997 resultados para Maithilisharan Gupta


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Non-fatal health outcomes from diseases and injuries are a crucial consideration in the promotion and monitoring of individual and population health. The Global Burden of Disease (GBD) studies done in 1990 and 2000 have been the only studies to quantify non-fatal health outcomes across an exhaustive set of disorders at the global and regional level. Neither effort quantified uncertainty in prevalence or years lived with disability (YLDs). Methods Of the 291 diseases and injuries in the GBD cause list, 289 cause disability. For 1160 sequelae of the 289 diseases and injuries, we undertook a systematic analysis of prevalence, incidence, remission, duration, and excess mortality. Sources included published studies, case notification, population-based cancer registries, other disease registries, antenatal clinic serosurveillance, hospital discharge data, ambulatory care data, household surveys, other surveys, and cohort studies. For most sequelae, we used a Bayesian meta-regression method, DisMod-MR, designed to address key limitations in descriptive epidemiological data, including missing data, inconsistency, and large methodological variation between data sources. For some disorders, we used natural history models, geospatial models, back-calculation models (models calculating incidence from population mortality rates and case fatality), or registration completeness models (models adjusting for incomplete registration with health-system access and other covariates). Disability weights for 220 unique health states were used to capture the severity of health loss. YLDs by cause at age, sex, country, and year levels were adjusted for comorbidity with simulation methods. We included uncertainty estimates at all stages of the analysis. Findings Global prevalence for all ages combined in 2010 across the 1160 sequelae ranged from fewer than one case per 1 million people to 350 000 cases per 1 million people. Prevalence and severity of health loss were weakly correlated (correlation coefficient −0·37). In 2010, there were 777 million YLDs from all causes, up from 583 million in 1990. The main contributors to global YLDs were mental and behavioural disorders, musculoskeletal disorders, and diabetes or endocrine diseases. The leading specific causes of YLDs were much the same in 2010 as they were in 1990: low back pain, major depressive disorder, iron-deficiency anaemia, neck pain, chronic obstructive pulmonary disease, anxiety disorders, migraine, diabetes, and falls. Age-specific prevalence of YLDs increased with age in all regions and has decreased slightly from 1990 to 2010. Regional patterns of the leading causes of YLDs were more similar compared with years of life lost due to premature mortality. Neglected tropical diseases, HIV/AIDS, tuberculosis, malaria, and anaemia were important causes of YLDs in sub-Saharan Africa. Interpretation Rates of YLDs per 100 000 people have remained largely constant over time but rise steadily with age. Population growth and ageing have increased YLD numbers and crude rates over the past two decades. Prevalences of the most common causes of YLDs, such as mental and behavioural disorders and musculoskeletal disorders, have not decreased. Health systems will need to address the needs of the rising numbers of individuals with a range of disorders that largely cause disability but not mortality. Quantification of the burden of non-fatal health outcomes will be crucial to understand how well health systems are responding to these challenges. Effective and affordable strategies to deal with this rising burden are an urgent priority for health systems in most parts of the world. Funding Bill & Melinda Gates Foundation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The convergence of corporate social responsibility and corporate governance has changed the mechanism of corporate accountability, which has developed "corporate self-regulation...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New governance (NG) denotes a new approach in the governance strategies. This approach comes with a conceptual background explaining how the hardcore corporate decision-making and people-friendly business strategies have started to converge, relying on executive fiduciary duties, stakeholder engagement, and economic analysis of management incentives. It also addresses how companies incorporate stakeholder-friendly business strategies, examines the role of shareholder and board activism in pushing for social responsibility, and provides quantitative assessments of reporting practices, indexes, and ratings that link governance with responsibility (Kolk 2008; Statman 2005; Deegan 2002). It suggests models for pursuing this emerging frontier through greater involvement on behalf of the board of directors and utilizes a comparative approach to cross the border between the traditional ...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

CSR is increasingly an essential issue for business enterprises. It is a company and multidimensional organizational ...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work presents a collision avoidance approach based on omnidirectional cameras that does not require the estimation of range between two platforms to resolve a collision encounter. Our method achieves minimum separation between the two vehicles involved by maximising the view-angle given by the omnidirectional sensor. Only visual information is used to achieve avoidance under a bearing- only visual servoing approach. We provide theoretical problem formulation, as well as results from real flights using small quadrotors

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Professor Christine Parker is a leading author in the field of legal regulation, governance, and professional ethics. She did her Bachelor of Arts with First Class Honors in 1991 and Bachelor of Laws with First Class Honors in 1992 in the University of Queensland. In 1997, she finished her doctoral dissertation and earned her Ph.D. from Australian National University.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraine with aura is a common, debilitating, recurrent headache disorder associated with transient and reversible focal neurological symptoms. A role has been suggested for the two-pore domain (K2P) potassium channel, TWIK-related spinal cord potassium channel (TRESK, encoded by KCNK18), in pain pathways and general anaesthesia. We therefore examined whether TRESK is involved in migraine by screening the KCNK18 gene in subjects diagnosed with migraine. Here we report a frameshift mutation, F139WfsX24, which segregates perfectly with typical migraine with aura in a large pedigree. We also identified prominent TRESK expression in migraine-salient areas such as the trigeminal ganglion. Functional characterization of this mutation demonstrates that it causes a complete loss of TRESK function and that the mutant subunit suppresses wild-type channel function through a dominant-negative effect, thus explaining the dominant penetrance of this allele. These results therefore support a role for TRESK in the pathogenesis of typical migraine with aura and further support the role of this channel as a potential therapeutic target.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numerous studies have reported associations between IGF-I and other extra cellular matrix (ECM) proteins, including fibronectin (FN), integrins, IGF-binding proteins (IGFBPs) and through IGFBPs, with vitronectin (VN). Nevertheless, the precise nature and mechanisms of these interactions are still being characterised. In this paper, we discuss transglutaminases (TGases) as a constituent of the ECM and provide evidence for the first time that IGF-I is a lysine (K)-donor substrate to TGases. When IGF-I was incubated with an alpha-2 plasmin inhibitor-derived Q peptide in the presence of tissue transglutaminase (TG2), an IGF-I:Q peptide cross-linked species was detected using Western immunoblotting and confirmed by mass spectrometry. Similar findings were observed in the presence of Factor XIIIa (FXIIIa) TGase. To identify the precise location of this K-donor TGase site/s on IGF-I, all the three IGF-I K-sites, individually and collectively (K27, K65 and K68), were substituted to arginine (R) using site-directed mutagenesis. Incubation of these K→R IGF-I analogues with Q peptide in the presence of TG2 or FXIIIa resulted in the absence of cross-linking in IGF-I analogues bearing arginine substitution at site 68. This established that K68 within the IGF-I D-domain was the principal K-donor site to TGases. We further annotated the functional significance of these K→R IGF-I analogues on IGF-I mediated actions. IGF-I analogues with K→R substitution within the D-domain at K65 and K68 hindered migration of MCF-7 breast carcinoma cells and correspondingly reduced PI3-K/AKT activation. Therefore, this study also provides first insights into a possible functional role of the previously uncharacterised IGF-I D-domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growth of graphene on SiC/Si substrates is an appealing alternative to the growth on bulk SiC for cost reduction and to better integrate the material with Si based electronic devices. In this paper, we present a complete in-situ study of the growth of epitaxial graphene on 3C SiC (111)/Si (111) substrates via high temperature annealing (ranging from 1125˚C to 1375˚C) in ultra high vacuum (UHV). The quality and number of graphene layers have been thoroughly investigated by using x-ray photoelectron spectroscopy (XPS), while the surface characterization have been studied by scanning tunnelling microscopy (STM). Ex-situ Raman spectroscopy measurements confirm our findings, which demonstrate the exponential dependence of the number of graphene layer from the annealing temperature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors, and network authorities to fight phishing. At the forefront of this resilience are consortiums such as APWG (Anti-Phishing Working Group) and PhishTank, the latter being a collaborative platform where everyone can submit potentially phishing web-pages and classify web-pages as either phish or genuine. PhishTank also has an API that the browsers use to notify users when she tries to load a phishing page. There are some organizations and individuals who are very active and highly accurate in classifying web-pages on PhishTank. In this paper, we propose a defense model that uses these experts to fight phishing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.