Background: The possibility of converting the organic fraction of municipal solid waste to mature compost using the composting bin method was studied. Nine distinct treatments were created by combining municipal solid waste (MSW) with animal waste (3:1, 2:1), poultry manure (3:1, 2:1), mixed waste (2:1:1), agricultural waste (dry leaves), biocont (Trichoderm hazarium), and humic acid. Weekly monitoring of temperature, pH, EC, organic matter (OM percent), and the C/N ratio was performed, and macronutrients (N, P, K) were measured. Trace elements, including heavy metals (Cd and Pb), were tested in the first and final weeks of maturity. Results: Temperatures in the first days of composting reached the thermophilic phase in MSW compost with animal and poultry manure between 55–60 °C, pH and EC (mS/cm) increased during the composting period in most composting bin treatments. Overall, organic matter (OM percent) and the C/N ratio decreased (10.27 to 18.9) as result of microbial activity during composting. Organic matter loss percent was less in treatments containing additives (biocont l humic acid) as well agricultural waste treatment. Composting bin treatments with animals and poultry showed higher K and P at the mature stage with an increase in micronutrients. Finally heavy metals were (2.25–4.20) mg/kg and (139–202) mg/kg for Cd and Pb respectively at maturation stage. Conclusion: Therefore, the results suggested that MSW could be composted in the compost bin method with animal and poultry manure. The physio-chemical parameters pH, Ec and C/N were within the acceptable standards. Heavy metals and micronutrients were under the limits of the USA standards. The significance of this study is that the compost bin may be used as a quick check to guarantee that the outputs of long-term public projects fulfill general sustainability requirements, increase ecosystem services, and mitigate the effect of municipal waste disposal on climate change particularly the hot climate regions.
In this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model duri
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r
... Show MoreThis paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
Abstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show More