Search results for: simulated concrete pore solution (SPS)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9002

Search results for: simulated concrete pore solution (SPS)

2 “MaxSALIVA”: A Nano-Sized Dual-Drug Delivery System for Salivary Gland Radioprotection and Repair in Head and Neck Cancer

Authors: Ziyad S. Haidar

Abstract:

Background: Saliva plays a major role in maintaining oral and dental health (consequently, general health and well-being). Where it normally bathes the oral cavity and acts as a clearing agent. This becomes more apparent when the amount and quality of salivare significantly reduced due to medications, salivary gland neoplasms, disorders such as Sjögren’s syndrome, and especially ionizing radiation therapy for tumors of the head and neck, the fifth most common malignancy worldwide, during which the salivary glands are included within the radiation field or zone. Clinically, patients affected by salivary gland dysfunction often opt to terminate their radiotherapy course prematurely because they become malnourished and experience a significant decrease in their quality of life. Accordingly, the development of an alternative treatment to restore or regenerate damaged salivary gland tissue is eagerly awaited. Likewise, the formulation of a radioprotection modality and early damage prevention strategy is also highly desirable. Objectives: To assess the pre-clinical radio-protective effect as well as the reparative/regenerative potential of layer-by-layer self-assembled lipid-polymer-based core-shell nanocapsules designed and fine-tuned in this experimental work for the sequential (ordered) release of dual cytokines, following a single local administration (direct injection) into a murine sub-mandibular salivary gland model of irradiation. Methods: The formulated core-shell nanocapsules were characterized by physical-chemical-mechanically pre-/post-loading with the drugs (in solution and powder formats), followed by optimizing the pharmaco-kinetic profile. Then, nanosuspensions were administered directly into the salivary glands, 24hrs pre-irradiation (PBS, un-loaded nanocapsules, and individual and combined vehicle-free cytokines were injected into the control glands for an in-depth comparative analysis). External irradiation at an elevated dose of 18Gy (revised from our previous 15Gy model) was exposed to the head-and-neck region of C57BL/6 mice. Salivary flow rate (un-stimulated) and salivary protein content/excretion were regularly assessed using an enzyme-linked immunosorbent assay (3-month period). Histological and histomorphometric evaluation and apoptosis/proliferation analysis followed by local versus systemic bio-distribution and immuno-histochemical assays were then performed on all harvested major organs (at the distinct experimental end-points). Results: Monodisperse, stable, and cytocompatible nanocapsules capable of maintaining the bioactivity of the encapsulant within the different compartments with the core and shell and with controlled/customizable pharmaco-kinetics, resulted, as is illustrated in the graphical abstract (Figure) below. The experimental animals demonstrated a significant increase in salivary flow rates when compared to the controls. Herein, salivary protein content was comparable to the pre-irradiation (baseline) level. Histomorphometry further confirmed the biocompatibility and localization of the nanocapsules, in vivo, into the site of injection. Acinar cells showed fewer vacuoles and nuclear aberration in the experimental group, while the amount of mucin was higher in controls. Overall, fewer apoptotic activities were detected by a Terminal deoxynucleotidyl Transferase (TdT) dUTP Nick-End Labeling (TUNEL) assay and proliferative rates were similar to the controls, suggesting an interesting reparative and regenerative potential of irradiation-damaged/-dysfunctional salivary glands. The Figure below exemplifies some of these findings. Conclusions: Biocompatible, reproducible, and customizable self-assembling layer-by-layer core-shell delivery system is formulated and presented. Our findings suggest that localized sequential bioactive delivery of dual cytokines (in specific dose and order) can prevent irradiation-induced damage via reducing apoptosis and also has the potential to promote in situ proliferation of salivary gland cells; maxSALIVA is scalable (Good Manufacturing Practice or GMP production for human clinical trials) and patent-pending.

Keywords: saliva, head and neck cancer, nanotechnology, controlled drug delivery, xerostomia, mucositis, biopolymers, innovation

Procedia PDF Downloads 56
1 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 49