35 research outputs found

    МОДЕЛИ И РЕАЛИЗАЦИЯ ОБНАРУЖЕНИЯ ВТОРЖЕНИЙ В КОРПОРАТИВНОЙ ИНФОРМАЦИОННОЙ СИСТЕМЕ ПРЕДПРИЯТИЯ С ИСПОЛЬЗОВАНИЕМ ИНТЕЛЛЕКТУАЛЬНОГО ПОДХОДА

    Get PDF
    The methodic of intrusion detection in corporate information systems (CIS) on three levels are done. Models of autonomic and net intrusion detection systems (IDS) including some components are presented. IDS on the base of Snort is worked out and used. During its investigation some tasks were executed: creating the virtual computer net for CIS, analyzing its possible vulnerability; attuning and preparing IDS for CIS with intellectual approach (knowledge in rules view); checking of IDS activity during simulation various attacks and their detection.Приведена методика обнаружения вторжений в корпоративной информационной системе (КИС) по трем уровням. Представлены модели автономной и сетевой систем обнаружения вторжений (СОВ), включающие ряд компонент. Разработана и внедрена СОВ на базе инструментария Snort. В ходе исследований были выполнены задачи: построена виртуальная компьютерная сеть КИС; проанализированы возможные ее уязвимости; настроена и подготовлена к работе СОВ для КИС с использованием интеллектуального подхода (знания в виде правил); произведена проверка работоспособности СОВ путем моделирования различных атак и их обнаружения

    Mitochondria Targeting Non-isocyanate-based Polyurethane Nanocapsules for Enzyme-Triggered Drug Release

    Get PDF
    Surface engineering of nanocarriers allows fine tuning of their interactions with biological organisms, potentially forming the basis of devices for the monitoring of intracellular events or for intracellular drug delivery. In this context, biodegradable nanocarriers or nanocapsules capable of carrying bioactive molecules or drugs into the mitochondrial matrix could offer new capabilities in treating mitochondrial diseases. Nanocapsules with a polymeric backbone that undergoes programmed rupture in response to a specific chemical or enzymatic stimulus with subsequent release of the bioactive molecule or drug at mitochondria would be particularly attractive for this function. With this goal in mind, we have developed biologically benign nanocapsules using polyurethane-based, polymeric backbone that incorporate repetitive ester functionalities. The resulting nanocapsules are found to be highly stable and monodispersed in size. Importantly, a new non-isocyanate route is adapted for the synthesis of these non-isocyanate polyurethane nanocapsules (NIPU). The embedded ester linkages of these capsules' shells have facilitated complete degradation of the polymeric backbone in response to a stimulus provided by an esterase enzyme. Hydrophilic payloads like rhodamine or doxorubicin can be loaded inside these nanocarriers during their synthesis by an interfacial polymerization reaction. The post-grafting of the nanocapsules with phosphonium ion, a mitochondria-targeting receptor functionality, has helped us achieve the site-specific release of the drug. Co-localization experiments with commercial mitotracker green as well as mitotracker deep red confirmed localization of the cargo in mitochondria. Our in-vitro studies confirm that specific release of doxorubicin within mitochondria causes higher cytotoxicity and cell death compared to free doxorubicin. Endogenous enzyme triggered nanocapsule rupture and release of the encapsulated dye is also demonstrated in a zebrafish model. The results of this proof-of-concept study illustrate that NIPU nanocarriers can provide a site-specific delivery vehicle and improve the therapeutic efficacy of a drug or be used to produce organelle-specific imaging studies

    АНАЛИЗ И КОНЦЕПЦИЯ РАЗВИТИЯ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ КИС И ОБЛАЧНОЙ ПЛАТФОРМЫ НА БАЗЕ ИНТЕЛЛЕКТУАЛЬНЫХ ТЕХНОЛОГИЙ

    Get PDF
    Two problems the use of intelligence technologies in information defense (ITID) – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.Представлены две проблемы использования интеллектуальных технологий в защите информации (ИТ в ЗИ) – создание специализированных БЗ с моделированием угроз и повышение уровня безопасности в корпоративных сетях и облачных вычислениях.  Дан анализ направлений из второй проблемы ИТ в ЗИ: интеллектуальные поддержки принятия решений, использование многоагентных систем, элементы защиты в облачных вычислениях. В качестве тенденций развития рассмотрены совершенствования методов, моделей, архитектур, аппаратно-программных решений ИТ в ЗИ в КИС. В качестве концепции предложено развития ИТ в ЗИ для облачной инструментальной платформы проектирования интеллектуальных систем на основе семантических  технологи

    Tumorigenic Potential of Olfactory Bulb-Derived Human Adult Neural Stem Cells Associates with Activation of TERT and NOTCH1

    Get PDF
    BACKGROUND: Multipotent neural stem cells (NSCs) have been isolated from neurogenic regions of the adult brain. Reportedly, these cells can be expanded in vitro under prolonged mitogen stimulation without propensity to transform. However, the constitutive activation of the cellular machinery required to bypass apoptosis and senescence places these cells at risk for malignant transformation. METHODOLOGY/PRINCIPAL FINDINGS: Using serum-free medium supplemented with epidermal growth factor (EGF) and basic fibroblast growth factor (bFGF), we established clonally derived NS/progenitor cell (NS/PC) cultures from the olfactory bulb (OB) of five adult patients. The NS/PC cultures obtained from one OB specimen lost growth factor dependence and neuronal differentiation at early passage. These cells developed glioblastoma tumors upon xenografting in immunosuppressed mice. The remaining NS/PC cultures were propagated either as floating neurospheres or as adherent monolayers with maintenance of growth factor dependence and multipotentiality at late passage. These cells were engrafted onto the CNS of immunosuppressed rodents. Overall, the grafted NS/PCs homed in the host parenchyma showing ramified morphology and neuronal marker expression. However, a group of animals transplanted with NS/PCs obtained from an adherent culture developed fast growing tumors histologically resembling neuroesthesioblastoma. Cytogenetic and molecular analyses showed that the NS/PC undergo chromosomal changes with repeated in vitro passages under mitogen stimulation, and that up-regulation of hTERT and NOTCH1 associates with in vivo tumorigenicity. CONCLUSIONS/SIGNIFICANCE: Using culturing techniques described in current literature, NS/PCs arise from the OB of adult patients which in vivo either integrate in the CNS parenchyma showing neuron-like features or initiate tumor formation. Extensive xenografting studies on each human derived NS cell line appear mandatory before any use of these cells in the clinical setting

    Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch

    Get PDF
    The methodic of intrusion detection in corporate information systems (CIS) on three levels are done. Models of autonomic and net intrusion detection systems (IDS) including some components are presented. IDS on the base of Snort is worked out and used. During its investigation some tasks were executed: creating the virtual computer net for CIS, analyzing its possible vulnerability; attuning and preparing IDS for CIS with intellectual approach (knowledge in rules view); checking of IDS activity during simulation various attacks and their detection

    ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    No full text
    Two problems the use of intelligence technologies in information defense (ITID) – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing

    Gellan gum capped silver nanoparticle dispersions and hydrogels: cytotoxicity and in vitro diffusion studies

    No full text
    The preparation of highly stable water dispersions of silver nanoparticles using the naturally available gellan gum as a reducing and capping agent is reported. Further, exploiting the gel formation characteristic of gellan gum silver nanoparticle incorporated gels have also been prepared. The optical properties, morphology, zeta potential and long-term stability of the synthesized silver nanoparticles were investigated. The superior stability of the gellan gum–silver nanoparticle dispersions against pH variation and electrolyte addition is revealed. Finally, we studied the cytotoxicity of AgNP dispersions in mouse embryonic fibroblast cells (NIH3T3) and also evaluated the in vitro diffusion of AgNP dispersions/gels across rat skin

    Revesz syndrome

    No full text
    corecore