{"title":"Optimal Resource Selection by using Fuzzy Numbers","authors":"M. Aqeel, M. Ansari, M. Affaan","doi":"10.1109/ICEE.2007.4287316","DOIUrl":"https://doi.org/10.1109/ICEE.2007.4287316","url":null,"abstract":"Grid environment is constructed in order to achieve better utilization of available resources. Selection of appropriate resources for executing the user jobs is one of the most important features of any grid environment because non-optimal resource selection may spoil the ultimate objective of the grid environment. User describes its request for resources using some resource specification language. These specifications lead to a lot of ambiguities in resource description which may lead to selection of undesired resources. The resources with attribute values too higher than the required values can be selected with existing matchmaking mechanisms. This is not optimal and may leads to wastage of resources. In existing matchmaking mechanisms, all the resource attributes are treated equally whether they have great impact on better execution of user job or not. This paper suggests an intelligent matchmaking mechanism which uses fuzzy logic to select most appropriate resources for user jobs according to user specified criteria. It also helps to select most reliable resources as well.","PeriodicalId":291800,"journal":{"name":"2007 International Conference on Electrical Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132994663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images","authors":"O. Faragallah, HossamEl-din H. Ahmed, H. Kalash","doi":"10.5130/AJICT.V3I1.438","DOIUrl":"https://doi.org/10.5130/AJICT.V3I1.438","url":null,"abstract":"This paper investigates the encryption efficiency of RC6 block cipher application to digital images, introducing a mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection. The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.","PeriodicalId":291800,"journal":{"name":"2007 International Conference on Electrical Engineering","volume":"31 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120987125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}