Browsing by Author "Hassan N.H."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Deconstruction of Malaysian agro-wastes with inexpensive and bifunctional triethylammonium hydrogen sulfate ionic liquid(American Institute of Physics Inc., 2018) ;Zahari S.M.S.N.S. ;Amin A.T.M. ;Halim N.M. ;Rosli F.A. ;Halim W.I.T.A. ;Samsukamal N.A. ;Sasithran B. ;Ariffin N.Z. ;Azman H.H. ;Hassan N.H. ;Othman Z.S. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM) ;Universiti Selangor (UNISEL)Universiti Kebangsaan Malaysia (UKM)Ionic liquids (ILs) are known to be very effective at deconstructing biomass, but, they are typically 5-20 times more expensive than molecular solvents; this is a major impediment to the utilisation of ILs in biorefinery applications. In view of this, this paper is the first to report a preliminary study on the use of inexpensive and bifunctional triethylammonium hydrogen sulfate ionic liquid, [N2220][HSO4] IL, in deconstructing two Malaysian agro-wastes, oil palm empty fruit bunches (OPEFB) and coconut husk. The [N2220][HSO4] IL was synthesised via simple acid-base neutralisation route between two inexpensive precursors: sulfuric acid, H2SO4, and triethylamine, N222. The results of deconstruction of OPEFB and coconut husk under the applied conditions, IL/H2O (80/20 wt/wt) at 120�C for 2 h, proved that the IL provided bifunctional action as: a Br�nsted acid catalyst that hydrolysed chemical bonds linking carbohydrate-rich-material (cellulose and hemicellulose) and lignin fractions, and; a delignification agent that dissolved lignin, separating the biopolymer from the carbohydrate-rich-material. The outcomes of this study indicate that the deconstruction of Malaysian agro-wastes for isolating valuable biopolymers can be performed in a more economical and effective way using the [N2220][HSO4] IL. - Some of the metrics are blocked by yourconsent settings
Publication Proposed proactive digital forensic approach for cloud computing environment(Science Publishing Corporation Inc, 2018) ;Samy G.N. ;Maarop N. ;Wong D.H. ;Rahim F.A. ;Hassan N.H. ;Perumal S. ;Magalingam P. ;Albakri S.H. ;Faculty of Science and Technology ;Universiti Teknologi Malaysia (UTM) ;Universiti Tenaga Nasional (UNITEN)Universiti Sains Islam Malaysia (USIM)There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multitenancy, multistakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment. Thus, this paper proposed a proactive digital forensic approach for cloud computing environment. � 2018 Authors. - Some of the metrics are blocked by yourconsent settings
Publication A review on risk assessment using risk prediction technique in campus network(World Academy of Research in Science and Engineering, 2020) ;Awang N. ;Samy G.A.L.N. ;Hassan N.H. ;Magalingam P.A.P. ;Maarop N.Perumal S.A.L.Risk assessment is an important part of a risk management process to secure information systems. The risk assessment activities helped organizations determine the acceptable level of risk. Understanding and assessing risk is an important process to improve information security in making decisions. Risk prediction is an important part of information security system. In order to security operation center understand their environment, risk prediction technique helped them to create a holistic understanding of the networks, systems, services and applications they are responsible for monitoring. In this research paper, we discussed past related research in doing a risk prediction in conducting a risk assessment activity at the campus network. We have selected 5 key databases in computer science area. We have refined the searching based on subject area, types of document, publication title, index terms, sub-keyword and source title. In doing the screening process, we exclude articles that did not meet research selection criteria based on keyword searching in the papers. From the comprehensive literature search databases searching, we have selected 15 articles related to subject risk prediction conducted in campus network. � 2020, World Academy of Research in Science and Engineering. All rights reserved.