Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Pharmgenomics Pers Med ; 16: 785-794, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-37641720

RESUMEN

Background: Cretinism is a subtype of congenital hypothyroidism, an endocrine disorder resulting from inadequate thyroid hormone production or receptor deficiency. Genetic abnormalities play a major role in the development of thyroid dysfunction. Methods: We recruited 183 participants with cretinism and 119 healthy participants from the Xinjiang Uyghur Autonomous Region and randomly selected 29 tag single nucleotide polymorphisms (tSNPs) in TSHB, PAX8, TPO, NKX2-5, and TSHR in all participants. We compared genotype and allele frequencies between cases and controls utilizing the chi-squared test, logistic regression analysis, and haplotype analysis. Results: Using the chi-squared test, a single SNP was found to be associated with cretinism (recessive model: rs3754363, OR = 0.46, 95% CI = 0.27-0.80, P = 0.00519; genotype model: P = 0.01677). We stratified neurological, myxedematous, and mixed type and determined that another SNP was associated with a higher risk when comparing myxedematous type to the neurological type (rs2277923). Conclusion: rs3754363 has a statistically significant protective effect on people with cretinism, while rs2277923 may play a greater role in promoting the development of neurocretinism.

2.
BMC Bioinformatics ; 19(Suppl 9): 287, 2018 Aug 13.
Artículo en Inglés | MEDLINE | ID: mdl-30367580

RESUMEN

BACKGROUND: Global maritime trade plays an important role in the modern transportation industry. It brings significant economic profit along with bioinvasion risk. Species translocate and establish in a non-native area through ballast water and biofouling. Aiming at aquatic bioinvasion issue, people proposed various suggestions for bioinvasion management. Nonetheless, these suggestions only focus on the chance of a port been affected but ignore the port's ability to further spread the invaded species. RESULTS: To tackle the issues of the existing work, we propose a biosecurity triggering mechanism, where the bioinvasion risk of a port is estimated according to both the invaded risk of a port and its power of being a stepping-stone. To compute the invaded risk, we utilize the automatic identification system data, the ballast water data and marine environmental data. According to the invaded risk of ports, we construct a species invasion network (SIN). The incoming bioinvasion risk is derived from invaded risk data while the invasion risk spreading capability of each port is evaluated by s-core decomposition of SIN. CONCLUSIONS: We illustrate 100 ports in the world that have the highest bioinvasion risk when the invaded risk and stepping-stone bioinvasion risk are equally treated. There are two bioinvasion risk intensive regions, namely the Western Europe (including the Western European margin and the Mediterranean) and the Asia-Pacific, which are just the region with a high growth rate of non-indigenous species and the area that has been identified as a source for many of non-indigenous species discovered elsewhere (especially the Asian clam, which is assumed to be the most invasive species worldwide).


Asunto(s)
Minería de Datos/métodos , Ecosistema , Especies Introducidas , Modelos Teóricos , Transportes , Eliminación de Residuos Líquidos , Animales , Organismos Acuáticos , Océanos y Mares , Navíos
3.
Sensors (Basel) ; 18(10)2018 Oct 01.
Artículo en Inglés | MEDLINE | ID: mdl-30275433

RESUMEN

The Internet of things (IoT) comprises a huge collection of electronic devices connected to the Internet to ensure the dependable exchange of sensing information. It involves mobile workers (MWs) who perform various activities to support enormous online services and applications. In mobile crowd sensing (MCS), a massive amount of sensing data is also generated by smart devices. Broadly, in the IoT, verifying the credibility and truthfulness of MWs' sensing reports is needed for MWs to expect attractive rewards. MWs are recruited by paying monetary incentives that must be awarded according to the quality and quantity of the task. The main problem is that MWs may perform false reporting by sharing low-quality reported data to reduce the effort required. In the literature, false reporting is improved by hiring enough MWs for a task to evaluate the trustworthiness and acceptability of information by aggregating the submitted reports. However, it may not be possible due to budget constraints, or when malicious reporters are not identified and penalized properly. Recruitment is still not a refined process, which contributes to low sensing quality. This paper presents Reputation, Quality-aware Recruitment Platform (RQRP) to recruit MWs based on reputation for quality reporting with the intention of platform profit maximization in the IoT scenario. RQRP comprises two main phases: filtration in the selection of MWs and verifying the credibility of reported tasks. The former is focused on the selection of suitable MWs based on different criteria (e.g., reputation, bid, expected quality, and expected platform utility), while the latter is more concerned with the verification of sensing quality, evaluation of reputation score, and incentives. We developed a testbed to evaluate and analyze the datasets, and a simulation was performed for data collection scenario from smart sensing devices. Results proved the superiority of RQRP against its counterparts in terms of truthfulness, quality, and platform profit maximization. To the best of our knowledge, we are the first to study the impact of truthful reporting on platform utility.

4.
Sensors (Basel) ; 17(5)2017 May 03.
Artículo en Inglés | MEDLINE | ID: mdl-28467370

RESUMEN

As a promising paradigm, mobile crowdsensing exerts the potential of widespread sensors embedded in mobile devices. The greedy nature of workers brings the problem of low-quality sensing data, which poses threats to the overall performance of a crowdsensing system. Existing works often tackle this problem with additional function components. In this paper, we systematically formulate the problem into a crowdsensing interaction process between a requestor and a worker, which can be modeled by two types of iterated games with different strategy spaces. Considering that the low-quality data submitted by the workers can reduce the requestor's payoff and further decrease the global income, we turn to controlling the social welfare in the games. To that aim, we take advantage of zero-determinant strategy, based on which we propose two social welfare control mechanisms under both game models. Specifically, we consider the requestor as the controller of the games and, with proper parameter settings for the to-be-adopted zero-determinant strategy, social welfare can be optimized to the desired level no matter what strategy the worker adopts. Simulation results demonstrate that the requestor can achieve the maximized social welfare and keep it stable by using our proposed mechanisms.

5.
Sensors (Basel) ; 17(2)2017 Feb 10.
Artículo en Inglés | MEDLINE | ID: mdl-28208593

RESUMEN

In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user's contexts, based on which it provides personalized services. However, the application may sell the user's contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...