Polymeric micelles and nanomedicines: Shaping the future of next generation therapeutic strategies for infectious diseases

Author(s):  
María A. Toscanini ◽  
María J. Limeres ◽  
Agustín Videla Garrido ◽  
Maximiliano Cagel ◽  
Ezequiel Bernabeu ◽  
...  
2017 ◽  
Vol 96 (4) ◽  
pp. 135-139
Author(s):  
M. P. Kostinov ◽  
◽  
A. M. Kostinova ◽  
◽  

2015 ◽  
Vol 9 (6) ◽  
pp. 728-729 ◽  
Author(s):  
Georges C. Benjamin

ABSTRACTThe last 14 years has taught us that that we are facing a new reality; a reality in which public health emergencies are a common occurrence. Today, we live in a world with dangerous people without state sponsorship who are an enormous threat to our safety; one where emerging and reemerging infectious diseases are waiting to break out; a world where the benefits of globalization in trade, transportation, and social media brings threats to our communities faster and with a greater risk than ever before. Even climate change has entered into the preparedness equation, bringing with it the forces of nature in the form of extreme weather and its complications. (Disaster Med Public Health Preparedness. 2015;9:728–729)


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Na Zhao ◽  
Jian Wang ◽  
Yong Yu ◽  
Jun-Yan Zhao ◽  
Duan-Bing Chen

AbstractMany state-of-the-art researches focus on predicting infection scale or threshold in infectious diseases or rumor and give the vaccination strategies correspondingly. In these works, most of them assume that the infection probability and initially infected individuals are known at the very beginning. Generally, infectious diseases or rumor has been spreading for some time when it is noticed. How to predict which individuals will be infected in the future only by knowing the current snapshot becomes a key issue in infectious diseases or rumor control. In this report, a prediction model based on snapshot is presented to predict the potentially infected individuals in the future, not just the macro scale of infection. Experimental results on synthetic and real networks demonstrate that the infected individuals predicted by the model have good consistency with the actual infected ones based on simulations.


2016 ◽  
Vol 9 (2) ◽  
pp. 334-337
Author(s):  
Andrew M. Bleckman ◽  
Sarah N. Guarino ◽  
Wesley Russell ◽  
Eileen C. Toomey ◽  
Paul M. Werth ◽  
...  

During the fall 2015 semester, I (i.e., the last author of this response) taught a doctoral seminar on performance appraisal. Although this course was a general survey of research and theory regarding work performance and performance appraisal processes and methods, we also talked extensively about the value of performance ratings to organizations, raters, and ratees. It was indeed serendipitous that this focal article came out when it did. As part of the final examination requirements (and, admittedly, as a pedagogical experiment), I asked the six PhD students in this course (i.e., the first six authors of this response) to read and respond to the Adler et al. (2016) debate regarding the relative merits of performance ratings. To highlight the perspectives of this next generation of industrial and organizational psychologists, I have collected here various representative comments offered by each of these emerging scholars on this issue.


2018 ◽  
Vol 26 (4) ◽  
pp. 491-512 ◽  
Author(s):  
Natalia Miloslavskaya

Purpose Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated in real-time from an IS incident viewpoint, to identify an incident’s source, consider its type, weigh its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. Different security information and event management (SIEM) systems cope with this routine and usually complicated work by rapid detection of IS incidents and further appropriate response. Modern challenges dictate the need to build these systems using advanced technologies such as the blockchain (BC) technologies (BCTs). The purpose of this study is to design a new BC-based SIEM 3.0 system and propose a methodology for its evaluation. Design/methodology/approach Modern challenges dictate the need to build these systems using advanced technologies such as the BC technologies. Many internet resources argue that the BCT suits the intrusion detection objectives very well, but they do not mention how to implement it. Findings After a brief analysis of the BC concept and the evolution of SIEM systems, this paper presents the main ideas on designing the next-generation BC-based SIEM 3.0 systems, for the first time in open access publications, including a convolution method for solving the scalability issue for ever-growing BC size. This new approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. Research limitations/implications The most important area of the future work is to bring this proposed system to life. The implementation, deployment and testing onto a real-world network would also allow people to see its viability or show that a more sophisticated model should be worked out. After developing the design basics, we are ready to determine the directions of the most promising studies. What are the main criteria and principles, according to which the organization will select events from PEL for creating one BC block? What is the optimal number of nodes in the organization’s BC, depending on its network assets, services provided and the number of events that occur in its network? How to build and host the SIEM 3.0 BC infrastructure? How to arrange streaming analytics of block’s content containing events taking place in the network? How to design the BC middleware as software that enables staff to interact with BC blocks to provide services like IS events correlation? How to visualize the results obtained to find insights and patterns in historical BC data for better IS management? How to predict the emergence of IS events in the future? This list of questions can be continued indefinitely for a full-fledged design of SIEM 3.0. Practical implications This paper shows the full applicability of the BC concept to the creation of the next-generation SIEM 3.0 systems that are designed to detect IS incidents in a modern, fully interconnected organization’s network environment. The authors’ attempt to begin with a detailed description of the basics for a BC-based SIEM 3.0 system design is presented, as well as the evaluation methodology for the resulting product. Originality/value The authors believe that their new revolutionary approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. They hope that this paper will evoke a lively response in this segment of the security controls market from both theorists and direct developers of living systems that will implement the above approach.


Author(s):  
Toni Wandra

World Health Organization (WHO) defines zoonotic diseases (zoonoses) as those diseases and infections which are naturally transmitted between vertebrate animals and humans. More than 250 zoonoses have been described, over 60% of pathogens that cause diseases in humans are zoonoses of animals, and 75% of emerging infectious diseases. Most pandemics are caused by zoonoses.


Sign in / Sign up

Export Citation Format

Share Document