|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
March 2020 | Vol. 98
No.06 |
Title: |
A SCHEME FOR ROBUST AND IMPERCEPTIBLE VIDEO WATERMARKING |
Author: |
SANAA ADANA ABBAS |
Abstract: |
The prevalent growing of the Internet has made the digital media available to
everyone. Various digital watermarking techniques have been provided to find
solutions to protect the digital media. In the most of these techniques, the
digital media that include the watermark are distorted and the robustness in
extracting the watermark is unacceptable. The utilization of a scheme for
finding secure and preferable locations to embed the watermark inside the media
with little distortion and an acceptable robustness is an appropriate solution
to solve these problems. In this paper, a robust and imperceptible video
watermarking scheme is proposed to overcome a wide range of attacks like frame
noise attacks and frame cropping etc. by utilizing the preferable positions in
the wavelet transform of the video frames. |
Keywords: |
Video Watermarking, Wavelet Transform, Watermarked video frame, Watermark
inclusion, Watermark extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
THE ROLE OF SMAC (SOCIAL MEDIA, MOBILITY, ANALYTICS, CLOUD) FOR STUDENTS AND
EDUCATORS IN ONLINE EDUCATION |
Author: |
HABIB ULLAH KHAN |
Abstract: |
Supporting the global gearing towards the combined technology, SMAC (Social,
Mobility, Analytics, and Cloud), the present research intends to collect the
view of the key players in the domain of online education. That is, the opinion
of the students and instructors about the efficiency of SMAC as a good solution
in online education is tested. A rich sample of 400 students and 30 instructors
are selected at random for this purpose. The analysis is carried out in two
stages. After having the profile study of both the students and instructors
separately regarding the knowledge about SMAC and the interaction between SMAC
and OU, differences in the opinions are tested. Hypotheses are framed to test
the version of the participants regarding the current and future interaction
rates of SMAC and tested at 5% level of significance. The results showcased the
discrepancies in opinion with respect to the profile of the participants. Also,
the results obtained from both the set of participants for current and future
interaction rates about the SMAC usage did not coincide. Pertinent conclusions
are made by identifying the weak areas. Theoretical and managerial implications
are advocated for alleviating the difference in the views of the study
participants in the online university platform. |
Keywords: |
Social, Mobility, Analytics, Cloud, SMAC, Online University (OU) |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
ENTERPRISE DIMENSION OF THE E-GOVERNMENT: BACKGROUND OF A GENETIC ALGORITHM TO
COLLABORATE WITH LOCAL ECONOMIC DEVELOPMENT |
Author: |
ISRAEL PATINO GALVAN, JOSE ALBERTO HERNANDEZ AGUILAR, STELLA VALLEJO TRUJILLO |
Abstract: |
Intelligent computing has evolved in recent decades, which means that its
application and growth in several sectors have proven results. In this sense,
genetic algorithms are a clear application of this evolution, practical to
everyday aspects of life. In this research, we discuss how to improve the
decision making of government for economic development, through a genetic
algorithm, which has the capacity to identify Micro Small Medium Enterprises
(MSMEs) with potential for growth and economic development for one socioeconomic
region at northwest of Mexico, and that through collaboration with the constant
identification of internal and external variables that will guarantee the
correct decision-making. Main results of proposed GA show are possible to
identify percentage of success of Medium Enterprises (35%) very close to figures
of official Government institutions like National Institute of Statistic and
Geography - INEGI (34.6%). |
Keywords: |
Genetic Algorithms, Strategic, Decision making, Economic Development,
Entrepreneurship |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
DEVELOPING THE SECURITY THREAT DETECTION MODEL FOR THE WEB SERVICE USING DEEP
NEURAL NETWORK |
Author: |
HYUNCHUL CHANG , SUNGBUM PARK |
Abstract: |
The co-evolution of broadband networks and intelligent information system
development ushers present golden days of web service. However, cyber attackers
find loopholes easily for security threats under the web service environment.
Detection of web service attacks requires to develop a new security threat
counter-measure differentiated from the existing either signature-based or
anomaly-based algorithms. In this regard, this research introduces a
state-of-the-art intrusion detection model specialized in cyber-attacks on the
web-service using the combination of deep neural network algorithms. Then, we
evaluate the intrusion detection performance of the proposed deep neural network
models with the Big Data of real time network traffic. Our research helps
improve the limitation of existing intrusion detection systems and to overcome
web service vulnerability on cyber threats. |
Keywords: |
Intrusion detection system, Web application firewall, Convolution Neural Network
(CNN) Long Short-Term Memory (LSTM), C-LSTM. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
RADIO COMMUNICATION CHANNEL INTERACTION METHOD, MAINTAINING TRAIN PERFORMANCE
INFORMATION SECURITY |
Author: |
SANSYZBAY К.М., BAKHTIYAROVA YE.А., KUANDYKOV А.А., VLASENKO S.V. MAMYRBAYEV O.
ZH. |
Abstract: |
The work herein considers the principles of radio communication channel data
transfer, aims of information security maintenance as well as threats when
transmitting information over a radio channel. For experimental determination of
the data on channel capacity, batches transit time, data on batches loss in
radio net there have been carried out the experiments of interaction with a
train along the digital communication channel with account of requirements to
information security. Conducted experiments show, that at any size of the batch
in the standard digital radio communication system upon increasing the load on
the system, the batches transit time is increased. By means of the experiment it
has been proved, that the system meets the requirements to batches transit time
with the transfer rate up to 1,4 Kbit /s. Starting from the load 1,6-2,0 Kbit /s
the batches transit time becomes unacceptably big and simultaneously with that,
the lost batches percentage grows. The issues of communication between the radio
block center and the TETRA switching center, linking the radio block center with
electrical centralization systems, upgrading the locomotive's onboard equipment,
and checking the operation algorithms of onboard and stationary equipment were
examined during the experiment. It is established that the operational
characteristics of the TETRA digital radio communication system lead to regular
failures of the SIRDP-E system (system of interval regulation of train traffic
on the basis of the radio channel). |
Keywords: |
Information security, Digital channel, Train performance control system, Batches
transit time, Radio network. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
ASSESSMENT OF INSTRUMENT RELIABILITY AND VALIDITY ON REQUIREMENT REUSE PRACTICES
IN MALAYSIA |
Author: |
NORAINI CHE PA, NORHAYATI MD ALI, TEH NORANIS MOHD ARIS, RODZIAH ATAN, AINITA
BAN, HAZLINA HAMDAN, THAMARATUL IZZAH AZMAN |
Abstract: |
Requirement reuse came as an alternative method to facilitate the requirement
engineering process. It is an approach of making use of existing requirement
documents in order to reduce effort requirement elicitation and analysis during
software development lifecycle. There are various research works had been done
on the implementation of requirement reuse and many had sought to provide a
better practice of it. However, the practice of requirement reuse is still
uncertain. There is a lack of study to determine the current state of
requirement reuse practice in Malaysia. Therefore, an instrument is designed and
developed to determine requirement reuse process, challenges, component, and its
support tools. This paper describes the design of the instrument used for the
survey on requirement reuse practice and the assessment of its reliability and
validity. Cronbach’s alpha test was used to check on its reliability meanwhile
hetero-monotrait ratio (HTMT) criterion was used to check on the discriminant
validity. The result from both of the tests shows the item in the questionnaire
has a high level of consistency and established discriminant validity.
Therefore, based on the results, there are no modifications or amendments made
to the questionnaire. Hence, the developed instrument is reliable and has
sufficient discriminant validity for further work. |
Keywords: |
Requirement Reuse, Requirement Engineering, Survey Design, Reliability test,
Validity test |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
THE IMPACT OF KNOWLEDGE MANAGEMENT PROCESSES ON BUSINESS TRANSFORMATION AS
MEDIATED BY IT AGILITY |
Author: |
HISHAM O. MBAIDIN, SATTAM ALLAHAWIAH, SAMIAHAL TARAWNEH, NANCY AL- QATAWNEH,
NOUR AL - QATAWNEH |
Abstract: |
This study aims to investigate the impact of knowledge management processes
(KMPs) on business transformation (BT) as mediated by IT agility. The population
of the study is the lecturers and employees of Mutah University with a total of
305 participants. A questionnaire is adopted to conduct the study then the data
is analyzed according toSPSS modeling technique in order to determine what the
level of the existing relationship between KMPs and BT as mediated by IT
agility. Finally, the study concludes with main findings and recommendations are
related to confirming the two main hypotheses of the research that are related
to testing if there are relationships between the KMPs (represented by four
surrogate measures, namely, knowledge creation, knowledge storage, knowledge
sharing and knowledge application) and BT, as well as if the KMPs is related to
the BT as mediated by IT agility. |
Keywords: |
Knowledge Management, Mutah University, Business Transformation, Technology, IT
Agility, SPSS Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
SHARIA COMPLIANCE REQUIREMENTS FRAMEWORK FOR E-COMMERCE SYSTEMS: AN EXPLORATORY
STUDY |
Author: |
MOHAMMED BASHIR RIBADU, WAN NURHAYATI WAN AB. RAHMAN, ABDUL AZIM ABD GHANI,
AZRINA KAMARUDDIN, MOHD SUKKI OTHMAN |
Abstract: |
There is a growing concern among Muslims over the need to ensure Sharia
compliance in e-commerce transactions. Because non-conformity to Sharia
principles can result in a lack of trust and a barrier for many Muslims to
partake in e-commerce transactions. However, there is currently no comprehensive
and clearly specified Sharia compliance requirements guideline for e-commerce
systems. Therefore, a need to explore and develop a comprehensive guideline for
Sharia compliance requirements in e-commerce systems. In this study, an
exploratory qualitative study involving eight semi-structured interviews with
Sharia compliance scholars/experts was conducted. Consequently, a conventional
content analysis of data was carried out with the aid of QSR-NVivo 11. Findings
from the study revealed that e-commerce is acceptable and indeed encouraged in
Islam so long as it enhances the welfare of society. The fundamental Sharia
compliance requirements for e-commerce are adherence to the Maqasid Sharia and
the fulfillment of Islamic law of contract obligations. This requires e-commerce
systems to be structured towards enhancing the welfare of the society and
compliance with the form, contracting parties, and subject matter obligations of
Islamic law of contract. Therefore, this study proffers a comprehensive
framework of Sharia compliance requirements for e-commerce systems which
provides notions that agree with the Quran, Sunnah, and e-commerce best
practices. The framework provides a comprehensive but parsimonious guide that
would enhance understanding and support the development of Sharia compliant
e-commerce systems. Furthermore, it would guide researchers, consumers, vendors,
developers, analysts, and regulators with interest in the Sharia compliance
e-commerce domain. |
Keywords: |
Sharia Compliance Requirements, E-Commerce, Sharia Scholars/Experts, Maqasid
Sharia, Islamic Law of Contract. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
OSCILLATION EQUATIONS OF RECTANGULAR PLATES IN LINEAR APPROXIMATION |
Author: |
ANGISIN SEITMURATOV, NURBOLAT MEDEUBAEV, ZOYA TULEUBAEBNA SEYLOYA, LIDIYA
UNGARBAEVNA TAIMURATOVA, AIGUL OSPANOVNA DAUITBAYEVA, SARSENKUL SHAYKAMALQIZ
TILEUBAY, ELMIRA NURLANOVNA TULEGENOVA |
Abstract: |
This work discusses general oscillation equations of viscoelastic isotropic
medium in linear approximation with and without consideration for initial shifts
and stresses, as well as approximate oscillation equations with consideration
for ambient environment and at small deformations. Under the impact of forces
applied to continuous deformed body, the positional relationship of its
particles varies, that is, the deformed body varies its shape and volume. This
can be exemplified by compressed or tensioned rod. Mathematical description of
deformation of solid body is given in this or that coordinate system. For
instance, in Cartesian coordinates x1=x; x2=y; x3=z position of each point is
defined by radius vector and the components . After deformation, position of the
point will be defined by another coordinates: . |
Keywords: |
Longitudinal Oscillations, Transversal Oscillations, Viscoelastic Plate,
Deformed Body, Small Deformation. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
METHODS OF MODEL SYNTHESIS AND MULTI-CRITERIA OPTIMIZATION OF
CHEMICAL-ENGINEERING SYSTEMS IN THE FUZZY ENVIRONMENT |
Author: |
BATYR ORAZBAYEV, BAKTYGUL ASSANOVA, MURAT BAKIYEV, JANUSZ KRAWCZYK, KULMAN
ORAZBAYEVA. |
Abstract: |
Methods of synthesis of mathematical models and multi-criteria optimization of
parameters of chemical-technological systems in the conditions of initial
information uncertainty are proposed. It is proposed a technique for
constructing models of interconnected aggregates of technological systems using
the example of a delayed coking unit (DCU). Methods for the synthesis of fuzzy
and linguistic models based on the involvement of experts have been developed.
Based on the proposed methods, the structure of coke oven models is determined
and identified in the form of clear and fuzzy regression equations. Parametric
identification is carried out on the basis of least squares methods and the
theory of fuzzy sets.The problems of multicriteria optimization of the modes of
operation of the ultrasonic system in a fuzzy environment are formulated and
methods of their solution are proposed on the basis of various optimality
principles. The novelty of these results lies in the fact that the tasks are
posed and solved in a fuzzy environment without converting them to a system of
clear tasks. |
Keywords: |
Mathematical Models, Multi-Criteria Optimization, Chemical-Engineering System,
Fuzzy Information, Delayed Coking Unit. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
MSFMT: MULTI-SPECTRAL FUSION SYSTEM BASED ON DEEP TRANSFER LEARNING AND
DEMPSTER-SHAFER THEORY |
Author: |
DOAA MOHEY EL-DIN, ABOUL ELLA HASSANIEN, EHAB E. HASSANEIN |
Abstract: |
This paper presents a multi-spectral fusion system for improving the object
detection and classification results in military and terrorism domains that
entitled MSFMT. It relies on a combination between deep transfer learning and
Dempster-Shafer statistical method in decision level fusion. It improves the
classification results through fusing multiple sensory data that are extracted
from multiple sources into two data types, images and videos, in night modes. It
fuses multiple spectrums for showing the best vision for each object or action.
These spectrums are Visual Intensified images (VIS), Near-infrared spectroscopy
(NIR) images, thermal images, long wave infrared images (LIWR), DHV, and RGB).
The neural network structure is constructed based on six neural networks. Each
neural network is based on AlexNet pre-trained transfer neural networks for
classifying spectrums. Each neural includes two neural networks for classifying
objects and actions. MSFMT system improves the classification results through
creating a new algorithm for multi-spectral fusion that depends on integration
between machine learning (transfer learning model) and statistics methods
(Dempster-Shafer evidential reasoning technique). MSFMT uses a purified dataset
that consists of tuned six datasets for multiple spectrums in variant type
format. It applies the data augmentation for enlarging the dataset that includes
875,970 number of images and video's frames. The fusion accuracy results reach
96 % that increases the classification results by 21% for NIR and VIS spectrums,
7% for Thermal spectrum, and 4 to 6% for LIWR, DHV, RGB, spectrums. |
Keywords: |
Multi-Spectral, Sensor Fusion, Decision Level Fusion, Military, Terrorism,
Transfer Learning. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
ISLAMIC APPROACH TOWARD PURIFICATION OF TRANSACTION WITH CRYPTOCURRENCY |
Author: |
AL-HUSSAINI ABULFATHI IBRAHIM SALEH, ADAMU ABUBAKAR IBRAHIM, MOHAMAD FAUZAN
NOORDIN, H MOHD MOHADIS |
Abstract: |
This paper presents a qualitative study that examine the perception of users on
Islamic approach toward purification of transaction with cryptocurrency. Bitcoin
is has been used as a case study which is one of the type of cryptocurrency.
There are huge discrepancies from many Islamic school of thought about
transaction with bitcoin. Specifically, some school of thought viewed it as a
tool used for illegal purposes and that the global public already uses Bitcoin
mostly for illegal and non-Shari’ah-compliant purposes under Islamic
perceptions. As a result, this study developed an interview-qualitative research
approach in order to examine how the negative perceptions of cryptocurrency from
Islamic views cnd be purify. Sample of Eight informant were used in the study.
The finding of this study indicated that the use of cryptocurrency as a
legitimate as any payment method. It is also argued that it facilitated
transactions and cut the normal cost of international money transfer, and some
Muslim countries are actively encouraging the use of cryptocurrency due to its
easy use and transparency. This has been also supported by “hadithâ€ÂÂ. Finally,
the analysis also confirmed that from the Shari'ah point of view,
cryptocurrencies are as compliant as fiat money and ought to be accepted as
another mode of payment that can be used in transaction as its value can be
measured and quantified. Therefore, this study has contributed in understanding
the Islamic views behind the implementation of cryptocurrency. |
Keywords: |
Blockchain, Cryptocurrency, Bitcoin, Sharia’ah Compliance, Transaction |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
REALTIME MONITORING INSTRUMENT RELIABILITY OF THREE PHASE INDUCTION MOTOR
BEARING BASED ON NEURAL NETWORK (NN) ANALYSIS |
Author: |
BAMBANG SRI KALOKO, MALIKUL FANANI |
Abstract: |
Three-phase induction motors are one of the most widely used drives in industry
and transportation because of their simple construction and reliability. Damage
to the induction motor affects the existing production process. Therefore, early
detection of induction motor damage is needed to avoid further damage and cause
losses to the industry. The method of identifying bearing damage to the
induction motor uses a no-load condition. The combination of FFT transformation
and artificial neural net is used as a method of identifying the damage. The
identification variable used in the method is taken from the stator current
signal. To achieve the desired goal, the experimental data used are 10%, SEF
24%. bearing damage to the inside, the outside ball, and the separator.
Simulation results show that protoype is able to read 85% of the identified
training data for each type of damage |
Keywords: |
Early Detection, Bearing Damage, Artificial Neural Network, Induction Motor |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
FUZZY LOGIC OF ZADEH AND DECISION-MAKING IN THE FIELD OF LOAN |
Author: |
ULZHAN T. MAKHAZHANOVA, FEODOR A. MURZIN, AYAGOZ A. MUKHANOVA, EVGENIY P.
ABRAMOV |
Abstract: |
In the article, the features of lending to small (medium) businesses are
considered. A method for assessing the creditworthiness of small businesses
based on the application of the mathematical apparatus of the theory of fuzzy
sets is proposed. There are analyzed 22 parameters, such as: industry
development dynamics, market demand for products, current solvency and liquidity
ratios, receivables and payables turnover ratios, etc. In general, it is assumed
that any parameter takes values on a certain interval of real numbers. Further,
the values of the initial indicators are mapping on the interval [0,1]. This
process is called data unification. The rules on the basis of which decisions
are made are formulated in the form of logical formulas containing parameters.
Some parameters are obtained as a result of the analysis of the enterprise,
other parameters are predicted. A software system is currently being implemented
to support the lending process. |
Keywords: |
Creditworthiness, Lending to small and medium-sized businesses, Data
unification, Fuzzy logic, Linguistic variable, Logical rules, Decision making |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
Title: |
INTEGRATION OF THE DIMENSIONS OF COMPUTERIZED HEALTH INFORMATION SYSTEMS AND
THEIR ROLE IN IMPROVING ADMINISTRATIVE PERFORMANCE IN AL-SHIFA MEDICAL COMPLEX |
Author: |
SAMER ARQAWI, KHALED ABDUL FATTAH TAWFIQ ATIEH, MAZEN J. AL SHOBAKI, SAMY S.
ABU-NASER, ABDEL AZIZ M. ABU ABDULLA |
Abstract: |
The aim of the research is to identify the integration of the dimensions of
computerized health information systems and their role in improving
administrative performance in Dar Al-Shifa Medical Complex. The researchers used
the questionnaire method to collect data and the random stratified sample
method. A sample of 30 questionnaires was distributed to test the internal
consistency, structural honesty and stability of the questionnaire. After
verifying the validity and reliability of the test, (220) questionnaires were
distributed to the study population and (197) responses were retrieved with the
rate of (89.5%). The study found that the field of "equipment and equipment
used" is not statistically significant at the level of (α≤ 0.05), indicating
that the average response rate for this field is not significantly different
from the average approval level (3). This means that there is moderate approval
by the sample members in this field. The field of "databases used" is
statistically significant at the level of significance (α≤ 0.05), indicating
that the average response to this field has exceeded the average approval level
(3). This means that there is considerable approval by the sample Paragraphs of
this field. The field of "networks" is statistically significant at the level of
significance (α ≤ 0.05), indicating that the average response to this field has
exceeded the degree of intermediate approval which is (3) which means that there
is a high degree of approval by the respondents of the field. The field of
"senior management support" is not statistically significant at the level of
significance (α ≤ 0.05), indicating that the average response rate for this
field is not significantly different from the average approval level (3). This
means that there is moderate approval by individuals sample on this field. The
results showed a statistically significant relationship between computerized
health information systems on improving administrative performance at Dar
Al-Shifa Medical Complex - Gaza at a statistical significance level (α ≤ 0.05).
The existence of a statistically significant relationship between equipment and
devices used to improve administrative performance in Dar Al-Shifa Medical
Complex - Gaza at a statistical significance level (α ≤ 0.05). A statistically
significant relationship to the databases used to improve administrative
performance at Dar Al-Shifa Medical Complex-Gaza at a statistical significance
level (α ≤ 0.05). The results also confirmed a relationship between the networks
to improve the administrative performance in Dar Al-Shifa Medical Complex-Gaza.
There is a relationship to support the senior management to improve the
administrative performance in Dar Al-Shifa Medical Complex - Gaza. The results
also confirmed the existence of a relationship between users of the system to
improve the administrative performance in Dar Al-Shifa Medical Complex-Gaza.
The study reached a number of recommendations including: The need to establish a
specialized department of computerized health information systems, with clear
responsibilities, and includes technical and administrative specialists and
health personnel, and the number and efficiency required, working as a team work
to apply the mechanisms of work computerized health information systems, and be
in direct contact with staff in clinics and sections to provide services and
technical support as soon as possible with the best quality. Increased support
from senior management to users by encouraging them to use computerized health
information systems and understanding their different needs. The interest in
providing the material resources of equipment and devices used in the
computerized health information system. The use of database systems in
administrative and medical decisions in clinics and departments has the effect
of raising the effectiveness of decisions by improving their quality. Attention
to the provision of modern networks characterized by rapid communication, and
the problem of slow network, through the provision of a main server. Provide a
special e-mail to each employee using the computerized health information
system, which facilitates the exchange of data between employees and increases
communication with senior management. |
Keywords: |
Computerized Health Information Systems, Improving Administrative Performance,
Dar Al-Shifa Medical Complex. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2020 -- Vol. 98. No. 06 -- 2020 |
Full
Text |
|
|
|