Design and implementation of a health document
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 11
Abstract
Exchanging and integrating medical information in the healthcare domain is a challenge. Indeed, the diversity of databases and the different representations of information sources make this exchange a very difficult task. Divers standards, (e.g. HL7: Health Level Seven; DICOM: Digital Imaging and Communication in Medicine), are created to enable the exchange and make health information systems interoperable. However, applying standardization requires changing the structure of existing healthcare systems. Our main purpose is to create a health document for exchanging health information between heterogeneous systems without applying changes on the internal structure of systems. The document uses the XML language to allow a structured and flexible exchange of healthcare data. The proposed health document can make the exchange of healthcare data among heterogeneous health information systems simpler and efficient. This document addresses the problem of interoperability between health information systems. The paper summarizes standards used to support interoperability in healthcare domain and propose a health document to enable the exchange of medical information across heterogeneous and distributed health information systems without requirements or adjustment on their systems.
Authors and Affiliations
Sanae Mazouz, Ouçamah Mohammed Cherkaoui Malki, El Habib Nfaoui
A View of Cloud Computing
In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry...
INSTABILITY PROBLEM OF CONVENTIONAL TRANSFORMER DIFFERENTIAL PROTECTION-APPLICATION OF ZERO SEQUENCE CURRENT TRAP
Zero sequence component of current usually causes instability of the differential protection. It enters circuits through earthed terminals. The traditional way of solving the problem in differential schemes is by connect...
A Comparative Evaluation of approaches for Model Testability
Design for testability is a very importantissue in software engineering. It becomes crucial in the case of Model Based Testing where models are generally not tested before using as input of Model Based Testing. The quali...
WEB MINING THROUGH CUSTOMIZED MARKOV ALGORITHM
The problem of predicting a user’s behavior on a web site has gained Importance due to the very increases required web network. It also compulsory for market and research of social behavior. Although many approaches ar...
EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE
Visual cryptography is a secret information sharing technique which shares the information in the form of images. It generates noise-like random pixels on share images to hide secret information which on overlay decrypt...