preview

Magnetic Abrasive Finishing Process

Better Essays

Contents

S No Major Page No
1 Introduction 1
2 Process details 1
3 Mechanism of Material removal 5
4 Process Parameters Analysis 6
5 Conclusions 7
6 Advantages 8 References 9

Magnetic Abrasive Finishing (MAF) Process

Harry P. Coats first patented MAF in 1938. Although US originate this idea, most of later period development is done by USSR + Bulgaria. Japanese explore the technology for polishing purpose. Other countries in this field are: India, CIS, England, France, and Germany etc.

Process details:

• In MAP, w/p is kept between the two magnets & the air gap in-between the w/p & the magnet is filled with Magnetic Abrasive Particles (MAPs). The MAPs joined to each other, along the lines of magnetic force and form a Flexible …show more content…

Theses results in better surface finish.
• Unbonded abrasives are the mechanical mixture of ferromagnetic iron powder + abrasive particles without any lubricant. These yields higher Material Removal Rate (MRR) because of the availability of free abrasives that can scratch much deeper that the bonded.
.
2. Workpiece material: The workpiece can be ferromagnetic or non-ferromagnetic. It is widely used for the tubes & for cylindrical workpiece (external + internal surface) and the flat workpiece.
3. Magnetic Poles: ‘N’& ‘S’ Poles, are Electromagnetic in nature, and is of a good quality. Here we assume ideal poles.

Magnetic brush: the iron particle being responding to magnetic field gets in alignment along the magnetic flux line & the abrasives particle in between, forming a stable brush, they retains this shape, the brush is rigid, during the operation. The brush gets stick to contour of workpiece; the electro magnetically generated field is providing required pressing pressure. The workpiece can be given rotary, axial and vibratory motion

Assumptions:
The magnetic field is induced by electromagnetic phenomenon & the gradient of the magnetic field in the air-gap causes the required machining pressure. It is assumed that:
• The system does not

Get Access