Descriptive and multivariable analysis of the water parameters quality of Sfax sewage treatment plant after rehabilitation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
This study detailed the effect of simultaneous multiple intrinsic and extrinsic factors on the characteristics of Sfax activated sludge wastewater treatment plant (WWTP), located in Southern East Tunisia. The plant performance was evaluated through descriptive and statistical analysis of quantity and quality data of both raw wastewaters and treated effluent over a period of three years (2008 – 2010). Despite the rehabilitation, poor performance was shown to be attributed to raw wastewaters quality, civilization populations, bad functioning of the aerators and the industrial fallouts and deposits. Therefore, the downstream values of BOD5, COD, SS, FC, FS, TKN and TP are enough to achieve a final effluent that would meet the Tunisian standards limit. Multiple regression analysis showed that removal efficiencies of BOD5, COD and SS can be predicted to reasonable accuracy (R 2 = 0.973, 0.946 and 0.925, respectively). Goodness of the model fit to the data was also evaluated through the relationship between the residuals and the model predicted values of BOD5r, CODr and SSr. The advantage of this model is that it would allow a better process control.
Authors and Affiliations
Dalel Belhaj
Node Replication Attack Detection Algorithms in Wireless Sensor Networks: A Survey.
Abstract: The sensor networks are often deployed in hostile environments and are not attended for long time. Deployment of these networks is increased in the recent years, as they help in monitoring and analyzing d...
Fault Discovery Probability Analysis for Software Reliability Estimation
Abstract: Software reliability approximation and testing gauge how efficiently software works and meet up the end-user necessities. Software reliability assurance that users can enter the correct information on a day-to-...
Reversible Watermarking based on Histogram ShiftingModification:A Review
Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to...
Internal & External Attacks in cloud computing Environmentfrom confidentiality, integrity and availability points of view
Abstract: Cloud computing is set of resources and services offered through the Internet. Cloud services aredelivered from data centers located throughout the world. Cloud computing facilitates its consumers byprovi...
Analysis of Pattern Transformation Algorithms for SensitiveKnowledge Protection in Data Mining
Abstract: Privacy Preserving Data Mining(PPDM) is an emerging research area. Its objective is to extend thetraditional data mining techniques to work with transformed data while protecting confidential information...