• Title/Summary/Keyword: multi-agents

Search Result 546, Processing Time 0.03 seconds

Fusion anti-cancer drugs of cisplatin analogue and fatty acids for multi-targeted cancer treatment (시스플라틴과 지방산을 결합한 퓨전 항암제)

  • Byeon, Hong-Ju;Lee, Hyang-Yeol
    • Journal of the Korean Applied Science and Technology
    • /
    • v.35 no.4
    • /
    • pp.1386-1392
    • /
    • 2018
  • Cispatin has become one of the most widely used anticancer drugs for decades. One of the drawback of cisplatin (II) complex is that it not only targets cancerous cells but also normal cells causing several serious side effects in patients. We have synthesized Pt(IV) complex that are needed to have the ability to kill target cells selectively in a short time before drug resistance develops. By introducing PDK inhibitor, butyric acid and valproic acid, on Pt complex, two fusion anti-cancer agents 3 and 4 have been synthesized and characterized their structures by nmr and mass spectrometer. MTT assay was performed with $Pt(IV)-Bu_2$ 3 and $Pt(IV)-Val_2$ 4 against MCF-7 cell line. As a result, cisplatin, Pt(IV) complexes 3 and 4 were treated, cell viabilities at $50{\mu}M$ cencentration were decreased to 39%, 54% and 84% respectively.

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

Treatment results of the second-line chemotherapy regimen for patients with low-risk gestational trophoblastic neoplasia treated with 5-day methotrexate and 5-day etoposide

  • Kanno, Toshiyuki;Matsui, Hideo;Akizawa, Yoshika;Usui, Hirokazu;Shozu, Makio
    • Journal of Gynecologic Oncology
    • /
    • v.29 no.6
    • /
    • pp.89.1-89.8
    • /
    • 2018
  • Objective: Highly effective chemotherapy for patients with low-risk gestational trophoblastic neoplasia (GTN) is associated with almost a 100% cure rate. However, 20%-30% of patients treated with chemotherapy need to change their regimens due to severe adverse events (SAEs) or drug resistance. We examined the treatment outcomes of second-line chemotherapy for patients with low-risk GTN. Methods: Between 1980 and 2015, 281 patients with low-risk GTN were treated. Of these 281 patients, 178 patients were primarily treated with 5-day intramuscular methotrexate (MTX; n=114) or 5-day drip infusion etoposide (ETP; n=64). We examined the remission rates, the drug change rates, and the outcomes of second-line chemotherapy. Results: The primary remission rates and drug resistant rates of 5-day ETP were significantly higher (p<0.001) and significantly lower (p=0.002) than those of 5-day MTX, respectively. Forty-seven patients (26.4%) required a change in their chemotherapy regimen due to the SAEs (n=16) and drug resistance (n=31), respectively. Of these 47 patients failed the first-line regimen, 39 patients (39/47, 82.9%) were re-treated with single-agent chemotherapy, and 35 patients (35/39, 89.7%) achieved remission. Four patients failed second-line, single-agent chemotherapy and eight patients (17.0%) who failed first-line regimens were treated with combined or multi-agent chemotherapy and achieved remission. Conclusions: Patients with low-risk GTN were usually treated with single-agent chemotherapy, while 20%-30% patients had to change their chemotherapy regimen due to SAEs or drug resistance. The second-line regimens of single-agent chemotherapy were effective; however, there were several patients who needed multiple agents and combined chemotherapy to achieve remission.

Investigation of Effective Korean Herbal Medicine for Psoriasis - Focusing on Lipid Metabolism - (건선에 효과적인 한약 처방 탐색 - 지질 대사를 중심으로)

  • Han, Chang-Yi;Kim, Jundong;Seo, Gwang-Yeel;Kim, Kyu-Seok;Kim, Yoon-Bum
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.34 no.3
    • /
    • pp.70-79
    • /
    • 2021
  • Objectives : The purpose of this study is to investigate the possibility of using herbal medicine for the management of psoriasis focusing on lipid metabolism. Methods : We reviewed studies about pathophysiology, and medical treatment of psoriasis, the relationship between psoriasis and metabolic syndrome and lipid metabolism, and herbal medicine on Pubmed and Google scholar. Results : Psoriasis is a chronic multi-organ inflammatory disease not limited to skin, and steroids, immuno-suppressants, and biological agents are used. It is known that psoriasis and metabolic syndrome act as mutual risk factors, and lipid metabolism are involved in psoriasis. The effects of various single herbal preparations and complex herbal extract, decoction on improving lipid metabolism have been consistently reported, and there was an improvement of psoriatic skin lesions and improvement of blood lipid levels through herbal medicine. Conclusions : Herbal medicine research in psoriasis has focused on the anti-inflammatory effect and the suppression effect of certain immune mediators. However, considering that psoriasis is affected by lipid metabolism and side effects of Western medicines, the use of herbal medicines for the purpose of controlling lipid metabolism in psoriasis is useful in aspects of reducing side effects of concurrent Western medicine, improving the severity of psoriasis, and managing metabolic risk factors.

Image-based CAPTCHA Using Multi-Image Composition and Its Secure Operation (복수의 이미지를 합성하여 사용하는 이미지 기반의 캡차와 이를 위한 안전한 운용 방법)

  • Kang, Jeon-Il;Maeng, Young-Je;Kim, Koon-Soon;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.153-166
    • /
    • 2008
  • According to the growth of the internet and the usage of software agents, the CAPTCHA that is a method for taking apart humans and computers has been widely deployed and used. As the results of many research activities, the CAPTCHA, which is spoken for a distorted image material including random text, has known to be easily breakable via artificial intelligence techniques. As one of alternatives for those text-based CAPTCHAs, methods using photos are concerned and various image-based CAPTCHAs are suggested. However, image-based CAPTCHAs still have some problems. In this paper, we discuss what are the problems in each image-based CAPTCHA and propose a new image-based CAPTCHA using image composition as the solution of those problems. Furthermore, for the secure operation of the CAPTCHA, we suggest a communication protocol that works without the virtual session and consider possible security and usability problems in the protocol.

Prevalence of Multi-Antibiotic Resistant Bacteria Isolated from Children with Urinary Tract Infection from Baghdad, Iraq

  • Salman, Hamzah Abdulrahman;Alhameedawi, Alaa kamil;Alsallameh, Sarah Mohammed Saeed;Muhamad, Ghofran;Taha, Zahraa
    • Microbiology and Biotechnology Letters
    • /
    • v.50 no.1
    • /
    • pp.147-156
    • /
    • 2022
  • Urinary tract infections (UTIs) are one of the most common infections in different age groups, including children. Bacteria are the main etiological agents of UTIs. The aim of the present study was to isolate, identify, and determine the antibiotic susceptibility of bacteria isolated from children with UTIs from Baghdad, Iraq. Three hundred and two urine samples were collected from children aged 6 months to 12 years. The samples were cultured on blood agar and MacConkey agar. The selected colonies were subjected to biochemical tests and antibiotic susceptibility analysis using the Vitek® 2 Compact automated microbial identification system. In this sample, 299 bacteria were identified, of which, 267 were gram-negative bacteria, and 32 were gram-positive bacteria. Escherichia coli (56%) was the most commonly isolated gram-negative bacteria, followed by Pseudomonas aeruginosa (14%), Enterobacter spp. (10.48%), Klebsiella pneumoniae (9.36%), Proteus spp. (7.8%), Acinetobacter baumannii (1.5%), and Morganella morganii (0.37%). Enterococcus faecalis (62.5%) was the most commonly detected gram-positive bacteria, followed by Staphylococcus aureus (37.5%). E. coli and P. aeruginosa were the most antibiotic-resistant bacteria. Among the tested antibiotics, meropenem showed 100% sensitivity, followed by imipenem (97.4%), amikacin (91.8%), and tobramycin (83.5%). In contrast, the high frequencies of resistance were observed with cefixime (93.2%), cefotaxime (78.7%), and ceftriaxone/cefotaxime (71.2%). In conclusion, carbapenems and aminoglycosides are highly recommended for the empirical treatment of UTIs, while, Quinolones, penicillins, and cephalosporins are not suggested. Frequent antibiotics susceptibility testing are warranted to determine the resistance pattern of UTI bacteria.

A study on narrative text analysis from the perspective of information processing - focusing on four computational methodologies (정보처리 관점에서의 서사 텍스트 분석에 관한 연구 - 네 가지 전산적 방법론을 중심으로)

  • Kwon, Hochang
    • Trans-
    • /
    • v.13
    • /
    • pp.141-169
    • /
    • 2022
  • Analysis of narrative texts has been regarded as academically and practically important, and has been made from various perspectives and methods. In this paper, the computational narrative analysis methodology from the perspective of information processing was examined. From the point of view of information processing, the creation and acceptance of narrative is a bidirectional coding process mediated by narrative text, and narrative text can be said to be a multi-layered structured code. In this paper, four methodologies that share this point of view - character network analysis, text mining and sentiment analysis, continuity analysis of event composition, and knowledge analysis of narrative agents - were examined together with cases. Through this, the mechanism and possibility of computational methodology in narrative analysis were confirmed. In conclusion, the significance and side effects of computational narrative analysis were examined, and the necessity of designing a human-computer collaboration model based on the consilience of the humanities and science/technology was discussed. Based on this model, it was argued that aesthetically creative, ethically good, politically progressive, and cognitively sophisticated narratives could be made more effectively.

Consensus-based Cooperative Control for multiple leaders and single follower with interaction nonlinearities (상호작용 비선형성이 있는 다중 리더와 단일 추종자를 위한 일치 기반의 협력 제어)

  • Tack, Han-Ho;Lim, Young-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1663-1669
    • /
    • 2021
  • This paper considers the cooperative control problem for multiple leaders and a single follower with interactions. The leaders are controllable, and the follower has interactions with all leaders and is controlled by the interactions. Then, we study the cooperative control problem that achieves the consensus by controlling the leaders. The leaders and the follower are modeled by the single-integrator and the double-integrator, respectively, and it is assumed that the interactions have the nonlinearities. The leaders can estimate the interaction between the follower and exchange the estimated information with neighbors. Then, this paper proposes the consensus-based cooperative control algorithm using the information exchange of the estimated interactions and the virtual velocity variables to achieve the velocity consensus. We analyze the convergence of the agents to the common state based on the Lasalle's Invaraince Principle. Finally, we provide the numerical example to validate the theoretical results.

Design of the Agent-based Network-Centric Warfare Modeling System (에이전트 기반의 NCW 전투모델링 시스템 설계)

  • Park, Se-Youn;Shin, Ha-Yong;Lee, Tae-Sik;Choi, Bong-Wan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.271-280
    • /
    • 2010
  • While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.