Professional Documents
Culture Documents
Project
Project
Project
CHAPTER-1
INTRODUCTION
CHAPTER-2
COMPANY AND INDUSTRY PROFILE
CHAPTER-3
SYSTEM STUDY
CHAPTER-4
SYSTEM DESIGN
CHAPTER-5
SYSTEM DEVELOPMENT & TESTING
CHAPTER-6
CONCLUSION
CHAPTER-1
INTRODUCTION
INTRODUCTION
ThemainobjectiveistodevelopaPHPbasedwebapplicationnamed“ClinicAppointment Sys-
tem” that covers all the aspects of making appointment of doctors. It enables healthcare provid-
ers to improve operational effectiveness, reduce costs, reduce medical errors, reduce time con-
sumption and enhance delivery of quality of care.
This system help reduce the problems occur when using the manual system and helps pa-
tientstoskipendlessqueues.Theimportantthingisitwillbecomeeasierforthedatarecordand retrieval.
This software also stores all the patient details, patients profile, prescriptions etc. This sys-
temenablesdoctorsandclinicassistanttomanagepatientrecordsandappointments.Usercan enter their
details, update their profile and they can select doctors to make appointments. Other than that,
the system is user friendlyand it can help the clinic to manage their appointments. The system-
helpstoavoidmakingduplicate appointments. Userscanview availabledoctorsandtheir timings and
can make appointments according to it. Users also get an option to cancel their appointments.
Users can view their upcoming appointments and past appointments are deleted automatically.
The system also allows doctors to log in. Doctors can edit their profile and view their up-
coming appointments, patients etc. They can even send prescriptions to their patients by select-
ing their patients from the dropdown list.
The system also has an administrator section, where only a single person can manage the
whole system. Administrator can add/remove patients, doctors and departments and search for
appointments.
The system features a very intuitive and responsive design that fits devices of all screen
size (Smartphones, PCs, Tablets, and Notebooks etc.). The application automatically adapts its
layout to match user’s screen size.
CHAPTER-2
INDUSTRY AND COMPANY PROFILE
INDUSTRY PROFILE
The Software industry includes business for development, maintenance and publication of software that are
using different business models, mainly either “license/ maintenance basd” or “ Cloud Based” (such as
SaaS, PaaS, IaaS, MBaaS, MSaaS, DCaaS, etc.) The industry also include software services such as train-
ing, documentation, consulting and date recovery. The software and computer services industry spends
mote than 11% of its net sales for Research & Development which is in comparison with other industries
the second highest share after pharmaceuticals & biotechnology.
The first company founded to provide software products and services was Computer Usage Company in
1955.[2] Before that time, computers were programmed either by customers, or the few commercial com-
puter vendors of the time, such as Sperry Rand and IBM.
The software industry expanded in the early 1960s, almost immediately after computers were first sold in
mass-produced quantities. Universities, government, and business customers created a demand for soft-
ware. Many of these programs were written in-house by full-time staff programmers. Some were distribut-
ed freely between users of a particular machine for no charge. Others were done on a commercial basis,
and other firms such as Computer Sciences Corporation (founded in 1959) started to grow. Other influen-
tial or typical software companies begun in the early 1960s included Advanced Computer tech-
niques, Automatic Data Processing, Applied Data Research, and Informatics General.[3][4] The comput-
er/hardware makers started bundling operating systems, systems software and programming environments
with their machines.
When Digital Equipment Corporation (DEC) brought a relatively low-priced microcomputer to market, it
brought computing within the reach of many more companies and universities worldwide, and it spawned
great innovation in terms of new, powerful programming languages and methodologies. New software was
built for microcomputers, so other manufacturers including IBM, followed DEC's example quickly, result-
ing in the IBM AS/400 amongst others.
The industry expanded greatly with the rise of the personal computer ("PC") in the mid-1970s, which
brought desktop computing to the office worker for the first time. In the following years, it also created a
growing market for games, applications, and utilities. DOS, Microsoft's first operating system product, was
the dominant operating system at the time.
In the early years of the 21st century, another successful business model has arisen for hosted software,
called software-as-a-service, or SaaS; this was at least the third time[citation needed] this model had been
attempted. From the point of view of producers of some proprietary software, SaaS reduces the concerns
about unauthorized copying, since it can only be accessed through the Web, and by definition no client
software is loaded onto the end user's PC.
Size Of Industry
The global software products market amounts to US$968.25 billion in 2021 and had a compound annual
growth rate (CAGR) of 4%. Major companies include Microsoft, HP, Oracle, Dell and IBM.
Business models within the software industry
Business models of software companies have been widely discussed. Network effects in software ecosys-
tems, networks of companies, and their customers are an important element in the strategy of software
companies.
COMPANY PROFILE
Leadership
Siiva Ram KreshnaVasantha
(Founder & Chairman)
He started SINFO TECH with a vision to create an organization that combined IT with innovative ideas to
build solutions that benefited a wide range of users and industries. Exceptionally Self- Motivated and Di-
rected. He analyses, evaluates and motivates team- oriented collaborative environment. A part from han-
dling the end-to-end chain of work and with 10 years of experience in corporate development emerging
business.
He Post Graduated from the Business Management and Business Administration Program from the Uni-
versity of Andhra. He has a B.S. in Computer Science from the AcharyaNagarjuna University.
Aravind Krishna Kurapati
(Chief Operating Officer)
He holds a Degree in Software Engineering from Madras University. He has been Director - Operations of
SINFO TECH. He is considered a pioneer in the field, highly respected amongst his peers and his views
are sought in the field of software technology.
SrinivasaraoGude
(Director – F&A)
GudeSrinivasa Rao has a proven record of success in financial and operations management and leadership.
He has appeared ICAI and holds a B. Com in Accounting from the AcharyaNagarjuna University. He has
vast experience in Internal Operations.
KogantiSukanyaChowdary
Associate Director - Technical
She holds a Degree in Computer Science Engineering from JNTU. She has been Associate Director -
Technical of SINFO TECH. She has instituted ground breaking software development practices ensuring
optimal utilization of resources, on time delivery and best in class software quality and services all geared
towards ensuring customer satisfaction for SINFO TECH.
Siva Krishna Gorla
Project Manager and Tech Lead
He holds a Master Degree in Computer Science Engineering from JNTU. He has been Project Manager
and Tech Lead of SINFO TECH. And he has over 10+ years of experience In corporate development and
emerging business. He leads the technical team with precision and passion. Siva encourage team work, ap-
proach and innovation.
CHAPTER-3
SYSTEM STUDY& ANALYSIS
SYSTEM STUDY
Systemstudyisthefirststageofsystemdevelopmentlifecycle.Thisgivesaclear pic-
tureofwhatactuallythephysicalsystemis.Thesystemisdoneintwophase.Inthefirstphase, the prelimi-
narysurveyof the system is done which helps in identifythe scope of the system. The second
phase of the system study is more detailed and in-depth study in which the identification of us-
er’s requirement and limitations and problem of the present system are studied. After completing
the system study, a proposal is prepared by the user.
EXISTING SYSTEM
Presently people are making appointments manually. This is a time consuming process, patient
has to physically go to the clinic in order to make appointment. Some clinics provide the oppor-
tunity to make appointments by placing a phone call. But in this case, people are often left unat-
tended.
LIMITATIONS OFEXISTINGSYSTEM
Byanalyzingtheexistingsystem, someof its drawbacksarelisted.
1. Time consuming.
2. Lackof efficiency.
3. Needsto bephysicallypresent at the clinic.
4. Can’tmakeappointmentsinadvanceforlongintervals.
FACT FINDING
The major task of system study is fact finding, in this stage data collection is done in various
methods which are,
Reviewof writtendocument:
All documentation data carriers-forms, records reports, manuals, etc. was re-
viewed,organizedandevaluated.Reviewallthedocumentswhichcontainthelocations,categoriesand
the others by the help of maps. The methodof recording eachand every detail of location-
swere studied and noted.
On-site observation:
Here the operation and physical layout of the current system were studied by direct
observation of the operation /physical layout. The method directed toward describing and
understanding events and behavior as they occur.
People usually provide the best source of information and hence personal interviews
with the patients. Provide questionnaires to selected persons to collect data.
PROPOSED SYSTEM
Proposed system will overcome the drawbacks of existing system. Existing system is
manual and available appointment applications are not user friendly. Proposed system is com-
puterized and user friendly. The proposed system has many advantages.
Theuseofproposedsystemwillavoidtheproblemsoftheexistingsystemandwealsoget a new
system for managing information under the Clinic Appointment System. The proposed system
offers:
System analysis is the detailed study of the various operations performed by the system
and relationship within and outsidethesystem. It is themost essential part ofthedevelopment of
the project. During system analysis data are collected on the available file, decisions points and
transactionshandledbythepresencesystem.Systemanalysismustcarryoutacustomaryapproach to the
use of computers for the problem solving. Nowadays systems are so big and complex that teams
of architectures, analyst, programmers, testers and users must work together to create the mil-
lionsoflinesofcustom-returncodethatdriveourenterprise.Assumingthatanewsystemisto bedevel-
oped, thenext phaseis system analysis. Analysis involved adetailedstudyofthe current system,
leading to specification of a new system.
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS
Processor:IntelPentium
Monitor size: 14 inch
RAM: 256MB
HardDisk:80GB
SOFTWAREREQUIREMENTS
Technology :Web Application.
Front end :PHP, HTML, JQuery, Bootstrap & CSS.
Back end :MySQL.
Web browser: Mozilla Firefox, Google Chrome, Apple Safari or any Gecko/Web Kit based
browser.
CHAPTER-4
SYSTEM DESIGN
SYSTEM DESIGN
INITIALDESIGN
MAINMODULES:-
Main modules of these systems are given below.
1. ADMINMODULE:-
AddNew User
Administrator can remove existing user by selecting user ID from the drop down box.
Doctor registration
Administrator can add doctors and assign them duty times and schedules.
RemoveExistingDoctor
RemoveExistingDepartment
UserRegistration
Registering the user by the details that includes Name, Username, Email Address, Pass-
word, Residential Address, Phone Number, Gender etc.
Profile
User scaned it and update their profile including their password.
Doctors List
User scan browse through the entire list of doctors and select one for making ap-
pointment.
View Prescription
User can view, print or delete prescriptions sent by doctors.
Upcoming Appointments
Usercanview/deleteupcomingappointments.Pastappointmentsare automatically
removed from the list to show only the relevant contents.
Make Appointment
User can search desired departments using the intelligent, auto filling search en-
gine.Theformshowssuggestions/getsautomaticallyfilledasuserstartstyping.The search re-
sult shows relevant doctors list with available time, days etc. User can click make ap-
pointment and they get redirected to the date and time selection page. After selecting de-
sired date, the system returns to user with an appointment ID.
Notifications
Usercanview notificationsifone his/her appointmentrequest hasbeenmarkedas
‘Pending’ by the doctor.
3. DOCTORMODULE: -
Doctor Profile
Doctors can edit their profile details such as Name, Qualification etc.
SendPrescription
Doctors can view their upcoming appointments here. They can change appoint-
mentstatustoPendingorActive.Theycanevencanceltheappointment.
DATAFLOWDIAGRAM (DFD)
Generally, DFD’s are used as a design not ationto represents architectural design (Exter-
nal design) and top level design (internal design) specifications. DFD’s represent the system in
hierarchical manner with one top level and many lower level diagrams with each representing
separate parts of the system. A DFD shows what kind of information will be input to and output
from the system, where the data will come from and go to, and where the data will be stored. It
does not show information about the timing of processes, or information about whether processes
willoperateinsequenceorinparallelSincediagrammaticrepresentationsareeasiertointerpretas com-
pared to the technical descriptions, the non-technical users can also understand the system details
clearly. DFD consists of four basic notations which help to depict the information in the sys-
tem.These notations are rectangle, circle, open-ended rectangle, and arrows.
Rectangle Represents an external entity that is the source or destination of data
within the system. Each external entity is represented by a meaningful and
unique name.
Representprocessesthatsowtransformationormanipulationofdata within the
system
Representdatastoresthatindicatetheplaceforstoringinformation within the system.
Admin
User
Level 1.1
Remove user
User Login
Add Doctor
Doctor
Remove Doctor
Department
Add Department
appointment
Remove Department
Search Appointment
Update Appointment
Cancel Appointment
Doctor Doctor
Login
Prescription
Edit Profile
appointment
Send Prescrip-
tion
View Appoint-
ment
Change Ap-
pointment
Cancel Ap-
pointment
ER DIAGRAM
An entity–relationship model (ER model) is a data model for describing the data or in-
formation aspects of a business do main or its process requirements, in an abstract way that lends
itself to ultimately being implemented in a databasesuch as arelational database. The main com-
ponents of ER models areentities(things) and the relationships that can exist among them, and
databases. An entitymay be defined as a thing capable of an independent existence that can be
uniquely identified. An entity is an abstraction from the complexities of a domain. When we
speak of an entity, we normally speak of some aspect of the real world that can be distinguished
fromotheraspectsoftherealworld.Arelationshipcaptureshowentitiesarerelatedtooneanother. Rela-
tionship scan be thought of as verbs, linking two or more nouns. Examples: an owns relationship
between a company and a computer, a supervises relationship between an employee and a de-
partment, a performs relationship between an art istanda song, aprovedrelationshipbetweena-
mathematicianandatheorem.Entitiesandrelationshipscanboth have attributes. Every entity (unless
it is a weak entity) must have a minimal set of uniquely identifyingattributes, which is called the
entity's primarykey. Entity–relationship diagrams don't showsingleentitiesorsingleinstancesofre-
lations.Rather,theyshowentitysetsandrelationship sets.
ER DiagramNotations
Entity
Weakentity
Relationship
Attribute
Key Attribute
Determinetherelationshipsbetweenthedifferent dataelements.
TheClinicAppointmentSystemuses‘clinic’asitdatabaseforstoringallthedataintablesfor
dataprocessing.
NORMALIZATION
Normalizationistheprocessofdecomposingasetofrelationswithanomaliestoproduce smalle-
randwell-structuredrelationsthatcontain minimumredundancy. It isaformalprocessof deciding
which attributes should be grouped together in a relation. The proposed system has the following
relations:
SecondNormalForm
Second Normal form (2NF) is based on the concept of functional dependency. A relation
R is in 2NF if it is in 1NF and every non key attribute A of R is fully dependent on the primary
key. That is, relationissaidtobein2NFifeachattributeAinRmeetsoneofthefollowingcriteria:
The tables designed in the proposed system, contain a primary key for uniquely identifying each
user. For e.g.: table login has user_idas a primary key for unique identification of the user. The
table prescription has preside as the primary key and department has dept_id as primary key. All
non-key attributes of the table department sis fully dependent on the primary key dept_id.
Third Normal form (3NF) is based on the concept of transitive dependency. A relation is
saidtobein3NFifitisin2NFandhasnotransitivedependencies.Thatisallthenonkeyattribute should be
functionally determined by the primary key. In the proposed system all attributes of tables are
fully depends on the primary key only that is all non-key attributes are mutually independent.
TABLE DESIGN
Table: Login
Table:doctor
FIELDNAME DATATYPE SIZE CONSTRAINTS DESCRIPTION
Dr id int 11 - StoresdoctorID.Auto
Incremented value.
Dr user name varchar 30 Foreign Key Storesdoctor
Username.
Dr name varchar 60 - Storesdoctorname.
Table: admin
FIELDNAME DATATYPE SIZE CONSTRAINTS DESCRIPTION
adminname varchar 30 Primary Key Stores Admin
username.
adminpass varchar 60 - Stores admin
password.
Table: appointment
Table: Department
Table: Timing
INPUTDESIGN
Input design is the process of converting a user – oriented description of the inputs to a
computerbasedbusinesssystemintoaprogrammer–orientedspecification.Thegoalofdesigning input
datais to makedataentryas easy, logical and freefromerrors as possible. Input design is a
partoftheoverallsystemdesign,whichrequirescarefulattention.Ifthedatagoingintothesystem is in-
correct, then the processing and output will magnify these errors. The proposed system satisfies
the following input design objectives:
1. Acosteffectivemethodof input.
i. Controlling the amount of input: Wherever user input is required, the number of
key strokes is reduced by giving possible input values as default in that area. The
viewer canselecttheanswerinsingleclick.Theamountofinformationenteredbytheviewer
using the keyboard is reduced to the maximum and the software is made very user
friendly.
ii. Avoiding Delay: A processing delay resulting from data preparation or data entry
operations is called a bottleneck. Such bottlenecks are avoided to the maximum. Pro-
gressbarorprogressmetersaredisplayedtokeeptheuserwaitingandalsotoshow the speed
and amount of download.
iii. Avoiding Errors in Data: The rate at which errors occur depends on the quantity of
data. Here the quantity of data is reduced to the lowest, and a text file is easily man-
ageable.
iv. Avoiding Extra Steps: The viewer can quit at any point of time. Even at the time of
upload or download the viewer can quit. The viewer need not wait for any specific
event to happen for quitting the process.
d. Dataverification→checkingtheconversion.
e. Datacontrol→checkingtheaccuracyandcontrollingtheflowofthedatatothecomputer.
g. Datavalidation&correction→checking&correctingtheerrorstheinputdatabyprogram
OUTPUT DESIGN
b. Signalimportantevents,opportunities,problemsorwarnings.
c. Triggeranaction.
d. Confirmtheaction.
a. External Outputs
Manufacturers create and design external outputs for printers. External outputs ena-
ble the system to leave the trigger actions on the part of their recipients or confirm actions to
their recipients.
Someoftheexternaloutputsaredesignedasturnaroundoutputs,whichare implemented as
a form and re-enter the system as an input.
b. Internaloutputs
Internaloutputs arepresent insidethesystem,andused byend-usersand managers.
PHP
PHP (recursive acronym for PHP: Hypertext Pre-processor) is a widely-used open source
general-purpose scripting language that is especially suited for web development and can be
embedded into HTML. It is a server-side scripting language designed primarily for web de-
velopmentbutalsousedasa general-purposeprogramminglanguage.PHPstartedoutasa smallo-
pensourceprojectthatevolvedasmoreandmorepeoplefoundouthowusefulitwas. RasmusLerdorf
unleashed the first version of PHP way back in 1994.
PHPisaserversidescriptinglanguagethatisembeddedinHTML.Itisusedtomanage dynamic
content, databases, session tracking, even build entire e-commerce sites.
Itisintegratedwithanumberofpopulardatabases,includingMySQL,PostgreSQL, Ora-
cle, Sybase, Informix, and Microsoft SQL Server.
PHPispleasinglyzippyinitsexecution,especiallywhencompiledasanApachemodule on the
Unix side. The MySQL server, once started, executes even very complex queries with
huge result sets in record-setting time.
PHPsupportsalargenumberofmajorprotocolssuchasPOP3,IMAP,andLDAP.PHP4 added
support for Java and distributed object architectures (COM and CORBA), making n-tier
development a possibility for the first time.
PHPisforgiving:PHPlanguagetriestobe asforgivingaspossible.
PHPSyntax is C-Like.
PHPperformssystemfunctions,i.e.fromfilesonasystemitcancreate,open,read, write,
and close them.
Accesscookiesvariablesandsetcookies.
Itcanencryptdata.
HTML
HTMLstandsforHyperTextMark-upLanguage,whichisthemostwidelyusedlanguageon Web to
develop web pages.
HypertextreferstothewayinwhichWebpages(HTMLdocuments)arelinkedtogether. Thus
the link available on a webpage are called Hypertext.
As its name suggests, HTML is a Markup Language which means you use HTML to
simply"mark-up"atextdocumentwithtagsthattellaWebbrowserhowtostructureitto display.
Originally, HTML was developed with the intent of defining the structure of documents like
headings,paragraphs,lists,andsoforthtofacilitatethesharingofscientificinformationbetween re-
searchers.
Now,HTMLisbeingwidelyusedtoformatwebpageswiththehelpofdifferenttagsavailable in HTML
language.
Java Script
JavaScriptisalightweight,interpretedprogramminglanguage.Itisdesignedforcreatingnetwork-
centric applications. It is complimentary to and integrated with Java. JavaScript is very easy to
implementbecauseitisintegratedwithHTML.Itisopenandcross-platform.Itisadynamiccomputer
programming language. It is lightweight and most commonly used as a part of web pag-
es,whoseimplementationsallowclient-sidescripttointeractwiththeuserandmakedynamic pages. It is
an interpreted programming language with object-oriented capabilities.
Characteristics of Java Script are:
JavaScriptisalightweight,interpretedprogramminglanguage.
Designedforcreatingnetwork-centricapplications.
ComplementarytoandintegratedwithJava.
ComplementarytoandintegratedwithHTML.
Less server interaction−You can valid at user input before sending the page off to the
server. This saves server traffic, which means less load on your server.
Immediate feedback to the visitors−They don't have to wait for a page reload to see if
Increased inter activity−You can create interfaces that react when the user hovers over
Richerinterfaces−YoucanuseJavaScripttoincludesuchitemsasdrag-and-drop components
and sliders to give a Rich Interface to your site visitors.
MySQL
MySQListhemostpopularOpenSourceRelationalSQLdatabasemanagementsystem.MySQL iso-
neofthebestRDBMSbeingusedfordevelopingweb-basedsoftwareapplications.MySQLis a fast,
easy-to-use RDBMS being used formanysmall and bigbusinesses. MySQLis developed, market-
ed, and supported by MySQL AB, which is a Swedish company. MySQL is becoming so popular
because of many good reasons:
MySQLworksonmanyoperatingsystemsandwithmanylanguagesincludingPHP, PERL, C,
C++, JAVA, etc.
MySQLworks veryquicklyand works well evenwith largedata sets.
MySQLsupportslargedatabases,upto50millionrowsormoreinatable.Thedefaultfile sizelim-
itforatableis4GB,butyoucanincreasethis(ifyouroperatingsystemcanhandle it) to a theoreti-
cal limit of 8 million terabytes (TB).
MySQLiscustomizable.Theopen-sourceGPLlicenseallowsprogrammerstomodifythe
MySQL software to fit their own specific environments.
PROJECT PLAN
Properprojectmanagementisessentialforthesuccessfulcompletionofasoftwareproject.
Software project management (responsible for project planning) specifies activities necessary to
complete the project. After this, a project schedule is prepared to accomplish the specified tasks.
The purpose of planning and scheduling is to develop the software according to the user re-
quirementswithintheallocatedtimeandbudget.Projectplanningispartofprojectmanagement,
whichrelatestotheuseofschedulessuchasGanttchartstoplanandsubsequentlyreportprogress within
the project environment.
Initially, theproject scopeis defined and the appropriate methods for completing the pro-
ject are determined. Following this step, the durationsfor the various tasksnecessary to complete
thework are listed and grouped into a work breakdown structure. Project planning is often used
to organize different areas of a project, including project plans,workloads and the management of
teams and individuals.The logicaldependenciesbetween tasks are defined using anactivity net-
work diagram that enables identification of the critical path. Project planning is inherentlyuncer-
tainasitmustbedonebeforetheprojectisactuallystarted.Therefore,thedurationof the tasks is often es-
timated through a weighted average of optimistic, normal, and pessimistic cases. The critical
chain method adds "buffers" in the planning to anticipate potential delays in projectexecu-
tion.Floatorslacktimeintheschedulecanbecalculatedusingprojectmanagement soft-
ware.Thenthenecessaryresourcescanbeestimatedandcostsforeachactivitycanbe allocatedtoeachre-
source,givingthetotalprojectcost.Atthisstage,the projectschedulemaybe optimized to achieve the
appropriate balance between resource usageand project duration to comply with the project ob-
jectives. Once established and agreed, the project schedule becomes what is known as the base-
line schedule. Progress will be measured against the baseline schedule through-
outthelifeoftheproject.Analysingprogresscomparedtothebaselinescheduleisknown
asearnedvaluemanagement.Theinputsoftheprojectplanningphaseincludethe project charterand the
concept proposal. The outputs of the project planning phase include the project require-
ments,theprojectschedule,andtheprojectmanagementplan.TheProjectPlanningcanbe donemanual-
ly.However,whenmanagingseveralprojects,itisusuallyeasierandfasterto useproject management
software. The objective of a project plan is to define the approach to be used by the Project team
to deliver the intended project management scope of the project.
Introduction
Describes the objectives of the project and provides information about the constraints
thataffectthesoftware.Theblooddonationmobileapplication,ClinicAppointmentSystem is-
usedtomakemedicalappointmentsquicklyandeffectivelybytheuser.ClinicAppointment Sys-
temhelpspeopletogetrightinformationaboutdoctors,specializationandavailabilityand let them
to make appointments easily through an intuitive user interface.
ProjectOrganization
Describes the responsibilities assigned to the project management team members for
completing the project. The system was developed by a single a user, and each task was
completed in fixed time and schedule.
Risk Analyses
k. Describes the risks that can possibly arise during software development as well as explains
how to assess and reduce the effect of risks. The major risks involved in the software devel-
opment process was to locate blood banks in different places, provide adequateknowl-
edgeamongbloodbanksandpeopleaboutblooddonation.Ifnobloodbank is registered in the sys-
tem registered users are not able to use the app properly. To reduce ther is ksin software the
system should be available in all blood banks and among common people.
Resourcerequirements
Specifies the hardware and software required to carry out the software project. Cost estima-
tionisdoneaccordingtotheseresourcerequirements.Thecostincludes,costoflearning materi-
alsbrought,costincurredintravelingtobloodbanks,costassessedforbuyingsoftware and hardware
etc…
Workbreakdown
Describes the activities in to which the project is divided. It also describes the Mile-
stones and deliverables of the project activities. The first activity of the system develop-
mentincludeddesigningofthesystem,database,inputandoutputs.Thentheservices and the web
portion were developed based on the design. It was made working considered as a delivera-
ble to check whether the services are running properly.
ProjectSchedule
Specifies the dependencies of activities one achother. Based on this, the time re-
quired by the project management team members to complete the project activities is esti-
mated. Only if the web services are developed mobile application will be able to run. The da-
ta base including tables are to be created in the beginning itself for the proper functioning of
the system. If the designing phase is completed in a small amount of time, then the total work
time can be estimated.
There are several plans that may be a part of or linked to a project plan. These plans in-
clude quality assurance plan, verification plan and validation plan, configuration management
plan maintenance plan and staffing. The WBS is the hierarchicallist of the project's phases, tasks,
andmilestones.It'sthecoreoftheprojectschedule.TheWBSiscriticalbecauseitdrives thescopeof the
project. The scope translates into the timeline and budget. The time that you estimateit-
willtaketocompletethetasksbyenteringeitherworkorduration.Workistheamount ofeffortorperson-
hoursneededtocompleteatask.Durationistheamountofactualtimethatwill pass before the task is
completed. Thus, if a task takes 16 hours of work and one person does the work, its duration is
two days (assuming an 8-hour work day). If two people do the work, its duration is one day.
PROJECTSCHEDULING
Projectschedulingprovidesdetailssuchasstartandenddateoftheproject,milestonesand tasks
for the project. In addition, it specifies the resources (such as people, equipment, and facilities)
required to complete the project and the dependencies of tasks of the project on each oth-
er.Beforeaprojectschedulecanbecreated,theschedulemakershouldhaveaworkbreakdown structure
(WBS), an effort estimate for each task, and a resource list with availability for each resource.
An appropriate project schedule prepared according to project plan not only aims to completethe
project on timebut also helps to avoid theadditional cost incurred when the project is delayed. In
order for a project schedule to be healthy, the following criteria must be met:
Theremainingeffortmustbeappropriatelydistributedamongteammembers(takingvacations into
consideration).
To carry out project scheduling appropriately, some principles are followed. These prin-
ciples help the project management team to prepare the project schedule. Several techniques
areused forkeepingtrack oftheproject schedule. Thesetechniquesareapplied afterinformation is
collected from the project planning activities. This information includes estimation of effort, se-
lection of suitable process model, and decomposition of tasksintomultiple subtasks and so on.
Clinic Appointment System was scheduled to complete in 4 months’ duration. The system de-
velopment was completed in the scheduled time period. The cost estimated in development of
the system was accurate and was exact to the estimation after the completion of the project.
SYSTEM TESTING
TYPES OF TESTING
Software testing determines the correctness, completeness, and quality of software being
developed. Validation refers to the process of checking that the developed software meets the re-
quirements specified by the user. The activities involved in the testing phase basically evaluate
the capability of that system meets its requirements. The main objective of software testing is to
detect errors in the software. Errors occur if some part of the developed system is found to be in-
correct, incomplete or inconsistent. Test techniques include, but are not limited to, the process of
executing a program or application with the intent of findingsoftware bugs(errors or other de-
fects). It involves the execution of a software component or system to evaluate one or more
properties of interest. In general, these properties indicate the extent to which the component or
system under test:
Meetstherequirementsthatguideditsdesignanddevelopment,
Performsitsfunctionswithinanacceptable time,
Is sufficientlyusable,
Canbeinstalledandruninitsintended environments,and
Achievesthegeneralresultitsstakeholdersdesire.
Asthenumberofpossibletestsforevensimplesoftwarecomponentsispracticallyinfinite, all
software testing uses some strategy to select tests that are feasible for the available time and re-
sources. As a result, software testing typically (but not exclusively) attempts to execute a pro-
gramorapplicationwiththeintentoffindingsoftwarebugs(errorsorotherdefects).Software testing-
canprovideobjective,independentinformationaboutthequalityofsoftwareandriskofits failuretouser-
sand/orsponsors.Softwaretestingcanbeconductedassoonasexecutablesoftware (evenifpartially-
complete)exists.Theoverallapproachtosoftwaredevelopmentoftendetermines when and how test-
ing is conducted. For example, in a phased process, most testing occurs after system require-
ments have been defined and then implemented in testable programs. In contrast, under an Agile
approach, requirements, programming, and testing are often done concurrently.
Tests are performed to ensure that all internal operations of the software are per-
formedaccording to the specifications of the client. This is called White box testing.
White-box testing(also known asclear box testing,glass box testing,transparent box test-
ing, andstructural testing) is a method of testingsoftwarethat tests internal structures or workings
of an application, as opposed to its functionality (i.e. black-box testing).
Testsareperformedtoensurethateachfunctionisworkingproperly.Thisisreferredtoas Black
box testing. Black-box testingis a method of software testingthat examines the functionality of an
application (e.g. what the software does) without peering into its internal structures or workings.
This method of test can be applied to virtually every level of software test-
ing:unit,integration,systemandacceptance.Ittypicallycomprisesmostifnotallhigherlevel testing, but
can also dominateunit testingas well. Test cases are built around specifications and requirements,
i.e., what the application is supposed to do. Test cases are generally derived from external de-
scriptions of the software, including specifications, requirements and design parameters. Alt-
hough the tests used are primarilyfunctionalin nature,non-functionaltests may also be used.The
test designer selects both valid and invalid inputs and determines the correct output with-
outanyknowledgeofthetestobject'sinternalstructure.Testingisconductedinthesystemso thatthefunc-
tionsnamelyLogin,Making,searchingthenearestdonor,gettingroutestothenearest blood banks etc.
are done properly.
TESTING STRATEGY
Condition Testing
Test cases are derived to determine whether the logic conditions and decision statements
are free from errors. Condition testing strategy is used to check if the operators used are correct
and to verifyconditions such as ifan errormessageis displayed ifanon-registered useris signed in
to the application, or a user is registered without providing his email, address or full name.
Loop Testing
Unit Testing
This testing is performed to test the individual units in the system. Each module in the
systemistestedindividuallyandexecutedlinebylineforaccuratefunctioningofthesystem.The ap-
pointment part of the user module has been tested for its proper functioning, since it’s the core
part of the application.
IntegrationTesting
Theobjectiveofintegrationtestingistotakealltestedindividualmodules,integratethem, test
them again and develop the system. The user module, the appointment module as well as the
doctor & admin should be integrated together for the proper functioning of the whole system.
Testingisconductedatthisstagetocheckwhethertherequestedactionhascompletedsuccessfully and
changes are affected properly at both the doctor and admin modules.
AcceptanceTesting
This testing is performed to ensure that the functional, behavioural, and performance re-
quirements of the system is met. It may involvephysical tests orperformance tests. The ac-
ceptance test suite is run against the supplied input data or using an acceptance test script to di-
rect the testers. Then the results obtained are compared with the expected results. If there is a
correctmatchforeverycase,thetestsuiteissaidtopass.Ifnot,thesystemmayeitherberejected or accept-
ed on conditions previously agreed between the sponsor and the manufacturer. The objective is
to provide confidence that the delivered system meets the business requirements of both sponsors
and users. The acceptance phase may also act as the final quality gateway, where any quality de-
fects not previously detected may be uncovered. The system is implemented after all these
checks and validations.
SYSTEM IMPLEMENTATION
System implementation is the final stage of software development life cycle. For the suc-
cessful implementation and cooperation of new systems users must be selected, educated and
trained. Unless the users are not trained, the system will become complex and it will feel as a
burden for them. Aproduct software implementation methodis a systematically structured ap-
proach to effectively integrate software based service or component into the workflow of an or-
ganizational structure or an individual end-user. A product software implementation method is
ablueprinttogetusersand/ororganizationsrunningwithaspecificsoftwareproduct.Themethod is a set
of rules and views to cope with the most common issues that occur when implementing a soft-
ware product: business alignment from the organizational view and acceptance from human
view. It is stated that the implementation of (product) software consumes up to 1/3 of the budget
ofasoftwarepurchase.Thecomplexityofimplementingproduct softwarediffersonseveral issues. Ex-
amples are: the number of end users that will use the product software, the effects that the im-
plementation has on changes of tasks and responsibilities for the end user, the culture and the in-
tegrity of the organization where the software is going to be used and the budget available for
acquiring product software.
The implementation stage of the system begins by preparing a plan for implementation of
the system. According to this plan, activities are to be carried out, discussions are made regard-
ing the equipment to be required and resources and additional facilities required to implement the
system.Themostcriticalstageinachievingasuccessfulsystemisbygivingusersconfidencethat the sys-
tem will work based on their requirements and be effective. This method also offers the greatest
securities since the old system can take over if the errors are found or inabilityto handle certain
type of transactions while using the new system.
Careful planning.
SYSTEM MAINTANANCE
Corrective maintenance is done to repair the faults ordefects found in day–to–day system
functions, that is software design, logic and coding errors. Adaptive maintenance is the imple-
mentation of changes in a part of the system which has been affected by changes that occurred in
someotherpartofthesystem. Theobjectiveofperspectivemaintenanceshould beto prevent failures
and optimizethesoftware. Minor adaptive changes should behandledbynormal maintenance pro-
cess. Major adaptive changes should be carried out as a separate development project.
SYSTEM SECURITY
Any system developed should be secured and protected against possible hazards. Security
measures are provided to prevent unauthorized access of various levels. An uninterrupted supply
should be provided, so that the power failure or voltage fluctuations will not erase the data in the
files or database. Data security is the practice of keeping data protected from corruption and un-
authorizedaccess.Thefocusbehinddatasecurityistoensureprivacywhileprotectingpersonal orcorpo-
ratedata.Dataistherawformofinformationstoredascolumnsandrowsinourdatabase, networkserver-
sandpersonalcomputers.Authorizationensuresthatthelogged-inuserisallowed to use a page or per-
form an operation. Authorization is typically based on one or more roles (sometimes called
groups) to which the user belongs. Password protection and simple procedure tohidetheirperson-
aldataareprovidedtotheusersasapartofthesecurityobjectives.Thesystem allows the users to use the
app onlyafter signing in using their username and password provided during registration.
The admin is well protected by a password and username since all services are controlled
bythe admin, anyintrusion in to the admin can cause damage or a failurein the system. Theuser
can only access the service but can’t modify any. Each user is treated individually and can’t in-
terrupt to the details of another user account and make changes or modifications hence the activi-
ty of each single user is well protected and secured.
CHAPTER-6
CONCLUSION
CONCLUSION
Making clinic appointments shouldn’t be hard, but often due to the manual way of making ap-
pointments, patients findit’shardtomakeappointmentswiththeirdesireddoctor.Oftenpatients have
to wait in long queues and yet sometimes they won’t be able to book their appointments. Clinic
Appointment System is an easy solution for such patients. They don’t have to wait in endless
queues or ask someone to do them a favor, because Clinic Appointment system has everything
they need to make an appointment with their desired doctor. Clinic Appointment System comes
with a clean and responsive interface, so that user can make appointments from every device, all
they need is an internet connection.
From the hospital/clinic point of view, they often fail to satisfy the needs of their pa-
tients/customers. Sometimes, a staff may need to take a leave and it may cause the whole ap-
pointmentproceduretogodown.WiththenewClinicAppointmentSystem,alltheyneedtodo is de-
ploythe application to their web server and theyare done. Once the administrator has added all
the departments and doctors list, patient can book their appointments by visiting the system. No
need of a third person to process the request.
Clinic Appointment System also provides doctors an account to in teract with their pa-
tients. Now doctors can easily send prescriptions online, or see their patient details in advance or
even better, they can cancel/ put the appointment to the pending list. Patient on the other side,
don’t have to worry about losing his/her prescription since it’s stored in the hospital’s servers.