Abstract: Container handling problems at container terminals
are NP-hard problems. This paper presents an approach using
discrete-event simulation modeling to optimize solution for storage
space allocation problem, taking into account all various interrelated
container terminal handling activities. The proposed approach is
applied on a real case study data of container terminal at Alexandria
port. The computational results show the effectiveness of the
proposed model for optimization of storage space allocation in
container terminal where 54% reduction in containers handling time
in port is achieved.
Abstract: Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the “keys generation and management” mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.