INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY https://cirworld.com/index.php/ijct Interested in submitting to this journal? We recommend that you review the About the Journal page for the journal's section policies, as well as the Author Guidelines. Authors need to register with the journal prior to submitting or, if already registered, can simply log in and begin the five-step process. en-US <p>Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the&nbsp;<a href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License</a>, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.</p> <p>&nbsp;</p> ijct@cirworld.com (Dr Gurdev Singh) editor@cirworld.com (Gurdev Singh) Fri, 06 Jul 2018 08:36:05 +0000 OJS 3.1.1.2 http://blogs.law.harvard.edu/tech/rss 60 In-Silico Methodologies for Cancer Multidrug Optimization https://cirworld.com/index.php/ijct/article/view/7168 <p>Drug combinations is considered as an effective strategy designed to control complex diseases like cancer. Combinations of drugs can effectively decrease side effects and enhance adaptive resistance. Therefore, increasing the likelihood of defeating complex diseases in a synergistic way. This is due to overcoming factors such as off-target activities, network robustness, bypass mechanisms, cross-talk across compensatory escape pathways and the mutational heterogeneity which results in alterations within multiple molecular pathways. The plurality of effective drug combinations used in clinic were found out through experience. The molecular mechanisms underlying these drug combinations are often not clear, which makes it not easy to suggest new drug combinations. Computational approaches are proposed to reduce the search space for defining the most promising combinations and prioritizing their experimental evaluation. In this paper, we review methods, techniques and hypotheses developed for in silico methodologies for drug combination discovery in cancer, and discuss the limitations and challenges of these methods.</p> Doaa Mohamed Hasan, Ahmed Sharaf Eldin, Ayman Elsayed Khedr, Hanan Fahmy ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://cirworld.com/index.php/ijct/article/view/7168 Fri, 22 Jun 2018 00:00:00 +0000 Data Security In Cloud Computing: A Review https://cirworld.com/index.php/ijct/article/view/7551 <p>Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority’s request. Cloud computing provides the act of uniting. Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of CloudComputing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include securityaspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified. This non-existence of global standards and guidelines could be help academics to know the state of practice and formulatebetter methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.</p> Gurjeet Singh, Dr. Mohita Garg ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://cirworld.com/index.php/ijct/article/view/7551 Fri, 06 Jul 2018 00:00:00 +0000