by Khurram Qumar Siddque and Moyinuddeen Shaik
Original Research
The paper explores the meter-to-cash lifecycle, encompassing the provision of utilities such as electricity, gas, water, and wastewater to customers, along with the associated payment process. The study delves into the various steps of this lifecycle, offering insights for utilities and emphasizing ...
Journal of Computer Sciences and Applications. 2024, 12(1), 1-9. DOI: 10.12691/jcsa-12-1-1
Pub. Date: February 04, 2024
by Moyinuddeen Shaik and Khurram Qumar Siddque
Review Article
In the ever-evolving landscape of supply chain management, the convergence of Predictive Analytics, SAP, and Artificial Intelligence (AI) stands as a transformative force. This article embarks on a comprehensive exploration of the integration of Predictive Analytics within SAP systems bolstered by ...
Journal of Computer Sciences and Applications. 2023, 11(1), 1-6. DOI: 10.12691/jcsa-11-1-1
Pub. Date: December 28, 2023
by Muhammad Mika’ilu Yabo, Ahamed Baita Garko, Abubakar Atiku Muslim and Hassan Umar Suru
Original Research
Many intelligent healthcare systems have been developed to diagnose human diseases such as breast cancer, hepatitis, diabetes and heart diseases. Diabetes is a lifelong chronic disease that occurs when the pancreas does not produce enough insulin (Type I diabetes mellitus), or when the body's ...
Journal of Computer Sciences and Applications. 2022, 10(1), 6-15. DOI: 10.12691/jcsa-10-1-2
Pub. Date: October 16, 2022
1360 Views11 Downloads
by Ruth Chepkirui Kosgei, Gregory W. Wanyembi and Harisson Bii
Original Research
With respects to employees’ computers activity, do you know who, where, when and what goes on in case you are not monitoring in your organization? It simply takes a solitary unmonitored PC to leave a security hole in your institution. This study intended to recommend use of an electronic monitoring ...
Journal of Computer Sciences and Applications. 2022, 10(1), 1-5. DOI: 10.12691/jcsa-10-1-1
Pub. Date: March 25, 2022
1749 Views9 Downloads
by Rushit Dave, Naeem Seliya, Nyle Siddiqui and Su Mao
Review Article
Recent advancements in technology now allow for the generation of massive quantities of data. There is a growing need to transmit this data faster and more securely such that it cannot be accessed by malicious individuals. Edge computing has emerged in previous research as a method capable of ...
Journal of Computer Sciences and Applications. 2021, 9(1), 23-34. DOI: 10.12691/jcsa-9-1-3
Pub. Date: October 28, 2021
3525 Views12 Downloads