Automatic Scheduling of Charging and Pushing Sequence of Coke Ovens
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Most of the coke oven plants have the manual schedule for pushing and charging sequence of the coke ovens. The manual schedule gives rise to several problems which affect the process time and simultaneously affecting the production. This paper presents the full automatic system for coke oven scheduling using the process control system. Process control system uses plc logic based on the scheduling algorithm. Further, using this auto schedule battery machines can be made to work according to schedule leading to man-less operation of battery machines. This auto schedule system reduces all errors and all battery machines are made to work automatically using the schedule. This approach makes the system completely automatic in operation; which improves an overall efficiency of the plant and also reduces operator workload hence creating the comfortable working environment for plant operators.
Authors and Affiliations
Sneha Bhimrao Joundale, Devendra Sutar, Sajit Sadanandan
Vibration Analysis of Spur Gear- FEA Approach
Gears are used for a wide range of industrial applications. They have varied application starting from textile to aviation industries. They are the most common means of transmitting power. They change the rate of rotati...
Android based Advance Anti-Theft Security System
Security is a complicated system in our day-to-day life. Everyone wants to be as more secure as possible. We know our home or shop is protected provides us peace of mind. Theft has become major issue now a day’s. So we...
slugA Telemedicine Device for Monitoring of Patients with Respiratory Diseases
A wireless portable system for monitoring respiratory diseases using a thermal flow sensor to monitor respiratory air flow, a Triaxis micro accelerometer to monitor the body posture, and a photo electric sensor to monit...
Information Security through Steganography Technique
The encrypted messages will often attract the concentration of unauthorized users. They try to crack the encrypted message and get access to the actual contents of the message. To conceal the subsistence of message steg...
slugMaintaining Data Security In Privacy Preserving Association Rule Mining
This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data d...