Learn More
BACKGROUND & OBJECTIVE A-463 bp G/A polymorphism is located in the promoter region of myeloperoxidase (MPO) gene was found to be associated with lung cancer susceptibility; however, this association in Chinese population remained unclear. The aim of this study was designed to explore this association in Chinese population. METHODS MPO genotypes in 98(More)
Objective Evidence from pivotal clinical trials conducted more than a decade ago supports the use of antithrombotic therapy, particularly warfarin, for stroke prevention in atrial fibrillation (AF). Despite the wide dissemination of this evidence since that time, there is anecdotal evidence that utilisation of therapy remains suboptimal, especially in the(More)
BACKGROUND & OBJECTIVE Nucleotide excision repair is an important pathway for cellular DNA damage repair. The drug resistance of tumor cell is often companied with the enhanced expression of DNA repair genes. Down-regulation of DNA repair capacity by antisense strategy can increase the drug sensitivity of tumor cells. The aim of this study was to construct(More)
Animal models and clinical studies suggest a mechanistic link between the pneumococcal polysaccharide vaccine (PPV) and a cardiovascular protective effect. However, conflicting results exist from several large observational studies in humans. We set out to systematically review current literature and conduct meta-analyses of studies on PPV and(More)
This paper proposes an enhanced privacypreserving data aggregation scheme, which balances the onerous task of extracting reasonable data value and preserving data privacy even with incomplete or malicious data presentence. We propose an innovative encryption algorithm to preserve data privacy while it can provide secure data comparison between the encrypted(More)
Enterprise cloud tenants would store their outsourced cloud data in encrypted form for data privacy and security. However, flexible data access functions such as data searching is usually sacrificed as a result. Thus, enterprise tenants demand secure data retrieval and computation solution from the cloud provider, which will allow them to utilize cloud(More)
Private database query (PDQ) processing has received much attention from the fields of both cryptography and databases. While previous approaches to design PDQ protocols exploit several cryptographic tools concurrently, recently the appearance of fully homomorphic encryption (FHE) schemes enables us to design PDQ protocols without the aid of additional(More)