Patient Monitoring System Using RFID
Patient Monitoring System Using RFID
RFID
Tanyaradzwa
Mugumwa
[MIG 461] BMIS 4.2
Patient Monitoring System Using RFID
By
Tanyaradzwa Mugumwa
Gweru
Zimbabwe
Feb 2022
i
CHAPTER ONE: INTRODUCTION
1.1 Introduction
The traditional ways of storing details of patients and monitoring the patients is tedious.
RFID patient control and monitoring system is a simple desktop application developed
using C# Language in Visual Studio. The application is based on the concept of
managing hospital patient, staff records and more. The patient cannot edit their own
information for security reasons. A user for example the admin, doctor or security has
to pass through a login system in order to use its features. A user can register a patient
by entering his/her details such as name, gender, age, contact details, any chronic
diseases, status, room/ward number and any other notes on the patient. The user can
also proceed and view patient’s condition, prescription and ward number. This section
contains patient id, name, gender, age, contact details, date in-out, room number, type
and their status. Other features include staff details. In order to manage staff details, the
admin panel is responsible for this. It has features such as a login panel for the admin,
the doctor and the security, patient registration and information checkouts as well as
managing room information.
It is necessary to provide a stronger communication channel since the interaction
between the remote application and the monitoring system is performed through the
public internet. To do so, this project exploits a Virtual Private Network channel that
links the computer with the RFID Patient Control and monitoring System. Since the
system collects sensitive and confidential data, the platform ensures an adequate level
of security to data access and management. For this reason, the application users, such
as the doctor or the security personnel are authenticated before they can access this
platform through a Graphical User Interface. Once access is granted, whether local or
remote, the user can then now act on the system. Also, the local and remote
communications must be adequately protected.
1
greener pastures. Patients with conditions such as dementia really need constant
monitoring which can be very difficult if there is less staff and Covid-19 measures have
to be followed. To reduce the transmission of Covid-19 through patient records on
papers, an electronic system can be used. When a patient is admitted into the hospital,
all their details are entered into the system and offered an RFID wristband that stores
all their information. When a patient is unconscious, a simple scan on their wristband
will display all their information on the screen. The RFID patient control and
monitoring system will also alert the staff if their patients exit their room or ward.
As well as its general medical and surgical sections, the hospital includes Mbuya
Nehanda, a maternity section; Sekuru Kaguvi, which specialises in eye treatment; and
an annex for psychiatric patients and several specialist paediatric wards. It has in excess
of 5000 beds and 12 theatres in the main hospital complex. The College of Health
Sciences of the University of Zimbabwe is based at Parirenyatwa. This is where the
university's medical students train from third year onwards.
The hospital has a school of nursing within the complex, which has three intakes of
general nurses per year for a three-year diploma in nursing and some post-basic courses
in intensive/theatre nursing, community and primary care nursing, and ophthalmic
nursing.
2
1.2.2 Organisational Structure
1.2.3 Vision
Parirenyatwa’s vision states: An excellence in the provision of medical services and
ensuring a reliable supply of medicines.
3
1.5 Objectives
The system should be able to;
• Allocate a patient ID
• Alert staff if patient exits their ward
• Scan patient’s RFID band and display their records
• Print patient activity and medication records
1.8 Conclusion
The chapter introduced the organization which needs the system. It also covered
structure of the organisation, its values and mission statement. The problem was
defined, and the proposed solution introduced. The chapter also highlighted the
objectives of this project and what is intended to the addressed. As this chapter is
concluded the next chapter looks at the planning phase of the system.
4
CHAPTER TWO: PLANNING PHASE
2.1 Introduction
This chapter identifies whether or not there is the need for a new system to achieve a
business’ strategic objectives. To achieve the aim, a clearly defined road map must be
laid out depicting the milestones and possible deliverables at differing levels of project
progress. Benefits to Parirenyatwa Group of Hospitals through the successful
implementation of this patient monitoring system using RFID will be stated. Pros and
cons of the whole system will be analysed under the feasibility study. If all
considerations are in favour of the development of the system, that is, if it is found
feasible, then work plan can be provided as to how the processes are to be performed.
This chapter will discuss and highlight on the following:
• Business value to both internal and external stakeholders
• Feasibility study
• Risk analysis by identifying and mitigating potential risks and work plan
The project analysis will then come up with the project schedule from which work plan
and Gantt chart will be produced.
5
2.2.1 Stakeholder Value
The shareholder value will increase since the system is an asset hence its
implementation will add value to the organisation as a whole. This should be carried
out at each stage of the project, so that one can continually assess and track each
stakeholder’s position. Making sure if all the people and organizations who are key to
your project are involved, if potential problems are being adequately dealt with and also
if everyone knows what is going on. The more involved the key stakeholders are, the
more likely the outcome of the system is to be appropriate and sustainable.
6
2.3.1 Technical
The technical feasibility answers the question as to whether the system can be built
given the apparent constraints in terms of resources and time amongst many other
factors. We look at the hardware and software required for the project to progress and
availability of the technical expertise that will be required for the software to be
developed. Parirenyatwa Hospital has acquired state of the art infrastructure in the past;
thus the required infrastructure is available. The current networking technology is very
suitable for the system to be developed. The system would be accessible over the Internet
such that all branches are able to communicate efficiently and easily.
Specifications
Hardware Software
Computer Windows 10 OS
Server with at least 8GigRAM, Apache webserver
200GB HDD
Processor i5, 2,5 GHz MySQL
RAM 4GB PHP3
Hard Disk 1TB Mozilla 100.0.2
Ethernet cables Cat 6
Firewall SOPHOS
Switch CISCO
Router CISCO
RFID Bracelet
RFID reader
2.3.2 Economic
An economic evaluation is a vital part of investment appraisal, dealing with factors that
can be quantified, measured, and compared in monetary terms. The results of an
economic evaluation are considered with other aspects to make the project investment
ensure that the testing system is undertaken in a manner that gives it the best chances
of success. Different types of economic evaluation are used to measure weather the
project is economically feasible or not and they include the following:
• Return on investment
• Cost benefit analysis
7
2.3.3 Social
The system will bring plenty of benefits to the local community i.e.(the people ) as is
will facilitate quality and efficient health care and reduce mortality rates significantly
by flushing out wrong diagnosis, treatments and monitoring patient movements. The
essence of the system, is reliable transaction delivery in a fast-changing environment
involving people, processes, and an operational or business infrastructure.
Early involvement reduces the probability of resistance towards the new system.
• Will the proposed system really benefit the Hospital? Does the overall
response increase? Will accessibility of information be lost? Will the system
effect the customers in considerable way?
• Does management support the project?
The proposed system has been placed in line with the mission statement of the
organization which has been clearly outlined in the proposal phase. With the
organization’s much placed emphasis on quality service provision to its clients, this
system goes a long way in ensuring that this attribute is met. In order to achieve this,
consultations with several members of staff were made and through these problems
within the current system were identified.
8
2.4 Risk Analysis
Risk management is the process of assessing, analysing risk and taking measures so as
to eliminate or reduce the risk and then try to maintain the risk to an acceptable level.
As with any other project there are risks involved and they pose a threat to the
development of the system. The following section will identify the serious risks,
estimate their likelihood of occurrence, assess them and to come up with the ways to
avert these risks and to monitor all circumstances that may lead to these risks.
The following are identified risks and possible solutions to them:
• Requirement changes: Technology is fast changing and as such user and system
requirements may change dramatically during development. This may lead to
obsolescence before completion. This entails massive research of industrial
standards as well as user preferences in regard to the main objectives of the
project. Once these are drawn up in detail then the risk of change would have
been averted.
• Limited resources: The Hospital may fail to make the equipment available for
use as needed thereby delaying the project, as a way of combating this situation
scheduling of use of equipment that is not dedicated to the project and
effectively communicating the planned dates and time to those responsible for
granting access to the equipment. This will ensure that any shared resources will
be available as needed
• Financing risk: The Organization may fail to provide the necessary finance to
efficiently complete the project or fail to make funds available as needed during
stages of development, to prevent inconsistent funding of the project, there is
need to request part payment before the project commences. These funds will
be managed by the developer and will be dedicated to meeting at least two thirds
of the project costs. The remaining third may be paid up before or just after
completion of the project.
• Unreliable estimates cost: with the current forex system in the country it might
be impossible to acquire forex as it is available on the black market hence
figures change on a daily basis.
• Resistance to change: Any new concept brings about resistance due to the fear
of unknown to users and the fear of losing the experience they gained in the
9
time past so to counter this problem training need to be carried out that will
enlighten users about how the new system will operate and its objectives.
10
Gantt Chart
ask ask
no
D s pt n
11 Sys D
10 M n n
9 S ff Us r r
8 Sys r
7 Sys s
6 Sys I
5 D D s
4 Sys D s
3 Sys A ss
2 F sb S
1 Pro Pr s
kN 4 5 6 7 7 8 9 10 11 11 12 13 13 13
2.6 Conclusion
After carrying out the feasibility studies, including the cost benefit analysis table, with
costs and benefits clearly outlined, it has been revealed that the project is practically
feasible. Thus, a proper planning of the project coupled with skilled management would
guarantee project success.
11
CHAPTER THREE: ANALYSIS PHASE
3.1 Introduction
The Analysis Phase is where the project lifecycle begins. This phase analyses the
existing and the proposed system. It fully scrutinises all the information (input and
output) and processes of the current system. It outlines who is currently involved in
using the system, data type, how and where the data is handled in the current system.
The analysis focuses on the identification of project’s overall direction through the
creation of the project strategy documents. Gathering requirements is the main
attraction of the Analysis Phase. From the requirements gathered, clear definition of the
input, processing, outputs and relationships between entities that make the system
function will be deduced. This phase will focus on the following major areas:
Data collection is the process of gathering and measuring data, information or any
variables of interest in a standardized and established manner that enables the collector
to answer or test hypothesis and evaluate outcomes of the particular collection. This
was an integral component of the research at Parirenyatwa Hospital to gather
information from doctors, nurses and the administration. The data to be used to make
this project a success will be gathered through research methods such as:
• Interviews
• Questionnaires
• Observation and Document Review
3.2.1 Interviews
An interview is a formal discussion consisting of at least two parties in which
information is exchanged. The interviews provide immediate answers to questions
that could not be answered by the former technique.
12
Advantages;
• Data collection was immediate as the facts were noted down as soon as the
responded gave an answer.
• Questioning directly enabled for probing to certain answers.
• Analyst had direct conversations with the respondents which gave them the
chance to clarify some questions that were not clear.
• Body languages and facial expressions were noted and they allowed the
analyst to observe the interviewee’s non-verbal communication and also
gather information by merely looking.
• The interviews permitted the analyst to customize questions for the employees
in relation to their respective departments and positions.
Disadvantages;
• Few interviews can be conducted because of cost constraints, interviews
are time consuming and therefore costly.
• Probability of gathering biased data was significantly high as the interviewer
might have significantly influenced the user’s responses.
• It is very difficult to rely on results obtained as they are highly depended on one
interviewer.
3.2.2 Questionnaires
It consists of a series of questions and other prompts to serve the purpose of gathering
information from respondents. Questionnaires can be used to collect both qualitative
and quantitative data and are often designed for statistical analysis of the responses.
Questions were prepared for particular staff members in relation to the roles they play
in the organization and were given out to the members of staff for them to fill and return
them within two weeks. The analyst noted some advantages and disadvantages that this
information gathering technique brought about.
Advantages;
• The staff members were easy to arrange and conduct compared to interviews
as there was less need of personal monitoring.
13
• The staff members gave respondents ample time to think about the
questions before responding and hence allowing them to give comprehensive
answers.
• Anonymity was maintained therefore enhancing the chances of
receiving genuine responses, there was no room for intimidation from
other employees or senior staff members.
• The data was easy to compile as it was gathered in a standardised form.
Disadvantages;
• The respondents left some of the questions unanswered or gave poor responses
leaving some areas grey and making it difficult to come up with conclusions.
• Questionnaires are time consuming as the responses did not come immediately
as in the case with interviews
3.2.3 Observations
A fact-finding technique in which one is interested in behaviour rather than perceptions
of the users. Tasks which are complex are sometimes difficult to clearly explain in
words but through observation, the analyst could identify tasks that had been missed or
inaccurately described by other fact-finding techniques. The data describing the
physical environment of the task i.e. physical layout was also obtained.
Advantages;
• Observations allowed observer to discover relevant information in
person without probing for it from somebody else.
• The observations did not interrupt the work of the organizations
employees as work continued smoothly.
Disadvantages;
• Not all activities were observable
14
3.3 Analysis of the Existing System
This will cover the description, pitfalls, inputs, processes and outputs of the current
system.
When a patient visits a hospital, the administrative staff accesses the patient’s file if
he or she has been treated before at that particular centre. If it’s the patients first visit
at the centre the receptionist captures the patient’s personal details into some paper
forms and files them.
The patient then pays the registration fee and is then referred to the nursing staff who
carries out his/her own diagnoses to determine the extent of the illness and also enters
his/her diagnoses results in a form. If it’s a minor issue or one that is within his/her
scope treatment or a prescription is offered but if it’s beyond the nurse’s scope, the
patient is then put on a waiting list or schedules an appointment to be attended by a
general doctor. The doctor attends to the patient he requests for the patients file which
contains all the patient’s details including the medical history and personal data (age,
sex, contact details etc) and a receipt for consultation fee payment. All this data is
filed and kept in the health file that is stored in a shelf by the records clerk. The doctor
then can work with the health record to help with his/her diagnosis if the illness is
within his scope the patient can be admitted or treatment can commence immediately
if the illness is beyond his scope he\she writes a referral letter to a specialist who can
deal with that particular illness.
When the patient is then admitted at the hospital, they are allocated a bed and a
ward. The doctors and nurses have to constantly monitor the patient at regular
intervals.
15
3.3.3 Processes of existing system.
• Creation and update of patient records
• Creation of admission and discharge summaries
• Monitoring and treatment updates
• Providing patients with prescription records
Activity diagram is used to visualize the process flows within the healthcare centres
in the organisation. It shows the stepwise activities and actions with support for
choice, iteration and concurrency. The diagram below helps illustrate the processes
that take place when a patient visits a health centre
KEY
Symbol Description
Initial State
Decision
Activity/Process
flow of data
Final State
Table 3.1 activity diagram key
16
Figure 3.1 activity diagram of existing system
17
3.3.6 Context Diagram of existing system
A context diagram is used a method of representing processes, data inputs and outputs
of the current system. Below is a context diagram
18
3.3.7 DFD of Existing System
A data flow diagram (DFD) shows how data moves through an information system but
does not show program logic or processing steps. A context diagram is a top-level
view of an information system. A context diagram is shown as one process. DFDs use
four basic symbols that represent processes, data flows, data stores and entities.
19
KEY
3.5.1 Outsourcing
This is buying software that is a ready-made product that seeks to quickly address
the problem that is being faced.
20
Advantages;
• Requires less technical staff.
• There are no development costs
• The process of changing the current system would take a shorter time to
implement.
Disadvantages;
• Expensive packages
• They are Fixed and Rigid. Packages cannot be customized to the current
activities
• They might have high maintenance complications especially if the vendor of
the software does not offer efficient support for the software
• Might cause privacy issues if the vendor is in constant interaction with the
system.
21
3.5.3 Development
This is producing software that is tailor made specifically for the organisation
and therefore meets all or attempts to meet all the requirements that would have been
identified.
Advantages;
• Lowers the time taken to attend a patient
• It becomes easy to monitor a patient and accessing their records
• With less staff, the hospital can be able to attend patients efficiently
• Reduces costs related to stationery
• Mortality rates can decrease due to efficiency
• Data confidentiality is improved
Disadvantages;
• Employees might be resistant to change
• Development and training costs are huge
• It will take time until the system fully integrates into day-to-day operations
22
3.6.2 Non-functional requirements
Performance;
Maintainability;
3.7 Conclusion
This study has actually shown that some features of the current system can be adopted
in the proposed system. Through the requirements analysis used to determine the
functionalities of the proposed. The current system was also analyzed through
generating alternatives that included Software Packages, Outsourcing, Improving the
current system and or In-house development. From the analysis, In-house development
is relatively cheaper than all other alternatives. The next step is the actual design of the
proposed system.
23
CHAPTER FOUR: DESIGN PHASE
4.1 Introduction
This phase is mainly concerned with the design of input and screen output interface for
the system. It involves the development of the objectives of the proposed system. It also
looks at how the system is going to work. That is, both the logical and physical design
is going to be tackled and done in this design phase. It looks into the actual system
design and clarifies how the system is going to work. It also looks into the Architectural,
Physical, Database and program design of the system. Initial interface designs are
developed in this phase making sure that all requirements proposed in the previous
chapter are followed.
4.2.2 Inputs
The following are inputs for the proposed system;
• Patient’s personal details
• Diagnosis records and prescriptions
• Allocated ward and bed number
4.2.3 Processes
• Creation of patient records
• Updating patient records
• Writing and reading data on the RFID bracelet
4.2.4 Output
• Patient’s personal information
• Prescription and diagnosis reports
24
• Admission and treatment summary
25
4.2.6 Data flow diagram
26
KEY
27
4.3 Architectural Design
The architecture design describes the system hardware, software and network
environment. The architecture design flows primarily from the no-functional
requirements.
28
4.4 User Interface
The interface design defines the way in which users will interact with the system and
the nature of inputs that the system will accept. Screen design of the system has been
designed in such a way that it provides a user friendly Graphical User Interface
(GUI). This includes defining internal and external control and data flows. Its
highest level of abstraction and hides the complex parts of the system by
simplifying the user’s interaction with the database by the provision of an interface,
it outlines the design for the menus, forms and reports.
29
Figure 4.4 menu page
30
4.4.3 Output Design
Displays reports queried from the system
31
4.5 Process Design
32
4.6 Program design
4.6.1 Pseudocode
User Login Module
// Responsible for authenticating user details and thus controlling access to the
system
Repeat
Else
33
Select user folder;
Function Upload
{
Read entered user details;
Else
} // end if statement
34
4.6.2 Class diagram.
35
4.6.3 Sequence diagram
36
KEY
37
4.7 Database design
4.7.1 Database architecture
38
4.7.2 Entity relationship diagram
39
KEY
4.8.2 Verification
The process of confirming or denying that a claimed identity is correct by comparing
the credentials of a person requesting access with those previously proven and
associated with the
means on the 7th day, the daily (son) graduates to weekly backup (father). On the 4th
40
week, the weekly backup graduates to a monthly (grandfather). The daily and weekly
tapes get re-used during the cycle while the monthly tapes are removed from the cycle
and stored securely offsite. The backups done will be of a full backup nature. This
means all the data is stored will be backed up.
41
Figure 4.11 summarized view of the testing process
Unit testing
In unit testing the objective is to verify whether the module components are functioning,
as they are required. That is, are they doing what they are supposed to be doing? for
example adding a patient to the database. This is done on the lowest level program
module (unit) in an isolated environment before it is combined with the other units to
form higher-level modules to be tested as a whole. Each component within the system
was tested individually before progressing to the next component. The unit tests were
done in two scenarios which are logical testing/white box testing and functional testing
/black box testing.
42
on the internal working detail of a unit and identifies errors not shown through
black box.
Advantages of white box testing.
• This test is able to inspect the internal state of the box after the test has been
run. This can be useful to ensure that internal information is in the correct
state regardless of whether the output was correct or not.
Disadvantages of white box testing.
• A skilled analyst is needed to carry out the test which makes the test expensive
and time consuming
Testing audience
Module Testing
43
This involves the testing of the different modules independent of one another. It
combined the details of the patient etc. Module testing collects individual components
in module testing and also tested to check if patient details could be deleted or updated
System Testing
System testing is the testing of all the integrated modules that makes up the system to
check if it was performing the required functions. The system is able to diagnose a
patient if the patient is not in the system. If the patient is available the system will
confirm then one can edit the patient’s details is to be edited. The system is able to add
new records of patient. The system is also able to cancel a user if he/she no longer
active. All queries are executed by the system. Finally, my system can produce reports
like the patient details.
44
CHAPTER FIVE: IMPLEMENTATION
5.1 Introduction
Implementation is the process of delivering the working system to the user. Before
this system is delivered to the user it should pass a series of tests to ensure that it
conforms to the user requirements and it performs in accordance with the system
specifications. Users of the system should also be trained on how to use the system
before system starts to operate and security measures should be put in place to guard
the system against attacks and unauthorized access. Activities to be undertaken under
the implementation phase include construction, coding, testing the application,
installation, training, file conversion, system change over, system operation, post
implementation evaluation, documentation and support activities.
These are the new system’s pre-requisites and system customization to meet the users
needs
.
5.2.1 Software Specifications
Software Versions Required
45
5.2.2 Hardware Specifications
Item Required
Processor 2.5GHz
RAM 4GB
Firewall Sophos
46
5.4.2 Training Schedules/plans
Training Mode of Training Expected status
topic training hours completion
date
core system Classroom and 3 03-06-2022
uses online
Security Classroom 3 04-06-2022
Back up Classroom 3 06-06-2022
Reports classroom 2 08-06-2022
Table 5.4 Training schedule
5.4.3 System Installation and User Acceptance
The process of installation included the conversion of data from the old system which
had to be entered into the new system. All users of the system will be entered into
the new system by the System Administrator. It is very important at this stage to
ensure data is entered accurately and in a complete manner. When running the new
system, the users will have to firstly verify if the information entered in the database
was accurate. Data cleaning will have to be done initially to avoid carrying over
unwanted data. This will involve the removal of data with missing values for instance
and the correction of figures that stand out and don’t fall within a particular range.
Reports were generated to show all data entered into the new system to avoid omission.
The data capture clerks had to make visual checks of the data.
47
Direct conversion
This is whereby the new system replaces the old one in its entirety in one go. The old
system is rendered obsolete and all the departments that were using it will now start
carrying out their daily activities under the new system. The cost incurred is relatively
low because one system is in operation. However, the risk is high because there is no
backup option.
Phased conversion
With this method the new system is installed in phases allowing the users to
become accustomed to its use as well as to phase out the old system. Cost is relatively
moderate because the system is implemented in stages. Risk is also relatively moderate
because the risk is limited to the module being implemented.
5.5 Maintenance
System maintenance involves periodically updating the system to meet current
demands as well as repair malfunctions that may arise as the system is put to use.
Primarily, this will be done to address changes associated with error correction,
adaptations required as the system environment evolves as well as those changes
48
arising from the dynamics of user requirements. The four types of changes
which will encountered with are correction, adaptation, enhancement and prevention.
Correction;
Adaptation;
This is meant to modify and adjust the system so as to bring compliance to the
prevailing operating environment. It can be as a result of a respond to changes in the
hardware and software evolutions that may affect system compatibility with
technologies in use or as a result of changes in the regulations governing the industry,
hence a need to adjust the system so as to adapt to the prevailing environment.
Enhancement ;
A type of maintenance which is a function of the missing requirements noted by users
which could be of importance if added. Such requirements will lead to an update
requirement so as to affect the requested requirements. The system allows for system
enhancements which may arise as the system is put to use.
Prevention ;
This is a maintenance to be done to enable the system to serve the needs of its end
users. It is also known as system re-engineering. The system will require this type of
maintenance so as to allow the continued use of the system and protect its stay in
business without compromising the interests of the end users and the organisation at
large.
49
• Accuracy, completeness and timeliness of the system
• System reliability and maintainability
• Adequacy of system control and security from unauthorized users.
• Quality and effectiveness of the training given to the users
5.8 Conclusion
The implementation of the system went on well and a detailed documentation of the
system has been done. Proper verification and validation of the system was done so
as to come up with a system with data integrity. In this chapter, the developer also
highlights what is expected to be done after the system has been installed. There is
also a look at the system backup in place and to be continuously done.
50