Six-axis robot for machine, packaging applications

Yaskawa Motoman's MH12 six-axis robot features a curved arm for a wider range of assembly, machine tending, and packaging applicatoons and has thru-arm cable routing to reduce snagging or interference.


Yaskawa Motoman's MH12 six-axis robot features a curved arm for a wider range of assembly, machine tending, and packaging applicatoons and has thru-arm cable routing to reduce snagging or interference. Courtesy: Yaskawa MotomanYaskawa Motoman's MH12 six-axis robot is designed for assembly, dispensing, material handling, machine tending and packaging applications. It features a curved upper arm that enhances its reach and allows a wider range of applications. This double yoke design also offers additional strength if the robot crashes due to a programming error.

Thru-arm cable routing provides longer cable life and reduces the risks of snagging or interference. A large 50 mm thru-hole in the upper arm provides ample space to minimize wear and maximize cable life. Because the end effector cabling is frequently the highest maintenance item on a robot, this can increase the reliability of installations.

The MH12 has a 56.7 in. reach and a large work envelope that extends behind the robot, permitting space for robot tool storage or maintenance. The MH12 robot features an increased 12 kg payload, and higher moment and inertia ratings over previous "payload class" models, enabling it to carry larger and heavier payloads. It has brakes on all axes and can be floor- or wall-mounted for layout flexibility.

The MH12 has a small interference radius that allows the robot to be placed close to other equipment, decreasing floor space requirements. A mounting surface is provided on the back of the upper arm for junction boxes or pneumatics. Mounting in this area provides a lower profile to the robot and avoids interferences within the cell. The MH12 also has an IP67-rated wrist and an IP54 body.

Yaskawa Motoman 

- See more Control Engineering robotic products.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security