期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
1
作者 Sarah Mustafa Eljack mahdi jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
Hybrid Flow Shop with Setup Times Scheduling Problem
2
作者 mahdi jemmali Lotfi Hidri 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期563-577,共15页
The two-stage hybridflow shop problem under setup times is addressed in this paper.This problem is NP-Hard.on the other hand,the studied problem is modeling different real-life applications especially in manufacturing... The two-stage hybridflow shop problem under setup times is addressed in this paper.This problem is NP-Hard.on the other hand,the studied problem is modeling different real-life applications especially in manufacturing and high performance-computing.Tackling this kind of problem requires the development of adapted algorithms.In this context,a metaheuristic using the genetic algorithm and three heuristics are proposed in this paper.These approximate solutions are using the optimal solution of the parallel machines under release and delivery times.Indeed,these solutions are iterative procedures focusing each time on a particular stage where a parallel machines problem is called to be solved.The general solution is then a concatenation of all the solutions in each stage.In addition,three lower bounds based on the relaxation method are provided.These lower bounds present a means to evaluate the efficiency of the developed algorithms throughout the measurement of the relative gap.An experimental result is discussed to evaluate the performance of the developed algorithms.In total,8960 instances are implemented and tested to show the results given by the proposed lower bounds and heuristics.Several indicators are given to compare between algorithms.The results illustrated in this paper show the performance of the developed algorithms in terms of gap and running time. 展开更多
关键词 Hybridflow shop genetic algorithm setup times HEURISTICS lower bound
下载PDF
Corporate governance impact on banking risk
3
作者 mahdi jemmali Bassem SALHI 《Frontiers of Engineering Management》 2020年第2期182-195,共14页
This study aims to determine the relationship between several factors of governance and the level of risk in 10 Tunisian banks during an analysis period of eight years.We propose an important empirical question and ex... This study aims to determine the relationship between several factors of governance and the level of risk in 10 Tunisian banks during an analysis period of eight years.We propose an important empirical question and examine the internal mechanisms of governance aimed at reducing financial risks.This estimation is based on a model with a single equation that examines variables relative to governance and credit risk to determine their impact on banking financials.Results demonstrate that the internal mechanisms of governance present diverging effects on the financial risk of the Tunisian banks in our case study(i.e.,credit risk).Moreover,making applications work by putting together a process and model for banking risk is important.This model can be applied in any bank,and the results can be used to make decisions in real time. 展开更多
关键词 bank governance banking risk process decision modeling ARCHITECTURE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部