Perancangan dan Pembuatan Alat Bantu Meja Putar untuk Mesin Cnc 4 Axis

2016 ◽  
Vol 10 (2) ◽  
pp. 162-171
Author(s):  
Hafid Hafid ◽  
Tatang Sutisna

The design and manufacturing of the rotary table with the specification Ø 170 mm (6 inches) for CNC machine 4 axis has been done. The objective of manufacturing a rotary table is to increase the efficiency of CNC machine Hardford 4 axis to be above 80% in line machining center CV. IM’s workshop. The engineering methods was taken, consist of: working preparation, manufacturing of working drawing, engineering process, the manufacturing and testing. The prototype has been tested and operated, the resulting of increasing productivity of which were as follows: the process of assembling was increased to be 3 time ( before 1 time) and processing time for a specific case reduced from 5 hours to 3 hours, number of operators for the case of assembling the rotary reduced to 1 person (before 4 persons), safety and security become to be better. The results show increased efficiency of CNC machine Hardford, from under 50% to be above 80%. Based on the economical analysis obtained by the cost of good sold (C.G.S) of the rotary table is IDR 34.060.000. The results presented in this paper is expected to be case study for developing a business of the metal and engineering SMEs domestic to the effort of improving efficiency, quality, productivity and competitiveness in global market.ABSTRAKPerancangan dan pembuatan alat bantu meja putar (rotary table) dengan spesifikasi teknis Ø 170 mm (6 inci) untuk mesin CNC 4 axis telah dilakukan. Tujuan pembuatan rotary table adalah untuk meningkatkan efisiensi mesin CNC Hardford 4 axis di atas 80% pada line machining center Bengkel CV. IM. Metode rancang bangun yang dilakukan, meliputi: persiapan kerja, pembuatan gambar kerja, proses engineering, pembuatan dan uji coba. Prototip tersebut telah diuji coba dan dioperasikan dengan hasil peningkatan produktivitas sebagai berikut: proses pengerjaan bongkar pasang meningkat menjadi 3 kali (sebelumnya 1 kali) dan waktu pengerjaan untuk kasus tertentu berkurang dari 5 jam menjadi 3 jam, jumlah operator untuk kasus bongkar pasang rotary berkurang menjadi 1 orang (sebelumnya 4 orang), keselamatan kerja dan keamanan menjadi lebih baik. Hasil peningkatan berupa efisiensi mesin CNC Hardford 4 axis dari sebelumnya di bawah 50% menjadi di atas 80%. Berdasarkan hasil perhitungan analisis ekonomi diperoleh harga pokok produksi (HPP) alat bantu meja putar adalah sebesar Rp. 34.060.000. Bahasan ini diharapkan menjadi contoh kasus bagi pengembangan usaha IKM logam dan mesin dalam negeri untuk meningkatkan efisiensi, mutu, produktivitas dan keunggulan daya saing di pasar global.Kata kunci: alat bantu meja putar, mesin CNC, harga pokok produksi

2013 ◽  
Vol 465-466 ◽  
pp. 1144-1148 ◽  
Author(s):  
Mohd Norzaimi Bin Che Ani ◽  
Mohd Sollahuddin Solihin Bin Shafei

The Single Minute Exchange of Die (SMED), a process-based innovation originally published in the mid-1980s, involves the separation and conversion of internal setup operations into external ones. Traditionally some of the manufacturing company facing the problem loss of available time due to spent time for the changeover processes. Changeover process time meaning changing the programming or operation sequences on the machine based on process requirement during the change from one to another one model especially for the mixing parts. SMED technique is a systematic approach that enables to reduce dramatically the set-up time or changeover time. Normally in the SMED technique, it was segregated between internal and external set-up. External set-up means any processing time was done up front which is before machine stop and internal time is any tasks was performed during machine in operating, which is considering changeover time. The impact to organization that it was increasing the productivity, capacity and at the same time increased the revenue. This paper focuses on the improving the productivity on the CNC machine process through implementing SMED technique and eliminating waste in the case study company.


Author(s):  
Murilo Coutinho ◽  
Ragy Eleish ◽  
Jihie Kim ◽  
Vished Kumar ◽  
S. Ringo Ling ◽  
...  

Abstract A recent National Academy of Sciences study shows that design and manufacturing is dominated by three “eighty percent” rules. Eighty percent of the cost of a product typically is the purchase cost of its components. Eighty percent of the manufacturing costs are determined in the first twenty percent of the design phase. And eighty percent of an engineer’s time is spent not on design, but on communications: obtaining information about components comprising the design and coordinating with other engineers about design issues. Thus, the speed and quality of product development is heavily dependent on a designer’s ability to perform component engineering — to configure a set of components that work well together with respect to performance, reliability, cost and delivery schedule. This paper describes services provided in the Active Catalogs system that support the component engineering process. These services enable a designer not only to find candidate parts to serve as individual components in a design, but to explore and assess interactions between candidate parts for sets of components. These services include mechanisms for: (1) creating queries for parts based on their intended use rather than merely parametric specifications; (2) refining those queries to take account of constraints imposed by other components; (3) providing multi-modal information to help designers assess and compare candidate parts; and (4) generating simulation models of candidate parts and integrating them to provide simulation models of candidate systems.


2016 ◽  
Vol 835 ◽  
pp. 864-868
Author(s):  
Pasura Aungkulanon

The aim of this research is to study the problem and efficiency improvement of the instrument factory in Thailand. The methods of production schedule are performed by four heuristic techniques which are Shortest Processing Time (SPT), Earliest Due Date (EDD), First Come First Serve (FCFS) and Bee algorithm (BA). All four methods aim to reduce the cost of delay shipment and time loss in manufacturing process. We apply these methods in the production process in an instrument factory. The results show that BA method is powerful in term of minimize make span and average completion time. Whereas, SPT method is the best method for finding minimum value of total late job.


2011 ◽  
Vol 314-316 ◽  
pp. 1624-1627
Author(s):  
Li Li Lv ◽  
Jun Fang Ni

Post processing is to change the cutter location files into each axis motion files according to the structures of machine movements and control instruction formats. The case study of 5-axis double rotary table of the CNC machine is researched in this paper. The machine structure and the machine kinematics are analyzed to get the coordinate transformation matrixes, then specified post processing procedures of this machine are developed, the system achieves good effects in practical application.


2020 ◽  
Vol 4 (02) ◽  
pp. 34-45
Author(s):  
Naufal Dzikri Afifi ◽  
Ika Arum Puspita ◽  
Mohammad Deni Akbar

Shift to The Front II Komplek Sukamukti Banjaran Project is one of the projects implemented by one of the companies engaged in telecommunications. In its implementation, each project including Shift to The Front II Komplek Sukamukti Banjaran has a time limit specified in the contract. Project scheduling is an important role in predicting both the cost and time in a project. Every project should be able to complete the project before or just in the time specified in the contract. Delay in a project can be anticipated by accelerating the duration of completion by using the crashing method with the application of linear programming. Linear programming will help iteration in the calculation of crashing because if linear programming not used, iteration will be repeated. The objective function in this scheduling is to minimize the cost. This study aims to find a trade-off between the costs and the minimum time expected to complete this project. The acceleration of the duration of this study was carried out using the addition of 4 hours of overtime work, 3 hours of overtime work, 2 hours of overtime work, and 1 hour of overtime work. The normal time for this project is 35 days with a service fee of Rp. 52,335,690. From the results of the crashing analysis, the alternative chosen is to add 1 hour of overtime to 34 days with a total service cost of Rp. 52,375,492. This acceleration will affect the entire project because there are 33 different locations worked on Shift to The Front II and if all these locations can be accelerated then the duration of completion of the entire project will be effective


Author(s):  
Michael Woo ◽  
Marcos Campos ◽  
Luigi Aranda

Abstract A component failure has the potential to significantly impact the cost, manufacturing schedule, and/or the perceived reliability of a system, especially if the root cause of the failure is not known. A failure analysis is often key to mitigating the effects of a componentlevel failure to a customer or a system; minimizing schedule slips, minimizing related accrued costs to the customer, and allowing for the completion of the system with confidence that the reliability of the product had not been compromised. This case study will show how a detailed and systemic failure analysis was able to determine the exact cause of failure of a multiplexer in a high-reliability system, which allowed the manufacturer to confidently proceed with production knowing that the failure was not a systemic issue, but rather that it was a random “one time” event.


1992 ◽  
Vol 25 (9) ◽  
pp. 211-216
Author(s):  
A. Akyarli ◽  
Y. Arisoy

As the wave forces are the function of the wave height, period and the angle between the incoming wave direction and the axis of the discharge pipeline, the resultant wave force is directly related to the alignment of the pipeline. In this paper, a method is explained to determine an optimum pipeline route for which the resultant wave force becomes minimum and hence, the cost of the constructive measures may decrease. Also, the application of this method is submitted through a case study.


Author(s):  
David Whetham

Between 2007 and 2011, Wootton Bassett, a small Wiltshire town in the UK, became the focus of national attention as its residents responded to the regular repatriations of dead soldiers through its High Street. The town’s response came to symbolize the way that broader attitudes developed and changed over that period. As such, it is a fascinating case study in civil–military relations in the twenty-first century. Success may be the same as victory, but victory, at least as it has been traditionally understood, is not a realistic goal in many types of contemporary conflict. Discretionary wars—conflicts in which national survival is not an issue and even vital national interests may not be at stake—pose particular challenges for any government which does not explain why the cost being paid in blood and treasure is ‘worth it’.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document