Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. The transmission of big data between service providers, users and data centres emits carbon dioxide as a result of high power consumption. This chapter proposes a theoretical framework for big data analytics using computational intelligent algorithms that has the potential to reduce energy consumption and enhance performance. We suggest that researchers should focus more attention on the issue of energy within big data analytics in relation to computational intelligent algorithms, before this becomes a widespread and urgent problem.
An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i
... Show MoreHeat pipes and two‐phase thermosyphon systems are passive heat transfer systems that employ a two‐phase cycle of a working fluid within a completely sealed system. Consequently, heat exchangers based on heat pipes have low thermal resistance and high effective thermal conductivity, which can reach up to the order of (105 W/(m K)). In energy recovery systems where the two streams should be unmixed, such as airconditioning systems of biological laboratories and operating rooms in hospitals, heat pipe heat exchangers (HPHEs) are recommended. In this study, an experimental and theoretical study was carried out on the thermal performance of an air‐to‐air HPHE filled with two refrigerants as working fluids, R22 and R407c. The heat pipe he
... Show MoreCrime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreBy optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show MoreThe research is summarized in the construction of a mathematical model using the most common methods in the science of Operations Research, which are the models of transportation and linear programming to find the best solution to the problem of the high cost of hajj in Iraq, and this is done by reaching the optimum number of pilgrims traveling through both land ports and the number Ideal for passengers traveling through airports by Iraqi Airways, instead of relying on the personal experience of the decision-maker in Hajj and Umrah Authority by identifying the best port for pilgrim's travel, which can tolerate right or wrong, has been based on scientific methods of Operations Research, the researcher built two mathematical models
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreAbstract
People are supposed to use language harmoniously and compatibly. However, aggression may characterize much of human communication. Aggression has long been recognized as a negative anti-social issue that prevails in most personal interactions. If it abounds in familial communications, it is more dangerous due to its harmful effects on individuals, and consequently on societies. Aggression refers to all the instances in which we try to get our way without any consideration for others. Moriarty’s novel (2014), Big Little Lies, is argued to represent the patterns of aggressive communications. This study aims to find out the motivations behind aggressive language in familial communication in this
... Show More