Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.
The aim of this study is to investigate the behavior of composite castellated beam in which the concrete slab and steel beam connected together with headed studs shear connectors. Four simply supported composite beams with various degree of castellation were tested under two point static loads. One of these beams was built up using standard steel beam, i.e. without web openings, to be a reference beam. The other three beams were fabricated from the same steel I-section with various three castellation ratios, (25, 35, and 45) %. In all beams the concrete slab has the same section and properties. Deflection at mid span of all beams was measured at each 10 kN load increment. The test results show that the castellation process leads to
... Show MoreBackground: fixed orthodontic appliances deleterious influence on gingival health is well documented. Association between weight status and gingival health is presented in many studies. This study aimed to evaluate how early the impact of fixed orthodontic therapy on patients` gingival health, and if there are differences of that impact among different weight status groups. Materials and Methods: Sample consisted of 54 patients (25 males, 29 females; age limits are 16 -18 years) going under the course of treatment with fixed orthodontic appliance. Patients were categorized according to their Body Mass Index (BMI) into 3 weight status groups considering WHO charts in 2007 (underweight, normal weight, overweight and obese), then determinat
... Show MoreThe current research aims to analyze the chemistry books for the preparatory stage according to life skills for the academic year (2019-2020) and to know the life skills contained in the chemistry books for the preparatory stage through the following two questions:1-What life skills should be available in the content of chemistry books prescribed for middle school students approved by the Ministry of Education, General Directorate of Curricula in the academic year(2019-2020). 2-What is the percentage of life skills included in the content of chemistry textbooks prescribed for middle school students approved by the Ministry of Education, General Directorate of Curricula in the academic year (2019-2020). To achieve the objectives of the resea
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
Ubikh is one of the most important tribes of the Northwest Caucasus and has a long history. Naturally, rebukes are an integral part of the Caucasus region. Their people were able to confront the Russian invasion of their lands like the rest of the Caucasus tribes to defend their existence, freedom and the right to build their independent state, but they were not able to resist the great Russian military progress they achieved on all sides. For the territory that belonged to Persia and the Ottoman Empire and ended the resistance of the Meridian movement in the Northeast Caucasus, the Russians left only the weak resistance of the tribes of the Northwest Caucasus led by the rebuke after Russia managed to eliminate all resistance movements i
... Show MoreBackground: The combination of thermoplastic nylon resin materials and auto polymerizing resin is necessary in some situation for repair and adjustment. This study evaluated shear bond strength between thermoplastic nylon material (flexible) and auto polymerizing acrylic resin subjected to holes and silica coated layer. Materials and Method: Forty five (45) specimens were prepared from flexible acrylic bonded to auto-polymerizing acrylic resin and divided into three groups according to the surface treatments as follows: Group A: 15 specimens of flexible acrylic bonded with cold-cure acrylic by holes. Group B: 15 specimens of flexible acrylic bonded with cold-cure acrylic by silica coated layer. Group C: 15 specimens of flexible acrylic bon
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreAim of the study: Using surface roughness and tensile bond strength tests, the objective of this investigation was to ascertain the impact of laser surface modification on the binding strength of injectable thermoplastic acrylic denture base material to acrylic-based soft-liner material. Materials and methods: Acrylic base soft liner material was bonded to injectable thermoplastic acrylic resin (Deflex). Forty specimens were created (20 disc, 20 dumbbells) 10 of each specimen type as control specimens, and 10 were treated with nano pulse Nd: YAG laser. The data were analyzed using the Kruskal-Wallis test and unpaired t-test (a=.05) and the roughness test was performed utilizing a double column universal test machine. Results: Compar
... Show More