IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 11, November 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Integration Between Aqli And Naqli In Development Of Database For Hospital Information System

[Full Text]

 

AUTHOR(S)

Muhammad Mursyidan Mah Dahwi,Waidah Ismail, Asma Abd Rahman, Azlan Husin, Rosline Hassan

 

KEYWORDS

Index Terms: Aqli and Naqli, Agile Methodology, Hospital Information System, Database Development

 

ABSTRACT

Abstract: Database era has been appear during Prophet Muhammad S.A.W. We are using the same concept but only deployed in the medical environment with security features which is related to aqli and naqli. The development of a system not only covered the ability of the system to be functioned and execute very well but a good and efficient system must be able to communicate with the users and become a user friendly system. This research is about developing Hospital Patient Information System developed for Hematology Ward and Hemato-oncology Laboratory at the Hospital UniversitiSains Malaysia (HUSM) based on the aqli and naqli. It lacks of security in term of data integrity of the system. It will be enhanced in its security features which will be implemented with the data integrity feature and also password encryption to overcome the problems. As a result, an automated calculation of blood series and graph production as for data analysis will be implemented in this system.An approach of agile method is the chosen process to be used in realizing this research. This system will come out with the ability of protection in data integrity, password encryption and automatic calculation in order to reduce the fraud and human errors.

 

REFERENCES

[1] Fabrizio Montecucco, Federico Carbone, Frank Lloyd Dini, Manuela Fiuza, Fausto J. Pinto, Antonietta Martelli, Domenico Palombo, Gianmario Sambuceti, Francois Mach, Raffaele De. Caterina, (2014) “Implementation strategies of Systems Medicine in clinical research and home care for cardiovascular disease patients “European Journal of Internal Medicine 25 (2014) 785–794.
[2] Mar Marcos, Jose A. Maldonado, Begona Martinez-Salvador, Diego Bosca, Montserrat Robles, (2013). “Interoperability of clinical decision-support systems and electronic health records using archetypes: A case study in clinical trial eligibility” Journal of Biomedical Informatics 46 (2013) 676–689

[3] Andrew R. Post, Tahsin Kurc, Sharath Cholleti, Jingjing Gao, Xia Lin, William Bornstein, Debra Centrell, David Levine, Sam Hohmann, Joel H.Saltz (2013)“The Analytic Information Warehouse (AIW): a Platform for Analytics using Electronic Health Record Data”. J Biomed Inform. 2013 June ; 46(3): 410–424. doi:10.1016/j.jbi.2013.01.005.

[4] Bernardo Estacio, Rafael, Prikladnicki, Michael Mora,, Gabriel Notari, Alejandro Olchik (2014). “Software Kaizen : Using Agile to Form High Performance”. Agile Conference (Agile) 2014. July 28, 2014 – Aug 1, 2014. Pg 1 – 10.

[5] Gabriela Jurca, Theodore D. Hellmann, Frank Maurer (2014). “Integrating Agile and User-Centered Design” Agile Conference (Agile) 2014. July 28, 2014 – Aug 1, 2014. Pg 24 – 32.4

[6] Andrew Aken. “An Agile Approach to the Software Development Life Cycle”. Journal of Internet commerce, Vol. 7(3) 2008

[7] Aaron M. French. “Web Development Life Cycle: A New Methodology for DevelopingWeb Applications”. Journal of Internet Banking and Commerce, August 2011, vol.16, n o.2

[8] Fan Wu, Lili Xu. “Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems”. 2 July 2013.

[9] Hsien-ChuWu, Min-Shiang Hwang, Chia-Hsin Liu. “A Secure Strong-Password Authentication Protocol”. Fundamenta Informaticae. 2005, Vol. 68 Issue 4, p399- 406

[10] Waidah, I, Rosline, H and Swift, S,. (2010) Detecting Leukaemia (AML) blood cells using CellularAutomata and Heuristic Search. Intelligent Data Analysis (IDA 2010)University of Arizona, USA. 54 – 64

[11] Wan Fatimah Wan Ahmad, Aliza Sarlan, NurZatulIffahZakaria (2008) “UniversitiTeknologi PETRONAS Health, Safety & Environment System”, International Symposium On Information Technology 2008 (ITSim08), KL Convention Center, 26-29th Aug 2008.

[12] Norhaziah A, Nor Naimah, M. Nasratun. (2008) “Pet Shop Management System for KlinikVeterinar and SurgeriJawhari” Audio, Transactions of the IRE Professional Group

[13] Rajendran, S, Arof, H, Mokhtar, N, Nubin, M, Yegappan, S, Ibrahim (2011). “Dual modality search and retrieval technique analysis for leukemic information system” Scientific Research and Essays. Pp 247-255

[14] Jeff Zadeh, Dennis DeVolder. “Software Development and Related Security Issues.” (2007).Proceedings of IEEE Southeastcon. 2007.

[15] J.D. Meier. "Web Application Security Engineering." (2006). IEEE Security &Privacy (vol. 4, no. 4, pp. 16–24). 2006.

[16] Mark Curphey, Rudolph Araujo. “Web application security assessment tools.” (2006) IEEE Security & Privacy (vol. 4, no. 4, pp. 32-41). 2006

[17] Myat Myat Min, Khin Haymar Saw Hla. “Security on Software Life Cycle using Intrusion Detection System.” (2005). 6th AsiaPacific Symposium on Information and Telecommunication Technologies APSITT 2005 Proceedings. 2005.

[18] C. Rigney, S. Willens, A. Rubens, W. Simpson, "Remote Authentication Dial In User Service (RADIUS)",(2000). IETF RFC 2865, June 2000.

[19] Hassan Rasheed. (2014) “Vulnerability distribution scoring for software product security assessment”. Int. J. of Information and Computer Security, 2014 Vol.6, No.3, pp.270 – 285

[20] Lawrence Teo and Gail-JoonAhn (2013). “Extensible policy framework for heterogeneous network environments”. Int. J. of Information and Computer Security, 2013 Vol.5, No.4, pp.251 – 274

[21] Shada Alsalamah, W. Alex Graya, Jeremy Hilton, Hessah Alsalamah. “Information Security Requirements in Patient-Centred Healthcare Support Systems”. Studies In Health Technology And Informatics [Stud Health Technol Inform] 2013; Vol. 192, pp. 812-6.

[22] Wen-Shin Hsu & Jiann-I Pan.” The Secure Authorization Model for Healthcare Information System”. Springer Science+Business Media New York 2013. 2013.

[23] Fan Wu, Lili Xu. “Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems”. Journal Of Medical Systems[J Med Syst] 2013 Aug; Vol. 37 (4), pp. 9958. Date of Electronic Publication: 2013Jul 02.

[24] Hsien-ChuWu, Min-Shiang Hwang, Chia-Hsin Liu. “A Secure Strong-Password Authentication Protocol”. Fundamenta Informaticae. 2005, Vol. 68 Issue 4, p399- 406

[25] Jim Kanzler, Meta5 in Agile Development, 10 July 2010, available online at : http://www.meta5.us/2014/07/10/677/. [Retrieve by : 20 April 2015]

[26] Radhi Rafiee, Waidah Ismail, Rosline Hassan, Azlan Husin (2015) Developing of Heamatology with Security Features. Journal of Software (2015).