Professional Documents
Culture Documents
Design and Implementation of Stadium Management System
Design and Implementation of Stadium Management System
By
SUPERVISOR:
DECEMBER 2023
DECLARATION
DATE: ………………………..
i
ACKNOWLEDGMENT
First and foremost, we would like to extend our sincere appreciation to our
supervisor, Dr. Eli Fianu, for their invaluable support throughout this project. Their guidance,
knowledge, and encouragement have played a crucial role in our success. We are truly
grateful for their mentorship.
Furthermore, we would like to express our gratitude to God for His blessings and
guidance, which have been a constant source of inspiration and strength.
We would also like to acknowledge the significant contribution of our esteemed
colleague during the implementation stage. Their support and encouragement have been
greatly appreciated.
Lastly, we would like to convey our profound gratitude to our parents for their
unwavering support throughout our academic journey and this project. Their love and
dedication have been instrumental in our accomplishments.
ii
TABLE OF CONTENTS
Title Page
Declaration i
Acknowledgment ii
Table of contents iii
List of tables vi
List of figures vi
Abstract vii
Chapter One: Introduction 1
1.1 Background to Study 1
1.2 Statement of the Problem 3
1.3 Aim & Objectives 3
1.4 Significance of the Study 4
1.5 Organization of the Study 4
iii
Chapter Three: Methodology, System Specification and Design 15
3.1 Overview 15
3.2 Choice of System Development Method 15
3.2.1 Feature Driven Development 15
3.3 System Analysis 17
3.3.1 Requirement Capturing Techniques 17
3.3.1.1 Functional Requirements 18
3.3.1.2 Non-Functional Requirements 18
3.4 Target Computer System Requirements 19
3.5 System Design 19
3.5.1 Use case diagram 20
3.5.2 Data flow diagram 22
3.5.3 Sequence diagram 23
3.5.4 Database diagram 24
3.6 System Architecture 25
3.7 Conclusion 25
REFERENCES 38
Appendix A: Installation guide and System Requirements 41
Appendix B: Sample Codes 46
iv
LIST OF TABLES
v
LIST OF FIGURES
vi
ABSTRACT
This project aims to develop a computerized patient data management system that
efficiently stores and manages patient information, including medical history, test results, and
treatment plans. The system will feature an intuitive and user-friendly interface, allowing
healthcare professionals to easily access and update patient data. Additionally, a patient portal
is implemented, enabling patients to conveniently view their records and track their health
progress over time. The primary aim is to develop an efficient patient data management
system for healthcare professionals. The system is developed using Feature Driven
Development methodology and utilizes various development tools including HTML, CSS,
JavaScript, and PHP. This project aims to create an efficient and user-friendly patient data
management system for healthcare professionals. The system allows for seamless storage,
retrieval, and management of patient information, enhancing the overall healthcare
administration process.
vii
CHAPTER ONE
INTRODUCTION
1
The advancement in innovative medical technology and global warming has led to an
increase in the amount of medical data generated. This increase in medical data has made
traditional patient data management systems like paper-based records and cabinets obsolete
(Ibrahim et al, 2018).
Patient data management systems have become increasingly important in healthcare
systems around the world. They can store and analyze large amounts of medical data securely
and efficiently, improving the delivery of services and patient outcomes ( World Health
Organization, 2012).
The use of paper is still prevalent for managing individual patient information at the
national level, some countries have started to collect individual patient information to build
longitudinal medical records. The United Kingdom has adopted a national system, while
several European countries, such as Denmark, France, and Germany, make extensive use of
electronic health records (World Health Organization, 2012).
Charles and Ricky (2019) stated that a research team in Pakistan has shown that 50%
of patients were unlikely to receive timely care in selected hospitals due to the inability to
retrieve their records within an hour.
According to Eric et al (2019), in many developing countries, appropriate and well-
functioning Health Information Systems (HISs) are either not available or fail to scale or be
sustained. This can lead to challenges in healthcare delivery, such as inefficient use of
resources, lack of access to medical care, and poor health outcomes. Dillys (2018) points out
that West African countries do not have access to readily available and current healthcare
information systems, which hinders their ability to provide proper and efficient healthcare. In
Nigerian hospitals, physicians are unable to trace the medical history of their patients due to
the absence of electronic patient records (Dillys, 2018).
In Sierra Leone, as in many other countries, healthcare is faced with a growing demand
for medical treatment and services. It is essential that medical records appropriately capture
all of the patient’s medical history to ensure proper treatment and care (Ibrahim et al, 2018).
Dillys (2018) confirms that in Ghana, most district government hospitals still use paper-
based systems in the delivery of healthcare to their clients due to the absence of electronic
health systems. This means that physicians and healthcare providers in these hospitals do not
have access to electronic patient records, which can lead to difficulties in tracing the medical
history of their patients.
Research conducted by Matthew (2023) shows that a scientific study was done in four
premier Ghanaian hospitals, namely Komfo Anokye Teaching Hospital (KATH), Korle-Bu
2
Teaching Hospital (KBTH), Tamale Teaching Hospital (TTH) and Effia Nkwanta Regional
Hospital (ENRH). The study revealed that KATH and Asamankese Government Hospital
were partly ready and had an EHR system in place, whereas the other hospitals either had no
EHR system, were not ready for it, or were in the process of applying it.
This project will involve the design and implementation of a computerized patient data
management system that will be able to store, locate, retrieve, and manage patient
information, including medical history, diagnoses, test results, and treatment plans. The
system will ensure that patient information is accurate, up-to-date, and easily accessible to
healthcare providers. The system will also provide patients with secure access to their
medical records, allowing them to view their health information. The patient data
management system will improve the quality of care and patient outcomes by enabling
healthcare providers to make informed decisions about patient care and treatment.
3
To test the module to ensure that it accurately displays patient information and updates in
real-time
To implement a portal that patients can use to view their records and track their health
progress over time.
4
CHAPTER TWO
LITERATURE REWIEW
2.2 The Role of Data Sources in Enhancing Patient Data Management Systems
Data sources refer to the various types of data that are collected and stored in a
particular system or database (Anna, 2023). In the context of patient data management
systems, data sources typically include electronic health records (EHRs), medical imaging
data, laboratory test results, patient-generated health data (PGHD), and other types of clinical
and administrative data
Electronic medical records (EMRs), which are sometimes referred to as electronic
health records (EHRs), are a major source of clinical data in patient data management
5
systems. Although there are subtle differences between EMRs and EHRs, both types of
records contain important information about a patient's health history, including diagnoses,
medications, allergies, and other clinical data (Pieter et al, 2019). According to Ajami (2013),
electronic medical records (EMRs) have been described as an important tool to reduce
medical errors and improve information sharing among physicians. According to Pieter et al
(2019), electronic medical records (EMRs) contain various sources of data that are relevant to
data science. These data sources include laboratory values (tabular data), medical imaging
(audiovisual data), and physicians' written notes (semi-structured or free text). By integrating
information from multiple sources, EMRs provide a more complete picture of a patient's
health status and can help healthcare providers make informed decisions about patient care.
A laboratory information system (LIS) is a software system that is another source of
Patient data management system that is designed to manage laboratory workflows and data,
including patient samples, test orders, and test results. One of the primary functions of LIS is
to manage the process of sending laboratory test orders to lab instruments, tracking those
orders, and recording the results in a searchable database (Association of Public Health
Laboratories 2018 and Kyle et al, 2020). Laboratory information systems (LIS) are
particularly useful in public health institutions, such as hospitals and clinics, where there is a
high volume of laboratory data that needs to be managed and analyzed (Park et al, 2012).
Radiology information systems (RIS) were introduced earlier than electronic medical
records (EMRs) and were designed to support the efficient ordering and scheduling of
radiology procedures. RIS was later integrated with picture archiving and communication
systems (PACS) to improve workflow efficiency in radiology departments (Nance et al,
2013). Radiology generates a large volume of medical images, such as X-rays, CT scans, and
MRIs, which can be used to diagnose and treat patients.
6
2.3.1 The Internet of Things
IoT is a network of interconnected objects that are often intelligent, and these objects
can communicate with each other and share data via the Internet (Jordi, 2017; Rachida et al,
2022; Musa et al, 2020). Irina et al. (2020) note that in the medical sector, IoT is typically
referred to as IoMT, which has revolutionized the healthcare industry with the development
of remote healthcare systems that offer social benefits, improved perception, and effective
disease diagnosis. Combining IoT with Machine Learning (ML) enhances the effectiveness of
health monitoring systems, with pre-programmed medical solutions being used before human
intervention (Irina, 2020 )
Wearable internet of things (WIoT) is increasingly being used in the healthcare system
to monitor and analyze patients' health. WIoT devices, such as fitness trackers, smartwatches,
and other wearables, can collect a wide range of data on a patient's vital signs, physical
activity, and other health metrics ( Paul Singh and Pethuru, 2017 ). Iman et al. (2018) suggest
that IoT-based applications are expanding the boundaries of healthcare beyond traditional
settings.
The infrastructure of the Internet of Medical Things (IoMT) involves various types of
communication technologies and online networks, as described by Rachida et al. (2022).
These technologies include sensors, wireless communication protocols, and cloud computing
systems, which enable the collection, transmission, and analysis of medical data from various
sources. Rayat and Pathan (2018) explain that invasive and non-invasive devices can collect
patient information, reducing the time for doctors to engage with the patient's diagnosis and
frequency of hospital visits. When these devices collect sufficient patient information, they
can help doctors make more accurate diagnoses and develop personalized treatment plans.
2.3.2 Blockchain
Blockchain is a technology designed to ensure transparency and accountability in the
management of electronic data. Blockchain technology can be used in the health sector to
ensure transparent and immutable record keeping for various transactions, such as purchasing
and shipping of medical equipment and pharmaceuticals, and tracking personnel permissions
and access to facilities, medical records, or other health data (OECD, 2020).
According to Abid et al (2021), blockchain technology can ensure the confidentiality of
patient records and provide a secure and tamper-proof way to store medical history that
cannot be modified retroactively. This makes blockchain a promising technology for
managing sensitive health data and ensuring patient privacy.
7
Shangping et al (2019) found that sharing personal health records on the cloud server
can result in tampered or partially qualified encrypted records being returned to users,
potentially misleading doctors, research institutions, or other patients into making false
judgments that may endanger lives. As noted by Shangping et al (2019), the emergence of
blockchain technology provides a new way to address the challenges of key management and
distribution. By using blockchain for these purposes, key management and distribution can be
made easier and more secure, which can help ensure the privacy and security of sensitive
health data.
Azaria et al (2016) developed a novel medical data management system that utilizes
blockchain technology to enable patients to easily access their medical information across
multiple providers and medical sites. According to Saeed (2021), the global market for
blockchain technology has been expanding steadily since 2016.
8
enhance patient care. In this section essay, we will explore four key types of patient data
management systems: Electronic Health Records (EHRs), Personal Health Records (PHRs),
Health Information Exchanges (HIEs), and Clinical Data Warehouses (CDWs).
9
health services. This platform enables patient-provider information sharing and collaboration,
intending to improve healthcare outcomes and reduce costs
Archer et al. (2011) explain that the functionalities available through PHRs are
intended for patients to use, rather than providers. These functionalities include appointment
scheduling, prescription refills, and secure messaging.
2.5.1 Confidentially
Confidentiality refers to preserving authorized restrictions on information access and
disclosure, including means for protecting personal privacy and proprietary information
(William and Lawrie, 2015). Individuals have the right to access their health records and, in
limited circumstances, to access information about other people. This is typically governed
by laws and regulations that dictate who can access health information, under what
circumstances, and for what purposes ( Aaron, 2022 ). These laws and regulations are
designed to protect the privacy and confidentiality of health information while also
ensuring that individuals have access to their health information for purposes such as
treatment, research, and legal proceedings.
According to Aaron (2022), patients have the right to privacy and confidentiality, and
they expect the NHS to keep their confidential information safe and secure. Patients also
have the right to request that their confidential information is not used beyond their
treatment. The Health and Care Act 2022 includes measures concerning the collection and
sharing of health and care data. Health or social care professionals may be required to share
10
confidential patient information in line with the public interest or when they are legally
required to do so, irrespective of a patient's consent (Aaron, 2022).
Iwani et al. (2014) state that the mismanagement of patient records is closely linked to
the abuse of patient information. Improper security measures can lead to the misuse of
patient records, which can result in violations of privacy and confidentiality. Federal
agencies in the UAE recognize the significance of maintaining private and secure online
health data and prohibiting unauthorized access or improper sharing of such data. (Wegdan
et al., 2020).
2.5.2 Integrity
Integrity in patient data management refers to the accuracy and completeness of data
associated with an individual patient. Patient identity integrity involves correctly pairing or
linking all records of that individual across information systems, enabling patient record
matching. (HIMSS, 2016).
Patient allergy information is an example of an asset with a high requirement for
integrity. As noted by William and Lawrie (2015), inaccurate or incomplete information
about a patient's allergies could result in serious harm or even death, not to mention
significant legal and financial liability for the hospital or healthcare provider. Ensuring the
accuracy and integrity of this information is therefore critical to providing safe and effective
patient care.
According to the World Health Organization (2021), health information management
professionals should be aware that the privileges of public health do not extend to the
protection of the integrity and availability of data. Ensuring the accuracy, confidentiality, and
availability of health information is critical to providing safe and effective patient care, and
must be a top priority for those working in this field. According to Pramila (2021),
implementing the International Data Encryption Algorithm (IDEA) and comparing it with
AES256 (Advanced Encryption Standard 256-bit) can help safeguard the integrity and
privacy of patient data.
According to Pramila (2021), several measures can be taken to protect data integrity,
including access controls, backups, and other security measures. Additionally, data validation
and error checking can help ensure that data is accurate and reliable, while data redundancy
can help prevent data loss in the event of a system failure or other unexpected events.
2.5.3 Availability
11
Availability is an important aspect of security in patient data management systems.
Ensuring that patient data is available when it is needed is critical to providing safe and
effective patient care (Pramila, 2021). This can be achieved through measures such as
backups, disaster recovery planning, and redundant systems, which can help ensure that
patient data remains available even in the event of a system failure or other unexpected event.
Load balancing and caching can also be used to distribute the workload across multiple
servers, reducing the risk of downtime due to system overload. Monitoring and alerting
systems can help identify and address issues before they impact the availability of patient
data, and regular maintenance and updates can help ensure that systems are functioning
properly (Lina et al, 2017).
12
2.7 Challenges in Implementing Patient Data Management System
According to Thokozani (2020), several factors can impede the successful
implementation and scale-up of electronic health information systems (EHIS). These factors
include the complexity of the intervention and a lack of technical consensus, limited human
resources, poor leadership, insufficient finances, staff resistance, and lack of management
Thokozani (2020) highlights that the complexity of electronic health information
systems (EHIS) and a lack of consultation are key barriers to implementation in low- and
middle-income countries (LMICs). Without proper consultation, it can be difficult to ensure
that EHIS is tailored to the specific needs and contexts of LMICs, and this can result in
systems that are overly complex and difficult to use. According to Gavin (2012), in Rwanda,
the interfaces between existing and new electronic health information systems (EHIS) have
been identified as inhibitors to implementation. This is due to the challenges of capturing
patient information into the computer, which can be hindered by bandwidth requirements in
health facilities.
Daniel et al (2014) found that in Asia, incapacitated human resources and a shortage of
IT skills were identified as inhibiting factors to electronic health information system (EHIS)
implementation. In Iran, the lack of users' knowledge about the system and how to work with
it were identified as the barriers to EHIS implementation. Daniel et al (2014) found that EHIS
implementation can be costly due to hardware, software, maintenance, training, and human
resource investment. Cost is a main constraint to the adoption and implementation of EHIS.
Running costs and political will are prerequisites for sustaining EHIS.
According to Wegdan et al (2020), the poor public healthcare system with ever-
changing policies is a hindrance to the successful implementation of electronic health
information systems (EHIS) in low- and middle-income countries (LMICs).
Alex et al (2017) found that Leon et al used a framework to assess the health system
challenges to scaling up mobile health (m-Health) in South Africa and identified a weak
information and communication technology (ICT) environment and limited implementation
capacity within the health system. In Asia, incapacitated human resources and a shortage of
IT skills are inhibiting factors to electronic health information systems (EHIS)
implementation. In Iran, a lack of users’ knowledge about the system and how to work with it
are barriers (Daniel et al, 2014).
13
Chapter Two of the literature review provides an overview of patient data management
systems, including the role of data sources, emerging technologies, and types of systems. The
chapter also discusses key concepts of security, such as confidentiality, integrity, and
availability, and the challenges in implementing patient data management systems. The
chapter highlights the importance of investing in IT infrastructure, providing training and
support to healthcare providers and users, and ensuring the security of patient data to improve
the implementation and sustainability of patient data management systems.
14
CHAPTER THREE
3.1 Overview
This chapter gives a big-picture view of how the patient management system is
designed. To make sure it meets the needs of users and stakeholders, a systematic approach is
followed during its development. The chapter goes into detail about the different steps
involved, like gathering requirements, analyzing the system, and designing it. It also
emphasizes both the functional and non-functional requirements of the system, taking into
account the needs of both users and the system itself.
15
approach allows us to focus on the specific features that are crucial for the system's success.
For instance, the user can prioritize features such as patient registration, medical history
tracking, appointment scheduling, and billing. By breaking down the system into these
individual features, we can ensure that each aspect is developed effectively and meets the
unique needs of the healthcare environment.
Another advantage of FDD is its emphasis on team collaboration. With FDD, we can
assign specific features to different teams or individuals, promoting efficient development
and accountability. For example, one team can be responsible for patient registration, while
another team focuses on medical history tracking. This collaborative approach ensures that
each feature receives dedicated attention and expertise, leading to a more robust and well-
rounded patient data management system.
FDD also places great importance on progress tracking and regular inspections. This
allows us to closely monitor the development of each feature, ensuring that they are
completed on time and meet the desired quality standards. For instance, we can track the
progress of the appointment scheduling feature and make any necessary adjustments along
the way. This level of oversight helps us maintain a high level of quality and ensures that the
system is meeting the needs of healthcare providers and patients alike.
One of the key strengths of FDD is its adaptability. In the healthcare industry,
regulatory requirements and technological advancements are constantly evolving. FDD
allows us to easily accommodate these changes and adjust our development approach
accordingly. Whether it is incorporating new regulations or integrating innovative features,
FDD provides the flexibility needed to keep the patient data management system up to date
and in compliance with industry standards. Figure 3.1 displays the diagram of FDD
16
Figure 3.1 FDD diagram
17
3.3.1 Requirements Capturing Techniques
To gather these requirements, a variety of techniques were used. Questionnaires and
surveys were created to collect information from different people involved, helping us
understand their preferences, priorities, and any specific features they wanted in the
application. Additionally, short interviews were conducted with some of the staff at Accra
Police Hospital, allowing for more in-depth conversations and the gathering of specific
requirements directly from the people who will be using the application. By using a
combination of questionnaires, surveys, and interviews, a comprehensive set of requirements
was able to be gathered, which will guide the development of the web application.
18
Ease of use - The views and operations should be easy to use and natural. The system
should also allow the admin to easily create and maintain staff details.
Performance - The system must operate at a reasonable speed both when using and
accessing some data and information from the database.
Portability - The system should be able to run in different environments such as
Windows, MacOS, and Unix OS-based systems.
System and browser compatibility - The system should be compatible with various
browsers such as Google Chrome, Safari, Mozilla Firefox, Windows Internet Explorer,
Windows Edge, Opera Mini, etc
3.4 Target Computer System Requirements
This section considers the requirements that must be met by the target system to
enable the developed software application to function as required. Table 3.1 gives the
minimum requirements needed by any computer to deploy the system.
Component Requirement
19
User Roles
appointments.
the visit
by the doctor
20
Figure 3.2: Administrator’s Use Case Diagram
21
Figure 3.5: OPD Nurse Use Case Diagram
22
A data flow diagram is a visual representation of how data moves within a
system. It shows how information is input, processed, and outputted. Figure 3.7
specifically displays a data flow diagram that illustrates the flow of data within the
system.
A sequence diagram is a type of diagram used system. It shows the flow of messages
or actions between these objects over a specific period. Figure 3.8 displays a sequence
diagram that illustrates the order of actions within the system
23
Figure 3.8: Sequence Diagram
24
foreign key in the specialization table which in turn consists of all the specializations in the
hospital. The reception table, OPD table, and pharmacy table hold the login information for
user reception, OPD, and pharmacy respectfully. The hospital table takes care of information
about other hospitals if there should be a need to contact other hospitals or to transfer a
patient. Finally, the admin table has information about the administrator of the system.
System architecture refers to the overall design and structure of a system. It defines
how different components, modules, and subsystems of a system are organized and interact
with each other to achieve the desired functionality. It includes the hardware, software,
network, and other infrastructure components that make up the system. Figure 3.10 displays
the system architecture of this particular system, showing how all the different parts fit
together.
25
3.7 Conclusion
In this chapter, the approach taken to build our system and the reasons for choosing it
were discussed. The technique used to gather requirements for the system, including both
functional and non-functional requirements, was also explored. To visually represent the
functionality of the system, a use case study diagram and a data flow diagram were presented.
Additionally, in the system design section, diagrams for the system's architecture, database
structure, and sequence diagram were provided.
CHAPTER FOUR
SYSTEM IMPLEMENTATION
4.1 Introduction
This chapter explores the implementation phase of the Patient Data Management
System. During implementation, the detailed design outlined in the previous chapter is
transformed into a functional program, along with its supporting activities. The main
objective is to create a working program that meets the project's requirements. Developers
face various challenges during implementation. Successful execution relies on collaboration,
coordination, and thorough testing. Once implemented and tested, the system can be
deployed to effectively manage patient data and support healthcare operations.
26
identifying reusable code segments, creating modular and flexible code structures, and
documenting code libraries for easy access and integration.
Integration: Integration presents a complex challenge in the realm of patient data
management systems. Ensuring seamless communication and functionality between
different components or systems is of utmost importance. This involves designing and
implementing well-defined interfaces, handling data exchange formats, and addressing
compatibility issues.
4.3.1 HTML
HTML, or Hypertext Markup Language, is a fundamental web technology that helps
structure and organize the content of web pages. It uses tags and elements to define different
components like headings, paragraphs, images, links, and more. HTML provides the
foundation for creating the structure and layout of a website, allowing developers to easily
organize and present information. It is the backbone of the web and is essential for creating
web pages that are accessible, user-friendly, and visually appealing.
4.3.2 CSS
CSS, or Cascading Style Sheets, is a powerful tool that complements HTML in web
development. It allows for the customization and styling of HTML elements, enhancing the
visual presentation of a website. With CSS, developers can define colors, fonts, layouts, and
other visual aspects, making web pages more visually appealing and engaging for users. By
separating the content and design, CSS enables easier maintenance and consistent styling
across multiple web pages. Overall, CSS is a valuable addition to HTML in creating
attractive and well-designed websites.
4.3.3 MySQL
27
MySQL is widely used as a relational database management system (RDBMS). It is
known for its reliability, scalability, and performance. Structured data can be efficiently
stored and managed with MySQL, making it ideal for applications that require a robust and
organized data storage solution. With MySQL, databases can be created, updated, and
queried using SQL (Structured Query Language), which is a standard language for managing
relational databases. It is a powerful tool for building dynamic websites and applications that
require efficient data management capabilities.
4.3.4 PHP
PHP, which stands for Hypertext Preprocessor, is a popular server-side scripting
language used for web development. It is widely recognized for its versatility and ease of use.
PHP allows developers to embed dynamic content within HTML pages, making it possible to
create interactive and dynamic web applications. With PHP, you can perform tasks such as
processing form data, interacting with databases, and generating dynamic web pages. It is a
powerful tool for building dynamic and interactive websites that can deliver personalized and
engaging user experiences.
28
Figure 4.1 Homepage
Login Page: In Figure 4.2, the login page of the system is displayed. The login page
serves as the initial entry point for users to access the system. It typically includes
input fields for users to enter their credentials, such as a username and password. By
using the login page, authorized access to the system is ensured, providing an added
layer of security.
Admin Dashboard: In Figure 3.4, the admin dashboard is displayed, showcasing features
such as the management of doctors' accounts, the handling of the OPD, pharmacy
management, and the management of reception accounts. This allows for efficient
administration and control of these important aspects of the system.
29
Figure 4.3: Admin Dashboard
View Doctors Page - In Figure 4.4, a list of doctors' accounts added by the admin is
shown. Furthermore, there is a button available for the admin to click, enabling the
editing and deletion of these accounts. This allows for efficient management and
maintenance of the doctor accounts.
4.5 Testing
Testing is a process used to evaluate and verify the functionality, performance, and
quality of a software or system. It involves running various tests to identify any issues,
defects, or errors in the system. The goal of testing is to ensure that the software or system
meets the desired requirements and functions correctly.
30
Unit testing - Unit testing is a super important part of software development. It is all
about testing those small, isolated pieces of code to make sure they behave as expected.
By identifying any issues early on, it helps improve the overall quality of the application.
Integration testing - In integration testing, the already tested units are combined into a
component, and the interface between them is tested. Components, in this case, refer to
integrated aggregates of more than one unit. In a realistic scenario, many units are
combined into components, which are then aggregated into larger parts of the program.
The goal is to test the combination of pieces and eventually expand the process to test
modules with those from other groups. Integration testing can be performed using various
approaches, including the top-down, bottom-up, and umbrella approaches. In the
software's integration testing, satisfactory results were achieved using the bottom-up
approach.
System testing - In system testing, the final software product is used and tested in the
host environment it was designed for. To achieve this, our system was deployed onto a
WAMP server, and certain functionalities were tested. The testing was carried out by
users who played no role in the coding and had no prior knowledge of how the system
worked. It allowed us to assess the system's performance and functionality in a real-world
setting.
31
Test Title: Account Login
Test Priority: High
Purpose: To verify that users can successfully access the system
Step Description Test Data Expected Actual
Results Results
1 Go to the login page Load the login True
page
2 Enter your email Email:
address Samueloppong123@gmail
.com
3 Enter your password Password: ********
Add a user
Test case ID: User01
Test Title: Add user to the system
Test Priority: High
Test purpose : To verify that user can be successfully added to the system, allowing
them to access and use system functionalities.
Step Description Test Data Expected Actual
Results Results
1 Login to the system Username and password Admin page True
as an admin
2 Navigate through
different sections
such as Doctors,
Pharmacy,
Receptionist, OPD,
and Patients.
3 Click on the "add
32
user" button in the
chosen section to add
a user.
4 Enter the user Email, Full name, Phone
credentials number, and password
5 Click on the save Successful True
button addition of new
user to the
system
Table 4.3: Test case – User01
When the doctor’s section is clicked on by the admin to add a new doctor, the interface
in Figure 4.5 will be displayed. The interface will show fields where the doctor's information
can be entered, such as name, email, phone number, and password.
Remove user
Test case ID: User01
Test Title: Remove user from the system
Test Priority: High
Test purpose : to verify that the system successfully removes the user's account and
associated data, ensuring that the user no longer has access to the system functionalities.
Step Description Test Data Expected Actual
33
Results Results
1 Login to the system Username and password Admin page True
as an admin
2 Navigate to the
section where the
user is located (e.g.,
Doctors, Pharmacy,
Receptionist, OPD,
Patients)
34
Doctors, Pharmacy,
and Receptionist
3 Access the list of The admin can True
users and click on the view and edit
specific user you account
want to modify information
Table 4:5: Test case – edit01
4.6 Conclusion
During the system implementation phase discussed in chapter four, we encountered
various challenges that required careful consideration and problem-solving. These challenges
included code-reuse, integration, and optimizing performance. Web application technologies
such as HTML, CSS, and JavaScript were utilized for front-end development, while PHP and
MySQL were used for back-end database management. The interface was designed to be
dynamic and user-friendly, and snapshots were included to showcase its intuitive design and
functionality. Testing played a crucial role in ensuring reliability, with a comprehensive plan
encompassing manual and automated techniques.
35
CHAPTER FIVE
5.1 Summary
The goal of creating a system that easily manages patient information in the health
industry was successfully achieved. The system was deployed and hosted on a personal
computer running the WAMP Server, and all the different pages and modules of the system
were thoroughly tested.
To build the system, the Iterative Model of the Software Development Life Cycle
(SDLC) was followed. This model focuses on starting with a simplified implementation and
gradually adding complexity and features until the final system is completed. Five steps were
followed: Planning Phase, Analysis and Design Phase, Implementation Phase, Testing Phase,
and Evaluation Phase.
During the Planning Phase, a lot of planning was done to map out the specifications and
get ready for the upcoming stages. Then, in the Analysis and Design Phase, the logic of the
system was carefully analyzed, and the technical requirements were determined.
The most exciting part was the Implementation Phase, where the actual coding took place.
After that, the Testing Phase was carried out to thoroughly test each module of the system
and identify any bugs or issues. Finally, in the Evaluation Phase, the entire system was tested
to ensure that it met all the requirements.
5.2 Recommendations
36
After considering the results and difficulties encountered during the patient data
management system project, the few suggestions that can be made for future projects include:
Support for Laboratory: It would be beneficial to include a feature that supports laboratory
operations within the system. This could involve integrating lab test results and related
information into the patient records.
Admitted Patients ward: Consider incorporating a module specifically for managing the
details and status of patients admitted to the hospital. This would allow for better tracking and
organization of patient care.
Name of Doctor who checked patient: Including the name of the doctor who checked a
patient can help improve accountability and provide a comprehensive record of the medical
professionals involved in the patient's care.
Security improvement: Enhancing the security measures within the system is crucial to
protect sensitive patient information. This could involve implementing stronger
authentication methods, encryption techniques, and regular security audits.
Improvement on user dashboard: Enhancing the user dashboard can greatly improve the
overall user experience. This may include streamlining the interface, adding personalized
features, and providing easy access to important information.
Backup and restore of the database: Implementing a reliable backup and restore
mechanism for the database is essential to prevent data loss in case of system failures or
accidents. This ensures that patient information remains safe and accessible.
Transfer of patient information: Consider adding a feature that allows for the seamless
transfer of patient information between different healthcare providers. This can improve
continuity of care and facilitate smooth transitions for patients.
37
REFERENCES
1. Charles, A., & Ricky, L. (2016). Health Records Management Practices in Ghana:
An Exploratory Study. Journal of Development Research, 6(11), 10145-10149.
http://www.journalijdr.com
2. Duncombe, R., & Heeks, R. (2005). Information & Communication Technologies
(ICTs), Poverty Reduction and Micro, Small & Medium-scale Enterprises.
https://www.researchgate.net/profile/Richard-Heeks-2/publication/240642001_Infor
mation_Communication_Technologies_ICTs_Poverty_Reduction_and_Micro_Smal
l_Medium
scale_Enterprises_MSMEs/links/0046353c69924ed60d000000/Information-
Communication-Technologies-ICTs-Poverty-Reduction-and-Micro-Small-Medium-
scale-Enterprises-MSMEs.pdf?origin=publication_detail
3. Matthew, F.A. (2023). ‘Impact of Electronic Health Record System (EHRs) on
Healthcare Quality at Asamankese Government Hospital, Ghana. Gen Surgery Clin
Med Journal, 1(1), pp. 1-21.
https://www.opastpublishers.com/open-access-articles/impact-of-electronic-health-
record-system-ehrs-on-healthcare-quality-at-asamankese-government-hospital-
ghana.pdf
4. Chris, B. (2023). ‘What is a Health Information System’ Data Protection 101, 8th
May. Available at : https://www.digitalguardian.com/blog/what-health-information-
system
38
5. WHO (2012) Management of patient information trends and challenges in member
states. Available at: https://www.afro.who.int/publications/management-patient-
information-trends-and-challenges-member-states
6. Lorkowski, J. And Pokorski, M. ( 2022) ‘Medical Records: A Historical Narrative.
Journal of Biomedicine, 10, pp. 25-94. http://: doi.org/10.3390/
biomedicines10102594
7. Ibrahim, I, A, S., Joshua, J, H, K., & Albert, K. (2019) A Computerized Patient’s
Database Management System. International Journal of Computer Science and
Information Technology, 6(2), .6-10. http//:www.researchpublish.com
8. Eric, A, G., Petter, N., & Johan, I, S., (2019). The Dynamics of a Global Health
Information Systems Research and Implementation Project, 12-13.:
https://www.researchgate.net/publication/337276393_The_Dynamics_of_a_Global_
Health_Information_Systems_Research_and_Implementation_Project
9. Dillys, L. (2018) Implementing a Health Information System at the Greater Accra
Regional Hospital in Ghana. PhD thesis. Artic University of Norway.Available at :
https://munin.uit.no/bitstream/handle/10037/16907/thesis.pdf?
sequence=1&isAllowed=y (Accessed: 12 July 2023)
10. IFHIMA (2019), Privacy of Health Information, an IFHIMA Global Perspective.
Available at:
https://ifhimasitemedia.s3.us-east-2.amazonaws.com/wp-content/uploads/
2020/10/02235824/IFHIMA_Privacy_WP_09_20_final.pdf
11. Abdul, F.J. & Fuseini, A. (2020) ‘Health providers’ readiness for electronic health
records adoption: A cross-sectional study of two hospitals in northern Ghana, 15(6),
https://doi.org/10.1371/journal.pone.0231569
12. Emmanuel, K. A. (2012) ‘Electronic Health Record System: A Survey in Ghanaian
Hospitals, Open Access Scientific Reports, 1(2), doi:
http://dx.doi.org/10.4172/scientificreports.164
13. Pieter, K., Michel, D., & Andre, D. (2019) Fundamentals of Clinical Data Science.
Available at: https://www.loc.gov/item/2019763156/
14. Thokozani, K., Tlou, B., & Tivani, M, T., (2020) ‘Electronic Health Information
Systems to Improve Disease Diagnosis and Management at Point-of-Care in Low
and Middle Income Countries: A Narrative Review,
doi:10.3390/diagnostics10050327
39
15. Lina et al (2017) ‘Patient Health Record Systems Scope and Functionalities:
Patient Health Record Systems Scope and Functionalities: Literature Review and
Future Directions Literature Review and Future Directions, Journal of Medical
Internet Research, doi:10.2196/jmir .8073
16. Gavin, Y. (2012) ‘What are the barriers to scaling up health interventions in low and
middle income countries? A qualitative study of academic leaders in implementation
science, Article in Globalization and Health, 8(11), doi: 10.1186/1744-8603-8-11
17. Pramila, M. C. (2021) ‘Data Integrity and Privacy in Healthcare Management
System: A Survey, International Research Journal of Engineering and Technology,
7(11), doi:
18. HIMSS (2016) Achieving Patient Identity Integrity Organizations in Health
Information. Available at:
19. Alex et al (2017) ‘Personal Health Records: A Systematic Literature Review,
Article in Journal of Medical Internet Research, doi: 10.2196/jmir.5876
20. Hua et al (2016) ‘Ensuring data integrity in electronic health records: A quality
health care, Conference Paper, doi: 10.1109/ICOT.2016.8278970
21. James, W and Jens, W.J. (2010), Regulation Of Patient Management Software.
Available, Health Law Journal, 10(1). Available at :
http://ssrn.com/abstract=172927
22. Irina et al (2020) ‘An Effective Training Scheme for Deep Neural Network in Edge
Computing Enabled Internet of Medical Things (IoMT) Systems, Open Access
Journal, 8(1), doi: 10.1109/ACCESS.2020.3000322
23. Iman et al (2018) ‘Empowering Healthcare IoT Systems with Hierarchical Edge-
based Deep Learning, Conference Paper, doi: 10.1145/3278576.3278597
24. Abid et al (2020) ‘Blockchain technology applications in healthcare: An overview,
Article in International Journal of Intelligent Networks, doi:
10.1016/j.ijin.2021.09.005
25. Sinead et al (2017) ‘Using Mobile Phones to Collect Patient Data: Lessons Learned
From the SIMPle Study, Article in Research Protocol, doi: 10.2196/resprot.6389
40
Appendix A: Installation guide and System Requirements
The guide contains all the hardware and software requirements necessary to ensure the
accurate functioning of the system. It also provides a detailed, step-by-step walkthrough for
installing the required software to properly run the system. The installation process is
outlined in a series of clear and concise steps.
41
Figure A.1: XAMPP download interface
42
Figure A.2: Start Apache and MySQL services
43
Figure A.4: Creating a new database
44
Moving system files to the appropriate folder within the XAMPP directory is an essential step
in setting up your system. By placing the files in the "htdocs" folder, you ensure that they are
accessible through XAMPP. To do this, open the XAMPP installation directory on your
computer and locate the "htdocs" folder. Figure A.6 provides a visual representation of this
folder. Once you click on it, you can see the files that have been moved into the folder.
45
Appendix B: Sample Source Codes
$username = "";
$email = "";
$errors = array();
$role = "";
if (isset($_POST['login_user'])) {
$username = mysqli_real_escape_string($db, $_POST['username']);
$password = mysqli_real_escape_string($db, $_POST['password']);
if (count($errors) == 0) {
$password = md5($password);
// echo $password;
// die();
$query = "SELECT * FROM users WHERE username='$username' AND
password='$password'";
$results = mysqli_query($db, $query);
if (mysqli_num_rows($results) > 0)
{
while($row = mysqli_fetch_assoc($results))
{
$_SESSION['user_id'] = $row["id"];
if($row["user_type"] == "admin")
{
$_SESSION['username'] = $username;
header('location: ../users/admin/dashboard.php');
}
elseif($row["user_type"] == "doctor")
{
$_SESSION['username'] = $username;
$_SESSION['role'] = "doctor";
46
header('location: ../users/doctor/dashboard.php');
}
elseif($row["user_type"] == "reception")
{
$_SESSION['username'] = $username;
$_SESSION['role'] = "reception";
header('location: ../users/reception/patient.php');
}
elseif($row["user_type"] == "opd")
{
$_SESSION['username'] = $username;
$_SESSION['role'] = "opd";
header('location: ../users/opd/patient.php');
}
elseif($row["user_type"] == "pharmacy")
{
$_SESSION['username'] = $username;
$_SESSION['role'] = "pharmacy";
header('location: ../users/pharmacy/dashboard.php');
}
}
}else {
array_push($errors, "Wrong username/password combination");
}
?>
Adding Patient
<div class="content-wrapper">
<div class="content-header">
<div class="container-fluid">
47
<div class="row mb-2 justify-content-center">
<div class="col-sm-6 ">
<h1 class="m-0 text-center"><u>Add New reception
Account</u></h1>
</div>
</div><!-- /.row -->
</div><!-- /.container-fluid -->
</div>
<!-- Main content -->
<section class="content">
<div class="container-fluid">
<div class="row justify-content-center">
<form action="<?= $_SERVER['PHP_SELF'] ?>" method="POST"
class="p-7">
<div class="form-group">
<input type="text" name="fname" class="form-control form-
control-lg" placeholder="Name" required>
</div>
<div class="form-group">
<input type="text" name="username" class="form-control form-
control-lg" placeholder="Username">
</div>
<div class="form-group">
<input type="email" name="email" class="form-control form-
control-lg" placeholder="Email Address">
</div>
<div class="form-group">
<input type="text" name="number" class="form-control form-
control-lg" placeholder="Phone Number">
48
</div>
<div class="form-group">
<input type="password" name="password" class="form-control
form-control-lg" placeholder="Enter Password">
</div>
<div class="form-group">
<input type="password" name="confirm_password" class="form-
control form-control-lg" placeholder="Confirm Password">
</div>
<div class="form-group p-2 d-grid gap-2">
<button class="btn btn-danger btn-lg" type="submit"
name="reg_reception">Register</button>
</div>
</form>
</div>
</div>
</section>
<div class="container"
</div>
</div>
</div>
<?= include('inc/footer.php'); ?>
Update user account
if (isset($_POST['update'])) {
// receive all input values from the form
// $id = $_POST['id'];
$name = $_POST['fname'];
$username = $_POST['username'];
$email = $_POST['email'];
$number = $_POST['number'];
49
$password_1 = $_POST['password'];
$password_2 = $_POST['confirm_password'];
51
52