期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Exploring Biocomplexity in Cancer: A Comprehensive Review
1
作者 Andras Szasz Gyula Peter Szigeti 《Open Journal of Biophysics》 2024年第2期154-238,共85页
Living objects have complex internal and external interactions. The complexity is regulated and controlled by homeostasis, which is the balance of multiple opposing influences. The environmental effects finally guide ... Living objects have complex internal and external interactions. The complexity is regulated and controlled by homeostasis, which is the balance of multiple opposing influences. The environmental effects finally guide the self-organized structure. The living systems are open, dynamic structures performing random, stationary, stochastic, self-organizing processes. The self-organizing procedure is defined by the spatial-temporal fractal structure, which is self-similar both in space and time. The system’s complexity appears in its energetics, which tries the most efficient use of the available energies;for that, it organizes various well-connected networks. The controller of environmental relations is the Darwinian selection on a long-time scale. The energetics optimize the healthy processes tuned to the highest efficacy and minimal loss (minimalization of the entropy production). The organism is built up by morphogenetic rules and develops various networks from the genetic level to the organism. The networks have intensive crosstalk and form a balance in the Nash equilibrium, which is the homeostatic state in healthy conditions. Homeostasis may be described as a Nash equilibrium, which ensures energy distribution in a “democratic” way regarding the functions of the parts in the complete system. Cancer radically changes the network system in the organism. Cancer is a network disease. Deviation from healthy networking appears at every level, from genetic (molecular) to cells, tissues, organs, and organisms. The strong proliferation of malignant tissue is the origin of most of the life-threatening processes. The weak side of cancer development is the change of complex information networking in the system, being vulnerable to immune attacks. Cancer cells are masters of adaptation and evade immune surveillance. This hiding process can be broken by electromagnetic nonionizing radiation, for which the malignant structure has no adaptation strategy. Our objective is to review the different sides of living complexity and use the knowledge to fight against cancer. 展开更多
关键词 Complexity Networks SMALL-WORLD Genetic Mutations SELF-ORGANIZING Self-Symmetry Energetic Balance Entropy Nash Equilibrium GAMES Evolution CANCER Therapy
下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
2
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
下载PDF
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
3
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2641-2659,共19页
Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one... Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one of the biggest issues that arise.Different types of malware are wreaking havoc on the clouds.Attacks on the cloud server are happening from both internal and external sides.This paper has developed a tool to prevent the cloud server from spamming attacks.When an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)classification.Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks.However,the KNN classifiers will determine which area the spammer belongs to.At the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results. 展开更多
关键词 Intrusion prevention system SPAMMING KNN classification SPAM cyber security BOTNET
下载PDF
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
4
作者 Sagheer Abbas Syed Ali Raza +4 位作者 MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期3263-3278,共16页
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ... File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems. 展开更多
关键词 Automated file labeling file organization machine learning topic modeling
下载PDF
A Fused Machine Learning Approach for Intrusion Detection System
5
作者 Muhammad Sajid Farooq Sagheer Abbas +3 位作者 Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2607-2623,共17页
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet.The interconnectivity of networks has brought various complexities in maintaining network... The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet.The interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and discretion.Machine learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit activities.An intrusion detection system controls the flow of network traffic with the help of computer systems.Various deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network traffic.For this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network intrusion.The Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious attacks.The proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection. 展开更多
关键词 Fused machine learning heterogeneous network intrusion detection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部