Search results for: aquifers storage
1198 Energy Management System
Authors: S. Periyadharshini, K. Ramkumar, S. Jayalalitha, M. GuruPrasath, R. Manikandan
Abstract:
This paper presents a formulation and solution for industrial load management and product grade problem. The formulation is created using linear programming technique thereby optimizing the electricity cost by scheduling the loads satisfying the process, storage, time zone and production constraints which will create an impact of reducing maximum demand and thereby reducing the electricity cost. Product grade problem is formulated using integer linear programming technique of optimization using lingo software and the results show that overall increase in profit margin. In this paper, time of use tariff is utilized and this technique will provide significant reductions in peak electricity consumption.Keywords: cement industries, integer programming, optimal formulation, objective function, constraints
Procedia PDF Downloads 5911197 Catalytic Activity of CU(II) Complex on C(SP3)-H Oxidation Reactions
Authors: Yalçın Kılıç, İbrahim Kani
Abstract:
In recent years, interest in the synthesis of coordination compounds has greatly increased due to various application areas (such as catalysis, gas storage, luminescence). Dicarboxylic acids are often used in the synthesis of metal complexes. Bis-thiosalicylate derivative ligands contribute to the synthesis of structures of crystal engineering interest, as they can have both rigid and flexible properties. In addition, these ligands have great potential in terms of catalytic applications with the sulfur and oxygen donor atoms in their structures. In this study, we synthesized a Cu(II) complex [Cu(tsaxyl)(phen)2]•CH3OH (where tsaxyl = 2,2'-(1,2-phylenebis(methylene))bis(sulfanedyl)dibenzoate, phen = 1,10-phenantroline) and characterized through X-ray crystallography. The catalytic activities of Cu(II) complex on oxidation of ethylbenzene, cyclohexane, diphenylmethane, p-xylene were performed in acetonitrile with t-BuOOH as the source of oxygen.Keywords: complex, crystallography, catalysis, oxidation
Procedia PDF Downloads 1051196 Two and Three Layer Lamination of Nanofiber
Authors: Roman Knizek, Denisa Karhankova, Ludmila Fridrichova
Abstract:
For their exceptional properties nanofibers, respectively, nanofiber layers are achieving an increasingly wider range of uses. Nowadays nanofibers are used mainly in the field of air filtration where they are removing submicron particles, bacteria, and viruses. Their efficiency is not changed in time, and the power consumption is much lower than that of electrically charged filters. Nanofibers are primarily used for converting and storage of energy in both air and liquid filtration, in food and packaging, protecting the environment, but also in health care which is made possible by their newly discovered properties. However, a major problem of the nanofiber layer is practically zero abrasion resistance; it is, therefore, necessary to laminate the nanofiber layer with another suitable material. Unfortunately, lamination of nanofiber layers is a major problem since the nanofiber layer contains small pores through which it is very difficult for adhesion to pass through. Therefore, there is still only a small percentage of products with these unique fibers 5.Keywords: nanofiber layer, nanomembrane, lamination, electrospinning
Procedia PDF Downloads 7251195 Learning Based on Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment
Authors: Eiko Takaoka, Yoshiyuki Fukushima, Koichiro Hirose, Tadashi Hasegawa
Abstract:
Although all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.Keywords: computer science unplugged, computer science outreach, high school curriculum, experimental evaluation
Procedia PDF Downloads 3861194 3D Writing on Photosensitive Glass-Ceramics
Authors: C. Busuioc, S. Jinga, E. Pavel
Abstract:
Optical lithography is a key technique in the development of sub-5 nm patterns for the semiconductor industry. We have already reported that the best results obtained with respect to direct laser writing process on active media, such as glass-ceramics, are achieved only when the energy of the laser radiation is absorbed in discrete quantities. Further, we need to clarify the role of active centers concentration in silver nanocrystals natural generation, as well as in fluorescent rare-earth nanostructures formation. As a consequence, samples with different compositions were prepared. SEM, AFM, TEM and STEM investigations were employed in order to demonstrate that few nm width lines can be written on fluorescent photosensitive glass-ceramics, these being efficient absorbers. Moreover, we believe that the experimental data will lead to the best choice in terms of active centers amount, laser power and glass-ceramic matrix.Keywords: glass-ceramics, 3D laser writing, optical disks, data storage
Procedia PDF Downloads 2951193 Image Steganography Using Predictive Coding for Secure Transmission
Authors: Baljit Singh Khehra, Jagreeti Kaur
Abstract:
In this paper, steganographic strategy is used to hide the text file inside an image. To increase the storage limit, predictive coding is utilized to implant information. In the proposed plan, one can exchange secure information by means of predictive coding methodology. The predictive coding produces high stego-image. The pixels are utilized to insert mystery information in it. The proposed information concealing plan is powerful as contrasted with the existing methodologies. By applying this strategy, a provision helps clients to productively conceal the information. Entropy, standard deviation, mean square error and peak signal noise ratio are the parameters used to evaluate the proposed methodology. The results of proposed approach are quite promising.Keywords: cryptography, steganography, reversible image, predictive coding
Procedia PDF Downloads 4131192 Insect Infestation of Two Varieties of Cowpea Seeds (Vigna Unguiculata L.Walp) Stored at Sokoto Central Market Grainaries
Authors: A. Jatau, H. M. Bandiya, Q. Majeed, M. A. Yahaya
Abstract:
An investigation on the insect infestation of stored seeds of cowpea seeds varieties (Sokoto Loacal and Kanannado) was carried out in Sokoto central market, Sokoto. Two insects' species, Callosobrunchus maculatus and Callosobrunchus chinensis were found on the stored seeds with C. maculutus found to be the most prevalent. The rate of infestation of the cowpea seeds by the two insect species were significantly (P< 0.05) higher in Sokoto local than in Kanannado variety. The result shows that kanannado variety is more resistance to cowpea seeds weevils, hence should be used for long storage in Sokoto.Keywords: insect, infestation, cowpea seeds, grainaries
Procedia PDF Downloads 3841191 Multi-Level Security Measures in Cloud Computing
Authors: Shobha G. Ranjan
Abstract:
Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.Keywords: cloud computing, cloud security, integrity, multi-tenancy, security
Procedia PDF Downloads 4991190 BAN Logic Proof of E-passport Authentication Protocol
Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana
Abstract:
E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic
Procedia PDF Downloads 4331189 Tourism Satellite Account: Approach and Information System Development
Authors: Pappas Theodoros, Mihail Diakomihalis
Abstract:
Measuring the economic impact of tourism in a benchmark economy is a global concern, with previous measurements being partial and not fully integrated. Tourism is a phenomenon that requires individual consumption of visitors and which should be observed and measured to reveal, thus, the overall contribution of tourism to an economy. The Tourism Satellite Account (TSA) is a critical tool for assessing the annual growth of tourism, providing reliable measurements. This article introduces a system of TSA information that encompasses all the works of the TSA, including input, storage, management, and analysis of data, as well as additional future functions and enhances the efficiency of tourism data management and TSA collection utility. The methodology and results presented offer insights into the development and implementation of TSA.Keywords: tourism satellite account, information system, data-based tourist account, relation database
Procedia PDF Downloads 811188 Designing a Cyclic Redundancy Checker-8 for 32 Bit Input Using VHDL
Authors: Ankit Shai
Abstract:
CRC or Cyclic Redundancy Check is one of the most common, and one of the most powerful error-detecting codes implemented on modern computers. Most of the modern communication protocols use some error detection algorithms in digital networks and storage devices to detect accidental changes to raw data between transmission and reception. Cyclic Redundancy Check, or CRC, is the most popular one among these error detection codes. CRC properties are defined by the generator polynomial length and coefficients. The aim of this project is to implement an efficient FPGA based CRC-8 that accepts a 32 bit input, taking into consideration optimal chip area and high performance, using VHDL. The proposed architecture is implemented on Xilinx ISE Simulator. It is designed while keeping in mind the hardware design, complexity and cost factor.Keywords: cyclic redundancy checker, CRC-8, 32-bit input, FPGA, VHDL, ModelSim, Xilinx
Procedia PDF Downloads 2921187 Variation of Biologically Active Compounds and Antioxidancy in the Process of Blueberry Storage
Authors: Meri Khakhutaishvili, Indira Djaparidze, Maia Vanidze, Aleko Kalandia
Abstract:
Cultivation of blueberry in Georgia started in 21st century. There are more than 20 species of blueberry cultivated in this region from all other the world. The species are mostly planted on acidic soil, previously occupied by tea plantations. Many of the plantations have pretty good yield. It is known that changing the location of a plant to a new soil or climate effects chemical compositions of the plant. However, even though these plants are brought from other countries, no research has been conducted to fully examine the blueberry fruit cultivated in Georgia. Shota Rustaveli National Science Foundation Grant FR/335/10-160/14, gave us an opportunity to continue our previous works and conduct research on several berries, among them of course the chemical composition of stored Blueberry. We were able to conduct the first study that included examining qualitative and quantitative features of bioactive compounds in Georgian Blueberry. This experiments were held in the ‘West Georgia Regional Chromatography center’ (Grant AP/96/13) of our university, that is equipped with modern equipment like HPLC UV-Vis, RI-detector, HPLC-conductivity detector, UPLC-MS-detector. Biochemical analysis was conducted using different physico-chemical and instrumental methods. Separation-identification and quantitative analysis were conducted using UPLC-MS (Waters Acquity QDa detector), HPLC (Waters Brceze 1525, UV-Vis 2489 detectors), pH-meters (Mettler Toledo). Refractrometer -Misco , Spectrometer –Cuvette Changer (Mettler Toledo UV5A), C18 Cartridge Solid Phase Extraction (SPE) Waters Sep-Pak C18 (500 mg), Chemicals – stability radical- 2,2-Diphenil-1-picrilhydrazyl (Aldrich-germany), Acetonitrile, Methanol, Acetic Acid (Merck-Germany), AlCl3, Folin Ciocalteu reagent (preparation), Standarts –Callic acid, Quercetin. Carbohydrate HPLC-RI analysis used systems acetonitrile-water (80-20). UPLC-MS analysis used systems- solvent A- Water +1 % acetic acid და solvent -B Methanol +1% acetic acid). It was concluded that the amount of sugars was in range of 5-9 %, mostly glucose and fructose. Also, the amount of organic acids was 0.2-1.2% most of which was malic and citric acid. Anthocians were also present in the sample 200-550mg/100g. We were able to identify up to 15 different compounds, most of which were products of delphinidine and cyanide. All species have high antioxidant level(DPPH). By rapidly freezing the sample and then keeping it in specific conditions allowed us to keep the sample for 12 months.Keywords: antioxidants, bioactive, blueberry, storage
Procedia PDF Downloads 2111186 The Effect of Solution Density on the Synthesis of Magnesium Borate from Boron-Gypsum
Authors: N. Tugrul, E. Sariburun, F. T. Senberber, A. S. Kipcak, E. Moroydor Derun, S. Piskin
Abstract:
Boron-gypsum is a waste which occurs in the boric acid production process. In this study, the boron content of this waste is evaluated for the use in synthesis of magnesium borates and such evaluation of this kind of waste is useful more than storage or disposal. Magnesium borates, which are a sub-class of boron minerals, are useful additive materials for the industries due to their remarkable thermal and mechanical properties. Magnesium borates were obtained hydrothermally at different temperatures. Novelty of this study is the search of the solution density effects to magnesium borate synthesis process for the increasing the possibility of boron-gypsum usage as a raw material. After the synthesis process, products are subjected to XRD and FT-IR to identify and characterize their crystal structure, respectively.Keywords: boron-gypsum, hydrothermal synthesis, magnesium borate, solution density
Procedia PDF Downloads 3921185 F-IVT Actuation System to Power Artificial Knee Joint
Authors: Alò Roberta, Bottiglione Francesco, Mantriota Giacomo
Abstract:
The efficiency of the actuation system of lower limb exoskeletons and of active orthoses is a significant aspect of the design of such devices because it affects their efficacy. F-IVT is an innovative actuation system to power artificial knee joint with energy recovery capabilities. Its key and non-conventional elements are a flywheel, that acts as a mechanical energy storage system, and an Infinitely Variable Transmission (IVT). The design of the F-IVT can be optimized for a certain walking condition, resulting in a heavy reduction of both the electric energy consumption and of the electric peak power. In this work, by means of simulations of level ground walking at different speeds, it is demonstrated how F-IVT is still an advantageous actuator, even when it does not work in nominal conditions.Keywords: active orthoses, actuators, lower extremity exoskeletons, knee joint
Procedia PDF Downloads 5991184 Complexity Leadership and Knowledge Management in Higher Education
Authors: Prabhakar Venugopal G.
Abstract:
Complex environments triggered by globalization have necessitated new paradigms of leadership – complexity leadership that encompasses multiple roles that leaders need to take upon. The success of higher education institutions depends on how well leaders can provide adaptive, administrative and enabling leadership. Complexity leadership seems all the more relevant for institutions that are knowledge-driven and thrive on knowledge creation, knowledge storage and retrieval, knowledge sharing and knowledge applications. In this paper are the elements of globalization, the opportunities and challenges that are brought forth by globalization are discussed. The complexity leadership paradigm in a knowledge-based economy and the need for such a paradigm shift for higher education institutions is presented. Further, the paper also discusses the support the leader requires in a knowledge-driven economy through knowledge management initiatives.Keywords: globalization, complexity leadership, knowledge management
Procedia PDF Downloads 4891183 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Authors: Nazli W. Hardy
Abstract:
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem
Procedia PDF Downloads 3521182 Optimum Design of Photovoltaic Water Pumping System Application
Authors: Sarah Abdourraziq, Rachid El Bachtiri
Abstract:
The solar power source for pumping water is one of the most promising areas in photovoltaic applications. The implementation of these systems allows to protect the environment and reduce the CO2 gas emission compared to systems trained by diesel generators. This paper presents a comparative study between the photovoltaic pumping system driven by DC motor, and AC motor to define the optimum design of this application. The studied system consists of PV array, DC-DC Boost Converter, inverter, motor-pump set and storage tank. The comparison was carried out to define the characteristics and the performance of each system. Each subsystem is modeled in order to simulate the whole system in MATLAB/ Simulink. The results show the efficiency of the proposed technique.Keywords: photovoltaic water pumping system, DC motor-pump, AC motor-pump, DC-DC boost converter
Procedia PDF Downloads 3251181 Exploring De-Fi through 3 Case Studies: Transparency, Social Impact, and Regulation
Authors: Dhaksha Vivekanandan
Abstract:
DeFi is a network that avoids reliance on financial intermediaries through its peer-to-peer financial network. DeFi operates outside of government control; hence it is important for us to understand its impacts. This study employs a literature review to understand DeFi and its emergence, as well as its implications on transparency, social impact, and regulation. Further, 3 case studies are analysed within the context of these categories. DeFi’s provision of increased transparency poses environmental and storage costs and can lead to user privacy being endangered. DeFi allows for the provision of entrepreneurial incentives and protection against monetary censorship and capital control. Despite DeFi's transparency issues and volatility costs, it has huge potential to reduce poverty; however, regulation surrounding DeFi still requires further tightening by governments.Keywords: DeFi, transparency, regulation, social impact
Procedia PDF Downloads 811180 Dinitrotoluene and Trinitrotoluene Measuring in Double-Base Solid Propellants
Authors: Z. H. Safari, M. Anbia, G. H. Kouzegari, R. Amirkhani
Abstract:
Toluene and Nitro derivatives are widely used in industry particularly in various defense applications. Tri-nitro-toluene derivative is a powerful basic explosive material that is a basis upon which to compare equivalent explosive power of similar materials. The aim of this paper is to measure the explosive power of these hazardous substances in fuels having different shelf-life and therefore optimizing their storage and maintenance. The methodology involves measuring the amounts of di- nitro- toluene and tri-nitro-toluene in the aged samples at 90 ° C by gas chromatography. Results show no significant difference in the concentration of the TNT compound over a given time while there was a significant difference in DNT compound over the same period. The underlying reason is attributed to the simultaneous production of the material with destruction of stabilizer.Keywords: dinitrotoluene, trinitrotoluene, double-base solid propellants, artificial aging
Procedia PDF Downloads 4011179 Size-Reduction Strategies for Iris Codes
Authors: Jutta Hämmerle-Uhl, Georg Penn, Gerhard Pötzelsberger, Andreas Uhl
Abstract:
Iris codes contain bits with different entropy. This work investigates different strategies to reduce the size of iris code templates with the aim of reducing storage requirements and computational demand in the matching process. Besides simple sub-sampling schemes, also a binary multi-resolution representation as used in the JBIG hierarchical coding mode is assessed. We find that iris code template size can be reduced significantly while maintaining recognition accuracy. Besides, we propose a two stage identification approach, using small-sized iris code templates in a pre-selection satge, and full resolution templates for final identification, which shows promising recognition behaviour.Keywords: iris recognition, compact iris code, fast matching, best bits, pre-selection identification, two-stage identification
Procedia PDF Downloads 4371178 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.Keywords: discrete wavelet transforms, AES, dynamic SBox
Procedia PDF Downloads 4301177 To Individualisation of Subject, Donar, by Determination of Serological Markers from Obtain Biological Fluid at Crime Scene
Authors: Arun Kumar, Ravindra Pal Verma, Harsh Sharma, Shani Kumar
Abstract:
For the present study samples was collected from 20 donors with unknown blood group and secretor status had been determined from saliva by using biological fluid. ABO typing on the concentrated samples was successfully performed after 1 month of storage. Urine stained clothing samples are often submitted to forensic science laboratories for ABH blood group antigen determination. The serogenetic markers of semen stains submitted can be used to determine the origin of any of these samples. ABH blood group substances have previously been identified from urine. ABH blood group substance is low in urine in comparison with other body fluids.Keywords: ABH blood group, crime scene, serological markers, body fluids and urine
Procedia PDF Downloads 5851176 A Soil Stabilization Technique on Apa-Hotamiş Conveyance Channel
Authors: Ali Sinan Soğancı
Abstract:
Apa-Hotamış conveyance channel is located within in the boundaries of Konya Regional Directorate of Water Works. This channel transfers the water to the fount of Apa Dam with 17 km length of Blue Channel. Then the water is transmitted with Apa- Hotamış conveyance channel to Hotamış Water Storage. In some places along the Apa-Hotamış conveyance canal which will be constructed by Directorate of Water Works of Konya, some swelling soils have been seen. The samples taken from these places have 35-95 kPa swelling pressure. To prevent the swelling pressure arising from the penetration of water to the concrete channel, it was proposed to make 10 cm concrete coating by spreading the geomembrane and geotextile between the soil and concrete. In this way, the pressure (35-95 kPa) caused by the swelling and cracking of concrete failure will be blocked.Keywords: conveyance channel, swelling pressure, geomembrane, geotextile, concrete
Procedia PDF Downloads 4101175 Green Logistics Management and Performance for Thailand’s Logistic Enterprises
Authors: Kittipong Tissayakorn, Fumio Akagi, Yu Song
Abstract:
Logistics is the integrated management of all of the activities required to move products through the supply chain. For a typical product, this supply chain extends from a raw material source through the production and distribution system to the point of consumption and the associated reverse logistics. The logistical activities are comprised of freight transport, storage, inventory management, materials handling and all related information processing. This paper analyzes the green management system of logistics enterprise for Thailand and advances the concept of Green Logistics, which should be held by the public. In addition, it proposes that the government should strengthen its supervision and support for green logistics, and companies should construct self-disciplined green logistics management systems and corresponding processes, a reverse logistics management system and a modern green logistics information collection and management system.Keywords: logistics, green logistics, management system, ecological economics
Procedia PDF Downloads 4021174 Exergy Analyses of Wind Turbine
Authors: Muhammad Abid
Abstract:
Utilization of renewable energy resources for energy conservation, pollution prevention, resource efficiency and systems integration is very important for sustainable development. In this study, we perform energy and exergy analyses of a wind turbine, located on the roof of Mechanical Engineering Department, King Saud University, and Riyadh, Saudi Arabia. The turbine is part of a hybrid photovoltaic (PV)-wind system with hydrogen storage. The power output from this turbine varies between 1.5 and 5.5 kW with a rated wind speed of 12 m/s and a cut-in wind speed of 2.4 m/s. We utilize a wide range of experimental data in the analysis and assessment. We determine energy and exergy efficiencies. The energy efficiency changes between 0% to 45% while the exergy efficiency varies between 0% and 31.3%. We also determined some of the exergoeconomic parameters that are the ratios of energy and exergy loss rates to the capital cost (R en and R ex), respectively. (R en) changes between 0.96% and 59.03% for different values of velocity while R ex has a maximum value of 53.62% for the highest wind speed.Keywords: exergy, efficiency, performance evaluation, wind energy
Procedia PDF Downloads 3651173 The Application of the Enterprise Systems through the Cloud Computing in Company: A Review and Suggestions
Authors: Mohanaad Talal Shakir, Saad AJAJ Khalaf, Nawar Ahmed Aljumaily, Mustafa Talal Shakere
Abstract:
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Objectives of this paper are to investigate the role of the Enterprise System and Cloud Computing Services to assist and guide him to ensure the initiative become successful. The cloud computing technology offers great potential for Enterprise such as the speed of dealing with data and product introductions, innovations and speed of response. The use of cloud computing technology leads to the rapid development and competitiveness of enterprises in various fields.Keywords: cloud computing, information management, marketing, enterprise systems
Procedia PDF Downloads 6891172 Environmental Engineering Case Study of Waste Water Treatement
Authors: Harold Jideofor
Abstract:
Wastewater treatment consists of applying known technology to improve or upgrade the quality of a wastewater. Usually wastewater treatment will involve collecting the wastewater in a central, segregated location (the Wastewater Treatment Plant) and subjecting the wastewater to various treatment processes. Most often, since large volumes of wastewater are involved, treatment processes are carried out on continuously flowing wastewaters (continuous flow or "open" systems) rather than as "batch" or a series of periodic treatment processes in which treatment is carried out on parcels or "batches" of wastewaters. While most wastewater treatment processes are continuous flow, certain operations, such as vacuum filtration, involving storage of sludge, the addition of chemicals, filtration and removal or disposal of the treated sludge, are routinely handled as periodic batch operations.Keywords: wastewater treatment, environmental engineering, waste water
Procedia PDF Downloads 5831171 High-Performance Non-aqueous Organic Redox Flow Battery in Ambient Condition
Authors: S. K. Mohapatra, K. Ramanujam, S. Sankararaman
Abstract:
Redox flow battery (RFB) is a preferred energy storage option for grid stabilisation and energy arbitrage as it offers energy and power decoupling. In contrast to aqueous RFBs (ARFBs), nonaqueous RFBs (NARFBs) could offer high energy densities due to the wider electrochemical window of the solvents used, which could handle high and low voltage organic redox couples without undergoing electrolysis. In this study, a RFB based on benzyl viologen hexafluorophosphate [BV(PF6)2] as anolyte and N-hexyl phenothiazine [HPT] as catholyte demonstrated. A cell operated with mixed electrolyte (1:1) containing 0.2 M [BV(PF₆)₂] and 0.2 M [HPT] delivered a coulombic efficiency (CE) of 95.3 % and energy efficiency (EE) 53%, with nearly 68.9% material utilisation at 40 mA cm-2 current density.Keywords: non-aqueous redox flow battery, benzyl viologen, N-hexyl phenothiazine, mixed electrolyte
Procedia PDF Downloads 741170 Hybrid System Configurations and Charging Strategies for Isolated Electric Tuk-Tuk Charging Station in South Africa
Authors: L. Bokopane, K. Kusakana, H. J. Vermaark
Abstract:
The success of renewable powered electric vehicle charging station in isolated areas depends highly on the availability and sustainability of renewable resources all year round at a selected location. The main focus of this paper is to discuss the possible charging strategies that could be implemented to find the best possible configuration of an electric Tuk-Tuk charging station at a given location within South Africa. The charging station is designed, modeled and simulated to evaluate its performances. The techno-economic analysis of different feasible supply configurations of the charging station using renewable energies is simulated using HOMER software and the results compared in order to select the best possible charging strategies in terms of cost of energy consumed.Keywords: electric tuk-tuk, renewable energy, energy Storage, hybrid systems, HOMER
Procedia PDF Downloads 5111169 Electron-Ion Recombination of N^{2+} and O^{3+} Ions
Authors: Shahin A. Abdel-Naby, Asad T. Hassan, Stuart Loch, Michael Fogle, Negil R. Badnell, Michael S. Pindzola
Abstract:
Accurate and reliable laboratory astrophysical data for electron-ion recombination are needed for plasma modeling. Dielectronic recombination (DR) rate coefficients are calculated for boron-like nitrogen and oxygen ions using state-of-the-art multi-configuration Breit-Pauli atomic structure AUTOSTRUCTURE collisional package within the generalized collisional-radiative framework. The calculations are performed in intermediate coupling scheme associated with n = 0 (2 2) and n = 1 (2 3) core-excitations. Good agreements are found between the theoretically convoluted rate coefficients and the experimental measurements performed at CRYRING heavy-ion storage ring for both ions. Fitting coefficients for the rate coefficients are produced for these ions in the temperature range q2(102-107) K, where q is the ion charge before recombination.Keywords: Atomic data, atomic processes, electron-ion collision, plasma
Procedia PDF Downloads 165