Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 116

Research Paper | Information Technology | Indonesia | Volume 6 Issue 8, August 2017

Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM

Handy Lala, Puguh Yudho Trisnanto, Adil Candra

Cyclomatic Complexity Test Result and Probability of Improvement of Patient Registration of IGD in Wava Husada Hospital [1]. Patient Registration Flowmap 21 cc IGD generate value to the type of procedure that is complex and critical, high-risk level system, with a probability value improvement of 20%, improvement in the level of risk higher recommended. [2]. Flowmap Medical Examination Unit 9 cc generate value to the type of procedure that tersetrukutr and stable, low-risk level system, with a probability value improvement of 5%, the risk level that's recommended repairs easier, [3]. Flowmap Unit Billing produces 3 cc values with simple procedure type, low system risk level, with a probability value of 5% improvement, the recommended risk level is easy. Total value of cc produced 33 cc with complex and critical procedure with high risk level, and probability value of improvement yielded 40% with recommendation of improvement of complex system. [1]. Patient Registration Flowmap 21 cc IGD generate value to the type of procedure that is complex and critical, high-risk level system, with a probability value improvement of 20%, improvement in the level of risk higher recommended. Being a system improvement process that must be done using Model Reflective improvement SEM test, to determine the inter-relationship with the node node and a probability value of the node system improvements that are fixed with reflective construct models. Therefore there is no problem of convergent validity on the model we tested, discriminant latent exogenous cc (0.693) and latent endogenous ? (0481) of the results can be seen that the system Flowgraph Registration of patients IGD RSU Wava husada have a level of discriminant strong (0.693) against latent Endogenous Probability of R? improvement (0.481)

Keywords: Cyclomatic Complexity, test case, SOP, SEM, Flowgraph matrix, node, relation weight, Flowmap, Data Flow Average

Edition: Volume 6 Issue 8, August 2017

Pages: 1983 - 1987

Share this Article

How to Cite this Article?

Handy Lala, Puguh Yudho Trisnanto, Adil Candra, "Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176323, Volume 6 Issue 8, August 2017, 1983 - 1987

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'test case'

Downloads: 101

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Downloads: 116

Research Paper, Information Technology, Indonesia, Volume 6 Issue 8, August 2017

Pages: 1983 - 1987

Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM

Handy Lala, Puguh Yudho Trisnanto, Adil Candra

Share this Article

Similar Articles with Keyword 'SOP'

Downloads: 116

Research Paper, Information Technology, Indonesia, Volume 6 Issue 8, August 2017

Pages: 1983 - 1987

Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM

Handy Lala, Puguh Yudho Trisnanto, Adil Candra

Share this Article

Downloads: 127

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Downloads: 148 | Monthly Hits: ⮙13

Informative Article, Information Technology, Ethiopia, Volume 2 Issue 11, November 2013

Pages: 227 - 234

Marketing Library and Information Services

Prakash Dongardive

Share this Article

Downloads: 180

Research Paper, Information Technology, Kenya, Volume 5 Issue 12, December 2016

Pages: 162 - 166

Factors Affecting Adoption of Information Security Management Systems: A Theoretical Review

CPA. Philip K. Kiilu, Dr. David M. Nzuki

Share this Article

Similar Articles with Keyword 'SEM'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 103

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

Downloads: 104

Research Paper, Information Technology, India, Volume 2 Issue 4, April 2013

Pages: 548 - 550

Role of ICT in Sustainability of Research: A Conceptual Framework

Geeta Marmat

Share this Article

Downloads: 105

Research Proposals or Synopsis, Information Technology, Namibia, Volume 6 Issue 11, November 2017

Pages: 1316 - 1321

Investigating the Use of Social Media as a Learning and Teaching Tool in Higher Education Institutions of Namibia

Ndasilwohenda Tuyenikelago Ndilinawa, Nomusa Dlodlo, Jude Osakwe

Share this Article

Downloads: 107

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1051 - 1055

Enhancing the Protection scheme for FACTS-Based Transmission Lines using a Data Mining Model

Pallavi P. Wankhede, Rajesh K. Nasare

Share this Article

Similar Articles with Keyword 'node'

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2230 - 2233

A Control Mechanism for Enforcing Inference Usability of XML Documents

Smita Chaudhari, Rakesh Rajani

Share this Article

Downloads: 108

Survey Paper, Information Technology, India, Volume 6 Issue 8, August 2017

Pages: 2249 - 2253

A Literature Review on Parameters based MANET Routing Protocols

K. Sandhya, Dr. B. Indira

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 825 - 828

An Efficient Rushing Attack Prevention Algorithm for MANET Using Random Route Selection

Aakanksha Jain, Samidha Dwivedi Sharma

Share this Article

Downloads: 110

Research Paper, Information Technology, China, Volume 5 Issue 2, February 2016

Pages: 1855 - 1858

Bandwidth Utilization Optimization on Agent Based CR Networks

Aladje Umaro Balde, Cui Lin

Share this Article



Top