Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Increase treatment quality is the most challenging task because clinical status of the patient and circumstances inside a healthcare organization constantly change. In this paper we present a Rule based Exception handling and Priority modeling (REP) framework which aims at providing a solution for diabetes management. However, this functionality is a major requirement for next generation systems in order to deal with more exceptions at a time. The proposed framework explains about how to manage resources and activities during diabetes management. The exceptions are detected with the help of rule interpreter and rule base. The hospital workflow system is assisted by the semantic technologies, which utilize ontology to describe the required knowledge. At the time of monitoring, if any exceptions arise, the system reasons over the constructed Semantic Web Rule Language (SWRL) rules and provide decisions for the next step of the treatment. In order to provide treatment flow for the known cases, the adaptation results and patient information are stored on Electronic health record.
Authors and Affiliations
THANGARAJ MUTHURAMAN , GNANAMBAL SANKARAN
A COMPARATIVE ANALYSIS OF OBJECT POINT METHOD WITH USE CASE METHOD IN SOFTWARE EFFORT ESTIMATION
The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for ef...
A NOVEL HISTOGRAM BASED ROBUST IMAGE REGISTRATION TECHNIQUE
In this paper, a method for Automatic Image Registration (AIR) through histogram is proposed. Automatic image registration is one of the crucial steps in the analysis of remotely sensed data. A new acquired image must be...
A Technical Review on Intrusion Detection System
Network security is a big issue at present for large organizations. There are many types of Intrusion Detection Systems like Host Based IDS, Network Based IDS, Anomaly Based IDS and Misuse Based IDS etc. There are variou...
Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS
The Paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Fl...
Customer Segmentation for Decision Support using Clustering and Association Rule based approaches
Key business areas that data mining techniques can be potentially applied to include business profitability, customer relationships, and business process efficieny. Customer Realtionship Management(CRM)has become a leadi...