1child Birth Records Management System
1child Birth Records Management System
BY
STUDENT ID:
E-mail:
MOBILE PHONE NO
JANUARY, 2020
DECLARATION
I …….., hereby declare that this report is an original composition and a true record of the
activities I was involved in during my research project work. This report is not a duplicate
of any academic document submitted at any institution for any academic award.
i
APPROVAL
This is to certify that my approval has been given for this research report to be submitted to the
faculty of science and technology in partial fulfillment for the award of a bachelor degree of
information technology of Cavendish University Uganda.
ii
DEDICATION
This report is dedicated to my beloved family, I also dedicated it to my friends for the guidance
and financial they rendered to me during the study.
I further dedicated this to all the personnel staffs of Cavendish University Uganda especially
those dealing with computer studies and information technology.
iii
ACKNOWLEDGEMENT
I would like to thank Almighty God for giving me the opportunity, ability, health and wisdom to
successfully complete this project research work.
I register my sincere gratitude to my beloved parents, for the spiritual, moral and financial support
accorded to me throughout the course of my education.
I acknowledge my supervisor Mr. Moses balirwa for his great support, patience and guidance
throughout the accomplishment of this project.
Finally, I would like to express my gratitude to all the staff of Cavendish University, especially
the staff of Faculty of Computer Science and Information Technology for the assistance that they
have accorded me throughout my studies at the University.
May the good Lord richly bless everyone who has in one way or another contributed to this
Research Project.
iv
TABLE OF CONTENTS
DECLARATION ...................................................................................................................... i
APPROVAL ............................................................................................................................. ii
DEDICATION ........................................................................................................................ iii
ACKNOWLEDGEMENT ...................................................................................................... iv
Table of figures ...................................................................................................................................................... viii
LIST OF ACRONYMS ........................................................................................................... ix
CHAPTER ONE ...................................................................................................................... 1
INTRODUCTION .................................................................................................................... 1
1.0 Introduction .........................................................................................................................................................1
1.1 Background of the Study .....................................................................................................................................1
1.2 Problem Statement ...............................................................................................................................................3
1.3 Objectives of the Study ........................................................................................................................................3
1.3. 1 Main objective .................................................................................................................................................3
1.3.2 Specific objectives ............................................................................................................................................3
1.4 Research questions ...........................................................................................................................................3
1.5 Scope of the Study ...............................................................................................................................................3
1.5.1 Content scope ...................................................................................................................................................3
1.5.2 Time scope ........................................................................................................................................................4
1.5.3 Geographic bounds ...........................................................................................................................................4
1.6 Significance of the study .....................................................................................................................................4
CHAPTER TWO...................................................................................................................... 5
LITERATURE REVIEW ......................................................................................................... 5
2.0 Introduction .........................................................................................................................................................5
2.1 Related system.................................................................................................................... 5
2.2 Web Services ...................................................................................................................... 5
2.2.3 Access Control Models .....................................................................................................................................6
2.3 Flexible Authorization Framework ......................................................................................................................6
2.4 Birth registration in Nigeria .................................................................................................................................7
2.5 Child motility in Nigeria ......................................................................................................................................7
2.6 Analyzing the existing systems ............................................................................................................................8
2.7 Information system .............................................................................................................................................8
2.7.1 Operational Challenges .....................................................................................................................................9
2.8 Web based application ......................................................................................................................................9
2.8.1 Advantages of web based application ............................................................................................................. 10
2.9 The System Development Life Cycle ................................................................................................................ 11
2.9.1 Advantages of system development life cycle ................................................................................................ 12
v
2.9.2 There are always disadvantages with everything ............................................................................................ 13
2.10 Database application ........................................................................................................................................ 13
2.11 Chapter Summary ............................................................................................................................................ 13
CHAPTER THREE ................................................................................................................ 14
RESEARCH METHODOLOGY ........................................................................................... 14
3.0 Introduction ....................................................................................................................................................... 14
3.1 Study investigation ............................................................................................................................................ 14
3.2 Target population ............................................................................................................................................... 14
3.2.1 Sample size ..................................................................................................................................................... 14
3.2.2 Table of sample size. ...................................................................................................................................... 15
3.3 Data Collection .................................................................................................................................................. 15
3.3.1 Interview .................................................................................................................................................... 15
3.3.2 Observation method ........................................................................................................................................ 15
3.3.3 Questionnaire Guide ....................................................................................................................................... 16
3.4 Data analysis ...................................................................................................................................................... 16
3.5 System study ...................................................................................................................................................... 16
3.5.1 System study and findings .............................................................................................................................. 16
3.6 System implementation ..................................................................................................................................... 17
3.6.1 implementation tool ........................................................................................................................................ 17
3.6.2 System testing ................................................................................................................................................. 17
CHAPTER FOUR .................................................................................................................. 18
SYSTEM ANALYSIS AND REQUIREMENTS .................................................................. 18
4.0 Introduction ....................................................................................................................................................... 18
4.4 System design ................................................................................................................................................. 18
4.4.1. Data flow diagram ......................................................................................................................................... 18
4.4.2 Entity relationship diagram ............................................................................................................................. 18
4.5 Design Tools ...................................................................................................................................................... 18
4.6 Logical design.................................................................................................................................................... 19
4.7 Nonfunctional requirements .............................................................................................................................. 19
4.8 Software requirements ....................................................................................................................................... 19
4.9 Context Flow Diagram ...................................................................................................................................... 20
Fig 2: Context flow diagram level One ................................................................................ 20
Fig 3: Data flow diagram level two ........................................................................................ 21
4.4.4 Physical Design .............................................................................................................................................. 21
4.4.5 Architectural design ........................................................................................................................................ 21
Fig 4: System Architecture..................................................................................................... 22
Table 2 Child birth registration table ..................................................................................... 23
4.5 System presentation.......................................................................................................... 23
vi
Table 3: Child medical form .................................................................................................. 24
Table 4: Child Details ............................................................................................................ 25
CHAPTER FIVE .................................................................................................................... 26
SYSTEM DESIGN AND IMPLEMENTATION .................................................................. 26
5.0 Introduction .................................................................................................................. 26
5.1 System implementation ................................................................................................ 26
Figure 1 Home page ............................................................................................................... 26
Figure 2 Admin Login page ................................................................................................... 27
Figure 3 Hospital Registration page ....................................................................................... 27
Figure 4 Hospital login ........................................................................................................... 28
Figure 5 Registration Form .................................................................................................... 28
Figure 6 Number of registration babies................................................................................. 29
Figure 7 Birth certificate page ................................................................................................ 29
5.2 Database Design and development results ......................................................................................................... 30
Figure 8 Parents table ............................................................................................................. 30
Figure 9 Child table ................................................................................................................ 31
Figure 10 Admin table............................................................................................................ 31
Figure 11 Hospital table ......................................................................................................... 32
5 2 System Testing and Validation .......................................................................................................................... 32
CHAPTER SIX ...................................................................................................................... 33
CONCLUSIONS AND RECOMMENDATIONS ................................................................ 33
6.0 Introduction ....................................................................................................................................................... 33
6.1 Achievements of the study ........................................................................................... 33
6.2 Limitations ..................................................................................................................................................... 33
6.4 Recommendation .............................................................................................................. 34
6.5 Conclusion........................................................................................................................ 34
REFERENCES ....................................................................................................................... 35
APPENDIX ONE: INTERVIEW .......................................................................................... 37
APPENDIX TWO: TIME/ACTIVITY SCHEDULES .......................................................... 38
APPENDIX THREE: BUDGET ESTIMATE ....................................................................... 39
APPENDIX FOUR: SAMPLE CODE ................................................................................... 40
vii
Table of figures
Figure 1 Home page .................................................................................................................................................... 26
Figure 2 Admin Login page ......................................................................................................................................... 27
Figure 3 Hospital Registration page ............................................................................................................................ 27
Figure 4 Hospital login ................................................................................................................................................ 28
Figure 5 Registration Form .......................................................................................................................................... 28
Figure 6 Number of registration babies ...................................................................................................................... 29
Figure 7 Birth certificate page ..................................................................................................................................... 29
Figure 8 Parents table .................................................................................................................................................. 30
Figure 9 Child table ..................................................................................................................................................... 31
Figure 10 Admin table ................................................................................................................................................. 31
Figure 11 Hospital table .............................................................................................................................................. 32
viii
LIST OF ACRONYMS
IT Information Technology
ix
CHAPTER ONE
INTRODUCTION
1.0 Introduction
Nationally representative estimates of under-five mortality can be derived from a number of
different sources, including public registration and sample surveys, but excluding demographic
surveillance sites and Nsambya Hospital data, which are rarely representative. The preferred
source of data is a civil registration system which records births and deaths on a continuous basis.
If registration is complete and the system functions efficiently, the resulting estimates was be
accurate and timely. However, in the developing world most countries do not have well-
functioning vital registration systems, and household surveys, such as the UNICEF supported
Multiple Indicator Cluster Surveys (MICS), the USAID supported Demographic and Health
Surveys (DHS) and periodic population censuses have become the primary source of data on under
five and infant mortality in developing countries. These surveys ask women about the survival of
their children, and it is these reports that provide the basis of child mortality estimates for a
majority of developing countries.
Child birth registration is the continuous, permanent, compulsory, and universal recording within
the civil registry of the occurrence and characteristics of births in accordance with the legal
requirements of a country (UNICEF, 2013). Civil registration is a system where the occurrence
and characteristics of vital events pertaining to the population like births, deaths, marriages and
divorces are recorded in a continuous, permanent and universal manner. The purpose of civil
registration is primarily for establishing the legal documents provided by the law. These records
serve also as a primary source of vital statistics.
1
Birth registration is crucial for the implementation of national policies and legislation
establishing minimum age for work, military conscription and marriage, certificate of birth is
fundamental to the realization of a number of rights and practical needs such as:- Ensure that
children enroll in school at the right age, To prevent child labor by enforcing laws relating to
minimum age for employment, To effectively counter the problem of forced marriage for
girls before they are legally eligible without proof of age, Getting an educational, health
and or insurance policy cover for a child, Protecting a child orphan from being
disinherited by guardians/ relatives, Ensure that children in conflict with the law are given
special protection and not treated (legally) practically as adults.
In 2011, through a public-private partnership between Kenya Telecom and Unicef, the
electronic birth and death registration system known as the Mobile Vital Records System
(Mobile VRS) was developed. Mobile VRS enables birth notifications to be sent by mobile
phones to the server and enables health and government officials who have access to the
internet and a printer to register and print birth certificates in real time. Mobile VRS has
been designed to work in both healthcare and non-healthcare environments. For example, in a
healthcare setting where a child is born in a Nsambya Hospital, local administrators. Simply
enter and upload birth details to a web-based registration portal with connectivity delivered
through Kenya Telecom's existing 3G network. Data is transferred almost instantaneously,
and it cuts the uncertainty about whether records was reach the national.
At Nsambya Hospital offers capture mother’s details by using hand aided tools to record the
mother’s details these include pens, hand books, rulers and pencils this method of data
processing is challenged with many challenge these include. Time consuming as in compiling
birth records in a week, month and year, loss of data since all the data is recorded in paper based
files they can easily be burnt, stolen by internal or external individuals, human errors many
errors are likely to happen during the process of data entering because most of the data
processing is done by human beings who can make .error at any point and less information can
be stored by the paper based file as compared to computerized database in addition paper base
files requires a lot of space and furniture.
2
1.2 Problem Statement
Nsambya Hospital covers a wide catchment area of districts within Kampala; due to the increasing
number of birth mortality records becomes unmanageable with the manual data processing
method. Manual data process method is associated with the number of problems like time
consuming in retrieving child records, less information can be stored with the help of manual data
processing method, many errors are made when processing which require a lot of time to process
Simple tasks, lack of data integration, Data can easily be lost through theft of documents, fire,
floods etc. Basing on the above problems there is a need to develop a Web based Child
Records Management System which can capture child mortality records more efficiency and
effectively.
The study only looked at the design of a child records management systems using tools such as
MYSQL, HTML and PHP.
3
1.5.2 Time scope
The period of the coverage of the study was August-November 2019
II. The proposed will improve data security since it has access control limit which will
restrict unauthorized users from accessing system resources.
III. The proposed will improve data storage as results of developing central database which
provides a central point for child birth records storage.
IV. New system can assist in generating birth certificate hence solve the challenge of
delaying child certificate in addition this was the government to verify child birth
everywhere by using child Id-number
4
CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
This chapter looks into related studies carried out in line with the research topic, a web based child
records management system for Nsambya hospital in Kigali Rwanda and other literature about
the subject was be reviewed. In this review, the major focus was be to establish issues that have
not been adequately addressed by the previous researchers
5
of the recalls (most of the recalls' setting allow the access to HTTP port). Web services do
not provide users with GUI (Graphic User Interface). However, developers can add Web
services into their Web page or applications and other users with GUI which contains the
functionalities of the Web services.
6
stage ICT resolution policies are enforced. However, it is possible that access is neither authorized
nor denied.
7
MDG target. Hence, it is a key priority of the Government of Nigeria to sustain and accelerate
attainment of MDG 4, especially among the poorest.
The proportion of 1-year-old children immunized. Against measles declined between 1995
and2001 from 82% to 63%. Following implementation of the 2001-2005 immunization
revitalization strategic plans, measles immunization rose again in 2006 to 89%. The same pattern
is evident in the provision of DPT3 vaccines, a combination of vaccines against three infectious
diseases: diphtheria, pert us sis (whopping cough) and tetanus. In 2009, the measles immunization
rate was81 %, which is below the 90% national target.
8
emphasis is placed on an Information System having a definitive Boundary, Users,
Processors, Stores, Inputs, Outputs and the aforementioned. Communication networks.
Basing on the above argument child records management information system was have
the basic components of computer-based information systems are: Hardware- these are the
devices like the monitor, processor, printer and keyboard, all of which work together to
accept, process, show data and information. Software- is the programs that allow the hardware
to process the data. Databases- are the gathering of associated files or tables containing related
data. Networks- are a connecting system that allows diverse computers to distribute
resources. Procedures- are the commands for combining the components above to process
information and produce the preferred output.
9
2.8.1 Advantages of web based application
Cost effective development
With web-based applications, users access the system via a uniform environment-the web browser.
While the user interaction with the application needs to be thoroughly tested on different
web browsers, the application itself needs only be developed for a single operating system. There’s
no need to develop and test it on all possible operating system versions and configurations. This
makes development and troubleshooting much easier, and for web applications that use a flash
front end, testing and troubleshooting is even easier.
Accessible anywhere
Unlike traditional applications, web systems are accessible anytime, anywhere, via a PC with an
Internet connection, putting the user in charge of where and when they access the application.
Easily customizable
The user interface of web-based applications is easier to customize than it is in desktop
applications. This makes it easier to update the look and feel of the application, or to customize
the presentation of information to different user groups.
10
have up-to-date browsers and plug-in. And as the upgrades are only performed by an experienced
professional to a single server, the results are more predictable and reliable.
Adaptable to increased workload
Increasing processor capacity also becomes a far simpler operation. If an application requires more
power to perform tasks, only the server hardware needs to be upgraded. The capacity of web-based
software can be increased by "clustering" or running the software on several servers
simultaneously. As workload increases, new servers can be added to the system easily-Google, for
example, runs on thousands of inexpensive Linux servers. If a server fails, it can be replaced
without affecting the overall performance of the application.
Security
Web-based applications are typically deployed on dedicated servers, which are monitored and
maintained by experienced server administrators. This is far more effective than monitoring
hundreds or even thousands of client computers, as is the case with new desktop applications.
Flexible core technologies
Any of three core technologies can be used for building web-based applications, depending on the
requirements of the application. The Java-based solutions (J2EE) from Sun Microsystems involve
technologies such as JSP and Servlets. The newer Microsoft .NET platform uses Active Server
Pages, SQL Server and .NET scripting languages. The third option is the Open Source platform
(predominantly PHP and MySQL), which is best suited to smaller websites and lower budget
applications.
For any SDLC model that is used, information security must be integrated into the SDLC to ensure
appropriate protection for the information that the system was transmit, process, and store.
11
Initiation Phase, during the initiation phase, the organization establishes the need for a system and
documents its purpose. Security planning should begin in the initiation phase with the
identification of key security roles to be carried out in the development of the system. The
information to be processed, transmitted, or stored is evaluated for security requirements, and all
stakeholders should have a common understanding of the security considerations.
Implementation Phase. In the implementation phase, the organization configures and enables
system security features, tests the functionality of these features, installs or implements the system,
and obtains a formal authorization to operate the system. Design reviews and system tests should
be performed before placing the system into operation to ensure that it meets all required security
specifications. Operations/Maintenance Phase. In this phase, systems and products are in place
and operating, enhancements and/or modifications to the system are developed and tested,
and hardware and software components are added or replaced. Disposal Phase. In this phase, plans
are developed for discarding system information, hardware, and software and making the transition
to a new system. The information, hardware, and software may be moved to another system,
archived, discarded, or destroyed.
12
they meet the user’s needs and conform to standards. These can be further worked on if
they require tweaks to be made, ensuring that the business gets exactly what it needs.
Documentation is expensive and time-consuming to create. It is also difficult to keep current. What
may be current this month may not be the same this time next year!
Users cannot easily review intermediate products and evaluate whether a particular product (e.g.,
data flow diagram) meets their business requirements.
Another disadvantage of a program or software that follows the SDLC program is it encourages
stiff implementation instead of creativity. There are requirements that must be met and that is all
that developers complete.
This chapter has looked at the literature that gives this study on the theoretical basis. It has
specifically discussed literature about health systems, web-based system, and database and
system development.
13
CHAPTER THREE
RESEARCH METHODOLOGY
3.0 Introduction
This chapter describes the methods that were used in data collection, analysis, specification and
development. It consists of research design, target population, sample size, sampling techniques,
data collection methods and analysis techniques.
14
3.2.2 Table of sample size.
Table 3. 1 Sample Size
Staff 40 25
Administer 4 2
Clients/mothers 120 73
3.3.1 Interview
One of the data gathering tools that was used in this research is an interview . An interview
is a formal or informal meeting between two or more people with an intention of obtaining
information about something in particular, thus the researcher collected information from the
individual(s) through face-to-face interaction . The interview guide was used in this project
consisted of oral questions where the researcher asked direct questions through the use of mouth
to the respondent. This was done to obtain classification of information depending on the
interviewee's response to the specific set of questions in the guide. The researcher asked open-
ended questions to allow the interviewee to respond in any way that seems appropriate.
15
ii. The observation guide was used by the researcher to review certain problems on their
own.
iii. Observation technique provided less biased description than other methods.
16
were from (interview, questionnaire and observation) have been analyzed using excel and a pie-
chat was generated to give clear understanding of all these systems as shown below in the table
Table 4. 3 system study findings
17
CHAPTER FOUR
4.0 Introduction
This chapter gives the description of child birth records management system, it also light on
system analysis, design and provide both conceptual and physical design. It describes
data/information flow in the system with help of context diagram, data flow diagram (DFD), data
dictionary (data base schemes) and the architectural design.
18
Entity Relationship Diagram were used in data modeling to show the different relationships
between entity types in the system and their associated relationship type in child records to come
up with logical design of Child Birth Records Management System.
Search records
Child birth records management system allows system users to search individual record by
using a search criterion (child number).
19
Table 4. 1 Software requirements
Table 1 software requirements
20
Fig 3: Data flow diagram level two
21
Fig 4: System Architecture
22
Table 4. 2 Childbirth registration
Table 2 registration
Child_reg_Surname Varc(35)
Child_reg_Surname Varc(35)
Child_ Varc(35)
Child_ reg_nationality Varc(35)
reg_nationality
Child_ reg_dbate Date
Child_ reg_dbate Date Varc(20)
Child_ reg_regno PK
reg_regno
Child_ reg_mwork Varc(35)
Child_ reg_mwork Varc(35)
Varc(20) Varc(40)
Varc(35)
Child_ reg_fwork Varc(35)
Child_ reg_fwork
Child_ reg_subcounty Varc(40)
Child_ Varc(35)
Child_ reg_county Varc(35)
Varc(35)
Child_ reg_subcounty
reg_county Varc(35)
Child_ reg_district Varc(35)
Child_ Child_ reg_parish Varc(35)
reg_district
Child_
Table 2 Child birth registration table
reg_parish
called birth registration. Finally the data stored in the table used to generate both demand
and periodic report.
Birth registration individual report
Child birth registration generates individual report by using child registration number,
individual report is printed out by a system user and therefore the mother receives hard
copy of birth Registration
23
Table 3: Child medical form
Table 3 child medication form
Child Details
Child
Name:
Amenu Child's Nationality
Congolese Registration Date of Birth
Number.445 :06·Jan·2019
Child's Nationality:
Health unit: Date:06·Jan·2019
Congolese
Parents Details
The doctor use child birth registration number to search child details from the
registration table and child registration number is a primary key which identifies one
child from another child then the doctor adds medical records. Finally submits
medical records in medical table.
24
Table 4: Child Details
Table 4 child details
Child birth registration allows data sharing between local and hospital,
government the
government use child birth registration to generate birth certificate, for this case the
primary key is very important because it help to extra details of individual child from
the registration table. Finally register child birth certificate in birth certificate table.
25
CHAPTER FIVE
5.0 Introduction
This section describes the structure design of the system. It includes the screenshots for the system
and the description of the system functionality.
The figure above illustrates the nature of the system. The page contains user controls that
can give users access to other pages. For example, a user can create an admin account log
and access all user control panels for the system.
26
Figure 2 Admin Login page
After successful creating an account, the administrators have been provided with clear
control panels that can allow to proceed with using the system to fulfill their request.
after logging in an admin should create an Hospital account so that he/she will be able to
access the system registration
27
Figure 4 Hospital login
in this page the admin should login by using the hospital account and access the
registration form
From the forms identified above, the user (administrator) makes a request by either
submitting in information he or she need.
28
Figure 6 Number of registration babies
The above page allows the admin to request and print out the birth certificate
29
5.2 Database Design and development results
After the database design decisions, the right model for the database was modeled and exported to
the server and the database tables appear as show below
30
Figure 9 Child table
below is how it looks on the server
31
Hospital table, this is where all hospitals data is stored, below is how its structure looks on the
server;
32
CHAPTER SIX
6.0 Introduction
This chapter present the conclusion and the recommendations. The conclusion was explained
according to the study achieved goals, according to the objectives of the study.
6.2 Limitations
The implementation of child birth Management System faced numerous challenges among
which include the following.
i. Limited Internet facilities mainly for making research and hosting the database
which led the researcher end up using local hosting technology which is easy to
adopt and always free financial constraint. The study being self-sponsored activity,
the research would sometimes face some problems to finance some activities
involved in the study like transport to Focus Logistics Agencies and writing
materials.
ii. Through all the study, availability of electricity power was not on the
researcher’s side it would go off leaving the work on stand still.
iii. Limited time space given, a variety of technologies involved in the
development of the system which made it difficult to choose the one that can best
suite the users since all users have different experience and knowledge to
computer usage.
33
6.3 Future Works
i. To improve the system for future use various child birth system such as management
Information System (MIS) can be integrated for the system to be more comprehensive.
ii. Child birth management system should be further integrated with other functionalities
that were outside the scope of this study.
iii. There is need for child birth management to match the current technology trends. This
implies that the hospitals will need to undertake a number of reforms and changes in the
organizational policies to ensure a more effective and efficient way of service delivery
especially with online patients.
6.4 Recommendation
If the system is to be used· efficiently the users have to be familiar with the existing system: its
strengths, its weaknesses and also be educated about the new system and its advantages and
most importantly the benefits of child birth records management systems. Also the users must
be taught to recognize the need of this particular information system in as much as simplifying
their duties with time the system should be improved to facilitate other regional referral
hospitals in Nigeria. This was ease sharing of information especially in department of child
medical health and as such allows joint decision making that was improve child medical health.
6.5 Conclusion
This study identified the major problems faced by the existing child birth records management
system in Nigeria and attempted to solve them by developing child birth records management
system to manage records that consist of the following: A web-based application that can
therefore be accessed from any computer that is connected to the Internet thus making it online.
Edit, update and delete operations on exiting information in the database by the systems
administrator. The main objective of the study, which was to develop a system that can be used
by Nsambya hospital to capture child records, was achieved.
34
REFERENCES
Alkema L, New JR (2013). Estimating levels and trends in under-5 mortality: an assessment of
biases in data series and an improved estimation method. Paper to be presented at the XXVII
IUSSP International Population Conference, Busan, Republic of Korea.
Curbera, F., Nagy, W. and Weerawaran, S. (2001). Web services. Why and How.
Estimates Using Full Birth Histories and Summary Birth Histories. PLoS Med 9(8): el 001296.
doi: 10.1371/journal.pmed.1001296
Gellersen, H. and Gaedke. (2005). An Object-Oriented Model for the Web Application
Development Process, IEEE Internet Computing.
Geoffrey Elliott & Josh Strachan (2004) Global Business Information Technology. p.87
Kingkade WW and Cheryl CC. Infant Mortality in Eastern Europe and the Former Soviet Union
Before and After the Breakup. Population Division, US Bureau of the Census, Washington, DC
20233. (Prepared for presentation at the 2001 Meetings of the International Union for the Scientific
Study of Population, Salvador de Bahia, Brazil, August 19-24. Available at
www.iussp.org/Brazil2001/s40/S44_02_kingkade.pdf)
Marakas, James A . O'Brien, George M (2010). Management information systems (10th ed.).
New York: McGraw-Hill/Irwin. pp. 485-489. ISBN 0073376817.
35
Parag C. Pendharkara, James A. Rodgerb, Girish H Subramanian (November 2008). ‘‘An
empirical study of the Cobb-Douglas production function properties of software development.
Post, G., & Anderson, D (2006). Management information systems: Solving business problems
with information technology. (4th ed.). New York: McGraw-Hill Irwin.
Radack. S. (n.d.). The system development life cycle (sdlc). Retrieved from
http://csrc.nist.gov/publications/nistbul/april2009 _system-development-life-cycle. pdf
Sawyer CC (2012) Child Mortality Estimation: Estimating Sex Differences in Childhood Mortality
since the 1970s. PLoS Med 9(8): e1001287. doi: 10.1371/joumal.pmed. l 001287
UNAIDS. 2012 UNAIDS Report on the Global AIDS Epidemic. Geneva, UNAIDS, 2012.
Walker N, Hill K, Zhao F (2012) Child Mortality Estimation: Methods Used to Adjust for Bias
due to AIDS in Estimating Trends in Under-Five Mortality. PLoS Med 9(8): el 001298. Doi:
10.1371/journal.pmed.1001298
Zeitlin J and Wildman K. Indicators for Monitoring and Evaluating Perinatal Health in Europe.
European Union Health Monitoring Programme, 2000. (8) Graafmans WC et al. Comparability
of Published Perinatal Mortality Rates in Western Europe: The Quantitative Impact of Differences
in Gestational Age and Birthweight Criteria. BMOJ:
36
APPENDIX ONE: INTERVIEW
4. Give any suggestions on how the problems faced with the existing system can be
solved.
37
APPENDIX TWO: TIME/ACTIVITY SCHEDULES
38
APPENDIX THREE: BUDGET ESTIMATE
NO ITEM AMOUNT(Ugx)
1. photocopy 20.000
2. printing 40.000
3. binding 40,000
4. Transport 250.000
5. Internet 100.000
6. Airtime 50.000
39
APPENDIX FOUR: SAMPLE CODE
<?php (6, 'Hoima'),
ob_start(); // Initiate the output buffer to avoid header (7, 'Gulu'),
problem while redirecting (8, 'Tororo'),
(9, 'Kiboga'),
// Start the session (10, 'Kotido'),
session_start(); (11, 'Ishaka'),
?> (12, 'Kiruwura'),
<!DOCTYPE html> (13, 'Moroto'),
<html> (14, 'Kuumi'),
<head> (15, 'Ntungamo'),
<title>BCIS</title> (16, 'Kasese');";
<link rel="stylesheet" type="text/css" $connection->query($sql);
href="bith.css"> }
<?php
// Database connection
require 'db.php'; ?>
40
displayModal("Problem Signing in", setcookie("hospital_login_status",
"Username or Password incorrect!"); "logged_in", time() + (86400 * 30), "/"); // 86400 = 1
echo "<script type=\"text/javascript\"> day
window.location.href = 'index.php#adminLogin'; setcookie("hospital_user", $username,
</script>"; time() + (86400 * 30), "/");
} // Redirect to hospitalDataEntry page
} else { echo "<script type=\"text/javascript\">
// Failure window.location.href = 'hospitalDataEntry.php';
displayModal("Error", "Username doesn't </script>";
exists!"); } else {
echo "<script // Password don't match
type=\"text/javascript\">window.location.href = displayModal("Problem Signing in",
'index.php#adminLogin'; </script>"; "Username or Password incorrect!");
} echo "<script type=\"text/javascript\">
window.location.href =
} else { 'index.php#hospitalDataEntry'; </script>";
displayModal("Error", "Problem getting data }
from user"); } else {
echo "<script type=\"text/javascript\"> // Failure
window.location.href = 'index.php#adminLogin'; displayModal("Error", "Username doesn't
</script>"; exists!");
} echo "<script
} type=\"text/javascript\">window.location.href =
'index.php#hospitalDataEntry'; </script>";
}
/*
* hospitalLogin php } else {
* displayModal("Error", "Problem getting data
*/ from user");
echo "<script type=\"text/javascript\">
// When hospitalLoginSubmit button clicked window.location.href =
if (isset($_POST['hospitalLoginSubmit'])) { 'index.php#hospitalDataEntry'; </script>";
if (!(empty($_POST['hospitalUserName']) ||
empty($_POST['hospitalPassword']))) { }
$username = }
testInput($_POST['hospitalUserName']);
$password =
testInput($_POST['hospitalPassword']); /*
* birth certificate request page php
// Check if username and password is correct *
$sql = "SELECT `password` */
FROM `hospitals`
WHERE `username`=?;"; // When birthCertificateRequest button clicked
$result = $connection->prepare($sql); if (isset($_POST['birthCertificateRequest'])) {
$result->bind_param('s', $username); if (!(empty($_POST['childID']) ||
empty($_POST['hospitalID']) ||
if ($result->execute()) { empty($_POST['gender']) || empty($_POST['date']) ||
$result->store_result(); empty($_POST['time']) ||
empty($_POST['childName']) ||
// Store result in $storedPassword variable empty($_POST['fathersAadharNumber']) ||
$result->bind_result($storedPassword); empty($_POST['mothersAadharNumber']))) {
$result->fetch();
$childID = testInput($_POST['childID']);
if (password_verify($password, $hospitalID = testInput($_POST['hospitalID']);
$storedPassword)) { $gender = testInput($_POST['gender']);
// Success $date = testInput($_POST['date']);
42
$time = testInput($_POST['time']); WHERE aadharNo = ?";
$childName = testInput($_POST['childName']); $result = $connection->prepare($sql);
$fathersAadharNumber = $result->bind_param('s',
testInput($_POST['fathersAadharNumber']); $mothersAadharNumber);
$mothersAadharNumber = $result->execute();
testInput($_POST['mothersAadharNumber']);
$address = testInput($_POST['address']); // Get result from database
$res = $result->get_result();
// Check if hospital is selected or not
if ($hospitalID == "default") { // Convert it to associative array and get
displayModal("Error", "Please select the the name
Hospital"); $row = $res->fetch_assoc();
echo "<script type=\"text/javascript\"> $mother = $row['name'];
window.location.href =
'index.php#requestCertificate'; </script>"; // Get city
} else { $sql = "SELECT city.cityName
// Check if child is registered FROM hospitals, city
$sql = "SELECT childID WHERE hospitals.cityID =
FROM birth_details city.cityID AND
WHERE childID = ? AND username = ?";
gender = ? AND $result = $connection->prepare($sql);
dob = ? AND $result->bind_param('s', $hospitalID);
time = ? AND $result->execute();
fAadharNumber = ? AND
mAadharNumber = ? AND // Get result from database
hospital = ?"; $res = $result->get_result();
$result = $connection->prepare($sql);
$result->bind_param('issssss', $childID, // Convert it to associative array and get
$gender, $date, $time, $fathersAadharNumber, the name
$mothersAadharNumber, $hospitalID); $row = $res->fetch_assoc();
$city = $row['cityName'];
if ($result->execute()) {
$result->store_result(); // Store the details in session array which
if ($result->num_rows == 1) { is used to generate pdf
// If entered details are correct, generate $_SESSION["hospital"] =
the birth certificate pdf strtoupper($hospitalID);
// Get father's name $_SESSION["name"] = $childName;
$sql = "SELECT name $_SESSION["gender"] = $gender;
FROM aadhar $_SESSION["dob"] = $date;
WHERE aadharNo = ?"; $_SESSION["city"] = $city;
$result = $connection->prepare($sql); $_SESSION["fName"] = $father;
$result->bind_param('s', $_SESSION["mName"] = $mother;
$fathersAadharNumber); $_SESSION["address"] = $address;
$result->execute();
// Generate pdf
// Get result from database header('Location: pdf.php');
$res = $result->get_result(); } else {
// If details not found
// Convert it to associative array and get displayModal("Error", "Data entered is
the name not correct.");
$row = $res->fetch_assoc(); echo "<script type=\"text/javascript\">
$father = $row['name']; window.location.href =
'index.php#requestCertificate'; </script>";
// Get mother's name }
$sql = "SELECT name } else {
FROM aadhar
43
displayModal("Error", "Problem getting }
data from database"); });
echo "<script type=\"text/javascript\"> </script>
window.location.href =
'index.php#requestCertificate'; </script>"; <!--script for date and time picker -->
} <script>
} $('.datepicker').pickadate({
selectMonths: true,
} else { selectYears: 15, // Creates a dropdown of 15
// Error getting data years to control year,
displayModal("Error", "Problem getting data today: 'Today',
from user"); clear: 'Clear',
echo "<script type=\"text/javascript\"> close: 'Ok',
window.location.href = closeOnSelect: false // Close upon selecting a
'index.php#requestCertificate'; </script>"; date,
} });
}
$('.timepicker').pickatime({
default: 'now', // Set default time: 'now',
?> '1:30AM', '16:30'
fromnow: 0, // set default time to *
<?php milliseconds from now (using with default = 'now')
// Close database connection twelvehour: false, // Use AM/PM or 24-hour
$connection->close(); format
?> donetext: 'OK', // text for done-button
cleartext: 'Clear', // text for clear-button
<!-- if logged in, then redirect to respective pages --> canceltext: 'Cancel', // Text for cancel-button
<script type="text/javascript"> autoclose: false, // automatic close timepicker
function readCookie(name) { ampmclickable: true, // make AM PM clickable
var nameEQ = name + "="; aftershow: function () {
var ca = document.cookie.split(';'); } //Function for after opening timepicker
for (var i = 0; i < ca.length; i++) { });
var c = ca[i];
while (c.charAt(0) == ' ') c = c.substring(1, </script>
c.length);
if (c.indexOf(nameEQ) == 0) return <!-- script to open modal -->
c.substring(nameEQ.length, c.length); <script>
} $(document).ready(function () {
return null; $('.modal').modal();
} $('#modal1').modal('open');
$('a[href="#adminLogin"]').click(function () { });
</script>
var cookie_value =
readCookie('admin_login_status'); </body>
if (cookie_value === 'logged_in') { </html>
window.location = "addHospitals.php";
}
});
$('a[href="#hospitalDataEntry"]').click(function ()
{
var cookie_value =
readCookie('hospital_login_status');
if (cookie_value === 'logged_in') {
window.location = "hospitalDataEntry.php";
44