The current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless steel mesh (SSMa) and the cathode was a couple of stainless steel plain (SSPc). The anode in the third CW-MFC unit was stainless steel mesh (SSMa) and the cathode was graphite plate (GPc). It was found that the maximum performance for electricity generation (9 mW/m3) was obtained in the unit with stainless steel mesh as anode and graphite plate as cathode. After 10 days of operation, the best result for COD removal (70%) was obtained in the unit with stainless steel mesh as anode and stainless steel plain as cathode. The effect of temperature was also investigated. The performance of unit operation for electricity generation was tested at three values of temperature; 30, 35 and 40oC. The best result was obtained at 40oC, at which the current density obtained was 80 mA/m3. A culture of Algae could grow in the unit in order to supply the cathodic region with oxygen.
In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreCountries are developing the spatial development of their societies through the projects that they undertake in various ways, and this development may be cause great impact on the environment, which also depend on the type of development, whether industrial, agricultural, or service and after the problems that occurred as a result of development on the environment, most of the countries currently did to legislating laws Environmental and some other procedures before granting environmental approvals for the purpose of establishing spatial development projects. One of the most important of these laws and regulations is Environmental impact assessment (EIA). The environmental impact asse
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAbstract: Under high-excitation irradiance conditions to induce fluorescence, the dependence of photobleaching of Coumarin 307 (C307) and acriflavine (ACF) laser dyes in liquid and solid phases have been studied. A cw LD laser source of 1 mW and 407 nm wavelength was used as an exciting source. For one hour exposure time, it was found that the solid dye samples suffer photobleaching more than the liquid dye samples. This is because in liquid solutions the dye molecules can circulate during the irradiation, while the photobleaching is a serious problem when the dye is incorporated into solid matrix and cannot circulate.
Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More