FD Number
FD Number
FD Number
The intention of the study was to build up a computer based Disease detection for minor illness
and management alert system that helps to improve the services of Gweru Provincial Hospital.
The previous manual system’s problem was that it had loopholes that sometimes inaccuracy
identification of diseases was done by the doctor as well as people getting consulted without
paying the consultation fee. Feasibility study was carried out and the result showed it was worth
building a new system. A number of fact finding methodologies which includes Interviews,
observation and sampling were used to get a thorough understanding of the system. Alternative
solutions were done and in house development was recommended as the best because of low
implementation costs and full ownership by users. The main objectives of the new replacement
system were for it to identify a disease based on symptoms entered by the user, to immediately
diagnose the identified disease and its cure, to provide a chat platform between doctor and
patients as well as forbidding those who have not paid the consultation fee from accessing
information from the system. The system was developed using MySQL and PHP. The system
was then implemented using parallel changeover method because of the advantages that it gives
the user a solid platform to go back to the old system in case of new system malfunctioning.
Also the risks are relatively moderate. After all this has been done, Maintenance, which is on-
going, is going to be implemented using adaptive method as it considers adapting of the system
to changing environment. In future, it is recommended that the system should also provide
consultation for adults.
i
Declaration
I, Takunda Zambada do hereby declare that I am the sole author of this computer project. I
authorise the Midlands State University to lend this project to other institutions or individuals for
the purpose of scholarly research.
ii
Approval
This is dissertation entitled entitled “Disease Detection For Minor Illness and Management
Alert System” by Takunda Zambada meets the regulations governing the award of the degree
of BscHonours Information Systems of the Midlands State University, and is approved for its
contribution to knowledge and literary presentation.
Date………………………………
Supervisor………………………..
iii
Acknowledgement
I would want to thank my supervisor Mr M. Giyane for her outstanding supervision and
unwavering support I got from her while carrying out my research project. Her dedication,
assistance and patience led this project to be a success. My earnest thanks also go to the staff of
Gweru Provincial Hospital for helping me to gather facts that I used in my project and also
allowing me to carry my research using some of their confidential information. I want also to
acknowledge the following people for the contributions they made: Mrs Chirunga – Human
Resource Manager (Gweru Provincial Hospital), HINFOR Level 2.2 members and my parents
Mr and Mrs Zambada, for her unending support. Without her, I would not have made it. May the
Almighty Lord richly bless her my big brother Tafara for the guidance. Above all many thanks
goes to the Lord Almighty, without his blessing I would not have made it through.
iv
Dedication
I would like to dedicate this project together with its documentation to my family for their moral
and financial support during this crucial phase of my academic life. Thank you so much. Much
love.
v
Table of Contents
Abstract i
Declaration ii
Acknowledgement iv
List of Acronyms vi
CHAPTER 1:
INTRODUCTION………………………………………………………………………………...1
1.1 INTRODUCTION.................................................................................................................1
1.2:BACKGROUND OF THE STUDY......................................................................................1
1.2.1 Background of the organisation......................................................................................1
1.2.2 Organisational structure..................................................................................................2
1.2.3 Vision..............................................................................................................................3
1.2.4 Mission statement............................................................................................................3
1.3 PROBLEM DEFINITION.....................................................................................................3
1.4 AIM........................................................................................................................................4
1.5 OBJECTIVES........................................................................................................................4
1.6 INSTRUMENTS AND METHOD........................................................................................4
1.7 JUSTIFICATION AND RATIONALE.................................................................................5
1.8 CONCLUSION......................................................................................................................5
CHAPTER 2: PLANNING
PHASE………………………………………………………………………………………….....7
2.1 INTRODUCTION.................................................................................................................7
2.2 BUSINESS VALUE..............................................................................................................7
2.3 FEASIBILITY STUDY.........................................................................................................8
2.3.1 TECHNICAL FEASIBILITY.........................................................................................8
2.3.2: Economic feasibility.....................................................................................................10
2.3.3: Social feasibility...........................................................................................................15
2.3.4 Operational feasibility...................................................................................................15
2.4: RISK ANALYSIS...............................................................................................................16
2.4.1: Tight schedule risk.......................................................................................................16
2.4.2: Information risk............................................................................................................17
2.4.3: Economic risk...............................................................................................................17
2.5: STAKEHOLDER ANALYSIS...........................................................................................17
vi
2.7: WORK PLAN.....................................................................................................................18
2.7: CONCLUSION...................................................................................................................20
CHAPTER 3: ANALYSIS PHASE……………………………...
……………………………………………………………21
3.1: INTRODUCTION..............................................................................................................21
3.2: INFORMATION GATHERING METHODOLOGIES.....................................................21
3.2.1: Observation..................................................................................................................22
3.2.2: Interviews.....................................................................................................................22
3.2.3 Questionnaires...............................................................................................................24
3.2.4 Sampling........................................................................................................................24
3.3: ANALYSIS OF THE EXISITING SYSTEM....................................................................25
3.4: DATA ANALYSIS.............................................................................................................26
3.5: WEAKNESSES OF THE CURRENT SYSTEM...............................................................29
3.6: EVALUATE ALTERNATIVES........................................................................................29
3.6.1: Outsource.....................................................................................................................29
3.6.2: Improvement................................................................................................................30
3.6.3: Development................................................................................................................31
3.7: REQUIREMENTS ANALYSIS.........................................................................................33
3.7.1: Functional requirements...............................................................................................33
3.7.2: Non-functional requirements........................................................................................35
3.8: CONCLUSION...................................................................................................................35
CHAPTER 4: DESIGN
PHASE…………………………………………………………………………………………..36
4.1: INTRODUCTION..............................................................................................................36
4.2: SYSTEM DESIGN.............................................................................................................36
4.3: ARCHITECTURAL DESIGN............................................................................................39
4.3.1 Hardware requirements.................................................................................................39
4.3.2 Software requirements...................................................................................................39
4.4 PHYSICAL DESIGN..........................................................................................................41
4.5 DATABASE DESIGN.........................................................................................................42
4.5: ENTITY RELATIONSHIP DIAGRAM (ER) DIAGRAM...............................................43
4.6: INTERFACE DESIGN.......................................................................................................44
4.6.1: Menu design.................................................................................................................44
vii
4.6.1: Main menu....................................................................................................................44
4.6.2: Input design..................................................................................................................45
4.6.3: Output design...............................................................................................................49
4.7: PSEUDO CODE.................................................................................................................51
4.8 SECURTY DESIGN............................................................................................................53
4.8.1 Physical Design.............................................................................................................53
4.8.2 Network security...........................................................................................................53
4.8.3 Operational security......................................................................................................54
4.9 CONCUSION......................................................................................................................54
CHAPTER 5: IMPLEMENTATION
PHASE…………………………………………………………………………………………...55
5.1: INTRODUCTION..............................................................................................................55
5.2: CODING.............................................................................................................................55
5.3: TESTING............................................................................................................................55
5.3.1: Unit testing...................................................................................................................56
5.3.2: Module testing..............................................................................................................56
5.3.3: System testing..............................................................................................................57
5.3.4: Acceptance testing........................................................................................................58
5.3.5 Validation......................................................................................................................59
5.3.6 Verification....................................................................................................................60
5.4 INSTALLATION.................................................................................................................61
5.4.1 User Training.................................................................................................................62
5.4.2 System Changeover.......................................................................................................62
5.5 MAINTENANCE................................................................................................................64
5.5.1 Corrective Maintenance................................................................................................65
5.5.2 Adaptive Maintenance...................................................................................................65
5.5.3 Perfective Maintenance.................................................................................................66
5.6 Recommendations For Future Development.......................................................................66
5.7 CONCLUSION....................................................................................................................66
References………………………………………………………………………………………67
Appendices……………………………………………………………………………………...68
viii
List of Figures
Fig 1.1 Organogram.........................................................................................................................2
Fig 3.1 Context diagram................................................................................................................26
Fig 3.2 Use Case Diagram.............................................................................................................34
Fig 4.1 Context Diagram...............................................................................................................37
Fig 4.2 Data Flow Diagram...........................................................................................................38
Fig 4.3 Architectural design of the new system............................................................................40
Fig 4.4 Three Level Architecture...................................................................................................42
Fig 4.5 Main Menus & Sub Menus...............................................................................................44
Fig 4.6 Login Form........................................................................................................................45
Fig 4.7 Registration Form..............................................................................................................46
Fig 4.8 Payment Confirmation Form.............................................................................................47
Fig 4.9 Entering symptoms............................................................................................................48
Fig 4.10 Registration Report..........................................................................................................49
FIG 4.11 List Of Users..................................................................................................................49
Fig 4.12 Display Of Diseases.......................................................................................................50
Fig 5.1 Testing Process Flow.........................................................................................................57
Fig 5.2 Acceptance Testing...........................................................................................................58
Fig 5.3 Validation..........................................................................................................................59
Fig 5.4 Validation..........................................................................................................................60
Fig 5.5 Verification........................................................................................................................61
Fig 5.6 Verification........................................................................................................................61
Fig 5.7 Direct Changeover Method...............................................................................................63
Fig 5.8 Parallel Implementation....................................................................................................64
Fig 5.9 Maintenance process.........................................................................................................65
ix
List of Tables
x
LIST OF APPENDICES
xi
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: