42 research outputs found

    The chromatin remodelling enzymes SNF2H and SNF2L position nucleosomes adjacent to CTCF and other transcription

    Get PDF
    Within the genomes of metazoans, nucleosomes are highly organised adjacent to the binding sites for a subset of transcription factors. Here we have sought to investigate which chromatin remodelling enzymes are responsible for this. We find that the ATP-dependent chromatin remodelling enzyme SNF2H plays a major role organising arrays of nucleosomes adjacent to the binding sites for the architectural transcription factor CTCF sites and acts to promote CTCF binding. At many other factor binding sites SNF2H and the related enzyme SNF2L contribute to nucleosome organisation. The action of SNF2H at CTCF sites is functionally important as depletion of CTCF or SNF2H affects transcription of a common group of genes. This suggests that chromatin remodelling ATPase's most closely related to the Drosophila ISWI protein contribute to the function of many human gene regulatory elements

    Neuroanatomical Abnormalities in Violent Individuals with and without a Diagnosis of Schizophrenia

    Get PDF
    Several structural brain abnormalities have been associated with aggression in patients with schizophrenia. However, little is known about shared and distinct abnormalities underlying aggression in these subjects and non-psychotic violent individuals. We applied a region-of interest volumetric analysis of the amygdala, hippocampus, and thalamus bilaterally, as well as whole brain and ventricular volumes to investigate violent (n = 37) and non-violent chronic patients (n = 26) with schizophrenia, non-psychotic violent (n = 24) as well as healthy control subjects (n = 24). Shared and distinct volumetric abnormalities were probed by analysis of variance with the factors violence (non-violent versus violent) and diagnosis (non-psychotic versus psychotic), adjusted for substance abuse, age, academic achievement and negative psychotic symptoms. Patients showed elevated vCSF volume, smaller left hippocampus and smaller left thalamus volumes. This was particularly the case for non-violent individuals diagnosed with schizophrenia. Furthermore, patients had reduction in right thalamus size. With regard to left amygdala, we found an interaction between violence and diagnosis. More specifically, we report a double dissociation with smaller amygdala size linked to violence in non-psychotic individuals, while for psychotic patients smaller size was linked to non-violence. Importantly, the double dissociation appeared to be mostly driven by substance abuse. Overall, we found widespread morphometric abnormalities in subcortical regions in schizophrenia. No evidence for shared volumetric abnormalities in individuals with a history of violence was found. Finally, left amygdala abnormalities in non-psychotic violent individuals were largely accounted for by substance abuse. This might be an indication that the association between amygdala reduction and violence is mediated by substance abuse. Our results indicate the importance of structural abnormalities in aggressive individuals

    Girls' disruptive behavior and its relationship to family functioning: A review

    Get PDF
    Although a number of reviews of gender differences in disruptive behavior and parental socialization exist, we extend this literature by addressing the question of differential development among girls and by placing both disruptive behavior and parenting behavior in a developmental framework. Clarifying the heterogeneity of development in girls is important for developing and optimizing gender-specific prevention and treatment programs. In the current review, we describe the unique aspects of the development of disruptive behavior in girls and explore how the gender-specific development of disruptive behavior can be explained by family linked risk and protective processes. Based on this review, we formulate a gender-specific reciprocal model of the influence of social factors on the development of disruptive behavior in girls in order to steer further research and better inform prevention and treatment programs

    A comparison of methods for temporal analysis of aoristic crime

    Get PDF
    Objectives: To test the accuracy of various methods previously proposed (and one new method) to estimate offence times where the actual time of the event is not known. Methods: For 303 thefts of pedal cycles from railway stations, the actual offence time was determined from closed-circuit television and the resulting temporal distribution compared against commonly-used estimated distributions using circular statistics and analysis of residuals. Results: Aoristic analysis and allocation of a random time to each offence allow accurate estimation of peak offence times. Commonly-used deterministic methods were found to be inaccurate and to produce misleading results. Conclusions: It is important that analysts use the most accurate methods for temporal distribution approximation to ensure any resource decisions made on the basis of peak times are reliable

    Security Enforcement in the DOK Federated Database System

    No full text
    The Distributed Object Kernel (DOK) is a federated database system currently under developmentat the Royal Melbourne Institute of Technology. One of the issues currently under study is the development of a federated access control, as well a secure logical architecture allowing the DOK system to enforce federated security policies in the context of autonomous, distributed and heterogeneous databases. In this paper, we propose a Unified Security Model aiming for the integration of existing access control models, such as Mandatory Access Control and Discretionary Access Control, which could have been imposed on local components of a DOK application. Also, we extend the initial DOK multi-layered architecture proposed in (Tari et al. 1996) to include different types of security agents allowing the enforcement of different security functions within a federated environment. Coordination agents are responsible for maintaining a federation in a secure state by delegating the different functions to..
    corecore