Sea water Treatment using an Automatic Backwashing Filter
نویسندگان
چکیده
منابع مشابه
Preparation of Ceramic Composite Filter with Titanium Oxide Nanoparticles and Active Carbon Content for Treatment of Sea Water
In this mentioned study for sea water treatment ceramic composites were made from natural alumina and adsorbent active ingredients. According to the experimental results, filters along with active agents have acceptable effects on drinking water parameters and contaminants in compare with 1053 ISIRI standard. Modular set up was made for sea water treatment tests. Water flowrate after filtration...
متن کاملTreatment of Dairy Wastewater Using Pilot Scale Tricking Filter
A pilot scale trickling filter and secondary sedimentation are used to evaluate the feasibility of this process for the treatment of raw dairy waste. The BOD in the raw waste of 252 to 1200 mg/l is reduced 50-73% by a single stage and a further 17-55% by sedimentation tank. Treatment efficiencies are determined at various waste strengths and influent flow rates. With a loading rate of 5-12 kg B...
متن کاملAutomatic Wrinkle Detection Using Hybrid Hessian Filter
Aging as a natural phenomenon affects different parts of the human body under the influence of various biological and environmental factors. The most pronounced changes that occur on the face is the appearance of wrinkles, which are the focus of this research. Accurate wrinkle detection is an important task in face analysis. Some have been proposed in the literature, but the poor localization l...
متن کاملAutomatic Filter Selection Using Image Quality Assessment
We present a method for automatically selecting the best filter to treat poor quality printed documents using image quality assessment. We introduce five quality measures to obtain information about the quality of the images, and morphological filters to improve their quality. A training set of 370 images was used to develop the system. Experimental results on the test set show a significant im...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Korean navigation and port research
سال: 2006
ISSN: 1598-5725
DOI: 10.5394/kinpr.2006.30.3.241