A large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system generates theoretically (120 kg steam /h at 8 bars) with dry wood as fuel and preheating for the air of combustion and feed water and a diesel engine of (8 hp) four-stroke with single piston converted to steam engine coupled with the electrical generator of (3 kVA). The results are compared with practical values valid in the literature about small power plants of steam capacity (0.1-1) ton/h and operating pressure up to 10 bars. Experimentally, the generated electrical power is little and sufficient to operate a small fan and lump. The current converted steam engine is better than a conventional steam engine in auto lubrication with some operational problems. The boiler efficiency is 63.28%.
Rutting is a crucial concern impacting asphalt concrete pavements’ stability and long-term performance, negatively affecting vehicle drivers’ comfort and safety. This research aims to evaluate the permanent deformation of pavement under different traffic and environmental conditions using an Artificial Neural Network (ANN) prediction model. The model was built based on the outcomes of an experimental uniaxial repeated loading test of 306 cylindrical specimens. Twelve independent variables representing the materials’ properties, mix design parameters, loading settings, and environmental conditions were implemented in the model, resulting in a total of 3214 data points. The network accomplished high prediction accuracy with an R
... Show MoreABSTRACT: Ultimate bearing capacity of soft ground reinforced with stone column was recently predicted using various artificial intelligence technologies such as artificial neural network because of all the advantages that they can offer in minimizing time, effort and cost. As well as, most of applied theories or predicted formulas deduced analytically from previous studies were feasible only for a particular testing environment and do not match other field or laboratory datasets. However, the performance of such techniques depends largely on input parameters that really affect the target output and missing of any parameter can lead to inaccurate results and give a false indicator. In the current study, data were collected from previous rel
... Show MoreIn the present study, the removal of zinc from synthetic waste water using emulsion liquid membrane extraction technique was investigated. Synthetic surfactant solution is used as the emulsifying agent. Diphenylthiocarbazon (ditizone) was used as the extracting agent dissolved in carbon tetrachloride as the organic solvent and sulfuric acid is used as the stripping agent. The parameters that influence the extraction percentage of Zn+2 were studied. These are the ratio of volume of organic solvent to volume of aqueous feed (0.5-4), ratio of volume of surfactant solution to volume of aqueous feed (0.2-1.6), pH of the aqueous feed solution (5-10), mixing intensity (100-1000) rpm, concentration of extracting agent (20-400) ppm, surfactant co
... Show MoreComposting is one of the solid waste management (SWM) methods where the organic component decomposed biologically under controlled conditions. In this study, a 0.166 m3 bioreactor tank was designed to compose 59.2Kg of simulated common municipal solid food waste having a bulk density, organic matter, organic carbon, pH, nitrogen content, C/N and nitrification index (NH4-N/ NO3-N) of 536.62 kg/m3, 62.34%, 34.76%, 6.53, 1.86%, 23 and 0.34 respectively. The bioreactor operated aerobically for 30 days, and anaerobically for 70 days, until the end of the composting process. Results proved that the composting process could reduce the mass of the waste by 69%. Nitrogen content,
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More