• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

An Investigation into the Use of Control Technology in the Car Industry

Extracts from this document...

Introduction

An Investigation into the Use of Control Technology in the Car Industry The Mustang's body area encompasses 355,000 square feet. It also utilizes 145 robots to perform welding for structural integrity, material handling for assembly, and sealer application for water leak prevention. Six major assembly/welding lines, along with three subassembly and buildup areas, are required to complete a Mustang body. There are three subassembly buildup areas: front structure framing and respot where a front end is created, rear pan assembly and respot, and the bodyside subassembly. The six major assembly/welding lines are: 1) The press line which joins the rear pan, center pan and front end to create an underbody. 2) The underbody respot and clamp line which joins the bodysides to the underbody. 3) The welding bucks which provide dimensional and weld integrity. 4) The roof line 5) The IBM respot line 6) And the closure line which assembles the doors, hood and rear deck lid to the vehicle. A perception vision system is also used to verify dimensional quality. The last process before a unit leaves the body area is metal finishing, where metal surface imperfections are removed before delivering a body to paint. PAINT SHOP: The paint department provides four functions to the finished product. The four functions are: the application of the phosphate/e-coat coatings, body sealer, primer coating, and color coatings. The following is a brief description of each of these functions: Phosphate/E-Coating The phosphate coating is the primary safeguard against rust. In addition, the phosphate coating provides an excellent surface that paint will adhere to. The application process causes nonferrous crystals to grow directly onto the metal. Because the phosphate is crystalline, the finished product is rough when viewed under a microscope. The next process is an application of a water based primer using electricity to cause the primer to migrate to any uncoated metal surface of the unit. ...read more.

Middle

The input sensors and output control devices are then connected to these circuits. This is an embedded computer. The input/output devices that we are most familiar with - the keyboard, mouse, monitor - are not required. The computer control program is written using ''normal' computer and 'downloaded' into the embedded computer. The software program is stored in a ROM (read only memory) chip and activates when the machine is switched on. It is nessecary to input data from both the machines and the surrounding environment. There are many benefits for using computers for control here are some: * Although the cost of computerised machines in factories is high, the operating costs are low in comparison to wages for people doing the job as the manual system. * Computers work without the need for breaks and sleep, unlike manual workers. * The quality of output from the machine is consistent whereas manual workers can work well one day and bad the next. * Machines can handle very heavy work or very precise tasks, whereas only very skilled manual labourers can achieve this. * Machines can work in places which are comfortable or hostile for people. * Computers process data very quickly and so the machines can operate faster than manual labourers. * Computers can operate the machines with data from a range of sources. Computer control can be used in many different areas including motor industry, distribution warehouse, theatre companies and the fire services. In the motor industry computer control can be used in index.htmindex.htmyear_10_work.htmyear_10_work.htm ICT GCSE Case study: * This should take between 5 and 10 hours in duration * This is aimed at you developing your understanding of control systems * This will be assessed as part of your final grade for the course The task: The case study should explore a control system and should focus upon either the manufacturing, production, or service industries. ...read more.

Conclusion

the.community the.community is a New York based company with a nationally expanding chain of computer training centers catering towards senior citizens. The centers are located in retirement community complexes. United Kingdom - Prices In Pounds Classrooms - Network Teaching Tools One Lab = �995.00 Classrooms Light - (Features: Transmitter, Viewer, Handouts, HandIns, Discussions, Messenger) One Lab = �495.00 Lab = Single teacher (server) program. An unlimited number of student (client) programs can be installed with each server program purchased. Note: Please contact your reseller for site license and multiple copy discount options. All prices are subject to local taxation if applicable. Where to Buy: Counterpoint MTC England, Scotland, Wales, Northern Ireland & Erie +44 (0) 1903 538844; andy@counterpoint-mtc.co.uk; http://www.counterpoint-mtc.co.uk/ Back to Where to Buy... United Kingdom - Prices In Pounds Classrooms - Network Teaching Tools One Lab = �995.00 Classrooms Light - (Features: Transmitter, Viewer, Handouts, HandIns, Discussions, Messenger) One Lab = �495.00 Lab = Single teacher (server) program. An unlimited number of student (client) programs can be installed with each server program purchased. Note: Please contact your reseller for site license and multiple copy discount options. All prices are subject to local taxation if applicable. Where to Buy: Counterpoint MTC England, Scotland, Wales, Northern Ireland & Erie +44 (0) 1903 538844; andy@counterpoint-mtc.co.uk; http://www.counterpoint-mtc.co.uk/ Back to Where to Buy... Minimum hardware specifications * Pentium 166 PC. * 32 MB RAM on student computers; 64 MB RAM on teacher computer. * TCP/IP compatible network. * 10baseT network or Novell. * Super VGA graphics card. Minimum software specifications * Windows 95, 98, NT 4.0. * In labs with more than 14 computers, Windows NT Workstation may be required on the teacher's computer. Note: 1. The Teacher Workstation must have a static IP address, whereas, the Student Workstations can have dynamic IP addresses. Upon request, Classrooms can be configured to allow for dynamic IP addresses for both the Student Workstations and the Teacher Workstation. 2. The Teacher Workstation does not require any special hardware or software server products (i.e. the Teacher Workstation does not have to be a WindowsNT Server). ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Some things to look out for during a direct observation include the layout of the offices, work load, work methods, delays and office conditions. For my project, I will use interviews, a study of all the documents and direct observation. I will conduct a semi-structured interview with the manager Fred.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    I used the cloning tool to make a copy of part of my original graphic so that it could make a smooth animation. The grouping tool was used to assemble certain images together into one cluster. This enabled me to move a group of images in one movement, which saved time.

  1. Feasibility Report

    to the public, this could result in another major financial lose, and their regular customers might chose to go get their food elsewhere. The computerised system can easily crash, get viruses, spyware and Trojans, which can result in important files within or about the company being deleted, for example, files

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    Known biometrics are:- gait recognition, fingerprint scanning, iris detection, speech recognition. The costs of these security measures can be quite expensive, especially the newer ones like gait recognition and iris detection. More conventional biometrics are relatively cheap like fingerprinting and speech which are probably the most common ones around. Passwords.

  1. System Analysis and Design Assignment

    Disadvantages: * Data will have to be manually entered each time a book is borrowed or a file is updated * There is no real way to link the data together in the Excel program, and despite being able to perform advanced calculations this is not overly necessary * There

  2. A2 ICT CouseWork

    Quantitative Specification Testing Pass/Fail Description Screenshot It should include a page greeting our customer's Pass I have created a homepage which should greet my customer's or anyone who access's my website. It should include a page that displays our company details, such as our telephone number and our email address "we want our customers to contact us!"

  1. ict as level coursework

    WI2 6AL 07292928124 Address 1 Address 2 Address 3 Post Code Tel. No. Quantity Catalouge No. Product Name Unit Price #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A #N/A Total #N/A 10% Discount #N/A #N/A Grand Total #N/A For office use only All

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    For example a workplace may use strict measures to keep data secure. They may force their employees to change their password every 6 weeks. This makes sure that if someone does get to know the password of an employee or they have hacked it then the employee can keep data secure by changing the password.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work