Preferred Language
Articles
/
xBd18ZIBVTCNdQwCV8PK
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the applying sigmoid fish swarm optimization (SiFSO) for early compromised device detection and subsequently alerting other network nodes. Additionally, our data center implements an innovative ant skyscape architecture (ASA) cooling mechanism, departing from traditional, unsustainable cooling strategies that harm the environment. To validate the effectiveness of these approaches, extensive simulations were conducted. The evaluations primarily revolved around the fish colony’s ability to detect compromised devices, focusing on source tracing, realistic modelling, and an impressive 98% detection accuracy rate under ASA cooling solution with 0.16 ºC within 1,300 second. Compromised devices pose a substantial risk to green data centers, as attackers could manipulate and disrupt network equipment. Therefore, incorporating cyber enhancements into the green data center concept is imperative to foster more adaptable and efficient smart networks.

Scopus Crossref
View Publication
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Physics: Conference Series
Data Processing, Storage, and Analysis: Applying Computational Procedures to the Case of a Falling Weight Deflectomer (FWD)
...Show More Authors

In the field of civil engineering, the adoption and use of Falling Weight Deflectometers (FWDs) is seen as a response to the ever changing and technology-driven world. Specifically, FWDs refer to devices that aid in evaluating the physical properties of a pavement. This paper has assessed the concepts of data processing, storage, and analysis via FWDs. The device has been found to play an important role in enabling the operators and field practitioners to understand vertical deflection responses upon subjecting pavements to impulse loads. In turn, the resultant data and its analysis outcomes lead to the backcalculation of the state of stiffness, with initial analyses of the deflection bowl occurring in conjunction with the measured or assum

... Show More
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Journal Of The American Geriatrics Society
A Systems Approach to Identify Factors Influencing Adverse Drug Events in Nursing Homes
...Show More Authors

The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association

... Show More
View Publication
Scopus (29)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (138)
Crossref (114)
Scopus Clarivate Crossref
Publication Date
Wed May 04 2022
Journal Name
Theory And Practice In Language Studies
Investigating EFL Learners’ Ability to Analyse Poetic Language: A Pedagogical Corpus Stylistic Approach
...Show More Authors

Pedagogical stylistics refers to the application of the tools of stylistics in the teaching of the English language as a foreign or a second language.  Teaching and learning poetry is challenging. Thus, pedagogical corpus stylistics (Henceforth, PCS) approach has been introduced to Iraqi undergraduate foreign language learners (EFL) to guide them to analyze poetic language.  The study aims to make students interact with authentic examples of poetic language and answer questions about it. The main objective of the study is to examine whether PCS tools enable the learners to provide linguistic evidence from the poetic texts they are exposed to. This in turn ensures objective poetic analyses. Moreover, it aims to enable EFL Iraqi stu

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Agronomy Journal
Use of Rainfall Data to Improve Ground-Based Active Optical Sensors Yield Estimates
...Show More Authors

Ground-based active optical sensors (GBAOS) have been successfully used in agriculture to predict crop yield potential (YP) early in the season and to improvise N rates for optimal crop yield. However, the models were found weak or inconsistent due to environmental variation especially rainfall. The objectives of the study were to evaluate if GBAOS could predict YP across multiple locations, soil types, cultivation systems, and rainfall differences. This study was carried from 2011 to 2013 on corn (Zea mays L.) in North Dakota, and in 2017 in potatoes in Maine. Six N rates were used on 50 sites in North Dakota and 12 N rates on two sites, one dryland and one irrigated, in Maine. Two active GBAOS used for this study were GreenSeeker and Holl

... Show More
View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The Compact city and urban image of the traditional city center
...Show More Authors
Abstract<p>The traditional city suffers from the decline of the urban image due to urban development and homogeneity with the urban context of the city, and because of the lack of determinants governing the urban image, it is that the center of the city of traditional Kadhimiya suffers from a break in the urban image, Therefore, the research included how to build a distinctive urban image of the center of the traditional city of Kadhimiya and achieve the visual pleasure and comfort of the recipient and the urban image here means is an image not picture which are related to several aspects, including physical, social and psychological as well as the collective memory of individuals and their rela</p> ... Show More
View Publication
Scopus (11)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 05 2015
Journal Name
PrzeglĄd Elektrotechniczny
Power Amplifier Frequency Controller Using feedback control techniques for Bio-implanted Devices
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu May 01 2025
Journal Name
European Journal Of Medical And Health Research
Neonatal Seizure in a Tertiary Center Work
...Show More Authors

Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perin

... Show More
View Publication Preview PDF
Crossref