Compare And Contrast The Three Maintenance Management Techniques

Superior Essays
Section 2 – Comparing and contrasting between the three (3) maintenance management techniques
One of the benefits of using the reliability centred maintenance system is the failure, mode, effects and criticality analysis. This solution finding process will be carried out effectively by examining the equipment from its structure and examining the number of failure mode for each equipment involved. Once the failure modes have been established, failure effects will receive the information needed to examine the evaluation of the repercussion. The repercussion will be grouped into several related classes and examined for identification of failure. If the industry cannot locate a good strategy for the failure, a modification may be considered for
…show more content…
Augmentation can take place with different procedures, the main objective is to establish a system whereby a user cannot possibly differentiate between the real world and the virtual representation of the augmentation. In manufacturing, there is an approach called the Computer-integrated Manufacturing process which involves the use of computers to control the production process. This process involves examining and identifying problems in the components of equipment, managing equipment performance and schedule, equipment tools and devices as well as measurement. To achieve augmented reality aided manufacturing and also ensure effectiveness and productivity, some key processes will have to be followed through, and they include: the augmented reality aided robot control which makes good use of hardware and software tools to produce an amalgamation of a physical event and an augmented event comprising of a 3D virtual representation of a thing or situation. A digitalization device called Kinect in accordance with a software called skanect will be used to perform real-time job specifications. A light-emitting diode (LED) technology was introduced to enhance good lighting effect. Another process is the augmented reality aided assembly which aims to educate about assembling and disassembling procedures. The augmented reality aided testing process …show more content…
It will encourage as well as ensure rapid and comprehensive record containing a detailed job specification which will be complicated in nature, with the use of recreated/imitated accurate reproduction. The trainings will consist of electronic learning/training to a multitude of recipients with the use of the 3D reconstruction (computer-generated images), 3D pictorial illustration (computer aided designs), user-friendly tracking devices like the global positioning system used for detecting locations, the geographic information system which is used to identify, modify, save and reveal a particular place or environment, 3D image which appears to surround the user with the use of a computer display or system; incidents which are characterized by several different modes of activity or occurrence, etc. through the use of simulations in actuality; this will enable the workers explore their experimental, practical and reasoning skills, furthermore, it will enable the workers receive sensory messages and produce appropriate response, mobile learning/training which involves the use of hand held devices such as; mobile phones, laptops, computers, tablets, etc. This will enhance the training environment to a great level because it is easily accessible everywhere, thus, the mobile skilled worker can be linked through visual communication link to

Related Documents

  • Great Essays

    SOFTWARE REQUIREMENT SPECIFICATION Software development life cycle(SDLC) consists various phases: requirement gath- ering and analysis, design, implementation or coding phase, testing, deployment and maintenance. In this section, we specify the software requirements of the proposed EFFM system. This phase is critical to the success of the project. Requirement analy- sis is an art and science. In requirement gathering and ananlysis, customer expectations need to be eshed out in great detail and documented.…

    • 1824 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    artificial intelligence The artificial intelligence is one of branches in the computer science which is used in many application especially application of technology as it is the way that the machine or the computer or any application used to make its creation and creativity and help the application to take decisions like humans so it is used in making games, toys, computers, in the internet where the searching engines and absolutely in robotics. AI researchers and textbooks define the field of artificial intelligence as "the study and design of intelligent agents" in which an intelligent agent is a system that imagine its environment and takes actions that maximize its chance of success. What is the difference between the artificial intelligence…

    • 1600 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    The goal of this step is to identify a list of system weakness, by using security test of system, audit comments and security requirements that could be exploited. These weaknesses generate the threat/vulnerability pair. Control Analysis For every threat/vulnerability pairs, identify all the possible existing and planned controls to decrease the risk of the threat to exploit vulnerability. Security controls involve the use of technical and non-technical approaches. Technical controls are protection that are combined with computer hardware, software, and firmware.…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    1.1 Testing: Software testing is a phase in the software development that is used to provide stakeholders of the projects with information about the quality of the product or service that has been tested. Software Testing is also used to provide the objective and independent view of the system and that view allow to realize and understand the risks that could be faced at the implementation of the software. Multiple test techniques are included in the process of executing a program or application that has to be implemented with the intention of finding software bugs and errors. Testing is the process of finding, detecting, or discovering errors. Testing plays a important role in assuring that we have achieved the required set of quality and…

    • 842 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    With the use of the software engineering concepts and strategies, we can evaluate the applications performance and other factors. We’ve to check some major failures that will lead us to software failure before delivering the application to the user. These major failures are: • Poor user Input • Stockholder Conflict • Vague Requirements • Poor cost and schedule…

    • 1161 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    On the technology side, the designer must have a thorough understanding of the available hardware and software components and tools. On the human side, the designer must have a good understanding of how humans learn and work with computers, including envisioning new modes of working. The designer's task is to create effective, efficient, and satisfying interactions by balancing factors such as cost, benefits, standards, and the environmental constraints in which the interaction will take…

    • 902 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    BIM gathers information about the facility at various stages in order to properly manage the assets which are greatly used in quantifying, qualifying in design and construction stages. This data is collected by the laser scanner or recorded manually by numbers into a spreadsheet or by inputting model. For suppose if the quantities needed in the construction phase and quantity of elements in operation phase are readily calculated then vacant space if found then change the design and make that place rentable by knowing exact dimensions. In the design phase design information generated from design team found that there is a need for certain rooms or space facility then the contractor could determine the type of construction element needed before such as tower crane or specific replacement of the facility. The analyzing purpose of BIM includes coordinating, forecasting and validation to ensure the good harmony of relationship, to predict future performance and to check information is reasonable and logical (Kreider & Messner,…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies. Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it. (Kim, D. & Solomon, Michael 2014, page 486).…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Operating System

    • 1022 Words
    • 5 Pages

    The OS organises machine and peripheral actions so they can achieve optimum results.To do this it uses a function to connect with hardware such as the USB, RAM,ROM, keyboard and mouse. Data is sent back and forth to the RAM to help the system run its applications.The computers device drivers are used to manage the machine and these drivers are controlled by the OS. How do they facilitate users? Different types of operating systems provide their own levels of stability and reliability to facilitate the user. Software developers will often update the OS by…

    • 1022 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    After the vulnerabilities are identified, the enterprise can then decide what steps they need to take to mitigate the vulnerabilities. They take steps in such a way that it not only helps to get rid of the vulnerabilities but also removes the cause and hence enhance the security. In all the cases, every single enterprise has two options 1) Endure the risk and see what dangers it can cause so as to improve the security in future. This is called retention. 2) The other thing is mitigation.…

    • 1053 Words
    • 5 Pages
    Improved Essays