Learn More
The cluster of differentiation 24 (CD24) Ala57Val polymorphism has been implicated as a risk factor for multiple sclerosis (MS) and systemic lupus erythematosus (SLE); however, genetic studies have produced controversial results. A meta-analysis was performed on this topic. We used odds ratio (OR) and 95% confidence interval (95% CI) to investigate the(More)
There are several major pathological changes in Alzheimer's disease, including apoptosis of cholinergic neurons, overactivity or overexpression of β-site amyloid precursor protein cleaving enzyme 1 (BACE1) and inflammation. In this study, we synthesized a 19-nt oligonucleotide targeting BACE1, the key enzyme in amyloid beta protein (Aβ) production, and(More)
BACKGROUND Vitamin D is an import regulator of T helper 17 (Th17) differentiation, but our understanding of the underlying mechanisms remains limited. In the present study, we aimed to detect the expression levels of microRNAs (miRNAs) during human Th17 differentiation and evaluate the effects of 1,25-dihydroxyvitamin D3 (1,25(OH)2D3), the bioactive form of(More)
PURPOSE Polymorphisms in the genes encoding interleukin-23 receptor (IL23R) and the p40 subunit of IL-12/23 (IL12B) have been implicated in multiple sclerosis (MS) risk. However, results of different studies are inconsistent. Our aim was to perform a meta-analysis on this topic. METHODS We assessed two variants (rs10889677 and rs7517847) of IL23R and the(More)
Collaborations among different organizations produce mas-sive amounts of data which are increasingly stored in distributed file systems such as HDFS. Although systems, such as HDFS, are designed to manage different kinds of data, there are still challenges in processing oceans of data from local and remote nodes efficiently, especially dealing with data(More)
With the continuous growth of modern datacenter networks in recent years, network intrusions targeting those datacenters have also been growing rapidly. In this situation, system monitoring and intrusion detection become essential to control the risks of such networks. There are many network anomaly detection systems being used to identify significant(More)
  • 1