Research Article
Modelling Nitrogen Removal in the Kibendera Wastewater Stabilization Ponds in Ruiru, Kenya
George Kirumba*,
George Thumbi,
John Mwangi,
John Mbugua
Issue:
Volume 8, Issue 1, June 2024
Pages:
1-13
Received:
19 February 2024
Accepted:
8 March 2024
Published:
19 March 2024
DOI:
10.11648/j.ae.20240801.11
Downloads:
Views:
Abstract: Application of waste stabilization ponds (WSP) in wastewater treatment in the tropical regions is primarily due to their affordability and relatively high treatment performance. Monitoring of 2-year nitrogen removal behavior in Kibendera WSP in Ruiru, Kenya, was undertaken between January 2021 and December 2022. The experimental work determined the concentrations and removal efficiencies of Ammonia, Nitrate, Nitrite, Organic Nitrogen and Total Nitrogen. Standard Methods for the examination of water and wastewater determined Nitrogen and Dissolved Oxygen (DO) concentrations. Based on the experimental data obtained, mass balance reaction rate models characterized the nitrogen transformation and removal behavior in the WSP. Whereas model calibration was achieved using observed data from January to December 2021, model validation was achieved using observed data from January to December 2022. Ammonia volatilization, sedimentation, mineralization, nitrification, denitrification and microbial ammonia uptake were the possible transformation and removal pathways. Whereas ammonia volatilization contributed the least to the overall nitrogen removal (0.01-0.02 mg/L.d), denitrification contributed the most (2.12-14.67 mg/L.d). Low DO levels and high ammonia concentrations were responsible for low nitrification rates and high microbial ammonia uptake respectively. Comparison between experimental and modelled effluent concentrations yielded correlation coefficients (r) of 0.77 and 0.69 for ammonia and organic nitrogen respectively during the calibration period. The corresponding model validation r values were 0.74 and 0.93 respectively. The good agreement between the model output and observed effluent concentrations implies that nitrogen removal prediction and optimization is possible. External aeration to spike DO concentration levels is necessary to enhance the long-term nitrification rates.
Abstract: Application of waste stabilization ponds (WSP) in wastewater treatment in the tropical regions is primarily due to their affordability and relatively high treatment performance. Monitoring of 2-year nitrogen removal behavior in Kibendera WSP in Ruiru, Kenya, was undertaken between January 2021 and December 2022. The experimental work determined the...
Show More
Research Article
Evaluations of Crypto-System AES Using Multiple Bloc Ciphering Mode
Rakotondramanana Radiarisainana Sitraka,
Ramafiarisona Hajasoa Malalatiana
Issue:
Volume 8, Issue 1, June 2024
Pages:
14-30
Received:
9 March 2024
Accepted:
21 March 2024
Published:
2 April 2024
DOI:
10.11648/j.ae.20240801.12
Downloads:
Views:
Abstract: Cryptography, a scientific field that has existed even before the beginning of computer science. This article looks at the development symmetric crypto-system, which falls within the framework of image security, by Advanced Encryption Standard (AES- Advanced Encryption Standard) algorithms. AES algorithm is not integrity protected. Cryptanalysis could use modified encrypted image of each ciphered bloc for generating oracle and getting the key. A new crypto-system uses hash function named AES-GCM (Advanced Encryption Standard-) for solving this problem. Using Galois Counter Mode (GCM) combined with Secure Hash Algorithm 256 bits (SHA-256) or BLAKE2s hash function, the old mode of ciphering like: Cipher FeedBack (CFB), Output FeedBack (OFB), Cipher Block Chaining (CBC), Electronic Codebook Block (ECB) and CounTeR (CTR) mode encryption, will increase the security level at confidentiality and integrity. In this article, robustness of the crypto-system will be evaluated by multiple criteria, indeed the statistical analysis, sensitivity measurement and performance measurement. For the statistical analysis, the histogram is flat and the correlation between adjacent pixel is not linear for the encrypted image. The relation between clear image and encrypted image doesn’t exist. For the sensitivity analysis, Number of Pixel Changing Rate (NPCR) and Unified Averaged Changed Intensity (UACI) permit to avoid differential attack of the crypto-system. The two values are respectively near 99% and 30%. For performance measurement, the similarity of the decrypted image and original image will be tested. The Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are equals of infinity and zero. The decrypted image and original image are the same. The integrity of the image on the crypto-system will be evaluated by modifying one bit of the encrypted image. The decryption process doesn’t give decrypted image and show that the tag value is incorrect.
Abstract: Cryptography, a scientific field that has existed even before the beginning of computer science. This article looks at the development symmetric crypto-system, which falls within the framework of image security, by Advanced Encryption Standard (AES- Advanced Encryption Standard) algorithms. AES algorithm is not integrity protected. Cryptanalysis co...
Show More