63 research outputs found

    The risk of child and adolescent overweight is related to types of food consumed

    Get PDF
    <p>Abstract</p> <p>Background/Aims</p> <p>To investigate the association between the risk of overweight and the consumption of food groups in children and adolescents.</p> <p>Methods</p> <p>We studied 1764 healthy children and adolescents (age 6-19y) attending 16 Seventh-Day Adventist schools and 13 public schools using a 106-item non-quantitative food frequency questionnaire from the late 1980 Child-Adolescent Blood Pressure Study. Logistic regression models were used to compute the risk of overweight according to consumption of grains, nuts, vegetables, fruits, meats/fish/eggs, dairy, and, low nutrient-dense foods (LNDF).</p> <p>Results</p> <p>The frequency of consumption of grains, nuts, vegetables and LNDF were inversely related to the risk of being overweight and dairy increased the risk. Specifically, the odds ratio (95% CI) for children in the highest quartile or tertile of consumption compared with the lowest quartile or tertile were as follows: grains 0.59(0.41-0.83); nuts 0.60(0.43-0.85); vegetables 0.67(0.48-0.94); LNDF 0.43(0.29-0.63); and, dairy 1.36(0.97, 1.92).</p> <p>Conclusion</p> <p>The regular intake of specific plant foods may prevent overweight among children and adolescents.</p

    A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

    Full text link
    The 5G networks have the capability to provide high compatibility for the new applications, industries, and business models. These networks can tremendously improve the quality of life by enabling various use cases that require high data-rate, low latency, and continuous connectivity for applications pertaining to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of Things (IoT). However, these applications need secure servicing as well as resource policing for effective network formations. There have been a lot of studies, which emphasized the security aspects of 5G networks while focusing only on the adaptability features of these networks. However, there is a gap in the literature which particularly needs to follow recent computing paradigms as alternative mechanisms for the enhancement of security. To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing-based security modules. The taxonomy on the basis of security requirements is presented, which also includes the comparison of the existing state-of-the-art solutions. This article also provides a security model, "CATMOSIS", which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks. Finally, various security challenges and open issues are discussed to emphasize the works to follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure Wireless Networks, pp. 69-102. Springer, Cham, 201

    Genomic Approaches to Enhance Stress Tolerance for Productivity Improvements in Pearl Millet

    Get PDF
    Pearl millet [Pennisetum glaucum (L.) R. Br.], the sixth most important cereal crop (after rice, wheat, maize, barley, and sorghum), is grown as a grain and stover crop by the small holder farmers in the harshest cropping environments of the arid and semiarid tropical regions of sub-Saharan Africa and South Asia. Millet is grown on ~31 million hectares globally with India in South Asia; Nigeria, Niger, Burkina Faso, and Mali in western and central Africa; and Sudan, Uganda, and Tanzania in Eastern Africa as the major producers. Pearl millet provides food and nutritional security to more than 500 million of the world’s poorest and most nutritionally insecure people. Global pearl millet production has increased over the past 15 years, primarily due to availability of improved genetics and adoption of hybrids in India and expanding area under pearl millet production in West Africa. Pearl millet production is challenged by various biotic and abiotic stresses resulting in a significant reduction in yields. The genomics research in pearl millet lagged behind because of multiple reasons in the past. However, in the recent past, several efforts were initiated in genomic research resulting into a generation of large amounts of genomic resources and information including recently published sequence of the reference genome and re-sequencing of almost 1000 lines representing the global diversity. This chapter reviews the advances made in generating the genetic and genomics resources in pearl millet and their interventions in improving the stress tolerance to improve the productivity of this very important climate-smart nutri-cereal

    Evaluation of appendicitis risk prediction models in adults with suspected appendicitis

    Get PDF
    Background Appendicitis is the most common general surgical emergency worldwide, but its diagnosis remains challenging. The aim of this study was to determine whether existing risk prediction models can reliably identify patients presenting to hospital in the UK with acute right iliac fossa (RIF) pain who are at low risk of appendicitis. Methods A systematic search was completed to identify all existing appendicitis risk prediction models. Models were validated using UK data from an international prospective cohort study that captured consecutive patients aged 16–45 years presenting to hospital with acute RIF in March to June 2017. The main outcome was best achievable model specificity (proportion of patients who did not have appendicitis correctly classified as low risk) whilst maintaining a failure rate below 5 per cent (proportion of patients identified as low risk who actually had appendicitis). Results Some 5345 patients across 154 UK hospitals were identified, of which two‐thirds (3613 of 5345, 67·6 per cent) were women. Women were more than twice as likely to undergo surgery with removal of a histologically normal appendix (272 of 964, 28·2 per cent) than men (120 of 993, 12·1 per cent) (relative risk 2·33, 95 per cent c.i. 1·92 to 2·84; P < 0·001). Of 15 validated risk prediction models, the Adult Appendicitis Score performed best (cut‐off score 8 or less, specificity 63·1 per cent, failure rate 3·7 per cent). The Appendicitis Inflammatory Response Score performed best for men (cut‐off score 2 or less, specificity 24·7 per cent, failure rate 2·4 per cent). Conclusion Women in the UK had a disproportionate risk of admission without surgical intervention and had high rates of normal appendicectomy. Risk prediction models to support shared decision‐making by identifying adults in the UK at low risk of appendicitis were identified

    IGFBP mRNA expression in small intestine of rat during postnatal development

    No full text
    Published 1 December 2001In contrast to the adult gut, the immature intestine is refractory to subcutaneously infused insulin-like growth factor I (IGF-I). IGF binding protein (IGFBP) mRNA expression was characterized in intestinal tissues from 6-, 19-, and 90-day-old rats to determine if changes in local expression could account for this age-related change in IGF-I potency. For all age groups, IGFBP-3 to -6, but not IGFBP-1 or -2, were detected by Northern blot analysis. IGFBP-3, -4, and -5 were more intensely expressed in the 6-day-old rat intestine compared with weanling or adult tissue. In contrast, IGFBP-6 expression peaked at the time of weaning. In situ hybridization showed IGFBP-3 to -6 expression was confined to cells of the lamina propria and submucosa and also in the muscularis layer for IGFBP-5. Furthermore, the pattern of IGFBP-5 localization in the intestine changed with development. The findings indicate that the expression of IGFBP-3 to -6 is higher in the immature intestine compared with the adult intestine, suggesting locally produced IGFBPs may inhibit systemically derived IGF-I action in the intestine. Therefore, changes to local IGFBP expression may contribute to the varying response of the rat intestine to IGF-I peptides during postnatal development.C. A. Shoubridge, C.-B. Steeb, and L. C. Rea

    Improvising border security: 'a situation of security pluralism' along South Sudan’s borders with the Democratic Republic of Congo

    Get PDF
    This article compares two cases of securitization along South Sudan’s border with the Democratic Republic of the Congo. By comparing how a security concern – the presence of the Lord’s Resistance Army – was interpreted and responded to, the article shows that border security practices in two borderscapes are improvised, contradictory and contested, and serve to establish authority rather than actually securing the border. This is apparent on three levels: (a) through the multiplicity of security actors vying for authority; (b) in how they interpret security concerns; and (c) in terms of what practice follows. The article argues that by allowing authority at the border to be taken by actors that are not under direct control of the central government, the South Sudanese state is developing as one that controls parts of the country in absentia, either by granting discretionary powers to low-level government authorities at the border or through tactical neglect. Processes of securitization by both state and non-state actors in the borderland are largely disconnected from the South Sudanese central government, which does not claim authority over this border and thus seemingly does not consider the lack of security for its citizens, and the parallel authorities, as a threat to central stability
    corecore