874 research outputs found

    Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework

    Get PDF
    في هذا العصر، يجب على الدول وضع التشريعات التي تقيس قدرات أمنها السيبراني وتطوير برامجها، بالأخص عندما تُستخدم ثغرات الأمن السيبراني كذريعة لفرض الحصار، كما هو الحال في دولة قطر، وذلك بعد أن تم اختراق وكالة الأنباء القطرية. يقترح هذا البحث نموذجًا لتعزيز قدرات الأمن السيبراني (Q-C2M2) في دولة قطر ضمن إطار تشريعي. ويتناول البحث نموذجًا أصيلًا لتعزيز قدرات الأمن السيبراني مع تسليط الضوء على غرضه وخصائصه واعتماده. كما يعرض البحث نماذجًا لتعزيز قدرات الأمن السيبراني الحالية والمعترف بها عالميًا، ودراسة عن الأمن السيبراني في دولة قطر باستخدام الوثائق المتاحة، وذلك بناء على منهجية التحليل الموضوعي للوثائق. كما يقدم هذا البحث تحليلًا مقارنًا لنماذج تعزيز قدرات الأمن السيبراني في ضوء الأمن السيبراني القطري. وفي هذا الإطار، ساعد التحليل المقارن للوثائق في تحديد الثغرات الموجودة في سياسة تأمين المعلومات الوطنية القطرية بشكل عام، ودليل تأمين المعلومات الوطنية القطرية بشكل خاص. يهدف نموذج  (Q-C2M2) المقترح إلى تعزيز إطار عمل الأمن السيبراني في قطر من خلال توفير نموذج عملي مع عنصر تشريعي يمكن استخدامه لقياس أداء الأمن السيبراني وتطويره. كما يقترح هذا النموذج مجالات للمستخدمين “USERS” التي تتكون من الفهم (Understand)، والأمن(Secure) ، والكشف(Expose) ، والاستعادة(Recover) ، والاستدامة(Sustain) ، حيث يتضمن كل مجال مجالات فرعية، والتي بموجبها يمكن للمؤسسة إنشاء أنشطة للأمن السيبراني عند التقييم الأولي. يستخدم نموذج (Q-C2M2) المستويات الخمسة التالية لقياس تعزيز قدرات الأمن السيبراني للمنظمات: البدء والتطبيق والتطوير والتكيف والمرونة.In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case of Qatar prompted by a hack of the Qatar News Agency, it becomes incumbent upon states to consider legislating the capability maturity measurement and the development of their cybersecurity programs across the community. This paper proposes a Qatar Cybersecurity Capability Maturity Model (Q-C2M2) with a legislative framework. The paper discusses the origin, purpose and characteristics of a capability maturity model and its adoption in the cybersecurity domain. Driven by a thematic analysis under the document analysis methodology, the paper examines existing globally recognized cybersecurity capability maturity models and Qatar’s cybersecurity framework using publicly available documents. This paper also conducts a comparative analysis of existing cybersecurity capability maturity models in light of the Qatari cybersecurity framework, including a comparative analysis of cybersecurity capability maturity model literature. The comparative document analysis helped identify gaps in the existing Qatar National Information Assurance Policy and specifically the Qatar National Information Assurance Manual. The proposed Q-C2M2 aims to enhance Qatar’s cybersecurity framework by providing a workable Q-C2M2 with a legislative component that can be used to benchmark, measure and develop Qatar’s cybersecurity framework. The Q-C2M2 proposes the USERS domains consisting of Understand, Secure, Expose, Recover and Sustain. Each domain consists of subdomains, under which an organization can create cybersecurity activities at initial benchmarking. The Q-C2M2 uses the following five levels to measure the cybersecurity capability maturity of an organization: Initiating, Implementing, Developing, Adaptive and Agile

    Comparative Assessment of the Binding and Neutralisation Activity of Bispecific Antibodies Against SARS-CoV-2 Variants.

    Get PDF
    Neutralising antibodies against SARS-CoV-2 are a vital component in the fight against COVID-19 pandemic, having the potential of both therapeutic and prophylactic applications. Bispecific antibodies (BsAbs) against SARS-CoV-2 are particularly promising, given their ability to bind simultaneously to two distinct sites of the receptor-binding domain (RBD) of the viral spike protein. Such antibodies are complex molecules associated with multi-faceted mechanisms of action that require appropriate bioassays to ensure product quality and manufacturing consistency. We developed procedures for biolayer interferometry (BLI) and a cell-based virus neutralisation assay, the focus reduction neutralisation test (FRNT). Using both assays, we tested a panel of five BsAbs against different spike variants (Ancestral, Delta and Omicron) to evaluate the use of these analytical methods in assessing binding and neutralisation activities of anti-SARS-CoV-2 therapeutics. We found comparable trends between BLI-derived binding affinity and FRNT-based virus neutralisation activity. Antibodies that displayed high binding affinity against a variant were often followed by potent neutralisation at lower concentrations, whereas those with low binding affinity also demonstrated reduced neutralisation activity. The results support the utility of BLI and FRNT assays in measuring variant-specific binding and virus neutralisation activity of anti-SARS-CoV-2 antibodies

    Grazing protozoa and the evolution of the Escherichia coli O157:H7 Shiga toxin-encoding prophage

    Get PDF
    Humans play little role in the epidemiology of Escherichia coli O157:H7, a commensal bacterium of cattle. Why then does E. coli O157:H7 code for virulence determinants, like the Shiga toxins (Stxs), responsible for the morbidity and mortality of colonized humans? One possibility is that the virulence of these bacteria to humans is coincidental and these virulence factors evolved for and are maintained for other roles they play in the ecology of these bacteria. Here, we test the hypothesis that the carriage of the Stx-encoding prophage of E. coli O157:H7 increases the rate of survival of E. coli in the presence of grazing protozoa, Tetrahymena pyriformis. In the presence but not the absence of Tetrahymena, the carriage of the Stx-encoding prophage considerably augments the fitness of E. coli K-12 as well as clinical isolates of E. coli O157 by increasing the rate of survival of the bacteria in the food vacuoles of these ciliates. Grazing protozoa in the environment or natural host are likely to play a significant role in the ecology and maintenance of the Stx-encoding prophage of E. coli O157:H7 and may well contribute to the evolution of the virulence of these bacteria to colonize humans

    Relativistic Heavy--Ion Collisions in the Dynamical String--Parton Model

    Get PDF
    We develop and extend the dynamical string parton model. This model, which is based on the salient features of QCD, uses classical Nambu-Got\=o strings with the endpoints identified as partons, an invariant string breaking model of the hadronization process, and interactions described as quark-quark interactions. In this work, the original model is extended to include a phenomenological quantization of the mass of the strings, an analytical technique for treating the incident nucleons as a distribution of string configurations determined by the experimentally measured structure function, the inclusion of the gluonic content of the nucleon through the introduction of purely gluonic strings, and the use of a hard parton-parton interaction taken from perturbative QCD combined with a phenomenological soft interaction. The limited number of parameters in the model are adjusted to e+ee^+e^- and pp --pp data. Utilizing these parameters, the first calculations of the model for pp --AA and AA--AA collisions are presented and found to be in reasonable agreement with a broad set of data.Comment: 26 pages of text with 23 Postscript figures placed in tex

    What Makes Some People Think Astrology Is Scientific?

    Get PDF
    Citizens in both North America and Europe are apt to read horoscope columns in newspapers and magazines. While some people read these casually and purely for entertainment, some believe that astrology has scientific status and can provide real insight into events and personality. Using data from a European survey, this article explores some of the reasons why some people think that astrology is scientific and how astrology is viewed in relation to other knowledge-producing practices. Three hypotheses in particular are tested. The first is that some Europeans lack the necessary scientific literacy to distinguish science from pseudoscience. The second is that people are confused about what astrology actually is. The third is derived from Adorno’s work on authoritarianism and the occult and postulates that those who adhere to authoritarian values are more likely to believe in astrological claims. Support is found for all three hypotheses. </jats:p

    Quantifying the impact of variability in railway bridge asset management

    Get PDF
    Bridge asset management is often a challenging and complicated task due to the diversity, multitude and variation of bridge configurations. Much research has been carried out in the field of asset management which has resulted in a wealth of models to help with the decision making process. However, often these models oversimplify the process, resulting in a decision making tool that trivialises the complexity of the decisions. The purpose of this study was to ascertain what the main sources of variability are in the process and then quantify the impact of them in terms of the Whole Life-Cycle Cost (WLCC). The study focuses on human-induced variability to ensure the results are directly influenceable by bridge portfolio managers. The sources of variability identified include misdiagnoses of defects as well as imperfect repairs and variability in costs, all of which are aspects that bridge portfolio managers are exposed to. The sources of variability are quantified and then incorporated into an existing railway bridge WLCC model, established in a previous study, which uses a flexible Petri-Net (PN) approach which is able to incorporate the complex logic and probabilistic aspects. The model itself is able to replicate some of the more complicated decisions which have to be made in bridge asset management, especially those which influence the decisions around rehabilitation. The resulting model, enhanced with the probabilistic variability, is able to reveal the impact of variability on the asset condition, WLCC and even understand where operational complexities are occurring within the system. Incorporating human-induced variability into any model will inevitably increase the financial and operational burden predicted by the model, however, recognising and modelling these aspects is a crucial step in providing bridge portfolio managers a more robust and accurate decision making tool which can more accurately replicate the real world system

    Phenotypic Diversity for Seed Mineral Concentration in North American Dry Bean Germplasm of Middle American Ancestry

    Get PDF
    Dry bean (Phaseolus vulgaris L.) seeds are a major protein, carbohydrate, and mineral source in the human diet of peoples in multiple regions of the world. Seed mineral biofortification is an ongoing objective to improve this important food source. The objective of this research was to assess the seed mineral concentration of five macroelements and eight microelements in a large panel (n = 277) of modern race Durango and race Mesoamerica genotypes to determine if variability existed that could be exploited for targeted seed biofortification. Varieties that derive from these races are found in many diets throughout the world. The panel was grown in replicated trials under typical production conditions in the major bean growing regions of the United States, and a subset of the panel was also grown in replicated trials at three locations under control and terminal drought conditions. Except for K, seed mineral concentrations were higher for race Mesoamerica genotypes. Significantly higher seed concentrations for the majority of the minerals were observed for white-seeded genotypes and race Durango genotypes with the now preferred indeterminate, upright growth habit. Modern genotypes (since 1997) had equal or increased mineral concentrations compared with older genotypes. Drought affected mineral content differentially, having no effect on the microelement content but increased Co, Fe, and Ni concentrations. The correlation of Ca and Mn concentrations suggests that these elements may share seed deposition mechanisms. The high heritability for seed mineral concentration implies that breeding progress can be achieved by parental selection from this panel

    Slow Relaxation in a Constrained Ising Spin Chain: a Toy Model for Granular Compaction

    Full text link
    We present detailed analytical studies on the zero temperature coarsening dynamics in an Ising spin chain in presence of a dynamically induced field that favors locally the `-' phase compared to the `+' phase. We show that the presence of such a local kinetic bias drives the system into a late time state with average magnetization m=-1. However the magnetization relaxes into this final value extremely slowly in an inverse logarithmic fashion. We further map this spin model exactly onto a simple lattice model of granular compaction that includes the minimal microscopic moves needed for compaction. This toy model then predicts analytically an inverse logarithmic law for the growth of density of granular particles, as seen in recent experiments and thereby provides a new mechanism for the inverse logarithmic relaxation. Our analysis utilizes an independent interval approximation for the particle and the hole clusters and is argued to be exact at late times (supported also by numerical simulations).Comment: 9 pages RevTeX, 1 figures (.eps

    Optical Detection of a Single Nuclear Spin

    Full text link
    We propose a method to optically detect the spin state of a 31-P nucleus embedded in a 28-Si matrix. The nuclear-electron hyperfine splitting of the 31-P neutral-donor ground state can be resolved via a direct frequency discrimination measurement of the 31-P bound exciton photoluminescence using single photon detectors. The measurement time is expected to be shorter than the lifetime of the nuclear spin at 4 K and 10 T.Comment: 4 pages, 3 figure
    corecore