Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

David uses the NHIN subject and data locator services offered in his EMR to discover that Joe has EKG data at Hospital B using a machine that is appropriate for evaluation by his new knowledge module. He makes a request to be given permission to evaluate the EKG data using his own local signal averaging criteria. Upon receiving authorization, DDSS A sends DDSS B the knowledge module. DDSS B then executes the rule, generates the result, logs the activity, and returns the requested evaluation back to DDSS A which then displays the results. David then concludes that Joe does indeed show evidence of conduction abnormalities and signs off on the recommendation for a treadmill evaluation placed in the system by DDSS A.

Actors: Physician (David), Patient (Joe)

Requirements:

 


Requirement

...

#  

Description

1.11.1The System will publish the metadata required to discover and invoke services.

1.11.2

The System will publish the metadata required to describe operational constraints for the knowledge modules.

1.11.3

The System shall enable one DDSS host to invoke rules and / or workflows on other remote DDSS hosts.

1.11.4The System shall be designed to operate from a central data center.
1.11.5The System shall provide services for replication of rules and workflow repositories to all nodes in the network as appropriate.