preview

Six Sigma And Theory Of Constraints

Decent Essays

time to next visit, and fastest time for next visit) are considered to construct the dispatch rule (Tyan et al., 2002).
Umble et al. (2006), in the research presented a case study of a virtual ‘textbook’ application of the theory of constraints (TOC) in a Japanese tool manufacturing company. Hitachi Tool Engineering uses state-of-the-art technology to design and manufacture cutting tools known as End-mills. The plant described in this study is a classic V-plant and exhibited all of the standard problems of a traditionally managed V-plant, existing within the unique framework of Japanese work culture. Plant management applied the five focusing steps and used the operations strategy tools, including drum-buffer-rope and buffer management, to …show more content…

al. (2003) have explained a generic buffer management procedure, based on the concept of the Theory of Constraints buffer management that rigorously defines a method of monitoring to size and to adjust the buffer. Author has stated Theory of Constraints replenishment solution to aggregate inventory buffers at the central warehouse in plant and change the mode of operation from push to pull. The solution is effective, but the optimal amount of buffer remains undetermined.
2.5 Comparison between Lean, Six Sigma and Theory of Constraints as found in Literature:
Jacob et al. (2009) in their business novel “Velocity: Combining Lean, Six Sigma and the Theory of Constraints to achieve breakthrough performance”, by combining the concepts of Lean, Six Sigma and the Theory of Constraints within the organizational program follow a “best of breed” approach. The author suggests taking the best of each school of thought has to offer and combining them to maximize the performance. Thus the weakness of one approach can be overcome by the strength of other and particularly by inclusion of Theory of Constraints in the mix.
Nave D. ( 2002) has compared Lean, Six Sigma and Theory of Constraints and described essence of these methodologies in following

Get Access