Final Major Team 3 Document
Final Major Team 3 Document
on
Submitted
In partial fulfillment for the requirement for the award of the degree of
BACHELOR OF TECHNOLOGY
in
(2020-2024)
I
VAAGDEVI COLLEGE OF ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
(UGC Autonomous, Accredited by NBA, Accredited by NAAC with “A”)
CERTIFICATE
This is to certify that the major project entitled “Monitoring Health Care Resources in
Government Hospitals” is submitted by Gopalapu Tejaswini 20641A0513, Syed Qadir Hussaini
20641A0528, Puppala Rohith 20641A0509, Junnuthula Asritha 20641A0531 in partial
fulfillment of the requirements for the award of the Degree in Bachelor of Technology in Computer
Science and Engineering during the academic year 2023-24.
External Examiner
II
ACKNOWLEDGEMENT
We wish to take this opportunity to express my sincere gratitude and deep sense of respect
to beloved Dr.K.Prakash, Principal, Vaagdevi College of Engineering for providing all the
required assistance and for his support and inspiration to carry out this industry Oriented Major
Project in the institute.
We are also thankful to Dr.K.Rekha Devi, Mr.Ch.Aravind Kumar for their valuable
suggestions, encouragement and motivations for completing this project successfully.
We are thankful to all other faculty members for their encouragement. We convey our
heartfelt thanks to the lab staff for allowing us to use the required equipment whenever needed.
Finally, we would like to take this opportunity to thank our family for their support through
the work. We sincerely acknowledge and thank all those who gave directly or indirectly their
support in completion of this work.
III
DECLARATION
IV
ABSTRACT
Government hospitals provide medicines for the treatment to the patients based on the diagnosis.
Generally government hospitals stores all the patients historical data and current data in cloud .In
our system user can register with their details, which is stored to the admin database. This system
allows the user to view the hospital location using predictive algorithm and details about the
hospital such as doctors, medicines ,specialists,beds availability and also helps the patient to get
details about the government hospitals. Financial and administrative performance are improved by
high utilization of resources and reduced fraud and abuses and optimized by supply chain and
human capital management.
V
INDEX
TITLE PAGE NO
CHAPTER-1
INTRODUCTION 1
CHAPTER-2
SYSTEM STUDY 10
CHAPTER-3
SYSTEM DESIGN 12
CHAPTER-4
INPUT AND OUTPUT DESIGN 20
VI
CHAPTER-5
IMPLEMENTATION 22
5.1 Modules 22
5.2 Java Technology 23
5.3 Source Code 38
CHAPTER-6
SYSTEM TESTING 50
6.1 Types Of Tests 50
6.2 Test Cases 54
CHAPTER-7
RESULTS 57
CHAPTER-8
CONCLUSION AND FUTURE SCOPE 64
8.1 Conclusion 64
8.2 Future Scope 65
BIBLIOGRAPHY 66
VII
LIST OF FIGURES
1 System Architecture 12
2 Flow Chart 13
3 Use case 15
4 Class diagram 16
5 Sequence diagram 17
6 Activity diagram 18
7 E-R Diagram 19
8 Java Working 23
9 Java on different OS 24
11 Java 2 SDK 25
13 TCP/IP Model 29
14 IP Address 31
15 Output Screens 57
VIII
CHAPTER-1
INTRODUCTION
This project aims to develop a comprehensive system for monitoring and managing
health resources in government hospital. In emergency situations, patients may be
exposed to potential harm or risks. So if the government hospital doesn’t have enough
things during an emergency, it may be necessary for us to redirect to another hospital
where the required resources are available. Here in this project user first sign up and
login into the system providing their information. After users register and log in, the
system reviews the provided details. If the users preferences and requirements match
the offerings of any specific hospitals, the user proceeds to go to that designated
hospital. However, in cases where the user’s preferences do not match with the
available options or if the preferred hospital is unavailable then user will go with the
alternate one. This ensures that users have the flexibility to choose an appropriate
healthcare facility based on their preferences and the availability of resources.
1
1.1 LITERATURE SURVEY
To date, the health care industry has paid little attention to the potential benefits to be
gained from big data. While most pioneering big data studies have adopted
technological perspectives, a better understanding of the strategic implications of big
data is urgently needed. To address this lack, this study examines the development,
architecture and component functionalities of big data, and identifies its capabilities,
including traceability, the analysis of unstructured data and patterns of care, and its
predictive capacity to support healthcare managers seeking to formulate more
effective big-data-based strategies. Our findings will help healthcare organizations
respond strategically to the challenges they face in today's highly competitive
healthcare market.
Since the 1960s, methods for extracting useful information from large data
sets, termed analytics or data mining, have played a key role in fields such as physics
and biology. In the last few years, the same trend has emerged in educational research
and practice, an area termed learning analytics (LA; Ferguson, 2012) or educational
data mining (EDM; Baker & Yacef, 2009). In brief, these two research areas seek to
find ways to make beneficial use of the increasing amounts of data available about
learners in order to better understand the processes of learning and the social and
motivational factors surrounding learning. The goal of these efforts is to produce more
efficient, more effective, and deeper learning in the context of increasingly positive
learning experiences. The emergence of EDM/LA is a recent phenomenon. The first
meetings of scientists in this area were the Educational Data Mining workshops,
which started in 2005 and became an annual conference series in 2008. This
conference series was joined by the Learning Analytics and Knowledge conference
series in 2011. The two research areas of EDM and LA, emerging from different
communities of scientists and practitioners, have somewhat different goals; discussing
these differences is outside the scope of this report (see Siemens & Baker, 2012). In
brief, the validity of models of learners and learning is perhaps the key focus of the
EDM community, whereas the use of the results of analysis to drive changes in
practice by instructors is perhaps the key focus of the LA community. The
conferences in EDM and LA were followed by the establishment of journals devoted
2
to the topics, with the Journal of Educational Data Mining commencing publication in
2009 and the International Journal of the Society for Learning Analytics Research
expected to commence publication in 2013. As of this writing, the International
Educational Data Mining Society has approximately 150 members and over 600
subscribers on its mailing lists. A range of methods has been developed by these two
communities, drawing from areas such as data mining, computational science,
statistics, psychometrics, and social network analysis. (A selection of these methods
will be discussed below; a fuller review can be found in Baker & Siemens, in press).
3
To describe the promise and potential of big data analytics in healthcare. The
paper describes the nascent field of big data analytics in healthcare, discusses the
benefits, outlines an architectural framework and methodology, describes examples
reported in the literature, briefly discusses the challenges, and offers conclusions. The
paper provides a broad overview of big data analytics for healthcare researchers and
practitioners. Big data analytics in healthcare is evolving into a promising field for
providing insight from very large data sets and improving outcomes while reducing
costs. Its potential is great; however there remain challenges to overcome.
Over the last three decades, the prevailing view of information technology
strategy has been that it is a functional-level strategy that must be aligned with the
firm’s chosen business strategy. Even within this socalled alignment view, business
strategy directed IT strategy. During the last decade, the business infrastructure has
become digital with increased interconnections among products, processes, and
services. Across many firms spanning different industries and sectors, digital
technologies (viewed as combinations of information, computing, communication,
and connectivity technologies) are fundamentally transforming business strategies,
business processes, firm capabilities, products and services, and key interfirm
relationships in extended business networks. Accordingly, we argue that the time is
right to rethink the role of IT strategy, from that of a functional-level strategy—
aligned but essentially always subordinate to business strategy—to one that reflects a
fusion between IT strategy and business strategy. This fusion is herein termed digital
business strategy. We identify four key themes to guide our thinking on digital
business strategy and help provide a framework to define the next generation of
insights. The four themes are (1) the scope of digital business strategy, (2) the scale of
digital business strategy, (3) the speed of digital business strategy, and (4) the sources
of business value creation and capture in digital business strategy. After elaborating
on each of these four themes, we discuss the success metrics and potential
performance implications from pursuing a digital business strategy. We also show
how the papers in the special issue shed light on digital strategies and offer directions
to advance insights and shape future research
4
Big Data governance requires a data governance that can satisfy the needs for
corporate governance, IT governance, and ITA/EA. While the existing data
governance focuses on the processing of structured data, Big Data governance needs
to be established in consideration of a broad sense of Big Data services including
unstructured data. To achieve the goals of Big Data, strategies need to be established
together with goals that are aligned with the vision and objective of an organization.
In addition to the preparation of the IT infrastructure, a proper preparation of the
components is required to effectively implement the strategy for Big Data services.
We propose the Big Data Governance Framework in this paper. The Big Data
governance framework presents criteria different from existing criteria at the data
quality level. It focuses on timely, reliable, meaningful, and sufficient data services,
focusing on what data attributes should be achieved based on the data attributes of Big
Data services. In addition to the quality level of Big Data, the personal information
protection strategy and the data disclosure/accountability strategy are also needed to
achieve goals and to prevent problems. This paper performed case analysis based on
the Big Data Governance Framework with the National Pension Service of South
Korea. Big Data services in the public sector are an inevitable choice to improve the
quality of people's life. Big Data governance and its framework are the essential
components for the realization of Big Data service.
Nowadays the increase of data variety considered very dispute problem for
analysis. So innovative methods are mandatory for analytics especially in big data
where the data in characteristic very complex and unstructured. The analytics is the
process of analysis to predict concealed pattern and association among data. The main
objective of this survey paper is to provide the exhaustive view of different predictive
analytics applications and approaches. Analytics methods focused with dissimilar
perspectives based on applications and data variety. Some of the application discussed
is big data in hotel governance, higher education, health care, data e-governance,
consumer orientations. This paper present different predictive approaches adapted for
different application with challenges and suggestions.
5
Consumer analytics is at the epicenter of a Big Data revolution. Technology
helps capture rich and plentiful data on consumer phenomena in real time. Thus,
unprecedented volume, velocity, and variety of primary data, Big Data, are available
from individual consumers. To better understand the impact of Big Data on various
marketing activities, enabling firms to better exploit its benefits, a conceptual
framework that builds on resource-based theory is proposed. Three resources—
physical, human, and organizational capital—moderate the following: (1) the process
of collecting and storing evidence of consumer activity as Big Data, (2) the process of
extracting consumer insight from Big Data, and (3) the process of utilizing consumer
insight to enhance dynamic/adaptive capabilities. Furthermore, unique resource
requirements for firms to benefit from Big Data are discussed.
6
1.2 EXISTING SYSTEM
In the existing system, Patients have to visit the hospital to know hospital resources
like about doctor and their specialization,medicines,beds avaliability. This may lead to
severe loss in emergency cases if the required specialist or beds or medicines are not
available. Sometimes,Patients life may be in risk as this is the time taking
process.Here,both hospital reputation and patients life may fall in risk.
7
1.3 PROPOSED SYSTEM
Our application provides the user the convenience where they can register, login and
view all the information related to the hospital like Hospital Location, Doctors name
with their Speciality, Consulting Time and days,Availability of Doctor to know
whether doctor is present or on Leave, Number of Available Medicines, Number of
Available Beds.This helps the user to make a decision to visit hospital according to
their needs.This can be useful to the hospital to keep track on their resources and
provide the best resources to maintain their reputation.This can create a positive
impact in a user towards the government hospitals who thinks government hospital
has less resources and helps in promoting government hospitals and free services to
help the people.
8
1.4 HARDWARE REQUIREMENTS
9
CHAPTER-2
SYSTEM STUDY
The feasibility of the project is analyzed in this phase and business proposal is put
forth with a very general plan for the project and some cost estimates. During system
analysis the feasibility study of the proposed system is to be carried out. This is to
ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.
1. ECONOMICAL FEASIBILITY
2. TECHNICAL FEASIBILITY
3. SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be
purchased.
10
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources. This will lead to high demands being placed on the client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must
not feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate
the user about the system and to make him familiar with it. His level of confidence
must be raised so that he is also able to make some constructive criticism, which is
welcomed, as he is the final user of the system.
11
CHAPTER-3
SYSTEM DESIGN
This project aims to develop a comprehensive system for monitoring and managing
health resources in government hospital. It has Admin module,Hospital Module and
User Module.System architecture is a conceptual model that describes a system's
structure, behavior, and other views. It can also refer to the description of an existing
system. A system architecture is made up of a diagram that defines the system's
structure and its subsystems, along with the behavior of the components
12
3.2 DATA FLOW DIAGRAM
1. The DFD is also called as bubble chart. It is a simple graphical formalism that
can be used to represent a system in terms of input data to the system, various
processing carried out on this data, and the output data is generated by this
system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It
is used to model the system components. These components are the system
process, the data used by the process, an external entity that interacts with the
system and the information flows in the system.
3. DFD shows how the information moves through the system and how it is
modified by a series of transformations. It is a graphical technique that depicts
information flow and the transformations that are applied as data moves from
input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system
at any level of abstraction. DFD may be partitioned into levels that represent
increasing information flow and functional details.
13
3.3 UML DIAGRAMS
GOALS:
14
USE CASE DIAGRAM
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases. The
main purpose of a use case diagram is to show what system functions are performed
for which actor. Roles of the actors in the system can be depicted.
15
Fig 3.5 Hospital Use Case Diagram
CLASS DIAGRAM
16
SEQUENCE DIAGRAM:
17
ACTIVITY DIAGRAM
18
3.4 E-R DIAGRAM
19
CHAPTER-4
The input design is the link between the information system and the user. It comprises
the developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document or it can
occur by having people keying the data directly into the system. The design of input
focuses on controlling the amount of input required, controlling the errors, avoiding
delay, avoiding extra steps and keeping the process simple. The input is designed in
such a way so that it provides security and ease of use with retaining the privacy.
Input Design considered the following things:
OBJECTIVES
2. It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be
free from errors. The data entry screen is designed in such a way that all the data
manipulates can be performed. It also provides record viewing facilities.
20
3. When the data is entered it will check for its validity. Data can be entered with
the help of screens. Appropriate messages are provided as when needed so that
the user will not be in maize of instant. Thus the objective of input design is to
create an input layout that is easy to follow
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users
and to other system through outputs. In output design it is determined how the
information is to be displaced for immediate need and also the hard copy output. It is
the most important and direct source information to the user. Efficient and intelligent
output design improves the system’s relationship to help user decision-making.
21
CHAPTER-5
IMPLEMENTATION
5.1 MODULES
1. Admin Module
2. Hospital Module
3. User Module
MODULES DESCRIPTION
ADMIN MODULE
In this module, admin can login directly, after successful login admin can perform
some operations like authorizing the hospitals after their registration, authorizing the
users after their registration. Only admin can view Hospital and User details. Only
after successful authorization by admin,Hospital and User can login.
HOSPITAL MODULE
In this Module, Hospital can register, after registration the admin must authorize the
hospital,until the admin authorizes the Hospital,the hospital will be in waiting status
and it cant login even after registering.When status is authorized,the hospital can login
and can Add Doctors, View Doctors, Add Medicine, View Medicine, Add Beds,View
Beds and logout.
USER MODULE
In this Module, User can register, after registration the admin must authorize the user,
until the admin authorizes the user, the user will be in waiting status and it cant login
even after registering.When status is authorized,the user can login and can View
Profile, Search Hospitals, view Doctor Details, ,View Beds,view Medicine Details
and logout.
22
5.2 JAVA TECHNOLOGY
23
You can think of Java byte codes as the machine code instructions for the Java
Virtual Machine (Java VM). Every Java interpreter, whether it’s a development tool or
a Web browser that can run applets, is an implementation of the Java VM. Java byte
codes help make “write once, run anywhere” possible. You can compile your program
into byte codes on any platform that has a Java compiler. The byte codes can then be
run on any implementation of the Java VM. That means that as long as a computer has
a Java VM, the same program written in the Java programming language can run on
Windows 2000, a Solaris workstation, or on an iMac.
24
The Java API is a large collection of ready-made software components that
provide many useful capabilities, such as graphical user interface (GUI) widgets. The
Java API is grouped into libraries of related classes and interfaces; these libraries are
known as packages. The next section, What Can Java Technology Do? Highlights
what functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As
the figure shows, the Java API and the virtual machine insulate the program from the
hardware.
25
ODBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL
database access mechanism that provides a consistent interface to a variety of
RDBMSs. This consistent interface is achieved through the use of “plug-in” database
connectivity modules, or drivers. If a database vendor wishes to have JDBC support,
he or she must provide the driver for each platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC.
As you discovered earlier in this chapter, ODBC has widespread support on a variety
of platforms. Basing JDBC on ODBC will allow vendors to bring JDBC drivers to
market much faster than developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public
review that ended June 8, 1996. Because of user input, the final JDBC v1.0
specification was released soon after.
The remainder of this section will cover enough information about JDBC for you to
know what it is about and how to use it effectively. This is by no means a complete
overview of JDBC. That would fill an entire book.
26
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with
early reviewer feedback, have finalized the JDBC class library into a solid framework
for building database applications in Java.
The goals that were set for JDBC are important. They will give you some insight
as to why certain classes and functionalities behave the way they do. The eight design
goals for JDBC are as follows:
1. SQL Level API: The designers felt that their main goal was to define a SQL
interface for Java. Although not the lowest database interface level possible, it is
at a low enough level for higher-level tools and APIs to be created. Conversely, it
is at a high enough level for application programmers to use it confidently.
Attaining this goal allows for future tool vendors to “generate” JDBC code and to
hide many of JDBC’s complexities from the end user.
2. SQL Conformance: SQL syntax varies as you move from database vendor to
database vendor. In an effort to support a wide variety of vendors, JDBC will
allow any query statement to be passed through it to the underlying database
driver. This allows the connectivity module to handle non-standard functionality
in a manner that is suitable for its users.
4. Provide a Java interface that is consistent with the rest of the Java system:
Because of Java’s acceptance in the user community thus far, the designers feel
that they should not stray from the current design of the core Java system.
27
5. Keep it simple: This goal probably appears in all software design goal listings.
JDBC is no exception. Sun felt that the design of JDBC should be very simple,
allowing for only one method of completing a task per mechanism. Allowing
duplicate functionality only serves to confuse the users of the API.
6. Use strong, static typing wherever possible: Strong typing allows for more
error checking to be done at compile time; also, less error appear at runtime.
7. Keep the common cases simple: Because more often than not, the usual SQL
calls used by the programmer are simple SELECT’s, INSERT’s, DELETE’s and
UPDATE’s, these queries should be simple to perform with JDBC. However,
more complex SQL statements should also be possible.
Java has two things: a programming language and a platform. Java is
a high-level programming language that is all of the following
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Robust Dynamic
Secure
Java is also unusual in that each Java program is both compiled and
interpreted. With a compile you translate a Java program into an intermediate
language called Java byte codes the platform-independent code instruction is
passed and run on the computer.
28
Java Program Interpreter
Compilers My Program
You can think of Java byte codes as the machine code instructions for
the Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a
Java development tool or a Web browser that can run Java applets, is an
implementation of the Java VM. The Java VM can also be implemented in
hardware.
Java byte codes help make “write once, run anywhere” possible. You
can compile your Java program into byte codes on my platform that has a
Java compiler. The byte codes can then be run any implementation of the
Java VM. For example, the same Java program can run Windows NT, Solaris,
and Macintosh.
NETWORKING
TCP/IP stack
The TCP/IP stack is shorter than the OSI one:
29
TCP is a connection-oriented protocol; UDP (User Datagram Protocol) is a
connectionless protocol.
UDP: UDP is also connectionless and unreliable. What it adds to IP is a checksum for
the contents of the datagram and port numbers. These are used to give a client/server
model - see later.
TCP: TCP supplies logic to give a reliable connection-oriented protocol above IP. It
provides a virtual circuit that two processes can use to communicate.
Internet addresses: In order to use a service, you must be able to find it. The Internet
uses an address scheme for machines so that they can be located. The address is a 32
bit integer which gives the IP address. This encodes a network ID and more
addressing. The network ID falls into various classes according to the size of the
network address.
Network address: Class A uses 8 bits for the network address with 24 bits left over
for other addressing. Class B uses 16 bit network addressing. Class C uses 24 bit
network addressing and class D uses all 32.
Subnet address: Internally, the UNIX network is divided into sub networks. Building
11 is currently on one sub network and uses 10-bit addressing, allowing 1024 different
hosts.
30
Host address: 8 bits are finally used for host addresses within our subnet. This places
a limit of 256 machines that can be on the subnet.
Total address
JFreeChart is "open source" or, more specifically, free software. It is distributed under
the terms of the GNU Lesser General Public Licence (LGPL), which permits use in
proprietary applications.
1. Map Visualizations
Charts showing values that relate to geographical areas. Some examples include: (a)
population density in each state of the United States, (b) income per capita for each
country in Europe, (c) life expectancy in each country of the world. The tasks in this
project include:
31
Sourcing freely redistributable vector outlines for the countries of the world,
states/provinces in particular countries (USA in particular, but also other areas);
Creating an appropriate dataset interface (plus default implementation), a
rendered, and integrating this with the existing XYPlot class in JFreeChart; Testing,
documenting, testing some more, documenting some more.
Implement a new (to JFreeChart) feature for interactive time series charts --- to
display a separate control that shows a small version of ALL the time series data, with
a sliding "view" rectangle that allows you to select the subset of the time series data to
display in the main chart.
3. Dashboards
4. Property Editors
The property editor mechanism in JFreeChart only handles a small subset of the
properties that can be set for charts. Extend (or reimplement) this mechanism to
provide greater end-user control over the appearance of the charts.
A Java web application generates interactive web pages containing various types of
markup language (HTML, XML, and so on) and dynamic content. It is typically
comprised of web components such as JavaServer Pages (JSP), servlets and
JavaBeans to modify and temporarily store data, interact with databases and web
services, and render content in response to client requests. Because many of the tasks
involved in web application development can be repetitive or require a surplus of
boilerplate code, web frameworks can be applied to alleviate the overhead associated
32
with common activities. For example, many frameworks, such as JavaServer Faces,
provide libraries for templating pages and session management, and often promote
code reuse.
What is Java EE?
Web Server is a software that can process the client request and send the response
back to the client. For example, Apache is one of the most widely used web server.
Web Server runs on some physical machine and listens to client request on specific
port.A web client is a software that helps in communicating with the server. Some of
the most widely used web clients are Firefox, Google Chrome, Safari etc. When we
request something from server (through URL), web client takes care of creating a
request and sending it to server and then parsing the server response and present it to
the user.
33
HTML and HTTP
Web Server and Web Client are two separate softwares, so there should be some
common language for communication. HTML is the common language between
server and client and stands for HyperText Markup Language.
Web server and client needs a common communication protocol, HTTP
(Hyper Text Transfer Protocol) is the communication protocol between server and
client. HTTP runs on top of TCP/IP communication protocol.
Some of the important parts of HTTP Request are:
HTTP Method – action to be performed, usually GET, POST, PUT etc.
URL – Page to access
Form Parameters – similar to arguments in a java method, for example
user,password details from login page.
Sample HTTP Request:
GET /FirstServletProject/jsps/hello.jsp
1
HTTP/1.1
2
Host: localhost:8080
3
Cache-Control: no-cache
Some of the important parts of HTTP Response are:
Status Code – an integer to indicate whether the request was success or not.
Some of the well known status codes are 200 for success, 404 for Not Found and
403 for Access Forbidden.
Content Type – text, html, image, pdf etc. Also known as MIME type
Content – actual data that is rendered by client and shown to user.
MIME Type or Content Type: If you see above sample HTTP response header, it
contains tag “Content-Type”. It’s also called MIME type and server sends it to client
to let them know the kind of data it’s sending. It helps client in rendering the data for
user. Some of the mostly used mime types are text/html, text/xml, application/xml etc.
Understanding URL: URL is acronym of Universal Resource Locator and it’s used
to locate the server and resource. Every resource on the web has it’s own unique
address. Let’s see parts of URL with an example.
http://localhost:8080/FirstServletProject/jsps/hello.jsp
34
http:// – This is the first part of URL and provides the communication protocol to be
used in server-client communication.
localhost – The unique address of the server, most of the times it’s the hostname of
the server that maps to unique IP address. Sometimes multiple hostnames point to
same IP addresses and web server virtual host takes care of sending request to the
particular server instance.
8080 – This is the port on which server is listening, it’s optional and if we don’t
provide it in URL then request goes to the default port of the protocol. Port numbers 0
to 1023 are reserved ports for well known services, for example 80 for HTTP, 443 for
HTTPS, 21 for FTP etc.
FirstServletProject/jsps/hello.jsp – Resource requested from server. It can be static
html, pdf, JSP, servlets, PHP etc.
Web servers are good for static contents HTML pages but they don’t know how to
generate dynamic content or how to save data into databases, so we need another tool
that we can use to generate dynamic content. There are several programming
languages for dynamic content like PHP, Python, Ruby on Rails, Java Servlets and
JSPs.
Web Container
Tomcat is a web container, when a request is made from Client to web server, it
passes the request to web container and it’s web container job to find the correct
resource to handle the request (servlet or JSP) and then use the response from the
resource to generate the response and provide it to web server. Then web server sends
the response back to the client.
When web container gets the request and if it’s for servlet then container
creates two Objects HTTPServletRequest and HTTPServletResponse. Then it finds
the correct servlet based on the URL and creates a thread for the request. Then it
invokes the servlet service() method and based on the HTTP method service() method
invokes doGet() or doPost() methods. Servlet methods generate the dynamic page and
write it to response. Once servlet thread is complete, container converts the response
to HTTP response and send it back to client.
35
Some of the important work done by web container are:
Communication Support – Container provides easy way of communication
between web server and the servlets and JSPs. Because of container, we don’t
need to build a server socket to listen for any request from web server, parse the
request and generate response. All these important and complex tasks are done by
container and all we need to focus is on our business logic for our applications.
Multithreading Support – Container creates new thread for every request to the
servlet and when it’s processed the thread dies. So servlets are not initialized for
each request and saves time and memory.
Deployment Descriptor
web.xml: file is the deployment descriptor of the web application and contains
mapping for servlets (prior to 3.0), welcome pages, security configurations, session
timeout settings etc.
MySQL: MySQL, the most popular Open Source SQL database management system,
is developed, distributed, and supported by Oracle Corporation. The MySQL Web site
(http://www.mysql.com/) provides the latest information about MySQL software.
MySQL is a database management system.
36
MySQL databases are relational.
A relational database stores data in separate tables rather than putting all the data in
one big storeroom. The database structures are organized into physical files optimized
for speed. The logical model, with objects such as databases, tables, views, rows, and
columns, offers a flexible programming environment. You set up rules governing the
relationships between different data fields, such as one-to-one, one-to-many, unique,
required or optional, and “pointers” between different tables. The database enforces
these rules, so that with a well-designed database, your application never sees
inconsistent, duplicate, orphan, out-of-date, or missing data.
MySQL software is Open Source.
Open Source means that it is possible for anyone to use and modify the software.
Anybody can download the MySQL software from the Internet and use it without
paying anything. If you wish, you may study the source code and change it to suit
your needs. The MySQL software uses the GPL (GNU General Public License),
http://www.fsf.org/licenses/, to define what you may and may not do with the
software in different situations.
37
5.3 SOURCE CODE
1. Index.html
<!DOCTYPE html>
<html>
<head>
<title>index</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li class="active"><a href="index.html"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li><a href="Admin.jsp"><strong><font
color="lightgreen">ADMIN</font></strong></a></li>
<li><a href="Hospital.jsp"><strong><font
color="lightgreen">HOSPITAL</font></strong></a></li>
<li><a href="user.jsp"><strong><font
color="lightgreen">USER</font></strong></a></li>
38
</ul>
</div>
</div>
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<h1><a href="#">MONITORING HEALTHCARE RESOURCES IN
GOVERNMENT HOSPITALS</a></h1>
</div>
</div>
</div>
<div class="wrapper row3">
<div id="featured_slide_">
<ul id="featured_slide_Content">
<li class="featured_slide_Image"><a href="#"><img src="images/sadar-hospital-
2019.png" alt="" /></a>
</li>
<li class="clear featured_slide_Image"><!-- Important - Leave This Empty --
></li>
</ul>
</div>
<div class="wrapper row5">
<div id="container" class="clear">
<div id="homepage" class="clear">
<center>
<h2>PROJECT ABSTRACT</h2>
<P align="justify">
Government hospitals provide medicines for the treatment to the patients
based on the diagnosis. Generally government hospitals stores all the patients
historical data and current data in cloud .In our system user can register with there
details, which is stored to the admin’s database. This system allows the user to view
the hospital location using predictive algorithm and details about the hospital such as
39
doctors, medicines ,specialists availability and also helps the patient to get details
about the government hospitals. Financial and administrative performance are
improved by high utilization of resources and reduced fraud and abuses and optimized
by supply chain and human capital management.
</P>
</center>
</div>
</div>
</div>
</body>
</html>
2. Dbconnection.java
package com.database;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.SQLException;
public class Dbconnection{
public static Connection
getcon(){Connection con = null;
try{
Class.forName("com.mysql.jdbc.Driver");
con = DriverManager.getConnection("jdbc:mysql://localhost:3306/govt_hsp",
"root", "root");
}
catch(Exception
e){ e.printStackTra
ce();
}
return con;
} }
40
3. AddGOVTHSP.jsp
<%@page import="com.database.Queries"%>
<%@page import="java.sql.ResultSet"%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<html>
<head>
<title>Admin Home</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="table.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="AdminHome.jsp"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li><a href="ViewUserDetails.jsp"><strong><font color="lightgreen">View
Users Details</font></strong></a></li>
<li class="active"><a href="AddGOVTHSP.jsp"><strong><font
color="lightgreen">Add Govt_Hsp</font></strong></a></li>
41
<li><a href="AddDoctors.jsp"><strong><font color="lightgreen">Add
Doctors</font></strong></a></li>
42
</table>
</form>
</center>
</div>
</center>
</div>
</div>
</body>
</html>
4. DoctorAction.jsp
<%@page import="java.sql.ResultSet"%>
<%@page import="com.database.Queries"%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<!DOCTYPE html>
<%
try{
String hsp=request.getParameter("hsp");
String special=request.getParameter("special");
String name=request.getParameter("name");
String Experience=request.getParameter("Experience");
String days=request.getParameter("days");
String time=request.getParameter("time");
String contact=request.getParameter("contact");
String availability=request.getParameter("availability");
43
<script type='text/javascript'>
window.alert("Successful...!!");
window.location="AddDoctors.jsp";
</script>
<%
}else{
%>
<script type='text/javascript'>
window.alert("Failed..!!");
window.location="AddDoctors.jsp";
</script>
<%
}
}catch(Exception
e){out.println(e);
}
%>
5. SearchHospital.jsp
44
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="UserHome.jsp"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li><a href="ViewProfile.jsp"><strong><font color="lightgreen">View
Profile</font></strong></a></li>
45
<center>
<%String username=(String)session.getAttribute("username");%>
<h1 style="color:red;">Search Hospital Here </h1>
<form action="SearchDetails.jsp" method="post">
<table>
<tr><th>Hospital Name</th><td><input type="text" name="hname"
required="" placeholder="Hospital Name"
style="width:300px;height:50px;"></td></tr>
<tr><th></th><td><input type="submit" value="Get Hospital Details"
required="" style="height:30px;"></td></tr>
</table
</form>
</center>
</div>
</center>
</div>
</div>
</body>
</html>
6. ViewUsersDetails.jsp
<%@page import="com.database.Queries"%>
<%@page import="java.sql.ResultSet"%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<html>
<head>
<title>Admin Home</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="tablestyle.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
46
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="AdminHome.jsp"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li class="active"><a href="ViewUserDetails.jsp"><strong><font
color="lightgreen">View Users Details</font></strong></a></li>
<li><a href="ViewHSPDetails.jsp"><strong><font color="lightgreen">View
Hospital Details</font></strong></a></li>
<li><a href="Admin.jsp"><strong><font
color="lightgreen">LOGOUT</font></strong></a></li>
</ul>
</div>
</div>
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<h1><a href="#" ><font color="lightgreen">MONITORING HEALTHCARE
RESOURCES IN GOVERNMENT HOSPITALS</font></a></h1>
</div>
</div>
</div>
47
<center>
<div id="homepage1" class="clear1"
style="width:1000px;height:500px;border:none;">
<center>
<h1 style="color:red;">View All Registered Users Details</h1>
<table>
<tr>
<th>Name</th>
<th>Mobile</th>
<th>Address</th>
<th>Register Date</th>
<th>UserName</th>
<th>Status</th>
</tr>
<%
try{
ResultSet r=Queries.getExecuteQuery("select * from user");
while(r.next()){
String s=r.getString("status");
%>
<tr>
<td><%=r.getString("name")%></td>
<td><%=r.getString("mobile")%></td>
<td><%=r.getString("address")%></td>
<td><%=r.getString("date")%></td>
<td><%=r.getString("username")%></td>
<%if(s.equals("waiting")){%>
<td><a
href="AuthorizeUser.jsp?id=<%=r.getString("id")%>">waiting</a></td>
<%}else{%>
<td><%=r.getString("status")%></td>
48
<%}%>
</tr>
<%
}
}catch(Exception
e){out.println(e);
}
%>
</table>
</center>
</div>
</center>
</div>
</div>
</body>
</html>
49
CHAPTER-6
SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It
is the process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not
fail in an unacceptable manner. There are various types of test. Each test type
addresses a specific testing requirement.
Unit testing
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All
decision branches and internal code flow should be validated. It is the testing of
individual software units of the application .it is done after the completion of an
individual unit before integration. This is a structural testing, that relies on knowledge
of its construction and is invasive. Unit tests perform basic tests at component level
and test a specific business process, application, and/or system configuration. Unit
tests ensure that each unique path of a business process performs accurately to the
documented specifications and contains clearly defined inputs and expected results.
Integration testing
50
Functional test
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
Functional testing is centered on the following items:
System Test
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.
White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It is
purpose. It is used to test areas that cannot be reached from a black box level.
51
Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most
other kinds of tests, must be written from a definitive source document, such as
specification or requirements document, such as specification or requirements
document. It is a testing in which the software under test is treated, as a black
box .you cannot “see” into it. The test provides inputs and responds to outputs without
considering how the software works.
Unit Testing
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.
Field testing will be performed manually and functional tests will be written in detail.
Test objectives
Features to be tested
52
Integration Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing: User Acceptance Testing is a critical phase of any project and
requires significant participation by the end user. It also ensures that the system meets
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
53
6.2 TEST CASES
Hospital Module:
1. Registration:
Test hospital registration with invalid credentials (e.g., missing fields, invalid
format).
2. Authorization:
3. Doctor Management:
4. Medicine Management:
54
5. Bed Management:
User Module:
1. Registration:
Test user registration with invalid credentials (e.g., missing fields, invalid
formats).
3. Search Hospitals:
letters).
4. Booking Appointment:
55
Admin Module:
1. Authorization:
2. Viewing Details:
3. System Management:
registrations).
simultaneously.
Each of these test cases covers different functionalities and scenarios to ensure the
56
CHAPTER-7
RESULTS
57
Fig 7.3 Admin Home Page
58
Fig 7.6 Hospital Login
59
Fig 7.8 Hospital Home Page
60
Fig 7.11 Add Medicine
61
Fig 7.14 View Beds
62
Fig 7.17 User Home Page
63
CHAPTER-8
8.1 CONCLUSION
64
8.2 FUTURE SCOPE
65
BIBLIOGRAPHY
[1] YiChuan Wang, LeeAnn Kung, Chaochi Ting, “Beyond a Technical Perspective:
Understanding Big Data Capabilities in Health Care”, publications on. ResearchGate,
2015
[2] Baker, R. S. J. D. “Learning, schooling, and data analytics”. Handbook on
innovations in learning for states,districts, and schools, Philadelphia, PA: Center on
Innovations in Learning , 2013, pp. 179–190
[4] Ben K. Daniel, “Big Data and analytics in higher education: Opportunities and
challenges”, British journal of educational technology. September, 2015.
[5] Raghupathi, W, “Big data analytics in healthcare: promise and potential. Health
Information Science and Systems, volume2, 2014.
[6] Bharadwaj, A, El Sawy, O.A. Palou, P.A. and Venkatraman, “Digital Business
Strategy: Toward A Next Generation of Insights”, MIS Quarterly, 2013.
[7] C. Mohanapriya, “A Trusted Data Governance Model For Big Data Analytics”,
Volume 1, Issue 7, ISSN (online): 2349-6010, Dec 2014.
[8] Aiden, E., Michel, “The Predictive Power of Big Data. News week”. April 2014.
[9] Sunil Erevelles, Nobuyuki Fukawa, Linda Swayne, “Big Data consumer analytics
and the transformation of marketing”, Journal of Business Research, JBR- 08469, July
2015.
[10] V. Ambrosini et al. What are dynamic capabilities and are they a useful construct
in strategic management?
66
Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
MONITORING HEALTH CARE RESOURCES IN GOVERNMENT HOSPITALS
ABSTRACT
Government hospitals provide medicines for the treatment to the patients based on the diagnosis.
Generally government hospitals stores all the patients historical data and current data in cloud .In our
system user can register with their details, which is stored to the admin database. This system allows
the user to view the hospital location using predictive algorithm and details about the hospital such as
doctors, medicines ,specialists,beds availability and also helps the patient to get details about the
government hospitals. Financial and administrative performance are improved by high utilization of
resources and reduced fraud and abuses and optimized by supply chain and human capital
management.
1. INTRODUCTION
This paper aims to develop a comprehensive system for monitoring and managing health resources in
government hospital. In emergency situations, patients may be exposed to potential harm or risks. So
if the government hospital doesn’t have enough things during an emergency, it may be necessary for
us to redirect to another hospital where the required resources are available. Here in this paper user
first sign up and login into the system providing their information. After users register and log in, the
system reviews the provided details. If the users preferences and requirements match the offerings of
any specific hospitals, the user proceeds to go to that designated hospital. However, in cases where the
user’s preferences do not match with the available options or if the preferred hospital is unavailable
then user will go with the alternate one [1]. This ensures that users have the flexibility to choose an
appropriate healthcare facility based on their preferences and the availability of resources.
Here we are developing an application for government hospitals such that it is monitoring the health
resources in the hospital.Our system ensures that information about medicines, beds, doctor
availability, location of hospital, and the specialization of doctor is always up-to-date. The system
prevents shortages and reduces waste by managing hospital supplies more efficiently, ensuring that
essential items are always available when needed [2]. By doing this, hospitals use their resources
wisely, serve patients better, and overall , make health care more effective.
2. LITERATURE SURVEY
1. To date, the health care industry has paid little attention to the potential benefits to be gained from
big data. While most pioneering big data studies have adopted technological perspectives, a better
understanding of the strategic implications of big data is urgently needed. To address this lack, this
study examines the development, architecture and component functionalities of big data, and identifies
its capabilities, including traceability, the analysis of unstructured data and patterns of care, and its
predictive capacity to support healthcare managers seeking to formulate more effective big-data- based
strategies [3]. Our findings will help healthcare organizations respond strategically to the challenges
they face in today's highly competitive healthcare market.
9. FUTURE ENHANCEMENT
As technology continues to evolve, future iterations of health resource monitoring in government
hospitals will likely integrate advanced technologies such as artificial intelligence (AI), Internet of
Things (IoT), and blockchain. AI algorithms can analyze vast amounts of data to predict resource needs
and optimize allocation, while IoT devices can provide real-time monitoring of equipment and
supplies. Blockchain technology can ensure the security and integrity of data, enhancing trust and
transparency in resource management.We can make this web application as mobile application for the
convenience.With the increasing demand for remote healthcare services, future health resource
monitoring systems will likely incorporate remote monitoring capabilities and telemedicine platforms.
Patients will be able to access healthcare services from anywhere, reducing the burden on physical
hospital infrastructure and improving access to care, especially in rural areas.
10. REFERENCES/BIBLIOGRAPHY
[1] YiChuan Wang, LeeAnn Kung, Chaochi Ting, “Beyond a Technical Perspective: Understanding
Big Data Capabilities in Health Care”, publications on. ResearchGate, 2015
[2] Baker, R. S. J. D. “Learning, schooling, and data analytics”. Handbook on innovations in learning
for states,districts, and schools, Philadelphia, PA: Center on Innovations in Learning , 2013, pp. 179–
190
[3] BasU.A, “Five pillars of prescriptive analytics success”s. Analytics-magazine.org, 2013, pp. 8–
12.
[4] Ben K. Daniel, “Big Data and analytics in higher education: Opportunities and challenges”, British
journal of educational technology. September, 2015.
[5] Raghupathi, W, “Big data analytics in healthcare: promise and potential. Health Information
Science and Systems, volume2, 2014.
[6] Bharadwaj, A, El Sawy, O.A. Palou, P.A. and Venkatraman, “Digital Business Strategy: Toward