Académique Documents
Professionnel Documents
Culture Documents
AND MANAGEMENT
SCIENCES
“Doctor online”
A Project Report
Session 2008-2009
Submitted By:
Sahdev Singh 0607514028
Ram Prawesh Yadav 0607514025
This is to certify that this project entitled “doctor online” submitted by Sahdev
Singh and Ram Prawesh Yadav of MCA final year (session 2008-2009) developed
by the students during the industrial training at CMC Limited Noida, has not been
We also certify that this project fulfills the requirements that are
necessary in the project submitted by the student of the Industrial training. We find
that the above mentioned project is suitable in the partial fulfillments of the
We hereby declare the this project entitled “doctors online” assigned to us during
our 6 month industrial project training at CMC Limited has been made by our team
We have developed that project, all its component and designing has
been done by the team. During the development of this project emphasis was given
on the client requirement specified in the synopsis. As we are submitting this project
for the partial fulfillments of the requirement for the award of degree of Master of
Sahdev Singh
MCA Final Year
Roll. No. 0607514028
manager of CMC Limited for his invaluable guidance, inspirations and timely
suggestions which facilitated the entire process of bringing out this project entitled
We are highly obliged to Mr. Manoj Kumar, Mrs. Neetu and Mr. Ashish Kumar
of CMC Limited for their valuable technical guidance during the development and
Computer Application Department) for his kind and unpartial attitude towards us. We
also wish to express our heartiest gratitude to our project guide Mrs. Paramjeet
Rawat for making the valuable information available on time and for her kind and
Sahdev Singh
CMC NOIDA has been selected for imparting corporate training for the renowned
leading organization like Tech Mahindra, HCL Technologies, Tata Motors and so
on. We have already trained 400 employee of Tech Mahindra and more than 800
employee of HCL as ILP at Noida center since July 2006. To add on we are also
providing Pro-metric Testing facilities for the candidates which add on the
enduringness to our program. We are also proud to have world class trainers for
providing in depth study for the topics. Apart from that we have tie-ups with various
Engineering colleges in the form of Project /Industrial training to provide the high-end
training programs especially on .Net/Java/Embedded System/Oracle etc for
Engineering and MCA students.
Location –
D 108 Sector -2 Noida (U.P)
Ph. 95120-3061873, 9810041839, 9810041879
WebSite: www.cmcnoida.com
E-mail: info@cmcnoida.com
Contents
Project introduction
system analysis
feasibility study
software description
system design
database description
Project Dictionary
o Class diagram
o Sequence diagram
o Collaboration diagram
ER diagrams
Testing
User interface
Implementation
Enhancement
Limitation
References
Project Description
This System is mainly used by Doctors, Dentists, Optometrists, and any
practice of medicine. Many times they run into a complicated patient and need to
A nice way to get a second opinion is through photos. But then they have to take
photo’s print them out and mail them. Or you can email them to an intended
specialist but this can pose serious privacy issues and can be time consuming.
This system is to solve this problem. i.e., to make it easy for anyone to take
photos, upload them to a web page that is secure and then simply email the link to
anyone. The intended referral can then view the pictures and enter comments at the
create an account. The basis of the site is for members to create web pages from
preformatted templates with simple point and click. They can upload pictures and
add text to these templates. Once they are finished they click create and the web
page is created in their folder under the root domain. They need to be able to
password and username protect the individual web pages they create so when
someone comes to a particular page in their folder they must enter the correct
The web page that is produced should have small thumbnails of the original
images uploaded (so the page loads fast). Then when someone clicks on the
After the user has created the page, they should be able to email anyone they want
to come see the page they have created. An email should be sent to anyone the
user desires.
The webpage created needs to have an open form at the bottom of the page, where
a viewer can respond to the creator within the web page. In other words when a
visitor comes to the site and views the pictures and the text they can then enter a
response in the form and then click on a link that will email the form to the creator of
1. Member Area
2. Control Panel
Members Area: When users first comes to the site they will obviously hit the home
page that will have an overall description of the service and some marketing hype,
etc. They will then click on a “join” or “sign up” link, which will take then to the first
At sign up, the user should provide all essential information. After the user
will then be created for the user. This account will create a folder under the root
panel that he can log into to create pages, view user feedback, delete pages,
change usernames and passwords for different pages, etc., The control panel
should probably be located within his folder to avoid confusion later on.
Page Creation : When user decides that he wants to create a web page with
some photos so he can get some feedback from a colleague. He comes to the site
and clicks on a “LOG IN” link, enters his username and password and is then taken
Within his control panel there is a button that allows him to create a new page. He
clicks the button and then the wizard begins. He should first be asked to name the
page. This text will show up at the top of the page created.
He will then be asked to choose a template. The templates should be nothing more
than simple web pages that have 2 pictures side by side with an area for text below
template inside. Within each picture spot there should be a link that when clicked
will allow john to choose a photo from his PC to be uploaded to that spot.
User should be able to preview his page before finalizing. The preview should have
a picture in each spot and the accompanying text below each picture.
This application will be dealing with sensitive patient information and needs a
good level of security. User should be able to choose a username and password
for the web page or the folder that will be created for it. So when a viewer comes to
the page they should be prompted for the username and password. The application
should then check it against the set stored in the database and grant permission to
When user clicks create, the application creates a unique folder within his folder,
uploads the photos to the folder, creates the HTML and saves the photos and web
page in it. (i.e., JSmith). The folder should be named similar to the web page being
created.
**Notes on the page generated. When the application creates the web page should
have a form at the bottom of EVERY page created that allows a visitor to put his/her
input in and then submit those comments to the creator. This can be part of every
template in the system. It needs to email the responses to the email address on file
for the user and also alert the user at their control panel that a response has been
posted to whatever web page they created. They should then be able to view these
responses from within the control panel and delete them when they are done.
User can then select to email an alert to who ever he chooses. So if he wants his
colleague in Germany to view the pictures he can enter the email address and send
an email that will have a link to the web page in it. The email should also send the
After user has created his page there should be an area in his control panel that
allows him to view, delete and edit his work. This part should allow him to email
alerts, change usernames and passwords, delete pages (and also the associated
folder and files in that folder) and change text within the template, change pictures
professionals. After they have created their pages and emails sent then other
When a viewer comes to a generated page the first thing that should happen is a
prompt for username and password. Once they have provided the correct pair then
The pictures should be smaller thumbnails of the originals. When the viewer clicks
on the picture a new window opens with the original sized picture.
After they have reviewed the pictures and text they should then scroll to the bottom
of the page and enter their comments into a form. This form should ask for the
viewers name and comment. The viewer, then clicks submit and the comments will
be emailed to the creator and also saved in the database. When the creator comes
to his control panel, there should be an alert that a comment has been posted.
He/she should then be able to click on a link and view the comment. After reviewing
the comment they should be able to delete or respond to the comment. Once they
have deleted the comment then it will be removed from the database and the control
panel.
Control Panel
- Creates web page and stores all files for that “session” in unique folder
- Can send email alert to anyone, will email link and username and password
- Comments are emailed to user and stored for viewing at control panel.
System Analysis
System Analysis is the process of examining a business situation with the intent of
improving it through better procedures and methods Requirement analysis is the first
specification. It is the systematic use of proven principles, techniques, languages and tools
for the cost-effective analysis, documentation and on-going evolution of user needs and the
The very first thing is the problem recognition. After the need of the project is
identified the implementation of the project is identified – who is going to use the system,
what all are the points needed in modeling the design of the system.
TARGET USERS
The term user is widely used in the system analysis and design. The term end-user is
widely used by the analysts to refer to people who are not professional information systems
specialists but they are specialist in their respective field and who can use computers to
• Hands-on Users actually interact with the system. They are medical professional or
might be their representative who fed in data and receive output as answered from the
specialist.
• End- Users benefits form the results produced by these systems but do not directly
interact with the patients, but overall it is the patients who gets the benefits of the
system.
• Manager users are third types of users and are talking increased responsibility for the
SYSTEM DEFINATION
accomplish some purpose. Systems are all around us. As computers are used more and
more by persons who are not computer professionals, the face of systems development is
of the systems they use, as the executive in the vignette emphasized. These different
information systems: -
Systems development, a process consisting of two major steps of systems analysis and
thought of as the set of activities that analysts, designers and users carry out to develop and
implement an information system. Different parts of the project can be in various phases at
the same time, with some components undergoing analysis while other advanced stages.
• Preliminary investigation.
• Design of system.
• Development of system
• System testing.
elements.
Create a system definition that forms the foundation for all subsequent engineering work.
Both hardware and software expertise are required to successfully attain the objectives
listed above.
As our website “doctor online” is going to be used by the people who may or may not
IDENTIFICATION OF NEED
This step is initiation of system analysis .An overview of the doctor’s requirement has
been done. The basic need of the user to opt for such kind of project is analyzed.
1. Slow process
2. Time consuming.
3. Lacks accuracy.
specialist to quick access of all records. It also maintains all the files in databases to provide
quick access and save the time. The objective of the project is to develop system for
handling the patients where a doctors need to take advice of other doctors. The main aim of
the project is to increasing the efficiency of the management process and to better maintain
the records of the patients who visit the doctors. And when need records should available
easily.
purposes. Regardless of the nature of the information required, the information should
recent years, need for information improvement by reports lacking one or more of these
characteristics and by increased paper work volume, rising costs, and pressures from
outside changes.
Fortunately computers thrive on repetitive large volume processing tasks, are fast
and accurate. The processing capability in many organizations has been strained by
More than a million new pages of data are generated each minute of the day in offices.
Compare to other processing methods, the use of computers may make it possible for
certain administrative costs to be reduced while the level of processing activity remains
stable. The increased cost and clerical labor materials and other expenses associated with
volume and size of an organization, there is only a reduction in the speed of processing.
Rapid changes are taking place in the world socially, economically and technically. Such
changes have a significant impact on the environment in which organizations must operate,
on the planning that managers must do, and on the information that they must have. But if a
data processing operation is strained to or beyond the capacity for which if was originally
planned, inaccuracies will begin to appear. Inadequate control will permit inadequate
performance. It is due to these pressures (increased paper work volume, costs, pressure
from outside changes, and demand for timeliness & demand for quality) that most of the
organizations today are opting for computers to do data processing for them. The project is
information might lose the characteristics of either timeliness or accuracy. Hence the need
All the data has to be first fed in the computer. Once it is stored in the files any query
regarding the patient to a specialist can be made satisfactorily. The retrieval process
involves much less time and the information is accurate. Any updating is easily
accommodated.
PRELIMINARY INVESTIGATION
The user is a doctor and a specialist, which has to keep records of his patients, their details,
the details of their requirements. The doctors can also maintain the resource pool of patients
• Team Structure.
• Topic understanding.
• Database requirements
TEAM STRUCTURE
The project team comprises of four members who worked as developers and a project
leader who assigned the whole task and provided the finest details of the problem. The
project guide supervises the whole project work and sort out the problems occurred during
TOPIC UNDERSTANDING
It is vital that the field of application as introduced in the project may be totally a new field.
So as soon as I took this project, I carefully went through the project to identify the
Password Module
In this module, user enters a password and the system checks its validity. If the password is
Registration
Those who are interested can have the membership of the website for this they have to be
registered themselves on the website they will be provided a valid identification and the
password.
Doctors can create the webpage of the patients regarding whom they want to consult their
colleagues or seniors. These page will have the description of the along with information
As any formation regarding a patient can be changed due to wrong entry or due to change
of problem hence a facility to edit the page is provided. If page is not needed in future
specialist to whom we want to send the page. Apart from this we can send the pages later
Alert and feedback are like inbox that we see when we check our e-mail. Alert is a inbox in
which specialist get the message received from doctors while feedback are the answered
Address book
Members are being provide this facility based on the specialization they are provided this
facility to see the address book of the doctors having their details.
Setting
Members have this facility to change the setting of their account i.e. the password for
security purpose.
In this module, the validity of data entered by the doctors during the various processes is
checked through various validation checks. For example, there shouldn’t be any characters
entered in the numeric fields, likewise if there is any error occurs that it should handle that
doctor.
performed, just like the first module it should have the proper checks for every entity being
modified or updated. In this module, validation checks are made and the different messages
DATABASE REQUIREMENTS
• The various key fields (for example Primary key and foreign key).
Feasibility Study
Depending on the results of the initial investigation, the survey is expanded to a more
detailed feasibility study. Feasibility study is a test of system proposal according to its work
ability, impact on the organization, ability to meet user needs, and effective use of
resources. The objective for this phase is not to solve the problem but to acquire a sense of
scope. During the study, the problem definition is crystallized and aspects of the problem to
being spent currently in order to achieve benefits to be received over a period of time
We started the project by listing the possible queries that the user might want to be
satisfied. And on these lines we guided the project further. The three main points, kept in
The three major areas to consider while determining the feasibility of a project are: ---
ECONOMICAL FEASIBILITY
An evaluation of development cost weighed against the ultimate income or benefit derived
from the developed system. Today, software is the most expensive element of virtually all
computer-based systems. A large cost estimation error can make the difference between
profit and loss. Estimation of resources, cost, and schedule for a software engineering effort
requires experience, access to good historical information, and the courage to commit to
quantitative predictions. Estimation carries inherent risk and this risk leads to uncertainty.
Project complexity has a strong effect of the uncertainty inherent in planning. Complexity,
however, is a relative measure that is affected by familiarity with past effort. Project size is
another important factor that can affect the accuracy and efficiency of estimates. As size
increases, the interdependency among various elements of the software grows rapidly.
Software cost and effort estimation will never be an exact science. Too many variables-
human, technical, environmental, political-can affect the ultimate cost of software and effort
applied to develop it. However, software project estimation can be transformed from a black
art to a series of systematic steps that provide estimates with acceptable risk. The system is
not too costly according to the features of the application. The cost of the project is
TECHNICAL FEASIBILITY
is a serious constraint, then the project is judged not feasible. The analyst thinks about the
technical feasibility of the system. In the proposed system, the application has made in this
way so that it is technically feasible for the distribution promotion. There are some certain
types of control being used in the system to make the application more users friendly i.e. the
grid view is used. The system has made in such away that it is being used for a single user
Windows XP. Thus we see that the system is more technically feasible regarding to
operating system. We are using Microsoft SQL Server 2005 as backend for maintaining
the database. SQL Server is a relational database management system of an object that is
formed by the database and an instance of the SQL Server. SQL Server 2005 is Windows
based RDBMS. This is one of the powerful RDBMS due to its menu driven facility. This
provides a better service to the user in the sense of taking the backup of data and then
restores it. We can easily mirror the database in the SQL Server 2005
This application is very easy to operate as it is made user friendly. Main consideration is
The findings of a feasibility study are generally documented in what is called a feasibility
report. The degree of detail in such reports would be greatly dependent on the native of the
Introduction
• Statement of problem
• Implementation Environment
• Constraints
• Important findings
• Comments
• Recommendations
• Impact
Alternatives
System description
analysis task. The function and performance allocated to vital as part of system engineering
and design constraints, appropriate validation criteria, and other information pertinent to
requirements.
The Introduction of the vital requirement specification states the goals and objectives
of the vital, describing it in the context of the computer-based system. Actually the
introduction may be nothing more than the software scope of the planning document. The
information description provides a detailed description of the problem that the vital must
solve. Information content, flow, and structure are documented. Hardware, Software and
human interfaces are described for external system elements and internal software
functions. For this project we need some special type of environment for setup. This is as
follows:
Software Interfaces
II Environment VisualStudio.Net
.
I Technology ASP.NET
V
.
Hardware Interfaces
It's a web – based project, so a robust hardware configuration is required. The hardware
requirements are:
DEVELOPMENT ENVIRONMENT
Microsoft Visual Studio 2008 .NET
The .NET Framework is a managed type-safe environment for application development and
execution. The .NET Framework manages all aspects of your program’s execution. It
allocates memory for the storage of data and instructions, grants or denies the appropriate
permissions to your application, initiates and manages application execution, and manages
the reallocation of memory from resources that are no longer needed. The .NET Framework
consists of two main components: the common language runtime and the .NET Framework
class library.
The common language runtime can be thought of as the environment that manages
code execution. It provides core services, such as code compilation, memory allocation,
thread management, and garbage collection. Through the common type system (CTS), it
enforces strict type-safety and ensures that code is executed in a safe environment by also
The .NET Framework class library provides a collection of useful and reusable types
that are designed to integrate with the common language runtime. The types provided by
the .NET Framework are object-oriented and fully extensible, and they allow you to
seamlessly integrate your applications with the .NET Framework. The .NET Framework is
designed for cross-language compatibility, which means, simply, that .NET components can
interact with each other no matter what supported language they were written in originally.
So, an application written in Microsoft Visual Basic .NET might reference a dynamic-link
library (DLL) file written in Microsoft Visual C#, which in turn might access a resource written
in managed Microsoft Visual C++ or any other .NET language. This language
interoperability extends to full object-oriented inheritance. A Visual Basic .NET class might
language runtime. When a .NET application is compiled, it is converted from the language in
which it was written (Visual Basic .NET, C#, or any other .NET-compliant language) to
Microsoft Intermediate Language (MSIL or IL). MSIL is a low-level language that the
common language runtime can read and understand. Because all .NET executables and
DLLs exist as MSIL, they can freely interoperate. The Common Language Specification
(CLS) defines the minimum standards to which .NET language compilers must conform.
Thus, the CLS ensures that any source code successfully compiled by a .NET compiler can
The CTS ensures type compatibility between .NET components. Because .NET applications
are converted to IL prior to deployment and execution, all primitive data types are
represented as .NET types. Thus, a Visual Basic Integer and a C# int are both represented
hard-to-find errors.
Visual Studio .NET ships with languages such as Visual Basic .NET, Visual C#, and
Visual C++ with managed extensions, as well as the JScript scripting language. You can
also write managed code for the .NET Framework in other languages. Third-party tools and
compilers exist for Fortran, Cobol, Perl, and a host of other languages. All of these
languages share the same cross-language compatibility and inheritability. Thus, you can
write code for the .NET Framework in the language of your choice, and it will be able to
interact with code written for the .NET Framework in any other language.
V C# Vb.net Jscript. …
I net
S
U Common Language Specification (CLS)
A
L
Window
s Forms Web Form Web Service
S
T
U ADO.Net and XML
D
I
O .Net Framework Classes
A database is stored in a very structured manner. Each database requires some way for a
user to interact with the information within. Such interaction is performed by a database
provide for the definition, storage, and management of data in a centralized area that can be
shared by many users. SQL Server’s database management system is patterned on the
relational model. Relational databases allow us to store vast amounts of data with far
sampler maintenance and smaller storage requirements than the equivalent flat database.
Relations among tables in a relational database are established using keys. A primary key is
a field that uniquely identifies a record so it can be referenced from a related table. A foreign
key is a field that holds identification values to relate records stored on other tables.
With each query of the database, we form a virtual table that contains the results of our
query. Database queries are made with a specific language named SQL (structured query
language).
SQL Server 2005has many performance improvements and features which allows
us to build and manage large databases, query them fast, insert data into them at high
rates, partition them for fast loading and backup and store very large objects or whole files.
Central, Shared, Accessible, Backed up, Version etc. SQL, as a relational data language
supports certain basic functions to control, define and manipulate data. SQL uses the term
row to refer to a database record and the term column to refer to database field
The Data type that a Cell can hold
UserDetails
PhoneBook
Feedback
UML DIAGRAMS
Specialist
View pages
V i ew M es s ag es
Doctors
Name : String Pages
Hospital Hospital-name : String Name : String
Hospital-ID : String Code : Int
Name : Strin g
Specialist : String Date-Creat ed : date
Addre ss : String
Email-ID : String Date-Mailed : d ate
Branc h : String
UserID : String Status : St ri ng
Branc h-Code : String
Receiver : Strin g
Register() Sender : Strin g
Data-Maint enance ()
Login() Creat or : String
Operat ions()
Page-Creation()
Facilities-Provisi on()
Page-Mailing() Numbe r-of-pages()
View-M essages() Pending-P ages ()
Login Send-Password()
UserID : S tring
Pass word : String
Vali date()
Specialists
Nam e : String Messages
Hospita l-N ame : Strin g
Name : String
Hospita l-ID : S tring
Validation Sender : String
Specialist : String
UserID : S tring Receiver : String
Em ail-ID : String
Pass word : String Me ssageID : String
Address : String
Vali date() Numb er-of-Messages()
View -Pages()
Aut hent icate() Reply()
Class relationship diagram for doctor’s online discussion forum
Doctors
Name : String Pages
Hospital Hospital-nam e : St ring Name : String
Hospital-ID : String Code : Int
Name : String
Specialist : String Date-Created : date
Address : String
Belong to Email-ID : Strin g Mails Date-Mailed : date
Branch : String
UserID : String Status : String
Branch-Code : String
1 * Receiver : String
1 *
Regis ter() Sender : String
Data-Maintenance()
Login() Creator : String
Operations()
Page-Creati on()
Facilities-Provision()
Page-M ailing() Number-of-pages()
Login View-Mess ages() Pending-Pages()
Login Send-Pass word()
UserID : String
Password : String Creat es & Views
Validate()
Login
Sp eciali sts
Aut hentication
Name : String Messa ges
Hospital-Name : S tring
Name : String
Hospital-ID : String Creates & Views
Validation Sender : String
Specialist : String
UserID : String Receiver : String
Email-ID : String
Password : String MessageID : String
Address : String
Validate() Number-of-Messages()
View-Pages()
Authenticate() Reply()
Class relationship diagram for page creation
Doctors
Name : String Pages
Hospital-name : String Name : String
Hospital-ID : String Code : Int
Specialist : String Date-Created : date
Email-ID : String Date-Mailed : date
UserID : String Status : String
Receiver : String
Register() Sender : String
Login() Creator : String
Page-Creation()
Page-Mailing() Number-of-pages()
View-Messages() Pending-Pages()
Send-Password()
Login
Login Validation
UserID : String UserID : String
Password : String Authentication Password : String
Validate() Validate()
Authenticate()
Class relationship diagram for mailing the page
Doctors
Name : String Pages
Hospital-name : String Name : String
Hospital-ID : String Code : Int
Specialist : String Date-Created : date
Email-ID : String Mails Date-Mailed : date
UserID : String Status : String
Receiver : String
1 *
Register() Sender : String
Login() Creator : String
Page-Creation()
Page-Mailing() Number-of-pages()
View-Messages() Pending-Pages()
Send-Password()
Login
Validation
Login
UserID : String
UserID : String
Password : String
Password : String Authentication
Validate()
Validate()
Authenticate()
Class relationship diagram for View-Messages
Doc tors
Nam e : S tring
Hos pital-nam e : S tring
Hos pital-ID : S tring M es sages
Login S pecialis t : S tring
Nam e : String
Login E m ail-ID : S tring
Us erID : S tring S end er : S tring
UserID : S tring
P as sword : S tring Rece iver : S tr ing
Create s & ViewsM es s ag eID : S tr ing
Regis ter()
V alidate()
Login()
Num ber-of-M essa ges()
P age-Creation()
P age-M ailing()
Lo gin V iew-M ess ages ()
A uthentication S end-P ass word()
Creates & V iews
V alidation
S pecialis ts
Us erID : S tring
Nam e : S tring
P as sword : S tring
Hos pital-Nam e : S tring
Hos pital-ID : S tring
V alidate()
S pec ialis t : S tring
A uthenticate()
E mail-ID : S tring
A ddress : S tring
V iew-P ages()
Reply ()
Class relationship diagram for facilities utilization
Doctors
Name : String
Hospital-na me : String Hospital
Hospital-ID : String Name : String
Speciali st : Strin g <<B elongs To>> Address : String
Emai l-ID : Strin g Branch : String
UserID : S tring Branch-Code : String
* 1
Regis ter() Data-Maintenance()
Login() Operations()
Page-Creation() Facilities-Provision()
Page-M aili ng() Discussion-Forums()
View -Mes sages()
Send-Pas swo rd()
Sequence diagram for Page-Creation
Enter UserID
Enter Password
Validate
Report if invalid
Authenticate if valid
Select a template
4: Report if invalid
5: Authenticate if valid
6: Name the page
7: Select a template
8: Select i mages & insert them 9: Select a specialist & retrieve their ID
10: Send the selected specialist ID
S:Specialist
Sequence diagram for Mailing the Pages
Enter UserID
Enter Password
Validate
Report if invalid
Authenticate if valid
Create a password
Select a Specialist
3: Validate
P:Page A:Authentication
1: En ter U serID
2: Enter P assword
8: Create a password
9: Select a Specialist
10: Mail the page
S:Specialist
Sequence diagram for View-Messages
Enter UserID
Enter Password
Validate
Report if inval id
Authenticate if valid
Edit a message
Edit a message
3: Validate
1: Enter UserID
2: Enter Password
D:Doctor A:Authentication
4: Report if invalid
5: Authenticate if valid
6: Edit a message
7: View/Mail the message
M:Message S:Specialist
8: Edit a message
9: View/Mail the message
Testing
System is tested for online response, volumes of transactions, stress recovery and
recovery from failure and usability. It has been vital for that system to make a logical
assumption that if any part of the system is not working properly. Although software
testing is itself an expensive activity, yet launching of this software without proper
testing was not possible.
Test Cases
The proper choice of test data is as important as the test itself. If test data as input
are not valid or representative of the data to be provided by the user, then the
reliability of the output may be suspect able. Test data may be artificial or live. It
depends where exactly we are going to execute the testing.
Unit Testing
In unit testing process different modules were taken independently to perform the
test. The software product by using prepared test cases and comparing the actual
results with the results predicted by the specification and design module. There were
a number of reasons in support of unit testing. These are given below:
• The size of single module is small enough, so we can
locate error fairly easily.
• The module is small enough that we can attempt to test it in demonstrably
exhaustive fashion.
• Confusing interactions of multiple errors in widely different parts of the
software are eliminated.
In unit testing the focuses was on the modules, independently of one another, to
locate errors. The programs were tested for correctness of logic applied and to
detect errors in coding. Valid and invalid data was be created and the programs
were be made to process this data to catch errors. All data that are entered was be
validated.
All conditions present in the program was tested, before proceeding one must make
sure that all the programs are working independently. Unit testing is simplified when
a module with high cohesion is designed.
Integration Testing
Symmetric technique for constructing the program structure while at the same time
conducting tests to uncover errors associated with interfacing. The objective is to
take unit tested components and build a program structure that has been dictated by
design.
Top-Down Integration Testing
The high level components of a system are integrated and tested before their design
and implementation has been completed.
Integral part of a top-down development process are where the development
process starts with high level components and works down the components
hierarchy.
All the low level components were integrated and tested before the higher level
components have been developed. It involves integrating and testing the modules at
the lower levels in the hierarchy and then working up the hierarchy of modules until
the final module is tested.
There is often a tendency to attempt non incremental integration, i.e. to construct the
program using a “big-bang approach”. .All modules were combined in advance. The
entire program is tested as a whole and chaos usually results. Some errors were
encountered. Correction was little bit difficult because isolation of causes is
complicated by the vast expanse of the entire program. As integration testing is
conducted, the tester should identify critical modules .A critical module has one or
more of the following characteristics:
• Addresses several software requirements.
• Has a high level of control.
• Is complex or error prone?
• Has definite performance requirements.
System Testing
Actually a series of different tests whose primary purpose is to fully exercise the
computer based system. Although each test has a different purpose, all work to
verified that the system elements have been properly integrated and perform
allocated functions.
When unit testing were conducted, we test the components i.e. various modules of
the software system. During integration of these modules we perform integration
testing and when all components of the system were integrated, we have a complete
computer based system and now we perform unit testing.
System testing also verified that file sizes are adequate and that indexes have been
built properly. Sorting and reindexing, procedures, assumed to be present in lower –
level modules, must be tested at the system level to see that they in fact, exist and
achieve the results the modules expect.
During the system testing, we should evaluate a number of attributes of the software
that are vital to the user. There were some special types of system tests which were
peak load test, storage testing, performance testing, recovery security and stress
testing.
Coding
Implementation
FUTURE ENHANCEMENTS
The project involves transforming the already existed manually operated system, so that it
can be accessed easily. Efforts have been made to cover all user requirements to the
extents possible and to make it user friendly. Input screens have designed in such a way
that user have practically no possible in entering the information.
The user can access the system from anywhere .If the user wants to check any feedback
then with a few keystrokes on a computer keyboard by a operator can avail all the details
helping him/her not to wander here and there in doing so. The paper work is greatly
minimized. No training is required for the users (doctors). With the interface a layman can
estimates, but analysis often takes weeks or months to complete. Therefore, we must
examine the product and the problem it is intended to solve at very beginning of the project,
At a minimum, the scope of the product must be established and bounded. Scope is defined
Context- how does the system to be built into a larger system, product, or business context
Information Objectives– What doctor visible data objects is produced as output from the
In recent times in India and also other parts of the world record handling and
maintaining the accuracy have become cumbersome processes. This system will assist
the concerned doctors in maintaining their records and searching proper matching as per
requirement only at mouse click. Manually find out the certain records in a very tedious,
cumbersome and risky job. This system can well assist in proper real estate records
management.
LIMITATIONS
Like any other standard application software (or any type of application in real world),
this developed software too has limitations. Although compared to the market, this software
“doctor online” this application might have some limitations and but in future with
enhancement it can be a better substituted for the “doctors”. Here is listing of known
• As this is a web-based application, like modern portals present on the internet or web
this portal might not be is not providing excellent user interface and GUI features.
However, attempts have been maintained to provide a sort of good user interface.
• Although security has been applied maintain the user name and password but still there
are chances that the confidential information provided by the user may get leakage or
tampered.
• As this a live project still the administrator part has to be made more affective to perform
functional tasks like checking the such as maintaining the database etc.
• Doctors are registered through online registration so there could be some fake person
• Whole of the registration process and the specialist searching is done on the website, so
the user must be aware of the computer system as such other device is being using to
• BOOKS
• WEB SITE
www.msdn.microsoft.com
www.support.microsoft.com
www.google.com
www.developer.com/net