Some chosen aspects of CFB boilers operation
نویسندگان
چکیده
منابع مشابه
Online Mass Flow Prediction in CFB Boilers
Fuel feeding and inhomogeneity of fuel typically cause process fluctuations in the circulating fluidized bed (CFB) process. If control systems fail to compensate for the fluctuations, the whole plant will suffer from fluctuations that are reinforced by the closed-loop controls. This phenomenon causes a reduction of efficiency and lifetime of process components. Therefore, domain experts are int...
متن کاملAn Approach towards Efficient Operation of Boilers
Amit Kumar Jain Abstract— Presently the world has enormous advancement in science and technology the topic considered here is just a drop out of an ocean of knowledge. Higher product quality, better reliability, better availability of plants, optimization of cost and efficient working of boilers is the chief concern now a days. Generally the production can be increased by the efficient use of b...
متن کاملOMFP: An Approach for Online Mass Flow Prediction in CFB Boilers
Fuel feeding and inhomogeneity of fuel typically cause process fluctuations in the circulating fluidized bed (CFB) boilers. If control systems fail to compensate the fluctuations, the whole plant will suffer from fluctuations that are reinforced by the closed-loop controls. Accurate estimates of fuel consumption among other factors are needed for control systems operation. In this paper we addr...
متن کاملSome Combinatorial Aspects of Differential Operation Composition on the Space
Ω(R) d −→ Ω(R) d −→ Ω(R) d −→ Ω(R), where Ωi(R) is the space of differential forms of degree i = 0, 1, 2, 3 on the space R over the ring of functions A = {f : R → R | f ∈ C(R)}. In the consideration, which follows, we give definitions of the first-order differential operations. Let us notice that one-dimensional spaces Ω0(R) and Ω3(R) are isomorphic to A and let φ0 : Ω (R) → A, φ3 : Ω (R) → A b...
متن کاملUnforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally held to the same standard of security as public-key encryption (i.e., indistinguishability) even though usage of the two is very different. Secondly, though the importance of secure encryption of single blocks is well known, the security of modes of encryption (used to e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2019
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1398/1/012009