Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreResearch summary
This research discloses the study of the methodology of one of the notables of the followers, which is: (Abi Mijlis Al-Basri), who had a clear impact on many commentators after him, especially in the field of interpretation by impact. This study included two topics:
The first: his biography and scientific
The second: his methodology in the traditional interpretation.
This paper argues that eco-awareness is presented in Margaret Atwood’s The Year of the Flood as a remedy for apocalyptic eco-phobia. The study focuses on apocalypse and eco-phobia as a motivation of the characters’ eco-awareness. Accordingly, the novel depicts several scenes of natural apocalyptic regarding the decline of the environment. There is an obvious relationship between apocalyptic eco-phobia and eco-awareness because they are environmental elements. Therefore, the study examines Atwood’s perception of apocalypse that threatens the ideal nature; she offers alternatives to avoid it via elevating the characters’ eco-awareness. Consequently, eco-awareness exemplifies the ideal natural state needed by the characters bec
... Show MoreThe current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThis paper focus on study the variations of monthly tropospheric NO2 concentrations over three Iraqi cities Baghdad (33.3° N, 44.4° E), Basrah (30.56° N, 47.8° E) and Erbil (36.3° N, 44.06° E). Monthly NO2 retrievals from the Ozone Monitoring Instrument (OMI) onboard Aura satellite during the period from October 2004 to March 2013 have been used. The results show a high monthly and annual NO2 concentrations at Baghdad than Basra and Erbil may be attribute to high densely populations and a high economic activity. During the whole period, Baghdad, Basrah and Erbil were exhibited an average of NO2 (8.1±2.5), (3.7±1.3) and (3.3±1.7) in unit 1015 molecules
... Show MoreBackground: despite the rise in the incidence of renal cell carcinoma attributed to availability of medical imaging, a considerable decline in mortality is an association. Morbidity-wise, the shift from radical nephrectomy to partial nephrectomy is the trend for now. Multiple scoring systems have been introduced over the past decades to help surgeons choose between radical and partial nephrectomy. One commonly used system is the RENAL nephrometry score that was first introduced by Kutikov and Uzzo in 2009.
Objective: to evaluate the role of RENAL nephrometry scoring system in predicting the surgical technique to use to resect renal masses and associated perioperative outcomes.
... Show MoreIn this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.