Professional Documents
Culture Documents
ABSTRACT
Electronic Health Records (EHRs) are electronically-stored health information in a digital
format. EHRs are typically shared among healthcare stakeholders and face power failure, data
misuse, lack of privacy, security, and audit trail. On the other hand, blockchain is the
revolutionary invention of the twentieth century that offers a distributed and decentralized
setting to communicate among nodes in a list of networks without a central authority. It can
address the limitations of EHRs management and provide a safer, secured, and decentralized
environment for exchanging EHRs data. Three categories of blockchain-based potential
solutions have been proposed by researchers to handle EHRs: conceptual, prototype, and
implemented. This project focused on a Systematic Literature Review (SLR) to find and
analyze articles submitted either conceptual or implemented to manage EHRs using
blockchain. The project examined papers that were collected from various publication
categories. The deep technical analysis focused on evaluating articles based on privacy,
security, scalability, accessibility, cost, consensus algorithms, and the type of blockchain
used. The SLR found that blockchain technology promises to provide decentralization,
security, and privacy that traditional EHRs often lack. Moreover, results obtained from the
detailed studies would provide potential researchers with the type of blockchain for future
research.
INTRODUCTION
Blockchain has been a buzzword in Information and Communication Technology industry in
recent years. The rise of this new technology has greater potentials to solve data privacy,
security, and integrity issues. The word blockchain came in the front line after the publication
of the Bitcoin white paper by Satoshi Nakamoto in 2008. The fundamental mechanism
behind Bitcoin is to make financial transactions possible without the intervention of a trusted
third party. The technology is mainly considered a distributed Peer to Peer (P2P) network
where digital data may publicly or privately be allocated to all users on the web in a secure
and verifiable way. In traditional financial transactions, both sender and receiver need to
depend on a Trusted Third Party (TTP), e.g., bank. It involves a few security issues and
operational difficulties. For instance, a TTP gets access to a user’s financial data, which
indicates the lack of user privacy. Moreover, the time involved in a TTP transaction is
lengthy as there are many steps in between the operation. Furthermore, users need to pay the
TTP for their service. Bitcoin solves the above limitations and makes the TTP vanish for a
successful transaction between two users
Tons of healthcare data would be highly beneficial for healthcare providers if
analyzed. These data can help us in fighting the virus through medical assistance, early
notification, and recommendation. However, it has become a big challenge for researchers to
store and analyze health data because most are incomplete and imperfect. Therefore
verification and validation of such data are crucial for reporting, and recommendation.
Blockchain technology has great potentials to tackle the pandemic crisis. It can help build a
decentralized data tracking system that can be retrieved when necessary. In addition, this big
healthcare data, especially EHRs, is vulnerable to privacy and security breaches. Starting
from the COVID-19 outbreak, healthcare providers and academic organizations faced several
complex cyberattacks. The International Criminal Police Organization (INTERPOL)
published a report about cyber-attacks related to COVID-19 in April 2020 Healthcare
industries have been severely affected alongside others by these attacks. On 6 May 2020,
INTERPOL released an awareness campaign where various cyber-attacks during pandemic
were listed. Therefore, it is crucial to take the necessary steps to tackle these threats
By considering the above scenario, this project aims to identify the potentiality of
blockchain to manage EHRs and show the challenges and future scopes. This systematic
review only explores research that offers conceptual solutions, experimental results,
prototypes, and blockchain implementations for managing EHRs.
LITERATURE SURVEY
2. Title : Measuring data quality through a source data verification audit in a clinical research
setting
Author : Y Probst
Description : Health data has long been scrutinised in relation to data quality and integrity
problems. Currently, no internationally accepted or "gold standard" method exists measuring
data quality and error rates within datasets. conducted a source data verification (SDV) audit
on a prospective clinical trial dataset. An audit plan was applied to conduct 100% manual
verification checks on a 10% random sample of participant files. A quality assurance rule was
developed. Error was coded: correct, incorrect (valid or invalid), not recorded or not entered.
Audit-1 had a total error of 33% and audit-2 36%. The physiological section was the only
audit section to have 5% error. Data not recorded to case report forms had the greatest impact
on error calculations. A significant association (p=0.00) was found between audit-1 and
audit-2 and whether or not data was deemed correct or incorrect. Our study developed a
straightforward method to perform a SDV audit. An audit rule was identified and error
coding was implemented. Findings demonstrate that monitoring data quality by a SDV audit
can identify data quality and integrity issues within clinical research settings allowing quality
improvement to be made. The authors suggest this approach be implemented for future
research.
3. Title : A novel architecture for tamper proof electronic health record management system
using blockchain wrapper
Author : A Boras and S Rahman
Description : In this paper, present a novel architecture of blockchain-based tamper-proof
electronic health record (EHR) management system. Recording electronic health data in
cloud-based storage systems always pose a threat to information security. Intruders can delete
or tamper EHR of patients, giving benefits to insurance companies or hiding medical
malpractices (e.g. misdiagnosis and delayed diagnosis). A tamper-proof EHR management
system is required that would essentially solve such issues. The blockchain is an emerging
technology that can be adapted to develop a tamper-proof data management system.
However, establishing a new blockchain based system replacing the existing system is
expensive. In our proposed architecture, we introduce a wrapper layer integration mechanism,
named as the blockchain handshaker, between the existing cloud-based EHR management
system and public blockchain network to develop a tamper-proof health record management
system.
4. Title : Secure and transparent KYC for banking system using IPFS and blockchain
technology
Author : M Kaisar and R Hasan
Description : Know your client (KYC) is a rule for the financial framework to approve a
client based on character, propriety, and risk assessment when establishing a financial
relationship. With the growing concern about security, the KYC cycle is perplexing and
includes a significant cost for completing for a single client. Through InterPlanetary File
System(IPFS) and blockchain innovation, we propose anaffordable, quick, secure, and simple
stage for KYC archive check for the Banking framework. The proposed framework allows a
client to open a record at one bank, complete the KYC cycle there, and generate a hash value
using the IPFS organization and distribute it via the blockchain method. After obtaining the
confidential key, anyBank/monetary association can recover and securely store client
information (i.e., KYC) utilizing the IPFS organization if the client wishes to open another
account with that Bank/monetary association. The proposed framework can save time,
money, and tedious work during the KYC cycle when someone tries to open a record at
multiple banks.
6. Title : Healthcare cyber-attacks and the COVID-19 pandemic: An urgent threat to global
health
Author : K Stevenson
Description : The Coronavirus Disease 2019 (COVID-19) pandemic has resulted in
widespread disruption to the healthcare industry. Alongside complex issues relating to
ensuring sufficient healthcare capacity and resourcing, healthcare organisations and
universities are now also facing heightened cyber-security threats in the midst of the
pandemic. Since the outbreak began various healthcare providers and academic institutions
across the world have been targeted in a variety of complex and coordinatized cyber-attacks.
International and national regulatory bodies have stressed the urgent need for healthcare
providers and universities to protect themselves against cyber-attacks during COVID-19,
recognising that a growing number of cyber-criminals are seeking to capitalise on the
vulnerabilities of the healthcare sector during this period. This includes a desire to steal
intellectual property such as data relating to COVID-19 vaccine development, modelling and
experimental therapeutics. It is therefore essential that healthcare providers and universities
ensure they are informed, protected and prepared to respond to any cyber-threat. This article
outlines key COVID-19 cyber-security principles for both healthcare organisations and
academic institutions.
8. Title : Scalable architecture for sharing EHR using the hyperledger blockchain
Author : F Horitha and V Rocha
Description : Blockchain technology has been applied in several areas, ranging from
financial to health. Although this technology offers benefits, for instance the immutability,
anonymity, and decentralization of information, its use presents some problems, been the
scalability in terms of storage size one of them. This paper presents a scalable architecture for
sharing electronic health records using a multi-channel hyperledger blockchain. The
architecture uses one blockchain to record patient visits and one blockchain for each health
institution to record links that point to Electronic Health Records (EHRs) stored in external
systems. Among the main conclusions, the final results highlight the scalability of the
proposed architecture, when compared to the related work models in the heterogeneous
network.
9. Title : Proof of vote: A highperformance consensus protocol based on vote mechanism &
consortium blockchain
Author : K Li and H Li
Description : Bitcoin introduces a revolutionary decentralized consensus mechanism.
However, Bitcoin-derived consensus mechanisms applied to public blockchain are inadequate
for the deployment scenarios of budding consortium blockchain. We propose a new
consensus algorithm, Proof of Vote (POV). The consensus is coordinated by the distributed
nodes controlled by consortium partners which will come to a decentralized arbitration by
voting. The key idea is to establish different security identity for network participants, so that
the submission and verification of the blocks are decided by the agencies' voting in the league
without the depending on a third-party intermediary or uncontrollable public awareness.
Compared with the fully decentralized consensus-Proof of Work (POW), POV has
controllable security, convergence reliability, only one block confirmation to achieve the
transaction finality, and low-delay transaction verification time.
10. Title : Consumer experience with and attitudes toward health information technology
Author : R Kaushal and M Miller
Description : Electronic health records (EHR) are becoming more common because of the
federal EHR incentive programme, which is also promoting electronic health information
exchange (HIE). To determine whether consumers' attitudes toward EHR and HIE are
associated with experience with doctors using EHR, a nationwide random-digit-dial survey
was conducted in December 2011. Of 1603 eligible people contacted, 1000 (63%)
participated. Most believed EHR and HIE would improve healthcare quality (66% and 79%,
respectively). Respondents whose doctor had an EHR were more likely to believe that these
technologies would improve quality (for EHR, OR 2.3; for HIE, OR 1.7). However,
experience with physicians using EHR was not associated with privacy concerns. Consumers
whose physicians use EHR were more likely to believe that EHR and HIE will improve
healthcare when compared to others. However, experience with a physician using an EHR
had no relationship with privacy concerns.
SYSTEM ARCHITECTURE
Server
Login,
View All Hospitals and
Authorize,
View All Clients and
Authorize,
Add Block chain Code,
View All Block chain Code,
View All Patient Details,
View All Transactions,
View All SK Request and
Response Details,
View All SK Requests and
Permit,
View All Credential Attackers
Details,
Trace and View All Disease
Records by Block chain,
Process all User View No. of Same Disease in
queries Chart,
Hospital client
Registering
the User
Server
In this module, the Admin has to login by using valid user name and password. After login
successful he can do some operations such as Login, View All Hospitals and Authorize,
View All Clients and Authorize, Add Block chain Code, View All Block chain Code, View
All Patient Details, View All Transactions, View All SK Request and Response Details,
View All SK Requests and Permit, View All Credential Attackers Details, Trace and View
All Disease Records by Block chain, View No. of Same Disease in Chart, View Patient
Searched Rank in chart, View Patient File Rank in chart, View No. Of Attackers on Patient.
Client
In this module, there are n numbers of users are present. User should register with group
option before doing some operations. After registration successful he has to wait for admin
to authorize him and after admin authorized him. He can login by using authorized user name
and password. Login successful he will do some operations like Register and Login, View
Profile, Search Patient, Search Patients by Age, View All SK Requests and Response, View
All SK Permitted and Download,
Hospital
In this module, there are n numbers of users are present. Hospitaluser should register with
group option before doing some operations. After registration successful he has to wait for
admin to authorize him and after admin authorized him. He can login by using authorized
user name and password. Login successful he will do some operations like Register and
Login, View Profile,Upload Patient Details, View All Uploaded Patient Details,
DESIGN
UML DIAGRAMS
The Unified Modelling Language (UML) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems, as well as for business
modeling and other non-software systems. The UML represents a collection of best
engineering practices that have proven successful in the modeling of large and complex
systems. The UML is a very important part of developing objects oriented software and the
software development process. The UML uses mostly graphical notations to express the
design of software projects. Using the UML helps project teams communicate, explore
potential designs, and validate the architectural design of the software.
As the strategic value of software increases for many companies, the industry looks for
techniques to automate the production of software and to improve quality and reduce cost and
time-to-market. These techniques include component technology, visual programming,
patterns and frameworks. Businesses also seek techniques to manage the complexity of
systems as they increase in scope and scale. In particular, they recognize the need to solve
recurring architectural problems, such as physical distribution, concurrency, replication,
security, load balancing and fault tolerance. Additionally, the development for the World
Wide Web, while making some things simpler, has exacerbated these architectural problems.
The Unified Modeling Language
(UML) was designed to respond to these needs. Simply, Systems design refers to the process
of defining the architecture, components, modules, interfaces, and data for a system to satisfy
specified requirements which can be done easily through UML diagrams.
Object-Oriented Concepts
UML can be described as the successor of object-oriented (OO) analysis and design.
An object contains both data and methods that control the data. The data represents the state
of the object. A class describes an object and they also form a hierarchy to model the real-
world system. The hierarchy is represented as inheritance and the classes can also be
associated in different ways as per the requirement.
Objects are the real-world entities that exist around us and the basic concepts such as
abstraction, encapsulation, inheritance, and polymorphism all can be represented using
UML.
UML is powerful enough to represent all the concepts that exist in object-oriented analysis
and design. UML diagrams are representation of object-oriented concepts only. Thus, before
learning UML, it becomes important to understand OO concept in detail.
Thus, it is important to understand the OO analysis and design concepts. The most important
purpose of OO analysis is to identify objects of a system to be designed. This analysis is also
done for an existing system. Now an efficient analysis is only possible when we are able to
start thinking in a way where objects can be identified. After identifying the objects, their
relationships are identified and finally the design is produced.
During OO analysis, the most important purpose is to identify objects and describe
them in a proper way. If these objects are identified efficiently, then the next job of
design is easy. The objects should be identified with responsibilities. Responsibilities
are the functions performed by the object. Each and every object has some type of
responsibilities to be performed. When these responsibilities are collaborated, the
purpose of the system is fulfilled.
The second phase is OO design. During this phase, emphasis is placed on the
requirements and their fulfilment. In this stage, the objects are collaborated
according to their intended association. After the association is complete, the design
is also complete.
The third phase is OO implementation. In this phase, the design is implemented using
OO languages such as Java, C++, etc.
UML is a modeling language used to model software and non-software systems. Although
UML is used for non-software systems, the emphasis is on modeling OO software
applications. Most of the UML diagrams discussed so far are used to model different aspects
such as static, dynamic, etc. Now whatever be the aspect, the artifacts are nothing but
objects.
Hence, the relation between OO design and UML is very important to understand. The OO
design is transformed into UML diagrams according to the requirement.
A rectangle is drawn around the use cases, called the system boundary box, to indicate the
scope of system. Anything within the box represents functionality that is in scope and
anything outside the box is not Relationships.
Include
In one form of interaction, a given use case may include another. "Include is a Directed
Relationship between two use cases, implying that the behavior of the included use case is
inserted into the behavior of the including use case”.
The first use case often depends on the outcome of the included use case. This is useful for
extracting truly common behaviours from multiple use cases into a single description. The
notation is a dashed arrow from the including to the included use case, with the label
"«include»". This usage resembles a macro expansion where the included use case behavior is
placed inline in the base use case behavior. There are no parameters or return values. To
specify the location in a flow of events in which the base use case includes the behavior of
another, you simply write include followed by the name of use case you want to include, as in
the following flow for track order.
Extend
In another form of interaction, a given use case (the extension) may extend another. This
relationship indicates that the behavior of the extension use case may be inserted in the
extended use case under some conditions. The notation is a dashed arrow from the extension
to the extended use case, with the label "«extend»". The notes or constraints may be
associated with this relationship to illustrate the conditions under which this behavior will be
executed. Modelers use the «extend» relationship to indicate use cases that are "optional" to
the base use case. Depending on the modeler’s approach "optional" may mean "potentially
not executed with the base use case" or it may mean "not required to achieve the base use
case goal".
Associations
Associations between actors and use cases are indicated in use case diagrams by solid lines.
An association exists whenever an actor is involved with an interaction described by a use
case. Associations are modelled as lines connecting use cases and actors to one another, with
an optional arrowhead on one end of the line. The arrowhead is often used to indicate the
direction of the initial invocation of the relationship or to indicate the primary actor within
the use case. The arrowheads imply control flow and should not be confused with data flow.
Identifying Actor
Add Block chain Code, View All Block chain Code, View All
Patient Details,
Cloud Server
Hospital
Upload Patient Details, View All
Uploaded Patient Details, Register and
Login
,View My Details
Client
,View My Details
UML class diagrams model static class relationships that represent the fundamental
architecture of the system. Note that these diagrams describe the relationships between
classes, not those between specific objects instantiated from those classes. Thus the diagram
applies to all the objects in the system.
Classes: These titled boxes represent the classes in the system and contain information
about the name of the class, fields, methods and access specifies. Abstract roles of the
Class in the system can also be indicated
Interfaces: These titled boxes represent interfaces in the system and contain
information about the name of the interface and its methods. Relationship Lines that
model the relationships between classes and interfaces in the system.
Dependency: A dotted line with an open arrowhead that shows one entity depends on
the behavior of another entity. Typical usages are to represent that one class
instantiates another or that it uses the other as an input parameter
Aggregation: Represented by an association line with a hollow diamond at the tail
end. An aggregation models the notion that one object uses another object without
"owning" it and thus is not responsible for its creation or destruction.
Inheritance: A solid line with a solid arrowhead that points from a sub-class to a
super class or from a sub-interface to its super-interface.
Implementation: A dotted line with a solid arrowhead that points from a class to the
interface that it implement
Composition: Represented by an association line with a solid diamond at the tail end.
A composition models the notion of one object "owning" another and thus being
responsible for the creation and destruction of another object.
Server Hospital
Login
Register
Login (), Reset (),
Methods Methods Register (), Reset ()
Register ().
Client
Register and Login ,View Profile, Search Patient, Search Patients by Age, View All SK Requests and
Methods Response, View All SK Permitted and Download,
Patient Name, Email Id, Mobile Number, Patient Address, Date of Birth, Hospital Name, Blood
Group, Disease Name, Disease Symptom, Age, Select Patient Picture.
Members
3. Sequence Diagram
The sequence diagram is an element that is used primarily to showcase the interaction that
occurs between multiple objects. This interaction will be shown over certain period of time.
Because of this, the first symbol that is used is one that symbolizes the object.
Lifeline
A lifeline will generally be generated, and it is a dashed line that sits vertically, and the top
will be in the form of a rectangle. This rectangle is used to indicate both the instance and the
class. If the lifeline must be used to denote an object, it will be underlined.
Messages
To showcase an interaction, messages will be used. These messages will come in the form of
horizontal arrows, and the messages should be written on top of the arrows. If the arrow has a
full head, and it’s solid, it will be called a synchronous call. If the solid arrow has a stick
head, it will be an asynchronous call. Stick heads with dash arrows are used to represent
return messages.
Objects
Objects will also be given the ability to call methods upon themselves, and they can add net
activation boxes. Because of this, they can communicate with others to show multiple levels
of processing. Whenever an object is eradicated or erased from memory, the "X" will be
drawn at the lifeline's top, and the dash line will not be drawn beneath it. This will often
occur as a result of a message. If a message is sent from the outside of the diagram, it can be
used to define a message that comes from a circle that is filled in. Within a UML based
model, a Super step is a collection of steps which result from outside stimuli.
View Profile,
A data flow diagram (DFD) maps out the flow of information for any process or system. It
uses defined symbols like rectangles, circles and arrows, plus short text labels, to show data
inputs, outputs, storage points and the routes between each destination. Data flowcharts can
range from simple, even hand-drawn process overviews, to in-depth, multi-level DFDs that
dig progressively deeper into how the data is handled. They can be used to analyze an
existing system or model a new one. Like all the best diagrams and charts, a DFD can often
visually “say” things that would be hard to explain in words, and they work for both technical
and nontechnical audiences, from developer to CEO. That’s why DFDs remain so popular
after all these years. While they work well for data flow software and systems, they are less
applicable nowadays to visualizing interactive, real-time or database-oriented software or
systems.
Using any convention’s DFD rules or guidelines, the symbols depict the four
components of data flow diagrams.
1. External entity: an outside system that sends or receives data, communicating with the
system being diagrammed. They are the sources and destinations of information entering or
leaving the system. They might be an outside organization or person, a computer system or a
business system. They are also known as terminators, sources and sinks or actors. They are
typically drawn on the edges of the diagram.
2. Process: any process that changes the data, producing an output. It might perform
computations, or sort data based on logic, or direct the data flow based on business rules. A
short label is used to describe the process, such as “Submit payment.”
3. Data store: files or repositories that hold information for later use, such as a database table
or a membership form. Each data store receives a simple label, such as “Orders.”
4. Data flow: the route that data takes between the external entities, processes and data stores.
It portrays the interface between the other components and is shown with arrows, typically
labeled with a short data name, like “Billing details.”
Login, View All Hospitals and
Authorize, View All Clients and
Authorize, Add Block chain Code,
Register, Add
Restaurants Search Documents,
Server System
Request
View No. of Same Disease in Chart, View
Patient Searched Rank in chart, View Client Search Patients by Age, View All SK
Patient File Rank in chart, View No. Of
Requests and Response, View All SK
Attackers on Patient.
Permitted and Download,
.
Index.html
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Home Page</title>
<style type="text/css">
<!--
.style1 {
font-size: 25px;
color: #33FF99;
.style2 {
color: #FF0000;
font-weight: bold;
}
.style3 {
font-size: 16px;
color: #FF0000;
font-weight: bold;
font-style: italic;
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
</div>
<div class="menu_nav">
<ul>
<li><a href="Hospital_login.jsp"><span>Hospital</span></a></li>
<li><a href="user_login.jsp"><span>Client</span></a></li>
<li><a href="cs_login.jsp"><span>Server</span></a></li>
</ul>
</div>
<div class="clr"></div>
<div class="slider">
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
<div class="clr"></div>
<div class="clr"></div>
</div>
</div>
<div class="sidebar">
<div class="clr"></div>
<div class="gadget">
<div class="clr"></div>
<ul class="sb_menu">
<li><a href="Hospital_login.jsp"><span>Hospital</span></a></li>
<li><a href="user_login.jsp"><span>Client</span></a></li>
<li><a href="cs_login.jsp"><span>Server</span></a></li>
<li><a href="au_login.jsp"><span></span></a></li>
</ul>
</div>
<div class="gadget">
<h2 class="star"><span>Concepts</span></h2>
<div class="clr"></div>
</ul>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="fbg">
<div class="fbg_resize">
<div class="clr"></div>
</div>
</div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
<div align=center></div>
</body>
</html>
Ow_main.jsp
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Hospital Main</title>
</script>
<style type="text/css">
<!--
.style1 {
font-size: 25px;
color: #33FF99;
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
</a></h1>
</div>
<div class="menu_nav">
<ul>
<li><a href="user_login.jsp"><span>Client</span></a></li>
<li><a href="cs_login.jsp"><span>Server</span></a></li>
<li><a href="au_login.jsp"><span></span></a></li>
</ul>
</div>
<div class="clr"></div>
<div class="slider">
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
</div>
</div>
<div class="sidebar">
<div class="gadget">
<div class="clr"></div>
</ul>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="fbg"></div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
<div align=center></div>
</body>
</html>
ow_profile.jsp
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Hospital Profile</title>
</script>
<style type="text/css">
<!--
.style1 {
font-size: 25px;
color: #33FF99;
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
</a></h1>
</div>
<div class="menu_nav">
<ul>
<li><a href="user_login.jsp"><span>Client</span></a></li>
<li><a href="cs_login.jsp"><span>Server</span></a></li>
<li><a href="au_login.jsp"><span></span></a></li>
</ul>
</div>
<div class="clr"></div>
<div class="slider">
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
<h2 align="center"> My Profile!!! </h2>
<%
String s1,s2,s3,s4,s5,s6,s7;
int i=0;
try
Statement st=connection.createStatement();
ResultSet rs=st.executeQuery(query);
if ( rs.next() )
i=rs.getInt(1);
s2=rs.getString(2);
//s3=rs.getString(3);
s4=rs.getString(4);
s5=rs.getString(5);
s6=rs.getString(6);
s7=rs.getString(7);
%>
<tr>
</a></div></td>
</tr>
<tr>
<%out.println(s2);%>
</div></td>
</tr>
<tr>
<%out.println(s4);%>
</div></td>
</tr>
<tr>
<%out.println(s5);%>
</div></td>
</tr>
<tr>
<%out.println(s7);%>
</div>
</div></td>
</tr>
<%
connection.close();
catch(Exception e)
out.println(e.getMessage());
%>
</table>
</div>
</div>
<div class="sidebar">
<div class="gadget">
<div class="clr"></div>
<ul class="sb_menu">
</ul>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="fbg"></div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
<div align=center></div>
</body>
</html>
ow_register.jsp
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Hospital Reister</title>
function valid()
var na3=document.s.userid.value;
if(na3=="")
document.s.userid.focus();
return false;
else
var na4=document.s.pass.value;
if(na4=="")
document.s.pass.focus();
return false;
var na9=document.s.dept.value;
if(na9=="--Select--")
document.s.dept.focus();
return false;
var na99=document.s.spec.value;
if(na99=="--Select--")
{
document.s.spec.focus();
return false;
var na6=document.s.email.value;
if(na6=="")
document.s.email.focus();
return false;
if (na6.indexOf("@", 0) < 0)
document.s.T3.focus();
return false;
if (na6.indexOf(".", 0) < 0)
return false;
var na7=document.s.mobile.value;
if(na7.length!=10)
document.s.mobile.focus();
return false;
if(na7=="")
document.s.mobile.focus();
return false;
var na5=document.s.address.value;
if(na5=="")
{
document.s.address.focus();
return false;
var dob=document.s.dob.value;
if(dob=="")
document.s.dob.focus();
return false;
var na9=document.s.gender.value;
if(na9=="--Select--")
document.s.gender.focus();
return false;
var na10=document.s.pincode.value;
if(na10=="")
{
document.s.pincode.focus();
return false;
var na11=document.s.pic.value;
if(na11=="")
document.s.pic.focus();
return false;
</script>
<style type="text/css">
<!--
.style1 {
font-size: 20px;
color: #33FF99;
.style3 {
color: #FF0000;
font-weight: bold;
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
</a></h1>
</div>
<div class="menu_nav">
<ul>
<li><a href="user_login.jsp"><span>Client</span></a></li>
<li><a href="cs_login.jsp"><span>Server</span></a></li>
<li><a href="au_login.jsp"><span></span></a></li>
</ul>
</div>
<div class="clr"></div>
<div class="slider">
<div id="coin-slider"> <a href="#"><img src="images/slide1.jpg" width="960" height="320"
alt="" /> </a> <a href="#"><img src="images/slide2.jpg" width="960" height="320" alt="" /> </a>
<a href="#"><img src="images/slide3.jpg" width="960" height="320" alt="" /> </a> </div>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
<label for="name">
</strong></span></label>
<p class="style3"><strong>
</strong></p>
<span class="style3">
<label for="password">
</label>
</span>
<p class="style3"><strong>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
<option>--Select--</option>
<option>Cardiology</option>
<option>Neurology</option>
<option>Nephrology</option>
</select>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
<option>--Select--</option>
<option>Heart</option>
<option>Brain</option>
<option>Kidney</option>
</select>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
</strong></p>
<span class="style3"><strong>
<label for="dob">Date of Birth (required)<br />
</label>
</strong></span>
<p class="style3"><strong>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
<option>-Select-</option>
<option>Male</option>
<option>Female</option>
</select>
</strong></p>
<span class="style3"><strong>
</label>
</strong></span>
<p class="style3"><strong>
</strong></p>
<span class="style3"><strong>
<label for="pic">Select Profile Picture (required)</label>
</strong></span>
<span class="style3">
<label for="pic"></label>
</span>
<strong>
<label for="pic"></label>
</strong>
</label>
<p>
</p>
<p>
</p>
</form>
<p> </p>
</div>
</div>
<div class="sidebar">
<div class="gadget">
<h2 class="star"><span>Sidebar</span> Menu</h2>
<div class="clr"></div>
<ul class="sb_menu">
<li><a href="Hospital_login.jsp"><span>Hospital</span></a></li>
<li><a href="user_login.jsp"><span>Client</span></a></li>
<li><a href="cs_login.jsp"><span>Server</span></a></li>
<li><a href="au_login.jsp"><span></span></a></li>
</ul>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="fbg"></div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
<div align=center></div>
</body>
</html>
Connect.jsp
<%
try {
Class.forName("com.mysql.jdbc.Driver");
connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/bbeh","root","root");
String sql="";
catch(Exception e)
System.out.println(e);
%>
SCREENSHOTS