https://cirworld.com/index.php/ijct/issue/feed INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2018-08-15T11:13:02+00:00 Dr Gurdev Singh ijct@cirworld.com Open Journal Systems Interested in submitting to this journal? We recommend that you review the About the Journal page for the journal's section policies, as well as the Author Guidelines. Authors need to register with the journal prior to submitting or, if already registered, can simply log in and begin the five-step process. https://cirworld.com/index.php/ijct/article/view/7168 In-Silico Methodologies for Cancer Multidrug Optimization 2018-08-15T11:13:02+00:00 Doaa Mohamed Hasan doaakhalilphd@gmail.com Ahmed Sharaf Eldin Profase2000@yahoo.com Ayman Elsayed Khedr Ayman.khedr@fue.edu.eg Hanan Fahmy Hanan.fahmy@gmail.com <p>Drug combinations is considered as an effective strategy designed to control complex diseases like cancer. Combinations of drugs can effectively decrease side effects and enhance adaptive resistance. Therefore, increasing the likelihood of defeating complex diseases in a synergistic way. This is due to overcoming factors such as off-target activities, network robustness, bypass mechanisms, cross-talk across compensatory escape pathways and the mutational heterogeneity which results in alterations within multiple molecular pathways. The plurality of effective drug combinations used in clinic were found out through experience. The molecular mechanisms underlying these drug combinations are often not clear, which makes it not easy to suggest new drug combinations. Computational approaches are proposed to reduce the search space for defining the most promising combinations and prioritizing their experimental evaluation. In this paper, we review methods, techniques and hypotheses developed for in silico methodologies for drug combination discovery in cancer, and discuss the limitations and challenges of these methods.</p> 2018-06-22T00:00:00+00:00 ##submission.copyrightStatement## https://cirworld.com/index.php/ijct/article/view/7551 Data Security In Cloud Computing: A Review 2018-08-15T11:12:19+00:00 Gurjeet Singh mrgurjeet93@gmail.com Dr. Mohita Garg mohita_cse@northwest.ac.in <p>Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority’s request. Cloud computing provides the act of uniting. Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of CloudComputing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include securityaspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified. This non-existence of global standards and guidelines could be help academics to know the state of practice and formulatebetter methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.</p> 2018-07-06T00:00:00+00:00 ##submission.copyrightStatement##