29 research outputs found

    Cyberspace: A Venue for Terrorism

    Get PDF
    This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace

    Common fragile sites are characterized by histone hypoacetylation

    Get PDF
    Common fragile sites (CFSs) represent large, highly unstable regions of the human genome. CFS sequences are sensitive to perturbation of replication; however, the molecular basis for the instability at CFSs is poorly understood. We hypothesized that a unique epigenetic pattern may underlie the unusual sensitivity of CFSs to replication interference. To examine this hypothesis, we analyzed chromatin modification patterns within the six human CFSs with the highest levels of breakage, and their surrounding non-fragile regions (NCFSs). Chromatin at most of the CFSs analyzed has significantly less histone acetylation than that of their surrounding NCFSs. Trichostatin A and/or 5-azadeoxycytidine treatment reduced chromosome breakage at CFSs. Furthermore, chromatin at the most commonly expressed CFS, the FRA3B, is more resistant to micrococcal nuclease than that of the flanking non-fragile sequences. These results demonstrate that histone hypoacetylation is a characteristic epigenetic pattern of CFSs, and chromatin within CFSs might be relatively more compact than that of the NCFSs, indicating a role for chromatin conformation in genomic instability at CFSs. Moreover, lack of histone acetylation at CFSs may contribute to the defective response to replication stress characteristic of CFSs, leading to the genetic instability characteristic of this regions

    Primary sequence and epigenetic determinants of in vivo occupancy of genomic DNA by GATA1

    Get PDF
    DNA sequence motifs and epigenetic modifications contribute to specific binding by a transcription factor, but the extent to which each feature determines occupancy in vivo is poorly understood. We addressed this question in erythroid cells by identifying DNA segments occupied by GATA1 and measuring the level of trimethylation of histone H3 lysine 27 (H3K27me3) and monomethylation of H3 lysine 4 (H3K4me1) along a 66 Mb region of mouse chromosome 7. While 91% of the GATA1-occupied segments contain the consensus binding-site motif WGATAR, only ∼0.7% of DNA segments with such a motif are occupied. Using a discriminative motif enumeration method, we identified additional motifs predictive of occupancy given the presence of WGATAR. The specific motif variant AGATAA and occurrence of multiple WGATAR motifs are both strong discriminators. Combining motifs to pair a WGATAR motif with a binding site motif for GATA1, EKLF or SP1 improves discriminative power. Epigenetic modifications are also strong determinants, with the factor-bound segments highly enriched for H3K4me1 and depleted of H3K27me3. Combining primary sequence and epigenetic determinants captures 52% of the GATA1-occupied DNA segments and substantially increases the specificity, to one out of seven segments with the required motif combination and epigenetic signals being bound

    c- and N-myc Regulate Neural Precursor Cell Fate, Cell Cycle, and Metabolism to Direct Cerebellar Development

    Get PDF
    Separate murine knockout (KO) of either c- or N-myc genes in neural stem and precursor cells (NSC) driven by nestin-cre causes microcephaly. The cerebellum is particularly affected in the N-myc KO, leading to a strong reduction in cerebellar granule neural progenitors (CGNP) and mature granule neurons. In humans, mutation of N-myc also causes microcephaly in Feingold Syndrome. We created a double KO (DKO) of c- and N-myc using nestin-cre, which strongly impairs brain growth, particularly that of the cerebellum. Granule neurons were almost absent from the Myc DKO cerebellum, and other cell types were relatively overrepresented, including astroglia, oligodendrocytes, and Purkinje neurons. These findings are indicative of a profound disruption of cell fate of cerebellar stem and precursors. DKO Purkinje neurons were strikingly lacking in normal arborization. Inhibitory neurons were ectopic and exhibited very abnormal GAD67 staining patterns. Also consistent with altered cell fate, the adult DKO cerebellum still retained a residual external germinal layer (EGL). CGNP in the DKO EGL were almost uniformly NeuN and p27KIP1 positive as well as negative for Math1 and BrdU at the peak of normal cerebellar proliferation at P6. The presence of some mitotic CGNP in the absence of S phase cells suggests a possible arrest in M phase. CGNP and NSC metabolism also was affected by loss of Myc as DKO cells exhibited weak nucleolin staining. Together these findings indicate that c- and N-Myc direct cerebellar development by maintaining CGNP and NSC populations through inhibiting differentiation as well as directing rapid cell cycling and active cellular metabolism

    YesWorkflow:A User-Oriented, Language-Independent Tool for Recovering Workflow Information from Scripts

    Get PDF
    Scientific workflow management systems offer features for composing complex computational pipelines from modular building blocks, for executing the resulting automated workflows, and for recording the provenance of data products resulting from workflow runs. Despite the advantages such features provide, many automated workflows continue to be implemented and executed outside of scientific workflow systems due to the convenience and familiarity of scripting languages (such as Perl, Python, R, and MATLAB), and to the high productivity many scientists experience when using these languages. YesWorkflow is a set of software tools that aim to provide such users of scripting languages with many of the benefits of scientific workflow systems. YesWorkflow requires neither the use of a workflow engine nor the overhead of adapting code to run effectively in such a system. Instead, YesWorkflow enables scientists to annotate existing scripts with special comments that reveal the computational modules and dataflows otherwise implicit in these scripts. YesWorkflow tools extract and analyze these comments, represent the scripts in terms of entities based on the typical scientific workflow model, and provide graphical renderings of this workflow-like view of the scripts. Future versions of YesWorkflow also will allow the prospective provenance of the data products of these scripts to be queried in ways similar to those available to users of scientific workflow systems

    Transcription Factors Bind Thousands of Active and Inactive Regions in the Drosophila Blastoderm

    Get PDF
    Identifying the genomic regions bound by sequence-specific regulatory factors is central both to deciphering the complex DNA cis-regulatory code that controls transcription in metazoans and to determining the range of genes that shape animal morphogenesis. We used whole-genome tiling arrays to map sequences bound in Drosophila melanogaster embryos by the six maternal and gap transcription factors that initiate anterior–posterior patterning. We find that these sequence-specific DNA binding proteins bind with quantitatively different specificities to highly overlapping sets of several thousand genomic regions in blastoderm embryos. Specific high- and moderate-affinity in vitro recognition sequences for each factor are enriched in bound regions. This enrichment, however, is not sufficient to explain the pattern of binding in vivo and varies in a context-dependent manner, demonstrating that higher-order rules must govern targeting of transcription factors. The more highly bound regions include all of the over 40 well-characterized enhancers known to respond to these factors as well as several hundred putative new cis-regulatory modules clustered near developmental regulators and other genes with patterned expression at this stage of embryogenesis. The new targets include most of the microRNAs (miRNAs) transcribed in the blastoderm, as well as all major zygotically transcribed dorsal–ventral patterning genes, whose expression we show to be quantitatively modulated by anterior–posterior factors. In addition to these highly bound regions, there are several thousand regions that are reproducibly bound at lower levels. However, these poorly bound regions are, collectively, far more distant from genes transcribed in the blastoderm than highly bound regions; are preferentially found in protein-coding sequences; and are less conserved than highly bound regions. Together these observations suggest that many of these poorly bound regions are not involved in early-embryonic transcriptional regulation, and a significant proportion may be nonfunctional. Surprisingly, for five of the six factors, their recognition sites are not unambiguously more constrained evolutionarily than the immediate flanking DNA, even in more highly bound and presumably functional regions, indicating that comparative DNA sequence analysis is limited in its ability to identify functional transcription factor targets

    Cyberspace: A Venue for Terrorism

    Get PDF
    This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace

    Cyberspace: A Venue for Terrorism

    No full text
    This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace
    corecore