Documente Academic
Documente Profesional
Documente Cultură
Introduction
A heat-exchanger network HEN. always experiences vari- ity is largely dependent upon its network structure. Clearly,
ous disturbances of temperatures and heat-capacity flow rates controllability analysis should be an integral part of process
in operation. These disturbances propagate through the net- design. More appropriately, it should be referred to the anal-
work that may make the control of stream output tempera- ysis of structural controllability that focuses on the structural
tures extremely difficult, if the network is improperly de- property of a process.
signed. Consequently, how to effectively reject disturbances To ensure structural controllability, Calandranis and
through developing a superior HEN with optimally placed Stephanopoulos 1988. proposed an approach to the design
bypasses becomes a challenging task. of control loops for a HEN and to sequence the control ac-
Over the past decade, disturbance propagation DP. and tions of the loops in order to accommodate setpoint changes
disturbance rejection DR. in processes have been exten- and to reject load disturbances. From the process design point
sively studied. A great deal of effort has been made to con- of view, Fisher et al. 1988a,b,c. introduced a systematic pro-
trol DP for improving flexibility Morari, 1983; Floudas and cedure for assessing process controllability, where control-re-
Grossmann, 1986; Calandranis and Stephanopoulos, 1986; lated economic penalties could be imposed in process screen-
Galli and Cerda, 1991.. Flexibility is a systems capability of ing. Mathisen et al. 1991. considered the dynamic resilience
absorbing long-term variations appearing at the inlets of the of a HEN based on the notion of static resilience that was
process Kotjabasakis and Linnhoff, 1986; Colberg and introduced by Saboo et al. 1985.. Later on, Mathisen et al.
Morari, 1988; Yee and Grossmann, 1990; Papalexandri and 1992. provided a heuristic method for bypass placement. The
Pistikopoulos, 1994b.. In contrast, controllability is referred resultant HEN is supposedly satisfactory in rejecting distur-
to the systems capability of withstanding short-term dis- bances over a moderate range of operating conditions. Pa-
turbances. Morari 1992. pointed out that HEN controllabil- palexandi and Pistikopoulos 1994a,b. introduced a system-
atic framework for the synthesis or retrofit of a flexible and
structurally controllable HEN. Dynamic controllability of a
Correspondence concerning this article should be addressed to Y. L. Huang. HEN was considered using a hyperstructure network repre-
T t s Dt T s H Dm Mc P 1.
or
Tht 1y Ths
/
Tct
s
1y / / Tcs
h 2y . y c Mc Ph
q
h y c 2y . / /
Mc Pc
, 2.
where
Ths yTht
s 3.
Ths yTcs
Tct yTcs
s 4. Figure 1. General structure of a heat exchanger with
Ths yTcs bypasses.
cX s
2 Mc pe h
Tco yTci
s
s
2 1y f h . Mc p h
Tco yTci
s
s
2
2
1y f h Mc p h
.
Tct yTcs
s
s
1y f h .
c
12.
2
.
/
Tco
s
0
Ths yTht
1
1y f c
0 Tct /
2 Mc pe c 2 1y f c . Mc pc 2
2 1y f c . Mc pc 1y f c . 2 0
1y f h . 2
Tho 1y X X Ths
13. y
0
Tct yTcs
1y f c
fh
2
.
00
fh
/
fc
/ o s X 1y X / / 1y f h Ths
Tc
q
hX 2y X .
hX X
Tcs
y cX X
y cX 2y X . / / Mc pe h
Mc pe c
. 14.
y
0
Vectors Tho Tco .T and Mc pe h Mc pe c .T in the preceding by using the relationships in Eqs. 10 through 13, we can ob-
model should be converted to Tht Tct .T and Mc p h tain the following model:
Mc pc .T, respectively. Note that
T t s B f H Dt T s H Dm Mc P , 23.
Mc pe hs 1y f h . Mc ph . sy Mc ph f h q 1y f h . Mc ph .
15. where
T
Similarly, T t s Tht Tct . 24.
T
Mc pe csy Mc pc f c q 1y f c . Mc pc . 16. f s fh fc . 25.
T
T ss Ths Tcs . 26.
These two equations can be written in the following matrix
form. T
Mc P s Mc P h Mc Pc . 27.
Mc pe h y Mc p h 0 fh Ths yTht . Ths yTht .
/
Mc pe c
s
0 y Mc Pc / / fc 2 2
AIChE Journal
q
1y f h
0 0
1y f c / / Mc Ph
Mc Pc
. 17.
2255
1y preceding vectors can be reorganized in the following man-
Dt s
1y / 29. ner.
c T
h 2y T in s Ths1 ThsN Tcs1 TcsN T1m TNmm .
1y f h / y
1y f c
Dm s
h
1y f h
s
c
T s . T T m. T .
T out s Tht1 Tht N Tct1 TctN T1m TNmm
h c
/
T
T
41.
T
t T
is more general than the DP model in Eq. 1. In fact, if no s T . T m. T / . 42.
bypass is involved that is, f h and f c are equal to zero and
thus f h and f c are zero., then the two models are identi-
In McUP , there are Nm redundant heat-capacity flow rates
cal.
that should be eliminated. This reduces McUP to Mc P w2 Ne
y Nm .=1x. Correspondingly, BU U U
E , D t e , and Dm E should be
System DP&C model changed in the following way:
The unit-based DP&C model in Eq. 23 is applicable to any
HEX in a HEN. That is, the model for the ith HEX, named Dt 11 Dt 12
DU sVI DU
Ei , in a network can be rewritten as t s
/ Dt 21 Dt 22 t E V2 43.
TEout
i
s B Ei f Ei q Dt E TEin q Dm E Mc PE . 31. Dm1
i i i i
U U
T U out s BU U U
E f H Dt E T
U in U
H Dm E
McUp , 32.
where V1 through V4 are the conversion matrices determined
by a HEN structure and bypass locations. Their derivations
where
are discussed in the succeeding section. With these reorgani-
T zations, an equivalent model to Eq. 32 is
T T T
T U in s TEin . TEin .
1 2
TEinN
/ / 33.
e
T t B1 Dt 11 Dt 12 T s
T U out s
T . T . out
E1
T
out
E2
T
TEout
N e
/
T
/
T
34. / /
T m
s
B 2
fH
D t 21 Dt 22 / / Tm
T T T
T Dm1
U
Mc s Mc . Mc
p pE1 pE2 . Mc p E Ne
. / 35. / q
Dm 2
Mc P . 46.
T T T
fUs
T
f E1 . fE . 2
f EN
2
. / 36. The preceding model contains two equations:
BU
E s diag B E1 , B E 2 , , B EN 4 37. T t s B1 fH Dt 11 T s H Dt 12 T m H Dm 1 Mc P
e 47.
DU
t E s diag D t E , D L E , . . . , D t E 4 38.
1 2 Ne and
U
Dm s diag Dm E , Dm E , . . . , Dm E
4 . 39.
E 1 2 Ne T m s B2 fH Dt 21 T s H Dt 22 T m H Dm 2 Mc P . 48.
The dimensions of vectors T U in , T U out , f U , and McUP
Equivalently, Eq. 48 can be written as
are all 2 Ne =1, and those of matrices BU U U
E , D t E , and Dm E are
U in U out
all 2 Ne =2 Ne . Note that T and T contain a total of m I1 I1
Nm intermediate temperatures. An intermediate temperature T s I I Dt 22 . B 2 fq I I Dt 22 . Dt 21 T s
is that of a stream between two adjacent HEXs. The term, I1
Nm , can be evaluated as q I I Dt 22 . Dm 2 Mc p . 49.
Nm s 2 Ne y Ns y Nsplit , 40. Substituting Eq. 49 into Eq. 47 yields the following system
DP&C model:
where Ne is the number of heat exchangers; Ns is the total
number of hot streams Nh . and cold streams Nc .; and Nsplit T t s B fHDt T s HDmMc p , 50.
is the total number of stream branches after splitting. The
T If the jth column in S does not contain 14 or w1x, then let
T sT
t
c
t
c1 Tct2 TctN / 56. 2 j, i be 0 if si, j equals to 0, or 1 if si, j is greater than 0.
c
Deriation of V3 . Matrix V3 has the dimension of 2 Ne =
T T T
Ns . If the jth of matrix S contains at most one of 14 and w1x,
fs f EI . f E . T fE .
2 N2 / 57.
then let 3 j, i equal si, j is1, 2, , Ns .. If the jth column of
T S contains both 14 in the lth row. and w1x in the mth row.,
T hs s Ths1 Ths2 ThsN . 58.
h then the elements of the jth row of V3 can be determined in
T two ways. In the lth row, if sl, k is w1x, and the kth column
T cs s Tcs1 Tcs2 TcsN . 59. contains only one w1x and no 14, or in the row, sm, k is 14 and
c
T the kth column contains only one 14 and no w1x, then let 3 j, i
Mc Ph s Mc P h Mc P h Mc P h . 60. equal si, k w1F iF Ns ; Ns F k F 2 Ne y Nsplit .x.
1 2 Nh
T
Deriation of V4 . Matrix V4 is determined by bypass selec-
Mc Pc s Mc Pc Mc Pc Mc Pc . . 61. tion in a HEN. Mathematically,
1 2 Nc
fsV4 f X , 62.
Network Structural Representation
As stated in the preceding section, conversion matrices V1 where f consists of all 2 Ne bypass candidates of Ne HEXs;
through V4 in Eqs. 43 through 45 are structure dependent. f X has the bypasses selected from the 2 Ne candidates.
To derive these matrices, we first define a structural matrix,
namely Sw2 Ne y Nsplit .=2 Ne x. Matrix S can be decomposed Model-Based Optimal Bypass Selection
into two submatrices, S1 Ns =2 Ne . and S2 Nm =2 Ne .. Their Utility units that is, heaters and coolers. are commonly
definitions are given below; a detailed example of construct- placed to heat or cool the streams just before leaving a HEN,
ing these matrices for a given HEN is presented in Appendix although some industrial practices show that they can be
A. placed in other locations. This has been widely used for ef-
Construction of S1 . In submatrix S1 , each row is desig- fective control of stream target temperatures. The number of
nated for a hot or a cold stream. Note that a stream can be utility units is always much less than that of process streams
split into a number of branches, which enter different HEXs in the network for the sake of energy savings. In addition to
and then mix together. In this case, the splitting ratios are utility units, a bypass acts as a control mechanism for distur-
reflected in the elements of the row for that stream. The bance rejection Linnhoff and Kotjabasakis, 1986; Calandra-
columns are divided into Ne pairs; each pair is assigned for a nis and Stephanopoulos, 1988; Mathisen et al., 1991; Uzturk
specific HEX. In each pair, the left column and the right and Akman, 1997; Yan and Huang, 1998, 1999..
column are, respectively, designated to a hot stream and a Another important assumption is the worst-case design.
cold stream going through the HEX. Each element has a value That is, the maximum positive and negative deviations of the
between 0 and 1, where 0 represents the stream not going HEN target temperatures occur at the extreme disturbance
through the HEX; a fraction represents the splitting portion values of the supply temperatures and mass-capacity flow
going through the HEX; and 1 means the stream going rates. This is, in fact, commonly adopted such as Yee and
through the HEX with no splitting involved. Grossmann, 1990; Uzturk and Akman, 1997., although there
Construction of S2 . In submatrix S2 , each row is desig- are exceptions.
B, Dt , and Dm , depend on the nominal values of the bypasses d iy. s~ is1, 2, . . . , Ns . 73.
in vector f X, which are updated in each iteration. T max i y Td i
ty . ty .
, otherwise
Step 5. Lump all the unit models to form a unit-based
system DP&C model, as shown in Eq. 32. Step 9. Calculate the extended RGA, according to Eq. 68.
Step 6. Convert the lumped system model to the system Step 10. Identify a subset of manipulated variables in f ,
model in Eq. 50 or 54. pair each element in this vector with a controlled variable in
Step 7. Calculate the maximum positive and negative de- T t according to the paring rules in the section titled Bypass
viations of system target temperatures based on the known Placement. The pairing generates f X, where only preferred
source disturbances as follows: bypasses are included. Then derive conversion matrix V4
through checking the locations of the selected elements in
(H )
sDth T hs(H ) HDtc Tcs(H ) HDmh Mc PhH IDmc Mc PcI the extended RGA, . If i, j is selected, then 4 j, i is set to 1;
( ) ( )
Tdt
otherwise, 4 j, i is set to zero.
70.
Step 11. Calculate the nominal fraction of each bypass in
Xq .
f X, based on d q. and d y. derived in Step 8. Here f
and X
and f y . are calculated using Theorem 2 in Appendix B.
(I ) Step 12. For each selected bypass, check to see if its frac-
sDth T hs(I ) qDtc Tc s(I ) HDmh Mc PhI IDmc Mc PcH
( ) ( )
Tdt
tion violates the upper permissible value in the following way:
71.
< f hXq . <q < f hXy . < F f hlim. ;
Ei Ei Ei
where vectors Dth , Dtc , Dmh , and Dmc are defined in Eqs. 52
if the hot-stream-side bypass is placed on Ei , 74.
and 53.
Step 8. Compare vectors Tdtq . and Tdt , on the ele-
y .
or
ment-by-element basis, with the maximum permissible target
temperature vectors, Tmaxtq .
and Tmax
t y.
, respectively, and < f cXq . <q < f cXy . < F f clim. ;
Ei Ei Ei
then determine the necessary control correction vectors, d q.
and d y., where if the cold-stream-side bypass is placed on Ei , 75.
0, Tdtq
i
.
F Tmax
tq .
i
; where
1
0
0
0
0
0
0
0
0
1
0
0
V3 s
0
0
0
0
0 1
0
1
0
0
1
0
0
0
0
0
1
. 85.
V1 s
0
0
0
0
1
0
0
0
1
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0 83.
In Step 3, the bypass candidates for the three HEXs are
identified below:
fs f h E f cE f h E f cE f h E f cE .
T
. 86.
1 1 2 2 3 3
0 0 1 0 0 0
V2 s
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
0 84.
At this stage, matrix V4 6=6. is an identity.
In Steps 4 and 5, the following unit-based system model
can be obtained:
T
t
h1 86.3 43.1 0 0 0 0 f 0.266 hE1 0.734 0 0 0 0
T2m y43.1 y21.6 0 0 0 0 fcE 0.367 0.633 0 0 0 0
1
T
t
c2 0 0 0 0 y14.4 y7.2 f 0 cE 3 0 0 0 0.24 0.76
T 14.9
s
h1 y2.16 0 0 0 0 Mc Ph 1
0
Tcs2 0 0 0 0.96 y1.76 Mc Pc 2
f
hE1
Tht1 f cE
86.3 43.1 0 0 0 0 1
X
Tht 2 fhE
0
Tc1t
Tct2
s
y14.1
y22.8
y6.50
y7.05
y11.4
y3.25
y44.8
31.0
14.3
23.3
y33.6
10.7
28.8
0
y14.4
14.4
y7.2
0
0 f cE
fhE
f
cE 3
2
Ths1 Mc Ph
0.266 0 0.734 0 14.9 0 y2.16 0 1
Ths2 Mc Ph
q
0.12
0.194
0.055
0.193
0.471
0.089
0.207
0.335
0.095
0.48
0
0.76
0 0
Tcs1
Tcs2
q
1.41
2.28
0.65
10.6
2.98
3.05
y2.73
y7.98
y1.26
y0.48
0
y1.76
0 Mc Pc
Mc Pc
2
2
0 88.
T
89.
90.
V4 s
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
1
0
0
0 . 97.
X
Note that the paring, Tht 2 with f cE , is related to the target
3
temperature that is to be controlled by a utility unit. Hence,
On the other hand, we can form the vectors, Tmax
q.
and Tmax
y.
it is not to be considered further; we only discuss the other
from Table 1: three pairs. The reduced output and control vectors are TRt
s Tht1 Tct Tct2 .T and f RX s f h1 f h 2 f h .T, respec-
1 3
tively. Correspondingly, the reduced process gain matrix be-
T
Tmax
q .
s 0 5.5 0 4.0 . 91. comes
T
Tmax
y .
s 0 y5.5 0 y4.0 . . 92. 86.3 0 0
In Step 9 the pseudoinverse of matrix B is calculated, and Hence, the required maneuverability of the bypasses is calcu-
the extended RGA is obtained below, where the detailed steps lated in Step 11:
are shown in Appendix D:
Nd f s1q4q2=3q0y0s11. 106.
" . T
Figure 5. Optimal bypass design with control loops for Tmax s 0 "5.5 0 "4.0 . . 108.
the HEN by the DP&C approach.
This shows that the design is very satisfactory. When the worst
disturbances enter the network, the bypass fractions, f h E , f h E ,
1 2
Thus, let f h E . old equal f h E . new is1, 2, 3., and keep all and f h E , are adjusted to 0.007, 0.106, and 0.08, respectively.
i i 3
other not selected bypass nominal fractions as zero, let con- Comparison. Uzturk and Akman 1997. studied the same
version matrix V4 be an identity matrix, and then return to problem. Table 3 provides the comparison of their bypass de-
Step 4 for a new iteration. Figure 4 depicts the iterative se- sign Figure 7. with ours Figure 5.. Our solution is 6%
lection processes for all three bypasses associated with ex- cheaper than that by Uzturk and Akman. This can be justi-
changers E1 and E3. The finally selected bypass fractions are fied by examining the bypass nominal fractions Table 4.. Our
f h E , f h E , and f h E , with the nominal fractions of 0.015, 0.053, design has much smaller values than Uzturk and Akmans. In
1 2 3
and 0.082, respectively. addition, our design needs one control loop less than Uzturk
In Step 15, three bypasses are placed in the network, as and Akmans; this reduces the cost for the control system.
shown in Figure 5, where the related control schemes are More importantly, the RGA analysis reveals that our design
also indicated. For this process, the system gain matrix, B R , has no system interaction among the three loops at the steady
is state. By contrast, the design in Figure 7 has considerable
interactions among loops.
88.9 0 0 Discussion. It is very difficult to analyze quantitatively the
rate of convergence in running the iterative design proce-
BR s y2.35
y6.70
y49.9
15.9
0
y17.1
0 . 103. dure. In solution identification, an initial bypass fraction that
is, initial point for search. for each bypass candidate equal to
zero is preferred. This is physically more meaningful, as an
According to Eq. 68, the RGA for this case is initial HEN has no bypass on any HEX. It is suggested to try
other starting points if the convergence is slow. In this exam-
1 0 0 ple, however, the same bypass design can always be obtained
s 0
0 1
0 1 /
0 . 104. for different initial points. For instance, initial bypass frac-
tions of 0.5 are illustrated in Figure 8 to compare with the
initial bypass fractions of 0 shown in Figure 4. After four
Note that in this example four manipulated variables three iterations, the same optimal bypass fractions as those in Fig-
bypasses and one cooler flow rate. are selected to control the ure 4 are all obtained in Figure 8. Certainly, this does not
four stream target temperatures. This is inconsistent with the mean true for all other cases.
study on the degree of freedom. According to Calandranis A trade-off between DR and cost is always a concern in
and Stephanopoulos 1988., degree of freedom Nd f . for a design. The design procedure provides complete profiles of
HEN can be evaluated as DR and the increment of heat-transfer areas for a HEN, such
as those in Figure 6. In this example, a complete DR with
minimum economic penalty is preferred. Certainly, one can
Nd f s Nu q Ns q Nb,HEX q Nsplit y Nscr , 105. have different preference.
Further Study. The design just studied is under the tem-
where Nu is the number of utility units; Nb,HEX the total perature disturbances only. A more complicated situation is
number of bypass candidates; Nsplit the total number of when the network experiences both temperature and heat-
0.4
y6.25
0
0
0
40.9
y46.7
0.6
0
0
46.7
0
y53.3
0
Ths1
fhE
f cE
1
2
0
65.6C; and e. feed B temperature change between 32.2C
Ths2
and 48.9C. These make the process inoperable, especially
for reactor R 2 . The process design data, source disturbances,
and control requirements are listed in Table 5.
Yang et al. 1996. used the system DP model to modify a
HEN associated with the process. Their solution is depicted
q
0
0.5
0
0.199
0
0.913
0
0.5
0
0.801
0
0.087
0 0 Tcs2
Tcs3
0
y2.95
y3.4
0
0 0 Mc Pc
Mc Pc
2
3
. 111.
X
T t
h1
95.1 47.2 0 0 0 0 y28.9 y36.5 6.3 28 y2.6 y7.5
Tht
2
6.4 3.2 58.5 47.3 0 0 y30.8 y39 y2.2 y9.9 y2.7 y8
Tht
Tht
Tht
T
4
t
c1
3
X
s
y35.6
0
0
0
0
0
0
y17.7 y15
0
0
0
y12.1
0
0
0
209.4
y20
0
0
208.7
y20
0
0
0
29.1
0
y18.9 y23.9
0
36.8
0
0
0
0
y1.4
0
0
0
y6.1
y16.7
11
y1.7
0
y48.9
y4.9
32.2
0
0
HE 1
f cE
1
fhE
2
f cE
2
0.06 0 0 0.57 0.07 0.22 T s
h1 12.2 0 0 0.4 0 y3.2
Mc Ph 1
fhE Ths2 Mc Ph
3 0 0.22 0 0.6 0.07 0.01 0.6 7.6 0 0.5 0 y2.6 2
=
f cE
fhE
f cE
fhE
f cE
3
5
q
0
0
0
0.33
0
0
0
0.2
0.11
0
0
0.08
0
0.43
0
0.37
0
0.44
0.71
0.04
0.89
0.04
0.29
0.01
0
Ths3
Ths4
Ths6
Tcs1
q
0
0
0
3
0
0
0
1.3
50.3
0
0
4.2
0
1
0
0.3
0
0.1
0.5
0
y4.4
y2
y0.7
y3.3
0 Mc Ph
Mc Ph
Mc Ph
Mc Pc 1
3
6
113.
fhE
6
f cE 6
The upper limits for all the potential pass fractions are
calculated using Eqs. 76 and 77:
Note that stream H5 is not included in the model, since
this stream has no interaction with the rest of the network. f Elim.
i
s 0 0.504 0.125 0.241 0.076 0 0.341
Its target temperature can be readily controlled by the cooler
placed at its end. Likewise, the target temperatures of stream 0 0.775 0 0.682 0 . . 115.
H1 and C1 can be controlled by the utility units. What needs
to be considered is to reject disturbances for streams H1, H5 ,
For the DR of stream H2 , the second row of RGA needs
and C1. Based on the system DP&C model, the RGA is ob-
to be examined. The element 2,3 0.482. is greater than other
tained below.
elements. This corresponds to the bypass on the hot-stream
side of exchanger E2 . For the same reason, after examining The upper limits for the potential pass fractions are
the third row of elements, the bypass on the hot-stream side
of the exchanger E3 is selected to control the target tempera- f E ilim . s 0 0.318 0.125 0.358 0 0.55 0.217 0
ture of stream H3. For stream H4 , the bypass on the cold- 0.426 0.79 0.1 0.31 0.682 0.033 . 117.
stream side of exchangers E6 or E4 should be selected, since
4,12 0.495. and 4,8 0.147. are closer to 1. They cannot be
A complete process flowsheet with bypasses is depicted in
selected because f E6,c
lim.
and f Elim. equal 0. The next choice of
4, c Figure 14.
bypass is on the hot-stream side of exchanger E 4 . For the
The bypass design for the two HEN solutions are com-
same reason, the bypass on the hot-stream side of exchanger
pared to each other. As summarized in Table 7, these two
E6 needs to be selected to control the target temperature in
solutions all need four bypasses on four HEXs. The total cost
stream H6 Figure 13..
for Solution A is 4.18% cheaper than that for solution B.
For the network by Papotilias and Grossmarm 1983., the
However, the system interaction analysis based on -values
system DP&C model and the RGA can be derived in the
shows that Solution B is somehow a little better than Solu-
same way. For simplicity, only the RGA is given below:
tion A. A process designer can make a choice based on this
information.
0.079 0.037 0 0 0 0 0 0 0.78 0.104 0 0 0 0
0 0 0.65 0.35 0 0 0 0 0 0 0 0 0 0
s
0
0
0
0.597
0
0
0
0.277
0
0
0
0
0
0
0
0
0.001
0
0
0.105
0
0
0
0.021
0
0.38
0
0
0
0.62
0
0
0
0
0
0
0
0
0
0
0.629
0
0
0
0.37
0
0
0
0
0
0.098
0
0
0
0.902
0
0. 116.
1 0 0 0
In the submatrix, each row from the left to the right stands
for the stream temperature from the hot end to the cold end.
For instance, the left side of the first row is for the inlet of
hot stream H1 that is, H1in . and the right side is for the
V2 s
0
0
0
1
0
0
0
0
1
0
1
0
.
0 A5.
outlet of the same stream that is, H1out .. In each pair of Deriation of V3 . Matrix V3 has the dimension of 4=3.
columns, the left and the right column are assigned to the Since each column of matrix S contains at most one 14 or
hot stream and the cold stream going through the HEX, re- one w1x, we can let 3 j, i equal si, j is1, 2, 3; js1, 2, . . . , 4..
spectively. An element having a value of 1 or 0 means the Thus, the resultant V3 is
stream going through or not going through the HEX. For
example, the first row is the vector of 1 0 1 0.. This indicates 1 0 0
that hot stream H1 enters E1 and E2 . The second row has
the vector of 0 1 0 0.. This means that stream C1 enters E1.
Construction of S2 . In submatrix S2 , each row is desig-
nated to an intermediate stream. For this example there is
V3 s
0
1
0
0 1
0
0
0
0
1
A6.
E1 E2
!# " !# " B sU V T , B1 .
h c h c
S 2 s M1 1 4 0 w1x 0. . A2. where
1 0 1 0 1 G 2 G G k ) 0, B4 .
S1 0 1 0 0
Ss
S2 /
s
0
14
0
0
0
w1x
1 .
0 0 A3.
where U, , and V have dimensions of Ns = Ns , Ns =2 Ne ,
and 2 Ne =2 Ne , respectively. The pseudoinverse, Bq, of B can
be calculated as
Deriation of V1 . Matrix V1 has the same dimension as
matrix S 4=4.. Each column j js1, 2, . . . , 4. in V1 is B HsV H U T , B5 .
generated based on the same column in S. For the first col-
umn in S, since s4,1, is 14, then 1 4,1 should be equal to 1 and where
all three other elements in the same column be 0. As s4,3 in
I1
S is w1x, then 1 4,3 needs to be equal to 0 and 1 i,3 is equal to qs E 0 .
/ B6 .
si,3 is1, 2, 3.. Since the other two columns js 2, 4. in S 0 0
dont contain 14 and w1x, 1 i, j should be equal to si, j is1, 2,
. . . , 4.. Hence, the resultant V1 is Theorem 2: Identification of the Optimal Solution of Eq. 66.
For matrix B Ns =2 Ne , and 2 Ne . of rank k with the singu-
0 0 1 0 lar-value decomposition shown in Eq. B1, the solution f X
( Nf X =1. that minimizes I BV4 f Xy d I 2 can be expressed as
V1 s
0
0
1
1
0
0
0
0
0
0
1
0
.
0 A4.
V4 f X sVW, B7 .
X
b i
is1, 2, . . . , k f c lim . s
Ths yTct y Tmin
~
ws
i i B8 . Ths yTcs y Tmin
. C10.
0 is k q1, k q2, . . . , Ns ,
Min
X
IBV4 f Xy d I 2 . D1 .
Appendix C: Derivation of the Upper Limits of f
Bypass Fractions
Equations 77 and 78 are derived based on the requirement According to their theorems, the matrix in Eq. 88, that is, the
of minimum temperature driving force Tmin . for a HEX. control matrix B is
Referring to Figure 1, the following relationships must hold:
86.3 43.1 0 0 0 0
Thi yTco G Tmin C1.
Note that
Tho yTci G Tmin . C2.
Bs
y14.1
y22.8
y6.5
y7.05
y11.4
y3.25
31.0
y44.8
14.3
23.3
y33.6
10.7
28.8
0
y14.4
14.4
0
y7.2
0.
D2 .
y0.045
101.7
0.658
y0.315 y0.713
0.644
0.384
0.194 y0.637
0 0 0 0
y0.372
y0.495
y0.745
0
0 D3 .
0.097
0.073
y0.027
y0.013
0.769 y0.198
0.577 y0.147
0.225
0.113
0.865
0.433
0
0
0
0
y0.6
0.8
0
0
y0.001 y0.447
y0.001 0.894
0
D5 .
comes
Because the fourth singular value, 4 0.011., is much
Tht yTcs y Tmin smaller compared with the first three, it is regarded as zero
fh F . C8. according to the Nobel and Daniel theorem and condition.
Ths yTcs y Tmin
In other words, the upper limit of the nominal fraction of the For the first example,
bypass placed on the hot-stream side of a HEX, f h lim., is
0.0098 0 0 0 0 0
f h lim . s
Tht yTcs y Tmin
Ths yTcs y Tmin
. C9.
q
s
0
0
0
0.014
0
0
0
0.0312
0
0
0
0
0
0
0
0
0
0
0. D6 .
y0.0018
y0.0013
0.0041
0.0021
0.0030 y0.0103
0.0023 y0.0077
0.0195
0.0097
0.0060
0.0045
0.0082 y0.0166
0.0041 y0.0083
.
0 D7 .
0.0111 0.0028 0.0855 0.0477 0.2387 0.0597
Manuscript receied May 3, 1999, and reision receied Feb. 14, 2000.
D8 .