Preview

Worst Case Tolerance and Statistical Tolerance Analysis

Satisfactory Essays
Open Document
Open Document
457 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Worst Case Tolerance and Statistical Tolerance Analysis
Worst Case Tolerance
And
Statistical Tolerance
Analysis

1.0 REVISION PAGE

REVISION DATE DESCRIPTION

1 11-17-2013 Initial Release 2 11-19-2013 Final Release
2.0 TABLE OF CONTENT

1.0 Revision Page ……………………………………………………………………………… 2
2.0 Table of Content …………………………………………………………………………… 3
3.0 Introduction ………………………………………………………………………………….4
4.0 Drawing…………………………………………………………………………………...… 5
5.0 Data and Calculation …………………………………………………………………………6
6.0 Recommendation ……………………………………………………………….…………….8

3.0 INTRODCUTION
Objective
The following report demonstrates Worst Case Tolerance Analysis, WCTA, and Statistical Tolerance Analysis, STA. The part is failing due to clearance between circuit card from male part of assembly and a metal contacting device of female part of assembly. We need use WCTA, STA to find suitable tolerance limit to eliminate so as to reduce probability of making parts outside of extreme tolerance zone.

Assembly Overview
The circuit card in male part of assembly which transmits the electrical current is inserted between metal contacting devices attached to female part of assembly to provide power to main source.

4.0 DRAWING

The following engineering drawing was used to identify necessary dimensions and its tolerances.

5.0 DATA AND CALCULATION
Nominal Clearance/ interference on Top and Bottom of Circuit Card
Dimension Number
Dimension(d)
Ti
1A
0.87
0.1
1B
1.75
0.08
2A
1.94
0.12
2B
1.13
0.12
2C
0.4
0.1

Nominal Assembly Dimension Calculation
Bottom Contact Surface
Dimension Used

Male
1B
1.75
Female
2A
1.94
Nominal Assembly dimension () = 1.94-1.75 = 0.19
Top Contact Surface
Dimension Used

Male
1A,1B
2.62
Female
2A,2C
2.34
Nominal Assembly dimension() = 2.62 - 2.34 = 0.28

Note:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5

    • 973 Words
    • 4 Pages

    A 100a Distribution Board will be used to power Block L. A ring circuit will provide power to the substation room and Generator/switch room (labelled Sockets, Generator/Switchroom). It will be protected by a 32A BS EN 60898 type C RCBO. The RCBO type C is used as equipment could either be plugged in from outside or attached to an inductive load. Another ring circuit will provide power for the workshop and restroom (labelled Sockets, Workshop/Restroom), this will also be protected by a 32A BS EN 60898 type c RCBO as again, equipment could be plugged in from outside or attached to an inductive load, as well as equipment being used within the restroom. The Electric Roller Shutter Door (labelled Motor Door) will be wired…

    • 973 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To resolve the issue of the window of vulnerability (WoV), we would need to get the patch from Microsoft. According to Microsoft, it will take up to 3 days for the patch to be available. Then, we would need additional time to download and test the patch to make sure that this is what is needed to fix the security breach on the SMB server. After doing the testing, the IT department would need time to install the patch onto the servers and deploy to the client computers. This will take 2 days to do, depending on the IT staff, if they work on weekends will determine the completion date. Meaning, if they will work on the weekend, then the deployment to all computers and servers will be done by that Sunday. If not, then it will be the following Tuesday. So, the time that is needed would be a week.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This is the wire that connects the computer to the power socket so the computer has power to work with.…

    • 1180 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    window breaks in an abandoned building in a neighborhood and it is not fixed, then more windows will be broken and graffiti will occur. In turn, this will make honest people afraid to leave their homes, and only the mischievous people who want to cause trouble will be out on the streets reeking havoc. Thus producing crime. Fixing Broken Windows offers a very desiccated but persuasive look at how to reform the modern criminal justice system by looking at three different aspects: the rise of crime rates in the middle of the 1960’s; the fact that the police are in a reactive role; and how the “broken windows” theory actually works.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Delta Plastics, Inc. (B)

    • 689 Words
    • 3 Pages

    The average number of defects for the standard material is 1.93 and the range is 2.6. The control limit (CL) is 2.41, upper control limit (UCL) is 3.28 and the lower control limit (LCL) is .571.…

    • 689 Words
    • 3 Pages
    Better Essays
  • Good Essays

    CHM130 Lab 6

    • 1556 Words
    • 6 Pages

    1. Use the concepts/vocabulary of density to explain why the liquids formed layers in Part I of the procedure. (8 pts)…

    • 1556 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Failure Mode of Semiconductor

    • 18284 Words
    • 74 Pages

    The reliability of semiconductor devices depends on their resistance to stresses applied to the devices, such…

    • 18284 Words
    • 74 Pages
    Better Essays
  • Satisfactory Essays

    Data Analysis and Design of Experiments – CHEE231 (3 credits) Fall 2013 Department of Chemical Engineering McGill University Instructor : Prof. Pierre-Luc Girard-Lauriault M.H. Wong Building, room 4150 Tel. 514-398-4006 email : pierre-luc.girard-lauriault@mcgill.ca Co-Requisite: CHEE 291 - Instrumentation and Measurement 1 Teaching Assistants: Simon Kwan (simon.kwan@mail.mcgill.ca) - Assignments Gregory Laskey (gregory.laskey@mail.mcgill.ca) - Assignments Mahdi Roohnikan (mahdi.roohnikan@mail.mcgill.ca) - Simulations…

    • 791 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Failure Mode Analysis

    • 1502 Words
    • 7 Pages

    FMEA & FTA •FMEA/FMECA •Fault Tree Analysis Arnljot Hoyland, Marvin Rausand, System Reliability Theory, John Wiley & Sons, Inc., 1994, ISBN 0-471-59397-4 Meng-Lai Yin 1 FMEA (Failure Mode and Effects Analysis) • Qualitative analysis • Purpose: identify design areas where improvements are needed to meet reliability requirements • One of the first systematic techniques for failure analysis • Developed in the late 50s to study problems that might arise from malfunctions of military systems • Often used as the first step of a system reliability study • An FMEA becomes a failure mode, effects, and criticality analysis (FMECA) if criticalities or priorities are assigned • Information can be found in: MIL-STD-1629, IEC 812, SAE ARP 926, IEEE std.…

    • 1502 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Sensitivity Analysis

    • 938 Words
    • 4 Pages

    Sensitivity analysis is a technique that indicates exactly how much a project's profitability (NPV or IRR) will change in response to a given change in a single input variable, other things held constant. Sensitivity analysis begins with a base case developed using expected values (in the statistical sense) for all uncertain variables. Then, each uncertain variable is usually changed by a fixed percentage amount above and below its expected value, holding all other variables constant at their expected values. Thus, all input variables except one are held at their base case values. The resulting NPVs (or IRRs) are recorded and plotted.…

    • 938 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    components required, details of all major electrical components including the voltages and currents required, details…

    • 301 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Inside the System Unit

    • 2819 Words
    • 12 Pages

    • The power supply is a device [box] inside the system that converts A.C into D.C means changes normal household electricity into electricity that a computer can use.…

    • 2819 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    handouts

    • 269 Words
    • 2 Pages

    converts the power from the wall outlet to the type of power needed by the computer.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The System Unit

    • 356 Words
    • 2 Pages

    Components of the system unit include the processor, memory modules, adapter cards, drive bays, power supply, ports, and connectors. The processor interprets and carries out the basic instructions that operate a computer. A memory module houses memory chips. An adapter card is a circuit board that provides connections and functions not built into the motherboard. A drive bay holds a disk drive. The power supply allows electricity to travel into a computer.…

    • 356 Words
    • 2 Pages
    Good Essays