Professional Documents
Culture Documents
ABSTRACT
1. INTRODUCTION
The medical field is a vast and broad field of study where many
people find it fascinating. Today, the field of medicine is much
revolutionized and it keeps evolving as experts find new medical
breakthroughs. These breakthroughs bring the medical field to its
prime and on its highest point in our history, innovations in
machinery, medical equipment, treatments for incurable diseases
and other helpful inventions that could help the whole industry.
These innovations help people improve their ways of living and
prolonging their lives. Inventions help us to have more convenient
and pleasant life, thus there are people who devote themselves on
finding
and
crafting
new
ideas.
Tests were conducted for the system, wherein it was judged using
these four categories namely: functionality, content, reliability and
availability. From these categories the system gained a grand
mean of 3.21 having a good qualitative interpretation. For the
evaluation, it consists of seven categories namely: accuracy,
efficiency, reliability, security, user-friendliness, flexibility and
validity. From these categories the system gained the grand mean
of 4.18 and a 0.68 standard deviation with a qualitative
interpretation acceptable.
General Terms
Management, Security, Performance,
Standardization and Verification
Design,
Reliability,
Keywords
MEDITOR, Medical Monitoring, Analytics, Inventory, Health
Services Department, HSD
From all these features, the system applies a complex user level
for all the users. Each user only sees the feature tailored for the
user level allotted to them. The administrator of the system is the
university physician. She is responsible for user account
management, adding colleges, major medical consultations and
prescriptions, and viewing all the reports within the system. The
nurse is responsible for all minor consultations, encoding all the
patient information, dispensing all kinds of medications and
inventory management. They are entitled to use the checkup and
medicine repository module based on their responsibilities and
user level. The dentist which is responsible for all the dental
consultations and prescriptions are entitled to use the dental
records module. The secretary is responsible for all the reports and
communications with the other departments within the university
who have concerns with the Health Services Department (HSD),
these tasks enables the secretary to use the reports module that
contains all the generated reports of the system.
f)
g)
2.1.3 Standalone
A standalone system works properly without the help of another
program of software. An example is a television hooked up with a
TiVo Box that has the capacity of recording shows is a standalone
3. TECHNICAL BACKGROUND
In this section every specific term used by the researchers are
mentioned and discussed according to the definition set by the
project requirements. It is also here that the necessary input
process and output diagram are included and discussed.
do certain tasks within the system but with only a few menus
enabled for them
Fi
4.2.1
Operational Feasibility
4.2.1.1.1 Checkup
This function is mainly concerned with adding the patient records
within the system. The main user of this function is the nurse, all
the patient information will be created in the system during the
interview or when the nurse decides to transfer the written
information from the forms to the system itself. The following are
the other contents of the checkup menu:
a)
b)
c)
d)
This function shows the user all the encoded information that has
concerns with the patient information gathered through the
interview.
a)
View records the user can view, update, and edit the
patient information in this function.
b)
b)
c)
4.2.2
Technical Feasibility
a)
4.2.1.1.5 Reports
The reports function is where the user can view all the lists of the
content of the system. It will let the user review all the registered
information within the system.
a)
4.2.3
Schedule Feasibility
B. Non-Recurring Cost
Table 2. Non-Recurring Cost for Year 0 of Existing System
4.2.4
B. Non-Recurring Cost
Table 4. Non-Recurring Cost for Year 1 of Existing System
Economic Feasibility
A. Recurring Cost
Table 9. Recurring Cost for Year 4 of Existing System
B. Non-Recurring Cost
Table 6. Non-Recurring Cost for Year 2 of Existing System
B. Non-Recurring Cost
Table 10. Non-Recurring Cost for Year 4 of Existing System
A. Recurring Cost
A. Recurring Cost
B. Non-Recurring Cost
Table 8. Non-Recurring Cost for Year 3 of Existing System
B. Non-Recurring Cost
Table 12. Non-Recurring Cost for Year 5 of Existing System
A. Recurring Cost
B. Non-Recurring Cost
B. Non-Recurring Cost
Table 19. Non-Recurring Cost for Year 5 of Proposed System
C. Software Cost
Table 15. Software Cost for Year 0 of Proposed System
C. Other Cost
Table 20. Other Cost for Year 5 of Proposed System
Payback Analysis
Table 21. Payback Analysis Table
B. Other Cost
Table 17. Other Cost for Year 1 to 4 of Proposed System
information,
information.
analyzed
information
and
generated
report
The use case diagram shows which user interacts with what
processes in the system. There may be one or more users that
interact with a single process but there are also processes that
cannot be interfered by other users.
The content, inventory, report and monitoring management are all
handled by the nurse. Besides the nurse two of the tasks done by
the nurse, which are the content and report management are
shared with the dentist and physician. The last three processes
which is the user, system and security management are only
handled by one user which is the admin. The admin is responsible
for the overall maintenance of the system.
The action log table shows who made or enacted actions within
the system. Besides from whom, it also shows when at what
action was done by the user.
Table 24. Checkups
All the colleges are shown in this table and it is also shown which
is active and which is inactive.
Table 27. Courses
This table shows each course from every college registered in the
system.
This table shows all the stocks within the inventory and of course
all the medicine information.
Table 34. Medicines
This table shows the content of all the forms filled up when a
patient undergoes checkup or consultation.
Table 31. Login Log
This table is the same as the action log but the difference is that
this table shows who used the login, when did they login and
which user level they are categorized.
This table shows all the possible recurring diseases the patient
has.
Table 36. Personal History
This table shows all the information encoded by the user to create
a user account in the system.
This table shows all the verification codes used by the user to
register an account to the system. It also shows the verification
code if it is the verified or not.
Table 42. Archive
This table shows the archive of all the information that is deleted
or removed from the system. All the discarded information go to
this database which can also be viewed by the users.
Table 43. Event Checkup
This table shows all the user accounts that used to login to the
system.
Table 39. Non-Teaching Personnel Information
This table shows all the needed information for the pre-event
checkups.
Table 44. Event Name
This table shows the list of all the event names within the system.
Table 45. Event Checkup Status
This table shows the status of the student who undergone checkup
for a specific event.
This form shows all the forms used to register and create patient
records within the system.
This table shows the list of all students and their status for the preevent checkup.
4.3.3.1 Forms
This section shows all the forms that the user uses to interact with
the system.
for the user level the user is entitled with is shown and the system
applications that the user can use and encode information into.
The second level is the application level that has all the
applications servers. When a certain user interacts with the
system, they will be interacting with the back end of the system
that has all the servers. All the interactions made by the user are
synchronized with the servers. The last level from the figure
above is the database level. The database level acts together with
the application level so the users that needs information could
easily have what they need. All the information encoded by the
users is stored in this level, while the system is always ready to
retrieve all the information needed by the user.
5.1.1 Description
Project implementation plan includes the list of activities when
the system of deployed to the client.
5.1.2 IT Infrastructure
IT Infrastructure states all the needed components of the system
so it could properly work. The hardware and software
requirements are properly stated and given to the client so they
could provide the sufficient materials in working with the system.
Fi
gure 52. System Architecture
The figure above shows all the infrastructures that the users can
interact with when they are using the system. The first level that
they interact with is the interface level that includes the Metro
form, which is the form that is used to login into the system; the
Home Page, where all the features of the system that is enabled
Inventory
Analytics
Reports
Printing
Printing
Where:
X = Summation of weighs
n = Total number of participants
This section shows all the collected results from the test and
evaluation instrument used by the researchers to measure the
effectiveness and overall accuracy of the system. Besides the
collection of results, each and every table is explained and
elaborated about all the contents that interpret the scores given by
all the evaluators.
6.2.2
Systems Efficiency
Efficiency shows how the system produces results that are all
correct and positive. It means that all the systems inputs are used
and nothing is discarded. Before the users encode all the
information in the system, everything is filtered and the
unimportant information is removed.
The test results signifies the rating of the system according to four
categories that are carefully chosen to specifically measure the
performance of the system. The mean of all the four categories are
computed and also given their own interpretation.
6.2.3
Systems Reliability
6.2.1
6.2.4
The main reason for security is for the files within the system to
be safe and protected. All the files that are in the system should be
well secured and properly organized. The security of the system is
still shared through user levels that have different views for each
user.
Table 50. Systems Security
6.2.5
Systems User-Friendliness
This concept shows if the system is able to make the user feel
comfortable when using the system. The user must feel at ease
and not be confused. They should be able to execute all processes
and tasks without flaws and errors. Besides this, the system should
be able to guide the user and dictate how the user will go through
the system.
Systems Accuracy
Systems Security
6.2.6
Systems Flexibility
The system should be able comply with all the possible cases that
the user encodes. The system must also be able to comply
6.2.7
7.2 Conclusions
Systems Validity
This category means that all the input, processes and output of the
system is satisfactory. The system should be able to satisfy all the
needs of the users and produce all the users expected results.
Table 53. Systems Validity
7.3 Recommendations
The system reached a tolerable level of 4.18 as the mean and 0.68
as the standard deviation. The category that got the first place was
validity with the mean of 4.43 and standard deviation of 0.61. The
second place was caught by the accuracy with the mean of 4.29
and the standard deviation of 0.58. For the third place, reliability
garnered a total of 4.18 mean and the standard deviation of 0.75.
Fourth category is the flexibility which gained a mean of 4.16 and
the standard deviation of 0.69. The fifth and second to the last
category is user-friendliness had the total of 4.09 as the mean and
the 0.72 as its standard deviation. The sixth and seventh categories
tied with the mean of 4.06 but differed with the standard deviation
0.68 for the efficiency and 0.73 for the security. These data means
that the system is ready for use and deployment to the client.
7.
SUMMARY,
CONCLUSION,
RECOMMENDATION
by accuracy (4.29 mean and 058 SD), reliability (4.18 mean and
0.75 SD), flexibility (4.16 mean and 0.69 SD), user-friendliness
(4.09 mean and 0.72 SD), efficiency (4.06 mean and 0.68 SD),
and lastly security (4.06 mean and 0.73 SD). To summarize the
results the Grand Mean for the evaluation is 4.18 and the total
Standard Deviation is 0.68 with the interpretation acceptable.
AND
ACKNOWLEDGEMENT
The researchers would like to show their deepest and most sincere
gratitude to the following people:
To Lyceum of the Philippines University Cavite Campus Health
Services Department for letting us conduct the development of the
thesis in their respective department
To Ms. Lynette Cortez our Capstone 1 thesis adviser who guided
us through time and motivated us to pursue our project; To Mr.
Genson Mendoza for helping us in every way he can as our
Capstone 2 adviser
To all the people that took part on evaluating the system; to all the
35 people from the medical staff, IT experts, student assistants and
REFERENCES
[1] Offshore Oil and Gas Operations Digital Magazine (2010).
Citing Websites. Remote monitoring system aids Dutch
production. Retrieved
February
26,
2014,
from http://www.offshore-mag.com/articles/2010/09/remotemonitoring.html
[2] Daily, F. (2013). Citing Websites. Choosing the Right Business
Record-Keeping System. Retrieved February 26, 2014, from
http://www.nolo.com/legal-encyclopedia/choosing-right-businessrecord-keeping-32277.html
[3] TechTerms.com (2013). Citing Websites. Standalone.
Retrieved
February
26,
2014,
from
http://www.techterms.com/definition/standalone
[4] Crosby, T. (2013). Citing Websites. How Inventory
Management Systems Work. Retrieved February 26,
2014, from http://money.howstuffworks.com/howinventory-management-systems-work.htm