http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Nanomemulsion of megestrol acetate for improved oral bioavailability and reduced food effect
Yixian Li,양수근,송정기,김민경,임효상,Qingbo Shen,이돈행 대한약학회 2015 Archives of Pharmacal Research Vol.38 No.10
Megestrol acetate (MGA) belongs to the BCSclass II drugs with low solubility and high permeability,and its oral absorption in conventional dosage form MGAmicrocrystal suspension (MGA MS) is very limited andgreatly affected by food. In this study, MGA nanoemulsion(MGA NE) was formulated based on solubility, phasediagramand release studies. Then oral bioavailability ofMGA NE and MGA MS was evaluated. A randomizedtwo-way crossover trial was conducted on six male dogsunder fed and fasting conditions. Blood concentrations ofMGA were analyzed using LC–MS/MS. MGA NE yielded5.00-fold higher oral bioavailability in fasting conditionsand displayed more stable absorption profiles after foodintake compared with MGA MS.
A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
( Jing Li ),( Licheng Wang ),( Jianhua Yan ),( Xinxin Niu ),( Yixian Yang ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.12
A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn`t need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.
Yuanqing Hu,Fengxia Li,Yixian Zheng,Xinan Jiao,Liqing Guo 한국미생물·생명공학회 2020 Journal of microbiology and biotechnology Vol.30 No.6
Vibrio parahaemolyticus is a major gastroenteritis-causing pathogen in many Asian countries. Antimicrobial resistance in V. parahaemolyticus has been recognized as a critical threat to food safety. In this study, we determined the prevalence and incidence of antimicrobial resistance in V. parahaemolyticus in the southern Fujian coast, China. A total of 62 isolates were confirmed in retail aquatic products from June to October of 2018. The serotype O3:K6 strains, the virulence genes tdh and trh, antibiotic susceptibility and molecular typing were investigated. Then plasmid profiling analysis and curing experiment were performed for multidrug-resistant strains. The results showed that the total occurrence of V. parahaemolyticus was 31% out of 200 samples. Five strains (8.1%) out of 62 isolates were identified as the V. parahaemolyticus O3:K6 pandemic clone. A large majority of isolates exhibited higher resistance to penicillin (77.4%), oxacillin (71%), ampicillin (66.1%) and vancomycin (59.7%). Seventy-one percent (44/62) of the isolates exhibited multiple antimicrobial resistance. All 62 isolates were grouped into 7 clusters by randomly amplified polymorphic DNA, and most of the isolates (80.6%) were distributed within cluster A. Plasmids were detected in approximately 75% of the isolates, and seven different profiles were observed. Seventy-six percent (25/33) of the isolates carrying the plasmids were eliminated by 0.006% SDS incubated at 42°C, a sublethal condition. The occurrence of multidrug-resistant strains could be an indication of the excessive use of antibiotics in aquaculture farming. The rational use of antimicrobial agents and the surveillance of antibiotic administration may reduce the acquisition of resistance by microorganisms in aquatic ecosystems.
PEGylated Fmoc–Amino Acid Conjugates as Effective Nanocarriers for Improved Drug Delivery
Zhang, Peng,Huang, Yixian,Kwon, Yong Tae,Li, Song American Chemical Society 2015 Molecular pharmaceutics Vol.12 No.5
<P>A structure activity relationship (SAR) study was conducted using a series of PEGylated Fmoc-amino acid conjugates (PFA) as a simple model to gain more insight into carrier drug interaction. Among the eight PEG(2000)-Fmoc conjugates with different neighboring structures of Fmoc motif, PEG(2000)-Fmoc-Lys (Cbz) (PFA(2))-based nanomicelles exhibited the smallest particle size distribution, lowest critical micelle concentration (CMC) value, and highest loading capacity with paclitaxel (PTX). These biophysical properties were largely attributed to the strengthened carrier carrier and carrier drug interaction, including pi-pi stacking, hydrophobic, and hydrogen bonding interaction, as confirmed by fluorescence quenching and C-13 NMR study. In vitro and in vivo evaluation further demonstrated the effectiveness of PFA(2) as a nanocarrier for efficient delivery of PTX to achieve improved antitumor activity. Importantly, PFA(2) was also effective in formulating eight other model drugs of diverse structures, indicating a broad application potential. This work may shed insights into the molecular basis for the structural optimization of nanocarriers for improved delivery efficacy.</P>
( Yanrong Lu ),( Lixiang Li ),( Haipeng Peng ),( Yixian Yang ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.3
With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari`s scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.
Xiaoyun Yi,Yuwei Ren,Li Qi,Ben Niu,Yixian Fang 제어·로봇·시스템학회 2023 International Journal of Control, Automation, and Vol.21 No.4
In this paper, we investigate the problem of weight estimation and secure control for discrete stochastic distribution control (SDC) systems under sparse sensor attacks. Firstly, a Luenberger observer is designed for the linear SDC systems to perform the weight estimation under sparse sensor attacks. Then, a generalized proportionalintegral (PI) tracking control strategy is proposed for the linear B-spline model. Furthermore, the tracking problem for output probability density functions (PDFs) is implemented, and the designed controller ensures that the closedloop system is stable. Finally, the simulation results show the effectiveness of the proposed method.
( Jianchao Bian ),( Shoushan Luo ),( Wei Li ),( Yaxing Zha ),( Yixian Yang ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.10
Traditional regenerating codes are designed to tolerate node failures with optimal bandwidth overhead. However, there are many types of partial failures inside the node, such as latent sector failures. Recently, proposed regenerating codes can also repair intra-node failures with node-level redundancy but incur significant bandwidth and I/O overhead. In this paper, we construct a new scheme of regenerating codes, called IR-RBT codes, which employs intra-node redundancy to tolerate intra-node failures and serve as the help data for other nodes during the repair operation. We propose 2 algorithms for assigning the intra-node redundancy and RBT-Helpers according to the failure probability of each node, which can flexibly adjust the helping relationship between nodes to address changes in the actual situation. We demonstrate that the IR-RBT codes improve the bandwidth and I/O efficiency during intra-node failure repair over traditional regenerating codes but sacrifice the storage efficiency.