Demonstration and verification of post combustion capture using solvent scrubbing

نویسندگان
چکیده

منابع مشابه

Carbon Dioxide Post-Combustion Capture: Solvent Technologies Overview, Status and Future Directions

One of the most promising approaches to tackle the high emission rate of carbon dioxide is the use of Carbon Capture and Storage (CCS) technology. This technology aims at capturing carbon dioxide from power stations and other industrial facilities, compressing, and then transporting it to underground storage locations. Three technological routes for carbon capture from power plants exist: pre-c...

متن کامل

Optimal conception of a post-combustion CO2 capture unit with assessment of solvent degradation

The combination of growing energy demand and environmental concerns has made the development of CO2 capture and storage technologies a necessity for the near-future energy mix. Post-combustion CO2 capture is one of the most mature technologies for reducing CO2 emissions in power plants. As a next step for the technology development, large-scale demonstration capture plants have to be implemente...

متن کامل

Detection of Degradation Products of Monoethanolamine- a Post-combustion Co2 Capture Solvent

Using solid phase extraction (SPE) combined with HPLCfluorescence/photodiode array (PDA) detection several low molecular-weight alkylamines (including ethylamine and propylamine) have been detected in the gas-phase, released during the oxidative/thermal degradation of monoethanolamine (MEA), an amine-based postcombustion CO2 capture solvent. In this study, a 30 wt% aqueous MEA solution was degr...

متن کامل

Post-Combustion Capture R&D at CSIRO

contact:Paul Feron phone: +61 (0) 2 4960 6022 email: [email protected] Introduction CSIRO has developed a post-combustion CO2 capture (PCC) R&D program consisting of two major components, a pilot plant programme and a laboratory research programme, which are operated in an integrated manner. The programme is almost exclusively focused on reactive liquid absorption liquids for the capture of C...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energy Procedia

سال: 2011

ISSN: 1876-6102

DOI: 10.1016/j.egypro.2011.02.552