Wastewater treatmentWastewater treatment is a process which removes and eliminates contaminants from wastewater and converts this into an effluent that can be returned to the water cycle. Once returned to the water cycle, the effluent creates an acceptable impact on the environment or is reused for various purposes (called water reclamation). The treatment process takes place in a wastewater treatment plant. There are several kinds of wastewater which are treated at the appropriate type of wastewater treatment plant.
Industrial wastewater treatmentIndustrial wastewater treatment describes the processes used for treating wastewater that is produced by industries as an undesirable by-product. After treatment, the treated industrial wastewater (or effluent) may be reused or released to a sanitary sewer or to a surface water in the environment. Some industrial facilities generate wastewater that can be treated in sewage treatment plants.
Sewage treatmentSewage treatment (or domestic wastewater treatment, municipal wastewater treatment) is a type of wastewater treatment which aims to remove contaminants from sewage to produce an effluent that is suitable to discharge to the surrounding environment or an intended reuse application, thereby preventing water pollution from raw sewage discharges. Sewage contains wastewater from households and businesses and possibly pre-treated industrial wastewater. There are a high number of sewage treatment processes to choose from.
Public key infrastructureA public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
EffluentEffluent is wastewater from sewers or industrial outfalls that flows directly into surface waters, either untreated or after being treated at a facility. The term has slightly different meanings in certain contexts, and may contain various pollutants depending on the source. Effluent is defined by the United States Environmental Protection Agency (EPA) as "wastewater–treated or untreated–that flows out of a treatment plant, sewer, or industrial outfall. Generally refers to wastes discharged into surface waters".
Water treatmentWater treatment is any process that improves the quality of water to make it appropriate for a specific end-use. The end use may be drinking, industrial water supply, irrigation, river flow maintenance, water recreation or many other uses, including being safely returned to the environment. Water treatment removes contaminants and undesirable components, or reduces their concentration so that the water becomes fit for its desired end-use. This treatment is crucial to human health and allows humans to benefit from both drinking and irrigation use.
Secondary treatmentSecondary treatment (mostly biological wastewater treatment) is the removal of biodegradable organic matter (in solution or suspension) from sewage or similar kinds of wastewater. The aim is to achieve a certain degree of effluent quality in a sewage treatment plant suitable for the intended disposal or reuse option. A "primary treatment" step often precedes secondary treatment, whereby physical phase separation is used to remove settleable solids.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Decentralized wastewater systemDecentralized wastewater systems (also referred to as decentralized wastewater treatment systems) convey, treat and dispose or reuse wastewater from small and low-density communities, buildings and dwellings in remote areas, individual public or private properties. Wastewater flow is generated when appropriate water supply is available within the buildings or close to them. Decentralized wastewater systems treat, reuse or dispose the effluent in relatively close vicinity to its source of generation.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.
Public key fingerprintIn public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are shorter than the keys they refer to, they can be used to simplify certain key management tasks. In Microsoft software, "thumbprint" is used instead of "fingerprint." A public key fingerprint is typically created through the following steps: A public key (and optionally some additional data) is encoded into a sequence of bytes.
Peripatric speciationPeripatric speciation is a mode of speciation in which a new species is formed from an isolated peripheral population. Since peripatric speciation resembles allopatric speciation, in that populations are isolated and prevented from exchanging genes, it can often be difficult to distinguish between them. Nevertheless, the primary characteristic of peripatric speciation proposes that one of the populations is much smaller than the other.
Sympatric speciationSympatric speciation is the evolution of a new species from a surviving ancestral species while both continue to inhabit the same geographic region. In evolutionary biology and biogeography, sympatric and sympatry are terms referring to organisms whose ranges overlap so that they occur together at least in some places. If these organisms are closely related (e.g. sister species), such a distribution may be the result of sympatric speciation. Etymologically, sympatry is derived from the Greek roots συν ("together") and πατρίς ("homeland").
Allochronic speciationAllochronic speciation (also known as allochronic isolation, or temporal isolation) is a form of speciation (specifically ecological speciation) arising from reproductive isolation that occurs due to a change in breeding time that reduces or eliminates gene flow between two populations of a species. The term allochrony is used to describe the general ecological phenomenon of the differences in phenology that arise between two or more species—speciation caused by allochrony is effectively allochronic speciation.
Ion sourceAn ion source is a device that creates atomic and molecular ions. Ion sources are used to form ions for mass spectrometers, optical emission spectrometers, particle accelerators, ion implanters and ion engines. Electron ionization Electron ionization is widely used in mass spectrometry, particularly for organic molecules. The gas phase reaction producing electron ionization is M{} + e^- -> M^{+\bullet}{} + 2e^- where M is the atom or molecule being ionized, e^- is the electron, and M^{+\bullet} is the resulting ion.
Species complexIn biology, a species complex is a group of closely related organisms that are so similar in appearance and other features that the boundaries between them are often unclear. The taxa in the complex may be able to hybridize readily with each other, further blurring any distinctions. Terms that are sometimes used synonymously but have more precise meanings are cryptic species for two or more species hidden under one species name, sibling species for two (or more) species that are each other's closest relative, and species flock for a group of closely related species that live in the same habitat.
Mass spectrometryMass spectrometry (MS) is an analytical technique that is used to measure the mass-to-charge ratio of ions. The results are presented as a mass spectrum, a plot of intensity as a function of the mass-to-charge ratio. Mass spectrometry is used in many different fields and is applied to pure samples as well as complex mixtures. A mass spectrum is a type of plot of the ion signal as a function of the mass-to-charge ratio.
Ion exchangeIon exchange is a reversible interchange of one kind of ion present in an insoluble solid with another of like charge present in a solution surrounding the solid with the reaction being used especially for softening or making water demineralised, the purification of chemicals and separation of substances. Ion exchange usually describes a process of purification of aqueous solutions using solid polymeric ion-exchange resin. More precisely, the term encompasses a large variety of processes where ions are exchanged between two electrolytes.