System Analysis and Design Report: IoT Healthcare System Analysis
VerifiedAdded on 2023/04/26
|9
|1353
|390
Report
AI Summary
This report provides a comprehensive analysis and design of an IoT healthcare system. It begins with an overview of information gathering techniques, including interviews, questionnaires, on-site visits, and document review. The report then details key processes, such as patient registration, login procedures, health data monitoring via IoT devices, and health data storage. Use case, ER, and class diagrams visually represent the system's functionality and data relationships. The data model section describes the entities and attributes relevant to the system. The report concludes with a bibliography of relevant sources.

Running head: SYSTEM ANALYSIS AND DESIGN
System Analysis and Design
Name of the Student
Name of the University
Author’s note
System Analysis and Design
Name of the Student
Name of the University
Author’s note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1SYSTEM ANALYSIS AND DESIGN
Table of Contents
Process Analysis:.............................................................................................................................2
Information Gathering Techniques:.............................................................................................2
Description of Processes and Required Data:..............................................................................3
Use Case:.....................................................................................................................................5
Data Model:.....................................................................................................................................6
Bibliography:...................................................................................................................................8
Table of Contents
Process Analysis:.............................................................................................................................2
Information Gathering Techniques:.............................................................................................2
Description of Processes and Required Data:..............................................................................3
Use Case:.....................................................................................................................................5
Data Model:.....................................................................................................................................6
Bibliography:...................................................................................................................................8

2SYSTEM ANALYSIS AND DESIGN
Process Analysis:
Information Gathering Techniques:
Interviews: In terms of interview process, the interviewee meets the interviewer face to
face to provide the answers to the interviewer questions. Using the interview process, the
interviewer can collect the raw information regarding user requirements. If the analyst is worried
about the accuracy of the answers then interview technique is the most suitable one for
communicating with the end users. As the questions are not fixed, this method can be extremely
flexible. Because of the complexity, the analyst have to be an experienced one and must have
extraordinary communication skills (Yousuf & Asger, 2015). Every question meant for the
participant should be completely related to the proposed system.
Questionnaire: The information gathering method that allows collecting vast amount of
user responses in very less time is called questionnaire. The questionnaire can be considered as a
self-administrative tool. The cost and effort of completing the questionnaire is very less than that
of interview. The analysts do not need have skills for completing the questionnaire process as
much as interview (EJAZ et al., 2016). There is a big issues in the questionnaire technique. The
participants of the questionnaire may not provide all the answers accurately and there is no way
to validate those answers at the first stage.
On Site Visits and Observations: Based on the proposed system requirements and
characteristics, the onsite visit technique is applied. It is essential that analyst is a keen observer
while completing the onsite visit. The analyst must have in-depth knowledge of proposed system
and proper skills on type of proposed system. This is important as the analyst will analyze the
organizational data and how the organization complete their work, directly (Yousuf & Asger,
Process Analysis:
Information Gathering Techniques:
Interviews: In terms of interview process, the interviewee meets the interviewer face to
face to provide the answers to the interviewer questions. Using the interview process, the
interviewer can collect the raw information regarding user requirements. If the analyst is worried
about the accuracy of the answers then interview technique is the most suitable one for
communicating with the end users. As the questions are not fixed, this method can be extremely
flexible. Because of the complexity, the analyst have to be an experienced one and must have
extraordinary communication skills (Yousuf & Asger, 2015). Every question meant for the
participant should be completely related to the proposed system.
Questionnaire: The information gathering method that allows collecting vast amount of
user responses in very less time is called questionnaire. The questionnaire can be considered as a
self-administrative tool. The cost and effort of completing the questionnaire is very less than that
of interview. The analysts do not need have skills for completing the questionnaire process as
much as interview (EJAZ et al., 2016). There is a big issues in the questionnaire technique. The
participants of the questionnaire may not provide all the answers accurately and there is no way
to validate those answers at the first stage.
On Site Visits and Observations: Based on the proposed system requirements and
characteristics, the onsite visit technique is applied. It is essential that analyst is a keen observer
while completing the onsite visit. The analyst must have in-depth knowledge of proposed system
and proper skills on type of proposed system. This is important as the analyst will analyze the
organizational data and how the organization complete their work, directly (Yousuf & Asger,

3SYSTEM ANALYSIS AND DESIGN
2015). An assistant will provided to the analyst because it is not possible for the analyst to
understand every aspect of the client organization.
Document Review: One of the most effective information gathering method for
collecting accurate data about the client. The document review is a great method for creating the
business process model of the existing processes in the client organization. The biggest
advantage of document review is that it can reveal a lot of core information about the
organization that is known to the management also. These information can be related to how the
processes are handled, the hierarchy of work load, data requirement for each process, the output
of every data (EJAZ et al., 2016).
Description of Processes and Required Data:
Registration of Patient: Registration of the patients are extremely vital for the
organization. This registration will allow the organization to have required data of the users. The
user will first open the website their own device and then click on the registration link. The
website will have a dedicated page for the registration form and the user will be redirected to the
registration page after the link is clicked. The user will input all the data into the registration
form into the registration form. After the system validates all the entered data are valid only then
registration request is accepted.
Login to System: Utilizing the given login credentials, the users are able to access the
data and functions that are authorized to them. As the users are able to submit the form of login,
the system is able to check the overall validity of the value entered. This includes pattern of login
id and many more. As anything is right, the system can check the matches of value entered with
2015). An assistant will provided to the analyst because it is not possible for the analyst to
understand every aspect of the client organization.
Document Review: One of the most effective information gathering method for
collecting accurate data about the client. The document review is a great method for creating the
business process model of the existing processes in the client organization. The biggest
advantage of document review is that it can reveal a lot of core information about the
organization that is known to the management also. These information can be related to how the
processes are handled, the hierarchy of work load, data requirement for each process, the output
of every data (EJAZ et al., 2016).
Description of Processes and Required Data:
Registration of Patient: Registration of the patients are extremely vital for the
organization. This registration will allow the organization to have required data of the users. The
user will first open the website their own device and then click on the registration link. The
website will have a dedicated page for the registration form and the user will be redirected to the
registration page after the link is clicked. The user will input all the data into the registration
form into the registration form. After the system validates all the entered data are valid only then
registration request is accepted.
Login to System: Utilizing the given login credentials, the users are able to access the
data and functions that are authorized to them. As the users are able to submit the form of login,
the system is able to check the overall validity of the value entered. This includes pattern of login
id and many more. As anything is right, the system can check the matches of value entered with
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4SYSTEM ANALYSIS AND DESIGN
that of the stored in database. As the password of login is combination get matched to the data
entered, the system accepts requests of login. Here, information needed is password and login id.
Monitor health data: The IoT device that is installed on the patient’s body monitor the
health related information constantly like blood pressure and heart neat and so on. Then, as the
user makes the login, he can fetch the data. Further, the system would never highlight the data in
real time. Moreover, the feature is not been finalized. Besides, the user can also see the data
stored for the last time in the database. Here, the monitoring involves the previous data regarding
health. In this case, the necessary information are health data and patient id.
Store health data: This IoT device has been sending the data related to the health for
getting connected to mobile device. Here, the system would transfer the information to the server
utilizing online connection. Next, the server validates and store the information to the server.
Moreover, as the mobile sent the information the server, it begins the checking of validity and
integrity of the data. As the data becomes valid, the server store that to NoSQL database system.
This is chosen, since the overall quality of the information is massive. Here also, the necessary
data are the id of patient and health related information.
that of the stored in database. As the password of login is combination get matched to the data
entered, the system accepts requests of login. Here, information needed is password and login id.
Monitor health data: The IoT device that is installed on the patient’s body monitor the
health related information constantly like blood pressure and heart neat and so on. Then, as the
user makes the login, he can fetch the data. Further, the system would never highlight the data in
real time. Moreover, the feature is not been finalized. Besides, the user can also see the data
stored for the last time in the database. Here, the monitoring involves the previous data regarding
health. In this case, the necessary information are health data and patient id.
Store health data: This IoT device has been sending the data related to the health for
getting connected to mobile device. Here, the system would transfer the information to the server
utilizing online connection. Next, the server validates and store the information to the server.
Moreover, as the mobile sent the information the server, it begins the checking of validity and
integrity of the data. As the data becomes valid, the server store that to NoSQL database system.
This is chosen, since the overall quality of the information is massive. Here also, the necessary
data are the id of patient and health related information.

5SYSTEM ANALYSIS AND DESIGN
Use Case:
Figure 1: Use Case Diagram of IoT Healthcare
(Source: Created by Author)
Use Case:
Figure 1: Use Case Diagram of IoT Healthcare
(Source: Created by Author)

6SYSTEM ANALYSIS AND DESIGN
Data Model:
Figure 2: ER Diagram of IoT Healthcare
(Source: Created by Author)
Data Model:
Figure 2: ER Diagram of IoT Healthcare
(Source: Created by Author)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7SYSTEM ANALYSIS AND DESIGN
Figure 3: Class Diagram of IoT Healthcare
(Source: Created by Author)
Figure 3: Class Diagram of IoT Healthcare
(Source: Created by Author)

8SYSTEM ANALYSIS AND DESIGN
Bibliography:
Al-Masree, H. K. (2015). Extracting Entity Relationship Diagram (ERD) from relational
database schema. International Journal of Database Theory and Application, 8(3), 15-26.
EJAZ, A., KHALID, A., Ahmed, S., & Cheema, M. (2016). Effectiveness of Requirements
Elicitation Techniques in Software Engineering Process: A Comparative Study Based on
Time, Cost, Performance, Usability and Scalability of Various Techniques. International
Journal of Management, Information Technology and Engineering, 4(5), 23-28.
Faitelson, D., & Tyszberowicz, S. (2017, May). UML Diagram Refinement (focusing on class-
and use case diagrams). In Proceedings of the 39th International Conference on Software
Engineering (pp. 735-745). IEEE Press.
Yang, L., & Cao, L. (2016). The Effect of MySQL Workbench in Teaching Entity-Relationship
Diagram (ERD) to Relational Schema Mapping. International Journal of Modern
Education and Computer Science, 8(7), 1.
Yousuf, M., & Asger, M. (2015). Comparison of various requirements elicitation
techniques. International Journal of Computer Applications, 116(4).
Zampognaro, P., Buys, R., Walsh, D., Woods, C., & Melillo, F. (2017, July). A Use Case based
requirements specification approach to support the development of a rehabilitation
system for CVD patients: The PATHWAY Project. In Computers and Communications
(ISCC), 2017 IEEE Symposium on (pp. 254-259). IEEE.
Bibliography:
Al-Masree, H. K. (2015). Extracting Entity Relationship Diagram (ERD) from relational
database schema. International Journal of Database Theory and Application, 8(3), 15-26.
EJAZ, A., KHALID, A., Ahmed, S., & Cheema, M. (2016). Effectiveness of Requirements
Elicitation Techniques in Software Engineering Process: A Comparative Study Based on
Time, Cost, Performance, Usability and Scalability of Various Techniques. International
Journal of Management, Information Technology and Engineering, 4(5), 23-28.
Faitelson, D., & Tyszberowicz, S. (2017, May). UML Diagram Refinement (focusing on class-
and use case diagrams). In Proceedings of the 39th International Conference on Software
Engineering (pp. 735-745). IEEE Press.
Yang, L., & Cao, L. (2016). The Effect of MySQL Workbench in Teaching Entity-Relationship
Diagram (ERD) to Relational Schema Mapping. International Journal of Modern
Education and Computer Science, 8(7), 1.
Yousuf, M., & Asger, M. (2015). Comparison of various requirements elicitation
techniques. International Journal of Computer Applications, 116(4).
Zampognaro, P., Buys, R., Walsh, D., Woods, C., & Melillo, F. (2017, July). A Use Case based
requirements specification approach to support the development of a rehabilitation
system for CVD patients: The PATHWAY Project. In Computers and Communications
(ISCC), 2017 IEEE Symposium on (pp. 254-259). IEEE.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.