ºÝºÝߣshows by User: ijcsea / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: ijcsea / Thu, 23 Jan 2025 07:03:01 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: ijcsea NLPI 2025 : 5th International Conference on NLP & Information Retrieval /slideshow/nlpi-2025-5th-international-conference-on-nlp-information-retrieval/275067340 nlpi-250123070301-097c543e
5th International Conference on NLP & Information Retrieval (NLPI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:]]>

5th International Conference on NLP & Information Retrieval (NLPI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:]]>
Thu, 23 Jan 2025 07:03:01 GMT /slideshow/nlpi-2025-5th-international-conference-on-nlp-information-retrieval/275067340 ijcsea@slideshare.net(ijcsea) NLPI 2025 : 5th International Conference on NLP & Information Retrieval ijcsea 5th International Conference on NLP & Information Retrieval (NLPI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to: <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nlpi-250123070301-097c543e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 5th International Conference on NLP &amp; Information Retrieval (NLPI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:
NLPI 2025 : 5th International Conference on NLP & Information Retrieval from IJCSEA Journal
]]>
7 0 https://cdn.slidesharecdn.com/ss_thumbnails/nlpi-250123070301-097c543e-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Call for Papers - 13th International Conference of Advanced Computer Science & Information Technology (ACSIT 2025) /slideshow/call-for-papers-13th-international-conference-of-advanced-computer-science-information-technology-acsit-2025/275044960 acsit2025cfp-250122102553-1f72657f
13th International Conference of Advanced Computer Science & Information Technology (ACSIT 2025) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Foundations of Computer Science & Technology. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advances. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science and Information Technology.]]>

13th International Conference of Advanced Computer Science & Information Technology (ACSIT 2025) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Foundations of Computer Science & Technology. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advances. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science and Information Technology.]]>
Wed, 22 Jan 2025 10:25:53 GMT /slideshow/call-for-papers-13th-international-conference-of-advanced-computer-science-information-technology-acsit-2025/275044960 ijcsea@slideshare.net(ijcsea) Call for Papers - 13th International Conference of Advanced Computer Science & Information Technology (ACSIT 2025) ijcsea 13th International Conference of Advanced Computer Science & Information Technology (ACSIT 2025) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Foundations of Computer Science & Technology. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advances. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science and Information Technology. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/acsit2025cfp-250122102553-1f72657f-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 13th International Conference of Advanced Computer Science &amp; Information Technology (ACSIT 2025) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Foundations of Computer Science &amp; Technology. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advances. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science and Information Technology.
Call for Papers - 13th International Conference of Advanced Computer Science & Information Technology (ACSIT 2025) from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/acsit2025cfp-250122102553-1f72657f-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Applying Machine Learning Techniques to Find Important Attributes for Heart Failure Severity Assessment /slideshow/applying-machine-learning-techniques-to-find-important-attributes-for-heart-failure-severity-assessment-c0c9/275038518 7517ijcsea01-250122055413-37f9f362
The diagnosis of heart disease depends mostly on the combination of clinical and pathological data. It leads to the quality of medical care provided for the patient. In this paper, three machine learning (ML) techniques −Classification and Regression tree (CART), Neural Networks (NN), and Support vector machine (SVM)− are utilized to find the best attributes for estimating the severity of heart failure. The data is collected from three different resources, then each input attribute used for assessing the severity of heart failure is analyzed individually after implementing the machine learning techniques. Finally, the most important supportive attributes are presented in this paper by which medical staffs can identify heart failure severity fast and more accurately. In fact, by screening important attributes, clinicians can make better decision about right treatment procedures or preventive actions that reduce risk of heart attacks.]]>

The diagnosis of heart disease depends mostly on the combination of clinical and pathological data. It leads to the quality of medical care provided for the patient. In this paper, three machine learning (ML) techniques −Classification and Regression tree (CART), Neural Networks (NN), and Support vector machine (SVM)− are utilized to find the best attributes for estimating the severity of heart failure. The data is collected from three different resources, then each input attribute used for assessing the severity of heart failure is analyzed individually after implementing the machine learning techniques. Finally, the most important supportive attributes are presented in this paper by which medical staffs can identify heart failure severity fast and more accurately. In fact, by screening important attributes, clinicians can make better decision about right treatment procedures or preventive actions that reduce risk of heart attacks.]]>
Wed, 22 Jan 2025 05:54:13 GMT /slideshow/applying-machine-learning-techniques-to-find-important-attributes-for-heart-failure-severity-assessment-c0c9/275038518 ijcsea@slideshare.net(ijcsea) Applying Machine Learning Techniques to Find Important Attributes for Heart Failure Severity Assessment ijcsea The diagnosis of heart disease depends mostly on the combination of clinical and pathological data. It leads to the quality of medical care provided for the patient. In this paper, three machine learning (ML) techniques −Classification and Regression tree (CART), Neural Networks (NN), and Support vector machine (SVM)− are utilized to find the best attributes for estimating the severity of heart failure. The data is collected from three different resources, then each input attribute used for assessing the severity of heart failure is analyzed individually after implementing the machine learning techniques. Finally, the most important supportive attributes are presented in this paper by which medical staffs can identify heart failure severity fast and more accurately. In fact, by screening important attributes, clinicians can make better decision about right treatment procedures or preventive actions that reduce risk of heart attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7517ijcsea01-250122055413-37f9f362-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The diagnosis of heart disease depends mostly on the combination of clinical and pathological data. It leads to the quality of medical care provided for the patient. In this paper, three machine learning (ML) techniques −Classification and Regression tree (CART), Neural Networks (NN), and Support vector machine (SVM)− are utilized to find the best attributes for estimating the severity of heart failure. The data is collected from three different resources, then each input attribute used for assessing the severity of heart failure is analyzed individually after implementing the machine learning techniques. Finally, the most important supportive attributes are presented in this paper by which medical staffs can identify heart failure severity fast and more accurately. In fact, by screening important attributes, clinicians can make better decision about right treatment procedures or preventive actions that reduce risk of heart attacks.
Applying Machine Learning Techniques to Find Important Attributes for Heart Failure Severity Assessment from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/7517ijcsea01-250122055413-37f9f362-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CFP - 5th International Conference on Computing and Information Technology (COIT 2025) /slideshow/cfp-5th-international-conference-on-computing-and-information-technology-coit-2025/274983292 coit2025-250120122741-71feffbd
5th International Conference on Computing and Information Technology (COIT 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. ]]>

5th International Conference on Computing and Information Technology (COIT 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. ]]>
Mon, 20 Jan 2025 12:27:41 GMT /slideshow/cfp-5th-international-conference-on-computing-and-information-technology-coit-2025/274983292 ijcsea@slideshare.net(ijcsea) CFP - 5th International Conference on Computing and Information Technology (COIT 2025) ijcsea 5th International Conference on Computing and Information Technology (COIT 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/coit2025-250120122741-71feffbd-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 5th International Conference on Computing and Information Technology (COIT 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
CFP - 5th International Conference on Computing and Information Technology (COIT 2025) from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/coit2025-250120122741-71feffbd-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Influence of Silicon Area on the Performance of the Full Adders /slideshow/the-influence-of-silicon-area-on-the-performance-of-the-full-adders-9046/274905713 7617ijcsea01-250116050701-bd2680f3
Recently, the influence of the silicon area on the delay time, power dissipation and the leakage current is a crucial issue when designing a full adder circuit. In this paper, an efficient full adder design referred to as 10-T is proposed. The new design utilized the use of XNOR gates instead of XOR in the full adder implementation and, as a result, the delay time and power dissipation are significantly decreased. In order, to show the influence of the silicon area and transistors count on the performance of the 10-T full adder, it is compared to the most recent full adders : 28-T , 20T , 16-T , and 14 –T. Simulation result based on HSPICE simulator using 16nm technology showed that the 10-T XNOR full adder significantly improved the performance of full adder through decreasing the transistors count. In addition using the multi-supply voltage of 130nm technology, in this case the proposed full adder demonstrated is the best power consumption in comparison to other designs.]]>

Recently, the influence of the silicon area on the delay time, power dissipation and the leakage current is a crucial issue when designing a full adder circuit. In this paper, an efficient full adder design referred to as 10-T is proposed. The new design utilized the use of XNOR gates instead of XOR in the full adder implementation and, as a result, the delay time and power dissipation are significantly decreased. In order, to show the influence of the silicon area and transistors count on the performance of the 10-T full adder, it is compared to the most recent full adders : 28-T , 20T , 16-T , and 14 –T. Simulation result based on HSPICE simulator using 16nm technology showed that the 10-T XNOR full adder significantly improved the performance of full adder through decreasing the transistors count. In addition using the multi-supply voltage of 130nm technology, in this case the proposed full adder demonstrated is the best power consumption in comparison to other designs.]]>
Thu, 16 Jan 2025 05:07:01 GMT /slideshow/the-influence-of-silicon-area-on-the-performance-of-the-full-adders-9046/274905713 ijcsea@slideshare.net(ijcsea) The Influence of Silicon Area on the Performance of the Full Adders ijcsea Recently, the influence of the silicon area on the delay time, power dissipation and the leakage current is a crucial issue when designing a full adder circuit. In this paper, an efficient full adder design referred to as 10-T is proposed. The new design utilized the use of XNOR gates instead of XOR in the full adder implementation and, as a result, the delay time and power dissipation are significantly decreased. In order, to show the influence of the silicon area and transistors count on the performance of the 10-T full adder, it is compared to the most recent full adders : 28-T , 20T , 16-T , and 14 –T. Simulation result based on HSPICE simulator using 16nm technology showed that the 10-T XNOR full adder significantly improved the performance of full adder through decreasing the transistors count. In addition using the multi-supply voltage of 130nm technology, in this case the proposed full adder demonstrated is the best power consumption in comparison to other designs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7617ijcsea01-250116050701-bd2680f3-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Recently, the influence of the silicon area on the delay time, power dissipation and the leakage current is a crucial issue when designing a full adder circuit. In this paper, an efficient full adder design referred to as 10-T is proposed. The new design utilized the use of XNOR gates instead of XOR in the full adder implementation and, as a result, the delay time and power dissipation are significantly decreased. In order, to show the influence of the silicon area and transistors count on the performance of the 10-T full adder, it is compared to the most recent full adders : 28-T , 20T , 16-T , and 14 –T. Simulation result based on HSPICE simulator using 16nm technology showed that the 10-T XNOR full adder significantly improved the performance of full adder through decreasing the transistors count. In addition using the multi-supply voltage of 130nm technology, in this case the proposed full adder demonstrated is the best power consumption in comparison to other designs.
The Influence of Silicon Area on the Performance of the Full Adders from IJCSEA Journal
]]>
5 0 https://cdn.slidesharecdn.com/ss_thumbnails/7617ijcsea01-250116050701-bd2680f3-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WJCI Indexed - Computer Science, Engineering and Applications - IJCSEA 2025 /slideshow/wjci-indexed-computer-science-engineering-and-applications-ijcsea-2025/274835423 ijcseacfp-250113092623-ad90905c
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal.]]>

International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal.]]>
Mon, 13 Jan 2025 09:26:23 GMT /slideshow/wjci-indexed-computer-science-engineering-and-applications-ijcsea-2025/274835423 ijcsea@slideshare.net(ijcsea) WJCI Indexed - Computer Science, Engineering and Applications - IJCSEA 2025 ijcsea International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijcseacfp-250113092623-ad90905c-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal.
WJCI Indexed - Computer Science, Engineering and Applications - IJCSEA 2025 from IJCSEA Journal
]]>
7 0 https://cdn.slidesharecdn.com/ss_thumbnails/ijcseacfp-250113092623-ad90905c-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Registration Technologies And Their Classification in Augmented Reality The Knowledge - Based Registration, Computer Vision - Based Registration And Tracker - Based Registration Technology /slideshow/registration-technologies-and-their-classification-in-augmented-reality-the-knowledge-based-registration-computer-vision-based-registration-and-tracker-based-registration-technology/274724844 6116ijcsea03-250108094706-52ddd8e7
The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased registration technology in augmented reality. Also described method in tracker- based technology, problem and solution.]]>

The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased registration technology in augmented reality. Also described method in tracker- based technology, problem and solution.]]>
Wed, 08 Jan 2025 09:47:06 GMT /slideshow/registration-technologies-and-their-classification-in-augmented-reality-the-knowledge-based-registration-computer-vision-based-registration-and-tracker-based-registration-technology/274724844 ijcsea@slideshare.net(ijcsea) Registration Technologies And Their Classification in Augmented Reality The Knowledge - Based Registration, Computer Vision - Based Registration And Tracker - Based Registration Technology ijcsea The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased registration technology in augmented reality. Also described method in tracker- based technology, problem and solution. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6116ijcsea03-250108094706-52ddd8e7-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased registration technology in augmented reality. Also described method in tracker- based technology, problem and solution.
Registration Technologies And Their Classification in Augmented Reality The Knowledge - Based Registration, Computer Vision - Based Registration And Tracker - Based Registration Technology from IJCSEA Journal
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/6116ijcsea03-250108094706-52ddd8e7-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Final Call - 11th International Conference on Software Engineering (SOFE 2025) /slideshow/final-call-11th-international-conference-on-software-engineering-sofe-2025/274691931 sofe2025-250107075320-fe676f25
11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering & applications.]]>

11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering & applications.]]>
Tue, 07 Jan 2025 07:53:19 GMT /slideshow/final-call-11th-international-conference-on-software-engineering-sofe-2025/274691931 ijcsea@slideshare.net(ijcsea) Final Call - 11th International Conference on Software Engineering (SOFE 2025) ijcsea 11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering & applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sofe2025-250107075320-fe676f25-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering &amp; applications.
Final Call - 11th International Conference on Software Engineering (SOFE 2025) from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/sofe2025-250107075320-fe676f25-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Analysis and Comparison Study of Data Mining Algorithms Using Rapid Miner /slideshow/analysis-and-comparison-study-of-data-mining-algorithms-using-rapid-miner/274576232 6116ijcsea02-250102061426-35eac260
Comparison study of algorithms is very much required before implementing them for the needs of any organization. The comparisons of algorithms are depending on the various parameters such as data frequency, types of data and relationship among the attributes in a given data set. There are number of learning and classifications algorithms are used to analyse, learn patterns and categorize data are available. But the problem is the one to find the best algorithm according to the problem and desired output. The desired result has always been higher accuracy in predicting future values or events from the given dataset. Algorithms taken for the comparisons study are Neural net, SVM, Naïve Bayes, BFT and Decision stump. These top algorithms are most influential data mining algorithms in the research community. These algorithms have been considered and mostly used in the field of knowledge discovery and data mining.]]>

Comparison study of algorithms is very much required before implementing them for the needs of any organization. The comparisons of algorithms are depending on the various parameters such as data frequency, types of data and relationship among the attributes in a given data set. There are number of learning and classifications algorithms are used to analyse, learn patterns and categorize data are available. But the problem is the one to find the best algorithm according to the problem and desired output. The desired result has always been higher accuracy in predicting future values or events from the given dataset. Algorithms taken for the comparisons study are Neural net, SVM, Naïve Bayes, BFT and Decision stump. These top algorithms are most influential data mining algorithms in the research community. These algorithms have been considered and mostly used in the field of knowledge discovery and data mining.]]>
Thu, 02 Jan 2025 06:14:26 GMT /slideshow/analysis-and-comparison-study-of-data-mining-algorithms-using-rapid-miner/274576232 ijcsea@slideshare.net(ijcsea) Analysis and Comparison Study of Data Mining Algorithms Using Rapid Miner ijcsea Comparison study of algorithms is very much required before implementing them for the needs of any organization. The comparisons of algorithms are depending on the various parameters such as data frequency, types of data and relationship among the attributes in a given data set. There are number of learning and classifications algorithms are used to analyse, learn patterns and categorize data are available. But the problem is the one to find the best algorithm according to the problem and desired output. The desired result has always been higher accuracy in predicting future values or events from the given dataset. Algorithms taken for the comparisons study are Neural net, SVM, Naïve Bayes, BFT and Decision stump. These top algorithms are most influential data mining algorithms in the research community. These algorithms have been considered and mostly used in the field of knowledge discovery and data mining. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6116ijcsea02-250102061426-35eac260-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Comparison study of algorithms is very much required before implementing them for the needs of any organization. The comparisons of algorithms are depending on the various parameters such as data frequency, types of data and relationship among the attributes in a given data set. There are number of learning and classifications algorithms are used to analyse, learn patterns and categorize data are available. But the problem is the one to find the best algorithm according to the problem and desired output. The desired result has always been higher accuracy in predicting future values or events from the given dataset. Algorithms taken for the comparisons study are Neural net, SVM, Naïve Bayes, BFT and Decision stump. These top algorithms are most influential data mining algorithms in the research community. These algorithms have been considered and mostly used in the field of knowledge discovery and data mining.
Analysis and Comparison Study of Data Mining Algorithms Using Rapid Miner from IJCSEA Journal
]]>
12 0 https://cdn.slidesharecdn.com/ss_thumbnails/6116ijcsea02-250102061426-35eac260-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CFP: 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) /slideshow/cfp-11th-international-conference-on-computer-science-information-technology-and-applications-csita-2025/274531995 csitacfp-241231061409-cceea679
11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects. ]]>

11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects. ]]>
Tue, 31 Dec 2024 06:14:09 GMT /slideshow/cfp-11th-international-conference-on-computer-science-information-technology-and-applications-csita-2025/274531995 ijcsea@slideshare.net(ijcsea) CFP: 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) ijcsea 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csitacfp-241231061409-cceea679-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects.
CFP: 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) from IJCSEA Journal
]]>
6 0 https://cdn.slidesharecdn.com/ss_thumbnails/csitacfp-241231061409-cceea679-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Viability of Computer-Based Examination in Developing Nations: The Way Forward /slideshow/viability-of-computer-based-examination-in-developing-nations-the-way-forward/274392796 6116ijcsea01-241226061926-af4f3870
Computer-based examination is becoming order of the day in almost all developed, developing and under developed nations. This is due to its advantages over paper means of testing. Unfortunately, some of the developing countries are adopting it without thorough examination of its feasibility, practicability, capability and possibility. This study tried to educate the public, government and examination bodies on the issues on ground that needs special attention before its full implementation. Data were gathered, analyzed and interpreted to show clear picture of present situation and the way forward.]]>

Computer-based examination is becoming order of the day in almost all developed, developing and under developed nations. This is due to its advantages over paper means of testing. Unfortunately, some of the developing countries are adopting it without thorough examination of its feasibility, practicability, capability and possibility. This study tried to educate the public, government and examination bodies on the issues on ground that needs special attention before its full implementation. Data were gathered, analyzed and interpreted to show clear picture of present situation and the way forward.]]>
Thu, 26 Dec 2024 06:19:26 GMT /slideshow/viability-of-computer-based-examination-in-developing-nations-the-way-forward/274392796 ijcsea@slideshare.net(ijcsea) Viability of Computer-Based Examination in Developing Nations: The Way Forward ijcsea Computer-based examination is becoming order of the day in almost all developed, developing and under developed nations. This is due to its advantages over paper means of testing. Unfortunately, some of the developing countries are adopting it without thorough examination of its feasibility, practicability, capability and possibility. This study tried to educate the public, government and examination bodies on the issues on ground that needs special attention before its full implementation. Data were gathered, analyzed and interpreted to show clear picture of present situation and the way forward. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6116ijcsea01-241226061926-af4f3870-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Computer-based examination is becoming order of the day in almost all developed, developing and under developed nations. This is due to its advantages over paper means of testing. Unfortunately, some of the developing countries are adopting it without thorough examination of its feasibility, practicability, capability and possibility. This study tried to educate the public, government and examination bodies on the issues on ground that needs special attention before its full implementation. Data were gathered, analyzed and interpreted to show clear picture of present situation and the way forward.
Viability of Computer-Based Examination in Developing Nations: The Way Forward from IJCSEA Journal
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/6116ijcsea01-241226061926-af4f3870-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
December Issue: International Journal of Computer Science, Engineering and Applications (IJCSEA) /slideshow/december-issue-international-journal-of-computer-science-engineering-and-applications-ijcsea/274354056 ijcseacfp-241224113813-e7494716
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal. ]]>

International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal. ]]>
Tue, 24 Dec 2024 11:38:13 GMT /slideshow/december-issue-international-journal-of-computer-science-engineering-and-applications-ijcsea/274354056 ijcsea@slideshare.net(ijcsea) December Issue: International Journal of Computer Science, Engineering and Applications (IJCSEA) ijcsea International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijcseacfp-241224113813-e7494716-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal.
December Issue: International Journal of Computer Science, Engineering and Applications (IJCSEA) from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/ijcseacfp-241224113813-e7494716-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Incremental Semi-Supervised Clustering Method Using Neighbourhood Assignment /slideshow/incremental-semi-supervised-clustering-method-using-neighbourhood-assignment/274166703 6216ijcsea02-241218013619-8a0eaf02
Semi-supervised considering so as to cluster expects to enhance clustering execution client supervision as pair wise imperatives. In this paper, we contemplate the dynamic learning issue of selecting pair wise must-connect and can't interface imperatives for semi supervised clustering. We consider dynamic learning in an iterative way where in every emphasis questions are chosen in light of the current clustering arrangement and the current requirement set. We apply a general system that expands on the idea of Neighbourhood, where Neighbourhoods contain "named samples" of distinctive bunches as indicated by the pair wise imperatives. Our dynamic learning strategy extends the areas by selecting educational focuses and questioning their association with the areas. Under this system, we expand on the fantastic vulnerability based rule and present a novel methodology for figuring the instability related with every information point. We further present a determination foundation that exchanges off the measure of vulnerability of every information point with the expected number of inquiries (the expense) needed to determine this instability. This permits us to choose questions that have the most astounding data rate. We assess the proposed strategy on the benchmark information sets and the outcomes show predictable and significant upgrades over the current cutting edge. ]]>

Semi-supervised considering so as to cluster expects to enhance clustering execution client supervision as pair wise imperatives. In this paper, we contemplate the dynamic learning issue of selecting pair wise must-connect and can't interface imperatives for semi supervised clustering. We consider dynamic learning in an iterative way where in every emphasis questions are chosen in light of the current clustering arrangement and the current requirement set. We apply a general system that expands on the idea of Neighbourhood, where Neighbourhoods contain "named samples" of distinctive bunches as indicated by the pair wise imperatives. Our dynamic learning strategy extends the areas by selecting educational focuses and questioning their association with the areas. Under this system, we expand on the fantastic vulnerability based rule and present a novel methodology for figuring the instability related with every information point. We further present a determination foundation that exchanges off the measure of vulnerability of every information point with the expected number of inquiries (the expense) needed to determine this instability. This permits us to choose questions that have the most astounding data rate. We assess the proposed strategy on the benchmark information sets and the outcomes show predictable and significant upgrades over the current cutting edge. ]]>
Wed, 18 Dec 2024 01:36:19 GMT /slideshow/incremental-semi-supervised-clustering-method-using-neighbourhood-assignment/274166703 ijcsea@slideshare.net(ijcsea) Incremental Semi-Supervised Clustering Method Using Neighbourhood Assignment ijcsea Semi-supervised considering so as to cluster expects to enhance clustering execution client supervision as pair wise imperatives. In this paper, we contemplate the dynamic learning issue of selecting pair wise must-connect and can't interface imperatives for semi supervised clustering. We consider dynamic learning in an iterative way where in every emphasis questions are chosen in light of the current clustering arrangement and the current requirement set. We apply a general system that expands on the idea of Neighbourhood, where Neighbourhoods contain "named samples" of distinctive bunches as indicated by the pair wise imperatives. Our dynamic learning strategy extends the areas by selecting educational focuses and questioning their association with the areas. Under this system, we expand on the fantastic vulnerability based rule and present a novel methodology for figuring the instability related with every information point. We further present a determination foundation that exchanges off the measure of vulnerability of every information point with the expected number of inquiries (the expense) needed to determine this instability. This permits us to choose questions that have the most astounding data rate. We assess the proposed strategy on the benchmark information sets and the outcomes show predictable and significant upgrades over the current cutting edge. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6216ijcsea02-241218013619-8a0eaf02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Semi-supervised considering so as to cluster expects to enhance clustering execution client supervision as pair wise imperatives. In this paper, we contemplate the dynamic learning issue of selecting pair wise must-connect and can&#39;t interface imperatives for semi supervised clustering. We consider dynamic learning in an iterative way where in every emphasis questions are chosen in light of the current clustering arrangement and the current requirement set. We apply a general system that expands on the idea of Neighbourhood, where Neighbourhoods contain &quot;named samples&quot; of distinctive bunches as indicated by the pair wise imperatives. Our dynamic learning strategy extends the areas by selecting educational focuses and questioning their association with the areas. Under this system, we expand on the fantastic vulnerability based rule and present a novel methodology for figuring the instability related with every information point. We further present a determination foundation that exchanges off the measure of vulnerability of every information point with the expected number of inquiries (the expense) needed to determine this instability. This permits us to choose questions that have the most astounding data rate. We assess the proposed strategy on the benchmark information sets and the outcomes show predictable and significant upgrades over the current cutting edge.
Incremental Semi-Supervised Clustering Method Using Neighbourhood Assignment from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/6216ijcsea02-241218013619-8a0eaf02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WJCI INDEXED: International Journal of Computer Science, Engineering and Applications (IJCSEA) /slideshow/wjci-indexed-international-journal-of-computer-science-engineering-and-applications-ijcsea/274135244 ijcseacfp-241217044622-345f30e5
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal ]]>

International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal ]]>
Tue, 17 Dec 2024 04:46:21 GMT /slideshow/wjci-indexed-international-journal-of-computer-science-engineering-and-applications-ijcsea/274135244 ijcsea@slideshare.net(ijcsea) WJCI INDEXED: International Journal of Computer Science, Engineering and Applications (IJCSEA) ijcsea International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijcseacfp-241217044622-345f30e5-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. All submissions must describe original research, not published or currently under review for another conference or journal
WJCI INDEXED: International Journal of Computer Science, Engineering and Applications (IJCSEA) from IJCSEA Journal
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/ijcseacfp-241217044622-345f30e5-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CFP: 11th International Conference on Software Engineering (SOFE 2025) /slideshow/cfp-11th-international-conference-on-software-engineering-sofe-2025/274015382 sofe2025-241212125100-50649e9b
11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. ]]>

11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. ]]>
Thu, 12 Dec 2024 12:50:59 GMT /slideshow/cfp-11th-international-conference-on-software-engineering-sofe-2025/274015382 ijcsea@slideshare.net(ijcsea) CFP: 11th International Conference on Software Engineering (SOFE 2025) ijcsea 11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sofe2025-241212125100-50649e9b-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 11th International Conference on Software Engineering (SOFE 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas.
CFP: 11th International Conference on Software Engineering (SOFE 2025) from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/sofe2025-241212125100-50649e9b-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Realtime National Health Insurance Scheme (RNHIS) : Means to Achieve Health for all /slideshow/realtime-national-health-insurance-scheme-rnhis-means-to-achieve-health-for-all-1d23/273981066 6216ijcsea01-241211034927-656e54ac
E-health, tele-medicine, and informatics are terms prominent in the health sector nowadays; Real-time Health Insurance should be among. The laudable program, National Health Insurance Scheme (NHIS) introduced in Nigeria can only be effective and efficient with the introduction of dynamic and integrated online NHIS system. Data were gathered through document examination, internet and interview of NHIS desk officers, health record officers, and NHIS accountant in two of our tertiary hospitals. Data were analysed and graphs were drawn to show current status. Software Engineering architecture for its development for better system was introduced. From the data analysed, it was found that none of the current Nigeria HMOs, Health Facilities (HFs) and NHIS headquarters is fully computerised and networked which is making the current system epileptic. People on transit and rural areas are not adequately catered for. Therefore, a workable Real-time Health Insurance Scheme will help people on transit and bridge urban-rural health divide.]]>

E-health, tele-medicine, and informatics are terms prominent in the health sector nowadays; Real-time Health Insurance should be among. The laudable program, National Health Insurance Scheme (NHIS) introduced in Nigeria can only be effective and efficient with the introduction of dynamic and integrated online NHIS system. Data were gathered through document examination, internet and interview of NHIS desk officers, health record officers, and NHIS accountant in two of our tertiary hospitals. Data were analysed and graphs were drawn to show current status. Software Engineering architecture for its development for better system was introduced. From the data analysed, it was found that none of the current Nigeria HMOs, Health Facilities (HFs) and NHIS headquarters is fully computerised and networked which is making the current system epileptic. People on transit and rural areas are not adequately catered for. Therefore, a workable Real-time Health Insurance Scheme will help people on transit and bridge urban-rural health divide.]]>
Wed, 11 Dec 2024 03:49:27 GMT /slideshow/realtime-national-health-insurance-scheme-rnhis-means-to-achieve-health-for-all-1d23/273981066 ijcsea@slideshare.net(ijcsea) Realtime National Health Insurance Scheme (RNHIS) : Means to Achieve Health for all ijcsea E-health, tele-medicine, and informatics are terms prominent in the health sector nowadays; Real-time Health Insurance should be among. The laudable program, National Health Insurance Scheme (NHIS) introduced in Nigeria can only be effective and efficient with the introduction of dynamic and integrated online NHIS system. Data were gathered through document examination, internet and interview of NHIS desk officers, health record officers, and NHIS accountant in two of our tertiary hospitals. Data were analysed and graphs were drawn to show current status. Software Engineering architecture for its development for better system was introduced. From the data analysed, it was found that none of the current Nigeria HMOs, Health Facilities (HFs) and NHIS headquarters is fully computerised and networked which is making the current system epileptic. People on transit and rural areas are not adequately catered for. Therefore, a workable Real-time Health Insurance Scheme will help people on transit and bridge urban-rural health divide. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6216ijcsea01-241211034927-656e54ac-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> E-health, tele-medicine, and informatics are terms prominent in the health sector nowadays; Real-time Health Insurance should be among. The laudable program, National Health Insurance Scheme (NHIS) introduced in Nigeria can only be effective and efficient with the introduction of dynamic and integrated online NHIS system. Data were gathered through document examination, internet and interview of NHIS desk officers, health record officers, and NHIS accountant in two of our tertiary hospitals. Data were analysed and graphs were drawn to show current status. Software Engineering architecture for its development for better system was introduced. From the data analysed, it was found that none of the current Nigeria HMOs, Health Facilities (HFs) and NHIS headquarters is fully computerised and networked which is making the current system epileptic. People on transit and rural areas are not adequately catered for. Therefore, a workable Real-time Health Insurance Scheme will help people on transit and bridge urban-rural health divide.
Realtime National Health Insurance Scheme (RNHIS) : Means to Achieve Health for all from IJCSEA Journal
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/6216ijcsea01-241211034927-656e54ac-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comparison of Collaborative Filtering Algorithms with Various Similarity Measures for Movie Recommendation /slideshow/comparison-of-collaborative-filtering-algorithms-with-various-similarity-measures-for-movie-recommendation-0391/273825699 6316ijcsea01-241204072700-6db57d92
Collaborative Filtering is generally used as a recommender system. There is enormous growth in the amount of data in web. These recommender systems help users to select products on the web, which is the most suitable for them. Collaborative filtering-systems collect user’s previous information about an item such as movies, music, ideas, and so on. For recommending the best item, there are many algorithms, which are based on different approaches. The most known algorithms are User-based and Item-based algorithms. Experiments show that Item-based algorithms give better results than User-based algorithms. The aim of this paper isto compare User-based and Item-based Collaborative Filtering Algorithms with many different similarity indexes with their accuracy and performance. We provide an approach to determine the best algorithm, which give the most accurate recommendation by using statistical accuracy metrics. The results are compared the User-based and Item-based algorithms with movie recommendation data set]]>

Collaborative Filtering is generally used as a recommender system. There is enormous growth in the amount of data in web. These recommender systems help users to select products on the web, which is the most suitable for them. Collaborative filtering-systems collect user’s previous information about an item such as movies, music, ideas, and so on. For recommending the best item, there are many algorithms, which are based on different approaches. The most known algorithms are User-based and Item-based algorithms. Experiments show that Item-based algorithms give better results than User-based algorithms. The aim of this paper isto compare User-based and Item-based Collaborative Filtering Algorithms with many different similarity indexes with their accuracy and performance. We provide an approach to determine the best algorithm, which give the most accurate recommendation by using statistical accuracy metrics. The results are compared the User-based and Item-based algorithms with movie recommendation data set]]>
Wed, 04 Dec 2024 07:26:59 GMT /slideshow/comparison-of-collaborative-filtering-algorithms-with-various-similarity-measures-for-movie-recommendation-0391/273825699 ijcsea@slideshare.net(ijcsea) Comparison of Collaborative Filtering Algorithms with Various Similarity Measures for Movie Recommendation ijcsea Collaborative Filtering is generally used as a recommender system. There is enormous growth in the amount of data in web. These recommender systems help users to select products on the web, which is the most suitable for them. Collaborative filtering-systems collect user’s previous information about an item such as movies, music, ideas, and so on. For recommending the best item, there are many algorithms, which are based on different approaches. The most known algorithms are User-based and Item-based algorithms. Experiments show that Item-based algorithms give better results than User-based algorithms. The aim of this paper isto compare User-based and Item-based Collaborative Filtering Algorithms with many different similarity indexes with their accuracy and performance. We provide an approach to determine the best algorithm, which give the most accurate recommendation by using statistical accuracy metrics. The results are compared the User-based and Item-based algorithms with movie recommendation data set <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6316ijcsea01-241204072700-6db57d92-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Collaborative Filtering is generally used as a recommender system. There is enormous growth in the amount of data in web. These recommender systems help users to select products on the web, which is the most suitable for them. Collaborative filtering-systems collect user’s previous information about an item such as movies, music, ideas, and so on. For recommending the best item, there are many algorithms, which are based on different approaches. The most known algorithms are User-based and Item-based algorithms. Experiments show that Item-based algorithms give better results than User-based algorithms. The aim of this paper isto compare User-based and Item-based Collaborative Filtering Algorithms with many different similarity indexes with their accuracy and performance. We provide an approach to determine the best algorithm, which give the most accurate recommendation by using statistical accuracy metrics. The results are compared the User-based and Item-based algorithms with movie recommendation data set
Comparison of Collaborative Filtering Algorithms with Various Similarity Measures for Movie Recommendation from IJCSEA Journal
]]>
4 0 https://cdn.slidesharecdn.com/ss_thumbnails/6316ijcsea01-241204072700-6db57d92-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
November 2024: Top 10 Read Article in Computer Science, Engineering and Applications /slideshow/november-2024-top-10-read-article-in-computer-science-engineering-and-applications/273705337 november2024top10readarticleincomputerscienceengineeringandapplications-241129085111-05843b95
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. ]]>

International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. ]]>
Fri, 29 Nov 2024 08:51:11 GMT /slideshow/november-2024-top-10-read-article-in-computer-science-engineering-and-applications/273705337 ijcsea@slideshare.net(ijcsea) November 2024: Top 10 Read Article in Computer Science, Engineering and Applications ijcsea International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/november2024top10readarticleincomputerscienceengineeringandapplications-241129085111-05843b95-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
November 2024: Top 10 Read Article in Computer Science, Engineering and Applications from IJCSEA Journal
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/november2024top10readarticleincomputerscienceengineeringandapplications-241129085111-05843b95-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Impact of Resource Management and Scalability on performance of Cloud Applications - A Survey /slideshow/impact-of-resource-management-and-scalability-on-performance-of-cloud-applications-a-survey-0953/273635156 6416ijcsea01-241127060430-bb4c56d8
Cloud computing facilitates service providers to rent their computing capabilities for deploying applications depending on user requirements. Applications of cloud have diverse composition, configuration and deployment requirements. Quantifying the performance of applications in Cloud computing environments is a challenging task. In this paper, we try to identify various parameters associated with performance of cloud applications and analyse the impact of resource management and scalability among them.]]>

Cloud computing facilitates service providers to rent their computing capabilities for deploying applications depending on user requirements. Applications of cloud have diverse composition, configuration and deployment requirements. Quantifying the performance of applications in Cloud computing environments is a challenging task. In this paper, we try to identify various parameters associated with performance of cloud applications and analyse the impact of resource management and scalability among them.]]>
Wed, 27 Nov 2024 06:04:30 GMT /slideshow/impact-of-resource-management-and-scalability-on-performance-of-cloud-applications-a-survey-0953/273635156 ijcsea@slideshare.net(ijcsea) Impact of Resource Management and Scalability on performance of Cloud Applications - A Survey ijcsea Cloud computing facilitates service providers to rent their computing capabilities for deploying applications depending on user requirements. Applications of cloud have diverse composition, configuration and deployment requirements. Quantifying the performance of applications in Cloud computing environments is a challenging task. In this paper, we try to identify various parameters associated with performance of cloud applications and analyse the impact of resource management and scalability among them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6416ijcsea01-241127060430-bb4c56d8-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cloud computing facilitates service providers to rent their computing capabilities for deploying applications depending on user requirements. Applications of cloud have diverse composition, configuration and deployment requirements. Quantifying the performance of applications in Cloud computing environments is a challenging task. In this paper, we try to identify various parameters associated with performance of cloud applications and analyse the impact of resource management and scalability among them.
Impact of Resource Management and Scalability on performance of Cloud Applications - A Survey from IJCSEA Journal
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/6416ijcsea01-241127060430-bb4c56d8-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication /slideshow/a-novel-approach-for-concealed-data-sharing-and-data-embedding-for-secured-communication-444f/273454104 1210ijcsea01-241120043619-19fda0c7
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely. ]]>

This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely. ]]>
Wed, 20 Nov 2024 04:36:19 GMT /slideshow/a-novel-approach-for-concealed-data-sharing-and-data-embedding-for-secured-communication-444f/273454104 ijcsea@slideshare.net(ijcsea) A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication ijcsea This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1210ijcsea01-241120043619-19fda0c7-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication from IJCSEA Journal
]]>
5 0 https://cdn.slidesharecdn.com/ss_thumbnails/1210ijcsea01-241120043619-19fda0c7-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ijcsea-48x48.jpg?cb=1737615691 International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications. airccse.org/journal/ijcsea/index.html https://cdn.slidesharecdn.com/ss_thumbnails/nlpi-250123070301-097c543e-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/nlpi-2025-5th-international-conference-on-nlp-information-retrieval/275067340 NLPI 2025 : 5th Intern... https://cdn.slidesharecdn.com/ss_thumbnails/acsit2025cfp-250122102553-1f72657f-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/call-for-papers-13th-international-conference-of-advanced-computer-science-information-technology-acsit-2025/275044960 Call for Papers - 13th... https://cdn.slidesharecdn.com/ss_thumbnails/7517ijcsea01-250122055413-37f9f362-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/applying-machine-learning-techniques-to-find-important-attributes-for-heart-failure-severity-assessment-c0c9/275038518 Applying Machine Learn...