Search or add a thesis

Advanced Search (Beta)
Home > Designing, Construction and Characterization of Field Scale Constructed Wetland for the Treatment of Domestic Wastewater

Designing, Construction and Characterization of Field Scale Constructed Wetland for the Treatment of Domestic Wastewater

Thesis Info

Access Option

External Link

Author

Mahwish Ali

Department

Department of Microbiology

Program

PhD

Institute

Quaid-i-Azam University

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2018

Thesis Completion Status

Completed

Subject

Natural Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/9046/1/Mahwish_Ali_Microbiology_HSR_2018_QAU_17.04.2018.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676725830627

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Pakistan, as many developing countries, is facing serious water quantity and water quality issues due to industrial, agricultural and municipal activities. Water availability among others is predicted to be less than 700 m3 per capita by 2025 which is far below the international standard of 1500 m3 per capita. In addition, water pollution is causing unfavorable health conditions by raising the level of water borne diseases. Reuse of the wastewater after treatment is one of the possible option to comply with water shortage. With the designing, construction and long term treatment process of wastewater other factors such as less energy consumption, operation and management and cost effectiveness should also be considered in developing countries like Pakistan. Constructed wetlands considered effective in developing countries for their low construction, management and operational cost. Constructed wetlands are considered as attached growth bioreactors in which microbial colonization occur either in substrate in the form of biofilm or they form association in plants roots. The present study aimed to construct a treatment system (constructed wetland) for the treatment of domestic wastewater of Quaid-i-Azam University residential colony. For this purpose initially laboratory scale wetland study was designed and evaluated. Laboratory scale horizontal subsurface flow (HSSF) and hybrid Horizontal and Vertical subsurface flow (HSSF+VSSF) constructed wetland with a surface area of 0.75 m2 were built for the treatment of domestic wastewater. The wetland units were planted with Typha latifolia. Both units were fed with domestic wastewater at flow rate of 0.0384 m3/d. Removal efficiencies of the both systems were increased with time and showed removal of COD and BOD upto 90 and 96 %, TSS 70 and 79 %, Nitrate 97 and 79 %, Nitrite 95 and 97 %, Phosphate 75 and 80 % and sulphates 59 and 53 % for HSSF and HSSF-VSSF setups respectively. Furthermore, for a single house hybrid constructed wetland system was constructed at pilot scale and was operated at continuous average flow rate of 1.6 liter per day with measured HRT of 8.6 Days. Year round performance of the system was monitored for physio chemical and microbial analysis. Significant results were found during the study and effluent of the system meets the national standards of water discharge by giving average removal efficiencies of 89.61 % for COD, 89.0 % for BOD, 94.0 % for NO-2, 81.13 % for NO-3, 36.94 % for SO4-2, 66.29 % for PO4-4, 94.5 % for TSS and 96.36 % for MPN. Based on the results of Lab-scale and Household units two systems at field scale were constructed receiving continuous flow of wastewater from residential colony of QAU. System-I consisted of an anaerobic baffled reactor (ABR) followed by a saturated vertical subsurface-flow (VSSF) CW and a free-water-surface (FWS) CW as a tertiary treatment; system-II consisted of an ABR followed by a horizontal subsurface-flow (HSSF) CW and FWS constructed wetland. Maximum reduction of 80 and 78 %, 81 and 82 %, 63 and 69 %, 79 and 89 % for COD, BOD, TKN and TSS was achieved in Systems I and II respectively. There was also effective removal (93-94 %) of the bacterial population in both the systems while more than 94 % of pathogenic microorganisms were removed. Data from both the systems were further used to compute the first–order rate constants for the k–C* model commonly used in CW design. The treatment performance was confirmed to follow a first-order reaction rate, in which the k20 values of Chemical oxygen demand, Biological oxygen demand, Total Kjeldahl nitrogen, Total phosphorus and Total suspended solids were calculated as 165, 117, 133, 7.5 and 78 m.yr-1 respectively for VSSF and 226, 134, 199, 22 and 73 m.yr-1 respectively for HSSF. A positive correlation with temperature was observed for all the parameters studied in the systems. Treated water from Field scale wetland was used for irrigation of different vegetables in summer and winter season. For this purpose vegetables were irrigated with raw sewage, treated sewage and tap water. A significant difference in aerobic plate count (APC) was found between vegetables irrigated with sewage water and wetland treated water. Significant difference in microbial load was observed in summer and winter season for both groups of vegetables irrigated with treated and untreated water. Non-significant difference was found between the growth of vegetables irrigated with sewage water and treated water, after 60 days of sowing. Therefore, it could be inferred from this study that wetland treatment significantly reduced the risk of pathogen spread in vegetables irrigated with sewage water. Application of constructed wetland 2D (CW2D) model HYDRUS Wetland module was used for the Vertical subsurface flow constructed wetland that was running in continuous mode without having any sequential dry and wet periods. Collected data was processed to examine whether the model could work for simulation of VSSF treating sewer wastewater with varying hydraulic loading rate (HLR). Results of simulation from CW2D was better fit in with the measured values for COD, Ammonia and Nitrates. CW2D can be used for the constructed wetlands receiving varying concentration of wastewater. In conclusion this study is the first study which contributed to the environment protection at the local level and a wastewater treatment system was constructed at Quaid-i-Azam University. This would lead to the duplication of such systems throughout the country for wastewater treatment at site on those areas which are not connected to main treatment systems of the city.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

۔۔۔کے پروفائل پر بلی دیکھ کر

۔۔ ۔کے پروفائل پر بلّی دیکھ کر

پالی میں نے بھی اک بلّی
دیکھی تیرے گھر جب بلّی

تیرے گھر میں جو بلّی ہے
بھولی بھالی سی دِکھتی ہے
خوب شرارت پر کرتی ہے
تیرے بستر پر بیٹھی ہے

مجھ کو کیسے گھور رہی ہے
تجھ سے ملنے جب آتا ہوں
اِس کے بسکٹ بھی لاتا ہوں

یہ کتنے نخرے کرتی ہے
بس تیرے جیسی لگتی ہے
کیک بیکری کے کھاتی ہے
اور پھر بھی گھورے جاتی ہے

یہ سب کچھ دیکھا میں نے تو
پالی میں نے بھی اک بلّی
ایسی نہیں پر میری بلّی
تیری بلّی ، تیری بلّی
ایسی نہیں پر میری بلّی

یہودیت، عیسائیت اور اسلام میں اجزائے حیوانات کے احکام کا تقابلی جائزہ

Almighty Allah bestowed honors and respect to mankind. Keeping in view the honor of mankind, Allah SWT blessed them also a purified, cleanse and Halal [permissible & Lawful] food. Moreover, the religious teachings are very clear and transparent in this regard to highlight the difference between what is beneficial and useful for them and what is harmful and injurious. Almighty Allah is very kind and compassionate to his servants and described definite commands and orders about such Animals which are adequate and effective to mankind and counts them in Halal category and otherwise are considered Restricted and Haram [impressible & unlawful]. So all kinds of animals which are harmful are prohibited with exception of their some body organs and which are useful are described with their all qualities are halal in mentioned divine religions i.e. Judaism, Christianity and Islam coupled with little changes in rulings about the use of body organs of impermissible animals like use of bones or skin etc. The paper emphasis on describing the disparities of three divine religions regarding the use of organs, skin of animals, bones and highlight their procedures of making them safe and useable for mankind. This study will lead us to know that which divine religion is more applicable and provides cleanse food to their followers along with having the status of eternity strength among three.

A Framework for Network Security, Privacy and Adaptability Management Through Mobile Software Agents

This thesis targets network security – an essential area of computer science, which has gained progressively attention of researchers due to concerns and potential damages in various organizations. More specifically, it deals with insider threat that is less focused than the external threat. Software agents have been used as a technology in this research that autonomously roam around network. Software agents are diversified research area that covers artificial intelligence, programming abstraction and distributed computing. During literature surveys of various agent platforms it has been summed up that both agent standards, FIPA and MASIF, have their own advantages and disadvantages but still some missing features were pointed out such as security, distributed events and multicasting that are not well focused at all by any of the available standards. There are two possible ways to focus the problem, i.e. either these two standards may be combined or another standard may be proposed to include all features necessary for a true agent system. While working on the Agent based Security Framework, first a vulnerability assessment model has been developed that presents an agent based solution and demonstrates that both insiders and outsiders exploit the weaknesses of the system. The literature survey and the practical results of the model reveal that the insider threat is more critical than the outsider. During development of vulnerability assessment model many practical issues have been identified and appropriate solution has been proposed. For the assessment, both agent platform-dependent and platform- independent approaches were used to achieve the task. After comparing results of both approaches, it was proposed that a qualitative, standardized and comprehensive management of the agents is only possible with established and recognized agent platforms. Considering privacy as another component of dissertation, the Agent-based Profiling model has been developed. The model considers an individual’s personality profile to identify real personality in the cyberspace; Guard and guide to use internet resources, and analyzing social interactions to create social community. Major indicators involving profile generation and personality identification have been viiiargued and implemented. The framework helps to create virtual social community in the cyberspace where users are guarded and guided to use internet resources according to their actual profiles and the interests. The profiling model has been implemented in two different ways, i.e. JADE and .Net framework. Test results show that .Net framework supports many advanced tools and technologies therefore and agent platform on the top of the .Net framework is proposed to develop agent based models. Hence, the proposed solution to insider threat will be integrated on the top of agent technology to autonomously monitor and predict human behavior. As human behavior is difficult to predict, therefore autonomously monitoring user behavior is the key solution to avoid insider threat. The FIPA-compliant agent framework for profiling, ACENET (Agent Collaborative Environment based on .NET), has been developed to solve the problem. The proposed profiling framework allows identifying anomalies in user activities either online or offline. Online monitoring is carried out in real time that is used to catch the sensitive activity started by user against organization’s policy. Offline monitoring is carried out on daily, weekly and monthly basis and is based on the analysis of specified factors. Both online and offline monitoring use agent based approach to identify anomalies in user activities. Motivation behind the proposed model is that many procedural security measures are being taken by the organizations at lower level. This dissertation focuses on high level security measures through profiling based agent system to detect the activities user is performing in the organization. It is also checked out that if the user-activities are in accordance with organization’s policy or not? The research has been conducted about insider threat and several issues are addressed and solution has been provided. The major developments are: Monitoring behavior either suspicious or normal, Certifying user’s authenticity to use resources, Checking limitations of the users, Monitoring that user comes into view from the assigned location or not, Analyzing the level of the destruction caused by user, etc. The ACENET scores every user of the organization and maintains a detailed profile. It is really a cumbersome process to determine whether a legitimate user is doing any malicious activity. Expectantly such activity would stand out as strange when compared to the user''s routine behavior. ACENET is adaptable to deploy in any ixorganization. Agents have been designed as service on the top layers of the model. The developed agents create and maintain user-profiles and monitor activities autonomously. The threats have been categorized in various classes and for each category agents have been designed. Communication among agents takes place by message passing at upper level whereas internally socket based communication is underway. To resolve conflict between users and organizations, some professional ethical issues pertaining to privacy, have been addressed and appropriate solution has been proposed to implement the framework in accordance with the recognized standards. A matrix or grid of the trust levels ‘trust grid’ is designed similar to ACL where diverse access privileges are assigned to different level of the users. Currently grid has been divided in two categories: Binary [access given, not given] and Gradient [strong, moderate, weak, none]. The professional issues regarding activity monitoring were studied and it has been proposed that organization may announce in advance what can be monitored and what cannot be monitored, by providing a user monitoring policy. In the light of organization’s policy weight-age has been assigned to profile attribute to identify threat contribution of each suspicious activity and user. The Agent-based Security Framework, ACENET, was tested on real data, obtained from the organizations, and the performance has also been evaluated on the basis of specified parameters. Framework’s results were analyzed to match with the targeted objectives. Finally future directions for the extension of the framework have been presented.