International Journal of Computer (IJC)
https://ijcjournal.org/index.php/InternationalJournalOfComputer
<p>The <a title="International Journal of Computer (IJC) home page" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double peer review process (within 4 weeks). For detailed information about the journal kindly check <a title="About the Journal" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/about">About the Journal</a> page. </p> <p>All <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p> </p>Mohammad Nassar for Researches (MNFR)en-USInternational Journal of Computer (IJC)2307-4523<p style="text-align: justify;">Authors who submit papers with this journal agree to the <a title="Copyright Notice" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/Copyright_Notice" target="_blank" rel="noopener">following terms</a>. </p>Analytics in SAP S/4 HANA of SD/MM/LE: A New Technology That is Faster and More Reliable
https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2118
<p>Operational analytics is all about answering business questions while doing business and supporting business users across the organization, from shop floor users to management and executives. Therefore, business transactions and analytics must co-exist together in a single platform to empower business users to drive insights, make decisions, and complete business processes in a single application and using a single source of facts without toggling between multiple applications. Traditionally transactional systems and analytics were maintained separately to improve throughput of the transactional system and that certainly introduced latency in decision making. However, with innovation in the SAP HANA platform, SAP S/4HANA embedded analytics enables business users, business analysts, and management to perform real-time analytics on live transactional data. This paper reviews technical architecture and key components of SAP S/4HANA embedded analytics. This paper reviews technical architecture and key components of SAP S/4HANA embedded analytics.</p>Narayan Mahajan
Copyright (c) 2024 Narayan Mahajan
https://creativecommons.org/licenses/by-nc-nd/4.0
2023-01-082023-01-0850117Enhancing Wireless Charging Systems through Dynamic Power Management with the Innovative Power Control Algorithm
https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2182
<p>Abstract— The Innovative Power Control Algorithm (IPCA) represents a significant theoretical advancement in the domain of wireless charging, addressing the inefficiencies and rigidity of traditional static power management systems. Rooted in dynamic power management principles, IPCA leverages real-time data analytics and adaptive feedback mechanisms to optimize power delivery, ensuring efficiency and adaptability across varying operational conditions. This paper delineates the theoretical framework of IPCA, elucidating its algorithmic structure, mathematical modeling, and simulated performance outcomes. Through comprehensive simulations, IPCA demonstrates a potential increase in charging efficiency and adaptability when compared to conventional methods. The theoretical implications of IPCA extend to diverse application scenarios, including consumer electronics, electric vehicles, and industrial automation, promising significant enhancements in wireless charging systems. Despite its theoretical nature, this research lays a robust groundwork for future empirical studies, aiming to validate and realize the practical deployment of IPCA in real- world wireless charging systems.</p>Aarav MittalRichard Huang
Copyright (c) 2024 Aarav Mittal, Richard Huang
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-02-262024-02-265016578Hybrid Software Classifier of Internet Applications
https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2176
<p>Traffic classification refers to the processes used to categorize traffic based on features in the traffic and in accordance with specific classification objectives. In general, there are numerous forests, fields, and aims in the classification of internet traffic. Internet service providers must be aware of the types of traffic that are sent across their network Classifying Internet applications that are carried by computer networks is the specific goal, create a hybrid software classifier that can be applied to the classification of Internet traffic. Internet service providers (ISPs) attempt to boost bandwidth as a result of rising Internet traffic, but at the same time, more bandwidth is needed for Internet applications. Problems arise from the exponential growth of new internet applications using unregistered ports. The new programs may also contain a lot of viruses and dangerous code. In recent years, traffic classification has drawn more and more attention. With the help of direct and passive observation of the individual packets or stream of packets moving over the network, it seeks to provide the capability of automatically identifying the program that created a specific stream of packets. Data mining (DM) is a method for sifting through enormous databases in search of fresh, obscured, and practical information patterns. The knowledge discovery process includes the DM idea. This study employs a variety of techniques and functions as a hybrid classification. The foundation of many essential network monitoring and controlling jobs, such as billing, quality of service, security, and trend analyzers, is the classification of networks flows by their application type. Identification of Internet traffic is a crucial tool for network management. It enables operators to more accurately forecast upcoming traffic patterns and demand, and it enables security staff to spot unusual conduct.</p>Fatima AljwariHamza IbrahimFaraah ALnashriAisha ALkamisiReem ALkhaldi
Copyright (c) 2024 Fatima Aljwari, Hamza Ibrahim, Faraah ALnashri, Aisha ALkamisi, Reem ALkhaldi
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-02-262024-02-2650179106The Mega Healthcare Data Breaches in the United States (2009 – 2023): A Comparative Document Analysis
https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2154
<p>This paper presents a comprehensive analysis of the predominant healthcare data breaches in the United States from October 2009 to September 2023, utilizing a mixed-methods approach centered on seven publicly available breach reports. It aims to identify patterns, common factors, and measures to enhance cybersecurity within the sector. Through comparative document analysis, the study examines the nature, causes, and repercussions of these breaches, recognizing external attacks, internal errors, and software vulnerabilities as critical weaknesses. The consequences range from financial and reputational damage to erosion of patient trust. The findings stress the necessity for improved preventive strategies, bolstering of security practices, employee training, vendor oversight, and effective incident response mechanisms. The paper also offers insights into the legal and ethical implications of breaches. It suggests robust cybersecurity measures, including the adoption of emerging technologies like blockchain and AI/ML to deter threats. The recommendations guide healthcare organizations toward establishing robust protections for sensitive health data, ensuring regulatory compliance, and facilitating continuity of trust and care. The paper serves as a call to action for ongoing study into the multidimensional impact of data compromises in healthcare. </p>Abiola Adedeji Adebanjo
Copyright (c) 2024 Abiola Adedeji Adebanjo
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-01-272024-01-275013254Wearable Sensors for Posture and Movement in Patient Handling: A Scoping Review
https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2177
<p>Nurses experience work-related musculoskeletal disorders (WMSDs) such as lower back pain due to awkward postures or movements during patient handling. Monitoring and education for patient handling are necessary to prevent these WMSDs. Recently, measurement methods for patient handling using wearable sensors have been developed to implement these interventions at various sites. However, the status of these measurement methods has not been comprehensively summarized. The purpose of this study is to summarize the status of measurement methods for patient handling using wearable sensors. Peer-reviewed papers published between January 2013 and November 2023 that included measurements of patient handling using wearable sensors were selected from Google Scholar. Measured patient handlings, postures, and movements were summarized. The type, number, and placement of sensors were also investigated. Furthermore, the applied data processing techniques were also summarized. Inertial sensors and insole pressure sensors were applied for measurement methods. Current methods can measure trunk angle, arm movement, and foot placement during several motions such as patient transfer. In addition, load and correctness of patient handling motion are recognized by a wearable sensor-based system using machine learning techniques. These results indicate that current methods can provide effective kinematic values during patient handling to prevent WMSDs. On the other hand, there were also limitations due to number of sensors. Future studies should develop simpler measurement methods using fewer sensors.</p>Kodai Kitagawa
Copyright (c) 2024 Kodai Kitagawa
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-02-202024-02-205015564Application of Text Summarization on Text-Based Generative Adversarial Networks
https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2170
<p><strong> </strong>In this project, we wish to convert long textual inputs into summarised text chunks and generate images describing the summarized text. This project aims to cultivate a model that can generate true-to-life images from summarized textual input using GAN. GANs aim to estimate and recreate the possible spread of real-world data samples and produce new pictures based on this distribution. This project offers an automated summarised text-to-image synthesis for creating images from written descriptions. The written descriptions serve as the GAN generator's conditional intake. The first step in this synthesis is the use of Natural Language Processing to bring out keywords for summarizing. BART transformers are employed. This is then fed to the GAN network consisting of a generator and discriminator. This project used a pre-trained DALL-E mini model as the GAN architecture.</p>Muhammad Alli-Balogun
Copyright (c) 2024 Muhammad Alli-Balogun
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-01-272024-01-27501831