Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe research represents an applied study to the urban scene of Baghdad city center within the area of (Al Bab Al Sharqi – Al Tahrir Square) through studying and identifying the levels of the reciprocal correlation of advertising signs impact on urban scene , then finding out the indicators and potential values which have made advertising signs as positive value by achieving the mechanisms of visual quality or a negative value by achieving mechanisms of visual pollution. And then examining the resulted visual perception defect reforming mechanism from it and identify the basic elements represented of the laws and legislation known worldwide. When presenting the problem, The research depends on: (Lack of clear perception
... Show More
The research handles the prominent books of The Weak and Unknown Narrators , which is written by Imam Abu Al-Hasan Al-Daraqutni. It contains a brief introduction about the book and about Abu Bakr Al-Barqani, as well as Abi Mansour Ibn Hamkan.
The research handles the issue of unknown narrators and their relationship to the abandonment stipulated in the preamble to the book.
The research dealt with the identification and comparison between the sayings of Al-Daraqutni and his students - especially Al-Burqani, the publisher of his knowledge, as he is the one who narrated the sayings of Al-Daraqutni. The study concluded that the principle is to abandon the me
... Show MoreBackground: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreInterval lies at rest in the speech; so as to improve to speak out, which is how Evaln Koran by other speech, called separators; for the secession of Alkalaman then, as the last verse separation between it and its aftermath in the Al-Jinn had a comma significant impact on the statement of the case of gin, as portrayed interval Gin and like the distraught after hearing of the Koran
This Sura carried various types of repetition represent wordy repeat itself and repeat some of the votes as well as the repeated sound of a thousand who remained in Sura breaks Bhaa also repeat the voice of the shredder breaks
Linguistic sounds of Koranic breaks played a significant role in a statement carried by the linguistic meaning of these interludes