Académique Documents
Professionnel Documents
Culture Documents
Chapter I
Introduction
priority calls was all very crucial in order to maintain the overall level of health
care in Kalayaan Health Center. However, to aim the level of efficiency and
recorded the dissatisfaction in the length of time spent between patient arrival
and actual starting time of consultation; the present assessment did not focus
on the issue of mobile smart phone usage as reading devices in the clinical
phone, to collect data from another device or NFC tag at close range. In many
ways, a contactless payment card can be integrated into a phone which was
can act as electronic documents and keycards which save the information and
website of the barangay health center that tracks the information of all the in-
and-out patients.
This study tried to comply with the needs of the barangay health
centers in retrieving the information of the patients using NFC (Near Field
Card) with ease. This was found out that the record management was very
important in the daily activities in the barangay health center in such a way
The virtual world needs the same kind of protection as the physical
world, especially when there was medical information involved. At the same
files, which can provide the best possible care. Using NFC to control access
protect data while making faster and more efficient to perform routine tasks,
Project Context
Bluetooth and Wi-Fi standard allowing users to perform and NFC device was
able to act both as reader and a tag. This unique ability has made NFC
NFC to read the information just needs to tap the NFC card. NFC fulfills
NFC technology begins with the ease of use by triggering the communication
centimeters of each other using the 13.56 MHz operating frequency which
known as the target. NFC Smartphone and NFC readers used own power.
emergency. One such has already been demonstrate the details. Home
or tablet, and the medical data where a medical professional can check it.
The tag can also provide access to web links, to get more information, request
enables the integration of services from a wide range of applications into one
not much academic data were available yet, although the number of academic
research studies carried out in the past two years has already surpassed the
1.1 age
1.2 gender
1.3 designation
4.1 Compatibility
4.2 Functionality
4.3 Portability
4.4 Maintainability
4.5 Reliability
4.6 Security
4.7 Usability
Specific Objectives
3. To test and evaluate the efficiency of the proposed system using ISO
3.1 Compatibility
3. 2 Functionality
3.3 Maintainability
3. 4 Portability
3. 5 Security
3. 6 Reliability
3. 7 Usability
Scope
The main goal of the healthcare and security applications was the
and the main benefits of NFC was the improvement of care, quality, and
Delimitation
The main barriers was limited in the availability of mobile phones with
health center staff. The proposed system was limited only in the use of NFC
card that can store information with the aid of website which was created to
for patient registration and appointment scheduling was time consuming and
difficulty finding the patient records. Normally, patients coming to the health
center and filling out registration forms and waiting to be called or patient calls
in for getting appointment and waits for the response for an agreed date.
Patients. The study provides the patient future reference for own
system that may help the said company Kalayaan Health Center
Future Researchers. The study can provide help for the future
Chapter II
This chapter includes the ideas relevant to the present subject relating
to the other studies and briefly discussed to provide the foundation of the
reading materials such as books, journals, magazines, case studies and other
which back up and justify the operational feasibility of the proposed study. In
order to develop new method and procedures, careful review of literature and
studies must be done for the development of the system, Improving Health
Conceptual Literature
coupling of radio frequency fields at 13.56 MHz NFC evolved out of existing
existing RFID system and infrastructure. The primary distinction between NFC
and other RFID technologies, varies on the operating range which typically
Foreign Literature
Foreign literature was the thesis topic other than own native literature.
theme, topic, genre of a foreign literature. This can be written in ones own
native language.
reduce public health care costs and enhance the quality of public health care.
factors and significantly improved the access to and delivery of public health
budgets. In this context, mobile smart phones were recognized as the best
choice for reader devices, considering the ubiquity and widespread use.
The smart phone has the advantage over other reading devices of
The main conclusion of this comparative assessment was that the use
combined with mobile smart phones as code reading and decoding devices,
for automatic patient identification, as well as for quick remote health record
budgets.
develops rapidly a challenge to make the mobile web of full use to make up
for the time and distance gab between doctors and patients to provide fast
management.
automatically monitor patient status and generate alerts and maintain logs can
cloud server.[2]
RFID system by using NFC tags and replaced the server architecture by using
generated and stored in the cloud server and also alerts were generated if the
patient was in a critical condition. Currently this possible to conclude that for
study from 2,894 articles initially obtained from the MEDLINE searches. A
Information System (HIS) client applications (4), medical training (2) and
fall-related (3), and two other conditions (2). The disease diagnosis, drug
Many medical applications for smart phones have been developed and
widely used by health professionals and patients. The use of smart phones
the point of care, in addition to the use in mobile clinical communication. Also,
smart phones can play a very important role in patient education, disease self-
targeted users (i.e., clinicians, medical and nursing students, and patients).
applications were growing day by day and new functionalities were available
with every major releases. The work of healthcare professionals was very
Moreover, performing simple medical exams such as visual acuity test also
viable using a smart phone. The wide adoption of smart phones by the
patients.
still issues for walk-in patient whereby have to wait for a very long period of
time for the turn to come up. Patient may schedule the appointment; however,
this still have to wait for the appointments to be confirmed from healthcare
administrator which may take weeks or even months for any available slots.
achieve small direct waiting time for unscheduled cases (especially when it
involves with urgent and emergency operation) without increasing the direct
and Engineering, 2(4), July - August 2013, 74 - 85 78. Both scenarios do not
work with parties involved. The party which includes involves the patient,
[4]
healthcare personnel and the healthcare center as a whole.
device as a queuing system for accessing patients health records and reports
which alert nurses, doctors and pharmacists upon the arrival on a web
Technology
hospitals to ensure effective and efficient service delivery in the health sector
system. Most patients complain about the time spent between walking into
the hospital and being attended by hospital staff, especially doctors. This calls
benefits.
which can be done only during working hours. The World Health Organization
(WHO) conducted a global survey in 2011 involving 114 nations and found
that mobile devices were used in almost all countries but this vary on the
uptake level: some use the mobile devices to send reminders to patients by
emphasis on the need to change in the way hospital services were offered by
sector In one study, this was reported that waiting time for patients who
appointment. [5]
need to fill in lots of forms. There was no waste of time in queues when a
appointments.
Medical Records which was now considered a key initiative in the Healthcare
industry. This was because paper medical records were easily lost and
damaged and also disappears during emergencies. This was often incomplete
charts really any better - Unless this was available to providers at the right
Healthcare decision.
transfer of healthcare details within and outside the organization Every now
and then new technology arrives and influences the lifestyle and changes the
EMR was one among them. Nowadays more focus was on mobile industries
and many technological applications bloom around it. This was observed the
the NFC technology and healthcare workflows and found that can be
technology which allows the exchange of data between a reader and a target
424kbps. Frequency speed of the NFC was 13.56 MHz. NFC was based on
not required set up by user. NFC technology makes it combine the interface of
The standards include ISO/IEC 18092 and those defined by the NFC Forum,
which was founded in 2004 by Nokia itself, Philips and Sony, and now has
more than 160 members. 1.2 Communication Mode In NFC, two type of
between the Initiator and the Target of the communication. Any device may
be either an Initiator or a Target. The device that initiates and controls the
exchange of data was called initiator and target was the device that answers
the request from the Initiator. a) Active Communication Mode: Initiator and
Target Device both have own power supplies and alternate generate own RF
signals on which the data were carried. This was the same for both initiator to
target and target to initiator. A device deactivates RF field while this was
waiting for data. Ex. Mobile phone, NFC reader b) Passive Communication
Mode: Target device has no power supply of the own RF signal. This powered
by the field generated by the initiator (reader). The Initiator was the device
Local Literature
topic, genre of own literature. This cannot be written in other native language.
for admission, referring physician, public health identification number, etc. and
recorded at this stage. At the same time at least one additional identification
number was assigned to the admitted patient, which was also used in the
patients medical record. This number, along with other basic personal
information, was either directly printed on the wrist bracelet that were usually
generated and fitted to the patient, or printed on a label which attached to it.
Later, the treating physician, with the assistance of other health care
personnel, was responsible for filling out the patients medical history in
accordance with the particular model used in the public health system or the
particular health care center. Subsequent patient identification was still today
was highly undesirable because was inevitably prone to human error. The
identification was a practical means to reduce these risks. Such systems can
Record). Although the main purpose of any system for this purpose was to
clinical information was also a desirable feature. Additionally, the system must
handed.
efficiencies.
For healthcare CFOs, the challenge was not only to secure the funding
for new technology, but also to weigh the potential benefits of new and
costs, and long-term technology evolution. This white paper outlines some of
the major challenges faced by healthcare CFOs and discusses how smart
Research Literature
Foreign Studies
victims were left without homes after were devastated in the earthquake and
health of these residents but providing individual services was beyond the
scope of the resources available, and a complete and innovative system was
To enable patients to track the data and to improve the impact of local
Mobile phones now-a-days was largely used in almost every part of our
life as easy to carry and were easily accessible. This was always available
with the patient and location aware. Considering this large functionality of
mobile phone sit be helpful to use in healthcare system to make the medical
data easy to carry, efficient, accessible, and manageable. The patients can
can use this to monitor the health of the patient with the use of portability of
health records.
technology that has proven to be reliable and secure can be used for storing
health credentials and securing the data. This can be achieved using the
system which includes- i) Secure Health card for storing patient ID and ii)
This system can benefit both the patient and the doctors by providing a
robust and secure health flow. This can provide portability to devices and
RFID was an AIDC method that uses radio waves to store and retrieve
data from an identification chip. These chips were known as RFID tags. RFID
was now widely used in the industry for several applications including
writer RFID tag and application software for processing the information. The
periodically transmits signals to search for tags in the vicinity. When this
captures a signal from a tag, this extracts the information and passes the data
antenna, a radio transceiver and integrated circuit for storing and processing
information. [11]
where data was stored to be transfer later to RFID readers. The internal
memory capacity of a tag depends on the model and varies from tens to
than 100 meters. Others systems of this type were: Bluetooth, IrDA and Wi-Fi.
Mobile and Physical User Interface for NFC based on Mobile Interaction
Multiple Tags
management. In this work, this have been proposed a novel architecture for
improving healthcare system with the help of Android based mobile devices
secure element (SE) for storing credentials and secure data, and a Health
Secure service on a hybrid cloud for security and health record management.
Secure Medical Tags for reducing medical errors and ii) Secure Health card
for storing Electronic Health Record (EHR) based on Secure NFC Tags,
mobile device using NFC P2P Mode or Card Emulation Mode. This briefly
NFC NDEF format was prone to security attacks that have utilized low
level APIs on Android based mobile devices, to securely access NFC tags
such as MIFARE Classic tags with NFC-A (ISO 1443-3A) properties. Simple
touch of NFC enabled mobile devices can benefit both the patient as well as
the medical doctors by providing a robust and secure health flow. This can
considering metrics such as achieved data rates and received power for
for public transport systems. This describes the design of 13.56 MHz antenna
being touched together or brought within a short distance. The NFC standard
this were in close proximity, usually no more than a few centimeters, allowing
the ECMA and ETSI standards, which describe the integration of a smart card
with a terminal device. NFC devices allow writing and reading of information
wireless connection, which was also compatible with widely used technologies
The coverage of various ISO standards ensures for NFC technology the
Apart from simple interactions with single tags, NFC has the potential for more
elaborate interactions with physical objects that comprise multiple tags and
serve as physical user interfaces (UI). This paper investigated the design of
mobile and physical UIs for the interaction with multiple NFC-tags.
This was focused on three basic interactions that qualify for multi-tag
items and the combination of items. Two user studies compare different
devices and tagged objects. The results advocate the continuous interaction
UIs.[14]
the execution of daily life tasks. The proposed solution takes advantage of the
use, to enable advanced user interaction. The user can perform normal daily
to read NFC tags containing the commands for the home automation system.
conclusions were drawn from the experimental results, about the effective
Along with making the event experience more efficient on the exhibit
hall floor, NFC has the added benefit of being more secure with dealing with
cashless payments.
that uses the latest tablet and smartcard technology to change the way the
Nigerian government collects data and delivers benefits to its citizens. This
NFC works at such a short range, there was a less chance for payment
drink and merchandise with a phone or event badge (again, one less thing to
carry), NFC can give attendees that extra level of trust and security when
There were a variety of NFC tags that can be read with a smart phone.
The spectrum ranges from simple stickers and key rings to complex cards
which were integrated cryptographic hardware. Tags also differ in the chip
technology. The most important of this, NDEF, which was supported by most
tags. In addition, Mifare should be mentioned as this was the most used
contactless chip technology worldwide. Some tags can be read and written,
can do for them and how it can make lives easier. The many uses of NFC
was not NFC compatible and consider buying a micro SD or SIM card
embedded with the NFC chip, this guide helps to decide if the benefits were
worth it.[16]
The small size of NFC tags and the lack of a battery, relying instead on
displays to library books, an NFC tag can hold information that a user can
Chapter III
Technical Background
This chapter includes for hardware and software was set of common
requirements that completed to useful to the system that requires using this.
Hardware Requirements
such as changing
handset settings
Software Requirements
functional requirements.
(pcs.)
A developed
1 by Google,
based on
Android 2.3 or
the Linux
kernel and higher
designed
primarily for
touch
Android OS screen mobile
devices such
as Smartphone
and tablets
An open source
1
relational database
management
system which were
based on Structured
Query Language
(SQL)
A software
application for
retrieving,
presenting, and
traversing
information
resources on the
Chapter IV
This chapter presented the research design used in the study was
Project Design
studied. This emphasizes what actually exists in the current condition and
Project Development
One of the largest IT challenges in the health and medical fields were
the ability to track large numbers of patients and materials. As mobile phone
availability becomes ubiquitous around the world, the use of Near Field
emergency response.
environment. While this system design has been inspired by the needs of an
ongoing project, this was believed to recognize and apply similar health and
patient appointment and priority calls were all very crucial in order to maintain
the overall level of health care must be carefully ascertained before making a
decision.
Sampling Technique
supply mobile smart phones to the medical personnel for patient identification
respect of health records, patient appointment and priority calls were all very
crucial in order to maintain the overall level of health care in Kalayaan Health
Center.
performance.
survey questionnaire.
category. The question formulated was based from the initial interview done in
the company and how the current traditional of Kalayaan Health center with
the patients.
answer to the bets of knowledge. This was given time allocation to complete
the forms and provide them opportunity to raise concern if any. The survey
Survey Questionnaire
depending on the goal of the study. Questionnaire was the main tool to
deduce responses from respondents. The first part was composed of the
demographic data about the respondents that includes the basic information
part, contains the information about familiarization of the software and the
Interview
The data needed for this study were gathered through personal
development. In this study the key informant was the system user of which
respondents that involved within the system. Question in the survey forms
were based in the daily routines of the company process and the
and level of each respondent that which involve within the process of the
The given data which provided from gathering data forms used in the
presented graphical presentation and analysis in this study. The given data
The proponents evaluate all the data received from the respondents
and use the different statistical method. The analysis statistical formula shows
Statistical Tools
The statistical tools used this to help the proponents too easily tabulate
and analyze the data gathered during the survey process. It was based on
how data interpreted using the statistics. These tools can also help the
proposed system.
Frequency
occurs. This was the number of times that the event occurs in a study. The
F = F/N
where,
Percentage
P = f/N x 100
where,
P = percentage
N = number of respondents
Mean
population means to appropriate frequency and add the entire product then
divide the sum of all the frequency by the number of all frequencies. The
formula was:
X= fx/ N
where,
X = mean
F = number of frequency
Likert Scale
the main topic, and also to measure the positive and negative response of the
The Chi- Square Test of Goodness of Fit (X2) was used in determining
single qualitative variable and in knowing if the sample under observation and
analysis was drawn from a population with some specified distribution or not.
Further, this was the sum of the squared differences of the observed
X2 = (O-E) 2
E
where,
O= observed frequency
E= expected frequency
= level of significance
Conceptual Framework
Figure 4.1 shows the manual process of the designed stages of the
development process.
PROCESS OUTPUT
INPUT 1. Planning Improving Health
Center Services Using
Preliminary of the study
Knowledge Mobile tap card for
Requirements 2. System Kalayaan Health
Analysis
1. Brief description of Center
the process
Find possible and
2. Information of the
patients appropriate solutions
6. Implementation
- Security
- Reliability
Initializing and testing
for errors - Usability
Records
Doctor
View Records
Proposed Study
1.0 2.0
User Admin
Admin/User
1.0
Login Page
Page
1.1 1.2
Login Confirm
Password
1.1
Login
Data Dictionary
Database: dbtest
Database: dbtest
Database: dbtest
Start
Patients
Records
Health
Administrator
Doctor
Patient Record
Storage
Appointment
End
Start
Patient taps
Patient read using
the card
Smartphone
Time of
receiving all
Send patient data
info
End
NFC Card
Planning
Deployment Defining
Android Studio
Testing Designing
Building
Chapter V
Health Center such as the Age Bracket, Gender, Performance of the device,
Table 5.1
18 23 2 8% 4th
24 33 8 32% 2nd
34 41 10 40% 1st
age bracket. Out of 25 respondents, age bracket 34- 41 got the highest
frequency of 10 or 40% was in rank 1, while the 18- 23 got the lowest
1.2 Gender
Table 5.2
Gender F % Rank
of gender, there were of 25 respondents, the frequency of male got the lowest
frequency of 11 or 44% was in rank 2, while the frequency of female got the
1.3 Designation
Table 5.3
Designation F % Rank
Police 0 0%
Teacher 0 0%
lowest frequency of 3 or 12% was in rank 3, while the frequency of Others got
the highest frequency of 16 or 64% was in rank 1, while the frequency of Staff
1. 4 Educational Attainment
Table 5.4
Attainment
Response F % Rank
Masteral 0 0%
of response that were College was 12 or 48% and was in rank 1, the
frequency of response that was High School was 8 or 32%% and in rank 2,
the frequency of response that were in Elementary was 5 or 20% and in rank
3.
Table 5.5
Interpretation
Excellent 2 8% 4th
Poor 1 4% 5th
the respondents rated Excellent which rank 4. In the response, 11of them or
last 1 of them or 4% which was rank as 5. The computed mean was 3.57 and
Good.
most observations shown the rating scale of Very Good covered the 44% of
the total response and 32% rating for Good. The overall average response
for the ungrouped data hit 3.57, rounded of the rating scale which means that
Compatibility as Very Good. The average weighted mean who said Very
chi-square was 19.85; this value was greater than the 9.48 table value with
region was the H0 therefore the proponents conclude that there was significant
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.6
Interpretation
Excellent 0 0%
Poor 0 0%
Total No. of 25 0
Respondents
(N)
of the respondents rated Very Good which rank 1, in the response, 8 of them
mean was 4.00 and the verbal interpretation in the systems functionality
most observations shown the rating scale of Very Good covered the 40% of
the total response and 32% rating for Good. The overall average response
for the ungrouped data hit 4.00, rounded of the rating scale which means that
as Very Good. The average weighted mean who said Very Good was
square was 23.25; this value was greater than the 9.48 table value with
region was the H0, therefore the proponents conclude that there was
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.7
Interpretation
Fair 2 8% 4th
Poor 0 0%
of the respondents rated Very Good which rank 1, while 7 of them or 28% of
rated Fair which rank 4. The computed mean was 3.60 and the verbal
most observations shown the rating scale of Very Good covered the 48% of
the total response and 28% rating for Excellent. The overall average
response for the ungrouped data hit 3.60, rounded of the rating scale which
means that the majority of the respondents evaluated the proposed systems
Maintainability as Very Good. The average weighted mean who said Very
square was 25.00; this value was greater than the 9.48 table value with
region was the H0, therefore the proponents conclude that there was
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.8
Interpretation
Excellent 3 12% 3
Fair 3 12% 3
Poor 0 0%
Total No. of 25 0
Respondents (N)
the respondents rated Very Good which rank 2, while 1 of them or 4% of the
rated Fair which was rank 3. The computed mean was 4.00 and the verbal
most observations shown the rating scale of Good covered the 44% of the
total response and 32% rating for Very Good. The overall average response
for the ungrouped data hit 4.00, rounded of the rating scale which means that
as Very Good. The average weighted mean who said Very Good was
chi-square was 21.50; this value was greater than the 9.48 table value with
region was the H0, therefore the proponents conclude that there was
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.9
Interpretation
Excellent 1 4% 4
Fair 4 16% 3
Poor 0 0%
Respondents
(N)
rated Fair. The computed mean was 3.57 and the verbal interpretation in the
most observations shown the rating scale of Good covered the 44% of the
total response and 36% rating for Very Good. The overall average response
for the ungrouped data hit 3.57, rounded of the rating scale which means that
Very Good. The average weighted mean who said Very Good was
square was 23.75; this value was greater than the 9.48 table value with
region was the H0, therefore the proponents conclude that there was
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.10
Interpretation square
Fair 2 8% 4th
Poor 0 0%
Total No. of 25 0
Respondents (N)
of the respondents rated Very Good which rank 1, 6 of them or 24% of the
rated Fair which rank 4. The computed mean was 4.00 and the verbal
most observations shown the rating scale of Very Good covered the 52% of
the total response and 24% rating for Excellent. The overall average
response for the ungrouped data hit 4.00, rounded of the rating scale which
means that the majority of the respondents evaluated the proposed systems
Security as Very Good. The average weighted mean who said Very Good
chi-square was 25.00; this value was greater than the 9.48 table value with
region was the H0, therefore the proponents conclude that there was
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.11
Interpretation
Fair 1 4% 4th
Poor 0 0%
of the respondents rated Very Good which rank 1; 6 of them or 24% of the
rated Fair which rank 4.The computed mean was 4.00 and the verbal
most observations shown the rating scale of Very Good covered the 52% of
the total response and 28% rating for Excellent. The overall average
response for the ungrouped data hit 3.57, rounded of the rating scale which
means that the majority of the respondents evaluated the proposed systems
Usability as Very Good. The average weighted mean who said Very Good
chi-square was 25.00; this value was greater than the 9.48 table value with
region was the H0, therefore the proponents conclude that there was
respondents who said Very Good was significantly higher than the rest of
the sample.
Table 5.12
Interpretation
rate of 3.60 and a verbal interpretation of Very Good. The average of the
Chapter VI
Summary, Conclusions and Recommendations
Summary
proposed system can be used in any devices and this work with ease. In
with the system by providing the right tutorial for the user. In terms of
Portability, the respondents use the tap card system as very convenient as
of the user.
Conclusions
The proposed system has satisfied all the criteria set forth. Tthe
portable, secure and usable with an overall average mean of 3.57 - 4.00 or
with the use of the design project, the user can provide the necessary
information and data for the reference of the doctor and medical staff in the
records.
Recommendations
There was always a room for improvement and a wide range of this
study that must be taken into consideration. Similar studies may be conducted
triggering the communication just with a simple touch in a short distance, and
most important aspects of NFC technology was inherent security, since the
researchers of the same field with larger number of participants. Those future
researches conduct for a longer duration to have a sufficient data for more
accurate interpretation.
4. This also suggested exploring more on the other factors this could
be improved like using NFC tags that provide medical professionals with
information about what treatments a patient should receive, and also keep
track of when nurses and doctors have checked in with that patient. Each
time the tag was scanned, the information can be transferred to a database.
BIBLIOGRAPHY
[1] Kerem Ok, Vedat Coskun, Busra Ozdenizci (2011), Theory to Practice,
John Wiley & Son Ltd.: Atrium, Southern Gate, chicsussex, P019
8SQ, United Kingdom.
[3] Subtil, Vitor (2016), Near Field Communication with Android Cookbook
Pack, John Wiley & Sons Ltd.: Atrium, Southern Gate, chicsussex,
P019 8SQ, United Kingdom.
[5] Paret, Dominique (2016), Design Constraints for NFC Devices, John
Wiley & Son Ltd.: Atrium, Southern Gate, chicsussex, P019 8SQ,
United Kingdom.
[6] Paret, Dominique (2016), Antennas Designs for NFC Devices, John Wiley
& Son Ltd.: Atrium, Southern Gate, chicsussex, P019 8SQ, United
Kingdom.
[7] Igoe, Tom (2012), Getting Started with RFID: Identify Objects in the
Physical World with Arduino, Maker Media, Inc.: Sebastopol, California.
https://www.library.strathmore.edu/graduate/abstract.php?biblionumber
=310717
[13] Using NFC-Enabled Mobile Phones for Public Health in Developing ...
https://dspace.mit.edu/openaccess-disseminate/1721.1/59986
[17] A Healthcare CFO's Guide to Smart Card ... - Smart Card Alliance
www.smartcardalliance.org/.../Healthcare_CFO_Guide_to_Smart_C
ards_FINAL_012...
[18] NFC Portal site Case Studies Personal Health Record (PHR) system ...
www.nfc-world.com/en/cases/phr.html
[19] NFC Based Health Care System - International Journal of Innovative ...
ijiset.com/vol3/v3s4/IJISET_V3_I4_66.pdf
[21] PhilCare revolutionizes health care availment with NFC cards | STAY ...
https://stayadventurousblog.wordpress.com/.../philcare-
revolutionizes- health-care-avai..
Appendix A
Approval Letter
APPENDIX A
Appendix B
Evaluation Tools
1. Age 2. Gender
18-25 Male
23-33 Female
34-41
42-49
50 above
Police Elementary
Student College
Staff Masteral
Others
Excellent 5
Very good 4
Good 3
Fair 2
Poor 1
CRITERIA 1 2 3 4 5
the information?
stored data?
proposed system?
Comments/Suggestions:
Appendix C
Screenshots
Figure 4.11 Screenshots for writing the URL to access the patient
information
Appendix D
Market Analysis
Hardware Requirement
Software Requirement
Source: PC Gilmore
Factor to Consider:
Maintenance Cost:
= 35,565 * 0.20
Development Cost:
Appendix E
Environmental Analysis
Environmental Analysis
provide independently. With the use of this technology, this lessens the use of
hospitals. One of the environmental issues in this system, after using the NFC
card does have any environmental use. NFC technology can reduce long
lines and make the customer experience better overall. NFC does have a
NFC card X
Sim card X
Memory card X
Lithium Battery X
Charger X
Samsung Galaxy S3 X
Cellphone
Appendix F
Legal Implications
Legal Implications
communications (NFC) were far reaching for new business applications, for
the delivery of public services such as transport, and for public policy. This
stimulated innumerable innovative forms, but so far there has been insufficient
CHAPTER I
GENERAL PROVISIONS
SECTION 1. Short Title. This Act shall be known as the Data Privacy Act of
2012.
and communications systems in the government and in the private sector are
SEC. 3. Definition of Terms. Whenever used in this Act, the following terms
(b) Consent of the data subject refers to any freely given, specific, informed
indication of whereby the data subject agrees to the collection and processing
subject to do so.
processed.
(e) Filing system refers to any act of information relating to natural or juridical
material form or not, from which the identity of an individual is apparent or can
or when put together with other information would directly and certainly
identify an individual.
subject.
(j) Processing refers to any operation or any set of operations performed upon
personal information including, but not limited to, the collection, recording,
(k) Privileged information refers to any and all forms of data which under the
(1) About an individuals race, ethnic origin, marital status, age, color, and
but not limited to, social security numbers, previous or cm-rent health records,
kept classified.
SEC. 4. Scope. This Act applies to the processing of all types of personal
equipment that are located in the Philippines, or those who maintain an office,
including:
(1) The fact that the individual is or was an officer or employee of the
government institution;
(2) The title, business address and office telephone number of the individual;
(3) The classification, salary range and responsibilities of the position held by
(4) The name of the individual on a document prepared by the individual in the
including the terms of the contract, and the name of the individual given in the
individual, including the name of the individual and the exact nature of the
benefit;
purposes;
(e) Information necessary in order to carry out the functions of public authority
which includes the processing of personal data for the performance by the
No. 1405, otherwise known as the Secrecy of Bank Deposits Act; Republic
Act No. 6426, otherwise known as the Foreign Currency Deposit Act; and
Republic Act No. 9510, otherwise known as the Credit Information System Act
(CISA);
(f) Information necessary for banks and other financial institutions under the
ng Pilipinas to comply with Republic Act No. 9510, and Republic Act No.
including any applicable data privacy laws, which is being processed in the
Philippines.
Republic Act No. 53, which affords the publishers, editors or duly accredited
protection from being compelled to reveal the source of any news report or
(b) The entity has a link with the Philippines, and the entity is processing
(3) An entity that has a branch, agency, office or subsidiary in the Philippines
and the parent or affiliate of the Philippine entity has access to personal
information; and
(c) The entity has other links in the Philippines such as, but not limited to:
Philippines.
CHAPTER II
implement the provisions of this Act, and to monitor and ensure compliance of
the country with international standards set for data protection, there is hereby
of this Act;
act as a collegial body. For this purpose, the Commission may be given
(c) Issue cease and desist orders, impose a temporary or permanent ban on
(f) Coordinate with other government agencies and the private sector on
(g) Publish on a regular basis a guide to all laws relating to data protection;
codes shall adhere to the underlying data privacy principles embodied in this
Act: Provided, further,That such privacy codes may include private dispute
information controller. For this purpose, the Commission shall consult with
codes applying the standards set out in this Act, with respect to the persons,
entities, business activities and business sectors that said regulatory bodies
finally. That the Commission may review such privacy codes and require
(n) Ensure proper and effective coordination with data privacy regulators in
(o) Negotiate and contract with other data privacy authorities of other
privacy laws;
possession.
Policies and Planning. The Privacy Commissioner and the two (2) Deputy
for a term of three (3) years, and may be reappointed for another term of three
(3) years. Vacancies in the Commission shall be filled in the same manner in
The Privacy Commissioner must be at least thirty-five (35) years of age and of
recognized expert in the field of information technology and data privacy. The
Undersecretary.
on their behalf or under their direction, shall not be civilly liable for acts done
liable for willful or negligent acts done by him or her which are contrary to law,
morals, public policy and good customs even if he or she acted under orders
such official on the subject of the performance of his or her duties, where such
served for at least five (5) years in any agency of the government that is
involved in the processing of personal information including, but not limited to,
CHAPTER III
this Act and other laws allowing disclosure of information to the public and
proportionality.
(a) Collected for specified and legitimate purposes determined and declared
purposes only;
(c) Accurate, relevant and, where necessary for purposes for which it is to be
processing restricted;
(d) Adequate and not excessive in relation to the purposes for which collected
and processed;
(e) Retained only for as long as necessary for the fulfillment of the purposes
for which the data was obtained or for the establishment, exercise or defense
and
(f) Kept in a form which permits identification of data subjects for no longer
than is necessary for the purposes for which the data were collected and
may lie processed for historical, statistical or scientific purposes, and in cases
laid down in law may be stored for longer periods: Provided, further,That
processing.
prohibited by law, and when at least one of the following conditions exists:
fulfillment of a contract with the data subject or in order to take steps at the
comply with the requirements of public order and safety, or to fulfill functions
(f) The processing is necessary for the purposes of the legitimate interests
whom the data is disclosed, except where such interests are overridden by
fundamental rights and freedoms of the data subject which require protection
(a) The data subject has given his or her consent, specific to the purpose prior
(b) The processing of the same is provided for by existing laws and
information: Provided, further, That the consent of the data subjects are not
(c) The processing is necessary to protect the life and health of the data
subject or another person, and the data subject is not legally or physically
processing is only confined and related to the bona fide members of these
(f) The processing concerns such personal information as is necessary for the
responsible for ensurreing that proper safeguards are in place to ensure the
Act and other laws for processing of personal information. The personal
information processor shall comply with all the requirements of this Act and
inadmissible.
Appendix G
Relevant Source Code
Appendix H
Gantt chart
COMPUTER SCIENCE DEPARTMENT
114
ASIAN INSTITUTE OF COMPUTER STUDIES
410 D and I Bldg, Edsa Corner, Caloocan City
Metro Manila, Philippines
Appendix I
Progress Report
Progress Report
Introduction
progress evaluation.
TASK 1.
DESCRIPTION:
Quezon City. The challenge is how the study be conducted in order that the
TASK 2:
DESCRIPTION:
the key informant of the research project, Dr. Verdades Linga, City Health
Officer, Quezon City Health Department. Inquiries were asked to know the
background of the health center and the existing problem or problems being
encountered by the said entity which the development of the system can
TASK 3:
DESCRIPTION:
This was existing problem in every agency in which the proper record
management must maintained. In this way, the proponents have come up with
the idea of using NFC card that may be used in order to provide data and
TASK 4:
DESCRIPTION:
This was conducted in more than (7) seven months; the proponents
were on track in documenting this study. The documentation of this study was
needed in order to ease the work of personnel in tracking the medical records
TASK 5:
DESCRIPTION:
This was intended for more than seven (7) months, the proponents
engineered the proposed system. The ideas and concepts formed from the
analysis of the problem were applied to use in system development and thus
the following stages of system development were worked out with the
TASK 6:
DESCRIPTION:
In the facilitation of the proposed system the data of the patients were
input in the NFC card to ease the work of the personnel. After the
random patients that had been the subject of the study. Twenty five (25)
TASK 7:
DESCRIPTION:
The data gathered from the conducted survey were analyzed by the
proponents for the studys statistical treatment. Each respondents rating was
result. The Likert Scale method was towards the rating scheme of the
respondents.
TASK 8:
DESCRIPTION:
The final task in the entire study was to operate the system and this
Appendix J
Computation for
Statistical Treatment
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (2)/1
f=2
Very Good:
f= (8)/1
f=8
Good:
f = (11)/1
f = 11
Satisfactory:
f = (3)/1
f= 3
Fair:
f= (1)/1
f= 1
2 8 11 3 1 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (2/25) * 100
P = 8%
Very Good:
P = (8/25) * 100
P = 32%
Good:
P = (11/25) * 100
P = 44%
Satisfactory:
P = (3/25) * 100
P = 12%
Fair:
P = (1/25) * 100
P = 4%
Formula: X
x
n
where:
Solution:
X (2 8 11 3 1) / 7 3.57
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 2 23 24 25
8 2
Comp 1 4 2 3 3 3 3 3 3 3 4 3 3 2 3 4 4 3 4 4 3 3 3 3 4 1
atibilit
y
(O E ) 2
2
Formula: x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
2 4 -2 4 1
8 4 4 16 4
11 4 7 49 12.3
3 4 -1 1 0.3
1 4 -3 9 2.25
X2 Computed 19.85
(19.85) was greater than the critical or table value (9.48) at 0.05 level of
terms of the overall compatibility feature of the proposed Mobile tap card. The
ability of the system to provide medical record of the patient using NFC card
was evident.
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (0)/1
f=0
Very Good:
f= (10)/1
= 10
Good:
f = (8)/1
f=8
Satisfactory:
f = (7)/1
f=7
Fair:
f= (0)/1
f=0
0 10 8 7 0 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (0/25) * 100
P = 0%
Very Good:
P = (10/25) * 100
P = 40%
Good:
P = (8/25) * 100
P = 32%
Satisfactory:
P = (7/25) * 100
P = 28%
Fair:
P = (0/25) * 100
P = 0%
Formula:
X
x
n
where:
Solution:
X (0 10 8 7 0) / 7 4.00
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Functi 1 2 2 4 4 4 4 4 3 4 2 2 4 3 2 3 3 3 4 3 2 2 3 4 4 3
onality
4.00
Formula:
(O E ) 2
2
x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
0 4 -4 16 4
10 4 6 36 9
8 4 4 16 4
7 4 3 9 2.25
0 4 -4 16 4
X2 Computed 23.25
(23.25) was greater than the critical or table value (9.48) at 0.05 level of
terms of the overall functionality feature of the proposed Mobile tap card. The
ability of the system to provide medical record of the patient using NFC card
was evident.
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (7)/1
=7
Very Good:
f= (12)/1
= 12
Good:
f = (4)/1
=4
Satisfactory:
f = (2)/1
=2
Fair:
f= (0)/1
=0
7 12 4 2 0 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (7/25) * 100
= 28%
Very Good:
P = (12/25) * 100
= 48%
Good:
P = (4/25) * 100
= 16%
Satisfactory:
P = (2/25) * 100
= 8%
Fair:
P = (0/25) * 100
= 0%
Formula:
X
x
n
where:
Solution:
X (7 12 4 2 0) / 7 3.60
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Maint 1 3 5 4 2 4 4 3 4 3 4 3 2 3 2 4 4 4 4 3 2 3 3 4 3 4
anabili
4.00
ty
Formula:
(O E ) 2
2
x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
7 4 -4 16 4
12 4 8 64 16
4 4 0 0 0
2 4 -2 4 1
0 4 -4 16 4
X2 Computed 25.00
(25.00) was greater than the critical or tabular value (9.48) at 0.05 level of
terms of the overall maintainability feature of the proposed Mobile tap card.
The ability of the system to provide medical record of the patient using NFC
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (3)/1
=3
Very Good:
f= (8)/1
=8
Good:
f = (11)/1
= 11
Satisfactory:
f = (3)/1
=3
Fair:
f= (0)/1
=0
3 8 11 3 0 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (3/25) * 100
= 12%
Very Good:
P = (8/25) * 100
= 32%
Good:
P = (11/25) * 100
= 44%
Satisfactory:
P = (3/25) * 100
= 12%
Fair:
P = (0/25) * 100
= 0%
Formula:
X
x
n
where:
Solution:
X (7 12 4 2 0) / 7 4.00
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Portab 1 4 5 3 3 4 4 3 3 4 4 4 3 3 2 3 3 3 4 4 4 2 3 3 3 3
4.00
ility
Formula:
(O E ) 2
2
x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
3 4 -1 1 0.25
8 4 4 16 4
11 4 7 49 12.25
3 4 -1 1 1
0 4 -4 16 4
X2 Computed 21.50
(21.50) was greater than the critical or tabular value (9.48) at 0.05 level of
terms of the overall portability feature of the proposed Mobile tap card. The
ability of the system to provide medical record of the patient using NFC card
was evident.
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (1)/1
=1
Very Good:
f= (9)/1
=9
Good:
f = (11)/1
= 11
Satisfactory:
f = (4)/1 = 4
Fair: f= (0)/1
=0
1 9 11 4 0 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (1/25) * 100
= 4%
Very Good:
P = (9/25) * 100
= 36%
Good:
P = (11/25) * 100
= 44%
Satisfactory:
P = (4/25) * 100
= 16%
Fair:
P = (0/25) * 100
= 0%
Formula: X
x
n
where:
Solution:
X (7 12 4 2 0) / 7 3.57
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Reliab 1 2 4 4 3 3 3 4 4 3 2 1 3 3 2 3 3 4 3 3 3 4 3 4 4 4
ility
4.00
Formula:
(O E ) 2
2
x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
1 4 -3 1 0.25
9 4 5 25 6.25
11 4 7 49 12.25
3 4 -1 1 1
0 4 -4 16 4
X2 Computed 23.75
(23.75) was greater than the critical or tabular value (9.48) at 0.05 level of
terms of the overall reliability feature of the proposed Mobile tap card. The
ability of the system to provide medical record of the patient using NFC card
was evident.
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (6)/1
=6
Very Good:
f= (13)/1
= 13
Good:
f = (4)/1
=4
Satisfactory:
f = (2)/1
=2
Fair:
f= (0)/1
=0
6 13 4 2 0 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (6/65) * 100
= 24%
Very Good:
P = (13/25) * 100
= 52%
Good:
P = (4/25) * 100
= 16%
Satisfactory:
P = (2/25) * 100
= 8%
Fair:
P = (0/25) * 100
= 0%
Formula:
X
x
n
where:
Solution:
X (6 13 4 2 0) / 7 4.00
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Securi 1 3 4 4 2 3 4 3 4 3 2 2 3 2 3 4 4 4 3 4 3 2 4 3 4
ty
4.00
Formula:
(O E ) 2
2
x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
6 4 2 4 1
13 4 9 81 20.25
4 4 0 0 0
2 4 -2 4 1
0 4 -4 16 4
X2 Computed 26.25
(26.25) was greater than the critical or tabular value (9.48) at 0.05 level of
terms of the overall security feature of the proposed Mobile tap card. The
ability of the system to provide medical record of the patient using NFC card
was evident.
I. Computation of Frequency
Formula: F = F/N
where,
Solution:
Excellent:
f = (7)/1
=7
Very Good:
f= (13)/1
= 13
Good:
f = (4)/1
=4
Satisfactory:
f = (1)/1
=1
Fair:
f= (0)/1
=0
7 13 4 1 0 25
Formula: P = f/ N x 100
where,
P = percentage
N = number of respondents
Solution:
Excellent:
P = (7/25) * 100
= 28%
Very Good:
P = (13/25) * 100
= 52%
Good:
P = (4/25) * 100
= 16%
Satisfactory:
P = (1/25) * 100
= 4%
Fair:
P = (0/25) * 100
= 0%
Formula:
X
x
n
where:
Solution:
X (7 13 4 1 0) / 7 3.57
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Usabil 1 2 2 3 3 3 4 3 4 3 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 3
4.00
ity
Formula:
(O E ) 2
2
x , with df = c-1
E
where,
O = observed frequency
E = expected frequency
df = degrees of freedom
= level of significance
Computation:
7 4 3 9 2.25
13 4 7 49 12.25
4 4 0 0 0
1 4 -3 9 2.25
0 4 -4 16 4
X2 Computed 20.75
(20.75) was greater than the critical or tabular value (9.48) at 0.05 level of
terms of the overall portability feature of the proposed Mobile tap card. The
ability of the system to provide medical record of the patient using NFC card
was evident.
Appendix K
Grammarians Certificate
GRAM M A R I A N S C E R T I F I C A T E
at Kaunlaran High School has reviewed and went through all the pages of the
set of structural rules that govern the composition of sentences, phrases, and
SIGNED:
Grammarian
Appendix L
Users Manual
Patient
Of patient
History.
Appendix M
Curriculum Vitae
Afable, Frederick L.
008 Afable Street, Iba, Meycauayan, Bulacan
E-mail address: djmixerofficial101@gmail.com
Mobile Number: 09352765853
PERSONAL INFORMATION:
Age : 19
Gender : Male
Date of Birth : April 30 , 1997
Civil Status : Single
Citizenship : Filipino
Religion : Roman Catholic
Languages : English
___________________________________________________________
EDUCATIONAL ATTAINMENT:
Tertiary : Asian Institute of Computer Studies,
Caloocan City
Course :
Bachelor of Science in Computer Science
Year Graduated : 2017
Anido, Anjenette
246 E.Rodriguez Sr. Ave.,Brgy. Damayang Lagi, Quezon City
E-mail address: anjanido02@gmail.com
Mobile Number: 0291987721/09266315271
PERSONAL INFORMATION:
Age : 22
Gender : Female
Date of Birth : March 2,1995
Civil Status : Single
Citizenship : Filipino
Religion : Roman Catholic
Languages : English
___________________________________________________________
EDUCATIONAL ATTAINMENT:
Tertiary : Asian Institute of Computer Studies,
Caloocan City
Course :
Bachelor of Science in Computer Science
Year Graduated : 2017
Bernales,Gremar, B.
Blk 2 Bagong Silang San Jose Navotas City
E-mail address: bernalesgremar92@gmail.com
Mobile Number: 09090388264
PERSONAL INFORMATION:
Age : 20
Gender : Male
Date of Birth : Oct 17 , 1996
Civil Status : Single
Citizenship : Filipino
Religion : Roman Catholic
Languages : English
___________________________________________________________
EDUCATIONAL ATTAINMENT:
Tertiary : Asian Institute of Computer Studies,
Caloocan City
Course :
Bachelor of Science in Computer Science
Year Graduated : 2017
Enaje, Russell L.
Blk 12 c lot 17 Ph 3E1 Padas-alley Caloocan City
E-mail address: russell.enaje@gmail.com
Mobile Number: 09175190846
PERSONAL INFORMATION:
Age : 21
Gender : Male
Date of Birth : Dec 10 , 1995
Civil Status : Single
Citizenship : Filipino
Religion : Roman Catholic
Languages : English
___________________________________________________________
EDUCATIONAL ATTAINMENT:
Tertiary : Asian Institute of Computer Studies,
Caloocan City
Course :
Bachelor of Science in Computer Science
Year Graduated : 2017