Search Results - "Ali, F M H"
-
1
Evaluation of the clinical impact and In Vitro antibacterial activities of two bioactive restoratives against S. mutans ATCC 25175 in class II carious restorations
Published in Nigerian journal of clinical practice (01-04-2023)“…Background: Streptococcus mutans is a Gram-positive opportunistic bacterial pathogen and that causes dental caries and then restorative treatment remains the…”
Get full text
Journal Article -
2
Environmental carcinogen exposure and lifestyle factors affecting cancer risk in Qatar: findings from a qualitative review
Published in Eastern Mediterranean health journal (15-06-2016)“…To meet the country's health goals for 2011-2016, a qualitative review of exposure to risk factors for cancer in Qatar was conducted in 2013. The review…”
Get full text
Journal Article -
3
Bees wax and its unsaponifiables as natural preservative for butter and cottonseed oils
Published in Grasas y aceites (Sevilla) (01-05-1993)“…Sistemas modelo simples consistentes en aceite de mantequilla o aceite de semilla de algodon refinado mezclado con cera de abeja derretida y su insaponificable…”
Get full text
Journal Article -
4
Environmental carcinogen exposure and lifestyle factors affecting cancer risk in Qatar: findings from a qualitative review/Exposition aux carcinogenes environnementaux et facteurs associes aux modes de vie augmentant le risque de cancer au Qatar: resultats d'une analyse qualitative
Published in Eastern Mediterranean health journal (01-03-2016)“…To meet the country's health goals for 2011-2016, a qualitative review of exposure to risk factors for cancer in Qatar was conducted in 2013. The review…”
Get full text
Journal Article -
5
Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks
Published in 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP) (01-05-2012)“…The enormous number of attacks over the Internet nowadays makes the information under potential violation. Intrusion Detection System (IDS) is used as second…”
Get full text
Conference Proceeding -
6
Simple port knocking method: Against TCP replay attack and port scanning
Published in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (01-06-2012)“…Port knocking is a first technique introduces to prevent attackers from discovering and exploiting potentially vulnerable service on a network host, while…”
Get full text
Conference Proceeding