What are the seven tools of QC?
QC seven tools: 1. Checklist; it is a form used to facilitate the collection of data, filled in with simple marks and statistically organized for further analysis or for verification and inspection. 2. Plato; It is based on the collected data, calculates the proportion of each category item, arranges it in order of size, and adds a graph of cumulative value. 3. Fishbone diagram, also called cause-and-effect diagram, is designed to facilitate analysis of causes. 4. Histograms can be used in conjunction with control charts or to set specification limits. 5. Control chart is a graphic record of quality. 6. Walking picture. 7. Layer classification method.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
In the quality management module, we often use some tools to analyze and solve problems. What are the commonly used tools? This article will introduce the seven major tools of QC. If they are all used well, then regular quality problems in the factory should not be a problem.
1. Checklist
The focus is on inspection. It is a form used to facilitate the collection of data, filled in with simple marks and statistically organized for further analysis or for verification and inspection. For example, our commonly used quality problem checklist, 5S point inspection form, and equipment point inspection form are all very simple and practical.
2. Plato
This is what we often call the 2:8 principle, which is intended to facilitate goal setting. It is based on the collected data and classifies the causes of defects, defective conditions, defective items, locations of defective occurrences, types of customer complaints, or safety incidents, etc., calculates the proportion of each category of items, and arranges them in order of size, and then adds Graph of accumulated values.
3. Fishbone diagram
is also called a cause-and-effect diagram, which is designed to facilitate us to analyze the causes. It organizes many factors that affect product quality characteristics (usually people, machines, materials, methods, environment, and testing) into a fish-shaped diagram according to specified requirements, and identifies the graphics formed by the main factors, which is the characteristics. Main reason picture.
4. Histogram
can be used in conjunction with control charts or to set specification limits. It is a graph that divides the entire range of collected measured values or data into several equal intervals as the horizontal axis, and accumulates the number of occurrences of measured values in each interval. It is a graph lined up with columns, called a histogram. , also called a histogram.
5. Control chart
The control chart is a graphic record of quality. There is a center line (specification value) and two control limits on the chart. The center line is a specification value, and the two control limits are the ranges within which the quality characteristics of the product are allowed to vary. During the manufacturing process, spot checks are used to plot the sample statistics on a graph to determine whether the quality variation is significant.
6. Walking chart
Its function is to use a non-mathematical way to identify the relationship between the measured value of a certain phenomenon and possible cause factors. It displays two types of data on a coordinate chart to determine whether the two are related. This chart is called a scatter chart, also known as a scatter chart
7. Layer classification method
It is a statistical analysis method that classifies and hierarchies a variety of data according to their common characteristics according to the purpose, so as to facilitate subsequent analysis. The hierarchical method is the most basic concept among all quality control techniques and the most basic management tool among statistical methods. It can summarize messy data into meaningful categories and process things clearly at a glance. This scientific statistical method can make up for the shortcomings of intuitive judgment management.
To summarize, the seven QC tools are basically enough for us to analyze and improve regular quality problems, but to truly do a good job in quality, this must be a systematic project, and we must work hard from the source of quality planning and manufacturing processes.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What are the seven tools of QC?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

This article discusses how to improve Hadoop data processing efficiency on Debian systems. Optimization strategies cover hardware upgrades, operating system parameter adjustments, Hadoop configuration modifications, and the use of efficient algorithms and tools. 1. Hardware resource strengthening ensures that all nodes have consistent hardware configurations, especially paying attention to CPU, memory and network equipment performance. Choosing high-performance hardware components is essential to improve overall processing speed. 2. Operating system tunes file descriptors and network connections: Modify the /etc/security/limits.conf file to increase the upper limit of file descriptors and network connections allowed to be opened at the same time by the system. JVM parameter adjustment: Adjust in hadoop-env.sh file

This article describes how to clean useless software packages and free up disk space in the Debian system. Step 1: Update the package list Make sure your package list is up to date: sudoaptupdate Step 2: View installed packages Use the following command to view all installed packages: dpkg--get-selections|grep-vdeinstall Step 3: Identify redundant packages Use the aptitude tool to find packages that are no longer needed. aptitude will provide suggestions to help you safely delete packages: sudoaptitudesearch '~pimportant' This command lists the tags

Website performance optimization is inseparable from in-depth analysis of access logs. Nginx log records the detailed information of users visiting the website. Cleverly using this data can effectively improve the speed of the website. This article will introduce several website performance optimization methods based on Nginx logs. 1. User behavior analysis and optimization. By analyzing the Nginx log, we can gain a deep understanding of user behavior and make targeted optimization based on this: High-frequency access IP identification: Find the IP address with the highest access frequency, and optimize the server resource configuration for these IP addresses, such as increasing bandwidth or improving the response speed of specific content. Status code analysis: analyze the frequency of different HTTP status codes (such as 404 errors), find out problems in website navigation or content management, and proceed

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss