Distributed Data Patient In Medical Record Information System
|
|
|
- Luke Spencer
- 10 years ago
- Views:
Transcription
1 Distributed Data Patient In Medical Record Information System Bambang Eka Purnama, Ahmad Ashari Abstract: System legislation - crustaceans in Indonesia require to make medical records for each patient visit to a medical center. Physician handwriting that is difficult to interpret by others at a hospital would cause much impact. On the other hand at the moment that is not possible, after a patient enrolled in a hospital, this patient could not continue the examination in the hospital before. The aim of this system is designed to produce a good concept of distributed systems on the network of hospitals and other medical centers. So it can be useful to facilitate patients in treatment wherever he wants and likes. Data were recorded on a medical center will be read at the medical center anywhere. The proposed system using a distributed network and SOAP methods. This method is used to synchronize the different database formats on the hospital network. The expected result is to be comfortable in the treatment of patients and did not occur mall where a very dangerous practice. Keywords: Medical Record, Database, Networking, Coud Computing, Distributed System, Networking, Health Record 1.1. INTRODUCTION When a patient comes to a hospital, clinic, physician practice or other medical centers, the registration section will be asked whether the patient had ever come or not. If the patient says it never comes then the officer will ask for Patient Medication Identification Card (KIB) which will be used to find relevant patient records. In the conventional health care, then the officer will use a tracer to locate patient records on a storage form of stacks of paper. If the patient is in a hospital is still a bit then it would be problematic, but if the patient has reached a massive scale in the amount of hundreds of thousands or even millions it would have caused problems. The next problem is when a patient who had been to a hospital and then visited another hospital, the same procedure will also be experienced by the patient. Of course this will slow down service. Doctors also difficult to find a history of the patient as a reference diagnisisnya. Permenkes 749a No states that any health care facility shall conduct medical record. Medical Record (RM) is a file that contains records and documents about the identity of the patient, examination, treatment, action, and other services to patients in health care facilities. RM has the objective to support the achievement of orderly administration in the context of efforts to improve health services in the hospital. Implementation of RM in the hospital include patient admissions, medical and nursing services, administrative services and finance, RM data recording and reporting. Permenkes No. 749a (1989) 2.1. Distributed Systems Distributed computer system is a computer system that allows applications to operate in an integrated manner on more than one separate physical environment. Health information system consists of the components of a distributed application (in the doctor's office, in hospitals, in pharmacies and health insurance companies). Characteristic of distributed computer systems is heterogeneity in various ways: hardware, operating systems and programming languages. It is impossible to develop a homogeneous distributed systems compulsion, because naturally distributed computer systems grows from a heterogeneous environment. Keywords in bridging the differences that arise are interoperability. Lukito Edi Nugroho 2.2. Distributed Data Base In the distributed database system data is stored scattered in several places. Each storage area is managed by a DBMS independent. In order to view transparent distributed database view, it must meet two things, namely independence atomisitas distributed data and distributed transactions. With the independence of distributed data, the user can perform a simple query without specifying where the data or the data replicas or fragments of data that is stored. This satisfies the principle of physical data independence and data logic or data logic is independent of physical data. Furthermore the query process should also take into account the cost of the physical data storage through data communication or stored as local data (replica). With a distributed transaction atomisitas users should be able to perform daily transactions, update or data access to distributed data, as if the data is stored locally. Effect of transactions on distributed data must be atomic, that is persistent changes to the remote data and local data if the transaction has been committed, or there is no change at all if the transaction fails (can not commit). Although in general both of these must be met, but the situation in case of heavy traffic and a delay of the transmission, it would require a special mechanism to handle relating to administrative overhead and performance DBMS Bambang Eka Purnama Faculty of Informatics - University of Surakarta Surakarta, Indonesia Ahmad Ashari Faculty of Natural Science - Gadjah Mada University Yogyakarta, Indonesia 2.3. OLTP Database management systems are widely used by organizations to manage operational data every day, such as reservation data, the data should be reliable safe and efficient. Applications OLTP (online transaction processing) in the last 3 decades continues to grow. Applications that can generate a 116
2 summary of data from the old data and the new, including applications for decision support or, as it can be used to assist in making organizational decisions appropriately. The need to see the data as needed (view) and the corresponding user criteria (query) which is extracted from complex data sets triggers to learn how to define efficient query before view. Phase determination of query is called a pre-computational view. For purposes of computing pre-view, then the information should be consolidated from multiple database types (multi-database) into the data warehouse tables by copying from multiple locations to a single location. An organization that can take the right decisions requires view all aspects of a comprehensive organization, therefore we need a data warehouse that contains data taken from all the organization's data base managed by each organizational unit. Many of the character traits of decision support queries which can not be handled by the system SQL (structural query language) adequately, such as: the WHERE clause contains too many conditional operator (AND and OR) that it becomes cumbersome. In addition, many applications that require statistical functions like standard deviation can not be handled by SQL, so the SQL query should diembedkan into another programming language. Some applications relating to time require temporal databases, there are also some applications that require deductive approach of multiple queries relating to support a decision Data Mining Data Mining (DM) is the science that deals with how to find relevant information or knowledge from large databases once by using statistical and pattern rules automatically. In contrast to the search for knowledge with machine learning in the field of artificial intelligence the size of data stored on disk is not too large, then the size of the DM data stored on disk is very large. Search of knowledge there are two aspects of DM models, namely Model DM user who is directly involved in the search for knowledge, and knowledge of the search model of DM are completely handled by the system automatically. As the analysis and exploration tools, there is continuity between the query SQL, OLAP and DM. SQL queries are at the end, in the middle of OLAP and DM is at the other end. SQL queries are relatively simple compared to OLAP, query while the DM so complex that it requires a user defined parameters and the use of certain algorithms. On implementation of data on DM incomplete or contain noise. Exploration process knowledge or knowledge discovery process (KDD) can be divided into several stages. The early stages of data selection is to sort the raw data, then data cleaning is throwing phase noise and transformation of data values into a common unit, generating new attributes from existing attributes appropriate combination of relational schema. At the stage of data cleaning may also be done denormalisasi. In the next stage of the data mining stage of the real pattern extraction. In the last stage, the evaluation stage pattern visualized representation that is easy to understand the user, if required happened feedback to previous stages. Knowledge representation in DM using association rules: if antiseden then consequent (antiseden {} => {consequent}), which means that if there is a predicate on antiseden that is true, then the consequent also considered predicate true. In contrast to the statistical rule on the exact sciences that require a high percentage value (approaching 100%), the percentage value in DM usually around 50% support is considered high Distributed Component Distributed component is a software component that is stored on a separate machine to the client application and facilitated by communication protocols are added into the basic components. By separating the components of the client application is expected to facilitate the developer in making changes to the features and implementation of the component at a later date, without having to recompile existing applications on the client. The components are typically managed by a distributed Kakas which serves to manage and monitor the activities of the components. Kakas example of this is the Microsoft Transaction Server Distributed Applications Application architecture is a conceptual view of the structure of an application. In general, an application consists of a program code for processing the data, business logic and user interface. In the use of traditional enterprise application development paradigm that is monolithic, meaning that database, business logic and user interface incorporated into the same application. As a result, when there is a change, the entire system needs to be rebuilt, while the changes made are not too much. Another disadvantage, reusability of modules is very low. [STA00] 2.7. XML Extensible Markup Language (XML) provides a way to describe data structures. Unlike HTML label that serves to control the display and the data displayed, the label on the XML used to define the structure and data types of the data itself. [W3C-2007]. XML uses a set of labels to describe the data elements. Each element of a piece of data, whether the data is simple or very complex. With the possibility to define a set of labels is not limited to XML SOAP SOAP (Simple Object Access Protocol) is a simple class with basic XML protocol for exchanging information structure and types in the web [W3C-2007]. SOAP overall design goal is to make the exchange process to be as simple as possible and provide a minimum usability. This protocol defines an order book that contains no application or transport semantics. As a result, the protocol is modular high class and very knowledgeable. For example, the Web Service is to facilitate universal access to development services with SOAP Web Service A Web Service is a programmable entity that provides special functions and elements of it can be accessed for several separate systems through Internet standards, such as XML and HTTP [RUS-2002]. Web services rely heavily on widespread acclaim XML and other Internet standards to create an infrastructure that supports interoperability of applications. A Web Service can be used internally within an application or open externally through the Internet to be used by many applications. Because Web Service can be accessed through a standard display interface, a Web Service allows different systems to work together as a single web. 117
3 2.3. Infrastructure Web Service Web Service uses an infrastructure that provides the following services: 1. Discovery mechanism to locate a Web Service 2. A description of the service to mendefinisian how to use the service. 3. Standard format with a wire communication which Web Service Description Web Service infrastructure found in communication via XMLbased messages. Service description is an XML document that is written by an XML grammar, called WSDL (Web Service Description Language), which defines the message format that is understandable by the Web Service. Description of the service behavior of a Web Service and how the client instructions that can potentially interact with [MIC06b] CORBA Interoperability is the ability of mutual cooperation between computer systems. Interoperability is actually not new, because any data communication protocols (TCP / IP for example) are basically created to achieve interoperability. Which is not widely known is interoperability at the application software level. In the context of distributed computer systems, although the application components created with different programming languages, using different development tools, and operates in diverse environments, they still should be able to cooperate with each other. Interoperability of software requires certain homogeneity on a level. It required a kind of 'standardization'. Starting from this need was born the CORBA (Common Object Request Broker Architecture). CORBA is the result of 'agreement' between a number of software vendors and developers known as IBM, Hewlett-Packard, and DEC, who joined in a consortium called the OMG (Object Management Group). CORBA is a software architecture based on object-oriented technology or Object Oriented (OO) with the client-server paradigm. In OO terminology, an object communicates with other objects by sending messages (message passing). Communication context is then mapped into the client-server model: one object acts as a client (the sender) and the other acting as a server (which receives the message and process the message in question). For example, in the illustration at the beginning of this paper, if the patient requires a particular drug, then the application object in a doctor's office acts as a client and sends a message to the application object in the pharmacy to find out if drugs are needed are available there. The uniqueness of CORBA is its ability to handle heterogeneity between client and server (in CORBA terminology, a server object is called an object implementation (object implementation). Both can be implemented in hardware, operating systems, programming languages, and in different locations, but it can be mutually communicate. keys are on a layer of software called the ORB (Object Request Broker). CORBA architecture and ORBnya shown in figure 1 Lukito Edi Nugroho Unlike in the usual OO languages (C + + or Java), the process of sending a message from a client to an object implementation is not done directly. First, the stub and skeleton "isolate" the client and the object implementation of a low-level tasks such as marshalling and unmarshalling process data. Further ORB serves as a "broker" who bridge the heterogeneity between the two objects. ORB handles platform differences, tracking the location of the object, and the transfer of messages in such a way that is transparent to both the object. Thus the client programming and object implementations can concentrate fully on both functionality aspect. Mechanism shown in Figure 1 is the basic operation of CORBA-based systems. For example, in the case of the A above, the program at the doctor's office to act as a client for the program at the hospital. If Person A needs to be hospitalized, then the program will send a message to the doctor in the hospital program through ORB. Interestingly, both programs can be developed without the need for a lot of ties between the two, for example using a programming language, what operating system, and so on. Leaving enough of a 'deal' as outlined in an interface (see section on CORBA-Based Programming), the two programs can be developed independently CORBA-Based Programming How can two objects are developed separately, with different tools and languages, as well as run on different computers can communicate with each other? What can "reconcile" the differences? The key is the concept of interface. In the OO technology, interfaces can be regarded as "a contract" between the two objects will communicate. For server objects, interfaces serve as "advertisements" about what he could do. For the client, the interface serves to determine what services are provided by the server. In CORBA, interface specification is the first thing to do, just like in real life where before the transaction, made first contract. Interface specification is made using a special language that is standard called Interface Definition Language (IDL). IDL own syntax similar to C++ language syntax. The most noticeable difference is there is no code for the function and checktersedia checkharga! Keep in mind that the interface is only stating what is available (what aspects), not to mention how to provide it (how aspect). We will not discuss the syntax of IDL in this opportunity. Our focus is how to use the interface specification created with the IDL to make the client and the object implementation in applications. IDL interfaces are written with just a framework for client programs and object implementations. Programmers still have to fill in the details of both of them so as to form a complete program. In the example above interfacecheckobat example, the functions should be implemented checkharga and checktersedia. That need to be considered in the programming and implementation of the client object is a programming language used. Language that can be used is that a mapping (mapping) with IDL. The mention of equivalence mapping data types, functions, and other programming constructs in the IDL programming language construction is concerned. In general, the popular programming languages such as C, C++, Java, Smalltalk, and COBOL has had this mapping. As already explained above, the client and the object implementation can use different programming languages. Next step is to compile the program. Client program, the implementation of the object, and interface specifications compiled. Interface specification compiled with IDL compiler, generate code stubs (for client) and skeleton (for the implementation of the object). Each supported language has its own IDL compiler. Linking process is then performed to produce a program that can be executed. This process is shown in Figure 2 below. So far we can see that the IDL solve the problem of heterogeneity and distribution of the location of 118
4 the object. There are still things that remain unresolved: how a client can access an object implementation? Normally in programming languages this is done through the name (identifier) the object. But what if the object implementation is located on a different computer and made with different languages? Using the CORBA object reference for this purpose. Each object has a reference implementation as a handle to access the object itself. Reference object is created by the ORB at the time the object is created, it is unique, and remains valid as long as the object exists. Object reference also hides the physical location of the object in question. With reference to the object, the client can access an object implementations without having to know where the exact location of the object. Object reference can be passed to other applications, are stored in a database, or given to a customer for use in the program ORB Interoperability The scope of the CORBA-based computing is not just limited to the ORB only. Between the ORB with another ORB can also communicate. This model is very useful for large-scale enterprise computing with a very broad scope of distribution. In such a situation, it is impossible to use only one ORB for any existing program. The logical approach is to perform clustering, and a cluster is handled by an ORB. With this mechanism, each ORB required to be able to communicate with other ORB, to facilitate communication between programs running on it. Interoperability can be done efficiently and simpler by requiring two ORB to "talk" with the same protocol. Interoperable Internet Protocol (IIOP) is a standard protocol that must be owned by the ORB to be called "aligned with CORBA" (CORBA-compliant). In other words, IIOP is "a standard communication language" to the ORB. Interoperability can also be achieved through bridging (bridging). Allows bridging the communication is done by ORB with different protocols. This method provides flexibility to the implementor if the first method is not possible or difficult to apply, for example for reasons of computational solution demands the most cost-effective. Disadvantages, the overall system architecture becomes more complex because it requires inter-orb bridges. At first glance this model looks complicated, but in terms of application had no effect at all. Maintained full transparency, the client does not need to know anything if the implementation of the ORB object is located in the same scope or not. If not, it will automatically throw ORBnya message to ORB implementations in which the object is located. In our case, if the demand of a drug can not be filled by pharmacies objects X, then the ORB in that place can forward this request message to the ORB in pharmacies Y for example OMA So far, we only talk about interoperability at the object level. In fact, interoperability at the application level is much more complex. The linkage between one program to another so diverse, it is difficult for the provision of more comprehensive support is structured. With technology-based CORBA, OMG trying to pour his vision of distributed applications in an architecture called the Object Management Architecture (OMA). OMA classify the types of interaction between programs to facilitate the provision of support. Figure 3 illustrates the concept of OMA OMA application structuring the world into two large groups: service category CORBA (CORBA services) and facilities category CORBA (CORBA facilities). CORBA services provide basic functions used by almost every object in a variety of applications. These functions are usually quite generic and does not depend on the type of application domain. An example is the naming service (naming service). Imagine if we need a service but do not know where to look for servers that provide such services. Naming service can help us like a "yellow pages" (yellow pages), he can broadcast services directory listed him. Because it is generic, naming services can be used by applications from various domains. CORBA higher level facility. It provides services at the application level. There are two types of facilities: horizontal, which is required by the various types of domains (eg, userinterface), and vertical, that are specific to a particular domain (for example, in our case, the domain of health). Horizontal facilities function similar to CORBA services, but operates at a higher level because it is directly related to the functional aspects of the application. OMG continuously standardized the interfaces for the components in each category. The more services and facilities are standardized, the easier it is to achieve a component-based distributed computing in different areas of the plug-and-play, without being distracted by the heterogeneity problem Security Systems When a person receives or sends messages on the network, there are 4 very important issue, that is confidentiality, authentication, integrity and non-repudiation. Secrecy is that our data can not be read by unauthorized persons. Authentication guarantee of the authenticity of the data and with whom we are dealing. Guarantee the integrity of that data is not changed during the journey, in other words, the data sent is received data. And non-repudiation, which means the sender can not deny that the message sent not his. One of the parts is a cryptographic one-way hash function. One-way hash functions is that we can easily perform the encryption cipher to get it but it is very difficult to get the plaintext. One hash function is the most widely used Message Digest 5 (MD-5). MD-5 is a one-way hash function created by Ron Rivest. MD-5 is one of the applications that are used to determine that the message is sent when no change is in the network. MD-5 algorithms in general is taking a variable length messages have changed to 'fingerprint' or 'the essence of the message of having a fixed length is 128 bits. 'Fingerprints' This can not be reversed to get the message, in other words no one can see the message of 'fingerprints' MD-5. Message digest or the essence of the message should have three important properties, that is: 1. When P is known, then the MD (P) can be easily calculated. 2. When the MD (P) is known, then it is not possible to calculate P. 3. No one can give two messages having the same essence of the message Library Studies Maria Skouroliakou et al (2008). The use of computerized hospital records could potentially reduce medical errors and improve the cost-effectiveness of care by revealing the relationship between severity of illness and resource consumption in the ICU setting. The importance of computerized data management to improve safety and efficacy in the ICU for premature neonates has been fully 119
5 realized over the past few decades. Electronic documentation of some procedures for neonates. Establishment of a monitoring system allows for the study results as well as for the management of statistical information calculated yearly results have proven to be very important for the future and protect neonates to optimize the function of the ICU. Availability of this information allows clinicians to minimize errors and re-evaluate current clinical practice. Sorin Gudea (2005). To minimize pretext, information systems use databases to store metadata transform data into information. Large organizations often store the same data in different systems. A company has different health facilities and systems used for processing of patient data. A patient can receive treatment at more than one physical facility affiliated with the same organization, sometimes with random events and sometimes as part of the medical management process. There is technology available to system integration practitioners. System integration solutions for the system involves the exchange of data between system participants. Electronic transmission of data between systems across organizational boundaries by relying on standards for information content, format and exchange mechanisms. With the advent of Internet standards, open data transmission and access such as HTTP, FTP, XML and SOAP begin to find a way into the world of middleware. Web services middleware technology complements other than completely replacing it. Amany (2011). Communication and documentation is a means for the exchange of data and information. IS can facilitate communication between and among nurses, physicians and other health team members and improve patient outcomes. In addition, the use of IS to ensure completeness of documentation of patient care, facilitating the evaluation of patient care outcomes and improve patient safety Designing Network Server HS 1 Register Theraphy Pharmacy Billing Server HS 1 Register Theraphy Pharmacy Billing Figure 3.1. Network Model Server HS 1 Register Theraphy Pharmacy Billing Hospital networks in the design is a hospital has to serve an intranet network systems at hospitals concerned. Star topology is used for speed of access. The cable used is UTP cable connected to a switch hub centered. A live 24-hour servers used to store patient data. Interface used must be web-based for speed and ease of access. Server that is connected to the hospital that houses the Public Health Service hospitals in Indonesia Design Technology Figure 3.1. The problem frameworks 1. At the time of patient visit at Hospital A and sign up, then the database will be stored at Hospital A. Give KIB 1 patient in the form of print identity 1 Patient Medical Record Number and Identification Number Hospital A. After completion of the process in Hospital A, Patient 1 home and at that time, all activities are stored in database 1 Patient Hospital A. 2. At the time of patient visit at Hospital B and sign up, then the database will be stored at Hospital B. Give KIB 2 patients in the print form of identity Patients 2 and the Medical Record Number Identification Number Hospital B. After completion of the process at Hospital B, Patient 2 home and at that time, all activities are stored in database 2 Patient Hospital B. 3. One moment it is not possible, then the patient first visit to Hospital B. By showing his KIB Patient 1, the network connected systems will perform authorization at Hospital B. If the authorization is valid and accepted, the patient's identity will be displayed in the hospital with a complete patient history. 4. One moment it is not possible, then the patient 2 to the Hospital B. By showing his KIB Patient 2, the network connected systems will perform authorization at Hospital A. If the authorization is valid and accepted, the patient's identity will be displayed at the Hospital Bed complete with patient history. 5. One moment it is not possible, then Patient 1 and Patient 2 visited Hospital C. By showing KIB The patient, then the system is connected to the network will perform authorization at Hospital A and B. If the authorization is valid and accepted, the patient's identity will be displayed in the hospital with a complete patient history. 120
6 3.3. Design Technology 1. KIB made using Plastic Card Credit Card sandard size or ATM card. 6. Bibliography [1] Aghus Sofwan, Agung Budi P, Toni Susanto, Aplikasi Kriptografi Dengan Algoritma Message Digest 5 (Md5), Department of Electrical Engineering Faculty of Engineering, University of Diponegoro, Transmission, Vol. 11, No.. 1, June 2006 [2] Ismet Öztürk, Ibrahim Sogukpınar, Analysis and Comparison of Image Encryption Algorithms, Gebze Institute of Technology Computer Engineering Dept Gebze /Kocaeli, 2005 [3] W. Puech, M. Chaumont and O. Strauss, A Reversible Data Hiding Method for Encrypted Images, SPIE- IS&T/ Vol E-9, LIRMM Laboratory, UMR CNRS, University of Montpellier II, FRANCE, 2008 [4] Yusuf Kurniawan, Adang Suwandi Ahmad, M. Sukrisno Mardiyanto, Iping Supriana & Sarwono Sutikno, Analisis Sandi Diferensial terhadap AES, DES dan AE1, Proceeding. ITB Sains & Tek. Vol. 38 A, No. 1, 2006, [5] Tedjo Darmanto / Yulison HC, Basis Data 2, Team D3 TKJ STMIK AMIKBANDUNG [6] Madison L. Gates, PhD; and Phillip W. Roeder, PhD. A Case Study of User Assessment of a Corrections Electronic Health Record, Perspectives in Health Information Management (Spring 2011): Figure 3.2. Medication Identification Card Design 4.1. Discussion With the conventional system which had been a patient data will be stored in a conventional book. With this system, patient data will be difficult to be identified in the hospital, let alone in another hospital. With the proposed system in a patient who visit and register at a hospital will be digitally stored data. During a visit to another hospital and its patients submit KIB code system will track the hospitals where patients are listed first. To look at the track record of the patient, the patient can give authorization fingerprints would not be the same as other patients to the doctor to check. It's also a sign that the patient agrees history seen by a physician as further diagnostic reference CONCLUSION 1. With a well-designed system will be able to overcome the problem of data search quickly at a hospital. 2. Patients who visit any hospital will feel comfortable because it will not burdened with with paperwork. 3. Mall practice would be suppressed because the doctor can easily find previous patient history data, so as to determine the subsequent diagnosis becomes easier. [7] By Dean F Sittig, PhD; Brian L Hazlehurst, PhD; Ted Palen, MD, PhD; John Hsu, MD; Holly Jimison, PhD; Mark C [8] Hornbrook, PhD, A Clinical Information System Research Landscape, The Permanente Journal, Spring 2002, Volume 6 No. 2 [9] Gregory L. Alexander, PhD, RN, A Descriptive Analysis of a Nursing Home Clinical Information System with Decision Support, Perspectives in Health Information Management 5; 12, Summer 2008 [10] Bambang Parmanto PhD, Matthew Scotch, and Sjarif Ahmad, A Framework for Designing a Healthcare Outcome Data Warehouse, the American Health Information Management Association, 2005 [11] Mary E. Morton, PhD, rhia, dan Susan Wiedenbeck, PhD, A Framework for Predicting EHR Adoption Attitudes: A Physician Survey, Health Information Management 6, 2009 [12] Chris Johnstone, MBChB, and Gerry McCartney, MBChB, A Patient Survey Assessing the Awareness and Acceptability of the Emergency Care Summary and its Consent Model, Health Information Management (Spring 2010) [13] Ronaldo Parente, PhD, Ned Kock, PhD, and John Sonsini, An Analysis of the Implementation and Impact of Speech-Recognition Technology in the 121
7 Healthcare Sector, Health Information Management 1;5, Summer 2004 [14] Martin Pusic, MD, Dr J. Mark Ansermino, FFA, MMed, MSc, FRCPC, Clinical decision support systems, BCMJ, Vol. 46, No. 5, June 2004 [15] Robert J. Campbell, EdD, Consumer Informatics: Elderly Persons and the Internet, Health Information Management 2;2, Spring 2005 [16] Maria Skouroliakou, PhD; George Soloupis, MSc; Antonis Gounaris,MD; Antonia Charitou, MD; Petros Papasarantopoulos; Sophia L. Markantonis, PhD; Christina Golna, LLM, MSc; and Kyriakos Souliotis, PhD, Data Analysis of the Benefits of an Electronic Registry of Information in a Neonatal Intensive Care Unit in Greece Health Information Management 5; 10; Summer 2008 [17] Sorin Gudea, Data, Information, Knowledge: A Healthcare Enterprise Case Study, Health Information Management 2;8, Fall 2005 [18] Amany A. Abdrbo, BSN, MSN, PhD; Jaclene A. Zauszniewski, PhD, RN-BC, FAAN; Christine A. Hudak, RN, PhD, CPHIMS; and Mary K. Anthony, PhD, RN, CS, Development and Testing of a Survey Instrument to Measure Benefits of a Nursing Information System, Health Information Management (Summer 2011): [26] Sharon Gondodiputro,dr.,MARS, Rekam MedisDan Sistem Informasi Kesehatan Di Pelayanan Kesehatan Primer (Puskesmas), Faculty of Medicine, Universitas Padjadjaran Bandung 2007 [27] Hosizah, Electronic Health Record (Ehr) Atau Rekam Kesehatan Elektronik: Change In The Him Department, [28] Suhartanto, Pembuatan Sistem Informasi Rekam Medis Di Rumah Sakit Umum Pku Muhammadiyah Bantul [29] Eko Handoyo, Agung Budi Prasetijo, Fuad Noor Syamhariyanto, Aplikasi Sistem Informasi Rumah Sakit Berbasis Web Pada Sub-Sistem Farmasi Menggunakan Framework Prado, Diponegoro University, Semarang, 2008 [30] Tantos, Sistem Informasi Rumah Sakit Ideal, FMIPA UGM [31] Rr. Tutik Sri Haryati, SKp., MARS, Pendokumentasian Keperawatan Dengan Menggunakan Electronic Health Record (Ehr), UI Jakarta, 2010 [19] Sjamsuhidajat, Manual Rekam Medis, Konsil Kedokteran Indonesia, National Library Cataloging-in- Publication (KDT), Jakarta, 2006 [20] Brian hafiz adnan, Sistem Pendaftaran, Rekam Medis dan Sistem Pembayaran Pasien Rumah Sakit Berbasis Teknolog Java Card, Faculty of Engineering, University of Indonesia, Jakarta, 2008 [21] Arief Setyanto, Mobile Medical Records, STMIK AMIKOM Yogyakarta [22] Raden Sanjoyo, Aspek Hukum Rekam Medis, FMIPA Universitas Gadjah Mada [23] Abdul Mufti, Aplikasi Barcode 39 Pada Preregistrasi Online Penyelenggaraan Pameran, SNATI 2006 UII Yogyakarta [24] Netty Rahayuningtyas, Pembuatan Web Sistem Informasi Akademik Program Studi Diii Instrumentasi Dan Elektronika Berbasis Php Dan Mysql, UNDIP Semarang, 2007 [25] Hatmoko Tri Arianto, Pemprograman Aplikasi Platform Terbuka Berbasis Xml Web (Studi Kasus: Kolaborasi Aplikasi Dan Pertukaran Data Kependudukan Dengan Catatan Medis), Faculty of Engineering, Diponegoro University 122
Convenience and Medical Patient Database Benefits and Elasticity for Accessibility Therapy in Different Locations
Convenience and Medical Patient Database Benefits and Elasticity for Accessibility Therapy in Different Locations Bambang Eka Purnama Faculty of Informatics Engineering Surakarta University, Surakarta,
An Implementation of Outpatient Online Registration Information System of Mutiara Bunda Hospital
An Implementation of Outpatient Online Registration Information System of Mutiara Bunda Hospital Masniah College of Informatics and Computer Management STMIK Banjarbaru Banjarbaru, Indonesia Abstract Outpatient
Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur
Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker
Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Distributed Systems Architectures
Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems
System types. Distributed systems
System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors
Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications
Chapter 6. CORBA-based Architecture 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications 1 Chapter 6. CORBA-based Architecture Part 6.1 Introduction to
Middleware Lou Somers
Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,
Base One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture
Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit
Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A
Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,
Chapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) [email protected] http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
MIDDLEWARE 1. Figure 1: Middleware Layer in Context
MIDDLEWARE 1 David E. Bakken 2 Washington State University Middleware is a class of software technologies designed to help manage the complexity and heterogeneity inherent in distributed systems. It is
Infrastructure that supports (distributed) componentbased application development
Middleware Technologies 1 What is Middleware? Infrastructure that supports (distributed) componentbased application development a.k.a. distributed component platforms mechanisms to enable component communication
Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners
Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners Sokol Dhana One of the most challenging problems in
STRATEGIES ON SOFTWARE INTEGRATION
STRATEGIES ON SOFTWARE INTEGRATION Cornelia Paulina Botezatu and George Căruţaşu Faculty of Computer Science for Business Management Romanian-American University, Bucharest, Romania ABSTRACT The strategy
E-HEALTH PLATFORMS AND ARCHITECTURES
E-HEALTH PLATFORMS AND ARCHITECTURES E-Government Andreas Meier Nicolas Werro University of Fribourg Alfredo Santa Cruz 19.01.2007 Contents 1. Introduction 2. Existing Capabilities and Strategic Approach
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Distributed systems. Distributed Systems Architectures
Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore
An Ontology-based e-learning System for Network Security
An Ontology-based e-learning System for Network Security Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi Sendai National College of Technology [email protected] Goichi Itabashi Graduate School
Elements of Advanced Java Programming
Appendix A Elements of Advanced Java Programming Objectives At the end of this appendix, you should be able to: Understand two-tier and three-tier architectures for distributed computing Understand the
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
Service Oriented Architectures
8 Service Oriented Architectures Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) [email protected] http://www.iks.inf.ethz.ch/ The context for SOA A bit of history
Lesson 4 Web Service Interface Definition (Part I)
Lesson 4 Web Service Interface Definition (Part I) Service Oriented Architectures Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Interface Definition Languages (1) IDLs
Introduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
A Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems
Proceedings of the Postgraduate Annual Research Seminar 2005 68 A Model-based Software Architecture for XML and Metadata Integration in Warehouse Systems Abstract Wan Mohd Haffiz Mohd Nasir, Shamsul Sahibuddin
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
The Service Revolution software engineering without programming languages
The Service Revolution software engineering without programming languages Gustavo Alonso Institute for Pervasive Computing Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich)
Chapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
Enterprise Application Designs In Relation to ERP and SOA
Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...
Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
Overview of CORBA 11.1 I NTRODUCTION TO CORBA. 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary
C H A P T E R 1 1 Overview of CORBA 11.1 Introduction to CORBA 11.2 CORBA architecture 11.3 Client and object implementations 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary In previous
1 Introduction FEDERATED THROUGH-LIFE SUPPORT, ENABLING ONLINE INTEGRATION OF SYSTEMS WITHIN THE PLM DOMAIN. Abstract. Jonas Rosén
1 st Nordic Conference on Product Lifecycle Management - NordPLM 06, Göteborg, January 25-26 2006 FEDERATED THROUGH-LIFE SUPPORT, ENABLING ONLINE INTEGRATION OF SYSTEMS WITHIN THE PLM DOMAIN Jonas Rosén
3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
A Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
CHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom
Virtual Credit Card Processing System
The ITB Journal Volume 3 Issue 2 Article 2 2002 Virtual Credit Card Processing System Geraldine Gray Karen Church Tony Ayres Follow this and additional works at: http://arrow.dit.ie/itbj Part of the E-Commerce
Hubspan White Paper: Beyond Traditional EDI
March 2010 Hubspan White Paper: Why Traditional EDI no longer meets today s business or IT needs, and why companies need to look at broader business integration Table of Contents Page 2 Page 2 Page 3 Page
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
What Is the Java TM 2 Platform, Enterprise Edition?
Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today
Representing Knowledge Base into Database for WAP and Web-based Expert System
International Conference on Information Systems for Business Competitiveness (ICISBC 2013) 81 Representing Knowledge Base into Database for WAP and Web-based Expert System Istiadi Departement Of Electrical
Client/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
A Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University
The Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1
S C H E D A E I N F O R M A T I C A E VOLUME 20 2011 The Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1 Zdzis law Onderka AGH University
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE TIGRAN HAKOBYAN SUJAL PATEL VANDANA MURALI INTRODUCTION Common Object Request
Event-based middleware services
3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington
GEOG 482/582 : GIS Data Management Lesson 10: Enterprise GIS Data Management Strategies Overview Learning Objective Questions: 1. What are challenges for multi-user database environments? 2. What is Enterprise
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Development of Mobile Library Application Based on Android in Universitas Ahmad Dahlan
Development of Mobile Library Application Based on Android in Universitas Ahmad Dahlan Yana Hendriana Lecturer, Department of Informatics, Faculty of Industrial Technology, Universitas Ahmad Dahlan Yogyakarta,
What is a Web service?
What is a Web service? Many people and companies have debated the exact definition of Web services. At a minimum, however, a Web service is any piece of software that makes itself available over the Internet
Introduction to Web services architecture
Introduction to Web services architecture by K. Gottschalk S. Graham H. Kreger J. Snell This paper introduces the major components of, and standards associated with, the Web services architecture. The
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Architecture of the CORBA Component Model CORBA 3.0
Architecture of the CORBA Component Model CORBA 3.0 What is CORBA CORBA (Common Request Broker Architecture) is a distributed object-oriented client server platform. It provides: An object oriented remote
Distributed Objects and Components
Distributed Objects and Components Introduction This essay will identify the differences between objects and components and what it means for a component to be distributed. It will also examine the Java
FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS
FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS V. CHRISTOPHIDES Department of Computer Science & Engineering University of California, San Diego ICS - FORTH, Heraklion, Crete 1 I) INTRODUCTION 2
Master of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
Implementing Java Distributed Objects with JDBC
Implementing Java Distributed Objects with JDBC Pritisha 1, Aashima Arya 2 1,2 Department of Computer Science Bhagwan Mahaveer institute of engineering & technology (BMIET), Deenbandhu Chhotu Ram University
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
How To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz [email protected], [email protected] Institute of Control and Computation Engineering Warsaw University of
Service Oriented Architecture: A driving force for paperless healthcare system
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.16 Service Oriented Architecture: A driving
Integration Platforms Problems and Possibilities *
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8, No 2 Sofia 2008 Integration Platforms Problems and Possibilities * Hristina Daskalova, Tatiana Atanassova Institute of Information
Layering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure
University of California at Berkeley School of Information Management and Systems Information Systems 206 Distributed Computing Applications and Infrastructure Layering a computing infrastructure Middleware
ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001
ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Service Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Document management and exchange system supporting education process
Document management and exchange system supporting education process Emil Egredzija, Bozidar Kovacic Information system development department, Information Technology Institute City of Rijeka Korzo 16,
The Development of Mobile Client Application in Yogyakarta Tourism and Culinary Information System Based on Social Media Integration
The Development of Mobile Client Application in Yogyakarta Tourism and Culinary Information System Based on Social Media Integration Novrian Fajar Hidayat Department of Electrical Engineering and Information
AS/400 System Overview
Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence
Security Issues for the Semantic Web
Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,
Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer
Christoph Bussler B2B Integration Concepts and Architecture With 165 Figures and 4 Tables IIIBibliothek Springer Contents Part I Introduction to Business-to-Business Integration.... 1 1 History 3 1.1 Why
B.Sc. in Computer Information Systems Study Plan
195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210
Databases in Organizations
The following is an excerpt from a draft chapter of a new enterprise architecture text book that is currently under development entitled Enterprise Architecture: Principles and Practice by Brian Cameron
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Software Engineering. Software Engineering. Component-Based. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Component-Based Software Engineering Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain that CBSE is concerned with developing standardised components
Master s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
Challenges and Opportunities for formal specifications in Service Oriented Architectures
ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute
Model-Driven Data Warehousing
Model-Driven Data Warehousing Integrate.2003, Burlingame, CA Wednesday, January 29, 16:30-18:00 John Poole Hyperion Solutions Corporation Why Model-Driven Data Warehousing? Problem statement: Data warehousing
The Integration Between EAI and SOA - Part I
by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the
Distributed Systems LEEC (2005/06 2º Sem.)
Distributed Systems LEEC (2005/06 2º Sem.) Introduction João Paulo Carvalho Universidade Técnica de Lisboa / Instituto Superior Técnico Outline Definition of a Distributed System Goals Connecting Users
