Preferred Language
Articles
/
xBd18ZIBVTCNdQwCV8PK
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.

Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Comparison between Rush Model Parameters to Completed and Lost Data by Different Methods of Processing Missing Data
...Show More Authors

The current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 21 2025
Journal Name
Applied System Innovation
Utilizing Soft Computing Techniques to Estimate the Axial Permanent Deformation of Asphalt Concrete
...Show More Authors

Rutting is a crucial concern impacting asphalt concrete pavements’ stability and long-term performance, negatively affecting vehicle drivers’ comfort and safety. This research aims to evaluate the permanent deformation of pavement under different traffic and environmental conditions using an Artificial Neural Network (ANN) prediction model. The model was built based on the outcomes of an experimental uniaxial repeated loading test of 306 cylindrical specimens. Twelve independent variables representing the materials’ properties, mix design parameters, loading settings, and environmental conditions were implemented in the model, resulting in a total of 3214 data points. The network accomplished high prediction accuracy with an R

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 14 2019
Journal Name
International Journal On Emerging Technologies
Utilizing an Artificial Neural Network Model to Predict Bearing Capacity of Stone Columns
...Show More Authors

ABSTRACT: Ultimate bearing capacity of soft ground reinforced with stone column was recently predicted using various artificial intelligence technologies such as artificial neural network because of all the advantages that they can offer in minimizing time, effort and cost. As well as, most of applied theories or predicted formulas deduced analytically from previous studies were feasible only for a particular testing environment and do not match other field or laboratory datasets. However, the performance of such techniques depends largely on input parameters that really affect the target output and missing of any parameter can lead to inaccurate results and give a false indicator. In the current study, data were collected from previous rel

... Show More
View Publication
Scopus (3)
Scopus
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research
Comparison of Bacterial Contamination between I Phone and Galaxy Devices
...Show More Authors

Ninety eight mobile samples, (54) galaxy phone and (44) I phone, were swabbed for bacterial culture determination by culturing on MacConky agar , Blood agar , Mannitol salt agar , Muller Hinton agar .Staphylococcuswas the highest frequent isolated bacteria from Galaxy phone (33%) and I phone (37%). This study revealed that galaxy phone appears less contaminated with bacteria, the ratio of non-contaminated devices is (44%) when compared with I phone (9%). Sensitivity test showed that Ogmintin have the lowest effect on Staphylococcusisolated from both type of devices while cefitriaxone have the highest effect. DNA of isolate from galaxy 31 that exhibit highest resistance against antibiotics was extracted and 16S rRNA gene was polymerized by P

... Show More
Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Fri Jun 23 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
The dynamic of an eco-epidemiological model involving fear and hunting cooperation
...Show More Authors

In the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Utilizing the R.E.N.A.L Nephrometry Score to predict the Surgical Technique and Peri-operative Outcomes of Renal Masses
...Show More Authors

Background: despite the rise in the incidence of renal cell carcinoma attributed to availability of medical imaging, a considerable decline in mortality is an association. Morbidity-wise, the shift from radical nephrectomy to partial nephrectomy is the trend for now. Multiple scoring systems have been introduced over the past decades to help surgeons choose between radical and partial nephrectomy. One commonly used system is the RENAL nephrometry score that was first introduced by Kutikov and Uzzo in 2009.

Objective: to evaluate the role of RENAL nephrometry scoring system in predicting the surgical technique to use to resect renal masses and associated perioperative outcomes.

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref