Volume 6, Issue 9, September 2015 Edition

Publication for Volume 6, Issue 9, September 2015.


IJSER Research Group https://www.ijser.org/forum/index.php Register for IJSER Research Forum      IJSER Xplore IJSER Xplore Research Paper Database

Pages   [1] [2] [3] [4] [5] [6] [7] [8] [U]
 



RFID Technology to control manufacturing systems using OPC server[ ]


Starting from the “Industry 4.0” concept, this work aims to develop an event-condition-action (ECA) based structure to control in-telligent manufacturing systems (IMS). RFID technology is used as a main component to gather data from shop floor. These data are used to control product rooting among workstations and to control systems agents (robot’s arms for example). The whole system has OPC based architecture. A generic GUI using C-sharp compiler is developed allowing users to edit manufacturing sequences that could be automatically loaded from ERP software.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cadmium Toxicity And Its Phytoremediation A Review[ ]


Cumulative effect of urbanization, industrialization and population growth is increasing pressure on the limited natural resources. The change in living style has aggravated the problems. Among the diverse environmental problems, the discharge of heavy metals in environment through industrial, agricultural and domestic activities is of great concern. Removal of heavy metal from environment is a challenge as these toxic metals are non-biodegradable and bioaccumulate in living organisms. Sustainable development requires the use of green technologies to treat the wide range of contaminated aquatic and terrestrial habitats. Phytoremediation is an alternative to conventional methods for treating waste compounds. This review discusses the occurrence and toxicity of cadmium, the various remediation techniques with emphasis on phytoremediation of cadmium. Phytoremediation by plants occupying different taxonomic position is discussed. The scientific literature reveals that this technology has tremendous potential to cater for the needs and can be effectively used for environmental protection, sustainability and management.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Grey-Fuzzy Approach to Optimize the Process Parameters of Drilling of GFRP[ ]


Glass fibre-reinforced polymer (GFRP) composites are alternative to engineering materials because of economic, light weight, corrosive resistance and superior properties. In this paper, a Taguchi–Fuzzy decision method has been used to determine the effective process parameters for improving the quality of the drilled GFRP composites. The influence of drilling parameters on surface quality of GFRP plastic composite material, delamination, thrust force and torque was investigated experimentally. Drilling tests were carried out using WC drills of 12 mm in diameter at 600, 900, 1200 and 1500 rpm spindle speeds and at 0.04, 0.08, 0.12 and 0.16 mm/rev feed rates. The significant process parameters have been determined by using ANOVA. Optimum level of drilling parameter have identified by using the values of grey relational grade derived from grey analysis. The analysis of grey relational grade shows that feed rate is the influential parameter than spindle speed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Problem Solving Approach to the Performance and Attitude in College Algebra of College Students[ ]


The aim of this study is to determine the effects of problem-solving approach on the performance in and attitude of freshmen college students towards College Algebra. In the study, the Pretest-Posttest Control group design was utilized which involved two matched groups of respondents – the experimental group and the control group. The relevant concepts in selected topics in College Algebra were taught to the experimental group using the problem-solving approach, while the conventional approach in teaching and learning was employed to the control group. The research study was conducted during the first semester of school year 2014-2015. Necessary data were gathered through the achievement test, attitude scale questionnaire in College Algebra, form 138, and College Admission Test results sheet. The data gathered were managed using frequency counts, percentages, means, paired and t-test. The results of the analyses showed that the implementation of the problem solving approach in teaching College Algebra had positively affected and improved the performance of the respondents. it was also found out that the utilization of the problem-solving approach in the delivery of instruction in College Algebra had positively contributed to the development and reinforcement of a favorable attitude towards the subject.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay Tolerant Network[ ]


Delay tolerant networks (DTNs) exploit the intermittent connectivity between mobile nodes to transfer data. Due to a lack of consistent connectivity, two nodes exchange data only when they move into the transmission range of nodes In DTNs, a node may misbehave by dropping packets even when it has sufficient buffers. Routing misbehavior can be caused by selfish nodes that are unwilling to spend resources such as power and buffer on forwarding packets of others, or caused by malicious nodes that drop packets to launch attacks To address the problem, we recommend a distributed scheme to detect packet dropping in DTNs. In planned TP Trust misbehavior detection scheme, is required to keep a signed contact records of its previous contacts of transfer data, disseminated to a certain number of witness nodes, carry and store which can collect appropriate contact records and detect the misbehaving nodes to resend analysis with NDD. We also planned a scheme to mitigate routing misbehavior by limiting the number of packets forwarded to the misbehaving nodes. Trace-driven simulations show MASP to transfer the data with secure group aggregators to give security to our solutions are efficient and can effectively mitigate routing misbehavior.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Data Attribute Security for Distributed Database[ ]


Privacy-preserving publishing of micro data plays important in recent year because it is important to secure the sensitive information from data. We have used several micro data anonymization techniques such as Generalization, Bucketization and Slicing. A Slicing is a technique which divides data into two partitions such as horizontal and vertical. Slicing provides better data effectiveness than generalization and it also protect from membership disclosure. Data Provider aware algorithm is used for anonymization of the dataset which result into the reduction of the waiting time. Problem of attacks are removed with SQL Injection Prevention Technique. Experiments confirms that our approach achieve better utility and efficiency satisfying the security of the database.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Energy Efficient Location Privacy Preserving Based Qos Improvement in Wireless Multimedia Sensor Network[ ]


To introduce an Energy Efficient Location Privacy Preserving (EELPP) Protocol for WMSNs that is based on the Location Aided Routing (LAR) it’s mainly used in to improve QoS in network. LAR makes significant reduction in the energy consumption of the nodes batteries by limiting the area of discovering a new route to a smaller zone. Thus, control packets overhead are significantly reduced. In EELPP a reference wireless base station is used and the network's circular area centered at the base station is divided into six equal sub-areas.At route discovery instead of flooding control packets to the whole network area, they are flooded to only the sub-area of the destination mobile node. The base station stores locations of the nodes in a position table. To show the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that EELAR protocol makes an improvement in control packet overhead and delivery ratio compared to AODV. To reduce the energy cost, nodes are active only during data transmission and the intersection of node creates a larger merged node, to reduce the number of fake packets and also boost privacy preservation. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection than routing-based schemes and requires much less energy than data preventing based.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Marine bacteria: a potential bioresource for multiple applications[ ]


Marine microorganisms have developed distinctive metabolic and physiological capabilities to bloom in extreme habitats and produce novel metabolites which are not often present in microbes of terrestrial origin. They are a rich source of natural products with potential applications in drug discovery, environmental remediation, and the development of new resources for industrial processes. The present study aimed to isolate bacterial strains from marine water samples and screen their potential for various applications. A total of twelve bacterial strains were isolated and screened for enzyme production, Phosphate solubilization, EPS production and Azo dye decolorizing capacity. Most of the strains showed multiple potentialities. So these strains can be positively used for commercial applications.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Real Coded Genetic Algorithm Approach to Harmonic Reduction in Multilevel Inverters for Drives[ ]


Unlike utility application that requires a constant-frequency, constant-voltage high power multilevel inverter, adjustable speed drives (ASDs) used to control large industrial motors require high power variable-frequency and variable-voltage multilevel inverters that can operate over a wide range of modulation indices. In this paper, Real Coded Genetic Algorithm (RCGA) is proposed for computing the switching angles required to eliminate low order harmonics up to 13th order from multilevel inverter voltage waveform while keeping the magnitude of the fundamental at the desired level. RCGA is simple, derivative free, and globally convergent with any random initial values. The global search capability of RCGA is demonstrated in its ability to find solutions in the regions that are infeasible for other existing methods to find solutions. Both analytical and simulation results show that the proposed method efficiently mitigates harmonic distortion in multilevel inverter.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Harmonization of Geological Information Through Standards - The Case of Kelaat M'Gouna and Sidi Flah[ ]


Nowdays, the great explosion of the Geoscience data digitized, and diversity of independently developed information sources may be difficult to operated due to heterogeneous data sources that exist in all of these systems, interoperability has become a perssing need to share geographic information and contribute to the harmonization of data.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effects of Particle Size Variation of Palm Kernel Shell on Emission Performance and Temperature Distribution of a Bubbling Fluidized Bed Combustor[ ]


The effect of particle size variation of Palm Kernel Shell (PKS) on the temperature distribution and emission performance of a bubbling fluidized bed combustor (BFBC) was examined. PKS feedstock received from the farm were classified to three different sizes; ‘as received’ (6 – 22 mm), ‘mildly crushed’ (2 – 12 mm) and ‘pulverised’ (<2 mm). Combustions of the fuels were performed at Excess Air (EA) of 30, 50, 80 and 100% and fuel feed rate of 5 kg/hr in all cases. An electronic based regulating unit incorporated in the BFBC ensured that the inert bed temperature (T2) is limited to a maximum value of 750 oC in all the experiments. Significant impact of particle size variation on emission and temperature distribution in the BFBC were observed. At all EA, intense combustion and stable inert bed temperature (T2 = 750 ± 10 oC were obtained when firing size (6 - 22 mm), conversely (<2 mm) at EA>30% showed a rapid drop of inert bed temperature from750 - 500 oC. Particle size 6 - 12 mm and 2- 12 mm gave concentrations of pollutants that were within Nigeria emission limits at CO(195 – 856 ppm), NOx(9 – 182 ppm and SOx(8 – 93 ppm). No evidence of ash agglomerations was observed during the investigation thereby confirmed the effectiveness of the developed BFBC.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Implementation of Artificial Neural Networks for Mobile Robot based on FPGA[ ]


The world has seen great interest in intelligent systems and its control methods because they are provided distinctive service to humanity in civil and military purposes. In this paper presented the design and implementation of the intelligent controller system by Artificial Neural Network (ANN) for a laser mobile robot system to avoid obstacles in unknown environment. Back-Propagation (BP) method used to train the ANN. The system design was implemented and downloaded in FPGA board type Xilinx Spartan-3 XC3S700A. Four DC motor were used to move the mobile robot. The MATLAB program used to train the ANN. The mobile used IR sensors to detect the obstacles. The MSE get from the training the ANN is 〖 3*10〗^(-7) which is considered suitable accuracy in robotic system.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Aging influence on the performance of the steam power units in Kuwait- case study; Doha west power station[ ]


This study aims to the impact of aging steam power stations on the performance of the components of the station after 30 years from the age of steam power station and at different loads, a 50%, 75% and 100% of the maximum load. In this study exergy analysis to calculate the ratio of the rate of destruction in the steam unit components. The study revealed that the largest proportion of the destruction was 11.92% annual in evaporators at load 70%, and 10.64% annual at 50% of maximum load. While the percentage of the destruction in the boiler feed water pumps was 3.25% at load 50% of the maximum load of the unit steam and the highest value at load 100% was 4.17%.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study on the Nature and Necessity of Construction Logistics Plan[ ]


A study has been carried out at Island City Center (ICC) project (an ongoing high rise building project) in Mumbai, India, for duration of seven weeks, under the esteemed guidance of L&T Construction Company’s professionals, to understand construction logistics. Significance of construction logistics has been understood by direct observations in the site and interactions with L&T Construction Company’s professionals. Many construction companies may not have a well defined construction logistics plan before execution of the project. Over the last decade it has been realized by the Indian construction majors that detailed construction logistics plan is a must for any construction project for timely completion of the project within estimated cost and necessitates contractual bindings as Prelims. This study briefly explains the nature and necessity of construction logistics plan with a practical example.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design & Implementation an E-Commerce Sites Security System based on Local Binary Pattern Fingerprint Verification[ ]


E-Commerce has played a major role in changing the global economic thought, but it still suffers from serious threats concerning the protection of e-commerce transactions. As a result, there is a great demand for advanced protection system to increase consumer confidence and the institution in the field of e-commerce. In this paper, an e-commerce system is presented, which is a web application designed for browsing and purchasing products from the net. This system provides improved security techniques which are password and fingerprint verification to complete the purchasing procedure and protect e-bank and the system from intruder. The verification algorithm in purchasing procedure includes a series of steps starting with using canny edge detection filter and then using Local Binary Pattern (LBP) and histogram properties as statistical approaches for feature extraction from fingerprint image. A fingerprint image is first divided into (3*3) regions from which LBP histograms are extracted and then converted into a single feature vector. This feature vector forms an efficient representation of the fingerprint and is used to measure similarities between images.The result of matching has been compared by using the Chi Square Statistic (X2) that depend on the resulted feature vector which is a powerful information to prove identity of a person. ASP.NET 2013, SQL Server 2014, VB.NET 2013 and C# 2013 programming language has been used to execute the paper algorithms. Finally, it must be mentioned that an excellent results have been obtained using different fingerprint images.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dry and Wet Lab Studies for Some Indole Derivatives as Possible Corrosion Inhibitors for Copper in 2M HNO3[ ]


With contrast to the traditional techniques of identifying new corrosion inhibitors in wet lab, a prior dry-lab process, followed by a wet-lab process is suggested by using cheminformatics tools. Quantum chemical method is used to explore the relationship between the inhibitor molecular properties and its inhibition efficiency. The density function theory (DFT) is also used to study the structural properties of two selected indole derivatives in aqueous phase. It is found that when the indole derivatives adsorb on the copper surface, molecular structure influences their interaction mechanism. The inhibition efficiencies of these compounds showed a certain relationship to highest occupied molecular orbital (HOMO) energy, Mulliken atomic charges and Fukui indices. A wet lab study has been carried out using weight loss, potentiodynamic polarization, electrochemical impedance spectroscopy (EIS) and Electrochemical frequency modulation (EFM) measurements to evaluate their inhibition performance in 2 M HNO3 solutions at 30o C. Adsorption takes place by a direct chemisorption on the exposed copper surface, while it most probably occurs via hydrogen bonding on the oxidized surface. Compound (1) was the most effective among the two tested inhibitors, while Compound (2) was less effective than Compound (1). Results obtained from dry-lab process are in good agreement with those recorded from wet-lab experiments.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Live Line Selective Load Shedding[ ]


A power system has inbuilt capability to shed load automatically by voltage and frequency decline during the fault on transmission lines causing loss of generation. After the inception of heavy fault, the relays divide power system into multiple islands having varying frequencies and voltages. Natural 2% load reduction due to 1% frequency decline may be enhanced by rejecting loads using under voltage and under frequency relaying schemes to selectively disconnect auxiliary and noncritical loads as a demand side management strategy to overcome demand and supply deficits. This technique is good for live line load control instead of blanket load shedding equally affecting low and high demand consumers.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computation Of Simple Lens Design Parameters Using C++[ ]


Optics form part of the Instrumentation Design of almost all branches of Science and Technology. System Engineers (non-optics personal) manage with little or no theoretical knowledge. On several occasions, Engineers are required to compute the exact values of associated lens design parameters, say, focal length of a lens to verify the design data before finalization and submitting the same for production. To compute focal length to verify the design data, and refractive index of glass material of a lens while reverse engineering, requires precise input lens design parameters along with the proper sign conventions. The sign conventions vary with the type and configuration of a lens. Correct results are achieved only with the proper signs conventions as input. This requires some basic understanding of optics. The “LENS”, lens design tool, has been developed by us for System Engineers to determine the exact values of associated lens design parameters, wherein Sign Conventions as input are totally eliminated. Only positive values of lens parameters are entered as input. The System Engineer, on the other hand, should able to give input precisely as - one of the eight configurations of a lens - much simpler than inputting the sign conventions. A guide line has been given in using the design tool “LENS” with proper illustrations. The program has been found useful at various stages of System Design and Development. The “LENS” is also useful for Experienced Optical Engineers to get the reliable results quickly and precisely.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Fabrication of a Compact Microstrip Antenna with Notch Functions[ ]


A compact microstrip antenna with multiple band-notch characteristics is proposed. The proposed antenna has an operating frequency of 3.2 to 9 GHz, with six notch functions to reduce interference with existing systems. The notches created are C-band downlink (3.8-4.5GHz), WLAN (5.18-5.825GHz), Standard C-band uplink (5.825-6.425GHz), Extended C-band uplink (6.425-6.725GHz), Super Extended C-band uplink (6.725-7.025GHz) and X-band downlink (7.025-7.75GHz) using CST STUDIO SUITE 2010 .A return loss of -10dB has been achieved in the operating frequency range, other than the notches. There is a decrease in gain at the notch frequencies. The antenna is fabricated and the results attained from the network analyzer confirms the validity of the design which matches with the simulated results.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Real-time gesture control of a CNC machine tool with the use Microsoft Kinect sensor[ ]


The paper presents a control system of the AVIA VC 760 milling machine. Its control system is based on gesture monitoring and recognition using the Microsoft Kinect Motion Controller. The system was implemented in the Matlab/Simulink environment with Kinect for Windows Runtime and Kinect SDK & Developer Toolkit library. To investigate the system, three sets of gestures were developed for the purposes of the study (basic commads and movement control). The motion of the operator’s/controller’s hand can naturally and intuitively control the table and the spindle. The influence of light, distance from the robot, the speed of gestures performed by the operator on the system was tested. The paper discusses the concept and structure of the system and test results

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Effect of Flash Flood on the Efficiency of Roads Networks in South Sinai, Egypt. Case Study (Nuweiba-Dahab Road)[ ]


Sinai Peninsula is located at a unique position, both geographically and politically (1). In the mountainous area of Sinai Peninsula in Egypt, the improvement of infrastructure networks require reliable and accurate information about natural hazards particularly flash flood. Flash flooding is the most dangerous hazard to focus on because it prone the life of people who lives in the rough topography areas. This paper presents the assessment of flash flood hazards in the Southern Sinai governorate especially the road between Nuweiba and Dahab. GIS was used to delineate the morphometric parameters extracted from Digital Elevation Model (DEM) to construct a hydrological model that, indeed, helps the decision makers to rapidly take the necessary procedures to avoid risks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reduction Kinetics of El-Baharia iron ore (Egypt) via charcoal[ ]


Reduction kinetics of El-Baharia iron ore via solid charcoal briquettes in nitrogen atmosphere were carried out at different temperatures ranging from 700ËšC to 950ËšC. It was found that the best reduction properties were found at 950ËšC, where the kinetic models were determined.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Body Area Networks: Attacks and Countermeasures[ ]


Wireless Sensor Networks (WSNs) have been identified for their utility in a variety of different fields such as military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. Wireless Body Area Network (WBAN) technology is the consequence of the existing WSN technology. These networks are a composition of tiny, inexpensive and low-power biomedical nodes, fundamentally considered for healthcare monitoring applications. The main purpose of these applications is to ensure a monitoring of vital parameters of sick people without any interruption, while giving them the freedom of motion. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WBANs, the more challenging it becomes to fit the security of WBANs into such a limited environment. As a result, being familiar with the security aspects of WBANs is necessary before designing WBAN systems. In this paper, we review the security requirements for WBANs, the different kinds of possible attacks, and also some security mechanisms used to overcome these attacks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Determination of Monosodium Glutamate Content in Selected Traditional Meat Dishes[ ]


The study was conducted to determine the monosodium glutamate (MSG, Aginomotto or Chinese salt) content of selected traditional meat dishes. Six traditional meat dishes were selected from five different restaurant of Lahore. The dishes included were chicken karahi, mutton qorma, chicken biryani, seekhkabbab, chicken tikkah, palakgosht from five different places, which were Mazang, Lakshami Square,Fortress Stadium,Johar Town, M.MAlam Road. Estimation of monosodium glutamate was carried out by modified HPLC (Hiph Performance Liquid Chromatography) method of Lateef, Siddique, Saleem, & Iqbal, 2012 with minor modification. HPLC procedure included solution preparation, PH determination, Dervirization, Acidification, Extraction, Sample injection. The peak of MSG was identified by comparing it with retention time of MSG standards, that is, 8.2 min. The results from laboratory analysis concluded that MSG was present, altogether in the traditional meat dishes excluding five which were palakgosht from Lakshami Square, chicken tikha, chicken karahi, seekhkabab from Johar Town and mutton qorma from M.M Alam Road. On the bases of the data it was concluded that each restaurant adds MSG to makes their food more flavorful every time, it was observed that all the representative samples of chicken tikkah and chicken biryani contains MSG. it was also concluded that the amount of MSG was with the optimal palatability concentration i.e. 0.2 – 0.8% (w/w) as suggested by Loliger in 2000.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Structural Behavior & Design of Concrete Filled Steel Tube as Column as Per EC-4[ ]


An efficient method of resisting lateral loads for buildings in the 60-plus-story range is to position columns farthest from the building center with shear-resisting elements in between. This idea has given rise to a whole new category of composite systems characterized by their use of super columns interconnected across the building with a shear-resisting web-like framing. Large-diameter pipes or tubes filled with high-strength concrete in the range of 41 to 138 MPa. Generally, neither longitudinal nor transverse reinforcement is used within the steel pipe or tube. So this paper is based upon the design of CFST as per EUROCODE -4 & by using Ansys’11 as a analysis tool, the structural behavior of CFST (designed by myself) is shown in this paper. So from this it concluded that double skin concrete filled steel tube is efficient one.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sintering and Reduction via Hydrogen of Egyptian iron ore briquettes with Dolomite[ ]


This investigation studied the effect of dolomite addition to iron oxide raw material on the physicochemical properties of its briquette in a green form and indurate form. Also the effect of this addition on the degree of reduction was studied. The results indicated that the addition of (2% to 8%) dolomite improve the mechanical strength of the green briquettes while the mechanical strength of indurate form decreased. Also the reduction of these briquettes via hydrogen was studied and the model of reduction was put in this paper.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimal Analysis of Factors Affecting Cotton Production in Benin[ ]


According to the United States Department of Agriculture, Benin is ranked among the top 5 at the continental level in the production of cotton. Over the last fifteen years, despite different policies implemented by Benin’s government in agricultural sector, the cotton production has been drastically decreasing in conjunction with a rising of its production costs. Based on a triangulation approach this research aims on the one hand to determine the main factors that influence cotton production in Benin and on the other to assess if there is an optimal output that should be produced in Benin. Our findings show that, to make more profitable cotton sector, Benin needs to modernize its cotton production chains in order to produce 60 times more higher than its current level.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Three-Point Boundary Value Problems On Fuzzy Differential Equations- Existence and Uniqueness[ ]


Methods of fuzzy differential equations are extending to include Variation of Parameters formula, Existence and Uniqueness criteria for Three point Boundary Value Problems. Incidentally, we prove existence and uniqueness criteria for Initial Value Problems On fuzzy differential equations.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Predicting of Effluent Turbidity from Deep Bed Sand Filters Used in Water Treatment[ ]


Filtration is a solid liquid separation in which water passes through a porous medium to remove suspended or colloidal impurities. Deep bed filter is one of the most important types of filtration process in which solids are removed within the granular medium. Further, it is commonly used in either conventional water treatment plants or direct filtration plants. Various characteristics have been adopted for filtration process monitoring but usually, turbidity is used for this purpose. Turbidity removal is influenced by different parameters. It was needed to predict turbidity removal as a function of these parameters. In this study, experimental pilot plant was constructed to study turbidity removal efficiency and develop a simple predictive model for effluent turbidity by deep sand filter . Sand was used as a filtration media under different filtration rates ranged from 4 m/hr to 8 m/hr. Down flow was applied to the filter through sand media with size 0.7-1.0 mm, while sand depth was 140 cm. Aluminum sulfate (alum) was used as coagulat in different doses ranged from 20 to 40 mg/lit. The used synthetic turbid water was prepared in different turbidities varying from 10 to 30 NTU. Turbidity removal was investigated as functions of sand depth, filtration rate, influent turbidity, run time and alum dose. A mathematical model was obtained for predicting of effluent turbidity from deep bed sand filter with various operating conditions ( filter depth, filtration rate, alum dose, run time, and initial turbidity).The proposed model yield highly accurate results with correlation coefficient (R2) of 0.88. The proposed model showed that the most significant parameters on predicted effluent turbidity are the sand media depth and filtration rate. Also, the simple proposed model can be easily and effectively used as a decision supporting tool for prediction of filtration quality.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Pages   [1] [2] [3] [4] [5] [6] [7] [8] [U]