Chapter One: 1.1 Background Information
Chapter One: 1.1 Background Information
Chapter One: 1.1 Background Information
1.0 INTRODUCTION
1.1 BACKGROUND INFORMATION
According to Wikipedia a hospital is an institution for health care that provides patient
treatment by specialized staff and equipment. Usually, hospitals are funded by the public
sector, by health organizations (for profit or nonprofit), health insurance companies or
charities, including funds by direct charitable donations. Historically, however, hospitals
were often founded and funded by religious orders or charitable individuals and leaders.
Modern-day hospitals are largely staffed by professional physicians, surgeons, and nurses.
Various operational works are done in a hospital; all these works are done manually using
papers as follows:
i. Recording information about the patients that visit a hospital for treatment.
ii. Generating bills.
iii. Recording information related to diagnosis given to patients.
iv. Keeping record of the Immunization provided to children/patients.
v. Keeping information about various diseases and medicines available to cure them.
These are the various jobs that are done in a hospital by the operational staff and doctors;
information about patients is recorded manually by just writing the patients name, age and
gender. Whenever the patient visits, his information is stored again;
i. Bills are generated by recording price for each service provided to patient on a
separate sheet and at last they all are summed up.
1
ii. Diagnosis information to patients is generally recorded on the document, which
contains patient information. It is destroyed after some time to decrease the paper
load in the office.
iii. Immunization records of children are maintained in pre-formatted sheets, which are
kept in a file.
iv. Information about various diseases is not kept as any document. Doctors themselves
do this job by remembering various medicines.
v. All this work is done manually by the receptionist and other operational staff and
lots of papers are needed to be handled and taken care of. Doctors have to remember
various medicines available for diagnosis and sometimes miss better alternatives as
they can’t remember them at that time.
Error prone manual calculation: - Manual calculations are error prone and takes a lot of
time, this may result in incorrect information. For example, calculation of patient’s bill
based on various treatments.
Preparation of accurate and prompt reports: - This becomes a difficult task as business
intelligence is difficult, this is due to lack of information collation (ability to put
information together and analyze them).
Planned approach towards work: - The activities in the organization will be well planned
and organized. The data will be stored properly in data stores, which will help in retrieval of
information and in enforcing security.
2
Accuracy: - The level of accuracy in the proposed automated system will be higher. All
operations would be done correctly and accurately. In practice, errors are not completely
eliminated, they are reduced.
Reliability: - The reliability of the proposed system will be high as information is stored
properly and securely.
No Redundancy: - In the proposed system utmost care would be taken to ensure that no
information is repeated anywhere, in storage. This would assure economic use of storage
space and consistency in the data stored.
Easy to Operate: - The system should be easy to operate and should be such that it can be
developed within a short period of time and fit the limited budget of the user.
The hospital management system is capable of supporting any number of staff of the
hospital and each module of the package runs independently without affecting other
modules. This means that all departments of the hospital working independently and it
cover complete cycle from seven modules which are:-
1.7.1 PATIENT
This module deals with registering of new patients, for either OPD (Out-patient department)
or IPD (In-patient department) and issuing unique identification numbers to the patients.
These numbers are unique throughout the system. A patient is first registered at the OPD
front office. If eventually the patient is admitted, the same number issued. The IPD/ OPD
identification number is used for tracking the medical records of the patient for any OPD
visitor IPD admission. All medical records of this patient are identified by this number. The
number helps in a flexible searching finding the patient records. This number is assigned to
the patient together with a patient card. The number will be used to track the patient record
and medical history throughout the lifecycle of the patent medical section.
1.7.2 NURSE
A nurse’s work bench is a work platform provided for use by intermediate nurses (auxiliary
nurses) to assist in taking patients preliminary examination, accessing current health
condition, managing appointment queue and waiting list .Preliminary examination involves
taking temperature reading, blood pressure, height and weight of the patient. The features
are:-
i. Waiting list
ii. Referrals
iii. Pre–examination
iv. Bill payment
4
1.7.3 DOCTOR
This is a special diagnostic plat-form for doctors. Through the doctor’s workbench, doctors
can perform various tasks such as:
1.7.5 PHARMACY
This module maintains the data related to the servicing of the in-patient and out-patient of
the pharmacy department. It is more of drug order dispensary administration, billing and
reporting system.
1.7.6 ADMIN
This is the main administration plat form used by the Chief Medical Director (CMD),
hospital admin, hospital secretary, account and any other authorized personnel in the
hospital to monitor overall activities of all the modules.
1.7.7 ACCOUNTANT
This module is for monitoring payments and billing. The entire billing system for the
patient will automatically be created. It includes all kinds of expenses made by the patient.
When the patient is discharged, the entire bill will be generated automatically. The bill will
5
contain all the expenses, which should be charged to the patient for the period for which he
/ she were admitted in the hospital.
But also it cover or based in web-based client and multi-platform system. It requires no
modular installation and sits in any computer architecture.
6
CHAPTER TWO
LITERATURE REVIEW
2.1 CLASSIFICATION OF HOSPITAL.
The ministry of health and social welfare distinguish hospital by their ownership, scope of
services, and whether they are teaching hospitals with academic affiliations. Hospitals may
be operated as proprietary (for-profit) businesses, owned either by corporations or
individuals such as the physicians or they may be voluntary-owned by non-profit
corporations, religious organizations, or operated by federal, state, or city governments.
Voluntary and non-profit hospitals are usually governed by a board of trustees, selected
from among community business and civic leaders, who serve without pay to oversee
hospital operations.
MEANING OF HOSPITAL
is a health care institution providing patient treatment with specialized staff and equipment.
Hospitals are usually funded by the public sector, by health organizations (for profit or
nonprofit), by health insurance companies, or by charities, including direct charitable
donations. Historically, hospitals were often founded and funded by religious orders or
charitable individuals and leaders.
Today, hospitals are largely staffed by professional physicians, surgeons, and nurses,
whereas in the past, this work was usually performed by the founding religious orders or by
volunteers.
ADVANTAGES OF HOSPITAL
i. Improve patient safety and satisfaction through the immediate availability of specialists
in the management of high-risk obstetric encounters and emergencies.
ii. Prevent the loss of physicians and delivery volume (knowing that a loss of obstetric
volume will most likely be associated with a loss in elective surgery volume).
iii. Retain transports (which increase patient satisfaction and revenue).
7
iv. Increase market share by reaching out to physicians who are splitting deliveries with
their competition or who are exclusive with their competition.
v. Increase market share by reaching out to family practitioners, mid-level providers and
clinics.
vi. Grow their high-risk service and become known as the leader in obstetrics for their
market.
vii. Foster the relationship with obstetric patients so that they choose the hospital for their
other healthcare needs (and those of their families).
DISADVANTAGES OF HOSPITAL
i. Its too expensive. People who are low in income will have greater burden of
medical fees than those with high income. For example Private hospital
ii. No proper treatment. For example Public hospital
iii. No hygiene. For example Public hospital
iv. Doctors are not available on time. For example Public hospital
v. Hospitals are always messed up. For example Public hospital
vi. No vacancies for emergency cases. For example Public hospital
vii. No proper cure and worried about allergies and side effects. For example Public
hospital
CHARACTERISTIC OF HOSPITAL
Hospitals will rely heavily on data mining and analytics to guide care. The healthcare
community is pushing to make big data actionable, including through the use of
predictive medicine. "You need to be able to handle the patient in a seamless way. If
you're going to do that, you have to have clinical information systems that are very
effective," said Michael Blaszyk, CFO of Dignity Health, Becker's reported. In Atlanta,
doctors at Emory University Hospital are using health IT to combine data collected by
multiple machines used in critical care into a single report that provides a
comprehensive picture of the patient's condition, Fierce Health IT previously reported.
8
ii. Make prices transparent
With patients shouldering more of cost burden of care, it is essential for hospitals to
make their pricing available for customers, said Toby Cosgrove, M.D., president and
CEO of the Cleveland Clinic, according to the article.
Hospitals must provide efficient, coordinated care that focus on the patient in order to
take on risk. "If you're going to take risk, you have to have a seamless integrated system
that is all around the patient," Blaszyk said.
With a growing demand for comprehensive healthcare and a physician population that
isn't growing as fast as America needs, Henderson said hospitals must give non-physician
caregivers the ability to work at the top of their license. Hospitals that embrace teamwork
also could help prevent medical errors, encourage reciprocal communication and reduces
errors, Fierce Healthcare previously reported.
i. Dar-es-Salaam(Muhimbuli)
ii. Mwanza(Bugando)
iii. Moshi(KCMC)
9
2.1.3 DISTRICT HOSPITAL
one bed per 1000 inhabitants, 2-4 doctors, Medical Assistant, there is no special
departments,
1 District: Population from 100,000-200,000.
2.1.5 DISPENSARY
One Dispensary per 10,000 inhabitants. Medical assistant, curative and preventive work,
nurses, release and delivery services, vaccination, mother-child-services. Private
dispensaries can be registered and recognized by state if they have a doctor or an assistant
medical officer.
10
clinic or to see a consultant in the same hospital. For example he/she may be referred for
radiology services (CT scan, MRI, and ultrasound) or to special services like dental care.
There may also be possibilities for surgical services. The inpatient may recover fully and be
discharged or die and will be given a death report. The purpose of the hospital management
system is to automate the system for storage and easy retrieval of data, flow of information
and management of hospital.
SYSTEM
TYPES OF SYSTEM
On the other hand, physical systems are generally concrete operational systems made up of
people, materials, machines, energy and other physical things; Physical systems are more
than conceptual constructs.
A deterministic system is one in which the occurrence of all events is known with certainty.
A probabilistic system is one in which the occurrence of events cannot be perfectly
predicted. Though the behavior of such a system can be described in terms of probability, a
certain degree of error is always attached to the prediction of the behavior of the system.
An open system is one that interacts with its environment and thus exchanges information,
material, or energy with the environment, including random and undefined inputs. Open
11
systems are adaptive in nature, as they tend to react with the environment in such a way, so
as to favor their continued existence. Such systems are ‘self ,are organizing’, in the sense
that they change their organization in response to changing conditions.
A closed system is one, which does not interact with its environment. Such systems in
business world are rare, but relatively closed systems are common. Thus, the systems that
are relatively isolated from the environment but not completely closed, are termed closed
system.
Most of the physical systems are user-machine (or human –machines) systems It is difficult
to think of a system composed only of people who do not utilize equipment of some kind to
achieve their goals. In user-machine systems, both, i.e. human as well as machine perform
some activities in the accomplishment of a goal (e.g. decision-making). The machine
elements (may be computer hardware and software) are relatively closed and deterministic,
whereas the human elements of the system are open and probabilistic.
COMPONENTS OF A SYSTEM
Input elements
The information entered into a system. For instance raw data input to the computer system.
Process
Any specific treatment defined in the system to be performed on the data entered into the
system, for instance, computation, analysis, application of any model.
Output elements
The results given by the system after the process has been performed on the data being
input to the system.
Control mechanism
Every system is expected to generate some sort of standardized output. Hence actual output
needs to be compared with what it is supposed to generate. This comparison of actual with
expected output is done with the help of control mechanism.
12
Feedback system
Once the control mechanism has been devised, it needs to a reporting mechanism, which
should respond with a corrective action, if required.
Objectives
We just mentioned that a control mechanism should compare actual output with
expected/Ideal output.
But before this is being done, there needs to be a list of specific objectives which define
expected output.
Environment
The environment is the “supra-system” within which an organization operates. It is the
source of external elements that impinge on the system. In fact, it often determines how a
system must function.
Boundaries and Interfaces
A system should be defined by its boundaries- the limits that identify its components,
Processes, and interrelationships when it interfaces with another system.
CHARACTERISTICS OF A SYSTEM
Organization
It implies structure and order. It is the arrangement of components that helps to achieve
objectives.
Interaction
It refers to the manner in which each component functions with other components of the
system.
Interdependence
It means that parts of the organization or computer system depend on one another. They are
coordinated and linked together according to a plan. One subsystem depends on the output
of another subsystem for proper functioning.
Integration
It refers to the holism of systems. It is concerned with how a system is tied together.
Central Objective
A system should have a central objective. Objectives may be real or stated. Although a
stated objective may be the real objective, it is not uncommon for an organization to state
one objective and operate to achieve another. The important point is that users must know
13
the central objective of a computer application early in the analysis for a successful design
and conversion.
ADVANTAGES OF A SYSTEM
i. It reduces the cost and administrative workload associated with the issuance and
custody of beneficial certificates
ii. It executes administrative procedures promptly—for example, it used to take a
number of days to have the beneficial certificates issued after the purchase, but
under this System, the rights are recorded in the transfer account book on the day of
the purchase
iii. It eliminates the risk of loss, theft, forgery,
Our team conducted a survey to classify evaluation studies of information systems in health
care. The primary objective was to get an insight into the various systems applied. In all 8
studies survey conducted for all hospitals with manual system and automated systems
where included in the review.
14
The hospitals are:
The purpose of this survey was to analyze evaluation studies of inpatient and outpatient
patient care information systems requiring data entry and data retrieval by health care
professionals as witnessed at different healthcare institution, to determine the attributes that
were used to assess the success of these systems and to categorize these attributes.
MANAGEMENT SYSTEM
i. The total cost of ownership, which emphasizes that updating and servicing
equipment is likely to be a major cost
ii. The right balance of resources and control between centrally-managed and network-
distributed systems
iii. The outsourcing of all or part of information systems and systems management
iv. Tactical versus strategic purchasing decisions
v. The choices between proprietary, compatible, and Open Source software
15
vi. Exploitation of the Internet and Web interfaces
vii. Graphical user interfaces for controlling the information system
viii. Security management, including security for mobile device users
POWERWEB is used by various hospital including Hindu Mandal where we conducted our
survey, it have the following features.
Features:
16
2.3.2 CARE2X
CARE2x is designed to overcome integration problems in a network of multiple
incompatible programs. It can integrate almost any type of service, system, department,
clinic, process, data, communication, etc. in a hospital. Its design can also handle non-
medical services or functions such as security and maintenance. It is modular and highly
scalable. This system is used in Tanzania at Mount Meru hospital in Arusha
CARE2x uses a standard SQL database format for storing and retrieving data. The use of a
single data format solves the problem of data redundancy. It can be configured to support
multiple database configurations to enhance data security and integrity.
Features
2.3.3 HIMS
HIMS (Hospital Information Management System) This have several management systems
each for different operations doctors, accountants, human restores, procurements, lab and
reception have separate systems which are not integrated together. The system is mainly
and only used at Agha Khan Hospital. The doctors have to log in to several systems to carry
out required task. The system are;
i. POE-Physician order entry- This system operate between the physician and the
pharmacy. POE have a database for all the medicines where prescription of doses to
patient is carried out. A doctor prescribe a dose and a patient can collect the doses
from the pharmacy window without carrying prescription paper
17
ii. CLINICIAN WORKBENCH- This operate between the physician and the ward
where the overall routine checkup rounds data of a patient are filled in.
iii. PCS LAB- the give out lab result from the lab technician to the doctor
They also have separate system for accounts, billing, and procurement. This system
are not integrated together and the use different database
2.3.4 INAYA
Like many other hospitals management system this system have automated some but not all
operations carried out, INAYA is used by London hospital to automate its daily operations
It have the following features;
i. Doctor- where a doctor can see patient information, vitals, lab result, list of
medicine, past record.
ii. Lab- this is where the lab result are filled in and the list of lab check up to be done
on a patient is viewed
iii. Nurse- all the vitals are been recorded here
iv. Reception- payment information, insurance information and patient record are kept
v. DOA- Ward, Admission, Vitals, Bed Charges, Billing
iv. Doctors: Patients' Waiting List, Examination with over 250 Fields, Past Diagnosis,
Patients' Past Report.
18
vii. Pharmacy: Products, Suppliers ,Customer Order, Supplier Payments, Daily
Summary, Expiry Items Report
19
CHAPTER THREE
APPROACH DEVELOPMENTS
3.0 OVERVIEW
The system analysis and specification encompasses those tasks that determine the needs or
conditions to be met for a new product, taking into account the possible conflicting
requirements of the various stakeholders such as beneficiaries or users. A methodology is a
complete description of the behavior and procedures of the system to be developed. It
includes a set of used cases that describe all the interactions that the users will have with the
software. it also analyses the type of technology to be used.
3.1 METHODOLOGIES
A system of broad principles or rules from which specific methods or procedures may be
derived to interpret or solve different problems within the scope of a particular discipline.
Unlike an algorithm, a methodology is not a formula but a set of practices.
Software engineering is carry out of using preferred procedure techniques to progress the
quality of a software development effort. A methodology is defined as a collection of
procedures, techniques, tools, and documentation aids which will help developers in their
efforts (both product and process related activities) to implement a new system. For
successful implementation, a well-organized and systematic approach is crucial. Therefore,
several methodologies were developed to encourage the systematic approach to planning,
analysis, design, testing and implementation. Methodologies offer various tools and
techniques to assist in analysis, design and testing in terms of detailed design of
software, data flowcharts and database design. Why use the methodologies
i. To complete a project within time and budget with the expected scope and quality
we need methodologies which provide for a framework.
ii. Most methodologies have a general planning, developing and managing stages in
common. They suggest the development team the ways of thinking, learning and
arriving at a regular feasible solution.
20
i. Functional Decomposition: The methodology should have stages according to the
interrelated activities which can be grouped into different functional areas.
iii. Manage Risks: Determined the risk is an important activity to develop a project.
vi. Analysis and Design Support: A well-defined structure of the methodology helps for
analysis and designing to development process..
viii. Testing Support: More testing, more reliable the product is.
ix. Object Oriented Approach: Object oriented concepts will be used in developing the
project as it supports component reusability.
21
Figure 1: Waterfall-model
The requirement specifications from first phase are studied in this phase and
system design is prepared. System Design helps in specifying hardware and
system requirements and also helps in defining overall system architecture.
22
iii. Implementation
With inputs from system design, the system is first developed in small programs
called units, which are integrated in the next phase. Each unit is developed and
tested for its functionality which is referred to as Unit Testing.
Once the functional and non-functional testing is done, the product is deployed in the
customer environment or released into the market.
vi. Maintenance
There are some issues which come up in the client environment. To fix those issues patches
are released. Also to enhance the product some better versions are released. Maintenance is
done to deliver these changes in the customer environment.
i. Once an application is in the testing stage, it is very difficult to go back and change
something that was not well-thought out in the concept stage.
23
ii. No working software is produced until late during the life cycle.
iii. High amounts of risk and uncertainty.
iv. Not a good model for complex and object-oriented projects.
v. Poor model for long and ongoing projects.
vi. Not suitable for the projects where requirements are at a moderate to high risk of
changing.
i. This model is used only when the requirements are very well known, clear and
fixed.
ii. Product definition is stable.
iii. Technology is understood.
iv. There are no ambiguous requirements
v. Ample resources with required expertise are available freely
vi. The project is short.
Very less customer enter action is involved during the development of the product. Once
the product is ready then only it can be deemed to the end users. Once the product is
developed and if any failure occurs then the cost of fixing such issues are very high,
because we need to update everywhere from document till the logic.
24
Figure 2; Diagram of Incremental model
Requirement
i. Generates working software quickly and early during the software life cycle.
ii. This model is more flexible – less costly to change scope and requirements.
iii. It is easier to test and debug during a smaller iteration.
iv. In this model customer can respond to each built.
v. Lowers initial delivery cost.
vi. Easier to manage risk because risky pieces are identified and handled during it’d
iteration.
25
When to use the Incremental model:
i. This model can be used when the requirements of the complete system are clearly
defined and understood.
ii. Major requirements must be defined; however, some details can evolve with time.
iii. There is a need to get a product to the market early.
iv. A new technology is being used
v. Resources with needed skill set are not available
vi. There are some high risk features and goals.
vii. Project is for development of a mainframe-based or transaction-oriented batch system.
xii. Project requirements are stable or unchanging during the system development life cycle.
i. Large projects where the requirements are not well understood or are changing for any
reasons such as external changes, changing expectations, budget changes or rapidly
26
3.1.3PROTOTYPING MODEL
The basic idea here is that instead of freezing the requirements before a design or coding
can proceed, a throwaway prototype is built to understand the requirements. This prototype
is developed based on the currently known requirements. By using this prototype, the client
can get an “actual feel” of the system, since the interactions with prototype can enable the
client to better understand the requirements of the desired system. Prototyping is an
attractive idea for complicated and large systems for which there is no manual process or
existing system to help determining the requirements. The prototype are usually not
complete systems and many of the details are not built in the prototype. The goal is to
provide a system with overall functionality.
PHASES OF PROTOTYPING
27
v. Refining prototype
Once the user evaluates the prototype and if he is not satisfied, the current prototype is
refined according to the requirements. That is, a new prototype is developed with the
additional information provided by the user. The new prototype is evaluated just like the
previous prototype. This process continues until all the requirements specified by the user
are met. Once the user is satisfied with the developed prototype, a final system is developed
on the basis of the final prototype.
28
vi. Confusing or difficult functions can be identified
Requirements validation, Quick implementation of, incomplete, but
functional, application.
i. Prototype model should be used when the desired system needs to have a lot of
interaction with the end users.
ii. Typically, online systems, web interfaces have a very high amount of interaction
with end users, are best suited for Prototype model. It might take a while for a
system to be built that allows ease of use and needs minimal training for the end
user.
iii. Prototyping ensures that the end users constantly work with the system and provide
a feedback which is incorporated in the prototype to result in a useable system. They
are excellent for designing good human computer interface systems.
29
Figure no: 4
i. Planning Phase
Requirement are gathered during planning phase. Requirements like ‘BRS’ that is
‘Business Requirement Specifications’ and ‘SRS’ that is ‘System Requirement
specifications’.
ii. Risk Analysis
In the risk analysis phase, a process is undertaken to identify risk and alternate
solutions. A prototype is produced at the end of the risk analysis phase. If any risk
is found during the risk analysis then alternate solutions are suggested and
implemented.
iii. Engineering Phase
In this phase software is developed, along with testing at the end of the phase.
Hence in this phase the development and testing is done.
iv. Evaluation phase
This phase allows the customer to evaluate the output of the project to date before
the project continues to the next spiral.
30
Advantages of Spiral model:
3.1.5 AGILE
Agile model believes that every project needs to be handled differently and the existing
methods need to be tailored to best suit the project requirements. In agile the tasks are
divided to time boxes (small time frames) to deliver specific features for a release. Iterative
approach is taken and working software build is delivered after each iteration. Each build is
incremental in terms of features; the final build holds all the features required by the
customer.
31
i. Individuals and interactions - in agile development, self-organization and
motivation are important, as are interactions like co-location and pair programming.
ii. Working software - Demo working software is considered the best means of
communication with the customer to understand their requirement, instead of just
depending on documentation.
Advantages
vii. Enables concurrent development and delivery within an overall planned context.
Disadvantages
32
v. There is very high individual dependency, since there is minimum documentation
generated.
Figure no: 5
i. This model can be used when the requirements of the complete system are clearly
defined and understood.
ii. Major requirements are defined; however, some details can evolve with time.
iii. It help to get a product to the market early.
iv. A new technology is being used
v. When resources with needed skill set are not available
33
vi. Having some high risk features and goals.
vii. Project is for development of a mainframe-based or transaction-oriented batch system.
3.2.1BACK END
Is the application or program serves indirectly in support of the front-end services, usually
by being closer to the required resource or having the capability to communicate with the
required resource. The back-end application may interact directly with the front-end or,
perhaps more typically, is a program called from an intermediate program that mediates
front-end and back-end activities.
34
In a summarized way it could be concluded that SQL becomes the query engine
that resides over the database engine having been designed on the client-server
Approach and provided retrieval of data as well as operation on RDBMS. By
the Application package and web pages.
Is a server-side scripting language designed for web development but also used as a
general-purpose programming language. PHP code may be embedded into HTML code, or
it can be used in combination with various web template systems, web content management
system and web frameworks. PHP code is usually processed by a PHP interpreter
implemented as a module in the web server or as a Common Gateway Interface (CGI)
executable. The web server combines the results of the interpreted and executed PHP code,
which may be any type of data, including images, with the generated web page. PHP code
may also be executed with a command-line interface (CLI) and can be used to implement
stand alone graphical applications.
The UML is an international industry standard graphical notation for describing software
analysis and designs. When a standardized notation is used, there is little room for
misinterpretation and ambiguity. Therefore, standardization provides for efficient
communication (a.k.a. “a picture is worth a thousand words”) and leads to fewer errors
caused by misunderstanding. The different diagram can be drawing by using this tool such
as use case diagram, Flow chart diagram, Sequence diagram, Class diagram, Entity
relationship diagram(ERD),State diagram, Activity diagram and Object diagram.
35
CHAPTER 4
REQUIREMENT ANALYSIS
4.0 OVERVIEW
Requirements analysis is critical to the success of a development project. Requirements
must be documented, actionable, measurable, testable, related to identified business needs
or opportunities, and defined to a level of detail sufficient for system design. Requirements
can be architectural, structural, behavioral, functional, and non-functional.
An analysis and full description of the existing system should lead to a full specification of
the users’ requirement. This requirement specification can be examined and approved
before the system design is embarked upon. In recent times, greater emphasis has been
placed upon this stage because of former experience of designers who failed to meet
requirements. The earlier in a system life cycle that a mistake is discovered, the less costly
it is to correct. Hence, the need for requirement specification is very clear. We are going to
start with the analysis of the existing manual system under the following heading: data
collection, data storage, data communication and manipulation, data security and system
cost.
i.Correct
ii.Traceable (both forward and backward to prior/future artifacts)
iii.Unambiguous
iv.Verifiable (i.e., testable)
v.Prioritized (with respect to importance and/or stability)
36
vi.Complete
vii.Consistent
viii.Uniquely identifiable
Automated hospital Management system requirements presented in this section so that they
may easily accessed and understood.
In automated hospital management system there are number of stakeholder involved for to
complete different activities take place within the hospital.
i. Nurse
ii. Doctor
iii. Patient
iv. Pharmacist
v. Accountant
Electronic system that will capture patient information, Doctor and nurse information,
Reception and account, Blood bank, ward, and pharmacy. All these information will be
Automated and the consultation will be conducted using the system instead of paper method
and the patient sample for test will electronically transferred to laboratory from Doctor and
the results back to doctor after examination. Also this data are maintained in a Database for
reference.
37
1. HARDWARE constraints
i. 1.5GHz PROCESS
iv. 7”
2. SOFTWARE constraints
38
4.2.3 HARDWARE INTERFACES
According to Wikipedia Hardware interface design (HID) is a cross-disciplinary design
field that shapes the physical connection between people and technology. It employs a
combination of filmmaking tools, software prototyping, and electronics broad boarding.
Through this parallel visualization and development, hardware interface designers are able
to shape a cohesive vision alongside business and engineering that more deeply embeds
design throughout every stage of the product. The development of hardware interfaces as a
field continues to mature as more things connect to the internet.
39
4.4 FUNCTIONAL REQUIREMENT
A function specification explains what has to be done by identifying the necessary tasks,
action or activities that must be accomplished in the design. Automated hospital
management is a system, which is conceived, designed and developed to increase clinical
outcomes, operational efficiency, improve financial outcome, and manage all hospital
records on computers. Automated Hospital Management System (AHMS) addresses all
major functional areas of a hospital. It keeps track of a patient record from registration to
discharge. This software helps to maintain the data of each individual patient with a unique
identification for a life time.
The development environment ensures that AHMS has the portable and connectivity
features to run on virtually all-standard hardware and software platforms, with stringent
data security and easy recovery in case of system failure. The software provides the benefits
of streamlining operations, enhancing administration and control, improving response to
patient care, cost control and profitability.Describe functionality or system services. Depend
on the type of software, expected users and the type of system where the software is used.
Functional user requirements may be high-level statements of what the system should do
but functional system requirements should describe the system services in detail.
40
vi. The system must identify the patient by a unique numeric identifier derived from a
function performed on the patient’s identity number or birth date.
vii. The AHMS must retrieve, update, and store data from multiple input locations
including but not limited to hospital workstations, physician workstations, inbound
emergency vehicles, and the electronic monitoring equipment.
viii. The AHMS must allow patient to view their own medical record online allowing
changes only to address, Insurance # and phone number.
ix. The AHMS must only allow deletions by the vendor and only after archiving data.
This will be administrator privilege.
x. The system to be developed must display the correct patient name.
xi. The system to be developed shall display the correct time of day in compliance with
ISO 8601.
xii. The system to be developed must operate twenty-four hours a day.
xiii. The AHMS must allow full and complete record search queries by physicians,
Doctor; and nurse also allow access to limited blood bank, medication, and allergen
information of patients and display results in order specified by operator.
xiv. The system must allow input of diagnostic imagery and FAT32 compression for
storage and transmission of data-Scan and Other x ray pictures to be stored within
patient’s records.
xv. The system must enable output of real-time data and imagery from electronic
diagnostic equipment through java applets which run in the web browser. Nurses at
workstation or doctors at desktop can access this data.
xvi. The system must retrieve and sort medical record information and allow for screen
and print output of said information. Note. Print output will include name, DOB,
and requested diagnostic information only.
xvii. The software must encrypt the data encryption algorithms from the database for
transmission from point to point.
41
Diagram shows a set of classes, interfaces, and collaborations and their relationships. They
are important for visualizing, specifying, and documenting structural models. Developing
these also called scenarios or stories helps engage them in the process of acquisition and begins
the introduction of change.
i. Use Case- Use case Diagram is a visual representation of actor and use case together
with any additional definition and specification. It has use cases (requirement) &
Actor (person or system) there may be some use cases that do not directly interact
with actors. In many instance, a function requirement maps directly to a use case. In
Use case diagram of hospital management system there are an actors patient, doctor,
nurse, technologist, technician& employee. An employee are generalized as
receptionist, administration, Cleaner & cooker. symbols used in use case diagram
42
Figure No: 6 Use Case Diagram
System
<<extend>>
<<include>>
checkup tests appoitment
Doctor
undergo operation
<<include>>
patient
prescription
Patient information
Admit/Discharge
employee
clearing
Nurse
Edit doctor/staff
ii. Class diagram- executable systems through forward and reverse engineering. In
class diagram of hospital management there are many classes like Hospital, Patient,
Doctor, Receptionist, Nurse etc. the relationship among classes are association,
generalization, composition, aggregation. Symbol used Class Diagram shows a set
of classes, interfaces, and collaborations and their relationships. They are important
43
for visualizing, specifying, and documenting structural models and also for
constructing
Figure No: 7
44
4.5 AHMS MODULES
4.5.1 PATIENT
This module deals with registering of new patients, for either OPD (Out-patient department) or
IPD(In-patient department) and issuing unique identification numbers to the patients. These
numbers are unique throughout the system. A patient is first registered at the OPD front office. If
eventually the patient is admitted, the same number issued. The IPD/ OPD identification number
is used for tracking the medical records of the patient for any OPD visitor IPD admission. All
medical records of this patient are identified by this number. The number helps in a flexible
searching finding the patient records. This number is assigned to the patient together with a
patient card. The number will be used to track the patient record and medical history throughout
the lifecycle of the patent medical section.
4.5.2 NURSE
A nurse’s work bench is a work platform provided for use by intermediate nurses (auxiliary
nurses) to assist in taking patients preliminary examination, accessing current health condition,
managing appointment queue and waiting list .Preliminary examination involves taking
temperature reading, blood pressure, height and weight of the patient. The features are:-
Waiting list
Referrals
Pre–examination
Bill payment
4.5.3 DOCTOR
This is a special diagnostic plat-form for doctors. Through the doctor’s workbench, doctors can
perform various tasks such as:
4.5.5 PHARMACY
This module maintains the data related to the servicing of the in-patient and out-patient of the
pharmacy department. It is more of drug order dispensary administration, billing and reporting
system.
4.5.6 ADMIN
This is the main administration plat form used by the Chief Medical Director (CMD), hospital
admin, hospital secretary, account and any other authorized personnel in the hospital to monitor
overall activities of all the modules.
4.5.7 ACCOUNTANT
This module is for monitoring payments and billing. The entire billing system for the patient will
automatically be created. It includes all kinds of expenses made by the patient. When the patient
is discharged, the entire bill will be generated automatically. The bill will contain all the
expenses, which should be charged to the patient for the period for which he / she were admitted
in the hospital.
46
4.6 NON-FUNCTIONAL REQUIREMENTS
Non-functional requirements are attributes that either the system or the environment must have.
Some of these are requirements that many stakeholders gravitate to, and some are requirements
few if any end users recognize are needed. The following lists non-functional requirements and
their descriptions (adapted from McEwen, Scott, Meta system Technologies, IBM Developer
Works, and Requirements: An Introduction, 2004).
i. Performance
Response Time:-The system shall give responses in 1 second after checking the
patient’s information.
Capacity:-The System must support more than 100 people at a time.
User- interface :-The user-interface screen shall respond quickly
Conformity :
ii. Security
Logon ID:-Any user who uses the system shall have a Logon ID and Password.
Modification:- Any modification (inert, delete, update) for the Database shall be
synchronized and only by the administrator in the ward.
Administrators' Rights: -Administrators shall be able to view and modify all
information in AHMS.
iii. Reliability;-How general the form generation language is Simplicity vs. functionality of
the form language= Speeds up form development but does not limit functional.
iv. Availability;-The system shall be available all the time.
v. Safety;-Humans are error-prone, but the negative effects of common errors should be
limited. E.g., users should realize that a given command will delete data, and be asked to
confirm their intent or have the option to undo.
vi. Software Quality;-Good quality of the framework= produces robust, bug free software
which contains all necessary requirements Customer satisfaction.
vii. Reusability;-Is part of the code going to be used elsewhere= produces simple and
independent code modules that can be reused
viii. Maintainability
Back Up;-The system shall provide the capability to back-up the Data.
Errors;-The system shall keep a log of all the errors.
47
4.7 DATABASE REQUIREMENTS
A database is a collection of information and is systematically stored in tables in the form of
rows and columns. The table in the database has unique name that identifies its contents. The
database in turn is further described in detail giving all the fields used with the data types,
constraints available, primary key and foreign key. Database design is used to manage large
bodies of information. In this database we describe all the 4 tables available in the software,
which are used to store all the records.
Fields in database table have a data type. Some of the data types used in database table are
explained below.
i. Integer:-One optional sign character (+ or -) followed by at least one digit (0-9). Leading
and trailing blanks are ignored. No other character is allowed.
ii. Varchar: It is used to store alpha numeric characters. In this data type we can set the
maximum number of characters up to 8000 ranges by default SQL server will set the size
to 50 characters large
iii. Date/Time :Date/Time data type is used for representing data or time
Fields Data Type Relationships
Pid Varchar(5) Primary Key
Name Varchar(20) Not Null
Age Int Not Null
Weight Int Not Null
Gender Varchar(10) Not null
Address Varchar(50) Not Null
Phoneno Int Not Null
Disease Varchar(20) Not Null
Doctored Varchar(5) Not Null
48
v. Table 2; Lab Table
Fields Data Type Relationships
Labno Varchar(5) Primary Key
Pid Varchar(5) Not Null
Weight Int Not Null
Doctored Varchar(5) Foreign Key
Date Date/Time Not Null
Category Varchar(15) Not Null
patient_type Varchar(15) Not Null
Amount Int Not Null
49
ix. Table 6; Bill Table
x. From the table above the primary key in patient registration module is the patient identity
number and this module is related to all the other modules like admission, laboratory,
death, referral etc, in the sense that the same patient with patient identity can be admitted,
referred, sent to laboratory or examined by the nurse but the primary key in the patient
registration of this patient now becomes a foreign key in other modules because the
primary key of each module is that key with which the patient is primarily identified
there. For example, in Admission table, the admission number is the primary key while
the patient identity number is the foreign key, in laboratory; the laboratory identity is the
primary key while the patient identity number is the foreign key and so on.
E-R DIAGRAM
Entity relationship diagram is used in modern database software engineering to illustrate logical
structure of database. It is a relational schema database modeling method used to model a system
and approach. This approach commonly used in database design. The diagram created using this
method is called E-R diagram.
The E-R diagram depicts the various relationships among entities considering each object as
entity. Entity is represented as diamond shape and relationship is represented as rectangle. It
50
depicts the relationship between data objects. The E-R diagram is the relation that is used to
conduct the data modeling activity.
Figure 9; Entity
iii. Attributes:-Attributes are the properties of the entities and relationship. Descriptor of the
entity. Attributes are elementary pieces of information attached to an entity.
51
ENTITY RELATIONSHIP DIAGRAM FOR AUTOMATED HISPITAL
MANAGEMENT SYSTEM
pid name
DoB
gender weight
phone
no Consults
disease
Doctorid
dept
doctor
Doctor name
amount
Checks
lab no
category
Pid
date Lab
Report weight
pid
advance Decides pid
doctorid
date of
lab no
Inpatient Outpatient
admission Lab
no Date
Date of room no Bill no
discharge
issued_to
Admitted
pid
status toto medicine charge
lab charge
room room charge
room no
Bill patient type
Figure No:12
52
CHAPTER FIVE
SOFTWARE DESIGN
5.1 OVERVIEW
A software design is a model of a real world system that has many participating entities and
relationships. This design is used in different ways. It acts as a basis for tailed implementation; it
serves as a communication medium between the designers of subsystems; it provides information
to system maintainers about original intentions of the system designer. Database design is the
process of creating structure from user requirement. It is a complex and demanding process that
requires both creativity and experience.
In this work, an object – oriented design was chosen. This is because of its widespread popularity
and they are concerned with record processing where the processing of one record is not
dependent on any previous processing. An object oriented design relies on decomposing the
system into a set of interacting objects with a centralized system state shared by these objects.
Database design is the process of producing a detailed data model of a database. This logical
data model contains all the needed logical and physical design choices and physical storage
parameters needed to generate a design in a data definition language which can be used to create
a database. A fully attributed data model contains detailed attributes for each entity.
Database design has some parallels to more classic code or software design processes. It goes
through two stages namely: the logical design and physical design. The logical model is
concerned with transforming the database specification and normalized database schemas
respectively. The physical design process is concerned with how the database system will be
implemented. It specifies the physical configuration of the database on the storage media. It
includes the detailed specification of data element, data types, indexing options and other
parameters residing in the database management system. It is the detailed design of a system that
include modules, database’s hardware and software specification of the system.
53
5.2 DATABASE DESIGN
A database is a collection of information and is systematically stored in tables in the form of
rows and columns. The table in the database has unique name that identifies its contents. The
database in turn is further described in detail giving all the fields used with the data types,
constraints available, primary key and foreign key. Database design is used to manage large
bodies of information. In this database we describe all the 4 tables available in the software,
which are used to store all the records.
Fields in database table have a data type. Some of the data types used in database table are
explained below.
xi. Integer:-One optional sign character (+ or -) followed by at least one digit (0-9). Leading
and trailing blanks are ignored. No other character is allowed.
xii. Varchar: It is used to store alpha numeric characters. In this data type we can set the
maximum number of characters up to 8000 ranges by default SQL server will set the size
to 50 characters large
xiii. Date/Time :Date/Time data type is used for representing data or time
55
Table 13; Bill Table
From the table above the primary key in patient registration module is the patient identity
number and this module is related to all the other modules like admission, laboratory, death,
referral etc, in the sense that the same patient with patient identity can be admitted, referred, sent
to laboratory or examined by the nurse but the primary key in the patient registration of this
patient now becomes a foreign key in other modules because the primary key of each module is
that key with which the patient is primarily identified there. For example, in Admission table, the
admission number is the primary key while the patient identity number is the foreign key, in
laboratory; the laboratory identity is the primary key while the patient identity number is the
foreign key and so on.
56
The different diagram can be drawing by using UML includes:-
i. Class Diagram
ii. Object Diagram
iii. Activity Diagram
iv. State Diagram
v. Sequence Diagram
vi. Data Flow Diagram
A DFD shows what kind of information will be input to and output from the system, where the
data will come from and go to, and where the data will be stored. It does not show information
about the timing of process or information about whether processes will operate in sequence or
in parallel
57
A data store, a place where data is
held between processes.
A data flow.
Check
User A
HOME Name
&
Password
Auth.
Failed
58
Figure 14; Level 0 DFD
Inpatient In
Details Patient
ADMISSION
Outpatient Out
Details Patient
Staff
STAFF Details B
Inpatient In Bill
Bill
In
Patient
BILLING
Bill
Billing
Out
Patient
59
Figure 15; Level 0 DFD
B
PERSONAL Staff
DETAILS Details Staff
Attendance
ATTENDANCE Details
Staff
ON DUTY On Duty OD
Details
Atten
Payroll
PAYROLL Details
Payroll
OD
Shift
SHIFT Shift
Details
Staff
60
5.3.2ACTIVITY DIAGRAM
An activity diagram shows the sequence of steps that make up a complex process, such as an
algorithm or work flow it focus on operation.
ActionState
An action state is noted the working flow. Example Get appointment is a active state.
In decision if one condition is satisfied, it’s arrow indicate The next activity to perform.
Example. Pay fees of doctor is a guard condition.
Fork pseudo state enable to take a single event transmission & split it into several control parts.
61
62
5.3.3STATE DIAGRAM
A state diagram is a graph whose nodes are states and whose direct arcs are transition between
states. A state diagram specifies the state sequence caused by event sequence.
Fork pseudo state enable to take a single event transmission& split it into several control parts.
State
A state is an abstraction of the values and links of an Objects, sets of values and links are
grouped to gather into a state according to the group behavior of object. Example Prescribing is a
state.
Drawn as a line from the origin state to the target state. An arrow head points to the target state.
63
64
5.3.4SEQUENCEDIAGRAM
A sequence diagram shows the participants in an interaction and the sequence of messages
among them. It is not attempt to be general.
Object
Message
Message
Messages extend from the lifeline of one object to the life line of another except in the case of a
message from an object to itself, in which case the message begins and ends on the same
lifeline.
65
66
67
CHAPTER SIX
IMPLIMENTATIONANDTESTING
6.1 OVERVIEW
Implementation is the realization of a technical specification or algorithm as a program or
software component. It involves the accurate transform at or of the software design into some
executable program code using any programming language of choice. A design may be
implemented in various ways depending on the priorities of the software developer. In this work,
several factors were taken into consideration during implementation.
For most software applications there exists a wide variety of languages in which the application
may be implemented. Apart from use of PHP there is the use of other scripting language like
JavaScript and CSS to support HTML generation by PHP, also without forgetting Java based
android app interface was generated by XML
68
vii. PHP supports full object oriented programming giving us more control over the graphic
user interface
viii. PHP supports all the new AJAX and CSS. It makes the graphic user interface friendly.
69
6.2 USER INTERFACE:
User interface is the system by which users interact with a machine. The user interface includes
hardware and software components. User interfaces exist for various systems and provide a
means of:
The main aim of human-machine interaction is to produce a user interface which makes it easy,
efficient enjoyable for humans to operate a machine in a way which produces the desired result.
i. GRAPHIC USER INTERFACE: This type accepts input via devices such as computer
keyboard and mouse and provides articulated graphical output on the computer monitor.
ii. WEB-BASE USER INTERFACES: Accepts input and provide output by generating
web pages which are transmitted via the internet and viewed by the user using a web
browser program.
iii. TOUCH USER INTERFACE: These are graphical user interfaces using a touch screen
display as a combined input and output device.
iv. NATURAL LANGUAGE INTERFACE: Natural language interface is used for search
engines and on Webpages. The user types in a question and waits for a response.
In this design, ease of use was paramount; robust input procedures, error checking procedures,
system e.t.c were included in implementation to ensure easy and efficient use of the software.
This of course was achieved at the cost of bulkier code and resulting in increase of occupied
memory space. The trade-off, however is justified as most target users may have little or no
computer training and, thus require a very simple and straight forward user interfaces.
6.3 SECURITY
Quality control on the implementation was enhanced by the use of structural techniques as well
as subjective testing for all stages and modules of the software system. Unauthorized access to
data was handled by the inclusion of password protection for all sensitive modules of the system;
thereby reducing the probability of inadvertent or malicious access to the sensitive area of the
70
system. However, for the hospital management system, there are two major categories of security
deployed thus;
i. CLIENT SOFTWARE SECURITY: This level of security ensures that only authorized
persons such as doctors, nurses, consultants etc can have access to the system. The
system therefore presents a login box requesting for the users user name and password.
The username and password information are both stored in the database. Hence, during
login, the entered information must be validated in comparison with the account
information in the database. The above means that only authorized users can have access
to the software
ii. DATABASE SERVER SECURITY: The database is MYSQL and thus maintains an
architectural security enabled profile. As a result, at run-time a connection must be
established from the client software to the database server. This is a one-way connection
and authentication is required. Full access to the MYSQL database also requires that the
connection in client (user) must have the following information’s
ii.MYSQL server link or URL USUALLY LOCALHOST FOR Private web server 3
Correct port number of the server
Incorrect supply or error in the above information will lead to access denial to the MYSQL
database. This also enhances the security detail of the system.
Test based purely on structure, test based purely on function and a formal proof of correctness.
Each approach leads to the conclusion that complete testing on the sense of a proof is not
theoretically possible. Again to completely ascertain the software throughput, various testing
71
method. Each method is categorically deployed to check for reliability, strength, weakness, and
efficiency of the software. Among the testing methods used includes;
6.4.1DEBUGGING:
This test was carried out before the final compilation of the project for final publishing. This
testing was used to check for code and syntax errors.
Finally, the above test methods generally provides the analytical result on the performance and
integrity of the software
72
CHAPTER SEVEN
73