189 research outputs found

    Non-financial social determinants of diabetes among public assistance recipients in Japan: A cohort study

    Get PDF
    Aims/Introduction: Poverty is an important social determinant of diabetes. Poverty is a multidimensional concept including non-financial difficulties, such as social isolation and exclusion from communities. Many countries provide financial social assistance programs for those in need. This study aimed to explore non-financial social determinants of diabetes among public assistance recipients in Japan, by using linkage data of two municipal public assistance databases and medical assistance claim data. Materials and Methods: We carried out a retrospective cohort study. Public assistance is provided to households below the poverty line to ensure their income security. We extracted recipients’ sociodemographic factors of January 2016 (household number and employment status as non-financial social determinants of diabetes) and identified the incidence of diabetes diagnosis until December 2016 as the outcome. Results: We included the data of 2, 698 younger individuals (aged 65 years). A multivariable Poisson regression, with a robust standard error estimator, showed that among 2, 144 younger recipients at risk, unemployment and living alone were slightly associated with 1-year cumulative incidence of diabetes diagnosis (adjusted incidence ratio 1.20, 95% confidence interval 0.93–1.54 and adjusted incidence ratio 1.15, 95% confidence interval 0.89–1.48, respectively). Among 2, 181 older recipients at risk, there was no strong association between their sociodemographic factors and incidence of diabetes diagnosis. Conclusions: Unemployment and living alone might be additional risk factors for diabetes among younger public assistance recipients. Multidimensional supports assuring financial and non-financial securities are required to prevent diabetes among people living in poverty

    Functional disability trajectories at the end of life among Japanese older adults: findings from the Japan Gerontological Evaluation Study (JAGES)

    Get PDF
    BACKGROUND: this study aimed to identify distinct subgroups of trajectories of disability over time before 3 years of death and examine the factors associated with trajectory group membership probabilities among community-dwelling Japanese older adults aged 65 years and above. METHODS: participants included 4, 875 decedents from among community-dwelling Japanese older adults, aged ≥ 65 years at baseline (men: 3, 020; women: 1, 855). The certified long-term care levels of the national long-term care insurance (LTCI) system were used as an index of functional disability. We combined data from the 2010 Japan Gerontological Evaluation Study and data from the 2010 to 2016 LTCI system. Group-based mixture models and multinominal logistic regression models were used for data analysis. RESULTS: five distinct trajectories of functional disability in the last 3 years of life were identified: 'persistently severe disability' (10.3%), 'persistently mild disability' (13.0%), 'accelerated disability' (12.6%), 'catastrophic disability' (18.8%) and 'minimum disability' (45.2%). Multinominal logistic regression analysis found several factors associated with trajectory membership; self-rated health was a common predictor regardless of age and gender. The analysis also showed a paradoxical association; higher education was associated with trajectory group membership probabilities of more severe functional decline in men over 85 years at death. CONCLUSIONS: individual perception of health was a strong predictor of trajectories, independent of demographic factors and socio-economic status. Our findings contribute to the development of policies for the long-term care system, particularly for end-of-life care, in Asian countries

    Fault-Injection Attacks against NIST\u27s Post-Quantum Cryptography Round 3 KEM Candidates

    Get PDF
    We investigate __all__ NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and SIKE. All KEM schemes use variants of the Fujisaki-Okamoto transformation, so the equality test with re-encryption in decapsulation is critical. We survey effective key-recovery attacks when we can skip the equality test. We found the existing key-recovery attacks against Kyber, NTRU, Saber, FrodoKEM, HQC, one of two KEM schemes in NTRU Prime, and SIKE. We propose a new key-recovery attack against the other KEM scheme in NTRU Prime. We also report an attack against BIKE that leads to leakage of information of secret keys. The open-source pqm4 library contains all KEM schemes except Classic McEliece and HQC. We show that giving a single instruction-skipping fault in the decapsulation processes leads to skipping the equality test __virtually__ for Kyber, NTRU, Saber, BIKE, and SIKE. We also report the experimental attacks against them. We also report the implementation of NTRU Prime allows chosen-ciphertext attacks freely and the timing side-channel of FrodoKEM reported in Guo, Johansson, and Nilsson (CRYPTO 2020) remains, while there are no such bugs in their NIST PQC Round 3 submissions

    A Suzaku Observation of the Low-Ionization Fe-Line Emission from RCW 86

    Get PDF
    The newly operational X-ray satellite Suzaku observed the southwestern quadrant of the supernova remnant (SNR) RCW 86 in February 2006 to study the nature of the 6.4 keV emission line first detected with the Advanced Satellite for Cosmology and Astronomy (ASCA). The new data confirm the existence of the line, localizing it for the first time; most of the line emission is adjacent and interior to the forward shock and not at the locus of the continuum hard emission. We also report the first detection of a 7.1 keV line that we interpret as the K-beta emission from low-ionization iron. The Fe-K line features are consistent with a non-equilibrium plasma of Fe-rich ejecta with n_{e}t <~ 10^9 cm^-3 s and kT_{e} ~ 5 keV. This combination of low n_{e}t and high kT_{e} suggests collisionless electron heating in an SNR shock. The Fe K-alpha line shows evidence for intrinsic broadening, with a width of 47 (34--59) eV (99% error region). The difference of the spatial distributions of the hard continuum above 3 keV and the Fe-K line emission support a synchrotron origin for the hard continuum.Comment: 6 pages with 6 figures. Accepted for PASJ Suzaku Special Issue (vo. 58, sp.1

    Phenotypes of pain behavior in phospholipase C-related but catalytically inactive protein type 1 knockout mice

    Get PDF
    Phospholipase C-related inactive protein (PRIP) plays important roles in trafficking to the plasma membrane of GABAA receptor, which is involved in the dominant inhibitory neurotransmission in the spinal cord and plays an important role in nociceptive transmission. However, the role of PRIP in pain sensation remains unknown. In this study, we investigated the phenotypes of pain behaviors in PRIP type 1 knockout (PRIP-1 -/- ) mice. The mutant mice showed hyperalgesic responses in the second phase of the formalin test and the von Frey test as compared with those in wild-type mice. In situ hybridization studies of GABAA receptors revealed significantly decreased expression of γ2 subunit mRNA in the dorsal and ventral horns of the spinal cord in PRIP-1 -/- mice, but no difference in α1 subunit mRNA expression. β2 subunit mRNA expression was significantly higher in PRIP-1 -/- mice than in wild-type mice in all areas of the spinal cord. On the other hand, the slow decay time constant for the spontaneous inhibitory current was significantly increased by treatment with diazepam in wild-type mice, but not in PRIP-1 -/- mice. These results suggest that PRIP-1 -/- mice exhibit the changes of the function and subunits expression of GABAA receptor in the spinal cord, which may be responsible for abnormal pain sensation in these mice

    Oncogenic FGFR1 mutation and amplification in common cellular origin in a composite tumor with neuroblastoma and pheochromocytoma

    Get PDF
    Neuroblastoma (NB) and pheochromocytoma (PCC) are derived from neural crest cells (NCCs); however, composite tumors with NB and PCC are rare, and their underlying molecular mechanisms remain unknown. To address this issue, we performed exome and transcriptome sequencing with formalin-fixed paraffin-embedded (FFPE) samples from the NB, PCC, and mixed lesions in a patient with a composite tumor. Whole-exome sequencing revealed that most mutations (80%) were shared by all samples, indicating that NB and PCC evolved from the same clone. Notably, all samples harbored both mutation and focal amplification in the FGFR1 oncogene, resulting in an extraordinarily high expression, likely to be the main driver of this tumor. Transcriptome sequencing revealed undifferentiated expression profiles for the NB lesions. Considering that a metastatic lesion was also composite, most likely, the primitive founding lesions should differentiate into both NB and PCC. This is the first reported case with composite-NB and PCC genetically proven to harbor an oncogenic FGFR1 alteration of a common cellular origin

    Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

    Get PDF
    In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants. Many post-quantum KEMs usually perform re-encryption during key decapsulation to achieve chosen-ciphertext attack (CCA) security. The side-channel leakage of re-encryption can be exploited to mount a key-recovery plaintext-checking attack (KR-PCA), even if the chosen-plaintext attack (CCA) secure decryption constructing the KEM is securely implemented. Herein, we propose an efficient side-channel-assisted KR-PCA on post-quantum KEMs, and achieve a key recovery with significantly fewer attack traces than existing ones in TCHES 2022 and 2023. The basic concept of the proposed attack is to introduce a new KR-PCA based on a multiple-valued (MV-)PC oracle and then implement a dedicated MV-PC oracle based on a multi-classification neural network (NN). The proposed attack is applicable to the NIST PQC selected algorithm Kyber and the similar lattice-based Saber, FrodoKEM and NTRU Prime, as well as SIKE. We also present how to realize a sufficiently reliable MV-PC oracle from NN model outputs that are not 100% accurate, and analyze the tradeoff between the key recovery success rate and the number of attack traces. We assess the feasibility of the proposed attack through attack experiments on three typical symmetric primitives to instantiate a random oracle (SHAKE, SHA3, and AES software). The proposed attack reduces the number of attack traces required for a reliable key recovery by up to 87% compared to the existing attacks against Kyber and other lattice-based KEMs, under the condition of 99.9999% success rate for key recovery. The proposed attack can also reduce the number of attack traces by 85% for SIKE
    corecore