Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Introduction
A heat-exchanger network HEN. always experiences various disturbances of temperatures and heat-capacity flow rates
in operation. These disturbances propagate through the network that may make the control of stream output temperatures extremely difficult, if the network is improperly designed. Consequently, how to effectively reject disturbances
through developing a superior HEN with optimally placed
bypasses becomes a challenging task.
Over the past decade, disturbance propagation DP. and
disturbance rejection DR. in processes have been extensively studied. A great deal of effort has been made to control DP for improving flexibility Morari, 1983; Floudas and
Grossmann, 1986; Calandranis and Stephanopoulos, 1986;
Galli and Cerda, 1991.. Flexibility is a systems capability of
absorbing long-term variations appearing at the inlets of the
process Kotjabasakis and Linnhoff, 1986; Colberg and
Morari, 1988; Yee and Grossmann, 1990; Papalexandri and
Pistikopoulos, 1994b.. In contrast, controllability is referred
to the systems capability of withstanding short-term disturbances. Morari 1992. pointed out that HEN controllabil-
AIChE Journal
2253
T t s Dt T s H Dm Mc P
h s
c s
Ths yTht
5.
2 Mc Ph
Tct yTcs
2 Mc Pc
6.
Unit-based model
A HEX with bypass options is sketched in Figure 1. The
energy balance and heat-transfer equations can be readily
derived, as below. Here, an arithmetic mean-temperature difference is used. This approximation will not introduce any
calculation error for stream target temperatures when input
temperature disturbances exist, but will cause some prediction errors when mass flow rate disturbances enter the system. Practically, bypass fractions will not be very significant,
as shown in various practical examples; otherwise, a cost increment of relevant HEXs must be considerable.
Mc p hTht s Mc pbhThs q Mc pe hTho
7.
8.
QsUA
s Mc pe h Thi yTho .
s Mc pe c Tco yTci .
9.
1.
or
Tht
/
Tct
1y
1y
Ths
Tcs
/ /
h 2y .
y c
y c 2y .
Mc Ph
/ /
Mc Pc
2.
where
2254
Ths yTht
Ths yTcs
Tct yTcs
Ths yTcs
3.
4.
AIChE Journal
Since stream splitting does not change stream temperatures, Thi and Tci are equal to Ths and Tcs, respectively. The
mass flow rates in the two bypasses, Mc pbh and Mc pbc, are equal
to f h Mc p h and f c Mc pc, respectively, where f h are f c are bypass fractions. When the model in Eq. 1 is applied to the
inner part of the HEX see the dotted box in Figure 1., the
terms , , h , and c , in Eqs. 3 through 6 should be modified and are renamed below:
Xs
Ths y
Thi yTho
Thi yTci
1y f h
Tho s
Ths yTcs
1y f c
Ths yTht
1y f h .
Tct y f cTcs
Ths yTcs
10.
s
1y f h
19.
Tct yTcs
f c Ths yTcs
1y .
1
1y f h
Ths yTht
Tht y
1y f h .
fh y
fh
1y f h
Ths .
20.
Similarly,
Tco s
yTcs
Ths yTcs
18.
Tht y f hThs
Tco yTci
Xs i
Th yTci
1
1y f c
Tct y
Tct yTcs
q 1y f c .
fc y
fc
1y f c
Tcs . 21 .
s
1y f c
11.
Thi yTho
hX s
2 Mc pe h
Thi yTho
2 1y f h . Mc p h
Ths yTht
2
1y f h Mc p h
1y f h .
Tho
Tco
12.
cX s
Tco yTci
2 Mc pe c
Tco yTci
Tct yTcs
2 1y f c . Mc pc
2 1y f c . Mc pc
1y f c .
1y f c
0
Tct yTcs
2
1y f c
fh
/ /
hX 2y X .
y cX X
hX X
y cX 2y X .
Mc pe h
/ /
Mc pe c
14.
1y f h
fc
1y f c
T t s Tht Tct .
f s fh fc .
16.
T ss
y Mc p h
y Mc Pc
AIChE Journal
0
1y f c
/ /
Mc Pc
Bs
.
17.
2 1y f h .
y
24.
25.
T
Ths Tcs
26.
Ths yTht .
Mc Ph
22 .
23.
Mc P s Mc P h Mc Pc .
fh
fc
/ /
1y f h
q
0
where
Similarly,
Ths
.
Tcs
T t s B f H Dt T s H Dm Mc P ,
15.
Mc pe csy Mc pc f c q 1y f c . Mc pc .
fh
fc
Mc pe hs 1y f h . Mc ph . sy Mc ph f h q 1y f h . Mc ph .
Mc pe c
Tct
1y f h . 2
Ths
Tcs
Mc pe h
Tht
Ths yTht
X
1y X
13.
Tho
1y X
o s
X
Tc
1y f h
2 1y f c .
Tct yTcs .
2
27.
Ths yTht .
2 1y f h .
Tct yTcs .
2 1y f c .
28.
2255
Dt s
Dm s
h 2y
1y
1y f h
1y
29.
c
1y f c
y c 2y
1y f h
1y f c
/0
30.
s
TEout
s B Ei f Ei q Dt E TEin q Dm E Mc PE .
i
i
DU
t s
31.
U
Dm
s
U in
U
U
U
H Dm
McUp ,
T U out s BU
E f H Dt E T
E
32.
where
T
TEin . TEin .
1
T U out s
TEinN
T . T .
Mc s Mc . Mc
out
E1
U
p
fUs
out
E2
pE1
pE2
E1
. fE .
2
/
T
f EN
e
T T
B s
34.
T
Ne
Ne
t T
. T m. T /
Dt 21
Dt 22
Dm1
Dm 2
sVI DU
t E V2
42.
43.
U
sV1 Dm
V
E 3
44.
B1
sV1 BUE V4 ,
B2
45.
36.
Dt 22
T s
Tm
/ /
/
Dm1
Dm 2
Mc P .
46.
T t s B1 fH Dt 11 T s H Dt 12 T m H Dm 1 Mc P
47.
T m s B2 fH Dt 21 T s H Dt 22 T m H Dm 2 Mc P .
48.
and
39.
40.
Dt 12
T s I I Dt 22 .
I1
B 2 fq I I Dt 22 .
I1
Dt 21 T s
q I I Dt 22 .
I1
Dm 2 Mc p .
49.
Dt 12
/
/
/ /
35.
Dt 11
Dt 11
B1
T t
s
fH
m
B
D
T
2
t 21
38.
37.
4
Ne
41.
33.
U
s diag Dm E , Dm E , . . . , Dm E
Dm
E
Mc p E
DU
t E s diag D t E , D L E , . . . , D t E
2
TEout
N
BU
E s diag B E1 , B E 2 , , B EN
1
T U in s
T s . T T m. T .
T t s B fHDt T s HDmMc p ,
50.
AIChE Journal
where
B s B 1 H Dt 12 I I Dt 22 .
Dts Dt 11 q Dt 12 I I Dt 22 .
Dms Dm1 H Dt 12 I I Dt 22 .
I1
I1
I1
B2
51.
Dt 21 s DthT TtTc
52.
Dm 2 s DmhT DmcT
. 53 .
T ht
/
T ct
s B fq Dth Dtc
T hs
T cs
/
Mc Ph
q Dmh Dmc .
Mc Pc
54.
where
T sT
t
c
fs
t
c1
Tct2 TctN
T
h
55.
/
T
56.
EI
. f E . T fE .
T
h
T
c
Mc Pc s Mc Pc Mc Pc Mc Pc
1
57.
59.
58.
Mc Ph s Mc P h Mc P h Mc P h
1
N2
Nh
Nc
60.
61.
fsV4 f X ,
62.
2257
Theoretical basis
In the system DP&C model in Eq. 50, each bypass option
is a potential manipulated variable. Note that splitting fraction ratios and multiple bypasses contribute degree of freedom, and can be used for control design Calandranis and
Stephanopoulos, 1988; Mathisen et al., 1991, 1992, 1994..
These options are not considered here. However, the
methodology can be used to deal with a network involving
stream splitting. The number of bypass options in a network
is always more than necessary. Thus, a bypass selection must
be made in design. To do so, we can rewrite Eq. 50 in the
following way:
B fI d s 0.
63.
where
t
d s Tmax
I Dt T s HDm Mc P . .
64.
t
Ns =1. contains the information of the maxiVectors T max
mum permissible deviations of stream target temperatures.
These deviations can be positive and negative, which are desty .
t(H )
, respectively. Vector d
and Tmax
ignated by vectors Tmax
reflects the magnitude of control corrections needed to eliminated the influence of disturbances. Similarly, there will be
vectors d q. and d y..
Substituting Eq. 62 into Eq. 63 yields
BV4 f XI d s 0.
65.
66.
67.
68.
i , j s bi , j ri , j
Ei
is1, 2, . . . , Ne . to zero.
AIChE Journal
Figure 2. Qualitative relationship between a stream-target temperature fluctuation and a heat-transfer area change
as a bypass fraction increases.
a . Complete disturbance rejection when f E is equal to or greater than f Eopt ; b . Incomplete disturbance rejection with any bypass fraction.
Step 4. Construct the DP&C model for each HEX, according to Eq. 23. Note that the model coefficient matrices,
B, Dt , and Dm , depend on the nominal values of the bypasses
in vector f X, which are updated in each iteration.
Step 5. Lump all the unit models to form a unit-based
system DP&C model, as shown in Eq. 32.
Step 6. Convert the lumped system model to the system
model in Eq. 50 or 54.
Step 7. Calculate the maximum positive and negative deviations of system target temperatures based on the known
source disturbances as follows:
Tdt
(H )
d iy.
and
(I )
71.
where vectors Dth , Dtc , Dmh , and Dmc are defined in Eqs. 52
and 53.
y .
Step 8. Compare vectors Tdtq . and Tdt , on the element-by-element basis, with the maximum permissible target
tq .
t y.
and Tmax
, respectively, and
temperature vectors, Tmax
then determine the necessary control correction vectors, d q.
and d y., where
d iq.
0,
~
s
T
tq .
tq .
,
max i y Td i
.
ty .
Tdty
G Tmax
;
i
i
is1, 2, . . . , Ns .
ty .
ty .
,
max i y Td i
70.
Tdt
0,
~
s
T
Ei
Ei
74.
or
< f cXq . <q < f cXy . < F f clim. ;
Ei
Ei
Ei
75.
where
.
tq .
Tdtq
F Tmax
;
i
i
is1, 2, . . . , Ns
72.
f hlim.
s
Ei
otherwise
AIChE Journal
73.
otherwise
76.
2259
f clim.
s
E
i
77.
The two preceding equations are derived based on the requirement of minimum-temperature driving force for each
HEX; Appendix C gives the details.
If the criteria in Eqs. 74 and 75 hold for each HEX, go on
to the next step. Otherwise, stop the iteration. In this case,
the resultant design is not satisfactory, since a complete rejection of disturbances cannot be realized. The process designer needs to make a decision on the acceptance of the
design based on the calculated output deviations of stream
temperatures.
If some inequality constrains are not satisfied for some selected bypasses, this indicates that the HEN system cannot
reject completely the disturbances under the target temperature constraints. A trade-off should be then made to either
relax relevant target temperature constraints or permit partial disturbance rejection.
Step 13. Update the nominal value of each selected bypass based on the following formulas:
Ei
Ei
78.
or
Ei
79.
. new y f h . old
Ei
<F
80.
and
< fc
Ei
81.
Case Studies
Ei
< fh
In this section, three HEN bypass design synthesis problems are studied. The resultant HENs are compared with
known solutions in terms of DR and cost.
0
0
1
0
0
14
0
1
0
0
14
0
0
0
1
0
0
w1x
0
1
0
0
w1x
0
0
0
1
0
0
0
82.
Ts
K.
Tt
K.
H1
H2
C1
C2
620.0
720.0
300.0
280.0
385.0
400.0
560.0
340.0
tq .
ty .
Mc P
T sq . T sy . Tmax
Tmax
kWrK.
K.
K.
K.
K.
10.0
15.0
20.0
30.0
5
0
0
0
0
0
y5
y5
0
5.5
0
4.0
0
y5.5
0
y4.0
AIChE Journal
0
0
0
0
0
1
0
0
0
0
1
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
1
0
0
1
0
0
V2 s
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
1
0
0
0
0
1
0
0
V3 s
0
0
0
83.
y43.1
y21.6
Tct1
Tht 2
T
t
c2
44.8
y44.8
0
0
86.
0.367
0.633
0.372
0.628
0.471
0.529
0.52
0.48
y7.2 f 0
0.24
0.76
hE1
0
0
y14.4
14.4
fcE
fh E
f cE
fhE
s
h1
y4.80
Mc Pc
8.69
y2.24
Mc Ph
2.98
y5.45
Mc Pc
Mc P h
4.31
Ths2
T1m
Ph 1
6.08
y0.48
0.96
y1.76
Tcs2
Mc
y2.16
Tcs1
T2m
cE 3
T 14.9
=
28.8
f 0.266
0.734
y33.6
59.7
84.
43.1
85.
fs f h E f cE f h E f cE f h E f cE
86.3
0
0
0
.
0
0
1
T2m
s
0
1
0
1
0
0
0
t
h1
T1m
0
0
1
0
1
0
87.
Mc
Pc 2
f
hE1
Tht1
X
Tht 2
0
Tc1t
Tct2
86.3
43.1
y14.1
y7.05
31.0
23.3
28.8
14.4
y22.8
y11.4
y44.8
y33.6
y6.50
y3.25
14.3
10.7
y14.4
y7.2
f cE
fhE
f cE
fhE
f
cE 3
0.266
q
AIChE Journal
0.734
Ths1
Ths2
0.12
0.193
0.207
0.48
0.194
0.471
0.335
0.055
0.089
0.095
0.76
0 0
Tcs1
Tcs2
14.9
y2.16
1.41
10.6
y2.73
y0.48
2.28
2.98
y7.98
0.65
3.05
y1.26
y1.76
0
Mc Ph
Mc Ph
Mc Pc
Mc Pc
88.
2261
90.
q.
y.
On the other hand, we can form the vectors, Tmax
and Tmax
from Table 1:
91.
T
y .
Tmax
s 0 y5.5 0 y4.0 . .
q.
and d
y.
1
0
V4 s
0
0
0
0
0
0
89.
q .
Tmax
s 0 5.5 0 4.0 .
Correspondingly,
0
0
1
0
0
0
0
0
0
0
0
1
0
1
0
0
97.
92.
86.3
BR s y22.8
y44.8
y6.50
14.3
according to
0
0
y14.4
98.
y .
s 3.67
0 y0.97
0.
93.
0 1.67
0.277 . .
d Rq . s y1.33
94.
d Ry . s 3.67
99.
100.
y0.97 0 .
1.67
0.277 . .
0.751
0.188
0.012
0.003
0.093
0.052
0.561
0.14
0.026
0.007
0.462
0.260
0.011
0.003
0.086
0.048
0.239
0.06
. 95 .
f Xs f h E f c E f h E f h E
1
96.
101.
102.
E3
Hot
Stream
Cold
Stream
Hot
Stream
Cold
Stream
Hot
Stream
Cold
Stream
Streams
Process stream
H1in
H2in
C1out
C1out
1
0
0
0
0
0
1
0
0
1
0
0
0
0
1
0
0
1
0
0
0
0
1
0
H1out
M2
C1in
C2in
Intermediate
stream
M1
0
M3
0
0
14
14
0
0
w1x
w1x
0
0
Streams
2262
E2
Matrix
S
AIChE Journal
AIChE Journal
2263
106.
T t s 0 4.04 0 3.50 . .
107.
Thus, let f h E . old equal f h E . new is1, 2, 3., and keep all
i
i
other not selected bypass nominal fractions as zero, let conversion matrix V4 be an identity matrix, and then return to
Step 4 for a new iteration. Figure 4 depicts the iterative selection processes for all three bypasses associated with exchangers E1 and E3. The finally selected bypass fractions are
f h E , f h E , and f h E , with the nominal fractions of 0.015, 0.053,
1
2
3
and 0.082, respectively.
In Step 15, three bypasses are placed in the network, as
shown in Figure 5, where the related control schemes are
also indicated. For this process, the system gain matrix, B R ,
is
88.9
BR s y2.35
y49.9
y6.70
15.9
0
y17.1
103.
0
1
0
0
0 .
1
104.
105.
108.
This shows that the design is very satisfactory. When the worst
disturbances enter the network, the bypass fractions, f h E , f h E ,
1
2
and f h E , are adjusted to 0.007, 0.106, and 0.08, respectively.
3
Comparison. Uzturk and Akman 1997. studied the same
problem. Table 3 provides the comparison of their bypass design Figure 7. with ours Figure 5.. Our solution is 6%
cheaper than that by Uzturk and Akman. This can be justified by examining the bypass nominal fractions Table 4.. Our
design has much smaller values than Uzturk and Akmans. In
addition, our design needs one control loop less than Uzturk
and Akmans; this reduces the cost for the control system.
More importantly, the RGA analysis reveals that our design
has no system interaction among the three loops at the steady
state. By contrast, the design in Figure 7 has considerable
interactions among loops.
Discussion. It is very difficult to analyze quantitatively the
rate of convergence in running the iterative design procedure. In solution identification, an initial bypass fraction that
is, initial point for search. for each bypass candidate equal to
zero is preferred. This is physically more meaningful, as an
initial HEN has no bypass on any HEX. It is suggested to try
other starting points if the convergence is slow. In this example, however, the same bypass design can always be obtained
for different initial points. For instance, initial bypass fractions of 0.5 are illustrated in Figure 8 to compare with the
initial bypass fractions of 0 shown in Figure 4. After four
iterations, the same optimal bypass fractions as those in Figure 4 are all obtained in Figure 8. Certainly, this does not
mean true for all other cases.
A trade-off between DR and cost is always a concern in
design. The design procedure provides complete profiles of
DR and the increment of heat-transfer areas for a HEN, such
as those in Figure 6. In this example, a complete DR with
minimum economic penalty is preferred. Certainly, one can
have different preference.
Further Study. The design just studied is under the temperature disturbances only. A more complicated situation is
when the network experiences both temperature and heat-
AIChE Journal
Mc P
q .
s 0.5
0 0 1.5 .
109.
110.
AIChE Journal
Mc P y s y0.5 0 0 y1.5 . .
2265
follows:
Tht1
10.9
Tht 2
0
40.9
46.7
y6.25
0.774
Tct3
y9.1
Tct2
7.5
y46.7
y53.3
0
0.4
0.6
Ths1
0.199
0.801
Ths2
0.5
0.5
0.913
0.087
3.38
0.304
2.58
y2.95
0
y0.576
0
f cE
fhE
f cE
0 0
0 0
Tcs2
y0.23
fhE
y3.4
Tcs3
Mc Ph
Mc Ph
Mc Pc
Mc Pc
111.
Our Design
RGA analysis
1
RGA BR . s 0
0
0
1
0
0
0
1
RGA B. s
0.938
0.015
0.033
0.014
0
0.33
0
0.14
0
0.145
0.721
0.134
0
0.371
0
0.158
2266
AIChE Journal
easily controlled by another heater Figure 11.. The remaining issue is how to reject disturbances for stream C2 that
experiences the disturbances from stream H1 and itself.
Based on the system model in Eq. 111, the RGA is obtained
below:
2267
0.401
0.189
0.189
0.246
0.278
0.131
0.246
0.32
112.
AIChE Journal
Figure 11. Modified HEN for the heat-integrated reactor-separation process (Yang et al., 1996).
Yang et al., 1996.. The nominal fraction of the bypass calculated by the design procedure is 0.092, which is below the
upper limit 0.286.. The process flowsheet with the new by-
Ts
C.
Tt
C.
Mc P
kWrC.
T sq .
C.
T sy .
C.
.
Mc q
P
kWrC.
.
Mc y
P
kWrC.
tq .
Tmax
C.
ty .
Tmax
C.
H1
H2
C1
C2
C3
148.9
176.7
35.0
98.9
48.9
118.9
74.4
98.9
123.9
176.7
27.14
18.14
8.68
32.56
15.86
0
0
13.9
0
16.7
y16.7
0
y2.8
0
y11.1
2.25
0
0
3.25
0
0
0
0
0
0
0
13.3
0
7.1
0
y6.7
y8.9
0
y8.3
0
AIChE Journal
2269
Ts
F.
Tt
F.
Mc P
kBturh F.
T sq .
F.
T sy .
F.
.
Mc q
P
kBturh F.
.
Mc y
P
kBturh F.
tq .
Tmax
F.
ty .
Tmax
F.
H1
H2
H3
H4
H5
H6
C1
675
590
540
430
400
300
60
150
450
115
345
100
230
710
15.0
11.0
4.5
60.0
12.0
125.0
47.0
3.0
2.0
6.0
3.0
3.0
2.0
3.0
4.0
1.0
8.0
4.0
5.0
2.5
6.0
1.0
0.3
0.1
0.8
0.1
1.0
1.2
0.5
0.3
0.1
0.8
0.1
1.0
1.2
1.5
3.0
2.0
4.0
1.0
6.0
4.0
y1.5
y3.0
y2.0
y4.0
y1.0
y6.0
y4.0
95.1
47.2
6.4
3.2
58.5
47.3
T
t
h1
Tht
Tht
Tht
4
Tht
6
T
X
t
c1
y28.9
y36.5
y30.8
y39
209.4
208.7
6.3
28
y2.6
y7.5
y2.2
y9.9
y2.7
y8
29.1
36.8
y16.7
11
32.2
y20
y20
y18.9
y1.4
y6.1
y1.7
y4.9
12.2
y35.6
y17.7
y15
y12.1
y23.9
y48.9
HE 1
f cE
fhE
f cE
fhE
=
f cE
fhE
f cE
fhE
f cE
0.06
0.57
0.07
0.22
0.22
0.6
0.07
0.01
0.11
0.89
0.43
0.44
0.04
0.71
0.29
0.33
0.2
0.08
0.37
0.04
0.01
s
h1
Ths2
0
Ths3
0.4
y3.2
7.6
0.5
y2.6
50.3
y4.4
0.1
y2
Ths6
0.5
y0.7
Tcs1
1.3
4.2
0.3
y3.3
Ths4
Ph 1
Mc Ph
Mc Ph
Mc Ph
Mc Ph
113.
Mc
Pc 1
fhE
f
cE 6
The upper limits for all the potential pass fractions are
calculated using Eqs. 76 and 77:
0.547
y0.007
0
s
0
0
0.213
2270
0.6
Mc
0.134
y0.002
0
0
0
0.052
0
0.482
0
0
0
0.107
0
0.315
0
0
0
0.07
0
0
0.501
0
0
0.001
0
0
0.498
0
0
0.001
f Elim.
s 0 0.504 0.125 0.241 0.076 0 0.341
i
0 0.775 0 0.682 0 . .
115.
0.129
0.101
0
0.147
0
0.238
0.003
0.001
0
0
0
0
0.067
0.02
0
0
0
y0.001
0.002
0.002
0
0.058
0.038
0.005
0.021
0.017
0
.
0.495
0.323
0.039
114.
AIChE Journal
Figure 13. Solution A of the 7SP4 HEN synthesis problem (Huang and Fan, 1994) with the bypasses design by the DP&C approach.
0.079
0
0
s
0
0
0.597
0.037
0
0
0
0
0.277
AIChE Journal
0
0.65
0
0
0
0
0
0.35
0
0
0
0
0
0
0.001
0
0
0.105
0
0
0
0
0
0.021
0
0
0
0.38
0
0
0
0
0
0.62
0
0
Figure 14. Solution B of the 7SP4 HEN synthesis problem (Papoulias and Grossmann, 1983) with
the bypasses design by the DP&C approach.
117.
0.104
0
0
0
0
0
0
0
0.629
0
0
0
0
0
0.37
0
0
0
0
0
0
0
0.098
0
0
0
0
.
0
0.902
0
116.
2271
Items
f h E s 0.035; f h E s 0.082;
2
4
f h E s 0.053; f h E s 0.035
3
6
A1 s 29.32; A 4 s67.48;
A 2 s15.78; A 5 s 5.84;
A 3 s 39.57; A6 s63.6
Bypass fractions
Areas of the HEXs before adding bypasses m2 .
Areas of the HEXs after adding bypasses m2 .
Total areas of all HEXs not including utility units, since
they are the same. Solution A and B m2 .
Total areas of all HEXs after adding bypasses m2 .
Cost of the HEXs before adding bypasses not including utility units.
Cost of the HEXs after adding bypasses not including utility units.
Interaction analysis
Conclusion
Design of a cost-effective and high controllable heat-exchanger network HEN. has both economical and operational significance. The major difficulty involved is how to
choose the fewest bypasses and to determine their nominal
fractions for complete disturbance rejection with minimum
economic penalty. In this article, a unique system disturbance
propagation and control DP&C. model is developed to
quantify disturbance propagation throughout a HEN and disturbance rejection by choosing bypasses. A model-based design procedure is also introduced for the development of a
HEN with optimal bypass determination. The applications
demonstrate its robustness and effectiveness. The modeling
and design principles embedded in the methodology are general. They can be extended to the design of an optimal mass
exchanger network with recycles for maximum disturbance
rejection in a cost-effective way.
Acknowledgment
Financial support from the National Science Foundation CTS9414494. is gratefully acknowledged.
Notation
Asheat-transfer area
B sprocess-gain matrix
d scontrol-correction vector
Dm sheat-capacity flow-rate related disturbance-propagation matrix
Dt stemperature-related disturbance-propagation matrix
Esheat exchanger
f sbypass nominal fraction
f smaximum fluctuation of bypass nominal fraction
f svector of maximum fluctuations of bypass nominal fractions
I sunit matrix
Mc P sheat-capacity flow rate
Mc P smaximum disturbance of heat-capacity flow rates
Mc P svector of maximum disturbances of heat-capacity flow rates
Nsnumber of streams, heat exchangers, or utilities
Qsheat duty of a heat exchanger
Rstranspose of inversion of a process-gain matrix
Ssstructural matrix of a heat-exchanger network
T stemperature
T smaximum temperature deviation of a stream
T svector of maximum temperature deviations of streams
T stemperature difference
2272
Solution B
Papotilias and Grossmann 1983.
A 2 s16.81; A 4 s 72.71;
A 3 s 56.65; A6 s64.24
221.6
f h E s 0.106; f h E s 0.07;
2
2
f h E s 0.078; f h E s 0.047
4
7
A1 s 37.44; A 4 s84.33;
A 2 s13.6; A 5 s 25.36;
A 3 s 5.7; A 6 s8.19;
A 7 s 56.08
A 2 s17.07; A 6 s10.30;
A 4 s93.24; A 7 s 56.82
230.7
245.6
$49 393
$52 424
2,3 s 0.482; 4,7 s 0.092;
3,5 s 0.501; 5,11 s 0.038
245.9
$52 419
$54 617
2,3 s 0.65; 4,7 s 0.38;
3,11 s 0.629; 5,13 s 0.098
Greek letters
spermissible computational error
smatrix obtained from singular-value decomposition
srelative gain array
Symbols
mselement multiplication operator
w1x selement value in S for an intermediate stream leaving a heat
exchanger
14 selement value in S for an intermediate stream entering a
heat exchanger
X sselected bypass
lim. supper limit of a bypass nominal fraction
q spseudo inverse of a matrix
q. smaximum positive fluctuation
y. smaximum negative fluctuation
U slumped system model
Literature Cited
Aguilera, N., and J. L. Marchetti, Optimizing and Controlling the
Operation of Heat-Exchanger Networks, AIChE J., 44, 1090
1998..
Calandranis, J., and G. Stephanopoulos, Structural Operability
AIChE Journal
AIChE Journal
Figure A1. HEN structure with bypasses as manipulated variables to control target temperatures.
2273
is developed as follows:
E1
E2
!#
" !#
"
h
S1 s C1out 0
H1in
C2out
c
out
0 H1
0 C1in .
A1.
C2in
In the submatrix, each row from the left to the right stands
for the stream temperature from the hot end to the cold end.
For instance, the left side of the first row is for the inlet of
hot stream H1 that is, H1in . and the right side is for the
outlet of the same stream that is, H1out .. In each pair of
columns, the left and the right column are assigned to the
hot stream and the cold stream going through the HEX, respectively. An element having a value of 1 or 0 means the
stream going through or not going through the HEX. For
example, the first row is the vector of 1 0 1 0.. This indicates
that hot stream H1 enters E1 and E2 . The second row has
the vector of 0 1 0 0.. This means that stream C1 enters E1.
Construction of S2 . In submatrix S2 , each row is designated to an intermediate stream. For this example there is
only one intermediate stream, M1, which is between exchangers E1 and E2 . The definition of columns is the same as that
in submatrix S1. Figure A1 shows that the intermediate
stream leaves E1 and enters E2 . Thus, the first and third
elements of S2 are set to 14 and w1x, respectively. The submatrix is
1
0
V2 s
0
0
S 2 s M1 1 4
1
0
0
14
w1x 0. .
0
1
0
0
A2.
1
0
0
w1x
0
0
1 .
0
A3.
2274
0
1
0
0
1
0
0
0
0
0
.
1
0
A5.
1
0
V3 s
1
0
0
1
0
0
0
0
0
1
0
A6.
B1 .
E
0
B2 .
S1
Ss
s
S2
0
0
0
1
E1
E2
!#
" !#
"
h
0
1
0
0
0
0
.
1
0
A4.
where
s
0
0
Esdiag 1 , 2 , . . . , k 4 ,
B3 .
1 G 2 G G k ) 0,
B4 .
and
B5 .
where
I1
qs E
0
0 .
0
B6 .
B7 .
AIChE Journal
b
~
ws
0
i
is1, 2, . . . , k
f c lim . s
B8 .
C10.
is k q1, k q2, . . . , Ns ,
b sU d,
B9 .
D1 .
C1.
C2.
According to their theorems, the matrix in Eq. 88, that is, the
control matrix B is
86.3
y14.1
Bs
y22.8
y6.5
43.1
y7.05
y11.4
y3.25
0
31.0
y44.8
14.3
0
23.3
y33.6
10.7
0
28.8
0
y14.4
0
14.4
.
0
y7.2
Note that
D2 .
Thi yTco sThs yTco
C3.
C4.
C5.
Similarly, the relationship for the bypass placed on the coldstream side of the HEX is
Tct s f cTcs q 1y f c . Tco
C6.
C7.
101.7
0
0
0
0
71.6
0
0
s
0
0 32.0
0
0
0
0 0.011
y0.248
y0.372
y0.495
y0.745
0
0
0
0
0
0
0
0
D3 .
D4 .
0.888 y0.098
0.053 y0.447
0
0
0.443 y0.049
0.026
0.895
0
0
0.097
0.769 y0.198
0
y0.6
0
Vs
0.073
0.577 y0.147
0
0.8
0
y0.027
0.225
0.865
0
y0.001 y0.447
y0.013
0.113
0.433
0
y0.001
0.894
D5 .
C8.
AIChE Journal
C9.
0
0.014
0
0
0
0
0.0312
0
0
0
0
0
0
0
0
0
0
0
.
0
0
D6 .
2275
2276
D7 .
0.1873
0.0030
0.0065
0.0028
0
0.0920
0.04625
0.0855
0
0.0526
0.2597
0.0477
0
0.5613
0
0.2387
0
0.1403
.
0
0.0597
D8 .
Manuscript receied May 3, 1999, and reision receied Feb. 14, 2000.
AIChE Journal