Industrial developments in the oil and gas, petrochemical, pharmaceutical and food sector have contributed to the large production of oily wastewater worldwide. Oily wastewater pollution affects drinking water and groundwater resources, endangers aquatic life and human health, causes atmospheric pollution, and affects crop production. Several traditional and conventional methods were widely reported, and the advantages and limitations were discussed. However, with the technology innovation, new trends of coupling between techniques, use of new materials, optimization of the cleaning process, and multiphysical approach present new paths for improvement. Despite these trends of improvement and the encouraging laboratory results of modern and green methods, many challenges remain to be raised, particularly the commercialization and the global aspect of these solutions and the reliability to reduce the system’s maintenance and operational cost. In this review, the well-known oily wastewater cleaning methods and approaches are being highlighted, and the obstacles faced in the practical use of these technologies are discussed. A critical review on the technologies and future direction as the road to commercialization is also presented to persevere water resources for the benefit of mankind and all living things.
The Industrial Internet of Things (IIoT) can transform an existing isolated industrial system to a connected network. The IIoT and the related wireless connectivity requirements for industrial sensors are very significant. The deployed sensors in IIoT monitors the conditions of the industrial devices and machines. Therefore, reliability and security become the most important concerns in IIoT. This introduces many familiar and ever-increasing risks associated with the industrial system. The IIoT devices can be vulnerable to vast array of viruses, threats, and attacks. Therefore, an efficient protection strategy is required to ensure that the millions of IIoT devices are safe from these risks. However, resource constraint IIoT devices have not been designed to have effective security features. Due to this, in recent years, cloud, fog, and edge-based IIoT has received great attention in the research community. The computationally intensive tasks such as security, data analytics, decision making, and reporting are performed at the cloud or fog using a powerful computing infrastructure. The data security of the IIoT device has been provided by employing improved Rivest-Shamir-Adelman (RSA) and hash signatures. The proposed RSA algorithm has a four-prime number of 512-bits. The device authentication is performed by employing a hash signature. For long network life, an efficient clustering technique for the sensor devices which is based on node degree(N), distance from the cluster(D), residual energy(R), and fitness (NDRF) has been proposed. The fitness of the sensor nodes is computed using the Salp swarm algorithm (SSA). In order to reduce the latency and communication overhead for IIoT devices a resource scheduling using SoftMax deep neural network (DNN) is proposed. All the requests coming from the cluster head are classified using SoftMax-DNN for best resource scheduling on the basis of storage, computing, and bandwidth requirements. The proposed framework produces superior results, especially in terms of energy consumption, latency, and strength of security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.