Understanding key skills for information security managers
Journal Article

Information security management is a necessity for all institutions and enterprises that regard company information as valuable assets. Developing, auditing and managing information security depends upon professional expertise in order to achieve the desired information security governance. This research seeks the key skills required for the position of information security management as well as the methods to develop these skills through professional training programs. The study adopts the Delphi method which requires building a list of items through a literature survey and involves experts with certain expertise to modify the list until a consensus on less than 20% of the items is reached. Through completing three rounds of the Delphi technique - data collection, relevance voting and ranking - sixteen skills are shortlisted as the key skills. In the final list, the majority belong to core information security skills, and the top two skills belong to project/process management skills and risk management skills, indicating the importance of these skills for the information security manager role. In addition, a series of related professional training programs and certifications are surveyed, the outcome of which highlights a number of most comprehensive and appropriate programs to develop these determined skills.

HUSAM TOFIQ KHALEFA HAQAF, (12-2018), تركيا: International Journal of Information Management, 43 (2018), 165-172

أبو زهرة ومنهجه في إعمال القراءات من خلال تفسيره (زهرة التفاسير)
رسالة ماجستير


أشرف محمد إبراهيم دبوبة، (11-2018)، الأكاديمية الليبية للدراسات العليا طرابلس: الاكاديمية الليبية،

The transferable resistome of produce
Journal Article

Produce is increasingly recognized as a reservoir of human pathogens and transferable antibiotic resistance genes. This study aimed to explore methods to characterize the transferable resistome of bacteria associated with produce. Mixed salad, arugula, and cilantro purchased from supermarkets in Germany were analyzed by means of cultivation- and DNA-based methods. Before and after a nonselective enrichment step, tetracycline (TET)-resistant Escherichia coli were isolated and plasmids conferring TET resistance were captured by exogenous plasmid isolation. TET-resistant E. coli isolates, transconjugants, and total community DNA (TC-DNA) from the microbial fraction detached from leaves or after enrichment were analyzed for the presence of resistance genes, class 1 integrons, and various plasmids by real-time PCR and PCR-Southern blot hybridization. Real-time PCR primers were developed for IncI and IncF plasmids. TET-resistant E. coli isolated from arugula and cilantro carried IncF, IncI1, IncN, IncHI1, IncU, and IncX1 plasmids. Three isolates from cilantro were positive for IncN plasmids and blaCTX-M-1 From mixed salad and cilantro, IncF, IncI1, and IncP-1β plasmids were captured exogenously. Importantly, whereas direct detection of IncI and IncF plasmids in TC-DNA failed, these plasmids became detectable in DNA extracted from enrichment cultures. This confirms that cultivation-independent DNA-based methods are not always sufficiently sensitive to detect the transferable resistome in the rare microbiome. In summary, this study showed that an impressive diversity of self-transmissible multiple resistance plasmids was detected in bacteria associated with produce that is consumed raw, and exogenous capturing into E. coli suggests that they could transfer to gut bacteria as well.

Khald Blau, (11-2018), USA: mBio, 9 (6), 1-15

Structural insights into the function of type VI secretion system TssA subunits
Journal Article

The type VI secretion system (T6SS) is a multi-protein complex that injects bacterial effector proteins into target cells. It is composed of a cell membrane complex anchored to a contractile bacteriophage tail-like apparatus consisting of a sharpened tube that is ejected by the contraction of a sheath against a baseplate. We present structural and biochemical studies on TssA subunits from two different T6SSs that reveal radically different quaternary structures in comparison to the dodecameric E. coli TssA that arise from differences in their C-terminal sequences. Despite this, the different TssAs retain equivalent interactions with other components of the complex and position their highly conserved N-terminal ImpA_N domain at the same radius from the centre of the sheath as a result of their distinct domain architectures, which includes additional spacer domains and highly mobile interdomain linkers. Together, these variations allow these distinct TssAs to perform a similar function in the complex.

Asma Ashor Alajeli Ahmad, (11-2018), عن: تم أختياره, 12 (9), 1-16

2,6Diamin pyridine complexes with sodium salts of some amino acids : synthesis and chracterization
Journal Article

0

Afaf Mohamed Ali Almagtuf, Aisha Basher Ali Elmagtof, Omar Ali Saied Miftah, (10-2018), المعهد العالي للعلوم والتقنية الأصابعة: مجلة العلوم التقنية, 2 (2018), 1-17

دراسة الأنواع البكتيرية الموجودة داخل الفم وعلى اسنان البالغين والاطفال والمسببة لبعض الامراض الفم والاسنان
مقال في مجلة علمية

احمد فرج التومي عبد الرحمن، الصديق رمضان عنان، (10-2018)، جامعة نبي وليد: جامعة نبي وليد، 0

Colour image blind watermarking scheme based on fast walsh hadamard transform and hessenberg decomposition
Journal Article

Colour image watermarking has become one of the most important algorithms for copyright protection. The following paper will present an innovative scheme for watermarking blind colour images using the discrete wavelet transform (DWT), fast Walsh Hadamard transform (FWHT) and the Hessenberg decomposition as its basis. First, two-level DWT followed by FWHT are used to decompose the host image’s red channel. Next, the FWHT coefficients are split into 4× 4 non-overlapping blocks. Then, each selected block is decomposed using Hessenberg decomposition, where the first row, first column element of the upper Hessenberg matrix H is quantified to embed the watermark information. Peak signalto-noise ratio, normalized cross-correlation and structural similarity index measure are used to evaluate the feasibility and the robustness. The experimental results have demonstrated that the proposed watermarking scheme is highly invisible with PSNR> 40 dB, for several watermarked colour images, with a capacity of 4096 bits and execution time of 0.7415 s. The proposed watermarking scheme is also highly resistant to both common image processing and geometrical attacks such as filtering, JPEG2000, noise adding, cropping, scaling, blurring and sharpening, and others

Omar Moftah Ibrahim Abodena, Mary Agoyi, (09-2018), Studies in Informatics and Control: Studies in Informatics and Control, 27 (3), 339-348

Diversity Profiling of Learners to Understand Their Domain Coverage While Watching Videos
Conference paper

Modelling diversity is especially valuable in soft skills learning, where contextual awareness and understanding of different perspectives are crucial. This paper presents an application of a diversity analytics pipeline to generate domain diversity profiles for learners as captured in their comments while watching videos for learning a soft skill. The datasets for analysis were collected from a series of studies on learning presentation skills with Active Video Watching system (AVW-Space). Two user studies (with 37 postgraduates and 140 undergraduates, respectively) were compared. The learners’ diversity and personal profiles are used to further understand and highlight any notable patterns about their domain coverage on presentation skills.

Entisar Nassr Abdulati Abolkasim, (09-2018), Springer, Cham: Springer, 561-565

Detecting the Likely Causes behind the Emotion Spikes of Influential Twitter Users for Arabic language
Journal Article

ABSTRACT To our knowledge all the previous researches and studies for extracting the likely cause of emotion spikes was for comments and reviews with non-Arabic languages. Although, According to a study performed by Semiocast , Arabic was the fastest growing language on Twitter in 2011, and was the 6th most used language on Twitter in 2012. While a wide range of Arabic opinionated posts are broadcasted, research in the area of Arabic sentiment analysis remain sparse and show a very slow progress compared to that being carried out in other languages, mainly in English . For that, our work will be to identifying the likely causes of strong and sudden change of emotions within the temporal dimension of influential users’ emotion flow in Arabic Twitter we chose twitter because Twitter as a microblogging platform, receives over 500 million tweets worldwide every day as per 2016.These emotion spikes are the reaction of users toward certain events. Hence, our system will try to extracts keyphrases, which associated with each identified emotion spike, and passes them to an analyze step. Then the system will detect the named-entities and events or topics identification since the extracted keyphrases indicate a change on user’s emotions, and represent the causes of a particular emotion spike. 

Entesar Mahdi Milod Eljali, tarik MLIOD ALARBI AHMAD, (09-2018), www.ijerd.com: International Journal Of Engineering Research And Development, 9 (2), 34-40

The effectiveness of teachers and parents which helps prevent school violence among learners
Journal Article

.

Sarah Salem Alsunni Alzawali, (09-2018), ليبيا: مجلة العلوم الانسانية, 17 (9), 1-10

© All rights reserved to University of Gharyan