International Journal of Computer (IJC) https://ijcjournal.org/index.php/InternationalJournalOfComputer <p>The <a title="International Journal of Computer (IJC) home page" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double peer review process (within 4 weeks). For detailed information about the journal kindly check <a title="About the Journal" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/about">About the Journal</a> page. </p> <p>All <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p> </p> Mohammad Nassar for Researches (MNFR) en-US International Journal of Computer (IJC) 2307-4523 <p style="text-align: justify;">Authors who submit papers with this journal agree to the <a title="Copyright Notice" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/Copyright_Notice" target="_blank" rel="noopener">following terms</a>.&nbsp;</p> Analytics in SAP S/4 HANA of SD/MM/LE: A New Technology That is Faster and More Reliable https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2118 <p>Operational analytics is all about answering business questions while doing business and supporting business users across the organization, from shop floor users to management and executives. Therefore, business transactions and analytics must co-exist together in a single platform to empower business users to drive insights, make decisions, and complete business processes in a single application and using a single source of facts without toggling between multiple applications. Traditionally transactional systems and analytics were maintained separately to improve throughput of the transactional system and that certainly introduced latency in decision making. However, with innovation in the SAP HANA platform, SAP S/4HANA embedded analytics enables business users, business analysts, and management to perform real-time analytics on live transactional data. This paper reviews technical architecture and key components of SAP S/4HANA embedded analytics. This paper reviews technical architecture and key components of SAP S/4HANA embedded analytics.</p> Narayan Mahajan Copyright (c) 2024 Narayan Mahajan https://creativecommons.org/licenses/by-nc-nd/4.0 2023-01-08 2023-01-08 50 1 1 7 Wearable Sensors for Posture and Movement in Patient Handling: A Scoping Review https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2177 <p>Nurses experience work-related musculoskeletal disorders (WMSDs) such as lower back pain due to awkward postures or movements during patient handling. Monitoring and education for patient handling are necessary to prevent these WMSDs. Recently, measurement methods for patient handling using wearable sensors have been developed to implement these interventions at various sites. However, the status of these measurement methods has not been comprehensively summarized. The purpose of this study is to summarize the status of measurement methods for patient handling using wearable sensors. Peer-reviewed papers published between January 2013 and November 2023 that included measurements of patient handling using wearable sensors were selected from Google Scholar. Measured patient handlings, postures, and movements were summarized. The type, number, and placement of sensors were also investigated. Furthermore, the applied data processing techniques were also summarized. Inertial sensors and insole pressure sensors were applied for measurement methods. Current methods can measure trunk angle, arm movement, and foot placement during several motions such as patient transfer. In addition, load and correctness of patient handling motion are recognized by a wearable sensor-based system using machine learning techniques. These results indicate that current methods can provide effective kinematic values during patient handling to prevent WMSDs. On the other hand, there were also limitations due to number of sensors. Future studies should develop simpler measurement methods using fewer sensors.</p> Kodai Kitagawa Copyright (c) 2024 Kodai Kitagawa https://creativecommons.org/licenses/by-nc-nd/4.0 2024-02-20 2024-02-20 50 1 55 64 The Mega Healthcare Data Breaches in the United States (2009 – 2023): A Comparative Document Analysis https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2154 <p>This paper presents a comprehensive analysis of the predominant healthcare data breaches in the United States from October 2009 to September 2023, utilizing a mixed-methods approach centered on seven publicly available breach reports. It aims to identify patterns, common factors, and measures to enhance cybersecurity within the sector. Through comparative document analysis, the study examines the nature, causes, and repercussions of these breaches, recognizing external attacks, internal errors, and software vulnerabilities as critical weaknesses. The consequences range from financial and reputational damage to erosion of patient trust. The findings stress the necessity for improved preventive strategies, bolstering of security practices, employee training, vendor oversight, and effective incident response mechanisms. The paper also offers insights into the legal and ethical implications of breaches. It suggests robust cybersecurity measures, including the adoption of emerging technologies like blockchain and AI/ML to deter threats. The recommendations guide healthcare organizations toward establishing robust protections for sensitive health data, ensuring regulatory compliance, and facilitating continuity of trust and care. The paper serves as a call to action for ongoing study into the multidimensional impact of data compromises in healthcare. </p> Abiola Adedeji Adebanjo Copyright (c) 2024 Abiola Adedeji Adebanjo https://creativecommons.org/licenses/by-nc-nd/4.0 2024-01-27 2024-01-27 50 1 32 54 Application of Text Summarization on Text-Based Generative Adversarial Networks https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2170 <p><strong> </strong>In this project, we wish to convert long textual inputs into summarised text chunks and generate images describing the summarized text. This project aims to cultivate a model that can generate true-to-life images from summarized textual input using GAN. GANs aim to estimate and recreate the possible spread of real-world data samples and produce new pictures based on this distribution. This project offers an automated summarised text-to-image synthesis for creating images from written descriptions. The written descriptions serve as the GAN generator's conditional intake. The first step in this synthesis is the use of Natural Language Processing to bring out keywords for summarizing. BART transformers are employed. This is then fed to the GAN network consisting of a generator and discriminator. This project used a pre-trained DALL-E mini model as the GAN architecture.</p> Muhammad Alli-Balogun Copyright (c) 2024 Muhammad Alli-Balogun https://creativecommons.org/licenses/by-nc-nd/4.0 2024-01-27 2024-01-27 50 1 8 31