{"title":"Testing Web Applications","authors":"H. Jaleel","doi":"10.14445/23488387/ijcse-v6i12p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i12p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114436027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Healthcare Analytics for Medical Management","authors":"Vinay Kommera","doi":"10.14445/23488387/ijcse-v6i10p104","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i10p104","url":null,"abstract":"Healthcare organizations need a powerful system that can help them maintain a healthy environment which involves constantly striving to improve patient care by delivering the right kind of treatment. To achieve this Healthcare Analytics is used to manage huge healthcare data systematically, that is collected electronically, the purpose being improve patient healthcare, reduce cost, and give top priority to save the patient's life by taking necessary action at the right time by connecting with the concerned physician who can assure proper treatment. Healthcare Analytics also referred to as big data analytics is not only about managing massive and ever-growing data. It's also about extracting insights from patterns found in the healthcare database. Analytics dives deep to explore meaning in the realtime data; make predictions about future which can pave the way to the path of success. Implementing Healthcare Analytics wisely can change the way healthcare sectors operate, meaning it can only lead to advantageous direction like it can help healthcare providers reduce fraud, waste and abuse which in turn can drive to business growth, improve productivity, improve patient care, cut down medical expenses, transparency in billing, reduce unnecessary medical tests and much more than you can imagine. Most importantly using analytics can improve workflow across healthcare sectors. Healthcare industry to reach great heights needs to enforce Healthcare Analytics to the huge and everflowing database to produce the best consequences.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digitalizing a Monolithic Application","authors":"Boddam Linga Reddy","doi":"10.14445/23488387/IJCSE-V6I10P107","DOIUrl":"https://doi.org/10.14445/23488387/IJCSE-V6I10P107","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Machine Learning Algorithms in Analysis of Learners’ Behaviour Data","authors":"Jinjin Liang, Y. Nie","doi":"10.14445/23488387/ijcse-v6i10p103","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i10p103","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy, Security and Trust Issues in Cloud Computing","authors":"A. Li","doi":"10.14445/23488387/ijcse-v6i10p106","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i10p106","url":null,"abstract":"The use of technology has become an intrinsic part of our lives and most of the economic activities now takes place electronically. Emerging at a fast pace, new technologies allow businesses to be more innovative and competitive. Many of these new technologies foster collaboration, not without creating conflicting needs. Companies must ensure that they use technology safely while engaging more stakeholders to be more competitive. As the Cloud computing gaining popularity, it is also carrying some concerns to the implementors. This paper focuses on the topics such as issues in Cloud Computing, risks related to the privacy and how we can ensure the confidentiality of data.","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Thyroid Disease Using K Means and Fuzzy C Means Algorithm","authors":"K. M., Prinitha R, P. P, S. A","doi":"10.14445/23488387/ijcse-v6i10p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i10p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123241674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Logistic Regression And Its Optimization Techniques Using Octave","authors":"A. Anantharaman","doi":"10.14445/23488387/ijcse-v6i10p105","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i10p105","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Betteena Sheryl Fernando D, Srivarsha A B, Pirathisha K, Rubiya K
{"title":"Face Recognition For Home Security","authors":"Betteena Sheryl Fernando D, Srivarsha A B, Pirathisha K, Rubiya K","doi":"10.14445/23488387/ijcse-v6i10p102","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i10p102","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114356557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Descriptive Data Analysis of Contagious Diseases using Statistical Parameters","authors":"A. Sudhakar, Rajendra B.Patil, R. Srivaramangai","doi":"10.14445/23488387/ijcse-v6i9p101","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i9p101","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Multipath AODV for Enhanced Performance in Wireless Ad hoc Network","authors":"Nelesh Sharma, Dr.Nirupama Tiwari","doi":"10.14445/23488387/ijcse-v6i9p104","DOIUrl":"https://doi.org/10.14445/23488387/ijcse-v6i9p104","url":null,"abstract":"","PeriodicalId":186366,"journal":{"name":"International Journal of Computer Science and Engineering","volume":"37 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132537569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}