Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Increase treatment quality is the most challenging task because clinical status of the patient and circumstances inside a healthcare organization constantly change. In this paper we present a Rule based Exception handling and Priority modeling (REP) framework which aims at providing a solution for diabetes management. However, this functionality is a major requirement for next generation systems in order to deal with more exceptions at a time. The proposed framework explains about how to manage resources and activities during diabetes management. The exceptions are detected with the help of rule interpreter and rule base. The hospital workflow system is assisted by the semantic technologies, which utilize ontology to describe the required knowledge. At the time of monitoring, if any exceptions arise, the system reasons over the constructed Semantic Web Rule Language (SWRL) rules and provide decisions for the next step of the treatment. In order to provide treatment flow for the known cases, the adaptation results and patient information are stored on Electronic health record.
Authors and Affiliations
THANGARAJ MUTHURAMAN , GNANAMBAL SANKARAN
An Approach for Reducing Failures using Phased Data Migration Projects
Software organizations often need to migrating applications from one platform or technology to another for a variety of reasons. As part of an Information Lifecycle Management (ILM) best-practices strategy, the organizat...
Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
Increase treatment quality is the most challenging task because clinical status of the patient and circumstances inside a healthcare organization constantly change. In this paper we present a Rule based Exception handlin...
Comparison of Software Test Data for Automatic Path Coverage Using Genetic Algorithm
This paper discusses genetic algorithms that can automatically generate test cases to test selected path. This algorithm takes a selected path as a target and executes sequences of operators iteratively for test cases to...
Secret Detection of Sensitive Data Leakage
Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which...
Two Stage Robust Filtering Technique to Remove Salt & Pepper Noise in Grayscale Image
Digital images are playing a key role but while transmitting the image more disturbances are produced by the noise which corrupts the image. Denoising leads to good quality image and restoration of original information....