Search results for "protocols"

showing 10 items of 782 documents

Adaptogens in chemobrain (Part II): Effect of plant extracts on chemotherapy-induced cytotoxicity in neuroglia cells

2019

Abstract Background Cancer chemotherapy-induced cognitive impairments are apparently associated with harmful effects on physiological functions of brain cells. Adaptogens, are known to exhibit neuroprotective effects and to increase cognitive functions in clinical studies. In our previous study (Seo et al., 2018), we demonstrated that selected adaptogenic extracts significantly attenuate cytostatic-induced regulation of more than 100 genes involved in the activation of neuronal death and inhibiting neurogenesis. Neuroprotective and cytoprotective activities of adaptogens rise the question about their possible impact on cytostatic effects of a chemotherapeutic combination of 5-fluorouracil, …

AndrographolidePharmaceutical ScienceEleutherococcusPharmacologyNeuroprotectionCell Linelaw.invention03 medical and health scienceschemistry.chemical_compound0302 clinical medicinelawAntineoplastic Combined Chemotherapy ProtocolsDrug DiscoveryRhodiolamedicineHumansCytotoxic T cellCytotoxicityCyclophosphamideEpirubicin030304 developmental biologyPharmacology0303 health sciencesDose-Response Relationship DrugbiologyPlant ExtractsNeurotoxicitybiology.organism_classificationmedicine.diseaseNeuroprotective AgentsComplementary and alternative medicinechemistry030220 oncology & carcinogenesisMolecular MedicineAndrographisRhodiolaFluorouracilPhytotherapyNeurogliaEpirubicinmedicine.drugPhytomedicine
researchProduct

Chemotherapy and immunomodulation: from immunogenic chemotherapies to novel therapeutic strategies.

2013

Anticancer immunityCancer ResearchOrganoplatinum Compoundsmedicine.medical_treatmentBreast NeoplasmsT-Lymphocytes RegulatoryImmunomodulationChemoimmunotherapyNeoplasmsAntineoplastic Combined Chemotherapy ProtocolsmedicineHumansAnthracyclinesCyclophosphamideChemotherapyCell Deathbusiness.industryImmunosuppressionInflammasomeGeneral MedicineOxaliplatinOncologyImmunologyMyeloid-derived Suppressor CellFemaleFluorouracilbusinessImmunosuppressive Agentsmedicine.drugFuture oncology (London, England)
researchProduct

The DNA methylation inhibitor 5-azacytidine modulates 6-thioguanine toxicity in mammalian cells

2003

In order to assess the effects of combining two antimetabolites used separately to treat human leukemias, we carried out an experimental study by exposing V79 Chinese hamster cells, a 6-thioguanine (6-tG)-sensitive cell line, to sequential and concurrent treatments with 5-azacytidine (5-azaC) and 6-tG. In this paper, we demonstrate that there is a clear dependency for the way in which this combination was tested. Pre-treatment with 5-azaC made V79 cells more resistant to 6-tG by a substantial reduction in 6-tG incorporation into DNA; this effect could still be detected for several cell divisions after the removal of 5-azaC, and was achieved neither by reduced cell growth nor by the inductio…

Antimetabolites AntineoplasticHypoxanthine Phosphoribosyltransferasemedicine.drug_classCell SurvivalCellHamsterToxicologyAntimetaboliteChinese hamster6-thioguanineCricetulus5-azacytidineCricetinaeAntineoplastic Combined Chemotherapy ProtocolsmedicineAnimalsThioguanineCells CulturedbiologyCell growthtoxicityDrug SynergismGeneral MedicineDNAProdrugDNA Methylationbiology.organism_classificationMolecular biologySettore BIO/18 - Geneticamedicine.anatomical_structureBiochemistryCell cultureToxicityAzacitidineSister Chromatid ExchangeCell Division
researchProduct

Artificial intelligence techniques for cancer treatment planning

1988

An artificial intelligence system, NEWCHEM, for the development of new oncology therapies is described. This system takes into account the most recent advances in molecular and cellular biology and in cell-drug interaction, and aims to guide experimentation in the design of new optimal protocols. Further work is being carried out, aimed to embody in the system all the basic knowledge of biology, physiopathology and pharmacology, to reason qualitatively from first principles so as to be able to suggest cancer therapies.

Artificial Intelligence SystemKnowledge representation and reasoningbusiness.industryAnimals Antineoplastic Combined Chemotherapy Protocols; administration /&/ dosage/pharmacology Clinical Protocols Computer Simulation Drug Therapy; Computer-Assisted Expert Systems Humans Medical Oncology; methods Programming Languages Software Design Therapy; Computer-AssistedExpert SystemsMedical OncologyDrug Therapy Computer-AssistedmethodsCancer treatmentComputer-AssistedBasic knowledgeadministration /&/ dosage/pharmacologyClinical ProtocolsDrug TherapySoftware DesignTherapy Computer-AssistedAntineoplastic Combined Chemotherapy ProtocolsAnimalsHumansComputer SimulationProgramming LanguagesTherapyArtificial intelligenceAutomated reasoningbusinessMedical Informatics
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

Distributed Consensus in Networks of Dynamic Agents

2006

Stationary and distributed consensus protocols for a network of n dynamic agents under local information is considered. Consensus must be reached on a group decision value returned by a function of the agents' initial state values. As a main contribution we show that the agents can reach consensus if the value of such a function computed over the agents' state trajectories is time invariant. We use this basic result to introduce a protocol design rule allowing consensus on a quite general set of values. Such a set includes, e.g., any generalized mean of order p of the agents' initial states. We demonstrate that the asymptotical consensus is reached via a Lyapunov approach. Finally we perfor…

Asymptotic stability; Distributed consensus protocolsEngineeringMathematical optimizationAsymptotic stabilitybusiness.industryFunction (mathematics)Network topologyUniform consensusComputer Science::Multiagent SystemsLTI system theorySet (abstract data type)Distributed consensus protocolsConsensusExponential stabilityComputer Science::Systems and ControlControl theoryexperimental mechanics Fourier transform load stepping photoelasticityGeneralized meanbusinessProceedings of the 44th IEEE Conference on Decision and Control
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct

Decoding Children's Social Behavior

2013

We introduce a new problem domain for activity recognition: the analysis of children's social and communicative behaviors based on video and audio data. We specifically target interactions between children aged 1-2 years and an adult. Such interactions arise naturally in the diagnosis and treatment of developmental disorders such as autism. We introduce a new publicly-available dataset containing over 160 sessions of a 3-5 minute child-adult interaction. In each session, the adult examiner followed a semi-structured play interaction protocol which was designed to elicit a broad range of social behaviors. We identify the key technical challenges in analyzing these behaviors, and describe met…

Behavior Psychology Dataset Video analysis Speech Analysis AutismInter-action protocolsSocial and communicative behaviorInteraction protocol02 engineering and technologycomputer.software_genreAnnan data- och informationsvetenskapSession (web analytics)Activity recognitionTechnical challenges0202 electrical engineering electronic engineering information engineeringmedicineSocial behaviorAudio signal processingMultimediabusiness.industryDevelopmental disorders020207 software engineeringmedicine.diseaseSemi-structuredResearch questionsActivity recognitionProblem domainKey (cryptography)Autism020201 artificial intelligence & image processingArtificial intelligencePsychologybusinessOther Computer and Information SciencecomputerCognitive psychologySocial behavior2013 IEEE Conference on Computer Vision and Pattern Recognition
researchProduct

Efficacy of bendamustine and rituximab in splenic marginal zone lymphoma: results from the phase II BRISMA/IELSG36 study.

2018

Splenectomy in addition to immunotherapy with rituximab can provide quick and sometimes durable disease control in patients with splenic marginal zone lymphoma (SMZL). However, systemic chemotherapy is ultimately required in many cases. The BRISMA (Bendamustine-rituximab as first-line treatment of splenic marginal zone lymphoma)/IELSG (International Extranodal Lymphoma Study Group)36 trial is an open-label, single arm phase II study designed by the IELSG in cooperation with the Fondazione Italiana Linfomi and the lymphoma Study Association according to Simon's two-stage method. The primary endpoint was complete response rate. Fifty-six patients with SMZL diagnosis confirmed on central revis…

BendamustineAdultMalemedicine.medical_specialtyPhases of clinical researchNeutropeniaGastroenterologyDisease-Free SurvivalDrug Administration ScheduleSettore MED/15 - Malattie Del Sangue03 medical and health sciences0302 clinical medicineInternal medicinefirst-line therapyAntineoplastic Combined Chemotherapy ProtocolsMedicineBendamustine HydrochlorideHumansSplenic marginal zone lymphomabendamustineAgedbusiness.industrySplenic NeoplasmsHematologyLymphoma B-Cell Marginal ZoneMiddle Agedmedicine.diseaseLymphomaimmunochemotherapyRegimenTreatment Outcome030220 oncology & carcinogenesisbendamustine; first-line therapy; immunochemotherapy; rituximab; Splenic Marginal Zone Lymphoma; HematologySplenectomyRituximabFemaleSplenic Marginal Zone LymphomaNeoplasm Recurrence LocalbusinessRituximabFebrile neutropenia030215 immunologymedicine.drugBritish journal of haematology
researchProduct

Polatuzumab vedotin as a salvage and bridging treatment in relapsed or refractory large B-cell lymphomas

2021

The antibody-drug conjugate polatuzumab vedotin (pola) has recently been approved in combination with bendamustine and rituximab (pola-BR) for patients with refractory or relapsed (r/r) large B-cell lymphoma (LBCL). To investigate the efficacy of pola-BR in a real-world setting, we retrospectively analyzed 105 patients with LBCL who were treated in 26 German centers under the national compassionate use program. Fifty-four patients received pola as a salvage treatment and 51 patients were treated with pola with the intention to bridge to chimeric antigen receptor (CAR) T-cell therapy (n = 41) or allogeneic hematopoietic cell transplantation (n = 10). Notably, patients in the salvage and brid…

BendamustineOncologymedicine.medical_specialtyCancer ResearchImmunoconjugatesMedizinSalvage therapyInternal medicineAntineoplastic Combined Chemotherapy ProtocolsMedicineHumansProgression-free survivalRetrospective StudiesSalvage TherapyLymphoid Neoplasiabusiness.industryAntibodies MonoclonalHematologyChemotherapy regimenPolatuzumab vedotinTransplantationRegimenbacteriaRituximabbusinessmedicine.drug
researchProduct