Analysis and Design of Integrated HMS
Analysis and Design of Integrated HMS
Analysis and Design of Integrated HMS
2
Information Technology Department, Valley View University
Accra, Ghana
the work seem easy. Therefore, this research work seeks to CMS by AIZ Patient GAP: it was to provide a
analyze and design a Hospital Management System that
will allow hospital staff (doctors, nurses) access to patient Company Management flexible CMS, but it
records, reduce the stress in tracking records, reducing
(Azuan, 2005) Medicine doesn’t control
patients waiting time and increasing the number of patients
served. appointments patients
Inventory
part of the system. Dee Medical Patient The system is strictly for
(In-House ation extends to the to view the patient admit-history. The administrator
manages all system data and activities, from registration to
developed Billing Inpatients during using the feedback module to send SMS or email to the
patient to ensure patient satisfaction after services
application, registration where
rendered. Also in the feedback module is a live chat for
2014) they are given real-time communication with patients once they are
logged in to the system. The administrator also generates
registration numbers. reports from the system when the report is needed. The
doctor can access information from the database, so he/she
This number is now knows how to attend to the patient before the patient meets
him/her. If a patient is referred to the laboratory, the lab
used for locating an technician takes a number of tests and saves them to the
database so the doctor can access the information without
Inpatients’ file using
communicating to the lab technician. If referred to the
the manual filing pharmacist, the drugs or medication that is prescribed to
the patient is saved to the database. With one database, we
system. It is an can see it is all about the various departments updating
information on the patient data that is already stored in the
organised filing system and if there is any need for that information, it is
easily retrieved from the database. Since the information in
system but the time the database is backed up in the cloud, as soon as any
update is made, the cloud is updated with the information.
taken to retrieve a file
This is basically how the system works. All information
is long. Room from the users will be stored to the database and the
information is backed up on the cloud, so data is secure
availability check and readily available anytime it is requested.
cannot be performed.
3.2 Benefits Of The Proposed System With a single database it is much easier to develop
reports that show a broad range of activities
performed in hospital. With multiple databases,
Cloud Storage: Cloud backup delivers next
records need to be matched, de-duping needs to
generation intelligent data backup and recovery to
occur and the opportunity for duplicate records is
protect organisation’s business critical data in one
greatly increased.
simple unified solution. The purpose behind cloud
storage is to protect the information from the risk of
loss associated with fire, theft, hacking, or any kind With a single database, support is focused on one
of technological disasters. With current encryption product. With multiple databases, even if they are all
and security practices, data backed up in the cloud is built on the same platform, separate support is
highly secure (Clark, 2012). required for each database. In conclusion, the
hospital management system will simplify and
centralize updates on information, improve quality of
Cloud solutions leverage the elasticity of cloud
service, reduce errors and increase efficiency of the
computing to become more agile in responding to
system.
changing circumstances, like rapid data growth,
which can easily be accommodated because it is
cloud based, so increasing or decreasing your storage Feedback Module: This module contains SMS, e-
capacity should be painless. It also allows the user to mail and live-chat service in which all will be used
concentrate solely on his/her work without worrying as a medium to convey important information to
about data loss. You can restore lost data with zero patients and even staff. With this module you can
downtime. send general broadcasts of urgent/important
information, such as alerts/updates on epidemics.
You can broadcast to the masses at low cost and the
The cloud is invisible as it has no singular physical
message is available in the patient’s phone inbox so
location, so remote access is also a simple and
when they are ready they can read quickly and easily
feasible benefit of cloud backup. Once you can
at no cost. For booking/scheduling, the feedback
connect to the remote server, you have access to all
module decreases long queues, which can help
the data that you have stored in the cloud. From
resolve physical space issues. It is also time saving
wherever your contact point is, gaining access to the
for patients and they have the option to reschedule
information backed up on the cloud from your
their appointment if the desired slot is unavailable.
system ensures consistency and an easy approach
With the feedback module, the system requires
across departments.
feedback on patient’s condition, which can benefit
the patient as they receive better attention from well
Single Database: A single database decreases the informed caregiver. This module can also be used for
quantity of information managed and saves clinicians updates like health and diet tips to patients at home.
time spent on repeated data entry (Russel, 2013). The And also a step in fostering good relationship with
greatest benefit of a single database is data integrity. patients, for instance; sending greetings for birthdays
One of the cardinal rules of database design is that will be a good way to build up hospital rapport that
no redundancy is allowed, which means no piece of is not costly for the automated system. It can also be
data should ever be repeated within the database. used to get feedback on out patients that are on
When information is about to be entered in the medications, asking how they feel since they started
system from any department in the hospital, if the taking the drugs prescribed to them as there is no
information is already stored in the database, the medical personnel to watch them till their next
system will notify the user that the information about appointment. This is a good way of extending care to
to be entered is already available in system, thereby the patients and building a better relationship with
preventing data redundancy. So when any change is them.
to be implemented, there is only one place to look to
make the changes.
4. Design of the Proposed System Fig 1 and Fig 2 shows the flow of the proposed system. All
the users whether the Administrator, Doctor, patient,
technician, or whosoever will need to identify him or
herself with the system. The portals for each of the actors
on the system are customized based on their access levels.
Protecting the valuable and confidential information stored [4] F. K. S. Gihan and A.M. Haneef(2013). Database and Flat
within databases is vital for maintaining the integrity and File Validation Tool. International Journal of Engineering
reputation of organizations everywhere not to mention Science Invention ISSN (Online): 2319 – 6734, ISSN (Print):
2319 – 6726 www.ijesi.org Volume 2 Issue 4.PP.38-42.
ensuring regulatory compliance. Since the use of cloud
Retrieved from
storage is applied for backup, the hospital should not feel http://www.ijesi.org/papers/Vol%202(4)/Version-
that the documents on the cloud are invisible to threats, so 5/G243842.pdf on 23rd July, 2015.
the need for extra protection is not necessary. In preserving [5] T. Clark(2012). Top benefits of cloud backup and disaster
integrity, one must have a fully secure system which means recovery. Retrieved from www.symform.com/blog/top-
including security measures for the protected information benefits-cloud-backup-dr/ on 24th July, 2015
on the cloud database. The health institution should never [6] K. Russel(2013). The benefits of a single database in care
feel too safe in security of data because threats can come coordination throughout the Continuum.
from even the insiders that are trusted to the system. A [7] R. Ranjan(2014). How to secure your cloud database in an
insecure world.
database monitoring system that can monitor database
[8] S. Liu(2003). Two-tiered wireless sensor network
activity constantly is essential. Encryption is necessary to architecture for structural health monitoring.
make any kind of data unreadable (Ranjan, 2014). If you [9] N. A. A. Azuan(2005). Outpatient management system.
are not able to understand what is on a file, it is of no use Retrieved from
to the intruder. umpir.ump.edu.my/3707/1/NURZTEY_AQTAR_AHMAD_
Integrating a payment module too is important for the AZUAN.PDF
system. The payment module allows healthcare providers
to accept credit card and check payments as well as deposit
checks from the system. Here, the payments will be secure
online and automated weekly security scans of your
firewall will protect your payment entry and the patient
data is secure. Patient’s billing information is accurate and
posted directly to the patient accounts and this is
confidential between the hospital and the patient.
The need for a high performing robust network
infrastructure is recommended to monitor activity
occurring over the network. Two-tiered wireless sensor
network architecture is proposed as a solution to that issue
and the protocol used for the communication over the net
(Liu, 2003). Available tools are robust and lend themselves
to fast prototyping to ensure user needs are met accurately
and completely. The network architecture offers high
performance so there is little or no disappointment when
the network is accessed. It will ensure secure transmission
of information over the feedback module since a lot of
sensitive information will be handled in that module.
References
[1] J. Bisbal and D. Berry(2009). An Analysis framework for
Electronic Health Record System. Retrieved from
http://www.tecn.upf.es/~jbisbal/publications/me09-01-
0002_Bisbal.pdf on 23rd July 2015.
[2] A. E. Youssef (2014). A framework for secure HealthCare
Systems Based on Big Data Analysis in Mobile Cloud
Computing Enviromets. International Journal of Ambient
Systems and Applications (IJASA) Vol.2, No.2. Retrieved
from
http://www.airccse.org/journal/ijasa/papers/2214asa01.pdf on
23rd July, 2015
[3] R. Zhang and L. Liu, “Security Models and Requitements for
Healthcare Application Clouds”, IEEE 3rd International
Conference on Cloud Computing, 2010.