Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreObjective: preparing exercises for the third intensity zone for strength and speed for the legs, and identifying their effect on some physiological and biochemical indicators for (the level of lactic acid concentration, the concentration of sodium bicarbonate, the concentration level of (potassium K+) and (sodium Na+) in the blood, and the number of breathing times (RF) Research methodology: the experimental research method was adopted by designing the experimental and control groups on a sample of Army Sports Club players amounting to (16) players, deliberately selected (100%) from their community using a comprehensive enumeration method, and then divided into two groups of equal number, After determining the tests for physiologica
... Show MoreThe optical detectors which had been used in medical applications, and especially in radioactive treatments, need to be modified studied for the effects of radiations on them. This study included preparation of the MnS thin films in a way that vacuum thermal evaporation process at room temperature 27°C with thickness (400+-10nm) nm and a sedimentation rate of 0.39nm/sec on glass floors. The thin films prepared as a detector and had to be treated with neutron irradiation to examine the results gained from this process. The results decay X-ray (XRD) showed that all the prepared thin films have a multi-crystalline structure with the dominance of the direction (111), the two samples were irradiated with a neutron irradiation source (241Am-9Be)
... Show MoreAbstract The purpose of this study, teach the art of performing Olympic lifts (snatch and, clean and jerk) using the two methods are instructional (self-learning associated with the model) and (reverse style of partial way). Identify the effectiveness of these methods in learning the art of performance and style of the best Olympic lifting in the learning and retention of novice for Olympic lifts. The research sample consisted of 16 lifters were selected purposively representing specialist center for the care of athletic talent to weightlifting for ages 14 years. The sample was divided into two experimental, Each group (8) eight weightlifters. The experimental group used the style of the first self-learning associated with the m
... Show MoreThe effectiveness of upward training with weights to develop explosive power, characterized by speed and some functional variables for young volleyball players Many efforts of sports laboratories in various countries have been devoted to laying scientific foundations and rules in caring for the physical, skilled, planning, and psychological preparation of players and creating the conditions and requirements for reaching players to higher standards. The research aims to:1- Preparing an ascending training program with weights to develop explosive strength, which is characterized by speed and some functional variables for volleyball players.2- Identify the effect of the training program with upward training in weights to develop explosive stre
... Show More