Tigist Abera
YOU?
Author Swipe
View article: SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning
SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning Open
Split Learning (SL) is a distributed deep learning approach enabling multiple clients and a server to collaboratively train and infer on a shared deep neural network (DNN) without requiring clients to share their private local data. The DN…
View article: Malaria Surveillance system evaluation in Ankober woreda North Shewa, Amhara region, Ethiopia, 2022
Malaria Surveillance system evaluation in Ankober woreda North Shewa, Amhara region, Ethiopia, 2022 Open
Background: Malaria remains one of the most important causes of human morbidity and mortality with enormous medical, economic and emotional impact in the world. The World malaria report 2018 estimates that there were 219 million cases of m…
View article: Determinants of home delivery among childbearing age women in Gondar zuria district of central Gondar, Ethiopia, 2020
Determinants of home delivery among childbearing age women in Gondar zuria district of central Gondar, Ethiopia, 2020 Open
Introduction: Birth is a critical time for the health of the mother and newborn; and place of delivery is a crucial factor for the wellbeing of both. Ethiopia is a major contributor to the worldwide death tax of mothers with a maternal mor…
View article: GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks
GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks Open
Autonomous collaborative networks of devices are rapidly emerging in numerous\ndomains, such as self-driving cars, smart factories, critical infrastructure,\nand Internet of Things in general. Although autonomy and self-organization are\nh…
View article: Meningococcal Meningitis Data Analysis, Amhara National Regional State of Ethiopia, 2015-2019; a Descriptive Cross-Sectional Study
Meningococcal Meningitis Data Analysis, Amhara National Regional State of Ethiopia, 2015-2019; a Descriptive Cross-Sectional Study Open
Background: Meningococcal meningitis is a disease of major public health importance especially for countries in the meningitis belt. The retrospective data analysis had provided helpful information to understand the current prevalence of m…
View article: Phytochemistry and method preparation of some medicinal plants used to treat asthma-review
Phytochemistry and method preparation of some medicinal plants used to treat asthma-review Open
Asthma is one of the most common chronic diseases in the present day in which its incidence and severity are increasing. It is highly prevalent global disease; affecting approximately 300 million individuals worldwide. Different medicinal …
View article: Ethnobotany, traditional use, phytochemistry and pharmacology of Cymbopogon citratus: Review article
Ethnobotany, traditional use, phytochemistry and pharmacology of Cymbopogon citratus: Review article Open
Today, scores of people around the world consume plant based medicines as a part of traditional medicine for a variety of medical disorders. Cymbopogon citratus (DC) Stapf is an herbal plant belonging to Poaceae family, which is usually re…
View article: Phytochemical-constituents, safety and efficacy of commonly used medicinal plants for the treatment of malaria in Ethiopia-a review
Phytochemical-constituents, safety and efficacy of commonly used medicinal plants for the treatment of malaria in Ethiopia-a review Open
Background: Malaria is among the ten top leading causes of morbidity and mortality in children under-5 years.Due to the rise of drug-resistant parasites and limited therapeutic efficacy of the available drugs, there is a need to search nov…
View article: SADAN: Scalable Adversary Detection in Autonomous Networks
SADAN: Scalable Adversary Detection in Autonomous Networks Open
Autonomous collaborative networks of devices are emerging in numerous domains, such as self-driving cars, smart factories and critical infrastructure, generally referred to as IoT. Their autonomy and self-organization makes them especially…
View article: Medicinal Plants Used for the Management of Asthma in Ethiopia – A Review
Medicinal Plants Used for the Management of Asthma in Ethiopia – A Review Open
INTRODUCTION: Asthma is one of the most common chronic diseases in contemporary society and there is increasing evidence to suggest that its incidence and severity are increasing. Medicinal plants, also called medicinal herbs, have been di…
View article: Analysis of cadmium and lead using atomic absorption spectrophotometer in roadside soils of Jimma town
Analysis of cadmium and lead using atomic absorption spectrophotometer in roadside soils of Jimma town Open
Cadmium and lead are pollutants of great concern to human health.The analysis of Cadmium and lead content in our environment is crucial for policy makers to make decisions concerning the environment and to secure the wellbeing of the inhab…
View article: Phytochemical Constituents, Safety and Efficacy Study of Thymus schimperi and Thymus serrulatus
Phytochemical Constituents, Safety and Efficacy Study of Thymus schimperi and Thymus serrulatus Open
Background: The genus Thymus is one of the most taxonomically complex genera in the Lamiaceae family and it includes 250- 350 taxa (species and varieties). T. serrulatus Hochst. ex Benth and T. schimperi Ronniger are the two species of thy…
View article: DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems Open
Networks of autonomous collaborative embedded systems are emerging in many application domains such as vehicular ad-hoc networks, robotic factory workers, search/rescue robots, delivery and search drones.To perform their collaborative task…
View article: C-FLAT: Control-FLow ATtestation for Embedded Systems Software
C-FLAT: Control-FLow ATtestation for Embedded Systems Software Open
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device …