Case study: impact of auxiliary energy in manufacturing operations

Malachy McElholm, Jim Harkin, Abdul Razaq, Liam Maguire

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

There is shortage of trained staff within SMEs and even large enterprises that can be dedicated to energy auditing, efficiency/optimisation and overall energy management in manufacturing. A key gap is the provision of a capability to automatically monitor energy consumption data in production manufacturing and the analysis of the data to permit optimising the minimisation of energy. This paper outlines a methodology for effective monitoring of total energy consumption during the manufacturing process, so as to reduce overall energy costs. A case study is presented on the application of the methodology in quantifying the levels of direct auxiliary energy used in a real-world manufacturing company. The outcome of the study highlights the significance of auxiliary energy on total energy usage.
Original languageEnglish
Title of host publication2018 2nd International Symposium on Small-scale Intelligent Manufacturing Systems (SIMS)
Place of PublicationPiscataway, NJ
PublisherIEEE
Number of pages6
ISBN (Electronic)9781538644362, 9781538644379
ISBN (Print)9781538644355, 9781538644386
DOIs
Publication statusPublished - 7 May 2018
Externally publishedYes
Event2nd International Symposium on Small-scale Intelligent Manufacturing
Systems (SIMS)
- Farnham estate Spa & Golf Resort, Cavan, Ireland
Duration: 16 Apr 201818 Apr 2018
Conference number: 2nd
https://www.cavanitc.ie/sims-2018/

Conference

Conference2nd International Symposium on Small-scale Intelligent Manufacturing
Systems (SIMS)
Abbreviated titleSIMS 2018
Country/TerritoryIreland
CityCavan
Period16/04/1818/04/18
Internet address

Keywords

  • Energy monitoring
  • Methodology
  • Data analysis
  • Manufacturing
  • Case study

Fingerprint

Dive into the research topics of 'Case study: impact of auxiliary energy in manufacturing operations'. Together they form a unique fingerprint.

Cite this