Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.
The development of a new, cheap, efficient, and ecofriendly adsorbents has become an important demand for the treatment of waste water, so nano silica is considered a good choice. A sample of nanosilica (NS) was prepared from sodium silicate as precursor and the nonionic surfactant Tween 20 as a template. The prepared sample was characterized using various characterization techniques such as FT-IR, AFM, SEM and EDX analysis. The spectrum of FTIR confirms the presence of silica in the sample, while SEM analysis of sample shows nanostructures with pore ranging (2-100nm).The adsorptive properties of this sample were studied by removing Congo red dye (CR) from aqueous solution. Batch experimental methods were carried o
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreThis research is a continued efforts for a project on the fire tube boiler control for Al Rasheed edible oil factory. The aim is to enhance the control system with new integral control one. A functional blocks diagram (FBD) was built and simulated. With Schneider smart relays, FBD differs than ladder logic programming in which the PID option is active. An extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A control program was designed to control logical sequence of operation. Furthermore temperature is controlled via cascade control with fuel and air controllers. The temperature controller output is send as remote set point to the fuel controller in a serial cascade manner. The f
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreRecently, many materials have shown that they can be used as alternatives to chemicals materials in order to be used to improve the properties of drilling fluids. Some of these materials are banana peels and corn cobs which both are considered environmentally- friendly materials. The results of the X-ray diffraction examination have proved that the main components of these materials are cellulose and hemicellulose, which contribute greatly to the increasing of the effectiveness of these two materials. Due to their distinct composition, these two materials have improved the rheological properties (plastic viscosity and yield point) and reduced the filtration of the drilling fluids to a large extent. The addition rates used for each o
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreA method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav
... Show More