The Sultanate of Oman is located in the far southwest of the Arabian Peninsula and enjoys a distinctive geographical location as it overlooks the Arabian Gulf and the Gulf of Oman. The Sultanate has good relations with various countries of the world and enjoys an important regional position. At the beginning of 2020, Sultan Qaboos bin Said died, and Haitham bin Tariq assumed power after him, according to the will of his cousin, the late Sultan. The new Sultan had held some important positions before 2020, including: Minister of Heritage and Culture since February 2002, Chairman of the Supreme Committee for the Future Vision (Oman 2040), Secretary-General of the Ministry of Foreign Affairs, Undersecretary of the Ministry of Foreign Affairs for Political Affairs, and Special Envoy of Sultan Qaboos bin Said. Since assuming power, Sultan Haitham bin Tariq said that he is continuing to preserve what Sultan Qaboos bin Said has accomplished and will continue with the principles of foreign policy based on peaceful coexistence, ensuring good neighborliness, working not to interfere in the internal affairs of others, not engaging in any conflict, and working to respect the sovereignty of other countries as constants of Omani foreign policy. This research deals with the issue of constitutional amendments in Oman during the reign of Sultan Tariq and the impact of those amendments on the internal and foreign policies of the Sultanate.
Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.
Objective Tea lovers are increasing worldwide. We hope that this report is the first to discuss the possible impacts of high black tea consumption on gestational weight gain (GWG) and birth parameters. Methods Throughout one year, a total of 7,063 pregnant ladies coming for first antenatal visit were screened in a major tertiary center. Of them, 1,138 were involved and divided according to their preference into 3 groups: excessive tea (ET), usual tea (UT), and mixed beverages group. The study included women who gave birth to healthy neonates. Results The rate of ET consumption was 4.13% with a total of 41 cases. The UT group (controls) comprised 94 women. ET was significantly associated (P<0.05) with maternal age, parity, occupation, smokin
... Show MoreEriobotrya japonica Lindl., named as loquat, is a subtropical fruit tree of the family Rosaceae which is well known medical plant originated in Japan and China. Loquat portions, like leaves, peels and fruits have been shown to possess various health usefulnesses. In Chinese classical medicine, it is vastly utilized in many illnesses, like gastroenteric disorders, diabetes mellitus, pulmonary inflammatory diseases and chronic bronchitis. Loquat plant contain many active constituents, such as flavonoids, carotenoids, vitamins, polyphenolic compounds, other that have many biological effects like anti-tumor, anti-diabetic, anti-inflammatory, anti-mutagenic, antioxidant, antiviral, antitussive, hepatoprotective and hypoli
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this study, mesoporous silica (MPS) is made using the sol-gel method from a cheap source (Na2SiO3) using the surfactant hydroxycetyl hydroxyethyl dimonium chloride as a template. The task is the adsorption-based removal of the medication metoprolol (MP) at concentrations between 10 and 50 ppm. Variables such as: contact time, dose of adsorbent, starting concentration of adsorbate, and adsorption temperature were studied which show the equilibrium time and adsorbent dose are 40 min and 0.05 g respectively. The Langmuir, Freundlich, Temkin, and Dubinin-Radushkevich isotherm models were fitted to the data obtained from the experiments. Comparing the outcomes showed that, of the four investigated isotherm models, the Freundlich equation m
... Show MoreThe synthesis of new substituted cobalt Phthalocyanine (CoPc) was carried out using starting materials Naphthalene-1,4,5, tetracarbonic acid dianhydride (NDI) employing dry process method. Metal oxides (MO) alloy of (60%Ni3O4 40%-Co3O4 ) have been functionalized with multiwall carbon nanotubes (F-MWCNTs) to produce (F-MWCNTs/MO) nanocomposite (E2) and mixed with CoPc to yield (F-MWCNT/CoPc/MO) (E3). These composites were investigated using different analytical and spectrophotometric methods such as 1H-NMR (0-18 ppm), FTIR spectroscopy in the range of (400-4000cm-1), powder X-rays diffraction (PXRD, 2θ o = 10-80), Raman spectroscopy (0-4000 cm-1), and UV-Visib
... Show More