More than 90% of patients with diabetes worldwide are type 2 diabetes (T2D), which is caused by insulin resistance or impaired producing insulin by pancreatic β cells. T2D and its complications, ...mainly large cardiovascular (LCV) and kidney (Ne) complications, are the major cause of death in diabetes patients. Recently, the dysregulation of peripheral T cell immune homeostasis was found in most T2D patients. However, the characteristics of T-cell receptors (TCR) remain largely unexplored in T2D patients.
Here we investigated the TCR repertoire using high-throughput sequencing in peripheral blood collected from T2D patient with (8 LCV and 7 Ne) or without complications.
Our analysis of TCR repertoires in peripheral blood samples showed that TCR profiles in T2D patients with complications tended to be single and specific compared to controls, according to the characteristics of TCR repertoire in V-J combination number, diversity, principal component analysis (PCA) and differential genes. And we identified some differentially expressed V-J gene segments and amino acid clonotypes, which had the potential to contribute to distinguishing T2D patient with or without complications. As the progression of the disease, we found that the profiling of TCR repertoire was also differential between T2D patients with LVD and Ne complications base on this pilot analysis.
This study demonstrated the protentional unique property of TCR repertoire in peripheral blood of T2D patient with and without complications, or T2D patients with LVD and Ne complications, which provided the possibility for future improvements in immune-related diagnosis and therapy for T2D complications.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
This meta-analysis aims to evaluate the impact of Sodium Glucose Transporter 2 (SGLT2) inhibitors on fractures, bone mineral density (BMD), and bone metabolism markers in type 2 diabetes mellitus ...(T2DM) patients. Pooled relative risk (RR) with 95% confidence interval (CI) assessed the relationship between SGLT2 inhibitors and fracture risk. Weighted mean difference (WMD) with 95% CI explored the correlation between SGLT2 inhibitors and BMD, as well as bone metabolism markers. A total of 20 randomised controlled trials (RCTs) involving 12,764 patients were analysed. No significant association emerged between SGLT2 inhibitor use and elevated fracture risk (pooled RR = 1.21, 95% CI 0.95, 1.54, I
2
= 22%). Furthermore, SGLT2 inhibitors exhibited no substantial effects on BMD changes at the lumbar spine (WMD = -0.02, 95% CI -0.38, 0.34), femoral neck (WMD = 0.11, 95% CI -0.28, 0.50), total hip (WMD = -0.20, 95% CI -0.41, 0.01), and distal forearm (WMD = -0.20, 95% CI -0.62, 0.22). Similarly, no notable impact of SGLT2 inhibitors on bone metabolism markers, including CTX (WMD = 0.04, 95% CI -0.02, 0.09), P1NP (WMD = 1.06, 95% CI -0.44, 2.57), PTH (WMD = 0.34, 95% CI -0.07, 0.75), calcium (WMD = 0.01, 95% CI -0.02, 0.04), and phosphate (WMD = 2.37, 95% CI -0.76, 5.49). The findings suggest that the utilization of SGLT2 inhibitors is not significantly linked to an elevated risk of fractures in individuals with T2DM. However, further clinical investigations and extended follow-up periods are warranted to establish more conclusive determinations.
To the Editor: The Ebola epidemic has taken almost 7000 lives thus far in Western Africa.1 China's contribution to the control of Ebola has shown China's, increasing engagement in global health. ...After deploying over 260 medical personnel from China Centers for Disease Control (CDC) and hospitals, China decided to send its elite People's Liberation Army (PLA) medical team of 163 military medical staffers on November 14, 2014 to Liberia, which is a very significant milestone in China's modern engagement in global health because it is the first time for China to send an elite PLA medical team to Africa and to run hospitals on their own.
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have ...been posed. Mobile IP protocol can be used to enable roaming across different access technologies. One of the important challenges in Mobile IP is security. The service delivery should be secured and efficient, which implicates that security should be integrated with mobility management (MM), Quality-of-Service (QoS) to minimise the negative impact of security mechanisms. It is proposed in the thesis an architectural framework, which uses Hierarchical Mobile IPv6 (HMIPv6) protocols interworking with Authentication, Authorization, Accounting (AAA) framework. The concept of Enhanced Node (EN) is introduced in the framework. The EN is empowered with intelligence to integrate security, MM and QoS. The focal point of the work is to address security challenges based on the framework and to evaluate the impact of security mechanisms on the mobile networks in terms of extra signalling load introduced. Three security mechanisms are proposed in the thesis, according to the handover domains. For handover across two access networks, an enhanced AAA solution is proposed to provide the mobile node authenticated network access. It establishes keys between serving access network and target access network for the purpose of securing context transfer. Also keys are established between mobile node and the target access network for future use after mobile node (MN) roams to the target access network. For micro-mobility handover within one EN domain, an enhanced key management scheme is proposed to generate a bunch of handover keys for all of the access routers (AR) within one EN domain instead of generating key every single time the mobile node changes the AR in the previous mechanism. The enhanced key management scheme reduces the handover disruption time introduced by security. For fast handovers within one EN domain (micro-mobility handover) and across EN domains (macro-mobility handover), the security mechanism is proposed to secure the fast handover between ARs/enhanced nodes. The fast handover key is established between previous AR/EN and new AR/EN, thus, the fast handover registration messages between ARs/ENs can be secured. More importantly, the context transfer messages between previous EN and new EN for the purpose of prompting "smooth handover", can be protected using the fast handover keys. The performance of three proposed solutions is evaluated using analytical models. Signalling cost is the main parameter to be evaluated. Discussions on advantage and disadvantage of each proposed mechanisms are also provided at the end of chapter 4, 5 and 6 respectively.
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have ...been posed. Mobile IP protocol can be used to enable roaming across different access technologies. One of the important challenges in Mobile IP is security. The service delivery should be secured and efficient, which implicates that security should be integrated with mobility management (MM), Quality-of-Service (QoS) to minimise the negative impact of security mechanisms. It is proposed in the thesis an architectural framework, which uses Hierarchical Mobile IPv6 (HMIPv6) protocols interworking with Authentication, Authorization, Accounting (AAA) framework. The concept of Enhanced Node (EN) is introduced in the framework. The EN is empowered with intelligence to integrate security, MM and QoS. The focal point of the work is to address security challenges based on the framework and to evaluate the impact of security mechanisms on the mobile networks in terms of extra signalling load introduced. Three security mechanisms are proposed in the thesis, according to the handover domains. For handover across two access networks, an enhanced AAA solution is proposed to provide the mobile node authenticated network access. It establishes keys between serving access network and target access network for the purpose of securing context transfer. Also keys are established between mobile node and the target access network for future use after mobile node (MN) roams to the target access network. For micro-mobility handover within one EN domain, an enhanced key management scheme is proposed to generate a bunch of handover keys for all of the access routers (AR) within one EN domain instead of generating key every single time the mobile node changes the AR in the previous mechanism. The enhanced key management scheme reduces the handover disruption time introduced by security. For fast handovers within one EN domain (micro-mobility handover) and across EN domains (macro-mobility handover), the security mechanism is proposed to secure the fast handover between ARs/enhanced nodes. The fast handover key is established between previous AR/EN and new AR/EN, thus, the fast handover registration messages between ARs/ENs can be secured. More importantly, the context transfer messages between previous EN and new EN for the purpose of prompting "smooth handover", can be protected using the fast handover keys. The performance of three proposed solutions is evaluated using analytical models. Signalling cost is the main parameter to be evaluated. Discussions on advantage and disadvantage of each proposed mechanisms are also provided at the end of chapter 4, 5 and 6 respectively.
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have ...been posed. Mobile IP protocol can be used to enable roaming across different access technologies. One of the important challenges in Mobile IP is security. The service delivery should be secured and efficient, which implicates that security should be integrated with mobility management (MM), Quality-of-Service (QoS) to minimise the negative impact of security mechanisms. It is proposed in the thesis an architectural framework, which uses Hierarchical Mobile IPv6 (HMIPv6) protocols interworking with Authentication, Authorization, Accounting (AAA) framework. The concept of Enhanced Node (EN) is introduced in the framework. The EN is empowered with intelligence to integrate security, MM and QoS. The focal point of the work is to address security challenges based on the framework and to evaluate the impact of security mechanisms on the mobile networks in terms of extra signalling load introduced. Three security mechanisms are proposed in the thesis, according to the handover domains. For handover across two access networks, an enhanced AAA solution is proposed to provide the mobile node authenticated network access. It establishes keys between serving access network and target access network for the purpose of securing context transfer. Also keys are established between mobile node and the target access network for future use after mobile node (MN) roams to the target access network. For micro-mobility handover within one EN domain, an enhanced key management scheme is proposed to generate a bunch of handover keys for all of the access routers (AR) within one EN domain instead of generating key every single time the mobile node changes the AR in the previous mechanism. The enhanced key management scheme reduces the handover disruption time introduced by security. For fast handovers within one EN domain (micro-mobility handover) and across EN domains (macro-mobility handover), the security mechanism is proposed to secure the fast handover between ARs/enhanced nodes. The fast handover key is established between previous AR/EN and new AR/EN, thus, the fast handover registration messages between ARs/ENs can be secured. More importantly, the context transfer messages between previous EN and new EN for the purpose of prompting "smooth handover", can be protected using the fast handover keys. The performance of three proposed solutions is evaluated using analytical models. Signalling cost is the main parameter to be evaluated. Discussions on advantage and disadvantage of each proposed mechanisms are also provided at the end of chapter 4, 5 and 6 respectively.
The rapid growth in the demand for Internet services and many new applications has driven the development of satellite, which are the preferred delivery mechanism due to its wide area coverage, ...multicasting capacity and speed to deliver affordable future services. However, security has been one of the barriers for satellite services, especially for domains spanning over cryptographically heterogeneous networks. In this paper, a scalable and adaptable security architecture is specified to protect satellite services. Two major issues in the proposed security architecture, key management and policy provisioning, are presented and analyzed. And three scenarios, mobile network, fixed network and Delay Tolerant Network (DTN), are presented, with details on characteristics and security features.
Delivering ubiquitous services to various users and devices through heterogeneous networks is a major aim in next generation networks. The delivery should be efficient and secure. The support and ...integration of security, quality of service (QoS) and mobility management (MM) in access networks become parts of the essential issues. An enhanced node (EN) with a network sub-layer is proposed here to achieve this integration. The architectural framework with ENs located in the IP-based access networks is presented. The focus of this paper is to investigate the challenges of integrating security with QoS and MM, notably the threats and requirements, based on this framework. The solutions are also proposed to provide the authenticated and authorized access control and to secure the handover process.
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have ...been posed. One of the important challenges is to integrate quality of service (QoS), security and mobility support in heterogeneous networks. To facilitate the interworking of these mechanisms we propose the concept of enhanced node (EN) in this paper. The EN is an intelligent entity with a network sub-layer, which integrates QoS, security and mobility management (MM). ENs are located in the access network and they communicate with each other via signalling. In this paper, the functionalities of the ENs are described and the framework with ENs to integrate QoS, security and MM in IP-based networks is presented. The mechanisms to provide the authenticated and authorized access control and to enhance the secured QoS combined fast handovers are also proposed.
It is envisaged that in future mobile ubiquitous environments, users will be able to seamlessly, search, access and consume a rich offering of services and content from an array of Service/Content ...Providers, whilst they are on the move, anytime, anywhere. Unfortunately, this new computing paradigm also brings along new and unique security challenges. Novel security solutions are therefore required. But, in order for appropriate security solutions to be devised, all possible security threats must first be thoroughly analysed, and the corresponding security requirements be identified. In this paper, we examine the security issues germane to a mobile ubiquitous environment. We then suggest some possible solutions which may be employed to address these security issues. Open research issues are also highlighted.