IJEME Vol. 12, No. 2, Apr. 2022
Cover page and Table of Contents: PDF (size: 543KB)
A Drug-Drug Interaction is an alteration in the impact of a drug when consolidated with another drug or group of drugs. Drug interactions are common and have caused increased hospital admission rates, treatment failures, avoidable medical complications, and even deaths. Studies have found multiple drug usage, and age-related comorbidities to be the reasons for the interactions and this demands a general study. Here in this paper, we discuss the Drug-Drug Interactions between Chronic Obstructive Pulmonary Disease (COPD) and its associated comorbidity diseases. We have designed a Drug Decision Support System which helps the Physicians to check the Drug-Drug interaction between Chronic Obstructive Pulmonary Disease and its associated comorbidity diseases. COPD is a fourth decade disease means after age 40 it may be diagnosed and is currently fourth largest killing disease. Study says one of the major cause for COPD is smoking (active/passive). As there is no cure for COPD yet. The patient’s life can be improved by providing better treatment and management strategies. Once the patient is diagnosed with COPD the patient may also end up suffering with the comorbidity diseases associated with COPD like Asthma, Depression, Dementia, Diabetics, Heart Failure, Hypertension, Hypotension, Obesity, and Osteoporosis. The patient has no choice but taking the prescribed drugs for COPD and other comorbidity disease he is suffering from. Therefore the proposed work plays a vital role in avoiding the drug-drug interaction between COPD and its associated comorbidity diseases.[...] Read more.
The main objective of this study was to explore the practice of traditional church education specifically Zema-Bet education in the three selected Ethiopian Orthodox Tewahido churches found in Bahir Dar city. In doing so, a mixed-method research approach with the convergent parallel design was employed. To achieve the purpose of the study, all the three churches of Zema-Bet education teachers, 90 learners, and three leaders were included in the study by using comprehensive, simple random, and purposive sampling techniques, respectively. An open-ended questionnaire, observation, semi-structured interview, and document analysis were employed for data collection. The collected data were analyzed via descriptive analysis technique and data driven word-by-word thematic narrations. The obtained results confirmed that Zema-Bet education learners usually learn by themselves, and sometimes through peer-led groups under the tree shade. The findings further revealed that some of the principles of adult learning (like practical oriented, motivation to learn, self-directed learning, etc.) are applied in Zema-Bet education. Based on the findings, it is recommended that the government should build a teaching-learning center like what has been done in modern education to resolve the absence of well-furnished buildings and teaching-learning places. Moreover, the government, private agencies, and non-government organizations should support Zema-Bet learners by funding and providing learning materials. Attendant offices of the ministry of education should give attention and recognize traditional church education as one basic education modality and center for adult learning.[...] Read more.
The vision 2021 of Bangladesh had to transform into a digital country, where the digital platform was a significant part of it. To make a digital platform, the Bangladesh government announced plans to build web applications in government, non-government, financial, educational and other sectors. By increasing the number of websites, the security risk is growing because of vulnerable coding practices. If those security risks are not fixed, attackers could exploit these vulnerabilities and perform various malpractices like data breaches, injected spam content, spreading viruses, malicious redirects, Denial-of-service, or even website defacements. This paper focuses on vulnerability assessment on Bangladeshi government and financial websites to show the security posture of these sites. This study scanned and analyzed four types of risk alerts High, Medium, Low and Informational using Acunetix and ZAP tools. In addition, the selected top five vulnerabilities are CJ, MC, CSRF, ID and XSS in terms of single vulnerability-type detected for targeted websites. The report has described representing the security condition of Bangladesh official websites. Also, it provided mitigation techniques for these vulnerabilities to avoid security risk, which is less discussed in this country.[...] Read more.
Blockchain is the technology which in the last decade has influenced our lifestyles most. Bitcoin is a word used frequently for Blockchain. For example, scalability and protection issues that stands up because of the immoderate numbers of IoT items within the community. The server/client version calls for all devices to be connected and authenticated via the server, which creates a single point of failure. Therefore, shifting the IoT machine into the decentralized course may be the right selection. One of the popular decentralization structures is blockchain. The Blockchain is a powerful technology that decentralizes computation and management methods that may resolve many of IoT troubles, in particular safety.Many Blockchain still confuse Bitcoin, even if it's not equal. Bitcoin is one of several applications are available in Blockchain technology. First of all we present an outline of blockchain architecture and compare a few popular consensus methods in various blockchains. This study also introduced the entire blockchain ecosystem of all the articles we examined and summed up. Furthermore, analyses and consensus models are conducted on many blockchain platforms. Finally, we analyze key issues which are necessary for the future of blockchain technology in these key fields to be broadly available.[...] Read more.