Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Towards a secured design methodology for cloud based bioinformatics applications.
Author(s):
1. A. Nasir: Department of Computer Science and Engineering, Bio-informatics Lab, Al-Khwarizmi Institute of computer Sciences University of Engineering and Technology, Lahore, Pakistan
2. M. U. G. Khan: Department of Computer Science and Engineering, Bio-informatics Lab, Al-Khwarizmi Institute of computer Sciences University of Engineering and Technology, Lahore, Pakistan
Abstract:
The amount of molecular biology data currently being generated from the lab based testing and conventional computing techniques was not thought before. But at the same time the existing techniques remains incapable to cater this massive amount data sets to retrieve meaningful results in an efficient manner. With the exponential growth of computing applications and their corresponding users, many evolutionary systems have appeared in the current markets, such as cloud computing, grid computing, bioinformatics, and video surveillance systems. Though the discovery of such systems has brought fruitful changes in daily lives of their users, there are several severe problems associated with such computing environments and security is one of the most critical issues faced by the users and service providers of these applications. These security issues and problems may arise during the life span of any evolutionary domain i.e. they are dynamic in nature as they arise and need to be handled during their life span. In this paper, we have introduced a secured methodology for designing evolutionary computing applications. We further present a working system from bioinformatics domain for testing and evaluation of the proposed design methodology.
Page(s): 1176-1182
DOI: DOI not available
Published: Journal: Journal of Animal and Plant sciences, Volume: 25, Issue: 4, Year: 2015
Keywords:
Keywords are not available for this article.
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

21

Views