November 2020

  1. Abeer F. AL-Otaibi and Emad S Alsuwat
    ABSTRACT:

    Recently, with the development of digital technology and the spread of the social media network and made the communication of human beings between each other more easily, but with the put the personal information and private evidence and the participation of others via the Internet, it causes a great danger that this information can be exploited and collected, and from this a new concept called social engineering has spread that is the attackers or whoever wants Damage to people searches and collects personal and confidential information to penetrate and cause harm to the victim. One of the most common threats facing people is phishing through social engineering. In this paper, Survey summarizes the concept of social engineering and how the attacker seeks For that, it starts with attack, phishing, It is a mixture of social engineering and technical methods to persuade the user to disclose his sensitive and personal data, in addition to phishing classifications via social engineering. Moreover, this paper will discuss Survey Techniques to reduce this attack and try to raise the awareness of defense and raise human culture from Being caught in a phishing scam. These attacks aim to trick individuals or companies into carrying out actions that benefit the attackers or provide them with sensitive data via e-mail messages or malicious and counterfeit software that represents a real site and asks them to do so. such as credit card and passwords. Social engineering is one of the biggest challenges to network security because it takes advantage of the natural human tendency to trust. In conclusion, Recommend Some Preventive Measures and Possible Solutions to the Threats and Weaknesses of Social Engineering.

    Pub. Date: November 30, 2020
    Paper No:
    3407
  2. Abdoulaye Diankha, El hadjiMamadou Sonko, Diomaye Dieng, Jean Birane Gning and Cheikh Diop
    ABSTRACT:

    Household hazardous waste is hazardous waste generated by households in relatively small quantities (between 1% and 4% of municipal solid waste) and containing toxic or labeled toxic, flammable, reactive, explosive or corrosive chemicals such as automobile products, cleaning products, personal care products, maintenance products, unused medications, insecticides, garden pesticides, products containing heavy metals, photographic chemicals. Many of these wastes are regulated at the industrial level in larger quantities. However, the smaller, distinct quantities found in consumer products are relatively less regulated. In addition, a lack of definition for this category of waste has been observed in many countries, both developed and developing. Moreover, there are potential health and environmental risks that result from inappropriate use and disposal of these wastes. Thus, this article reviews the current situation with regard to the management of household hazardous waste.

    Pub. Date: November 30, 2020
    Paper No:
    3409
  3. Díaz Cruz José Ramón, Báez Zamudio N.S., Martínez Garza OE., Fernández Luna C.P. Rodríguez Cuevas J.L., Escobedo Castro J.V., López Pérez D., Salgado Sangri R.E. and De la Torre García O.
    Journal Area:
    ABSTRACT:

    The diagnosis of Marfan syndrome (MFS) is based on clinical characteristics already defined in the Ghent nosology, and agreed by the opinion of international experts to recognize this syndrome. 9 These Ghent criteria are mentioned here, which include a set of Major and minor criteria in different body systems, and which have been shown to be applicable to this condition, since with these criteria the diagnosis has been confirmed in more than 95% of the patients, described in the literature. However, it is not always easy to reach the diagnosis, since some of the diagnostic criteria are not applicable to children. And failure to accurately recognize the variable clinical expression can delay follow-up and decision-making in these patients. This article describes a case report of a patient with clinical characteristics of Marfan syndrome, which are transposed with some characteristics of Loeys-dietz, in the absence of family history.

    Pub. Date: November 30, 2020
    Paper No:
    3414
  4. Agnes Namaganda, Ronald Bisaso and Sarah Ssali
    ABSTRACT:

    Background: The Sexual harassment of female students by their instructors has long been identified as a significant social problem in universities. While a significant body of research has linked the vice to power, much less research has examined how this power operates. Objective: This study sought to examine the sexual harassment experiences of female undergraduate students at a large public University in East Africa. Anchored in the socio-cultural and organizational theories of sexual harassment, the study paid particular attention to how workplace and gendered power facilitate the sexual harassment of female students. Methods: The study was purely qualitative and was guided by the case study design. The data was collected by the use of individual interviews. A total of 42 participants took part in the study and the data was analyzed thematically. Findings: The findings indicated that a lot of the harassment is of a quid pro quo nature and that the sexuality of female students has been commoditized as something that can be exchanged for academic favours. The findings further indicated that the sexual harassment experienced by students is related to power in multi layered ways and that the very context of higher education provides fertile ground for the vice to thrive as the everyday activities that are synonymous in teacher learner relationships provide opportunities for behavioral deviance and power abuse. Conclusion: The sexual harassment of female students is driven by both formal and informal power hierarchies.

    Pub. Date: November 30, 2020
    Paper No:
    3416
  5. Hind Alshambari and Emad Alsuwat
    ABSTRACT:

    The Internet of Things (IoT) has the potential to transform healthcare dramatically via changing the way hospitals, clinics, and other healthcare facilities collect and use data. IoT can bring together major technical and business trends related to mobility, automation, and data analysis to improve patient care delivery. IoT is the networking of physical objects such as on-board sensors, actuators, and other equipment that collect and transmit activity information in real-time across the network. The data collected from these devices can then be analyzed by the organization to improve patient care. That is, we can use the collected data to offer new services or improve the already existing services. IoT will enable health organizations to manage data in such a way that would make them able to differentiate themselves from their competitors. However, there are some vulnerabilities in practice that would make the use of IoT data infeasible such as False data injection attacks. In this paper, we aim to investigate false data injection attacks, its impact on healthcare, and how to detect and prevent such attacks.

    Pub. Date: November 30, 2020
    Paper No:
    3420
  6. José Alfredo Noriega Ponce, Raúl Iván López Gómez and Jessica Alonso Ramírez
    Journal Area:
    ABSTRACT:

    Pheochromocytoma is a tumor that arises from the chromaffin cells of the adrenal medulla, which is histologically impossible to differentiate from paragangliomas that can arise outside the adrenal gland, in addition to the low incidence and high complexity in the differential diagnosis. It is a challenge for both the anesthesiologist and the surgical team, due to possible complications that could occur in the operating room. It should be rigorously evaluated and alpha and beta blockade must be started at least two weeks before the surgical procedure. Maintaining a good anesthetic plane and avoiding noxious stimuli wich may trigger sympathetic stimuli are the main objectives of this procedure. Due to the complexity of hemodynamics during surgery constant and open communication between the surgical team is essential.

    Pub. Date: November 30, 2020
    Paper No:
    3423