• Title/Summary/Keyword: Al Hail

Search Result 5, Processing Time 0.017 seconds

Effects of Tobacco Smoking on the Dorsum of the Tongue and Buccal Epithelium

  • Al Shammari, Abdullah Faraj;AL Ibrahim, Ibrahim Khalil;Alaauldeen, Amjad Ibrahim;Merza, Randa Fouad;Ahmed, Hussain Gadelkarim
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.10
    • /
    • pp.4713-4718
    • /
    • 2016
  • Objective: The aim of this study was to assess the effects of tobacco smoking on the dorsum of the tongue and buccal epithelium. Methodology: This case control cross-sectional study was conducted with 174 smoking and non-smoking volunteers living in the city of Hail, Northern KSA. Cytological Materials were obtained from buccal mucosa and dorsum of the tongue, and assessed using cytopathological methods. Results: In buccal smears, cytological atypia was observed in 17 out of 101 (16.8%) smoker cases but only 3/73(4.1%) of the controls. For cytological atypia in buccal and tongue smears, the adjusted odd ratio (OR) and the 95% confidence interval (CI) were found to be 4.7 (1.3-16.8), P < 0.016)) and 4.3 (0.93- 20.2), P <0.06)), respectively, in the two sites. Conclusion: Tobacco smoking is a major risk factor for occurrence of cytological atypia, which might subsequently develop into oral precancerous and cancerous lesions. Oral exfoliative cytology is an easy and cheap non-invasive procedure which appears highly suitable for screening populations at risk of developing oral cancer.

Honeypots Tools Study and Analysis

  • Al-Jameel, Sultan;Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.162-173
    • /
    • 2021
  • The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.

Viewpoint Model Manipulating Inconsistencies Management

  • Ahmad Dalalah;Jalawi AlShudukhi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.96-100
    • /
    • 2023
  • In this paper, each inconsistency management process activities was addressed. In addition, a guideline to deal with inconsistency by viewpoints method are introduced. At the end of the paper you should have clear idea to support inconsistency management in future research and having good knowledge of inconsistency management process activities and research issues. Moreover, it gives the researcher ability to design new framework by using powerful concept in inconsistency management and viewpoint techniques. The paper is organized as follows: an introduction is presented in section one, section two contains process viewpoint, while section three includes the proposed model and conclusions are in section four.

Groundwater pollution risk mapping using modified DRASTIC model in parts of Hail region of Saudi Arabia

  • Ahmed, Izrar;Nazzal, Yousef;Zaidi, Faisal
    • Environmental Engineering Research
    • /
    • v.23 no.1
    • /
    • pp.84-91
    • /
    • 2018
  • The present study deals with the management of groundwater resources of an important agriculture track of north-western part of Saudi Arabia. Due to strategic importance of the area efforts have been made to estimate aquifer proneness to attenuate contamination. This includes determining hydrodynamic behavior of the groundwater system. The important parameters of any vulnerability model are geological formations in the region, depth to water levels, soil, rainfall, topography, vadose zone, the drainage network and hydraulic conductivity, land use, hydrochemical data, water discharge, etc. All these parameters have greater control and helps determining response of groundwater system to a possible contaminant threat. A widely used DRASTIC model helps integrate these data layers to estimate vulnerability indices using GIS environment. DRASTIC parameters were assigned appropriate ratings depending upon existing data range and a constant weight factor. Further, land-use pattern map of study area was integrated with vulnerability map to produce pollution risk map. A comparison of DRASTIC model was done with GOD and AVI vulnerability models. Model validation was done with $NO_3$, $SO_4$ and Cl concentrations. These maps help to assess the zones of potential risk of contamination to the groundwater resources.

Lucerne transient streak virus; a Recently Detected Virus Infecting Alfafa (Medicago sativa) in Central Saudi Arabia

  • Raza, Ahmed;Al-Shahwan, Ibrahim M.;Abdalla, Omer A.;Al-Saleh, Mohammed A.;Amer, Mahmoud A.
    • The Plant Pathology Journal
    • /
    • v.33 no.1
    • /
    • pp.43-52
    • /
    • 2017
  • A survey was conducted to determine the status of Lucerne transient streak virus (LTSV) in three high-yielding alfalfa regions in central Saudi Arabia (Riyadh, Qassim, and Hail) during 2014. Three hundred and eight symptomatic alfalfa, and seven Sonchus oleraceus samples were collected. DAS-ELISA indicated that 59 of these samples were positive to LTSV. Two isolates of LTSV from each region were selected for molecular studies. RT-PCR confirmed the presence of LTSV in the selected samples using a specific primer pair. Percentage identity and homology tree comparisons revealed that all Saudi isolates were more closely related to each other but also closely related to the Canadian isolate-JQ782213 (97.1-97.6%) and the New Zealand isolate-U31286 (95.8-97.1%). Comparing Saudi isolates of LTSV with ten other sobemoviruses based on the coat protein gene sequences confirmed the distant relationship between them. Eleven out of fourteen plant species used in host range study were positive to LTSV. This is the first time to document that Trifolium alexandrinum, Nicotiana occidentalis, Chenopodium glaucum, and Lathyrus sativus are new host plant species for LTSV and that N. occidentalis being a good propagative host for it.