Clean drinking water is one of the United Nations Sustainable Development Goals.Despite significant progress in the water purification technology,many regions still lack access to clean water.This paper provides a rev...Clean drinking water is one of the United Nations Sustainable Development Goals.Despite significant progress in the water purification technology,many regions still lack access to clean water.This paper provides a review of selected water contaminants and their impacts on human health.The World Health Organization(WHO)guidelines and regional standards for key contaminants were used to characterise water quality in the European Union and UK.The concept of safe drinking water was explained based on the non-observed adverse effect level,threshold concentrations for toxic chemicals,and their total daily intake.Various techniques for monitoring water contaminants and the drinking water standards from five different countries,including the UK,USA,Canada,Pakistan and India,were compared to WHO recommended guidelines.The literature on actual water quality in these regions and its potential health impacts was also discussed.Finally,the role of public water suppliers in identifying and monitoring drinking water contaminants in selected developed countries was presented as a potential guideline for developing countries.This review emphasised the need for a comprehensive understanding of water quality and its impacts on human health to ensure access to clean drinking water worldwide.展开更多
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t...Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER).展开更多
With time concrete / reinforced concrete has become the popular material for construction. Modern industry utilizes this material a lot and has produced various beautiful, eye catching and amazing structures. Due to m...With time concrete / reinforced concrete has become the popular material for construction. Modern industry utilizes this material a lot and has produced various beautiful, eye catching and amazing structures. Due to modern requirements for living and developed construction industries, the old buildings (usually constructed with brick masonry) are demolished and are replaced with new modern buildings. Demolition of buildings results in waste materials which can create waste related problems and environmental issues. By using recycled aggregates weight of concrete can also be reduced, which can also solve problems related to self-weight of concrete. In this paper attempt has been made to use local used bricks from vicinity of Nawabshah, Pakistan, as coarse aggregate. Concrete cubes made with local recycled bricks are cast and tested for overall weight of concrete, moisture content, dynamic modulus of elasticity and compressive strength (nondestructive and destructive methods). The results showed that concrete derived from recycled aggregates attained lower strength than regular concrete. More detailed elaborated work is recommended with different mix ratios and different proportions recycled aggregates for better conclusions.展开更多
文摘Clean drinking water is one of the United Nations Sustainable Development Goals.Despite significant progress in the water purification technology,many regions still lack access to clean water.This paper provides a review of selected water contaminants and their impacts on human health.The World Health Organization(WHO)guidelines and regional standards for key contaminants were used to characterise water quality in the European Union and UK.The concept of safe drinking water was explained based on the non-observed adverse effect level,threshold concentrations for toxic chemicals,and their total daily intake.Various techniques for monitoring water contaminants and the drinking water standards from five different countries,including the UK,USA,Canada,Pakistan and India,were compared to WHO recommended guidelines.The literature on actual water quality in these regions and its potential health impacts was also discussed.Finally,the role of public water suppliers in identifying and monitoring drinking water contaminants in selected developed countries was presented as a potential guideline for developing countries.This review emphasised the need for a comprehensive understanding of water quality and its impacts on human health to ensure access to clean drinking water worldwide.
基金supported by Natural Science Foundation of China(61801008)The China National Key R&D Program(No.2018YFB0803600)+1 种基金Scientific Research Common Program of Beijing Municipal Commission of Education(No.KM201910005025)Chinese Postdoctoral Science Foundation(No.2020M670074).
文摘Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER).
文摘With time concrete / reinforced concrete has become the popular material for construction. Modern industry utilizes this material a lot and has produced various beautiful, eye catching and amazing structures. Due to modern requirements for living and developed construction industries, the old buildings (usually constructed with brick masonry) are demolished and are replaced with new modern buildings. Demolition of buildings results in waste materials which can create waste related problems and environmental issues. By using recycled aggregates weight of concrete can also be reduced, which can also solve problems related to self-weight of concrete. In this paper attempt has been made to use local used bricks from vicinity of Nawabshah, Pakistan, as coarse aggregate. Concrete cubes made with local recycled bricks are cast and tested for overall weight of concrete, moisture content, dynamic modulus of elasticity and compressive strength (nondestructive and destructive methods). The results showed that concrete derived from recycled aggregates attained lower strength than regular concrete. More detailed elaborated work is recommended with different mix ratios and different proportions recycled aggregates for better conclusions.