Thursday, September 5, 2019

Primary Healthcare Web Technology Application

Primary Healthcare Web Technology Application Primary health care ABSTRACT Primary Health Care is committed to helping patients take control of their health. This system is virtual, but our physicians and their dedication is real. Using secure, web-based technologies provided by Medical Web, our health-care providers offer advice and treatment for a variety of conditions. Patients can communicate securely and confidentially with our physicians throughout the treatment process using our messaging system. As a physician-owned company, we are committed to helping our patients receive the utmost care and medical attention. Primary Health Care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.1 INTRODUCTION TO PROJECT Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. ORGANIZATION PROFILE Software Solutions is an IT solution provider for a dynamic environment where business and technology strategies converge. Their approach focuses on new ways of business combining IT innovation and adoption while also leveraging an organizations current IT assets. Their work with large global corporations and new products or services and to implement prudent business and technology strategies in todays environment. Xxxxxxxs RANGE OF EXPERTISE INCLUDES: Software Development Services Engineering Services Systems Integration Customer Relationship Management Product Development Electronic Commerce Consulting IT Outsourcing We apply technology with innovation and responsibility to achieve two broad objectives: Effectively address the business issues our customers face today. Generate new opportunities that will help them stay ahead in the future. THIS APPROACH RESTS ON: A strategy where we architect, integrate and manage technology services and solutions we call it AIM for success. A robust offshore development methodology and reduced demand on customer resources. A focus on the use of reusable frameworks to provide cost and times benefits. They combine the best people, processes and technology to achieve excellent results consistency. We offer customers the advantages of: SPEED: They understand the importance of timing, of getting there before the competition. A rich portfolio of reusable, modular frameworks helps jump-start projects. Tried and tested methodology ensures that we follow a predictable, low risk path to achieve results. Our track record is testimony to complex projects delivered within and evens before schedule. EXPERTISE: Our teams combine cutting edge technology skills with rich domain expertise. Whats equally important they share a strong customer orientation that means they actually start by listening to the customer. Theyre focused on coming up with solutions that serve customer requirements today and anticipate future needs. A FULL SERVICE PORTFOLIO: They offer customers the advantage of being able to Architect, integrate and manage technology services. This means that they can rely on one, fully accountable source instead of trying to integrate disparate multi vendor solutions. SERVICES: Xxx is providing its services to companies which are in the field of production, quality control etc with their rich expertise and experience and information technology they are in best position to provide software solutions to distinct business requirements. 1.2 PURPOSE OF THE PROJECT The project is fully integrated with Customer Relationship Management (CRM) solution and developed in a manner that is easily manageable, time saving and relieving one form semi automated. Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.3 PROBLEM IN EXISTING SYSTEM The existing system is a manual system. Here the User of the system needs to save his information in the form of excel sheets or Disk Drives. There is no sharing is possible if the data is in the form of paper or Disk drives. There is no online appointment facility. The manual system gives us very less security for saving data; some data may be lost due to mismanagement. There is no rich user interface. Its a limited system and fewer users friendly. There is no email facility. Searching of particular information is very critical it takes lot of time. The users cannot able to restrict the information. There is no report generation. SOLUTION OF THESE PROBLEMS The development of the new system objective is to address the solutions for the drawbacks of existing problem domain. Using this new system the patient can register for making online appointment with doctor. For interaction between patient and doctor chatting has provided. By this facility patient would chat with doctor. The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach. User Friendliness is provided in the application with various controls provided by system Rich User Interface. This system provides online appointment facility. The system makes the overall project management much easier and flexible. It can be accessed over the Intranet. It provides email facility. The user information files can be stored in centralized database which can be maintained by the system. his can give the good security for user information because data is not in client machine. Authentication is provided for this application only registered users can access. It provides search facility. There is no risk of data management at any level while the project development is under process. Report generation features is provided to generate different kind of data reports. SYSTEM ANALYSIS 2.1 INTRODUCTION After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. 2.2 ANALYSIS MODEL SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article, â€Å"A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. A preliminary design is created for the new system. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure: Evaluating the first prototype in terms of its strengths, weakness, and risks. Defining the requirements of the second prototype. Planning an designing the second prototype. Constructing and testing the second prototype. At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operating-cost miscalculation, or any other factor that could, in the customers judgment, result in a less-than-satisfactory final product. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired. The final system is constructed, based on the refined prototype. The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. The following diagram shows how a spiral model acts like: 2.3 STUDY OF THE SYSTEM In the flexibility of the uses the interface has been developed a graphics concept in mind, associated through a browser interface. The GUIS at the top level have been categorized as Administrative user interface The operational or generic user interface The administrative user interface concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. The interfaces help the administrations with all the transactional states like Data insertion, Data deletion and Data updating along with the extensive data search capabilities. The operational or generic user interface helps the users upon the system in transactions through the existing data and required services. The operational user interface also helps the ordinary users in managing their own information helps the ordinary users in managing their own information in a customized manner as per the assisted flexibilities NUMBER OF MODULES The system after careful analysis has been identified to be presented with the following modules: Administrator Managers Doctors Patients General Public Web Registration Search Reports Authentication Administrator Administrator is treated as a super user in this system. He can have all the privileges to do anything in this system. He is the person who received the Profile of a Doctor and accept/reject the registration. He is the person who receives the Complaints from the Patient and redirects to respective Doctor for response. He should have a facility to communicate using chat, email facility with other stakeholders. He should take care of Backup of Patient, Doctor details and maintain history. He should able to add Rooms availability and Ambulance details into the site for each Hospital. Another tasks done by the administrator is he can generates reports, log files, backup, recovery of data any time. Doctors He should able to see a Patients appointment details on a particular date. Also if the Patient is already visited, able to see the previous Prescription given the Patient, Disease History, Visiting details, etc. They should be able to see the Feedback given by the Patient. They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. Patients They should have a facility to register to the site with their Personal data along with Health details Height, Weight, Family inherited Diseases, Blood Group, etc. Being a Patient (after registration) should able to take an Appointment of a Doctor visit. They should have a facility to give Complaints about Kiosk Manager or Doctor service. They should able to Search for a Doctor and can see the Doctors Profile for an appointment. They should able to book Rooms or make request for an Ambulance to Kiosk Manager Managers He should be able to provide an Appointment of a Doctor to a Patient on request (based on Doctors available timings). They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. They should have a Search facility to find a Patient or Doctor and can check their Profile or History details. He should to receive the Rooms Booking or request for an Ambulance of a particular Hospital and make arrangement/approve the same for a Patient. General Public General Public (i.e. Guest visitors) should able to access the site Home page, Registration Page, etc. common pages of the site. This user should able to see the Doctors Schedules, Contact details, Specialization details, etc. They should able to Search for a Doctor. They should able to see the Rooms available, Ambulance availability of a particular Hospital. Web Registration The system has a process of registration. Every User need to submit his complete details in the form of registration. Whenever a User registration completed automatically he/she can get a user id and password. By using that user id and password he/she can log into the system. Search: This system provides search facility to the patients. Patient can search for Doctors and their available timings for take appointments Reports Different kind of reports is generated by the system. Patients History and prescriptions Doctors list Lab reports Daily Monthly Reports, Appointment list of Patients for Kiosk Managers Authentication: Authentication is nothing but providing security to the system. Here every must enter into the system throw login page. The login page will restrict the UN authorized users. A user must provide his credential like user Id and password for log into the system. For that the system maintains data for all users. Whenever a user enters his user id and password, it checks in the database for user existence. If the user is exists he can be treated as a valid user. Otherwise the request will throw back. 2.4 System Requirement Specifications Hardware Requirements: PIV 2.8 GHz Processor and Above RAM 512MB and Above HDD 40 GB Hard Disk Space and Above Software Requirements: WINDOWS OS (XP / 2000 / 200 Server / 2003 Server) Visual Studio .Net 2008 Enterprise Edition Internet Information Server 5.0 (IIS) Visual Studio .Net Framework (Minimal for Deployment) version 3.5 SQL Server 2005 Enterprise Edition 2.5 PROPOSED SYSTEM To debug the existing system, remove procedures those cause data redundancy, make navigational sequence proper. To provide information about users on different level and also to reflect the current work status depending on organization. To build strong password mechanism. NEED FOR COMPUTERIZATION We all know the importance of computerization. The world is moving ahead at lightning speed and everyone is running short of time. One always wants to get the information and perform a task he/she/they desire(s) within a short period of time and too with amount of efficiency and accuracy. The application areas for the computerization have been selected on the basis of following factors: Minimizing the manual records kept at different locations. There will be more data integrity. Facilitating desired information display, very quickly, by retrieving information from users. Facilitating various statistical information which helps in decision-making? To reduce manual efforts in activities that involved repetitive work. Updating and deletion of such a huge amount of data will become easier. FUNCTIONAL FEATURES OF THE MODEL As far as the project is developed the functionality is simple, the objective of the proposal is to strengthen the functioning of Audit Status Monitoring and make them effective and better. The entire scope has been classified into five streams knows as Coordinator Level, management Level, Auditor Level, User Level and State Web Coordinator Level. The proposed software will cover the information needs with respect to each request of the user group viz. accepting the request, providing vulnerability document report and the current status of the audit. 2.6 INPUT AND OUTPUT The major inputs and outputs and major functions of the system are follows: Inputs: Admin enter his user id and password for login Admin accept the Doctor registration. User enters his user id and password for login. Patient registers for the Appointment. New user gives his completed personnel, address and phone details for registration. Administrator giving information to generate various kinds of reports. Outputs: Admin can have his own home page. Admin get all Doctors details. Admin can view all Patients details. Users enter their own home page. Admin will get the login information of a particular user. The new users data will be stored in the centralized database. Admin get the search details of different criteria. Different kind of reports is generated by administrator. 2.7 PROCESS MODEL USED WITH JUSTIFICATION ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICAION The following commands specify access control identifiers and they are typically used to authorize and authenticate the user (command codes are shown in parentheses) USER NAME (USER) The user identification is that which is required by the server for access to its file system. This command will normally be the first command transmitted by the user after the control connections are made (some servers may require this). PASSWORD (PASS) This command must be immediately preceded by the user name command, and, for some sites, completes the users identification for access control. Since password information is quite sensitive, it is desirable in general to mask it or suppress type out. Feasibility Report Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility Operational Feasibility Economical Feasibility 3.1. TECHNICAL FEASIBILITY The technical issue usually raised during the feasibility stage of the investigation includes the following: Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required to use the new system? Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Can the system be upgraded if developed? Are there technical guarantees of accuracy, reliability, ease of access and data security? Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System. The current system developed is technically feasible. It is a web based user interface for audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databases purpose is to create, establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software and hard requirements for the development of this project are not many and are already available in-house at NIC or are available as free as open source. The work for the project is done with the current equipment and existing software technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users using the system. 3.2. OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned out into information system. That will meet the organizations operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test the operational feasibility of a project includes the following: Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application benefits? This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the management issues and user requirements have been taken into consideration. So there is no question of resistance from the users that can undermine the possible application benefits. The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status. 3.3. ECONOMICAL FEASIBILITY A system can be developed technically and that will be used if installed must still be a good investment for the organization. In the economical feasibility, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs. The system is economically feasible. It does not require any addition hardware or software. Since the interface for this system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and economical feasibility for certain. SOFTWARE REQUIREMENT SPECIFICATION The software, Site Explorer is designed for management of web sites from a remote location. INTRODUCTION Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. DEVELOPERS RESPONSIBILITIES OVERVIEW: The developer is responsible for: Developing the system, which meets the SRS and solving all the requirements of the system? Demonstrating the system and installing the system at clients location after the acceptance testing is successful. Submitting the required user manual describing the system interfaces to work on it and also the documents of the system. Conducting any user training that might be needed for using the system. Maintaining the system for a period of one year after installation. 4.1. FUNCTIONAL REQUIREMENTS OUTPUT DESIGN Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provides a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the Users main interface with the computer. Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly. OUTPUT DEFINITION The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For Example Will decimal points need to be inserted Should leading zeros be suppressed. Output Media: In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. The response time required. The location of the users The software and hardware available. Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies. INPUT DESIGN Input design is a part of overall system design. The main objective during the input design is as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user. INPUT STAGES: The main input stages can be listed as below: Data recording Data transcription Data conversion Data verification Data control Data transmission Data validation Data correction INPUT TYPES: It is necessary to determine the various types of inputs. Inputs can be categorized as follows: External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the system? Interactive, which are inputs entered during a dialogue. INPUT MEDIA: At this stage choice has to be made about the input media. To conclude about the input media consideration has to be given to; Type of input Flexibility of format Speed Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability Keeping in view the above description of the input types and input media, it can be said that most of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the user, the keyboard can be considered to be the most suitable input device. ERROR AVOIDANCE At this stage care is to be taken to ensure that input data remains accurate form the stage at which it is recorded up to the stage in which the data is accepted by the system. This can be achieved only by means of careful control each time the data is handled. ERROR DETECTION Even though every effort is make to avoid the occurrence of errors, still a small proportion of errors is always likely to occur, these types of errors can be discovered by using validations to check the input data. DATA VALIDATION Procedures are designed to detect errors in data at a lower level of Primary Healthcare Web Technology Application Primary Healthcare Web Technology Application Primary health care ABSTRACT Primary Health Care is committed to helping patients take control of their health. This system is virtual, but our physicians and their dedication is real. Using secure, web-based technologies provided by Medical Web, our health-care providers offer advice and treatment for a variety of conditions. Patients can communicate securely and confidentially with our physicians throughout the treatment process using our messaging system. As a physician-owned company, we are committed to helping our patients receive the utmost care and medical attention. Primary Health Care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.1 INTRODUCTION TO PROJECT Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. ORGANIZATION PROFILE Software Solutions is an IT solution provider for a dynamic environment where business and technology strategies converge. Their approach focuses on new ways of business combining IT innovation and adoption while also leveraging an organizations current IT assets. Their work with large global corporations and new products or services and to implement prudent business and technology strategies in todays environment. Xxxxxxxs RANGE OF EXPERTISE INCLUDES: Software Development Services Engineering Services Systems Integration Customer Relationship Management Product Development Electronic Commerce Consulting IT Outsourcing We apply technology with innovation and responsibility to achieve two broad objectives: Effectively address the business issues our customers face today. Generate new opportunities that will help them stay ahead in the future. THIS APPROACH RESTS ON: A strategy where we architect, integrate and manage technology services and solutions we call it AIM for success. A robust offshore development methodology and reduced demand on customer resources. A focus on the use of reusable frameworks to provide cost and times benefits. They combine the best people, processes and technology to achieve excellent results consistency. We offer customers the advantages of: SPEED: They understand the importance of timing, of getting there before the competition. A rich portfolio of reusable, modular frameworks helps jump-start projects. Tried and tested methodology ensures that we follow a predictable, low risk path to achieve results. Our track record is testimony to complex projects delivered within and evens before schedule. EXPERTISE: Our teams combine cutting edge technology skills with rich domain expertise. Whats equally important they share a strong customer orientation that means they actually start by listening to the customer. Theyre focused on coming up with solutions that serve customer requirements today and anticipate future needs. A FULL SERVICE PORTFOLIO: They offer customers the advantage of being able to Architect, integrate and manage technology services. This means that they can rely on one, fully accountable source instead of trying to integrate disparate multi vendor solutions. SERVICES: Xxx is providing its services to companies which are in the field of production, quality control etc with their rich expertise and experience and information technology they are in best position to provide software solutions to distinct business requirements. 1.2 PURPOSE OF THE PROJECT The project is fully integrated with Customer Relationship Management (CRM) solution and developed in a manner that is easily manageable, time saving and relieving one form semi automated. Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.3 PROBLEM IN EXISTING SYSTEM The existing system is a manual system. Here the User of the system needs to save his information in the form of excel sheets or Disk Drives. There is no sharing is possible if the data is in the form of paper or Disk drives. There is no online appointment facility. The manual system gives us very less security for saving data; some data may be lost due to mismanagement. There is no rich user interface. Its a limited system and fewer users friendly. There is no email facility. Searching of particular information is very critical it takes lot of time. The users cannot able to restrict the information. There is no report generation. SOLUTION OF THESE PROBLEMS The development of the new system objective is to address the solutions for the drawbacks of existing problem domain. Using this new system the patient can register for making online appointment with doctor. For interaction between patient and doctor chatting has provided. By this facility patient would chat with doctor. The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach. User Friendliness is provided in the application with various controls provided by system Rich User Interface. This system provides online appointment facility. The system makes the overall project management much easier and flexible. It can be accessed over the Intranet. It provides email facility. The user information files can be stored in centralized database which can be maintained by the system. his can give the good security for user information because data is not in client machine. Authentication is provided for this application only registered users can access. It provides search facility. There is no risk of data management at any level while the project development is under process. Report generation features is provided to generate different kind of data reports. SYSTEM ANALYSIS 2.1 INTRODUCTION After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. 2.2 ANALYSIS MODEL SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article, â€Å"A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. A preliminary design is created for the new system. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure: Evaluating the first prototype in terms of its strengths, weakness, and risks. Defining the requirements of the second prototype. Planning an designing the second prototype. Constructing and testing the second prototype. At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operating-cost miscalculation, or any other factor that could, in the customers judgment, result in a less-than-satisfactory final product. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired. The final system is constructed, based on the refined prototype. The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. The following diagram shows how a spiral model acts like: 2.3 STUDY OF THE SYSTEM In the flexibility of the uses the interface has been developed a graphics concept in mind, associated through a browser interface. The GUIS at the top level have been categorized as Administrative user interface The operational or generic user interface The administrative user interface concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. The interfaces help the administrations with all the transactional states like Data insertion, Data deletion and Data updating along with the extensive data search capabilities. The operational or generic user interface helps the users upon the system in transactions through the existing data and required services. The operational user interface also helps the ordinary users in managing their own information helps the ordinary users in managing their own information in a customized manner as per the assisted flexibilities NUMBER OF MODULES The system after careful analysis has been identified to be presented with the following modules: Administrator Managers Doctors Patients General Public Web Registration Search Reports Authentication Administrator Administrator is treated as a super user in this system. He can have all the privileges to do anything in this system. He is the person who received the Profile of a Doctor and accept/reject the registration. He is the person who receives the Complaints from the Patient and redirects to respective Doctor for response. He should have a facility to communicate using chat, email facility with other stakeholders. He should take care of Backup of Patient, Doctor details and maintain history. He should able to add Rooms availability and Ambulance details into the site for each Hospital. Another tasks done by the administrator is he can generates reports, log files, backup, recovery of data any time. Doctors He should able to see a Patients appointment details on a particular date. Also if the Patient is already visited, able to see the previous Prescription given the Patient, Disease History, Visiting details, etc. They should be able to see the Feedback given by the Patient. They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. Patients They should have a facility to register to the site with their Personal data along with Health details Height, Weight, Family inherited Diseases, Blood Group, etc. Being a Patient (after registration) should able to take an Appointment of a Doctor visit. They should have a facility to give Complaints about Kiosk Manager or Doctor service. They should able to Search for a Doctor and can see the Doctors Profile for an appointment. They should able to book Rooms or make request for an Ambulance to Kiosk Manager Managers He should be able to provide an Appointment of a Doctor to a Patient on request (based on Doctors available timings). They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. They should have a Search facility to find a Patient or Doctor and can check their Profile or History details. He should to receive the Rooms Booking or request for an Ambulance of a particular Hospital and make arrangement/approve the same for a Patient. General Public General Public (i.e. Guest visitors) should able to access the site Home page, Registration Page, etc. common pages of the site. This user should able to see the Doctors Schedules, Contact details, Specialization details, etc. They should able to Search for a Doctor. They should able to see the Rooms available, Ambulance availability of a particular Hospital. Web Registration The system has a process of registration. Every User need to submit his complete details in the form of registration. Whenever a User registration completed automatically he/she can get a user id and password. By using that user id and password he/she can log into the system. Search: This system provides search facility to the patients. Patient can search for Doctors and their available timings for take appointments Reports Different kind of reports is generated by the system. Patients History and prescriptions Doctors list Lab reports Daily Monthly Reports, Appointment list of Patients for Kiosk Managers Authentication: Authentication is nothing but providing security to the system. Here every must enter into the system throw login page. The login page will restrict the UN authorized users. A user must provide his credential like user Id and password for log into the system. For that the system maintains data for all users. Whenever a user enters his user id and password, it checks in the database for user existence. If the user is exists he can be treated as a valid user. Otherwise the request will throw back. 2.4 System Requirement Specifications Hardware Requirements: PIV 2.8 GHz Processor and Above RAM 512MB and Above HDD 40 GB Hard Disk Space and Above Software Requirements: WINDOWS OS (XP / 2000 / 200 Server / 2003 Server) Visual Studio .Net 2008 Enterprise Edition Internet Information Server 5.0 (IIS) Visual Studio .Net Framework (Minimal for Deployment) version 3.5 SQL Server 2005 Enterprise Edition 2.5 PROPOSED SYSTEM To debug the existing system, remove procedures those cause data redundancy, make navigational sequence proper. To provide information about users on different level and also to reflect the current work status depending on organization. To build strong password mechanism. NEED FOR COMPUTERIZATION We all know the importance of computerization. The world is moving ahead at lightning speed and everyone is running short of time. One always wants to get the information and perform a task he/she/they desire(s) within a short period of time and too with amount of efficiency and accuracy. The application areas for the computerization have been selected on the basis of following factors: Minimizing the manual records kept at different locations. There will be more data integrity. Facilitating desired information display, very quickly, by retrieving information from users. Facilitating various statistical information which helps in decision-making? To reduce manual efforts in activities that involved repetitive work. Updating and deletion of such a huge amount of data will become easier. FUNCTIONAL FEATURES OF THE MODEL As far as the project is developed the functionality is simple, the objective of the proposal is to strengthen the functioning of Audit Status Monitoring and make them effective and better. The entire scope has been classified into five streams knows as Coordinator Level, management Level, Auditor Level, User Level and State Web Coordinator Level. The proposed software will cover the information needs with respect to each request of the user group viz. accepting the request, providing vulnerability document report and the current status of the audit. 2.6 INPUT AND OUTPUT The major inputs and outputs and major functions of the system are follows: Inputs: Admin enter his user id and password for login Admin accept the Doctor registration. User enters his user id and password for login. Patient registers for the Appointment. New user gives his completed personnel, address and phone details for registration. Administrator giving information to generate various kinds of reports. Outputs: Admin can have his own home page. Admin get all Doctors details. Admin can view all Patients details. Users enter their own home page. Admin will get the login information of a particular user. The new users data will be stored in the centralized database. Admin get the search details of different criteria. Different kind of reports is generated by administrator. 2.7 PROCESS MODEL USED WITH JUSTIFICATION ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICAION The following commands specify access control identifiers and they are typically used to authorize and authenticate the user (command codes are shown in parentheses) USER NAME (USER) The user identification is that which is required by the server for access to its file system. This command will normally be the first command transmitted by the user after the control connections are made (some servers may require this). PASSWORD (PASS) This command must be immediately preceded by the user name command, and, for some sites, completes the users identification for access control. Since password information is quite sensitive, it is desirable in general to mask it or suppress type out. Feasibility Report Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility Operational Feasibility Economical Feasibility 3.1. TECHNICAL FEASIBILITY The technical issue usually raised during the feasibility stage of the investigation includes the following: Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required to use the new system? Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Can the system be upgraded if developed? Are there technical guarantees of accuracy, reliability, ease of access and data security? Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System. The current system developed is technically feasible. It is a web based user interface for audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databases purpose is to create, establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software and hard requirements for the development of this project are not many and are already available in-house at NIC or are available as free as open source. The work for the project is done with the current equipment and existing software technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users using the system. 3.2. OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned out into information system. That will meet the organizations operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test the operational feasibility of a project includes the following: Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application benefits? This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the management issues and user requirements have been taken into consideration. So there is no question of resistance from the users that can undermine the possible application benefits. The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status. 3.3. ECONOMICAL FEASIBILITY A system can be developed technically and that will be used if installed must still be a good investment for the organization. In the economical feasibility, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs. The system is economically feasible. It does not require any addition hardware or software. Since the interface for this system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and economical feasibility for certain. SOFTWARE REQUIREMENT SPECIFICATION The software, Site Explorer is designed for management of web sites from a remote location. INTRODUCTION Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. DEVELOPERS RESPONSIBILITIES OVERVIEW: The developer is responsible for: Developing the system, which meets the SRS and solving all the requirements of the system? Demonstrating the system and installing the system at clients location after the acceptance testing is successful. Submitting the required user manual describing the system interfaces to work on it and also the documents of the system. Conducting any user training that might be needed for using the system. Maintaining the system for a period of one year after installation. 4.1. FUNCTIONAL REQUIREMENTS OUTPUT DESIGN Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provides a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the Users main interface with the computer. Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly. OUTPUT DEFINITION The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For Example Will decimal points need to be inserted Should leading zeros be suppressed. Output Media: In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. The response time required. The location of the users The software and hardware available. Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies. INPUT DESIGN Input design is a part of overall system design. The main objective during the input design is as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user. INPUT STAGES: The main input stages can be listed as below: Data recording Data transcription Data conversion Data verification Data control Data transmission Data validation Data correction INPUT TYPES: It is necessary to determine the various types of inputs. Inputs can be categorized as follows: External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the system? Interactive, which are inputs entered during a dialogue. INPUT MEDIA: At this stage choice has to be made about the input media. To conclude about the input media consideration has to be given to; Type of input Flexibility of format Speed Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability Keeping in view the above description of the input types and input media, it can be said that most of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the user, the keyboard can be considered to be the most suitable input device. ERROR AVOIDANCE At this stage care is to be taken to ensure that input data remains accurate form the stage at which it is recorded up to the stage in which the data is accepted by the system. This can be achieved only by means of careful control each time the data is handled. ERROR DETECTION Even though every effort is make to avoid the occurrence of errors, still a small proportion of errors is always likely to occur, these types of errors can be discovered by using validations to check the input data. DATA VALIDATION Procedures are designed to detect errors in data at a lower level of

Research Problem

Research Problem CHAPTER-2: FORMULATION OF RESEARCH PROBLEMS AND STEPS OF RESEARCH 2.1 INTRODUCTION: One of the important concepts and the back bone of research analysis is that of ‘identifying research problem(s). This is the real difficulty that commonly creates puzzle in the minds of researchers at the initial stage of research work. It is rather researchers perception or recognition of a difficulty that motivates him/her for planning a research. All the imagination that rules in the mind of a researcher while recognizing about a research, difficulty may not be necessarily a best fit and accurate problem, for which, the process and task of identification of a good research problem is considered as a ‘discovery in itself. 2.2 FORMULATION OF RESEARCH PROBLEM However, in a general meaning, a research problem may be stated as some difficulty which an individual (manager) or organization(s) or society faces and the solution on the existing difficulty is sought. A proper, systematic and thorough analysis of a research problem will definitely enable the researcher (may be social scientist in case of social science research or business executive in case of business research) to be on the right track in the process of research. As it is often said that a problem or difficulty may be defined/stated clearly treated as half solved. As much as the researcher is clear about the problem, it will be better on his/her part to smoothly carry on the entire consequential steps continuously one after the other in the process of execution of a scientific research work. 2.3 COMPONENTS OF RESEARCH PROBLEM: The components of identifying a research problem imply that of analyzing some basic necessities which are required in the process of identifying a research problem. In this process, a research goal should satisfy five basic requirements as outlined below: a. Existence of Both Researcher(s) and Respondent(s): One of the basic requirements for identifying a research problem is the presence of both the parties- the researcher(s) and the respondent (s). The respondent(s) may be an individual or a group who face some difficulty or problem. Similarly, the researcher may be an individual or a group who want to solve the existing problem of the respondent(s). The respondents may be the customers, employees, executives etc., in case of business research where as they may be common human beings in case of social science research. For example, if the respondents are not facing any difficulty, then there may not arise any question of decision-making and hence, no chance of research. b. Both Must Have Some Objectives: The second basic requirement is that, to identify a research problem, both the parties must have some objectives. The respondents want to fulfill their basic requirements of life, want to live in a healthy environment, willingness to purchase new products, to maintain standard of living and as a whole are having unlimited wants. The researchers task is to solve the existing huddles in the process of achieving the desires of the respondents i.e., satisfaction of unlimited human wants. c. Both Must Have Some Doubt While Selecting Alternatives: The respondents are having a number of alternatives with them. This creates doubts in their mind while deciding which alternative to select. Similarly, the researchers are also having few alternatives in the form of doubts. This may lead to the question of selecting the important one that can solve the existing problem in a better way. For example: Let that Hindustan Unilever Ltd. (HUL), is interested to lunching a new brand of tooth paste, with the brand name ‘PARAS in India. The RD cell of HUL is interested to know the market picture of this product and wants to predict the feasibility of the product in the market before introducing it. The researchers of HUL may identify some problem areas like: Who are the major competitor in this product category?, What are the brand image and share of different competitors?, What is the dealers reaction towards the proposed product? In which market segment (area) HUL should concentrate? etc. All these are required for the RD members for suggesting their management while deciding on whether to lunch the product or not? All the four alternatives chosen can give the answer to the question that whether or not to go for the new product. But due to some constraint the team has to make a choice between the alternatives and have to concentrate on any one or few alternatives. No w it is very difficult on the part of the researcher(s) to decide that which one will give better result to achieve at the desired objectives. Similarly, the respondents are also having number of alternatives with them while purchasing a product. d. There Must be an Environment: An activity can emerge in an environment. Like wise a research problem can exist in an environment. The environment may be social, business, political, demographic, technological or any such environments characterized by problems of any kind. 2.4 FACTORS OF PROBLEM IDENTIFICATION: Originating problems or questions constitute the initial phase in the process of problem-formulation. The process of problem finding is having some component of analysis. These components answer to the general questions like how to proceed in the process of problem identification? In this connection Gupta 2001, distinguishes three principal components in the progressive formulation of a research problem like: * What one wants to know? (The originating a general question) * Why one wants to have the particular questions answered? (the rationale behind the question) * Analyzing the questions formatted in search of their appropriateness. a. What One Wants to Know? This type of question generally represents the beginning of certain difficulties or challenges which, should be formulated in such specific terms so as to indicate where exactly the answers to the problem can be found. One type of originating question calls for discovering particular matter of common interest. Another type of originating question draws direct attention to the search for analysis and comparison between different variables in a society. Some questions may be descriptive in nature, while another group of researchers may raise the questions based on the adequacy of certain concepts, while some may be interested in analyzing observed empirical generalizations and so on. b. Why One Wants to Have the Particular Question Answered? The second phase of problem formulation is that of analyzing the vagueness or rational of the formulated question. Rationale is defined as the statement of reasons why a particular question is having some value in that circumstances. Hence, it answers to the question how the answers to the question(s) formulated will contribute to theory or/and in practice? c. Analyzing the Questions Formulated: Each question differs to that of another question in their degree of specificity. Some questions may be quite diffused where as some may be relatively specific and some questions formulated may be undifferentiated or fused. Thus the questions must be broken down into several specifying questions related to the particular aspects may be from management field or related to the areas of social science or can be any combination between the two. 2.5. NATURE OF THE PROBLEM: One of the important concerns before finalizing the problem in research is that of thoroughly scanning the nature of the identified problem(s) by the researcher. As it is already stated earlier that the researchers may face number of huddles (i.e., limited time, less budget, lack of resources etc.) in the process of research, hence, they have to compare the huddles that they are facing and the nature of problem they have identified. The following derivation will help the reader in clarifying this concept. Case-1: When the problem is narrow in scope Foe example: ‘Soft drink habits of management students of a particular institute of a specific area?. Like ‘Soft drink habits of management students of IMF, Bangalore. ‘Socio-economic condition of fruit sellers of Noida etc Solution: These cases require less time to execute, less expensive and also requires fewer resources. Case-2: When the problem identified is broad in scope For example: ‘Impact of world economic crisis on corporate employment ‘Impact of government programmes on rural development in India Solution: Take Long time, expensive and need more resources. Case-3: The problem identified cannot be measured For example: ‘Will this new information technology make society better? ‘Is it possible to shift the human being to Moon to settle there? Solutions: Difficult to estimate. Based on the accessible limitations, the researchers are advised to select their own problem. If they are having less time, less finance to execute research work etc., here it is advisable to identify a research problem which may be narrow in scope and so on. 2.6. SOURCES OF IDENTIFYING RESEARCH PROBLEM(S): Where is the problems lie? or what will be the sources of research problem? This is the question that generally puzzles the minds of researchers at the beginning stage of the research. Most of the researchers are always in search of research problems. The task of problem selection is always confusing. One can explore a research problem basically from three important sources. They are 1. Researchers own interest 2. Contemporary interests of the researcher 3. Identifying unexplored areas 1. Researchers Own Interest: Gupta (2001) pointed out that personal values play an important role along with other determinants in the selection of a topic of research. Researcher(s) with different values tend to choose different topics for investigation. It is always advisable and better to select the problem based on the own interest of the researcher itself. A researcher may select a problem for research from a given situation or circumstances or existing theory as per his/her area of interest. One may generate an idea either while reading a research paper or reading a particular subject in self interested areas. For example, while doing my Ph. D in economics, I am very much interested to explore the level of living in India. Box-2.1: Illustration of Own Interest in Research A popular way of looking at the level of living of the people in the country is to look at the state of inequality in the distribution of income and the level of poverty by analysing their consumption pattern. One of the major curiosities in the Indian economy is to define and estimate a poverty line and to determine the percentage of people below it. There are number of methods to estimate poverty line and number of indices to measure the magnitude of inequality and incidence of poverty. The scope of the study is limited to some popular and widely used traditional, modern (non-ethical) and the recently developed ethical measures of poverty and to some positive and normative measure of inequality to estimate the incidence of poverty and magnitude of inequality in the state. 2. Contemporary Interest of the Researcher: In the busy world, a researcher may come across various problems which require a specific study. Beside personal interest, social and or business environmental conditions do often shape the preference of investigators in order to identify research problem (s). Since societies and/or business environments differ in respect of the premium they place on the work in different fields, hence, these differences affect the choice of research topics. In a given socio-business condition, thousands and thousands of opportunities prevail and can be identified. It is however, researchers own conscious, matters a lot while identifying a research problem. For instance, suppose the prices of major durable goods like that of TVs, washing machines etc., are reducing day-to-day in the electronic market in India, here, the researcher may be interested to study the extent of reduce in price in different time periods, factors that are influencing the acquisition of durables, diffusion of durable goods and hence, demand for the durable goods in the market and so on. Conversion of a problem of contemporary interest into a good and interesting research topic depends largely on the skill and expertise of the researcher in that field of knowledge. 3. Gap in the Existing Theories/Principles: The third source in the process of problem identification is of analyzing the existing gap in the available theories or principles in literatures. Irrespective of rapid expansion of communication, there still exists gap between what is known and what is unknown. This identification of gap between the two is the task of the researcher while selecting a research problem. This type of research would be extending and broadening the field of knowledge in that area. The theoretical or empirical studies conducted on this basis may sometimes alter, modify or revise the existing theories or principles. Here, the researcher uses some existing theories or principles from any discipline of knowledge, may be managerial economics, macro economics, international trade, marketing management, consumer behaviours, finance etc., in the empirical analysis and suggest some modification or development of some new theories in the existing one. Box-2.2: Methods of Estimating Unit Consumer Scales: Consumption pattern of a household, in general is affected by several factors, which may be of economic and non-economic in nature. For example, age-sex distribution, marital status, occupation etc., of the members of the household might be the significant determinants of the consumption pattern in addition to income, tastes, size of the household etc. Since different types of household members have different needs and ability to consume, the actual decisions regarding expenditure by a household are considerably influenced by the consumption of the household (in terms of age-sex etc.). Several researchers1 have proposed alternative methods of estimation of unit consumer scales (to estimate the ‘specific and ‘income unit consumer weights, which constitute ‘specific and ‘income scales respectively). In the beginning, the effect of a single additional individual on the household consumption was used to investigate, by comparing group of households with identical composition except for the presence or absence of one members. This approach was soon abandoned in view of its inefficient results and various other difficulties (Kemsley, 1952). The limitations of this method are: (1) it is difficult to get sufficient number of households of the requisite type and (2) it is possible that consumption pattern of the households of this type may be different by several other factors such as income distribution, regional, climatic and social conditions etc. As a result, subsequent researchers in the field mainly considered child as a fraction of an adult. Although, this idea was originally propounded by Carrol and Bright (1875) and then by Engel (1857) but its scientific treatment was done by Sydenstricker and King (1921). Singh (1968), Singh and Nagar (1973) adopted a modified version of Prais and Houthakkers iterative procedure to estimate both the specific and income scales independently of any such restrictions and assumptions as employed in the models of Forsyth (1960), Barten (1969) and Coondoo (1973, 1975). It is obvious that the same form of the Engel function (in per capita or per unit terms) may not describe the consumption pattern with respect to all the items of consumption. Prais and Houthakker choose to work with only the semi-log and the double-log in their study. However, Singh and Nagars model need not be constrained by any particular form of the Engel function. Instead, they scan through eleven different functional forms and (viz. L, DL, SL, EX, LI, HYP, P, LP, LO, LLI and SLI) and select for the purpose of analysis the one which (i) provide initial and final critical levels of demand below and above which the consumer would not have any demand for the item in question however low or high his income may be, (ii) satisfy the Slutskys conditions and (iii) explains the maximum variation in the dependent variable. Hence, it can be said that selection of a research topic is not the end of research process rather it is only half a step forward. The selection of topics does not help the researcher to see the data are relevant to the methodology to be used, the design of the research etc. 2.7. PROCESS FOR FORMATION OF A RESEARCH PROBLEM: There are number of processes of identification of research problem. They are as follows: 1. Systematic Inquiry Through Pilot Survey: Having a few alternatives in mind, the researcher has to inquiry about the viability of each alternative through pilot survey. The process of pilot survey is nothing but is the preliminary study that the researchers are generally doing before finalization of research topic. This will help the researcher in keeping close contact with the problem to that of related requirements like-the condition of the study area, the nature of the respondents, the expected difficulty in data collection, the time frame required to complete the study, the approximate budget required etc., to solve the problem identified. Some times, it so happens that, the problem selected even though looks easy but in practice it is not so easy to execute. 2. Survey of Existing Literature: Scanning the literature is having multiple advantages to the researcher. In one hand, it helps the researcher to be familiar with the concepts already available in the literature, hence, add some new knowledge to the researcher in the required area. On the other hand, it also helps the researcher in selecting new alternatives, fixation of hypotheses, deciding objectives of study and so on from the existing literature. 3. Group Discussions: Group discussions is the process of discussing about particular topics among the persons who are associated with the work. In group discussions each person in the group shares their own existence and knowledge on a particular topic. It may help the researcher in getting the number of new ideas or knowledge to the existing source of knowledge. Again, discussions with the experts also pave a new way and new idea in the existing field. It also provides some practical knowledge which will help the researchers in the process of execution of the research work. Hence, it can be said that a problem/statement gives information concerning who, what, where and how? 2.8. CRITERIA OF A GOOD RESEARCH PROBLEM: Before finalization of the research problem, the researcher should aware of several conditions and considerations although there is no hard and first rule that all the research problem should follow all the criteria, still few criteria in the form of conditions might be listed for guidance in the selection of a topic. They are: (a) Clarity in problem -the problem selected must have perfect clarity without creating any confusion; (b) Novelty- The problem formulated should be original one so that it should not involve objectionable duplications. Originality is the basic credit point of any research; (c) Logical and Systematic- Research is guided by logic or reasoning; (d) Interesting and Importance- The problem formulated for research should be interesting for the readers and the problem should be significant enough and involve an important principle or practice; (e) Relation between Variables- The problem under study must be in a position to highlight the nature, extent and implicatio ns that exist among variables of the study; (f) Availability of adequate information on data- The research work chosen should ensure the devices and procedures etc. 2.9. DIFFICULTIES OF RESEARCH IN INDIA: India is a pluralistic country. It is not only pluralistic in religion, geographic conditions, body color, living standards etc., but also pluralistic in economic conditions. It generally, possesses characteristics of a typical Under Developed Country (UDC). Before explaining the difficulties that the researchers in India are facing, it is better to narrate some of the distinctive characteristics of the Indian economy. 1. Low Per Capita Income: Indias per capita income is very low compared to the developed countries of the world. The World Development Report 2005 categorized India as a low income category (GNI per capita of $765 or less in 2003) calculated on basis of income aggregates. Similarly, India is also placed in the category of Medium Human Development countries category with HDI value as between 0.05 to 0.799 calculated, based on the human development aggregates in the world. 2. Inequalities in Income Distribution: Another related characteristic of the Indian economy is the prevalence of gross inequalities. The World Bank, in its World Development Report, 2002, has revealed that the richest 10 per cent took 33.5 per cent of the total income and the poorest 10 per cent received only 3.5 per cent of the total income distribution in India. The larger number of people in the top group includes owners and managers in the private sector, managers of public enterprises, workers in large public and private sector enterprises, government workers at the middle levels and small family farmers in the prosperous rural areas. 3. Predominance of Agriculture: Agriculture is the mainstay of Indian economy. Agriculture and allied sectors contribute nearly 22 per cent of Gross Domestic Product of India, while about 65-70 per cent of the population is dependent on agriculture for their livelihood. 4. Low Productivity: There are wide difference in the level of productivity in different sectors between the advanced and the backward countries. The average productivity in Indian agriculture is about 40 times below the productivity level in U.S.A. and Canara. Difference in the industrial productivity between advanced and backward nations is also found to be very significant. 5. Technological Backwardness: The techniques of production employed in most of the sectors of the underdeveloped economics are either absolute or outdated. In India, for example, agriculture is still carried out with the centuries old techniques. Similarly, modernization in the industrial sector is also found to be very limited, as most of the industries still employ techniques which have been long discarded in the western countries. The transport sector still needs more improvement. 6. Deficiency in Capital: A common characteristic of all the underdeveloped countries is the deficiency in capital. The rate of capital formation in India has been depressing low. 7. Rapid Growth of Population: The rate of growth of population in underdeveloped countries is generally very high. This is primarily because of the high birth rate and low death rate. 8. Existence of Unemployed and Disguised Unemployment: Unemployment, underemployment and disguised unemployment are very common feature of the underdeveloped nation, as India. Since, population grows rapidly, labour is a prime factor and it is not possible to provide employment to all the people who are capable of work and willing to work. Consequently unemployment and underemployment is found to be very common. In the agricultural sector of the economy, disguised unemployment exists to a considerable degree. 9. Poor Quality of Human Capital: Human capital implies the quality of the countrys labour force. It is the labour which has to play a great role in building up the economy. Public expenditure on education, medical care and social services goes a long way to improve the quality of labour in the nation. Unfortunately, in India masses still continue to be illiterate and ignorant. For this reason, India is lack of skilled experts in various sectors. 10. Under-utilisation of Natural Resources: In India, still now a large proportion of its forest are laying unexploited. Similarly, the water resources of the country are again remaining unutilized. A better use of all these actual and potential resources pave the way in support of improvement in economic activity and the volume of national production, hence, level of living. The above features and remaining more, point out that India is an underdeveloped country. In the years after independence the government of India has awakened to the need of economic development of the country and has made an organized effort and initiated the process of development in the country. As a result of these efforts the pace of development has gathered momentum and the country is making a steady progress towards development. In such a situation, it is very easy on the part of a researcher to find out accurate problems/ideas/objectives of research within a short span of time. But in the process of execution of research work, he/she may face numbers of difficulties. These difficulties generally emerge as bottlenecks in the process of research in our country. Even though, the literature points out about the presence of a number of huddles that the researchers generally face, some important factors are narrated below: 1. Lack of Specialized Institutions: In India, we have lack of specialized research institutions for conducting frequent research and development in our preferred areas, particularly in management. 2. Lack of Adequate Source of Literature: Since we are lack of adequate specialized research institutions, hence, there is lack of rich library for getting adequate literature. Even though in some particular cities there exist rich libraries but still they seem to be very few in numbers in comparison to requirement. In such a situation, the researchers are spending huge amount towards maintenance expenditure before the collection of required materials. This task is expensive and also time consuming. Such facts are generally de-motivating the researchers. 3. Lack of Adequate Data: Collection of primary data is time consuming and expensive. In India, a researcher is not getting adequate data for conducting research work. There are few organizations that collect primary data (panel data) from the field periodically. But the cost of the data available for sell is very high. For example, suppose a person is interested in consumer expenditure data. The best source of data is that of NSSO unit record data. It is surprising that the data CD of 61st round consumer data costs around Rs. 18000/-, which is very expensive and is beyond the limit of the individual researcher(s). 4. Lack of Experts: We have very limited experts in different fields of research in social sciences and also in management. Since, we have limited institutions and also because of improper salary structure in comparison to developed countries, experts are getting maximum exposure in developed countries and also the working environment is also very attractive and good. This encourages most of our scholars to settle abroad. 5. Technical Bottlenecks: Technology in 21st century is changing very faster. But in India most of the research scholars are using traditional means of technology in research, which are both time consuming and requires more personal involvement. 5. Infant Industry Condition: Most of the industries in India are in Infant stage. For this reason, the industries in India are lack of their own research and development cell. Since, the execution of independent research is expensive, requires more time and human resources, thus, the industries prefer to conduct research through consultants and NGOs, rather than opening up of their own RD department. 6. Dualistic Economy: Indian industrial sector shows dualistic economic structure i.e., the presence of modern sector and the traditional sector. Similarly, small pockets of development exist in towns and metropolitan cities where the industry has grown and the trade is flourishing. On the other hand, the rural areas continue to be in the grip of backwardness, poverty and stagnation. All these create problems to the researcher to get adjusted with these dualistic natures of the economy. 7. Democratic form of Government: Since, Indian constitution is adopting the democratic form of Government; hence, we have no strict legal code and conduct for the research. By the way, it is essential for the formation of a code and conduct specifying methodologies and procedure of research and related issues to make the research process more uniform and ethical. 8. Lack of Adequate Financial Assistance to Researcher: There is lack of certain economic institutions like financial institutions and credit agencies for funding the research work. As funding is not available, it is discouraging research work. 9. Time Consuming: Research process is mostly time consuming. Since we are using all most all the traditional technique of research, hence, it requires much time. This is discouraging for further research. 2.10 LINKING RESEARCH TO PRACTICE: Olivier Serrat (2005) of Asian Development Bank, in his volume ‘Linking Research to Practice which is meant for ADBs series of knowledge solutions pointed out that research greatly exceeds its application in practice. So, he pointed out that researchers must pay greater attention to the production of their research findings in a flexible range of formats in recognition of the varied needs of readers. To him, research is about both generation and enunciation of findings. An enunciate policy is the expression of a research institutions mission and values to its staff members and to the public. It establishes a common vision and the values and measures that can be engaged to achieve accessibility to information content. An enunciate policy can be an effective and economical instrument that links research to practice but in reality it is observed that except few there may be rarely such other institute who are following this in practice. Thus, he advocated for the definite existenc e of an enunciation policy and an enunciation plan for each research agenda. Enunciation tactics will then automatically come into play. Drawing a Enunciate Plan: The most successful enunciate processes are usually designed before the start of a research agenda. It should produce a response-utilization of the research findings-on the part of users. While drawing an enunciation plan, researchers should consider at least the following seven major elements: a. Impact and Outcomes: What is the desired impact of enunciation? What outcomes does the enunciation plan aim to accomplish? In what ways the users are benefited? b. Users: Which users are most affected by the research? Which would be most interested in learning of the research findings? What are their scope and characteristics? c. Information Content: Does the information content match the users expressed informational needs? Does the comprehension level require to understand the information content that match the characteristics of the users? Is the information content reviewed through a quality control mechanism to ensure accuracy and relevance? d. Medium: What is the most effective enunciation method to reach each user group? What reso

Wednesday, September 4, 2019

Essay --

Do the names Chaucer, Webster, or Dickens ring any bells? They are only a few of the greatest English poets, playwrights, and novelists of all time! Their writings have influenced many poets and novelists over the years and still influence new authors today. One of the most influential authors in English literature is Geoffrey Chaucer, whom many thought of as â€Å"the greatest English poet of the Middle ages†. Chaucer is known for Troilus and Criseyde, The Book of Duchess, and The Canterbury Tales. Troilus and Criseyde, tells the tragic story of the Trojan prince Troilus, falling in love with Criseyde. With the help of Pandarus, her uncle, Troilus wins Criseyde’s heart. Calchas, Criseyde’s father, persuades the Greeks to release Antenor, a prisoner of war, in exchange for his daughter. Troilus tells Criseyde he wants to elope, but instead Criseyde promises to return in ten days. Upon arriving with the Greeks, she soon realizes she won’t be able to keep her promise and decides to accept Diomedes, the Greek warrior and king, as her new lover. Another acclaimed work of Chaucer’s is The Boo...

Tuesday, September 3, 2019

The World of Technical and Professional Writing Essay -- Ethics Morals

The World of Technical and Professional Writing As technical writing grows into a more common discipline, complicated questions concerning ethical standards seem to present themselves more frequently. Much of what is written by a technical writer will need to appeal to individuals of varying situational backgrounds, and in this day of intense political correctness and moral responsibility, it is important to remember the ethical and other cultural issues associated with writing for diverse groups of people. Perhaps the foremost ethical question that presents itself to technical writers revolves around the question â€Å"What makes a piece of writing acceptable to one’s audience?† On the surface, this is a seemingly uncomplicated thought. Unfortunately, however, it is one that few professional writers attempt to answer. This question can be approached by remembering that the ultimate goal of any form of writing is to spark an interest in the reader that will cause she or he to want to follow the writer’s thoughts to the end of the work. One way to ensure that the audience will remain attentive is to refrain from offending those who have expressed a desire to read your words. This issue is largely a matter of ethics and one that can harm or assist one’s career in technical writing. Alienation of one’s audience defeats the purpose of the work that accompanied the research and writing of the text in the first place. If technical writers sim ply exercise empathy and remember a few ethical and commonsensical ideas, they will find themselves far more successful in their chosen field. When examining the ethical issues involved in the rapidly growing field of technical writing, it may be helpful to beg... ...so factors a technical writer should consider, as he or she wants to be certain that what is written comes across to the audience in the spirit in which it was intended. As one can see, ethics are an integral aspect of this field. Their careful observation will certainly help to ensure the dignity of technical writers, as well as the profession itself, for many years to come. Works Cited Anderson, Paul V. â€Å"Simple Gifts: Ethical Issues in the Conduct of Person-Based Composition Research." College Composition and Communication 49.1 (1998): 63-87. Pearsall, Thomas E., Donald H. Cunningham, and Elizabeth O. Smith. How to Write for the World of Work. 6th Ed. Fort Worth: Harcourt, 2000. Pickett, Nell Ann, Ann A. Laster, and Katherine E. Staples. Teaching English: Writing, Reading and Speaking. 8th Ed. New York: Addison Wesley Longman, 2001.

Monday, September 2, 2019

“Competing for the Future” by Gary Hamel and C K Pralahad

The book, â€Å"Competing for the future† brings into fore the discussion of effective strategic management as a path towards the establishment of efficient organizations and companies for the future. Moreover, the book's objective is to create ways in which leaders, specifically managers, can help lead the path towards the creation and development of an effective strategy plan for the organization. The path towards the future, however, should not be misconstrued as a ‘race' in which organizations or companies must participate in. What Hamel and Pralahad brought into focus is the nature of the race towards the future, and this was aptly stated in the book (25): There is not one future but hundreds. There is no law that says most companies must be followers. Getting to the future first is not just about outrunning competitors bent on reaching the same prize. It is also about having one's own view of what the prize is. There can be as many prizes as runners†¦In business†¦what distinguishes leaders from laggards, and greatness from mediocrity, is the ability to uniquely imagine what could be. Given this thesis of the book, the authors began their discussion by making it clear that in strategic planning, members of the organization must have a ‘vision,' the ability to imagine things beyond the scope of reality. That is, organizations and companies must also ‘dream,' create ambitions that have not been always considered â€Å"realistic,† yet feasible enough to be accomplished provided the strategy is well-thought out and effectively implemented (145). Of course, it is vital to consider that the process towards the establishment of an effective strategic plan is to bring together all members of the organization, because to delegate the task to a specific group would mean foresightedness in the part of the manager. The authors recommend that for full participation among members in the organization become possible, managers should plan to make each member educated about the whole process in which the organization/company operates (146). Re-educating members/employees ensures that they are able to understand how the organization/company works, and can provide suggestions or recommendations that can be beneficial not only to one department or sector of the organization, but also to the whole organization. The process described above illustrates the authors' view of what â€Å"resource leverage† should be: an acknowledgment of the organization's existing resources, and what can be generated as new resources from these existing ones. Thus, putting leverage on resources may be accomplished through converging, targeting, mining, blending, balancing, recycling, co-opting, and protecting these resources (160-173). Central also to the discussion of strategic management is establishing an organizations ‘core competencies.' The authors define core competencies as those activities that are an â€Å"integral part of the process of general management† (225). This does not only include specific products and/or activities, but all activities and products must be considered as potential core competency. The bigger and more difficult task is in identifying an organization's core competencies; surely there would be activities that specific members of the organization may consider as core, but the authors clarify that these activities becomes a core competency when it is an inevitable and essential part of the organization's daily activities and operations (226). Integrating together the authors' recommendations, â€Å"Competing for the future† brings into light how managers have the foremost goal of creating strategies that integrates the thoughts expressed in the book. This includes creating the â€Å"big dream,† opening up to the possibility that ambitious goals propels companies and organization towards the front race to the future, re-educating employees/members about the organization's daily operations, and identifying core competencies in preparation to the creation of a core competence agenda.

Sunday, September 1, 2019

How Going to College Becomes a Process of Unlearning Essay

This was my reaction after reading Jorge Bacobo’s college uneducation. How can you ever imagine that going to college becomes a process of unlearning? Just look at this scenario. For all of your life, you have dreamed of entering college and you have spent a total of 10 years in elementary and high school to prepare yourself and only to find out that once you stepped in this institution, it becomes a different world all of a sudden. The ideal bubble that pops out of your mind suddenly bursts and you came to realize that after reading a selection in your GE class, all of your efforts have become useless. You, yes you unknowingly is a victim of college uneducation. How ironic, right? How could you ever waste your time memorizing the book and all the principles of sciences only to find out that after an exam is finished, you tend to forget everything? How come you have forgotten your existence here on earth and disregarded the most important thing of the world called life because you are preoccupied of all the assignments, thesis, lab reports, quizzes and exams? How did education evolved to memorization and book worship? How come you cannot answer a simple question without relying on Google or your Encyclopedia? How come you have become a slave of technology instead of you using it? I repeat, how ironic this is. It is a slap in the face because it is the truth. Now, do you call yourself educated? So this is college uneducation – a word unrecognized by Microsoft Word, a newly-discovered term by an author through his observations of what have become of the college students nowadays. Book worship. This is a very rampant activity of the students nowadays. When you ask someone a question, one answers like a robot controlled by the book he has read. This starts the death of critical thinking and sound mind reasoning. Our professor in our Genetics class even worsens this scenario. It is understood that everything we learn in our major subjects must have a r eference and everything we speak in the class should be quoted from an author. However, how can we become educated when everything seems to be a copy paste of the things we ourselves have not experienced? The book answers it all. Then if you become unstoppable saying your answer, confident of what you are saying, the professors says, â€Å"From where did you get that? Who is the author of that?† So this is how books became the students’ gods, worshipping them overnight and forgetting them everything all at once? Professional philistinism. For me, this is like programming the students of what they are to become – specialists in their own fields resulting to narrowing their entire lives to overspecialization. Maybe our professors can be blamed for this since instead of inflicting to us the core values of our existence in this planet, such as realizing how to achieve higher thinking and deep feeling, and appreciating the aesthetic refinement and intellectual pursuits, we are being confined to set our hearts in becoming specialists. As a Fisheries student, we focus on all the areas of the fish beginning from its genetic constitution until how it behaves in migration so that it can be caught by the fish farmers to lay the fish on our plates for food. Our professors keep on saying that one day, one of us will become an expert of this and that and so we have to really study hard on our field. As a result, we end up being slaves of our profession and remain ignorant on the artistic and cultural values around us. Jading dullness of modern life. Unlike the old education, the new generation education does not anymore cultivate the heart. We cannot control the release of the new iPhone or iPad in the market so as we cannot control how the new education brought about by modernity evolves into a way in which forgets how beautiful this world is. Everyone is addicted to Facebook posting their selfies, hashtagging, tweeting on Twitter, uploading a video in Instragram and the like. All assignments can be done by copy-pasting, and getting information from the cannot-be-trusted Wikipedia; and just by one single click, you thought you already have found what you have been looking for. All the formula, equations, scientific names and essays appear on screen which your brain refuses to digest. How easy. How convenient. How fast it is do what you call research. However, can your laptop release nectar which invites the colorful butterflies to come around? How can’t anyone appreciate the rainforests of Miag ao and the rich culture it has? You have to ask yourself: when was the last time you jogged in the campus, breathing in the freshest of the air, taking in the singing silence of the salty air of the OWL waters, or ran barefoot on the grasses of fishbukid? This should have been what education is also all about but now it seems that everyone is a failure. Misguided zeal. Our passion has shifted into a direction that beclouds our vision of the broader perspectives of life as a result of continually pushing ourselves to highly specialized training. How can we be effective in demonstrating the life formulas after we graduate if even now when we are still in college, we have not fully crossed the advanced line of human thinking? Our professor in our Statistics class always allows us to open our notes on the formulas during exams since according to him, if we will be working, reality is that we will still look at our books as a basis. However, there are no books for life formulas just like statistics. Life is not all about standardizing the solutions but rather mastering ourselves alone because no one knows us that well except ourselves. The author’s ideal college student is the wise individual who has unveiled the mysteries of his life, the one who is happy of his existence, has a sense of patriotism, is simple but knows how to defend his virtues without relying on the complexities of rules. On the other hand, honestly, my ideal vision of an Iskolar ng Bayan is someone who is a critical thinker. An Isko also knows how to interpret graphs and charts in literatures when he is told to do so. He envisions his future landing a job to help his fellowmen. Finally, an ideal Iskolar ng Bayan has an overwhelmin g love for his country. Maybe it is not too late to add Bacobo’s ideal college student to my list. A well-rounded education does not only deal with the truths and facts the books and our teachers offer. Art and philosophy is also important because only in art do we find the values of beauty which enables us to appreciate life and human existence as a whole. Philosophy should never be taken for granted since even if we are asked of any question, at least we are able to defend ourselves and prove that we really are educated. In the end, it is not about what we learn or how much we learn, but it is always about the process of how we learn and apply it to real life scenarios because common sense is not always common anymore. Honestly, I dominantly agree with the author for the reason that college students are nowadays really uneducated according to the context he presented. However, there are still a few individuals who do not possess such kind of thinking. And of course, I would not want to allow myself to be called UNEDUCATED. #