Preface |
|
xv | |
Acknowledgments |
|
xvii | |
Authors |
|
xix | |
Overview |
|
xxi | |
Section I Foundation of Information Systems |
|
|
1 Boolean Algebra and Digital Logic Circuits for Computer Hardware |
|
|
3 | (16) |
|
|
3 | (5) |
|
1.1.1 Binary Values and Boolean Operators |
|
|
3 | (1) |
|
1.1.2 Basic Properties of Boolean Algebra |
|
|
4 | (1) |
|
1.1.3 Conversion of a Truth Table for a Function into a Boolean Expression |
|
|
5 | (3) |
|
1.2 Digital Logic Circuits |
|
|
8 | (9) |
|
1.2.1 Digital Logic Gates |
|
|
8 | (2) |
|
1.2.2 Combinational Circuits |
|
|
10 | (3) |
|
1.2.3 Sequential Circuits |
|
|
13 | (4) |
|
|
17 | (2) |
|
2 Digital Data Representation |
|
|
19 | (14) |
|
2.1 Representation of Numbers |
|
|
19 | (8) |
|
2.1.1 Conversion between Unsigned Binary and Decimal Numbers |
|
|
19 | (3) |
|
2.1.2 Representation of Signed Integers |
|
|
22 | (5) |
|
2.1.2.1 Signed Magnitude Method |
|
|
23 | (1) |
|
2.1.2.2 One's Complement Method |
|
|
23 | (2) |
|
2.1.2.3 Two's Complement Method |
|
|
25 | (2) |
|
2.1.3 Representation of Signed Floating Point Values |
|
|
27 | (1) |
|
2.2 Representation of Alphabet and Control Characters |
|
|
27 | (1) |
|
2.3 Error Detection and Correction |
|
|
28 | (4) |
|
|
32 | (1) |
|
3 Computer and Network System Software |
|
|
33 | (10) |
|
|
33 | (2) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
3.2 Networking and Communication Software |
|
|
35 | (6) |
|
3.2.1 OSI Reference Model |
|
|
35 | (1) |
|
3.2.2 Transmission Control Protocol/Internet Protocol |
|
|
36 | (5) |
|
|
41 | (2) |
|
4 Overview of Information Systems |
|
|
43 | (12) |
|
4.1 Information System Concepts |
|
|
43 | (1) |
|
4.2 The Role of Information System in Business |
|
|
44 | (4) |
|
4.2.1 Transaction Processing System |
|
|
47 | (1) |
|
4.2.2 Management Information System |
|
|
47 | (1) |
|
4.2.3 Decision Support System |
|
|
47 | (1) |
|
4.2.4 Executive Information System and Strategic Information System |
|
|
47 | (1) |
|
4.2.5 Electronic Business and Electronic Commerce |
|
|
48 | (1) |
|
|
48 | (1) |
|
4.3 Post-PC Information Age: Five Trends in the Future Information System Applications |
|
|
48 | (2) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
4.3.5 Consumerization of IT |
|
|
50 | (1) |
|
|
50 | (5) |
Section II Database Design and Development |
|
|
5 Conceptual Data Modeling: Entity-Relationship Modeling |
|
|
55 | (24) |
|
5.1 Types, Attributes, and Instances of Entities |
|
|
55 | (4) |
|
5.2 Types, Attributes, Instances, and Degrees of Relationships between Entities |
|
|
59 | (1) |
|
5.3 Maximum and Minimum Cardinalities of a Relationship |
|
|
60 | (6) |
|
|
66 | (5) |
|
|
71 | (1) |
|
5.6 Superclass and Subclass of Entities |
|
|
71 | (5) |
|
|
76 | (3) |
|
6 Logical Database Design: Relational Modeling and Normalization |
|
|
79 | (30) |
|
6.1 Relational Model of Database and Data Integrity Constraints |
|
|
79 | (4) |
|
6.2 Transformation of an E-R Model to a Relational Model |
|
|
83 | (13) |
|
6.2.1 Transformation of Entities and Their Attributes |
|
|
83 | (3) |
|
6.2.2 Transformation of Superclass and Subclass Entities and Their Attributes |
|
|
86 | (1) |
|
6.2.3 Transformation of Relationships and Their Attributes |
|
|
86 | (7) |
|
6.2.4 Transformation of Association Entities |
|
|
93 | (1) |
|
6.2.5 Transformation of Weak Entities |
|
|
93 | (3) |
|
|
96 | (8) |
|
6.3.1 Data Redundancy and Data Anomalies |
|
|
96 | (2) |
|
6.3.2 Functional Dependency |
|
|
98 | (2) |
|
6.3.3 Normalization and Normal Forms |
|
|
100 | (4) |
|
|
104 | (5) |
|
7 Database Implementation in Microsoft Access |
|
|
109 | (42) |
|
7.1 Tables for Data Storage |
|
|
109 | (8) |
|
7.1.1 Setting the Primary Key for a Table |
|
|
109 | (1) |
|
7.1.2 Data Types of a Data Field |
|
|
110 | (1) |
|
7.1.3 Field Size Property of a Data Field |
|
|
111 | (2) |
|
7.1.4 Format Property of a Data Field |
|
|
113 | (1) |
|
7.1.5 Input Mask Property of a Data Field |
|
|
113 | (1) |
|
7.1.6 Default Value Property of a Data Field |
|
|
114 | (1) |
|
7.1.7 Validation Rule and Validation Text Properties of a Data Field |
|
|
115 | (1) |
|
7.1.8 Required Property of a Data Field |
|
|
115 | (1) |
|
7.1.9 Indexed Property of a Data Field |
|
|
115 | (1) |
|
7.1.10 Adding and Deleting Records of a Table |
|
|
115 | (2) |
|
7.2 Relationships of Tables |
|
|
117 | (3) |
|
7.3 Queries for Data Retrieval |
|
|
120 | (20) |
|
7.3.1 Select Queries Using One Table |
|
|
120 | (3) |
|
7.3.2 Select Queries with Joins of Multiple Tables |
|
|
123 | (3) |
|
7.3.3 Select Queries with Parameters and Calculated Fields |
|
|
126 | (2) |
|
7.3.4 Select Queries with Groupings of Records |
|
|
128 | (4) |
|
|
132 | (2) |
|
7.3.6 Embedded Select Queries |
|
|
134 | (6) |
|
|
140 | (1) |
|
|
141 | (10) |
|
8 Structured Query Language |
|
|
151 | (26) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (17) |
|
8.3.1 SQL Data Definition Language and Data Types |
|
|
153 | (4) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (2) |
|
8.3.2 SQL Data Manipulation Language: Data Queries |
|
|
157 | (8) |
|
8.3.2.1 Basic Structure of the SELECT Command |
|
|
157 | (3) |
|
8.3.2.2 Aggregate Functions |
|
|
160 | (2) |
|
8.3.2.3 Nested Subqueries |
|
|
162 | (1) |
|
|
163 | (2) |
|
8.3.3 SQL Data Manipulation Language: Data Modification |
|
|
165 | (3) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
8.3.4 SQL Data Manipulation Language: Relation Modification |
|
|
168 | (10) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (8) |
|
|
177 | (24) |
|
|
177 | (1) |
|
9.2 Get Ready to Work with MySQL |
|
|
178 | (6) |
|
9.2.1 MySQL Installation on Windows |
|
|
179 | (4) |
|
9.2.2 MySQL Installation on Mac OS X |
|
|
183 | (1) |
|
9.3 Working with MySQL Command Line Client |
|
|
184 | (10) |
|
|
184 | (2) |
|
9.3.1.1 Numeric Data Types |
|
|
184 | (1) |
|
9.3.1.2 String (Character) Data Type |
|
|
185 | (1) |
|
9.3.1.3 Date and Time (Temporal) Data Types |
|
|
185 | (1) |
|
|
186 | (1) |
|
9.3.2 Practice Data Definition Language in MySQL |
|
|
186 | (3) |
|
9.3.2.1 Statements for Database Operations |
|
|
186 | (2) |
|
9.3.2.2 Statements for Relation Operations |
|
|
188 | (1) |
|
9.3.3 Practice Data Manipulation Language in MySQL |
|
|
189 | (2) |
|
9.3.3.1 Adding Records to a Table |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
9.3.4 MySQL Transaction Control Language |
|
|
191 | (1) |
|
9.3.5 MySQL Data Control Language |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
9.3.6.2 DESCRIBE Statement |
|
|
194 | (1) |
|
|
194 | (1) |
|
9.4 Working with MySQL Workbench |
|
|
194 | (4) |
|
|
195 | (1) |
|
|
196 | (1) |
|
9.4.3 Server Administration |
|
|
197 | (1) |
|
|
198 | (3) |
|
10 Object-Based Database Systems |
|
|
201 | (16) |
|
10.1 Object-Oriented Database Management System |
|
|
201 | (8) |
|
10.1.1 Object-Oriented Database Concepts |
|
|
201 | (3) |
|
10.1.1.1 Objects and Identities |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
10.1.1.4 Classes and Inheritance |
|
|
203 | (1) |
|
10.1.1.5 Overloading, Overriding, and Late Binding |
|
|
204 | (1) |
|
10.1.2 Object-Oriented Database Design and Modeling |
|
|
204 | (4) |
|
|
204 | (2) |
|
10.1.2.2 Object Definition Language |
|
|
206 | (1) |
|
10.1.2.3 Object Query Language |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (3) |
|
10.2.1 Object-Relational Model |
|
|
209 | (1) |
|
10.2.2 Object-Relational Query Language |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (5) |
Section III Windows Application Development |
|
|
11 Windows Forms and Controls in Microsoft Visual Studio |
|
|
217 | (18) |
|
11.1 Visual Basic Development Environment |
|
|
217 | (3) |
|
|
220 | (3) |
|
|
223 | (4) |
|
11.4 GUI of the Healthcare Information System Application |
|
|
227 | (1) |
|
11.5 Execution of a Windows-Based Application Outside Visual Studio |
|
|
227 | (2) |
|
|
229 | (6) |
|
12 Visual Basic Programming in Microsoft Visual Studio |
|
|
235 | (10) |
|
12.1 Variables and Data Types |
|
|
235 | (3) |
|
|
238 | (1) |
|
12.3 Operators and Mathematical Functions in Expressions |
|
|
238 | (1) |
|
|
238 | (5) |
|
|
243 | (2) |
|
13 Database Connection in Microsoft Visual Studio |
|
|
245 | (32) |
|
13.1 Adding an Access Database as a Data Source |
|
|
245 | (6) |
|
13.2 Presenting Data from Tables and Simple Select Queries |
|
|
251 | (1) |
|
13.3 Architecture of Database Connection |
|
|
251 | (6) |
|
13.4 Displaying Related Data in Parent and Child Tables |
|
|
257 | (2) |
|
13.5 Displaying Data Fields Using Controls Other Than DataGridView |
|
|
259 | (2) |
|
13.6 Handling Crosstab and Select Queries with Parameters |
|
|
261 | (10) |
|
13.7 Updating Data to an Access Database |
|
|
271 | (1) |
|
13.8 Visual Basic Code to Retrieve, Add, and Delete Data of an Access Database |
|
|
272 | (4) |
|
|
276 | (1) |
|
14 Working with VBA in Excel |
|
|
277 | (24) |
|
|
277 | (4) |
|
|
281 | (1) |
|
|
282 | (7) |
|
14.3.1 Visual Basic Editor |
|
|
282 | (2) |
|
14.3.1.1 Project Explorer Window |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
14.3.1.4 Immediate Window |
|
|
283 | (1) |
|
14.3.1.5 Object Browser Window |
|
|
284 | (1) |
|
14.3.2 Graphical User Interface: Forms and Controls |
|
|
284 | (2) |
|
14.3.2.1 Controls in Excel |
|
|
284 | (1) |
|
14.3.2.2 Controls with Forms |
|
|
285 | (1) |
|
14.3.3 Modules: Sub and Function Procedure |
|
|
286 | (1) |
|
14.3.4 Modules: Variables |
|
|
287 | (2) |
|
14.3.4.1 Procedure-Only Variables |
|
|
288 | (1) |
|
14.3.4.2 Module-Only Variables |
|
|
289 | (1) |
|
14.3.4.3 Public Variables |
|
|
289 | (1) |
|
14.3.4.4 Static Variables |
|
|
289 | (1) |
|
14.4 Programming with VBA and Excel |
|
|
289 | (6) |
|
14.4.1 Excel: Range Object |
|
|
289 | (2) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
14.4.1.4 Some Useful Properties and Methods for the Range Object |
|
|
291 | (1) |
|
14.4.2 VBA Functions and Excel Functions |
|
|
291 | (3) |
|
|
292 | (1) |
|
|
293 | (1) |
|
14.4.3 Some Important Events in Excel |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
295 | (1) |
|
14.5.2 Spreadsheet Specifications |
|
|
296 | (1) |
|
|
297 | (4) |
|
15 Database Connectivity with VBA |
|
|
301 | (14) |
|
|
301 | (1) |
|
15.2 ADO.NET Objects in Data Provider Libraries |
|
|
301 | (2) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
15.3 Illustrative Example 1: Connecting to MySQL |
|
|
303 | (4) |
|
15.4 Illustrative Example 2: Connecting to an Access Database |
|
|
307 | (1) |
|
15.5 Illustrative Example 3: Connecting to XML |
|
|
308 | (2) |
|
|
310 | (5) |
Section IV Web Application Development |
|
|
16 Web Applications in Microsoft Visual Studio |
|
|
315 | (22) |
|
16.1 Starting a Web Application in Microsoft Visual Studio |
|
|
315 | (4) |
|
16.2 Hypertext Markup Language |
|
|
319 | (1) |
|
|
320 | (4) |
|
|
324 | (10) |
|
|
334 | (3) |
|
|
337 | (28) |
|
17.1 What Is Markup Language? |
|
|
337 | (2) |
|
17.1.1 Standard Generalized Markup Language |
|
|
337 | (1) |
|
17.1.2 Hypertext Markup Language |
|
|
338 | (1) |
|
17.1.3 Extensible Markup Language |
|
|
339 | (1) |
|
17.2 XML Basics: Elements and Attributes |
|
|
339 | (4) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
341 | (2) |
|
|
343 | (2) |
|
|
345 | (12) |
|
17.4.1 DTD and XML Validation |
|
|
345 | (7) |
|
|
346 | (4) |
|
17.4.1.2 Internal versus External DTD |
|
|
350 | (2) |
|
17.4.2 XML Schema and XML Validation |
|
|
352 | (3) |
|
17.4.2.1 XML Schema Data Types |
|
|
352 | (1) |
|
17.4.2.2 XML Schema Namespaces |
|
|
352 | (1) |
|
17.4.2.3 XML Schema Elements and Attributes |
|
|
353 | (2) |
|
17.4.3 Referencing XML Schema for Validation |
|
|
355 | (2) |
|
|
357 | (1) |
|
|
357 | (8) |
|
|
365 | (28) |
|
|
365 | (5) |
|
|
370 | (3) |
|
|
373 | (3) |
|
18.4 Interfacing XML with Database Applications |
|
|
376 | (11) |
|
18.4.1 Relational Database versus XML |
|
|
376 | (4) |
|
18.4.2 XML and Microsoft Access |
|
|
380 | (5) |
|
18.4.2.1 Exporting Access Database Tables to XML |
|
|
380 | (1) |
|
18.4.2.2 Importing XML to an Access Database |
|
|
381 | (4) |
|
|
385 | (2) |
|
18.4.3.1 Exporting MySQL to XML |
|
|
385 | (1) |
|
18.4.3.2 Importing XML to MySQL |
|
|
386 | (1) |
|
18.4.4 XML and Microsoft Excel |
|
|
387 | (1) |
|
|
387 | (6) |
|
|
393 | (16) |
|
19.1 Introduction to Web Services |
|
|
393 | (1) |
|
19.2 Web Service Protocols |
|
|
394 | (2) |
|
19.2.1 Hypertext Transfer Protocol |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
19.2.2 Simple Object Access Protocol |
|
|
395 | (1) |
|
19.2.3 Web Services Definition Language |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (8) |
|
19.3.1 Creating Web Service |
|
|
396 | (5) |
|
19.3.1.1 Web Services Definition Language |
|
|
397 | (2) |
|
|
399 | (2) |
|
19.3.2 Using the Web Service |
|
|
401 | (3) |
|
|
404 | (5) |
Section V Design of Information Systems |
|
|
20 Computing Efficiency of Algorithms |
|
|
409 | (12) |
|
20.1 Analysis of the Running Time of a Non-Recursive Algorithm |
|
|
409 | (4) |
|
20.2 Asymptotic Notations for the Computing Efficiency of Algorithms |
|
|
413 | (5) |
|
|
418 | (3) |
|
21 User Interface Design and Usability |
|
|
421 | (6) |
|
|
421 | (1) |
|
21.2 Principles and Guidelines of User Interface Design |
|
|
422 | (4) |
|
|
426 | (1) |
|
22 Computer and Network Security |
|
|
427 | (20) |
|
22.1 Security Risks Involving Assets, Vulnerabilities, and Threats |
|
|
427 | (2) |
|
22.2 Various Types of Cyber Attacks |
|
|
429 | (6) |
|
22.2.1 Brute Force Attack |
|
|
430 | (1) |
|
|
430 | (2) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
22.2.8 Probing and Scanning |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
22.3 Cyber Security Protection |
|
|
435 | (9) |
|
22.3.1 Cyber Attack Prevention |
|
|
435 | (7) |
|
|
435 | (5) |
|
22.3.1.2 Two Types of Firewalls: Screening Routers and Application Gateways |
|
|
440 | (1) |
|
22.3.1.3 Authentication and Authorization |
|
|
441 | (1) |
|
22.3.2 Cyber Attack Detection |
|
|
442 | (1) |
|
22.3.3 Cyber Attack Response |
|
|
443 | (1) |
|
|
444 | (3) |
|
|
447 | (24) |
|
23.1 Learning a Binary Decision Tree and Classifying Data Using a Decision Tree |
|
|
447 | (13) |
|
23.1.1 Description of a Data Set |
|
|
447 | (2) |
|
23.1.2 Elements of a Decision Tree |
|
|
449 | (1) |
|
23.1.3 Decision Tree with the Minimum Description Length |
|
|
450 | (1) |
|
23.1.4 Split Selection Methods |
|
|
450 | (6) |
|
23.1.5 Algorithm for the Top-Down Construction of a Binary Decision Tree |
|
|
456 | (2) |
|
23.1.6 Classifying Data Using a Decision Tree |
|
|
458 | (2) |
|
23.2 Learning a Non-Binary Decision Tree |
|
|
460 | (7) |
|
23.3 Handling Numeric and Missing Values of Attribute Variables |
|
|
467 | (1) |
|
23.4 Advantages and Shortcomings of the Decision Tree Algorithm |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (2) |
|
|
471 | (10) |
|
24.1 Structure of the Knowledge Base |
|
|
471 | (1) |
|
24.2 Forward Chaining and Backward Chaining by the Inference Engine |
|
|
472 | (4) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
24.6 Software and Advantages of Expert Systems to Algorithms of Computer Programs |
|
|
478 | (1) |
|
|
479 | (2) |
|
25 Decision Support Systems |
|
|
481 | (18) |
|
|
481 | (3) |
|
25.1.1 Components of a Decision |
|
|
481 | (1) |
|
25.1.1.1 Decision Problem |
|
|
481 | (1) |
|
25.1.1.2 Decision Alternatives |
|
|
482 | (1) |
|
25.1.1.3 Decision Constraints |
|
|
482 | (1) |
|
25.1.1.4 Decision Criteria |
|
|
482 | (1) |
|
25.1.2 Types of Decisions |
|
|
482 | (3) |
|
25.1.2.1 Decisions According to Their Nature |
|
|
482 | (1) |
|
25.1.2.2 Decisions According to Their Scope |
|
|
483 | (1) |
|
25.2 Decision-Making Process |
|
|
484 | (1) |
|
25.3 Decision Support Systems |
|
|
485 | (4) |
|
|
485 | (1) |
|
25.3.2 Extraction, Transformation, and Loading |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (3) |
|
25.3.5.1 Simple Weighted Average Methodology |
|
|
486 | (1) |
|
25.3.5.2 Compromise Programming |
|
|
487 | (1) |
|
25.3.5.3 Genetic Algorithms |
|
|
488 | (1) |
|
25.3.5.4 Analytic Hierarchy Process |
|
|
488 | (1) |
|
|
489 | (1) |
|
25.4 Implementing Decision Support Systems |
|
|
489 | (4) |
|
25.4.1 Identifying Problem and Objectives |
|
|
491 | (1) |
|
25.4.2 Identifying Data Sources |
|
|
491 | (1) |
|
25.4.3 Data Analysis and Preparation |
|
|
491 | (1) |
|
25.4.4 Designing Decision Models |
|
|
492 | (1) |
|
25.4.5 Evaluation of Results |
|
|
492 | (1) |
|
25.4.6 Implementing and Monitoring the Decision Support System |
|
|
492 | (1) |
|
|
493 | (6) |
Section VI Case Studies |
|
|
26 Development of a Healthcare Information System Using Microsoft Access and Visual Studio |
|
|
499 | (40) |
|
|
499 | (2) |
|
26.2 Conceptual Data Modeling |
|
|
501 | (4) |
|
|
505 | (1) |
|
26.4 Database Implementation Using Microsoft Access |
|
|
505 | (1) |
|
26.5 Windows-Based Application and Web-Enabled Application Using Microsoft Visual Studio |
|
|
505 | (32) |
|
|
537 | (2) |
|
27 Development of an Online System for Imaging Device Productivity Evaluation in Radiology Practices |
|
|
539 | (12) |
|
|
539 | (1) |
|
27.2 Imaging Equipment Utilization |
|
|
539 | (1) |
|
|
540 | (6) |
|
27.3.1 Imaging API Design: DICOM Receiver and Parser |
|
|
541 | (1) |
|
|
541 | (2) |
|
27.3.2.1 DICOM Knowledge Database |
|
|
541 | (1) |
|
27.3.2.2 Patient-Centric Imaging Exam Database |
|
|
542 | (1) |
|
|
543 | (9) |
|
27.3.3.1 Benchmark Metric for Imaging Exam Efficiency Assessment |
|
|
543 | (3) |
|
|
546 | (1) |
|
|
546 | (2) |
|
|
548 | (1) |
|
|
548 | (3) |
|
28 Development of a Radiology Skin Dose Simulation Tool Using VBA and Database |
|
|
551 | (10) |
|
28.1 Quality Assurance in Radiology Exam |
|
|
551 | (1) |
|
|
552 | (1) |
|
28.3 Simulation Tool for Peak Skin Dose Monitoring |
|
|
552 | (6) |
|
|
552 | (3) |
|
28.3.2 Virtual Equipment Configuration and Geometry |
|
|
555 | (1) |
|
28.3.3 Imaging Exam Database |
|
|
556 | (1) |
|
28.3.4 GUI for Physicist Validation |
|
|
556 | (1) |
|
28.3.5 GUI for Technologist Validation |
|
|
557 | (1) |
|
28.3.6 Peak Skin Dose Calculation Engine |
|
|
558 | (1) |
|
|
558 | (1) |
|
|
558 | (3) |
References |
|
561 | (4) |
Index |
|
565 | |