Novel intelligent architecture and approximate solution for future networks

A Sarhan, M Jemmali - Plos one, 2023 - journals.plos.org
Private networks have become popular for secure data sharing and anonymous
communication in many domains: enterprise environments, military, journalism …

A novel two-routers model based on category constraints secure data-dissemination-aware scheduling in next-generation communication networks

M Jemmali, A Ben Hmida, AY Sarhan - Journal of Network and Systems …, 2023 - Springer
Data breaches are a critical issue and have become one of the top widespread risks in
today's data-driven digital environment. Hence, Secure data outsourcing is essential in …

Optimizing forest fire prevention: intelligent scheduling algorithms for drone-based surveillance system

M Jemmali, BML Kayed, W Boulila, H Amdouni… - Procedia Computer …, 2023 - Elsevier
Given the importance of forests and their role in maintaining the ecological balance, which
directly affects the planet, the climate, and the life on this planet, this research presents the …

A secure solution based on load-balancing algorithms between regions in the cloud environment

S Eljack, M Jemmali, M Denden, S Turki… - PeerJ Computer …, 2023 - peerj.com
The problem treated in this article is the storage of sensitive data in the cloud environment
and how to choose regions and zones to minimize the number of transfer file events …

An enhanced multilevel secure data dissemination approximate solution for future networks

MM Otoom, M Jemmali, AY Sarhan, I Achour… - Plos one, 2024 - journals.plos.org
Sensitive data, such as financial, personal, or classified governmental information, must be
protected throughout its cycle. This paper studies the problem of safeguarding transmitted …

[PDF][PDF] Intelligent Solution System for Cloud Security Based on Equity Distribution: Model and Algorithms.

SM Eljack, M Jemmali, M Denden… - … , Materials & Continua, 2024 - researchgate.net
In the cloud environment, ensuring a high level of data security is in high demand. Data
planning storage optimization is part of the whole security process in the cloud environment …

Scheduling algorithms for data-protection based on security-classification constraints to data-dissemination

MM Otoom, M Jemmali, WM Khedr, AY Sarhan… - PeerJ Computer …, 2023 - peerj.com
Communication networks have played a vital role in changing people's life. However, the
rapid advancement in digital technologies has presented many drawbacks of the current …

Architecture and enhanced-algorithms to manage servers-processes into network: a management system

F AlFayez - PeerJ Computer Science, 2023 - peerj.com
This work investigates minimizing the makespan of multiple servers in the case of identical
parallel processors. In the case of executing multiple tasks through several servers and each …

Novel randomization and iterative based algorithms for the transactions assignment in blockchain problem

A Bajahzar - Plos one, 2023 - journals.plos.org
This study focuses on the load balancing of the transactions in the blockchain. The problem
is how to assign these transactions to the blocks. The objective is to guarantee a load …