Avijit Mallik
Dept. of ME, RUET

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Clean Future: Design of an efficient and feasible water treatment plant for rural South-Bengal Avijit Mallik; Md. Arman Arefin
Waste Technology Vol 7, No 1 (2019)
Publisher : Diponegoro University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (979.203 KB) | DOI: 10.14710/7.1.1-10

Abstract

Waste water treatment is an important issue because of lessening water resources. The primary reason for waste water treatment process is to expel the different constituents of the polluting load: solids, natural carbon, supplements, inorganic salts, metals, pathogens and so on. In this paper, mainly de-centralized method is considered as a solution. A new rural wastewater treatment process is introduced with proper planning and designing by using empirical equations. This paper exhibits the waste water treatment technologies present in Bangladesh, to expel contaminants from wastewater, for example, halogenated hydrocarbon mixes, overwhelming metals, colors, pesticides, and herbicides, which speak to the fundamental toxins in waste water. This research shows that the proposed decentralized system is more feasible economically and environmentally (about 75% BOD removal), since the centralized system needs modern machineries and high initial investment. To design a sustainable wastewater treatment system for developing area, further assessment on environmental, health, social and institutional aspects are recommended.
MAN-IN-THE-MIDDLE-ATTACK: UNDERSTANDING IN SIMPLE WORDS Avijit Mallik
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 2 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (748.628 KB) | DOI: 10.22373/cj.v2i2.3453

Abstract

These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle-attack’ (MITM/MIM). This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.