Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views92 pages

Final Major Team 3 Document

The document outlines a major project titled 'Monitoring Health Care Resources in Government Hospitals' submitted by students of Vaagdevi College of Engineering for their Bachelor of Technology degree in Computer Science and Engineering. The project aims to develop a system for efficiently managing health resources in government hospitals, ensuring up-to-date information on medicines, doctor availability, and hospital resources. The document includes acknowledgments, a declaration, an abstract, and a detailed index of chapters covering various aspects of the project, including system design, implementation, and testing.

Uploaded by

qadir hussaini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views92 pages

Final Major Team 3 Document

The document outlines a major project titled 'Monitoring Health Care Resources in Government Hospitals' submitted by students of Vaagdevi College of Engineering for their Bachelor of Technology degree in Computer Science and Engineering. The project aims to develop a system for efficiently managing health resources in government hospitals, ensuring up-to-date information on medicines, doctor availability, and hospital resources. The document includes acknowledgments, a declaration, an abstract, and a detailed index of chapters covering various aspects of the project, including system design, implementation, and testing.

Uploaded by

qadir hussaini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 92

A MAJOR PROJECT

on

MONITORING HEALTH CARE RESOURCES IN GOVERNMENT


HOSPITALS

Submitted
In partial fulfillment for the requirement for the award of the degree of
BACHELOR OF TECHNOLOGY
in

Computer Science and Engineering.


By
GOPALAPU TEJASWINI 20641A0513

SYED QADIR HUSSAINI 20641A0528

PUPPALA ROHITH 20641A0509

JUNNUTHULA ASRITHA 20641A0531

Under the Guidance of


Dr. V. MURALI KRISHNA
Associate Professor, Department of CSE.

Department of Computer Science & Engineering


Vaagdevi College of Engineering
(UGC Autonomous, Accredited by NAAC with “A”)

Bollikunta, Khila Warangal (Mandal), Warangal Urban – 506005(T.S)

(2020-2024)

I
VAAGDEVI COLLEGE OF ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
(UGC Autonomous, Accredited by NBA, Accredited by NAAC with “A”)

Bollikunta, Khila Warangal (Mandal), Warangal Urban-506 005 (T.S)

CERTIFICATE

This is to certify that the major project entitled “Monitoring Health Care Resources in
Government Hospitals” is submitted by Gopalapu Tejaswini 20641A0513, Syed Qadir Hussaini
20641A0528, Puppala Rohith 20641A0509, Junnuthula Asritha 20641A0531 in partial
fulfillment of the requirements for the award of the Degree in Bachelor of Technology in Computer
Science and Engineering during the academic year 2023-24.

Guide Head of the Department


Dr.V.Murali Krishna Dr.N.Satyavathi

External Examiner

II
ACKNOWLEDGEMENT

We wish to take this opportunity to express my sincere gratitude and deep sense of respect
to beloved Dr.K.Prakash, Principal, Vaagdevi College of Engineering for providing all the
required assistance and for his support and inspiration to carry out this industry Oriented Major
Project in the institute.

We extend our heartfelt thanks to Dr.N.Satyavathi, Head of the Department of CSE,


Vaagdevi College of Engineering for providing us necessary infrastructure and thereby giving us
freedom to carry out the Industry Oriented Major Project.

We express heartfelt thanks to the guide, Dr.V.Murali Krishna,Associate Professor,


Department of CSE for his constant support and giving necessary guidance for completion of this
Industry Oriented Major Project.

We are also thankful to Dr.K.Rekha Devi, Mr.Ch.Aravind Kumar for their valuable
suggestions, encouragement and motivations for completing this project successfully.

We are thankful to all other faculty members for their encouragement. We convey our
heartfelt thanks to the lab staff for allowing us to use the required equipment whenever needed.

Finally, we would like to take this opportunity to thank our family for their support through
the work. We sincerely acknowledge and thank all those who gave directly or indirectly their
support in completion of this work.

GOPALAPU TEJASWINI 20641A0513


SYED QADIR HUSSAINI 20641A0528
PUPPALA ROHITH 20641A0509
JUNNUTHULA ASRITHA 20641A0531

III
DECLARATION

We hereby declare that this project entitled "MONITORING HEALTH CARE


RESOURCES IN GOVERNMENT HOSPITALS" is submitted in partial fulfillment of
requirements for the award of bachelor of technology at VAAGDEVI COLLEGE OF
ENGINEERING affiliated to Jawaharlal Nehru Technology University. The report has not been
submitted either in part or full for degree earlier to this University.

GOPALAPU TEJASWINI 20641A0513


SYED QADIR HUSSAINI 20641A0528
PUPPALA ROHITH 20641A0509
JUNNUTHULA ASRITHA 20641A0531

IV
ABSTRACT

Government hospitals provide medicines for the treatment to the patients based on the diagnosis.
Generally government hospitals stores all the patients historical data and current data in cloud .In
our system user can register with their details, which is stored to the admin database. This system
allows the user to view the hospital location using predictive algorithm and details about the
hospital such as doctors, medicines ,specialists,beds availability and also helps the patient to get
details about the government hospitals. Financial and administrative performance are improved by
high utilization of resources and reduced fraud and abuses and optimized by supply chain and
human capital management.

V
INDEX

TITLE PAGE NO

CHAPTER-1
INTRODUCTION 1

1.1 Literature Survey 2


1.2 Existing System 7
1.3 Proposed System 8
1.4 Hardware Requirements 9
1.5 Software Requirements 9

CHAPTER-2
SYSTEM STUDY 10

2.1 Feasibility Study 10


2.2 Feasibility Analysis 10

CHAPTER-3
SYSTEM DESIGN 12

3.1 System Architecture 12


3.2 Data Flow Diagram 13
3.3 UML Diagrams 14
3.4 E-R Diagram 19

CHAPTER-4
INPUT AND OUTPUT DESIGN 20

4.1 Input Design 20


4.2 Output Design 21

VI
CHAPTER-5
IMPLEMENTATION 22

5.1 Modules 22
5.2 Java Technology 23
5.3 Source Code 38

CHAPTER-6
SYSTEM TESTING 50
6.1 Types Of Tests 50
6.2 Test Cases 54

CHAPTER-7
RESULTS 57

CHAPTER-8
CONCLUSION AND FUTURE SCOPE 64

8.1 Conclusion 64
8.2 Future Scope 65

BIBLIOGRAPHY 66

Paper Publication / Certificate

VII
LIST OF FIGURES

S.No Figures Page No.

1 System Architecture 12

2 Flow Chart 13

3 Use case 15

4 Class diagram 16

5 Sequence diagram 17

6 Activity diagram 18

7 E-R Diagram 19

8 Java Working 23

9 Java on different OS 24

10 Program running on Java platform 25

11 Java 2 SDK 25

12 Compilation and Interpretation of Java Program 29

13 TCP/IP Model 29

14 IP Address 31

15 Output Screens 57

VIII
CHAPTER-1
INTRODUCTION

This project aims to develop a comprehensive system for monitoring and managing
health resources in government hospital. In emergency situations, patients may be
exposed to potential harm or risks. So if the government hospital doesn’t have enough
things during an emergency, it may be necessary for us to redirect to another hospital
where the required resources are available. Here in this project user first sign up and
login into the system providing their information. After users register and log in, the
system reviews the provided details. If the users preferences and requirements match
the offerings of any specific hospitals, the user proceeds to go to that designated
hospital. However, in cases where the user’s preferences do not match with the
available options or if the preferred hospital is unavailable then user will go with the
alternate one. This ensures that users have the flexibility to choose an appropriate
healthcare facility based on their preferences and the availability of resources.

Here we are developing an application for government hospitals such that it


is monitoring the health resources in the hospital.Our system ensures that information
about medicines, beds, doctor availability, location of hospital, and the specialization
of doctor is always up-to-date. The system prevents shortages and reduces waste by
managing hospital supplies more efficiently, ensuring that essential items are always
available when needed.By doing this, hospitals use their resources wisely, serve
patients better, and overall , make health care more effective.

1
1.1 LITERATURE SURVEY

To date, the health care industry has paid little attention to the potential benefits to be
gained from big data. While most pioneering big data studies have adopted
technological perspectives, a better understanding of the strategic implications of big
data is urgently needed. To address this lack, this study examines the development,
architecture and component functionalities of big data, and identifies its capabilities,
including traceability, the analysis of unstructured data and patterns of care, and its
predictive capacity to support healthcare managers seeking to formulate more
effective big-data-based strategies. Our findings will help healthcare organizations
respond strategically to the challenges they face in today's highly competitive
healthcare market.

Since the 1960s, methods for extracting useful information from large data
sets, termed analytics or data mining, have played a key role in fields such as physics
and biology. In the last few years, the same trend has emerged in educational research
and practice, an area termed learning analytics (LA; Ferguson, 2012) or educational
data mining (EDM; Baker & Yacef, 2009). In brief, these two research areas seek to
find ways to make beneficial use of the increasing amounts of data available about
learners in order to better understand the processes of learning and the social and
motivational factors surrounding learning. The goal of these efforts is to produce more
efficient, more effective, and deeper learning in the context of increasingly positive
learning experiences. The emergence of EDM/LA is a recent phenomenon. The first
meetings of scientists in this area were the Educational Data Mining workshops,
which started in 2005 and became an annual conference series in 2008. This
conference series was joined by the Learning Analytics and Knowledge conference
series in 2011. The two research areas of EDM and LA, emerging from different
communities of scientists and practitioners, have somewhat different goals; discussing
these differences is outside the scope of this report (see Siemens & Baker, 2012). In
brief, the validity of models of learners and learning is perhaps the key focus of the
EDM community, whereas the use of the results of analysis to drive changes in
practice by instructors is perhaps the key focus of the LA community. The
conferences in EDM and LA were followed by the establishment of journals devoted

2
to the topics, with the Journal of Educational Data Mining commencing publication in
2009 and the International Journal of the Society for Learning Analytics Research
expected to commence publication in 2013. As of this writing, the International
Educational Data Mining Society has approximately 150 members and over 600
subscribers on its mailing lists. A range of methods has been developed by these two
communities, drawing from areas such as data mining, computational science,
statistics, psychometrics, and social network analysis. (A selection of these methods
will be discussed below; a fuller review can be found in Baker & Siemens, in press).

Most businesses today run on structured data – numbers and categories.


According to IBM, 80 percent of the data currently produced is unstructured – text,
image, video and audio. While some businesses may choose to run the same way in
the future as they do today, doing so could render them unproductive and
noncompetitive. These businesses may not survive as their customers, suppliers and
competitors move beyond them by taking full advantage of hybrid data, a
combination of unstructured and structured data. Hybrid data empowers businesses to
use all the available data to make the best decisions possible.For a prescriptive
analytics technology to be transformative, it must be able to process hybrid data.
Without incorporating hybrid data, decision-makers are making their decisions based
on just 20 percent of the available data. Figure 1 is a chart from Gartner Research that
showcases the evolution of analytics, culminating in prescriptive analytics with hybrid
data.

Institutions of higher education are operating in an increasingly complex and


competitive environment. This paper identifies contemporary challenges facing
institutions of higher education worldwide and explores the potential of Big Data in
addressing these challenges. The paper then outlines a number of opportunities and
challenges associated with the implementation of Big Data in the context of higher
education. The paper concludes by outlining future directions relating to the
development and implementation of an institutional project on Big Data.

3
To describe the promise and potential of big data analytics in healthcare. The
paper describes the nascent field of big data analytics in healthcare, discusses the
benefits, outlines an architectural framework and methodology, describes examples
reported in the literature, briefly discusses the challenges, and offers conclusions. The
paper provides a broad overview of big data analytics for healthcare researchers and
practitioners. Big data analytics in healthcare is evolving into a promising field for
providing insight from very large data sets and improving outcomes while reducing
costs. Its potential is great; however there remain challenges to overcome.

Over the last three decades, the prevailing view of information technology
strategy has been that it is a functional-level strategy that must be aligned with the
firm’s chosen business strategy. Even within this socalled alignment view, business
strategy directed IT strategy. During the last decade, the business infrastructure has
become digital with increased interconnections among products, processes, and
services. Across many firms spanning different industries and sectors, digital
technologies (viewed as combinations of information, computing, communication,
and connectivity technologies) are fundamentally transforming business strategies,
business processes, firm capabilities, products and services, and key interfirm
relationships in extended business networks. Accordingly, we argue that the time is
right to rethink the role of IT strategy, from that of a functional-level strategy—
aligned but essentially always subordinate to business strategy—to one that reflects a
fusion between IT strategy and business strategy. This fusion is herein termed digital
business strategy. We identify four key themes to guide our thinking on digital
business strategy and help provide a framework to define the next generation of
insights. The four themes are (1) the scope of digital business strategy, (2) the scale of
digital business strategy, (3) the speed of digital business strategy, and (4) the sources
of business value creation and capture in digital business strategy. After elaborating
on each of these four themes, we discuss the success metrics and potential
performance implications from pursuing a digital business strategy. We also show
how the papers in the special issue shed light on digital strategies and offer directions
to advance insights and shape future research

4
Big Data governance requires a data governance that can satisfy the needs for
corporate governance, IT governance, and ITA/EA. While the existing data
governance focuses on the processing of structured data, Big Data governance needs
to be established in consideration of a broad sense of Big Data services including
unstructured data. To achieve the goals of Big Data, strategies need to be established
together with goals that are aligned with the vision and objective of an organization.
In addition to the preparation of the IT infrastructure, a proper preparation of the
components is required to effectively implement the strategy for Big Data services.
We propose the Big Data Governance Framework in this paper. The Big Data
governance framework presents criteria different from existing criteria at the data
quality level. It focuses on timely, reliable, meaningful, and sufficient data services,
focusing on what data attributes should be achieved based on the data attributes of Big
Data services. In addition to the quality level of Big Data, the personal information
protection strategy and the data disclosure/accountability strategy are also needed to
achieve goals and to prevent problems. This paper performed case analysis based on
the Big Data Governance Framework with the National Pension Service of South
Korea. Big Data services in the public sector are an inevitable choice to improve the
quality of people's life. Big Data governance and its framework are the essential
components for the realization of Big Data service.

Nowadays the increase of data variety considered very dispute problem for
analysis. So innovative methods are mandatory for analytics especially in big data
where the data in characteristic very complex and unstructured. The analytics is the
process of analysis to predict concealed pattern and association among data. The main
objective of this survey paper is to provide the exhaustive view of different predictive
analytics applications and approaches. Analytics methods focused with dissimilar
perspectives based on applications and data variety. Some of the application discussed
is big data in hotel governance, higher education, health care, data e-governance,
consumer orientations. This paper present different predictive approaches adapted for
different application with challenges and suggestions.

5
Consumer analytics is at the epicenter of a Big Data revolution. Technology
helps capture rich and plentiful data on consumer phenomena in real time. Thus,
unprecedented volume, velocity, and variety of primary data, Big Data, are available
from individual consumers. To better understand the impact of Big Data on various
marketing activities, enabling firms to better exploit its benefits, a conceptual
framework that builds on resource-based theory is proposed. Three resources—
physical, human, and organizational capital—moderate the following: (1) the process
of collecting and storing evidence of consumer activity as Big Data, (2) the process of
extracting consumer insight from Big Data, and (3) the process of utilizing consumer
insight to enhance dynamic/adaptive capabilities. Furthermore, unique resource
requirements for firms to benefit from Big Data are discussed.

The dynamic capability perspective extends the resource-based view argument


by addressing how valuable, rare, difficult to imitate and imperfectly substitutable
resources can be created and how the current stock of valuable resources can be
refreshed in changing environments. The concept of dynamic capabilities emerged in
the 1990s, and the field has advanced considerably since. This paper presents a review
as well as a synthesis of the extant literature. This synthesis first highlights, that
dynamic capabilities are shaped by enabling and inhibiting variables within and
outside the firm, including the perceptions and motivations of managers; secondly, it
identifies processes that create dynamic capabilities; and thirdly, it explains that
dynamic capabilities do not automatically lead to performance improvements.

6
1.2 EXISTING SYSTEM

In the existing system, Patients have to visit the hospital to know hospital resources
like about doctor and their specialization,medicines,beds avaliability. This may lead to
severe loss in emergency cases if the required specialist or beds or medicines are not
available. Sometimes,Patients life may be in risk as this is the time taking
process.Here,both hospital reputation and patients life may fall in risk.

DISADVANTAGES OF EXISTING SYSTEM

 Patient life in risk.

 Chance of loosing hospital reputation.

 Here we need to spend more time.

 We may not get the proper information.

7
1.3 PROPOSED SYSTEM

Our application provides the user the convenience where they can register, login and
view all the information related to the hospital like Hospital Location, Doctors name
with their Speciality, Consulting Time and days,Availability of Doctor to know
whether doctor is present or on Leave, Number of Available Medicines, Number of
Available Beds.This helps the user to make a decision to visit hospital according to
their needs.This can be useful to the hospital to keep track on their resources and
provide the best resources to maintain their reputation.This can create a positive
impact in a user towards the government hospitals who thinks government hospital
has less resources and helps in promoting government hospitals and free services to
help the people.

ADVANTAGES OF PROPOSED SYSTEM

 Very useful in emergency cases.

 Can take Decision to visit or not.

 Helps in promoting Government Hospitals.

 Time and Cost saving.

 Gets accurate information.

 No need to visit hospital prior to know information.

8
1.4 HARDWARE REQUIREMENTS

 Processor : 1GHz or faster CPU or System on a Chip (SoC) with


two or more cores.
 RAM : 4GB.
 Hard drive : 64GB or larger.
 System firmware : UEFI, Secure Boot capable.
 TPM : Trusted Platform Module (TPM) version 2.0.

1.5 SOFTWARE REQUIREMENTS

 Operating system : Windows 10.


 Coding Language : JAVA, HTML, CSS.
 Data Base : MS SQL.
 IDE : Netbeans 8.

9
CHAPTER-2

SYSTEM STUDY

2.1 FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put
forth with a very general plan for the project and some cost estimates. During system
analysis the feasibility study of the proposed system is to be carried out. This is to
ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.

2.2 FEASIBILITY ANALYSIS

Three key considerations involved in the feasibility analysis are

1. ECONOMICAL FEASIBILITY
2. TECHNICAL FEASIBILITY
3. SOCIAL FEASIBILITY

ECONOMICAL FEASIBILITY

This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be
purchased.

10
TECHNICAL FEASIBILITY

This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources. This will lead to high demands being placed on the client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.

SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must
not feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate
the user about the system and to make him familiar with it. His level of confidence
must be raised so that he is also able to make some constructive criticism, which is
welcomed, as he is the final user of the system.

11
CHAPTER-3

SYSTEM DESIGN

3.1 SYTEM ARCHITECTURE

This project aims to develop a comprehensive system for monitoring and managing
health resources in government hospital. It has Admin module,Hospital Module and
User Module.System architecture is a conceptual model that describes a system's
structure, behavior, and other views. It can also refer to the description of an existing
system. A system architecture is made up of a diagram that defines the system's
structure and its subsystems, along with the behavior of the components

Fig 3.1 System Architecture

12
3.2 DATA FLOW DIAGRAM

1. The DFD is also called as bubble chart. It is a simple graphical formalism that
can be used to represent a system in terms of input data to the system, various
processing carried out on this data, and the output data is generated by this
system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It
is used to model the system components. These components are the system
process, the data used by the process, an external entity that interacts with the
system and the information flows in the system.
3. DFD shows how the information moves through the system and how it is
modified by a series of transformations. It is a graphical technique that depicts
information flow and the transformations that are applied as data moves from
input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system
at any level of abstraction. DFD may be partitioned into levels that represent
increasing information flow and functional details.

Fig 3.2 Flow chart

13
3.3 UML DIAGRAMS

UML stands for Unified Modeling Language. UML is a standardized general-purpose


modeling language in the field of object-oriented software engineering. The standard
is managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of
object oriented computer software. In its current form UML is comprised of two
major components: a Meta-model and a notation. In the future, some form of method
or process may also be added to; or associated with, UML.
The Unified Modeling Language is a standard language for specifying,
Visualization, Constructing and documenting the artifacts of software system, as well
as for business modeling and other non-software systems.
The UML represents a collection of best engineering practices that have
proven successful in the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and
the software development process. The UML uses mostly graphical notations to
express the design of software projects.

GOALS:

The Primary goals in the design of the UML are as follows:

1. Provide users a ready-to-use, expressive visual modeling Language so that


they can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core
concepts.
3. Be independent of particular programming languages and development
process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations,
frameworks, patterns and components.
7. Integrate best practices.

14
USE CASE DIAGRAM

A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases. The
main purpose of a use case diagram is to show what system functions are performed
for which actor. Roles of the actors in the system can be depicted.

Fig 3.3 User Use Case Diagram

Fig 3.4 Admin Use Case Diagram

15
Fig 3.5 Hospital Use Case Diagram

CLASS DIAGRAM

In software engineering, a class diagram in the Unified Modeling Language (UML) is


a type of static structure diagram that describes the structure of a system by showing
the system's classes, their attributes, operations (or methods), and the relationships
among the classes. It explains which class contains information.

Fig 3.6 Class Diagram

16
SEQUENCE DIAGRAM:

A sequence diagram in Unified Modeling Language (UML) is a kind of interaction


diagram that shows how processes operate with one another and in what order. It is a
construct of a Message Sequence Chart. Sequence diagrams are sometimes called
event diagrams, event scenarios, and timing diagrams.

Fig 3.7 Sequence Diagram

17
ACTIVITY DIAGRAM

Activity diagrams are graphical representations of workflows of stepwise activities


and actions with support for choice, iteration and concurrency. In the Unified
Modeling Language, activity diagrams can be used to describe the business and
operational step-by-step workflows of components in a system. An activity diagram
shows the overall flow of control.

Fig 3.8 Activity Diagram

18
3.4 E-R DIAGRAM

The Entity Relational Model is a model for identifying entities to be represented in


the database and representation of how those entities are related. The ER data model
specifies enterprise schema that represents the overall logical structure of a database
graphically.

Fig 3.9 E-R Diagram

19
CHAPTER-4

INPUT AND OUTPUT DESIGN

4.1 INPUT DESIGN

The input design is the link between the information system and the user. It comprises
the developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document or it can
occur by having people keying the data directly into the system. The design of input
focuses on controlling the amount of input required, controlling the errors, avoiding
delay, avoiding extra steps and keeping the process simple. The input is designed in
such a way so that it provides security and ease of use with retaining the privacy.
Input Design considered the following things:

 What data should be given as input?


 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.

OBJECTIVES

1. Input Design is the process of converting a user-oriented description of the input


into a computer-based system. This design is important to avoid errors in the data
input process and show the correct direction to the management for getting
correct information from the computerized system.

2. It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be
free from errors. The data entry screen is designed in such a way that all the data
manipulates can be performed. It also provides record viewing facilities.

20
3. When the data is entered it will check for its validity. Data can be entered with
the help of screens. Appropriate messages are provided as when needed so that
the user will not be in maize of instant. Thus the objective of input design is to
create an input layout that is easy to follow

4.2 OUTPUT DESIGN

A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users
and to other system through outputs. In output design it is determined how the
information is to be displaced for immediate need and also the hard copy output. It is
the most important and direct source information to the user. Efficient and intelligent
output design improves the system’s relationship to help user decision-making.

1. Designing computer output should proceed in an organized, well thought out


manner; the right output must be developed while ensuring that each output
element is designed so that people will find the system can use easily and
effectively. When analysis design computer output, they should Identify the
specific output that is needed to meet the requirements.

2. Select methods for presenting information.

3. Create document, report, or other formats that contain information produced by


the system.

The output form of an information system should accomplish one or more of


the following objectives.

 Convey information about past activities, current status or projections of the


 Future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.

21
CHAPTER-5

IMPLEMENTATION

5.1 MODULES

1. Admin Module

2. Hospital Module

3. User Module

MODULES DESCRIPTION

ADMIN MODULE

In this module, admin can login directly, after successful login admin can perform
some operations like authorizing the hospitals after their registration, authorizing the
users after their registration. Only admin can view Hospital and User details. Only
after successful authorization by admin,Hospital and User can login.

HOSPITAL MODULE

In this Module, Hospital can register, after registration the admin must authorize the
hospital,until the admin authorizes the Hospital,the hospital will be in waiting status
and it cant login even after registering.When status is authorized,the hospital can login
and can Add Doctors, View Doctors, Add Medicine, View Medicine, Add Beds,View
Beds and logout.

USER MODULE

In this Module, User can register, after registration the admin must authorize the user,
until the admin authorizes the user, the user will be in waiting status and it cant login
even after registering.When status is authorized,the user can login and can View
Profile, Search Hospitals, view Doctor Details, ,View Beds,view Medicine Details
and logout.

22
5.2 JAVA TECHNOLOGY

Java technology is both a programming language and a platform.


The Java Programming Language

The Java programming language is a high-level language that can be characterized by


all of the following buzzwords:
 Simple
 Architecture neutral
 Object oriented
 Portable
 Distributed
 High performance
 Interpreted
 Multithreaded
 Robust
 Dynamic
 Secure
With most programming languages, you either compile or interpret a program
so that you can run it on your computer. The Java programming language is unusual
in that a program is both compiled and interpreted. With the compiler, first you
translate a program into an intermediate language called Java byte codes —the
platform-independent codes interpreted by the interpreter on the Java platform. The
interpreter parses and runs each Java byte code instruction on the computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The following figure illustrates how this works.

Fig 5.1 JAVA Working

23
You can think of Java byte codes as the machine code instructions for the Java
Virtual Machine (Java VM). Every Java interpreter, whether it’s a development tool or
a Web browser that can run applets, is an implementation of the Java VM. Java byte
codes help make “write once, run anywhere” possible. You can compile your program
into byte codes on any platform that has a Java compiler. The byte codes can then be
run on any implementation of the Java VM. That means that as long as a computer has
a Java VM, the same program written in the Java programming language can run on
Windows 2000, a Solaris workstation, or on an iMac.

Fig 5.2 JAVA on different OS

The Java Platform

A platform is the hardware or software environment in which a program runs. We’ve


already mentioned some of the most popular platforms like Windows 2000, Linux,
Solaris, and MacOS. Most platforms can be described as a combination of the
operating system and hardware.
The Java platform differs from most other platforms in that it’s a software-
only platform that runs on top of other hardware-based platforms.
The Java platform has two components:
 The Java Virtual Machine (Java VM)
 The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java
platform and is ported onto various hardware-based platforms.

24
The Java API is a large collection of ready-made software components that
provide many useful capabilities, such as graphical user interface (GUI) widgets. The
Java API is grouped into libraries of related classes and interfaces; these libraries are
known as packages. The next section, What Can Java Technology Do? Highlights
what functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As
the figure shows, the Java API and the virtual machine insulate the program from the
hardware.

Fig 5.3 Program running on Java platform

What Can Java Technology Do?


The most common types of programs written in the Java programming language are
applets and applications. If you’ve surfed the Web, you’re probably already familiar
with applets. An applet is a program that adheres to certain conventions that allow it
to run within a Java-enabled browser.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts
what is included in the Java 2 SDK.

Fig 5.4 Java 2 SDK

25
ODBC

Microsoft Open Database Connectivity (ODBC) is a standard programming interface


for application developers and database systems providers. Before ODBC became a
de facto standard for Windows programs to interface with database systems,
programmers had to use proprietary languages for each database they wanted to
connect to. Now, ODBC has made the choice of the database system almost irrelevant
from a coding perspective, which is as it should be. Application developers have
much more important things to worry about than the syntax that is needed to port their
program from one database to another when business needs suddenly change.
Through the ODBC Administrator in Control Panel, you can specify the
particular database that is associated with a data source that an ODBC application
program is written to use. Think of an ODBC data source as a door with a name on it.
Each door will lead you to a particular database.
JDBC

In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL
database access mechanism that provides a consistent interface to a variety of
RDBMSs. This consistent interface is achieved through the use of “plug-in” database
connectivity modules, or drivers. If a database vendor wishes to have JDBC support,
he or she must provide the driver for each platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC.
As you discovered earlier in this chapter, ODBC has widespread support on a variety
of platforms. Basing JDBC on ODBC will allow vendors to bring JDBC drivers to
market much faster than developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public
review that ended June 8, 1996. Because of user input, the final JDBC v1.0
specification was released soon after.
The remainder of this section will cover enough information about JDBC for you to
know what it is about and how to use it effectively. This is by no means a complete
overview of JDBC. That would fill an entire book.

26
JDBC Goals

Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with
early reviewer feedback, have finalized the JDBC class library into a solid framework
for building database applications in Java.
The goals that were set for JDBC are important. They will give you some insight
as to why certain classes and functionalities behave the way they do. The eight design
goals for JDBC are as follows:

1. SQL Level API: The designers felt that their main goal was to define a SQL
interface for Java. Although not the lowest database interface level possible, it is
at a low enough level for higher-level tools and APIs to be created. Conversely, it
is at a high enough level for application programmers to use it confidently.
Attaining this goal allows for future tool vendors to “generate” JDBC code and to
hide many of JDBC’s complexities from the end user.

2. SQL Conformance: SQL syntax varies as you move from database vendor to
database vendor. In an effort to support a wide variety of vendors, JDBC will
allow any query statement to be passed through it to the underlying database
driver. This allows the connectivity module to handle non-standard functionality
in a manner that is suitable for its users.

3. JDBC must be implemental on top of common database interfaces : The


JDBC SQL API must “sit” on top of other common SQL level APIs. This goal
allows JDBC to use existing ODBC level drivers by the use of a software
interface. This interface would translate JDBC calls to ODBC and vice versa.

4. Provide a Java interface that is consistent with the rest of the Java system:
Because of Java’s acceptance in the user community thus far, the designers feel
that they should not stray from the current design of the core Java system.

27
5. Keep it simple: This goal probably appears in all software design goal listings.
JDBC is no exception. Sun felt that the design of JDBC should be very simple,
allowing for only one method of completing a task per mechanism. Allowing
duplicate functionality only serves to confuse the users of the API.

6. Use strong, static typing wherever possible: Strong typing allows for more
error checking to be done at compile time; also, less error appear at runtime.

7. Keep the common cases simple: Because more often than not, the usual SQL
calls used by the programmer are simple SELECT’s, INSERT’s, DELETE’s and
UPDATE’s, these queries should be simple to perform with JDBC. However,
more complex SQL statements should also be possible.
Java has two things: a programming language and a platform. Java is
a high-level programming language that is all of the following

Simple Architecture-neutral

Object-oriented Portable

Distributed High-performance

Interpreted multi threaded

Robust Dynamic

Secure

Java is also unusual in that each Java program is both compiled and
interpreted. With a compile you translate a Java program into an intermediate
language called Java byte codes the platform-independent code instruction is
passed and run on the computer.

Compilation happens just once; interpretation occurs each time the


program is executed. The figure illustrates how this works.

28
Java Program Interpreter

Compilers My Program

Fig 5.5 Compilation and interpretation of Java programs

You can think of Java byte codes as the machine code instructions for
the Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a
Java development tool or a Web browser that can run Java applets, is an
implementation of the Java VM. The Java VM can also be implemented in
hardware.

Java byte codes help make “write once, run anywhere” possible. You
can compile your Java program into byte codes on my platform that has a
Java compiler. The byte codes can then be run any implementation of the
Java VM. For example, the same Java program can run Windows NT, Solaris,
and Macintosh.

NETWORKING

TCP/IP stack
The TCP/IP stack is shorter than the OSI one:

Fig 5.6 TCP/IP model

29
TCP is a connection-oriented protocol; UDP (User Datagram Protocol) is a
connectionless protocol.

IP datagram’s: The IP layer provides a connectionless and unreliable delivery system.


It considers each datagram independently of the others. Any association between
datagram must be supplied by the higher layers. The IP layer supplies a checksum that
includes its own header. The header includes the source and destination addresses.
The IP layer handles routing through an Internet. It is also responsible for breaking up
large datagram into smaller ones for transmission and reassembling them at the other
end.

UDP: UDP is also connectionless and unreliable. What it adds to IP is a checksum for
the contents of the datagram and port numbers. These are used to give a client/server
model - see later.

TCP: TCP supplies logic to give a reliable connection-oriented protocol above IP. It
provides a virtual circuit that two processes can use to communicate.

Internet addresses: In order to use a service, you must be able to find it. The Internet
uses an address scheme for machines so that they can be located. The address is a 32
bit integer which gives the IP address. This encodes a network ID and more
addressing. The network ID falls into various classes according to the size of the
network address.

Network address: Class A uses 8 bits for the network address with 24 bits left over
for other addressing. Class B uses 16 bit network addressing. Class C uses 24 bit
network addressing and class D uses all 32.

Subnet address: Internally, the UNIX network is divided into sub networks. Building
11 is currently on one sub network and uses 10-bit addressing, allowing 1024 different
hosts.

30
Host address: 8 bits are finally used for host addresses within our subnet. This places
a limit of 256 machines that can be on the subnet.

Total address

Fig 5.7 IP address

The 32 bit address is usually written as 4 integers separated by dots.


Port addresses: A service exists on a host, and is identified by its port. This is a 16
bit number. To send a message to a server, you send it to the port for that service of
the host that it is running on. This is not location transparency! Certain of these ports
are "well known".

Sockets: A socket is a data structure maintained by the system to handle network


connections. A socket is created using the call socket. It returns an integer that is like a
file descriptor. In fact, under Windows, this handle can be used with Read File and
Write File functions.
JFree Chart

JFreeChart is "open source" or, more specifically, free software. It is distributed under
the terms of the GNU Lesser General Public Licence (LGPL), which permits use in
proprietary applications.

1. Map Visualizations

Charts showing values that relate to geographical areas. Some examples include: (a)
population density in each state of the United States, (b) income per capita for each
country in Europe, (c) life expectancy in each country of the world. The tasks in this
project include:

31
Sourcing freely redistributable vector outlines for the countries of the world,
states/provinces in particular countries (USA in particular, but also other areas);
Creating an appropriate dataset interface (plus default implementation), a
rendered, and integrating this with the existing XYPlot class in JFreeChart; Testing,
documenting, testing some more, documenting some more.

2. Time Series Chart Interactivity

Implement a new (to JFreeChart) feature for interactive time series charts --- to
display a separate control that shows a small version of ALL the time series data, with
a sliding "view" rectangle that allows you to select the subset of the time series data to
display in the main chart.

3. Dashboards

There is currently a lot of interest in dashboard displays. Create a flexible dashboard


mechanism that supports a subset of JFreeChart chart types (dials, pies, thermometers,
bars, and lines/time series) that can be delivered easily via both Java Web Start and an
applet.

4. Property Editors

The property editor mechanism in JFreeChart only handles a small subset of the
properties that can be set for charts. Extend (or reimplement) this mechanism to
provide greater end-user control over the appearance of the charts.

What is a Java Web Application?

A Java web application generates interactive web pages containing various types of
markup language (HTML, XML, and so on) and dynamic content. It is typically
comprised of web components such as JavaServer Pages (JSP), servlets and
JavaBeans to modify and temporarily store data, interact with databases and web
services, and render content in response to client requests. Because many of the tasks
involved in web application development can be repetitive or require a surplus of
boilerplate code, web frameworks can be applied to alleviate the overhead associated

32
with common activities. For example, many frameworks, such as JavaServer Faces,
provide libraries for templating pages and session management, and often promote
code reuse.
What is Java EE?

Java EE (Enterprise Edition) is a widely used platform containing a set of coordinated


technologies that significantly reduce the cost and complexity of developing,
deploying, and managing multi-tier, server-centric applications. Java EE builds upon
the Java SE platform and provides a set of APIs (application programming interfaces)
for developing and running portable, robust, scalable, reliable and secure server-side
applications.

JavaScript and Ajax Development


JavaScript is an object-oriented scripting language primarily used in client-side
interfaces for web applications. Ajax (Asynchronous JavaScript and XML) is a Web
2.0 technique that allows changes to occur in a web page without the need to perform
a page refresh. JavaScript toolkits can be leveraged to implement Ajax-enabled
components and functionality in web pages.

Web Server and Client

Web Server is a software that can process the client request and send the response
back to the client. For example, Apache is one of the most widely used web server.
Web Server runs on some physical machine and listens to client request on specific
port.A web client is a software that helps in communicating with the server. Some of
the most widely used web clients are Firefox, Google Chrome, Safari etc. When we
request something from server (through URL), web client takes care of creating a
request and sending it to server and then parsing the server response and present it to
the user.

33
HTML and HTTP

Web Server and Web Client are two separate softwares, so there should be some
common language for communication. HTML is the common language between
server and client and stands for HyperText Markup Language.
Web server and client needs a common communication protocol, HTTP
(Hyper Text Transfer Protocol) is the communication protocol between server and
client. HTTP runs on top of TCP/IP communication protocol.
Some of the important parts of HTTP Request are:
 HTTP Method – action to be performed, usually GET, POST, PUT etc.
 URL – Page to access
 Form Parameters – similar to arguments in a java method, for example
user,password details from login page.
Sample HTTP Request:
GET /FirstServletProject/jsps/hello.jsp
1
HTTP/1.1
2
Host: localhost:8080
3
Cache-Control: no-cache
Some of the important parts of HTTP Response are:
 Status Code – an integer to indicate whether the request was success or not.
Some of the well known status codes are 200 for success, 404 for Not Found and
403 for Access Forbidden.
 Content Type – text, html, image, pdf etc. Also known as MIME type
 Content – actual data that is rendered by client and shown to user.
MIME Type or Content Type: If you see above sample HTTP response header, it
contains tag “Content-Type”. It’s also called MIME type and server sends it to client
to let them know the kind of data it’s sending. It helps client in rendering the data for
user. Some of the mostly used mime types are text/html, text/xml, application/xml etc.
Understanding URL: URL is acronym of Universal Resource Locator and it’s used
to locate the server and resource. Every resource on the web has it’s own unique
address. Let’s see parts of URL with an example.
http://localhost:8080/FirstServletProject/jsps/hello.jsp

34
http:// – This is the first part of URL and provides the communication protocol to be
used in server-client communication.
localhost – The unique address of the server, most of the times it’s the hostname of
the server that maps to unique IP address. Sometimes multiple hostnames point to
same IP addresses and web server virtual host takes care of sending request to the
particular server instance.
8080 – This is the port on which server is listening, it’s optional and if we don’t
provide it in URL then request goes to the default port of the protocol. Port numbers 0
to 1023 are reserved ports for well known services, for example 80 for HTTP, 443 for
HTTPS, 21 for FTP etc.
FirstServletProject/jsps/hello.jsp – Resource requested from server. It can be static
html, pdf, JSP, servlets, PHP etc.

Why we need Servlet and JSPs?

Web servers are good for static contents HTML pages but they don’t know how to
generate dynamic content or how to save data into databases, so we need another tool
that we can use to generate dynamic content. There are several programming
languages for dynamic content like PHP, Python, Ruby on Rails, Java Servlets and
JSPs.
Web Container

Tomcat is a web container, when a request is made from Client to web server, it
passes the request to web container and it’s web container job to find the correct
resource to handle the request (servlet or JSP) and then use the response from the
resource to generate the response and provide it to web server. Then web server sends
the response back to the client.
When web container gets the request and if it’s for servlet then container
creates two Objects HTTPServletRequest and HTTPServletResponse. Then it finds
the correct servlet based on the URL and creates a thread for the request. Then it
invokes the servlet service() method and based on the HTTP method service() method
invokes doGet() or doPost() methods. Servlet methods generate the dynamic page and
write it to response. Once servlet thread is complete, container converts the response
to HTTP response and send it back to client.

35
Some of the important work done by web container are:
 Communication Support – Container provides easy way of communication
between web server and the servlets and JSPs. Because of container, we don’t
need to build a server socket to listen for any request from web server, parse the
request and generate response. All these important and complex tasks are done by
container and all we need to focus is on our business logic for our applications.

 Lifecycle and Resource Management – Container takes care of managing the


life cycle of servlet. Container takes care of loading the servlets into memory,
initializing servlets, invoking servlet methods and destroying them. Container
also provides utility like JNDI for resource pooling and management.

 Multithreading Support – Container creates new thread for every request to the
servlet and when it’s processed the thread dies. So servlets are not initialized for
each request and saves time and memory.
Deployment Descriptor

web.xml: file is the deployment descriptor of the web application and contains
mapping for servlets (prior to 3.0), welcome pages, security configurations, session
timeout settings etc.
MySQL: MySQL, the most popular Open Source SQL database management system,
is developed, distributed, and supported by Oracle Corporation. The MySQL Web site
(http://www.mysql.com/) provides the latest information about MySQL software.
 MySQL is a database management system.

A database is a structured collection of data. It may be anything from a simple


shopping list to a picture gallery or the vast amounts of information in a corporate
network. To add, access, and process data stored in a computer database, you need a
database management system such as MySQL Server. Since computers are very good
at handling large amounts of data, database management systems play a central role in
computing, as standalone utilities, or as parts of other applications.

36
 MySQL databases are relational.

A relational database stores data in separate tables rather than putting all the data in
one big storeroom. The database structures are organized into physical files optimized
for speed. The logical model, with objects such as databases, tables, views, rows, and
columns, offers a flexible programming environment. You set up rules governing the
relationships between different data fields, such as one-to-one, one-to-many, unique,
required or optional, and “pointers” between different tables. The database enforces
these rules, so that with a well-designed database, your application never sees
inconsistent, duplicate, orphan, out-of-date, or missing data.
 MySQL software is Open Source.

Open Source means that it is possible for anyone to use and modify the software.
Anybody can download the MySQL software from the Internet and use it without
paying anything. If you wish, you may study the source code and change it to suit
your needs. The MySQL software uses the GPL (GNU General Public License),
http://www.fsf.org/licenses/, to define what you may and may not do with the
software in different situations.

37
5.3 SOURCE CODE

1. Index.html

<!DOCTYPE html>
<html>
<head>
<title>index</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li class="active"><a href="index.html"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li><a href="Admin.jsp"><strong><font
color="lightgreen">ADMIN</font></strong></a></li>
<li><a href="Hospital.jsp"><strong><font
color="lightgreen">HOSPITAL</font></strong></a></li>
<li><a href="user.jsp"><strong><font
color="lightgreen">USER</font></strong></a></li>

38
</ul>
</div>
</div>
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<h1><a href="#">MONITORING HEALTHCARE RESOURCES IN
GOVERNMENT HOSPITALS</a></h1>
</div>
</div>
</div>
<div class="wrapper row3">
<div id="featured_slide_">
<ul id="featured_slide_Content">
<li class="featured_slide_Image"><a href="#"><img src="images/sadar-hospital-
2019.png" alt="" /></a>
</li>
<li class="clear featured_slide_Image"><!-- Important - Leave This Empty --
></li>
</ul>
</div>
<div class="wrapper row5">
<div id="container" class="clear">
<div id="homepage" class="clear">
<center>
<h2>PROJECT ABSTRACT</h2>
<P align="justify">
Government hospitals provide medicines for the treatment to the patients
based on the diagnosis. Generally government hospitals stores all the patients
historical data and current data in cloud .In our system user can register with there
details, which is stored to the admin’s database. This system allows the user to view
the hospital location using predictive algorithm and details about the hospital such as

39
doctors, medicines ,specialists availability and also helps the patient to get details
about the government hospitals. Financial and administrative performance are
improved by high utilization of resources and reduced fraud and abuses and optimized
by supply chain and human capital management.
</P>
</center>
</div>
</div>
</div>
</body>
</html>

2. Dbconnection.java

package com.database;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.SQLException;
public class Dbconnection{
public static Connection
getcon(){Connection con = null;
try{
Class.forName("com.mysql.jdbc.Driver");
con = DriverManager.getConnection("jdbc:mysql://localhost:3306/govt_hsp",
"root", "root");
}
catch(Exception
e){ e.printStackTra
ce();
}
return con;
} }

40
3. AddGOVTHSP.jsp

<%@page import="com.database.Queries"%>
<%@page import="java.sql.ResultSet"%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<html>
<head>
<title>Admin Home</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="table.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="AdminHome.jsp"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li><a href="ViewUserDetails.jsp"><strong><font color="lightgreen">View
Users Details</font></strong></a></li>
<li class="active"><a href="AddGOVTHSP.jsp"><strong><font
color="lightgreen">Add Govt_Hsp</font></strong></a></li>

41
<li><a href="AddDoctors.jsp"><strong><font color="lightgreen">Add
Doctors</font></strong></a></li>

<li><a href="AddMedicine.jsp"><strong><font color="lightgreen">Add


Medicine</font></strong></a></li>
<li><a href="Admin.jsp"><strong><font
color="lightgreen">LOGOUT</font></strong></a></li>
</ul>
</div>
</div>
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<h1><a href="#" ><font color="lightgreen">MONITORING HEALTHCARE
RESOURCES IN GOVERNMENT HOSPITALS</font></a></h1>
</div>
</div>
</div>
<center>
<div id="homepage" class="clear" style="width:600px;">
<center>
<h1 style="color:red;">Add Government Hospitals Here</h1>

<form action="HSPAction.jsp" method="post">


<table>
<tr><th>Hospital Name</th><td><input type="text" name="hname"
required=""></td></tr>
<tr><th>Hospital Description</th><td><textarea cols="30" rows="8"
name="description" required=""></textarea></td></tr>

<tr><th></th><td><input type="submit" value="Add Hospital"


required=""></td></tr>

42
</table>
</form>
</center>
</div>
</center>
</div>
</div>
</body>
</html>

4. DoctorAction.jsp

<%@page import="java.sql.ResultSet"%>
<%@page import="com.database.Queries"%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<!DOCTYPE html>
<%
try{
String hsp=request.getParameter("hsp");
String special=request.getParameter("special");
String name=request.getParameter("name");
String Experience=request.getParameter("Experience");
String days=request.getParameter("days");
String time=request.getParameter("time");
String contact=request.getParameter("contact");
String availability=request.getParameter("availability");

String query="insert into doctor


values(null,'"+hsp+"','"+special+"','"+name+"','"+Experience+"','"+days+"','"+time+"',
'"+contact+"','"+availability+"')";
int i=Queries.getExecuteUpdate(query);
if(i>0){
%>

43
<script type='text/javascript'>
window.alert("Successful...!!");
window.location="AddDoctors.jsp";
</script>
<%
}else{
%>
<script type='text/javascript'>
window.alert("Failed..!!");
window.location="AddDoctors.jsp";
</script>
<%
}
}catch(Exception
e){out.println(e);
}
%>

5. SearchHospital.jsp

<%@page contentType="text/html" pageEncoding="UTF-8"%>


<html>
<head>
<title>UserHome</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});

44
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="UserHome.jsp"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li><a href="ViewProfile.jsp"><strong><font color="lightgreen">View
Profile</font></strong></a></li>

<li class="active"><a href="SearchHospital.jsp"><strong><font


color="lightgreen">Search Hospital</font></strong></a></li>
<li><a href="SearchMedicine.jsp"><strong><font color="lightgreen">Search
Medicine</font></strong></a></li>
<li><a href="user.jsp"><strong><font
color="lightgreen">LOGOUT</font></strong></a></li>
</ul>
</div>
</div>
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<h1><a href="#" ><font color="lightgreen">MONITORING HEALTHCARE
RESOURCES IN GOVERNMENT HOSPITALS</font></a></h1>
</div
</div>
</div>
<center>
<div id="homepage" class="clear" style="width:500px;">

45
<center>
<%String username=(String)session.getAttribute("username");%>
<h1 style="color:red;">Search Hospital Here </h1>
<form action="SearchDetails.jsp" method="post">
<table>
<tr><th>Hospital Name</th><td><input type="text" name="hname"
required="" placeholder="Hospital Name"
style="width:300px;height:50px;"></td></tr>
<tr><th></th><td><input type="submit" value="Get Hospital Details"
required="" style="height:30px;"></td></tr>
</table
</form>
</center>
</div>
</center>
</div>
</div>
</body>
</html>

6. ViewUsersDetails.jsp

<%@page import="com.database.Queries"%>
<%@page import="java.sql.ResultSet"%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<html>
<head>
<title>Admin Home</title>
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="tablestyle.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>

46
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({timeOut:1000
0
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="AdminHome.jsp"><strong><font
color="lightgreen">Home</font></strong></a></li>
<li class="active"><a href="ViewUserDetails.jsp"><strong><font
color="lightgreen">View Users Details</font></strong></a></li>
<li><a href="ViewHSPDetails.jsp"><strong><font color="lightgreen">View
Hospital Details</font></strong></a></li>
<li><a href="Admin.jsp"><strong><font
color="lightgreen">LOGOUT</font></strong></a></li>
</ul>
</div>
</div>
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<h1><a href="#" ><font color="lightgreen">MONITORING HEALTHCARE
RESOURCES IN GOVERNMENT HOSPITALS</font></a></h1>
</div>
</div>
</div>

47
<center>
<div id="homepage1" class="clear1"
style="width:1000px;height:500px;border:none;">
<center>
<h1 style="color:red;">View All Registered Users Details</h1>
<table>
<tr>
<th>Name</th>
<th>Mobile</th>
<th>Address</th>
<th>Register Date</th>
<th>UserName</th>
<th>Status</th>
</tr>
<%
try{
ResultSet r=Queries.getExecuteQuery("select * from user");
while(r.next()){
String s=r.getString("status");
%>
<tr>
<td><%=r.getString("name")%></td>

<td><%=r.getString("mobile")%></td>
<td><%=r.getString("address")%></td>
<td><%=r.getString("date")%></td>
<td><%=r.getString("username")%></td>
<%if(s.equals("waiting")){%>
<td><a
href="AuthorizeUser.jsp?id=<%=r.getString("id")%>">waiting</a></td>
<%}else{%>
<td><%=r.getString("status")%></td>

48
<%}%>
</tr>
<%
}
}catch(Exception
e){out.println(e);
}
%>
</table>
</center>
</div>
</center>
</div>
</div>
</body>
</html>

49
CHAPTER-6
SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It
is the process of exercising software with the intent of ensuring that the

Software system meets its requirements and user expectations and does not
fail in an unacceptable manner. There are various types of test. Each test type
addresses a specific testing requirement.

6.1 TYPES OF TESTS

Unit testing

Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All
decision branches and internal code flow should be validated. It is the testing of
individual software units of the application .it is done after the completion of an
individual unit before integration. This is a structural testing, that relies on knowledge
of its construction and is invasive. Unit tests perform basic tests at component level
and test a specific business process, application, and/or system configuration. Unit
tests ensure that each unique path of a business process performs accurately to the
documented specifications and contains clearly defined inputs and expected results.
Integration testing

Integration tests are designed to test integrated software components to determine if


they actually run as one program. Testing is event driven and is more concerned with
the basic outcome of screens or fields. Integration tests demonstrate that although the
components were individually satisfaction, as shown by successfully unit testing, the
combination of components is correct and consistent. Integration testing is
specifically aimed at exposing the problems that arise from the combination of
components.

50
Functional test

Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures : interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements,


key functions, or special test cases. In addition, systematic coverage pertaining to
identify Business process flows; data fields, predefined processes, and successive
processes must be considered for testing. Before functional testing is complete,
additional tests are identified and the effective value of current tests is determined.

System Test

System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.

White Box Testing

White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It is
purpose. It is used to test areas that cannot be reached from a black box level.

51
Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most
other kinds of tests, must be written from a definitive source document, such as
specification or requirements document, such as specification or requirements
document. It is a testing in which the software under test is treated, as a black
box .you cannot “see” into it. The test provides inputs and responds to outputs without
considering how the software works.

Unit Testing

Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.

Test strategy and approach

Field testing will be performed manually and functional tests will be written in detail.

Test objectives

 All field entries must work properly.

 Pages must be activated from the identified link.

 The entry screen, messages and responses must not be delayed.

Features to be tested

 Verify that the entries are of the correct format


 No duplicate entries should be allowed
 All links should take the user to the correct page.

52
Integration Testing

Software integration testing is the incremental integration testing of two or more


integrated software components on a single platform to produce failures caused by
interfa defects.

The task of the integration test is to check that components or software


applications, e.g. components in a software system or – one step up – software
applications at the company level – interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

Acceptance Testing: User Acceptance Testing is a critical phase of any project and

requires significant participation by the end user. It also ensures that the system meets

the functional requirements.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

53
6.2 TEST CASES

Hospital Module:

1. Registration:

 Test hospital registration with valid credentials.

 Test hospital registration with invalid credentials (e.g., missing fields, invalid

format).

2. Authorization:

 Test authorization of a registered hospital by the admin.

 Test unauthorized access attempt by a hospital before admin authorization.

3. Doctor Management:

 Test adding a doctor with all required fields filled.

 Test adding a doctor with missing required fields.

 Test adding a doctor with invalid data formats.

 Test adding a doctor with unavailable days/times.

4. Medicine Management:

 Test adding a medicine with valid details.

 Test adding a medicine with missing required fields.

 Test adding a medicine with invalid data formats.

 Test updating medicine count.

54
5. Bed Management:

 Test adding beds with valid details.

 Test adding beds with missing required fields.

 Test adding beds with invalid data formats.

 Test updating available beds count.

User Module:

1. Registration:

 Test user registration with valid credentials.

 Test user registration with invalid credentials (e.g., missing fields, invalid

formats).

2. View User Details:

 Test viewing user details after login.

 Test updating user details.

3. Search Hospitals:

 Test searching hospitals by different criteria (e.g., location, specialty,starting

letters).

 Test viewing details of a specific hospital.

4. Booking Appointment:

 Test booking an appointment with a doctor at a chosen hospital.

 Test booking an appointment with invalid data (e.g., past date/time).

55
Admin Module:

1. Authorization:

 Test viewing pending hospital registrations.

 Test authorizing a hospital for login access.

 Test rejecting a hospital's registration request.

2. Viewing Details:

 Test viewing details of registered users.

 Test viewing details of registered hospitals.

3. System Management:

 Test system performance under load (e.g., multiple simultaneous logins,

registrations).

 Test system behavior when admin performs multiple operations

simultaneously.

Each of these test cases covers different functionalities and scenarios to ensure the

robustness of your system.

56
CHAPTER-7
RESULTS

Fig 7.1 Home Page

Fig 7.2 Admin Login

57
Fig 7.3 Admin Home Page

Fig 7.4 View Users Details

Fig 7.5 View Hospital Details

58
Fig 7.6 Hospital Login

Fig 7.7 Hospital Registration

59
Fig 7.8 Hospital Home Page

Fig 7.9 Add Doctors

Fig 7.10 View Doctors

60
Fig 7.11 Add Medicine

Fig 7.12 View Medicine

Fig 7.13 Add Beds

61
Fig 7.14 View Beds

Fig 7.15 User Login

Fig 7.16 User Registration

62
Fig 7.17 User Home Page

Fig 7.18 User profile

Fig 7.19 Search Hospital

Fig 7.20 Search Medicine

63
CHAPTER-8

CONCLUSION AND FUTURE SCOPE

8.1 CONCLUSION

In this project, we present a study on monitoring the health care resources in


government hospitals, especially useful in emergency cases where we can save the life
of the patient by checking the resources like specialized doctors, availability of beds
and medicines in the hospital before visiting it.This application is useful for a user
who want to visit hospital where he can check resources and book appointment.This
application shows doctor specification details so, user can decide by checking it
whether he/she needs to visit or not. It also shows whether the doctor is available or
on leave by which the user can decide to visit hospital on that day or not. Every doctor
Consulting days and Consulting time are also available to user in order to provide
then convenience.This application is also useful for the hospital to check their
resources and can improve their resources.

64
8.2 FUTURE SCOPE

As technology continues to evolve, future iterations of health resource monitoring in


government hospitals will likely integrate advanced technologies such as artificial
intelligence (AI), Internet of Things (IoT), and blockchain. AI algorithms can analyze
vast amounts of data to predict resource needs and optimize allocation, while IoT
devices can provide real-time monitoring of equipment and supplies. Blockchain
technology can ensure the security and integrity of data, enhancing trust and
transparency in resource management.We can make this web application as mobile
application for the convenience.With the increasing demand for remote healthcare
services, future health resource monitoring systems will likely incorporate remote
monitoring capabilities and telemedicine platforms. Patients will be able to access
healthcare services from anywhere, reducing the burden on physical hospital
infrastructure and improving access to care, especially in rural areas.

65
BIBLIOGRAPHY

[1] YiChuan Wang, LeeAnn Kung, Chaochi Ting, “Beyond a Technical Perspective:
Understanding Big Data Capabilities in Health Care”, publications on. ResearchGate,
2015
[2] Baker, R. S. J. D. “Learning, schooling, and data analytics”. Handbook on
innovations in learning for states,districts, and schools, Philadelphia, PA: Center on
Innovations in Learning , 2013, pp. 179–190

[3] BasU.A, “Five pillars of prescriptive analytics success”s. Analytics-magazine.org,


2013, pp. 8–12.

[4] Ben K. Daniel, “Big Data and analytics in higher education: Opportunities and
challenges”, British journal of educational technology. September, 2015.

[5] Raghupathi, W, “Big data analytics in healthcare: promise and potential. Health
Information Science and Systems, volume2, 2014.

[6] Bharadwaj, A, El Sawy, O.A. Palou, P.A. and Venkatraman, “Digital Business
Strategy: Toward A Next Generation of Insights”, MIS Quarterly, 2013.

[7] C. Mohanapriya, “A Trusted Data Governance Model For Big Data Analytics”,
Volume 1, Issue 7, ISSN (online): 2349-6010, Dec 2014.

[8] Aiden, E., Michel, “The Predictive Power of Big Data. News week”. April 2014.

[9] Sunil Erevelles, Nobuyuki Fukawa, Linda Swayne, “Big Data consumer analytics
and the transformation of marketing”, Journal of Business Research, JBR- 08469, July
2015.

[10] V. Ambrosini et al. What are dynamic capabilities and are they a useful construct
in strategic management?

66
Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
MONITORING HEALTH CARE RESOURCES IN GOVERNMENT HOSPITALS

Dr.Murali Krishna Vanam, Associate Professor CSE, Vaagdevi College of


Engineering(Autonomous), India
G.Tejaswini,UG Student,CSE,Vaagdevi College of Engineering (Autonomous), India
Syed Qadir Hussaini, UG Student, CSE,Vaagdevi College of Engineering (Autonomous),
India
P.Rohit,UG Student,CSE,Vaagdevi College of Engineering(Autonomous),India
J.Asritha,UG Student,CSE,Vaagdevi College of Engineering (Autonomous), India

ABSTRACT
Government hospitals provide medicines for the treatment to the patients based on the diagnosis.
Generally government hospitals stores all the patients historical data and current data in cloud .In our
system user can register with their details, which is stored to the admin database. This system allows
the user to view the hospital location using predictive algorithm and details about the hospital such as
doctors, medicines ,specialists,beds availability and also helps the patient to get details about the
government hospitals. Financial and administrative performance are improved by high utilization of
resources and reduced fraud and abuses and optimized by supply chain and human capital
management.

1. INTRODUCTION
This paper aims to develop a comprehensive system for monitoring and managing health resources in
government hospital. In emergency situations, patients may be exposed to potential harm or risks. So
if the government hospital doesn’t have enough things during an emergency, it may be necessary for
us to redirect to another hospital where the required resources are available. Here in this paper user
first sign up and login into the system providing their information. After users register and log in, the
system reviews the provided details. If the users preferences and requirements match the offerings of
any specific hospitals, the user proceeds to go to that designated hospital. However, in cases where the
user’s preferences do not match with the available options or if the preferred hospital is unavailable
then user will go with the alternate one [1]. This ensures that users have the flexibility to choose an
appropriate healthcare facility based on their preferences and the availability of resources.
Here we are developing an application for government hospitals such that it is monitoring the health
resources in the hospital.Our system ensures that information about medicines, beds, doctor
availability, location of hospital, and the specialization of doctor is always up-to-date. The system
prevents shortages and reduces waste by managing hospital supplies more efficiently, ensuring that
essential items are always available when needed [2]. By doing this, hospitals use their resources
wisely, serve patients better, and overall , make health care more effective.

2. LITERATURE SURVEY
1. To date, the health care industry has paid little attention to the potential benefits to be gained from
big data. While most pioneering big data studies have adopted technological perspectives, a better
understanding of the strategic implications of big data is urgently needed. To address this lack, this
study examines the development, architecture and component functionalities of big data, and identifies
its capabilities, including traceability, the analysis of unstructured data and patterns of care, and its
predictive capacity to support healthcare managers seeking to formulate more effective big-data- based
strategies [3]. Our findings will help healthcare organizations respond strategically to the challenges
they face in today's highly competitive healthcare market.

UGC CARE Group-1, 236


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
2. Since the 1960s, methods for extracting useful information from large data sets, termed analytics
or data mining, have played a key role in fields such as physics and biology. In the last few years, the
same trend has emerged in educational research and practice, an area termed learning analytics (LA;
Ferguson, 2012) or educational data mining (EDM; Baker & Yacef, 2009). In brief, these two research
areas seek to find ways to make beneficial use of the increasing amounts of data available about
learners in order to better understand the processes of learning and the social and motivational factors
surrounding learning. The goal of these efforts is to produce more efficient, more effective, and deeper
learning in the context of increasingly positive learning experiences. The emergence of EDM/LA is a
recent phenomenon. The first meetings of scientists in this area were the Educational Data Mining
workshops, which started in 2005 and became an annual conference series in 2008. This conference
series was joined by the Learning Analytics and Knowledge conference series in 2011. The two
research areas of EDM and LA, emerging from different communities of scientists and practitioners,
have somewhat different goals; discussing these differences is outside the scope of this report (see
Siemens & Baker, 2012). In brief, the validity of models of learners and learning is perhaps the key
focus of the EDM community, whereas the use of the results of analysis to drive changes in practice
by instructors is perhaps the key focus of the LA community. The conferences in EDM and LA were
followed by the establishment of journals devoted to the topics, with the Journal of Educational Data
Mining commencing publication in 2009 and the International Journal of the Society for Learning
Analytics Research expected to commence publication in 2013. As of this writing, the
International
Educational Data Mining Society has approximately 150 members and over 600 subscribers on its
mailing lists. A range of methods has been developed by these two communities, drawing from areas
such as data mining, computational science, statistics, psychometrics, and social network analysis. (A
selection of these methods will be discussed below; a fuller review can be found in Baker & Siemens,
in press).
3. Most businesses today run on structured data – numbers and categories. According to IBM, 80
percent of the data currently produced is unstructured – text, image, video and audio. While some
businesses may choose to run the same way in the future as they do today, doing so could render them
unproductive and noncompetitive. These businesses may not survive as their customers, suppliers and
competitors move beyond them by taking full advantage of hybrid data, a combination of unstructured
and structured data [4]. Hybrid data empowers businesses to use all the available data to make the best
decisions possible.For a prescriptive analytics technology to be transformative, it must be able to
process hybrid data. Without incorporating hybrid data, decision-makers are making their decisions
based on just 20 percent of the available data. Figure 1 is a chart from Gartner Research that showcases
the evolution of analytics, culminating in prescriptive analytics with hybrid data.
4. Institutions of higher education are operating in an increasingly complex and competitive
environment. This paper identifies contemporary challenges facing institutions of higher education
worldwide and explores the potential of Big Data in addressing these challenges[5]. The paper then
outlines a number of opportunities and challenges associated with the implementation of Big Data in
the context of higher education. The paper concludes by outlining future directions relating to the
development and implementation of an institutional paper on Big Data.
5. To describe the promise and potential of big data analytics in healthcare. The paper describes the
nascent field of big data analytics in healthcare, discusses the benefits, outlines an architectural
framework and methodology, describes examples reported in the literature, briefly discusses the
challenges, and offers conclusions. The paper provides a broad overview of big data analytics for
healthcare researchers and practitioners. Big data analytics in healthcare is evolving into a promising
field for providing insight from very large data sets and improving outcomes while reducing costs. Its
potential is great; however there remain challenges to overcome.

UGC CARE Group-1, 237


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
6. Over the last three decades, the prevailing view of information technology strategy has been that
it is a functional-level strategy that must be aligned with the firm’s chosen business strategy. Even
within this socalled alignment view, business strategy directed IT strategy. During the last decade, the
business infrastructure has become digital with increased interconnections among products, processes,
and services. Across many firms spanning different industries and sectors, digital technologies (viewed
as combinations of information, computing, communication, and connectivity technologies) are
fundamentally transforming business strategies, business processes, firm capabilities, products and
services, and key interfirm relationships in extended business networks. Accordingly, we argue that
the time is right to rethink the role of IT strategy, from that of a functional-level strategy— aligned but
essentially always subordinate to business strategy—to one that reflects a fusion between IT strategy
and business strategy. This fusion is herein termed digital business strategy. We identify four key
themes to guide our thinking on digital business strategy and help provide a framework to define the
next generation of insights. The four themes are (1) the scope of digital business strategy, (2) the scale
of digital business strategy, (3) the speed of digital business strategy, and (4) the sources of business
value creation and capture in digital business strategy. After elaborating on each of these four themes,
we discuss the success metrics and potential performance implications from pursuing a digital business
strategy. We also show how the papers in the special issue shed light on digital strategies and offer
directions to advance insights and shape future research
7. Big Data governance requires a data governance that can satisfy the needs for corporate
governance, IT governance, and ITA/EA. While the existing data governance focuses on the
processing of structured data, Big Data governance needs to be established in consideration of a broad
sense of Big Data services including unstructured data. To achieve the goals of Big Data, strategies
need to be established together with goals that are aligned with the vision and objective of an
organization. In addition to the preparation of the IT infrastructure, a proper preparation of the
components is required to effectively implement the strategy for Big Data services. We propose the
Big Data Governance Framework in this paper. The Big Data governance framework presents
criteria different from existing criteria at the data quality level. It focuses on timely, reliable,
meaningful, and sufficient data services, focusing on what data attributes should be achieved based on
the data attributes of Big Data services. In addition to the quality level of Big Data, the personal
information protection strategy and the data disclosure/accountability strategy are also needed to
achieve goals and to prevent problems. This paper performed case analysis based on the Big Data
Governance Framework with the National Pension Service of South Korea. Big Data services in the
public sector are an inevitable choice to improve the quality of people's life. Big Data governance and
its framework are the essential components for the realization of Big Data service.
8. Nowadays the increase of data variety considered very dispute problem for analysis. So innovative
methods are mandatory for analytics especially in big data where the data in characteristic very
complex and unstructured. The analytics is the process of analysis to predict concealed pattern and
association among data. The main objective of this survey paper is to provide the exhaustive view of
different predictive analytics applications and approaches. Analytics methods focused with dissimilar
perspectives based on applications and data variety. Some of the application discussed is big data in
hotel governance, higher education, health care, data e-governance, consumer orientations. This paper
present different predictive approaches adapted for different application with challenges and
suggestions.
9. Consumer analytics is at the epicenter of a Big Data revolution. Technology helps capture rich
and plentiful data on consumer phenomena in real time. Thus, unprecedented volume, velocity, and
variety of primary data, Big Data, are available from individual consumers. To better understand the
impact of Big Data on various marketing activities, enabling firms to better exploit its benefits, a
conceptual framework that builds on resource-based theory is proposed. Three resources— physical,

UGC CARE Group-1, 238


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
human, and organizational capital—moderate the following: (1) the process of collecting and storing
evidence of consumer activity as Big Data, (2) the process of extracting consumer insight from Big
Data, and (3) the process of utilizing consumer insight to enhance dynamic/adaptive capabilities.
Furthermore, unique resource requirements for firms to benefit from Big Data are discussed.
10. The dynamic capability perspective extends the resource-based view argument by addressing how
valuable, rare, difficult to imitate and imperfectly substitutable resources can be created and how the
current stock of valuable resources can be refreshed in changing environments. The concept of
dynamic capabilities emerged in the 1990s, and the field has advanced considerably since. This paper
presents a review as well as a synthesis of the extant literature. This synthesis first highlights, that
dynamic capabilities are shaped by enabling and inhibiting variables within and outside the firm,
including the perceptions and motivations of managers; secondly, it identifies processes that create
dynamic capabilities; and thirdly, it explains that dynamic capabilities do not automatically lead to
performance improvements.[6]
3. PROBLEM STATEMENT
Government hospitals play a vital role in ensuring access to affordable healthcare for a large portion
of the population. However, effective delivery of care is often hampered by inefficient management
of healthcare resources.
Here's a breakdown of the core problem:
Limited Visibility and Inaccurate Data: A lack of centralized and standardized data collection on
resources like medications, equipment, and personnel creates blind spots. This makes it difficult to
assess real-time availability, predict shortages, and optimize resource allocation.
Inefficient Resource Utilization: Ineffective monitoring can lead to underutilized resources in some
hospitals while others face critical shortages. This disparity hinders service delivery and patient care.
Inventory Management Challenges: Outdated inventory management systems can result in expired
medications, equipment breakdowns due to lack of maintenance, and overstocking of unnecessary
supplies. This leads to wasted resources and potential safety hazards.[7]
Data-Driven Decision Making Gap: Without access to reliable data on resource utilization and needs,
planning for procurement, budgeting, and infrastructure development becomes a challenge. This can
lead to reactive decision-making instead of proactive strategies.
Impact:
These issues have a cascading effect, impacting:
Patient Care: Resource shortages can lead to delays in treatment, limited access to specialized care,
and potentially compromised patient outcomes.
Financial Sustainability: Inefficient resource use translates to wasted funds and increased costs for the
healthcare system.
Staff Morale: Working in an environment with limited resources can lead to frustration and burnout
among healthcare workers [8]. This problem statement highlights the critical need for a robust system
to monitor and manage healthcare resources in government hospitals. By addressing these challenges,
we can ensure efficient resource allocation, improved patient care, and a more sustainable healthcare
system.
4. PROPOSED SYSTEM
Our application provides the user the convenience where they can register, login and view all the
information related to the hospital like Hospital Location, Doctors name with their Speciality,
Consulting Time and days [9],Availability of Doctor to know whether doctor is present or on Leave,
Number of Available Medicines, Number of Available Beds.This helps the user to make a decision to
visit hospital according to their needs.This can be useful to the hospital to keep track on their resources
and provide the best resources to maintain their reputation.This can create a positive impact in a user
towards the government hospitals who thinks government hospital has less resources and helps in

UGC CARE Group-1, 239


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
promoting government hospitals and free services to help the people.
ADVANTAGES OF PROPOSED SYSTEM
 Very useful in emergency cases.
 Can take Decision to visit or not.
 Helps in promoting Government Hospitals.
 Time and Cost saving.
 Gets accurate information.
 No need to visit hospital prior to know information.
5. SYSTEM ARCHITECTURE
This paper aims to develop a comprehensive system for monitoring and managing health resources in
government hospital [10]. It has Admin module,Hospital Module and User Module.System
architecture is a conceptual model that describes a system's structure, behavior, and other views. It can
also refer to the description of an existing system. A system architecture is made up of a diagram that
defines the system's structure and its subsystems, along with the behavior of the components.

Fig 5.1 System Architecture


6. IMPLEMENTATION
ADMIN MODULE
In this module, admin can login directly, after successful login admin can perform some operations
like authorizing the hospitals after their registration, authorizing the users after their registration. Only
admin can view Hospital and User details. Only after successful authorization by admin,Hospital and
User can login.
HOSPITAL MODULE
In this Module, Hospital can register, after registration the admin must authorize the hospital,until the
admin authorizes the Hospital,the hospital will be in waiting status and it cant login even after
registering.When status is authorized,the hospital can login and can Add Doctors, View Doctors, Add
Medicine, View Medicine, Add Beds,View Beds and logout.
USER MODULE
In this Module, User can register, after registration the admin must authorize the user, until the admin
authorizes the user, the user will be in waiting status and it cant login even after registering.When
status is authorized,the user can login and can View Profile, Search Hospitals, view Doctor Details,
,View Beds,view Medicine Details and logout.
7. OUTPUT SCREENS

UGC CARE Group-1, 240


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024

Fig 7.1 Home Page

Fig 7.2 Admin Login

Fig 7.3 Admin Home Page

UGC CARE Group-1, 241


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024

Fig 7.4 View Users Details

Fig 7.5 View Hospital Details

UGC CARE Group-1, 242


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
Fig 7.6 Hospital Login

Fig 7.7 Hospital Registration

Fig 7.8 Hospital Home Page

Fig 7.9 Add Doctors

UGC CARE Group-1, 243


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024

Fig 7.10 View Doctors

Fig 7.11 Add Medicine

Fig 7.12 View Medicine

UGC CARE Group-1, 244


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024

Fig 7.13 Add Beds

Fig 7.14 View Beds

Fig 7.15 User Login

UGC CARE Group-1, 245


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024

Fig 7.16 User Registration

Fig 7.17 User Home Page

Fig 7.18 User profile

Fig 7.19 Search Hospital

UGC CARE Group-1, 246


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024

Fig 7.20 Search Medicine


8. CONCLUSION
In this paper, we present a study on monitoring the health care resources in government hospitals,
especially useful in emergency cases where we can save the life of the patient by checking the resources
like specialized doctors, availability of beds and medicines in the hospital before visiting it.This
application is useful for a user who want to visit hospital where he can check resources and book
appointment.This application shows doctor specification details so, user can decide by checking it
whether he/she needs to visit or not. It also shows whether the doctor is available or on leave by which
the user can decide to visit hospital on that day or not. Every doctor Consulting days and Consulting
time are also available to user in order to provide then convenience.This application is also useful for
the hospital to check their resources and can improve their resources.

9. FUTURE ENHANCEMENT
As technology continues to evolve, future iterations of health resource monitoring in government
hospitals will likely integrate advanced technologies such as artificial intelligence (AI), Internet of
Things (IoT), and blockchain. AI algorithms can analyze vast amounts of data to predict resource needs
and optimize allocation, while IoT devices can provide real-time monitoring of equipment and
supplies. Blockchain technology can ensure the security and integrity of data, enhancing trust and
transparency in resource management.We can make this web application as mobile application for the
convenience.With the increasing demand for remote healthcare services, future health resource
monitoring systems will likely incorporate remote monitoring capabilities and telemedicine platforms.
Patients will be able to access healthcare services from anywhere, reducing the burden on physical
hospital infrastructure and improving access to care, especially in rural areas.

10. REFERENCES/BIBLIOGRAPHY
[1] YiChuan Wang, LeeAnn Kung, Chaochi Ting, “Beyond a Technical Perspective: Understanding
Big Data Capabilities in Health Care”, publications on. ResearchGate, 2015
[2] Baker, R. S. J. D. “Learning, schooling, and data analytics”. Handbook on innovations in learning
for states,districts, and schools, Philadelphia, PA: Center on Innovations in Learning , 2013, pp. 179–
190
[3] BasU.A, “Five pillars of prescriptive analytics success”s. Analytics-magazine.org, 2013, pp. 8–
12.
[4] Ben K. Daniel, “Big Data and analytics in higher education: Opportunities and challenges”, British
journal of educational technology. September, 2015.
[5] Raghupathi, W, “Big data analytics in healthcare: promise and potential. Health Information
Science and Systems, volume2, 2014.
[6] Bharadwaj, A, El Sawy, O.A. Palou, P.A. and Venkatraman, “Digital Business Strategy: Toward

UGC CARE Group-1, 247


Industrial Engineering Journal
ISSN: 0970-2555
Volume : 53, Issue 5, May : 2024
A Next Generation of Insights”, MIS Quarterly, 2013.
[7] C. Mohanapriya, “A Trusted Data Governance Model For Big Data Analytics”, Volume 1, Issue
7, ISSN (online): 2349-6010, Dec 2014.
[8] Aiden, E., Michel, “The Predictive Power of Big Data. News week”. April 2014.
[9] Sunil Erevelles, Nobuyuki Fukawa, Linda Swayne, “Big Data consumer analytics and the
transformation of marketing”, Journal of Business Research, JBR- 08469, July 2015.
[10]V. Ambrosini et al. What are dynamic capabilities and are they a useful construct in strategic
management?

You might also like