Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Brackish water desalination offers a sustainable solution to water scarcity, but mineral scaling such as gypsum scaling poses a major operational challenge. While electrodialysis (ED) has emerged as a promising alternative to reverse osmosis (RO) for brackish water desalination, the propensity to mineral scaling has not been systematically compared between these two processes. This study employs a process modeling approach to compare gypsum scaling propensity between RO and ED, focusing on a low feed salinity regime (∼3 g L–1). Gypsum scaling is evaluated in RO as a function of water recovery, applied pressure, and membrane water permeance, while it is assessed in ED for the concentrate stream as a function of salt removal under varying cell pair voltages and water recoveries. Results reveal that increasing applied pressure or membrane water permeance intensifies gypsum scaling in RO and reduces the water recovery at gypsum saturation. In ED, co-ions and counterions exhibit distinct behaviors of accumulation near the membrane surface, with scaling potential increasing at higher water recovery and lower cell pair voltage. At consistent system productivity, gypsum scaling imposes a more significant constraint on RO than ED, highlighting the potential of ED as a more robust alternative to RO and informing technology selection and optimization in brackish water desalination.more » « less
-
Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable DecompilationPRD lifts suspect binary functions to source, available for analysis, revision, or review, and creates a patched binary using source- and binary-level techniques. Al- though decompilation and recompilation do not typically succeed on an entire binary, our approach does because it is limited to a few functions, such as those identified by our binary fault localization.more » « less
An official website of the United States government

Full Text Available