54 research outputs found

    Growth differentiation factor-15/adiponectin ratio as a potential biomarker for metabolic syndrome in Han Chinese

    Get PDF
    AimsGrowth differentiation factor-15 (GDF-15) and adiponectin are adipokines that regulate metabolism. This study aimed to evaluate the roles of GDF-15, adiponectin, and GDF-15/adiponectin ratio (G/A ratio) as biomarkers for detecting metabolic syndrome (MS).Materials and methodsThis cross-sectional study included 676 participants aged 20–70 years in Jurong, China. The participants were divided into four groups based on sex and age (<40 and ≥40 years). MS was defined according to the modified National Cholesterol Education Program Adult Treatment Panel III criteria. Receiver operating characteristic curves were used to evaluate the performance of GDF-15, adiponectin, and the G/A ratio in predicting MS.ResultsThe prevalence of MS was 22.0% (149/676). Logistic regression analysis indicated that the G/A ratio and adiponectin levels, but not GDF-15 levels, were correlated with MS [odds ratio; 95% CI 1.010 (1.006–1.013) and 0.798 (0.735–0.865), respectively] after adjusting for confounding factors. The G/A ratio displayed a significant relationship with MS in each subgroup and with each MS component in both men and women; however, adiponectin concentrations were significantly associated with MS and all its components only in men (all P <0.05). The area under the curve (AUC) of the G/A ratio and the adiponectin level for MS was 0.758 and 0.748, respectively. The highest AUC was 0.757 for the adiponectin level in men and 0.724 for the G/A ratio in women.ConclusionsThis study suggests that the G/A ratio and adiponectin are potential biomarkers for detecting MS in women and men, respectively

    Sustained high glucose intake accelerates type 1 diabetes in NOD mice

    Get PDF
    IntroductionEpidemiological studies have suggested that dietary factors, especially high consumption of high glycaemic index carbohydrates and sugars, may trigger or exacerbate the progression of type 1 diabetes. We aimed to provide experimental evidence to confirm this relevance and to explore the underlying mechanisms.MethodsNOD mice were given sustained high-glucose drinking or glucose-free water and observed for the incidence of type 1 diabetes and islet inflammation. RNAseq was performed to detect the transcriptome changes of the NOD islet beta cell line NIT-1 after high glucose treatment, and mass spectrometry was performed to detect the proteome changes of NIT-1-cells-derived sEVs.ResultsSustained high glucose drinking significantly aggravates islet inflammation and accelerates the onset of type 1 diabetes in NOD mice. Mechanistically, high glucose treatment induces aberrant ER stress and up-regulates the expression of autoantigens in islet beta cell. Moreover, high glucose treatment alters the proteome of beta-cells-derived sEVs, and significantly enhances the ability of sEVs to promote DC maturation and stimulate immune inflammatory response.DiscussionThis study provides evidence for negative effect of high glucose intake as a dietary factor on the pathogenesis of type 1 diabetes in genetically predisposed individuals. Therefore, avoiding high sugar intake may be an effective disease prevention strategy for children or adults susceptible to type 1 diabetes

    Interorganisational conflict between national and provincial sport organisations within China's elite sport system: Perspectives from national organisations

    Get PDF
    © 2018 Sport Management Association of Australia and New Zealand. In this article, the authors examine interorganisational conflict between provincial and national sport organisations in China. The authors theoretically ground the research in work related to interorganisational relationships and interorganisational conflict. The three case studies are artistic gymnastics, swimming, and cycling, and the authors conducted interviews with 11 staff from the relevant national-level sport organisations. Secondary data was sourced from official publications, websites, and influential domestic media. The key finding is that, whilst famed for its top-down bureaucratic system, there is considerable interorganisational conflict within the Chinese sport system. The extent and characteristics of the national-provincial conflict vary between sports. But there is also some consistency regarding the causes of the conflict and the measures adopted to mitigate the tension. Interorganisational conflict provides a useful heuristic for articulating and understanding the interorganisational relationships within the Chinese elite sport system and hence advances elite sport management research

    Verifiable Edge Computing for Indoor Positioning

    No full text
    Edge computing has been widely adopted in many systems, thanks for its advantages to offer low latency and alleviate heavy request loads from end users. Its integration with indoor positioning is one of promising research topics. Different from a traditional positioning system where a user normally query remotely deployed positioning services provided by a Location Information Service Provider (LIS), LIS will outsource its service to an edge device, and the user can obtain the service by directly accessing the edge device in an edge computing-based system. Though the benefits from edge computing, there is still some open issues for service outsourcing. One of them is how to ensure that the outsourced service is executed honestly by the edge device. However, the current literature has not yet seriously studied this issue with a feasible solution. In this paper, we design a verification scheme to solve this open problem for indoor positioning based on edge computing. By injecting some specially designed datasetinto a trained machine learning based positioning model, the functionality of outsourced model on edge devices can be verified through this dataset with regard to its prediction accuracy from outsourced model. The verification is successful only when the prediction accuracy can pass a threshold. In experiments, we provide extensive empirical evidence using state-of-the-art positioning models based on real-world datasets to prove the effectiveness of our proposed scheme and meanwhile investigate the effects caused by different factors.Peer reviewe

    Efficient Privacy Protection Protocols for 5G Enabled Positioning in Industrial IoT

    No full text
    Publisher Copyright: IEEEHigh-accuracy positioning has drawn huge attention with the potential in enhancing location-aware communications, intelligent transportation, and so on. The emergency of the fifth-generation (5G) technologies like device to device (D2D) communications, vehicle to vehicle (V2V) communications and crowdsourcing networks is expected to help achieve highly accurate positioning. By employing nearby mobile terminals to estimate position cooperatively, these technologies can improve positioning accuracy effectively, especially in indoor and urban areas. Despite the benefit, the potential information disclosure in these positioning systems threatens the engagement of public participants (also known as reference points). The location of the reference points and their distances to a target point is quite sensitive since they can be easily used to locate the reference points once exposed. Though existing solutions based on Paillier homomorphic encryption have been proposed to preserve the privacy of distance information. The sensitivity of reference points’ locations is ignored. Additionally, the adoption of Paillier introduces a high computation cost, which is impractical in reality. To address the above problems, this paper proposes two efficient protocols, named Pub-pos and Pri-pos. By leveraging matrix concatenation and multiplication, these two protocols can disguise the original sensitive data, including both distance and location information, into a random matrix while keeping a positioning result intact. We analyze security strength, complexity and optimal variable selection of the proposed protocols. Numerous experiments verify that our proposed protocols have significant efficiency improvement in both system and individual levels compared with a Paillier based solution.Peer reviewe

    Predict Pairwise Trust based on Machine Learning in Online Social Networks

    No full text
    Trust plays a crucial role in online social networks where users do not communicate or interact with each other in a direct face-to-face manner. Although many researchers have already conducted comprehensive studies on trust computing like trust evaluation, pairwise trust prediction is still relatively under explored especially with machine learning methods which can overcome the disadvantages of both linear predication and trust propagation. This survey aims to fill this gap and first provides an overview of state-of-the-art researches in pairwise trust prediction using machine learning techniques, especially in the context of social networking. Specifically, we present a workflow of trust prediction using machine learning and summarize current available trust-related datasets, classifiers and different metrics used to evaluate a trained classifier. Also, we review, compare, and contrast the literature for the purpose of identifying open issues and directing future research.Peer reviewe

    Privacy-preserving D2D Cooperative Location Verification

    No full text
    Device-to-Device (D2D) cooperative location verification allows a device to verify its location with the help of neighbouring devices. It is especially handy in location-based services where location verification is essential. However, the exposure of device location during verification rises a big privacy risk for participants since they have to send their real-time locations to unknown verifiers holding anonymous identities. Thus, a privacy-preserving solution is urgently needed to provide verification without location disclosure. Traditional solutions based on Paillier and garbled circuits can solve the problem but also introduce high cost. Based on order-preserving encryption, we propose an efficient protocol with high-security guarantee to address this issue. Apart from rigorous security proof, complexity analysis and extensive experiments are also conducted to evaluate the proposed solution. The results compared with related work show that order-preserving encryption based mechanism achieves the best balance with regards to privacy, utility and performance requirements.Peer reviewe

    Golf in Asia and the Middle East

    No full text

    Volunteering for sports mega events: A non-host region perspective

    Get PDF
    Despite a plethora of studies focussing on sports mega event volunteering, little is known about volunteers who live outside of the host city. This exploratory research makes a novel contribution by focusing on a group of the London 2012 Olympic and Paralympic Games volunteers from a non-host region. Within this context, the study explores volunteers’ motives, the utility of using financial subsidies to support volunteering participation, and their attitudes towards post-event volunteering. Semi-structured interviews with twelve volunteers were conducted, accompanied by interviews with key local stakeholders. The findings suggest that Olympic-related factors and altruistic feelings were central motivations to volunteering. Some previous volunteering experiences increased confidence levels to volunteer at the Olympics. The financial scheme was perceived as an impetus further enhancing Leicestershire residents’ confidence to volunteer. Program participants also indicated positive attitudes towards future volunteering intentions
    • …
    corecore