首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到3条相似文献,搜索用时 0 毫秒
1.
Cancer is the second deadliest human disease worldwide with high mortality rate. Rehabilitation and treatment of this disease requires precise and automatic assessment of effective drug response and control system. Prediction of treated and untreated cancerous cell line is one of the most challenging problems for precise and targeted drug delivery and response. A novel approach is proposed for prediction of drug treated and untreated cancer cell line automatically by employing modified Deep neural networks. Human hepatocellular carcinoma (HepG2) cells are exposed to anticancer drug functionalized CFO@BTO nanoparticles developed by our lab. Prediction models are developed by modifying ResNet101 and exploiting the transfer learning concept. Last three layers of ResNet101 are re-trained for the identification of drug treated cancer cells. Transfer learning approach in an appropriate choice especially when there is limited amount of annotated data. The proposed technique is validated on acquired 203 fluorescent microscopy images of human HepG2 cells treated with drug functionalized cobalt ferrite@barium titanate (CFO@BTO) magnetoelectric nanoparticles in vitro. The developed approach achieved high prediction with accuracy of 97.5% and sensitivity of 100% and outperformed other approaches. The high performance reveals the effectiveness of the approach. It is scalable and fully automatic prediction approach which can be extended for other similar cell diseases such as lung, brain tumor and breast cancer.  相似文献   

2.
Resource allocation in auctions is a challenging problem for cloud computing. However, the resource allocation problem is NP-hard and cannot be solved in polynomial time. The existing studies mainly use approximate algorithms such as PTAS or heuristic algorithms to determine a feasible solution; however, these algorithms have the disadvantages of low computational efficiency or low allocate accuracy. In this paper, we use the classification of machine learning to model and analyze the multi-dimensional cloud resource allocation problem and propose two resource allocation prediction algorithms based on linear and logistic regressions. By learning a small-scale training set, the prediction model can guarantee that the social welfare, allocation accuracy, and resource utilization in the feasible solution are very close to those of the optimal allocation solution. The experimental results show that the proposed scheme has good effect on resource allocation in cloud computing.  相似文献   

3.
With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the operational state proactively. The fundamental concept behind SDN-NFV is the encroachment from specific resource execution to the programming-based structure. This research is around the combination of SDN and NFV for rational decision making to control and monitor traffic in the virtualized environment. The combination is often seen as an extra burden in terms of resources usage in a heterogeneous network environment, but as well as it provides the solution for critical problems specially regarding massive network traffic issues. The attacks have been expanding step by step; therefore, it is hard to recognize and protect by conventional methods. To overcome these issues, there must be an autonomous system to recognize and characterize the network traffic’s abnormal conduct if there is any. Only four types of assaults, including HTTP Flood, UDP Flood, Smurf Flood, and SiDDoS Flood, are considered in the identified dataset, to optimize the stability of the SDN-NFV environment and security management, through several machine learning based characterization techniques like Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Logistic Regression (LR) and Isolation Forest (IF). Python is used for simulation purposes, including several valuable utilities like the mine package, the open-source Python ML libraries Scikit-learn, NumPy, SciPy, Matplotlib. Few Flood assaults and Structured Query Language (SQL) injections anomalies are validated and effectively-identified through the anticipated procedure. The classification results are promising and show that overall accuracy lies between 87% to 95% for SVM, LR, KNN, and IF classifiers in the scrutiny of traffic, whether the network traffic is normal or anomalous in the SDN-NFV environment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号