Descriptive and multivariable analysis of the water parameters quality of Sfax sewage treatment plant after rehabilitation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
This study detailed the effect of simultaneous multiple intrinsic and extrinsic factors on the characteristics of Sfax activated sludge wastewater treatment plant (WWTP), located in Southern East Tunisia. The plant performance was evaluated through descriptive and statistical analysis of quantity and quality data of both raw wastewaters and treated effluent over a period of three years (2008 – 2010). Despite the rehabilitation, poor performance was shown to be attributed to raw wastewaters quality, civilization populations, bad functioning of the aerators and the industrial fallouts and deposits. Therefore, the downstream values of BOD5, COD, SS, FC, FS, TKN and TP are enough to achieve a final effluent that would meet the Tunisian standards limit. Multiple regression analysis showed that removal efficiencies of BOD5, COD and SS can be predicted to reasonable accuracy (R 2 = 0.973, 0.946 and 0.925, respectively). Goodness of the model fit to the data was also evaluated through the relationship between the residuals and the model predicted values of BOD5r, CODr and SSr. The advantage of this model is that it would allow a better process control.
Authors and Affiliations
Dalel Belhaj
Edge Adaptive Image Steganography Based on Adaptive Pixel Pair Matching
This paper proposes a new improved steganographic technique based on pixel pair matching which is driven by edge adaptive technique. The cover image is scanned first to explore the edges of the image and is used...
A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todeman...
Protocols for detection of node replication attack on wireless sensor network
Wireless sensor network has many small sensor nodes that work in collaborative manner to achieve a specific task. But it is deployed in unattended environment and that is why it is prone to attacks. These a...
An EfficientHybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network
Abstract : Video-on-Demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide vi...
JTAG Architecture with Multi Level Security
For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes...