Recently Published Articles
Is the Onion Router a Secure Network?
Abstract:
This paper attempts to answer the question of how government agencies use The Onion Router, or Tor, in conducting investigations. The essay observes that Tor is free open-source software that can be used by anyone who desires to communicate with others in a secure manner. In surveying the literature, it is found that Tor can be employed for both legal and illegal purposes. As the major financial contributor, Tor is used by government to secure its communications. Because Tor by bad actors, and because many of the Tor relays are operated by government agencies, Tor has been successfully employed in catching unsuspecting criminals. The conclusion of this exposition is that if one wants to communicate securely with someone else, and not be visible to government agencies, Tor should not be the vehicle of choice. There are alternative modes of communication that can thwart the risk of government surveillance.
Brazil and COVID-19: Challenges of Remote Education in Basic Education
Abstract:
A commentary on remote education challenges during COVID‑19 in Brazil. It covers equity, infrastructure, teacher training, and student engagement, proposing pragmatic steps to support learning continuity.
Bacteriological Quality of Groundwater in Imiringi Town, Bayelsa State, Nigeria
Abstract:
This study evaluated the bacteriological quality of groundwater from Imiringi in Ogbia Local government area of Bayelsa State, Nigeria. Groundwater samples were obtained in triplicates from four locations in the study area and analyzed for the bacteria quality using standard protocols. Results showed that the microbial density ranged from 2.97 – 6.03 x 104 cfu/ml (for total heterotrophic bacteria counts), 4.17 – 5.43 x 102 cfu/ml (for
Laboratory Tests Used in the Diagnosis of Immune Thrombocytopenia and General Treatment Approaches
Abstract:
Immune thrombocytopenia currently called under its’ new name, immune thrombocytopenic purpura (ITP) is a disease characterized by thrombocytopenia, in which the body attacks its own platelets due to the disorders in immune system. The pathophysiology of this disease includes increased platelet destruction and most megakaryocyte production in bone marrow. The most common clinical manifestation of ITP is mild or severe progressive bleeding that could result in death. ITP is generally named as primary or secondary ITP according to thrombocytopenia severity, disease duration, bleeding status and secondary occurrence of the disease. Currently for diagnosis, despite the blood count, antiglobulin test and laboratory tests that can detect platelet-bound antibodies, they are not enough for definitive diagnosis. Like the difficulty in diagnosis, ITP treatment is quite complicated which varies depending on age, characteristics and risk of the patient. It is classified as f...
Therapeutic Evaluation of Neemazal® Against Experimental Eimeria Tenella Infection in Broiler Chickens, Jos - Nigeria
Abstract:
Coccidiosis in poultry is caused by protozoan parasites of the
Molecular Study of Hepcidin HAMP (-582A/G) Gene Polymorphisms and Measurement of Serum Hepcidin Level among Sudanese Patients with Anemia of Chronic Kidney Disease
Abstract:
Anemia of chronic disease is anemia found in certain chronic disease states, is typically marked by the disturbance of iron homeostasis or hypoferremia. Chronic renal failure is currently known as Chronic Kidney Disease (CKD) or Chronic Renal Insufficiency (CRI) implies long-standing, progressive and irreversible renal parenchyma disease resulting in diminished renal function up to 40 to 60%. Often, chronic kidney disease is diagnosed as a result of screening of people known to be at risk of kidney problems, such as those with high blood pressure or diabetes and those with a blood relative with chronic kidney disease. This disease may also be identified when it leads to one of its recognized complications such as cardiovascular disease, anemia, or pericarditis.
How Valid are the Reported Cases of People Infected with Covid-19 in the World?
Abstract:
The goal of this paper is to analyze the registered cases of people who have been infected with Covid-19 registered from throughout the world, using a digital forensic analysis technique that is based on Benford's Law. Twenty-three countries were randomly chosen for this analysis: China, India, Germany, Brazil, Venezuela, Netherlands, Italy, Colombia, Russia, Norway, South Africa, Portugal, Singapore, United Kingdom, Chile, Ecuador, Egypt, Denmark, Ireland, France, Belgium, Australia and Croatia.. We calculate on the p-values based on Pearson χ2 and Mantissa Arc Test according to the results obtained with the first digit. If any country fails these two tests, a third proof will be carried out based on the Freedman-Watson test. The results indicated that results from Italy, Portugal, Netherlands, United Kingdom, Denmark, Belgium and Chile are suspicions of data manipulation because the numbers fail the Benford’s Law according to the results obtained u...
Should an Online Blogger Be Protected by the Illinois Reporter’s Privilege?
Abstract:
The question that this paper answer is whether the Illinois Reporter’s Privilege should protect an online blogger. The definitions of the terms “reporter,” “news medium,” and “source” quoted from 735 ILCS 5/8-902, followed by several examples. Second, a brief history of journalism is presented, where it is demonstrated that for hundreds of years, journalists and publishers alike engaged in their profession with little formal training, but rather with a sincere desire to convey the facts and the truth to their peers. Second, the essay outlines how Illinois and federal courts have employed the privilege in case law. In answering the question, the work examines whether WikiLeaks qualifies under the Illinois Reporter’s Privilege. The position taken is that the answer is yes. The idea is that if WikiLeaks qualifies under the privilege, then other online blogs also qualify. The opinion of the author is that the law is sufficient as it stands. There is no...
Management of Fruit Flies Using Environmentally Safer Pesticide (Spinosad) in Shendi, Sudan
Abstract:
The fruit flies of family
Does Digital Terrorism Really Exist?
Abstract:
This paper attempts to answer the question of whether digital terrorism, also known as cyberterrorism, exists. The paper defines terrorism both in the conventional and digital sense. It then gives a short history of conventional terrorism, dating back two thousand years and ending with the terrorist activities in several third-world nations. The essay then discusses digital terrorism, highlighting the Estonian, Georgian, and Ukrainian cyber-attacks. The work concludes that digital terrorism does indeed exist, but that the future is uncertain in the sense that future cyber-attacks will probably not resemble past attacks as the technology advances.