Data Flow Diagrams of an Electronic Medical Record System in Mansoura Hospital
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 7
Abstract
This paper develops an Electronic Medical Record System in the Neurosurgical Unit of Mansoura General Hospital using Data Flow Diagrams. Data Flow Diagrams are the first step to design the system blueprint as they represent users requirements. The paper creates a context-aware fisheye view as it is more successfully communicate the information contained in a set of Data Flow Diagrams (DFD) than a traditional context-free presentation. A case study and experimental results show that our context-aware fisheye DFD's are well suited for application in developing Electronic Medical Record System. This makes the expert system more reliable and faster response
Authors and Affiliations
Ali Asakr, Diana T Mosab
A Taxonomic Service for Species Identification
Taxonomy is the science of discovering, classifying and categorizing organisms into groups. Names are given to species when they are recognized for ecology, potential hazards or just for human culture and admiration. How...
Shape Matching and Recognition using Hybrid Features from Skeleton and Boundary
This paper presents a novel approach for effective matching of similar shapes from skeleton and boundary features. The features identified from the shape are the junction points, end points, and maximum length from singl...
Providing security for Web Service Composition using Finite State Machine
The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the...
The Optimal q-Homotopy Analysis Method (Oq-HAM)
In this paper, an optimal q-homotopy analysis method (Oq-HAM) is proposed. We present some examples to show the reliability and efficiency of the method. It is compared with the one-step optimal homotopy analysis method....
Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs
In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due...