Search results for: terrorist profiling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 443

Search results for: terrorist profiling

143 Fight against Money Laundering with Optical Character Recognition

Authors: Saikiran Subbagari, Avinash Malladhi

Abstract:

Anti Money Laundering (AML) regulations are designed to prevent money laundering and terrorist financing activities worldwide. Financial institutions around the world are legally obligated to identify, assess and mitigate the risks associated with money laundering and report any suspicious transactions to governing authorities. With increasing volumes of data to analyze, financial institutions seek to automate their AML processes. In the rise of financial crimes, optical character recognition (OCR), in combination with machine learning (ML) algorithms, serves as a crucial tool for automating AML processes by extracting the data from documents and identifying suspicious transactions. In this paper, we examine the utilization of OCR for AML and delve into various OCR techniques employed in AML processes. These techniques encompass template-based, feature-based, neural network-based, natural language processing (NLP), hidden markov models (HMMs), conditional random fields (CRFs), binarizations, pattern matching and stroke width transform (SWT). We evaluate each technique, discussing their strengths and constraints. Also, we emphasize on how OCR can improve the accuracy of customer identity verification by comparing the extracted text with the office of foreign assets control (OFAC) watchlist. We will also discuss how OCR helps to overcome language barriers in AML compliance. We also address the implementation challenges that OCR-based AML systems may face and offer recommendations for financial institutions based on the data from previous research studies, which illustrate the effectiveness of OCR-based AML.

Keywords: anti-money laundering, compliance, financial crimes, fraud detection, machine learning, optical character recognition

Procedia PDF Downloads 120
142 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 24
141 Uruguayan vs. British Press Coverage of a Political Kidnapping

Authors: Luisa Peirano

Abstract:

What began as a middle-class insurgent political movement whose slogan was 'Words divide us. Action unites us!' ultimately mutated into an underground terrorist group that staged a series of armed robberies, kidnappings and even executions in the 1960s and early 1970s. One of the most memorable was the kidnapping of the British ambassador, Sir Geoffrey Jackson, in January 1971, who was held captive for eight months. The episode, which triggered a massive government response and resulted in the capture of the Tupamaros leaders, continued to have political repercussions decades later when Tupamaros leaders emerged from prison to re-enter mainstream Uruguayan politics. The kidnapping and its aftermath attracted intense media coverage in Uruguay and Britain, coverage that affected public opinion profoundly. The treatment by the Uruguayan and British medias’ diverged, however. Uruguayan newspapers focused on political issues, mirrored the positions of various political parties, and showed the larger context of social, cultural and political forces that rocked Latin America in the 1960s and early 1970s. By contrast, the British press limited its attention mainly to the human drama. On the 30th anniversary of Sir Geoffrey Jackson's death, this study compares over one hundred major newspaper articles and suggests some reasons for the differences between Uruguayan and British media treatment in terms of the volume, content, and perspective as well in the effect on readers. The differences have persisted and continue to matter in present day coverage of terrorism and its victims.

Keywords: British Ambassador, Churchill Archives Centre, Sir Geoffrey Jackson, political kidnapping, Latin America in the 1960's, Tupamaro guerrillas, Uruguay

Procedia PDF Downloads 179
140 Mutation Profiling of Paediatric Solid Tumours in a Cohort of South African Patients

Authors: L. Lamola, E. Manolas, A. Krause

Abstract:

Background: The incidence of childhood cancer incidence is increasing gradually in low-middle income countries, such as South Africa. Globally, there is an extensive range of familial- and hereditary-cancer syndromes, where underlying germline variants increase the likelihood of developing cancer in childhood. Next-Generation Sequencing (NGS) technologies have been key in determining the occurrence and genetic contribution of germline variants to paediatric cancer development. We aimed to design and evaluate a candidate gene panel specific to inherited cancer-predisposing genes to provide a comprehensive insight into the contribution of germline variants to childhood cancer. Methods: 32 paediatric patients (aged 0-18 years) diagnosed with a malignant tumour were recruited, and biological samples were obtained. After quality control, DNA was sequenced using an ion Ampliseq 50 candidate gene panel design and Ion Torrent S5 technologies. Sequencing variants were called using Ion Torrent Suite software and were subsequently annotated using Ion Reporter and Ensembl's VEP. High priority variants were manually analysed using tools such as MutationTaster, SIFT-INDEL and VarSome. Putative identified candidates were validated via Sanger Sequencing. Results: The patients studied had a variety of cancers, the most common being nephroblastoma (13), followed by osteosarcoma (4) and astrocytoma (3). We identified 10 pathogenic / likely pathogenic variants in 10 patients, most of which were novel. Conclusions: According to the literature, we expected ~10% of our patient population to harbour pathogenic or likely pathogenic germline variants, however, we reported about 3 times (~30%) more than we expected. Majority of the identified variants are novel; this may be because this is the first study of its kind in an understudied South African population.

Keywords: Africa, genetics, germline-variants, paediatric-cancer

Procedia PDF Downloads 117
139 Modeling and Simulation of Honeycomb Steel Sandwich Panels under Blast Loading

Authors: Sayed M. Soleimani, Nader H. Ghareeb, Nourhan H. Shaker, Muhammad B. Siddiqui

Abstract:

Honeycomb sandwich panels have been widely used as protective structural elements against blast loading. The main advantages of these panels include their light weight due to the presence of voids, as well as their energy absorption capability. Terrorist activities have imposed new challenges to structural engineers to design protective measures for vital structures. Since blast loading is not usually considered in the load combinations during the design process of a structure, researchers around the world have been motivated to study the behavior of potential elements capable of resisting sudden loads imposed by the detonation of explosive materials. One of the best candidates for this objective is the honeycomb sandwich panel. Studying the effects of explosive materials on the panels requires costly and time-consuming experiments. Moreover, these type of experiments need permission from defense organizations which can become a hurdle. As a result, modeling and simulation using an appropriate tool can be considered as a good alternative. In this research work, the finite element package ABAQUS® is used to study the behavior of hexagonal and squared honeycomb steel sandwich panels under the explosive effects of different amounts of trinitrotoluene (TNT). The results of finite element modeling of a specific honeycomb configuration are initially validated by comparing them with the experimental results from literature. Afterwards, several configurations including different geometrical properties of the honeycomb wall are investigated and the results are compared with the original model. Finally, the effectiveness of the core shape and wall thickness are discussed, and conclusions are made.

Keywords: Abaqus, blast loading, finite element modeling, steel honeycomb sandwich panel

Procedia PDF Downloads 330
138 Next Generation Sequencing Analysis of Circulating MiRNAs in Rheumatoid Arthritis and Osteoarthritis

Authors: Khalda Amr, Noha Eltaweel, Sherif Ismail, Hala Raslan

Abstract:

Introduction: Osteoarthritis is the most common form of arthritis that involves the wearing away of the cartilage that caps the bones in the joints. While rheumatoid arthritis is an autoimmune disease in which the immune system attacks the joints, beginning with the lining of joints. In this study, we aimed to study the top deregulated miRNAs that might be the cause of pathogenesis in both diseases. Methods: Eight cases were recruited in this study: 4 rheumatoid arthritis (RA), 2 osteoarthritis (OA) patients, as well as 2 healthy controls. Total RNA was isolated from plasma to be subjected to miRNA profiling by NGS. Sequencing libraries were constructed and generated using the NEBNextR UltraTM small RNA Sample Prep Kit for Illumina R (NEB, USA), according to the manufacturer’s instructions. The quality of samples were checked using fastqc and multiQC. Results were compared RA vs Controls and OA vs. Controls. Target gene prediction and functional annotation of the deregulated miRNAs were done using Mienturnet. The top deregulated miRNAs in each disease were selected for further validation using qRT-PCR. Results: The average number of sequencing reads per sample exceeded 2.2 million, of which approximately 57% were mapped to the human reference genome. The top DEMs in RA vs controls were miR-6724-5p, miR-1469, miR-194-3p (up), miR-1468-5p, miR-486-3p (down). In comparison, the top DEMs in OA vs controls were miR-1908-3p, miR-122b-3p, miR-3960 (up), miR-1468-5p, miR-15b-3p (down). The functional enrichment of the selected top deregulated miRNAs revealed the highly enriched KEGG pathways and GO terms. Six of the deregulated miRNAs (miR-15b, -128, -194, -328, -542 and -3180) had multiple target genes in the RA pathway, so they are more likely to affect the RA pathogenesis. Conclusion: Six of our studied deregulated miRNAs (miR-15b, -128, -194, -328, -542 and -3180) might be highly involved in the disease pathogenesis. Further functional studies are crucial to assess their functions and actual target genes.

Keywords: next generation sequencing, mirnas, rheumatoid arthritis, osteoarthritis

Procedia PDF Downloads 59
137 Hyper-Production of Lysine through Fermentation and Its Biological Evaluation on Broiler Chicks

Authors: Shagufta Gulraiz, Abu Saeed Hashmi, Muhammad Mohsin Javed

Abstract:

Lysine required for poultry feed is imported in Pakistan to fulfil the desired dietary needs. Present study was designed to produce maximum lysine by utilizing cheap sources to save the foreign exchange. To achieve the goal of lysine production through fermentation, large scale production of lysine was carried out in 7.5 L stirred glass vessel fermenter with wild and mutant Brevibacterium flavum (B. flavum) using all pre-optimized conditions. The identification of produced lysine was carried out by TLC and amino acid analyzer. Toxicity evaluation of produced lysine was performed before feeding to broiler chicks. During biological trial concentrated fermented broth having 8% lysine was used in poultry rations as a source of Lysine for test birds. Fermenter scale studies showed that the maximum lysine (20.8 g/L) was produced at 250 rpm, 1.5 vvm aeration, 6.0% inoculum under controlled pH conditions after 56 h of fermentation with wild culture but mutant (BFENU2) gave maximum yield of lysine 36.3 g/L under optimized condition after 48 h. Amino acid profiling showed 1.826% Lysine in fermented broth by wild B. flavum and 2.644% by mutant strain (BFENU2). Toxicity evaluation report showed that the produced lysine is safe for consumption by broilers. Biological evaluation results showed that produced lysine was equally good as commercial lysine in terms of weight gain, feed intake and feed conversion ratio. A cheap and practical bioprocess of Lysine production was concluded, that can be exploited commercially in Pakistan to save foreign exchange.

Keywords: lysine, fermentation, broiler chicks, biological evaluation

Procedia PDF Downloads 528
136 Simulating Human Behavior in (Un)Built Environments: Using an Actor Profiling Method

Authors: Hadas Sopher, Davide Schaumann, Yehuda E. Kalay

Abstract:

This paper addresses the shortcomings of architectural computation tools in representing human behavior in built environments, prior to construction and occupancy of those environments. Evaluating whether a design fits the needs of its future users is currently done solely post construction, or is based on the knowledge and intuition of the designer. This issue is of high importance when designing complex buildings such as hospitals, where the quality of treatment as well as patient and staff satisfaction are of major concern. Existing computational pre-occupancy human behavior evaluation methods are geared mainly to test ergonomic issues, such as wheelchair accessibility, emergency egress, etc. As such, they rely on Agent Based Modeling (ABM) techniques, which emphasize the individual user. Yet we know that most human activities are social, and involve a number of actors working together, which ABM methods cannot handle. Therefore, we present an event-based model that manages the interaction between multiple Actors, Spaces, and Activities, to describe dynamically how people use spaces. This approach requires expanding the computational representation of Actors beyond their physical description, to include psychological, social, cultural, and other parameters. The model presented in this paper includes cognitive abilities and rules that describe the response of actors to their physical and social surroundings, based on the actors’ internal status. The model has been applied in a simulation of hospital wards, and showed adaptability to a wide variety of situated behaviors and interactions.

Keywords: agent based modeling, architectural design evaluation, event modeling, human behavior simulation, spatial cognition

Procedia PDF Downloads 236
135 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 240
134 Deciphering the Action of Neuraminidase in Glioblastoma Models

Authors: Nathalie Baeza-Kallee, Raphaël Bergès, Victoria Hein, Stéphanie Cabaret, Jeremy Garcia, Abigaëlle Gros, Emeline Tabouret, Aurélie Tchoghandjian, Carole Colin, Dominique Figarella-Branger

Abstract:

Glioblastoma (GBM) contains cancer stem cells that are resistant to treatment. GBM cancer stem cell expresses glycolipids recognized by the A2B5 antibody. A2B5, induced by the enzyme ST8 alpha-N-acetyl-neuraminide alpha-2,8-sialyl transferase 3 (ST8Sia3), plays a crucial role in the proliferation, migration, clonogenicity, and tumorigenesis of GBM cancer stem cells. Our aim was to characterize the resulting effects of neuraminidase that remove A2B5 in order to target GBM cancer stem cells. To this end, we set up a GBM organotypic slice model; quantified A2B5 expression by flow cytometry in U87-MG, U87-ST8Sia3, and GBM cancer stem cell lines, treated or not by neuraminidase; performed RNAseq and DNA methylation profiling; and analyzed the ganglioside expression by liquid chromatography-mass spectrometry in these cell lines, treated or not with neuraminidase. Results demonstrated that neuraminidase decreased A2B5 expression, tumor size, and regrowth after surgical removal in the organotypic slice model but did not induce a distinct transcriptomic or epigenetic signature in GBM CSC lines. RNAseq analysis revealed that OLIG2, CHI3L1, TIMP3, TNFAIP2, and TNFAIP6 transcripts were significantly overexpressed in U87-ST8Sia3 compared to U87-MG. RT-qPCR confirmed these results and demonstrated that neuraminidase decreased gene expression in GBM cancer stem cell lines. Moreover, neuraminidase drastically reduced ganglioside expression in GBM cancer stem cell lines. Neuraminidase, by its pleiotropic action, is an attractive local treatment against GBM.

Keywords: cancer stem cell, ganglioside, glioblastoma, targeted treatment

Procedia PDF Downloads 54
133 Effects of Ascophyllum nodosum in Tomato in the Tropical Caribbean Climate: Effects and Molecular Insights into Mechanisms

Authors: Omar Ali, Adesh Ramsubhag, Jayaraj Jayaraman

Abstract:

Seaweed extracts have been reported as plant biostimulants which could be a safer, organic alternative to harsh pesticides. The incentive to use seaweed-based biostimulants is becoming paramount in sustainable agriculture. The current study, therefore, screened a commercial extract of A. nodosum in tomatoes, cultivated in Trinidad to showcase the multiple beneficial effects. Foliar treatment with an A. nodosum commercial extract led to significant increases in fruit yield and a significant reduction of incidence of bacterial spots and early blight diseases under both greenhouse and field conditions. Investigations were carried out to reveal the possible mechanisms of action of this biostimulant through defense enzyme assays and transcriptome profiling via RNA sequencing of tomato. Studies into disease control mechanisms by A. nodosum showed that the extract stimulated the activity of enzymes such as peroxidase, phenylalanine ammonia-lyase, chitinase, polyphenol oxidase, and β-1,3-glucanase. Additionally, the transcriptome survey revealed the upregulation and enrichment of genes responsible for the biosynthesis of growth hormones, defense enzymes, PR proteins and defense-related secondary metabolites, as well as genes involved in the nutrient mobilization, photosynthesis and primary and secondary metabolic pathways. The results of the transcriptome study also demonstrated the cross-talks between growth and defense responses, confirming the bioelicitor and biostimulant value of seaweed extracts in plants. These effects could potentially implicate the benefits of seaweed extract and validate its usage in sustainable crop production.

Keywords: A. nodosum, biostimulants, elicitor, enzymes, growth responses, seaweeds, tomato, transcriptome analysis

Procedia PDF Downloads 142
132 A High Content Screening Platform for the Accurate Prediction of Nephrotoxicity

Authors: Sijing Xiong, Ran Su, Lit-Hsin Loo, Daniele Zink

Abstract:

The kidney is a major target for toxic effects of drugs, industrial and environmental chemicals and other compounds. Typically, nephrotoxicity is detected late during drug development, and regulatory animal models could not solve this problem. Validated or accepted in silico or in vitro methods for the prediction of nephrotoxicity are not available. We have established the first and currently only pre-validated in vitro models for the accurate prediction of nephrotoxicity in humans and the first predictive platforms based on renal cells derived from human pluripotent stem cells. In order to further improve the efficiency of our predictive models, we recently developed a high content screening (HCS) platform. This platform employed automated imaging in combination with automated quantitative phenotypic profiling and machine learning methods. 129 image-based phenotypic features were analyzed with respect to their predictive performance in combination with 44 compounds with different chemical structures that included drugs, environmental and industrial chemicals and herbal and fungal compounds. The nephrotoxicity of these compounds in humans is well characterized. A combination of chromatin and cytoskeletal features resulted in high predictivity with respect to nephrotoxicity in humans. Test balanced accuracies of 82% or 89% were obtained with human primary or immortalized renal proximal tubular cells, respectively. Furthermore, our results revealed that a DNA damage response is commonly induced by different PTC-toxicants with diverse chemical structures and injury mechanisms. Together, the results show that the automated HCS platform allows efficient and accurate nephrotoxicity prediction for compounds with diverse chemical structures.

Keywords: high content screening, in vitro models, nephrotoxicity, toxicity prediction

Procedia PDF Downloads 294
131 Clostridium Difficile in Western Australian Native Animals: Prevalence and Molecular Epidemiology

Authors: Karla Cautivo, Thomas Riley, Daniel Knight

Abstract:

Clostridium difficile infection (CDI) is the most common cause of infectious diarrhea in hospitalised humans. C. difficile colonises the gastrointestinal tract, causes disease in a variety of animal species and can persist as a spore in diverse environments. Genetic overlap between C. difficile strains from human, animal and environmental sources suggests CDI has a zoonotic or foodborne aetiology. In Australia, C. difficile PCR ribotype RT014 (MLST clade 1) and several ST11 (MLST clade 5) RTs are found commonly in livestock. The high prevalence and diversity of ST11 strains in Australian production animals indicates Australia might be the ancestral home for this lineage. This project describes for the first time the ecology of C. difficile in Australian native animals, providing insights into the prevalence, molecular epidemiology and evolution of C. difficile in this unique environment and a possible role in CDI in humans and animals in Australia. Faecal samples were collected from wild/captive reptiles (n=37), mammals (n=104) and birds (n=102) in Western Australia in 2020/21. Anaerobic enrichment culture was performed, and C. difficile isolates were characterised by PCR ribotyping and toxin gene profiling. Seventy isolates of C. difficile were recovered (prevalence of C. difficile in faecal samples 28%, n=68/243); 27 unique RTs were identified, 5 were novel. The prevalence of C. difficile was similar for reptiles and mammals, 46% (n=17/37) and 43%(n=45/104), respectively, but significantly lower in birds (7.8%, n=8/102; p<0.00001 for both reptiles and mammals). Of the 57 isolates available for typing, RT237 (clade 5) and RT002 (clade 2) were the most prevalent, 15.8% (n=9/57) and 14% (n=8/57), respectively. The high prevalence of C. difficile in reptiles and mammals, particularly clade 5 strains, supported by previous studies of C. difficile in Australian soils, suggest that Australia might be the ancestral home of MLST clade 5.

Keywords: Clostridium difficile, zoonosis, molecular epidemiology, ecology and evolution

Procedia PDF Downloads 174
130 Conspiracy Theories and the Right to Believe

Authors: Zwelenkani Mdlalose

Abstract:

From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust.

Keywords: conspiracy theories, subjugated knowledge, epistemic injustice, epistemic responsibility

Procedia PDF Downloads 78
129 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks

Authors: Adrian Ionita, Ana-Maria Ghimes

Abstract:

The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.

Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling

Procedia PDF Downloads 143
128 Natural Gas Flow Optimization Using Pressure Profiling and Isolation Techniques

Authors: Syed Tahir Shah, Fazal Muhammad, Syed Kashif Shah, Maleeha Gul

Abstract:

In recent days, natural gas has become a relatively clean and quality source of energy, which is recovered from deep wells by expensive drilling activities. The recovered substance is purified by processing in multiple stages to remove the unwanted/containments like dust, dirt, crude oil and other particles. Mostly, gas utilities are concerned with essential objectives of quantity/quality of natural gas delivery, financial outcome and safe natural gas volumetric inventory in the transmission gas pipeline. Gas quantity and quality are primarily related to standards / advanced metering procedures in processing units/transmission systems, and the financial outcome is defined by purchasing and selling gas also the operational cost of the transmission pipeline. SNGPL (Sui Northern Gas Pipelines Limited) Pakistan has a wide range of diameters of natural gas transmission pipelines network of over 9125 km. This research results in answer a few of the issues in accuracy/metering procedures via multiple advanced gadgets for gas flow attributes after being utilized in the transmission system and research. The effects of good pressure management in transmission gas pipeline network in contemplation to boost the gas volume deposited in the existing network and finally curbing gas losses UFG (Unaccounted for gas) for financial benefits. Furthermore, depending on the results and their observation, it is directed to enhance the maximum allowable working/operating pressure (MAOP) of the system to 1235 PSIG from the current round about 900 PSIG, such that the capacity of the network could be entirely utilized. In gross, the results depict that the current model is very efficient and provides excellent results in the minimum possible time.

Keywords: natural gas, pipeline network, UFG, transmission pack, AGA

Procedia PDF Downloads 69
127 Genomic and Transcriptomic Analysis of Antibiotic Resistance Genes in Biological Wastewater Treatment Systems Treating Domestic and Hospital Effluents

Authors: Thobela Conco, Sheena Kumari, Chika Nnadozie, Mahmoud Nasr, Thor A. Stenström, Mushal Ali, Arshad Ismail, Faizal Bux

Abstract:

The discharge of antibiotics and its residues into the wastewater treatment plants (WWTP’s) create a conducive environment for the development of antibiotic resistant pathogens. This presents a risk of potential dissemination of antibiotic resistant pathogens and antibiotic resistance genes into the environment. It is, therefore, necessary to study the level of antibiotic resistance genes (ARG’s) among bacterial pathogens that proliferate in biological wastewater treatment systems. In the current study, metagenomic and meta-transcriptomic sequences of samples collected from the influents, secondary effluents and post chlorinated effluents of three wastewater treatment plants treating domestic and hospital effluents in Durban, South Africa, were analyzed for profiling of ARG’s among bacterial pathogens. Results show that a variety of ARG’s, mostly, aminoglycoside, β-lactamases, tetracycline and sulfonamide resistance genes were harbored by diverse bacterial genera found at different stages of treatment. A significant variation in diversity of pathogen and ARGs between the treatment plant was observed; however, treated final effluent samples from all three plants showed a significant reduction in bacterial pathogens and detected ARG’s. Both pre- and post-chlorinated samples showed the presence of mobile genetic elements (MGE’s), indicating the inefficiency of chlorination to remove of ARG’s integrated with MGE’s. In conclusion, the study showed the wastewater treatment plant efficiently caused the reduction and removal of certain ARG’s, even though the initial focus was the removal of biological nutrients.

Keywords: antibiotic resistance, mobile genetic elements, wastewater, wastewater treatment plants

Procedia PDF Downloads 198
126 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 120
125 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 245
124 Developing an Automated Protocol for the Wristband Extraction Process Using Opentrons

Authors: Tei Kim, Brooklynn McNeil, Kathryn Dunn, Douglas I. Walker

Abstract:

To better characterize the relationship between complex chemical exposures and disease, our laboratory uses an approach that combines low-cost, polydimethylsiloxane (silicone) wristband samplers that absorb many of the chemicals we are exposed to with untargeted high-resolution mass spectrometry (HRMS) to characterize 1000’s of chemicals at a time. In studies with human populations, these wristbands can provide an important measure of our environment: however, there is a need to use this approach in large cohorts to study exposures associated with the disease. To facilitate the use of silicone samplers in large scale population studies, the goal of this research project was to establish automated sample preparation methods that improve throughput, robustness, and scalability of analytical methods for silicone wristbands. Using the Opentron OT2 automated liquid platform, which provides a low-cost and opensource framework for automated pipetting, we created two separate workflows that translate the manual wristband preparation method to a fully automated protocol that requires minor intervention by the operator. These protocols include a sequence generation step, which defines the location of all plates and labware according to user-specified settings, and a transfer protocol that includes all necessary instrument parameters and instructions for automated solvent extraction of wristband samplers. These protocols were written in Python and uploaded to GitHub for use by others in the research community. Results from this project show it is possible to establish automated and open source methods for the preparation of silicone wristband samplers to support profiling of many environmental exposures. Ongoing studies include deployment in longitudinal cohort studies to investigate the relationship between personal chemical exposure and disease.

Keywords: bioinformatics, automation, opentrons, research

Procedia PDF Downloads 89
123 High-Risk Gene Variant Profiling Models Ethnic Disparities in Diabetes Vulnerability

Authors: Jianhua Zhang, Weiping Chen, Guanjie Chen, Jason Flannick, Emma Fikse, Glenda Smerin, Yanqin Yang, Yulong Li, John A. Hanover, William F. Simonds

Abstract:

Ethnic disparities in many diseases are well recognized and reflect the consequences of genetic, behavior, and environmental factors. However, direct scientific evidence connecting the ethnic genetic variations and the disease disparities has been elusive, which may have led to the ethnic inequalities in large scale genetic studies. Through the genome-wide analysis of data representing 185,934 subjects, including 14,955 from our own studies of the African America Diabetes Mellitus, we discovered sets of genetic variants either unique to or conserved in all ethnicities. We further developed a quantitative gene function-based high-risk variant index (hrVI) of 20,428 genes to establish profiles that strongly correlate with the subjects' self-identified ethnicities. With respect to the ability to detect human essential and pathogenic genes, the hrVI analysis method is both comparable with and complementary to the well-known genetic analysis methods, pLI and VIRlof. Application of the ethnicity-specific hrVI analysis to the type 2 diabetes mellitus (T2DM) national repository, containing 20,791 cases and 24,440 controls, identified 114 candidate T2DM-associated genes, 8.8-fold greater than that of ethnicity-blind analysis. All the genes identified are defined as either pathogenic or likely-pathogenic in ClinVar database, with 33.3% diabetes-associated and 54.4% obesity-associated genes. These results demonstrate the utility of hrVI analysis and provide the first genetic evidence by clustering patterns of how genetic variations among ethnicities may impede the discovery of diabetes and foreseeably other disease-associated genes.

Keywords: diabetes-associated genes, ethnic health disparities, high-risk variant index, hrVI, T2DM

Procedia PDF Downloads 112
122 Base Deficit Profiling in Patients with Isolated Blunt Traumatic Brain Injury – Correlation with Severity and Outcomes

Authors: Shahan Waheed, Muhammad Waqas, Asher Feroz

Abstract:

Objectives: To determine the utility of base deficit in traumatic brain injury in assessing the severity and to correlate with the conventional computed tomography scales in grading the severity of head injury. Methodology: Observational cross-sectional study conducted in a tertiary care facility from 1st January 2010 to 31st December 2012. All patients with isolated traumatic brain injury presenting within 24 hours of the injury to the emergency department were included in the study. Initial Glasgow Coma Scale and base deficit values were taken at presentation, the patients were followed during their hospital stay and CT scan brain findings were recorded and graded as per the Rotterdam scale, the findings were cross-checked by a radiologist, Glasgow Outcome Scale was taken on last follow up. Outcomes were dichotomized into favorable and unfavorable outcomes. Continuous variables with normal and non-normal distributions are reported as mean ± SD. Categorical variables are presented as frequencies and percentages. Relationship of the base deficit with GCS, GOS, CT scan brain and length of stay was calculated using Spearman`s correlation. Results: 154 patients were enrolled in the study. Mean age of the patients were 30 years and 137 were males. The severity of brain injuries as per the GCS was 34 moderate and 109 severe respectively. 34 percent of the total has an unfavorable outcome with a mean of 18±14. The correlation was significant at the 0.01 level with GCS on presentation and the base deficit 0.004. The correlation was not significant between the Rotterdam CT scan brain findings, length of stay and the base deficit. Conclusion: The base deficit was found to be a good predictor of severity of brain injury. There was no association of the severity of injuries on the CT scan brain as per the Rotterdam scale and the base deficit. Further studies with large sample size are needed to further evaluate the associations.

Keywords: base deficit, traumatic brain injury, Rotterdam, GCS

Procedia PDF Downloads 419
121 Understanding Inhibitory Mechanism of the Selective Inhibitors of Cdk5/p25 Complex by Molecular Modeling Studies

Authors: Amir Zeb, Shailima Rampogu, Minky Son, Ayoung Baek, Sang H. Yoon, Keun W. Lee

Abstract:

Neurotoxic insults activate calpain, which in turn produces truncated p25 from p35. p25 forms hyperactivated Cdk5/p25 complex, and thereby induces severe neuropathological aberrations including hyperphosphorylated tau, neuroinflammation, apoptosis, and neuronal death. Inhibition of Cdk5/p25 complex alleviates aberrant phosphorylation of tau to mitigate AD pathology. PHA-793887 and Roscovitine have been investigated as selective inhibitors of Cdk5/p25 with IC50 values 5nM and 160nM, respectively, but their mechanistic studies remain unknown. Herein, computational simulations have explored the binding mode and interaction mechanism of PHA-793887 and Roscovitine with Cdk5/p25. Docking results suggested that PHA-793887 and Rsocovitine have occupied the ATP-binding site of Cdk5 and obtained highest docking (GOLD) score of 66.54 and 84.03, respectively. Furthermore, molecular dynamics (MD) simulation demonstrated that PHA-793887 and Roscovitine established stable RMSD of 1.09 Å and 1.48 Å with Cdk5/p25, respectively. Profiling of polar interactions suggested that each inhibitor formed hydrogen bonds (H-bond) with catalytic residues of Cdk5 and could remain stable throughout the molecular dynamics simulation. Additionally, binding free energy calculation by molecular mechanics/Poisson–Boltzmann surface area (MM/PBSA) suggested that PHA-793887 and Roscovitine had lowest binding free energies of -150.05 kJ/mol and -113.14 kJ/mol, respectively with Cdk5/p25. Free energy decomposition demonstrated that polar energy by H-bond between the Glu81 of Cdk5 and PHA-793887 is the essential factor to make PHA-793887 highly selective towards Cdk5/p25. Overall, this study provided substantial evidences to explore mechanistic interactions of the selective inhibitors of Cdk5/p25 and could be used as fundamental considerations in the development of structure-based selective inhibitors of Cdk5/p25.

Keywords: Cdk5/p25 inhibition, molecular modeling of Cdk5/p25, PHA-793887 and roscovitine, selective inhibition of Cdk5/p25

Procedia PDF Downloads 120
120 Stress-Controlled Senescence and Development in Arabidopsis thaliana by Root Associated Factor (RAF), a NAC Transcription Regulator

Authors: Iman Kamranfar, Gang-Ping Xue, Salma Balazadeh, Bernd Mueller-Roeber

Abstract:

Adverse environmental conditions such as salinity stress, high temperature and drought limit plant growth and typically lead to precocious tissue degeneration and leaf senescence, a process by which nutrients from photosynthetic organs are recycled for the formation of flowers and seeds to secure reaching the next generation under such harmful conditions. In addition, abiotic stress affects developmental patterns that help the plant to withstand unfavourable environmental conditions. We discovered an NAC (for NAM, ATAF1, 2, and CUC2) transcription factor (TF), called RAF in the following, which plays a central role in abiotic drought stress-triggered senescence and the control of developmental adaptations to stressful environments. RAF is an ABA-responsive TF; RAF overexpressors are hypersensitive to abscisic acid (ABA) and exhibit precocious senescence while knock-out mutants show delayed senescence. To explore the RAF gene regulatory network (GRN), we determined its preferred DNA binding sites by binding site selection assay (BSSA) and performed microarray-based expression profiling using inducible RAF overexpression lines and chromatin immunoprecipitation (ChIP)-PCR. Our studies identified several direct target genes, including those encoding for catabolic enzymes acting during stress-induced senescence. Furthermore, we identified various genes controlling drought stress-related developmental changes. Based on our results, we conclude that RAF functions as a central transcriptional regulator that coordinates developmental programs with stress-related inputs from the environment. To explore the potential agricultural applications of our findings, we are currently extending our studies towards crop species.

Keywords: abiotic stress, Arabidopsis, development, transcription factor

Procedia PDF Downloads 169
119 An Analysis on Clustering Based Gene Selection and Classification for Gene Expression Data

Authors: K. Sathishkumar, V. Thiagarasu

Abstract:

Due to recent advances in DNA microarray technology, it is now feasible to obtain gene expression profiles of tissue samples at relatively low costs. Many scientists around the world use the advantage of this gene profiling to characterize complex biological circumstances and diseases. Microarray techniques that are used in genome-wide gene expression and genome mutation analysis help scientists and physicians in understanding of the pathophysiological mechanisms, in diagnoses and prognoses, and choosing treatment plans. DNA microarray technology has now made it possible to simultaneously monitor the expression levels of thousands of genes during important biological processes and across collections of related samples. Elucidating the patterns hidden in gene expression data offers a tremendous opportunity for an enhanced understanding of functional genomics. However, the large number of genes and the complexity of biological networks greatly increase the challenges of comprehending and interpreting the resulting mass of data, which often consists of millions of measurements. A first step toward addressing this challenge is the use of clustering techniques, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. This work presents an analysis of several clustering algorithms proposed to deals with the gene expression data effectively. The existing clustering algorithms like Support Vector Machine (SVM), K-means algorithm and evolutionary algorithm etc. are analyzed thoroughly to identify the advantages and limitations. The performance evaluation of the existing algorithms is carried out to determine the best approach. In order to improve the classification performance of the best approach in terms of Accuracy, Convergence Behavior and processing time, a hybrid clustering based optimization approach has been proposed.

Keywords: microarray technology, gene expression data, clustering, gene Selection

Procedia PDF Downloads 303
118 Plant Growth, Symbiotic Performance and Grain Yield of 63 Common Bean Genotypes Grown Under Field Conditions at Malkerns Eswatini

Authors: Rotondwa P. Gunununu, Mustapha Mohammed, Felix D. Dakora

Abstract:

Common bean is the most importantly high protein grain legume grown in Southern Africa for human consumption and income generation. Although common bean can associate with rhizobia to fix N₂ for bacterial use and plant growth, it is reported to be a poor nitrogen fixer when compared to other legumes. N₂ fixation can vary with legume species, genotype and rhizobial strain. Therefore, screening legume germplasm can reveal rhizobia/genotype combinations with high N₂-fixing efficiency for use by farmers. This study assessed symbiotic performance and N₂ fixation in 63 common bean genotypes under field conditions at Malkerns Station in Eswatini, using the ¹⁵N natural abundance technique. The shoots of common bean genotypes were sampled at a pod-filling stage, oven-dried (65oC for 72h), weighed, ground into a fine powder (0.50 mm sieve), and subjected to ¹⁵N/¹⁴N isotopic analysis using mass spectrometry. At maturity, plants from the inner rows were harvested for the determination of grain yield. The results revealed significantly higher modulation (p≤0.05) in genotypes MCA98 and CIM-RM01-97-8 relative to the other genotypes. Shoot N concentration was highest in genotype MCA 98, followed by KAB 10 F2.8-84, with most genotypes showing shoot N concentrations below 2%. Percent N derived from atmospheric N₂ fixation (%Ndfa) differed markedly among genotypes, with CIM-RM01-92-3 and DAB 174, respectively, recording the highest values of 66.65% and 66.22 % N derived from fixation. There were also significant differences in grain yield, with CIM-RM02-79-1 producing the highest yield (3618.75 kg/ha). These results represent an important contribution in the profiling of symbiotic functioning of common bean germplasm for improved N₂ fixation.

Keywords: nitrogen fixation, %Ndfa, ¹⁵N natural abundance, grain yield

Procedia PDF Downloads 194
117 An Investigation into Root Causes of Sabotage and Vandalism of Pipes: A Major Environmental Effluence in Niger Delta, Nigeria

Authors: Oshienemen Albert

Abstract:

Human’s activities could be pointed as the root cause of almost all environmental damages/ disasters as we contribute to the activities that are currently damaging the ozone layers (global warming), unusual environmental changes and extreme weather conditions (climate change) in recent times. Nigeria just as every other disaster-prone nation is faced with different types of disasters and environmental calamities, starting from terrorist displacement disasters, flood, drought and oil spill hazards. Oil spillage as an environmental disaster has great consequences not just on the environment but on human health, economy and the entire populace that might be involved, which deem necessary to look into the root causes of the incidents and how it can be curtailed. The different incidents of oil spillages and other oil production consequent on the environment is alarming in the Nigerian context and cannot be overemphasized without a critical investigation and synthesis. This paper investigates the root causes of environmental pollution induced by oil spill hazards from petroleum activities within Niger Delta communities of effects and detailed the potential solutions to reduce the causal factors and reoccurrence of the incidents. This study adopts a desk-based approach, interviews with key members of communities which consist of chiefs, youth leaders, and key women within the high environmental damaged communities. Also, Interviews were conducted with environmental expertise representatives from the oil and gas sectors and representatives from oil spill-related agency. Data were analyzed using thematic techniques. The study shows different influencing factors of sabotage and vandalism of oil facilities as such; marginalization, deprivation of resources utility and resource derivation principles were identified as major contributors to vandalism and sabotage act. The study proposed potential strategies to curtail the root causes of sabotage and vandalism as the major causes of environmental devastations in Nigeria.

Keywords: environment, oil spill hazards, Niger delta, Nigeria

Procedia PDF Downloads 171
116 Metabolic Profiling of Populus trichocarpa Family 1 UDP-Glycosyltransferases

Authors: Patricia M. B. Saint-Vincent, Anna Furches, Stephanie Galanie, Erica Teixeira Prates, Piet Jones, Nancy Engle, David Kainer, Wellington Muchero, Daniel Jacobson, Timothy J. Tschaplinski

Abstract:

Uridine diphosphate-glycosyltransferases (UGTs) are enzymes that catalyze sugar transfer to a variety of plant metabolites. UGT substrates, which include plant secondary metabolites involved in lignification, demonstrate new activities and incorporation when glycosylated. Knowledge of UGT function, substrate specificity, and enzyme products is important for plant engineering efforts, especially related to increasing plant biomass through lignification. UGTs in Populus trichocarpa, a biofuel feedstock, and model woody plant, were selected from a pool of gene candidates using rapid prioritization strategies. A functional genomics workflow, consisting of a metabolite genome-wide association study (mGWAS), expression of synthetic codon-optimized genes, and high-throughput biochemical assays with mass spectrometry-based analysis, was developed for determining the substrates and products of previously-uncharacterized enzymes. A total of 40 UGTs from P. trichocarpa were profiled, and the biochemical assay results were compared to predicted mGWAS connections. Assay results confirmed seven of 11 leaf mGWAS associations and demonstrated varying levels of substrate specificity among candidate UGTs. P. trichocarpa UGT substrate processing confirms the role of these newly-characterized enzymes in lignan, flavonoid, and phytohormone metabolism, with potential implications for cell wall biosynthesis, nitrogen uptake, and biotic and abiotic stress responses.

Keywords: Populus, metabolite-gene associations, GWAS, bio feedstocks, glycosyltransferase

Procedia PDF Downloads 93
115 Modeling Socioeconomic and Political Dynamics of Terrorism in Pakistan

Authors: Syed Toqueer, Omer Younus

Abstract:

Terrorism, today, has emerged as a global menace with Pakistan being the most adversely affected state. Therefore, the motive behind this study is to empirically establish the linkage of terrorism with socio-economic (uneven income distribution, poverty and unemployment) and political nexuses so that a policy recommendation can be put forth to better approach this issue in Pakistan. For this purpose, the study employs two competing models, namely, the distributed lag model and OLS, so that findings of the model may be consolidated comprehensively, over the reference period of 1984-2012. The findings of both models are indicative of the fact that uneven income distribution of Pakistan is rather a contributing factor towards terrorism when measured through GDP per capita. This supports the hypothesis that immiserizing modernization theory is applicable for the state of Pakistan where the underprivileged are marginalized. Results also suggest that other socio-economic variables (poverty, unemployment and consumer confidence) can condense the brutality of terrorism once these conditions are catered to and improved. The rational of opportunity cost is at the base of this argument. Poor conditions of employment and poverty reduces the opportunity cost for individuals to be recruited by terrorist organizations as economic returns are considerably low and thus increasing the supply of volunteers and subsequently increasing the intensity of terrorism. The argument of political freedom as a means of lowering terrorism stands true. The more the people are politically repressed the more alternative and illegal means they will find to make their voice heard. Also, the argument that politically transitioning economy faces more terrorism is found applicable for Pakistan. Finally, the study contributes to an ongoing debate on which of the two set of factors are more significant with relation to terrorism by suggesting that socio-economic factors are found to be the primary causes of terrorism for Pakistan.

Keywords: terrorism, socioeconomic conditions, political freedom, distributed lag model, ordinary least square

Procedia PDF Downloads 304
114 Transcriptome and Metabolome Analysis of a Tomato Solanum Lycopersicum STAYGREEN1 Null Line Generated Using Clustered Regularly Interspaced Short Palindromic Repeats/Cas9 Technology

Authors: Jin Young Kim, Kwon Kyoo Kang

Abstract:

The SGR1 (STAYGREEN1) protein is a critical regulator of plant leaves in chlorophyll degradation and senescence. The functions and mechanisms of tomato SGR1 action are poorly understood and worthy of further investigation. To investigate the function of the SGR1 gene, we generated a SGR1-knockout (KO) null line via clustered regularly interspaced short palindromic repeats (CRISPR)/Cas9-mediated gene editing and conducted RNA sequencing and gas chromatography tandem mass spectrometry (GC-MS/MS) analysis to identify the differentially expressed genes. The SlSGR1 (Solanum lycopersicum SGR1) knockout null line clearly showed a turbid brown color with significantly higher chlorophyll and carotenoid content compared to wild-type (WT) fruit. Differential gene expression analysis revealed 728 differentially expressed genes (DEGs) between WT and sgr1 #1-6 line, including 263 and 465 downregulated and upregulated genes, respectively, for which fold change was >2, and the adjusted p-value was <0.05. Most of the DEGs were related to photosynthesis and chloroplast function. In addition, the pigment, carotenoid changes in sgr1 #1-6 line was accumulated of key primary metabolites such as sucrose and its derivatives (fructose, galactinol, raffinose), glycolytic intermediates (glucose, G6P, Fru6P) and tricarboxylic acid cycle (TCA) intermediates (malate and fumarate). Taken together, the transcriptome and metabolite profiles of SGR1-KO lines presented here provide evidence for the mechanisms underlying the effects of SGR1 and molecular pathways involved in chlorophyll degradation and carotenoid biosynthesis.

Keywords: tomato, CRISPR/Cas9, null line, RNA-sequencing, metabolite profiling

Procedia PDF Downloads 94