2,205 research outputs found

    Factors associated with uptake of influenza vaccine in people aged 50 to 64 years in Hong Kong: a case-control study.

    Get PDF
    BACKGROUND: In Hong Kong, people aged 50-64 years were added as a recommended priority group (recommended group) for influenza vaccination by the Department of Health (DH) starting from 2011/12 onwards. The coverage rate of influenza vaccination for this age group was suboptimal at 8.5 % in 2012/13. This study investigates the factors associated with the uptake of influenza vaccination among adults in Hong Kong aged 50-64 years. METHODS: A case-control study was conducted in communities by street intercept interviews from 17 July to 15 August 2013. Cases were adults aged 50-64 years who had received the influenza vaccine in 2011/12 or 2012/13, while controls were the same as the cases, except they had not received the influenza vaccine in 2011/12 or 2012/13. Multiple logistic regression analysis was performed on the data to explore the associations between vaccination status and the variables. RESULTS: Six hundred and four respondents in total were interviewed and included in the analysis. There were 193 cases (vaccinated) and 411 controls (non-vaccinated), with a case-to-control ratio of 1:2.1. The following were strongly associated with vaccination compared to other factors: 'eligible for free government vaccine' (OR6.38, 95 % CI, 3.43-11.87, p 80 %) were willing to be vaccinated if it was free. CONCLUSIONS: Factors related to free and convenient vaccination, the perception of the severity of symptoms when contracting influenza had a comparatively strong association with influenza vaccination uptake amongst 50-64 year olds, compared to other factors

    Epstein-barr virus-encoded latent membrane protein 1 impairs G2 checkpoint in human nasopharyngeal epithelial cells through defective Chk1 activation

    Get PDF
    Nasopharyngeal carcinoma (NPC) is a common cancer in Southeast Asia, particularly in southern regions of China. EBV infection is closely associated with NPC and has long been postulated to play an etiological role in the development of NPC. However, the role of EBV in malignant transformation of nasopharyngeal epithelial cells remains enigmatic. The current hypothesis of NPC development is that premalignant nasopharyngeal epithelial cells harboring genetic alterations support EBV infection and expression of EBV genes induces further genomic instability to facilitate the development of NPC. The latent membrane protein 1 (LMP1) is a well-documented EBV-encoded oncogene. The involvement of LMP1 in human epithelial malignancies has been implicated, but the mechanisms of oncogenic actions of LMP1, particularly in nasopharyngeal cells, are unclear. Here we observed that LMP1 expression in nasopharyngeal epithelial cells impaired G2 checkpoint, leading to formation of unrepaired chromatid breaks in metaphases after γ-ray irradiation. We further found that defective Chk1 activation was involved in the induction of G2 checkpoint defect in LMP1-expressing nasopharyngeal epithelial cells. Impairment of G2 checkpoint could result in loss of the acentrically broken chromatids and propagation of broken centric chromatids in daughter cells exiting mitosis, which facilitates chromosome instability. Our findings suggest that LMP1 expression facilitates genomic instability in cells under genotoxic stress. Elucidation of the mechanisms involved in LMP1-induced genomic instability in nasopharyngeal epithelial cells will shed lights on the understanding of role of EBV infection in NPC development. © 2012 Deng et al.published_or_final_versio

    Effect of a qigong intervention program on telomerase activity and psychological stress in abused Chinese women: a randomized, wait-list controlled trial

    Get PDF
    BACKGROUND: Abused women, who suffer from chronic psychological stress, have been shown to have shorter telomeres than never abused women. Telomere shortening is associated with increased risk of cell death, and it is believed that adopting health-promoting behaviors can help to increase the activity of telomerase, an enzyme that counters telomere shortening. Qigong is an ancient Chinese mind-body integration, health-oriented practice designed to enhance the function of qi, an energy that sustains well-being. Therefore, an assessor-blind, randomized, wait-list controlled trial was developed to evaluate the effect of a qigong intervention on telomerase activity (primary objective) and proinflammatory cytokines, perceived stress, perceived coping, and depressive symptoms (secondary objectives) in abused Chinese women. METHODS/DESIGN: A total of 240 Chinese women, aged >/= 18 years, who have been abused by an intimate partner within the past three years will be recruited from a community setting in Hong Kong and randomized to receive either a qigong intervention or wait-list control condition as follows: the qigong intervention will comprise (i) a 2-hour group qigong training session twice a week for 6 weeks, (ii) a 1-hour follow-up group qigong exercise session once a week for 4 months, and (iii) a 30-minute self-practice qigong exercise session once a day for 5.5 months. The wait-list control group will receive qigong training after the intervention group completes the program. Upon completion of the qigong intervention program, it is expected that abused Chinese women in the intervention group will have higher levels of telomerase activity and perceived coping and lower levels of proinflammatory cytokines, perceived stress, and depressive symptoms than will abused Chinese women in the wait-list control group. DISCUSSION: This study will provide information about the effect of qigong exercise on telomerase activity and chronic psychological stress in abused Chinese women. The findings will inform the design of interventions to relieve the effects of IPV-related psychological stress on health. Also, the concept that health-promoting behaviors could slow down cellular aging might even motivate abused women to change their lifestyles. TRIAL REGISTRATION: Current Controlled Trials NCT02060123. Registered February 6, 2014.published_or_final_versio

    A simple approach to counterterms in N=8 supergravity

    Get PDF
    We present a simple systematic method to study candidate counterterms in N=8 supergravity. Complicated details of the counterterm operators are avoided because we work with the on-shell matrix elements they produce. All n-point matrix elements of an independent SUSY invariant operator of the form D^{2k} R^n +... must be local and satisfy SUSY Ward identities. These are strong constraints, and we test directly whether or not matrix elements with these properties can be constructed. If not, then the operator does not have a supersymmetrization, and it is excluded as a potential counterterm. For n>4, we find that R^n, D^2 R^n, D^4 R^n, and D^6 R^n are excluded as counterterms of MHV amplitudes, while only R^n and D^2 R^n are excluded at the NMHV level. As a consequence, for loop order L<7, there are no independent D^{2k}R^n counterterms with n>4. If an operator is not ruled out, our method constructs an explicit superamplitude for its matrix elements. This is done for the 7-loop D^4 R^6 operator at the NMHV level and in other cases. We also initiate the study of counterterms without leading pure-graviton matrix elements, which can occur beyond the MHV level. The landscape of excluded/allowed candidate counterterms is summarized in a colorful chart.Comment: 25 pages, 1 figure, published versio

    The Worldvolume Action of Kink Solitons in AdS Spacetime

    Full text link
    A formalism is presented for computing the higher-order corrections to the worldvolume action of co-dimension one solitons. By modifying its potential, an explicit "kink" solution of a real scalar field in AdS spacetime is found. The formalism is then applied to explicitly compute the kink worldvolume action to quadratic order in two expansion parameters--associated with the hypersurface fluctuation length and the radius of AdS spacetime respectively. Two alternative methods are given for doing this. The results are expressed in terms of the trace of the extrinsic curvature and the intrinsic scalar curvature. In addition to conformal Galileon interactions, we find a non-Galileon term which is never sub-dominant. This method can be extended to any conformally flat bulk spacetime.Comment: 32 pages, 3 figures, typos corrected and additional comments adde

    Superconformal symmetry and maximal supergravity in various dimensions

    Full text link
    In this paper we explore the relation between conformal superalgebras with 64 supercharges and maximal supergravity theories in three, four and six dimensions using twistorial oscillator techniques. The massless fields of N=8 supergravity in four dimensions were shown to fit into a CPT-self-conjugate doubleton supermultiplet of the conformal superalgebra SU(2,2|8) a long time ago. We show that the fields of maximal supergravity in three dimensions can similarly be fitted into the super singleton multiplet of the conformal superalgebra OSp(16|4,R), which is related to the doubleton supermultiplet of SU(2,2|8) by dimensional reduction. Moreover, we construct the ultra-short supermultiplet of the six-dimensional conformal superalgebra OSp(8*|8) and show that its component fields can be organized in an on-shell superfield. The ultra-short OSp(8*|8) multiplet reduces to the doubleton supermultiplet of SU(2,2|8) upon dimensional reduction. We discuss the possibility of a chiral maximal (4,0) six-dimensional supergravity theory with USp(8) R-symmetry that reduces to maximal supergravity in four dimensions and is different from six-dimensional (2,2) maximal supergravity, whose fields cannot be fitted into a unitary supermultiplet of a simple conformal superalgebra. Such an interacting theory would be the gravitational analog of the (2,0) theory.Comment: 54 pages, PDFLaTeX, Section 5 and several references added. Version accepted for publication in JHE

    The S-Matrix in Twistor Space

    Get PDF
    The simplicity and hidden symmetries of (Super) Yang-Mills and (Super)Gravity scattering amplitudes suggest the existence of a "weak-weak" dual formulation in which these structures are made manifest at the expense of manifest locality. We suggest that this dual description lives in (2,2) signature and is naturally formulated in twistor space. We recast the BCFW recursion relations in an on-shell form that begs to be transformed into twistor space. Our twistor transformation is inspired by Witten's, but differs in treating twistor and dual twistor variables more equally. In these variables the three and four-point amplitudes are amazingly simple; the BCFW relations are represented by diagrammatic rules that precisely define the "twistor diagrams" of Andrew Hodges. The "Hodges diagrams" for Yang-Mills theory are disks and not trees; they reveal striking connections between amplitudes and suggest a new form for them in momentum space. We also obtain a twistorial formulation of gravity. All tree amplitudes can be combined into an "S-Matrix" functional which is the natural holographic observable in asymptotically flat space; the BCFW formula turns into a quadratic equation for this "S-Matrix", providing a holographic description of N=4 SYM and N=8 Supergravity at tree level. We explore loop amplitudes in (2,2) signature and twistor space, beginning with a discussion of IR behavior. We find that the natural pole prescription renders the amplitudes well-defined and free of IR divergences. Loop amplitudes vanish for generic momenta, and in twistor space are even simpler than their tree-level counterparts! This further supports the idea that there exists a sharply defined object corresponding to the S-Matrix in (2,2) signature, computed by a dual theory naturally living in twistor space.Comment: V1: 46 pages + 23 figures. Less telegraphic abstract in the body of the paper. V2: 49 pages + 24 figures. Largely expanded set of references included. Some diagrammatic clarifications added, minor typo fixe

    Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

    Get PDF
    In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online detection on any DDoS attack event, and then react with defense mechanisms to mitigate the attack. The testbed is built up by a cluster of sufficient number of Linux machines to mimic a portion of the Internet. Using the testbed, we conduct real experiments to evaluate the IDR system and demonstrate that IDR is effective in protecting the network from various DDoS attacks. © 2006 IEEE.published_or_final_versio
    corecore