HL7 in chapter II (Control) defines some basic concepts as follows
1.trigger Events
The Standard is written from the assumption, the real world of healthcareCreates the need for data to flow among systems. The Real-world event is called theTrigger event. For example, the trigger event a patient be admitted may cause the need forData about that, patient to is sent to a number of the other systems. The trigger event, anobservation (e.g., a CBC result) f
V2: http://hl7book.net/index.php? Title = hl7_version_2Including HL7 introduction, main chapters, changes to each version, HL7 libraries implemented in various languages, free HL7 tools, the latest XML schema, Implementation Guide, Ihe related chapters (pix ), and HL7 related blogs.
The goal of the HL7 engine is to standardize data according to the requirements of the HL7 protocol, integrate standard businesses, and synchronize standard business data between different systems. During years of hospital informatization, HL7 Standard Organization and resolution are the most complicated. The following
Original link http://blog.csdn.net/ycyangcai/article/details/6643784The goal of the Hl7 engine is primarily to address the standardization of data in accordance with the requirements of the HL7 protocol, the integration of standard services and the synchronization of standard business data between different systems. In the years of hospital informatization proces
The goal of the HL7 engine is to standardize data according to the requirements of the HL7 protocol, integrate standard businesses, and synchronize standard business data between different systems. During the Informatization Process of the hospital integration platform for many years, the HL7 standard organization and
Recently, some tools are required for the development of the PIX project, such as the test tools for each actor of the PIX and the HL7 message verification tools.Which of the following can I find?
Required tools. 1. http://hit-testing.nist.gov: 8080/connectathon-pixpdq/***** this website is mainly for the validation of PIX and PDQ messages, for example you can choose profile to pix, testcase to query, the website will have two input boxes: Query and r
Summary
This whitepaper contains 2 use case descriptions. each Use Case cocould be supported by either the HL7 v2.x or the HL7 V3 messaging standard. each example use case has two example messages associated with it: A HL7 v2.x message, and its functional equivalent in V3. the whitepaper aims to show some of the differences as well as similarities between exampl
Clinical documents can be revised and can be appended to existing documents. In theory, an updated document should declare that it has been deprecated, It should include a clear pointer to the new version of the document. This reduces errors or data integrity of medical service providers based on treatment decisions.
However, in practice, it is impossible to ensure a clear forward pointer from an expired version to a new version. There is no trace queue that can be traced about the st
2. Telnet protocolThe Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main way of Internet remote Login service. It provides users with the ability to perform remote host work on the local computer. Use a Telnet program (such as Putty) on the end user's computer to connect to the server. End users can enter commands in t
http://blog.csdn.net/heanyu/article/details/6202500
RTP (Real time Transport Protocol)
RTP is a transport protocol for multimedia traffic on the Internet that is published by the IETF (Internet Engineering Task Force) as RFC1889 . RTP is defined as a one-to-many transmission, with the purpose of providing time information and implementing stream synchronization. Typical applications for RTP are built on U
RTP (Real Time Transport Protocol)
RTP is a transmission protocol for multimedia data streams over the Internet.Rfc1889Release. RTP is defined to work during one-to-one or one-to-many transmission. It aims to provide time information and implement stream synchronization. Typical RTP applications are built on UDP, but can also work on TCP, ATM, and other protocols. RTP itself only guarantees the transmissio
The IP protocol is the most important protocol in the family of TCP/IP protocols, which provides unreliable, non-connected datagram transport services. So understanding IP protocols is critical to our learning network.IP headerImportant Field Introduction:4bit First ministerial degree: in 4 bytes, determines the IP head of the largest minister of 15*4=60, the general IP datagram header length of 20, at this
Label:IMAP (Internet Mail access protocol,internet) is formerly known as the Interactive Mail Access Protocol (Interactive mail, Access Protocol). IMAP was an email acquisition protocol developed by Stanford University in 1986. Its main role is that the mail client (for example, Ms Outlook Express) can obtain mail info
Both TCP and UDP are port-based protocols. TCP has links, and UDP has no links. The TCP protocol also drops packets (network problems, the data may be gone)The application is sent to the operating system's cache, and the operating system is removed from the cache, and once the data is lost, it is completely gone. TCP is reliable because the data in its own cache is emptied after it receives a confirmation message.How UDP works I took it out of my own
Commands and responses to the SMTP protocol
From the previous communication model, you can see that the SMTP protocol's session between sending SMTP and receiving SMTP is done by sending SMTP commands and receiving an answer to SMTP feedback. After the communication link is established, Send SMTP send mail command message sender, if receive SMTP at this time can receive mail then make OK answer, and then send SMTP continue to Issue RCPT command to con
Software download for analysis: Wireshark-win32-1.10.2.exeRead the guided Tour1. Analyze and apply the ARP protocol2. Analyzing IP Protocols3. Analyzing the ICMP protocol1. Analysis of the format and content of ARP messages(1) The ARP request message of ping 172.18.3.132:000108000604000100e04c512ae8ac12038e000000000000ac120384Physical network Type hardware type:0001-ethernet (1)Protocol type Protocol TYPE:0
Let's look at what happens when we enter http://www.mycompany.com:8080/mydir/index.htmlin the browser, behind the scenes.First HTTP is an application layer of protocol, in this layer of protocol, is just a communication specification, that is, because the two sides to communicate, we have to agree to a specification beforehand.1. Connection when we enter such a request, first to establish a socket connectio
Transfer http://blog.csdn.net/goodboy1881/article/details/668556
------------------------------------------------------
Put the three Protocols together for learning because these three protocols are on the same layer. ARP is used to find the MAC address of the Ethernet NIC of the target host, and the IP address carries the message to be sent. The data link layer can get the data transmission information from ARP, and get the data information to be transmitted from the IP address.1. IP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.