PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water flow rate (manipulated variable). The model is identified to be First Order plus Dead Time (FOPDT).
The objective of this work is to design and implement a controller to regulate the outlet temperature of hot water that is taken as controlled variable. The comparison of the designed PI controller with the PC-Based controller performance (according to rise time, percentage overshoot and settling time) shows a good agreement for PC-Based to control the system.
The aim of this paper is to estimate a single reliability system (R = P, Z > W) with a strength Z subjected to a stress W in a stress-strength model that follows a power Rayleigh distribution. It proposes, generates and examines eight methods and techniques for estimating distribution parameters and reliability functions. These methods are the maximum likelihood estimation(MLE), the exact moment estimation (EMME), the percentile estimation (PE), the least-squares estimation (LSE), the weighted least squares estimation (WLSE) and three shrinkage estimation methods (sh1) (sh2) (sh3). We also use the mean square error (MSE) Bias and the mean absolute percentage error (MAPE) to compare the estimation methods. Both theoretical c
... Show MoreThe essential objective of this paper is to introduce new notions of fibrewise topological spaces on D that are named to be upper perfect topological spaces, lower perfect topological spaces, multi-perfect topological spaces, fibrewise upper perfect topological spaces, and fibrewise lower perfect topological spaces. fibrewise multi-perfect topological spaces, filter base, contact point, rigid, multi-rigid, multi-rigid, fibrewise upper weakly closed, fibrewise lower weakly closed, fibrewise multi-weakly closed, set, almost upper perfect, almost lower perfect, almost multi-perfect, fibrewise almost upper perfect, fibrewise almost lower perfect, fibrewise almost multi-perfect, upper* continuous fibrewise upper∗ topol
... Show MoreWe introduce and discuss the modern type of fibrewise topological spaces, namely fibrewise fuzzy topological spaces. Also, we introduce the concepts of fibrewise closed fuzzy topological spaces, fibrewise open fuzzy topological spaces, fibrewise locally sliceable fuzzy topological spaces and fibrewise locally sectionable fuzzy topological spaces. Furthermore, we state and prove several theorems concerning these concepts.
Csaszar introduced the concept of generalized topological space and a new open set in a generalized topological space called -preopen in 2002 and 2005, respectively. Definitions of -preinterior and -preclosuer were given. Successively, several studies have appeared to give many generalizations for an open set. The object of our paper is to give a new type of generalization of an open set in a generalized topological space called -semi-p-open set. We present the definition of this set with its equivalent. We give definitions of -semi-p-interior and -semi-p-closure of a set and discuss their properties. Also the properties of -preinterior and -preclosuer are discussed. In addition, we give a new type of continuous function
... Show MoreStealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreLet M be an R-module, where R is commutative ring with unity. In this paper we study the behavior of strongly hollow and quasi hollow submodule in the class of strongly comultiplication modules. Beside this we give the relationships between strongly hollow and quasi hollow submodules with V-coprime, coprime, bi-hollow submodules.
Now that most of the conventional reservoirs are being depleted at a rapid pace, the focus is on unconventional reservoirs like tight gas reservoirs. Due to the heterogeneous nature and low permeability of unconventional reservoirs, they require a huge number of wells to hit all the isolated hydrocarbon zones. Infill drilling is one of the most common and effective methods of increasing the recovery, by reducing the well spacing and increasing the sweep efficiency. However, the problem with drilling such a large number of wells is the determination of the optimum location for each well that ensures minimum interference between wells, and accelerates the recovery from the field. Detail
In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona
... Show More