Parameter Estimation of Reverse Osmosis Process Model for Desalination
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 6
Abstract
The present work pertains to modelling and identification of seawater desalination system using reverse osmosis. Initially the manipulated variable (feed pressure and recycle ratio) and the measured variables (flowrate, concentration and pH of permeate) are identified from reverse osmosis desalination system. The model of reverse osmosis was developed from the first principle approach using the mass balance equation (taking into consideration effect of concentration polarisation) from which the transfer function model was developed. The parameters of multi-input multi-output model are identified using the autoregressive exogenous linear identification technique. The states of the process model were also estimated using Kalman filter and parameters are identified by nonlinear least square (NNLS) algorithm. The plant’s data of spiral wound model are given as input to all the identification methods. The results obtained from the predicted and the linear models are in good agreement with these obtained for the same plant data.
Authors and Affiliations
Rames C Panda, S Sobana
Analyze the Future: Cloud Computing, a New Phase in Information Technology Infrastructure Management
The use of cloud computing is becoming widespread, but systematic study of its managerial implications is lacking. This paper examines cloud computing in the context of other major changes in Information Technology (IT)...
Robust Singular Value Decomposition Algorithm for Unique Faces
It has been read and also seen by physical encounters that there found to be seven near resembling humans by appearance .Many a times one becomes confused with respect to identification of such near resembling faces wh...
A Survey on Design Methods for Secure Software Development
Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many sec...
CLOUD COMPUTING
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) ov...
Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs
In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due...