1. Cloud Encryption
The complexity of cloud computing creates many issues related to security. The main focus of this research is the data storage security in a cloud environment. Generally, data security is an important factor for both cloud computing and traditional desktop applications. This is to obtain the highest possible level of privacy. We present an evaluation for selected eight modern encryption techniques namely: RC4, RC6, MARS, AES, DES, 3DES, Two-Fish, and Blow-Fish at two independent platforms namely; desktop computer and Amazon EC2 Micro Instance cloud computing environment. The evaluation has been performed for those encryption algorithms according to randomness testing by using NIST statistical testing in cloud computing environment. This evaluation uses Pseudo Random Number Generator (PRNG) to determine the most suitable technique and analyses the performance for selected modern encryption techniques. Cryptography algorithms are implemented using Java Cryptography Extensions (JCE). Simulation results are shown to demonstrate the effectiveness of each algorithm.
2. DRT Systems
ITS (Intelligent Transportation System) is a system provides users safety, increased throughput, and cost saving and quality of service. ITS reduce the travel time, travel cost and reduce the risk of accidents. ITS covers all form of transport. ITS compromises on vehicle, drivers and the other entire component about infrastructure of roads. For ITS information is very important which is about real time, static traffic and a digital map. Different tools are used to collect process and transfer this information. ITS supplied information about current road conditions on networks this information is very useful for the individuals and commercial transport authority to make better informed and saver journey using the network. ITS provides the saver and secure traffic network by attentive the passengers about dangerous conditions and situation. ITS has different application. One of the applications is DRT. DRT is defined as under DRT is referred as Demand Responsive Transit or Demand Responsive Transport. DRT service operates on the user demand which provide the facility to pick up and drop off the user on their specific locations. This service operates mostly in the low population areas where regular transport is not common. This type of service may be used for disabled persons, so their expenses are afforded by the transport authority. Some private companies manage DRT service for commercial purpose. Companies charge the cost from passengers according to the time to reach at the destination and how long the path be travelled. DRT service operated in specific zone. In this zone passengers request for the service and mentioned their starting and ending point of the journey, and vehicle approximately travel door to door according to the passenger’s desired destination. In the congested area where lot of stops it is difficult for a vehicles to find the position of the person.GPS enabled mobiles are common now a days and capable to obtain the position of the employees. Most algorithms are developed in the different cities for calculating the location, their location are chosen by vehicles derivers or company engineer. In real time employee do not know about the vehicle and vehicle do not know about the employee’s location. And both employ and vehicle are not coordinated to their head office. In the context of DRT system we want to develop a scenario that employee stay on their suitable location from their homes where vehicle pickup the employees from their suitable location.
3.Flow Shop Scheduling
Flow Shop Scheduling Problems (FSSP) is a classic problem of the tasks scheduling. This problem is a typical example of combinatorial optimization and it is faced in factories where conventional machine-tools exist and different types of pieces are manufactured having a common route. The solution of this problem consists on finding a sequence of tasks that uses a minimum processing time (makespan). This research uses a simple genetic algorithm and the technique of particle swarm optimization to provide a solution to this problem and the quality of both solutions are compared using their simulation results. To validate the results, instances of planning problems of different sizes and complexity from specialized literature are used as test cases.
4. Google Go
Different programming languages use automatic memory management and in some programming languages it is the responsibility of programmer to allocate memory. A good language makes the programmer unaware of memory management and uses memory efficiently. There are different programming languages which do memory management and claim to be the most efficient. This research aims to put two object oriented languages, Google Go and Java head to head to test object creation and memory reclamation in case of de-allocation. The results would provide an insight into how the new programming languages that claim to be much more efficient are performing as compared to established industry standards.
A network has been designed for short range communications between the on road vehicles for the prevention of collisions, ensuring safety of the vehicles and assisting drivers. This network between the vehicles is called Vehicular Ad-Hoc Network and is abbreviated as VANET. It is a part of unified technology ITS (Intelligent Transportation System). ITSis designed to enhance safety and efficiency of transportation systems and applying advance technologies like communications, controls and electronics in vehicles. Minimizing air pollution, reducing energy loss, relieving congestions, enhancing safety and promotion of related industry are the main objectives of ITS. Actually VANETs are a subclass of Mobile Ad-Hoc Networks MANETs however VANETs are different from VANETs in many ways. VANETs are specially designed to ensure the safety of the vehicles. In VANETs vehicles broadcast warning messages, alert messages and safety messages several times within one second. For ensuring safety this broadcasting of safety alert messages should be most reliable and should have no delays in transmission or should have very low Moreover MANETs and VANETs are also similar in many ways. Both networks have dynamic topologies and are multi-hop networks. Both MANETs and VANETs can be deployed without the need of infrastructure. Both Mobile and Vehicular Ad-Hoc Networks are mobile networks but their pattern of being mobile is different from each other. Vehicles in VANETs do not move in random directions but move on specified paths i.e. roads. Therefore nodes in VANETs are easily predictable than the nodes in MANETs. MANETs have low storage capacity, low battery and low processing power than VANETs. With the help of powerful battery, communication between the vehicles at large distances can be done. In VANETs nodes move at very high speed therefore the life time of communication between the vehicles is very short. The vehicles have to share safety warning messages with each other in this short interval. Other than safety there are also other applications of VANETs like traffic control, rail road crossings, pre trip information, travel service information, electronic payments and automatic highway systems. It can help in selecting the best route for travelling to a driver with updated conditions of the road. This is done by using some road side equipment e.g., electronic sign boards and intelligent traffic signals.Besides road safety applications and drivers assistance, information and entertainment is also a part of VANETs. Drivers can use the internet in the vehicles by road side units in the areas where no other wireless technology for internet is available but in this proposal we shall only focus broadcasting of safety messages between the on road vehicles efficiently without delays and will try to minimize the wastage of resources and loss of data due to packet collisions and redundancy. VANETs require very reliable and scalable broadcasting for the transmission of safety alert messages to ensure the safety. There are number of techniques used for broadcasting secure information between the vehicles. These techniques include Simple Flooding, Area based Flooding,Probabilistic based Flooding, Neighbor knowledge based Flooding, Distance based Flooding, counter based Flooding, Cluster based Flooding, Location based Flooding and traffic based Flooding. When the network becomes dense there arise some problems due to Flooding like redundant rebroadcasts, medium contention, packet collisions and data loss. When the number of rebroadcasts increases there arise a broadcast storm. There are also some techniques to overcome the broadcast storm problem likeslotted 1-persistence technique, weighted p-persistence technique and slotted p-persistence technique. Some popular and efficient algorithms like The Last One, Distributed Optimized Time algorithm, Adaptive Probability Alert Protocol, and Adaptive Broadcast Protocol are being used for the suppression of broadcast storm in Vehicular Ad-Hoc Networks. We will try to eliminate the broad cast storm problem by developing a new broadcast suppression technique which will be based on distance based flooding. Zigbee devices will be ourcommunication devices for communication between the vehicles because Zigbee technology is very low cost and consumes very low power. In case of vehicular ad hoc networks topologies of network are always changing due to different positions of vehicles on road and Zigbee can well operate in star, mesh and peer to peer topologies. Zigbee devices are low cost devices and can easily be deployed for ad hoc communication between the vehicles. It can provide high scalability and have larger range as compared to blue tooth and Wi-Fi devices and best suitable for dedicated short range communication between the vehicles on road for sharing safety messages without arising a broadcast storm of messages. This technology can help in eliminating redundancy of safety messages being broadcasted.
6. ZigBee Streaming
AVideo streaming is a process when the video is over and over again receiving while supplier providing the user. The end user always watches the video consistently without any difficulty. When we did video chat with any one without any failure on internet that is also video streaming. There are many types of video streaming like point to point and multi cast and broad cast video streaming. The main type of the video streaming is point to point or one to one communication. Videophone or online video chat is the example of point to point video streaming. The important property of this communication is back channel between sender and receiver. The main use of this back channel is that the receiver provides feedback to sender. If this back channel does not exist then sender have very low knowledge about channel. These all types of video streaming are done with the help of many types of technology. It can be internet, Wi-Fi or may be any short range wireless technology. Two modules also directly transmit video single with each other in short range. There are many short range technologies are available now a days. The most suitable technology for PAN is Zigbee. Zigbee fit in to IEEE 802.15.4.It is just like a sister technology of Bluetooth and it is also very famous in PAN. In this technology signals travel in zig zag style that is why it is called Zigbee. It works on 868 MHs/ 915 MHs/ 2.4 GHz frequency. It have very low data rate 250Kbps but have very low complexity. It is very low cost and also very low energy consumption. We can attach 65536 devices. It has range from 30 to 100 meters with high security. Zigbee mostly use for home automation, health, telecom, input, retail and within the buildings. In a Zigbee network there are three devices used Zigbee coordinator ,Zigbee Router and Zigbee end devices. In Pakistan where energy is main problem now e day’s .Here we need technologies that save our energy .We know that Zigbee is low cost, slow power for wireless technology. Image transfer and video streaming also done by many other wireless technologies. But the main issue in these technologies is the power consumption. If we use Zigbee for video streaming and image transfer in Pakistan, it is very good for energy save. In Pakistan Zigbee mostly not use for image transfer and video streaming but if we Use Zigbee then we can save energy .Video streaming also done by Zigbee. Many algorithms were used for this purpose. But these algorithms are slow. So this study is based on a new and efficient algorithm for video streaming over short range wireless technology Zigbee.