Development of Cooling Process Control Technique in Hot Strip Mill

来源 :Journal of Iron and Steel Research(International) | 被引量 : 0次 | 上传用户:wcjlb
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In order to ensure required mechanical properties of steel strip,various innovations in the cooling process control on the run-out table of a hot strip mill were actively promoted.The recent progress of process mathematical model and the new cooling strategy and equipment were discussed.The computer control system of high performance was introduced.The development trend in cooling process control was given. In order to ensure required mechanical properties of steel strip, various innovations in the cooling process control on the run-out table of a hot strip mill were applied promoted. The recent progress of the process mathematical model and the new cooling strategy and equipment were discussed. The computer control system of high performance was introduced. Development trend in cooling process control was given.
其他文献
本文针对于磨矿中的二次溢流粒度及浓度控制在常规自动化控制的不足而提出了自己的控制方法——模糊控制,并且根据实际经验而设计出了模糊控制器。可有效解决磨矿作业控制当
本文简述目前数字化测图现状,并就大比例尺数字测图的基本原理、方法和应用,存在问题等提出解决方法,进行探讨。
The sheath structures of strongly electronegative plasmas are investigated on basis of the accurate Bohm criterion obtained by Sagdeev potential. It is found th
随着我国住房制度的改革,经济适用住房和商品住宅发展迅猛,而现有住宅楼面板大多为现浇结构,近几年来,随着钢筋混凝土强度等级的提高,全现浇钢筋混凝土楼面板出现裂缝机率增
本文对市政工程结构的抗浮设计进行了较为详细的论述,并提供了成熟的设计计算方法,作者希望对从事市政工程结构设计人员提供借鉴.
从便于应用的角度把网络全文电子期刊分为数据库型、网站型、简短型三大类。其中数据库型在学术界利用率最高,是目前广大科研、教学及管理人员了解学术动态的重要信息源。访
Objective The standard therapy aft er failure of the initial non-fi rst line epidermal growth factor receptor tyrosine kinase inhibitor (EGFR-TKI) treatment in
在对高职院毕业生工资福利待遇、工作情况和对口情况进行实地调研的基础上,将调查结果进行详细分析,并从加强素质教育、加强教研教改和培养和锻炼学生的多方面能力提出了建议
An explicit formula for the ergodic capacity of Orthogonal Frequency Division Multiplexing (OFDM)-based Multiple-Input Multiple-Output (MIMO) systems under corr
This paper presents a new method based on a second-order stochastic model for computer intrusion detection. The results show that the performance of the second-