通信工程、自动化技术 |
|
|
|
|
基于软测量技术的化工过程优化控制策略 |
叶凌箭,马修水 |
浙江大学宁波理工学院 信息科学与工程学院,浙江 宁波 315100 |
|
Optimal control strategy for chemical processes
based on soft-sensoring technique |
YE Ling-jian, MA Xiu-shui |
School of Information Science and Engineering, Ningbo Institute of Technology, Zhejiang
University, Ningbo 315100, China |
[1] ENGELL S. Feedback control for optimal process operation [J]. Journal of Process Control, 2007, 17(3): 203-219.
[2] SRINIVASAN B, BONVIN D, VISSER E, et al. Dynamic optimization of batch processes - II. role of measurements in handling uncertainty [J]. Computers and Chemical Engineering, 2003, 27(1): 27-44.
[3] FRANCOIS G, SRINIVASAN B, BONVIN D. Use of measurements for enforcing the necessary conditions of optimality in the presence of constraints and uncertainty [J]. Journal of Process Control, 2005, 15(6): 701-712.
[4] CHACHUAT B, MARCHETTI A, BONVIN D. Process optimization via constraints adaptation [J]. Journal of Process Control, 2008, 18(3/4): 244-257.
[5] MARCHETTI A, CHACHUAT B, BONVIN D. Modifier-adaptation methodology for real-time optimization [J]. Industrial and Engineering Chemistry Research, 2009, 48(13): 6022-6033.
[6] FORTUNA L, GRAZIANI S, RIZZO A, et al. Soft sensors for monitoring and control of industrial processes [M]. London: Springer-Verlag, 2007.
[7] EDGAR T F, HIMMELBLAU D M, LASDON L S. Optimization of chemical processes [M]. 2nd ed. [S.l.]: McGraw-Hill, 2001.
[8] CHACHUAT B, SRINIVASAN B, BONVIN D. Adaptation strategies for real-time optimization [J]. Computers and Chemical Engineering, 2009, 33(10):1557-1567.
[9] SRINIVASAN B, BIEGLER L T, BONVIN D. Tracking the necessary conditions of optimality with changing set of active constraints using a barrier-penalty function [J]. Computers and Chemical Engineering, 2008, 32(3): 572-579.
[10] NEWELL R B, LEE P. Applied process control: a case study [M]. New York, Sydney : Prentice-Hall of Australia, 1989.
[11] CAO Y. Direct and indirect gradient control for static optimisation [J]. International Journal of Automation and Computing, 2005, 2(1): 1555-1564. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|