-
Separation of biocrude produced from hydrothermal liquefaction of faecal sludge without any solvent
Authors:
H M Fairooz Adnan,
Md Khalekuzzaman,
Md. Atik Fayshal,
Md. Mehedi Hasan
Abstract:
In this study faecal sludge is used as raw biomass due to its abundance, low cost, and easy availability. After HTL operation, product separation is getting challenging. Current developed studies observed the separation of aqueous and biocrude oil products occurs during the HTL process more popularly with the use of an organic solvent which is quite expensive. Focusing on this critical issue, this…
▽ More
In this study faecal sludge is used as raw biomass due to its abundance, low cost, and easy availability. After HTL operation, product separation is getting challenging. Current developed studies observed the separation of aqueous and biocrude oil products occurs during the HTL process more popularly with the use of an organic solvent which is quite expensive. Focusing on this critical issue, this study aims to separate the biocrude and aqueous phase without using any solvent by gravity separation technique. From FTIR analysis data it showed that centrifuged at 6000 rpm partial separation of biocrude and aqueous phase (AP) was noticed. however, at 9000 rpm, FTIR analysis showed that biocrude samples included aliphatic hydrocarbons, phenols, and esters where no signs of any carbon chain were found at AP which indicated the products are successfully separated. The separated Crude portion had the higher A-Factor (0.68) and lower C-Factor (0.58) value which indicates the oil quality was immature grade of lower kerogen type II (i.e., moderate oil-prone). This low-cost technique can be economically advantageous for commercial-scale biocrude production.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Traffic Congestion Prediction using Deep Convolutional Neural Networks: A Color-coding Approach
Authors:
Mirza Fuad Adnan,
Nadim Ahmed,
Imrez Ishraque,
Md. Sifath Al Amin,
Md. Sumit Hasan
Abstract:
The traffic video data has become a critical factor in confining the state of traffic congestion due to the recent advancements in computer vision. This work proposes a unique technique for traffic video classification using a color-coding scheme before training the traffic data in a Deep convolutional neural network. At first, the video data is transformed into an imagery data set; then, the vehi…
▽ More
The traffic video data has become a critical factor in confining the state of traffic congestion due to the recent advancements in computer vision. This work proposes a unique technique for traffic video classification using a color-coding scheme before training the traffic data in a Deep convolutional neural network. At first, the video data is transformed into an imagery data set; then, the vehicle detection is performed using the You Only Look Once algorithm. A color-coded scheme has been adopted to transform the imagery dataset into a binary image dataset. These binary images are fed to a Deep Convolutional Neural Network. Using the UCSD dataset, we have obtained a classification accuracy of 98.2%.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Wireless Power Distributions in Multi-Cavity Systems at High Frequencies
Authors:
Farasatul Adnan,
Valon Blakaj,
Sendy Phang,
Thomas M. Antonsen,
Stephen C. Creagh,
Gabriele Gradoni,
Gregor Tanner
Abstract:
The next generations of wireless networks will work in frequency bands ranging from sub-6 GHz up to 100 GHz. Radio signal propagation differs here in several critical aspects from the behaviour in the microwave frequencies currently used. With wavelengths in the millimeter range (mmWave), both penetration loss and free-space path loss increase, while specular reflection will dominate over diffract…
▽ More
The next generations of wireless networks will work in frequency bands ranging from sub-6 GHz up to 100 GHz. Radio signal propagation differs here in several critical aspects from the behaviour in the microwave frequencies currently used. With wavelengths in the millimeter range (mmWave), both penetration loss and free-space path loss increase, while specular reflection will dominate over diffraction as an important propagation channel. Thus, current channel model protocols used for the generation of mobile networks and based on statistical parameter distributions obtained from measurements become insufficient due to the lack of deterministic information about the surroundings of the base station and the receiver-devices. These challenges call for new modelling tools for channel modelling which work in the short wavelength/high-frequency limit and incorporate site-specific details -- both indoors and outdoors. Typical high-frequency tools used in this context -- besides purely statistical approaches -- are based on ray-tracing techniques. Ray-tracing can become challenging when multiple reflections dominate. In this context, mesh-based energy flow methods have become popular in recent years. In this study, we compare the two approaches both in terms of accuracy and efficiency and benchmark them against traditional power balance methods.
△ Less
Submitted 15 April, 2020;
originally announced May 2020.
-
An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices
Authors:
Mohd Anuar Mat Isa,
Habibah Hashim,
Jamalul-lail Ab Manan,
Syed Farid Syed Adnan,
Ramlan Mahmod
Abstract:
After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed improvements in the DHKE protocol to encounter modern security issues. This protocol seems quite simple to be implemented, but it can be vulnerable to many types of attacks. In this work, we propose the Chained Key Exchange scheme as a case study to explore cryptographic computation capability of embedded microc…
▽ More
After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed improvements in the DHKE protocol to encounter modern security issues. This protocol seems quite simple to be implemented, but it can be vulnerable to many types of attacks. In this work, we propose the Chained Key Exchange scheme as a case study to explore cryptographic computation capability of embedded microcontroller. We choose ARM RaspberryPi board as hardware platform for experimental setup. To enable RasberberryPi system on chip (SoC) to perform cryptographic computation, we modified the GNU GMP Bignum library to support a simple primitive cryptographic computation in the UBOOT firmware. The main purpose of our study is to determine whether there is any gap between cryptographic protocol-scheme (in term of theoretical) and its engineering implementation. Our scheme will be integrated with Trivial File Transfer Protocol (TFTP) application in the UBOOT firmware. Our proposed scheme in the TFTP protocol will secure the sharing of secrets and symmetric keys (e.g., AES256). After that, the symmetric encryption algorithm can be used to encrypt data in the cases of remote system updates, patching and upgrades (e.g., firmware, kernel or application).
△ Less
Submitted 29 August, 2014;
originally announced September 2014.
-
A Secure TFTP Protocol with Security Proofs
Authors:
Mohd Anuar Mat Isa,
Habibah Hashim,
Syed Farid Syed Adnan,
Jamalul-lail Ab Manan,
Ramlan Mahmod
Abstract:
Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this work, we present an enhanced lightweight security protocol for smart device and server communic…
▽ More
Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this work, we present an enhanced lightweight security protocol for smart device and server communications using Trivial File Transfer Protocol (TFTP). We suggest the use of lightweight symmetric encryption for data encryption and asymmetric encryption for key exchange protocols in TFTP. The target implementation of secure TFTP is for embedded devices such as Wi-Fi Access Points (AP) and remote Base Stations (BS). In this paper we present the security proofs based on an attack model (IND-CCA2) for securing TFTP protocol. We also present the security reduction of SSW-ARQ protocol from Cramer-Shoup encryption scheme and fixed-time side channel security. We have also introduced a novel adversary model in IND-CCA2-(SC-TA) and it is considered a practical model because the model incorporates the timing attack.
△ Less
Submitted 29 August, 2014;
originally announced September 2014.