Premium Essay

Nt1310 Unit 3.1 Project Method

Submitted By
Words 1429
Pages 6
3. METHODOLOGY:
3.1 Project Method:
There are three types of methods of filling with liquid filling machine which have the high rating of accuracy. These three methods are filling by volume, filling by time and filling by weight. For this filling machine, filling by volume method has selected in rigid plastic container as a mode of packaging to fill lubricant oil. The servo mechanism is used for the filling process which includes induction motor, encoder and high speed counter. The encoder produces the pulses by counting the rpm of the induction motor and gives its signal to the high speed counter and the high speed counter counts the pulses and compares it with the reference pulses and when the reference pulses and the counter pulses matched …show more content…
It takes inputs and takes decisions according to the inputs and gives the output according to the reference which is given in the programming. It can give a fast and a precise output. The biggest advantage of using PLC is that we can replace, add or delete any sensor or logic in the software. In this project, the latest version of PLC is used which is S7-1200. There are six high speed counters used in this machine that’s why CPU S7-1214C has been chosen. There are likewise some external modules are utilized to satisfy the requirements of inputs and outputs. Another advantage of using PLC is that we cannot need to rewire or add some other hardware.

3.3.2 Servo Mechanism:

The Servo mechanism used for filling process in this machine contains an induction motor, an encoder and high speed counter. The encoder produces the pulses by counting the rpm of the induction motor and gives its signal to the high speed counter and the high speed counter counts the pulses and compares it with the reference pulses and when the reference pulses and the counter pulses matched with each other then the induction motor stops and the filling process complete.

3.3.3 Photoelectric …show more content…
Most commonly DC solenoid valves are used in the industry. When 24V DC is supplied to the coil of the solenoid valve then its normally open switch is converted into normally close and we can operate any device from it. Solenoid valves are used to operate the pumps, gates, diving nozzles and the tray. For the safety of the solenoid valves reed switches are used to check the status of the solenoid valves whether it is open or close.

3.3.5 Human Machine Interface:

Human machine interface (HMI) is used to control and monitor all the operations on run time. The touch screen HMI is used in this project to control and give inputs to the machine and also used to monitor the visualization of a run time process.

3.3.6 Variable Frequency Drive:

Variable frequency drive is used to increase the efficiency and to vary the speed of the three phase induction motor. It is also used to protect the induction motor in case of not getting the correct shape of the sine

Similar Documents

Premium Essay

Nt1310 Unit 3.1 Project Methods

...3.1 Project methodology Bonding of permanent join of metallic parts to form an electrically conductive path that ensures electrical continuity and capacity to conduct safe current. Grounding is vital to connect the metallic parts of an electrical appliances to the earth (ground) by using thick conductor wire with very low resistance for safety purposes. In other word, grounding is a connection of the neutral point of a power supply system to the earth to avoid danger during discharge of electric energy. Hazards that may occur due to failure of earthing system are electrocution, fire or explosion due to the leakage of current through undesired path and to ensure potential current carried by conductor does not rise with respect to the earth...

Words: 1188 - Pages: 5

Premium Essay

Test

...analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10