Thursday, January 30, 2020

Logic bombs Essay Example for Free

Logic bombs Essay With the advent of information communication technology which has greatly helped in solving uncountable problems in all domains of human life all over the world, it has also come with its problems. Globally, the term cyber crime has gained unimaginable popularity because of its harm to all segments of human life. Cyber crime has not been defined in statutes/acts of parliament in many countries apart from a few developed countries which have some sections in their constitutions addressing this kind of emerging crime. The idea of cyber crime is not absolutely different from the other types of normal crimes. A crime is defined in the laws of land as the conduct which results to violation of the law and it is counterbalanced by the sanction of the state. The conduct may be an act or omission. Crime has been in existence through out human history and it is an economic and social phenomenon. It is a concept in the legal field which has the sanction of the law . Crime can also be referred to as an offence. It is an act which is legally wrong and can be pursued by criminal proceedings which can result to penalty (http://www. cybercrimelaw. net/content/cybercrime. html). Cyber crime basically refers to any criminal activity that involves the use of computer as a tool or a target. There are many kinds of unlawful activities that can be done via computer and they include: email spoofing, cyber deformation, sale of illegal articles, forgery, cyber stalking, online gambling, and intellectual property theft. The criminal cases where the computer is used as a target include: access to computer, computer system, or computer networks without permission , stealing of information in electronic form, logic bombs, Trojan attacks, internet time theft, email bombing, salami attacks, stealing computer system, web jacking, physical destruction of the computer and data diddling (http://cybercrime. planetindia. net/intro. htm). Cyber crime is as result of various reasons and they are as follows: Firstly, it is due to ability of the computer to store data in a very small space. Computers are designed in a very unique way such that they can store a lot of information in a very small space within it. This makes it possible to retrieve the information with a lot of ease. This is done using either virtual or physical medium. Secondly, it is very easy to access the information. This is usually due to the fact that the technology employed in protecting a computer from unauthorized access is very complex and is prone to human errors. This poses the main challenge in the protection of a computer. The security systems can be penetrated through using different technologies like the use of key loggers implanted logic bombs, retina imagers and sophisticated voice recorders which usually dupe and trick the biometric system and cross the firewalls thus entering into the security system being used in the computer. The third reason is that the working of a computer is very complex and involves the use of an operating system that uses millions and millions of codes to store information and execute commands. Since all these is designed by humans whose mind is liable to memory lapses, the cyber criminals uses this one as an opportunity to distort the codes and gain access to the computer operating system. The fourth reason is because of negligence. It is evident that human behavior is often characterized by negligence. As a result of this, it is likely that while installing guarding programs, this negligence might occur thus giving the cyber criminals an opportunity for accessing the computer operation system (http://www. cybercrimelaw. net/content/cybercrime. html). From the previous experiences, it is notable that cyber crimes are done by various groups of people in the community. Some of this groups are justified depending on the intention of what they are doing in the cyber. These groups include children and adolescents at the age of 6-18 years. This group is normally active and inquisitive and therefore tend to be very curious to explore and know beyond what they are not aware of in life. This makes them to engage in these types of crimes. In addition, this group likes being popular and achieving unique things something which predisposes them to this kind of delinquency. The second category consists of organized hackers who form groups with a defined goal which may be settling political scores or to gaining competitive edge in the business world. The third and the last group consist of professional hackers/crackers. This are cyber criminals who are out to make money by using their expertise to damage other people’s information systems. They are often hired to crack the sites of competitors or rivals and access vital information related to their organizational, production, marketing and operational strategies. The fourth group in some instances is composed of dissatisfied employees. In this case, the employees may have been sacked or demoted or denied a higher position or may be underpaid and they use cyber rimes as away of revenging (http://www. crime-research. org/analytics/702/). There are various forms of unlawful activities that are done via the computers and they include: unauthorized access to computer systems or net works which is popularly known as hacking. This involves the use of sophisticated technology to penetrate to the computer systems. Theft of information from electronic devices or in electronics is another form of cyber crime. These electronic gadgets include hard disks and removable computer devices. This form of crime is done by interfering with the data in the devices through virtual medium. Email bombing is also another common crime. It involves sending of emails to an individual or organization in bulk such that they derail the functioning or crashing of the computer system. Data diddling is also a form of cyber crime and is conducted before the raw data is processed by the computer. Here, the data is altered prior to being processed and then this is followed by changing it back after the processing. Closely related to this are the salami attacks. These are cyber crimes that are common in financial organizations and they are done with an aim of committing financial crime. It involves the alteration of the computer systems slightly such that the damages go unnoticed. Denial of service which is overstretching of victims computer system with a lot of work than it can handle is also a cyber crime that has been identified. This overstretching of computer leads to its crash. The frequent disturbing viruses and worms are forms of cyber crimes. The difference between the two is that while viruses need a file to attach to, alter and delete. The worms do not need this and they just use all the available space in the memory of the computer. The other forms include: the unauthorized soft wares known as Trojans, logic bombs, and internet time theft which involves stealing of another persons time for browsing which is done by getting the password and login ID. Lastly, is the web hijacking which is involves use of technology to access and gain control of another person’s website and mutilating or changing the information in it. This cyber crime is usually done to people who are looking for money or want to politically destroy their rivals (http://www. usdoj. gov/criminal/cybercrime/). As it is widely known, prevention is better than cure and the same case applies in cyber crimes . The fundamental preventive measure uses the 5P strategy to control and prevent this crime. The 5P stands for prevention, preservation, precaution, protection and perseverance. In addition, one should put the following in mind so as to prevent cyber crime. Firstly, avoid revealing personal information at the cyber, do not sent photographs online and stop chatting to unfamiliar people over the net. Elsewhere, web servers for the public must be separated from the internal corporate network. Always update your antivirus and keep back ups of your information in the computer in other devices, use of firewalls. Additionally, do not ever send your credit card number to any site that is insecure and the use intrusion detection gadget may also help significantly. In conclusion therefore, since humans are rationally thinking, there is no way in which cyber crimes can be completely eliminated from the cyber space. What is most important in this case is to develop very stringent laws to protect the people from the effects of cyber crime and also sensitizing the people to observe morals while embracing the world of information communication technology

Wednesday, January 22, 2020

The Naked Truth of the Poultry Show World :: Personal Narrative

The Naked Truth of the Poultry Show World Professor’s comment: This student’s wonderfully vivid, often funny, first-person report brings readers into a little-known world of poultry exhibitors. Who could have imagined what it’s like to bathe fifteen chickens and groom them for judging? From this essay I learned a great deal about chickens, and the student’s talents as a writer made the experience thoroughly engrossing. Most people seem to think it’s pretty weird that I show chickens. They’re right, I suppose. It’s an odd hobby. I started showing when I was eight years old, and thirteen years later I’m still at it. I went to a county fair way back then, and decided that one day I would own some of those cute little bantam chickens. On July 29, 1987, that dream came true, and from then on I’ve been a dedicated member of the poultry show world. Why do I show chickens? Well, you could say I’m just weird. But I love everything about it: my birds, my poultry friends, the competition, and the camaraderie. The number of chickens that I have varies from season to season. The breeding season usually starts out with about seventy-five birds, and I hatch anywhere from 200 to 400 chicks between March and July. Throughout the summer and fall, I gradually sell almost all of those chicks until I am down to just the cream of the crop again. I raise Rosecomb Bantams, one of many breeds of miniature chickens. The adults are only a little over twenty ounces. I work with color genetics to develop new and improved color patterns on these birds (that’s what happens when you’re an art major who raises chickens), and to bring back old colors that have long since disappeared in the Rosecomb breed. I used to name every one of my chickens, back in the old days when I only had a few. But as the population grew, I started running out of names, and out of time to spoil each chicken enough so that it was worthy of a name. Now I only name my favorites — those that win a show or those that simply win my heart. Poultry shows are a huge part of my life. My show season runs from September through February. I go to about six shows a year, and show about fifteen birds each time.

Tuesday, January 14, 2020

Smed, Continuous Improvement Activity for Crank Changeove

GM INDIA POWERTRAIN PROJECT TRAINEE TOPIC SUMMARY Name of Trainee: SYAMLAL. A. R Qualification: Mechanical Engineering Institute: National Institute of Technology, Calicut Project Guide: Vinayak Angane Title of the project: SMED (Single Minute Exchange of Die), continuous improvement activity for crank changeover process. Brief Description of the project: Use SMED techniques to reduce changeover time through system for crank machining to throughput simulation approved levels. Activities to be performed by trainee: * Update crank changeover board to reflect the current. Create and manage tracking sheet of changeover issues and countermeasures. * Measure changeover times by operation. * Get changeover within ‘OEM’ specified timing by end of project. Learning/Expectation of the trainee at the end of term: * Understand process of manufacturing crankshaft. * Understand how to implement continuous improvement process on shop floor. * SMED research and implementation. ACKNOWLED GEMENT I would like to express my gratitude to all the people in the General Motors Power Train department for helping me with my project.I would like to thank the Human resources managers who gave me an opportunity to undertake such a project in a world renowned company as General Motors. I would also like to thank all the operators who passed on all the knowledge that they could in two months to help me understand all the processes. They also helped me in various situations where it seemed that my project would come to a standstill, giving me exactly what I needed to go on. Next I would like to thank the each and every single person in the crank line who helped me and guided me in every step.They provided me with the resources and made suggestions that helped me improve and build a base for my ideas. I would also like to thank my fellow project trainee who had much more experience than me. He helped me to take off on my own path to completing the project with his valuable suggesti on and ideas. Above all I would like to thank him for being a very good friend at the hour of need. I cannot fail to mention the undying support of Mr Kisan Kapse, Mr Prashant Kurde and Mr Bharat Sawant who helped me in every stage of the project. They were of great help in difficult times.I am deeply in debt to them whose stimulating suggestions and encouragement helped me in times. Last but not the least I would like to thank my project guide Mr Vinayak Angane who looked closely throughout the project, correcting and offering suggestions for improvement. He took time off his busy schedule to explore me with alternate approaches to my problem and with ideas that could never have occurred to me on my own. INTRODUCTION The General Motors powertrain in Pune machines cam carrier, cylinder Head, cylinder block and crankshaft. GMI powertrain in Pune is a level IV flex plant.This power train plant is the one and only Level IV Flex plant in India. A level IV flex plant means that the plant can machine different types of the same component in the same machine. This is done by changing the die holding the component and also changing the program mentioning where to machine. My project revolves around the SMED of crankshaft. Some different parts constitute of the Cylinder block, Cylinder head & the Crankshaft. The crankshaft is the part of an engine which translates reciprocatinglinearpiston motion into rotation.Basically the crankshaft powers the engine. Crankshafts can be monolithic (made in a single piece) or assembled from several pieces. Monolithic crankshafts are most common, but some smaller and larger engines use assembled crankshafts. The different types of crank made in GM Powertrain Talegeon plant are 1. 0 xSDE, 1. 2 BDOHC, 1. 3 xSDE and 1. 4 BDOHC. SMED (Single Minute Exchange of Die) is a method for rapidly and efficiently converting a process from running the current product to running the next product. SMED is also often referred to a Quick Changeover.The SMED method can, and often is, used in starting up a process and rapidly getting it to running condition with minimum waste of time. SETUP CHANGE / CHANGEOVER Setup change/ Changeover is preparation, execution of activities in work station which includes hardware changes, sometimes software changes e. g. : locator centres, chuck jaws, steady program calling etc. to produce good to good parts. Change over time is defined as the time difference of the last product produced and the next new product produced with the right quality and at the right speed. The production capacity of a plant is determined by the changeover time.Unless the changeover time is reduced to the bottleneck the production can’t meet the target Production sites with long setup times are characterised by * Low flexibility of the component * Large batch sizes * High levels of stock If we decrease the setup change time then we could use the extra capacity either to increase productivity or to decrease the batch sizes. There are many benefits likereduction in lead time and therefore increased, improved and faster delivery, higher productivity and therefore satisfying customer needs faster, Reduction in working capital, less disturbances etc.SINGLE MINUITE EXCHANGE OF DIE (SMED) The process of changing die is called Single Minute Die Exchange (SMED). Single-Minute Exchange of Die  (SMED) is one of the many  lean production  methods for reducing waste in a manufacturing process. It provides a rapid and efficient way of converting a manufacturing process from running the current product to running the next product. This rapid changeover is the key to reducing production lot sizes and thereby improving flow. The phrase â€Å"single minute† does not mean that all changeovers and start-ups should take only one minute, but that they should take less than 10 minutes.In short it should be a single digit number. The different features of SMED are: * It is a systematic approach that decr eases disturbances and problems * The main factor that can lead to its success are team work & creativity * SMED methods are used for exchange of dies, but it can also be used for cleaning and for maintenance purposes. IMPORTANCE OF REDUCING CHANGEOVER TIME Reducing changeover time is like adding capacity, increasing profitability and can help most manufacturers gain a competitive edge.Image a pit crew changing the tires on a race car. Team members pride themselves on reducing changeover by even tenths of a second because it means that their driver is on the road faster and in a better position to win. The same philosophy applies to manufacturing – the quicker you are producing the next scheduled product, the more competitive you are. Reducing changeover times is a fundamental requirement of any company to take lead over the other in production and maintaining top position.By understanding the principles and practices of the SMED system organisations will be able to cut chang eovers by over 50% with very little expenditure, and to single minutes with the modification of tooling and fastening systems. Single Minute Exchange of Dies can be applied to any changeover operation and aims to reduce the overall downtime for a complete changeover to less than nine minutes. An understanding of the operational benefits to be gained from the fast exchange of tooling. The interaction of a multi-disciplined workforce constructively looking to eliminate waste from the changeover process.How unstable setups can adversely affect subsequent operations and how standard operating procedure can eliminate these concerns. A team approach in understanding the methodology used in applying SMED through theoretical explanation and practical involvement in actual changeovers. SMED IMPLEMENTATION To successfully implement SMED in a system is a difficult task. Therefore to successfully guarantee the implementation of the process, the following steps should be followed closely. STEP 1 – FOCUS * Start by choosing the right equipment to start with. . This is normally a bottle-neck with long set-up times STEP 2 – BUILD THE RIGHT TEAM Work cross-functional. Operators, Technicians, Engineers and Managers should worktogether STEP 3 – MEASURE AND SET GOALS * Visualize the present situation and agree on a common goal STEP 4 – 5S * To succeed you will need a clean and well organized work-place. A 5S implementation is recommended. This process will be explained in detail as we move ahead. STEP 5 – ANALYSIS * Keenly observe the operations and processes. Analyze the present situation video-technique. The different moments are classified as being external or internal and waste or not waste. All known disturbances are listed as well.STEP 6 – SEPARATION BETWEEN INTERNAL AND EXTERNAL MOMENTS * The purpose is to secure that all external set-ups are performed when the machine is running. Use checklists, function controls and improved tran sports. For example collect necessary tools and consumables before the next operation starts up or sharp the tools before activity starts. STEP 7 – ELIMINATION OF WASTE * Measures are carried out to reduce all types of waste. This includes: * Elimination of all need for adjustments. * Exchange of bolts for quick-fasteners. * Standardized parts, tools, dimensions Need for quality control STEP 8 – FOLLOW UP AND IMPROVE * Each changeover should be so planned that it is better and faster than the previous one. Each changeover should be analysed and properly documented which includes suggestion that could make it faster THE 5S SYSTEM â€Å"5S† is a method to create a safer, cleaner, and better-organized workplace. The five S in the process stand for: * SET IN ORDER The principle here is to keep things in their proper places. One guide to proper placement is to keep frequently-used items handy, and store other things where they can be found.In reference to a workplace , it means: At present the tools required for the changeover process are stored in red tool carts and the carts are kept in a specific location for easy access. The tool carts are rolled to the machine where changeover is taking place at the required time. SORT Every tool which is used for a changeover process must be tagged and identified properly. All the operators involved in the changeover must be aware of the location and purpose of the tool. SHINY CLEAN This is the exception – the only one-time activity in the 5S method. This stage has two goals: Determine and gain agreement on the desired level of cleanliness * Learn how to make new routines so this will become standardized STANDARDIZED CLEANUP In this phase consider the sources of dirt: air-borne dust; sawdust or other dry powder from cutting operations; splatter from wet processes; or simple trash because there is no proper container. A practical target is to have all workers take five minutes every day to tidy up af ter themselves – including the time to complete and sign the checklists. Supervisors should monitor compliance with the clean-up. The checklists make this both important and achievable.SUSTAIN This phase is perhaps the most important concept that includes instilled discipline, self-discipline, common cultural values, and self-motivated practice to improve. This step requires continued management support and communication. It brings out the leadership qualities of the employees and also improves their human values too. All these activities should be followed up on a regular basis with full commitment and hard work from all operators as well as managers for SMED to be a success. ACTIVITIES PERFORMED * Understood process of manufacturing crankshaftUnderstood the process of manufacturing crankshaft with the process flow of current status and different machines involved. * Understood activities performed by different machines OP 10:Machine: HELLER * Mill the lengths * Centring * O rbital and hollow milling OP 20:Machine: HELLER * Rough milling of mains/pins incl. * Counter weights and incl. * Rough diameter of mains and pins OP 25:Machine: HELLER * Broaching of mains and journals OP 30:Machine: HELLER * Outer Diameter milling of pins OP 40 (A & B):Machine: NTC * Drill and camphor oil holes OP 50:Machine: ELOTHERM * Washing Hardening (only for xSDE) * Tempering (only for xSDE) OP 60:Machine: HEGENSCHIEDL * Deep rolling * Strengthening OP 70:Machine: NTC * Recenter both ends OP 80:Machine: NILES-SIMMONS * Finish turning * Thrust face and hub outer diameter and post end shoulder * Post process measuring OP 100 (A & B):Machine: LANDIS * Grinding mains and pins OP 110 (A & B):Machine: NTC * Ream index holes * Milling keyway * Machine reluctor ring holes and flange holes OP 120:Machine: ROBOTIC * Brush * Check oil holes OP 140:Machine: LANDIS * Grinding Flange and post ends OP 160:Machine: SCHENK BALANCE Balancing OP 170:Machine: SUP FINA * Polish mains and pins * Thrust face and flange outer diameter (2 stations) OP 180:Machine: FINE TEC * Wash and dry OP 190:Machine: HOMMEL * Final inspection (2 stations) OP 200:Machine: MANUAL * Manual assembly of dowel pin SMED FOR CRANKSHAFT CHANGEOVER My project revolves around the changeover process in the crankshaft line. My project activities can be divided into the following: * Documentation of the changeover process for the entire crankshaft line. * Identified and separated internal and external activities for the changeover process. To define separate activities for different operators. My activity here consists of reducing changeover time. TO REDUCE CHANGEOVER TIME USING SMED TECHNIQUES The steps involved in reducing the changeover tie using this method are: 1. Observe the current methodology 2. Document it appropriately 3. Separate the INTERNAL and EXTERNAL activities. Internal activities are those that can only be performed when the process is stopped, while External activities can be done whil e the last batch is being produced, or once the next batch has started.Make sure it is properly documented. 4. Do most of the activities to be done during the changeover to be done when the previous batch is being done or while the buffer is running. 5. Try to simplify each and every process. 6. The procedure as well as the measures taken to simplify the timings should be well documented and easily accessible. 7. Keep a standard improvement percentage for each new changeover. Teamwork, meaning several operators sharing changeover operations in order to minimize the stop time is also scarce.As changeovers take time, cause productivity loss and carry costs, the temptation is to dilute them in changing less often by launching bigger batches. This policy ends up with higher inventories and lower agility for the production. Documented the current changeover process The machine is usually stopped and all changeover operations happen in sequence, while the machine is stopped. The machine w ill start again only after completion of adjustments and trials. Most often all these operations are done without any standard method nor procedures or checklists.This means the changeover sequence, and hence its duration is related to individual know-how, skills and habits. During this stage: * Agreed on the start and end of the changeover * Observed the changeover * Recorded ALL observations * Organized it and created changeover table * Record times for each element The time required for each individual steps were measured and added to the table for OP 20, OP 25, OP 30 and OP 40. Recorded and organized all observations for OP 20, OP 25, OP 30, OP 40, OP 60, OP 70, OP 80, OP 100 and OP 160 and created a table as follows:Separated INTERNAL and EXTERNAL activities Another important process is separating the internal and external activities performed during changeover. This is a serious procedure which must be done with a lot of care, which will help in the reduction of changeover tim e. During this stage: * Identified whether each step in the changeover is ‘internal’ or ‘external’ * INTERNAL activities are those which can be performed only when the machine is stopped (e. g. : removing or clamping jaws) * EXTERNAL activities are those which can occur while the machine is running (e. g. returning tools to storage after use and bringing new tools to the machine) * Separated each step involved in changeover to internal and external Separated activities for OP 20, OP 25, OP 30, OP 40, OP 60, OP 70, OP 80, OP 100 and OP 160 and added in the same table. Different external activities consist of: * Having everything prepared before stopping the machine (checklists) * Any preheating, pre-cleaning, presetting that could be completed * Standardizing changeover parts with attachments/improvements to help speed up centering and securing * Cleaning and keeping new changeover parts to be changedDefined activities for both team members During the next p hase of the project, I defined activities for both the team members involved in the changeover, i. e. the steps that must be performed by first operator and second operator were classified. The thought of parallel operations leads mainly to the following features: * Two or more people doing different jobs at the same time (e. g. : while first operator removing tool, second one bringing tool trolley in position in case of OP 20) Two people working together on one operation (e. g. : Both the operators changing over OP 40 A and OP 40 B simultaneously Others * Recorded the different tools and the auxillary equipments required to complete the changeeover * The different tools used in every step of changeover were noted down. * Bolt size of different allen screws were recorded * Auxillary equipments needed such as torque wrench, ratchet etc. were added in the same tabe * Organized changeover parts in the part trolleyAs part of the implementation of 5S system, inorder to reduce the part se arching time, each and every part involved in the changeover process were photographed. These photos were stick inside the machine tool trolley and hence the part searching time was reduced. * Improving location labeling to make items easier to find * Organized changeover parts in part trolley with photos having part number and part name on them * Hence reducing the time required for accessing the correct part * Deskilling and avoiding confusion SAMPLE PICTURE * The photographs were stick inside the tool trolley For different models, differents racks were provided so as to avoid confusion * In one rack, the space wasseparated inorder to fit to all the parts to be changed over All the above processes helped in reducing the part searching time and also worked as an alternate checklist. Also created a chelist of different parts to be changed for different operations. * Measured changeover time by station * Plotted graph with comparison of actual time taken by station for changeover to simulation * Plotted graph for total time taken for changeover for OP 20 to OP 180 Plotted graph for time taken to changeover from model 1. 0 to 1. 2 for OP 20 to OP 180 * Plotted graph for time taken to changeover from model 1. 0 to 1. 2 for OP 20 to OP 180 Suggestions * Providing power tool for all loosening and tightening processes instead of Allen key * Power tool will reduce about: 15 min for OP 20 3 min for OP 25 9 min for OP 30 * OP 40 * Changeover both OP 40 A and OP 40 B simultaneously * Reduce machine lockout time by making bed flush valve in action which was not noticed earlier * Hence solved problem of chips getting stuck in burr OP 60 * Get power tool * Change the tool tray (boxes) in which rollers are placed * Arrange rollers in boxes in same order that they are to be used * Stick colour codes on box also * Make arrangement loosen minimum number of bolts and adjust measuring probe * Provide power tool for OP 80 will reduce approximately 4 min * OP 160 * Provide a plast ic kit (box) with separations which can be taken and placed inside the machine through the side door which makes the operator not to lean in and out of machine each and every time * Bearing seal on the extreme is not used for 1. xSDE which is not required to be mounted * OP 10, OP 50, OP 70, OP 100, OP 110, OP 120 and OP 180 are already changed over in time or about time CONCLUSION At the end of the project, I was able to understand process of manufacturing crankshaft, different machines used in crank line and their uses, what is changeover and its use in the plant, advantages and disadvantages of changeover and importance of reducing changeover time. As a preliminary step to the project, I studied the basic idea of SMED (Single Minute Exchange of Die) and 5S techniques.Found out how SMED techniques can be used to reduce changeover time. During the project, I documented the whole process step by step for changeover for OP 20, OP 25, OP 30, OP 40, OP 60, OP 70, OP 80, OP 100 and OP 1 60. Organized these steps and created a changeover procedure table. Defined activities for both the team members involved in the changeover in the same table. Separated internal and external activities occurring during changeover and marked it in the changeover procedure table. Time taken for each step in the same table was also recorded (for OP 20, OP 25, OP 30 and OP 40).Reduced machine lockout time for OP 40 by making bed flush valve in action which was not noticed earlier and hence solved the problem of chips getting stuck in the burr and making the cleaning process long and difficult. The changeover parts in the part trolley were organized with the help of photos having part number and part name. Measured changeover time by station and plotted graphs: * Comparison of actual time taken by station for changeover with simulation time (For OP 20 to OP 180 for last 7 changeovers) * Total time taken for changeover by stations For OP 20 to OP 180 for last 7 changeovers) * Time taken f or changing over from 1. 0 xSDE to 1. 2 BDOHC (For OP 20 to OP 180 for last 4 changeovers) * Time taken for changing over from 1. 2 BDOHC to 1. 0 xSDE (For OP 20 to OP 180 for last 5 changeovers) Updated crank changeover board to reflect current by updating different graphs required and action plan. The process to implement continuous improvement on shop floor was understood and perfected. Different steps to decrease the time taken for changeover process and to bring it under OEM specified timing was suggested.

Monday, January 6, 2020

Birthday Wishes and Quotes for Friends

Friends make your birthday special. They may not shower you with expensive presents, but their presence makes the celebration complete. Likewise, your friends expect you to shower them with love and attention on their birthdays. Friends Like Unexpected Birthday Surprises On your friends birthday, show your dearest friend how much you care. As long as your surprise does not cause embarrassment, your friend will enjoy being surprised on her birthday. The surprise need not be extravagant. You can throw a surprise birthday party with close friends. Your friend will be touched by your gesture, however big or small.With little investment, come up with creative birthday surprises. You can plan a treasure hunt for your friend, or a picnic at her favorite holiday spot. You can even plan a special trip to a rock concert. Or take her to a karaoke bar, and dedicate a birthday song to your friend. Connect With Friends on Birthdays Birthdays are the perfect occasion to catch up with friends. If your friend has moved to another part of the world, send birthday wishes through text messages or social networking sites. If you have not been in touch with your childhood friends, surprise them by sending them birthday wishes. Everybody loves to be remembered on birthdays. Your birthday wish will come as a pleasant surprise. Also, you can use birthdays as the perfect excuse to befriend someone. Birthday Quotes for Friends Add a Special Zing You want your gift to stand out in a pile of presents. While it would be foolish to empty your pockets and buy the most expensive presents, you can gift your friend something you hold dear. Or you can gift her a handmade present, such as an engraved handkerchief, or a personalized t-shirt. While choosing a birthday gift, keep your friends preferences in mind. If you are unable to make a choice, simply gift your friend a small present with a happy birthday wish written on it. Your eloquent words can make any gift special. Use these birthday quotes for friends to add that magic touch. Larry Lorenzoni: Birthdays are good for you. Statistics show that the people who have the most live the longest. Menachem Mendel Schneerson: Because time itself is like a spiral, something special happens on your birthday each year: The same energy that God invested in you at birth is present once again. Edna St. Vincent Millay: My candle burns at both ends; it will not last the night.But, ah, my foes, and, oh, my friends; it gives a lovely light! ï » ¿Robert Brault: In childhood, we yearn to be grown-ups. In old age, we yearn to be kids. It just seems that all would be wonderful if we didnt have to celebrate our birthdays in chronological order. Chili Davis: Growing old is mandatory; growing up is optional. Oscar Wilde: Thirty-five is a very attractive age; London society is full of women who have of their own free choice remained thirty-five for years. E. W. Howe: Probably no man ever had a friend that he did not dislike a little. Robert Brault: I value the friend who for me finds time on his calendar, but I cherish the friend who for me does not consult his calendar. Margaret Lee Runbeck: Silences make the real conversations between friends. Not the saying but the never needing to say is what counts. John Leonard: It takes a long time to grow an old friend. Ralph Waldo Emerson: It is one of the blessings of old friends that you can afford to be stupid with them. Barbara Kingsolver: The friend who holds your hand and says the wrong thing is made of dearer stuff than the one who stays away. Elbert Hubbard: The friend is the man who knows all about you, and still likes you. Antoine De Saint-Exupery: The tender friendships one gives up, on parting, leave their bite on the heart, but also a curious feeling of a treasure somewhere buried. Jean-Paul Richter: Our birthdays are feathers in the broad wing of time. William Shakespeare: With mirth and laughter let old wrinkles come. Cherokee Expression: When you were born, you cried, and the world rejoiced. Live your life so that when you die, the world cries and you rejoice. Bishop Richard Cumberland: It is better to wear out than to rust out. John Lennon:Count your life by smiles, not tears,Count your age by friends, not years. W. C. Fields: Start every day with a smile and get it over with. Bob Hope: You know you are getting old when the candles cost more than the cake. Samuel Ullman: Years may wrinkle the skin, but to give up enthusiasm wrinkles the soul. William W. Purkey:You’ve gotta dance like there’s nobody watching,Love like you’ll never be hurt,Sing like there’s nobody listening,And live like it’s heaven on earth. Markus Zusak: Sometimes people are beautiful. Not in looks. Not in what they say. Just in what they are. George Harrison: All the world is birthday cake, so take a piece, but not too much. Mae West: You only live once, but if you do it right, once is enough. Ralph Waldo Emerson: To laugh often and much; to win the respect of intelligent people and the affection of children; to earn the appreciation of honest critics and to endure the betrayal of false friends. To appreciate beauty; to find the best in others; to leave the world a bit better whether by a healthy child, a garden patch, or a redeemed social condition; to know that even one life has breathed easier because you have lived. This is to have succeeded. Ralph Waldo Emerson: It is not the length of life, but the depth. Maya Angelou: Let gratitude be the pillow upon which you kneel to say your nightly prayer. And let faith be the bridge you build to overcome evil and welcome good. Martin Buxbaum: Some people, no matter how old they get, never lose their beauty—they merely move it from their faces into their hearts. Elizabeth Cady Stanton: The heyday of a womans life is the shady side of fifty.