Académique Documents
Professionnel Documents
Culture Documents
MANAGMENT)
A Research Paper
Submitted for the partial fulfillment of the requirements for the award of the
Degree in
ICT
By
DEPARTMENT OF ICT
July – 2010
Admas University College Hargeisa Main Campus
Admas Universit y Col l ege Hargeissa Main Campus
HMC › É T e ¿’ > d ª “ "U þ e
y` e+ ¢K?Ï N ` Ñ@
_______
Tel :-____________________Fax:-____________________ P.o.Box:-_____________e:mail :____________________
CERTIfICATE
This is to certify that the project titled “inpatient outpatient database managment” is a bona-fide
work done by
DECLARATION
We, (mubarik mohamed abdi&muse Mohamed sheikh) , hereby declare that this thesis is our
original work and has not been presented for the award of any degree/diploma in any other
college or university.
This hereby confirmed that this research will be applied for knowledge reference
and considered resources knowledge of ADMAS UNIVERSITY. May supervisor,
advisor and other respectful lectures and professor could also use this paper and
valuable information embodied and submitted this report. Due to the huge
investments and professionals contribution make this paper more knowledgeable
and valuable, therefore, I would expect that a lot demanders will be referred this
resources contents.
Signatures:…………………………………………………………………………………..
Date:…………………………………
PRO ahmed,
Professor of ICT,
Admas University College, Hargeisa. Somaliland.
Signature………………………………………………..
Date:………………………
Acknowledgement
All praise and tanks belongs to ALLAH, who to bestowed on the ability
and patience to maintain to studying period and come up with this
paper confess that there is no GOD, but ALLAH and MOHAMED
(P.B.U.H) is his prophet and messenger and I committed to act
according to the word of ALLAH and the teaching of my prophet hoping
to achieve his forgiveness and end up with his everlasting paradise.
Our highest appreciation goes to our parents those cares as well form
child to the present time. Also they give high investment to be educated
and responsible persons. Hence we have to mention here our fathers &
mothers
HALIMO MOHAMED ALI FIHIIMA ILMI A/LAHI
& &
MOHAMED ABDI WARSAME MOHAMED SHEIKH A/LAHI
Finally I would like to convey my deep gratefulness and thanks to my
paper advisor his excellence Mr.Ahmed Hassan Haji who guidance
and corrective assistance made possible the output of this research
report.
CONTENTS
1. INTRODUCTION
2. COMPANY PROFILE
3. SYSTEM STUDY
3.1 Existing System
3.2 Proposed System
4. Feasibility Study
4.1 Technical feasibility
4.2 Economical feasibility
4.3 Operational feasibility
4.4 schedule feasibility
5. SYSTEM ANALYSIS
5.1Information Gathering
5.2Process Modeling
5.3Data Modeling
6.SYSTEM Design
7.TESTING
7.1.1system testing
7.2unit testing
7.3module testing
7.4INTEGRATION TESTING
7.5ACCEPTANCE TESTING
8.IMPLEMENTATION
9. SCREEN SHOTS
9CONCLUSION
10 BIBLIOGRAPHY
INTRODUCTION
SYNOPSIS
This project will automate the daily operations of LIFE LINE hospital. The
project keeps track of the staff and patient (in-patient, out-patient) details. It also
takes care of the ward, medical, invoice and the doctor’s appointment details. The
system generates the daily ward availability, the status of the operation theatres .
This project deals with processing of each and every department in the
hospital. This project sincerely aims to reduce the manual processing of each
department.
The Scope of the project takes care of the details of each and every
department. These details gives the doctor, staffs, specialists and patient details
including their salary, attendance , doctor’s appointments and the billing system.
The details of Doctor and staff help the hospital to maintain the record of every
person. Their attendance details help them to know about their attentive presence
while salary is calculated. The billing system provides an efficient way for
calculating bill details of the patients.
Hospital profile:
Hospital was established in the time that the great britian leads the country,that time the hospital
was serving a lot of patients who are suffering different diseases or pains include this
people in and around hargeisa for the past 12 years. The hospital was founded by
Kuwait NGO who is a leading to bring drugs and employees salary . The hospital
is located at Indian line Street which is very near to hargeisa group hospital .
PROJECT OBJECTIVE
1) Admission
Inpatient
Outpatient
MODULES REQUIRED
Admission :
This module records basic patient related information, which is collected when
the patient visits the hospital for the first time. Each patient is allocated a unique
patient identification numbers also known as Hospital No.
Patient Details:
It keeps track of all details about both in-patient and out-patient. Patient
id, patient name, address, admitted date, doctor name, room no are entered in a
form and stored for future reference. Also particular patient details can be viewed
in the table using a separate form with a attribute patient id.
Outpatient:
This module manages activities related to patient who visits the Hospital
Resident Doctor or Consultant Doctor for Medical Consultations, diagnosis and
treatment.
Inpatient:
Admission request will be made here. Request for admission is made before
patient admitting the hospital.
SYSTEM CONFIGURATION
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
Information about current operations and requirement for a replacement system must be
organized for analysis and design. Structuring or organizing system requirement results in
diagrams and descriptions (model) that can be analyzed to show deficiencies and
inefficiencies, missing elements and illogical components of the current business operation.
The result of requirement determination can be structured according three essential views of
the current and replacement information system.
Process Modeling : The sequence of data movement and handling operations with the
system
Logic and Timing: The rules by which data are transformed and manipulated and
indication of what triggers data transformation.
During the analysis, I have collected the information mainly from the human
resource manager, the secretary who is the person responsible for keeping
employee information and the accountant who is responsible for anything to
do with salary information.
Information Sources:
I have collected the information about the current system from:
1. Reports/document used
2. Personal staff
5. Existing System
EXISTING SYSTEM
PROPOSED SYSTEM
The proposed system has been designed to overcome all the drawbacks
found in the existing system. The new system has been proposed to use VISUAL
BASIC.NET as front end and mss access as backend.
The proposed system has enhanced features, which was not found in the
existing system. The salient features are:
It is easy to combine the database of other software and to view the records
in the files and also it is easy to get the reports by giving input data.
ADVANTAGES OF PROPOSED SYSTEM:
FEASIBILITY STUDY
Once the problem is clearly understood, the next step is to conduct
feasibility study, which is high-level capsule version of the entered systems
and design process. The objective is to determine whether or not the
proposed system is feasible. The three tests of feasibility have been carried
out.
Technical Feasibility
Economical Feasibility
Operational Feasibility
Schedule feasibility
TECHNICAL FEASIBILITY
In Technical Feasibility study, one has to test whether the proposed
system can be developed using existing technology or not. It is planned to
implement the proposed system using java technology. It is evident that the
necessary hardware and software are available for development and
implementation of the proposed system. Hence, the solution is technically
feasible.
ECONOMICAL FEASIBILITY
As part of this, the costs and benefits associated With the proposed
system compared and the project is economically feasible only if tangible or
intangible benefits outweigh costs. The system development costs will be
significant. So the proposed system is economically feasible.
OPERATION FEASIBILITY
It is a standard that ensures interoperability without stifling competition
and innovation among users, to the benefit of the public both in terms of
cost and service quality. The proposed system is acceptable to users. So the
proposed system is operationally feasible.
Preliminary analysis
Evaluate system concept for feasibility, perform economic and technical analysis,
Perform cost benefit analysis and create system definition that forms the
After the preliminary analysis, the analyst should report the findings to
Proposal.
Data modeling
Process Modeling
Process modeling involves graphically representing the functions or process
that captured, manipulated, and distributed data between systems and its
environment and component between within a system. A common form of a
process model is a data flow diagram.
Data Flow Diagrams (DFD) are versatile diagramming tools, with only four
symbols (process, data store, sink/source, and data flow).
There are four processes that occur in the hotel and here below we will
discuss.
1. PHYSICAL DFD:
Structured analysis states that the current system should be first
understood correctly. The physical DFD is the model of the current
system and is used to ensure that the current system has been clearly
understood. Physical DFDs shows actual devices, departments, and
people etc., involved in the current system
2. LOGICAL DFD:
Logical DFDs are the model of the proposed system. They clearly
should show the requirements on which the new system should be built.
Later during design activity this is taken as the basis for drawing the
system’s structure charts.
BASIC NOTATIONS:
NOTATION DESCRIPTION
1. inputs
2. work activities, programs or processes, to
3. the immediate outputs of the work that are delivered to customers , to
4. outcomes or results that are the long-term consequences of delivering
outputs.
Other versions of a logic model set out a series of intermediate outcomes or results,
explaining in more detail the logic of how an intervention contributes to intended
or observed results. Some logic models also include assumptions, which are beliefs
the prospective grantees have about the program, the people involved, and the
context and the way the prospective grantees think the program will work, and
external factors, consisting of the environment in which the program exists,
including a variety of external factors that interact with and influence the program
action.
The difference between these two approaches can be illustrated through the
example of teacher home visits in Weiss' 1972 evaluation book.
This intervention can be described in terms of its inputs (teacher time, information
about students' residencences, transport), processes (setting up appointments,
visiting, talking with parents, writing up notes), outputs, and outcomes (improved
learning by students). However this does not explain how the home visits work.
A more detailed logic model would show it is understood that home visits work -
such as through improving teachers' understanding of home conditions of their
students, by establishing a co-operative relationship between teachers and parents,
by encouraging the child, or through some other means. These different 'theories of
change' have implications for how such visits should be designed, implemented
and evaluated, and they are invisible in overly simple logic models.
Logic models can be drawn with the causal and temporal sequence running from
left to right, from top to bottom, or from bottom to top.
structured english
decision tree
Detailed analysis:
During the Detailed Analysis, the Project Manager and the System Development Manager work
closely together to:
a. Complete business process engineering of the functions to be supported,
b. Complete component selection.
c. Develop detailed data and process models,
d. Refine functional and system requirements that are not easily expressed in data and
process models,
e. Refine the high level architecture and logical design to support the system, functional,
and electronic records management requirements,
f. Continue to identify and mitigate risk that the technology can be phased-in and
coordinated with the business.
There are three key reviews during the Detailed Analysis : the Detailed Level
Requirements Review, Logical Design Review, and the Technical Design Review. This
phase is completed when the Technical Review Board approves the high level
architecture and system requirements, revised economic analysis, the logical design
including the business process description, and the technical design. This approval is
provided at these three reviews alysis
Tasks:
The primary tasks performed during the Detailed Analysis are as follows:
a. Consolidate and affirm business needs,
b. Implement project management infrastructure including requirements, configuration, and
data management support services and utilities,
c. Revise plans to document changes in project scope including changes in business,
schedule, and technical requirements,
d. Revise plans to document changes in available resources including budget, skills, staff,
and training,
e. Update list of candidate reuse components, and complete reuse component selection.
f. Complete electronic records management requirements,
g. Identify data acquisition, conversion, and validation strategies,
h. Refine the technical architecture and build architectural prototype,
SYSTEM DESIGN
SYSTEM DESIGN
• Identify global resources and the control mechanisms required to access them.
TABLES:
1.patients
2.inpatients
3.city
4.district
patientno Patient name age gender city district Visit date
NORMALIZATION
It is a process of converting a relation to a standard form. The process is used to handle
the problems that can arise due to data redundancy i.e. repetition of data in the database,
maintain data integrity as well as handling problems that can arise due to insert, update,
delete anomalies.
Update anomaly: Data inconsistency resulting from data redundancy and partial
update
Normal Forms: These are the rules for structuring relations that eliminate
anomalies.
Data dictionary:
cheif complaint
personal data
physical exam
users
Screen shots
Login form:
Patient registration:
Patient physical exam:
Investigation:
Sample Coding
form log in :
Imports System.Data.SqlClient
Imports System.Data
Public Class frmLoging
Dim dbread As SqlDataReader
Private Sub Checkuser()
If dbread.Item(3) = "Enable" Then
dbread.Close()
txtname.Focus()
MainForm.Show()
Me.Hide()
Else
lblError.Visible = True
PictureBox2.Visible = True
dbread.Close()
End If
End Sub
Private Sub OK_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles OK.Click
opencon()
Try
Dim sql As String = "select username, password,id ,userstate from
users where username='" & txtname.Text & "' and password='" & txtlogpass.Text
& "'"
Dim cmd As New SqlCommand(sql, con)
dbread = cmd.ExecuteReader
If dbread.Read Then
Module1.username = dbread.Item(0)
Module1.userpass = dbread.Item(1)
Module1.id = dbread.Item(2)
lblcontacterror.Visible = False
PictureBox1.Visible = False
lblError.Visible = False
PictureBox2.Visible = False
Checkuser()
Else
dbread.Close()
cmd.Cancel()
'MessageBox.Show("YOur Username and passowrd Not much ",
"Error", MessageBoxButtons.OK, MessageBoxIcon.Error)
lblcontacterror.Visible = True
PictureBox1.Visible = True
End If
txtname.Text = ""
txtlogpass.Text = ""
Catch ex As Exception
MessageBox.Show(ex.Message, "Warring", MessageBoxButtons.OK,
MessageBoxIcon.Warning)
End Try
End Sub
Private Sub Cancel_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Cancel.Click
Me.Close()
End Sub
Private Sub frmLoging_KeyPress(ByVal sender As Object, ByVal e As
System.Windows.Forms.KeyPressEventArgs) Handles Me.KeyPress
End Sub
Private Sub frmLoging_Load(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MyBase.Load
opencon()
End Sub
Private Sub LogoPictureBox_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles LogoPictureBox.Click
End Sub
Private Sub txtlogpass_KeyPress(ByVal sender As Object, ByVal e As
System.Windows.Forms.KeyPressEventArgs) Handles txtlogpass.KeyPress
If Asc(e.KeyChar) = 13 Then
End If
End Sub
Private Sub OK_KeyPress(ByVal sender As Object, ByVal e As
System.Windows.Forms.KeyPressEventArgs) Handles OK.KeyPress
If Asc(e.KeyChar) = Keys.Enter Then
If txtname.Text = "" Then
MsgBox("Ya gotta enter a food name!")
Else
Me.Hide()
End If
End If
End Sub
End Class
registration:
Imports System.Data
Imports System.Data.SqlClient
Public Class FrmRegisteredPatient
Dim objitem2 As New ListViewItem
Dim str As String
End While
cmd.Cancel()
dr.Close()
End Sub
Private Sub ListView1_SelectedIndexChanged(ByVal sender As System.Object,
ByVal e As System.EventArgs) Handles ListView1.SelectedIndexChanged
On Error Resume Next
With ListView1.SelectedItems(0)
investigation.txtpid.Text = .SubItems(0).Text
investigation.txtRegDate.Text = .SubItems(2).Text
investigation.txtname.Text = .SubItems(1).Text
investigation.txtage.Text = .SubItems(3).Text
End With
Me.Hide()
investigation.btnupdate.Enabled = False
End Sub
End Class
main form:
Imports System.Data
Imports System.Data.SqlClient
Public Class FrmRegisteredPatient
Dim objitem2 As New ListViewItem
Dim str As String
End With
End While
cmd.Cancel()
dr.Close()
End Sub
Private Sub ListView1_SelectedIndexChanged(ByVal sender As System.Object,
ByVal e As System.EventArgs) Handles ListView1.SelectedIndexChanged
On Error Resume Next
With ListView1.SelectedItems(0)
investigation.txtpid.Text = .SubItems(0).Text
investigation.txtRegDate.Text = .SubItems(2).Text
investigation.txtname.Text = .SubItems(1).Text
investigation.txtage.Text = .SubItems(3).Text
End With
Me.Hide()
investigation.btnupdate.Enabled = False
End Sub
End Class
reports:
Imports CrystalDecisions.CrystalReports.Engine
Public Class Reports
CrystalReportViewer1.Zoom(100)
End Sub
System Implementation
Implementation is the process of having system personal check out and provides new
equipments into use, train the users to install a new application and construct any files of data
needed to use it. There are three types of implementation.
SOFTWARE SPECIFICATION
VISUAL STUDIO . NET
Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same
integrated development environment (IDE), which allows them to share tools and
facilitates in the creation of mixed-language solutions.
Visual Basic
Visual Basic has been updated to include many new and improved language
features that make it a powerful object-oriented programming language. These
features include inheritance, interfaces, and overloading, among others. Visual
Basic also now supports structured exception handling, and custom attributes. In
addition, Visual Basic supports multithreading. Multithreading is the ability to
assign individual tasks to separate processing threads.
C#
C++
Managed Extensions for C++ and attributed programming are just some of
the enhancements made to the C++ language. Managed Extensions simplify the
task of migrating existing C++ applications to the new .NET Framework.
Attributes, like C++ keywords, are used in your source files and interpreted by the
compiler. Attributes are designed to provide a quick and efficient method to
simplify COM programming with Visual C++.
JScript
Web Forms
Windows Forms
Overview
Debugging
Visual Studio .NET provides a single integrated debugger for all Visual
Studio languages, including Visual Basic and C#. A new, unified interface
combines features of the Visual C++ and Visual Basic 6.0 debuggers, as well as
many new features.
Cross-Language Debugging
Using the integrated debugger, you can debug projects that are part of the
same solution but are written in different languages. For example, you can debug a
solution that contains a project consisting of a Visual Basic or Visual C# user
interface application and a Visual C++ server application, and you can step back
and forth between these projects, for example from Managed Extensions for C++
to Visual Basic and back to Managed Extensions for C++.
Remote Debugging
You can attach to and debug a process that is running on a different
computer from the one on which you are running Visual Studio. For example, if
you are debugging a Windows Forms client application and an XML Web service it
uses, you can run Visual Studio on the client and then attach to the server that is
providing the XML Web service. You typically perform this kind of debugging for
Web Forms projects or ASP.NET Web Service projects.
Visual Basic.Net
Web Development: Visual Basic and C# include support for Web Forms
and XML Web services. Web Forms allow you to easily and quickly create the
browser-based interface for ASP.NET Web applications. XML Web services allow
you to package a Visual Basic or C# method and make it accessible on the Web.
Windows Forms and Controls: You can use Windows Forms and controls
to create the presentation layer of a distributed application. Windows Forms
provides a clear, object-oriented, extensible set of classes that enable you to
develop rich Windows applications.
New in Projects: You can use the Project templates in this version to easily
create various types of Windows and ASP.NET Web applications and controls.
Project templates set necessary references for you, import namespaces, and add
default items to your projects.
New in Debugging: You can now debug projects that are part of the same
solution but written in different languages, perform remote debugging, and
implement trace functionality throughout your code to retrieve finely tuned output.
No matter what you do with data, there are certain fundamental concepts that
you should understand about the data approach in ADO.NET. You might never
need to know some of the details of data handling — for example, you might never
need to directly edit an XML file containing data — but it is very useful to
understand the data architecture in ADO.NET, what the major data components
are, and how the pieces fit together.
New in ADO.Net
For all these reasons, data access with ADO.NET is designed around an
architecture that uses connections sparingly. Applications are connected to the
database only long enough to fetch or update the data. Because the database is not
holding on to connections that are largely idle, it can service many more users.
Benefits of ADO.NET
Interoperability
Maintainability
Performance
Scalability
Because the Web can vastly increase the demands on your data, scalability
has become critical. Internet applications have a limitless supply of potential users.
Although an application might serve a dozen users well, it might not serve
hundreds —or hundreds of thousands — equally well. An application that
consumes resources such as database locks and database connections will not serve
high numbers of users well, because the user demand for those limited resources
will eventually exceed their supply.
Number of Tables
Because the dataset can hold multiple, separate tables and maintain
information about relationships between them, it can hold much richer data
structures than a recordset, including self-relating tables and tables with many-to-
many relationships.
Data Navigation and Cursors
In ADO you scan sequentially through the rows of the recordset using the
ADO MoveNext method. In ADO.NET, rows are represented as collections, so
you can loop through a table as you would through any collection, or access
particular rows via ordinal or primary key index. DataRelation objects maintain
information about master and detail records and provide a method that allows you
to get records related to the one you are working with. For example, starting from
the row of the Investor table for "Nate Sun," you can navigate to the set of rows of
the Purchase table describing his purchases.
The transmission of XML files offers the following advantages over COM
marshalling:
Penetrating Firewalls
SQL SERVER
SQL SERVER:
SQL server is a client/server relational database management system
(RDBMS) that uses transact-SQL to send request between a client and SQL server.
Client/server Architecture
Data Representation
Rule of guaranteed access
Proper treatment of null value
Security
Versioning
Physical Independence
Logical Independence
Integrity constraint independence
View Updating
Data Description
Comprehensive data sub language
Insert and update rule
Distribution
SYSTEM TESTING
TESTING
system is tested using the test data. While testing, errors are noted and
corrections remade, the corrections are also noted for future use.
SYSTEM TESTING
UNIT TESTING
was tested separately to uncover errors within its boundaries. User interface
MODULE TESTING
A module is composed of various programs related to that module. Module
within the same module. It then tests the overall functionality of each
module.
INTEGRATION TESTING
ACCEPTANCE TESTING
The software has been tested with the realistic data given by the client and produced fruitful
results. The client satisfying all the requirements specified by them has also developed the
software within the time limitation specified. A demonstration has been given to the client and
.
Conclusion
BIBLIOGRAPHY
BOOKS REFERRED
The following books were used extensively for the project development and
implementation.
1.”VB.N ET Developer’s Guide” Syngress Publishing, Inc. Rockland,
By Cameron Wakefield
Henk-Evert Sonder
Wei Meng Lee
WEBSITES REFERRED
The following links were searched and exploited extensively for the project
development and implementation.
1 www.google.com
2 www.wikipidea.com
3 www.homeandlearn.com
4 www.dotnetspider.com
5 www.codeproject.com