Browsing by Author "Kumar, Vikas"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Embargo Discovery and characterization of novel CYP1B1 inhibitors based on heterocyclic chalcones: Overcoming cisplatin resistance in CYP1B1-overexpressing lines(Elsevier, 2017-02-09) Horley, Neill; Beresford, Kenneth J. M.; Chawla, Tarun; McCann, Glen J. P.; Ruparelia, K. C.; Gatchie, Linda; Sonawane, Vinay; Williams, Vinay R.; Tan, Hoon Leong; Joshi, Prashant; Bharate, Sonali S.; Kumar, Vikas; Bharate, Sandip B.; Chaudhuri, BhabatoshThe structure of alpha-napthoflavone (ANF), a potent inhibitor of CYP1A1 and CYP1B1, mimics the structure of chalcones. Two potent CYP1B1 inhibitors 7k (DMU2105) and 6j (DMU2139) have been identified from two series of synthetic pyridylchalcones. They inhibit human CYP1B1 enzyme bound to yeast-derived microsomes (Sacchrosomes™) with IC50 values of 10 and 9 nM, respectively, and show a very high level of selectivity towards CYP1B1 with respect to the IC50 values obtained with CYP1A1, CYP1A2, CYP3A4, CYP2D6, CYP2C9 and CYP2C19 Sacchrosomes™. Both compounds also potently inhibit CYP1B1 expressed within ‘live’ recombinant yeast and human HEK293 kidney cells with IC50 values of 63, 65, and 4, 4 nM, respectively. Furthermore, the synthesized pyridylchalcones possess better solubility and lipophilicity values than ANF. Both compounds overcome cisplatineresistance in HEK293 and A2780 cells which results from CYP1B1 overexpression. These potent cell-permeable and water-soluble CYP1B1 inhibitors are likely to have useful roles in the treatment of cancer, glaucoma, ischemia and obesity.Item Metadata only Security and Privacy in Fog Computing: Challenges(IEEE, 2017-09-06) Mukherjee, Mithun; Matam, Rakesh; Shu, Lei; Maglaras, Leandros; Ferrag, Mohamed Amine; Choudhry, Nikumani; Kumar, VikasFog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied to the fog computing due to its features, such as mobility, heterogeneity, and large-scale geo-distribution. This paper provides an overview of existing security and privacy concerns, particularly for the fog computing. Afterward, this survey highlights ongoing research effort, open challenges, and research trends in privacy and security issues for fog computing.