Pub Date : 2018-12-01DOI: 10.1109/JEC-ECC.2018.8679568
Sahar I. Ghanem, Nagia M. Ghanem, M. Ismail
Nowadays, the analysis of the complex diseases through the epistatic interactions between single nucleotide polymorphisms (SNPs), for the detection of their statistical association with the disease is challenging due to curse of dimensionality, time complexity, absence of marginal effect and effect of the environmental factors. Studies of deep Learning (DL) techniques are shown to have more accurate results compared to other techniques such as Logistic Regression (LR), Multifactor dimensionality reduction (MDR) and associative classification-based multifactor dimensionality reduction (MDRAC). However, DL is not tested against different sources of noise. In this paper, we are concerned about studying the effect of different types of noise on a DL technique. Experiments are designed to compare the performance of the technique for different data models. The empirical results show that the DL approach gives robust and accurate results when compared to LR, MDR and MDRAC approaches.
{"title":"Noisy Epistasis Using Deep Learning","authors":"Sahar I. Ghanem, Nagia M. Ghanem, M. Ismail","doi":"10.1109/JEC-ECC.2018.8679568","DOIUrl":"https://doi.org/10.1109/JEC-ECC.2018.8679568","url":null,"abstract":"Nowadays, the analysis of the complex diseases through the epistatic interactions between single nucleotide polymorphisms (SNPs), for the detection of their statistical association with the disease is challenging due to curse of dimensionality, time complexity, absence of marginal effect and effect of the environmental factors. Studies of deep Learning (DL) techniques are shown to have more accurate results compared to other techniques such as Logistic Regression (LR), Multifactor dimensionality reduction (MDR) and associative classification-based multifactor dimensionality reduction (MDRAC). However, DL is not tested against different sources of noise. In this paper, we are concerned about studying the effect of different types of noise on a DL technique. Experiments are designed to compare the performance of the technique for different data models. The empirical results show that the DL approach gives robust and accurate results when compared to LR, MDR and MDRAC approaches.","PeriodicalId":197824,"journal":{"name":"2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/JEC-ECC.2018.8679551
H. Eldeeb, H. Dahshan, A. Shehata
Cloud storage service is one of the services provided by cloud computing where data is stored on a remote group of public storage severs. Despite the various benefits of cloud storage service, the service suffers from various security problems. This paper introduces a new cryptographic and pairing-based security solution to overcome the security issues/concerns found in cloud storage security. In addition to confidentiality and privacy, the proposed solution provides a mechanism that eliminates the need for a trusted third-party entity for the purpose of cipher key management, private key distribution and user revocation. Besides, the solution is concerned with providing protection for the cipher key and its derived sub-keys against different security threats.
{"title":"A new Cryptographic Pairing-Based Security Solution for Cloud Storage","authors":"H. Eldeeb, H. Dahshan, A. Shehata","doi":"10.1109/JEC-ECC.2018.8679551","DOIUrl":"https://doi.org/10.1109/JEC-ECC.2018.8679551","url":null,"abstract":"Cloud storage service is one of the services provided by cloud computing where data is stored on a remote group of public storage severs. Despite the various benefits of cloud storage service, the service suffers from various security problems. This paper introduces a new cryptographic and pairing-based security solution to overcome the security issues/concerns found in cloud storage security. In addition to confidentiality and privacy, the proposed solution provides a mechanism that eliminates the need for a trusted third-party entity for the purpose of cipher key management, private key distribution and user revocation. Besides, the solution is concerned with providing protection for the cipher key and its derived sub-keys against different security threats.","PeriodicalId":197824,"journal":{"name":"2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126355875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}