Skip to main content

What is Error-Proofing?

 

Error-Proofing:-

                  Error-proofing refers to the implementation of fail-safe mechanisms to prevent a process from producing defects. This activity is also known by the Japanese term poka-yoke, from poka (inadvertent errors) and yoke (to avoid) - pronounced POH-Kuh YOH-kay.

Although this common-sense concept has been around for a long time, it was more fully developed and popularized by Shigeo Shingo in Japan.

The philosophy behind error proofing is that it is not acceptable to make even a very small number of defects, and the only way to achieve this goal is to prevent them from happening in the first place.

In essence, error-proofing becomes a method of 100% inspection at the source rather than down the line, after the additional value has been added (wasted). Achieving extremely high levels of process capability requires this type of focus on prevention rather than detection.

You may not realize it, but you probably encounter many examples of error-proofing in your everyday life, as outlined below:

Examples From Every-Day:

  • The brake-shift interlock device on your automatic transmission vehicle prevents you from starting the engine unless the brake is depressed and the shift selector is in the park or neutral.
  • A tennis ball hung from a screen in your garage can make parking easier, and avoid crashing into items stored at the front of the garage.
  • When you close a computer file, the operating system may ask you if you want to save your work first to prevent losing it inadvertently.
  • Childproof caps on medicine bottles keep children from taking medication that could be harmful.
  • Soft barrier hanging in front of the door opening at a drive-thru that hits the top of your vehicle to prevent you (hopefully) from crashing into the overhanging wall.
  • The anti-siphon valve on your outside garden hose outlet prevents contaminated water from flowing backward into the water supply.
  • Speed-dial on your phone that improves accuracy as well as speed - if you hit the right speed dial button!
  • The engine control module on your vehicle controls the top-end speed so you don't over-drive that speed rating of your tires.
  • A patient about to undergo surgery for a problem on his right arm, concerned about reports of surgery accidents, wrote "The wrong Arm" with a magic marker on his left arm.
  • The spell-check feature on a word-processing program.

Examples From Industry:

  • A sensor connected to the electric nut-runner in an automobile assembly plant triggers a horn if a suspension assembly is moved to the next operation before a bolt is properly tightened.
  • Color-coding of components that otherwise look similar. Bins of parts are electronically connected to the bill of materials through a bar code scanner so that only the proper bin door opens for a given product.
  • Bar-code scanning at the check-out lane to eliminate errors and increase speed
  • Computer-controlled inspection of a vehicle's electrical system that senses any disconnected modules and electronically "locks out" the shipping documents so the vehicle must be properly repaired and verified by computer retest before it can be shipped to a customer.
  • Fuse box lock-out procedures so that power cannot be turned on before an electrical repair is complete and all personnel is out of harm's way.
  • Guide pins on emblems on the back of a car to guarantee proper alignment.

Categories:

You can see from the examples above that there are three basic categories of error-proofing:

  • At the simplest level are WARNINGS that provide quick feedback of a potential problem, like a smoke alarm or the warning lights on your car instrument panel.
  • Automatic SHUTDOWN controls force the problem to be corrected before resuming production, such as the vehicle electrical test mentioned above.
  • AUTOCORRECTION controls provide an integrated test-feedback-repair loop, such as the spell-checker in a word processing program.

Application:

Error-proofing is an excellent activity to involve the workforce in continuous improvement. Many poka-yoke ideas relieve stress from operators by eliminating the need to concentrate on mundane activities and by providing more capable tools to get the job done right consistently.

And remember, operations that require more finesse, adjustment, judgment are not just a quality risk, they also take more time, and are therefore more wasteful than they could be in terms of productivity and quality.

The first step in applying error-proofing principles is to identify all of the possible errors that can be generated by an operation. Using a Failure Mode and Effects Analysis (FMEA) is a great way to get started, because the FMEA asks many of the same questions, and provides a prioritization of the potential errors. You may also find that a Cause and Effect Diagram (Fishbone Chart) is a useful tool to organize your efforts.

After identifying the potential errors, involve the workforce in Brainstorming to generate ideas to provide Warning, Shutdown, or Autocorrection to the process.

Summary

Error proofing, or Poke Yoke, can greatly decrease defects in processes and increase the speed of processes. By decreasing variation and designing a system where the right way is the only way to produce a product or service, error proofing, enables focus on the other variable factors in the process. The more error-proofing built into processes, the less the defects associated with errors will be generated.

Comments

Popular posts from this blog

Best digital marketing in Perth

Best digital marketing in Perth Introduction Your introduction into the brave new world of the digital space will be custom-tailored to your business needs requirements. You will be introduced to the crew who will be handling your project, from inception to the launch into the market. Assess It will be our job to not only know your customers but how they engage with the core products and  brand relationships . From here we break down what we research, to identify the core elements needed to engage the customer. Create It’s imperative that the design of your vessel is done right from the start. Its shape, level of focus, and attention to detail are crucial for a prosperous, lucrative, and extended journey. We will always present concepts and suggestions as per the requirement, but we truly believe this process should be a collaborative one between the creative crew of the PWD and the client. The final form will dictate its progression into the  development  and manufacturi...

The Ultimate Guide to Pay-Per-Click (PPC) Advertising

  The Ultimate Guide to Pay-Per-Click (PPC) Advertising Introduction In the fast-paced digital marketing world, businesses strive to maximize their online presence and reach their target audiences effectively. One of the most potent tools in their arsenal is Pay-Per-Click (PPC) advertising. This advertising model has revolutionized how companies attract and engage potential customers. This comprehensive guide will delve deep into PPC advertising, exploring its benefits, strategies, and best practices to help you harness its power for your business. What is Pay-Per-Click (PPC) Advertising? PPC advertising is an online marketing model where advertisers pay a fee each time their ad is clicked. Essentially, it's a way of buying visits to your site rather than earning them organically. PPC ads are displayed on search engines, social media platforms, and websites, targeting specific keywords and demographics. The Mechanics of PPC Understanding the mechanics of PPC is crucial for creating...

WHAT ARE NEURAL NETWORKS? | Comingfly

WHAT ARE NEURAL NETWORKS ? Neural Networks the process of machine learning are neural networks. These are brain-inspired networks of interconnected layers of algorithms, called neurons, that feed data into each other, and which can be trained to carry out specific tasks by modifying the importance attributed to input data as it passes between the layers. During training of these neural networks, the weights attached to different inputs will continue to be varied until the output from the neural network is very close to what is desired, at which point the network will have 'learned' how to carry out a particular task. A subset of machine learning is deep learning, where neural networks are expanded into sprawling networks with a huge number of layers that are trained using massive amounts of data. It is these deep neural networks that have fueled the current leap forward in the ability of computers to carry out task like speech recognition and computer vision. T he...

Difference between loc() and iloc() in Pandas DataFrame

  Difference between loc() and iloc() in Pandas DataFrame Pandas library of python is very useful for the manipulation of mathematical data and is widely used in the field of machine learning. It comprises many methods for its proper functioning.  loc()  and  iloc()  are one of those methods. These are used in slicing data from the Pandas DataFrame. They help in the convenient selection of data from the DataFrame. They are used in filtering the data according to some conditions. The working of both of these methods is explained in the sample dataset of cars. loc()  :  loc()  is label-based data selecting method which means that we have to pass the name of the row or column which we want to select. This method includes the last element of the range passed in it, unlike  iloc() .  loc()   can accept the boolean data unlike  iloc()  .  iloc() :  iloc( )  is an indexed-based selecting method which means that we ...

What is Cyber Security | Comingfly

What is Cyber Security The Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Description:  Major areas covered in cyber security are: 1)  Application Security 2)  Information Security 3)  Disaster recovery 4)  Network Security Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are:  a)  Input parameter validation,  b) User/Role Authentication & Authorization,  c)  Session management, parameter manipulation & exception management, and  d)  Auditing and logging. Information security protects information from unauthori...