PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water flow rate (manipulated variable). The model is identified to be First Order plus Dead Time (FOPDT).
The objective of this work is to design and implement a controller to regulate the outlet temperature of hot water that is taken as controlled variable. The comparison of the designed PI controller with the PC-Based controller performance (according to rise time, percentage overshoot and settling time) shows a good agreement for PC-Based to control the system.
Abstract
In the present work, thermal diffusivity and heat capacity measurements have been investigated in temperature range between RT and 1473 K for different duplex stainless steel supplied by Outokumpu Stainless AB, Sweden. The purpose of this study is to get a reliable thermophysical data of these alloys and to study the effect of microstructure on the thermal diffusivity and heat capacity value. Results show the ferrite content in the duplex stainless steel increased with temperature at equilibrium state. On the other hand, ferrite content increased with increasing Cr/Ni ratio and there is no significant effect of ferrite content on the thermal diffusivity value at room temperature. Furthermore, the heat capacity of all sam
... Show MoreThe aim of this work is studying the binary system ??'??? Ni?)with two ratios (y=36,80) by using casting method for preparing the samples.Magnetic and Mechanical properties have been studidt different httrea^nttem^rature.All the alloys were found a ferromagnetic behavior and sensitive to the heat treatment. Best properties were found at the heat treatment 1100 C°.A significant different results were found above 1100C° for lower magnetic and mechanical values. This is possibly due to the change on the degree of magnetic moment orders, in which most of the moments are started to remove from coupled ferromagnetically.?
Copper tin sulfide (Cu2SnS3) thin films have been grown on glass
substrate with different thicknesses (500, 750 and 1000) nm by flash
thermal evaporation method after prepare its alloy from their
elements with high purity. The as-deposited films were annealed at
473 K for 1h. Compositional analysis was done using Energy
dispersive spectroscopy (EDS). The microstructure of CTS powder
examined by SEM and found that the large crystal grains are shown
clearly in images. XRD investigation revealed that the alloy was
polycrystalline nature and has cubic structure with preferred
orientation along (111) plane, while as deposited films of different
thickness have amorphous structure and converted to polycrystalline
Liquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of l
... Show MoreThis research was carried out to determine the impact of heat shock, electric shock and seeds in soaking nitrous acid mutagen solution on three cultivars of faba beans plant (Zaina, Aguadulce and Local) at the year 2012-2013. Factorial experiment was arranged in randomized complete block design (RCBD) with three replicates were used. The results showed that heat shock lead to early plants of 50% in flowering and an increase in the number of branches/plant and the number of seeds/pod compared to other treatments, whereas the seeds soaked in nitrous acid mutagen solution gave the highest plant height, leaf area index, number of pods/plant, seed weight, seed yield kg/ha, and did not differ significantly with treatment of electric shock in the
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Link failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall,
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More