Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.
Background :Thalassemia is an autosomal
disease of the haemoglobin. Two types of
thalassemia are recognized: thalassemia major
and thalassemia intermedia.
The most serious cardiac complication in
thalassemia major is due to multiple blood
transfusions rather than the disease itself, which
is due to iron overload.
Cardiomyopathy is the most common cardiac
defect that occurs with iron overload. Pricarditis,
congestive heart failure and arrhythmias are due
to hemosidrosis and chronic aneamia.
Aim of the study: to demonstrate the prevalence
and types of electrocardiographic changes among
thalassemic patients with aged over ten years old.
The inelastic longitudinal electron scattering form factors are calculated for the low-lying excited states of 7Li {the first excited state 2121TJ (0.478 MeV) and the second excited state 2127TJ (4.63 MeV)}. The exact value of the center of mass correction in the translation invariant shell model (TISM) has been included and gives good results. A higher 2p-shell configuration enhances the form factors for high q-values and resolves many discrepancies with the experiments. The data are well described when the core polarization (CP) effects are included through effective nucleon charge. The results are compared with other theoretical models.
Keyword: 7Li inelastic electron scattering form factors calculated with exact
Background: It's believed that HBD-3 is involved in the tissue remodeling process of articular cartilage. Also, HBD-3 has anti-inflammatory properties. Objectives: The purpose of this study is to assay human beta-defensine-3 (HBD-3) in serum from rheumatoid arthritis (RA) patients and investigate its correlation with proinflammatory cytokines. Methods: In this case-control study, fifty-eight RA patients were aged 20–65 years, and 29 age-matched healthy subjects (HS) had no inflammatory rheumatic diseases. The disease activity score-28 joint erythrocyte sedimentation rate (DAS28-ESR) was used to measure RA activity. CRP, ACPA, HBD-3, TNF-α, and IL-1β were assessed using the enzyme-linked immunosorbent assay technique (ELISA). Res
... Show MoreAmong the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show More