SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Sun Yanfei) "

Search: WFRF:(Sun Yanfei)

  • Result 1-6 of 6
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Guo, Yanfei, 1984, et al. (author)
  • Frailty trajectories in people aged 50 years and above in China
  • 2022
  • In: Zhonghua liu xing bing xue za zhi = Zhonghua liuxingbingxue zazhi. - 0254-6450. ; 43:11, s. 1711-1716
  • Journal article (peer-reviewed)abstract
    • 目的: 识别中国≥50岁人群的衰弱轨迹,并探索相关影响因素。 方法: 采用WHO“全球老龄化与成人健康研究”(SAGE)中国项目第一至第三轮纵向数据,由32种变量计算衰弱指数得分,并在此基础上在组基轨迹模型中采用删失正态模型确定随时间变化的衰弱轨迹模式,采用多项式logistic回归模型研究社会经济地位和行为影响因素对衰弱轨迹的影响。 结果: 共纳入4 303名≥50岁且拥有3轮完整数据的调查对象进入分析,本研究识别出3条衰弱轨迹:低水平稳定轨迹(LT)、中度增加轨迹(MT)和高度增加轨迹(HT),分别占所有调查对象的75.9%,19.1%和5.0%。多项式logistic回归分析的结果显示,与LT组相比,HT组更倾向是女性(OR=1.88,95%CI:1.22~2.92)和农村居民(OR=1.87,95%CI:1.29~2.70)。在家庭人均财富方面,OR值有一个明显的梯度,较低的家庭财富更有可能归为HT组。 结论: 本研究识别出了3种我国≥50岁人群衰弱轨迹的进展模式,并强调了干预措施应尽可能地以那些衰弱进展快速的脆弱人群为目标。. Objective: To identify distinct frailty trajectories in a cohort of nationwide community adults aged 50 years and above, and explore the relationship between frailty trajectories and their socioeconomic characteristics and behavioral factors at baseline survey. Methods: Data were from the three waves of "Global Ageing and Adult Health Research" (SAGE) by World Health Organization in China. The frailty index is generated from 32 items. Group-based trajectory modeling using a censored normal model was conducted to identify the patterns in frailty progression over time. Multinomial logistic regression model was used to examine the effect of socioeconomic status and behavioral factors on the frailty trajectories. Results: A total of 4 303 adults aged 50 years and above with complete data from all three rounds of project were included in the final analysis. Three frailty trajectories were identified: low and stable trajectory (LT) (56.8%), moderately increased trajectory (MT) (34.4%) and highly increased trajectory (HT) (8.8%). The results of the multinomial logistic regression analysis showed that the HT group was more likely to be women (OR=1.88, 95%CI:1.22-2.92) and rural residents (OR=1.87, 95%CI:1.29-2.70) compared with the LT group. In terms of household wealth per capita, there was a clear gradient in ORs, the people with lower household wealth were more likely to be classified in the HT group. Conclusion: This study identified three patterns of progression of frailty trajectories in population aged 50 years and above in China and highlighted that interventions should target those vulnerable populations with rapid progression of frailty.
  •  
2.
  • Qin, F., et al. (author)
  • Frailty and risk of adverse outcomes among community-dwelling older adults in China: a comparison of four different frailty scales
  • 2023
  • In: Frontiers In Public Health. - 2296-2565. ; 11
  • Journal article (peer-reviewed)abstract
    • BackgroundData on which frailty scales are most suitable for estimating risk in Chinese community populations remain limited. Herein we examined and compared four commonly used frailty scales in predicting adverse outcomes in a large population-based cohort of Chinese older adults. MethodsA total of 5402 subjects (mean age 66.3 +/- 9.6 years, 46.6% male) from the WHO Study on global AGEing and adult health (SAGE) in Shanghai were studied. Frailty was measured using a 35-item frailty index (FI), the frailty phenotype (FP), FRAIL, and Tilburg Frailty Indicator (TFI). Multivariate logistic regression models were performed to evaluate the independent association between frailty and outcomes including 4-year disability, hospitalization, and 4- and 7-year all-cause mortality. The accuracy for predicting these outcomes was determined by evaluating the area under the curve (AUC). The prevalence of frailty, sensitivity, and specificity were calculated using our proposed cut-off points and other different values. ResultsPrevalence of frailty ranged from 4.2% (FRAIL) to 16.9% (FI). FI, FRAIL and TFI were comparably associated with 4-year hospitalization, and 4- and 7-year mortality (adjusted odds ratios [aORs] 1.44-1.69, 1.91-2.22 and 1.85-2.88, respectively). FRAIL conferred the greatest risk of 4-year disability, followed by FI and TFI (aOR 5.55, 3.50, and 1.91, respectively). FP only independently predicted 4- and 7-year mortality (aOR 1.57 and 2.21, respectively). AUC comparisons showed that FI, followed by TFI and FRAIL, exhibited acceptable predictive accuracy for 4-year disability, 4- and 7-year mortality (AUCs 0.76-0.78, 0.71-0.71, 0.65-0.72, respectively), whereas all scales poorly predicted 4-year hospitalization (AUCs 0.53-0.57). For each scale, while specificity estimates (85.3-97.3%) were high and similar across all outcomes, their sensitivity estimates (6.3-56.8%) were not sufficient yet. Prevalence of frailty, sensitivity, and specificity varied considerably when different cut-off points were used. ConclusionFrailty defined using any of the four scales was associated with an increased risk of adverse outcomes. Although FI, FRAIL and TFI exhibited fair-to-moderate predictive accuracy and high specificity estimates, their sensitivity estimates were not sufficient yet. Overall, FI performed best in estimating risk, while TFI and FRAIL were additionally useful, the latter perhaps being more applicable to Chinese community-dwelling older adults.
  •  
3.
  • Wang, Kun, et al. (author)
  • Attack Detection and Distributed Forensics in Machine-to-Machine Networks
  • 2016
  • In: IEEE Network. - Piscataway, NJ : IEEE. - 0890-8044 .- 1558-156X. ; 30:6, s. 49-55
  • Journal article (peer-reviewed)abstract
    • The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honeypot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.
  •  
4.
  • Wang, Kun, et al. (author)
  • Distributed Energy Management for Vehicle-to-Grid Networks
  • 2017
  • In: IEEE Network. - Piscataway, NJ : IEEE. - 0890-8044 .- 1558-156X. ; 31:2, s. 22-28
  • Journal article (peer-reviewed)abstract
    • Making full use of V2G services, EVs with batteries may assist the smart grid in alleviating peaks of energy consumption. Aiming to develop a systematic understanding of the interplay between smart grid and EVs, an architecture for the V2G networks with the EV aggregator is designed to maintain the balance between energy suppliers (the grid side) and consumers (the EV side). We propose a combined control and communication approach considering distributed features and vehicle preferences in order to ensure efficient energy transfer. In our model, the integrated communication and control unit can achieve realtime and intelligent management with the logic controller and collected data. On the consumers' side, we theoretically analyze how to satisfy the charging constraints that we incorporate in the form of willingness to pay, and propose a distributed framework to coordinate the energy delivery behaviors for satisfying service demands. Moreover, illustrative results indicate that the proposed approach can yield higher revenue than the conventional pricing mechanism in V2G networks.
  •  
5.
  • Wang, Kun, et al. (author)
  • Wireless Big Data Computing in Smart Grid
  • 2017
  • In: IEEE wireless communications. - Piscataway, NJ : IEEE Press. - 1536-1284 .- 1558-0687. ; 24:2, s. 58-64
  • Journal article (peer-reviewed)abstract
    • The development of smart grid brings great improvement in the efficiency, reliability, and economics to power grid. However, at the same time, the volume and complexity of data in the grid explode. To address this challenge, big data technology is a strong candidate for the analysis and processing of smart grid data. In this article, we propose a big data computing architecture for smart grid analytics, which involves data resources, transmission, storage, and analysis. In order to enable big data computing in smart grid, a communication architecture is then described consisting of four main domains. Key technologies to enable big-data-aware wireless communication for smart grid are investigated. As a case study of the proposed architecture, we introduce a big-data- enabled storage planning scheme based on wireless big data computing. A hybrid approach is adopted for the optimization including GA for storage planning and a game theoretic inner optimization for daily energy scheduling. Simulation results indicate that the proposed storage planning scheme greatly reduce.
  •  
6.
  • Wei, Yanfei, et al. (author)
  • Stalled oligodendrocyte differentiation in IDH-mutant gliomas.
  • 2023
  • In: Genome medicine. - 1756-994X. ; 15:1
  • Journal article (peer-reviewed)abstract
    • Roughly 50% of adult gliomas harbor isocitrate dehydrogenase (IDH) mutations. According to the 2021 WHO classification guideline, these gliomas are diagnosed as astrocytomas, harboring no 1p19q co-deletion, or oligodendrogliomas, harboring 1p19q co-deletion. Recent studies report that IDH-mutant gliomas share a common developmental hierarchy. However, the neural lineages and differentiation stages in IDH-mutant gliomas remain inadequately characterized.Using bulk transcriptomes and single-cell transcriptomes, we identified genes enriched in IDH-mutant gliomas with or without 1p19q co-deletion, we also assessed the expression pattern of stage-specific signatures and key regulators of oligodendrocyte lineage differentiation. We compared the expression of oligodendrocyte lineage stage-specific markers between quiescent and proliferating malignant single cells. The gene expression profiles were validated using RNAscope analysis and myelin staining and were further substantiated using data of DNA methylation and single-cell ATAC-seq. As a control, we assessed the expression pattern of astrocyte lineage markers.Genes concordantly enriched in both subtypes of IDH-mutant gliomas are upregulated in oligodendrocyte progenitor cells (OPC). Signatures of early stages of oligodendrocyte lineage and key regulators of OPC specification and maintenance are enriched in all IDH-mutant gliomas. In contrast, signature of myelin-forming oligodendrocytes, myelination regulators, and myelin components are significantly down-regulated or absent in IDH-mutant gliomas. Further, single-cell transcriptomes of IDH-mutant gliomas are similar to OPC and differentiation-committed oligodendrocyte progenitors, but not to myelinating oligodendrocyte. Most IDH-mutant glioma cells are quiescent; quiescent cells and proliferating cells resemble the same differentiation stage of oligodendrocyte lineage. Mirroring the gene expression profiles along the oligodendrocyte lineage, analyses of DNA methylation and single-cell ATAC-seq data demonstrate that genes of myelination regulators and myelin components are hypermethylated and show inaccessible chromatin status, whereas regulators of OPC specification and maintenance are hypomethylated and show open chromatin status. Markers of astrocyte precursors are not enriched in IDH-mutant gliomas.Our studies show that despite differences in clinical manifestation and genomic alterations, all IDH-mutant gliomas resemble early stages of oligodendrocyte lineage and are stalled in oligodendrocyte differentiation due to blocked myelination program. These findings provide a framework to accommodate biological features and therapy development for IDH-mutant gliomas.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-6 of 6

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view