Search Results - "Ali, F M H"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Evaluation of the clinical impact and In Vitro antibacterial activities of two bioactive restoratives against S. mutans ATCC 25175 in class II carious restorations by Maher, Y, Rajeh, M, Hamooda, F, Zerain, G, Habis, R, Sulaimani, R, Albar, S, H Ali, F, Abdelaleem, N

    Published in Nigerian journal of clinical practice (01-04-2023)
    “…Background: Streptococcus mutans is a Gram-positive opportunistic bacterial pathogen and that causes dental caries and then restorative treatment remains the…”
    Get full text
    Journal Article
  2. 2

    Environmental carcinogen exposure and lifestyle factors affecting cancer risk in Qatar: findings from a qualitative review by Denholm, R, Schüz, J, Straif, K, Ali, F M H, Bonas, F, Gjebrea, O, Sifton, C, Olsson, A C

    Published in Eastern Mediterranean health journal (15-06-2016)
    “…To meet the country's health goals for 2011-2016, a qualitative review of exposure to risk factors for cancer in Qatar was conducted in 2013. The review…”
    Get full text
    Journal Article
  3. 3

    Bees wax and its unsaponifiables as natural preservative for butter and cottonseed oils by Farag, R.S. (Cairo Universiti (Egipto). Biochemistry Dept.), Hassan, M.N.A, Ali, H.F

    Published in Grasas y aceites (Sevilla) (01-05-1993)
    “…Sistemas modelo simples consistentes en aceite de mantequilla o aceite de semilla de algodon refinado mezclado con cera de abeja derretida y su insaponificable…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks by Hussein, S. M., Ali, F. H. M., Kasiran, Z.

    “…The enormous number of attacks over the Internet nowadays makes the information under potential violation. Intrusion Detection System (IDS) is used as second…”
    Get full text
    Conference Proceeding
  6. 6

    Simple port knocking method: Against TCP replay attack and port scanning by Ali, F. H. M., Yunos, R., Alias, M. A. M.

    “…Port knocking is a first technique introduces to prevent attackers from discovering and exploiting potentially vulnerable service on a network host, while…”
    Get full text
    Conference Proceeding