Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.
The purpose of this research is to improve the organizational performance of the Oil Projects Company by adopting an approach to strategic change، and finding appropriate solutions to the problems facing the company. The researcher adopted in designing his research by conducting a survey of previous literature that dealt with approaches to strategic change، as the results of the survey showed that most researchers agree on the approach of renewal and modernization، Which formed a starting point for the researcher to identify the extent of the company's management interest in renewal and modernization to improve its level of performance، and the quality of the procedures followed on the ground that is related to
... Show MoreThe current study aims to apply the methods of evaluating investment decisions to extract the highest value and reduce the economic and environmental costs of the health sector according to the strategy.In order to achieve the objectives of the study, the researcher relied on the deductive approach in the theoretical aspect by collecting sources and previous studies. He also used the applied practical approach, relying on the data and reports of Amir almuminin Hospital for the period (2017-2031) for the purpose of evaluating investment decisions in the hospital. A set of conclusions, the most important of which is: The failure to apply
... Show MoreAbstract
A surface fitting model is developed based on calorimeter data for two famous brands of household compressors. Correlation equations of ten coefficient polynomials were found as a function of refrigerant saturating and evaporating temperatures in range of (-35℃ to -10℃) using Matlab software for cooling capacity, power consumption, and refrigerant mass flow rate.
Additional correlations equations for these variables as a quick choice selection for a proper compressor use at ASHRAE standard that cover a range of swept volume range (2.24-11.15) cm3.
The result indicated that these surface fitting models are accurate with in ± 15% for 72 compressors model of cooling cap
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreBackground: Patient satisfaction is of increasing importance and widely recognized as an important indicator of quality of the medical care. There was no homogeneous definition of patient satisfaction, since satisfaction concerns different aspects of care or settings, as well as care given by various professions.
Objective: The objective of this study is to assess the patients’ level of satisfaction with diabetes care and to identify the underlying factors influencing it.
Methods: This cross-sectional study had been conducted in the Specialized Center for Diabetes and Endocrinology in Baghdad Al- Rusafa 2018. Where150 type two diabetic patients attending their follow-up
... Show MoreBACKGROUND: Febrile neutropenia occurs in more than 80% of patients with hematological malignances specially after chemotherapy cycles and an infectious source is identified in approximately 20–30%. Various bacterial, viral, and fungal pathogen contribute to the development of neutropenic fever and without prompt antibiotic therapy mortality rate can be as high as 70%. AIM: The objective of the study was to document the current sites of infection in patients with febrile neutropenia in hematological ward in Baghdad Teaching Hospital, the microorganisms and antibiotic susceptibly in culture positive cases and mortality rate in 1 week and 4 weeks after episode of fever. PATIENTS AND METHODS: One hundred cases of febrile neutrop
... Show MoreBACKGROUND: Enteric fever caused by Salmonella Typhi is an endemic disease in Iraq. Variations in presentations make it a diagnostic challenge. If untreated or treated inappropriately then it is a serious disease with potentially life-threatening complications. The recent emergence of drug resistant strains of S. Typhi is a rising public health problem and a clinical concern to the physician. AIM: The objectives of the study were to assess and describe the patterns of antimicrobial resistance, clinical characteristics, epidemiological distribution, and complications of typhoid fever. PATIENTS AND METHODS: Fifty cases of typhoid fever (culture proven) were collected during the period from February 2019 to November 2019 in the me
... Show More