improving mshe design procedure using genetic algorithm and reduced number of sections

نویسندگان

f. joda

school of chemical engineering, university of tehran, p.o. box: 11365-4563, tehran, iran g.t. polley

institute for scientific research, university of guanajuato, mexico n. tahouni

school of chemical engineering, university of tehran, p.o. box: 11365-4563, tehran, iran m.h. panjeshahi

school of chemical engineering, university of tehran, p.o. box: 11365-4563, tehran, iran

چکیده

pinch technology is one of the best methods for designing a multi stream heat exchanger(mshe) through a network; current pinch-based methods, however, lead to a larger and more complicateddesign problems. the major drawback of the current methods is they result in designs having more individual mshe sections than essential, correspond to the enthalpy intervals on temperature vs. enthalpy diagrams or composite curves. in this paper, a new conceptual procedure for optimizing the entrance and exit points of each stream of a mshe is proposed minimizing the number of sections required for a given duty. moreover, genetic algorithm (ga) is used to find the suitable fin type for making the heat exchanger dimensions consistent with manufacturing needs and the fully utilization of allowable pressure drops. having applied the new design procedure in two industrial case studies, the results showed 11% and 7% cost reductions compared to the current method, respectively.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improving mshe design procedure using genetic algorithm and reduced number of sections

pinch technology is one of the best methods for designing a multi stream heat exchanger(mshe) through a network; current pinch-based methods, however, lead to a larger and more complicateddesign problems. the major drawback of the current methods is they result in designs having more individual mshe sections than essential, correspond to the enthalpy intervals on temperature vs. enthalpy diagra...

متن کامل

Optimal Design of Open Channel Sections Using PSO Algorithm

This paper applies an evolutionary algorithm, the particle swarm optimization (PSO), to design the optimum open channel section. Depth, channel side slope and bottom width are considered as the variables for rectangular, triangular and trapezoidal channels, respectively. The objective function is minimizing the construction cost of the channel section. MATLAB software is used for programming an...

متن کامل

Aerodynamic Optimal Design of Wind Turbine Blades using Genetic Algorithm

Wind power has been widely considered and utilized in recent years as one of the most promising renewable energy sources. In the current research study, aerodynamic analysis of the upwind three-bladed horizontal axis turbine is carried out using blade element momentum theory (BEM), and a genetic algorithm (GA) is applied as an optimization method. Output power generation is considered as an obj...

متن کامل

Aerodynamic optimal design of wind turbine blades using genetic algorithm

Wind power has been widely considered and utilized in recent years as one of the most promising renewable energy sources. In the current research study, aerodynamic analysis of the upwind three-bladed horizontal axis turbine is carried out using blade element momentum theory (BEM), and a genetic algorithm (GA) is applied as an optimization method. Output power generation is considered as an...

متن کامل

A Technique for Improving Web Mining using Enhanced Genetic Algorithm

World Wide Web is growing at a very fast pace and makes a lot of information available to the public. Search engines used conventional methods to retrieve information on the Web; however, the search results of these engines are still able to be refined and their accuracy is not high enough. One of the methods for web mining is evolutionary algorithms which search according to the user interests...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
international journal of environmental research

جلد ۷، شماره ۲، صفحات ۳۰۳-۳۱۸

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023