0% found this document useful (0 votes)
46 views

Final Report

The document describes a hospital management system (HMS) that aims to replace a manual, paper-based system currently used by hospitals. The HMS will automate the management of key hospital information like patient information, room availability, staff schedules, and patient invoices. This will make the hospital's operations more efficient and reduce errors by standardizing data and ensuring data integrity across departments. The HMS seeks to streamline hospital workflows, improve patient care, boost employee productivity, minimize operating expenses, and increase revenues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Final Report

The document describes a hospital management system (HMS) that aims to replace a manual, paper-based system currently used by hospitals. The HMS will automate the management of key hospital information like patient information, room availability, staff schedules, and patient invoices. This will make the hospital's operations more efficient and reduce errors by standardizing data and ensuring data integrity across departments. The HMS seeks to streamline hospital workflows, improve patient care, boost employee productivity, minimize operating expenses, and increase revenues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

ABSTRACT

Hospitals currently use a manual system for the management and maintenance of critical
information. The current system requires numerous paper forms, with data stores spread
throughout the hospital management infrastructure. Often information (on forms) is incomplete,
or does not follow management standards. Forms are often lost in transit between departments
requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple
copies of the same information exist in the hospital and may lead to inconsistencies in data in
various data stores. The Hospital Management System (HMS) is designed for Any Hospital to
replace their existing manual, paper based system. The new system is to control the following
information; patient information, room availability, staff and operating room schedules, and
patient invoices. These services are to be provided in an efficient, cost effective manner, with the
goal of reducing the time and resources currently required for such tasks. A significant part of
the operation of any hospital involves the acquisition, management and timely retrieval of great
volumes of information. This information typically involves; patient personal information and
medical history, staff information, room and ward scheduling, staff scheduling, operating theater
scheduling and various facilities waiting lists. All of this information must be managed in an
efficient and cost wise fashion so that an institution's resources may be effectively utilized HMS
will automate the management of the hospital making it more efficient and error free. It aims at
standardizing data, consolidating data ensuring data integrity and reducing inconsistencies. A
significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; patient personal
information and medical history, staff information, room and ward scheduling, staff scheduling,
operating theater scheduling and various facilities waiting lists. All of this information must be
managed in an efficient and cost wise fashion so that an institution's resources may be effectively
utilized HMS will automate the management of the hospital making it more efficient and error
free. It aims at standardizing data, consolidating data ensuring data integrity and reducing
inconsistencies.

1
.

LIST OF CONTENTS

S. NO. CHAPTER NAME PAGE NO.


1 HOSPITAL MANAGEMENT SYSTEM

1.1 INTRODUCTION 5

1.2 OBJECTIVES 6-7

2 SYSTEM ANALYSIS

2.1 INTRODUCTION 8

2.2 IDENTIFICATION OF NEED 9

2.3 PRELIMINARY INVESTIGATION 10

2.4 PEASIBILITY STUDY 11

3 PROJECT PLANNING

3.1 INITRODUCTION 12-13

4 Project SCHEDULING

4.1 INTRODUCTION 14

4.2 PERT CHART 15

4.3 GANTT CHART 16

5 SYSTEM DESIGN

5.1 INTRODUCTION 17

2
5.2 UML DIAGRAMS 18-19

5.3 COLLABPRATION DIAGRAM 20

6 DATA FLOW DIAGRAM

6.1 INTRIDUCION 21

6.2 RULES DFD 21-22

6A LOGIC MODEL 22

6B PAITIENT APPOINYMENT 23

6C SEARCHING FOR PAITIENT 24

6D SEARCHING FOR DOCTOR 25

7 ER DIAGRAM
7.1 INTRODUCTION 26-27
7.2 ER DIAGRAM 28

8 OVERVIEW OF TECHNOLOGIES USED

8.1 FRONT END TECNOLOGY 29

8.2 ARCHITECTURE OF FRONT END USER 30-32

9 SOFTWARE AND TOOLS USED

9.1 PHP 33-35

9.2 HTML 36-37

9.3 HTML-5 37

9.4 CSS 38-39


9.5 JAVASCRIPT 39
10 ABOUT BACKEND

3
10.1 INTRODUCTION 40
10.2 MYSQL LOGICAL ARCHITECTURE 40-42
10.3 MYSQL 42-44
10.4 PHP MAIN FEATURE OF MYSQL 45
10.5 XAMPP 46-49
11 FUNCTION 50-51
12 DATABASE MODELS
12.1 SINGLE TIER 52
12.2 TWO TIER 52-63
12.3 THREE TIER 53
13 DATABASE TABLE 54
14 SOFTWARE METHOLOGY 55-59
15 TESTING 57-60
16 PAGES
16.1 MAIN PAGE 61
16.2 SERVICES PAGE 62
16.3 LOGINS PAGE 62
16.4 PATIENT REGISTRATION 63
16.5 ADMIN LOGIN 63
16.6 PATIENT LOGIN 64
17 CODING
17.1 INDEX .PHP 65-74
17.2 USER LOGIN.PHP 75-78
18 CONCLUSION 79
19 FUTURE ENHANCEMENT 80
20 BIBILOGRAPHY 81

4
Chapter-1
Hospital Management System
1.1 INTRODUCTION:
Documenting the assembly, maintenance, use, and troubleshooting of a system as complex as a
voting system is a difficult task. A single system might combine proprietary hardware, custom
operating systems and software, commodity personal computers, and pen and paper. Describing
these highly varied components is one function of voting system documentation .But it is not
only voting system technology that is heterogeneous; so are voting systems users, and the
environments in which the systems are used. Election officials, poll workers, and voters often
need guidance from documents in order to administer or use a voting system. In addition, voting
system certification—the process by which a system is approved for use in state— demands
evidence that a voting system complies with one or more sets of standards or
guidelines.Documentation provides the details that certification bodies need to evaluate the
System. Taken as a whole, voting system documentation must explain the system in several ways
to meet the needs of these multiple audiences.As the modern organizations are automated and
computers are working as per the instructions, it becomes essential for the coordination of human
beings, commodity and computers in a modern organization.Many big cities where the life is
busy needs the transaction of the goods within few minutes of time. So, this online information
recorded by the distributor helps him to complete this task within the time. The administrators
and all the others can communicate with the system through this project, thus facilitating
effective implementation and monitoring of various activities of the voting Software.

5
1.2 OBJECTIVE:
Streamline Hospital Operations
Streamlining hospital operations is one of the main goals of hospital management systems
(HMS). Hospitals must handle many data, resources, and processes to offer patients
appropriate care. The healthcare business is growing more and more complex.HMS provides
a variety of solutions that can assist hospitals in achieving this goal, including centralising
patient data, automating administrative tasks, optimising resource utilisation, improving
communication and coordination, reducing waiting times, minimising errors and
duplications, standardising processes, ensuring the availability of necessary supplies and
medications, enhancing emergency response capabilities, and maximising revenue
generation.
Better patient care
Hospital management systems enhance patient care by giving medical workers precise and
current patient information. The technology guarantees smooth communication between
medical specialists, improving healthcare coordination. HMS further contributes to faster
evaluation and therapy by lowering wait times, automating medicine administration, and
providing real-time visualisation of patient data.Hospital management systems also assist
healthcare professionals in offering patients more individualised and accessible healthcare
services, improving patient happiness and performance.
Boost Employee Productivity
By eliminating repetitive operations and removing paperwork, hospital management systems
increase staff efficiency and accessible medical professionals to concentrate on patient care.
The technology gives them real-time availability of patient data to help healthcare
professionals make quicker and more sound choices.Hospital management systems enhance
teamwork and decrease errors by streamlining expert healthcare interaction. Hospital
Management Systems cut down their time by streamlining administrative duties like making
appointments or medical billing, allowing them to devote extra time to patients and rais ing
employee satisfaction.
Minimise operating expenses
By streamlining processes and eliminating paperwork, hospital management systems lower
operating expenses. Healthcare organisations can cut staffing needs and operating costs by

6
automating procedures, including enrollment of patients, arranging appointments, and
billing health care.The purpose of a hospital management system is to allocate resources
like personnel, equipment, and supplies as efficiently and cheaply as possible. Hospital
Management Systems can decrease costs for rework or overtime compensation by reducing
mistakes and increasing employee productivity.
Increased Income
Hospital management systems can boost revenues by improving billing and coverage
procedures. Healthcare organisations may speed up payment and enhance their finances by
outsourcing medical billing, reducing the time required to file and evaluate claims.
Additionally, hospital management systems assist in accurate billing, lowering the
possibility of rejected claims and missed payments.Hospital management systems enable
healthcare organisations to make data-driven choices to maximise revenue by giving real-
time exposure to accounting information. Hospital Management Systems can also draw in
more patients and boost revenue by raising client happiness and the standard of service.

7
Chapter-2

SYSTEM ANALYSIS

2.1 INTRODUCTION:
Hospitals currently use a manual system for the management and maintenance of critical
information. The current system requires numerous paper forms, with data stores spread
throughout the hospital management infrastructure. Often information (on forms) is incomplete,
or does not follow management standards. Forms are often lost in transit between departments
requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple
copies of the same information exist in the hospital and may lead to inconsistencies in data in
various data stores.The Hospital Management System (HMS) is designed for Any Hospital to
replace their existing manual, paper based system. The new system is to control the following
information; patient information, room availability, staff and operating room schedules, and
patient invoices. These services are to be provided in an efficient, cost effective manner, with the
goal of reducing the time and resources currently required for such tasks. Hospitals currently use
a manual system for the management and maintenance of critical information. The current system
requires numerous paper forms, with data stores spread throughout the hospital management
infrastructure. Often information (on forms) is incomplete, or does not follow management
standards. Forms are often lost in transit between departments requiring a comprehensive auditing
process to ensure that no vital information is lost. Multiple copies of the same information exist in
the hospital and may lead to inconsistencies in data in various data stores.
.

8
2.2 IDENTIFICATION OF NEED:

Efficient Patient Record Management: Hospitals deal with a vast amount of patient data,
including medical history, test results, prescriptions, and billing information. A hospital
management system is needed to streamline the storage, retrieval, and management of patient
records, ensuring easy access to accurate information for healthcare professionals.Streamlined
Appointment Scheduling: Managing appointments for multiple doctors and departments can be
complex and time-consuming. A hospital management system can automate appointment
scheduling, allowing patients to book appointments online, reducing waiting times, and
optimizing the allocation of resources.
Improved Workflow and Coordination: Hospitals consist of various departments, such as
reception, billing, laboratory, pharmacy, and more. Coordinating activities between these
departments is crucial for efficient operations. A management system can facilitate
communication, task allocation, and information sharing among different departments,
improving overall workflow.Inventory and Supply Chain Management: Hospitals require a
steady supply of medicines, equipment, and other medical supplies. A hospital management
system can track inventory levels, automate reordering processes, and manage supplier
relationships, ensuring that essential items are always available when needed.Financial
Management and Billing: Hospitals need to manage their financial transactions, including billing
patients, insurance claims, and payment tracking. A management system can automate billing
processes, generate accurate invoices, and integrate with accounting systems for efficient
financial management.
Reporting and Analytics: Hospitals need to generate reports and analyze data to monitor
performance, track key metrics, and make informed decisions. A management system can
provide real-time data insights, generate customized reports, and facilitate data-driven decision-
making for administrators and healthcare professionals.
Enhanced Patient Experience: Improving patient experience is a key objective for hospitals. A
management system can offer features like online patient portals, self-service kiosks, and mobile
applications to provide convenience, empower patients, and enhance their overall
experience.Regulatory Compliance: Hospitals must comply with various regulatory standards
and guidelines.

9
2.3 PRELIMINARY INVESTIGATION

During the preliminary investigation phase of a hospital management system project, the focus is
on gathering information and conducting an initial analysis to determine the project's feasibility
and scope. Here are the key steps involved in the preliminary investigation:

Clearly define the objectives of the hospital management system project. Identify the specific
goals, such as improving patient care, streamlining operations, enhancing efficiency, or
addressing specific pain points within the hospital. Identify the key stakeholders who will be
affected by or have an interest in the hospital management system. This may include hospital
administrators, healthcare providers (doctors, nurses, technicians), billing and finance staff, IT
personnel, patients, and regulatory bodies.Evaluate the existing systems and processes within the
hospital. Identify the strengths, weaknesses, opportunities, and threats associated with the current
system. Assess the efficiency, accuracy, and effectiveness of processes such as patient record
management, appointment scheduling, billing, inventory management, and communication.
Conduct interviews, surveys, and workshops with stakeholders to gather their requirements and
expectations from the hospital management system. Identify pain points, challenges, and desired
features or functionalities. Document the user requirements and prioritize them based on their
importance and feasibility.Assess the hospital's existing technical infrastructure, including
hardware, software, and networking capabilities. Identify any gaps or limitations that may need
to be addressed to support the implementation of the hospital management system.Identify the
regulatory and legal requirements that need to be complied with, such as data privacy laws (e.g.,
HIPAA), security standards, and healthcare industry regulations. Assess how the proposed
system will align with these requirements.

10
2.4 FEASIBILITY STUDY:
Feasibility study is conducted once the problem is clearly understood. Feasibility study is a high
level capsule version of the entire system analysis and design process. The objective is to
determine quickly at a minimum expense how to solve a problem. The purpose of feasibility is
not to solve the problem but to determine if the problem is worth solving.
The system has been tested for feasibility in the following points.
1. Technical Feasibility
2. Economical Feasibility
3. Operational Feasibility.
1. Technical Feasibility
The project entitles "Courier Service System” is technically feasibility because of the below
mentioned feature. The project was developed in Java which Graphical User Interface. It provides
the high level of reliability, availability and compatibility. All these make Java an appropriate
language for this project. Thus the existing software Java is a powerful language.
2. Economical Feasibility
The computerized system will help in automate the selection leading the profits and details of the
organization. With this software, the machine and manpower utilization are expected to go up by
80-90% approximately. The costs incurred of not creating the system are set to be great, because
precious time can be wanted by manually.
3. Operational Feasibility
In this project, the management will know the details of each project where he may be presented
and the data will be maintained as decentralized and if any inquires for that particular contract can
be known as per their requirements and necessaries.

11
Chapter-3
PROJECT PLANNING

3.1 INTRODICTION:
Project planning for a hospital management system involves creating a detailed roadmap that
outlines the tasks, deliverables, milestones, and resources required for successful development and
implementation. Here are the key steps involved in project planning:
1. Define Project Objectives and Scope: Clearly articulate the goals and objectives of the hospital
management system project. Define the scope of the project by identifying the functionalities,
modules, and features that will be included in the system. Document the project scope statement
to provide a clear understanding to all stakeholders.
2. Identify Project Stakeholders: Identify and engage all stakeholders who will be involved in or
impacted by the project. This includes hospital administrators, healthcare providers, IT personnel,
finance and billing staff, patients, and regulatory bodies. Determine their roles and responsibilities
within the project.
3. Create Work Breakdown Structure (WBS): Develop a hierarchical breakdown of project tasks
and activities using a Work Breakdown Structure (WBS). Divide the project into smaller,
manageable components, and assign each task to the responsible team member. This helps in
organizing and planning project activities.
4. Estimate Resources: Estimate the resources required for the project, including human resources,
technology, infrastructure, and budget. Determine the skills and expertise needed for each task and
allocate resources accordingly. Ensure that the resource allocation is realistic and feasible.
5. Develop Project Schedule: Create a detailed project schedule that outlines the start and end dates
for each task, including dependencies and milestones. Use project management tools such as Gantt
charts or project management software to visualize the project timeline and task interdependencies.
Consider factors like resource availability and critical path analysis while developing the schedule.
6. Risk Management: Identify potential risks and develop strategies to mitigate and manage them.
Assess the impact and likelihood of each risk and develop contingency plans. Regularly monitor
and update the risk management plan throughout the project lifecycle.

12
7. Communication Plan: Establish a communication plan to ensure effective and timely
communication among project stakeholders. Determine the communication channels, frequency
of communication, and the parties responsible for communicating project updates, progress, and
issues. This helps in maintaining transparency and keeping all stakeholders informed.
8. Quality Assurance Plan: Develop a quality assurance plan to ensure that the hospital
management system meets the required standards and specifications. Define the quality metrics,
testing processes, and validation procedures to be followed throughout the development and
implementation phases.
9. Procurement Plan: Identify any external vendors or suppliers required for the project and
develop a procurement plan. This includes activities such as vendor selection, contract
negotiations, and monitoring vendor performance.
10. Change Management: Anticipate and plan for any changes that may arise during the project.
Define a change management process to handle change requests, evaluate their impact, and obtain
approvals before implementing changes. This helps in managing scope creep and ensuring that
changes are properly evaluated and controlled.
11. Documentation Plan: Outline a plan for documenting project deliverables, user manuals,
system documentation, and other relevant artifacts. Determine the documentation standards and
guidelines to be followed throughout the project.

13
Chapter-4
PROJECT SCHEDULING

4.1 INTRODUCTION:
Scheduling a project, such as a hospital management system, involves creating a plan that outlines
the tasks, resources, and timeframes necessary to complete the project. Here's a general approach
to scheduling a hospital management system project:
Clearly define the purpose and desired outcomes of the hospital management system project.
Identify key stakeholders and gather requirements.Divide the project into smaller, manageable
tasks. For a hospital management system, tasks might include requirements gathering, system
design, database development, user interface development, testing, deployment, and training.
Determine the logical order in which tasks should be completed. Identify any dependencies
between tasks—tasks that must be completed before others can start—and create a task sequence.
Work with your team to estimate the time required to complete each task. Consider factors such
as complexity, resources available, and potential risks or uncertainties.Identify the resources
needed for each task, such as personnel, equipment, and software. Determine resource availability
and assign resources to tasks accordingly.Using project management software or tools like Gantt
charts, create a visual representation of the project schedule. Include task names, start and end
dates, task durations, and resource assignments. Ensure that the schedule reflects the task sequence
and any dependencies.Identify significant project milestones, such as completing key deliverables
or reaching specific project phases. Milestones provide checkpoints to track progress and evaluate
the project's overall timeline.Determine the critical path, which is the longest sequence of tasks
that determines the project's minimum duration. Tasks on the critical path must be closely
monitored, as any delays can impact the overall project timeline.Regularly review the project
schedule and compare it with the actual progress. Update the schedule as necessary to reflect any
changes, delays, or unforeseen circumstances. Communicate with your team and stakeholders
about any adjustments or potential impacts on the project timeline.Identify potential risks or issues
that could affect the project schedule. Develop contingency plans and mitigation strategies to
address these risks proactively.

14
4.2 PERT CHART:

15
4.3 GANTT CHART:

16
Chapter-5
SYSTEM DESIGN

5.1 INTRODUCTION:
Design is the first step in the development phase for any techniques and principles for the purpose
of defining a device, a process or system in sufficient detail to permit its physical realization.
Once the software requirements have been analyzed and specified the software design involves
three technical activities - design, coding, implementation and testing that are required to build
and verify the software.The design activities are of main importance in this phase, because in this
activity, decisions ultimately affecting the success of the software implementation and its ease of
maintenance are made. These decisions have the final bearing upon reliability and maintainability
of the system. Design is the only way to accurately translate the customer’s requirements into
finished software or a system.Design is the place where quality is fostered in development.
Software design is a process through which requirements are translated into a representation of
software. Software design is conducted in two steps. Preliminary design is concerned with the
transformation of requirements into data.

17
5.2 UML Diagrams:
Actor:
A coherent set of roles that users of use cases play when interacting with the use `cases.

UML stands for Unified Modeling Language. UML is a language for specifying, visualizing and
documenting the system. This is the step while developing any product after analysis. The goal
from this is to produce a model of the entities involved in the project which later need to be built.
The representation of the entities that are to be used in the product being developed need to be
designed.
There are various kinds of methods in software design:
They are as follows:
➢ Use case Diagram
➢ Sequence Diagram
➢ Collaboration Diagram
➢ Activity Diagram
➢ State chat Diagram
USECASE DIAGRAMS:
Use case diagrams model behavior within a system and helps the developers understand of what
the user require. The stick man represents what’s called an actor.Use case diagram can be useful
for getting an overall view of the system and clarifying who can do and more importantly what
they can’t do.Use case diagram consists of use cases and actors and shows the interaction between
the use case and actors.
• The purpose is to show the interactions between the use case and actor.
• To represent the system requirements from user’s perspective.
• An actor could be the end-user of the system or an external system.

18
A Use case is a description of set of sequence of actions Graphically it is rendered
as an ellipse with solid line including only its name. Use case diagram is a behavioral
diagram that shows a set of use cases and actors and their relationship. It is an association
between the use cases and actors. An actor represents a real-world object.

Registration

Reception

Discharge Summary
Patient
Doctor

Laboratory

Pharmacy

USECASE DIAGRAM(fig 5.2)

19
5.3 COLLABORATION DIAGRAM:
A collaboration diagram is an introduction diagram that emphasizes the structural organization of
the objects that send and receive messages. Graphically a collaboration diagram is a collection of
vertices and arcs.

start

Doctor Patient

Registration

Pharmacy

Reception

Discharge
Laboratory summary

End

Activity Diagram (Fig 5.3)

20
Chapter -6

DATA FLOW DIAGRAMS:

6.1 INTRIDUCTION:
The DFD takes an input-process-output view of a system i.e. data objects flow into the software,
are transformed by processing elements, and resultant data objects flow out of the software.Data
objects represented by labeled arrows and transformation are represented by circles also called as
bubbles. DFD is presented in a hierarchical fashion i.e. the first data flow model represents the
system as a whole. Subsequent DFD refine the context diagram (level 0 DFD), providing
increasing details with each subsequent level. The DFD enables the software engineer to develop
models of the information domain & functional domain at the same time. As the DFD is refined
into greater levels of details, the analyst perform an implicit functional decomposition of the
system. At the same time, the DFD refinement results in a corresponding refinement of the data as
it moves through the process that embody the applications.A context-level DFD for the system the
primary external entities produce information for use by the system and consume information
generated by the system. The labeled arrow represents data objects or object hierarchy.

6.2 RULES FOR DFD:

• Fix the scope of the system by means of context diagrams.

• Organize the DFD so that the main sequence of the actions

• Reads left to right and top to bottom.

• Identify all inputs and outputs.

• Identify and label each process internal to the system with Rounded circles.

• A process is required for all the data transformation and Transfers. Therefore, never
connect a data store to a data Source or the destinations or another data store with just
a Data flow arrow.

• Do not indicate hardware and ignore control information.

• Make sure the names of the processes accurately convey everything the process is done.

21
• There must not be unnamed process.

• Indicate external sources and destinations of the data, with Squares.

• Number each occurrence of repeated external entities.

• Identify all data flows for each process step, except simple Record retrievals.

• Label data flow on each arrow.

• Use details flow on each arrow.

• Use the details flow arrow to indicate data movements.

Logic Module (Fig 6 A)

22
Patient Appoinyment(fig 6B)

23
Searching For Patient(fig 6c)

24
Searching For Doctor(fig 6d)

25
Chapter-7

ER Diagrams
7.1 INTRODUCTION:

The Entity-Relationship (ER) model was originally proposed by Peter in 1976 [Chen76] as a way
to unify the network and relational database views. Simply stated the ER model is a conceptual
data model that views the real world as entities and relationships. A basic component of the model
is the Entity-Relationship diagram which is used to visually represents data objects. Since Chen
wrote his paper the model has been extended and today it is commonly used for database design
For the database designer, the utility of the ER model is:

• it maps well to the relational model. The constructs used in the ER model can easily be
transformed into relational tables.
• it is simple and easy to understand with a minimum of training. Therefore, the model can
be used by the database designer to communicate the design to the end user.
• In addition, the model can be used as a design plan by the database developer to implement
a data model in a specific database management software.

Connectivity and Cardinality

The basic types of connectivity for relations are: one-to-one, one-to-many, and many-to-many.
A one-to-one (1:1) relationship is when at most one instance of a entity A is associated with one
instance of entity B. For example, "employees in the company are each assigned their own
office. For each employee there exists a unique office and for each office there exists a unique
employee. A one-to-many (1:N) relationships is when for one instance of entity A, there are zero,
one, or many instances of entity B, but for one instance of entity B, there is only one instance of
entity A. An example of a 1:N relationships is a department has many employees each employee
is assigned to one department A many-to-many (M:N) relationship, sometimes called non-
specific, is when for one instance of entity A, there are zero, one, or many instances of entity B
and for one instance of entity B there are zero, one, or many instances of entity A. The
connectivity of a relationship describes the mapping of associated

26
ER Notation

There is no standard for representing data objects in ER diagrams. Each modeling methodology
uses its own notation. The original notation used by Chen is widely used in academics texts and
journals but rarely seen in either CASE tools or publications by non-academics. Today, there are
a number of notations used, among the more common are Bachman, crow's foot, and IDEFIX. All
notational styles represent entities as rectangular boxes and relationships as lines connecting boxes.
Each style uses a special set of symbols to represent the cardinality of a connection. The notation
used in this document is from Martin. The symbols used for the basic ER constructs are:

▪ entities are represented by labeled rectangles. The label is the name of the entity. Entity
names should be singular nouns.
▪ relationships are represented by a solid line connecting two entities. The name of the
relationship is written above the line. Relationship names should be verbs
▪ attributes, when included, are listed inside the entity rectangle. Attributes which are
identifiers are underlined. Attribute names should be singular nouns.
▪ cardinality of many is represented by a line ending in a crow's foot. If the crow's foot is
omitted, the cardinality is one.
▪ existence is represented by placing a circle or a perpendicular bar on the line. Mandatory
existence is shown by the bar (looks like a 1) next to the entity for an instance is required.
Optional existence is shown by placing a circle next to the entity that is optional

27
7.2 DIAGRAM:

ER Diagram (fig 7A)

28
Chapter 8
OVERVIEW OF TECHNOLOGIES USED

8.1 Front End Technology:


The front end is an interface between the user and the back end. The front and back ends may be
distributed amongst one or more systems.

In network computing, front end can refer to any hardware that optimizes or protects network
traffic. It is called application front-end hardware because it is placed on the network's outward-
facing front end or boundary. Network traffic passes through the front-end hardware before
entering the network.

In compilers, the front end translates a computer programming source code into an intermediate
representation, and the back end works with the intermediate representation to produce code in a
computer output language. The back end usually optimizes to produce code that runs faster. The
front-end/back-end distinction can separate the parser section that deals with source code and the
back end that generates code and optimizes.

These days, front-end development refers to the part of the web users interact with. In the past,
web development consisted of people who worked with Photoshop and those who could code
HTML and CSS. Now, developers need a handle of programs like Photoshop and be able to code
not only in HTML and CSS, but also JavaScript or jQuery, which is a compiled library of
JavaScript.

Most of everything you see on any website is a mixture of HTML, CSS, and JavaScript, which are
all controlled by the browser. For example, if you’re using Google Chrome or Firefox, the browser
is what translates all of the code in a manner for you to see and with which to interact, such as
fonts, colors, drop-down menus, sliders, forms, etc. In order for all of this to work, though, there
has to be something to support the front-end; this is where the backend comes into play.

29
8.2 Architecture of Front End user:

Architecture and Concepts


The query cache plugin is implemented as a PHP extension. It is written in C and operates under
the hood of PHP. During the startup of the PHP interpreter, it gets registered as a mysqlnd plugin
to replace selected mysqlnd C methods. Hereby, it can change the behaviour of any PHP MySQL
extension (mysqli, PDO_MYSQL, mysql) compiled to use the mysqlnd library without changing
the extensions API. This makes the plugin compatible with each and every PHP MySQL
application. Because existing APIs are not changed, it is almost transparent to use. Please, see the
mysqlnd plugin API description for a discussion of the advantages of the plugin architecture and
a comparison with proxy based solutions.

Transparent to use
At PHP run time PECL/mysqlnd_qc can proxy queries send from PHP (mysqlnd) to the MySQL
server. It then inspects the statement string to find whether it shall cache its results. If so, result set
is cached using a storage handler and further executions of the statement are served from the cache
for a user-defined period. The Time to Live (TTL) of the cache entry can either be set globally or
on a per statement basis.

30
A statement is either cached if the plugin is instructed to cache all statements globally using a or,
if the query string starts with the SQL hint (/*qc=on*/). The plugin is capable of caching any query
issued by calling appropriate API calls of any of the existing PHP MySQL extensions.

Flexible storage: various storage handler


Various storage handler are supported to offer different scopes for cache entries. Different scopes
allow for different degrees in sharing cache entries among clients.

• default (built-in): process memory, scope: process, one or more web requests depending
on PHP deployment model used

• APC: shared memory, scope: single server, multiple web requests

• SQLite: memory or file, scope: single server, multiple web requests

• MEMCACHE: main memory, scope: single or multiple server, multiple web requests

• user (built-in): user-defined - any, scope: user-defined - any

Support for the APC, SQLite and MEMCACHE storage handler has to be enabled at compile time.
The default and user handler are built-in. It is possible to switch between compiled-in storage
handlers on a per query basis at run time. However, it is recommended to pick one storage handler
and use it for all cache entries.

Built-in slam defence to avoid overloading


To avoid overload situations the cache plugin has a built-in slam defence mechanism. If a popular
cache entries expires many clients using the cache entries will try to refresh the cache entry. For
the duration of the refresh many clients may access the database server concurrently. In the worst
case, the database server becomes overloaded and it takes more and more time to refresh the cache
entry, which in turn lets more and more clients try to refresh the cache entry. To prevent this from
happening the plugin has a slam defence mechanism. If slam defence is enabled and the plugin
detects an expired cache entry it extends the life time of the cache entry before it refreshes the
cache entry. This way other concurrent accesses to the expired cache entry are still served from
the cache for a certain time . The other concurrent accesses to not trigger a concurrent refresh.
Ideally, the cache entry gets refreshed by the client which extended the cache entries lifespan
before other clients try to refresh the cache and potentially cause an overload situation.

31
Unique approach to caching
PECL/ mysqlnd qc has a unique approach to caching result sets that is superior to application based
cache solutions. Application based solutions first fetch a result set into PHP variables. Then, the
PHP variables are serialized for storage in a persistent cache, and then unserialized when fetching.
The mysqlnd query cache stores the raw wire protocol data sent from MySQL to PHP in its cache
and replays it, if still valid, on a cache hit. This way, it saves an extra serialization step for a cache
put that all application based solutions have to do. It can store the raw wire protocol data in the
cache without having to serialize into a PHP variable first and deserializing the PHP variable for
storing in the cache a

32
Chapter 9
Software & Tools Used

9.1 PHP:-

Introduction
PHP is now officially known as “PHP: Hypertext Preprocessor”. It is a server-side scripting
language usually written in an HTML context. Unlike an ordinary HTML page, a PHP script is
not sent directly to a client by the server; instead, it is parsed by the PHP binary or module, which
is server-side installed. HTML elements in the script are left alone, but PHP code is interpreted
and executed. PHP code in a script can query databases, create images, read and write files, talk to
remote servers – the possibilities is endless. The output from PHP code is combined with the
HTML in the script and the result sent to the user’s web-browser, therefore it can never tell the
user whether the web-server uses PHP or not, because the entire browser sees is HTML.PHP’s
support for Apache and MySQL further increases its popularity. Apache is now the most-used
web-server in the world, and PHP can be compiled as an Apache module. MySQL is a powerful
free SQL database, and PHP provides a comprehensive set of functions for working with it. The
combination of Apache, MySQL and PHP is all but unbeatable. That doesn’t mean that PHP cannot
work in other environments or with other tools. In fact, PHP supports an extensive list of databases
and web-servers. While in the mid-1990s it was ok to build sites, even relatively large sites, with
hundreds of individual hard-coded HTML pages, today’s webmasters are making the most of the
power of databases to manage their content more effectively and to personalize their sites
according to individual user preferences.

Reasons for using PHP


There are some indisputable great reasons to work with PHP. As an open source product, PHP is
well supported by a talented production team and a committed user community. Furthermore, PHP
can be run on all the major operating systems with most servers.

a) Learning PHP is easy


Basic is easy any interpreted language should be easy to learn. Since you are isolated from the

33
system (no pointers to use, no memory to allocate). The other advantage that all modern interpreted
languages share is good associative array constructs.

b) Its Performance
While we can build an application that serves millions of pages a day on a server, when we really
look at the performance of the language it sucks. We are still orders of magnitude from real
performance. Not only that, but since PHP is designed around a single process model our ability
to share data structures or connection pool resources is left to native code libraries.

• The low cost

There are many languages which are available at very less cost. There are some languages which
are available at very less cost like below:

• PHP

• C

• C++ etc

d) It’s Open Source, We can modify it


We can modify it if you need a hole in your head! Technically the point is that it’s an open source
project and they release patches often. You’re point is that the community is actively working out
the bugs. So, what any active language is doing this...
Unfortunately C, C++ and Perl have all “died” at this point and will pretty much remain static at
their current functionality.

Its Portability
C is portable; it’s just the OS bits that aren’t. A lot PHP isn’t portable to Windows since people
don’t use the OS abstractions to avoid some problems.
It has interfaces to a large variety of database systems
PHP supports a large variety of the database.
Support available

34
Online Support is available for using PHP.

e)PHP Syntax
You cannot view the PHP source code by selecting “View source” in the browser – you will only
see the output from the PHP file, which is plain HTML. This is because the scripts are executed
on the server before the result is sent back to the browser.

Basic PHP Syntax


A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting block can be
placed anywhere in the document.On servers with shorthand support enabled you can start a
scripting block with <? And end with ?>. However, for maximum compatibility, we
recommend that you use the standard form (<?php) rather than the shorthand form.

A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code.

9.2 HTML

HTML or Hyper Text Markup Language is the standard markup language used to create web
pages.HTML was created in 1991 by Tim Berners-Lee at CERN in Switzerland. It was designed
to allow scientists to display and share their research.HTML is written in the form of HTML
elements consisting of tags enclosed in angle brackets(like <html>). HTML tags most commonly
come in pairs like <h1> and </h1>, although some tags represent empty elements and so are
unpaired, for example <img>. The first tag in a pair is the start tag, and the second tag is the end
tag (they are also called opening tags and closing tags).

The purpose of a web browser is to read HTML documents and compose them into visible or
audible web pages. The browser does not display the HTML tags, but uses the tags to interpret the
content of the page. HTML describes the structure of a website semantically along with cues for
presentation, making it a markup language rather than a programming language.

HTML elements form the building blocks of all websites. HTML allows images and objects to be
embedded and can be used to create interactive forms. It provides a means to create structured
documents by denoting structural semantics for text such as headings, paragraphs, lists, links,

35
quotes and other items. It can embed scripts written in languages such as Java Script which affect
the behavior of HTML web pages.

HTML is descriptive markup language. Library of various markup languages is defined in various
browsers.

a) HTML Images - The <img> Tag and the Src Attribute

In HTML, images are defined with the <img> tag.

The <img> tag is empty, which means that it contains attributes only, and has no closing tag.

To display an image on a page, you need to use the src attribute. Src stands for "source". The value
of the src attribute is the URL of the image you want to display.

Syntax for defining an image:

<imgsrc="url" alt="some_text">

b) HTML FORMS

HTML forms are used to pass data to a server.

The <form> tag is used to create an


HTML form:

<form>
.
input elements
.
</form>

An HTML form can contain input elements like text fields, checkboxes, radio-buttons, submit
buttons and more. A form can also contain select lists, textarea, fieldset, legend, and label elements.

c) Image tag (<img>) :


To add an image to an HTML document, we just need to include an <IMG> tag with a

36
reference to the desired image. The <IMG> tag is an empty element i.e. it doesn’t require a
closing tag and we can use it to include from small icons to large images.

Syntax: <imgsrc=”URL” alt=”alternative text”>

d) HTML Lists :

An ordered list:
An unordered list:
• The first list item
• List item
• The second list item
• List item
• The third list item
• List item

9.3 HTML 5

HTML5 will be the new standard for HTML . The previous version of HTML, HTML 4.01,
came in 1999. The web has changed a lot since then. HTML5 is still a work in progress.
However, the major browsers support many of the new HTML5 elements and APIs.
HTML5 is cooperation between the World Wide Web Consortium (W3C) and the Web
Hypertext Application Technology Working Group (WHATWG).
WHATWG was working with web forms and applications, and W3C was working with
XHTML 2.0. In 2006, they decided to cooperate and create a new version of HTML.
Some rules for HTML5 were established:
a) New features should be based on HTML, CSS, DOM, and JavaScript
b) Reduce the need for external plug-ins (like Flash)
c) Better error handling
d) More markup to replace scripting
e) HTML5 should be device independent
f) The development process should be visible to the public

37
9.4. CSS

CSS tutorial or CSS 3 tutorial provides basic and advanced concepts of CSS technology. Our CSS
tutorial is developed for beginners and professionals. The major points of CSS are given below:

• CSS stands for Cascading Style Sheet.

• CSS is used to design HTML tags.

• CSS is a widely used language on the web.

• HTML, CSS and JavaScript are used for web designing. It helps the web designers to apply
style on HTML tags.

Cascading Style Sheets (CSS) is a style sheet language used for describing the look and
formatting of a document written in a markup language. While most often used to style web pages
and user interfaces written in HTML and XHTML, the language can be applied to any kind
of XML document, including plain XML, SVG and XUL. CSS is a cornerstone specification
of the web and almost all web pages use CSS style sheets to describe their presentation.CSS is
designed primarily to enable the separation of document content from document presentation,
including elements such as the layout, colors, and fonts. This separation can improve
content accessibility, provide more flexibility and control in the specification of presentation
characteristics, enable multiple pages to share formatting, and reduce complexity and repetition in
the structural content (such as by allowing for table less web design).CSS can also allow the same
markup page to be presented in different styles for different rendering methods, such as on-screen,
in print, by voice (when read out by a speech-based browser or screen reader) and on Braille-based,
tactile devices. It can also be used to allow the web page to display differently depending on the
screen size or device on which it is being viewed. While the author of a document typically links
that document to a CSS file, readers can use a different style sheet, perhaps one on their own
computer, to override the one the author has specified. With plain HTML you define the colors
and sizes of text and tables throughout your pages. If you want to change a certain element you
will therefore have to work your way through the

document and change it. With CSS you define the colors and sizes in "styles". Then as you
write your documents you refer to the styles. Therefore: if you change a certain style it will

38
change the look of your entire site. Another big advantage is that CSS offers much more
detailed attributes than plain HTML for defining the look and feel of your site.

9.5 JAVASCRIPT

JavaScript (JS) is a dynamic computer programming language. It is most commonly used as part
of web browsers, whose implementations allow client-side scripts to interact with the user, control
the browser, communicate asynchronously, and alter the document content that is displayed. It is
also being used in server-side network programming (with Node.js), game development and the
creation of desktop and mobile applications.JavaScript is a prototype-based scripting language
with dynamic typing and has first-class functions. Its syntax was influenced by C. JavaScript
copies many names and naming conventions from Java, but the two languages are otherwise
unrelated and have very different semantics. The key design principles within JavaScript are taken
from the Self and Scheme programming languages. It is a multi-paradigm language, supporting
object-oriented, imperative, and functional programming styles.The application of JavaScript in
use outside of web pages—for example, in PDF documents, site-specific browsers, and desktop
widgets—is also significant. Newer and faster JavaScript VMs and platforms built upon them
(notably Node.js) have also increased the popularity of JavaScript for server-side web applications.
On the client side, JavaScript was traditionally implemented as an interpreted language but just-
in-time compilation is now performed by recent (post-2012) browsers.JavaScript was formalized
in the ECMA Script language standard and is primarily used as part of a web browser (client-side
JavaScript). This enables programmatic access to objects within a host environment.JavaScript is
the most popular programming language in the world.It is the language for HTML, for the Web,
for computers, servers, laptops, tablets, smart phones, and more.

You can use JavaScript to:

a) Change HTML elements

• Delete HTML elements

• Create new HTML elements

39
Chapter- 10
About Back End

10.1 INTRODUCTION:
In a previous blog, we talked about how web programmers are concerned with launching websites,
updates, and maintenance, among other things. All of that works to support the front-end of the
website. The back-end has three parts to it: server, application, and database.To better explain how
all of this works, let’s use the example of a customer trying to purchase a plane ticket using a
website. Everything that the customer sees on the webpage is the front-end, as we have explained
before, but once that customer enters all of his or her information, such as their name, billing
address, destination, etc, the web application stores the information in a database that was created
previously on the server in which the website is calling for information.The web application
creates, deletes, changes, renames, etc items in the database. For example, when a customer
purchases a ticket, that creates an item in the database, but when they have a change in their order
or they wish to cancel, the item in the database is changed.In short, when a customer wants to buy
a ticket, the backend operation is the web application communicating with the server to make a
change in a database stored on said server. Technologies like PHP, Ruby, Python, and others are
the ones backend programmers use to make this communication work smoothly, allowing the
customer to purchase his or her ticket with ease.

10.2 MySQL’s Logical Architecture


The topmost layer contains the services that aren’t unique to MySQL. They’re services most
network-based client/server tools or servers need: connection handling, authentication, security,
and so forth.

40
.

The third layer contains the storage engines. They are responsible for storing and retrieving all
data stored “in” MySQL. Like the various filesystems available for GNU/Linux, each storage
engine has its own benefits and drawbacks. The server communicates with them through the
storage engine API. This interface hides differences between storage engines and makes them
largely transparent at the query layer. The API contains a couple of dozen low-level functions that
perform operations such as “begin a transaction” or “fetch the row that has this primary key.” The
storage engines don’t parse SQL[4] or communicate with each other; they simply respond to
requests from the server.

41
10.3 My Sql:

Introduction:

42
The database has become an integral part of almost every human's life. Without it, many things
we do would become very tedious, perhaps impossible tasks. Banks, universities, and libraries
are three examples of organizations that depend heavily on some sort of database system. On the
Internet, search engines, online shopping, and even the website naming convention would be
impossible without the use of a database. A database that is implemented and interfaced on a
computer is often termed a database server.
One of the fastest SQL (Structured Query Language) database servers currently on the
market is the MySQL server, developed by T.c.X. DataKonsultAB. MySQL, available for
download at www.mysql.com, offers the database programmer with an array of options and
capabilities rarely seen in other database servers. MySQL is free of charge for those wishing to
use it for private and commercial use. Those wishing to develop applications specifically using
MySQL should consult MySQL's licensing section, as there is charge for licensing the product.

These capabilities range across a number of topics, including the following:


a) Ability to handle an unlimited number of simultaneous users.
b) Capacity to handle 50,000,000+ records.
c) Very fast command execution, perhaps the fastest to be found on the market.
d)Easy and efficient user privilege system.

However, perhaps the most interesting characteristic of all is the fact that it's free. That's right,
T.c.X offers MySQL as a free product to the general public.

Reasons to Use MySQL

a) Scalability and Flexibility

The MySQL database server provides the ultimate in scalability, sporting the capacity to handle
deeply embedded applications with a footprint of only 1MB to running massive data warehouses
holding terabytes of information. Platform flexibility is a stalwart feature of MySQL with all
flavors of Linux, UNIX, and Windows being supported.

43
b) High Performance
A unique storage-engine architecture allows database professionals to configure the MySQL
database server specifically for particular applications, with the end result being amazing
performance results.

C) High Availability

Rock-solid reliability and constant availability are hallmarks of MySQL, with customers relying
on MySQL to guarantee around-the-clock uptime. MySQL offers a variety of high-availability
options from high-speed master/slave replication configurations, to specialized Cluster servers
offering instant failover, to third party vendors offering unique high-availability solutions for the
MySQL database server.

d) Robust Transactional Support


MySQL offers one of the most powerful transactional database engines on the market. Features
include complete ACID (atomic, consistent, isolated, durable) transaction support, unlimited row-
level locking, distributed transaction capability, and multi-version transaction support where
readers never block writers and vice-versa.

e) Web and Data Warehouse Strengths


MySQL is the de-facto standard for high-traffic web sites because of its high-performance query
engine, tremendously fast data inserts capability, and strong support for specialized web functions
like fast full text searches.

f) Strong Data Protection


Because guarding the data assets of corporations is the number one job of database professionals,
MySQL offers exceptional security features that ensure absolute data protection. In terms of
database authentication, MySQL provides powerful mechanisms for ensuring only authorized
users have entry to the database server, with the ability to block users down to the client machine
level being possible.

44
g) Management Ease
MySQL offers exceptional quick-start capability with the average time from software download
to installation completion being less than fifteen minutes. This rule holds true whether the platform
is Microsoft Windows, Linux, Macintosh, or UNIX.

10.4 PHP Main Features of MySQL


• Tested with a broad range of different compilers.

• Works on many different platforms.

• The MySQL Server design is multi-layered with independent modules.

• Fully multi-threaded using kernel threads. It can easily use multiple CPUs if they are available.

• Provides transactional and non-transactional storage engines.

• Uses very fast B-tree disk tables with index compression.

• Relatively easy to add other storage engines. This is useful if you want to provide an SQL interface
for an in-house database.

• A very fast thread-based memory allocation system.

• Very fast joins using an optimized one-sweep multi-join.

• In-memory hash tables, which are used as temporary tables.

• SQL functions are implemented using a highly optimized class library and should be as fast as
possible. Usually there is no memory allocation at all after query initialization.

• The server is available as a separate program for use in a client/server networked environment.

10.5 XAMPP:-

• Install XAMPP by double clicking on the icon, an installation wizard will be opened.

45
46
b) Click Next. It's at the bottom of the setup window.

c) Select aspects of XAMPP to install. Review the list of XAMPP attributes on the left side of
the window; if you see an attribute that you don't want to install as part of XAMPP, uncheck
its box.

By default, all attributes are included in your XAMPP installation.

47
d) Select an installation location. Click the folder-shaped icon to the right of the current
installation destination, then click a folder on your computer.

If you have the UAC activated on your computer, avoid installing XAMPP in your hard
drive's folder (e.g., OS (C:)).

You can select a folder (e.g., Desktop) and then click Make New Folder to create a new folder
and select it as the installation destination.

48
e) Click OK. Doing so confirms your selected folder as your XAMPP installation location and
click NEXT on Bottom Of The Page

49
Chapter 11
Functions
INTRODUCTION:
Functions are bet declared between the <Head> tag of HTML page. Functions are called by user-
initiated events. Seems reasonable to keep the functions between the <Head> tags. They are
loaded first before a user can do anything that might call a function. Scripts can be placed between
inside comment fields to ensure that older browser do not display the script itself.

<html>
<head>
<script language=”JavaScript”>
function pushbutton (){
alert (“Hello!”);
}
</script>
</head>
<body>
<form>
<input type=”button” name=”Button1” value=”push me” onclick=”pushbutton ()”>
</form>
</body>
</html>

If we want to test this one immediately and you are using a Java Script enabled browser then
please go ahead and push the button.This script will create a button and when you press it a window
will pop up saying “hello!”. In fact we have a lot of possibilities just by adding functions to our
scripts.The common browsers transmit the form information by either method: here’s the complete
tag including the GET transmission method attribute for the previous form

50
Example:

<Form method =GET action=http://www.mycompany.com/cgi-bin/upfdate.pl>


………
</form>

Input elements.

Use the <input> tag to define any one of a number of common form elements including text
fields multiple choice lists click able images and submission buttons. There are many attributers
for this tag only that types and name attributes are required for each element, each type of input
element uses only a subset of the followed attributes. Additional <input> attributes may be
required based upon which type of the form element you specify.

Submit button:

The submit button (<input type=submit> ) does what its name implies, settings in motion the
form’s submission to the server from the browser. We many have more than submit buttons will
be added to the parameter list the browser sends along to the server.

Example
< Input type =”submit”>
<Input type=”submit” value=”submit” name=”name”>

Reset button:

The reset button if firm <input> button is nearly self- explanatory; it lets the user reset erase or
set to some default value all elements in the form. By default the browser displays a reset button
worth the label “reset”. We can change that by specifying a value attribute with tour own button
label.

51
Chapter – 12
nn DATABASE MODELS

ADO.NET and accessing the database through applets and ADO.NET API via an intermediate
server resulted server resulted in a new type of database model which is different from the client-
server model. Based on number of intermediate server through the request should go it is named
as single tire, two tire and multi tire architecture

12.1 Single Tier


In a single tier the server and client are the same in the sense that a client program that needs
information (client) and the source of this type of architecture is also possible in java, in case flat
files are used to store the data. However this is useful only in case of small applications. The
advantage with this is the simplicity and portability of the application developed.

Server and
client

Database

12.2 Two Tier (client-server)

In two tier architecture the database resides in one machine and client in different machine
they are connected through the network. In this type of architecture a database management takes
control of the database and provides access to clients in a network. This software bundle is also
called as the server. Software in different machines, requesting for information are called as the
clients.

52
Server

Client

Database

Client

12.3 Three Tier and N-Tier


In the three-tier architecture, any number servers can access the database that resides on server.
Which in turn serve clients in a network. For example, you want to access the database using java
applets, the applet running in some other machine, can send request only to the server from which
it is down loaded. For this reason we will need to have a intermediate server which will accept the
requests from applets and them to the actual database server. This intermediate server acts as a
two-way communication channel also. This is the information or data from the database is passed
on to the applet that is requesting it. This can be extended to make n tiers of servers, each server
carrying to specific type of request from clients, however in practice only 3 tiers architecture is
popular.Controversy , since it required core-CLR changes affecting not only .NET2, but all
dependent technologies (including C#, VB, SQL Server 2005 and Visual Studio 2005).

53
Chapter – 13

DATABASE TABLES

Fig 13.A

54
Chapter - 14
SOFTWARE METHODOLOGY
INTRODUCTION:
The software methodology followed in this project includes the object-oriented methodology and
the application system development methodologies. The description of these methodologies is
given below. Although there are a growing number of applications (such as decision support
systems) that should be developed using an experimental process strategy such as prototyping, a
significant amount of new development work continue to involve major operational applications
of broad scope. The application systems are large highly structured. User task comprehension and
developer task proficiency is usually high. These factors suggest a linear or iterative assurance
strategy. The most common method for this stage class of problems is a system development life
cycle modal in which each stage of development is well defined and has straightforward
requirements for deliverables, feedback and sign off. The system development life cycle is
described in detail since it continues to be an appropriate methodology for a significant part of new
development work.The basic idea of the system development life cycle is that there is a well-
defined process by which an application is conceived and developed and implemented. The life
cycle gives structure to a creative process. In order to manage and control the development effort,
it is necessary to know what should have been done, what has been done, and what has yet to be
accomplished. The phrases in the system development life cycle provide a basis for management
and control because they define segments of the flow of work, which can be identified for
managerial purposes and specifies the documents or other deliverables to be produced in each
phase.The phases in the life cycle for information system development are described differently
by different writers, but the differences are primarily in the amount of necessity and manner of
categorization. There is a general agreement on the flow of development steps and the necessity
for control procedures at each stage. The information system development cycle for an application
consists of three major stages.

1) Definition.
2) Development
3) Installation and operation

55
The first stage of the process, which defines the information requirements for a feasible cost
effective system. The requirements are then translated into a physical system of forms, procedures,
programs etc., by the system design, computer programming and procedure development. The
resulting system is test and put into operation. No system is perfect so there is always a need for
maintenance changes. To complete the cycle, there should be a post audit of the system to evaluate
how well it performs and how well it meets the cost and performance specifications. The stages of
definition, development and installation and operation can therefore be divided into smaller steps
or phrases as follows.
Definition
Proposed definition : preparation of request for proposed applications.
Feasibility assessment : evaluation of feasibility and cost benefit of proposed system.
Information requirement analysis : determination of information needed.
Design
Conceptual design : User-oriented design of application development.
Physical system design : Detailed design of flows and processes in applications processing system
and preparation of program specification.
Development
Program development : coding and testing of computer programs.
Procedure development : design of procedures and preparation of user instructions.

Installation and operation

Conversion : final system test and conversion.


Operation and maintenance : Month to month operation and maintenance
Post audit : Evaluation of development process,application system and results of
use at the completion of the each phase, formal approval sign-off is required from the users as well
as from the manager of the project development.

56
Chapter - 15
TESTING

Testing is a process of executing a program with the indent of finding an error. Testing is a crucial
element of software quality assurance and presents ultimate review of specification, design and
coding.System Testing is an important phase. Testing represents an interesting anomaly for the software.
Thus a series of testing are performed for the proposed system before the system is ready for user acceptance
testing.A good test case is one that has a high probability of finding an as undiscovered error. A successful
test is one that uncovers an as undiscovered error.

Testing Objectives:

1. Testing is a process of executing a program with the intent of finding an error


2. A good test case is one that has a probability of finding an as yet undiscovered error
3. A successful test is one that uncovers an undiscovered error

Testing Principles:

➢ All tests should be traceable to end user requirements


➢ Tests should be planned long before testing begins
➢ Testing should begin on a small scale and progress towards testing in large
➢ Exhaustive testing is not possible
➢ To be most effective testing should be conducted by a independent third party

The primary objective for test case design is to derive a set of tests that has the highest livelihood
for uncovering defects in software. To accomplish this objective two different categories of test
case design techniques are used. They are

▪ White box testing.

▪ Black box testing.

57
White-box testing:

White box testing focus on the program control structure. Test cases are derived to ensure
that all statements in the program have been executed at least once during testing and that all
logical conditions have been executed.

Block-box testing:

Black box testing is designed to validate functional requirements without regard to the internal
workings of a program. Black box testing mainly focuses on the information domain of the
software, deriving test cases by partitioning input and output in a manner that provides through
test coverage. Incorrect and missing functions, interface errors, errors in data structures, error in
functional logic are the errors falling in this category.

Testing strategies:

A strategy for software testing must accommodate low-level tests that are necessary to
verify that all small source code segment has been correctly implemented as well as high-level
tests that validate major system functions against customer requirements.

Testing fundamentals:

Testing is a process of executing program with the intent of finding error. A good test case
is one that has high probability of finding an undiscovered error. If testing is conducted
successfully it uncovers the errors in the software. Testing cannot show the absence of defects, it
can only show that software defects present.

Testing Information flow:

Information flow for testing flows the pattern. Two class of input provided to test the
process. The software configuration includes a software requirements specification, a design
specification and source code.

58
Test configuration includes test plan and test cases and test tools. Tests are conducted and
all the results are evaluated. That is test results are compared with expected results. When
erroneous data are uncovered, an error is implied and debugging commences.

Unit testing:

Unit testing is essential for the verification of the code produced during the coding phase
and hence the goal is to test the internal logic of the modules. Using the detailed design description
as a guide, important paths are tested to uncover errors with in the boundary of the modules. These
tests were carried out during the programming stage itself. All units of Vienna SQL were
successfully tested.

Integration testing:

Integration testing focuses on unit tested modules and build the program structure that is
dictated by the design phase.

System testing:

System testing tests the integration of each module in the system. It also tests to find
discrepancies between the system and it’s original objective, current specification and system
documentation. The primary concern is the compatibility of individual modules. Entire system is
working properly or not will be tested here, and specified path ODBC connection will correct or
not, and giving output or not are tested here these verifications and validations are done by giving
input values to the system and by comparing with expected output. Top-down testing
implementing here.

Acceptance Testing:

This testing is done to verify the readiness of the system for the implementation.
Acceptance testing begins when the system is complete. Its purpose is to provide the end user with
the confidence that the system is ready for use. It involves planning and execution of functional
tests, performance tests and stress tests in order to demonstrate that the implemented system
satisfies its requirements.

59
Tools to special importance during acceptance testing include:

Test coverage Analyzer – records the control paths followed for each test case.

Timing Analyzer – also called a profiler, reports the time spent in various regions of the code are
areas to concentrate on to improve system performance.

Coding standards – static analyzers and standard checkers are used to inspect code for deviations
from standards and guidelines.

Test Cases:

Test cases are derived to ensure that all statements in the program have been executed at
least once during testing and that all logical conditions have been executed.
Using White-Box testing methods, the software engineer can drive test cases that
• Guarantee that logical decisions on their true and false sides.
• Exercise all logical decisions on their true and false sides.
• Execute all loops at their boundaries and with in their operational bounds.
• Exercise internal data structure to assure their validity.
The test case specification for system testing has to be submitted for review before system testing
commences.

60
Chapter – 16
Pages
16.1 Main Page:

16.2 Services Page :

61
16.3 Logins Page

62
16.4 Patient Registration

16.5 ADMIN LOGIN

63
16.6 PATIENT LOGIN

64
Chapter - 17
Code

17.1 Index.php

<?php
include_once('hms/include/config.php');
if(isset($_POST['submit']))
{
$name=$_POST['fullname'];
$email=$_POST['emailid'];
$mobileno=$_POST['mobileno'];
$dscrption=$_POST['description'];
$query=mysqli_query($con,"insert into tblcontactus(fullname,email,contactno,message)
value('$name','$email','$mobileno','$dscrption')");
echo "<script>alert('Your information succesfully submitted');</script>";
echo "<script>window.location.href ='index.php'</script>";

} ?>
<!doctype html>
<html lang="en">

<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
<title>SAI Hospital</title>

<link rel="shortcut icon" href="assets/images/fav.jpg">


<link rel="stylesheet" href="assets/css/bootstrap.min.css">
<link rel="stylesheet" href="assets/css/fontawsom-all.min.css">
<link rel="stylesheet" href="assets/css/animate.css">
<link rel="stylesheet" type="text/css" href="assets/css/style.css" />
</head>

<body>

<!-- ################# Header Starts Here#######################--->

<header id="menu-jk">

<div id="nav-head" class="header-nav">


<div class="container">
<div class="row">

65
<div class="col-lg-2 col-md-3 col-sm-12" style="color:#000;font-weight:bold; font-
size:42px; margin-top: 1% !important;">SAIH
<a data-toggle="collapse" data-target="#menu" href="#menu" ><i class="fas d-
block d-md-none small-menu fa-bars"></i></a>
</div>
<div id="menu" class="col-lg-8 col-md-9 d-none d-md-block nav-item">
<ul>
<li><a href="#">Home</a></li>
<li><a href="#services">Services</a></li>
<li><a href="#about_us">About Us</a></li>
<li><a href="#gallery">Gallery</a></li>
<li><a href="#contact_us">Contact Us</a></li>
<li><a href="#logins">Logins</a></li>
</ul>
</div>
<div class="col-sm-2 d-none d-lg-block appoint">
<a class="btn btn-success" href="hms/user-login.php">Book an
Appointment</a>
</div>
</div>

</div>
</div>
</header>

<!-- ################# Slider Starts Here#######################--->

<div class="slider-detail">

<div id="carouselExampleIndicators" class="carousel slide" data-ride="carousel">


<ol class="carousel-indicators">
<li data-target="#carouselExampleIndicators" data-slide-to="0" class="active"></li>
<li data-target="#carouselExampleIndicators" data-slide-to="1"></li>
</ol>

<div class="carousel-inner">
<div class="carousel-item ">
<img class="d-block w-100" src="assets/images/slider/slider_2.jpg" alt="Second
slide">
<div class="carousel-cover"></div>
<div class="carousel-caption vdg-cur d-none d-md-block">
<h5 class="animated bounceInDown">SAI Hospital</h5>

66
</div>
</div>

<div class="carousel-item active">


<img class="d-block w-100" src="assets/images/slider/slider_3.jpg" alt="Third
slide">
<div class="carousel-cover"></div>
<div class="carousel-caption vdg-cur d-none d-md-block">
<h5 class="animated bounceInDown">SAI Hospital</h5>

</div>

</div>

</div>
<a class="carousel-control-prev" href="#carouselExampleIndicators" role="button" data-
slide="prev">
<span class="carousel-control-prev-icon" aria-hidden="true"></span>
<span class="sr-only">Previous</span>
</a>
<a class="carousel-control-next" href="#carouselExampleIndicators" role="button" data-
slide="next">
<span class="carousel-control-next-icon" aria-hidden="true"></span>
<span class="sr-only">Next</span>
</a>
</div>

</div>

<!-- ********* Logins ********** -->

<section id="logins" class="our-blog container-fluid">


<div class="container">
<div class="inner-title">

<h2>Logins</h2>
</div>
<div class="col-sm-12 blog-cont">
<div class="row no-margin">

67
<div class="col-sm-4 blog-smk">
<div class="blog-single">

<img src="assets/images/patient.jpg" alt="">

<div class="blog-single-det">
<h6>Patient Login</h6>
<a href="hms/user-login.php" target="_blank">
<button class="btn btn-success btn-sm">Click Here</button>
</a>
</div>
</div>
</div>
<div class="col-sm-4 blog-smk">
<div class="blog-single">

<img src="assets/images/doctor.jpg" alt="">

<div class="blog-single-det">
<h6>Doctors login</h6>
<a href="hms/doctor" target="_blank">
<button class="btn btn-success btn-sm">Click Here</button>
</a>
</div>
</div>
</div>

<div class="col-sm-4 blog-smk">


<div class="blog-single">

<img src="assets/images/admin.jpg" alt="">

<div class="blog-single-det">
<h6>Admin Login</h6>

<a href="hms/admin" target="_blank">


<button class="btn btn-success btn-sm">Click Here</button>
</a>
</div>
</div>
</div>

68
</div>
</div>

</div>
</section>

<!-- ################# Our Departments Starts Here#######################--->

<section id="services" class="key-features department">


<div class="container">
<div class="inner-title">

<h2>Our Key Features</h2>


<p>Take a look at some of our key features</p>
</div>

<div class="row">
<div class="col-lg-4 col-md-6">
<div class="single-key">
<i class="fas fa-heartbeat"></i>
<h5>Cardiology</h5>
</div>
</div>

<div class="col-lg-4 col-md-6">


<div class="single-key">
<i class="fas fa-ribbon"></i>
<h5>Orthopaedic</h5>
</div>
</div>

<div class="col-lg-4 col-md-6">


<div class="single-key">
<i class="fab fa-monero"></i>
<h5>Neurologist</h5>
</div>
</div>

69
<div class="col-lg-4 col-md-6">
<div class="single-key">
<i class="fas fa-capsules"></i>
<h5>Pharma Pipeline</h5>
</div>
</div>

<div class="col-lg-4 col-md-6">


<div class="single-key">
<i class="fas fa-prescription-bottle-alt"></i>
<h5>Pharma Team</h5>
</div>
</div>

<div class="col-lg-4 col-md-6">


<div class="single-key">
<i class="far fa-thumbs-up"></i>
<h5>High Quality treatments</h5>

</div>
</div>
</div>

</div>

</section>

<!-- ********* About Us Starts Here ********** -->

<section id="about_us" class="about-us">


<div class="row no-margin">
<div class="col-sm-6 image-bg no-padding">

</div>
<div class="col-sm-6 abut-yoiu">
<h3>About Our Hospital</h3>

70
<?php
$ret=mysqli_query($con,"select * from tblpage where PageType='aboutus' ");
while ($row=mysqli_fetch_array($ret)) {
?>

<p><?php echo $row['PageDescription'];?>.</p><?php } ?>


</div>
</div>
</section>

<!-- ********* Gallery Starts Here ********** -->


<div id="gallery" class="gallery">
<div class="container">
<div class="inner-title">

<h2>Our Gallery</h2>
<p>View Our Gallery</p>
</div>
<div class="row">

<div class="gallery-filter d-none d-sm-block">


<button class="btn btn-default filter-button" data-filter="all">All</button>
<button class="btn btn-default filter-button" data-filter="hdpe">Dental</button>
<button class="btn btn-default filter-button" data-filter="sprinkle">Cardiology</button>
<button class="btn btn-default filter-button" data-filter="spray"> Neurology</button>
<button class="btn btn-default filter-button" data-filter="irrigation">Laboratry</button>
</div>
<br/>

<div class="gallery_product col-lg-4 col-md-4 col-sm-4 col-xs-6 filter hdpe">


<img src="assets/images/gallery/gallery_01.jpg" class="img-responsive">
</div>

<div class="gallery_product col-lg-4 col-md-4 col-sm-4 col-xs-6 filter sprinkle">


<img src="assets/images/gallery/gallery_02.jpg" class="img-responsive">
</div>

<div class="gallery_product col-lg-4 col-md-4 col-sm-4 col-xs-6 filter hdpe">


<img src="assets/images/gallery/gallery_03.jpg" class="img-responsive">
</div>

<div class="gallery_product col-lg-4 col-md-4 col-sm-4 col-xs-6 filter irrigation">

71
<img src="assets/images/gallery/gallery_04.jpg" class="img-responsive">
</div>

<div class="gallery_product col-lg-4 col-md-4 col-sm-4 col-xs-6 filter spray">


<img src="assets/images/gallery/gallery_05.jpg" class="img-responsive">
</div>

<div class="gallery_product col-lg-4 col-md-4 col-sm-4 col-xs-6 filter spray">


<img src="assets/images/gallery/gallery_06.jpg" class="img-responsive">
</div>

</div>
</div>

</div>
<!-- ######## Gallery End ####### -->

<!-- ********* Contact Us Starts Here ********** -->

<section id="contact_us" class="contact-us-single">


<div class="row no-margin">

<div class="col-sm-12 cop-ck">


<form method="post">
<h2 >Contact Form</h2>
<div class="row cf-ro">
<div class="col-sm-3"><label>Enter Name :</label></div>
<div class="col-sm-8"><input type="text" placeholder="Enter Name"
name="fullname" class="form-control input-sm" required ></div>
</div>
<div class="row cf-ro">
<div class="col-sm-3"><label>Email Address :</label></div>
<div class="col-sm-8"><input type="text" name="emailid" placeholder="Enter
Email Address" class="form-control input-sm" required></div>
</div>
<div class="row cf-ro">
<div class="col-sm-3"><label>Mobile Number:</label></div>
<div class="col-sm-8"><input type="text" name="mobileno" placeholder="Enter
Mobile Number" class="form-control input-sm" required ></div>
</div>
<div class="row cf-ro">
<div class="col-sm-3"><label>Enter Message:</label></div>

72
<div class="col-sm-8">
<textarea rows="5" placeholder="Enter Your Message" class="form-control
input-sm" name="description" required></textarea>
</div>
</div>
<div class="row cf-ro">
<div class="col-sm-3"><label></label></div>
<div class="col-sm-8">
<button class="btn btn-success btn-sm" type="submit" name="submit">Send
Message</button>
</div>
</div>
</form>
</div>

</div>
</section>

<!-- ################# Footer Starts Here#######################--->

<footer class="footer">
<div class="container">
<div class="row">

<div class="col-md-6 col-sm-12">


<h2>Useful Links</h2>
<ul class="list-unstyled link-list">
<li><a ui-sref="about" href="#about">About us</a><i class="fa fa-angle-
right"></i></li>
<li><a ui-sref="portfolio" href="#services">Services</a><i class="fa fa-angle-
right"></i></li>
<li><a ui-sref="products" href="#logins">Logins</a><i class="fa fa-angle-
right"></i></li>
<li><a ui-sref="gallery" href="#gallery">Gallery</a><i class="fa fa-angle-
right"></i></li>
<li><a ui-sref="contact" href="#contact">Contact us</a><i class="fa fa-angle-
right"></i></li>
</ul>
</div>
<div class="col-md-6 col-sm-12 map-img">
<h2>Contact Us</h2>

73
<address class="md-margin-bottom-40">

<?php
$ret=mysqli_query($con,"select * from tblpage where PageType='contactus' ");
while ($row=mysqli_fetch_array($ret)) {
?>

<?php echo $row['PageDescription'];?> <br>


Phone: <?php echo $row['MobileNumber'];?> <br>
Email: <a href="mailto:<?php echo $row['Email'];?>" class=""><?php echo
$row['Email'];?></a><br>
Timing: <?php echo $row['OpenningTime'];?>
</address>

<?php } ?>

</div>
</div>
</div>

</footer>
<div class="copy">
<div class="container">
SAI Hospital

</div>

</div>

</body>

<script src="assets/js/jquery-3.2.1.min.js"></script>
<script src="assets/js/popper.min.js"></script>
<script src="assets/js/bootstrap.min.js"></script>
<script src="assets/plugins/scroll-nav/js/jquery.easing.min.js"></script>
<script src="assets/plugins/scroll-nav/js/scrolling-nav.js"></script>
<script src="assets/plugins/scroll-fixed/jquery-scrolltofixed-min.js"></script>

<script src="assets/js/script.js"></script>

74
17.2 User Login.php:

<?php
session_start();
error_reporting(0);
include("include/config.php");
if(isset($_POST['submit']))
{
$puname=$_POST['username'];
$ppwd=md5($_POST['password']);
$ret=mysqli_query($con,"SELECT * FROM users WHERE email='$puname' and
password='$ppwd'");
$num=mysqli_fetch_array($ret);
if($num>0)
{
$_SESSION['login']=$_POST['username'];
$_SESSION['id']=$num['id'];
$pid=$num['id'];
$host=$_SERVER['HTTP_HOST'];
$uip=$_SERVER['REMOTE_ADDR'];
$status=1;
// For stroing log if user login successfull
$log=mysqli_query($con,"insert into userlog(uid,username,userip,status)
values('$pid','$puname','$uip','$status')");
header("location:dashboard.php");
}
else
{
// For stroing log if user login unsuccessfull
$_SESSION['login']=$_POST['username'];
$uip=$_SERVER['REMOTE_ADDR'];
$status=0;
mysqli_query($con,"insert into userlog(username,userip,status)
values('$puname','$uip','$status')");
$_SESSION['errmsg']="Invalid username or password";

header("location:user-login.php");
}
}
?>

<!DOCTYPE html>
<html lang="en">
<head>

75
<title>User-Login</title>

<link
href="http://fonts.googleapis.com/css?family=Lato:300,400,400italic,600,700|Raleway:300,400,
500,600,700|Crete+Round:400italic" rel="stylesheet" type="text/css" />
<link rel="stylesheet" href="vendor/bootstrap/css/bootstrap.min.css">
<link rel="stylesheet" href="vendor/fontawesome/css/font-awesome.min.css">
<link rel="stylesheet" href="vendor/themify-icons/themify-icons.min.css">
<link href="vendor/animate.css/animate.min.css" rel="stylesheet"
media="screen">
<link href="vendor/perfect-scrollbar/perfect-scrollbar.min.css" rel="stylesheet"
media="screen">
<link href="vendor/switchery/switchery.min.css" rel="stylesheet"
media="screen">
<link rel="stylesheet" href="assets/css/styles.css">
<link rel="stylesheet" href="assets/css/plugins.css">
<link rel="stylesheet" href="assets/css/themes/theme-1.css" id="skin_color" />
</head>
<body class="login">
<div class="row">
<div class="main-login col-xs-10 col-xs-offset-1 col-sm-8 col-sm-offset-2
col-md-4 col-md-offset-4">
<div class="logo margin-top-30">
<a href="../index.php"><h2> HMS | Patient Login</h2></a>
</div>

<div class="box-login">
<form class="form-login" method="post">
<fieldset>
<legend>
Sign in to your account
</legend>
<p>
Please enter your name and
password to log in.<br />
<span style="color:red;"><?php
echo $_SESSION['errmsg']; ?><?php echo $_SESSION['errmsg']="";?></span>
</p>
<div class="form-group">
<span class="input-icon">
<input type="text"
class="form-control" name="username" placeholder="Username">
<i class="fa fa-user"></i>
</span>
</div>
<div class="form-group form-actions">

76
<span class="input-icon">
<input type="password"
class="form-control password" name="password" placeholder="Password">
<i class="fa fa-lock"></i>
</span><a href="forgot-
password.php">
Forgot Password ?
</a>
</div>
<div class="form-actions">

<button type="submit" class="btn


btn-primary pull-right" name="submit">
Login <i class="fa fa-arrow-
circle-right"></i>
</button>
</div>
<div class="new-account">
Don't have an account yet?
<a href="registration.php">
Create an account
</a>
</div>
</fieldset>
</form>

<div class="copyright">
</span><span class="text-bold text-uppercase">
Hospital Management System</span>.
</div>

</div>

</div>
</div>
<script src="vendor/jquery/jquery.min.js"></script>
<script src="vendor/bootstrap/js/bootstrap.min.js"></script>
<script src="vendor/modernizr/modernizr.js"></script>
<script src="vendor/jquery-cookie/jquery.cookie.js"></script>
<script src="vendor/perfect-scrollbar/perfect-scrollbar.min.js"></script>
<script src="vendor/switchery/switchery.min.js"></script>
<script src="vendor/jquery-validation/jquery.validate.min.js"></script>

<script src="assets/js/main.js"></script>

<script src="assets/js/login.js"></script>

77
<script>
jQuery(document).ready(function() {
Main.init();
Login.init();
});
</script>

</body>
<!-- end: BODY -->
</html>

78
Chapter 18
CONCLUSION
The package was designed in such a way that future modifications can be done easily. The
following conclusion can be deduced from the development of the project.

➢ Automation of the entire system improves the efficiency


➢ It provides a friendly graphical user interface which proves to be better when
compared to the existing system.
➢ It gives appropriate access to the authorized users depending on their permissions.
➢ It effectively overcomes the delay in communications.
➢ Updating of information becomes so easier.
➢ System security, data security and reliability are the striking features.
➢ The System has adequate scope for modification in future if it is necessary.

79
Chapter - 19

FUTURE ENHANCEMENTS
This application avoids the manual work and the problems concern with it. It is an easy way to
obtain the information regarding the various travel services that are present in our System.
Well I and my team member have worked hard in order to present an improved website better
than the existing one’s regarding the information about the various activities. Still, we found out
that the project can be done in a better way. Primarily, In this system patient login and then go to
reception. By using this patient will send request for consulting the doctor. Reception will set the
date for doctor appointments. After that doctor see his appointments and see the patients,
surgeries also done.The next enhancement is, we will develop online services. That mean, if
patient have any problems he can send his problem to the doctor through internet from his home
then doctor will send reply to him. In this patients have some login name and password.

80
Chapter - 20
BIBILOGRAPHY
WEBSITES:
www.google.com
www.microsoft.com
www.php.net
www.w3school.com

81

You might also like