The purpose of this work is to find a correlation for heat transfer to walls in a 1296 t/h supercritical circulating fluidised bed (CFB) boiler. The effect of bed-to-wall heat transfer coefficient in a long active heat transfer surface was discussed, excluding the radiation component. Experiments for four different unit loads (i.e. 100% MCR, 80% MCR, 60% MCR and 40% MCR) were conducted at a constant excess air ratio and high level of bed pressure (ca. 6 kPa) in each test run. The empirical correlation of the heat transfer coefficient in a large-scale CFB boiler was mainly determined by two key operating parameters, suspension density and bed temperature. Furthermore, data processing was used in order to develop empirical correlation ranges between 3.05 to 5.35 m·s-1 for gas superficial velocity, 0.25 to 0.51 for the ratio of the secondary to the primary air, 1028 to 1137K for bed temperature inside the furnace chamber of a commercial CFB boiler, and 1.20 to 553 kg·m-3 for suspension density. The suspension density was specified on the base of pressure measurements inside the boiler’s combustion chamber using pressure sensors. Pressure measurements were collected at the measuring ports situated on the front wall of the combustion chamber. The obtained correlation of the heat transfer coefficient is in agreement with the data obtained from typical industrial CFB boilers.
Spectrophotometry is an analytical technique of increasing importance for the food industry, applied i.a. in the quantitative assessment of the composition of mixtures. Since the absorbance data acquired by means of a spectrophotometer are highly correlated, the problem of calibration of a spectrophotometric analyzer is, as a rule, numerically ill-conditioned, and advanced data-processing methods must be frequently applied to attain an acceptable level of measurement uncertainty. This paper contains a description of four algorithms for calibration of spectrophotometric analyzers, based on the singular value decomposition (SVD) of matrices, as well as the results of their comparison - in terms of measurement uncertainty and computational complexity - with a reference algorithm based on the estimator of ordinary least squares. The comparison is carried out using an extensive collection of semi-synthetic data representative of trinary mixtures of edible oils. The results of that comparison show the superiority of an algorithm of calibration based on the truncated SVD combined with a signal-to-noise ratio used as a criterion for the selection of regularisation parameters - with respect to other SVD-based algorithms of calibration.
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security. While these practical improvements offer progressively enhanced security and/or speed for non-ideal conditions, the fundamental physical laws providing the security remain the same.
In the "intelligent" KLJN (iKLJN) scheme, Alice and Bob utilize the fact that they exactly know not only their own resistor value but also the stochastic time function of their own noise, which they generate before feeding it into the loop. By using this extra information, they can reduce the duration of exchanging a single bit and in this way they achieve not only higher speed but also an enhanced security because Eve’s information will significantly be reduced due to smaller statistics.
In the "multiple" KLJN (MKLJN) system, Alice and Bob have publicly known identical sets of different resistors with a proper, publicly known truth table about the bit-interpretation of their combination. In this new situation, for Eve to succeed, it is not enough to find out which end has the higher resistor. Eve must exactly identify the actual resistor values at both sides.
In the "keyed" KLJN (KKLJN) system, by using secure communication with a formerly shared key, Alice and Bob share a proper time-dependent truth table for the bit-interpretation of the resistor situation for each secure bit exchange step during generating the next key. In this new situation, for Eve to succeed, it is not enough to find out the resistor values at the two ends. Eve must also know the former key.
The remaining four KLJN schemes are the combinations of the above protocols to synergically enhance the security properties. These are: the "intelligent-multiple" (iMKLJN), the "intelligent-keyed" (iKKLJN), the "keyed-multiple" (KMKLJN) and the "intelligent-keyed-multiple" (iKMKLJN) KLJN key exchange systems.
Finally, we introduce a new transient-protocol offering practically-perfect security without privacy amplification, which is not needed in practical applications but it is shown for the sake of ongoing discussions.