scispace - formally typeset
Search or ask a question
Institution

Manchester Metropolitan University

EducationManchester, Manchester, United Kingdom
About: Manchester Metropolitan University is a education organization based out in Manchester, Manchester, United Kingdom. It is known for research contribution in the topics: Population & Context (language use). The organization has 5435 authors who have published 16202 publications receiving 442561 citations. The organization is also known as: Manchester Polytechnic & MMU.


Papers
More filters
Journal ArticleDOI
TL;DR: Aged garlic extract and S-allylcysteine deserve more attention and should be investigated to see whether they can reduce AGEPs in vivo.
Abstract: Diabetes mellitus is a common endocrine disorder characterized by hyperglycemia and long-term complications affecting the eyes, nerves, blood vessels, skin, and kidneys. Increased glycation of proteins and accumulation of advanced glycation endproducts (AGEPs) have been implicated in the pathogenesis of diabetic complications. Glycation and AGEP formation are also accompanied by formation of free radicals via autoxidation of glucose and glycated proteins. Compounds with combined antiglycation and antioxidant properties may offer therapeutic potential. Recent studies suggest that aged garlic extract (AGE) inhibits formation of AGEPs in vitro and formation of glycation-derived free radicals. S-Allylcysteine, a key component of aged garlic, is a potent antioxidant and can inhibit AGEP formation. Aged garlic extract and S-allylcysteine deserve more attention and should be investigated to see whether they can reduce AGEPs in vivo.

141 citations

Journal ArticleDOI
TL;DR: In this paper, the authors explored observable oral participation (OOP) of customers at the front stage of the service delivery system within a retail store setting and proposed a process and structure of classification of OOP1 and OOP2 interactions.
Abstract: Explores observable oral participation (OOP) of customers at the front stage of the service delivery system within a retail store setting. Spoken interactions between a customer and a sales assistant are denoted as OOP1, and those between one customer and another as OOP2. The respective front stage roles of customers and sales assistants are examined through an analysis of the content of OOP1 and OOP2 as described by a large sample of customers of a particular store. A process and structure of classification of OOP1 and OOP2 interactions is described and proposed. Results show that, while overall patterns of OOP1 and OOP2 activities are significantly different, the proportion of products‐related interactions for each is very similar. OOP2 interactions were predominantly positive and there is evidence that, for some customers, product‐related conversations with other customers replace or reinforce those with sales assistants. Discusses the actual roles enacted by persons at the front stage in the context of the management of the service encounter.

141 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examine different forms of spiritual practice which seek to re-enchant the everyday and the ordinary by considering the duality of sacred and profane as the relational outcome of both embodied action and the action of other objects or things that are nominally valued as profane.
Abstract: In this paper I examine different forms of spiritual practice which seek to (re)enchant the everyday and the ordinary. By considering the duality of sacred and profane as the relational outcome of both embodied action and the action of other objects or things that are nominally valued as profane, an account is sought which acknowledges the corporeal enacting and sensing of the sacred both in and of the everyday. Taking empirical examples from New Age spiritual seekers, I trace the ways in which profane spatialities and temporalities are reconfigured into sacred topologies and how these seekers realise spiritual enlightenment through a reinhabited appropriation or articulation of the world. The source of signification of this spiritual comportment lies in embodied practices of the everyday that are sensed as the spiritually ‘correct’ or ‘true’ way of doing things. New ways of thinking everyday spiritual practice are thus sought and elaborated upon.

141 citations

Journal ArticleDOI
TL;DR: In this paper, the authors used the newly developed ARDL bounds testing procedure to find that U.S. saving and investment rates cointegrate in all sample periods considered, suggesting that the Feldstein-Horioka approach provides an at least partially informative measure of capital mobility.

140 citations

Journal ArticleDOI
TL;DR: A concrete construction in the key encapsulation mechanism setting based on Rouselakis and Waters (prime order) CP-ABE is designed, and security and extensive experimental analysis are presented to highlight the scalability and efficiency of the construction.
Abstract: As a sophisticated mechanism for secure fine-grained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising candidates for cloud computing applications. However, there exist two main long-lasting open problems of CP-ABE that may limit its wide deployment in commercial applications. One is that decryption yields expensive pairing cost which often grows with the increase of access policy size. The other is that one is granted access privilege for unlimited times as long as his attribute set satisfies the access policy of a given ciphertext. Such powerful access rights, which are provided by CP-ABE, may be undesirable in real-world applications (e.g., pay-as-you-use). To address the above drawbacks, in this paper, we propose a new notion called auditable $\sigma $ -time outsourced CP-ABE , which is believed to be applicable to cloud computing. In our notion, expensive pairing operation incurred by decryption is offloaded to cloud and meanwhile, the correctness of the operation can be audited efficiently. Moreover, the notion provides $\sigma $ -time fine-grained access control . The cloud service provider may limit a particular set of users to enjoy access privilege for at most $\sigma $ times within a specified period. As of independent interest, the notion also captures key-leakage resistance . The leakage of a user’s decryption key does not help a malicious third party in decrypting the ciphertexts belonging to the user. We design a concrete construction (satisfying our notion) in the key encapsulation mechanism setting based on Rouselakis and Waters (prime order) CP-ABE, and further present security and extensive experimental analysis to highlight the scalability and efficiency of our construction.

140 citations


Authors

Showing all 5608 results

NameH-indexPapersCitations
David T. Felson153861133514
João Carvalho126127877017
Andrew M. Jones10376437253
Michael C. Carroll10039934818
Mark Conner9837947672
Richard P. Bentall9443130580
Michael Wooldridge8754350675
Lina Badimon8668235774
Ian Parker8543228166
Kamaruzzaman Sopian8498925293
Keith Davids8460425038
Richard Baker8351422970
Joan Montaner8048922413
Stuart Robert Batten7832524097
Craig E. Banks7756927520
Network Information
Related Institutions (5)
University of Exeter
50.6K papers, 1.7M citations

93% related

University of Leeds
101.8K papers, 3.6M citations

93% related

University of Sheffield
102.9K papers, 3.9M citations

93% related

University of Manchester
168K papers, 6.4M citations

93% related

Cardiff University
82.6K papers, 3M citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202350
2022471
20211,600
20201,341
20191,110
20181,076