期刊文献+

基于工作流驱动的手术临床路径建模及系统架构 被引量:4

Modeling of the Surgical Clinical Pathway Driven by Workflow and Its System Framework
下载PDF
导出
摘要 针对手术业务流程的复杂性,提出了基于工作流驱动的手术临床路径管理系统,并给出了其整体架构.在一种基于节点和连接的手术临床路径工作流建模方法和路由实现规则的基础上加入了时间约束机制.利用该管理系统的整体架构,对一个案例运行情况进行了说明. Orienting the complexity of surgical processes, a surgical clinical pathway management system driven by workflow and the framework of the system were presented. A workflow modeling method based on nodes and links as well as the routing rules was proposed, based on which the time constraint mechanism is added. A case implementation was also shown in the paper by use of the framework ot" this system.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2008年第5期791-797,共7页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60774103)
关键词 工作流 手术管理 手术临床路径管理系统 workflow surgical management surgical clinical pathway management system
  • 相关文献

参考文献13

  • 1Cheah J. Development and implementation of a clini cal pathway programme in an acute care general hospital in Singapore [J]. International Journal for Qual- ity in Health Care. 2000, 12(5), 403-412
  • 2Workflow Management Coalition. The workflow ref erence model [R]. Hampshire: Workflow Management Coalition, WfMC-TC00 1003,1995.
  • 3Dwivedi A, Bali R K, James A E, et al. Workflow management systems: The healthcare technology of the future annual [J]. Reports of the Research Reactor Institute, 2001 (4) :3887-3890.
  • 4Poulymenopoulou M, Malamateniou F. Emergency heahhcare process automation using workflow technology and web services [J]. Medical lnformatics and the lnternet in Medicine, 2003, 28:195-207.
  • 5Malamateniou F, Vassilacopoulos G. Developing a virtual patient record using XML and web-based workflow technologies [J]. International Journal of Medical lnformaties, 2003(70) : 131-139.
  • 6Silvana Quaglini. Flexible guideline-based patient care flow systems [J]. Artificial Intelligence in Medicine, 2001,22:65-80.
  • 7Davulcu H, Kifer M. Logic based modeling and analysis of workflows [C]//Proceedings of the ACM Symposium on Principles of Database Systems. New York, NY, USA:ACM Press, 1998:25-33.
  • 8Aalst van der WMP. Structural characterizations of sound workflow nets [R]. Computing Science Re ports, Eindhoven: Eindhoven University of Technology, 1996.
  • 9Chen L, Li M, Cao J. ECA rule-based workflow modeling and implementation for service composition [J]. IEICE Transactions on Information and Systems, 2006, E89-D (2): 624-630.
  • 10谢子松,武友新,牛德雄,江恭和,张烨.基于UML的工作流建模的研究与应用[J].计算机系统应用,2005,14(2):22-25. 被引量:14

二级参考文献26

  • 1[1]Hollingsworth D. Workflow Management Coalition: The Workflow Reference Model. Document Number WfMC-TC00-1003. Brussels, 1994
  • 2[2]WfMC. Workflow Management Coalition Specification: Terminology & Glossary. Document Number WfMC-TC-1011. Brussels, 1996
  • 3[3]Leung K R P H et al. The liaison workflow engine architecture. In: Proc of the 32nd Hawaii Int'l Conf on System Sciences. Hawaii. 1999. http://www.computer.org/proceedings/Hiccs2/
  • 4[4]Tagg R et al. Preliminary design of a lightweight workflow server. In: 8th Australian Conf on Information Systems. Australia, 1997. http://business.unisa.edu.au/acis97/
  • 5Tom Pender著 耿国桐等译.《UML Bible》[M].电子工业出版社,2004..
  • 6杨东 王英林.《工作流过程建模方法及模型的形式化验证》[M].计算机科学,2003..
  • 7《Workflow management coalition 》, The Workflow Reference Model, David Hollingsworth,1995 .
  • 8《The Unified Modeling Language Reference Manual》, Grady Booch. Jim Rumbaugh. Ivar Jacobson,Addison - Wesley,1999 .
  • 9《Extending UML Activily Diagram for Workflow Modeling in Production Systems》, Ricardo M. Bastos,Duncan Dubugras A. Ruiz Proceedings of the 35thHawaii International Proceedings of the 35th Hawaii Intemaional Conference On System Sciences-2002.
  • 10WFMC. Workflow manage mentcoalition terminology and glossary[R]. WFMC-TC- 1011,1999.

共引文献124

同被引文献35

  • 1周颖,郑国梁,李宣东.面向模型检验的UML状态机语义[J].电子学报,2003,31(z1):2091-2095. 被引量:8
  • 2邓水光,俞镇,吴朝晖.动态工作流建模方法的研究与设计[J].计算机集成制造系统,2004,10(6):601-608. 被引量:35
  • 3Brian L.Porto:legal reasoning and review.David A Schuhz ed.Law and politics:unanswered questions,Harvard University Press,1996.
  • 4丁丽萍,王永吉.多维计算机取证模型研究.第二十次全国计算机安全学术交流会论文集.
  • 5Knight E.Computer vulnerabilities,http://www.ussrback.com/decs/papers/general/compvuln_draft.pdf,2008-04-06.
  • 6Lough D L.A taxonomy of computer attacks with applications to wireless networks.Virginia Polytechnic Institute and State University,2001.
  • 7Amel M,Noureddine B.Multi-violation detectors an algebraic tool for alert correlation and intrusion detection.In:ICTtA 06,Damascus:IEEE Computer Society,2006.
  • 8Agrswal R,Srikant B.Fast algorithms for mining association rules in LARGE databases.In:Proceedings of 20th International Conference on Very Large Databases,Santiago,Chile,1994.
  • 9Calders T.Pereodaens J.Axiomatization of frequent itemsets.Theoretical Computer Science,2003,290(1):669-693.
  • 10Jin H,Sun J H.A fuzzy data mining based intrusion detection model.In:10th IEEE International Workshop on Future Trends of Distributed Computing Systems(ftdcs04).IEEE Computer Society,2004.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部