Professional Documents
Culture Documents
ON
Hospital Management
By
Mumbai
2017-2018
ACKNOWLEDGEMENT
With immense please we are presenting “Hospital Management” Project report as part of the
curriculum of ‘Bachelor of Computer Application’. We wish to thank all the people who gave us
unending support.
I / we express my / our profound thanks to our head of department Mr./ Mrs. “Name of the
HOD ”, project guide and project incharge Mr. / Mrs. “Name of the project incharge” and all those who
CERTIFICATE
“Hospital Management”
Deepak Rathod
1. Introduction 1
2. Objectives 3
3. Project Category 4
4. Characteristics of a Relational DBMS Model 7
5. Flow Diagram 9
6. Data Structure (Table) 14
7. Process Logic 18
8. Validation Checks 22
9. Scope of the future application 23
10. Preliminary Investigation 25
11. Request Clarification 26
12. Feasibility study 30
13. Design Specification 34
14. Code Efficiency 42
15. Code Optimization Used in Software 43
16. Code 44
17. Testing Techniques & Strategy 54
18. Testing 55
19. System Security 59
20. Cost Estimation of Project 61
21. Report 67
INTRODUCTION
Health of citizen is the wealth of Nation. India has contributed the most
ancient Medical science “AYURVEDA” to the world besides other Medical
sciences. This field had witnessed a rapid metamorphosis in all of its sections.
With immensely increasing advancement in the field of technology, ambit of
medical sciences has enlarged making it more sophisticated, diagnosis and cure-
oriented. With the advent of 21st century, Health care has become an industry
having tremendous potential.
Software application can provide solution and services for the global health
care industry. By using the cutting edge technologies, Hospital Management can
be improved with efficient work flow and communication. Any time any where
facilities of the INTERNET have helped the Medical fields to integrate into a single
unit. Various Hospitals across the globe can be connected together. They can
share information and even services. Details of the Patients, their previous visits
etc. are totally not perceptible without a computer. Relevant Information are
always stored in the computer and are available instantly in front of the user.
1|Page
Medical Transcription, one of the latest technologies in health world
provided with Internet facilities helps patient’s interaction with different Health
Experts of the world for an astute clinical analysis as if treatment is going on at his
home and door step.
2|Page
OBJECTIVE
3|Page
PROJECT CATEGORY
OVERVIEW OF RDBMS:
4|Page
Identify what specific objects in that part of the world's data are of interest
to us.
Identify a relationship between the objects.
Hence, the objects, their attributes and the relationship between them
That are of interest to us are in the database which is designed, built and
populated with data for a specific purpose.
Provides creation of a file, addition & deletion & modification of data,
creation, addition and deletion of entire files.
Provides retrieval of data collectively or selectively by Database.
Provides storing and indexing the data stored at the user's discretion and
direction.
Provides performance of Mathematical function and manipulation of the
data stored in the database to perform the desired calculation.
Provides maintenance of data integrity and database use.
Provides form-based interface for easy accessibility and data entry.
Provides complex relationships between data.
Provides keeping a tight control over data redundancy.
Provides enforcement of user-defined rules to ensure the integrity of table
data.
Provides a centralized data dictionary for the storage of information
pertaining to data and its manipulation.
Provides ensuring that data can be shared across applications.
Provides automatic intelligent backup and recovery procedures for data.
Provides different interfaces via which users can manipulate data.
5|Page
In the early days of computing the DBM System, used to manage data,
were of the Hierarchic or Network model. When these were placed into network
operating System and multiple users began to access table data concurrently, the
DBM system responded to these user requests very sluggishly and was not totally
stable when the number of users exceeded four or five.
Oracle 8.0 implements around seven of codd's laws, Ingress nine, Sybase
ten and a half. However, research and development is constantly going on at all
the sevendor's sites. Each vendor is striving to implement all of Codd's laws in
their products; this constantly leads to products upgrades being brought out by
the product vendors. This is really good news for programmers. Currently
implements all rules fully or partially. The programming world is constantly
getting easier and easier.
6|Page
Characteristics of a Relational DBMS Model
7|Page
If the RDBMS engine is not loaded and running in a computer memory, user
security and request for a table data are simply not entertained.
8|Page
Analysis DFD
9|Page
Billing Context Level DFD
10 | P a g e
11 | P a g e
12 | P a g e
MODULES AND ITS DESCRIPTION
13 | P a g e
Data Structure (Table)
Doctor Table:
Field name Data type Length Constraint Description
Doctor_id Number 10 Not Null Doctor
Identification
Number
Doct_name Varchar 12 Not Null Doctor name
Edu_Qualification Varchar 15 Not Null Education
Qualification
D_O_B Varchar 08 Not Null Date of Birth
Doc_department Varchar 15 Not Null Department
Doc_Salary Varchar 08 Not Null Doctor Salary
Father_name Varchar 20 Not Null Doctor’s
Father name
Phone_num Number 11 Not Null Doctor Phone
number
Email_id Varchar 12 Not Null Doctor
Electronic
mail
14 | P a g e
Patient Table:
Field name Data type Length Constraint Description
Patient_id Number 10 Not Null Patient
Identification
Number
Pat_name Varchar 12 Not Null Patient Name
Edu_Qualification Varchar 12 Not Null Educational
Qualification
D_O_B Varchar 08 Not Null Date of Birth
Pat_department Varchar 15 Not Null Department
Pat_fee Varchar 08 Not Null Patient Fee
Father_name Varchar 20 Not Null Patient Father
Name
Phone_num Number 11 Not Null Patient Phone
Number
15 | P a g e
Nurse Table:
Field name Data type Length Constraint Description
Nur_id Number 10 Not Null Nurse
Identification
Number
Nur_name Varchar 12 Not Null Nurse Name
Edu_Qualification Varchar 15 Not Null Educational
Qualification
D_O_B Varchar 08 Not Null Date of birth
Nur_department Varchar 15 Not Null Department
Nur_salary Varchar 08 Not Null Nurse Salary
Father_name Varchar 20 Not Null Nurse Father
Name
16 | P a g e
Admin Staff Table:
Field name Data type Length Constraint Description
Staff_id Number 14 Not Null Staff
Identification
Number
Staff_name Varchar 16 Not Null Staff name
Edu_Qualification Varchar 10 Not Null Educational
Qualification
D_O_B Varchar 10 Not Null Date of Birth
Staff_department Varchar 15 Not Null Department
Staff_salary Varchar 08 Not Null Staff Salary
Father_name Varchar 18 Not Null Staff Father
name
Phone_num Number 11 Not Null Staff Phone
Number
Email_id Varchar 12 Not Null Staff
Electronic
Mail
17 | P a g e
Process Logic
Patient details
Doctor details
Employee details
Medicine Details
Department details
Report details
Account details
Employee work details
PATIENT DETAILS:
This module is the most important module of the “Hospital”. Unless there is
patient there is no means of having hospital .In this module we know the details
of patient. Patient which come from any part take treatment inform of admitted
basis or out patient door basis. Patient is an important factor for Hospital.
18 | P a g e
DOCTORS DETAIL:
EMPLOYEE DETAIL:
The employee detail module of Hospital through which the treatment are
done. In this module the main works are attendance of Employee work time,
salary of the employee are shown. In every hospital whether it is private sector or
public sector the work are important part off any hospital. It is the survival of any
hospital worker.
MEDICINE DETAILS:
The module medicines are common modules of any hospital. In this module
details of medicine are kept as records. The stock of medicine, date of
manufacturing, date of expiry, composition of medicine is kept in this module.
Medicine composition is also adjusted so that required medicines reach to
required ward so that treatment can have in proper way.
REPORT DETAILS:
This module is very important for each part of the hospital like employee,
doctors, patients, etc. This module will help in showing the progress the hospital.
In this module report of the patient ,condition of the patient, status of the
patient, recovery of the patient, detection of the patient disease all are explain.
19 | P a g e
Doctors report, Employee reports, Employee working reports, Hospital
department record, Medicine prescribe to the Patient, accounts and Billing of all
employee including Doctor, Patient, Nurse and administrative employee are kept
and do work as and where demand.
ACCOUNT DETAILS:
The output and report generation for Hospital management system will include
the following details
Doctors detail
Visiting doctors detail
patient detail
outpatient door detail
staff detail
nurse detail
ward boy detail
employee detail
employees work time detail
20 | P a g e
emp_work detail
emp attendance detail
medicine detail
medicine prescribed detail
holiday detail
accounts detail
21 | P a g e
VALIDATIONS CHECK
Primary key
Foreign key
Limit values
22 | P a g e
SCOPE OF THE FUTURE APPLICATION
23 | P a g e
Object oriented design.
Fully automated, need for human intervention
The project being developed with friendly user interface can be used by any
user.
24 | P a g e
Preliminary Investigation
This is the first phase and consists of a brief survey of the areas involved
and will result in taking the project into the next phase, postponing development
for a period or recommending that no further action be taken. Sometimes it is
subdivided into a preliminary investigation (initial study) followed by a more
detailed feasibility study. The phase is initiated by management, who perceive the
need because of changes or expected changes in the Hospital environment,
limitations or failure of existing systems, or the awareness of technological
advances relating to the particular are involved in particular systems which
competitors are developing. Information systems projects’ originate from many
reasons: to achieve greater speed in processing data, better accuracy and
improved consistency, faster information retrieval, integration of business areas,
reduced cost and better security. The sources also vary project proposals
originate with department managers, senior executives and systems analysis.
Sometimes the real origin is an outside source, such as a government agency
which stipulates a systems requirement the organisation must meet. When the
request is made, the first systems activity, the preliminary investigation, begins.
The activity has three parts: request clarification, feasibility study and request
approval.
25 | P a g e
Request Clarification
Many requests from employees and users in organisations are not clearly stated.
Therefore, before any systems investigation can be considered, the project
request must be examined to determine precisely what the originator wants. A
simple telephone call may suffice if the requester has a clear idea but does not
know how to state it. On the other hand, the requester may merely be asking for
help without knowing what is wrong or why there is a problem. Problem
clarification in this case is much more difficult. In either case, before any further
steps can be taken, the project requests must be clearly states. This phase (initial
study) involves estimating whether or not a development project is worthwhile.
Problems with the current automated or manual system are identified, as well as
the benefits and costs of an alternative system. If the benefits seem to out wright
the costs(especially when compared with competing projects), a green signal may
be given to continue the project, and detailed plans and schedules are drafted for
making the system a reality. The proposed solution to the user’s problem may
involve something between dramatic change(completely new system) and slight
change to the present system. If the present system is manual and a computer
system is proposed, the development project will probably be very large. At the
other extreme are small development project that represent slight changes to
existing systems, such as sorting information in a different way or inserting
subtotals or adding new columns to a report.
26 | P a g e
The objectives of this phase are:
During this phase, which should be as short as possible, the systems analyst will
be concerned with:
27 | P a g e
6. Interfaces with other systems.
An initial study calls for learning as much has possible about the proposed project.
At this early point in the project, rough as mates are made of the following:
29 | P a g e
FEASIBILITY STUDY
Technical Feasibility:
In this project, I can say that this project will be technical feasible. This is
successfully satisfying the users of the basis requirement. The tools and
application software are used in this project are very popular and easily available
across the world.
For the setup of the project minimum software and hardware requirements
are given above “package collection”.
Operational Feasibility:
Economic Feasibility:
Economic feasibility requires one to make the cost benefit analysis, if I say it
in technical term. In a layman’s language it is a comparison of the cost of installing
system and benefits according from it.
30 | P a g e
At this level the project may be called a demo project at desktop level.
Therefore, it is not possible to measure the benefits accruing and cost of
installation. Such study can be made only the project advances to a higher level.
Management Feasibility:
The senior level officers are supportive in implement this project for
motivation of clerical or no-technical employee.
Legal Feasibility:
This project is not expected to violate any statute made 3 under the
Constitution of India and addition it is approved by IGNOU to do this project.
Time Feasibility:
Technical Feasibility:
In this project, I can say that this project will be technical feasible. This is
successfully satisfying the users for the basis requirements. The tools and
application software are used in this project are very popular and easily available
across the world.
31 | P a g e
For the setup of the project minimum Software and Hardware
requirements are given above in “Package Selection”.
Operational Feasibility:
Analysis Document
Determining systems requirements requires analysis of the facts in hand. Systems
analysis is fact-finding followed by analysis of the facts. The analyst first defines
and documents, then analyzes. Descriptions and documentation developed as a
result of the fact-finding effort are studied to evaluate current system
performance and establish requirements to be met in a new design. The
conclusions drawn during this activity form the basis for the transition to design
and to all over other development activities that follow.
32 | P a g e
Management of a Hospital is being time critical in nature; smooth running of the
management software has been a nightmare for both the management
department as well as the IT department. Constant updating is required to the
management software due to the ever-changing statutory and internal
requirement, adding to woes.
For developing “Hospital management system”, the work is carried out by me.
The work is carried out in accordance with specific requirements of the Hospital.
The forms and the tables required for monthly salary processing is designed and
developed with the help of the respected Guide sir. After this stage proper coding
is carried out and finally checked and modified by the project guide time-to-time
and finally testing and debugging is carried out thoroughly and minutely. Reports
are prepared in the last. The analysis process assists me in the development of
good design for the system.
33 | P a g e
Design Specification
The topic provides idea regarding general structure of application keeping system
constrains and functionality, in view. The design means to plan or sketch out the
form and method of a solution. The design represents the major characteristic of
the final system and determines the upper bound in quality for the system.
System design emphasizes on two aspects of a system:
Logical Design: This steps describes the features, the inputs, the outputs, tables,
databases and procedures to meet the project requirements. This gives the
detailed specification for the new system.
Physical Design: This steps involve production of software. Programs are written
to accept user input, process the data, produces output or reports and store data
in database.
34 | P a g e
1.) Output Design: For many end-user, output is the main reason for
developing the system and the basis on which they will evaluate the
usefulness of the application. Output design involves….
Determine what information is present?
Decide whether to display or print the information.
Presentation in an acceptable format.
2.) Input Design: Input design specifies how data are accepted for processing.
This involves…
What data to input?
What medium to use?
How data should be arranged or coded?
The dialog to guide user in providing input?
Method for performing input validation and steps to follow when error
occurs.
35 | P a g e
Database Design:
The collection data is usually referred as the referred as the database. The
database contains information about the particulars of an enterprise. The
management of data involves both the definitions of structures for the storage of
information and provision of mechanism for the manipulation of information. In
addition, the database system must provide for the safety of information stored
in the database despite system crashes or attempt to unauthorized access.
36 | P a g e
User interface Design:
37 | P a g e
Login Form:
This interface is used for checking the unauthorized user to enter the
system/software. It contains the following fields:
a. User name/Id
b. Password
38 | P a g e
Dashboard Page:
39 | P a g e
Staff Details Page:
40 | P a g e
Doctor Panel:
41 | P a g e
CODE EFFICIEENCY
The goal of the coding of programming phase is to translate the design of the
system produced during the design phase into code in a given programming
language. The coding phase affects both testing and maintenance phase. As we
knows the time spent in coding is a small percentage of software cost, while
testing and maintenance consume the major percentage. So it is clear that the
goal of coding is not to reduce the implementation cost, but to reduce the cost of
testing and maintenance phase. Efficiency of coded is determined my many
factors. These factors are readability of code, size of the program, execution time
and require memory. Having readability and understandability as a clear objective
of the coding activity can itself help in producing software that is more
maintainable.
42 | P a g e
CODE OPTIMIZATION USED IN SOFTWARE
Optimization of code involves giving life to your code it means the person who is
not actually programming this code can also easily understand what is happing
over there. This utility is achieved by to effective logical tools:->
1.make title
2.comments
Titling:-> if there is suitable title for each code window one can easily interact
with that code and calculate the prospect for debugging the program.
Documentation:->Relating to code designing where all logic are define for the
login process of that code it also better way of code optimization.
43 | P a g e
Code
Home Page:
namespace Hospital_Management
{
public partial class Home : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
lblError.Visible = false;
}
44 | P a g e
if (count == 1)
{
Session["email"] = email.Text;
Response.Redirect("Admin/AdminDashboard.aspx");
con.Close();
}
else
{
lblError.Visible = true;
}
}
}
else if (DropDownList1.SelectedValue == "Staff")
{
using (SqlConnection con = new SqlConnection(@"Data
Source=(LocalDB)\v11.0;AttachDbFilename=C:\Users\admin\Documents\Visual Studio
2012\Projects\Hospital Management\Hospital
Management\App_Data\Database.mdf;Integrated Security=True"))
{
con.Open();
string query = "select count(1) from Staffs where email=@email and
password=@password";
SqlCommand cmd = new SqlCommand(query, con);
cmd.Parameters.AddWithValue("@email", email.Text);
cmd.Parameters.AddWithValue("@password", password.Text);
int count = Convert.ToInt32(cmd.ExecuteScalar());
if (count == 1)
{
Session["email"] = email.Text;
Response.Redirect("Staff/INPatient.aspx");
con.Close();
45 | P a g e
}
else
{
lblError.Visible = true;
}
}
}
else if (DropDownList1.SelectedValue == "Doctor")
{
using (SqlConnection con = new SqlConnection(@"Data
Source=(LocalDB)\v11.0;AttachDbFilename=C:\Users\admin\Documents\Visual Studio
2012\Projects\Hospital Management\Hospital
Management\App_Data\Database.mdf;Integrated Security=True"))
{
con.Open();
string query = "select count(1) from Doctors where email_id=@email_id and
password=@password";
SqlCommand cmd = new SqlCommand(query, con);
cmd.Parameters.AddWithValue("@email_id", email.Text);
cmd.Parameters.AddWithValue("@password", password.Text);
int count = Convert.ToInt32(cmd.ExecuteScalar());
if (count == 1)
{
Session["email"] = email.Text;
Response.Redirect("Doctor/OutPatient.aspx");
con.Close();
}
else
{
lblError.Visible = true;
}
46 | P a g e
}
}
}
Doctor Registration:
47 | P a g e
values(@first_name,@last_name,@gender,@mobile,@email_id,@password,@address,@spe
cialization,@degree,@salary,@department)";
SqlCommand cmd = new SqlCommand(insert, con);
cmd.Parameters.AddWithValue("@first_name", fname.Text);
cmd.Parameters.AddWithValue("@last_name", lname.Text);
cmd.Parameters.AddWithValue("@gender", gender.SelectedItem.Text);
cmd.Parameters.AddWithValue("@mobile", mobileNo.Text);
cmd.Parameters.AddWithValue("@email_id", emailID.Text);
cmd.Parameters.AddWithValue("@password", passwordDoc.Text);
cmd.Parameters.AddWithValue("@address", Address.Text);
cmd.Parameters.AddWithValue("@specialization", specialization.Text);
cmd.Parameters.AddWithValue("@degree", degree.Text);
cmd.Parameters.AddWithValue("@salary", sal.Text);
cmd.Parameters.AddWithValue("@department",
DropDownList1.SelectedItem.Text);
cmd.ExecuteNonQuery();
con.Close();
Label2.Text = " Success ";
}
catch(Exception ex)
{
Response.Write(ex);
}
}
} }
48 | P a g e
OutPatient:
namespace Hospital_Management.Doctor
{
public partial class OutPatient : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
49 | P a g e
Label7.Visible = true;
Label8.Visible = true;
Label9.Visible = true;
Label10.Visible = true;
TextBox1.Visible = true;
TextBox2.Visible = true;
print.Visible = true;
}
con.Close();
}
catch (Exception ex)
{
Response.Write(ex);
}
}
}
}
InPatient:
namespace Hospital_Management.Staff
{
public partial class StaffDashbroad : System.Web.UI.Page
{
public void Clear()
{
firstname.Text = lastname.Text = mobile.Text = disease.Text = symptoms.Text =
address.Text = "";
}
50 | P a g e
2012\Projects\Hospital Management\Hospital
Management\App_Data\Database.mdf;Integrated Security=True");
con.Open();
string insert = "select id from PatientDetails where firstname='"+firstname.Text+"'
and lastname='"+lastname.Text+"'";
SqlCommand cmd = new SqlCommand(insert, con);
SqlDataReader mdr;
mdr=cmd.ExecuteReader();
if(mdr.Read())
{
Label10.Text = "Patient ID is "+mdr.GetInt32(0).ToString();
}
con.Close();
}
51 | P a g e
string insert = "insert into
PatientDetails(firstname,lastname,gender,mobile,address,disease,symptoms,department)
values(@firstname,@lastname,@gender,@mobile,@address,@disease,@symptoms,@depa
rtment)";
SqlCommand cmd = new SqlCommand(insert, con);
cmd.Parameters.AddWithValue("@firstname", firstname.Text);
cmd.Parameters.AddWithValue("@lastname", lastname.Text);
cmd.Parameters.AddWithValue("@gender", gender.SelectedItem.Text);
cmd.Parameters.AddWithValue("@mobile", mobile.Text);
cmd.Parameters.AddWithValue("@address", address.Text);
cmd.Parameters.AddWithValue("@disease", disease.Text);
cmd.Parameters.AddWithValue("@symptoms", symptoms.Text);
cmd.Parameters.AddWithValue("@department",
DropDownList1.SelectedItem.Text);
cmd.ExecuteNonQuery();
con.Close();
getID();
Label8.Text = "Successfully Registered";
Clear();
}
catch (Exception ex)
{
Response.Write(ex);
}
}
52 | P a g e
protected void Button_New_Click(object sender, EventArgs e)
{
Clear();
}
53 | P a g e
TESTING (TESTING TECHNIQUES AND
TESTING STRATEGIES)
TESTING OBJECTIVE
54 | P a g e
TESTING
TYPE OF TESTING
TYPE OF TESTING
BLACK BOX TESTING: Black box testing to be applied dwring lateral of testing
Black box testing enables the software engineer.
55 | P a g e
The Black bon texting procedure is exhaustive testing. One crtrion for generating
testcases is to generate the candomly. There are no formal rules for designing test
cases forfunctionl testing. However there we a number at method that can be
used to select are anumber of method that can be used to select test cases they
are.
By applying Black Box testing a set of test cases that satisfy the following criteria.
Test cases that reduce, by a count that is greater than one, the number of
additional test case must be designed to achieve reasonable testing.
Test case that tells as something about the presence associated only with the
specific test at haud.
WHITE BOX TESTING: Structural Testing or white Bon texting:- To text the
structural testing or white box texting is used. This test is preformated ewcly in
the testing process. This testing also called glass box testing can drive test cases
that.
1. Gwrtantee that all the independent paths within the module have been
exeresisedat least once.
2. Exercise all logical deesions on their true and flace sides.
3. Execute all loops at their boundries and within their validity.
4. Exercise internal data strctyer to enswe their validity.
56 | P a g e
1. Control flow based testing.
3. Mutation testing.
Unit testing
integration testing
system testing
acceptance testing
UNIT TESTING
Unit testing is iersonstially for verification of the code produced drawing
the code phase that is goal of testing is to the internal logic at the modules.
As focus of this testing level is testing the code structure testing is best
suited forth is level
INTEGRATION TESTING
The goal of this testing level is to see if the modules can be integrated
propenly. In other accrds the emphasis on testing the inter cases between
the modules . this testing activity can be consired festing the design .
SYSTEM TESTING
In this testing entire software is tested. The goal is to see if the software
meets its rewuirements.
ACCEPTANCE TESTING
57 | P a g e
Acceptance testing is preformatted using real data of the client to
demonstrate that software. Is working satisfactory. Testing lane focuses in
the external behavior by the system Intense the fanatical testing is
performance at this level.
VALIDATION CHECKS
Validation retrs to different set of activities that inswe that the software
that has been built is traceable that customer requirement. Validation is
the check that “the product made is what was required or not”
Validation testing provides final assurance performance requirement. Black
ontesting technique are used cxeelusively during validation.
After each validation test cues has been conducted, one or two passable
and condition exists. The function or performance characteristics conform
to specification and are accepts.
A deviation from specification is uncovered and a defiance list is created.
Deviation or error discovered at this stage in a project can rarely be
corrected prior to scheduled completion. It is often necessary for resolving
deviancies.
58 | P a g e
SYSTEM SECURITY
Every system application must provide built- in features for security and
integrity of data. Without safeguards against unauthorized access fraud,
embezzlement etc. a system could be so vulnerable as to threaten the survival of
the organization.
Every software developer has to take care about the security measures
required by a system according to the functionality provided by it. Data security is
of major concern in this respect. To present unauthorized access to the system
there are many techniques that can be applied. Some special measures should
also be developed for quick recovery after a disaster.
My project provides the user, choices to select the category of user through
login facility where each category has its own username and password. Each
category has privileges according to the access rights required by it.
59 | P a g e
Also there is a login profile, maintained by the system to store the user
details who access the system so that the administrator should be able to check
the type of users entered whenever he wants.
60 | P a g e
COST ESTIMATION OF THE PROJECT
Whenever estimates are made, we look into future and accept some
degree of uncertain as a matter of course estimation of resources k cost and
shedyke of a software development effort requires experience acces to good
historical information, and the coursge to commit to quantitatice measures when
qualitative data are all that exist. Estimation carries inherent risk that leads to
uucertainty.
61 | P a g e
approaches take an iteratise view of the development. In such approaches it is
possible to revisit the estimate and revise it when customer makes changes to
requirements.
IMPLEMENTATION
1. Training personnel
2. Conversion procedures
3. Post-implementation review.
Training personnel- In the training personnel both systems operators and
user needstraining. There are two types of training.
a. System Operators Trainig.
b. Users Training.
62 | P a g e
1. Vendor and in-service Training.
2. In-house Training
Conversion Methods- Conversion is the process of changing from the old system
to the new one. It must be properly planned and executed. Four methods are
common in use,these are:-
1. Parallel System.
2. Direct Conversion.
3. Pilot System.
4. Phase-in method.
REVIEW PLAN
The review team prepares a formal review plan around the objectives of the
review, the type of evaluation to be carried out and the time schedule required.
An overall plan covers the following areas:-
63 | P a g e
1. Administrative Plan.
3. Hardware Plan.
The review not only assesses how well the current system is designed and
implemented, but also is a valuable sources of information that can be applied to
the next systems project.
ON SITE TEST:-On feed all types of data for the last period for menu system and
try generating all kinds of reports. Now these reports have to be matched with
manual system Reports. If everything is ok then real life use of package can be
started immediately.
The programmers Analyst spend sufficient time for maintaining programs. The
study on the maintenance requirements for the information system revealed
that:-
a. 60-90 percent of the overall cost of software during the life of a system
isspent on maintenance.
64 | P a g e
b. In documented cases, the cost of maintenance, when measured on the
basis of writing each instruction in coding from is more than 50 times the
cost of developing a system.
c. The software demand is increasing at faster rate than supply. Many
programmers are devoting more time on systems maintenance than on
new software development. There is a backlog of new development work.
1. Corrective:
2. Adaption or Perfective:
65 | P a g e
changes in the specifications. It is to keep with changing user needs and the
operational environment.
The keys to reduce the need for maintenance while making it possible to carry
on with essential tasks more efficiently are as follows:
66 | P a g e
REPORT
The output and report generation for Hospital management system will include
the following details
Doctors detail
Visiting doctors detail
patient detail
outpatient door detail
staff detail
nurse detail
ward boy detail
employee detail
employees work time detail
emp work detail
emp attendance detail
medicine detail
medicine prescribed detail
holiday detail
accounts detail
67 | P a g e
Reference and Bibliography
68 | P a g e