CHAPTER 1: INTRODUCTION TO THE STUDY PROJECT TITLE PDA-Rehabilitation Management System BACKGROUND...

67
CHAPTER 1: INTRODUCTION TO THE STUDY PROJECT TITLE PDA-Rehabilitation Management System BACKGROUND According to (L. Leape, 2003) stated that every year, millions of sick and injured people go to hospitals, putting their trust in medical staff to do whatever is necessary to help them. While the majority of the patients receive the level of help and care required, others are not so fortunate. In fact, hospital errors occur more frequently than generally known. Even worse, when they do occur, hospital errors can have devastating, potentially fatal, consequences. Medical error generated increase the attention to the issue of patient safety in the health care system. Among hospital inpatients, medications are a leading cause of adverse events, and errors involving medications are frequent. (Rosen-bloom, 2003) has mentioned in his article of medical error that medical dosage error continue to contribute heavily to thin ongoing health care crisis and cause high percentage of death every year. The reputation of the entire healthcare industry is at stake, as patient confidence continues to proportionately erode. After all fragile patient –doctor relationship is a bond of trust around which any healthcare system must revolve. El-Jabry Page 1

Transcript of CHAPTER 1: INTRODUCTION TO THE STUDY PROJECT TITLE PDA-Rehabilitation Management System BACKGROUND...

CHAPTER 1: INTRODUCTION TO THE STUDY

PROJECT TITLEPDA-Rehabilitation Management System

BACKGROUNDAccording to (L. Leape, 2003) stated that every year,

millions of sick and injured people go to hospitals,

putting their trust in medical staff to do whatever is

necessary to help them. While the majority of the

patients receive the level of help and care required,

others are not so fortunate. In fact, hospital errors

occur more frequently than generally known. Even worse,

when they do occur, hospital errors can have devastating,

potentially fatal, consequences.

Medical error generated increase the attention to the

issue of patient safety in the health care system. Among

hospital inpatients, medications are a leading cause of

adverse events, and errors involving medications are

frequent. (Rosen-bloom, 2003) has mentioned in his

article of medical error that medical dosage error

continue to contribute heavily to thin ongoing health

care crisis and cause high percentage of death every

year. The reputation of the entire healthcare industry is

at stake, as patient confidence continues to

proportionately erode. After all fragile patient –doctor

relationship is a bond of trust around which any

healthcare system must revolve.

El-Jabry Page 1

There is potential for a hospital error at many stages of

the patient’s hospital visit of stay. Everyone – from the

first nurse to check a patient in, to the doctor, to the

x-ray technician, to the surgeon, to the pharmacist, must

be diligent about his or her work in order to ensure that

patients have as error-free visit. Unfortunately,

hospitals especially government hospital or local

hospitals are often busy, short-staffed, and resources

are often scarce. This creates an environment conductive

to hospital errors.

An erroneous medication use history may result in failure

to detect drug-related problems as the cause of hospital

admission or lead to interrupt or inappropriate drug

therapy during hospitalization. Either occurrence may

adversely affect patient safety. Following hospital

discharge, the perpetuation of these errors may result in

drug interactions, therapeutic duplication, other

unintended adverse events and additional cost.

In a recent study (Rosen-bloom, 2003) claimed that from

the opposite side of the bed, healthcare professionals

are often equally frustrated. To err is indeed human, yet

physicians, more so than most professionals, are expected

to make no mistakes. Pressures mount as ongoing medical

research and technological advances produce a virtual

mountain of information for healthcare professionals to

incessantly monitor. As a result, fragmented and varied

care can produce inconsistencies in healthcare emphasis

and service, to which medical professionals are held El-Jabry Page 2

accountable. Combine this avalanche of information with

the day-to-day stress of a working medical environment,

and mistakes, regardless of intent, become inevitable.

Some of these common hospital errors are shown in the

following table;

Problems DescriptionDoctor’s mistakes Doctors are not infallible,

no matter how much we would

like them to be. Sometimes

doctors make mistakes

unintentionally. These

mistakes are actually more

common than generally known

because doctors are

reluctant to report them out

fear of liability-making

doctor’s mistakes one of the

most underreported types of

medical malpractice. Medical

malpractice, including

medical mistakes and

negligence, is one of the

leading causes of death and

injury. Medical malpractice

may involve serious errors

such as wrong site surgery,

labor mismanagement, a

El-Jabry Page 3

botched procedure, or other

gross mistakes. Yet most

cases, the negligence is

less obvious, though equally

detrimental. Many medical

mistakes occur when a doctor

or other health practitioner

absentmindedly prescribes

the wrong medicine, do not

check into a patient’s

medical background

thoroughly, and otherwise

fail to meet the acceptable

standards of providing

prudent and skilled medical

care.

Nurses Mistakes Nurses are also constantly

challenged by the

availability of information

resources at the point of

care. Evidence supports that

clinically relevant

questions may be answered by

performing queries in

electronic bibliographic

databases such as MEDLINE.

One study addressed

El-Jabry Page 4

information needs and

communication difficulties

for nurses and physicians.

It has been found that,

nurses had specific

information needs related to

patient diagnoses,

laboratory and other test

results, drug information,

patient/caregiver teaching,

this causes them to perform

error the to patients.

Surgical errors (J. Krizek, 1999) Mentioned

sometimes Surgeons do make

mistakes regardless of

intent. Sadly, surgical

errors are not uncommon.

Non-fatal surgical errors

occur at an equally alarming

rate and often result in

serious injury, like

paralysis or permanent

disability, to the patient.

Causes

Inattentiveness

Fatigue

Miscommunication

El-Jabry Page 5

Poor Handwriting

RecklessnessConfusion of one patient

with another

When the doctors, or nurses

have got a lot of patient in

the hospital, he might be

confused in providing the

right service to the right

patient.Improper diagnoses It occurs when a patient is

treated for a disease he or

she does not have or a

disease goes untreated

because of the failure of a

doctor to recognize a

threatening condition.

Medical Error This can include over-or

under-medication,

administering the wrong drug

or incorrect diagnosis. Etc.

Drug ordering problems This is due to failed

communication, including

poor handwriting, name

confusion, decimal paint

errors, inappropriate

abbreviation, ambiguous or

incomplete orders.

El-Jabry Page 6

The way of discharge medication lists at hospitals

contributes very much in the evolution of errors. As we

can see there is a disadvantage of time consuming (time

wastage), possibility of increasing medication errors,

inconvenient accessibility of information with a patient.

The system needs improvement in order to prevent or at

least reduce the occurrence of these errors to avoid

harm.

A medication error is any preventable event that may

cause or lead to inappropriate medication use of patient

harm while the medication is in the control of the health

care professional, patient, or consumer. Such events may

be related to professional practice, health care

products, procedures and systems.

Rationale

The use of PDA technology for medical application is

opening a new field to research in recent years. This

technology appears to be very useful for collecting data

and data entry at point of care providing tools to enter

data in an efficiency and consistent way to nurses,

physicians and doctors. New information technologies,

particularly personal digital assistants (PDA), will be

able to provide readily accessible medical information at

the point of care. Bedside use of these portable

electronic devices, equipped with relevant, reliable and

El-Jabry Page 7

accurate drug and medical reference can help to reduce

the prevalence of medical errors in hospitals and improve

patient safety at point of care.

Tangible Benefit

Improve quality of management and hence, improve

patient safety

PDA application will help nurses to manage the

patient information. Check the medical order and

recording the nursing care plan at point of care.

Ward in Hand to computerize clinical record by

connecting the PDA to the wireless connection

directly to the central database. It application

should collect clinical and relevant patient

information like test and labs at the bedside.

The system will be able to display and update

patient problems and treatments, medication,

ordering and print the documents.

The interface will have the prototype application

that stats the importance of usability and human

computer interaction on the PDA. The system will

provide graphical user interface for east use and

learn.

The other benefit is its portability and ease of

use. Since these devices are generally small, they

can be placed in a suit jacket pocket or in a purse.

El-Jabry Page 8

This allows user nurses to have the patient’s

information at their fingertips.

PDA have the ability to share the information, they

are not the devices unto themselves. Most of them

have the ability to talk to the PC or each other.

The system provides ubiquitous access, allows making

editing patient information easier, and provides

easier patient archiving.

DPA are light weight device that can access a server

anywhere, anytime. With the help of wireless

technology integrated with the medical field can

form an extensive frame work that can significantly

aid health care providers.

Intangible Benefits Reduction of Medication Error

Convenience of using the system, the use of

technology in medical field. Health care information

is becoming a more popular are of research and

development because doctors are in need of new

technology so they can attend their patients in a

more efficient way.

The system will save the time. When the nurse simply

held a cell phone in her hand and accessed the

patient’s information from a built in system, it

would be much quicker and less time would be wasted.

Degree of usefulness

El-Jabry Page 9

AIMS AND OBJECTIVES

Prior to developing a system, the aims and objectives for

the system development have to be set. An application

developed without a goal would lead to nothing and more

likely result to a disastrous outcome.

CORETo manage patients and drug information based on PDA.

This will determine the optimal rehabilitation

information available on PDA by the use of wireless

El-Jabry Page 10

technology used in daily hospitalization activities to

meet the goal of reducing possible errors. The PDA will

have the application that would have access to the

database where all drug and patient information would be

kept there.

ENHANCEMENT1. To provide wireless communication between nurses and

doctors, the system must be able to support communication

between users through PDA and support multiple users to

connect to the database and share the available

information. Nevertheless, the system should provide

electronic prescription using PDA tool which will avoid

illegible prescriptions and transcription error would be

avoided with machine text and transmission via either

wireless network of fax i.e. allow user to fax and print

copies of medication list.

2. To provide email alert.

SPECIALThe System should be able to monitor the network in the

work place.

El-Jabry Page 11

JUSTIFICATON FOR THE RESEACH

1. The system that would be created would be web-base

system

2. During testing the system, we might test it by using

emulator if the PDA device itself will be

unavailable.

3. There should be wireless network along the place

that we expect to test the system. The wireless

network is unavailable then the system cannot be

tested.

4. Battery life must be least as long as a typical

medical workday. Most PDAs have battery lives of 1

to 4 weeks (depending on usage, and whether the

device is rechargeable or uses disposable alkaline

batteries)

5. A minimum of 16 MB is recommended for medical

applications and e-texts, which tend to be

relatively large (1 to 5 MB). However, 8 MB would be

sufficient if the device is expandable through

compact flash, secure digital or memory stick cards

METHODOLOGYThe methodology chosen for the development of this system

is Rational Unified Process (RUP) establishing four

phases of development. Each of the phases is organized

into number of iterations that must satisfy defined

criteria before the next phase is undertaken. In the El-Jabry Page 12

first phase, named inception phase, the scope of this

project is defined as well as its business case; in the

second phase known as elaboration phase, the project’s needs

are analyzed in detail; in the third phase known as

construction phase, the system design is created as well as

the source code; and finally, in the last phase known as

transition phase, the system is delivered to users.

CONCLUSIONAfter medical student or practitioner decide to take

advantage of this ongoing PDA revolution. Several

important factors must first be considered. After all,

efficient point-of-care computing demands:

Portability

Practicality

Screen clarity

PC synchronization

For improving the performance of users as well as

providing accurate results, adopting Rational Unified

Process (RUP) methodology for the development of proper

PDA and resident software have been chosen, any

healthcare practitioner will have the necessary point-of-

El-Jabry Page 13

care information required to help minimize the risk of

medical error.

CHAPTER 2: LITERATURE REVIEW.Today there are many hospitalization systems that have

been developed to help the safety of hospital patients

and reduce hospitalization error. However, data are

consistent with recent reports that patient safety

progress is slow and is a cause for great concern. As (R.

Longo,2010) mentioned that medical error as primarily an

organizational issue resulting from inadequate or non-

El-Jabry Page 14

existence systems that evidence suggested would reduce

the probability of error; from this perspective, problem

in care are largely the result of poorly organized care

systems in which breakdowns occur in the transfer of

complex information from physician orders to the patient

bedside, with many clinicians and systems involved from

start to completion, the hospitalization systems needs

improvement. Clearly, the time is long overdue for not

only addressing this nationwide crisis in healthcare, but

providing tangible and effective solutions at the point-

of-care.

The new Information Technologies (IT), particularly

personal digital assistants (PDAs), will be able to

provide readily accessible medical information at point

of care. Although definitive study are all necessary, the

bedside use of those electronic devices, equipped with

relevant, reliable and accurate drug, medical reference,

email alert and monitoring IP addresses of the devices

connected to the network, can help to reduce the

prevalence of medical errors.

DOMAIN RESEARCHPDA- Rehabilitation management system is a system that

would be able to provide readily accessible medical

information at point of care to reduce medication errors

in hospitals or any other clinic environment. The

implementation of this system will require the

El-Jabry Page 15

combination of several technologies from the first stage

of development to end. According to the research, a

researcher has tried to choose the best technologies that

would fulfill the requirement of the proposed system.

Review of Past Research Works and Identification of

Gaps

Comparison and contracts with the positions developed by

other research

(Cacace et al, 2004) They have conducted a project of

Hospital Information System for Students (HISS), run by

Campus Bio-Medico University of Rome, students of

Medicine. They were trained to use handled devises

connected through a WLAN to record patients’ data. Beside

learning the new technology and applying it for freely

accessing teaching resources from any place in the

campus, the students were able to design new user

interfaces for accomplishing daily tasks. The project

have been able to meet the following goals: enhance the

hospital level of technology by improving the

accessibility to the information system at different

level (student, nurse, and physician) through mobile

technologies, improve teaching and learning in the wards

through a faster access to clinical data; designing new

El-Jabry Page 16

interfaces for small devices for collecting and examining

data at the bedside; a deeper comprehension of security

issues; analysis of geographical mobility needs;

performance evaluation. (Cacace et al, 2004) also

mentioned the most critical approach was by Medicine

students. The complexity of the tasks and the different

approach in data entry contributed to a very low degree

of acceptance of the new technology. Therefore, after an

ineffective extensive phase (all the students in all the

wards), they tried an intensive approach. A pilot project

started in the departments that had shown a more positive

attitude during the first phase: general surgery and

cardiology. All the medical staffs were involved, not

only the students and their tutors. This phase showed

that the presence of a leading figure is a key element

for the acceptance of innovation: the fact that the

directors of both departments were keen on using the

devices motivated all the staff.

According to the other research that has been carried out

by (Chang et al, 2004), they were involvement in the

Development and Pilot Evaluation of User Acceptance of

Advanced Mass-Gathering Emergency Medical Services PDA

Support System. The support systems for the Emergency

Medical Services (EMS) in the mass gatherings, such as

the local marathon or the large international baseball

games, had underdeveloped. The purpose for their research

was to develop triangle-based EMS personal Digital

El-Jabry Page 17

Assistant (PDA) support system for the mass gathering

and to evaluate users’ perceive ease use and use fullness

of the systems in terms of Technology Acceptance Model

(TAM). The systems were developed based on an established

intelligent triage PDA support system and two other

forms, the general EMS form from the Taipei EMT and the

customer-made Mass Gathering Medical form used by a

medical center.

23 nurses and 6 physicians in the medical center, who had

ever served in the mass gatherings, were invited to

examine the new systems and answered the TAM

questionnaire. (Chang et al, 2004) have come out with the

result that shows that PDA systems included as many 450

information items inside 42 screens under 6 categories

and the great potential of using triage-based PDA systems

in the mass gatherings. Overall, most of the subjects

agreed with that the systems were easy to use and useful

for the mass gatherings, and they were willing to accept

the systems.

The results showed the potentially values of new PDA

systems in supporting the EMS in the mass gatherings.

Overall, most of the subjects more than agreed with that

the systems were easy to use and useful for the mass

gatherings, and they were willing to accept the systems.

The results also assured that the interface of PDA could.

The above two system are successful system and are two

different systems where they are applied in two different

El-Jabry Page 18

environment. With the help of smart devices that can be

either PDA or smart phones we have seen their application

in health care are now increasing at different angle.

Many applications are now increasingly using PDA as an

additional means of data capture and enquiry. Many

applications now have PDA based solutions to enhance

existing applications. Based on user requirements, these

applications differ.

Looking at the comparison between the projects conducted

above i.e. (Cacace et al, 2004) and (Chang et al, 2004),

compared to the proposed PDA-Rehabilitation management

System we can see that here is a huge similarities. They

all involve managing the information system by the use of

PDA through wireless technology and have gap or varies in

the implementation according to the user requirement and

the environment applied.

In the country like Malaysia, PDA rehabilitation

management system will be very useful when applied in

private and government hospitals by reducing

hospitalization error. (Sapiah Binti Sulaiman et all,

2006) were having seminar in Malaysia paperless hospital

because of the variability of human behavior due to the

dynamic nature of cyber space. They have been discussed

that currently Malaysia hospitals are using computer

information system as their medium to improve their

operation efficiently. In spite the application of these

system there are still some problems that are unsolved,

El-Jabry Page 19

and one of those is unavailability of quality healthcare

centers in remote areas and still error are there which

cause more effects and death to the patients. Therefore,

the application of mobile wireless management system as

proposed will likely help the operation of hospitals to

be performed better than it was before.

WIRELESS TECHNOLOGIES

Data in the good old days was only the stepchild of

telephone network, the speech being the main child. This

scenario gradually changed with data acquiring important

place and this gave rise to access technologies. Data

volumes to be transported were constantly on the rise due

to computers becoming more and more sophisticated and

graduating from mainframe to PCs and necessitating ever

growing need for computer- to- computer communication at

higher and higher bit rates. All this led to wireless

data communication technologies like Wi-Fi and WiMax

which combine the techniques developed for modems, LANs,

WANs, MANs with the wireless technologies.

WHY WE NEED WIRELESS NETWORKAccording to (Matthew, 2005) has mentioned in his book

that “wireless networks are an excellent complement to fixed networks, but

they are not a replacement technology. Just as mobile telephones

complement fixed-line telephony, wireless LANs complements existing fixed

networks by providing mobility to users”. Servers and other data

El-Jabry Page 20

center equipment must access data, but the physical

location of the server is irrelevant. As long as the

servers do not move, they may as well be connected to

wires that do not move. At the other end of the spectrum,

wireless networks must be designed to cover large areas

to accommodate fast-moving clients. For this reason the

wireless network will bring lots of benefit and speed up

the work done in the hospital environment.

COMPARISON BETWEEN WIRELESS STANDARDS AND

TECHNOLOGIESWe are going to compare between wireless standards to see

which one will be the best when coming to apply to the

hospital or clinic environment and the one which will be

more compatible to the personal digital assistant (PDA).

COMPARISON BETWEEN BLUETOOTH AND WIFI

The following Table summarizes the comparison between Wi-

Fi and Bluetooth

Bluetooth Wi-FiFrequency Band 2.4 GHz 2.4 GHz, 5 GHzCoexistence

mechanism

Adaptive

frequency hopping

Transmit power

controlMultiplexing FHSS DSSS, CCK, OFDMFuture

Multiplexing

UWB MIMO

Noise adaptation Link layer Physical layerTypical output 1-10 mW (1-10dBm) 30-100 mW (15-20

El-Jabry Page 21

power dBM)Nominal range 10m 100mMax one-way data

rate

732 kb/s 31.4 Mb/s

Basic cell Piconet BSSExtension of basic

cell

Scatternet ESS

Topologies Various analogiesMaximum signal

rate

1 Mb/s 54Mb/s

Channel access

method

Centralized:

polling

Distributed:

CSMA/CAChannel efficiency Constant Decreasing with

offered trafficSpatial capacity From 0.1 to 400

kb/s. m2

About 15 kb/s. m2

Data protection 16-bit CRC(ACL

links only)

32-bits CRC

Max number of

devices in the

basic cell

8 active devices;

255 in park mode

Unlimited in ad

hoc networks

(IBSS); up to

2007devices in

infrastructure

networks.Procedures used

for the network

setup

Inquiry, Page ad hoc networks:

Scan,

Authentication

infrastructure:

Scan,

El-Jabry Page 22

Authentication,

AssociationAuthentication Shared secret,

pairing

Shared secret,

challenge-responseEncryption E0 stream cipher RC4 stream cipher

(IEEE: FERRO, POTORTI, 2004)

CONCLUSION OF THE COMPARISON

The table below gives us a broad overview of the two most

popular wireless standards, with comparison in terms of

capacity, network topology, security, quality of service

support, and power consumption. However, one of these

technologies is better than the other according to the

requirements of where they are implemented. In this

project WI-FI will be the best standard to be implemented

in hospital environment than Bluetooth because of the

noisy is adopted in physical layer not link layer, broad

range of connectivity, quality of services, cannot easily

affected by obstacles, it is distributed and so many

other advantages than a blue tooth as we have seen from

the comparison.

El-Jabry Page 23

PERSONAL DIGITAL ASSISTANCE (PDAs)A PDA is a handheld device with organizer and basic

computing functions. There are many benefits of using PDA

on patient rehabilitation system at point of care; some

of the most important advantages are as follows;

The public healthcare environment is very information

intensive (Li.Chang, Fu. Hung, 2005) Doctors and nurses

do most of their work at the point of care, which is the

patient. This means that they move around between wards,

outpatient clinics, diagnostic and therapeutic

departments and operating theatres. This movement,

together with the fact that most of public hospitals

usually only have one central computer terminal per ward,

makes it extremely difficult to service all the needs of

the doctor and nurse. The use of an ICT in support of

this point of care activity of the doctors and nurses is

what is relevant to this research. Mobile device

technologies as PDA are quite suitable for supporting the

doctors and nurses at the point of care. They are small,

lightweight, can be carried around with doctors and

nurses, and at the middle of the range devices usually

come with some form of networking protocol built into the

device. Mobile device technologies are also becoming

affordable and offer more processing power and storage

capabilities (Andersen, 1997) .Mobile technology ranges

from cellular telephones, pagers and PDAs, to very El-Jabry Page 24

sophisticated tablet computers. For the mobile computers

to be used in a healthcare environment it should have the

following characteristics;

An interface that supports input via a stylus

Expandable memory

Software upgradability

A method of developing custom built software for the

device and network connectivity.

PDA-Rehabilitation Management System will be able to

bring some solutions that would reduce medication errors,

some of the advantages of implement this system are;

Making paper records of patients obsolete

Such a device (PDA) would make the need for paper

record obsolete. All patient information would be

stored electronically and accessed from PDA device

and not from only PC assigned to an entire ward.

This will make missing folders and folders not

containing up-to-date patient information a thing of

the past.

Not having to struggle with reading illegible notes

and other information

Generally, doctor’s hand writing is generally quite

poor and illegible. This device would be able to

make incorrect prescriptions due to bad writing a

thing of the past

Mobility

Patient information would be delivered to PDA device

when the nurse or doctors walk into the ward. This El-Jabry Page 25

will alleviate the need to consult the slow,

outdated PC assigned to the floor.

As decision support tool

There will be the latest available patient

management information and with this can ensure that

the patient is treated correctly.

INTRANET

According to (Goles & Hirschheim, 1997) defined intranet

as “private computing networks, internal to an

organization, allowing access only to authorized users”.

They also mentioned that Intranet may include an internal

`web along similar lines to the World Wide Web with

multiple websites and web pages, electronic mail,

newsgroups, online meeting facilities and any number of

applications. Web browsers are used to navigate across

information on the network and, whilst authorized users

can cross into the Internet, those outside the

organization cannot cross into the Intranet. As the

distribution of information is not restricted by time or

geographical location and can be viewed by any employee

within an organization, the intranet `provides global

communication within the corporate environment internally

rather than externally.

The application of intranet technology in hospital

network refers to a private network that is installed

El-Jabry Page 26

within the hospital environment. The benefit of intranet

in the hospital or clinic environment is to allow the

organization’s members such as doctors, nurses,

physicians or other corporation with authorization.

Intranet is installed for the benefit of sharing the

company information and shares the company resources

among the staff.

COMMUNICATION PROTOCOLThe most communication protocol that is applied in

hospital is TCP/IP, abbreviation for transmission control

panel/ Internet Protocol. The use of TCP/IP will be able

to increase the security and only authorized person can

be able to read the message. This is because when

intranet member send message will be considered as a

private message and the content of this message is gone

through the process of encryption. Nevertheless, there

will be firewalls installed within the intranet for the

security purpose mainly for intranet website. Because of

this reason the security of the organization will be

maintained well when every user of the intranet that

would access the internet will have to go through the

firewall server.

TCP/IP IN CLIENT/SERVER MODELClient/Server model is where a client sends a request to

the server and the server response to the client within a

network. The communication of TCP/IP is taken place in

Client/Server is mainly in concept of point-to-point. In

El-Jabry Page 27

other words TCP/IP communicates from one point to another

point. It is considered as “stateless” who means the

request from the previous is not related to the next

request. These allow anyone to use them continuously.

CLIENT/SERVER ARCHITECTUREThe new feature of the new proposed system may be hardly

useful, unless they are fully integrated within the

existing hospital information system. Let us consider in

more details the underlying ward architecture: It is a

client-server one, where mobile clients on a PDA will have to

interact via a web-based interface, communication with

the ward server by means of XML documents. The electronic

patient record itself is kept as an XML document, divided

into three different parts: Personal Data, clinical

history, stay.

As described by (Lee et al, 2004) that TCP/IP provides a

sequenced, reliable, two-way communication mechanism when

a mobile device is connected to the network. The TCP/IP

server application listens on a specific network port for

incoming client requests. The client application

initiates communication with the server by sending a

request packet. When the server receives the request, it

processes it and responds. After this initial sequenced

message exchange, the client and server can exchange data

as shown below;

El-Jabry Page 28

(Lee et al, 2004)

To exchange data, the server application creates a new

socket, which it binds to a particular IP address and

port. Then the server waits for incoming requests. When a

new request is received, it spawns a new worker thread to

process that request and send a response. The client

application also opens a socket and connects to the

server on the given IP address and port. The client then

sends and receives messages over the network as arrays of

bytes. In order to demonstrate the transfer of data

between a mobile client and a server using TCP/IP, have

developed a simple communication server that receives

data from a remote client and echoes it back. This

communication server listens for client connections and

starts up new threads as needed to handle the client

communications. Each thread is an asynchronous TCP/IP

listener. When a client program connects to the

communications server, the server creates a new thread

and a new state object to hold the data sent by the

client. Once the client enters an end marker string, the

data is echoed back to the client.

El-Jabry Page 29

Data SynchronizationIn the proposed system the database server will offers

support for mobile subscribers to data publication. The

client server will run the database server for the

synchronization of data with the mobile device. The

synchronization procedure uses the HTTP protocol for data

transport in order to be easily accessible on highly

secured platforms. The mobile server will deliver the

functionalities necessary to a relational database,

transported to a lower scale: robust information storage,

query preparation, and connectivity capabilities. The

following diagram illustrates the architecture and

integration with hospital management software. (see in

the next page)

Integration of hospital management software

El-Jabry Page 30

(IEEE: Bolyai, 2007)

The connection type affects the way in which you can

synchronize data between the mobile device and back-end

systems. Synchronization is possible in two ways:

continuously or through a store and-forward method.

Continuous Communication

When the connectivity between the client and server is

continuous, the synchronization of data between client

and server is continuous and can be achieved through

synchronous or asynchronous means. The diagram shown in

the next page illustrates the continuous synchronization.

El-Jabry Page 31

Continuous synchronization

(Lee et al, 2004)

Synchronous communication occurs when a request to store

data is sent to the server followed by the data to be

stored. The data is then placed in a storage area, such

as a database, on the server. In synchronous

communication, all data is completely stored before the

server acknowledges receipt of the data and frees up the

client user interface.

El-Jabry Page 32

In asynchronous communication, however, the data does not

have to be completely stored before the server

acknowledges the client. Indeed, the server typically

acknowledges the request immediately and only

subsequently carries out the store request. Subsequently,

when the store request is actually complete, the server

will initiate a conversation to tell the client it is

done.

Store-and-Forward Synchronization

When connectivity between a client and server cannot be

guaranteed, it is still possible to store and transmit

information safely using a method called “store-and-

forward.” Store-and-forward is a powerful method that

allows mobile users the ability to work even when they

are not connected to a server.

The synchronization mechanisms occur when using mobile

device, as it allows the automatic and independent data

update on both the mobile device and the server. As soon

as the device connected, the data is synchronized,

changes being sent from the client to the server, along

with the new information being pushed from the server to

the mobile device. According to (Bolyai, 2007) described

that PDA devices needs more server configurations and

maintenance than its alternative method needs more server

configurations and maintenance than its alternative

method (Remote Data Access), but it is more advantageous El-Jabry Page 33

for application that involve several mobile devices. As

already mentioned, the synchronization method uses HTTP

as transport protocol. HTTP is used because of its high

implementation availability on all platforms and because

it allows easier through Firewall communication.

ELECTRONIC MAILS (E-MAIL)E-mail is a transition of message over communication

network; it refers to apply the computer concept to send

a letter. Email is used by large number of people on the

internet. It handles and manipulates email services on

the internet which is done by using SMTP, abbreviation

for Simple Mail Transfer Protocol. Email message is

usually encoded in ASCII form before it being sent out.

El-Jabry Page 34

Simple Mail Transfer Protocol (SMTP)It is the protocol which provides the electronic mail

service. It is able to transfer the message or mail from

one host to another until the mail is arrived to its

destination. Mailing list, returning mail and forwarding

mail are some of important features of SMTP.

When a message or a mail is created, The SMTP will accept

it. Then the SMTP will make the use of TCP protocol to

send this mail/message to another host. Then, the mail

/message will be sent to the local host into the user’s

mail account. The basic operation occurs in three stages;

Connection set up

Mail Transfer

Connect closing

Companies that have switched to electronic mail to

improve the systems speed communications by avoiding

telephone tag and ''flatten'' organizations by permitting

anyone to communicate regardless of rank. Advocates of

electronic mail cite studies showing that it encourages

workers at different levels of a company to communicate

informally, cutting through layers of corporate

bureaucracy, more than does the telephone or paper mail.

A middle-level manager is more likely to send a message

to the chief executive over the computer than to

telephone or place a note in the office mail. As a

result, in many corporations electronic mail is becoming

a significant alternative to the fax machine, the

El-Jabry Page 35

telephone and to what electronic mail advocates like to

call snail mail, or paper mail. (John, M 1989)

The emailing technology was suggested for the

system .this is due to the fact that in most hospital,

many individuals need to be alerted or reminded of the

operation schedule (time, location and any other

information that is needed in order for a smooth flow of

the operation procedures.) and to know well their task

and reduce confusion.

The doctor, patient and /or patients guardians will be

sent an email a day before the operation to avoid any

inconveniences that usually tend to occur due to

unawareness of the precise information or right

information about the operation

MOBILE PRINTINGFrom the article that is available at URL www.zebra.com,

it has been explained from the article that modern mobile

printing systems offer quality and convenience necessary

to provide documentation for internal operations and

customer service. Modern mobile printers can create

compliance shipping labels, print receipts, invoices and

tickets, conduct price audits and markdowns, process

credit card payments, connect to wireless networks and

even receive print jobs by e-mail-a dramatic evolution

from receipt printers whose output quickly faded and

El-Jabry Page 36

curled at the edges. By handling select print jobs with

small, mobile printers instead of centrally located

stationary units, businesses are improving staff

productivity, lowering overall printing expenses and

efficiently satisfying their customers at the point of

service.

Mobile printers can use a wireless network to receive

print jobs, label formats, variable data and information

from host systems. The printer has an IP address and

appears like any other device in the network, which lets

users take advantage of the many excellent software

products available for network management and security.

Wireless network printing is possible even if the mobile

devices such as PDA and other portable smart phones.

In the proposed system there have been introduced the use

of PDA for directly print out discharge medication lists

as an integral part of the daily clinical activities of

the medical stuff. The stuff will be able to send the

current medication list and dosages directly from the PDA

to the printer via wireless technology port at the time

of each patient’s discharge. The patient’s discharge

medication list and dosages will be then printed out in

user friendly-format, preventing the transcription errors

that occurred when this process is being done

traditionally by hands.

El-Jabry Page 37

MONITORING IP ADDRESSThe explosive growth of varieties of internet and

intranet applications has increased the demand for high

network system reliability. Although network managers can

improve reliability by adding alternate routing paths

before outages occur, a more effective way to manage and

ensure the converged network reliability is early

detection.

As (Sham, J. Jenny, 2010) mentioned that, available

statistical data shows that the cost of finding and

repairing network system components rises dramatically as

detection time increases. The need has emerged for

network system monitoring and mobile anywhere-anytime

failure notification. It should allow network managers to

access network health status through a wireless mobile

device.

In the proposed system, administrator will be able to

monitor the IP address of the device that are current and

have been connected before in the network. The aim of

including this monitoring system in hospital environment

is for security manner as well as the need to know who is

using which device at the hospital network. As we know we

will need to protect the patient’s information and their

health, also the referred scheme is base on the

monitoring of the source IP addresses of the incoming

packets from providing any defaults or attacks. We used a

El-Jabry Page 38

wireless mobile monitoring (WMM) method to monitor an IP

network behavior and performance and to notify network

managers of any failures through wireless mobile devices.

TECHNICAL RESEARCH

LANGUAGE

C sharp (C#)For the development of PDA-Rehabilitation Management

System many languages were compared in order to come up

with the one which would be the best and help in the

development process of the proposed system. C# is the

language that have been chosen because of its modernity,

flexibility, type-safety, consistency, object-oriented,

version support, compatibility, scalability support and

lots of other features that make developing solution

faster and easier. The following are the reasons that

made the developer to C# languages;

According to (Harvey et al, 2000) has mentioned that

Microsoft Visual C# is a powerful but simple language

aimed primarily at developers creating applications by

El-Jabry Page 39

using Microsoft .Net framework. It inherits many of the

best features of the C++ and Microsoft Visual Basic but

few of the inconsistencies and anachronisms, resulting in

cleaner and more logical language. For example, C# uses

operator overloading and type-safe enumerations, features

that java completely dispensed with.

Another thing that made the developer to choose C# over

other languages is that C# supports the introduction of

XML comments. Far from being just another way to add

comments to code, XML comments can actually turn into the

developer’s documentation, states (Craig, 2002).

Furthermore, the C# compiler has the option to

automatically produce XML-formatted code documentation

(Harvey et al, 2000) which is using special comment

syntax.

C# is also a type- safe, which will help the developer to

be fast while developing as uninitialized variables

cannot be used and the C# compiler gives notification if

any variable is used before it is initialized to some

valid value. “Another significant plus for C# is the

ease” (Harvey et al, 2000) with which it can make calls

to the windows API as an advantage to the developer.

While many would argue that C++ is object oriented, C#

goes to another level. Even simple data types can be

treated as objects, meaning that an int has methods

associated with it. While C++ is an extremely powerful

language, it has not typically been considered easy. C#

El-Jabry Page 40

attempts to simplify the syntax to be more consistent and

more logical while also removing some of the more complex

features of C++. For example, C# does away with pointers.

As a type-safe language, C# doesn't allow direct memory

manipulation, so pointers are no longer needed in C#.

Header files have also been removed from C#. The

namespace and reference operators, and respectively, have

been replaced with a single operator, the period (.). C#

also removes memory management issues from the developer

by using .NET’s garbage collection scheme. Items no

longer referenced are marked for garbage collection, and

the Framework can reclaim this memory as needed. (Craig,

2002)

C# contains wireless communication library .Net edition

which contain the power features of Bluetooth, IrDA and

Wi-Fi technologies to the .Net applications. The Wi-Fi

technology is the one that will be able to support the

connection between PDA and the server that would be

applied in domain area. Discover devices, send and

receive files, bulk fide sending and lots of other

features like enumerating Wi-Fi networks, measure Wi-Fi

networks signal quality etc.

With the release of visual studio 2005, Microsoft

delivers on this commitment by applying a single IDE for

native, managed, and server-side application development

that enables targeting windows Mobile 2003, and windows

mobile 5.0 platforms. Visual Studio 2005's Smart Device

Programmability features offer the most productive El-Jabry Page 41

Windows Mobile development environment yet. Visual Studio

2005 integrates the best device development features from

previous tools and adds several new features including a

new, faster ARM emulator, a faster debugger, new data and

UI designers, and multiple-platform support. Developers

can target Windows Mobile natively with Visual C++, or

they can target the .NET Compact Framework with managed

code by using C#.

The other reason is programming in C# saves the developer

time not only in code writing but also in eliminating

errors from that code, as stated by ( jared,2001), C#

empowers the user with exceptional debugging abilities

through the Microsoft intermediate viewer. This allows

the developer to more or less see assembly code, MSIL,

for all programming chunks created and therefore create

code that is extremely efficient for a given task.

However, java does not provide low level debugging

support. Even though C# programming language and java

programming language are both garbage –collected runtime-

compiled languages with syntax derived from C and C++, C#

is described as a hybrid of C++ and java, which was a

strong point for the developer to chose it as the

language to be used for the development of this system,

as it combines some features from C++ and others from

java and with its additional features and changes.

El-Jabry Page 42

DATABASE

Proposed Database

Microsoft SQL Server 2005

It is a relational database management system produced by

Microsoft for applications that run on mobile devices and

desktop. Its primarily query language, is transact-SQL,

an implementation of the ANSI/ISO Standard Query Language

(SQL) used by both Microsoft and Sybase. (Microsoft,

2005).

SQL (Structured Query Language) is a standard language

used to communicate with a relational database. The name

may be pronounced either as the letters S-Q-L or as the

word “sequel.” A query is simply a request that is sent

to the database for which the database sends some form of

response back to the sender. SQL is the most common

language used to form database queries. SQL is considered

a nonprocedural or declarative language, which means that

you tell the computer the results you want without

telling it how to achieve them. For example, if you want

the average of a column of numbers, you simply use the

AVG function to ask for it. There is no need to count how

many numbers are in the column and to divide by that

count. The SQL language processor in the DBMS handles all

of that for you. (Oaborne, 2005 P.38).

Oracle Database 10g

Oracle has long had a commitment to the IBM mainframe

environment. Beginning in 1986, every major release of

El-Jabry Page 43

the Oracle database has been delivered on the mainframe,

and Oracle’s most current release, Oracle 10g, is now

available on z/ OS 1.4. The Oracle database is

implemented in a large kernel, written in C, which is

identical on all platforms. This database kernel gets

operating system function through a layer of code (called

the “port-specific” layer) that is specific to the

platform. In September 2000 the Oracle database on the

mainframe was researched to make a significant

improvement in the z/ OS port-specific layer. This

chapter introduces the Oracle architecture on z/ OS and

how it exploits z/ OS features.

Justification for chosen System Database

The proposed system database were reviewed and compared

with one another to determine the most appropriate

database to be used for the proposed system. Microsoft

SQL Server 2005 was chosen as the most suitable database

to be implemented in this project. There were few factors

involved in choosing the most appropriate database for

the system. One of it is that SQL Server 2005 on

Microsoft Windows Server provides a platform for

enterprise-class relational database and analysis

solutions that outstrip Oracle 10g in security,

availability, integration with

Microsoft Visual Studio, and scalability from small

businesses to the largest, and at lower costs which are

among the instances need to be built in Uni-made Mobile

Edu-Portal. (Microsoft, 2005.)

El-Jabry Page 44

Beside the above mentioned factors. After an in-depth

analysis of Oracle 10g RAC and SQL Server 2005, at

Performance Tuning Corporation; the author concludes

that:

1. Oracle 10g RAC is an interesting technology with

great potential. However, its high-cost and

excessive administrative complexity offsets any

potential hardware cost savings obtained by using

commodity hardware.

2. SQL Server 2005 on SMP servers with Database

Mirroring for high availability is a more cost

effective and easier to manage solution than Oracle

10g RAC. SQL Server 2005 can meet the scalability

requirements of 99% of customers’ real-world

applications, while providing the desired levels of

availability.

3. For situations where scale-out architectures are the

only choice, both Oracle 10g RAC and SQL Server 2005

should be considered as equally viable options.

(Thomas, 2005)

El-Jabry Page 45

The developer can make use of SQL server CE or SQL server

Mobile edition as a complement to the development tools

when.

Extending enterprise data management capabilities to

Windows Mobile–based devices.

Developing applications that store and manipulate

significant amounts of data on a mobile device.

Needing reliable data replication with mobile

devices in environments with intermittent

connectivity.

But the developer will use SQL Server Mobile Edition

includes the largest number of new and improved features

in any version of SQL Server CE since the original

version, SQL Server CE 1.0. SQL Server Mobile Edition

includes enhancements over SQL Server CE 2.0 including:

Support for Smartphone devices

Integration with SQL Server 2005 and Visual Studio

2005

Synchronization enhancements

Increased reliability and performance

Faster development of mobile applications

El-Jabry Page 46

METHODOLOGY

What is need for a Methodology?

Early applications development was not up to the

acceptable level in terms of timeliness completion, end

product quality and lack in deliverables of the system.

The main problem was that entire application depends on

the programmer skills and experience, due to discrepancy

among the programmer attitude and lack of communication

which jeopardize the company success and fame. This is

the main cause to introduce methodology which act as a

barrier against the issues and helped the software

development to deliver the application on time with high

quality (Pressman, 2001).

Methodology can be defined as “A collection of

procedures, techniques, tools and documentation aids

which help the system developers in their efforts to

implement a new information system” (Maddison, 1983).

El-Jabry Page 47

For the justification of the project development

methodology chosen, Rational Unified Process is compared

to other methodologies to show the limitations of each of

the methodologies as well as the advantages and

disadvantages relating to the project goals.

Comparison of Methodologies

Rational Unified Process (RUP)

The Rational Unified Process (RUP) was developed by

International Business Machines (IBM) and has been in use

in major software Development Company which includes IBM

itself. This process defines the development of software

to be in bits and as the development continues,

additional features are being incorporated into the

development process. The process further stated that each

bit developed is being tested as though it is a complete

application to ensure full functionality of the bit. IBM

thus conclude that the time spent to complete the full

development life cycle of a single bit in an application

development can be referred to as an iteration.

(K.Weinmeis & C. VanEpps, 2005 IBM)

The figure below shows the architecture of rational

unified process.

El-Jabry Page 48

(Source:

http://www.ibm.com/developerworks/rational/library/05/081

6_Louis/)

Advantages of RUP:

• Effective risk management as risks involve

are discovered at the beginning of the

project.

• Iterative process allows for developing the

most critical aspect of the project first and

not the entire project.

• Regular feedbacks to stake holders.

• Effective management of development processes and

occurring changes.

• Effective quality control of the developed system

as a result of iterative process which requires

El-Jabry Page 49

managing development in bits rather than as a

whole.

Disadvantages of RUP:

• Before development, an elaborate documentation is

required to analyze the different phases involved.

• System test processes are repeated for iterations.

(Rational Software Corporation, 1998)

Waterfall Model

The waterfall model gives a development process whereby

each phase of the development are developed one after the

other, that is, stages in the development process are

done successively. Basically, the waterfall model

consists of two distinctive improvements:

• Identify and monitor feedback loops between

successive stages to limit the amount of rework to

be done.

• Implementation of a system prototype in the

development process to flow along with the analysis

and design.

(W. Boehm, 1998)

El-Jabry Page 50

Water Fall Model

El-Jabry Page 51

(Source: W.Boehm, TRW Defence System Group)

Advantages of Waterfall Model:

• The development processes of the system is based

on experience, thereby making development to be

straight forward as known issues can easily be

avoided.

• Developers can perform better as they can easily

see what they want to build.

• There is flexibility to certain extent.

Disadvantages of Waterfall Model:

• Responses to unforeseen problems are not

defined in this model.

• The waterfall model is too linear in the

development process.

• There is no flexibility to change resulting

code.

(W. Boehm, 1998 IEEE)

El-Jabry Page 52

Spiral Methodology

The spiral model of software development is based on the

refinements of waterfall model and its being used by the

department of defense. Individual cycle in the spiral

model identify the core objectives of the project. In

most cases, emphasis is placed on the elaborated phase,

which includes system performance and functionality, and

its flexibility to accepting changes. The contingency

plans and the constraints of the project to be developed

are also considered.

(K. Schwaber, SCRUM Development Process)

Spiral Software Methodology

(Source: Ken Schwaber, SCRUM Development Process)

El-Jabry Page 53

Advantages of the Spiral Model:

• The complete cycle of the spiral model is based on

the organization goals on the project. Previous

projects and future plans on the project are taken

into consideration to ensure each development phase

meets the designed goals.

• The spiral model accommodates mixture of other

methodologies to achieve the goals of the project,

and also ensure that potential risks have been

avoided.

• This model identifies errors and irrelevant

alternatives at the initial stage of the project.

• Create availability for unexpected changes.

• Quality objectives are defined in developmental

process.

• There is easy integration of software and hardware

to an existing framework.

Disadvantages of the Spiral Model:

• There is need for further elaboration of the model

in other to be applicable to the development

El-Jabry Page 54

process.

• Deliverables are based on risk involved in the

project.

• The spiral model is never complete.

(W. Boehm, 1998 IEEE)

Critical Evaluation & Analysis for Project

MethodologiesHaving identified the capabilities of the three

methodologies, evaluation could be based on the basic

requirements for the development process required for

this project. This project is the kind of project which

requires its core functionality to be developed first and

there can be future additional features. Identified

methodologies could be analyzed as follows in the

following page:

Waterfall model defines a situation whereby stages of the

development are done successively which means that if

applied; the first stage of the system development must

be completed as a prerequisite to the next stage of the

system development. However, it is not the case for the

current situation, for the case of this project, as long

as a crucial aspect is identified; it can then be the

first to be developed.

Though the spiral model also focuses on the functionality

aspect of development, but it has not clearly stated when

development process should end. The spiral model has

El-Jabry Page 55

shown that once a potential risk could be identified, the

development process continues until a risk free phase can

be identified using other methodologies. The development

of this project would not only focus on the risk involved

but also what can be achieved to solve a defined problem

within the period of time that has been allocated for the

project.

Rational Unified Process (RUP) involves a development

process whereby project core functionality as identified

by the requirements, is being done completely before an

additional feature is considered. It allows building the

most difficult aspect of the project first, thereby

putting the risk in the project into consideration at the

earlier stage of the development. Other factors which

could be considered include:

• The functionality of each component in the system

can be ascertained as each bit of the system would

undergo a complete development process which is

referred o as iteration. For this project, the

Timetable/Scheduling aspect would be completely

developed and tested while other services would be

added thereafter.

• Additional bits are introduced into the project as

the development progresses.

El-Jabry Page 56

Justification for the chosen Methodology - RUP

Considering the above methodologies, it could be observed

that only Rational Unified Process has a unique approach

to developing the system based on the goals and

specifications defined. Consideration can also be given

in terms of the phase components of the RUP methodology.

The inception component ensures the project is still

within budget; elaboration component ensures the complete

functionality of each chunks of the system; construction

ensures application can at a stage be tested in the

user’s environment while the transition components

reflects the development in a well documented format

which may not be limited to all paper works and

brainstorming sessions. This gives a complete procedure

that defines the design and analysis section of the

project and it gives a complete and specific approach to

this project, unlike the spiral and waterfall models.

Moreover, the figure below compares the risk involved

between RUP and Waterfall model.

Risk comparison between RUP and Waterfall

El-Jabry Page 57

(Source: B.Benyó et al, 2006)

RUP constitutes four phases of development, each of that

is organized into a number of separate iterations that

must satisfy defined criteria before proceeding to next

phase.

Inception Phase

The primary objective is to scope the system adequately

as a basis for validating initial costing and budgets.

(Stephen, 2004)

The activities which can be done in this phase for this

project are:

idea generation

initial research

Drafting up of Project proposal

Completion of the project specification form

El-Jabry Page 58

Domain and Technical research

Apply fact finding techniques

justification of programming language used

Learning on programming language chosen

Elaboration Phase

The elaboration phase is where the project starts to take

shape. In this phase the problem domain analysis is made

and the architecture of the project gets its basic form.

(Stephen, 2004) Concerning this project, the main

activity would be the initial design of the system.

Construction Phase

The primary objective is to build the software system. In

this phase, the main focus goes to the development of

components and other features of the system being

designed. This is the phase when the bulk of the coding

takes place. (Stephen, 2004)

Transition Phase

The primary objective is to 'transition' the system from

the development into production, making it available to

and understood by the end user. The activities of this

El-Jabry Page 59

phase include training of the end users and maintainers

and beta testing of the system to validate it against the

end users' expectations. The product is also checked

against the quality level set in the Inception phase.

(Stephen, 2004) Applying to this project, testing of the

system and finalize documentation and user manual, would

be the main activities.

(Word 8,811)

(Words in table 549)

El-Jabry Page 60

CHAPTER 3: RESEARCH METHODOLOGYResearch methodology is a way to systematically solve the

research problem by logically adopting various steps.

Methodology helps understanding not only the products of

scientific inquiry but the process itself. Research

method aims to describe and analyze methods, throw light

on their limitations and resources, clarify their

presuppositions and consequences, relating their

potentialities to the twilight zone at the ‘frontiers of

knowledge’.(Goode et al., 1981)

output helps to inculcate the ability to evaluate

and use results of earlier research with reasonable

confidence and take rational decisions

Doing Benefits of research methodology

Advancement of wealth of human knowledge

‘Tools of the trade’ to carry out research; provides

tools to look at things in life objectively

Develops a critical and scientific attitude,

disciplined thinking or a bent of mind to observe

El-Jabry Page 61

objectively; skills of research will pay –off in

long term particularly in the ‘ age of information’

Enriches practitioner and his practices; provides

chance to study in depth; Enable us to make

intelligent decisions; understand the material which

no other kind of work can match

As a consumers of research is the best way to learn,

to read and think critically, etc. (Cohen et al.,

1980)

Research Approach

Questionnaires

The methodology that has been adopted to conduct the

research for this project involves questionnaires.

Selection of questions has been well done and those

questions will be addressed to Hospital PDA-

Rehabilitation Management System. This method of

gathering information,’ questionnaire’, was chosen to be

used because it is easy to prepare and questionnaires are

a less expensive way to reach people, including people at

some distance, as nowadays they can be sent online.

Because of the mode of distribution chosen (Through

online), this will be done quickly and the data analysis

can begin right away. Kothari (1990) states that: ‘The

questionnaire avoids interviewer bias, guiding, and cues

that can impact the validity, and reliability of the data

collection. Anonymity insures more valid responses.

El-Jabry Page 62

Response quality is better because respondents may gather

and consult sources needed to respond well.

Below is the sample of the proposed questions and

justifications for the questions to be asked:

Question1: Age

a) Less than 17

b) 18-21

c) 22-31

d) 32-51

e) More than 51

Justification: To investigate different age views

Question 2: Gender

a) Male

b) Female

Justification: To investigate different gender views

Question3: Highest Education

a) Primary school

b) Secondary school

c) High school

d) College

e) Pre-university

f) University

g) Non-educated

El-Jabry Page 63

Questioin4: How good are you in using the computer?

a) No knowledge

b) Beginner

c) Intermediate

d) Expert

Justification: Knowing the level of knowledge in computer field.

Question5: How good are you in using mobile devices?

a) No knowledge

b) Beginner

c) Intermediate

d) Expert

Justification: Knowing the level of knowledge of using mobile devices.

Qestion5: Which Technology is more convenient to use?

a) Tablet PC

b) Mobile

Justification: Knowing which kind of technology is easy and convenient when

coming into the implementation and the usage.

Question6: Have you use any computerized system before?

If yes, please precede the next question.

a) Yes

b) No

El-Jabry Page 64

Justification: Knowing whether the user have been using computerized

system.

Question7: If you have been using computerized system

before, do you think it is better than paper-work system?

If yes, please proceed to the next question.

a) Yes

b) No

Justification: Compare the computerized system to the old paper-work system.

Question8: If we are going to implement Mobile

computerized system in hospital, what level of work flow

will be?

a) Poor

b) Good

c) Better

d) Best

Justification: Knowing if the work level in hospital will improve if we are going

to apply Mobile support System.

Question9: Do u think the use of mobile devices such as

smart phones or PDA, will help in reducing medication

errors in hospital?

a) Yes

b) No

Justification: Finding the opinion of the users when coming to implement the

system in hospital.

El-Jabry Page 65

InterviewAn interview is used to obtain information from one person

about a particular situations, problems or topics. The

interview can be structured or semi-structured. The interview

will be done to support questionnaires. Interviews will be the

best method to get information of the user’s requirements.

The following the interview questions and justification that

will be asked:

Qestion1: Have you use any mobile computing device?

Justification: To discern on how familiar doctors with other

mobile service/system are available.

Question2: What system does the Clinic/Hospital currently run?

How do you find it?

Justification: to know what kind of operation do the

hospital/clinic run.

Question3: How much accuracy do you receive by this current

system? And what problem do u face?

Justification: to know how well is this system running and

also to identify possible error?

Qestion4? Which system Screen do you prefer? Monitor or

Mobile? And Why?

El-Jabry Page 66

Justification: To know which screen suit the doctors/nurses

well.

Question5: What do you think when we are going to apply system

that will be supported by mobile devices such as PDA? Will

that be helpful?

Justification: To know if we are going to upgrade the current

system to the computerized system that s supported by mobile

device will be better or worse.

Question6: When the computerized mobile support system is

implemented in hospital. What is your opinion in case of the

medication error and operation in the hospitalized

environment?

Justification: Knowing if the computerized mobile support

system will bring development in the hospital environment.

El-Jabry Page 67