29 research outputs found
Cyberspace: A Venue for Terrorism
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace
Common fragile sites are characterized by histone hypoacetylation
Common fragile sites (CFSs) represent large, highly unstable regions of the human genome. CFS sequences are sensitive to perturbation of replication; however, the molecular basis for the instability at CFSs is poorly understood. We hypothesized that a unique epigenetic pattern may underlie the unusual sensitivity of CFSs to replication interference. To examine this hypothesis, we analyzed chromatin modification patterns within the six human CFSs with the highest levels of breakage, and their surrounding non-fragile regions (NCFSs). Chromatin at most of the CFSs analyzed has significantly less histone acetylation than that of their surrounding NCFSs. Trichostatin A and/or 5-azadeoxycytidine treatment reduced chromosome breakage at CFSs. Furthermore, chromatin at the most commonly expressed CFS, the FRA3B, is more resistant to micrococcal nuclease than that of the flanking non-fragile sequences. These results demonstrate that histone hypoacetylation is a characteristic epigenetic pattern of CFSs, and chromatin within CFSs might be relatively more compact than that of the NCFSs, indicating a role for chromatin conformation in genomic instability at CFSs. Moreover, lack of histone acetylation at CFSs may contribute to the defective response to replication stress characteristic of CFSs, leading to the genetic instability characteristic of this regions
Primary sequence and epigenetic determinants of in vivo occupancy of genomic DNA by GATA1
DNA sequence motifs and epigenetic modifications contribute to specific binding by a transcription factor, but the extent to which each feature determines occupancy in vivo is poorly understood. We addressed this question in erythroid cells by identifying DNA segments occupied by GATA1 and measuring the level of trimethylation of histone H3 lysine 27 (H3K27me3) and monomethylation of H3 lysine 4 (H3K4me1) along a 66 Mb region of mouse chromosome 7. While 91% of the GATA1-occupied segments contain the consensus binding-site motif WGATAR, only ∼0.7% of DNA segments with such a motif are occupied. Using a discriminative motif enumeration method, we identified additional motifs predictive of occupancy given the presence of WGATAR. The specific motif variant AGATAA and occurrence of multiple WGATAR motifs are both strong discriminators. Combining motifs to pair a WGATAR motif with a binding site motif for GATA1, EKLF or SP1 improves discriminative power. Epigenetic modifications are also strong determinants, with the factor-bound segments highly enriched for H3K4me1 and depleted of H3K27me3. Combining primary sequence and epigenetic determinants captures 52% of the GATA1-occupied DNA segments and substantially increases the specificity, to one out of seven segments with the required motif combination and epigenetic signals being bound
c- and N-myc Regulate Neural Precursor Cell Fate, Cell Cycle, and Metabolism to Direct Cerebellar Development
Separate murine knockout (KO) of either c- or N-myc genes in neural stem and precursor cells (NSC) driven by nestin-cre causes microcephaly. The cerebellum is particularly affected in the N-myc KO, leading to a strong reduction in cerebellar granule neural progenitors (CGNP) and mature granule neurons. In humans, mutation of N-myc also causes microcephaly in Feingold Syndrome. We created a double KO (DKO) of c- and N-myc using nestin-cre, which strongly impairs brain growth, particularly that of the cerebellum. Granule neurons were almost absent from the Myc DKO cerebellum, and other cell types were relatively overrepresented, including astroglia, oligodendrocytes, and Purkinje neurons. These findings are indicative of a profound disruption of cell fate of cerebellar stem and precursors. DKO Purkinje neurons were strikingly lacking in normal arborization. Inhibitory neurons were ectopic and exhibited very abnormal GAD67 staining patterns. Also consistent with altered cell fate, the adult DKO cerebellum still retained a residual external germinal layer (EGL). CGNP in the DKO EGL were almost uniformly NeuN and p27KIP1 positive as well as negative for Math1 and BrdU at the peak of normal cerebellar proliferation at P6. The presence of some mitotic CGNP in the absence of S phase cells suggests a possible arrest in M phase. CGNP and NSC metabolism also was affected by loss of Myc as DKO cells exhibited weak nucleolin staining. Together these findings indicate that c- and N-Myc direct cerebellar development by maintaining CGNP and NSC populations through inhibiting differentiation as well as directing rapid cell cycling and active cellular metabolism
YesWorkflow:A User-Oriented, Language-Independent Tool for Recovering Workflow Information from Scripts
Scientific workflow management systems offer features for composing complex
computational pipelines from modular building blocks, for executing the
resulting automated workflows, and for recording the provenance of data
products resulting from workflow runs. Despite the advantages such features
provide, many automated workflows continue to be implemented and executed
outside of scientific workflow systems due to the convenience and familiarity
of scripting languages (such as Perl, Python, R, and MATLAB), and to the high
productivity many scientists experience when using these languages. YesWorkflow
is a set of software tools that aim to provide such users of scripting
languages with many of the benefits of scientific workflow systems. YesWorkflow
requires neither the use of a workflow engine nor the overhead of adapting code
to run effectively in such a system. Instead, YesWorkflow enables scientists to
annotate existing scripts with special comments that reveal the computational
modules and dataflows otherwise implicit in these scripts. YesWorkflow tools
extract and analyze these comments, represent the scripts in terms of entities
based on the typical scientific workflow model, and provide graphical
renderings of this workflow-like view of the scripts. Future versions of
YesWorkflow also will allow the prospective provenance of the data products of
these scripts to be queried in ways similar to those available to users of
scientific workflow systems
Transcription Factors Bind Thousands of Active and Inactive Regions in the Drosophila Blastoderm
Identifying the genomic regions bound by sequence-specific regulatory factors is central both to deciphering the complex DNA cis-regulatory code that controls transcription in metazoans and to determining the range of genes that shape animal morphogenesis. We used whole-genome tiling arrays to map sequences bound in Drosophila melanogaster embryos by the six maternal and gap transcription factors that initiate anterior–posterior patterning. We find that these sequence-specific DNA binding proteins bind with quantitatively different specificities to highly overlapping sets of several thousand genomic regions in blastoderm embryos. Specific high- and moderate-affinity in vitro recognition sequences for each factor are enriched in bound regions. This enrichment, however, is not sufficient to explain the pattern of binding in vivo and varies in a context-dependent manner, demonstrating that higher-order rules must govern targeting of transcription factors. The more highly bound regions include all of the over 40 well-characterized enhancers known to respond to these factors as well as several hundred putative new cis-regulatory modules clustered near developmental regulators and other genes with patterned expression at this stage of embryogenesis. The new targets include most of the microRNAs (miRNAs) transcribed in the blastoderm, as well as all major zygotically transcribed dorsal–ventral patterning genes, whose expression we show to be quantitatively modulated by anterior–posterior factors. In addition to these highly bound regions, there are several thousand regions that are reproducibly bound at lower levels. However, these poorly bound regions are, collectively, far more distant from genes transcribed in the blastoderm than highly bound regions; are preferentially found in protein-coding sequences; and are less conserved than highly bound regions. Together these observations suggest that many of these poorly bound regions are not involved in early-embryonic transcriptional regulation, and a significant proportion may be nonfunctional. Surprisingly, for five of the six factors, their recognition sites are not unambiguously more constrained evolutionarily than the immediate flanking DNA, even in more highly bound and presumably functional regions, indicating that comparative DNA sequence analysis is limited in its ability to identify functional transcription factor targets
Cyberspace: A Venue for Terrorism
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace
Cyberspace: A Venue for Terrorism
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace