SlideShare a Scribd company logo
1 of 4
Strengths and Weakness of Informatics
Strengths and Weakness of InformaticsReview websites of health informatics and other
articles in the USU Academic databases.Identifying strengths and weaknesses of informatics
and the use of EHRs (Electronic Health Records) in healthcare, using a minimum of 5 peer-
reviewed references, and no more than 20 references total (the textbook is an excellent
reference and may be used as an extra reference, but it is not a peer-reviewed reference).
Please contact me if you are unsure of what peer-reviewed literature means.One of the
pages must be a SWOT table (see below or Google).
Strengths/Weaknesses/Opportunities/Threats or SWOT analyses are a great way for you to
learn about a topic and an extremely useful tool that is actually used in both large and small
organizations. Since the majority of you will be working in either private industry or for
public entities (military, education, government, etc), this type of analysis will be useful to
you in your job. Please list the characteristics of EHRs and informatics in the tables of your
SWOT chart which will make it easier to describe in your writing.Make sure you aIDress the
course topics and student learning outcomes covered in the first 4 modules. Your title and
reference pages are not counted as part of the 5 – 8. Please follow your APA
guidelines.SWOT TableStrengths WeaknessesOpportunities Threats Discussion #1:1.
Bellinger, G., Casstro, D.& Mills, A. (2004). Data, Information, Knowledge, and Wisdom.
Retrieved from http://www.systems-thinking.org/dikw/dikw.htm2. U.S. Department of
Health and Human Services. Health Information Technology and Quality Improvement.
(n.d.). How can you successfully collect and analyze data?. Retrieved from
http://www.hrsa.gov/healthit/toolbox/RuralHealthITtoolbox/PatientQuality/analyzedata.
html3. Bess, O., Wallace, M., Torpunari, V., O’ Neil, M., Schwend, G., Haughton, J., & …
Kolbeck, G. (2012). Looking toward the future: 2012: Industry insiders weigh in on the year
ahead in healthcare technology. Health Management Technology, 33(1), 8-15. Retrieved
from CINAHL Plus with Full Text.
http://search.ebscohost.com/login.aspx?direct=true&db=rzh&AN=2011446252&site=ehos
t-liveDiscussion #2:1. Teare, D. (2012). Internetworking Technology Handbook.
Indianapolis: Cisco Press, Retrieved from
http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook2. Ratzel, R., &
Greenstreet, R. (2012). Toward Higher Precision. Communications Of The ACM, 55(10), 38-
47. doi:10.1145/2347736.2347750. Retrieved from Business source
Elite.http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=82150085&site=eh
ost-live3. Thomas, B., Jurdak, R., & Atkinson, I. (2012). SPDYing Up the Web.
Communications Of The ACM, 55(12), 64-73. Retrieved from Business source
Elite.5http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=84348443&site=e
host-live4. Sreelatha, A. A., VinayaBabu, A. A., Madhukar, K. K., Nagaprasa, S. S., Verghese, D.,
Mallaiah, V. V., & Pratima, A. A. (2010). Mobile Wireless Enhanced Routing Protocol in
Adhoc Networks. International Journal On Computer Science & Engineering, 2398-2401.
Retrievede from Academic Search
Premier.http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=58663725&site
=ehost-liveDatabase Models (n.d.). Retrieved from
www.unixspace.com/context/databases.htmlDiscussion #3:1. Textbook Chapter 7 (pps
211-253):Shortliffe, E.H., Cimino (eds.) Biomedical Informatics, London: Springer-Verlag,
2014.2. Szolovits, P. (2003). Nature of Medical Data. MIT, Intro to Medical Informatics:
Lecture-2. Retrieved from
http://groups.csail.mit.edu/medg/courses/6872/2003/slides/lecture2-print.pdf3. Blair, J.
S. (1999). An Overview of Healthcare Information Standards, IBM Healthcare Solutions.
Retrieved from http://lists.essential.org/med-privacy/msg00186.html4. ANSI Standards
Activities. Healthcare Information Technology Standards Panel. Retrieved
fromhttp://www.ansi.org/standards_activities/standards_boards_panels/hisb/hitsp.aspx?
menuid=3Health IT. Gov. Health IT Standards Committee. Retrieved
fromhttp://www.healthit.gov/policy-researchers-implementers/health-it-standards-
committee5. American National Standards Institute. Healthcare Informatics Standards
Board. (n.d.) Inventory if health care information standards: pertaining to the Health
Insurance Portability and Accountbility Act (HIPAA) of 1996. (P.L. 104-191). Retrieved
fromhttp://aspe.hhs.gov/admnsimp/hisbinv0.htm6.Health Level Seven: Links to Standards
Developers. Retrieved from http://www.hl7.com.au/FAQ.htm7. U.S. National Library of
Medicine. National Institute of Health. (2003). Unified Medical Language Fact Sheet.
Retrieve from http://www.nlm.nih.gov/pubs/factsheets/umls.html8. Gannot, I.(n.d.)
Computers in Medicine. Retrieved
fromhttp://www.authorstream.com/Presentation/Panfilo-42896-Introduction-lesson-
Computers-Medicine-Computer-Meets-Biology-Emergence-Discipline-Subjects-Index-
Inputs-le-Education-ppt-powerpoint/Discussion #4:1. Textbook chapters 8 and 12 (Natural
Language Processing in Healthcare and Biomedicine, Electornic Health Records
Systems)Shortliffe, E.H., Cimino, J.J. (eds), Biomedical Informatics. London: Springer-
Verlag.2. Johnson, Ronald. (2003). Health Care Technology: A History of Clinical Care
Innovation. Health Technology: Special Technology Overview, HCT Project, 1. Retrieved
fromhttp://mthink.com/article/health-care-technology-history-clinical-care-innovation/3.
Mueller, M. L., Ganslandt, T., Frankewitsch, T., Krieglsein, C. F., Senninger, N. & Prokosch, H.
U. (2003). Workflow Analysis and Evidence-Base Medicine: Toward Integration of
Knowledge-Based Functions in Hospital Information Systems. Department of Medical
Informatics and Biomathematics, University of Muenster, Germany. Retrieved
fromhttp://www.ncbi.nlm.nih.gov/pubmed/10566375
ORhttp://www.ncbi.nlm.nih.gov/pmc/articles/PMC2232821/Q&A x 4 weeks:1. Identify
barriers to effective communications in healthcare settingsThere are various barriers to
effective communications in healthcare settings. Although language can be a huge barrier,
the barrier that frustrates me the most at work is "lack of data." It is imperitive that all
nurses chart accurately in the computer; like the old saying, if it hasn’ t been charted, it
wasn’ t done! I realize that the night nurse is tired and wants to go home, but I do not
tolerate getting 1/2 of a report because she is in a hurry! There have been far too many
times errors are made because the previous nurse did not chart the things she either did or
didn’ t do, and then followed that up by not mentioning it in shift change. This is proof of
how important technology is in the healthcare workplace. These are patient’ s lives and
they have the right to receive accurate treatment and in order for us to do that, our charting
needs to be completed and in the computer 100%. This way, if a nurse forgets to tell me
something vital about the patient, I can look it up at anytime during my shift in the
patient’ s chart on the computer.2. Explain and Discuss the Open Systems Interconnection
Reference Model (OSI) as a framework for communications flowThe OSI or Open System
Interconnection, model defines a networking framework to implement protocols in seven
layers. Control is passed from one layer to the next, starting at the application layer in one
station, and proceeding to the bottom layer, over the channel to the next station and back
up the hierarchy.There’ s really nothing to the OSI model. In fact, it’ s not even tangible. The
OSI model doesn’ t do any functions in the networking process, It is a conceptual
framework so we can better understand complex interactions that are happening. The OSI
model takes the task of internetworking and divides that up into what is referred to as a
vertical stack that consists of the following layers:Physical (Layer 1)This layer conveys the
bit stream – electrical impulse, light or radio signal —through the network at the electrical
and mechanical level. It provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and
ATM are protocols with physical layer components.Data Link (Layer 2)At this layer, data
packets are encoded and decoded into bits. It furnishes transmission protocol knowledge
and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access
Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls
how a computer on the network gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and error checking.– Layer 2 Data
Link examples include PPP, FIDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame
RelayNetwork (Layer 3)This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from node to node. Routing
and forwarding are functions of this layer, as well as aIDressing, internetworking, error
handling, congestion control and packet sequencing.– Layer 3 Network examples include
AppleTalk IDP, IP, IPX.Transport (Layer 4)This layer provides transparent transfer of data
between end systems, or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer.– Layer 4 Transport examples include SPX, TCP,
UDP.Session (Layer 5)This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates conversations,
exchanges, and dialogues between the applications at each end. It deals with session and
connection coordination.– Layer 5 Session examples include NFS, NetBios names, RPC,
SQL.Presentation (Layer 6)This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to network format, and
vice versa. The presentation layer works to transform data into the form that the
application layer can accept. This layer formats and encrypts data to be sent across a
network, providing freedom from compatibility problems. It is sometimes called the syntax
layer.– Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT,
JPEG, MPEG, MIDI.Application (Layer 7)This layer supports application and end-user
processes. Communication partners are identified, quality of service is identified, user
authentication and privacy are considered, and any constraints on data syntax are
identified. Everything at this layer is application-specific. This layer provides application
services for file transfers, e-mail, and other network software services. Telnet and FTP are
applications that exist entirely in the application level. Tiered application architectures are
part of this layer.– Layer 7 Application examples include WWW browsers, NFS, SNMP,
Telnet, HTTP, FTPRetrieved from: The 7 Layers of the OSI Model – Webopedia.com
http://webopedia.com/quick_ref/OSI_Layers.aspI believe the importance of the OSI model
is for the communication of networks specifically designed for a communication system. It
is a system designed for trouble shooting errors in communication, in a way that is logical
through step by step through its seven layer model.3. Discuss the ways the NLP is used to
manage biomedical recordsNatural language processing has a wide range of potential
applications in the biomedical domain. NLP enables a new level of functionality for health
care and research-oriented applications that would not be otherwise possible. NLP methods
can help manage large volumes of text (e.g. patient reports or journal articles) by extracting
relevant information in a timely manner.The following are important applications of NLP
technology in biomedicine:Information extraction: This locates and structures important
information in text, usually without performing a complete analysis.Information retrieval:
this helps users to access documents in very large collections, such as the scientific
literature. This is a crucial application in biomedicine, due to the explosion of information
available in electronic form. The essential goal of information retrieval is to match a user’ s
query against the collection and return of most similar documents.Text generation: this
formulates natural language sentences from a given source of information, usually
structured data. These techniques can be used to generate text from a structured database,
such as summarizing trends and patterns in laboratory data.User interfaces: this enables
humans to communicate more effectively with computer systems. Tools that facilitate data
entry are an important application in biomedicine. Data can be captured by keyboard (e.g. a
single clinical report such as a discharge summary), or of multiple documents (e.g., multiple
journal articles).Machine translation: this converts text in one language (e.g., English) into
another (e.g., Spanish).Reference:Shortliffe, E.H., Cimino (eds.) Biomedical Informatics,
London: Springer-Verlag, 2014ORDER TODAY YOUR PAPER WITH SIMILAR INSTRUCTIONS
AND WE WILL WRITE YOUR PAPER FROM SCRATCH

More Related Content

Similar to Strengths and Weakness of Informatics.docx

Seminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONSeminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONArhind Gautam
 
Written Assignment 1 HIT Strategic Plan .docx
Written Assignment 1 HIT Strategic Plan .docxWritten Assignment 1 HIT Strategic Plan .docx
Written Assignment 1 HIT Strategic Plan .docxtroutmanboris
 
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET Journal
 
Advantages And Disadvantages Of EHR
Advantages And Disadvantages Of EHRAdvantages And Disadvantages Of EHR
Advantages And Disadvantages Of EHRCarla Jardine
 
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET Journal
 
Application 1 Nursing Informatics Pioneers One of the major dri.docx
Application 1 Nursing Informatics Pioneers One of the major dri.docxApplication 1 Nursing Informatics Pioneers One of the major dri.docx
Application 1 Nursing Informatics Pioneers One of the major dri.docxspoonerneddy
 
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...journal ijrtem
 
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...IJRTEMJOURNAL
 
IRJET- Text Summarization of Medical Records using Text Mining
IRJET- Text Summarization of Medical Records using Text MiningIRJET- Text Summarization of Medical Records using Text Mining
IRJET- Text Summarization of Medical Records using Text MiningIRJET Journal
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...IAEME Publication
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDavid Sweigert
 
OSS 2011 Multi-Level Modelling Presentation
OSS 2011 Multi-Level Modelling PresentationOSS 2011 Multi-Level Modelling Presentation
OSS 2011 Multi-Level Modelling PresentationTimothy Cook
 
Information Systems - Lecture C
Information Systems - Lecture CInformation Systems - Lecture C
Information Systems - Lecture CCMDLearning
 
Key Topics in Health Care Technology EvaluationThe amount of new i.docx
Key Topics in Health Care Technology EvaluationThe amount of new i.docxKey Topics in Health Care Technology EvaluationThe amount of new i.docx
Key Topics in Health Care Technology EvaluationThe amount of new i.docxsleeperfindley
 
G0312036044
G0312036044G0312036044
G0312036044inventy
 
Chaps30 the entirebookks2017
Chaps30 the entirebookks2017Chaps30 the entirebookks2017
Chaps30 the entirebookks2017SyedVAhamed
 
Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Editor IJARCET
 

Similar to Strengths and Weakness of Informatics.docx (20)

Seminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONSeminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTION
 
Written Assignment 1 HIT Strategic Plan .docx
Written Assignment 1 HIT Strategic Plan .docxWritten Assignment 1 HIT Strategic Plan .docx
Written Assignment 1 HIT Strategic Plan .docx
 
Poster CBIS 2012
Poster CBIS 2012Poster CBIS 2012
Poster CBIS 2012
 
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
 
Advantages And Disadvantages Of EHR
Advantages And Disadvantages Of EHRAdvantages And Disadvantages Of EHR
Advantages And Disadvantages Of EHR
 
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission Management
 
Application 1 Nursing Informatics Pioneers One of the major dri.docx
Application 1 Nursing Informatics Pioneers One of the major dri.docxApplication 1 Nursing Informatics Pioneers One of the major dri.docx
Application 1 Nursing Informatics Pioneers One of the major dri.docx
 
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
 
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
E-Symptom Analysis System to Improve Medical Diagnosis and Treatment Recommen...
 
IRJET- Text Summarization of Medical Records using Text Mining
IRJET- Text Summarization of Medical Records using Text MiningIRJET- Text Summarization of Medical Records using Text Mining
IRJET- Text Summarization of Medical Records using Text Mining
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information Resources
 
Poster IHI 2012
Poster IHI 2012Poster IHI 2012
Poster IHI 2012
 
OSS 2011 Multi-Level Modelling Presentation
OSS 2011 Multi-Level Modelling PresentationOSS 2011 Multi-Level Modelling Presentation
OSS 2011 Multi-Level Modelling Presentation
 
Information Systems - Lecture C
Information Systems - Lecture CInformation Systems - Lecture C
Information Systems - Lecture C
 
Key Topics in Health Care Technology EvaluationThe amount of new i.docx
Key Topics in Health Care Technology EvaluationThe amount of new i.docxKey Topics in Health Care Technology EvaluationThe amount of new i.docx
Key Topics in Health Care Technology EvaluationThe amount of new i.docx
 
G0312036044
G0312036044G0312036044
G0312036044
 
Chaps30 the entirebookks2017
Chaps30 the entirebookks2017Chaps30 the entirebookks2017
Chaps30 the entirebookks2017
 
Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397
 

More from write5

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docxwrite5
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxwrite5
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxwrite5
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxwrite5
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxwrite5
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxwrite5
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxwrite5
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxwrite5
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxwrite5
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxwrite5
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxwrite5
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxwrite5
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxwrite5
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxwrite5
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxwrite5
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxwrite5
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docxwrite5
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docxwrite5
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxwrite5
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docxwrite5
 

More from write5 (20)

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docx
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docx
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docx
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docx
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docx
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docx
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docx
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docx
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docx
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docx
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docx
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docx
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docx
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docx
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docx
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docx
 

Recently uploaded

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Strengths and Weakness of Informatics.docx

  • 1. Strengths and Weakness of Informatics Strengths and Weakness of InformaticsReview websites of health informatics and other articles in the USU Academic databases.Identifying strengths and weaknesses of informatics and the use of EHRs (Electronic Health Records) in healthcare, using a minimum of 5 peer- reviewed references, and no more than 20 references total (the textbook is an excellent reference and may be used as an extra reference, but it is not a peer-reviewed reference). Please contact me if you are unsure of what peer-reviewed literature means.One of the pages must be a SWOT table (see below or Google). Strengths/Weaknesses/Opportunities/Threats or SWOT analyses are a great way for you to learn about a topic and an extremely useful tool that is actually used in both large and small organizations. Since the majority of you will be working in either private industry or for public entities (military, education, government, etc), this type of analysis will be useful to you in your job. Please list the characteristics of EHRs and informatics in the tables of your SWOT chart which will make it easier to describe in your writing.Make sure you aIDress the course topics and student learning outcomes covered in the first 4 modules. Your title and reference pages are not counted as part of the 5 – 8. Please follow your APA guidelines.SWOT TableStrengths WeaknessesOpportunities Threats Discussion #1:1. Bellinger, G., Casstro, D.& Mills, A. (2004). Data, Information, Knowledge, and Wisdom. Retrieved from http://www.systems-thinking.org/dikw/dikw.htm2. U.S. Department of Health and Human Services. Health Information Technology and Quality Improvement. (n.d.). How can you successfully collect and analyze data?. Retrieved from http://www.hrsa.gov/healthit/toolbox/RuralHealthITtoolbox/PatientQuality/analyzedata. html3. Bess, O., Wallace, M., Torpunari, V., O’ Neil, M., Schwend, G., Haughton, J., & … Kolbeck, G. (2012). Looking toward the future: 2012: Industry insiders weigh in on the year ahead in healthcare technology. Health Management Technology, 33(1), 8-15. Retrieved from CINAHL Plus with Full Text. http://search.ebscohost.com/login.aspx?direct=true&db=rzh&AN=2011446252&site=ehos t-liveDiscussion #2:1. Teare, D. (2012). Internetworking Technology Handbook. Indianapolis: Cisco Press, Retrieved from http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook2. Ratzel, R., & Greenstreet, R. (2012). Toward Higher Precision. Communications Of The ACM, 55(10), 38- 47. doi:10.1145/2347736.2347750. Retrieved from Business source Elite.http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=82150085&site=eh ost-live3. Thomas, B., Jurdak, R., & Atkinson, I. (2012). SPDYing Up the Web.
  • 2. Communications Of The ACM, 55(12), 64-73. Retrieved from Business source Elite.5http://search.ebscohost.com/login.aspx?direct=true&db=bsh&AN=84348443&site=e host-live4. Sreelatha, A. A., VinayaBabu, A. A., Madhukar, K. K., Nagaprasa, S. S., Verghese, D., Mallaiah, V. V., & Pratima, A. A. (2010). Mobile Wireless Enhanced Routing Protocol in Adhoc Networks. International Journal On Computer Science & Engineering, 2398-2401. Retrievede from Academic Search Premier.http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=58663725&site =ehost-liveDatabase Models (n.d.). Retrieved from www.unixspace.com/context/databases.htmlDiscussion #3:1. Textbook Chapter 7 (pps 211-253):Shortliffe, E.H., Cimino (eds.) Biomedical Informatics, London: Springer-Verlag, 2014.2. Szolovits, P. (2003). Nature of Medical Data. MIT, Intro to Medical Informatics: Lecture-2. Retrieved from http://groups.csail.mit.edu/medg/courses/6872/2003/slides/lecture2-print.pdf3. Blair, J. S. (1999). An Overview of Healthcare Information Standards, IBM Healthcare Solutions. Retrieved from http://lists.essential.org/med-privacy/msg00186.html4. ANSI Standards Activities. Healthcare Information Technology Standards Panel. Retrieved fromhttp://www.ansi.org/standards_activities/standards_boards_panels/hisb/hitsp.aspx? menuid=3Health IT. Gov. Health IT Standards Committee. Retrieved fromhttp://www.healthit.gov/policy-researchers-implementers/health-it-standards- committee5. American National Standards Institute. Healthcare Informatics Standards Board. (n.d.) Inventory if health care information standards: pertaining to the Health Insurance Portability and Accountbility Act (HIPAA) of 1996. (P.L. 104-191). Retrieved fromhttp://aspe.hhs.gov/admnsimp/hisbinv0.htm6.Health Level Seven: Links to Standards Developers. Retrieved from http://www.hl7.com.au/FAQ.htm7. U.S. National Library of Medicine. National Institute of Health. (2003). Unified Medical Language Fact Sheet. Retrieve from http://www.nlm.nih.gov/pubs/factsheets/umls.html8. Gannot, I.(n.d.) Computers in Medicine. Retrieved fromhttp://www.authorstream.com/Presentation/Panfilo-42896-Introduction-lesson- Computers-Medicine-Computer-Meets-Biology-Emergence-Discipline-Subjects-Index- Inputs-le-Education-ppt-powerpoint/Discussion #4:1. Textbook chapters 8 and 12 (Natural Language Processing in Healthcare and Biomedicine, Electornic Health Records Systems)Shortliffe, E.H., Cimino, J.J. (eds), Biomedical Informatics. London: Springer- Verlag.2. Johnson, Ronald. (2003). Health Care Technology: A History of Clinical Care Innovation. Health Technology: Special Technology Overview, HCT Project, 1. Retrieved fromhttp://mthink.com/article/health-care-technology-history-clinical-care-innovation/3. Mueller, M. L., Ganslandt, T., Frankewitsch, T., Krieglsein, C. F., Senninger, N. & Prokosch, H. U. (2003). Workflow Analysis and Evidence-Base Medicine: Toward Integration of Knowledge-Based Functions in Hospital Information Systems. Department of Medical Informatics and Biomathematics, University of Muenster, Germany. Retrieved fromhttp://www.ncbi.nlm.nih.gov/pubmed/10566375 ORhttp://www.ncbi.nlm.nih.gov/pmc/articles/PMC2232821/Q&A x 4 weeks:1. Identify barriers to effective communications in healthcare settingsThere are various barriers to effective communications in healthcare settings. Although language can be a huge barrier,
  • 3. the barrier that frustrates me the most at work is "lack of data." It is imperitive that all nurses chart accurately in the computer; like the old saying, if it hasn’ t been charted, it wasn’ t done! I realize that the night nurse is tired and wants to go home, but I do not tolerate getting 1/2 of a report because she is in a hurry! There have been far too many times errors are made because the previous nurse did not chart the things she either did or didn’ t do, and then followed that up by not mentioning it in shift change. This is proof of how important technology is in the healthcare workplace. These are patient’ s lives and they have the right to receive accurate treatment and in order for us to do that, our charting needs to be completed and in the computer 100%. This way, if a nurse forgets to tell me something vital about the patient, I can look it up at anytime during my shift in the patient’ s chart on the computer.2. Explain and Discuss the Open Systems Interconnection Reference Model (OSI) as a framework for communications flowThe OSI or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.There’ s really nothing to the OSI model. In fact, it’ s not even tangible. The OSI model doesn’ t do any functions in the networking process, It is a conceptual framework so we can better understand complex interactions that are happening. The OSI model takes the task of internetworking and divides that up into what is referred to as a vertical stack that consists of the following layers:Physical (Layer 1)This layer conveys the bit stream – electrical impulse, light or radio signal —through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.Data Link (Layer 2)At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.– Layer 2 Data Link examples include PPP, FIDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame RelayNetwork (Layer 3)This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as aIDressing, internetworking, error handling, congestion control and packet sequencing.– Layer 3 Network examples include AppleTalk IDP, IP, IPX.Transport (Layer 4)This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.– Layer 4 Transport examples include SPX, TCP, UDP.Session (Layer 5)This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.– Layer 5 Session examples include NFS, NetBios names, RPC, SQL.Presentation (Layer 6)This layer provides independence from differences in data
  • 4. representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.– Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.Application (Layer 7)This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.– Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTPRetrieved from: The 7 Layers of the OSI Model – Webopedia.com http://webopedia.com/quick_ref/OSI_Layers.aspI believe the importance of the OSI model is for the communication of networks specifically designed for a communication system. It is a system designed for trouble shooting errors in communication, in a way that is logical through step by step through its seven layer model.3. Discuss the ways the NLP is used to manage biomedical recordsNatural language processing has a wide range of potential applications in the biomedical domain. NLP enables a new level of functionality for health care and research-oriented applications that would not be otherwise possible. NLP methods can help manage large volumes of text (e.g. patient reports or journal articles) by extracting relevant information in a timely manner.The following are important applications of NLP technology in biomedicine:Information extraction: This locates and structures important information in text, usually without performing a complete analysis.Information retrieval: this helps users to access documents in very large collections, such as the scientific literature. This is a crucial application in biomedicine, due to the explosion of information available in electronic form. The essential goal of information retrieval is to match a user’ s query against the collection and return of most similar documents.Text generation: this formulates natural language sentences from a given source of information, usually structured data. These techniques can be used to generate text from a structured database, such as summarizing trends and patterns in laboratory data.User interfaces: this enables humans to communicate more effectively with computer systems. Tools that facilitate data entry are an important application in biomedicine. Data can be captured by keyboard (e.g. a single clinical report such as a discharge summary), or of multiple documents (e.g., multiple journal articles).Machine translation: this converts text in one language (e.g., English) into another (e.g., Spanish).Reference:Shortliffe, E.H., Cimino (eds.) Biomedical Informatics, London: Springer-Verlag, 2014ORDER TODAY YOUR PAPER WITH SIMILAR INSTRUCTIONS AND WE WILL WRITE YOUR PAPER FROM SCRATCH