Acknowledgements |
|
xiv | |
|
Chapter 1 Data Structures |
|
|
1 | (20) |
|
|
1 | (1) |
|
|
1 | (7) |
|
|
8 | (3) |
|
|
11 | (2) |
|
|
13 | (5) |
|
|
18 | (3) |
|
|
19 | (2) |
|
|
21 | (28) |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.3 The Goals of Database Design |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (2) |
|
2.6 Example - Making the Design More Efficient |
|
|
26 | (3) |
|
2.7 Fourth and Fifth Normal Form |
|
|
29 | (4) |
|
2.8 Many-to-Many Relationships |
|
|
33 | (1) |
|
2.9 Distributed Relational Systems and Data Replication |
|
|
33 | (2) |
|
2.10 Columnstore and Data Warehousing |
|
|
35 | (3) |
|
|
38 | (2) |
|
|
40 | (1) |
|
2.13 Database Standards and Standards for Interoperability and Integration |
|
|
41 | (8) |
|
2.13.1 Database Naming Conventions |
|
|
42 | (1) |
|
2.13.2 Data Administration Standards |
|
|
43 | (1) |
|
2.13.3 Database Administration Standards |
|
|
44 | (1) |
|
2.13.4 System Administration Standards |
|
|
44 | (1) |
|
2.13.5 Database Application Development Standards |
|
|
44 | (1) |
|
2.13.6 Database Security Standards |
|
|
45 | (1) |
|
2.13.7 Application Migration and Turnover Procedures |
|
|
45 | (1) |
|
2.13.8 Operational Support Standards |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (54) |
|
|
49 | (1) |
|
3.2 Common Commands: SELECT, INSERT, UPDATE and DELETE |
|
|
49 | (4) |
|
3.3 Some Useful Commands/Functions |
|
|
53 | (1) |
|
|
53 | (21) |
|
|
74 | (1) |
|
|
74 | (4) |
|
|
78 | (2) |
|
|
80 | (4) |
|
3.8 Loading Large Data Sets |
|
|
84 | (1) |
|
|
85 | (3) |
|
|
88 | (2) |
|
|
90 | (1) |
|
3.12 Concurrency Control and Transaction Management |
|
|
91 | (4) |
|
3.13 Database Performance Tuning |
|
|
95 | (3) |
|
|
98 | (5) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
3.14.5 Normalization and Referential Integrity |
|
|
99 | (1) |
|
3.14.6 Maintenance: Run Periodic Scripts to Find |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (2) |
|
|
101 | (2) |
|
|
103 | (18) |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
105 | (13) |
|
4.3.1 Some Data-Mining Methods |
|
|
109 | (1) |
|
4.3.1.1 Decision Trees and Rules |
|
|
109 | (1) |
|
4.3.1.2 Nonlinear Regression and Classification Methods |
|
|
110 | (1) |
|
4.3.1.3 Example-Based Methods |
|
|
111 | (1) |
|
4.3.1.4 Probabilistic Graphic Dependency Models |
|
|
112 | (1) |
|
4.3.1.5 Principal Component Analysis (PCA) |
|
|
113 | (3) |
|
|
116 | (2) |
|
4.4 Data Mining Models in Healthcare |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (2) |
|
|
119 | (1) |
|
|
119 | (2) |
|
Chapter 5 Data Analysis and Presentation |
|
|
121 | (22) |
|
|
121 | (1) |
|
5.2 Appropriate Methods and Tools |
|
|
121 | (1) |
|
5.3 Interpretation of Results |
|
|
122 | (1) |
|
5.4 Presentation of Results |
|
|
123 | (1) |
|
|
123 | (1) |
|
5.6 Graphical Presentation |
|
|
124 | (3) |
|
|
127 | (1) |
|
5.8 Commercial Software: Excel |
|
|
127 | (11) |
|
|
127 | (11) |
|
|
138 | (5) |
|
|
140 | (1) |
|
|
141 | (2) |
|
Chapter 6 Boolean Algebra |
|
|
143 | (10) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
146 | (1) |
|
6.5.1 Functions of One Variable |
|
|
146 | (1) |
|
6.5.2 Functions of Two Variables |
|
|
146 | (1) |
|
6.6 Simplification of Logical Expressions |
|
|
147 | (1) |
|
6.7 A Slight Detour into NAND and NOR |
|
|
148 | (1) |
|
|
149 | (2) |
|
6.9 Using Boolean Algebra in Forming and Validating Queries |
|
|
151 | (1) |
|
|
151 | (2) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (10) |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (3) |
|
|
158 | (3) |
|
|
161 | (2) |
|
|
161 | (2) |
|
Chapter 8 Network Architecture |
|
|
163 | (42) |
|
|
163 | (1) |
|
8.2 Networking and the Network Environment |
|
|
163 | (7) |
|
|
163 | (1) |
|
8.2.2 Hardware - Hub, Switch, Router, Firewall |
|
|
164 | (2) |
|
|
166 | (4) |
|
8.3 Cabling Infrastructure |
|
|
170 | (3) |
|
8.4 IP Addressing and DNS |
|
|
173 | (3) |
|
|
173 | (2) |
|
|
175 | (1) |
|
|
176 | (5) |
|
8.5.1 IP Routing Table Entry Types |
|
|
176 | (1) |
|
8.5.2 Route Determination Process |
|
|
177 | (1) |
|
8.5.3 Example Routing Table for Windows 2000 |
|
|
178 | (1) |
|
8.5.4 Static, Dynamic and Reserved IPs |
|
|
179 | (1) |
|
8.5.4.1 Two Devices with the Same IP Address |
|
|
180 | (1) |
|
8.5.5 Where Is Your Data? |
|
|
180 | (1) |
|
8.6 Connecting Medical Devices to the Hospital Network |
|
|
181 | (3) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
8.8 The OSI 7-layer Model |
|
|
184 | (2) |
|
|
186 | (3) |
|
|
187 | (1) |
|
|
187 | (1) |
|
8.9.3 Intermediate System to Intermediate System (IS-IS) |
|
|
188 | (1) |
|
|
188 | (1) |
|
8.10 Web Services: Introduction |
|
|
189 | (1) |
|
8.11 Web Services: Representational State Transfer (REST) |
|
|
190 | (4) |
|
8.11.1 Client-Server Architecture |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
8.11.6.1 Resource Identification in Requests |
|
|
192 | (1) |
|
8.11.6.2 Resource Manipulation through Representations |
|
|
192 | (1) |
|
8.11.6.3 Self-Descriptive Messages |
|
|
192 | (1) |
|
8.11.6.4 Hypermedia as the Engine of Application State (HATEOAS) |
|
|
192 | (1) |
|
8.11.7 Relationship between URL and HTTP Methods |
|
|
193 | (1) |
|
8.12 Web Services: Simple Object Access Protocol (SOAP) |
|
|
194 | (3) |
|
8.13 Web Services and the Service Web |
|
|
197 | (1) |
|
|
198 | (7) |
|
|
200 | (3) |
|
|
203 | (2) |
|
Chapter 9 Storage Services |
|
|
205 | (6) |
|
|
205 | (1) |
|
|
205 | (2) |
|
|
207 | (1) |
|
9.4 Security and Governance for Cloud Services |
|
|
208 | (3) |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (6) |
|
|
211 | (1) |
|
|
211 | (6) |
|
10.2.1 Ciphers and Cryptography |
|
|
211 | (1) |
|
10.2.2 RSA and PGP Encryption |
|
|
212 | (1) |
|
10.2.3 Steganography, Checksums and Digital Signatures |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (2) |
|
Chapter 11 Web Programming |
|
|
217 | (24) |
|
|
217 | (1) |
|
11.2 Strategies for Web Development |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (4) |
|
|
219 | (3) |
|
|
222 | (4) |
|
11.4.1 The Class Selector |
|
|
224 | (1) |
|
11.4.2 Applying a Style Sheet |
|
|
225 | (1) |
|
11.4.3 Multiple Style Sheets |
|
|
226 | (1) |
|
11.5 Dynamic HTML - Forms |
|
|
226 | (1) |
|
11.6 Dynamic HTML - JavaScript |
|
|
227 | (3) |
|
|
230 | (1) |
|
11.8 Server- and Client-Side Architecture |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
11.11 Interfacing with a Database |
|
|
234 | (1) |
|
11.12 Privacy and Security |
|
|
235 | (6) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (30) |
|
|
241 | (1) |
|
12.2 Parity and Hamming Codes |
|
|
241 | (3) |
|
12.2.1 Decide on the Number of Bits in the Codeword |
|
|
242 | (1) |
|
12.2.2 Determine the Bit Positions of the Check Bits |
|
|
242 | (1) |
|
12.2.3 Determine Which Parity Bits Check Which Positions |
|
|
242 | (1) |
|
12.2.4 Calculate the Values of the Parity Bits |
|
|
243 | (1) |
|
12.2.5 Using the Codeword to Correct an Error |
|
|
243 | (1) |
|
|
244 | (2) |
|
|
246 | (15) |
|
|
247 | (1) |
|
12.4.2 Information Entities |
|
|
248 | (1) |
|
12.4.3 Information Object Definitions |
|
|
249 | (2) |
|
|
251 | (1) |
|
12.4.4.1 Value Representations |
|
|
252 | (1) |
|
12.4.4.2 Sequence Attributes |
|
|
252 | (2) |
|
12.4.4.3 Private Attributes |
|
|
254 | (1) |
|
12.4.4.4 Unique Identifiers |
|
|
255 | (1) |
|
12.4.4.5 Attribute Example: Orientation |
|
|
256 | (2) |
|
12.4.5 Standard Orientations |
|
|
258 | (1) |
|
12.4.6 DICOM Associations |
|
|
259 | (1) |
|
|
259 | (2) |
|
12.5 HL7 (Health Level Seven) |
|
|
261 | (5) |
|
12.6 Fast Healthcare Interoperability Resources (FHIR) |
|
|
266 | (5) |
|
|
267 | (2) |
|
|
269 | (2) |
|
Chapter 13 Hospital Information Systems and Interfaces |
|
|
271 | (6) |
|
|
271 | (1) |
|
|
271 | (1) |
|
13.3 Hospital Information Systems and Interfaces |
|
|
271 | (1) |
|
13.4 Equipment Management Database Systems |
|
|
272 | (1) |
|
13.5 Device Tracking Systems |
|
|
273 | (2) |
|
|
275 | (2) |
|
|
275 | (1) |
|
|
275 | (2) |
|
|
277 | (4) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
14.4 Resilience Using RAID |
|
|
278 | (2) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
Chapter 15 Software Engineering |
|
|
281 | (34) |
|
|
281 | (1) |
|
|
282 | (5) |
|
|
282 | (1) |
|
15.2.1.1 Microsoft Windows |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (2) |
|
15.3 The Software Lifecycle |
|
|
287 | (15) |
|
15.3.1 Requirements Specification: Gathering and Analysing User Requirements |
|
|
288 | (3) |
|
|
291 | (1) |
|
|
292 | (2) |
|
|
294 | (6) |
|
15.3.4.1 Acceptance Testing |
|
|
300 | (1) |
|
15.3.5 Installation and Maintenance |
|
|
301 | (1) |
|
15.4 Software Lifecycle Models |
|
|
302 | (4) |
|
|
302 | (1) |
|
15.4.2 Incremental Model/Prototyping Model |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (2) |
|
15.5 Overview of Process Models and Their Importance |
|
|
306 | (3) |
|
15.5.1 Comparison of Process Models |
|
|
307 | (1) |
|
15.5.1.1 Joint Application Development |
|
|
307 | (1) |
|
15.5.1.2 Assembling Reusable Components |
|
|
308 | (1) |
|
15.5.1.3 Application Generation |
|
|
309 | (1) |
|
15.6 Systems Design Methods |
|
|
309 | (6) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Chapter 16 Software Quality Assurance |
|
|
315 | (34) |
|
|
315 | (4) |
|
|
315 | (1) |
|
16.1.2 Configuration Management and Change Control |
|
|
316 | (1) |
|
|
316 | (1) |
|
16.1.4 Hungarian Notation |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
16.3 Software Tools and Automation for Testing |
|
|
320 | (6) |
|
16.3.1 Record and Playback |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
16.3.7 Test/Error Recovery |
|
|
324 | (1) |
|
|
324 | (1) |
|
16.3.9 Object Identity Tool |
|
|
324 | (1) |
|
16.3.10 Extensible Language |
|
|
325 | (1) |
|
16.3.11 Environment Support |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (17) |
|
|
326 | (1) |
|
16.4.2 The Medical Devices Directive |
|
|
327 | (3) |
|
16.4.3 The Medical Devices Regulations |
|
|
330 | (5) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (2) |
|
16.4.6.1 ISO/IEC 62366-1: 2015 Medical Devices - Part 1: Application of Usability Engineering to Medical Devices |
|
|
341 | (1) |
|
16.4.6.2 ISO 14971:2012 Application of Risk Management to Medical Devices |
|
|
341 | (1) |
|
16.4.6.3 IEC 62304:2006/Al:2015 Medical Device Software - Lifecycle Processes |
|
|
341 | (1) |
|
16.4.6.4 ISO 13485: 2016 Medical Devices - Quality Management Systems - Requirements for Regulatory Purposes |
|
|
342 | (1) |
|
|
342 | (1) |
|
16.4.8 Standards and Guidelines Issued by Professional Bodies |
|
|
343 | (1) |
|
|
343 | (6) |
|
|
344 | (2) |
|
|
346 | (3) |
|
Chapter 17 Project Management |
|
|
349 | (16) |
|
|
349 | (1) |
|
|
350 | (2) |
|
17.3 Keeping It Going - Managing the Project |
|
|
352 | (1) |
|
17.4 Stopping (The Hard Bit) |
|
|
352 | (4) |
|
|
356 | (1) |
|
17.6 Team Management (Personnel and Technical) |
|
|
356 | (1) |
|
17.7 Project Planning (Resource and Technical) |
|
|
357 | (3) |
|
17.7.1 Quantifying the Resource Requirements: Labour |
|
|
359 | (1) |
|
17.7.2 Constructing a Resource Schedule |
|
|
360 | (1) |
|
17.8 Education and Training |
|
|
360 | (1) |
|
|
361 | (4) |
|
17.9.1 Tactical versus Strategic Purchasing Decisions |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (2) |
|
|
365 | (10) |
|
|
365 | (1) |
|
18.2 The Purpose of a Safety Case |
|
|
365 | (1) |
|
18.3 The Structure of a Safety Case |
|
|
366 | (3) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
18.4 Implementation of a Safety Case |
|
|
369 | (1) |
|
18.5 Design for Assessment |
|
|
370 | (1) |
|
18.6 The Safety Case Lifecycle |
|
|
370 | (1) |
|
18.7 The Contents of a Safety Case |
|
|
370 | (1) |
|
|
371 | (4) |
|
18.8.1 The Therac-25 Incident |
|
|
372 | (2) |
|
|
374 | (1) |
|
|
374 | (1) |
|
Chapter 19 Critical Path Analysis |
|
|
375 | (6) |
|
|
375 | (1) |
|
|
375 | (2) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (2) |
|
|
379 | (2) |
Appendix |
|
381 | (1) |
List of Abbreviations |
|
381 | (6) |
Index |
|
387 | |