Muutke küpsiste eelistusi

E-raamat: Developing Windows-Based and Web-Enabled Information Systems

(Arizona State University, Phoenix, USA), (Arizona State University)
  • Formaat: 602 pages
  • Sari: Data-Enabled Engineering
  • Ilmumisaeg: 19-Sep-2014
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781482253870
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 76,69 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 602 pages
  • Sari: Data-Enabled Engineering
  • Ilmumisaeg: 19-Sep-2014
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781482253870
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems.

Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entityrelationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components.

The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you dont have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.

Arvustused

"This book takes a comprehensive approach to cover the topics of information systems and their development. At the same time it has detailed examples to help readers at different levels. detailed examples and case studies makes it a good textbook and reference for readers of diverse backgrounds." Xiangyang Li, Johns Hopkins University

"The main strength of this book is that it is written by industrial engineering professors that understand how to present important data management concepts to engineers that may not have a computer science background. Most books on data management and information systems are written with the computing professional in mind. This book finally gives engineers an understandable approach to learning the fundamental data management concepts that are relevant to engineering applications." Susan D Urban, Texas Tech University

"The book is provides a comprehensive introduction to the concepts of information systems. Furthermore, this book has struck the right balance of having sufficient business case concepts for implementing information systems as well as including important technical theories on designing databases." Eugene Rex L. Jalao, Ph.D., University of the Philippines Diliman

" the most comprehensive book to introduce information system. covers all the topics related to information system from theoretical background to practical applications. organized very well and considers the diversity of the readers which will attract a huge number of audiences. the best textbook for information system related class at both the undergraduate and graduate levels. covers lots of complex case studies." Mengqi Hu, Mississippi State University

Preface xv
Acknowledgments xvii
Authors xix
Overview xxi
Section I Foundation of Information Systems
1 Boolean Algebra and Digital Logic Circuits for Computer Hardware
3(16)
1.1 Boolean Logic
3(5)
1.1.1 Binary Values and Boolean Operators
3(1)
1.1.2 Basic Properties of Boolean Algebra
4(1)
1.1.3 Conversion of a Truth Table for a Function into a Boolean Expression
5(3)
1.2 Digital Logic Circuits
8(9)
1.2.1 Digital Logic Gates
8(2)
1.2.2 Combinational Circuits
10(3)
1.2.3 Sequential Circuits
13(4)
1.3 Summary
17(2)
2 Digital Data Representation
19(14)
2.1 Representation of Numbers
19(8)
2.1.1 Conversion between Unsigned Binary and Decimal Numbers
19(3)
2.1.2 Representation of Signed Integers
22(5)
2.1.2.1 Signed Magnitude Method
23(1)
2.1.2.2 One's Complement Method
23(2)
2.1.2.3 Two's Complement Method
25(2)
2.1.3 Representation of Signed Floating Point Values
27(1)
2.2 Representation of Alphabet and Control Characters
27(1)
2.3 Error Detection and Correction
28(4)
2.4 Summary
32(1)
3 Computer and Network System Software
33(10)
3.1 The Operating System
33(2)
3.1.1 Process Management
33(1)
3.1.2 Storage Management
34(1)
3.1.3 I/O Management
35(1)
3.2 Networking and Communication Software
35(6)
3.2.1 OSI Reference Model
35(1)
3.2.2 Transmission Control Protocol/Internet Protocol
36(5)
3.3 Summary
41(2)
4 Overview of Information Systems
43(12)
4.1 Information System Concepts
43(1)
4.2 The Role of Information System in Business
44(4)
4.2.1 Transaction Processing System
47(1)
4.2.2 Management Information System
47(1)
4.2.3 Decision Support System
47(1)
4.2.4 Executive Information System and Strategic Information System
47(1)
4.2.5 Electronic Business and Electronic Commerce
48(1)
4.2.6 Mobile Commerce
48(1)
4.3 Post-PC Information Age: Five Trends in the Future Information System Applications
48(2)
4.3.1 Mobile
48(1)
4.3.2 Social Media
49(1)
4.3.3 Big Data
49(1)
4.3.4 Cloud Computing
50(1)
4.3.5 Consumerization of IT
50(1)
4.4 Summary
50(5)
Section II Database Design and Development
5 Conceptual Data Modeling: Entity-Relationship Modeling
55(24)
5.1 Types, Attributes, and Instances of Entities
55(4)
5.2 Types, Attributes, Instances, and Degrees of Relationships between Entities
59(1)
5.3 Maximum and Minimum Cardinalities of a Relationship
60(6)
5.4 Associative Entities
66(5)
5.5 Weak Entities
71(1)
5.6 Superclass and Subclass of Entities
71(5)
5.7 Summary
76(3)
6 Logical Database Design: Relational Modeling and Normalization
79(30)
6.1 Relational Model of Database and Data Integrity Constraints
79(4)
6.2 Transformation of an E-R Model to a Relational Model
83(13)
6.2.1 Transformation of Entities and Their Attributes
83(3)
6.2.2 Transformation of Superclass and Subclass Entities and Their Attributes
86(1)
6.2.3 Transformation of Relationships and Their Attributes
86(7)
6.2.4 Transformation of Association Entities
93(1)
6.2.5 Transformation of Weak Entities
93(3)
6.3 Normalization
96(8)
6.3.1 Data Redundancy and Data Anomalies
96(2)
6.3.2 Functional Dependency
98(2)
6.3.3 Normalization and Normal Forms
100(4)
6.4 Summary
104(5)
7 Database Implementation in Microsoft Access
109(42)
7.1 Tables for Data Storage
109(8)
7.1.1 Setting the Primary Key for a Table
109(1)
7.1.2 Data Types of a Data Field
110(1)
7.1.3 Field Size Property of a Data Field
111(2)
7.1.4 Format Property of a Data Field
113(1)
7.1.5 Input Mask Property of a Data Field
113(1)
7.1.6 Default Value Property of a Data Field
114(1)
7.1.7 Validation Rule and Validation Text Properties of a Data Field
115(1)
7.1.8 Required Property of a Data Field
115(1)
7.1.9 Indexed Property of a Data Field
115(1)
7.1.10 Adding and Deleting Records of a Table
115(2)
7.2 Relationships of Tables
117(3)
7.3 Queries for Data Retrieval
120(20)
7.3.1 Select Queries Using One Table
120(3)
7.3.2 Select Queries with Joins of Multiple Tables
123(3)
7.3.3 Select Queries with Parameters and Calculated Fields
126(2)
7.3.4 Select Queries with Groupings of Records
128(4)
7.3.5 Crosstab Queries
132(2)
7.3.6 Embedded Select Queries
134(6)
7.4 Action Queries
140(1)
7.5 Summary
141(10)
8 Structured Query Language
151(26)
8.1 Introduction to SQL
151(1)
8.2 Backus-Naur Form
152(1)
8.3 SQL Syntax
152(17)
8.3.1 SQL Data Definition Language and Data Types
153(4)
8.3.1.1 CREATE SCHEMA
153(1)
8.3.1.2 CREATE VIEW
154(1)
8.3.1.3 CREATE DOMAIN
154(1)
8.3.1.4 CREATE TABLE
155(2)
8.3.2 SQL Data Manipulation Language: Data Queries
157(8)
8.3.2.1 Basic Structure of the SELECT Command
157(3)
8.3.2.2 Aggregate Functions
160(2)
8.3.2.3 Nested Subqueries
162(1)
8.3.2.4 JOIN Query
163(2)
8.3.3 SQL Data Manipulation Language: Data Modification
165(3)
8.3.3.1 INSERT
165(2)
8.3.3.2 UPDATE
167(1)
8.3.3.3 DELETE
167(1)
8.3.4 SQL Data Manipulation Language: Relation Modification
168(10)
8.3.4.1 ALTER TABLE
168(1)
8.3.4.2 DROP TABLE
169(1)
8.4 Summary
169(8)
9 MySQL
177(24)
9.1 Introduction
177(1)
9.2 Get Ready to Work with MySQL
178(6)
9.2.1 MySQL Installation on Windows
179(4)
9.2.2 MySQL Installation on Mac OS X
183(1)
9.3 Working with MySQL Command Line Client
184(10)
9.3.1 Data Types
184(2)
9.3.1.1 Numeric Data Types
184(1)
9.3.1.2 String (Character) Data Type
185(1)
9.3.1.3 Date and Time (Temporal) Data Types
185(1)
9.3.1.4 NULL Value
186(1)
9.3.2 Practice Data Definition Language in MySQL
186(3)
9.3.2.1 Statements for Database Operations
186(2)
9.3.2.2 Statements for Relation Operations
188(1)
9.3.3 Practice Data Manipulation Language in MySQL
189(2)
9.3.3.1 Adding Records to a Table
189(1)
9.3.3.2 Querying Tables
190(1)
9.3.3.3 Updating Tables
190(1)
9.3.3.4 Deleting Records
191(1)
9.3.4 MySQL Transaction Control Language
191(1)
9.3.5 MySQL Data Control Language
192(1)
9.3.6 MySQL Utilities
193(1)
9.3.6.1 SHOW Statement
193(1)
9.3.6.2 DESCRIBE Statement
194(1)
9.3.6.3 HELP Statement
194(1)
9.4 Working with MySQL Workbench
194(4)
9.4.1 Data Modeling
195(1)
9.4.2 SQL Development
196(1)
9.4.3 Server Administration
197(1)
9.5 Summary
198(3)
10 Object-Based Database Systems
201(16)
10.1 Object-Oriented Database Management System
201(8)
10.1.1 Object-Oriented Database Concepts
201(3)
10.1.1.1 Objects and Identities
202(1)
10.1.1.2 Complex Objects
202(1)
10.1.1.3 Encapsulation
202(1)
10.1.1.4 Classes and Inheritance
203(1)
10.1.1.5 Overloading, Overriding, and Late Binding
204(1)
10.1.2 Object-Oriented Database Design and Modeling
204(4)
10.1.2.1 Object Modeling
204(2)
10.1.2.2 Object Definition Language
206(1)
10.1.2.3 Object Query Language
207(1)
10.1.3 Summary of OODBMS
208(1)
10.2 Object RDBMS
209(3)
10.2.1 Object-Relational Model
209(1)
10.2.2 Object-Relational Query Language
210(1)
10.2.3 Summary of ORDBMS
211(1)
10.3 Summary
212(5)
Section III Windows Application Development
11 Windows Forms and Controls in Microsoft Visual Studio
217(18)
11.1 Visual Basic Development Environment
217(3)
11.2 Windows Forms
220(3)
11.3 GUI Controls
223(4)
11.4 GUI of the Healthcare Information System Application
227(1)
11.5 Execution of a Windows-Based Application Outside Visual Studio
227(2)
11.6 Summary
229(6)
12 Visual Basic Programming in Microsoft Visual Studio
235(10)
12.1 Variables and Data Types
235(3)
12.2 Constants
238(1)
12.3 Operators and Mathematical Functions in Expressions
238(1)
12.4 Control Structures
238(5)
12.5 Summary
243(2)
13 Database Connection in Microsoft Visual Studio
245(32)
13.1 Adding an Access Database as a Data Source
245(6)
13.2 Presenting Data from Tables and Simple Select Queries
251(1)
13.3 Architecture of Database Connection
251(6)
13.4 Displaying Related Data in Parent and Child Tables
257(2)
13.5 Displaying Data Fields Using Controls Other Than DataGridView
259(2)
13.6 Handling Crosstab and Select Queries with Parameters
261(10)
13.7 Updating Data to an Access Database
271(1)
13.8 Visual Basic Code to Retrieve, Add, and Delete Data of an Access Database
272(4)
13.9 Summary
276(1)
14 Working with VBA in Excel
277(24)
14.1 Introduction to VBA
277(4)
14.2 Excel Object Models
281(1)
14.3 VBA for Excel
282(7)
14.3.1 Visual Basic Editor
282(2)
14.3.1.1 Project Explorer Window
283(1)
14.3.1.2 Code Window
283(1)
14.3.1.3 Property Window
283(1)
14.3.1.4 Immediate Window
283(1)
14.3.1.5 Object Browser Window
284(1)
14.3.2 Graphical User Interface: Forms and Controls
284(2)
14.3.2.1 Controls in Excel
284(1)
14.3.2.2 Controls with Forms
285(1)
14.3.3 Modules: Sub and Function Procedure
286(1)
14.3.4 Modules: Variables
287(2)
14.3.4.1 Procedure-Only Variables
288(1)
14.3.4.2 Module-Only Variables
289(1)
14.3.4.3 Public Variables
289(1)
14.3.4.4 Static Variables
289(1)
14.4 Programming with VBA and Excel
289(6)
14.4.1 Excel: Range Object
289(2)
14.4.1.1 Range
290(1)
14.4.1.2 Cells
290(1)
14.4.1.3 Offset
290(1)
14.4.1.4 Some Useful Properties and Methods for the Range Object
291(1)
14.4.2 VBA Functions and Excel Functions
291(3)
14.4.2.1 VBA Functions
292(1)
14.4.2.2 Excel Functions
293(1)
14.4.3 Some Important Events in Excel
294(1)
14.5 Mini Project
295(2)
14.5.1 Introduction
295(1)
14.5.2 Spreadsheet Specifications
296(1)
14.6 Summary
297(4)
15 Database Connectivity with VBA
301(14)
15.1 ActiveX Data Object
301(1)
15.2 ADO.NET Objects in Data Provider Libraries
301(2)
15.2.1 Connection Object
301(1)
15.2.2 Command Object
302(1)
15.2.3 Recordset Object
303(1)
15.3 Illustrative Example 1: Connecting to MySQL
303(4)
15.4 Illustrative Example 2: Connecting to an Access Database
307(1)
15.5 Illustrative Example 3: Connecting to XML
308(2)
15.6 Summary
310(5)
Section IV Web Application Development
16 Web Applications in Microsoft Visual Studio
315(22)
16.1 Starting a Web Application in Microsoft Visual Studio
315(4)
16.2 Hypertext Markup Language
319(1)
16.3 Multiple Web Forms
320(4)
16.4 Database Connection
324(10)
16.5 Summary
334(3)
17 Working with XML (I)
337(28)
17.1 What Is Markup Language?
337(2)
17.1.1 Standard Generalized Markup Language
337(1)
17.1.2 Hypertext Markup Language
338(1)
17.1.3 Extensible Markup Language
339(1)
17.2 XML Basics: Elements and Attributes
339(4)
17.2.1 Elements
339(1)
17.2.2 Attributes
340(1)
17.2.3 Text
341(1)
17.2.4 Empty Elements
341(1)
17.2.5 Well-Formed XML
341(2)
17.3 XML Namespaces
343(2)
17.4 XML Validation
345(12)
17.4.1 DTD and XML Validation
345(7)
17.4.1.1 DTD Structure
346(4)
17.4.1.2 Internal versus External DTD
350(2)
17.4.2 XML Schema and XML Validation
352(3)
17.4.2.1 XML Schema Data Types
352(1)
17.4.2.2 XML Schema Namespaces
352(1)
17.4.2.3 XML Schema Elements and Attributes
353(2)
17.4.3 Referencing XML Schema for Validation
355(2)
17.5 XML Editor Tools
357(1)
17.6 Summary
357(8)
18 Working with XML (II)
365(28)
18.1 XML Parsers
365(5)
18.2 XML Query
370(3)
18.3 XML Transformation
373(3)
18.4 Interfacing XML with Database Applications
376(11)
18.4.1 Relational Database versus XML
376(4)
18.4.2 XML and Microsoft Access
380(5)
18.4.2.1 Exporting Access Database Tables to XML
380(1)
18.4.2.2 Importing XML to an Access Database
381(4)
18.4.3 XML and MySQL
385(2)
18.4.3.1 Exporting MySQL to XML
385(1)
18.4.3.2 Importing XML to MySQL
386(1)
18.4.4 XML and Microsoft Excel
387(1)
18.5 Summary
387(6)
19 Web Services
393(16)
19.1 Introduction to Web Services
393(1)
19.2 Web Service Protocols
394(2)
19.2.1 Hypertext Transfer Protocol
394(1)
19.2.1.1 HTTP-GET
394(1)
19.2.1.2 HTTP-POST
395(1)
19.2.2 Simple Object Access Protocol
395(1)
19.2.3 Web Services Definition Language
395(1)
19.2.4 UDDI Language
395(1)
19.3 Web Service Example
396(8)
19.3.1 Creating Web Service
396(5)
19.3.1.1 Web Services Definition Language
397(2)
19.3.1.2 SOAP Message
399(2)
19.3.2 Using the Web Service
401(3)
19.4 Summary
404(5)
Section V Design of Information Systems
20 Computing Efficiency of Algorithms
409(12)
20.1 Analysis of the Running Time of a Non-Recursive Algorithm
409(4)
20.2 Asymptotic Notations for the Computing Efficiency of Algorithms
413(5)
20.3 Summary
418(3)
21 User Interface Design and Usability
421(6)
21.1 Usability Criteria
421(1)
21.2 Principles and Guidelines of User Interface Design
422(4)
21.3 Summary
426(1)
22 Computer and Network Security
427(20)
22.1 Security Risks Involving Assets, Vulnerabilities, and Threats
427(2)
22.2 Various Types of Cyber Attacks
429(6)
22.2.1 Brute Force Attack
430(1)
22.2.2 Bypassing Attack
430(2)
22.2.3 Code Attachment
432(1)
22.2.4 Mobile Code
432(1)
22.2.5 Denial of Service
432(1)
22.2.6 Tampering
433(1)
22.2.7 Man in the Middle
433(1)
22.2.8 Probing and Scanning
434(1)
22.2.9 Spoofing
434(1)
22.2.10 Adding
434(1)
22.2.11 Insider Threat
434(1)
22.3 Cyber Security Protection
435(9)
22.3.1 Cyber Attack Prevention
435(7)
22.3.1.1 Data Encryption
435(5)
22.3.1.2 Two Types of Firewalls: Screening Routers and Application Gateways
440(1)
22.3.1.3 Authentication and Authorization
441(1)
22.3.2 Cyber Attack Detection
442(1)
22.3.3 Cyber Attack Response
443(1)
22.4 Summary
444(3)
23 Data Mining
447(24)
23.1 Learning a Binary Decision Tree and Classifying Data Using a Decision Tree
447(13)
23.1.1 Description of a Data Set
447(2)
23.1.2 Elements of a Decision Tree
449(1)
23.1.3 Decision Tree with the Minimum Description Length
450(1)
23.1.4 Split Selection Methods
450(6)
23.1.5 Algorithm for the Top-Down Construction of a Binary Decision Tree
456(2)
23.1.6 Classifying Data Using a Decision Tree
458(2)
23.2 Learning a Non-Binary Decision Tree
460(7)
23.3 Handling Numeric and Missing Values of Attribute Variables
467(1)
23.4 Advantages and Shortcomings of the Decision Tree Algorithm
468(1)
23.5 Software
469(1)
23.6 Summary
469(2)
24 Expert Systems
471(10)
24.1 Structure of the Knowledge Base
471(1)
24.2 Forward Chaining and Backward Chaining by the Inference Engine
472(4)
24.3 Conflict Resolution
476(1)
24.4 Variable Binding
476(1)
24.5 Certainty Factor
477(1)
24.6 Software and Advantages of Expert Systems to Algorithms of Computer Programs
478(1)
24.7 Summary
479(2)
25 Decision Support Systems
481(18)
25.1 What Is a Decision?
481(3)
25.1.1 Components of a Decision
481(1)
25.1.1.1 Decision Problem
481(1)
25.1.1.2 Decision Alternatives
482(1)
25.1.1.3 Decision Constraints
482(1)
25.1.1.4 Decision Criteria
482(1)
25.1.2 Types of Decisions
482(3)
25.1.2.1 Decisions According to Their Nature
482(1)
25.1.2.2 Decisions According to Their Scope
483(1)
25.2 Decision-Making Process
484(1)
25.3 Decision Support Systems
485(4)
25.3.1 Data Sources
485(1)
25.3.2 Extraction, Transformation, and Loading
486(1)
25.3.3 Data Warehouse
486(1)
25.3.4 Data Marts
486(1)
25.3.5 Decision Models
486(3)
25.3.5.1 Simple Weighted Average Methodology
486(1)
25.3.5.2 Compromise Programming
487(1)
25.3.5.3 Genetic Algorithms
488(1)
25.3.5.4 Analytic Hierarchy Process
488(1)
25.3.6 Interfaces
489(1)
25.4 Implementing Decision Support Systems
489(4)
25.4.1 Identifying Problem and Objectives
491(1)
25.4.2 Identifying Data Sources
491(1)
25.4.3 Data Analysis and Preparation
491(1)
25.4.4 Designing Decision Models
492(1)
25.4.5 Evaluation of Results
492(1)
25.4.6 Implementing and Monitoring the Decision Support System
492(1)
25.5 Summary
493(6)
Section VI Case Studies
26 Development of a Healthcare Information System Using Microsoft Access and Visual Studio
499(40)
26.1 Enterprise Modeling
499(2)
26.2 Conceptual Data Modeling
501(4)
26.3 Relational Modeling
505(1)
26.4 Database Implementation Using Microsoft Access
505(1)
26.5 Windows-Based Application and Web-Enabled Application Using Microsoft Visual Studio
505(32)
26.6 Summary
537(2)
27 Development of an Online System for Imaging Device Productivity Evaluation in Radiology Practices
539(12)
27.1 Introduction
539(1)
27.2 Imaging Equipment Utilization
539(1)
27.3 REES Design
540(6)
27.3.1 Imaging API Design: DICOM Receiver and Parser
541(1)
27.3.2 Database Design
541(2)
27.3.2.1 DICOM Knowledge Database
541(1)
27.3.2.2 Patient-Centric Imaging Exam Database
542(1)
27.3.3 Application Layer
543(9)
27.3.3.1 Benchmark Metric for Imaging Exam Efficiency Assessment
543(3)
27.3.3.2 Web Interface
546(1)
27.4 Use Case
546(2)
27.5 Conclusion
548(1)
27.6 Summary
548(3)
28 Development of a Radiology Skin Dose Simulation Tool Using VBA and Database
551(10)
28.1 Quality Assurance in Radiology Exam
551(1)
28.2 Peak Skin Exposure
552(1)
28.3 Simulation Tool for Peak Skin Dose Monitoring
552(6)
28.3.1 Patient Phantom
552(3)
28.3.2 Virtual Equipment Configuration and Geometry
555(1)
28.3.3 Imaging Exam Database
556(1)
28.3.4 GUI for Physicist Validation
556(1)
28.3.5 GUI for Technologist Validation
557(1)
28.3.6 Peak Skin Dose Calculation Engine
558(1)
28.4 Discussion
558(1)
28.5 Summary
558(3)
References 561(4)
Index 565
Nong Ye is a Professor at the School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, Arizona, USA. She holds a Ph.D. degree in Industrial Engineering from Purdue University, West Lafayette, Indiana, a M.S. degree in Computer Science from the Chinese Academy of Sciences, Beijing, P. R. China, and a B.S. degree in Computer Science from Peking University, Beijing, P. R. China. Her book publications include this book, Data Mining: Theories, Algorithms and Examples, The Handbook of Data Mining, and Secure Computer and Network Systems: Modeling, Analysis and Design. Her publications also include over eighty journal papers in the fields of data mining, statistical data analysis and modeling, computer and network security, quality of service optimization, quality control, human-computer interaction, and human factors.

Teresa Wu is an Associate Professor at the School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, Arizona, USA. She holds a Ph.D. degree in Industrial Engineering from University of Iowa. Her book publications include this book and Managing Supply Chain Risk and Vulnerability Tools and Methods for Supply Chain Decision Makers. Her publications also include over sixty journal papers in the fields of information systems, decision algorithms, data mining, and health informatics.