. It should ideally be applicable to as many of the products offered in the product range as

possible.

5. It must not be complicated or excessively time consuming for operators to use at site.

1.5 Method In order to investigate the different possibilities of successful digital product identification, the initial

focus was on understanding different ways of identifying products in different applications and

different industries and how these create value there.

A literature study was conducted to investigate different approaches and technologies which have

been used by other companies for digital identification. This market study serves as basis for

choosing a feasible identification solution. For those methods requiring acquisition of additional

parts, suppliers were contacted and their products were compared in order to ensure that the best

equipment would be provided for the project.

Expectations on the benefits from digitally identifying drill bits were explored. A survey was

constructed to acquire information and to explore the potential benefits further. The survey was first

sent to a smaller test group to ensure good quality in questions and answers before sending the

survey to the business line managers. Currently measured parameters were mapped and provided in

the same survey to review how today's measurements are managed.

Page 12: Successful Digital Product identification

4

Different approaches to implement the chosen model were considered. Since data frequency, data

flow and physical fitting were important aspects to accomplish, a proof of concept was made outside

Fagersta with real rig testing on one of chosen models and thereafter evaluated.

The general method of the project, which describes how the three different problem areas are

connected are explained in figure 2. The three circles, automatic identification, data capture and key

performance indicators are three independent sub-methods which are based on each other and

processed throughout the project. The project was initiated and progressed in two areas

simultaneously as indicated by figure 2.

Figure 2. The method of the project.

The first steps, marked in figure 2 with number 1, were to explore available technologies, methods

and to identify stakeholders which could be affected and benefited from any changes. Stakeholders

and key performance indicators are quite similar between different technologies. However,

differences occur in the amount of data possible to gather and the data frequency depending on the

level of automation in the technology.

After different identification technologies were investigated, evaluated and suggested, methods for

data capturing were explored to understand the approaches on a higher level. Thereafter, model and

connectivity could be decided for a final flow assessment. The flow assessment was based on all

building blocks in the figure 2 and analyzes the final concept before implementation. Thereafter,

model and connectivity could be decided in order to do the finally flow test.

This flow assessment is mostly theoretical and/or based on the field test so that the suggested model

structure could be assessed before building a system to reveal its positive and negative

consequences.

Due to this general method several types of models are introduced and suggested in this thesis to

fulfil implementation possibilities for the different needs of different products. Furthermore, if one

model will be dismissed because cost, manufacturing possibilities or other restrictions, the other

models still have chance to be applicable.

Page 13: Successful Digital Product identification

5

2 Current frameworks Products that are manufactured in the Epiroc plant in Fagersta are today attached with a barcode

sticker and in some cases with a punched serial code. These labels are utilized for supply chain

reasons to keep track of inventory and shipments and are discarded or ignored when the products

reach their final customers. Many customers are then using their own drilling data templates to

record drilling information manually, often with pen and paper at site before importing the

information from the sheets to a database later on.

A previous project developed together with ABB called Mobile Machine Integration (MMI) has

brought a system to monitor production and maintenance data. As machines operate they now have

the ability to collect and transmit data over Wi-Fi access points or pick-up points to a server that

analyses and provides relevant information to control room centers. For optimal utilization MMI

should be used on machines equipped with Rig Control System (RCS). The information collected by

the RCS rigs today includes for instance percussion pressures, feed pressures, penetration rates,

temperatures, drilling time, number of holes, total depth and the amount of time spent on different

drilling phases amongst other measurements (Atlas Copco 2014).

The intention is that customers will be able to access this information on a global level by simply

logging onto a web application. A number of services are available for customers to globally monitor

site operations and quickly receive detailed information regarding all drilling parameters. Surface

Manager, Rock Manager, Exploration Manager, Certiq and advanced analytics have been developed

to not only show the raw data, but also to compute the data to be presented and visualized in an

intuitive and practical form. By monitoring real-time information about the location of the machines

and each drilling process, operators, supervisors and managers can take direct actions to ensure the

highest efficiency of a mining operation.

A recently identified desire has been to receive more information to enable monitoring of

parameters related to the drill bits and other consumables. The current framework for monitoring of

drill bits and other consumables involves manual recording by typing or no recording at all.

In a previous project called MR Consumable Management 1 a pre-study was conducted to investigate

the current patent landscape in order to avoid any possible intrusions. Many patent claims regarding

oil field equipment were in risk to be infringed however according to the U.S attorney it was not a

problem if some of the parameters were changed. This project was given freedom to operate on that

basis.

An experiment was conducted in Consumable Management 1 with 3 robust RFID tags of the type

Xerafy Explorer which were placed into a drill bit, to test survivability during operations. According to

the results the first tag broke after 8 minutes of testing, the second tag was lost and the third tag was

still operational after 80 minutes of percussion drilling. A similar project called SmartBit was also

conducted and showed negative results.

Another project initiated at Epiroc is SMART Consignment which involves RFID tagging of the product

segment. Tagging of drill bits are desired as well although excluded from SMART Consignment due to

the challenges to tag drill bits.

Page 14: Successful Digital Product identification

6

3 Internet of Things As technology has advanced, means of communication has gradually moved from person-to-person

communication, to person-to-machine communication and now the latest direction of market

entering machine-to-machine communication, in other words, communication between things

(Measuring the Information Society Report 2005).

The international telecommunication union has provided the following explanation of Internet of

Things (IOT): "A global infrastructure for the information society, enabling advanced services by

interconnecting (physical and virtual) things based on existing and evolving interoperable information

and communication technologies."(International Telecommunication Union 2012).

This implies that our previously static objects progressively become connected to each other. Smart

homes and smart factories have successfully been transformed in the last decades which has made

our environment safer and more user friendly. For the industry this means great new opportunities

and further possibilities to introduce Industry 4.0. However, in the big picture, there are some

important steps to develop considering the varying stages in the products lifecycle. Many things can

be considerably difficult to connect because of product dimensions, properties and working

environment.

The values underlined in chapter 3.2 Predicted IOT value for Epiroc are assessments of possible

benefits for different parties achieved from digitally connecting drilling equipment.

3.1 Industry 4.0 In today's industrial appliances it is common to use digital representation of components, equipment

and systems. As computers however become more capable of storing and handling large amounts of

data and manufacturing systems evolve ability to communicate directly with each other, production

systems will in the future have real-time cyber-physical representations.

Industry 4.0 involves the introduction of a decentralized manufacturing process where products

communicate with the rest of the factory. Fully linked data and computers with decision-making

capabilities at every step in the production system could coordinate processes and provide quick

adjustments in order to operate at optimal efficiency (MacDougall 2013).

Since Artificial Intelligence (AI) will without doubt play a major role in Industry 4.0 it will probably not

only optimize production in terms of reliability and lean manufacturing but it is also likely to

unexpectedly discover new techniques (Deloitte 2015). Similarly, the same will likely occur in other

areas. A drill rig might be comparable with a factory since many systems work together. AI and the

repercussions of Industry 4.0 will undoubtedly provide helpful support and instant decision -making

functions to enhance productivity and product development.

Page 15: Successful Digital Product identification

7

3.2 Predicted IOT value for Epiroc Before a thorough investigation is conducted, the below statements were speculated as potential

benefits that could be earned from this project. These statements would then be brought up to

stimulate discussions with collogues and to serve as a basis for the survey.

Epiroc's customers should likely benefit from digitally connected products in the following ways.

♦ Traceability – Knowing what part has been used by which machine and in what operation.

♦ Hole diameter – The diameter of drilled holes depends on the outer diameter of used drill

bits to that specific hole.

♦ Rig adjustments – By automatically knowing the mounted drill bit, the rig can adjust its

drilling parameters accordingly for optimal usage.

♦ Upcoming service – Time for upcoming service occasion of a specific drill bit can be

approximated and optimized based on penetration speed, force, pressure and rock type.

♦ Service interval – Knowing service interval of drill bits is a productivity indicator. If the drill bit

is serviced much too often the customer might be using it wrong.

♦ Receive better feedback on product usage – Instructions for suggested drill bit usage could

easily be obtained from scanning the drill bit.

♦ Inventory management – Quick and easy identification of products on site will be a helpful

tool when managing inventory.

♦ Tool selecting assistance – If the team on site is uncertain of which drill bit to use in what

material, a built-in application can help select the correct bit. For instance, a warning

message can popup informing that the drill bit installed is not intended to be used for the

next rock type.

R&D should likely benefit from digitally connected products in the following ways.

♦ Customer usage information - Productivity at different sites/rock types/temperatures could

be useful for future optimization in equipment selection and product development.

Marketing and Sales should likely benefit from digitally connected products in the following ways.

♦ Sales forecasts – Knowing what tools are being used by what customer, when and where.

This would give valuable information for sales forecasts.

♦ Customer productivity – If one customer discards alarmingly many parts they might be using

the equipment inaccurately. Corrective assistance is probably a good selling point.

♦ Traceability – Parts from the same batch can be traced to investigate and prevent

malfunctions. Received feedback on failing batches can trace errors.

♦ Easier logistics – Customer and delivery information can be connected with product.

Page 16: Successful Digital Product identification

8

3.3 Regulations Regulations regarding Radio frequency identification (RFID) frequencies are mainly applied to

readers, UHF RFID active tags and in some specific cases passive tags if used in for example

hazardous environments. As seen in figure 3, the allowed frequencies vary significantly depending on

specific country regulations (Smiley 2014).

Moreover, other regulations can occur regarding specifically UHF RFID readers. For example, in the

European Union the maximum period of continuous transmission is 4 seconds and the transmission

power is limited to 2 watts. This is however an issue that will be dealt by the local operations since

they manage ordering of their own equipment (RFID4U 2018).

Figure 3. Map over UHF RFID regulation (RFID4U 2018).

As regulations are very country specific, this project focuses on Epiroc's four largest market which are

South Africa, Canada, Europe and Australia. The only concern then is the regional acceptance of 866

MHz-868 MHz (South Africa, Europe) and 902 MHz-928 MHz (South Africa, Canada, Australia).

However, passive tags are not the issue here since the regulations only target the readers.

Industrial, scientific and medical (ISM) equipment which transmit energy are by international

standard permitted to operate at the defined frequencies shown in table 1.

Frequency ranges

Regulation Application

125 kHz ISO/IEC 18000-2:2009 , 2006/771/EG 2013/752/EU LF, medical and inductive equipment 13,55 – 13,56 MHz ISM, ISO/IEC 18000-3:2010, 2006/771/EG 2013/752/EU HF NFC, inductive devices

866 – 868 MHz ISM, ISO/IEC 18000-6:2013, regional acceptance,

2006/771/EG 2013/752/EU

UHF RFID

902 – 928 MHz ISM, ISO/IEC 18000-6:2013, regional acceptance, UHF RFID 2,4 – 2,5 GHz ISM, 2006/771/EG 2013/752/EU Bluetooth, Wi-Fi 3,1 – 4,8 GHz ECC Rec 70-03/ ECC Decision 06(04) ETSI EN 302065 UWB

5,725 – 5,875 GHz ISM, 2006/771/EG 2013/752/EU Wi-Fi 6,0 – 8,5 GHz ETSI EN 302065, 2006/771/EG 2013/752/EU UWB 8,5 – 10,6 GHz ETSI EN 302065, 2006/771/EG 2013/752/EU UWB

*With special authorization.

Table 1. (European Commission 2013; European Radiocommunications Committee (ERC) & European

Conference of Postal and Telecommunications Administrations (CEPT) 2000; Morrison 2011) .

Page 17: Successful Digital Product identification

9

When it comes to regulations of UWB, most countries allow transmission the ranges 3,1-4,8GHz,

6GHz-8,5GHz and 8,5GHz-9GHz except for a few countries (Decawave Ltd. 2015; Madjar 2014; Marc

2007).

For passenger carried portable electronic devices, (PED), on commercial airlines, it is up to each

airline to determine their rules. Since 2014, EASA has decided that all PEDs are allowed on aircrafts

regardless if they are transmitting or not. Each airline has therefore responsibil ity themselves to

verify that none of their components may be disrupted from PEDs and set their own rules accordingly

(Easa Europa 2018).

No specific regulations have been found on PEDs in non-passenger cargo transfer, although based on

the above, it can be presumed that the same rules apply to shipping firms.

According to ETSI EN 302 065-5 V1.1.1 (2017-09), UWB is limited to maximum EIRP spectral density,

where the density depends on the altitude 'x' of the aircraft as table 2 shows.

Table 2. Limitations to UWB EIRP in aircrafts (ETSI 2017). [ETSI EN 302 065-5 V1.1.1 (2017-09)]

Page 18: Successful Digital Product identification

10

4 Performance monitoring To increase the efficiency of mining operations, a solid understanding of the equipment is essential.

In this chapter the currently monitored key performance indicators (KPI) are identified for different

types of drilling methods. Furthermore, there is a fine line between those parameters which are

monitored today, those parameters which the system can report but does not and those parameters

which are desired but not yet available. The thoughts and expectations of KPIs depends on the role of

whoever handles the data. Therefore, stakeholders where categorized into different groups which

received variations of a survey so that relevant information would be discussed.

The survey distributed can be viewed in appendix 3.

The focus, which is also stated in the limitation, is on the DTH drill bits, although in order to consider

any differences and data model complexity between the divisions, this chapter also identifies the

required parameters for THE (Tophammer drilling tools) and ROT (Rotary drilling tools) drilling.

4.1 Certiq Table 3 shows the currently logged KPIs extracted from the Certiq interface. Certiq is a telematic

solution made to increase the connectivity with the machines.

Site Average tonnes per box

Type Utilization %

Machine model Utilization hours

Machines Engine hours per day

Date Accumulated engine hours

Drill meters Pump hours per day Accumulated drill meters Compressor hours per day

Drill hours per engine hours Drill hours per day

Drill speed Accumulated drill hours

Drill meters per engine hour Transmission hours

Drilled holes Accumulated transmission hours

Total tonnes Fuel consumption

Accumulated total tonnes Accumulated fuel consumption

Loaded travel distance Fuel consumption per hour

Average tonnes per engine hour CO2 emissions

Average tonnes km per engine hour Accumulated CO2 emissions

Number of buckets Fuel consumption per drilled meter

Accumulated number of buckets Fuel consumption per tonnes

Average buckets per engine hour Pre-maintenance warning for engine

Average tonnes per bucket Pre-maintenance warning for impact unit Number of boxes Acknowledged services

Accumulated number of boxes Number of alarms

Average boxes per engine hour Alarm type trending

Table 3. Currently logged site parameters transferred to Certiq.

Page 19: Successful Digital Product identification

11

4.2 Advanced analytics Table 4 shown below presents the currently logged KPIs extracted from a measuring while drilling

(MWD) advanced analytics interface. The advanced analytics project is however only a

demonstration of how data could be classified and presented in the future and is not used today.

Hole # Depth

Rod # Time

Penetration rate Percussion pressure

Feed pressure Feed force

Flush air pressure

Flush air flow Rotation pressure

Rotation speed Rotation torque

Dampening pressure

Table 4. Currently logged site parameters in drill rigs equipped with RCS. This MWD data is then used

by the advanced analytics tool.

4.3 Data classification & mining The data received from performance monitoring could in different ways be classified to find patterns

to describe more of the current situation in the mining procedure. One part of the advanced

analytics is engineered to understand the different stages that the drilling rig might encounter. This is

found by the help of tools such as ANN, fuzzy logic or random forest machine learning as a mapping

method. The results can be divided in the stages collaring, drilling, rod change, air fill -up and delay as

seen in the example figure 4 below. Figure 4 shows how the stages can be interpreted from variables

like depth, penetration rate, feed pressure and percussion pressure.

Figure 4. Currently logged site parameters.

Random forest machine learning uses several decision trees which will result in different

classification of the data. The majority of the chosen decisions from the decision trees is chosen to be

Co

lla

rin

g

Dri

llin

g

Ro

d c

ha

nge

Air

fil

lup

Dri

llin

g

Dri

llin

g

Depth

Penetration rate

Feed pressure

Percussion pressure

De

lay

Air

fil

lup

Duration

Ho

le d

ep

th

Page 20: Successful Digital Product identification

12

the final decision. For example, if there are four decision trees and one decision tree classify the

stage of being drilling, another being delay and the last two of being rod change, the result of the

algorithmic pattern will then predict that the actual stage is rod change. This method is highly

dependable of training data (Hastie et al. 2009).

The method described above could in theory also be used to investigate the optimal time to service a

drill bit depending on different usage situations. The factors which then could be of interest are for

example flush pressure and penetration rate. If the rig could do a real -time prediction of remaining

time to service, the operators could predict how many bits they need to use for one day of

operation. This could serve as a helpful tool to increase productivity.

Page 21: Successful Digital Product identification

13

5 Available technologies For finding the best method of digital product identification, characteristics of different technologies

and methods that can be suitable for identification were investigated.

5.1. RFID Radio frequency identification is a technology that is today widely used in for example keycards,

congestion charge transponders, commodity labeling and much more with further potential in the

future as the technology and the materials behind the technology are becoming cheaper (Sempler

2005).

RFID tags can be divided into passive or active RFID based on how the operating mechanism

performs. Active RFID requires a connected power source in order to transmit information to a

reader device while passive RFID does not require any directly connected power source, instead the

passive RFID tags are powered by a nearby reading device through either electromagnetism or

induction, further dividing passive RFID into near-field or far-field units. The components which make

up a passive RFID tag consists of an antenna, a semiconductor chip and casing. Since the passive RFID

does not require an attached battery it does not need maintenance or battery change, thereby

prolonging its operational lifespan significantly while an active RFID is limited to the status of its

battery. The elimination of batteries in passive RFID tags also makes them much cheaper and

consequently more common than active RFID tags (Asif & Mandviwalla 2005).

Faradays law of electromagnetic induction states that a coil can receive a time-varying electric

current from the time-varying electric field produced by another nearby coil without physical

connection between the two coils (Johansson 2013). Near-field RFID devices work by utilizing this law

by having the reader and the tag act as two coils in order to power the tag chip, making it able to

transmit a signal back to the reader coil with load modulation as the reader coil records changes in

the magnetic field, seen in figure 5. In short, a near field RFID creates disturbances in the magnetic

field of the reader, which the reader records and decodes (Want 2006).

The main drawback of near-field RFID is however, as its description gives away, the physical range of

its communication capabilities since magnetic fields decrease over the distance r at a rate of 1/r^3.

Additionally, the strength of magnetic fields decreases as frequency increases. This makes the near-

field RFID limited to the scanning distance and the power capacity of the reading device as well as

the sensitivity of the reading device (Want 2006).

Figure 5. Near field HF RFID with load modulation mechanism.

In contrast to the near-field RFID, far-field RFID uses back scattering instead of load modulation

which allows the RFID tag to be read at a further distance from the reader. A reading device is in this

Page 22: Successful Digital Product identification

14

case attached with an antenna that variates its dipoles charges at both ends. The RFID tag is attached

with a smaller antenna which absorbs these variations and uses the differences in polarity to charge

a capacitor with power. The small antenna reflects some of the electromagnetic field as impedance

which the reading device can register. Adjustments can be made to the RFID tag to change the

frequency of the impedance reflected back which the reader can upon registration interpret

numerically into the programmed information (Want 2006). An illustration of this mechanism is

shown in figure 6.

Figure 6. Far field UHF RFID with backscattering mechanism.

RFID tags can handle information as read-only or read-write modules. The code format most

commonly used today is 96-bit EPC code where 8 bits are allocated to the electronic product code

(EPC) version, 28 bits to manufacturer identification, 24 bits to product identification and 36 b its to

item number. This gives tag ability to be identifiable for 16 million unique products and 68 billion

unique parts (Asif & Mandviwalla 2005).

RFID transmitters in presence of metals and liquids will suffer in performance as these interfere with

radio waves. High-frequency radio waves are more interfered by metals and liquids than low-

frequency radio waves, making low-frequency RFID tags more effective in proximity of metals and

liquids than high-frequency RFID tags (Asif & Mandviwalla 2005). However, by strategically placing

the tag between a reader and a metal source, the metal can act as a mirror to reflect some of the

radio waves, and thus enhancing the tag performance (Mitchell 2013).

RFID tags come in three different types which operate at the frequency spans: low frequencies (LF)

125-134 kHz, high frequencies (HF) 13,56 MHz and ultra-high frequencies (UHF) 860-960 MHz (RFID

Journal 2018).

RFID readers can recognize signals at frequencies between about 100 kHz to 5.8 GHz (Asif and

Mandviwalla, 2005). RFID readers in Europe are however limited to fifteen 200 kHz wide channels by

European radio regulations. This limitation in bandwidth might be problematic when scanning large

amount of RFID tags in close proximity as some distribution centers might (Floerkemeier & Lampe

2005).

The properties of RFID tags come with many variations depending on the manufacturer. Low-

frequency RFID tags need larger antennas which means larger and generally more expensive tags,

while high-frequency RFID tags can be made smaller and cheaper although require more expensive

reading devices (Li et al. 2006).

Page 23: Successful Digital Product identification

15

5.2 NFC Near field communication (NFC) was developed by Sony and Philips as a further development on

RFID-technology. It uses the same mechanism to power its electrical components in active or passive

mode for communication at the unlicensed frequency 13,56 MHz with speeds up to 848 Kbit/s at

distances under 20 cm (Curran et al. 2012).

Unlike RFID, NFC devices could change its operation procedure between read/write, peer-to-peer

and tag emulation. In read/write mode, an NFC device will work as a reader to read NFC tags that

transmit certain information just like a RFID reading device. Moreover, the NFC device has ability to

write onto an NCF tag to modify its content. In peer-to-peer mode NFC devices can establish

communication with each other to send information both ways. For example, pictures or music files

can be sent between two cellphones with NFC capabilities by holding them close to each other. In tag

emulation mode an NFC device can act as a tag to store and transmit data upon request. This mode is

for example used in smart cards to provide access or electronic payment in ticketing systems (Al-

ofeishat & Rababah 2012).

5.3 Bluetooth and BLE Bluetooth was developed by Ericsson foremost in an effort to eliminate cables in short range

communication between electronic devices. A Bluetooth connected device consist of a host device

(computer, cellphone, keyboard etc.), a bandwidth controller and a radio with an antenna. Bluetooth

applies a frequency hopping technique to transmit between 2.402GHz and 2.480GHz by rapidly

changing frequency and making 79 hops along the bandwidth.

Bluetooth devices in proximity to each other will interact either by one device taking control over

other devices. A network with a master Bluetooth device and one or several slave Bluetooth devices

is called a piconet, while a network of piconets connected to each other is called a scatternet as the

figure 7 states (Erasala & C. Yen 2002).

Figure 7. Scatternet

A master device is limited to a maximum of seven connected slaves in the same piconet. In each

piconet the master decides the frequency hopping sequence that the slaves must follow. In a

scatternet, the two or more piconets overlap by having at least one of the devices to act as a bridge

node, functioning simultaneously as a master in one piconet and a slave in another and thereby

connecting the piconets. Scatternets can be installed in different configurations depending on the

purpose of the system (Persson et al. 2005).

Bluetooth devices are like other radio equipment subjects to communication interference, especially

when many devices are in close proximity. However, since Bluetooth transmits short ranged signals

Page 24: Successful Digital Product identification

16

and uses frequency hopping to jump randomly between 79 frequencies at rates of 1600

times/second, interference should be low in theory. If two devices happen to share the same

frequency and interfere with each other, the interference will at least be very short (Goldtouch 2014;

Lee et al. 2007).

Battery powered Bluetooth devices have the advantage to operate at a data rates of 1 Mb/s and

within a nominal range of 10 m. Moreover, Bluetooth networks can be useful in industrial

applications where many machines have to communicate with each other simultaneously. Since

Bluetooth devices however constantly search for other Bluetooth devices they have to be active all

the time. This puts a strain on the devices power supply and therefore reduces their lifetime

significantly in comparison with other wireless communication technologies (Baker 2005).

In recent years a further development of the newer Bluetooth version 4.0 has resulted in the

invention of Bluetooth Low Energy (BLE) which is the Bluetooth alternative for low-power devices.

Similar to previous Bluetooth technology, BLE also applies frequency hopping which is very beneficial

when working in environments with much radio interference like in many industrial situations. Unlike

previous Bluetooth, BLE transmits 1Mb/s at much shorter 2 MHz signals instead of 1 MHz over a span

of 40 frequencies instead of 79, which requires less power and therefore saves battery life (Faragher

& Harle 2015). A study conducted in 2012 showed the differences in lifetime of a BLE device with a

battery capacity of 230 mAh depended much on connection interval and latency. With

measurements once every 32 second the slave device showed a theoretical lifetime of 14,1 years

(Gomez et al. 2012).

5.4 Matrix barcode The conventional barcode, known as UPC barcode, has been widely used in many industries. In 1994

a new type of matrix barcode was invented, QR code (Denso ADC 2011). QR code stands for Quick

Response Code, which is a two-dimensional barcode (Lx et al. 2008). This means that the amount of

information which a QR code can store is much larger than the amount in the regular one-

dimensional barcode, as shown in the figure 8.

Figure 8. How data contains in a one and two-dimensional barcode (Kieseberg et al. 2010).

Also, the fast readability is a factor which makes the QR code an interesting technology. To increase

the reliability and the reading speed of the QR code different algorithm for decoding with a mobile

phones camera has been invented. The findings of efficient algorithms for reliable method of image

processing of QR has resulted in an ISO standard from 2015 which describes the structure, figure 9,

of the QR code (International Standards Organisation 2015).

Page 25: Successful Digital Product identification

17

Figure 9. QR code structure (International Standards Organisation 2015).

The structure of the QR code shown in the figure 9 above is a structure of a version 7 QR symbol.

There is a difference between the micro QR code, M3 version, and the regular size QR code, version

M7, regarding the structure components. The micro QR code symbol could be compared with the

upper left quadrant of the version 7 symbol without the alignment patterns (International Standards

Organisation 2015). Furthermore, the area which includes in the function patterns does not encode

data.

However, QR code is one of several invented two-dimensional barcodes which the market offers.

Several new and tailor-made barcode alternatives have entered the market in the last decades,

which needs a certain special software to be readable. Micro-QR and Data Matrix are two examples

of how information can be compressed into smaller areas, which can be valuable when marking a

tighter area or a smaller product.

Further, to attach barcodes on products has evolved lately. Nowadays, for example laser marking,

punching and dot peen (Stylus) marking is three commonly used marking methods above stickers

which figure 10 displays (TELESIS 2006; Etchmark 2018).

Figure 10. Stulys marking a data matrix on metal (TELESIS 2006; Etchmark 2018).

One concern with marking the drill bits surfaces is the damages occurring during operation.

Scratches, blasting, corrosion and wear on the drill bit can make the matrix barcode unreadable. To

counter this, the matrix barcode should be positioned on a surface of the drill bits that is somewhat

more protected during drilling. Moreover, the material at which the matrix barcode is printed on, can

be made of a very hard material that is not affected by any drilling environment. The same tungsten

carbide that the pins are made of, can easily be fitted to another part of the drill bit without much

adjustments to the current manufacturing arrangement.

Page 26: Successful Digital Product identification

18

Security of two-dimensional data matrix such as QR, are in one aspect not so high. The non-human

readable code makes it impossible for humans to distinguish between a real and fake or dangerous

QR code before the scanning process (Kieseberg et al. 2010). Therefore, the focus should be on

secure software solutions and on scanning only trusted codes.

Furthermore, a new generation of 3D matrix bar code is available but not fully commercialized yet.

The advantage of adding a third dimension, the same as adding a second, is to increase the amount

of data in a smaller size. Although creating good readability when adding a third dimension could be

a tricky challenge because of the contrasts (Peternikolow 2012).

Adding more physical dimensions and changing the encoding algorithmic method of a barcode is not

the only way of creating a more efficient and data dense barcode. Using RGB color will also result in

the same advantage and will in some cases increase readability.

The amount of information that a barcode can contain depends on resolution, size, dpi and reader.

Read length and lighting (contrasts) are also two factors which have effect on the reliability and

readability of a barcode with high data density. The more information the barcode needs to contain,

the bigger or denser the barcode will get. Therefore, the readability could suffer.

In order to test if a custom solution for a matrix barcode could be of interest, a creation of a suitable

two-dimensional barcode was made in excel using VBA. The algorithmic code is not optimized for the

output number in the figure 11 below.

Figure 11. Custom-made matrix barcode created in excel.

In this way the products can be marked and identified with straight line patterns. The borders are

designed to change the output which is calculated from the four quadrants. The highest number and

marking which could be made is shown in the green quadrant in figure 11. The quadrants are

calculated separately and then joined together.

5.5 Optical character recognition Optical character recognition, also known as OCR, is similar to barcodes but is also readable for

humans. This makes it easy for operators to read manuals by adding the code into the system if the

reader is faulty. The readers could in this case be a camera phone and this technology is used in

Sweden for automatically adding payment from account receivables in the bank application.

However, the number is only one-dimensional which means that the size tends to be bigger for an

OCR then a for example QR code (Nordea 2018).

5.6 Wi-Fi Wi-Fi is a well-known technology which is widely used around the world. The radio frequency Wi-Fi

operates on is mostly 2,4 GHz, the same as Bluetooth. However, to avoid interference a secondary

Page 27: Successful Digital Product identification

19

frequency using 5 GHz has in the latest years increased in application (Lee et al. 2007). Figure 12

shows a comprehensive explanation of differences between Wi-Fi and other similar technologies.

Figure 12. Overview of Wi-Fi compared with other technologies (Lee et al. 2007).

5.7 Ultra-wideband UWB is a communication technology which employs transmissions at 3,1-10,6 GHz, with very broad

bandwidths ranging from 500 MHz to 7,5 GHz, to spread out the radio energy. The low spectral

energy and broad bandwidths allows little interference, great data transmission speeds and very

detailed locating capabilities (ETSI 2018; Lee et al. 2007).

Page 28: Successful Digital Product identification

20

6 Standards When it comes to tags and readers there are a number of standards available for classification of

electronical products. To decide whether a product is suitable for a specific application, one first

need to understand the utilization limits of the certain product which preferably involves knowledge

on how these certifications have been developed and how they are intended to classify products.

The standards which are explored in this chapter are those that are of interest when investigating the

feasibility of implementing tags and readers in the extreme environment mining tools are used in.

One fallback is that even the standard with the highest degree is still not enough for the environment

the tags are operating in if inserted in drill bits.

The standard for degrees of protection provided by enclosures known as Ingress Protection rating

(IP) code is divided into several parts. The IP code is declared with the two letters IP which is followed

by two mandatory single numeral digits and one optional letter, for example IP67. The first di git

indicates in which level the product is protected from solid particles and the second digit specifies

the liquid ingress protection. Explanations of the IP codes only relevant for this project are stated in

the table 5 below (SVENSK STANDARD 2014).

IP code Solid particle protection Liquid ingress protection

IP67 Protected from total dust ingress. Protected from immersion between 15 centimeters and 1 meter in depth.

IP68 Protected from total dust ingress. Protected from long term immersion up to a specified pressure.

IP69K (IPX9) Protected from total dust ingress. Protected from steam-jet cleaning.

Table 5. Explanation of different IP codes (SVENSK STANDARD 2014; Sealing Technology 2017).

The additional letter which is not mandatory is additional information about the protection of the

product (Sealing Technology 2017). This is shown in table 6.

Additional letter Meaning

K High temperature and pressure water test H High voltage protection

M Movement during water test

S Still during water test W Spec of weather conditions

Table 6. Meaning of various additional letters (SVENSK STANDARD 2014).

ATEX, ATmosphères EXplosibles, is type of directive which determine the protection from explosive

atmospheres for products and how a working environment is allowed in an explosive atmosphere.

The type of tests conducted gives an understanding of the sensitivity of the product. In this project

there is no explosive environment expected which means that this directive i s only good to have, if

the product might in the future be implemented in an application which include an explosive

atmosphere. However, the directive shows properties to withstand harsh environments which still is

a positive indicator for the products in the project. (Jespen 2016).

When it comes to shock and vibration two standards from IEC, the International Electrotechnical

Commission, have been investigated. The first one IEC 68.2.29 focuses on shock and the other one,

IEC 68.2.6, focuses on vibration. The tests for how these standards are conducted differ a bit from

each other. The definition of a shock according to the IEC 68.2.29 standard is a sudden acceleration

and deceleration. The definition of a vibration according to IEC 68.2.6 standard is that the product is

Page 29: Successful Digital Product identification

21

placed on a shaking table. The tags are usually tested with a force of 500-1000 N which is often

mentioned in the technical specification (Tricker & Tricker 1999).

Furthermore, RoHS is a standard that restricts from using certain hazardous substances in electri cal

products (Kemikalieinspektionen 2016; Samsonek & Puype 2017). Finally, MIL-STD 810 is a military

standard to test the product environmental limit such as pressure, temperature, humidity,

acceleration and shock (Standard & Specifications 2001).

Page 30: Successful Digital Product identification

22

7 Benchmarking technologies The project is in many ways unique, although several other industries are working in the same area

of tracking their products in a digital way. Transparency throughout the product lifetime has been

increasingly important in order to track the performance, but also where in the chain the product is.

7.1 RFID The U.S merchandise company Wal-Mart tried in 2004 to apply RFID on pallets of shipped and

received goods from suppliers. However, the attempt was not successful as suppliers failed to see

the benefits of supply chain efficiency and only saw the new system as an additional cost. A new

effort to implement the technology has begun where Wal-Mart is focusing on slow-moving items

where RFID can create most value. Moreover, Wal-Mart is aiming to have closer communication and

transparency towards suppliers and aiding the suppliers in the purchasing process of labels (Roberti

2010).

Scottish Courage which is one of UKs largest beer manufacturer have been using RFID since 1998 on

their kegs to improve supply chain visibility. They have since then experienced a reduction of pro duct

losses from 4% to 2%, reduced inventory levels and reduced total overhead costs as logistics

efficiency has increased (Wilding & Delgardo 2004).

Truck tire retailer Michelin is currently exploring on equipping their tires with RFID tags with the

purpose to make every tire identifiable throughout its whole lifecycle. The ambition is then to create

a fleet management tool for customers to track their assets and collect information on further tire

operating parameters (Tire Business 2017). However, there is no indication that Michelin has

succeeded with their realization of this. Furthermore, the mechanism does not seem to be fully

automatic, instead manual procedures are included where the manual measurements are only

coupled automatically as figure 13 shows.

Figure 13. Michelin Tire Care (Michelinmedia 2017).

Ford Motor Co. are using passive UHF RFID in their manufacturing processes. The Omni -id Adept 850

tags are attached to the metal motor blocks to track their progress throughout the assembly line and

write onto the tag after each process, to distinguish different motor types and to ensure that no

process has been overlooked. The tags contain 64 kbit of memory which store component data

instead of a central database to ensure production uptime if the network system would malfunction

(Swedberg 2015).

Page 31: Successful Digital Product identification

23

Holt Cat is a supplier of heavy duty machinery for construction, mining and agricultural applications.

The company has recently moved to a tool tracking system with no manual interaction, by

implementing RFID technology into their equipment and employee cards. Employees who need new

tools from nearby storehouses pass RFID readers that registers their personal cards with HF RFID.

When the employees exit the storehouse, UHF readers, figure 14, register the UHF RFID tags fitted

onto the tools. This new procedure has eliminated unnecessary man hours of manually logging tools

checked in and out and significantly reduced the amount of lost or stolen tools (Omni-ID 2009)

Figure 14. UHF readers in Holt cat storehouse.

Omni-id is a supplier of RFID solutions who claims to have embedded RFID tags into golf balls to track

the location and distance fired golf balls (Omni-ID 2018). Upon impact the golf balls and the RFID tags

experience great forces, normally around 10kN (Penner 2003).

Sandvik is a leading manufacturer and supplier of industrial cutting and mining tools. They have

involved an RFID system to increase logistics transparency. When goods are shipped to one of

Sandvik's factories they are attached with RFID tags. Upon arrival to the factory the shipment passes

gates which register the attached RFID and sends this information to a central server, thus

eliminating any need for manual labor to track shipment status (Turckvilant 2018).

Statoil is a leading company in the oil and gas sector which has implemented LF RFID into their down-

the-hole drilling equipment. This allows information to be gathered regarding usage of equipment

and expected remaining lifetime (Swedberg 2012).

7.2 NFC One example of NFC technology utilization is in Apple Pay. The purpose of this application is to

digitalize the wallet so credit cards could be saved and secured in personal mobiles, tablets, watches

or computers and to execute e-payment or payment though a terminal with hardware which has NFC

functionality. The NFC technology is feature in the latest mobile hardware from apple and all of their

watches. For example, when a payment should be executed in the store though a terminal you only

need to double-click on a button on the watch and the hold it close to the terminal (Apple 2018).

7.3 Bluetooth A new pilot project has been started by Husqvarna in 2107 where tool could be rent though a app

and then pick up in a container. This has been developed due the fact that many of the tools

customer uses for the garden are used less frequently. Therefore, this project has driven the

innovative and sustainable solutions for garden space. Husqvarna uses Bluetooth in order to identify

the customer when a tool is chosen in the battery box and then authorized the customer though

mobilt bankID, a Swedish solution for a secure personal identification. The pickup and drop-off are

working in the same way which involved that a designated locker in the battery box opens when a

customer has authorized themselves (Husqvarna Group 2018).

Page 32: Successful Digital Product identification

24

7.4 QR The Alibaba Group has launched a digital wallet called Alipay which intends to replace current

payment methods by having merchants, customers and peer-to-peer transactions using smart

phones. All necessary transaction information can be translated simply by scanning a QR-code (Alipay

2018; Rizwan 2018).

QR-code has grown bigger in everyday merchandise to provide information or to take opportunity of

further advertisement. QR-code has also become an addition to the conventional barcode, or even

replaced the barcode in many cases as it contains more information about the product than barcodes

can (George 2015).

7.5 UWB Voelstalpine is a leading European steel manufacturer and provider of metal solutions. The company

has implemented Ultra-wideband technology in its Austrian steel plant for the purpose of real time

tracking of their employees within the plant. In case of an emergency, employees can much easier be

located by rescue personnel by tracking their UWB badges, which is especially helpful around the

furnaces where dense smoke might occur.

Washington hospital center uses UWB-badges similarly too track people and objects at their hospital

in order to trace interactions at the hospital and thereby respond to and minimize any contagious

exposure. Moreover, important hospital equipment has been fitted with UWB-tags for quick and

easy locating purposes (Zebra Technologies 2016).

7.6 Wi-Fi Mobilaris Group is a company which has help firms like Boliden and LKAB with mining intelligence.

This includes Wi-Fi technology to be able to track down and locate vehicles and equipment in the

mine. The system which Mobilaris uses could combine various position technologies for location

accuracy (Mobilaris 2018).

Page 33: Successful Digital Product identification

25

8 Positioning The different methods for asset identification all include properties which makes them vulnerable to

the extreme environments which the products are used in. For identification purposes where the

method includes components to be installed inside drill bits and other tools, it is especially important

to manage harsh conditions as the method should function throughout the assets lifetime.

However, if the tag would be re-attachable to the tool and removed before each operation, the

protective requirements would be significantly lowered and advanced durability properties less

important.

To protect an electronic ID tracker, the two major strategies described below have been identified.

For optimal effect, a combination of both is preferable.

There are many obstacles as to where a tag can be positioned on a drill bit. Positioning must consider

the following:

• The tag must not disturb the drilling properties of the drill bits. Any modifications of products

must not impair its properties in such way that dynamic load carrying capabilities will be

reduced.

• The tag must be positioned in such way that it can easily be accessed for reading purposes.

• The tag must be positioned in such way that it is protected from the elements and drilling

operations.

• The tag must be positioned in such way that it will stay attached to the products and not fall

of unintentionally during transport, drilling operations or normal handling.

Page 34: Successful Digital Product identification

26

9 Available products

This chapter presents some products currently available on the market from each technology

alternative. The products were selected based on possible feasibility and were considered to b e the

best candidates from each technology for the project.

There are a lot of factors to consider when choosing a tag for a specific purpose. This chapter

highlights mostly the main properties of each different technology type.

9.1 Tags The market offers different types of tags within the same technology which are quite similar in a

large extent but have different dimension and casings in order to fit and withstand forces. This

chapter contains information of chips which are suitable for this projects application. Overview of

different tags and reading distance is find in appendix 1.

9.1.1 Xerafy Dot-iN XS

Xerafy Dot-iN XS is a UHF RFID tag with a very rugged, small and lightweight design. This means lesser

mass and thereby lesser force that needs absorbing by the damping medium. Xerafy Dot-iN XS which

can be fitted onto or embedded into metal with satisfiable reading distances. However, reading

possibilities are highly dependent on reading angle, figure 15, and need to be controlled (Xerafy

2011).

• Frequency: UHF 902-928 MHz (US); 866-868 MHz (EU) • Dimensions (mm) ø 6 x 2.5 tolerance +/- 0.2 mm • Battery: No • Weight: 0.34 grams • Shock (drop): 1 m to concrete/granite up to 200 cycles • Operating temperature: -40°C to +85°C • Read Distance: up to 1.5 m (on-metal) / 1.0 m (in-metal) • Protection rating: IP68

Figure 15. Radiation pattern of Xerafy Dot-iN XS in metal (Xerafy 2011).

Page 35: Successful Digital Product identification

27

9.1.2 IPC03-10

IPC03-10 is a LF RFID tag provided by Pepperl+Fuchs. The tags somewhat larger design could provide

better reading possibilities yet fit inside drill bits. Operating at 125 kHz, the tag is desi gned to be

mounted in metal (Pepperl+Fuchs 2018c).

• Frequency: LF 125 kHz • Dimensions: Ø10 x 4,5 mm • Battery: No • Weight: 1 grams • Operating temperature: -25°C to 70°C • Read range: N/A • Protection rating: IP67 • Not writable, delivered with unique ID

9.1.3 IPC02-3GL

IPC02-3GL is a LF RFID tag provided by Pepperl+Fuchs. The tag housing is made of glass with a ferrite

core to give especially good reading possibilities when mounted in metal. A glass design might not be

the best solution for drilling applications, however the high protection rating should compensate for

this (Pepperl+Fuchs 2018b).

• Frequency: LF 125 kHz • Dimensions: 13 ±0,4 x Ø3.15 ±0,1 mm • Battery: No • Weight: 0,22 grams • Operating temperature: -40°C to 85°C • Read range: 7 mm in steel with IPH-18GM-V1 • Protection rating: IP68 • Not writable, delivered with unique ID

9.1.4 Bluvision BEEKs Mini

Bluvision BEEKs Mini is a BLE 4,1 tag with a relatively small, light and rugged design. Its transmitting

properties can be modified to decrease or increase range up to 150 m. By entering a sleep mode

where the Bluvision tag only consumes 1.6 µA the battery life of the tag can be significantly

increased. For asset tracking the tag might not be required to notify its position constantly, once

every 5 second will increase the tags lifetime to 4 years (Bluvision 2017).

The greatest strengths of using a Bluetooth like Bluvisions is its capabilities of larger data storage and

processing power. The tag is compatible with additional sensor installations which gives the ability to

measure and record temperatures, motion from a 3-axis accelerometer, light and presence of

magnetic materials, however additional mountings will draw more power. Measuring temperature

only with transmission every 5 second will decrease lifetime to 3 years.

Bluvisions BEEKS mini is described to be tamper-proof which means that it detects and immediately

alerts if it is removed from the asset.

• Frequency: 2,4 GHz • Dimensions: 34.2mm x 8.35mm • Battery: 3V • Weight: 28 grams • Range: up to 150 m • Operating temperature: -30°C to +77°C • Protection rating • Lifetime: RTLS mode (Asset Tracking):

o advertisement every 3 second: 2 years o advertisement every 5 second: 4 years

Page 36: Successful Digital Product identification

28

9.1.4 Zebra DartTag Zebra DartTag is an asset tracking device that transmit very short UWB signals on frequencies

between 6,35-7,35 GHz to provide excellent location tracking of thousands of tags simultaneously

within 30 cm proximity from ranges up to 200 m. The transmitting interval can be adjusted to

increase battery life up to 7 years. The tag has been claimed to be rugged as it can withstand dust,

water and multiple drops from 1.8 m height (Zebra Technologies 2018a).

• Frequency: 6.35 - 6.75 GHz • Dimensions: Ø4 cm x 2 cm • Battery: 3V • Battery life: Up to 7 years at 1 Hz blink rate (programmable 0,01-200 Hz) • Long RF Range: Up to 200 meters • Location accuracy: 30 cm line of sight • Weight: 18 grams • Protection rating: IP67 • Operating temperature: -40°C to 70°C

9.1.5 T2-EB Wi-Fi Active RFID Tag

T2-EB Wi-Fi Active RFID Tag delivers asset tracking options over with compatibility to an existing Wi-fi

infrastructure which means simple installation and operation. It connects to the local Wi-fi using a

2,4 GHz frequency with ranges up to 200 m outdoors and 80 m indoors. The tag is also capable of LF

communication over 125 kHz which gives ability to behave like an RFID. This is useful for tracking the

movement of the asset through gates with RFID detectors. Moreover, the tag is equipped with

motion sensors so that the tag can alert any handling of the asset. The extended battery version is

fitted with a stronger casing which increases durability and battery lifetime up to 8 years depending

on usage (Extronics Ltd 2016).

• Frequency: 2,4 GHz and 125 kHz (for RFID behavior) • Dimensions: 85 x 59 x 19 mm • Battery: 3,6 V • Battery life: up to 8 years (dependent on use and other factors) • Range:

o Outdoor: 200 m o Indoor: 80 m

• Weight: 85 grams • Protection rating: IP66 • Operating temperature: -30°C to +75°C • Motion sensor

Page 37: Successful Digital Product identification

29

9.1.6 Summary of tag properties

The above mention tags have been compared in a summery according to table 7.

Tag properties Xerafy Dot-iN XS IPC03-10 IPC02-3GL Bluvision DartTag

Technology RFID UHF LF RFID LF RFID BLE UWB

Drop (m) 1 n/a n/a n/a 1,8

Lifetime (yr) Passive (50) Passive Passive 4 7

Range (m) 1 n/a 0,07 150 200

Operating temperature (°C)

-40 to +85 -25 to +70 -40 to +85 -30 to +77 -40 to +70

Weight (g) 0,34 1 0,22 28 18

Unit price (SEK) 43 n/a 26 142 n/a

Table 7. Tag type properties in comparison.

9.2 Printers Labeling is an older and widely used method for identifying products. This chapter contains different

types of printers with different types of technologies.

9.2.1 RFID tag printers on site

ZQ520 is an example of a RFID printer delivered by Zebra, figure 16, capable of printing UHF RFID for

quick labeling of products made possible on site. In this way the printer can quickly provide new RFID

labels for products with previously destroyed labels. On top of this, the RFID labels can also be

printed with matrix barcodes for visual identification. The printer has a rugged design with an IP54

rating to withstand dirty environments and temperatures from –20°C to +55°C. Zebra promises easy

usage with fast pairing to mobile devices and an intuitive interface. The printer is equipped with

Bluetooth 3.0 and Wi-Fi over 2.4 GHz or 5 GHz as well as software tools for remote management.

Special labels, table 8, are available for on-metal applications.

Table 8. Printable on-metal RFID labels (Zebra Technologies 2018c).

Figure 16. Zebra ZQ520 RFID label printer (Zebra Technologies 2018e). Confidex Silverline label on

metal to the right (Zebra Technologies 2018c).

Page 38: Successful Digital Product identification

30

9.2.2 Matrix barcode labels printed on site

The ZQ320 is a rugged label printer from Zebra, figure 17, with IP54 rating and solid drop durability.

With USB 2.0, Bluetooth 4.0 and Wi-Fi connectivity it can easily be operated by a mobile phone

device or offered remote management tools. The ZQ320 supports many barcode types including

matrix barcodes amongst others.

Figure 17. Zebra ZQ320 label printer (Zebra Technologies 2018d; Datorama 2018).

9.3 Reading possibilities For reading matrix barcodes there are several products available on the market. Additionally, most

smartphones today have capabilities to read matrix barcodes.

9.3.1 RFID readers

Pepperl+Fuchs IC-KP2-2HB17-2V1D, IUH-F190-V1-EU and IUH-F192-V1-FR1, figure 18, are devices for

reading and writing RFID tags. With associated software these units can be altered to read between

different tag type frequencies. (Pepperl+Fuchs 2018a; Pepperl+Fuchs 2018e). IUH-F192-V1-FR1 is the

strongest reader device provided by Pepperl+Fuchs and should have the best chance of reading tags

that are otherwise difficult to read (Pepperl+Fuchs 2018f).

Figure 18. IC-KP2-2HB17-2V1D (left) and IUH-F190-V1-EU (middle) and IUH-F192-V1-FR1 (right)

(Pepperl+Fuchs 2018a; Pepperl+Fuchs 2018e; Pepperl+Fuchs 2018f).

Handheld 1128 Bluetooth UHF RFID Reader, figure 19, from TSL communicate with compatible

smartphone via Bluetooth and settings such as output effect can be changes within the application.

Although being a cheaper model, the handheld reader should still be adequate for reading tags

inserted in drill bits (Technology Solutions 2018).

Page 39: Successful Digital Product identification

31

Figure 19. 1128 Bluetooth UHF RFID Reader (Technology Solutions 2018).

IPH-18GM-V1, figure 20, is a LF RFID reader provided by Pepperl+Fuchs. With a power consumption

of 1,2 W, an IP67 classification, reading distances up to 50 mm and its focused beam, it should have

promising readability of LF tags embedded in metal (Pepperl+Fuchs 2018d).

Figure 20. IPH-18GM-V1 (Pepperl+Fuchs 2018d).

9.3.2 Bluetooth readers

The number of Bluetooth capable devices on the market is many. For these applications, rugged

mobile phone with an app software could be a suitable product to use as a reader.

9.3.3 Matrix barcode readers

DS3678-SR, figure 21, is an example of a handheld scanning device capable of reading matrix

barcodes. The rugged design with IP67 rating promises durability and easy handling under relatively

harsh conditions. The scanner can be wirelessly connected and each charge cycle lasts for 100 000

scans (Zebra Technologies 2018b).

Page 40: Successful Digital Product identification

32

Figure 21. DS3678-SR handheld matrix barcode reader (Zebra Technologies 2018b).

9.3.4 Wi-Fi reading

Mobile phones and currently Epiroc devices on site have Wi-Fi capabilities already.

9.3.5 UWB reading Zebra's Dart Hub is a locating software designed to manage all Dart sensors which are placed at the

worksite. The Dart sensors register UWB tags in proximity and sends the information to Dart Hub to

establish a detailed real-time location system. Moreover, the Dart sensors can be set to identify

presence of RFID tags (Zebra Technologies 2012).

9.4 Reading methods compared Table 9 provides a comparison on the characteristics of the different reading methods.

Readability/ User-friendly

RFID tag RFID Label NFC Bluetooth Matrix

Barcode Wi-Fi UWB

Scanning possibility

Scanner Scanner Scanner Mobile Mobile/ Cameras

Mobile Scanner

Complexity Normal Normal Normal High Low High High

Connectivity Normal Normal Normal Good Low Good Good

Manual interaction

Normal/Low Normal/High Normal Low High Low Low

Implementation Normal Normal Normal Normal Easy Normal Normal

Table 9. Characteristics of the different reading methods.

Page 41: Successful Digital Product identification

33

10 Model structures for digital product identification As a new method is implemented for digitally identifying products, there will be accompanying

procedures revolving all the work around to collect data. These procedures are highly related to the

identification method chosen. Therefore, three different models are stated in this chapter as

feasible.

10.1 Adhesive labels This model is built to fulfil the need of using a low technology solution for identification of products.

For example, QR-codes, printed RFID or other physical labeling methods are applicable for this

model. The model is intended to ensure that a tag is always present when an identification occurs,

therefore figure 22 shows several steps of confirming that a tag is present on every product on site.

To put it simply, whenever a product has been used or serviced, a new tag is printed on site and

fitted onto the product with the new information.

The retagging upon service of a product will result in the unique product ID and numbers of repair.

Repairs could be made on other locations since only a certain printer needs to be placed at the repair

site.

Scanning of the product occurs only in connection with a rig where the rig ID and the product ID is

paired when the product is mounted on the rig. This information is then sent to a central data system

preferably though Wi-Fi or GSM from a device such as a smartphone.

Delivery to

customer

Customer

warehouse or

consignment

Product is scanned

and mounted on

the rig

Drilling starts Drilling stops

Product is

dismounted

New tag is fitted to

the productService

Before service

the product tag

is scanned

After service a

new tag is fitted

to the product

Retagging

Dismounted

product creates

new tag

Delivery

confirmation

Cloud

Join rigID

with

productID

Start time Stop time

Rig ID and

product ID

scans

Storage

confirmation

Damage tags

replacedRetagging

Serviced product ID =

product ID + #service

Drilling

parameters

Drilling

Discarded

Epiroc customer

center

Figure 22. Model structure for adhesive labels.

Page 42: Successful Digital Product identification

34

10.1.1 Placement of adhesive labels

For placement of adhesive labels, the requirements can be less specific since the tag has a shorter

expected lifetime. The following still applies:

• The tag needs to be place in such way that it is protected during transportation and delivery

of products to customers.

• The tag needs to be placed in such way that it can be read by a reading device.

• The tag needs to be protected from the elements when the products is not in use.

• The tag needs to be attachable even if the product is dirty.

The adhesive labels should preferably be designed in such way that they can be wrappe d around the

products, figure 23. If the surface is dirty, the label can still stick to itself. Moreover, the label should

be made of plastic or a paper quality which does not deteriorate if pieces are left outside in wet.

Figure 23. Suggestion on how a label with printed QR can be wrapped around drill bits (Datorama

2018).

10.2 Re-attachable tags Products could be identified with a tag designed using a fastening mechanism, suggestively, a

clamping device with quick release could be combined with a QR, RFID or other tracking devices to

attach to the products. When mounting the product to the rig, the tag is removed and immediately

placed at a designated area on the rig. The rig computer acknowledges the tag and thereby registers

the specific product mounted on the rig. Drilling data recorded by the rig is coupled to the tag. Once

the drilling operation is complete, the tag is re-attached to the product.

In this way the product identifier will not be damaged during operations and information about the

product will be managed in a quick and easy way. The risk of course is that the tag might get lost if

not handled properly.

When a drill bit reaches the end of its operational lifetime and will be disposed, the tag can be

recoded, equipped with new batteries if necessary and used on a new product, prolonging the

lifetime of tags and thus reducing total cost. The structure of this model is shown in figure 24 below.

Page 43: Successful Digital Product identification

35

Delivery to

customer

Customer

warehouse or

consignment

Tag is placed on

designated

tagbox on the rig

Drilling starts Drilling stops

Product is

dismounted from

the rig

Service

Delivery

confirmation

Cloud

Join rigID

with

productID

Start time Stop timeStorage

confirmation

Scan product if

service is

required

Drilling

parameters

DrillingProduct is mounted

onto the rig

Tag is removed

from tagbox and

re-attached to the

product

Serviced product ID =

product ID + #service

Discarded and recycling of tag

Epiroc customer

center

Figure 24. Model structure for re-attachable tags.

10.2.1 Placement of a re-attachable tag Plenty of design options can be thought up for re-attachable tags. However, they all need to consider

the following:

• The tag must not disturb the drilling properties of drill bits. Any modifications of products

must not impair its properties in such way that dynamic load carrying capabilities will be

reduced.

• The tag should easily be attached and removed from the product with little manual

interaction.

• The tag must be positioned and fitted with a strong mechanism such way that i t will stay

attached to the products and not fall of unintentionally during transport or other normal

handling conditions.

To cover the wide product range, while simultaneously fulfilling the above stated requirements,

quick release clamps can be a very effective way of attaching and detaching tags from products,

figure 25. The clamps can also be attached with larger and more complex tracking devices.

Figure 25. Suggestion on how quick release clamps can be attached to drill bits (iq-parts-shop 2018).

Page 44: Successful Digital Product identification

36

10.3 Inserted tags and surface inscription The model structure for inserted tags and surface inscription, figure 26, is quite similar as the two

models above, inserted tags and refitting tags. The main difference is that no extra procedures are

needed when mounting the product on the rig.

Pairing between rig and product is performed at the mounting stage by a fixed or a handheld reading

device. Upon service of a drill bit, the product is scanned afterwards, and the product ID is coupled

with this new information.

Delivery to customer Customer warehouse

or consignment

Product is scanned

and mounted on the

rig

Drilling starts Drilling stops

Product is

dismountedService

Delivery

confirmation

Cloud

Join rigID with

productIDStart time Stop time

Rig ID and

product ID scans

Storage

confirmation

Scan product if

service is

required

Drilling

parameters

Drilling

Serviced product ID =

product ID + #service

Discarded

Epiroc customer

center

Figure 26. Model structure for inserted tags and surface inscription.

10.3.1 Placement of an inserted tag For correct placement of the test with an inserted tag, a local external firm was contracted to

accurately drill the holes accordingly to the provided drawings. Other placement characteristics to

take into account in order to receive a decent result:

• Pepperl+Fuchs were consulted regarding reading possibilities in metal.

• Xerafy provided a user manual with information regarding required circumstances when

using their tags with metal.

• Sika AG assisted in injecting the silicon mediums into the drill bit holes together with the tags

to ensure proper installation.

Furthermore, the tag need some space to move freely in the hole and the damping medium. This

makes it important to investigate not only the height of the hole but also the wi dth. The tag Xerafy

DOT-iN is 6 mm in diameter and 2,5 mm in height which means that the minimal possible diameter of

the hole need to be 6,5 mm as the figure 27 shows.

Page 45: Successful Digital Product identification

37

Figure 27. Calculation of the longest part of the Xerafy DOT-iN tag.

10.3.2 Potting Electronic assemblies can be poured over and fully covered with an insulating liquid which hardens to

a protective casing. Potting is widely used in protection of electrical components from harmful

effects like moist, temperature differences, mechanical forces and electrical disruptions

(Polymerteknik 2018).

The RFID readers from Pepperl & Fuchs have for instance been potted for increased durability. The

RFID tags Xerafy Dot-In XS and Xerafy Xplorer have potted designs as well.

10.3.3 Damping

To ensure the safety of the electronic components inside a tracker device, damping could be used as

a countermeasure to the extreme shocks and vibrations which occur in Epiroc's case.

In order to achieve the best damping properties, a silicon solution was selected as a barrier to absorb

shocks between the tag and the inside walls of the drill bits. Sika AG, which is a provider of bonding,

sealing, damping, reinforcing and protection services, was consulted with to ensure that the best

dampening medium would be selected, as properties can vary significantly between application. Sika

proposed usage of Sikasil® WS-605 S and Sikasil® SG-500 as they have good damping properties.

Datasheets of these can be found in appendix 4.

10.3.3 Inserted passive RFID tags and Xerafy Dot-iN XS

From the available tags on the market which were investigated and compared with the project

requirements, passive RFID fulfilled most of the requirements and was therefore chosen as the best

candidate to insert into drill bits. RFID is first of all a very easy technology to use with little additional

manual labor for workers. The tags themselves include very few and simple components which

should have the best capabilities to withstand the extreme drilling conditions. They can be designed

small enough to be placed inside a drill bit and passive RFID tags are cheap in comparison with other

tagging technologies. Moreover, there are many RFID solutions with rugged designs available on the

market today to choose from which also indicates wide competences and successful

implementations in other businesses. Recent developments at Epiroc also seem to move the

company towards RFID solutions in other parts of the company, which also speaks for implementing

RFID to drill bits for compatibility reasons.

Reading ranges of passive RFID tags are in theory satisfied although it should be noted that the metal

environment can disrupt the radio waves transmitted from the tag which means that placement of

the tag inside a drill bit needs careful attention for optimal readability.

Figure 30 shows the comparison made between certain tags with different possibilities. The factors

chosen in the comparison has been considered to be the most important for this project.

Page 46: Successful Digital Product identification

38

Xerafy Dot-iN XS was the UHF RFID tag selected as the best product to place inside drill bits due to its

small and rugged design yet satisfying reading ranges in metal according to its product specifications.

In theory, LF RFID should do best in metal applications, however Xerafy Dot-iN XS promises satisfiable

properties.

When testing readability of Xerafy Dot-iN XS outside of metal, reader IUH-F190-V1-EU could support

distances of up to 5 cm. The emitting power from IUH-F190-V1-EU was set to 200 mW.

10.3.4 Placement of a surface inscription. Placement of a surface inscription needs special consideration since readability and protections are

both highly desired and not the best in combination.

• This method has lesser requirements however they need special consideration.

• The inscription must be placed in such a way that it is protected during transportation,

drilling operations and normal handling.

• The tag must be placed in such a way that is can be accessed and be visibl e for reading

devices.

10.3.5 Surface inscription For marking the bits with printed codes like QR-code, Micro-QR and Data Matrix the limitations occur

in manufacturing and readability. Since each bit is covered with a yellow protective coating to protect

the bits from corrosion, the method of printing must not destroy this coating or the expected

lifespan of the products will be shortened.

From the methods investigated it was learned that milling and laser cutting operations before

coating would result in coating flowing into the removed spaces and thus hindering reading

possibilities.

Since the products serial numbers are today punched after painting, without damage to the coating

properties, the alternative of punching a data code might be possible if an adequate and adjustable

punching method exist. Suppliers exist who promise good quality by marking data codes on metal

using stylus devices. The result would be similar to the laser printed drill bit shown in figure 28. For

the larger drill bits, the data matrix should be placed at the same top position as the tag in figure 30.

Figure 28. Laser printed data matrix on a drill bit.

10.4 Architecture for KPIs and APIs The architecture of the KPI's flows is highly dependent on the models above, since information

between these two systems, product identification and rig data, comes from two different sources

and are matched in late stages.

In the chosen method for the KPI's, the parameters are connected to different sources depending on

where the sensors are mounted. If a sensor on the rig measures a parameter and transmits this data

Page 47: Successful Digital Product identification

39

to the RCS then it will be collected in a certain place. This will be further described in chapter 10.5

Data collection model.

Application Programming Interface (API) is a set of communication subroutines which an application

can request data from and to subsequently use functions to retrieve the data. Brajesh De defines in

his book API Management what an API is in simple terms. “In simple terms, APIs are a set of

requirements that govern how two applications can talk to each other.” To be more specific, API

creates gateways and communication methods between different data sources and applications in

order to produce an easier way of creating user-friendly applications. In figure 29, the lines

connecting the interactive user interface are methods of communication which are the same as APIs

connections with request and receive functionality (De 2017).

10.5 Data Collection model The models above describe the physical adoption of methods implementation. However, another

important issue is the data model and how corresponding data will be transferred and connected to

each other. Figure 29 below shows how the data should be connected in order to create an

interactive general user interface. The key columns and representative entities are displayed as a

demonstration in figure 29, however there will be much more data columns entered in to these

tables with real mining operations. However, the key columns which purpose is to join together

different type of data stored in different tables or databases is fixed and no more of those columns

will be added. The once which will be added is data about product characteristics and data received

from measure-which-drilling.

PerformanceMonitoring

ProductInfomation

ProductTools

MachineInformation

GUI

ProductionInformation

TimestampPMPK

PenetrationRate

Productivity

ProductNumberPK

Diameter

Length

MetersDrilled

TimestampPT(Mounted)PK

ProductID

MachineNumberPK

DrillingMethod

MachineModel

HoleDiameterMax

MachineIDTimestampPK

ChosenParameter1

ChosenParameter2

MachineNumber

MachineIDPK

ProductIDPK

ProductIDPK

BatchNo

ProductionDate

ErrorLog

HoleID

ClassificationOfAction

FeedForceWeight

DrillingMethod

ButtonConfiguration

BitType

MainApplicationArea

ProductNumber

ChosenParameter3

TypeOfProduct

CarbideGrade

FrontDesign

HoleDiameterMin

RigID (Joined)

ProductStatus

Figure 29. Data collection model.

The "Production Information", "Product information" and "Machine Information" is not highly

dependable on real-time information due to the fact that the products are used later on in the chain.

Page 48: Successful Digital Product identification

40

The matching process between the rig and tag could result in some latency on the time stamp data

which an implementation of a time acceptance span is needed for joining the data in the database.

This together with mapping the different stages which the drill rig encounters, see chapter 4.3, will

produce valuable information in good quality to the user.

On approach of ensure that the data which needs to be inside the product tag is to divide the data

into a unique product ID, product number and batch number which is joined in the table "Production

Information" and "Product Information" in the figure 29. In this way the production and the product

can be traced throughout the chain and the transparency will increase. A standard that is feasible to

store in a tag or an inscription, for electronic product code is described in chapter 5.1 RFID.

The frequency which data are needed to be collected is, according to two products managers, every

hole and every product. So, if a new product for example a rod is mounted a new row is needed. The

same applies when starting a new hole. However, to be able to use machine learning algorithm,

which is describe in chapter 4.3, the data density may need to be higher.

Page 49: Successful Digital Product identification

41

11. Design of Experiment In order to verify that the chosen tag, Xerafy Dot-iN XS, will withstand the extreme environment as

well as be readable in its positioning, a physical test was conducted to gather practical information

and knowledge. The field test analyses several aspects such as placement options, amount of

damping material and type of damping material. The figure 30 shows the first position of the tag.

Four holes on two drill bits, eight holes in total, with different dampening materials, height and width

were drilled and tested with. Since many holes were available for opportunity, LF RFID IPC02-3GL was

also tested since it had good reading properties in metal although having a less rough design . IPC03-

10 was also tested as it has a rough design and good reading ranges.

Figure 30. The first position of the tag.

In the previous studies, the tag has been placed aligned with the vertical force. In this experiment the

placement of the tag is perpendicular to the vertical force. Figure 31 shows how the force and

direction of the tag is related to each other. A theoretical assessment is that the weakest part of the

tag is the connection between the antenna (copper spiral) and the chip (black part in figure 31)

according to Pepperl+Fuch's sales engineer.

According to SmartBit and Consumable Management 1, previous RFID tags have been placed

vertically as seen in figure 31 below. Due to the direction of the shock and vibrating forces and the

design of the RFID tag, a horizontal placement of the RFID tag as seen in figure 31 was considered to

be a more suitable configuration. This would also allow for an optimal volume and utilization of

damping medium.

Figure 31. The tag and force direction.

Page 50: Successful Digital Product identification

42

Another proposal is to drill a 45 degrees angled hole closer to the bottom of the drill bit. It is

important to avoid drilling to close to the tungsten pins, as the bits structural properties might be

affected and the drilling equipment might be damaged. In order to make the tag readable in a 45-

degree hole while simultaneously leaving enough room for the dampening medium, the hole has

been designed as seen in figure 32.

Figure 32. Drawing of the 45-degree hole.

Furthermore, the placement of the tag inside the angled hole can be seen in figure 33. Two different

approaches of placing the tag have been chosen, one which is centered in the hole and one which is

placed in a more suitable way for readability. In the figure 33, the left drawing shows the placement

of theoretical higher readability and the right one is the centered. The test is made in this way to

understand if the different amount of damping material on the sides could affect the results due to

viscosity. Also, the test creates a better understanding on readability of this sort of embedded UHF

RFID tags. The red vertical dashed line represents the force direction.

Figure 33. The tag placements and force direction.

Considering the above factors, the dimensions of the holes for testing have been decided as table 10

shows. Two different damping materials with different viscosity and amount of material is tested in

the drill bit which has eight holes in order to test the different approaches in the exact same

condition.

Page 51: Successful Digital Product identification

43

Type of hole Width

[mm]

Depth [mm] Damping material 1st position 7 7,5 Sikasil® WS-605 S 1st position 7 17,5 Sikasil® WS-605 S 1st position 7 7,5 Sikasil® SG-500 1st position 7 17,5 Sikasil® SG-500

45-degree hole 12 13,5 Sikasil® WS-605 S 45-degree hole 10 10 Sikasil® WS-605 S 45-degree hole 12 13,5 Sikasil® SG-500 45-degree hole 10 10 Sikasil® SG-500

Table 10. Holes dimensions setup for test.

Two drill bits, three types of tags and two types of silicone dampening was used for the experiment

in the combination according to table 11. After injection of silicone and tags the drill bits looks

according to figure 34.

Bit Hole Tag Depth from top

[mm] Damping material

Hole

description

4 1 Xerafy Dot-iN XS 7,5 Sikasil® WS-605 S Top deep

4 2 IPC03-10 - Sikasil® WS-605 S Bottom large

4 3 Xerafy Dot-iN XS 2,5 Sikasil® WS-605 S Top shallow

4 4 Xerafy Dot-iN XS 2 Sikasil® WS-605 S Bottom small

4 5 Xerafy Dot-iN XS 7,5 Sikasil® SG-500 Top deep

4 6 IPC03-10 - Sikasil® SG-500 Bottom large

4 7 Xerafy Dot-iN XS 2,5 Sikasil® SG-500 Top shallow

4 8 Xerafy Dot-iN XS 2 Sikasil® SG-500 Bottom small

9 1 Xerafy Dot-iN XS 1 Sikasil® WS-605 S Top shallow

9 2 IPC02-3GL - Sikasil® WS-605 S Bottom small

9 3 IPC02-3GL 2 Sikasil® WS-605 S Top deep

9 4 IPC02-3GL - Sikasil® WS-605 S Bottom large

9 5 Xerafy Dot-iN XS 1 Sikasil® SG-500 Top shallow

9 6 IPC02-3GL - Sikasil® SG-500 Botten small

9 7 IPC02-3GL 2 Sikasil® SG-500 Top deep

9 8 IPC02-3GL - Sikasil® SG-500 Bottom large

Table 11. Configuration for test of inserted tags.

Figure 34. One of the two drill bits with RFID tags in holes at different positions filled with silicone.

Page 52: Successful Digital Product identification

44

To evaluate how the readability is dependable to the power output of the handheld UHF RFID reader

from Technology Solutions (UK) Ltd, 1128 Bluetooth® UHF RFID Reader with maximum 800 mW, was

tested. The tag which the measurement was conducted on was Xerafy Dot-iN XS. The reader used in

the experiment was connected via Bluetooth to a mobile phone were the amount of powe r output

could be set. Figure 35 shows the results and a linear regression line to predict the reading distance

for the maximum allowed power output in Europe, 2000 mW.

Figure 35. Test and prediction of reading distance in relation to output power with reader TSL 1128

on Xerafy Dot-iN XS tag.

From real test readings of the tags it became apparent that the UHF tags selected for the test were

greatly affected by the presence of metal. The tag itself without direct presence of metal behind the

tag gave poor reading ranges. However, placing a metal surface directly behind the tag enhanced the

read ranges significantly. This is thought to be the result of UHF radio waves reflecting from the

metal and thus enhancing the emitted signal in front of the tag. Although an increase of distance was

achieved, it was still not close to 1 m as promised by the Xerafy Dot-iN XS product specifications.

In contrast, LF tags seemed unaffected by the presence of metal, no matter the distance.

This means that for placement of tags, UHF "in-metal" should not be placed in the middle of a

silicone cylinder as first intended for damping reasons. LF tags can however be placed according to

the drawings to achieve the damping effect without any loss of reading distance.

To conclude, factors which seem to have a significant effect on the UHF Xerafy Dot-iN XS tag is:

• Amount of metal

• The distance between tag and metal surface plane

• The angle between tag and metal surface plane

Also, since LF tags were originally developed for these types of applications, the market is wider with

cheap and many solutions.

According to the product specification the operating distance for IUH-F190-V1-EU is 1000 mm,

although in practice when tests was conducted with Xerafy Dot-iN XS a distance of 50 mm was

achieved. IUH-F192-V1-FR1 was the best/strongest (2 W) reader that Pepperl+Fuchs have which

unfortunately showed shorter reading range than expected. The reading distance was at most 30

centimeters for the Xerafy Dot-iN tag with metal placed behind, which was not nearly 1 m as stated

Page 53: Successful Digital Product identification

45

in the specifications provided by Xerafy. One reason which is probably true is that the size of the

reader is too big to efficiently aim at the small target. A strong reader with a more focused inductive

field might be more appropriate.

After drilling with the modified drill bits, it quickly became apparent that the Xerafy Dot-iN XS

mounted in the top and shallow positions had the best survivability. Table 12 shows the readability of

the different tags after drilling at various depths. The tags with "-" had no readability whatsoever

after insertion into the drill bits with silicones. Tags with "0" were readable in the drill bits from the

beginning however did not survive the initial drilling sequence. The reason for why tags did not

survive was that they fell out of the drill bit holes and were lost.

Bit Hole Type of Tag Depth from

top [mm]

Damping material Hole

description

Type of

Reader

Readable #

of rods (3m) 4 1 Xerafy Dot-

iN XS

7,5 Sikasil® WS-605 S Top deep TSL 1128 -

4 2 IPC03-10 - Sikasil® WS-605 S Bottom large IPH-18GM-V1 1

4 3 Xerafy Dot-iN XS

2,5 Sikasil® WS-605 S Top shallow TSL 1128 11

4 4 Xerafy Dot-iN XS

2 Sikasil® WS-605 S Bottom small TSL 1128 1

4 5 Xerafy Dot-iN XS

7,5 Sikasil® SG-500 Top deep TSL 1128 -

4 6 IPC03-10 - Sikasil® SG-500 Bottom large IPH-18GM-V1 0

4 7 Xerafy Dot-

iN XS

2,5 Sikasil® SG-500 Top shallow TSL 1128 -

4 8 Xerafy Dot-

iN XS

2 Sikasil® SG-500 Bottom small TSL 1128 -

9 1 Xerafy Dot-iN XS

1 Sikasil® WS-605 S Top shallow TSL 1128 3

9 2 IPC02-3GL - Sikasil® WS-605 S Bottom small IPH-18GM-V1 0

9 3 IPC02-3GL 2 Sikasil® WS-605 S Top deep IPH-18GM-V1 -

9 4 IPC02-3GL - Sikasil® WS-605 S Bottom large IPH-18GM-V1 1

9 5 Xerafy Dot-

iN XS

1 Sikasil® SG-500 Top shallow TSL 1128 5

9 6 IPC02-3GL - Sikasil® SG-500 Botten small IPH-18GM-V1 0

9 7 IPC02-3GL 2 Sikasil® SG-500 Top deep IPH-18GM-V1 0

9 8 IPC02-3GL - Sikasil® SG-500 Bottom large IPH-18GM-V1 0

Table 12. Tag survivability after drill test.

Under and after the test the drill bits looked according to figure 36.

Figure 36. Reading LF tags (left). No LF tag in the bottom hole after drilling (right).

Page 54: Successful Digital Product identification

46

12 Survey outcomes The survey showed interesting results on the parameters which are most desirable to monitor. The

survey includes three different drilling applications; down-the-hole, tophammer and rotary-drilling.

Since the respondents of the survey do not work with all, the number of answers of the different

drilling methods are not equally distributed. 20 recipients of the survey gave their answers which is

considered sufficient for this study.

From the results of the survey it was found that 85% of the respondents agreed that they must have

the below parameters listed in table 13:

Service life DTH hammers

Machine model

Drilling method

Service life drill bits

Service life drill pipes

Service life adapters

Service life THE rods

Service life THE shanks

Table 13. 85% of the respondents selected 'must have' on these parameters.

Desired KPIs from two product managers from the R&D department resulted in the table 14 below.

The product managers are working with tophammer and down-the-hole drilling application, so this

table does not include some specific information according to what rotary drilling is needed in future.

Furthermore, monitoring the parameter in the table will be of great benefit when conducting

product tests.

Desired information

Drill bits Bit wear per meter Diameter before operation

Diameter after operation Pin breakages on drill bits

Penetration rate per drilling meter Error codes

Rods, pipes and adapters

Drilled meters per rod Drilled meters per pipe

Error codes

DTH hammers

Drilled meters per hammer related to service occasion and E-kit. Penetration rate per drilling meter.

Service occasion E-kit

Page 55: Successful Digital Product identification

47

Hole data Idle parameters

Drilling material maximum pressure Drilling material minimum pressure

Drilling material average pressure Equipment breakdown to hole ID

Redrilling of hole Cleansing of hole

Tool changes performed throughout hole

Hole location (GPS) Drilled meters

Related rig ID Related hammer ID

Air pressure used Fuel consumption (diesel, electricity)

Other equipment used

Flow of flushing media Lubrication

Other: Fuel consumption per drilling meter

Table 14. Desirable KPI's according to Product Managers THE and DTH.

Following figures 37-46 shows the outcome from the survey which was targeting the business line

mangers. The key performance indicators in the survey was divided into different categories with

focus on distinct types of KPIs. According to the following figure the title shows this grouping of KPIs.

Figure 37. Desirable KPIs of machine information data.

0%

20%

40%

60%

80%

100%

Machine model Machine ID Drilling method Compressor capacity

Equipment

Must have Good to have Not needed N/A

Page 56: Successful Digital Product identification

48

Figure 38. Desirable KPIs to monitor availability an utilization on site.

Figure 39. Desirable KPIs to monitor productivity on site.

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Miningavailability %

Machineavailability %

Machineutilization %

Number ofalarms

Machine status(working/not

working)

Time usage(tramming,

drilling,waiting, etc)

Engine hours

Availability & Utilization

Must have Good to have Not needed N/A

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Meters drilled Productivity(meters per hour)]

Penetration rate(meters per

minute)

Number of holesdrilled

Compressor hours Percussive hours

Productivity

Must have Good to have Not needed N/A

Page 57: Successful Digital Product identification

49

Figure 40. Desirable KPIs to monitor energy usage.

Figure 41. Desirable KPIs for site specified data.

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Fuel burn / Energy consumption

Must have Good to have Not needed N/A

0%10%20%30%40%50%60%70%80%90%

100%

Drill plan and site condition

Must have Good to have Not needed N/A

Page 58: Successful Digital Product identification

50

Figure 42. Desirable KPIs of product performance data.

Figure 43. Desirable KPIs of product information data.

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Rock drilling tools

Must have Good to have Not needed N/A

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Product description Product number Product code Product ID/unique serialnumber

Rock drilling tools product data

Must have Good to have Not needed N/A

Page 59: Successful Digital Product identification

51

Figure 44. Desirable drilling parameters for down-the-hole drilling.

Figure 45. Desirable drilling parameters for tophammer drilling.

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Drilling parameters DTH

Must have Good to have Not needed N/A

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Drilling parameters THE

Must have Good to have Not needed N/A

Page 60: Successful Digital Product identification

52

Figure 46. Desirable drilling parameters for rotary drilling.

The survey also included an investigation on how frequent this KPIs need to be delivered and

updated in the system, figure 47. The answers showed that 70% of the respondents need updates

daily or less frequent. The focus of monitoring performance, figure 48, showed that the interest in

this area is very high.

Figure 47. Desired frequency of KPIs to be delivered and updated in the system according to survey.

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Drilling parameters ROT

Must have Good to have Not needed N/A

How frequent would you like updates?

Real time Daily Weekly Other

Page 61: Successful Digital Product identification

53

Figure 48. Interest and value to monitor KPIs according to survey.

To get a better understanding and comparison on which KPIs is of highest importance to be

implemented, on the ground of the survey, the figure 49 displays a Pareto chart which ranks the KPIs

on number of respondents that have answered “must have”.

How valuable is it for your customers to monitor performance?

0 1 2 3 4 5

Page 62: Successful Digital Product identification

54

Figure 49. Comparison of number of “must have” on the 83 KPIs according to survey.

Page 63: Successful Digital Product identification

55

13 Flow and model assessment A great tool for comparing the different approaches presented in the previous chapters, is to assess

the critical failure modes associated with each design. Risk priority number (RPN) is an effective tool

for this. In the RPN analysis, probability, severity and detection possibilities have been categorized

from 1 to 4 to have a reference grading scale seen as table 15. The RPN is then calculated as a

multiplication of these, making the most critical failure modes stand out in table 16.

Probability Severity Detection

1 1% 1 Acceptable 1 Automatic notification

2 10% 2 Tolerable 2 Moderate detection possibility (manual inspection) 3 50% 3 Bad 3 Difficult to detect

4 90% 4 Critical 4 Impossible to detect Table 15. Scale for RPN grading.

Failure mode Probability Severity

Detection possibility

RPN

Inserted RFID

The tag turns 1 2 4 8

The tag gets destroyed 2 4 4 32

The tag flies out (from top pos.)

1 4 2 8

The tag flies out (from bottom pos.)

3 4 2 24

The tag can dig deeper into the silicone

2 2 4 16

Drill bit properties suffer

2 4 3 24

Surface inscription

The inscription gets worn out

4 4 2 32

Bad lighting causes unreadability

2 2 2 8

The inscription is dirty 4 3 2 24

Drill bit properties suffer

2 4 3 24

Re-attachable tag

Lost tag 2 3 2 12 Tag battery is depleted

1 3 2 6

Damaged tag 2 3 2 12 Destroyed tag 1 4 2 8

Adhesive label

Label gets lost 1 4 2 8

Label gets destroyed 2 4 2 16 Label gets dirty and not readable

3 2 2 12

Printer runs out of labels or ink

3 4 1 12

Page 64: Successful Digital Product identification

56

Data

Data is not sent 1 4 1 4

Operator mistreats procedure

2 4 2 16

Wrong data is presented

1 4 4 16

Presented data is misinterpreted

1 3 3 9

Data mismatch between sources

1 4 1 4

Time stamp latency 3 2 1 6 Data intrusion 1 4 2 8

Faulting manual inputted data

2 3 3 18

Changes in raw data 1 4 4 16

Faulting algorithmic calculation

1 4 2 8

Data storage issues 1 4 1 4

Slow response form interface

1 2 1 2

Data frequency too high

1 2 2 4

Data frequency too low

2 3 2 12

Not accurate raw data received

2 3 3 18

Issues with data classification

1 3 2 6

Table 16. RPN analysis.

13.1 Final method comparison

To get a conclusive comparison between the four approaches, a full view including all aspects was

constructed as can be seen in table 17. For each category, points were awarded to the approaches in

a grading system that ranges from (-5) to 5. The result can be seen in figure 50.

Page 65: Successful Digital Product identification

57

Table 17. Grading of the four approaches.

Figure 50. Resulting total comparison of the four approaches.

Inserted RFID Re-attachable RFID Adhesive QR+RFID Surface inscription

Benefits 27 23 19 9

Drawbacks -20 -11 -16 -30

-30

-20

-10

0

10

20

30

Total comparison

Page 66: Successful Digital Product identification

58

14. Discussion and conclusion This chapter discusses and concludes the findings of this project. Moreover, recommendations for

future work is provided to make the best use from the lessons of this project.

14.1 Discussion From investigating currently used methods for product identification in the industry, conducting a

deep study on various technologies available on the market today and from discussions with

employees from different roles, this report has recognized four approaches for successful digital

product identification.

Three of these approaches are based on joining products with tags that can be identified by

electronical equipment. The fourth approach involves modification to the surface of products to

make them identifiable by optical equipment. There are numerous factors to consider when

comparing the approaches due to the widely different characteristics following. An all -conclusive

comparison was constructed to explore all possible benefits and drawbacks that could be thought of

for each approach. This however should only serve as an initial basis for further decision making as

there can be a multitude of factors which have been mixed or changed since the writing of this

report. Moreover, some of the factors were graded on estimation and are possible to alter if this

would be motivated by more detailed investigations.

Several tag types have been explored in this project, each type with different characteristics. Passive

RFID has in the major part of the project been favorized since it is one of the cheaper, simpler,

smaller and more robust alternatives. Moreover, RFID is compatible with other projects at Epiroc. If

other properties would be more desirable in the future, other alternatives such as BLE and UWB are

also presented in this report. The mission of this project however is first of all to find a method of

identification and RFID is sufficient for this purpose.

Methods to modify the surface of drill bits have also been investigated and discussed through out this

project. Companies exist today which mark QR-codes onto the surfaces of tools although due to the

nature of drill bits working conditions, skepticism has formed around the survivability and readability

of this option. Simpler alternatives for coding data matrix codes have been investigated and could be

a possibility, although no simple existing solution has been found. This means that a system for

coding and decoding information must be invented which was outside the scope of this project. If a

system to read very simple data matrix codes would in the future be found or invented, it could be

interesting to test the readability of such an inscription on a drill bit, to see how wear, dirt and

contrast affects the reading possibilities.

In addition to the above motivation for RFID, the benchmark study presented cases on how RFID was

the most widely used solution in other areas with similar asset tracking purposes. The more

advanced and active technologies such as Wi-Fi, UWB and BLE is mostly applied in areas where asset

location tracking is important to have in real time, whereas for this project registration of the

products are only needed at certain events.

Dealing with PEDs that emit radio signals was not considered a major problem in this project.

Regulation differences between counties is only an issue for RFID. Moreover, the regulations only

cover RFID tags and not readers, which means that a unified distribution of drill bits and other

equipment can be applied. The readers are however restricted to different frequencies depending on

region. The logistics of readers must therefore be transparent to ensure that no regulations are

violated. In some cases, this can be tricky if readers are moved between regions. This can after all be

Page 67: Successful Digital Product identification

59

considered a lesser problem, since there will be a lot less readers in circulation in relation to other

products.

From comparing different RFID readers and discussions with the Pepperl+Fuchs sales technician, we

learned that reading possibilities were much dependent on output power of the reading device.

Therefore, the drill bits with inserted LF and UHF RFID tags were tested with Pepperl -Fuchs strongest

reader, IUH-F192-V1-FR1, in hope to achieve greater reading distances. Despite this, the smaller and

weaker reader IPH-18GM-V1 gave better readings of the tags. This is thought because since the

reader is smaller it has better accessibility and can therefore reach closer to the tags than the larger

reader could. Moreover, the sales technician explained that the smaller reader emits a more focused

magnetic field.

When testing the readability of RFID tags from Xerafy, it soon became clear that read ranges were

lower than the ones stated in the suppliers' specifications. This was a major drawback since the

approaches including RFID relied much on good reading possibilities.

From the theoretical research we had previously learned that UHF tags can be amplified by utilizing

metal surfaces as mirrors to reflect the radio waves to their advantage. From reading test with the

Pepperl+Fuchs sales technician, we also discovered that the Xerafy Dot-iN XS had significantly

enhanced reading distance possibilities when placed directly onto a metal surface. Our theory is that

the metal surface behaves like an extension of the tags antenna when in direct contact with the UFH

tags. The silicone damping solution between the tag and metal surface of the drill bits therefore had

a diminishing effect on the readability. For future test it might be better to have UHF tags in direkt

contact with the drill bit surfaces.

In the drilling test, the Xerafy Dot-iN XS with placement in the shallow top positions had the best

survivability. This might be because of the protection received from the equipment surrounding the

bits in combination with shock forces from a beneficial direction. It is unclear if the silicone medium

had the intended damping effect since the tags that failed did so because the fell out of their holes

and were lost. Moreover, the readings were made with some difficulty probably because of silicone

between the tag and the metal surface.

The focus for this project was on drill bits for down-the-hole blast mining applications which is the

most extreme environment for inserted tags. Therefore, the results gathered from the field test gives

an understanding of implementation possibilities of the same type of tag in other products and

applications.

The respondents on the survey agreed that performance monitoring is more or less important for

customers, meaning a positive attitude from customers towards implementation of new methods is

likely if performance monitoring can be improved. An interesting comment however from one of the

business line managers based in Africa was that the volume mining customers valued performance

monitoring more than quarry customers, which are more attracted by price and support.

The survey showed very good and verifying results as many of the parameters which were selected

as 'must have' of 85% of the respondents, were parameters which could be achieved from digital

product identifications. Service life can be determined by connecting product ID with drilling

parameters like actual drill time. Drilling method could be determined by knowing what type of

product/products are mounted in the rig. Drill bit OD for new bi ts and product description can

directly be retrieved from knowing the product ID. This shows that this project is of high interest and

further justifies future work on this project.

Page 68: Successful Digital Product identification

60

Only 30% of the survey respondents answered that they need updates in real time. This means that if

large data amounts become a problem in the future, there might be a possibility to be more selective

of who needs real time data.

The survey was sent out to the global mail group which includes all Business Line Manager. Out of a ll

recipients, 20 chose to respond to the survey. The credibility of the results from the survey can be

discussed due to the low response rate. However, because of the wide variety in background of the

respondents, the results can be seen as a statistical representation.

According to the data collection model, we have suggested the data will be connected from the

different systems in a late stage of the process. The information regarding the ID on product and rig

will be joined on site but the performance data will be connected to this ID data in the interface later

on. In this way we will only store the raw data and join this data together when and how the user

wants it to be presented in the interactive user interface. One benefit of just storing the raw data is

that it will be easy to adjust algorithms for calculating different KPIs and process machine learning

algorithms to for example understand when the rig is drilling and when a rod change happens.

The more expensive tag technologies like BLE and UWB tend to cost more and therefore some kind

of recycling might be solution to reduce costs. The quick release clamps introduced in chapter 10.2.1

opens up a wider arrange of options to join products with tags for digital identification of products.

The clamps can be fitted with more complex tracking devices as a result of lower shock resistance

requirements in combination with larger surface attachment. Since the quick release clamps are not

product specific, they can be reused to other products once products reach the endings of their

lifecycles, meaning that more expensive tags could be acquired while lowering total costs. Larger

RFID tags with greater emitting strengths can be fitted onto the clamps for quick and easy

identification of products.

The clamps could in theory be fitted with BLE devices if they are sturdy enough. This would be a great

advantage in logistical appliances as mesh networks could be formed and instantly provide valuable

overviews of current stock levels. The Bluvision BLE tags reviewed previously in this report, have

tamper-proof functions which alerts the owner when the tag is detached from the surface of a

product, which could be useful as an automatic indication of mounting/dismounting bits on/off the

rigs.

UWB tags could be fitted onto the quick release clamps to achieve great locating capabilities if

products are lost at site. Dig sites in Australia have in previous occasions experienced drill bits being

lost in drill holes only to be found later on destroying graveling machinery. This could be prevented

by locating the bits using the UWB tags. However, if the drill bits are lost during drilling when the tags

have been detached from the bits, the UWB will not do much help.

The RPN analysis indicated that the approaches with the largest failure possibilities and

consequences are related to inserted RFID and surface inscription. The acceptance level of the RPN

might be discussed however a value of 24 and above was considered alarming in this report. These

failure modes should be considered before choosing one of the methods to investigate if they can be

reduced. The RPN analysis is however based on current method setup conditions and estimations

and will show a different result if the setup is changed. If for example a stronger bindi ng medium

would be used in the inserted tag approach, there will of course be no chance of the tag turning and

thus lowering the RPN number for inserted tags.

If a higher level of transparency scanning could be made before and after a reparation in order to

understand where the product is in the chain. This is, however, not compulsory for understanding

Page 69: Successful Digital Product identification

61

the product performance but it could serve as a part of understanding the duration of service on

different products on different sites.

The four recognized approaches are provided as basis for further decision making. Since many factors

must be considered for a project in this magnitude, it is better to have alternatives. If one

approaches might for instance be disregarded because of production limitations, too large

investment or by customer opposition, the other presented approaches might still be applicable. This

report should therefore serve as a basis for future decision making.

This area of automatic identification technology is in fast development. In the close future it is likely

to see reduced prices in components or possibly new technologies invented for tagging. With this in

mind, it might be relevant to reconsider this project in the future, to check if circumstances have

changed.

No calculations on the dynamic system of damping material have been made due to its complexity. A

too small cylinder of silicone will not have the damping abilities which are expected. A too large

cylinder of silicone will have better shock absorbing properties although i t might create mechanical

resonance and cause violent oscillations which can break, turn or loose the tag. The optimal cylinder

of silicone damping could in theory be calculated as any Newtonian fluid subjected to forces.

However, due to the complexity and unpredictability of the system, heavy simulations and extensive

research and more resources would be needed for a valid result. KTH professors within fluid

mechanics were contacted for their input regarding this matter although none of the recipients

chose to answer, probably because they also found it to complex address. Therefore, the test was

designed with different hole depths to give an indication of possible adjustment.

The final comparison presented in chapter 13.1 was based on a debate with our supervisor for this

project. For example: The re-attachable concept is very feasible for a big range of the products

although needs some manual interaction from the operator. To minimize the risk of operational

errors when taking off or putting on tags on products the operator needs to be aware of the

connection status between the tag and the RCS with some type of notification system. With the

learnings throughout this project, along with our supervisors' broad expertise, the comparison should

provide a realistic result. With this said, the comparison might show other results if the debate would

in the future include other participants with their view and judgement.

14.2 Conclusion The project concludes on four different approaches for digital identification of products:

1. Inserted tags

2. Re-attachable tags

3. Adhesive labels

4. Surface inscription

The first three tagging approaches includes joining products with other equipment. For this it was

concluded that RFID shows most potential in real implementation.

With all aspects considered, Re-attachable tags should be most promising for further research.

Moreover, due to variations in size and mechanical characteristics of other products within Epiroc’s

rock drilling tools, some tools might be limited to some solutions. Therefore, a combination of two

approaches might be an optimal solution.

In the PoC, the tags placed in the top positions showed the best survivability. It was however unclear

if the damping medium had any effect since the failed tags were lost in the dril led hole.

Page 70: Successful Digital Product identification

62

Xerafy Dot-iN XS was selected as the most promising tag to insert into drill bits. Greater reading

distances were achieved by placing the tags on metal, however only about 30 cm was achieved in

comparison with the 1 m according to the product specifications.

Some of the products characteristics could make it impossible to apply a certain method to a certain

product. Figure 51 shows the amount of the product range on which the different methods could be

suitable for, where adhesive labels cover the entire product range.

Figure 51. Amount of the product range which is suitable for certain methods.

14.3 Future work With automatic identification and data capture of the relevant performance indicators it will be

possible to gather information on general performance in different situations. This information will in

the first state assist stakeholders with offline decision making in order to better understand the

products. However, in future work real time data transfer and data models could provide automated

decision making possible. An automated decision-making system could, in the future, both retrieve

and send information to the rig in order to provide decision making on site instant. However, to

make this possible the identification method needs to be integrated without any manual handling

and the connectivity and data transfer need to be state of the art. The ongoing development on 5G

could be a possible technology within the connectivity and data transfer to make instant transfers to

a central data source.

The central data source along with central data models with technology such as machine learning will

therefore be able to act on historical data to make the best possible decision in certain situation.

Therefore, big data handling will be a factor which need to be adopted for instant actions on site.

Full transparency throughout the rig and tools lifetime will also give an assessment of when a

product is use in the right way or not. This insight can help improve the assistance work to

customers.

So, in future work these could be possible questions to answer:

- How could a technology such as 5G provide instant transfer and connectivity of data to and

from a site?

- How could performance monitoring be increased with new sensor technologies?

- What is the requirement for automated big data capturing and sending?

- Which technologies could be feasible for data modeling in order to process large data

amount within reasonably speed? Machine learning?

- How could the architecture of a feasible automated decision-making system be?

Adhesive

Re-attachable

Surface inscription

Inserted

Page 71: Successful Digital Product identification

63

For a future test of inserting tags into drill bits, the design should be as illustrated in figure 52 below.

This strategic positioning in combination with a much stronger sealant to keep the tag in its position

should have better survivability and readability.

Figure 52. Illustration of how Xerafy Dot-iN XS should be placed for future tests.

[mm]

Page 72: Successful Digital Product identification

64

References Al-ofeishat, H.A. & Rababah, M.A.A.A.L., 2012. Near Field Communication ( NFC ). IJCSNS

International Journal of Computer Science and Network Security , 12(2), pp.93–99.

Alipay, 2018. Alipay, China’s leading third-party online payment solution. Available at: https://global.alipay.com/service/transaction_QR_Code/1 [Accessed March 20, 2018] .

Apple, 2018. Apple Pay security and privacy overview. Available at: https://support.apple.com/en-us/HT203027 [Accessed March 13, 2018].

Asif, Z. & Mandviwalla, M., 2005. Integrating the Supply Chain with RFID: A Technical and Business Analysis. Communications of the Association for Information Systems, 15, pp.393–427.

Atlas Copco, 2014. Underground mining - A global review of methods and practices,

Baker, N., 2005. ZigBee and Bluetooth: strengths and weaknesses for industrial applications. Computing and Control Engineering, 16(2), pp.20–25. Available at: http://digital-library.theiet.org/content/journals/10.1049/cce_20050204.

Bluvision, 2017. Specification Hardware: BEEKs Mini Tamper-proof. , pp.1–4. Available at: https://bluvision.com/wp-content/uploads/2017/12/Specs-BEEKs-Mini-Tamper-proof-1.pdf [Accessed April 17, 2018].

Curran, K., Millar, A. & Mc Garvey, C., 2012. Near field communication. , 2(June 2012), pp.371–382.

Datorama, 2018. Z-BAND DIRECT. Available at: http://datorama.se/etikettskrivare-1/forbrukningsmaterial/zebra-wristbands/z-band-direct-infant-white.html [Accessed May 28, 2018].

De, B., 2017. API Management, Available at: http://link.springer.com/10.1007/978-1-4842-1305-6_2.

Decawave Ltd., 2015. APR001 Application Note - UWB Worldwide Regulations. Available at: https://www.decawave.com/sites/default/files/apr001_uwb_worldwide_regulations_summary.pdf [Accessed April 14, 2018].

Deloitte, 2015. Industry 4.0. Challenges and solutions for the digital transformation and use of exponential technologies. Deloitte, pp.1–30. Available at: https://www2.deloitte.com/content/dam/Deloitte/ch/Documents/manufacturing/ch-en-manufacturingindustry-4-0-24102014.pdf [Accessed April 16, 2018].

Denso ADC, 2011. QR Code Essentials. Denso Adc, pp.1–12. Available at: http://www.nacs.org/LinkClick.aspx?fileticket=D1FpVAvvJuo=&tabid=1426&mid=480 [Accessed April 4, 2018].

Easa Europa, 2018. Portable Electronic Devices (PED) on board. Available at: https://www.easa.europa.eu/easa-and-you/passengers/portable-electronic-devices-ped-board [Accessed April 18, 2018].

Epiroc, 2018. Epiroc Web Page. Available at: https://www.epiroc.com/en-us [Accessed April 16, 2018].

Erasala, N. & C. Yen, D., 2002. Bluetooth technology: a strategic analysis of its role in global 3G wireless communication era. Computer Standards & Interfaces, 24, pp.193–206.

Etchmark, 2018. Dot Peening / Pin Marking. Available at: http://www.etchmark.co.uk/products/dot-peening/ [Accessed April 24, 2018].

ETSI, 2017. EN 302 065-5 - V1.1.1 - Short Range Devices (SRD) using Ultra Wide Band technology

Page 73: Successful Digital Product identification

65

(UWB); Harmonised Standard covering the essential requirements of article 3.2 of Directive 2014/53/EU; Part 5: Devices using UWB technology onboard aircraft. , 1, pp.1–29. Available at: http://www.etsi.org/standards-search.

ETSI, 2018. ETSI: Ultra Wide Band. Available at: http://www.etsi.org/technologies-clusters/technologies/radio/ultra-wide-band [Accessed May 15, 2018].

European Commission, 2013. Amending Decision 2006/771/EC on harmonisation of the radio spectrum for use by short-range devices and repealing Decision 2005/928/EC. Official Journal of the European Union, p.20.

European Radiocommunications Committee (ERC) & European Conference of Postal and Telecommunications Administrations (CEPT), 2000. Interference From Industrial, Scientific and Medical (Ism) Machines. , (June), p.15. Available at: http://www.erodocdb.dk/Docs/doc98/official/pdf/REP083.PDF.

Extronics Ltd, 2016. T2-EB Wi-Fi Active RFID Tag. Available at: www.aeroscout.com/files/AeroScout T2-EB Tag Data Sheet.pdf [Accessed April 4, 2018].

Faragher, R. & Harle, R., 2015. Location fingerprinting with bluetooth low energy beacons. IEEE Journal on Selected Areas in Communications, 33(11), pp.2418–2428.

Floerkemeier, C. & Lampe, M., 2005. RFID middleware design: addressing application requirements and RFID constraints. Proceedings of the 2005 Joint Conference on Smart Objects and Ambient Intelligence: Innovative Context-aware Services: Usages and Technologies, (october), pp.219–224. Available at: http://doi.acm.org/10.1145/1107548.1107603.

George, I., 2015. QR Codes Utilized In Diverse Industries. Available at: http://www.scanlife.com/blog/2015/07/qr-codes-utilized-in-diverse-industries/#sthash.edD6OI9C.dpbs [Accessed April 5, 2018].

Goldtouch, 2014. How to Stop Bluetooth Interference From Messing With Your Other Devices. Available at: https://www.goldtouch.com/stop-bluetooth-interference-messing-devices/ [Accessed May 14, 2018].

Gomez, C., Oller, J. & Paradells, J., 2012. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors (Switzerland), 12(9), pp.11734–11753.

Hastie, T., Tibshirani, R. & Friedman, J., 2009. The Elements of Statistical Learning, Available at: https://link.springer.com/content/pdf/10.1007%2F978-0-387-84858-7.pdf%0Ahttp://link.springer.com/10.1007/978-0-387-84858-7.

Husqvarna Group, 2018. Husqvarna pilots pay-per-use and brings chainsaws and hedge trimmers into sharing economy. Available at: http://www.husqvarnagroup.com/en/node/3944 [Accessed March 13, 2018].

International Standards Organisation, 2015. Information technology -- Automatic identification and data capture techniques -- QR Code bar code symbology specification. ISO Standards, 2015, p.Annex I I.3. Available at: https://www.iso.org/obp/ui/#iso:std:iso-iec:15420:ed-2:v1:en%5Cnhttp://www.iso.org/iso/catalogue_detail.htm?csnumber=62021.

International Telecommunication Union, 2012. Overview of the Internet of things. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks - Frameworks and functional architecture models, p.22.

iq-parts-shop, 2018. SVS Quick Release Clamps “ZY.” Available at: https://www.iq-parts-shop.com/en/norma-svs-quick-release-clamps-zy.html [Accessed May 28, 2018].

Page 74: Successful Digital Product identification

66

Jespen, T., 2016. ATEX — Explosive Atmospheres Risk Assessment, Control and Compliance H. Pham, ed., Springer.

Johansson, H., 2013. Elektroteknik, KTH.

Kemikalieinspektionen, 2016. RoHS-direktivet. KEMI. Available at: https://www.kemi.se/global/faktablad/faktablad-rohs-direktivet-2018.pdf [Accessed April 4, 2018].

Kieseberg, P. et al., 2010. QR code security. Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia - MoMM ’10, p.430. Available at: http://portal.acm.org/citation.cfm?doid=1971519.1971593.

Lee, J.S., Su, Y.W. & Shen, C.C., 2007. A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. IECON Proceedings (Industrial Electronics Conference) , pp.46–51.

Li, S. et al., 2006. Radio frequency identification technology: applications, technical challenges and strategies. Sensor Review, 26(3), pp.193–202. Available at: http://www.emeraldinsight.com/doi/10.1108/02602280610675474.

Lx, X.H. et al., 2008. Recognition of QR Code with mobile phones. 2008 Chinese Control and Decision Conference, pp.203–206. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4597299.

MacDougall, W., 2013. Industrie 4.0. Germany Trade & Invest Print, p.Online-Ressource (XII, 144 S. 71 Abb, online resou. Available at: http://www.inovasyon.org/pdf/GTAI.industrie4.0_smart.manufact.for.future.July.2014.pdf [Accessed April 16, 2018].

Madjar, H.M., 2014. International, regional and national regulation of SRDs ISM Bands. ITU Workshop on Short Range Devices and Ultra Wide Band, (June), pp.1–35.

Marc, L.D., 2007. UWB Regulations Regulatory Framework. , (July), pp.3–5. Available at: https://www.itu.int/ITU-D/finance/spectrum_management/Kyiv/Le Devendec-EN.PDF [Accessed April 14, 2018].

Measuring the Information Society Report, 2005. 5 The Internet of Things : data for development. , pp.147–171.

Michelinmedia, 2017. MICHELIN LEADS INNOVATION WITH RFID TECHNOLOGY AND UPGRADES TO SERVICE OFFERS THAT DRIVE VALUE FOR FLEETS. Available at: https://michelinmedia.com/pages/blog/detail/article/c/a590/ [Accessed May 16, 2018].

Mitchell, N., 2013. The Art and Science of UHF Passive Tag Design The Art and Science of UHF Passive Tag Design. , p.12.

Mobilaris, 2018. Mobilaris Web Site. Available at: https://www.mobilaris.se/ [Accessed May 14, 2018].

Morrison, D.C., 2011. US Frequency Allocations. Available at: https://upload.wikimedia.org/wikipedia/commons/c/c7/United_States_Frequency_Allocations_Chart_2016_-_The_Radio_Spectrum.pdf [Accessed April 4, 2018].

Nordea, 2018. OCR-skannern i Mobilbanken. Available at: https://www.nordea.se/privat/produkter/mobilbank-internetbank/ocr-skannern-i-mobilbanken.html [Accessed May 15, 2018].

Omni-ID, 2018. Custom Solutions. Available at: https://www.omni-id.com/custom-rfid/ [Accessed

Page 75: Successful Digital Product identification

67

March 21, 2018].

Omni-ID, 2009. Hands-Free RFID Tool Tracking System Delivers Rapid ROI. omni-id. Available at: https://www.omni-id.com/pdfs/rfid_asset_tracking_tools_us.pdf [Accessed April 14, 2018].

Penner, R., 2003. The physics of golf. REPORTS ON PROGRESS IN PHYSICS, 66, pp.131–171. Available at: http://raypenner.com/golf-physics.pdf [Accessed April 12, 2018].

Pepperl+Fuchs, 2018a. IC-KP2-2HB17-2V1D IDENTControl Compact Technical data. Available at: https://files.pepperl-fuchs.com/webcat/navi/productInfo/edb/200877_eng.pdf?v=20180530000212 [Accessed May 28, 2018].

Pepperl+Fuchs, 2018b. IPC02-3GL. , p.9091. Available at: https://files.pepperl-fuchs.com/webcat/navi/productInfo/edb/231659_eng.pdf?v=20180423144534 [Accessed May 28, 2018].

Pepperl+Fuchs, 2018c. IPC03-10. , p.9091. Available at: https://files.pepperl-fuchs.com/webcat/navi/productInfo/edb/255247_eng.pdf?v=20180423144539 [Accessed May 28, 2018].

Pepperl+Fuchs, 2018d. IPH-18GM-V1. , p.9091. Available at: https://files.pepperl-fuchs.com/webcat/navi/productInfo/edb/121115_eng.pdf?v=20180426142155 [Accessed May 28, 2018].

Pepperl+Fuchs, 2018e. IUH-F190-V1-EU. , pp.1–5. Available at: https://files.pepperl-fuchs.com/webcat/navi/productInfo/edb/230471_eng.pdf?v=20180602000157 [Accessed May 28, 2018].

Pepperl+Fuchs, 2018f. IUH-F192-V1-FR1. , pp.1–5. Available at: https://files.pepperl-fuchs.com/webcat/navi/productInfo/edb/256079_eng.pdf?v=20180423144539 [Accessed May 28, 2018].

Persson, K.., Manivannan, D. & Singhal, M., 2005. Bluetooth scatternets: criteria, models and classification. Ad Hoc Networks, 3(6), pp.777–794.

Peternikolow, 2012. 1D, 2D & 3D Barcodes. Available at: http://www.mobiliodevelopment.com/1d-2d-3d-barcodes/#gref [Accessed April 12, 2018].

Polymerteknik, 2018. Ingjutning. Available at: http://polymerteknik.com/category/76-ingjutning.html [Accessed May 28, 2018].

RFID Journal, 2018. RFID Frequently Asked Question. Available at: http://www.rfidjournal.com/faq/show?62 [Accessed March 14, 2018].

RFID4U, 2018. Basics – RFID Regulations. Available at: https://rfid4u.com/rfid-basics-resources/basics-rfid-regulations/ [Accessed April 16, 2018].

Rizwan, Z., 2018. https://scanova.io/blog/blog/2017/06/06/qr-codes-china/. Available at: https://scanova.io/blog/blog/2017/06/06/qr-codes-china/ [Accessed March 20, 2018].

Roberti, M., 2010. Wal-Mart Takes a New Approach to RFID Wal-Mart Takes a New Approach to RFID. , pp.1–2. Available at: http://www.rfidjournal.com/articles/pdf?7756 [Accessed March 16, 2018].

Samsonek, J. & Puype, F., 2017. RoHS and Spectroscopy 3rd ed., Elsevier Ltd. Available at: http://linkinghub.elsevier.com/retrieve/pii/B9780124095472121006.

Sealing Technology, 2017. IP69K rating for LabTecta OP. Sealing Technology, 2017(11), p.14. Available

Page 76: Successful Digital Product identification

68

at: http://linkinghub.elsevier.com/retrieve/pii/S1350478918300321 [Accessed April 5, 2018].

Sempler, K., 2005. Så funkar rfid-taggarna. Ny Teknik. Available at: https://www.nyteknik.se/teknikrevyn/sa-funkar-rfid-taggarna-6370691 [Accessed March 5, 2018].

Standard, S.E. & Specifications, E., 2001. Environmental Conditions. , (November).

SVENSK STANDARD, 2014. SS-EN 60529 Degrees of protection provided by enclosures (IP Code). , (148902), pp.1–47.

Swedberg, C., 2015. Ford Motor Co. Uses Omni-ID 64-kbit Tag to Monitor Engine Production. RFIDJournal.com, pp.8–10. Available at: http://www.rfidjournal.com/articles/view?13040 [Accessed April 14, 2018].

Swedberg, C., 2012. Statoil to Use RFID to Manage Drill Pipes at Offshore Rigs. Available at: http://www.rfidjournal.com/articles/view?9654 [Accessed April 3, 2018].

Technology Solutions, 2018. 1128 BLUETOOTH® UHF RFID READER SPECIFICATIONS. , (December), pp.2–5. Available at: https://www.tsl.com/wp-content/uploads/1128-Bluetooth-Handheld-UHF-Reader-Datasheet.pdf [Accessed May 28, 2018].

TELESIS, 2006. 2-D , QR and UID Code Marking and Verification. , p.2006. Available at: http://telesis.com/pdf/2D_and_UID_Code.pdf [Accessed May 9, 2018].

Tire Business, 2017. Michelin adding RFID to all truck tires - Tire Business. Available at: http://www.tirebusiness.com/article/20170302/NEWS/170309984/michel in-adding-rfid-to-all-truck-tires [Accessed February 27, 2018].

Tricker, R. & Tricker, S., 1999. Environmental Requirements for Electromechanical and Electrical Equipment, Elsevier.

Turckvilant, 2018. Critical shipment tracking Automated inbound processes with RFID. Available at: https://turckvilant.com/success_story/sandvik/ [Accessed April 3, 2018].

Want, R., 2006. An Introduction to RFID Technology. , (Cdc), pp.25–33.

Wilding, R.D. & Delgardo, T., 2004. RFID Demystified: Part 3. Company Case Studies. Logistics and Transport Focus, 6(5), pp.32–42.

Xerafy, 2011. Dot XS. Available at: http://www.xerafy.com/en/catalogue/product/dot-in-xs/3 [Accessed April 30, 2018].

Zebra Technologies, 2012. Dart UWB Technology Datasheet. Available at: https://www.zebra.com/content/dam/zebra/product-information/en-us/brochures-datasheets/location-solutions/dartuwb-tech-datasheet-en-us.pdf%5Cnhttp://www.zebra.com/content/dam/zebra/product-information/en-us/brochures-datasheets/location-solutions/dartuwb- [Accessed May 7, 2018].

Zebra Technologies, 2018a. DartTag Portfolio. , pp.3–4. Available at: https://www.zebra.com/content/dam/zebra/product-information/en-us/brochures-datasheets/location-solutions/dart-tag-portfolio-datasheet-en-us.pdf [Accessed April 19, 2018].

Zebra Technologies, 2018b. DS3608-SR / DS3678-SR Ultra-Rugged Scanner. , pp.2–5. Available at: https://www.zebra.com/content/dam/zebra_new_ia/en-us/solutions-verticals/product/barcode-scanners/ultra-rugged-scanners/3600-series-ultra-rugged-industrial-scanners/ds36x8-sr-ultra-rugged-standard-range/spec-sheet/ds36x8-sr-specification-sheet-en-us.pdf [Accessed May 28, 2018].

Page 77: Successful Digital Product identification

69

Zebra Technologies, 2018c. RFID LABELS. Available at: https://www.zebra.com/gb/en/products/supplies/rfid-labels-tags.html [Accessed May 28, 2018].

Zebra Technologies, 2016. voestalpine Expedites Search And Rescue Time With Real -Time Location Technology Tracks People And Assets When It Matters Most About voestalpine. Available at: https://www.zebra.com/content/dam/zebra/success-stories/en-us/pdfs/voestalpine-en-us.pdf [Accessed April 17, 2018].

Zebra Technologies, 2018d. ZQ320 Mobile Label and Receipt Printer. Available at: https://www.thebarcodewarehouse.co.uk/Documents/Zebra/Zebra-ZQ320-Datasheet.pdf [Accessed April 17, 2018].

Zebra Technologies, 2018e. ZQ520 RFID Mobile Printer. Available at: https://www.zebra.com/content/dam/zebra_new_ia/en-us/solutions-verticals/product/Printers/RFID Printers/zq520-rfid-printer/spec-sheet/zq520-rfid-product-spec-sheet-en-us-a4.pdf [Accessed April 17, 2018].

Page 78: Successful Digital Product identification

70

Appendix

1 Tag comparison One part of this project is to investigate which type of tags and readers are available on the market.

Moreover, this comparison based the key parameter which was needed for the most opti mal tag.

The figure below shows different technologies and tags with technical specification.

Bra

nd

Om

ni-

idO

mn

i-id

Co

nfi

de

xX

ERA

FY

Om

ni-

IDC

on

fid

ex

Blu

visi

on

Glo

bal

-tag

Pro

du

ctEx

o 4

00Fi

t 22

0Ir

on

sid

e M

icro

DO

T-IN

XS

Ad

ep

t 40

0X

-bo

ltB

EEK

S M

ini T

amp

er

Dis

c B

eac

on

y

Typ

eP

assi

ve U

HF

RFI

DP

assi

ve U

HF

RFI

DP

assi

ve U

HF

RFI

DP

assi

ve U

HF

RFI

DP

assi

ve U

HF

RFI

DP

assi

ve U

HF

RFI

DB

LEB

LE

Ch

ip (

IC T

ype)

Ali

en

Hig

gs 3

Ali

en

Hig

gs 3

Im

pin

j Mo

nza

4Q

TA

lie

n H

iggs

3A

lie

n H

iggs

3Im

pin

j Mo

nza

4Q

T-

No

rdic

518

22

F

req

866-

868

MH

z(EU

) 8

66–8

68 M

Hz

(EU

)EU

865

-869

MH

z

US

902-

928

MH

z

866-

868

MH

z (E

U)

902-

928

MH

z (U

S)

866-

868

(EU

)

902-

928

(US)

ETSI

865

-869

MH

z

FCC

902

-928

MH

z

2,4

GH

z2,

4 G

Hz

S

ho

ckM

IL S

TD 8

10-G

MIL

STD

810

-GR

TCA

DO

-160

Re

v E

7.2

ATE

X c

ert

ifie

d?

MIL

STD

810

F-

--

V

ibra

tio

nM

IL S

TD 8

10-G

MIL

STD

810

-G J

ESD

22-B

103B

RTC

A D

O-1

60 R

ev

E 8.

5

ATE

X c

ert

ifie

d?

MIL

STD

810

F-

--

In

gre

ss P

rote

ctio

nIP

68IP

68IP

68IP

68IP

68IP

68IP

67IP

54

T

emp

era

ture

-20

to +

235°

C-3

5°C

to

+85

°C-4

0 to

+85

°C–2

0°C

to

+85

°C-2

0°C

to

+70

°C-3

0°C

to

+77

°C-1

5°C

to

+ 5

0°C

Si

ze37

× 1

4 ×

5,9

mm

7,8

x 6.

8 x

2,7

mm

incl

ud

es

IC b

um

p

27 x

27

x 5,

5 m

6 x

2,5

mm

36 x

25

x 13

,5 m

22

x 20

mm

Ø 3

4,2

x 8,

35 m

31

x 8,

4 m

m

W

eig

ht

5,7

g0,

6 g

4,3

g0.

34 g

58g

21 g

28

g-

    L

ifet

ime

Pas

sive

Pas

sive

Pas

sive

Pas

sive

Pas

sive

Pas

sive

4 ye

ars

1 ye

ar

    C

ost

Est

ima

te (

SEK

)96

,64

kr56

,51

kr72

,07

kr42

,59

kr11

8,76

kr

156,

00 k

r15

5,61

kr

182,

16 k

r

C

om

men

tsO

n m

eta

lO

n m

eta

lO

n m

eta

lIn

me

tal

On

me

tal

In m

eta

lSe

nso

rs c

om

pat

ible

    R

an

ge

4m/2

m2,

2/1,

4m

EU: U

p t

o 5

m

US:

Up

to

4 m

1,5m

/1m

EU: U

p t

o 3

m/1

.2m

US:

Up

to

4.5

m/1

,8m

Up

to

2 m

150

m90

m

Bra

nd

HID

Xe

rafy

Pe

pp

erl

-Fu

chs

Pe

pp

erl

-Fu

chs

HID

Extr

on

ics

Zeb

ra

Pro

du

ctIr

on

Tag

206

FX

plo

rer

IPC

02-3

GL

IPC

03-1

0Lo

giTa

g 16

1T2

Dar

tTag

Typ

eP

assi

ve U

HF

RFI

DP

assi

ve U

HF

RFI

DP

assi

ve L

F R

FID

Pas

sive

LF

RFI

DP

assi

ve H

F R

FID

Wi-

fiA

ctiv

e U

WB

Ch

ip (

IC T

ype)

Mo

nza

XA

lie

n H

iggs

-3-

EM44

50 T

itan

ICO

DE

SLIX

(2)

-

-

F

req

860-

960

MH

z

(W

orl

dw

ide

)

902-

928

MH

z (U

S)

865-

868

MH

z (E

U)

125

kHz

125

kHz

13,5

6 M

Hz

2.4

GH

z, 1

25 k

Hz

6.35

- 6

.75

GH

z

S

ho

ckIE

C 6

8.2.

6

[10

g, 1

0 to

200

0 H

z,

3 ax

is, 2

.5 h

]

MIL

-STD

-810

FIE

C 6

8-2-

6

-

IEC

68.

2.29

[40

g, 1

8ms,

6 a

xis,

2000

x]

--

V

ibra

tio

nIE

C 6

8.2.

29

[40

g, 1

8 m

s, 6

axi

s,

2000

tim

es]

MIL

-STD

-810

FIE

C 6

8-2-

27

-

IEC

68.

2.6

[10g

, 10…

2000

Hz,

3

axis

, 2.5

h]

--

In

gre

ss P

rote

ctio

nIP

68/I

P69

K (

30 s

ek)

IP 6

9KIP

68IP

67IP

68IP

65IP

67

T

emp

era

ture

-40°

to

+85

° C

-40°

C t

o +

85°C

-40°

to

+85

° C

-25°

to

+70

° C

-25°

to

+85

° C

-30°

C t

o +

75°C

-40°

C t

o 7

0°C

Si

ze31

x 3

1 x

6,9

mm

Ø 2

8,3

x 8,

13

x 3,

15 m

13

x 3,

15 m

16

x 3

mm

62 x

40

x 17

mm

Ø40

mm

x 2

0 m

m

W

eig

ht

13 g

25.4

g0,

22 g

1 g

1 g

35g

20 g

    L

ifet

ime

War

ran

ty: 2

Ye

ars

Pas

sive

(50

ye

ars)

Pas

sive

Pas

sive

Pas

sive

4 ye

ars

7 ye

ars

    C

ost

Est

ima

te (

SEK

)37

,55

kr45

,05

kr26

,04

kr-

7,29

kr

65,0

0 kr

-

C

om

men

tsIm

pac

t: IE

C 6

2262

-

IK06

Axi

al /

Rad

ial

Forc

e: 8

00 N

/ 5

00

N, 1

0 se

c

In m

eta

lIn

me

tal

In m

eta

l

--

-

    R

an

ge

2 m

1,5m

--

34 c

m20

0m(o

ut)

/80m

(in

)20

0m

Page 79: Successful Digital Product identification

71

2 Matrix barcode developed In order to test the feasibility of a more suitable two-dimensional barcode, the below code was made

to calculate the four different quadrants separate based on the placement of the borders. The

algorithm is not optimized, and the code is a proof of concept without a separate reading device to

decode the algorithm.

Option Explicit Sub CheckCode() Dim i As Long Dim j As Long 'Control only the B2:C3 cube Dim BottomGreen As Long Dim LeftGreen As Long Dim DigUpGreen As Long Dim DigDownGreen As Long Dim BottomYellow As Long Dim LeftYellow As Long Dim DigUpYellow As Long Dim DigDownYellow As Long Dim BottomBlue As Long Dim LeftBlue As Long Dim DigUpBlue As Long Dim DigDownBlue As Long Dim BottomRed As Long Dim LeftRed As Long Dim DigUpRed As Long Dim DigDownRed As Long Dim Green As Long Dim Yellow As Long Dim Blue As Long Dim Red As Long CodeVBA.Cells(1, 3).ClearContents 'Green BottomGreen = 1 LeftGreen = 2 DigUpGreen = 4 DigDownGreen = 8 For i = 2 To 2 For j = 2 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeBottom).LineStyle <> xlNone Then BottomGreen = BottomGreen + 1 End If Next j Next i

Page 80: Successful Digital Product identification

72

For i = 2 To 3 For j = 3 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeLeft).LineStyle <> xlNone Then LeftGreen = LeftGreen + 1 End If Next j Next i For i = 2 To 3 For j = 2 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalUp).LineStyle <> xlNone Then DigUpGreen = DigUpGreen + 1 End If Next j Next i For i = 2 To 3 For j = 2 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalDown).LineStyle <> xlNone Then DigDownGreen = DigDownGreen + 1 End If Next j Next i 'End green 'Yellow BottomYellow = 1 LeftYellow = 2 DigUpYellow = 4 DigDownYellow = 8 For i = 4 To 4 For j = 2 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeBottom).LineStyle <> xlNone Then BottomYellow = BottomYellow + 1 End If Next j Next i For i = 4 To 5 For j = 3 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeLeft).LineStyle <> xlNone Then LeftYellow = LeftYellow + 1 End If Next j Next i For i = 4 To 5 For j = 2 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalUp).LineStyle <> xlNone Then DigUpYellow = DigUpYellow + 1 End If

Page 81: Successful Digital Product identification

73

Next j Next i For i = 4 To 5 For j = 2 To 3 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalDown).LineStyle <> xlNone Then DigDownYellow = DigDownYellow + 1 End If Next j Next i 'End Yellow 'Blue BottomBlue = 1 LeftBlue = 2 DigUpBlue = 4 DigDownBlue = 8 For i = 2 To 2 For j = 4 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeBottom).LineStyle <> xlNone Then BottomBlue = BottomBlue + 1 End If Next j Next i For i = 2 To 3 For j = 5 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeLeft).LineStyle <> xlNone Then LeftBlue = LeftBlue + 1 End If Next j Next i For i = 2 To 3 For j = 4 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalUp).LineStyle <> xlNone Then DigUpBlue = DigUpBlue + 1 End If Next j Next i For i = 2 To 3 For j = 4 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalDown).LineStyle <> x lNone Then DigDownBlue = DigDownBlue + 1 End If Next j Next i 'End Blue 'Red BottomRed = 1

Page 82: Successful Digital Product identification

74

LeftRed = 2 DigUpRed = 4 DigDownRed = 8 For i = 4 To 4 For j = 4 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeBottom).LineStyle <> xlNone Then BottomRed = BottomRed + 1 End If Next j Next i For i = 4 To 5 For j = 5 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlEdgeLeft).LineStyle <> xlNone Then LeftRed = LeftRed + 1 End If Next j Next i For i = 4 To 5 For j = 4 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalUp).LineStyle <> xlNone Then DigUpRed = DigUpRed + 1 End If Next j Next i For i = 4 To 5 For j = 4 To 5 If CodeVBA.Range(Cells(i, j), Cells(i, j)).Borders(xlDiagonalDown).LineStyle <> xlNone Then DigDownRed = DigDownRed + 1 End If Next j Next i 'End Red 'CodeVBA.Cells(1, 3).Clear 'CodeVBA.Cells(1, 3) = BottomGreen * LeftGreen * DigUpGreen * DigDownGreen * BottomYellow * LeftYellow * DigUpYellow * DigDownYellow * BottomBlue * LeftBlue * DigUpBlue * DigDownBlue * BottomRed * LeftRed * DigUpRed * DigDownRed Green = BottomGreen + LeftGreen ^ DigUpGreen + DigDownGreen Yellow = BottomYellow ̂ LeftYellow * DigUpYellow + DigDownYellow Blue = BottomBlue ̂ LeftBlue + DigUpBlue + DigDownBlue Red = BottomRed * LeftRed ^ DigUpRed + DigDownRed CodeVBA.Cells(1, 3) = Green & Yellow & Blue & Red End Sub

Page 83: Successful Digital Product identification

75

3 Survey The survey which was sent out to the business line managers in order to receive some important

intel of performance monitoring and KPIs is presented below.

Page 84: Successful Digital Product identification

76

Page 85: Successful Digital Product identification

77

Page 86: Successful Digital Product identification

78

Page 87: Successful Digital Product identification

79

Page 88: Successful Digital Product identification

80

Page 89: Successful Digital Product identification

81

4. Specification of damping material Specification of the two damping material which was used in the field test is presented below. The

sheets can be found at Sikas website.

Page 91: Successful Digital Product identification

83

Page 93: Successful Digital Product identification

TRITA ITM-EX 2018:454

www.kth.se