Enterprise Ontology Based Knowledge Map for Improving Hospital Services
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 5, Issue 2
Abstract
The global healthcare spending has constantly increased in the last decades, and there is data showing inefficiency in resource consumption that is not reflected in healthcare improvement. The need to introduce new ways to do the same at a lower cost is rational. To address this, we propose a method based on Enterprise Ontology and knowledge map to find non value-added transactions that must be redesigned to improve the healthcare management. This methodology was chosen as a basis for our solution because it provides a better understanding of the dynamics of an organization, and allows a good alignment between the enterprise design and operation.Demonstrations were accomplished in University Teknologi Malaysia Healthcare Center, making it possible to find transactions that can be refined or improved. Results prove that the method yield s an adequate and clear process view and is reliable when it comes to improving healthcare operational processes
Authors and Affiliations
Mahdi Alhaji Musa , Mohd Shahizan Othman , Waleed Mugaheed Al - Rahimi
Simulation Based Analysis of Two Different Control Strategies for PMSM
—In low power application generally permanent magnet synchronous motor (PMSM) are used. Because of their high performance/cost ratio, the attention toward PMSM in variable speed application, is greater. Control of...
Study on Environmental impact on oil and gas activities in Ghana- Analysis by graphical approaches using Matlab
Environmental impacts are main factor in any country. This paper is focused about various types of impacts on oil and gas activities carried over in Ghana. We are studied different results for aquatic impacts on di...
Performance Evaluation of Modified LSB Digital Image Watermarking Technique
Digital Image Watermarking is the process of embedding information/logo into a digital image which may be used to verify its authenticity or the identity of its owners. If the watermarked image is copied, then the inform...
Multilingual Person Identification
Speech conveys the word being spoken and information about the speakers. The speaker recognition is divided into two parts speaker identification and speaker verification. Present paper explores the idea to identify mult...
Securing SMS Based One Time Password Technique from Man in the Middle Attack
Security of financial transactions in E-Commerce is difficult to implement and there is a risk that user’s confidential data over the internet may be accessed by hackers. Unfortunately, interacting with an online service...