{"title":"APPLYING SIX-SIGMA IN HEALTH SERVICE: A STUDY OF CRITICAL SUCCESS FACTORS, CRITICAL TO QUALITY CHARACTERISTICS AND KEY PERFORMANCE INDICATORS IN MEDIUM SCALE HOSPITALS","authors":"G. Dileep, S. Rau","doi":"10.18000/IJISAC.50037","DOIUrl":"https://doi.org/10.18000/IJISAC.50037","url":null,"abstract":"The benefits of six-sigma quality standard implementation are realized by the manufacturing sector very well and most of the cases reaped astounding benefits. This paper presents an extensive review on the services, six-sigma, and study the Critical Success Factors, Critical to Quality Characteristics and Key Performance Indicators in medium scale hospitals in Tamilnadu, India. Can health care approach the near perfection of Six Sigma in actual practice? . General Electric has begun to apply the same Six Sigma methods that worked to improve its manufacturing processes to its other, more service-oriented businesses. We believe, however, that asking this question must not be an excuse for failing to embark on the journey. Health care now frequently produces defects at rates as high as 500,000 per million––as exemplified in failures to recognize and treat clinical depression (Wells et al. 1989) or control hypertension (Udvarhelyi et al. 1991). Enough examples of improvement exist to conclude that we can do much better. In order to improve health service quality focus on health service process is necessary. Six-sigma is a philosophy which also concentrates on the improvement of process. So, six-sigma if properly applied can be useful for health services. The wider applicability of six-sigma depends on identification of key performance indicators (KPIs) for different types of health service processes. A case study is conducted in a medium scale hospital to identify, analyze and rank the critical success factors for Six sigma implementation available in literature, critical to quality characteristics (CTQs) ,KPIs and hurdles in the hospitals which affect possible quality improvements. This study will be helpful to both practitioners and researchers.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123069294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer Behaviour Towards Mobile Phone Services (A Comparative Study Between Urban and Semi Urban Mobile Phone users in Tamilnadu)","authors":"Muthumani S, Thangavel N","doi":"10.18000/IJISAC.50025","DOIUrl":"https://doi.org/10.18000/IJISAC.50025","url":null,"abstract":"In fewer than twenty years, mobile phones have gone from being rare and expensive pieces of equipment used by businesses to a pervasive low-cost personal item. In many countries, mobile phones now outnumber land-line telephones, with most adults and many children now owning mobile phones The mobile phone itself has also become a totemic and fashion object, with users decorating, customizing, and accessorizing their mobile phones to reflect their personality. This has emerged as its own industry. The researcher feels that the present study helps to know the perceptions of the customers and the service providers between the two major segments. i.e. rural and urban. It gives a proper idea on the customer’s expectations which in turn helps in designing the various business plans to suit the customers in different segments","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126085438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TEST AUTOMATION FOR NEW GENERATION XAML WEB APPLICATIONS USING MULTI AGENT SYSTEM","authors":"G. Appasami, .K SureshJoseph, .P BalajiSrikaanth","doi":"10.18000/IJISAC.50072","DOIUrl":"https://doi.org/10.18000/IJISAC.50072","url":null,"abstract":"New generation of Interactive and attractive dynamic web applications are developed by Silverlight Technology. It is developed by Microsoft on Dot Net 3.5 Frame work using eXtended Application Markup Language (XAML). User Interface Test Automation for Silverlight Applications plays a vital role in software industry; especially User Interface Test Automation (UITA) in new technology like Silverlight is a challenging task because of its high security and low accessibility. Agent Technology is intermediate software that provides a better bridge between User Interface Test Automation and Silverlight applications. There are many different software agents for each group of controls to do User Interface Test Automation. For example button control agent will take care of all buttons in User Interface Test Automation. In this paper we present the XAML User Interface test automation using Multi Agent System. The main goal of Test Automation for New Generation XAML Web Applications Using Multi Agent System are to reduce cost and time to perform User Interface Test Automation.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN OVERVIEW REPORT ON SOFTWARE RE- AND REVERSE ENGINEERING","authors":"A. Reddy, A. Krishna, P. Srinivasulu","doi":"10.18000/IJISAC.50094","DOIUrl":"https://doi.org/10.18000/IJISAC.50094","url":null,"abstract":"Instability is the nature of any application. An Application may strive for and helps a business or company for some time (may be 10 or 15 years), during that time it has been corrected, adapted and enhanced many times. But every time a change is made into the application, unexpected and serious side effects occur. Yet the application must continue to evolve. Unmaintainable software is not a new problem. In the following sections, we are going to analyze the Software Re-engineering and Reverse-engineering processes and how they help any application to maintain the Quality standards.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REPUTATION MANAGEMENT SYSTEM FOR PEER-TO-PEER COMMUNITIES","authors":"Punitha S, Thompson S","doi":"10.18000/IJISAC.50089","DOIUrl":"https://doi.org/10.18000/IJISAC.50089","url":null,"abstract":"Abstract Peer-to-Peer (P2P) reputation systems are essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest, and malicious peer behaviors. The system collects locally-generated peer feedbacks and aggregates them to yield the global reputation scores. Surprisingly, most previous work ignored the distribution of peer feedbacks. We use a trust overlay network (TON) to model the trust relationships among peers. After examining the eBay transaction trace of over 10,000 users, we discovered a power-law distribution in user feedbacks. Our mathematical analysis justifies that power-law distribution is applicable to any dynamicall yg rowing P2P systems, either structured or unstructured. We develop a robust and scalable P2P reputation system, PowerTrust, to leverage the power-law feedback characteristics. The PowerTrust system dynamically selects small number of power nodes that are most reputable using a distributed ranking mechanism. By using a look ahead random walk strategy and leveraging the power nodes, the PowerTrust significantly improves in global reputation accuracy and aggregation speed. PowerTrust is adaptable to dynamics in peer joining and leaving and robust to disturbance by malicious peers. Through P2P network simulation experiments, we find significant performance gains in using PowerTrust. This power-law guided reputation system design proves to achieve high query success rate in P2P file-sharing applications. The system also reduces the total job make span and failure rate in large-scale, parameter-sweeping P2P Grid applications. A peer to peer network exploits diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. A pure peer to peer network doesn't have the notion of clients or servers, but only equal peer nodes that simultaneously function as both clients and servers to the other nodes on the network. Peers act as equals, merging the roles of clients and server. There is no central server managing the network. There is no central router.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EVA as Performance Indicator - A case study of Ucal Fuel Systems Pvt. Ltd","authors":"Rau. Ss, R. Satish","doi":"10.18000/IJISAC.50011","DOIUrl":"https://doi.org/10.18000/IJISAC.50011","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication and Computing Paradigm for Distributed Mobile Systems","authors":"A. MalukMohamedM","doi":"10.18000/IJISAC.50008","DOIUrl":"https://doi.org/10.18000/IJISAC.50008","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A FRAMEWORK FOR E-COMMERCE TRANSACTIONS","authors":"R. Lalitha, .D VenkataRamaRaju, R. Sadhanandavel","doi":"10.18000/IJISAC.50043","DOIUrl":"https://doi.org/10.18000/IJISAC.50043","url":null,"abstract":"All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non repudiation. Security is required to prevent theft, and to ensure revenue generation from authorized recipients. The secure e-commerce transactions for multicast Services (SETMS) architectural framework is proposed, to provide security in ecommerce sessions for multicast environments. The SETMS framework provides authentication of host through the HIP protocol, authorization of subscriber and his/her e-payments through a variant of the 2KP protocol. It supports non repudiation of principal parties through PKI.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123537498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NOVEL DOCUMENT CLUSTERING FOR ORGANIZING THE WEB PAGES","authors":"R. Subhashini, J. Senthil, V. Kumar","doi":"10.18000/IJISAC.50079","DOIUrl":"https://doi.org/10.18000/IJISAC.50079","url":null,"abstract":"The exponential growth of information on the World Wide Web has prompted for developing efficient and effective methods for organizing and retrieving the information. Clustering techniques play an important role in searching and organization of web pages. In this paper we proposed an approach for web search results clustering based on a new document clustering algorithm. It is an alternative to a single ordered result of search engines. This approach presents a list of clusters to the user. This believes that clusters of search results are easier to browse than a single ordered list. Experimental results show that the new approach has better performance than that of conventional web search result clustering.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRIVATE LABELS EVOLUTION, GROWTH AND CONSUMER'S ATTITUDE","authors":"S. Sasinandini, H. L. Manohar","doi":"10.18000/IJISAC.50063","DOIUrl":"https://doi.org/10.18000/IJISAC.50063","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130845689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}