Search alternatives:
per decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
2 step » a step (Expand Search), _ step (Expand Search)
per decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
2 step » a step (Expand Search), _ step (Expand Search)
-
1261
Effect of pH on dissolution of iron sulfide scales using THPS
Published 2019“…Both experimental and theoretical techniques suggest that the pyrite dissolution ability of THPS decreases as pH increases. Conversely, combing THPS with EDTA (Ethylenediaminetetraacetic acid) proved effective in dissolving a mixture of different iron sulfide field scales. …”
Get full text
Get full text
-
1262
-
1263
-
1264
-
1265
-
1266
-
1267
-
1268
Recycled Waste Tires Management in Constructions
Published 2020“…The LCCA results show that the rubberized concrete (RC2), obtained by replacing 5% of aggregate and mixing it with seawater, is more cost-effective than RC1, with a cost savings of 30%.LCCA data were acquired by investigating thirteen concrete mixes (a control mix; 5%, 10%, and 20% rubber aggregate substitutions mixed with freshwater; and 0%, 5%, and 10% rubber aggregate substitutions mixed with seawater). …”
Get full text
-
1269
Algal-algal bioflocculation enhances the recovery efficiency of Picochlorum sp. QUCCCM130 with low auto-settling capacity
Published 2023“…Results showed that self-settlement capacity increased with cell size and can be indirectly related to a decreased zeta potential of larger cells which enhances the Van der Waals attractive forces. …”
Get full text
Get full text
-
1270
-
1271
-
1272
-
1273
-
1274
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1275
-
1276
-
1277
-
1278
-
1279
-
1280