• Title/Summary/Keyword: Jeddah

Search Result 114, Processing Time 0.023 seconds

Does the Increasing Trend of Colorectal Cancer Incidence in Jeddah Reflect a Rise in the Kingdom of Saudi Arabia?

  • Mosli, Mahmoud H.;Al-Ahwal, Mahmoud S.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.12
    • /
    • pp.6285-6288
    • /
    • 2012
  • Background: The aim of this study was to outline the trend in the incidence of colorectal cancer (CRC) in the city of Jeddah, Kingdom of Saudi Arabia (KSA), for comparison with previously published national CRC data. Materials and Methods: A retrospective data analysis was performed on all cases of CRC diagnosed between January 2000 and December 2006 amongst Saudi patients in Jeddah using data retrieved from the Saudi Cancer Registry (SCR). Descriptive analysis was performed and results were compared to national CRC data from the SCR. Results: In Jeddah, 644 cases of CRC were diagnosed during the time period, accounting for 15% of all CRC cases in KSA. Males were more commonly affected than females (58% versus 42%). The male preponderance of CRC was similar to that observed at a national level. In Jeddah, the incidence was higher among those >45 years (77.0%), and the mean age at diagnosis was 57 years. At diagnosis, 10% of patients presented with localized disease; 25% presented with distant metastasis and the remaining patients had various stages of regional extension. Adenocarcinomas accounted for 72% of cases. Statistical analysis did not reveal any clinically significant differences between cases diagnosed in Jeddah and those diagnosed throughout KSA. Conclusions: The increased trend in the incidence of CRC in Jeddah between 2000 and 2006 mirrors the recent trend in KSA. This highlights the magnitude of this healthcare hazard, not only in Jeddah, but also across the country and supports the need for preventive measures and early detection of the disease.

Breast Cancer Awareness among Saudi Females in Jeddah

  • Radi, Sahar Mahmoud
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.7
    • /
    • pp.4307-4312
    • /
    • 2013
  • Breast cancer is the most frequent malignancy of women worldwide. It is the leading cause of female cancer related disability and mortality. In Saudi Arabia breast cancer ranks first among cancerous diseases in females. In the Gulf region, and especially in Saudi Arabia, few studies have been conducted to address breast cancer awareness. The purpose of the current study was therefore to investigate the level of breast cancer awareness among Saudi females in Jeddah, focusing on knowledge of breast cancer warning signs, risk factors, screening programs and breast self-examination (BSE). The design of this study was an exploratory correlational analysis. The sample comprised 200 Saudi females aged 20 and older living in Jeddah. Data were collected using face-to-face interviews. Breast cancer awareness was measured using a modified Arabic version of the Breast Cancer Awareness Measure (Breast CAM) version 2. Descriptive statistical analysis, Pearson's Product Moment correlation coefficients and ANOVA test were used to answer study questions. Out of 200 participants, 50.5% were aware of breast lump as a warning sign of breast cancer, 57.5% claimed that family history was risk factor, 20.5% had undergone breast screening, 79% heard about BSE, and 47.5% knew how to perform BSE. Findings indicated that Saudi females level of awareness of breast cancer is very inadequate. Public awareness interventions are needed in order to overcome an ever-increasing burden of this disease among Saudi females.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

Computer Architecture Execution Time Optimization Using Swarm in Machine Learning

  • Sarah AlBarakati;Sally AlQarni;Rehab K. Qarout;Kaouther Laabidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.49-56
    • /
    • 2023
  • Computer architecture serves as a link between application requirements and underlying technology capabilities such as technical, mathematical, medical, and business applications' computational and storage demands are constantly increasing. Machine learning these days grown and used in many fields and it performed better than traditional computing in applications that need to be implemented by using mathematical algorithms. A mathematical algorithm requires more extensive and quicker calculations, higher computer architecture specification, and takes longer execution time. Therefore, there is a need to improve the use of computer hardware such as CPU, memory, etc. optimization has a main role to reduce the execution time and improve the utilization of computer recourses. And for the importance of execution time in implementing machine learning supervised module linear regression, in this paper we focus on optimizing machine learning algorithms, for this purpose we write a (Diabetes prediction program) and applying on it a Practical Swarm Optimization (PSO) to reduce the execution time and improve the utilization of computer resources. Finally, a massive improvement in execution time were observed.

Evaluation of Head and Neck Cancer Awareness and Screening Status in Jeddah, Saudi Arabia

  • Alhazzazi, Turki Y
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.3
    • /
    • pp.1135-1139
    • /
    • 2016
  • Background: Head and neck cancer (HNC) is one of the deadliest cancers worldwide. Early detection is a key determinant of HNC prognosis. Hence, raising awareness of this disease may improve survival rates. The present study evaluated the level of awareness and screening status for HNC in the general population of Jeddah, Saudi Arabia. Materials and Methods: An e-questionnaire was distributed during our HNC awareness campaign at the Red Sea Mall in Jeddah. The questions assessed HNC knowledge and screening status among participants. Results: Of the 112 respondents, 68% indicated that they had no knowledge of HNC. Social media was the major source of information (39%) for respondents. The majority (40%) believed that it was the joint responsibility of dentists, dental hygienists, and general physicians to screen for HNC; 82% had never been screened. Conclusions: Knowledge and awareness of HNC must be increased in the general population and among dental health professionals.

UPHILL ZAGREB INDICES OF SOME GRAPH OPERATIONS FOR CERTAIN GRAPHS

  • SALEH, ANWAR;BAZHEAR, SARA;MUTHANA, NAJAT
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.5_6
    • /
    • pp.959-977
    • /
    • 2022
  • The topological indices are numerical parameters which determined the biological, physical and chemical properties based on the structure of the chemical compounds. One of the recently topological indices is the uphill Zagreb indices. In this paper, the formulae of some uphill Zagreb indices for a few graph operations of some graphs have been derived. Furthermore, the precise formulae of those indices for the honeycomb network have been found along with their graphical profiles.

Evaluation of CPU And RAM Performance for Markerless Augmented Reality

  • Tagred A. Alkasmy;Rehab K. Qarout;Kaouther Laabidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.44-48
    • /
    • 2023
  • Augmented Reality (AR) is an emerging technology and a vibrant field, it has become common in application development, especially in smartphone applications (mobile phones). The AR technology has grown increasingly during the past decade in many fields. Therefore, it is necessary to determine the optimal approach to building the final product by evaluating the performance of each of them separately at a specific task. In this work we evaluated overall CPU and RAM performance for several types of Markerless Augmented Reality applications by using a multiple-objects in mobile development. The results obtained are show that the objects with fewer number of vertices performs steady and not oscillating. Object was superior to the rest of the others is sphere, which is performs better values when processed, its values closer to the minimum CPU and RAM usage.

Challenges in the Architectural Technical Design of the New Generation of Supertall Buildings

  • Weismantle, Peter A.
    • International Journal of High-Rise Buildings
    • /
    • v.7 no.1
    • /
    • pp.85-93
    • /
    • 2018
  • The design of a supertall building poses many challenges to the architect and engineer. Using Jeddah Tower as a case study; this paper intends to discuss a few of those challenges specifically related to the arrangement of programmed spaces in the tower, their functional connection by means of the vertical transportation system and physical connection with shafts which introduces the potential for stack effect in the building. The measures applied in response to and mitigation of these issues are discussed.

Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study

  • Hakami, Mazen;Alshaikh, Moneer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.299-309
    • /
    • 2022
  • Human factor represents a very challenging issue to organizations. Human factor is responsible for many cybersecurity incidents by noncompliance with the organization security policies. In this paper we conduct a comprehensive review of the literature to identify strategies to address human factor. Security awareness, training and education program is the main strategy to address human factor. Scholars have consistently argued that importance of security awareness to prevent incidents from human behavior.

Blockchain for Securing Smart Grids

  • Aldabbagh, Ghadah;Bamasag, Omaimah;Almasari, Lola;Alsaidalani, Rabab;Redwan, Afnan;Alsaggaf, Amaal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.255-263
    • /
    • 2021
  • Smart grid is a fully-automated, bi-directional, power transmission network based on the physical grid system, which combines sensor measurement, computer, information communication, and automatic control technology. Blockchain technology, with its security features, can be integrated with Smart Grids to provide secure and efficient power management and transmission. This paper dicusses the deployment of Blockchain technology in Smart Grid. It presents application areas and protocols in which blockchain can be applied to in securing smart grid. One application of each area is explored in detail, such as efficient peer-to-peer transaction, lower platform costs, faster processes, greater flexibility in power generation to transmission, distribution and power consumption in different energy storage systems, current barriers obstructing the implementation of blockchain applications with some level of maturity in financial services but concepts only in energy and other sectors. Wide range of energy applications suggesting a suitable blockchain architecture in smart grid operations, a sample block structure and the potential blockchain technicalities employed in it. Also, added with efficient data aggregation schemes based on the blockchain technology to overcome the challenges related to privacy and security in the smart grid. Later on, consensus algorithms and protocols are discussed. Monitoring of the usage and statistics of energy distribution systems that can also be used to remotely control energy flow to a particular area. Further, the discussion on the blockchain-based frameworks that helps in the diagnosis and maintenance of smart grid equipment. We have also discussed several commercial implementations of blockchain in the smart grid. Finally, various challenges have been discussed for integrating these technologies. Overall, it can be said at the present point in time that blockchain technology certainly shows a lot of potentials from a customer perspective too and should be further developed by market participants. The approaches seen thus far may have a disruptive effect in the future and might require additional regulatory intervention in an already tightly regulated energy market. If blockchains are to deliver benefits for consumers (whether as consumers or prosumers of energy), a strong focus on consumer issues will be needed.