0% found this document useful (0 votes)
72 views

Identity Management A Complex Process With A Simple Goal

The document discusses key considerations for implementing an identity management system, including which departments it needs to integrate with, what business processes need to be established, whether to take a suite or best-of-breed approach, what existing systems need to integrate with it, who will do the integration work, what expertise is available in-house, and which identity management features to implement first. It also addresses questions around user provisioning and deprovisioning, role definitions, access for external users, physical component integration, and balancing security and usability.

Uploaded by

Gayathri Aparna
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Identity Management A Complex Process With A Simple Goal

The document discusses key considerations for implementing an identity management system, including which departments it needs to integrate with, what business processes need to be established, whether to take a suite or best-of-breed approach, what existing systems need to integrate with it, who will do the integration work, what expertise is available in-house, and which identity management features to implement first. It also addresses questions around user provisioning and deprovisioning, role definitions, access for external users, physical component integration, and balancing security and usability.

Uploaded by

Gayathri Aparna
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 16

Identity management a complex process with a simple goal

What noninformation technology departments and systems need to work with the identity management system? For example, human resources, physical security, finance? Do they already have information or systems in place that will help the initiative? What business processes need to be put in place to support identity management? Who will create, implement and manage the processes? Is a suite or best-of-breed approach best for your organization? Does the suite have everything you need, or will you still need additional components from other vendors? Can you purchase just one part of the suite and add other components later? What existing systems will need to integrate with the identity management system? Identity management software typically works well with Web-based or commercial applications but not with custom applications. Who will do the integration? What expertise do you have in-house for implementing the system? What outside help is required? Which features of identity management will you implement first single sign-on, provisioning, identity life cycle management, role-based access control? How will users be deprovisioned so there are no orphan accounts? Who is responsible for defining roles and access rights and assigning those to users? Besides agency employees, who else needs access general public, vendors, contractors, state and local agencies? How will you manage and control them? What types of physical components need to be integrated Homeland Security Presidential Directive 12 smart cards, fingerprint readers, door locks, radio frequency identification chips and sensors? What cultural barriers will you have to overcome? How? How will you balance security needs with usability? You don't want users using Post-it Notes to keep track of passwords that are too difficult toremember or have excessive help-desk calls for password resets.

o o

o o o o o o

o o

Unique Identification Number Project: Cautious Optimism


Fri, 2009-11-13 18:00 | Arjun Ghosh

On 30 and 31 October 2009 a workshop was organized at the Indian Institute of Advanced Study, Shimla on the project initiated by the Government of India to provide Unique Identification Number (UID) to all residents of India. The workshop was attended by members of the UID Authority of India (UIDAI) including Nandan Nilekani, who is heading the project, eminent social scientists and representatives of civil society groups working with various disadvantaged groups. The workshop is one of several consultative sessions being undertaken by the UIDAI in the run up to the roll-out of the project.

The workshop began with a presentation by Nandan Nilekani on the aims and objectives of the UID Project and its basic architecture. This was followed by discussions on various issues. One of the difficulties that scholars and critiques of the project have been faced

with was the lack of information on what were the exact dimensions of the project. Hence, the apprehensions - related to feasibility, cost, privacy and further marginalization of the marginalized which have been raised are based on an assumed architecture. In this article I shall record some of the proposed features of the UID project, as well as talk about some of the issues that came to light in the discussions at the workshop.
What does the UIDAI propose to do?

The objective of the project is to determine uniqueness of all individuals within

the territory of India. The UID is not to be treated as a determination of citizenship. The UIDAI will not provide any card. It will only issue a number which will be

delivered to the concerned person's address. The UID proposes to record the following data fields: etc. Date of Birth Current Address Permanent Address Gender Father's/ Mother's/ Guardian's Name and UID Number (for infants and Name taken as a string and not broken into First Name, Surname

minors) Photograph Prints of all 10 fingers Retina scan/ Iris (decision yet to be taken)

Decision is yet to be taken on required and optional fields.

Identification will be done for all, including infants. For infants, the record will

have to be updated regularly. The UIDAI will not register any person directly but through partners/ registrars

like the NREGS/ PDS/ LIC or Passport. When a person applies for any of these services which may ally themselves to the UID, the application process will involve the recording of all details required for the UID. The applicant will then be allotted a UID. To begin with Registration for UID will not be compulsory. In fact, from what I

gather, it would not be possible for an individual to obtain a UID separately from any service. As the scheme roles out more and more Registrars like banks, income tax department, election commission, may make UID compulsory. So, basically the UIDAI is looking at a time frame of 5-10 years for the complete

roll out of UID numbers to all residents of India. The UIDAI is targeting the issuing of the first set of numbers between Aug-Dec 2010. In four years to enroll about 600 million people. Registering the remaining population will be more difficult. In case of change of address the individual can visit any partner-registrar and

get the records changed after necessary verification. The UIDAI proposes to set up an online database for realtime verification of

details. The data fields on the UID database will not be downloadable. i.e. a clerk at the

counter will only be able to verify whether the data provided by the person at the counter is correct the system will respond with only 'Yes' or 'No'. Thus the clerk or any agent will not be able to download all details of a person by entering the UID number. This is important from the privacy point of view. However, the UID holder would be able to view all fields of data against her record. The UIDAI did not commit any budget estimate for the project as this will only be

clear after the technical details related to biometric become clear, i.e. whether they would use only fingerprinting or they need to include iris as well. The UIDAI is aware that a project of this scale has never been undertaken ever.

Though the technology exists it has not been proved at this scale.

The UIDAI proposes to put in place a Civil Society Advisory Council for a social

audit of the entire scheme to make sure it sticks to its objectives.


What are the projected benefits?

The UID will help remove duplicate names from various service lists. While this

would help clean up lists for NREGS, Old Age Pension Schemes, PDS etc, it may also help clean up benami bank accounts etc. Informally, the Income Tax Department is known to have projected an additional tax collection of about Rs.40,000 crores annually! Currently, however, the UIDAI's USP is focussed on the benefits to the poor. It will be possible to put in place systems of direct remittance to the beneficiary.

The proposal is to set up a network of Banking Correspondents (BC) much in the model of mobile recharge agents in every village and locality in the country. The Finance Ministry will soon come up with details of eligibility requirements of BC applicants. When the money to a beneficiary gets credited the individual can visit any BC and after biometric verification (which can be done through a kit costing about Rs.5000 and a mobile connection) withdraw the requisite amount in cash. This proposal will try to eliminate middlemen and leakages. (Interestingly, during the proceedings of the workshop Nandan Nilekani remarked that with uniqueness guaranteed it may be possible to think of an efficient universal PDS!!) The UID system is likely to benefit the poor who are often caught in a cyclical

process of verification of records. This would be a one time verification with all subsequent verification being taken care of by biometrics the slogan being the thumb is the card! The UID will also facilitate migration and mobility. Since the UID vouchsafes

uniqueness and identity it would be possible for a migrant labourer to easily get her BPL card transferred or open a no-frills bank account. Since the UID enrolls for life, it will force people to keep their record clean.

How will the UIDAI enroll people?

The major part of the difficulty would be in getting people to enroll and spread awareness about the benefits of the UID scheme.

The UIDAI lays stress in partnering with Civil Society groups working among the

poor and the marginal people. This issue was discussed at great length in the workshop. Doubts were raised on the efficacy of using NGOs as some of them could be

aligned to communal and fundamentalist groups which would gain legitimacy in the process. It was suggested that help should be sought from organisations of

disadvantaged groups like a rickshaw-pullers' association. A partnership with the Post Office and the panchayats was also suggested.

Difficulties and Unintended Consequences

Though the UID proposes to enable the inclusion of hitherto excluded sections

of society it may create new forms of exclusion. For instance, there are marginal groups who survive by being invisible to the state like slum dwellers in a city who live in constant fear of demolition and displacement, or forest population living in a reserve forest. Such groups may not want the new visibility. Certain powerful groups like owners of an illegal brick factory or mining agency

may prevent all under him from registering with the UID. Address proof for homeless people was another major stumbling block. Though

the UID can sanction uniqueness of a person, even without the address, the address becomes necessary for ensuring easy access to services like banking one of the USPs of the UID scheme. One of the possibilities discussed was that of flagging the address as verified or non-verified, which would then ensure that the UID number could be issued without address being a roadblock for benefits for which address may not be a prerequisite. However, this would create two categories of UID holders. Date of birth may be an issue with a majority of Indians lacking any verifiable

birth record. Date of birth becomes important for Old Age Pension benefits among other things. The name of a person may be another source of problem. Outside the literate

population a person may actually have multiple names. With the UID this is likely to get standardized.

Fears

One of the major fears that has been raised by many with regard to the UID

project is that of privacy. Though the UIDAI has not been mandated to set up any such system, once the UID system is in place, it would be possible to track an individual. Though the UID plans to record a small set of data fields, it is possible to pile on more data fields onto a record without the knowledge of the record-holder. Responding to the issue Nandan Nilekani pointed out that privacy is an issue but

the UID project is not the cause of it. He said today it is possible to track a person using her mobile phone, access basic details through the telephone directory and already there have been cases of the Voters' List being used for communal massacres. He suggested that we need to press for strong Privacy Laws. The possibility of misuse of the UID in context of a non-benign take over of state

power needs to be precluded by a strong Civil Society Advisory Council overseeing the UIDAI. One of the suggestions was that the range of uses of the UID should be limited

by law. For instance, a housing complex should not make UID/ biometric recognition mandatory for entry or taking up accommodation; job applications should not have to reveal their UID records; one should be able to buy a railway or air ticket without verifying fingerprints. The Free Software movement had raised an issue relating the possible threat to

sovereignty due to the UID project. This fear was raised in the context of Microsoft's declaration of desire to be a partner on the UID project. Microsoft as a corporation is tied to the laws of the United States of America. Microsoft being a proponent of proprietorial software would never let out the source code of the programs it would use on any project. If Microsoft or any other provider partners on the UID project there could be three possible situations: 1) In case of an adverse international political situation a foreign government could order the software vendor to lock or cripple the UID database in India a case of cyber-warfare; 2) it could lead to a situation of a vendor lock-in, whereby each time the UIDAI wishes to make changes to the database it would require the services of the software vendor, thus enabling the vendor continue to earn rent income; 3) the use of proprietorial software could have the unintended consequence of being incompatible with e-governance platforms which already use Open Source programing. The UIDAI team responded to

these concerns: 1) The Open Source model will be used for the UID project and the Source Code will be under public ownership; 2) all APIs will be standard and published APIs and can be accessed using a variety of software; 3) Proprietorial software may have to be used for specialized tasks like biometrics for that may be the cheaper and more efficient choice at hand, but in such cases the contract with the software firms will have sufficient safeguards to prevent any vendor lock-in.

Though the overall direction of the UIDAI is to make the government and governance more accessible to the poor, it is very difficult to imagine how this scheme will be rolled out among the millions of poor and marginalised in India. There are millions of homeless for whom the difficulty lies not in being able to provide an address-proof, but in having any address at all. Will they ever be able to open a bank account and be able to claim government benefits through Banking Correspondents!

The UID project also has a thrust in strengthening the central government and bypassing local governments inherent is a notion that peripheral authorities are inefficient. It is the technological core of the central or state level institutions which will displace corrupt middlemen. The UID project seeks to achieve through technology what politics has been unable to in independent India. If the UID project aims at combating poverty by making the distribution of money from government schemes more efficient, I would think that a similar initiative had been taken after independence through the legislation on land reforms. But land reforms, i.e. implementing land ceiling and redistribution of excess land, has been subverted by the State in India. Land redistribution could have unleashed an income redistribution which would have gone a long way in fighting poverty.

What I am trying to hint at that people in India are poor not because of inefficiencies in governance, but inefficiencies in governance exist because the class interests of India's ruling elite needs to keep people poor and deprived. The desire to use technology to fight poverty is another attempt by the neo-liberal State to legitimise its rule through reformism. It is quite strange to suggest that the root cause of government schemes not

working is because of leakages or duplicate names in the list of beneficiaries. After all one needs to study the comparative figures of how much of money is spent in povertyalleviation programmes and how much is dolled out in corporate tax holidays or simply as largess to the corporate sector in sell-outs like the multi-crore 3G-telecom scam!

The class basis of the Indian State which has caused various 'shadow' attempts to remove poverty in the past, is likely to hit back against the UID project as well when they find that the money making and money laundering channels are threatened by this project. Other than the subversion that one fears at the higher end of the UID hierarchy, I fear that the project can also be subverted at the local level. If the UIDAI proposes to set up a network of Banking Correspondents, as some participants at the workshops pointed out, at the local level it could be the elite who may grab these positions and subsequently seek kick-backs at the the point of handing over cash to the recipient. Technology can be used to transfer money in a cashless manner to the recipient's bank account but the recipient cannot utilise the value without encashing the money. However, scepticism apart the UID project is a valiant attempt to set the system correct. Given the huge sums of money which are written off as tax holidays to corporates and lost to the exchequer through corruption at various levels, the cost of the UID project seems worth giving a try. The UID is likely to enable the citizens to make greater demands from the state for having implemented the project the State can no longer blame leakages.

A curious dilemma faces the UIDAI. To make the project attractive and rationalise the costs involved, it needs to advertise the possible benefits it may entail. But the UIDAI itself is not mandated to implement or decide upon the way the UID will be used or what sort of government schemes will be run. Its mandate from the Home Ministry is to give every resident a number and guarantee uniqueness and verifiability. There is nothing anyone can tell the UIDAI on how the number should be used!

Another point to note is that the stress of the UID team is on partnering with Civil Society groups. I wonder whether political parties are considered to be part of such Civil Society! Certainly there is great scope for the democratic movement to get involved in critiquing the project with an aim to making it more responsive and more effective. There is a great need to generate greater public debate around the project so that the social exclusions can be minimised and the project can be made genuinely people-oriented. There is need for greater vigilance to ensure that the rent-seeking classes do not tinker the project to protect their interests. This is a political issue and political intervention is the need of the hour.

Hospital Management System

VB.NET

UNDER-GRADUATE

By leelamohan ~ Posted Thu, 14/04/2011 - 00:54 ABSTRACT Our project Hospital Management system includes registration of patients, storing their details into the system, and also computerized billing in the pharmacy, and labs. Our software has the facility to give a unique id for every patient and stores the details of every patient and the staff automatically. It includes a search facility to know the current status of each room. User can search availability of a doctor and the details of a patient using the id. The Hospital Management System can be entered using a username and password. It is accessible either by an administrator or receptionist. Only they can add data into the database. The data can be retrieved easily. The interface is very user-friendly. The data are well protected for personal use and makes the data processing very fast. 1 Hospital Management System PROBLEM DESCRIPTION The purpose of the project entitled as HOSPITAL MANAGEMENT SYSTEM is to computerize the Front Office Management of Hospital to develop software which is user friendly, simple, fast, and cost effective. It deals with the collection of patients information, diagnosis details, etc. Traditionally, it was done manually. The main function of the system is to register and store patient details and doctor details and retrieve these details as and when required, and also to manipulate these details meaningfully System input contains patient details, diagnosis details; while system output is to get these details on to the CRT screen. NEED 1. Efficiently maintains the details about the patient 2. Simultaneously updates changes made to any data, item in the entire data base. 3. It is faster than manual system 2 Hospital Management System SYSTEM STUDY

INTRODUCTION The goal of any system development is to develop and implement the system cost effectively; user-friendly and most suited to the users analysis is the heart of the process. Analysis is the study of the various operations performed by the system and their relationship within and outside of the system. During analysis, data collected on the files, decision points and transactions handled by the present system. Different kinds of tools are used in analysis of which interview is a common one. INITIAL INVESTIGATION The first step in system development life cycle is the identification of need of change to improve or enhance an existing system. An initial investigation on existing system was carried out. The present system of hospital is completely manual. Many problems were identified during the initial study of the existing system. 3 Hospital Management System EXISTING SYSTEM System analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. Here the key question is What all problems exist in the present system? What must be done to solve the problem? Analysis begins when a user or manager begins a study of the program using existing system. During analysis, data collected on the various files, decision points and transactions handled by the present system. The commonly used tools in the system are Data Flow Diagram, interviews, etc. training, experience and common sense are required for collection of relevant information needed to develop the system. The success of the system depends largely on how clearly the problem is defined, thoroughly investigated and properly carried out through the choice of solution. A good analysis model should provide not only the mechanisms of problem understanding but also the framework of the solution. Then the proposed system should be analyzed thoroughly in accordance with the needs. System analysis can be categorized into four parts. System planning and initial investigation Information gathering Applying analysis tools for structured analysis Feasibility study 4 Hospital Management System Cost/benefit analysis PROPOSED SYSTEM The drawback of the existing system is that it is very difficult to retrieve data from case files. It is difficult to handle the whole system manually and it is less accurate and to keep the data in case files for future reference because it may get destroyed. Moreover it is very difficult to retrieve data. Redundancy of data may occur and this may lead to the inconsistency. The manual system is so time-consuming. The proposed system is very easy to operate. Speed and accuracy are the main advantages of proposed system. There is no redundancy of data. The data are stored in the computers secondary memories like hard disk, etc. it can be easily receive and used at any time. The proposed system will easily handle all the data and the work done by the existing systems. The proposed systems eliminate the drawbacks of the existing system to a great extent and it provides tight security to data. ABOUT OPERATING SYSTEM

Windows XP is a line of operating systems developed by Microsoft for use on general purpose computer systems, including home and business desktops, notebook computers and media centers. The letters XP stand for experience. Windows XP is the successor to both 5 Hospital Management System Windows 2000 and Windows Me and is first consumer oriented operating system produced by Microsoft to be built on the Windows NT kernel and architecture. The most common editions of operating systems are Windows XP home edition, which is targeted at home users, and Windows XP professional, which has additional features such as, support for Windows server domain and two physical processors and is targeted at power users and business clients. Windows XP Tablet PC edition is designed to run the inkaware Tablet PC platform. Two separate 64 bit versions of Windows XP were also released, Windows XP 64 bit edition for IA-64(Itanium) processors and Windows XP Professional x64 edition for x86-64 processors. 6 Hospital Management System DATA FLOW DIAGRAMS DFD for Login Module DFD for Billing process Ok Rejected User Password Verifying User Name and Password Administrator Enter Administrator/User Login File User Password Detail Item Sales process User File Stock File Billing process Updating process Customer Item Bill Quotation Details Item Code 7 Hospital Management System Purchase Details DFD. Details

Medicine Purchase User Process Medicine File Stock File Updating process Item code, Qty Quotation Details 8 Hospital Management System ENTITY RELATIONSHIP DIAGRAMS Work Employee s On Department DateStarted Dept number Dept Name Emp- Number Name Address Controls Administrator HOD Doctor Dr-ID Name Address Works On Name Treat Patient ed by Patient ID Name Address 9 Hospital Management System SOFTWARE DESCRIPTION Microsoft Visual Basic 6.0 Visual Basic 6.0 is Microsofts latest version of the Visual Basic Programming language. Although writing programs can be a tedious chore at time. Visual Basic reduces the effort required on your part, and makes programming enjoyable. Visual Basic makes many aspects of programming as simple as dragging graphics objects on to screen with your mouse. Visual Basic 6.0 is more than just a programming language; the secret to Visual Basic is in its name Visual. With to days Windows Operating System, a program must be able to

interact with the screen. Keyboard, mouse and printer graphically. The environment provided by Visual Basic is suitable for any type of application. Using this environment, the user can visually design the objects that your application uses. Visual Basic is not just a languages, its an integrated development environment in which you can develop, run, test and debug your applications. The impressive array of 10 Hospital Management System programming resources provided by Visual Basic enables to create the objects extemporaneously which can range from pop-up menu to a message box. A form is a major part of Visual Basic application, which allows the user to enter the data as well as view the result. A control is an object that we draw on a form to enable or enhance user interaction with an application. Hence a Visual Basic application is a combination of object like forms and controls, procedures that can respond to Events and other general-purpose procedures. EVENT Event procedures are where we do the actual computer programming and are saved with the form in the file with the frm extension. These procedures are where we write BASIC language statements. You will learn a lot of programming and BASIC language in this course. The BASIC you will learn is very similar to the original BASIC used by Bill Gates and Paul Allen when starting Microsoft. Parts of the Visual Basic Program Event processor Event Procedure Event Procedure Event Procedure 11 Hospital Management System Visual Basic is more than just a computer language. It is a project building environment. Within this one environment, we can begin and build our project, run and test our project, eliminate errors (if any) in our project, and save our project for future use. With other computer languages, many times you need a separate text editor to write your program, something called a compiler to create the program, and then a different area to test your program. Visual Basic integrates each step of the project building process into one environment. Lets look at the parts of the Visual Basic environment. Features of Visual Basic: 1. Good User Interface. 2. OLE Features. 3. Windows API Features. 4. 32 bit Programming Languages. 5. Data Management 6. Online Help 7. Data Access. Areas of Application 12 Hospital Management System

The term "Personal Programming" refers to the idea that, wherever you work, whatever you do, you can expand your computer's usefulness by writing applications to use in your own job. Personal Programming is what Visual Basic is all about. Using Visual Basic's tools, you quickly translate an abstract idea into a program design you can actually see on the screen. VB encourages you to experiment, revise, correct, and network your design until the new project meets your requirements. However, most of all, it inspires your imagination and creativity. Visual Basic is ideal for developing applications that run in the new Windows 95 operating system. VB presents a 3-step approach for creating programs: 1. Design the appearance of your application. 2. Assign property settings to the objects of your program. 3. Write the code to direct specific tasks at runtime. Visual Basic can and is used in a number of different areas, for example: Education Research Medicine Business Commerce Marketing and Sales Accounting Consulting 13 Hospital Management System Law Science Microsoft Access 2003. Microsoft Access is the default database of Microsoft Visual Basic. Microsoft Access 2003 provides many new features that make working with data and designing a database even easier. Microsoft Access Database is a collection of data and objects related to particular topic or purpose. Microsoft Access Database may contain tables; queries, forms, reports, macros modules and shortcuts top data access pages. Microsoft Access is a Relational Database Management System. Using Access we can organize our data according to subject and can store information about how different subject are related. In general MS-Access database can have several small tables. Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the 2007 Microsoft Office system. Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or any ODBCcompliant data container (including MySQL and PostgreSQL). Skilled software developers and data architects use it to develop application software. Relatively unskilled programmers 14 Hospital Management System and non-programmer "power users" can use it to build simple applications. It supports some object-oriented techniques but falls short of being a fully object-oriented development tool. Access was also the name of a communications program from Microsoft, meant to compete with ProComm and other programs. This proved a failure and was dropped. Years later Microsoft reused the name for its database software.

Access is used by small businesses, within departments of large corporations, and by hobby programmers to create ad hoc customized desktop systems for handling the creation and manipulation of data. Access can be used as a database for basic web based applications hosted on Microsoft's Internet Information Services and utilizing Microsoft Active Server Pages ASP. Most typical web applications should use tools like ASP/Microsoft SQL Server or the LAMP stack. Some professional application developers use Access for rapid application development, especially for the creation of prototypes and standalone applications that serve as tools for on-the-road salesmen. Access does not scale well if data access is via a network, so applications that are used by more than a handful of people tend to rely on Client-Server based solutions. However, an Access "front end" (the forms, reports, queries and VB code) can be used against a host of database back ends, including JET (file-based database engine, used in Access by default), Microsoft SQL Server, Oracle, and any other ODBC-compliant product. Features One of the benefits of Access from a programmer's perspective is its relative compatibility with SQL (structured query language) queries may be viewed and edited as SQL 15 Hospital Management System statements, and SQL statements can be used directly in Macros and VBA Modules to manipulate Access tables. Users may mix and use both VBA and "Macros" for programming forms and logic and offers object-oriented possibilities. MSDE (Microsoft SQL Server Desktop Engine) 2000, a mini-version of MS SQL Server 2000, is included with the developer edition of Office XP and may be used with Access as an alternative to the Jet Database Engine. Unlike a modern RDBMS, the Access and the Jet Engine implements database triggers and stored procedures in a non-standard way. Stored Procedures are implemented in VBA, and Triggers are only available from embedded Forms. Both Triggers and Stored procedures are only available to applications built completely within the Access database management system. Client applications built with VB or C++ are not able to access these features. Starting in MS Access 2003 (Jet 4.0), there is a new syntax for creating queries with parameters, in a way that looks like creating stored procedures, but these procedures are still limited to one statement per procedure. Microsoft Access does allow forms to contain code that is triggered as changes are made to the underlying table (as long as the modifications are done only with that form), and it is common to use pass-through queries and other techniques in Access to run stored procedures in RDBMSs that support these. In ADP files (supported in MS Access 2003 and later), the database-related features are entirely different, because this type of file connects to a MSDE or Microsoft SQL Server, instead of using the Jet Engine. Thus, it supports the creation of nearly all objects in the underlying server (tables with constraints and triggers, views, stored procedures and UDF-s). However, only forms, reports, macros and modules are stored in the ADP file (the other objects are stored in the back-end database). 16 Hospital Management System CONCLUSION The HOSPITAL MANAGEMENT SYSTEM is a great improvement over the manual system using case fields and paper. The computerization of the system has sped up the process. In the current system, the front office managing is very slow. The hospital managing system

was thoroughly checked and tested with dummy data and thus is found to be very reliable. ADVANTAGES It is fast, efficient and reliable Avoids data redundancy and inconsistency Very user-friendly Easy accessibility of data Number of personnel required is considerably less Provides more security and integrity to data 17 Hospital Management System FUTURE ENHANCEMENTS The proposed system is Hospital Management System. We can enhance this system by including more facilities like billing system, inpatient room allotment for the admitted patients and the stock details of medicines in the pharmacy. Providing such features enable the users to include more comments into the system. BIBLIOGRAPHY Books A Complete Guide to Programming in Visual Basic .Net -Michael McMillian A Complete Visual Basic 6 Training Course: How to Programme: Package -Harvey M deitel,Paul j deitel,Tem R Neito Advanced Programming Using Visual Basic: Version 6.0 -Julia Case Bradley Access 2003 Power Programming with VBA -Allen G Taylor Advanced MS Visual Basic -Peter Morris Site Address www.associatedcontent.com www.members.tripod.com

You might also like