You are on page 1of 77

DESIGN AND IMPLEMENTATION OF STUDENT VERIFICATION

SYSTEM FOR DELTA STATE UNIVERSITY NIGERIA

(DELSU E-VERIFY)

BY

JOHNPAUL ANENECHUKWU HAMPO

MATHEMATICS AND COMPUTER SCIENCE DEPARTMENT

DELTA STATE UNIVERSITY, ABRAKA NIGERIA

NOVEMBER, 2011

i
DESIGN AND IMPLEMENTATION OF STUDENT VERIFICATION

SYSTEM FOR DELTA STATE UNIVERSITY NIGERIA

(DELSU E-VERIFY)

BY

JOHNPAUL ANENECHUKWU HAMPO

FOS/07/08/130685

A RESEARCH REPORT SUBMITTED TO THE DEPARTMENT OF

MATHEMATICS AND COMPUTER SCIENCE, FACULTY OF

SCIENCE, DELTA STATE UNIVERSITY, ABRAKA.

IN PARTIAL FUFILLMENT OF THE REQUIREMENT FOR THE

AWARD OF THE DEGREE OF BACHELOR OF SCIENCE (B.Sc) IN

COMPUTER SCIENCE

NOVEMBER, 2011
ii
CERTIFICATION

DESIGN AND IMPLEMENTATION OF STUDENT VERIFICATION

SYSTEM FOR DELTA STATE UNIVERSITY NIGERIA

(DELSU E-VERIFY)

BY

JOHNPAUL ANENECHUKWU HAMPO

This is to certify that this research work was carried out by JOHNPAUL

ANENCHUKWU HAMPO under the supervision of M.I AKAZUE (Mrs.)

lecturer, department of mathematics and computer science, Delta State University

Abraka during the 2010/2011 Academic Session.

____________________ ___________________

MRS. M.I. AKAZUE DR. O.A. ATONUJE

(Project Supervisor) (Head of department)

______________ ______________

DATE DATE

iii
DEDICATION

This research work is dedicated first to Jehovah God for his mercies

that endures forever and his grace and love that made me who I am today.

Secondly, to my grandmother, Mrs. Christiana Ogbeyeanu Ijomah (Late)

and all my supporters, God used to provide the product (me) today.

iv
ACKNOWLEDGEMENT

I appreciate and gratefully acknowledge God Almighty for making me

scale through despites the unpleasant events of nature. For the intuition, life,

Peace and every good thing God has been giving me, I say baba thank you.

I salute my grandmother Late Mrs. C.O. Ijomah, my parents, Mr. and

Mrs. Cyprian Hampo, my sisters, Vivienne, Pamela, Lovette and Jennifer

and my Brother, Gerald, for all their support and otherwise.

Among my friends, I sincerely appreciate Miss Onyeka O. Efe, she is

more than a friend to me. I wish to thank Tony E., Fegor O., Rachael I.,

Lillian, Florence and all my friends academic and non-academic.

I say thank you to Mrs. F.A. Oshasha, Mrs. Patricia and the Hampos’

notably Emma Hampo. Also to all my critics and supporters, I love you all.

Finally, but not the least, I appreciate my academic mother, Mrs.

Maureen I. Akazue and other lecturers in mathematics and computer science

especially computer science unit notably Mr. Ogini N.O. and Mr. Ojeme

B.O.
v
ABSTRACT

Forgery has long crept into our educational system and, counterfeit and

forged certificate and document have upper hand in various certificate and

degrees awarding institution. Invalid studentship has become greater than

valid studentship. The need for student verification system has become

necessary to check mate and expunge invalid studentship, invalid document

and invalid certificate yielding to authenticity of certificate and documents.

This research work DESIGNED AND IMPLEMENTED STUDENT

VERIFCATION SYSTEM FOR DELTA STATE UNIVERSITY (DELSU

E-VERIFY). The proposed model is concerned with monitoring the

studentship of students, keeping students basic academic record, tracking

students if there is malpractice of any kind and, verifying every certificate of

Delta State University in the future.

vi
TABLE OF CONTENTS

TITLE PAGES i & ii

CERTIFICATION iii

DEDICATION iv

ACKNOWLEDGEMENT v

ABSTRACT vi

TABLE OF CONTENTS vii-ix

LIST OF FIGURES x

LIST OF TABLES x

CHAPTER ONE – Introduction 1

1.1 Background of study 2

1.2 Objectives of study 4

1.3 Scope of the study 5

1.4 Limitation of the study 6

1.5 Methodology 6

vii
CHAPTER TWO – Literature Review 11

2.1 Introduction 11

2.2 Review of verification systems 11

CHAPTER THREE – System Analysis and Design 29

3.1 Introduction 29

3.2 System analysis of the system 29

3.3 Constraints of the existing system 31

3.4 Proposed system design 33

3.4.1 System algorithm design 33

3.4.2 Input design 39

3.4.3 Interface design 41

3.4.4 Output design 42

3.4.5 System database design 43

3.5 Technology, tools and programming language used 45

CHAPTER FOUR – Design and Implementation 48

4.0 Introduction 48
viii
4.1 System design 48

4.2 System description 49

4.3 System implementation 52

4.4 Hardware requirement 53

4.5 Software requirement 53

4.6 System testing 54

4.7 System review and maintenance 54

4.8 Installation procedure 55

4.9 User guide 55

CHAPTER FIVE – Summary and Conclusion 57

5.1 Summary 57

5.2 Recommendation 58

5.3 Conclusion 58

REFERENCE 60

APPENDIX (SOURCE CODES) 62

ix
LIST OF FIGURES

1.1 The SSADM Approach. 8

1.2 The RAD Model. 9

2.1 Credit/Debit Card – front and back view 28

3.1 Input form to add Administrator 40

3.2 The main interface form 41

3.3a Verification Form 42

3.3b The Verification Result form 43

3.4 System’s database table for Admin 45

4.1 Use Case diagram for SVS 51

LIST OF TABLES

2.1 Address Verification Service – the types 13

2.2 Address Verification Service – detail description 17

3.1 Company Table 44

x
CHAPTER ONE

INTRODUCTION

A system, with numerous definitions can be literally seen in a

computer way as a collection of the hardware and software components of a

computer.

According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a

system is set of components that interact to achieve a common goal. In

another sense, a system is a group of interrelated or intersecting elements

forming a unified whole.

A verification system as in this project is an application program used

to verify that someone or something rightly and legally belongs to a

collection, an organization or an individual. There are different verification

system, notably address verification system, adult verification system and

card verification system to mention but a few.

Student verification system is used to know whether or not a student is

or was a legal and rightly registered student. In this context, it is used to


1
verify that a student belongs/belonged to an institution and to confirm that

he/she is properly registered in a particular department running any of the

institutions programme.

This student verification system (SVS), also known as DELSU e-

Verify is a window based system. It is an electronic and computerized means

of verifying someone’s claim of studentship to an institution by means of

their matriculation number (Mat No) being input, hence using an output

clearly showing the truth or false of his/her claim.

1.1 BACKGROUND OF THE STUDY

In this modern age, computers have verified the cause of their

existence. The advent of computers in our society caused a lot of criticism

on the danger it poses on the society. Critics of computer and new

techniques express their fear on how computers will displace and replace all

human skills thus resulting to mass unemployment. The presence of

computer on virtually every field of today’s fast life has proved the critic

wrong as the invention of computers and new technologies continues to


2
create additional jobs for those who identify themselves with computers and

new technologies. This make computes partner to human beings in any

fields of human endeavour.

Over the past decades, students identification and verification has

been a major problem in large institutions as documents, certificate and

studentship can be forged at a great rate and easy way, using the computer

negatively. Forgers fail to know that in this fast moving world, the computer

has equally served as an aid to decision making, verification and

authentication.

This is because of computers efficiency in terms of speed, accuracy,

reliability, cost and security among others.

In recent years, awareness has existed and created in people as it

concerned the use of computer in verifying, authenticating and security

activities either through web-based (internet) or window-based. Decision

support system (DSS) and others system like management information

system (MIS) and information system (IS) are used in organization.


3
Decisions are largely based on experience and principle. The value of

every degree is the reputation of the institution and the students produced,

hence, the greatest obstacle to any academic institution which is dishonesty

and forgery has to be balanced with verification and authentication systems

and processes. “In recent times, effort are bring made to build intelligence

into computer system, whereby the computer can be used to process large

volume of structural and unstructured information for decision making”.

Said Uzoka, 1998.

1.2 OBJECTIVES OF THE STUDY

1. The importance of authentic document and certificate can not be

overemphasized as the reputations of institution are affected in every

counterfeit or forged document or certificate.

2. To design and implement student verification system for Delta State

University. The system will

4
• Prove the authenticity of document and certificate belonging to Delta

State University thereby expunging forged and counterfeit certificate

and document from circulation.

• Show the valid and legally registered student of Delta State

University.

• Prove its supremacy over the existing manual system of verification

and identification by using dummy data.

3. To highlight the importance of verifying and authenticating document

and certificates.

1.3 SCOPE OF THE STUDY

The scope and focus of this study is on students’ identification,

verification and authentication of document and degrees (certificate) and

monitoring of students via the keep of their basic academic information and

bio data. Importantly, the student must be students of Delta State University

or was a student of Delta State University.

5
1.4 LIMITATION OF THE STUDY

This study is limited to information gathered from the review of literature

and the data collection method used. The proposed system is designed on

.NET frame work. Others limitations to the study include:

1. The implementation and usefulness of the system by Delta State

University and other education might not be accepted.

2. In availability of the system on the internet, thought others user apart

from the administrator can use it with some abstraction upon the purchase of

the software and installation there in.

3. Restricted access to some vital and important data and information.

1.5 METHODOLOGY

Software methodology is the set of rules and practices used to create

computer software. It is composed of any one of the software development

models used together with at least a techniques thus,

METHODOLOGY = SOFTWARE MODEL + TECHNIQUES(S)

6
An in-depth literature review is done using document review and the

internet.

The proposed design will be implemented using MS Visual Studio

2008 tools and Visual Basic as the programming language and MS SQL

server 2005 for the database.

The methodology to be adopted for this project is the SSADM

(Structured System Analysis and Design Methodology). The SSADM

emphasizes on the completing a phase of the software development before

proceeding to the next phase and also being able to go back to the other

phases in a purely sequential manner. The model used for this project is the

RAD (Rapid Application Development model proposed by IBM

(International Business Machine) in 1980 and introduced to software

community by James Martins through his book Rapid Application

Development).

7
Requirement

Specification

Design

Implementation

Test

Deploy

Fig. 1.1 THE SSADM APPROACH

8
Elicit requirement

Modularize requirement

Analyze

Develop Develop Develop


module 1 module 2 module N Design

Code

Test
Integrate all the modules

Test and deliver the final


product

Fig. 1.2 THE RAD MODEL


9
SSADM and RAD takes a modular approach to this student’s

verification system using a best practice guide to ensure the successful

implementation of the parts of this project sequentially. The design and

testing of the system’s relational database management system (RDBMS) is

to confirm the design specification. Therefore the window based graphical

user face (GUI) will be integrated to input data into the system’s database.

This project starts small and break down the implementation process into

modules that are attainable based on the adopted requirement and analysis

methodology.

10
CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

This chapter focuses on the pass work of other people/researcher. It

shows what they have done as regard to the study STUDENT

VERIFICATION SYSTEM. Verification systems does a primary functions

with confirmation systems. This chapter shows research work and their

impact to the study.

2.2 REVIEW OF VERIFICATION SYSTEMS

An address verification system (AVS) verifies the address of a person

claiming to own a credit card. The system will check the billing address of

the credit card provider by the user with the address on file at the credit card

company. This system also uses another security features for the credit card

which include the card verification value (CVV2) number.

AVS is used when the merchant verifies credit card data, such as

billing address and zip code, against the VISA/master card billing
11
information of the card holder. This system makes some that the billing

address of the credit or debit card matches the address that was given by the

customer. Because AVS only verifies the numeric portion of the address,

certain abnormalities like apartment can cause false declines; however, it is

reported to be a rare occurrence. For example if someone address is 101

main street, highland, CA 92346, AVS will check only for 101 and 92346.

Sometimes, AVS checks additional digits such as apartment number, other

times it does not. Card holder may receive false negative or partial decline

for AVS from e-commerce verification system, which may require manual

overrides, voice authorization or reprogramming of the AVS entries by the

card issuing bank.

AVS is master card service to combat fraudulent activity for non-to-

face transaction by cross-referencing the card holders address information

with the card issue’s records. AVS is widely supported by VISA and master

card in the USA, Canada and United Kingdom. American express only

12
supports AVS in the USA. Cardholders with a bank that does not support

AVS may receive an error from internet stores due to lack of data.

TYPE OF CODES CODES DESCRIPTION

1. Domestic (U.S) visa codes A, E, N, R, S, U, The international and

W, X, Y, Z domestic alphabetic

2. International visa codes B, C, D, G, I, M, AVS codes are the

P visa.

Standard AVS codes.

3. American express card code F, H, j, K, L, O, For American express

Q, T, V cards only.

Table 2.1 Address verification service (AVS) codes – the types.

Code Description Network

A Street address matches, but 5-digit and 9- Standard domestic

digit postal code do not match

B Street address matches, but postal code not Standard international

13
verified.

C Street address and postal code do not match standard

international

D Street address and postal code match code standard

“M” is equivalent. international

E AVS data is invalid or AVS is not allowed standard

for the card type. domestic

F Card member’s name does not match, but American

billing postal code matches express only

G Non-US issuing bank does not support AVS standard

international

H card member’s name does not match street American

address and postal code match express only

I Address not verified standard

international

J card member’s name, billing address and American

14
postal code match express only

K Card member’s name, billing address and American

billing postal code do not match express only

L Card member’s name, billing postal code American

match, but billing address does not match express only

M Street address and postal code match code standard

“D” is equivalent international

N Street address and postal code do not match standard

domestic

O Card member’s name and billing address American

match, but billing postal code does not match express only

P Postal code matches, but street address not standard

verified international

Q Card members name, billing address and American

postal code match express only

R System unavailable standard

15
domestic

S Bank does not support AVS standard

domestic

T Card members name does not match, but American

street address matches express only

U Address information unavailable. returned if standard

the US bank does not support non-U.S. AVS domestic

or if the AVS in a U.S bank is not

functioning properly

V Card members name, billing address and American

postal code match express only

W Street address does not match, but 9-digit standard

postal code matches domestic

X Street address and 9-digit postal code match standard

domestic

Y Street address and 5-digit postal code match standard

16
domestic

Z Street address does not match, but 5-digit standard

postal code matches domestic

Table 2.2 Address verification service (AVS) codes - detail description of

alphabetic codes.

In a restricted websites an adult verification system (AVS) also known

as an age gate, (is a computing system) is used to confirm that the user

attempting to access a websites is of the age required (Usually by law) to

view the content of the websites, which typically include sex, nudity,

violence and so on that affects the life style of children, (usually under18

years) negatively.

Age Gate is used to legally protect companies from punishment under

law against disseminating pornography to a minor, for example. These

systems (age gate or adult verification systems) often use a company. An

AVS company can provide adult verification for multiple websites, thus

becoming more users friendly.

17
In 1999, landslide Inc, an AVS was at the centre of police crackdown

on internet users viewing child pornography known as operation one, in

which web users using a landslide AVS were identified by their financial

record when the company which stored the data went into liquidation.

Problems with age gate include the ease at which a child may get

access to an adult’s credit card, for instance, that of their parents, defeating

the stated purpose of age gate. Also, the ease of using a fake script to

defraud user’s into divulging their credit card number to an individual to use

for their own purpose is another problems of Adult verification system.

In the educational scene the Illinois state board of education (ISBE)

approved a three-year project that will greatly enhance the data collection

process of students’ information at a district level resulting in more accurate

information being submitted to the state for school annual report cards. This

system to be built is known as student information system (SIS). ISBE in

conjunction with IBM (international business machine) will develop and

18
implementation the tracking system that will help district to provide more

accurate students information for state assessment used for the report card.

SIS has been in the planning stages for several years and it finally

coming to fruition said state superintendent of education, Robert Schiler. He

continued “with the requirement that no child left behind (NCLB) places on

state and school, this will help all of us to improve the process of data

collection related to each of our student”.

The SIS is yet another major portion of the agency’s initiative to

create more processes which are completely electronic and paperless,

resulting in greater efficiency, according to Robert Schiller.

SIS promises to offer several benefits including:

 Improving the accuracy and quality of information gathered from schools

and district,

 Enable ISBE to respond to the accountability and reporting requirement

of NCLB and other federal and state mandates.

19
 Reducing the burden of respond data collection by school and districts,

amongst other benefits.

Schiller said “we are all committed to maintaining the privacy,

confidentially and security of students’ information”. The SIS is to replace

the old and manual annual data collection by ISBE from its 4,000 schools in

nearly 960 districts, hence serving Illinois 2.2 million students.

The proposal student information system (SIS) consists of three

phases.

Phase 1 of the project (School year 2004-2005) will involve two pilot

projects with a consortium of selected district, vendors that support their

local student information system, ISBE students’ assessment staff and ISBE

testing contractors.

One pilot project will focus on:

 Collecting local students identification numbers and demographic

information from pilot districts,

20
 Assigning a unique student’s identifier to each student in each pilot

district. This identifier will serve as a link between local student information

and the ISBE SIS,

 Assisting pilot district and their local students information vendors to

ensure that their systems are able to store the unique state student identifier

and to transfer required data to ISBE in specified data formats,

 Developing a process to allow pilot district administrators to request a

unique state student’s identifier for students entering the district during the

year.

The second pilot will involve working with selected district, ISBE

student’s assessment staff and testing contactors to capture individual

student’s assessment scores for NCLB reporting during the 2005 testing

cycle.

Phase 2 (school year 2005-2006) will expand phase 1 activities state

wide, building on the lessons and experience gained during the phase 1

pilots.
21
Phase 3 (school year 2006-2007) will focus on integrating existing

special education career and technical education students systems into the

ISBE SIS and building interfaces to other ISBE systems.

A plus ID, another student identification system agreed by schools, colleges

and universities, is the identification solution provider when it comes to

education. Improve productivity, efficiency, save time, money and even

lives with a fully integrated students ID system including access control,

time and attendance and video surveillance.

In addition to the functionality, reliability and ease of use, you expect

a student ID card system will deliver the security you need to protect your

campus from both internal and external threats. The A plus ID student ID

system allow you to:

 Issues a students ID card that is hard to forge but easy to authenticate,

 Differentiate between those who belong and those who do not,

 Save time and money by streamlining your operations,

 Create an image database for a varsity of uses,


22
 Monitor and track student’s and visitors activity for a secure facility by

using the student’s ID system,

 Remotely track students on field trips or at sporting events by giving

them students ID cards,

 Physical access control to facilities, secure area parking lots and parking

structures by incorporating the student ID system,

 Logical access control for network and databases,

 Cashless food service,

 Automate reporting of inconsistence, anomalies and emergencies.

A plus ID understands that security is a process which has bearing on

each department, employee and student. We take an active roll to gain

special knowledge of your unique needs including business operation and

management information systems by creating a strategic partnership with

our client in order to maximize return on investment, system performance

and customer satisfaction.

23
The Pakistani Higher Education Commission (HEC) has planned to

soon initiate online verification of degree of students intending to visit

abroad for further education. This was stated by member operation and

planning HEC Dr. Mukhtar Ahmed. He further said, that the commission

would verify degrees and certificates of students intending to get admission

abroad in Pakistani university or for getting job through online procedure.

Student verification system for online assessment: bolstering quality

and integrity of distance learning as studied by Dr. Suhansa Rodchua et al

verifies students through biometric technology either finger print or facial

recognition. The study also incorporates biometric technology, video

surveillance systems and computer restriction software into a system and

computer restriction software into a system. Hence, to eliminate cheating,

dishonesty and malpractices of all form.

In Nigeria, biometric finger print has been introduced as announced

by the Joint Admission and Matriculation Board (JAMB) in the conduct of

the Unified Tertiary Matriculation Examination 2011 (UTME 2011).


24
Register of JAMB, Dibu Oferinde said in Abuja that this was part of their

strategies to curb incidence of examination malpractices.

“The board introduced biometric finger print check impersonification,

Lateness and for identification of candidate before admitting them for the

examination” said Mr. Ojerinde. “Consequently, the board has successfully

carried out a pilot scheme aimed at test running the biometric verification

validity and reliability”.

The system according to Mr. Ojerinde has been designed to separate

the candidate on the basic of centre hence if a student is not register in a

particular centre; he or she cannot be captured against that centre and can

only be where the candidate is registered”.

There is no “I forgot my thumb and fingers” in this system.

To be admitted for the examination candidates are expected to have

printed their examination e-slip online after their registration number,

examination numbers and examination towns and centre. The slip will be

used for identification, while the system for verification and validation.
25
The Unified Tertiary Matriculation Examination represents a merger

of both the scrapped University Matriculation examination (UME) and the

Polytechnics and Monotechnics Matriculation Examination (PMME). To

show the capacity of the system, the board also reserved that a total of one

million, four hundred and ninety-three thousand, six hundred and three

(1,493,603) candidate registered for the 2011 UTME, against one million,

three hundred and seventy-five thousand, six hundred and forty-two

(1,375,642) candidates who registered for the examination in 2010. this

represented an increase of one hundred and seventy thousand, nine hundred

and sixty-nine (117,961) while a total of 160 visually impaired candidates

also registered for 2011 examination and about 26 candidates were

exempted from biometric finger print screening to be admitted and verified

with their e-slip and registration number.

The card security code (CSC), sometimes called card verification data

(CVD), card verification value card (CVVC), card verification code (CVC

or CVC 2 ), verification code (V-code or V code) or card code verification


26
(CCV) are different terms of security features for credit card or debit card

transaction, providing increased protection against credit/debit card fraud.

There are several types of security codes:

 The first code, called CVC1 or CVV1 is encoded on the magnetic stripe

of the card and used for transaction in person. This ensures that data stored

on the magnetic stripe are valid and generated by the issuing bank.

 The second code and most citied is CVV2 or CVC2. This CSC (also

known as CCID or credit card identification) is often asked by merchant for

them to secure card not present transaction occurring over the internet, by

mail, fax or over the phone.

 Contact-less card (uses RFID- Radio Frequency IDentification to transfer

data from a tag to an object) and chip card may supply there own code

generated electronically, such as iCCV or Dynamic CVV.

These codes should not be confused with standard bank account number,

card pin or password. These codes are not printed or embedded in the card

27
but are manually entered at the time of transaction. Users have to be careful

b not to enter the CSC into a fraudulent web site.

Fig 2.1 -

Credit/Debit Card – front and back view

28
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 INTRODUCTION

In this chapter the analysis of the proposal system and its design is

discussed more. That is to say, what the proposal system- DELSU e-Verify,

is made of, its features and how it is designed- its outputs, inputs and

database. Likewise the tools and technology that are used are not left out.

3.2 SYSTEM ANALYSIS OF THE SYSTEM

A system is an harmonious arrangement of components hardware and

software; that interact to achieve a common goal. ( Stella C.C and France

A.E., 2006).

Analysis is the focus of system development and is the stage when

system designers’ works at two levels - what to do and how to do. Analysis

of students verification system (DELSU e-Verify) involves a detailed study

of various operation performed by it.

29
Every system is created against at least a particular problem; that is

systems are created to solve problems. This student verification system

solves the problem of fraud, both in studentship and certificate and

documents obtained from higher institution notably Delta State University,

Abraka Nigeria (DELSU).

The existing verification system is a manual one, this is, it uses

manual method where a request usually via letter or memo is sent to the

concerned institution to verify the studentship of a students or the degree of

truth of a certificate or document. Every thing is done on paper.

In comparison with the manual system, student verification system is

an automated system that simplifies the activities of the manual system with

better integration and updates of the manual systems activities. This

automated system is designed and developed with Microsoft visual studio

2008 using visual basic (VB. Net) as it language and Microsoft SQL

management server 2005.

30
System analysis squarely deals with the software development activities.

Three basic stages are involved in designing and delivering a good student

verification system (and any other system), namely;

 A thorough analysis of the system. A problem understood is half

solved.

 Development of an effective automated system student verification

system; to meet requirement in an effective and efficient way.

 Developing, installation, testing of system components, training,

management, programming, monitoring and delivery the system-student

verification system; into production yields to successful construction and

implementation of the system in the user’s environment.

3.3 CONSTRAINTS OF THE EXISTING SYSTEM

The existing system which is a manual system of student verification

is associated with the following constraints or problems;

1. Unreliability: this system (the existing system) can be manipulated

since human beings are directly involved in the process of verification.


31
Human can be bribed, deceived and show favouritism but in the proposed

automated system (DELSU e-Verify) these are not possible.

2. Speed: this has to do with time,. It takes longer time to send an

application letter for verification and the reply thereof when compared to the

window based student verification system. The speed of the manual system

is a snail’s speed.

3. It increases paper work since it is not an electronic system. The

paper work of the manual system is far greater than the paper work of the

automated system.

4. During the process of application for verification and reply to

application, some important document might be lost.

5. Un-confidentiality: privacy is not considered in the manual system,

important and private information may be made open during the process of

verification, as many people (more than two persons) are involved.

32
3.4 PROPOSED SYSTEM DESIGN

Students’ verification system is the proposal system and it is designed

for institution of learning and is specifically restricted to Delta State

University, Nigeria. The system is designed to achieve the establishment

objectives of the proposal system.

3.4.1 SYSTEM ALGORITHM DESIGN

Note that the proceeding algorithm is not in pseudo code neither is it

written in any programming language but it is written in a natural language.

Start

If Admin starter then do

If the file then do

If new then do

Read data

If update then do

Read data

End if
33
Else if exist then do

Close application

End if

10 if search then do

If by programme then do

Read programme

End if

Else if by faculty then do

Read faculty

End if

Else if by level then do

Read level

End if

Else if by department then do

Read department

End if
34
Else if unique search then do

Read mat no

End if

End if

20 if verification then do

If graduate then

Read mat no and name

Else

If undergraduate then

Read mat no and name

End if

End if

If admin then do

If add then do

Read admin data start

Add new admin


35
Else

If edit then do

Admin start

Read data

Update admin else

If delete then do

Read admin data

Delete admin

Else

If system operation then do

If add then do

If (item = programme or dept or course or status or faculty or level) then do

Read data

Else

If edit the do

If (item = programme or dept or course or status or faculty or level) then do


36
Read data

Update data

Else

If item = delete then do

If (item = programme or dept or course or status or faculty or level) then do

Read data

Delete data

End if

End if

If organization menu then do

If add then do

Read data

Else

If modify the do

Read data

Update data
37
Else

If delete then do

Read data

Delete data

End if

End if

If (organization or student) then do

If file then do

If exit then do

Close application

End if

End if

If search then do 10 // does the algorithm with line number 10 end if

If verification then do 20 // does the algorithm with line number 20

End if

End if
38
End

3.4.2 INPUT DESIGN

For there to be an output, there must be an input which must be

processed to yield the required output. The input document used to record

information of student and to verify student information thereafter makes up

the input forms.

The supplied data on the input forms servers as the input to the

system. These inputs are linked to the systems database and comparison is

made with the pre-stored data in the database.

The system has a menu called verification which consists of two sub

menus called graduate and undergraduate. The verification form is shown on

the clicking of any of the sub-menus. The required fields used as inputs in

this form include Name and Mat no. The important and primary field is

matriculation number (mat no).

39
Fig. 3.1 input form to add Administrator

40
3.4.3 INTERFACE DESIGN

This is the physical structure of the visible side of the system, mainly

to the users. That is the front and of the system, which the users of the

system interacts with, it comprises of both inputs and out put forms.

The interface of the system is a graphical user interface and not a

command type; it is also an interactive, clear and not clumsy.

Fig. 3.2 The main interface form

41
3.4.4 OUTPUT DESIGN

After students details has been inputted into the student verification

system, for verification the processed information or result appears on a

form. This form that shows the output (result) is the output form.

Fig. 3.3a The Verification form

42
Fig. 3.3b The Verification Result form

3.4.5 SYSTEM DATABASE DESIGN

Database is a repository for data and information in an organized way

to prevent redundancy and to preserve data integrity amongst others.

The design and implementation of the database is done on Microsoft

SQL server engine. This database consists of table of which some are.

43
tblstud, tblcourses, tbladmin, amongst others. Each of these tables has their

column name (Field) and data types respectively. Notable, tblacomp has

Fields Data type

Username varchav

Pass varchav

Comp varchav

Squest varchav

Compid varchav

Dob varchav

Demp varchav

Table 3.1 company table

44
Fig 3.4 system’s database table for admin

3.5 TECHNOLOGY, TOOLS AND PROGRAMMING LANGUAGE USED

Windom based application are developed systems or applications that

are objects oriented and run on a windows environment. Thus, it needs no

internet connection.

45
Microsoft visual studio 2008 is an integrated Development

Environment (IDE) developed by Microsoft Inc. it can be used for

development of different things such as, console programs, GUI (Graphical

User Interface) application, web sites, web pages, web application and

services (native code and managed codes and included). Visual studio

includes a code editor, compiler, debugger and build-in tools like forms,

splash serene, class, web and database designer.

Visual basic Net (VB.Net) is an object oriental programming language

used for developing a variety of applications that runs on .NET framework.

VB and VB.Net is simple, powerful, type-safe objective oriented and

encourages Rapid Application Development (RAD). VB.Net and VB by

Microsoft Inc. is an implementation of the classic programming Basic

Language. Visual studio supports VB. Net with a complete featured code

editor, compiler, debugger and so on. Applications developed using visual

studio can run on any window platform or environment.

46
SQL server 2005 is a relational database management system

(RDMBS) developed by Microsoft Inc. it runs as a server giving access to a

number of databases. The SQL is an acronym for structured Query

Language, pronounced officially as “S.Q.L” but one often pronounced as “S-

equ-el”.

47
CHAPTER FOUR

DESIGN AND IMPLEMENTATION

4.0 INTRODUCTION

This chapter focuses, on the requirements for this automated system’s

implementation. Information about the installation is also discussed,

moreover, the automated system is described in UML (Unified Modeling

Language) and the use case diagram is given.

An automated system that is not implemental or is not successful

implemented can not be used to perform well as the case may be. “Even

after the development phase is over, the system project isn’t complete. The

new system must be implemented or installed” (said Stella C.C. and Franca

A.E, (2006)).

4.1 SYSTEM DESIGN

This automated system is designed using the SSADM (Structured

System Analysis and Design Methodology and RAD (Rapid Application

Development) Model which are object oriented. The UML which was
48
formulated by Booch, Rumbaugh and Jacobson in 1997 is used to describe

the system and the use Case diagram shows the system design (Detail

Design or design Overview). UML is a language for specifying, visualizing

and constructing the artifacts of software system. A Use case diagram is one

of the UMl diagrams. Others are sequence diagram, state diagram,

collaboration diagram and so on.

A use case diagram shows typical interactions between a user (actor)

and the computer system. As defined by Stella C. C. and Franca A.E. (2006)

in their book principle of system analysis and design, use case are included

in UML and it is a narrative document that describes the sequence of event

of an actor using a system to complete a process.

4.2 SYSTEM DESCRIPTION

To describe this automated system, we apply a use case diagram

which is graphical representation of the systems functionality by the

different users. The use case diagram consist of actors use cases and arrows

(for evens of flow.


49
The actors as concerned in this student verification system are Admin

(Administrator), student and Org. (organization). The use cases are

registration, update, search, verification, add admin, modify Admin, Delete

Admin, System Operations and organizations menu.

The system operation consists of Add, Edit and Delete of Programme,

department, status, session and so on. The organization menu is meant for

the registration of organization, editing and deleting likewise. The

registration gives license to the organization to own and use the student

verification system.

The use case diagram of this automated system – student verification

system; is given below.

50
Registration

Update

Student Search

Verification

Add Admin Admin

Modify Admin

Delete Admin

Organisation
System Operations

Organisation Menu

System Boundary

Fig 4.1 Use Case Diagram - Shows the description of the student verification

system.
51
From the above use case diagram, after the log in process has been

met, the system provides an abstraction based on the selection. Thus, if a

student or an organization log-in, he/she can only see and perform two

function - search and verification, apart from closing the application. When

an administrator logs in, he/she can use all the system components.

4.3 SYSTEM IMPLEMENTATION

Designing or developing a system is one thing, another is

implementing, not just implementing it, but the successful implementation.

Implementation of any information system or automated system

depends on the hardware, software and people. Hence, the hardware being

mainly a personal computer (PC) with printers, scanners and any peripheral

that is needed. The software for the implementation of this automated

system is MS SQL server 2005 which serves as the database but there is no

need for this software if a student or an organization desires to make use of

it. The operating system must be a Microsoft windows operating system.

52
The people consist of the users of the system which encompasses of

Administrators, organization and students. All the users must be trained and

computer literates else the system’s aim and objective will be defeated.

4.4 HARDWARE REQUIREMENT

The following hardware components are needed

• Personal computer (PC) – a desktop or laptop

• Printer – a desk jet or inkjet

• Scanner – Preferably colour scanner pictures.

The personal computer should have a minimum of

• Pentium 4 Processor

• 512 kb RAM

• GB Hard disk

4.5 SOFTWARE REQUIREMENT

The needed software is as follows:

• Microsoft windows XP or any Microsoft

53
• Microsoft SQL server 2005

• Microsoft visual studio 2008.

4.6 SYSTEM TESTING

Before a system is put into operation, its components programs must

be tested to make sure. They work both individually and as a unit. Testing

whether unit testing (individual testing) or individual testing, removes bugs

from individual programs and system application. The testing of this system

is done with life data and test data.

An automated system may have a hundred programs and a

comprehensive database, all must be tested together to ensure harmony of

operation. The purpose of system testing is to validate all software,

input/output, databases and procedures and so on as the case may be.

4.7 SYSTEM REVIEW AND MAINTENANCE

After successful testing and implementation, system review and

maintenance is necessary to do check and balances and for the following.

54
• Comparison of the system’s actual performance versus the anticipated

performance objectives

• Assessment of each facet of the system with respect to present criteria.

• Correction of any error that may occur after its use for say one months;

• Updating of new features;

• Unexpected problems

4.8 INSTALLATION PROCEDURE

After the purchase of the software, insert the CD into a CD/DVD

RW/ROM of the computer system you intend to have this software installed

on. Then Run the inserted disk and follow the setup procedure, there after,

the software will open if it has been successfully installed. This installed

software does no open on its own but open on the users demand by double

click on its icon or right click on the icon and click on open.

4.9 USERS GUIDE

Users of the software should take the following as a guide:

55
• Avoid the use of this software by a computer illiterate

• Ensure that you hardware and software meets the hardware requirements

and software requirement as stipulated in 4.4 and 4.5 respectively.

• Regular maintenance should be done on the software to avoid unexpected

problems.

56
CHAPTER FIVE

SUMMARY AND CONCLUSION

5.1 SUMMARY

Students’ verification is a major and important activity to any

institution. The system that has been in existence is the manual system

which has many defects as mentioned earlier in section 3.3 of this material.

The merits of this automated system over the existing one are as follows

• Accuracy

• Reliability

• Reduced paper work

• Speed in processing time

• It cannot be manipulated

• Simple process

• Users friendliness with GUI

57
5.2 RECOMMENDATION

This work should not put a stop to research on student verification

technology as biometrics technology, facial recognition and Iris recognition

technologies can be integrated to the technology used in this system.

Despite the fact that the system is a window based system (application

software), it should be re developed to a web based system but with stronger

security measures to avert web hackers and theft.

Also, we strongly recommend this software for Delta State University

and other degree awarding institution.

5.3 CONCLUSION

Automated system has proved to be more successful when compared

to manual systems.

Student verification system redefines the manual verification system,

hence averts academic fraud and illegal studentship certificate and

document.

58
Since the value of every degree is the reputation of the institution and

the student produced, student verification system will in no distance time

‘pocket’ the manual verification system with the utilization of biometric

technology and video surveillance.

59
REFERENCE

Byron, S.G. (2001). Theory and Problems of Programming with visual basic

Schaum’s Outline. McGraw – Hill USA.

Sikiru, O.A. (2009). Implementation of an Online Job recruitment system. An

unpublished M.IT Thesis, University of Lagos, Nigeria.

Stella, C.C. and Franca, A.E (2006). Principles of System Analysis and Design.

Rootprint and publisher, Benin city – Nigeria.

Suhansa, R., George, Y. and Ronald, W. (2011). Students verification system for

Online Assessments: Botstering Quality and interigty of Distrance Learning.

Journal of Industrial Technology. Volume 27 Number 3. P1-8.

Uzoka. (1998). Human Resources Management an unpublished M. Tech Thesis,

federal University of Technology, Akure, Ondo State.

WEBSTIES

www.atmae.org/jil/Article/rodchua-student-verification-system-07122011.Pdf

(Accessed on: 23rd August 2011).

60
http://propakistani.pk/2009/01/25/hec-onlinedegree-verification-system-for-

students/ (visited on: 23rd August 2011)

www.zimbio.com/Nigeria+today/articles/qpgfit02wiR/Biometric+fingerprint+2011

+jamb+utme (Accessed on 10th October 2011)

http://en.wikipedia.org/wiki/address-verification-system (Accessed on: 10th

October 2011).

http://en.wikipedia.orgwikie/adult-verifiation-system (Accessed on: 10th October

2011)

www.isbestate.il.USnews/2004/july16.htm/ (Accessed on: 1st November 2011).

http://en.wikipedia.org/wiki/microsoft-visual-studio (Accessed on: 10th November

2011).

www.aplusid.com/Education-C00718.html (Accessed on: 1st November, 2011).

61
APPENDIX (SOURCE CODES)
Imports ADODB
Imports dao
Imports Microsoft
Imports VBIDE
Imports System.Data.SqlClient
Imports System.Data.OleDb

Public Class jpsoft

Dim prov As jpsoft


Public cn As New SqlConnection
Public ServerDate As DateTime
Public Sub dbconnect()

cn.ConnectionString = "server=ANNABELLE; user id=sa;


password=123456; database=dbJP_Project"
If cn.State = ConnectionState.Open Then
cn.Close()
cn.Open()
End If
cn.Open()

End Sub

Public Sub serverdt()


Dim a As New jpsoft
a.dbconnect()
Dim cmd As New SqlCommand
cmd.Connection = a.cn
cmd.CommandText = "Select GetDate()"
cmd.ExecuteScalar()
cmd.Dispose()

End Sub
End Class

Imports System.Data.SqlClient
Public Class frmpp

62
Private Sub btnsave_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles btnsave.Click
If btnsave.Text = "SAVE" Then
Dim hamplus As New jpsoft
hamplus.dbconnect()
Dim CMD2 As New SqlCommand
CMD2.Connection = hamplus.cn
CMD2.CommandText = "select * from tblstud where matno=@mn"
CMD2.Parameters.AddWithValue("@mn", frmedudata.txtmat.Text)
Dim DS As SqlDataReader
DS = CMD2.ExecuteReader
If DS.HasRows = True Then
MsgBox("Student Already Registered")
Else
DS.Close()
Dim cmd As New SqlCommand
cmd.Connection = hamplus.cn
cmd.CommandText = "insert into tblstud
(surname,other,title,sex,dob,pob,mstatus,soo,lga,nat,rel,yoe,moe,eyog,y
grad,burs,awarded,prog,fac,dept,course,lev,matno,doc,div,sname,sadd,sre
l,kname,kaddress,krel,gog,cog,extension,badrec,koo,dateAwrded) values
(@surname,@other,@title,@sex,@dob,@pob,@mstatus,@soo,@lga,@nat,@rel,@yo
e,@moe,@eyog,@ygrad,@burs,@awarded,@prog,@fac,@dept,@course,@lev,@matno
,@doc,@div,@sname,@sadd,@srel,@kname,@kaddress,@krel,@gog,@cog,@extensi
on,@badrec,@koo,@dateAwrded)"
cmd.Parameters.AddWithValue("@surname",
frmbiodata.txtsn.Text)
cmd.Parameters.AddWithValue("other",
frmbiodata.txton.Text)
cmd.Parameters.AddWithValue("@title",
frmbiodata.cbotitle.Text)
cmd.Parameters.AddWithValue("@sex",
frmbiodata.cbosex.Text)
cmd.Parameters.AddWithValue("@dob",
frmbiodata.DateTimePicker1.Text)
cmd.Parameters.AddWithValue("@pob",
frmbiodata.txtpob.Text)
cmd.Parameters.AddWithValue("@mstatus",
frmbiodata.cbomstatus.Text)
cmd.Parameters.AddWithValue("@soo",
frmbiodata.cbosoo.Text)
cmd.Parameters.AddWithValue("@lga",
frmbiodata.txtlga.Text)

63
cmd.Parameters.AddWithValue("@nat",
frmbiodata.txtnation.Text)
cmd.Parameters.AddWithValue("@rel",
frmbiodata.cboreligion.Text)
cmd.Parameters.AddWithValue("@yoe",
frmedudata.cboyoe.Text)
cmd.Parameters.AddWithValue("@moe",
frmedudata.cbomoe.Text)
cmd.Parameters.AddWithValue("@eyog",
frmedudata.cboeyog.Text)
cmd.Parameters.AddWithValue("@ygrad",
frmedudata.cboyog.Text)
cmd.Parameters.AddWithValue("@burs",
frmburs.rbnyes.Text) '&frmburs.rbnno.Text)

cmd.Parameters.AddWithValue("@awarded",
frmburs.txtadward.Text)
cmd.Parameters.AddWithValue("@prog",
frmedudata.cboprogramme.Text)
cmd.Parameters.AddWithValue("@fac",
frmedudata.cbofac.Text)
cmd.Parameters.AddWithValue("@dept",
frmedudata.cbodept.Text)
cmd.Parameters.AddWithValue("@course",
frmedudata.cboco.Text)
cmd.Parameters.AddWithValue("@lev",
frmedudata.cbolev.Text)
cmd.Parameters.AddWithValue("@matno",
frmedudata.txtmat.Text)
cmd.Parameters.AddWithValue("@doc",
frmedudata.cbodoc.Text)
cmd.Parameters.AddWithValue("@div",
frmedudata.cbodegree.Text)
cmd.Parameters.AddWithValue("@sname",
frmspon.txtspn.Text)
cmd.Parameters.AddWithValue("@sadd",
frmspon.txtspa.Text)
cmd.Parameters.AddWithValue("@srel",
frmspon.cbosr.Text)
cmd.Parameters.AddWithValue("@kname",
frmkin.txtkn.Text)
cmd.Parameters.AddWithValue("@kaddress",
frmkin.txtka.Text)
cmd.Parameters.AddWithValue("@krel", frmkin.cbonr.Text)

64
cmd.Parameters.AddWithValue("@gog",
frmngrad.txtgog.Text)
cmd.Parameters.AddWithValue("@cog",
frmngrad.cbocog.Text)
cmd.Parameters.AddWithValue("@extension",
(frmngrad.cboext.Text)) '& "to" & (frmngrad.cboext2.Text))
cmd.Parameters.AddWithValue("@badrec",
frmngrad.RadioButton5.Text) '& frmngrad.RadioButton6.Text)
cmd.Parameters.AddWithValue("@koo",
frmngrad.txtoffence.Text)
'cmd.Parameters.AddWithValue("@passport",
PictureBox1.Image)
cmd.Parameters.AddWithValue("@dateAwrded",
frmburs.txtda.Text)
cmd.ExecuteNonQuery()
cmd.Parameters.Clear()
MsgBox("Student Added")
frmedudata.Close()
frmbiodata.Close()
frmkin.Close()
frmspon.Close()
frmngrad.Close()
End If

ElseIf btnsave.Text = "UPDATE" Then

End If
Me.Close()
End Sub

Private Sub btnpp_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles btnpp.Click
OpenFileDialog1.ShowDialog()
PictureBox1.Image = Image.FromFile(OpenFileDialog1.FileName)
End Sub

Private Sub PictureBox1_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox1.Click
PictureBox1.Image = Image.FromFile(OpenFileDialog1.FileName)
End Sub
End Class
Imports System.Data.SqlClient
Public Class frmgrad

65
Private Sub btnclear_Click(ByVal sender As System.Object, ByVal e
As System.EventArgs) Handles btnclear.Click
txtmn.Text = Nothing
txtname.Text = ""
End Sub

Private Sub btnverify_Click(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles btnverify.Click
Dim jp As New jpsoft
jp.dbconnect()
Dim cmd As New SqlCommand
cmd.Connection = jp.cn
cmd.CommandText = "select * from tblstud where matno=@mn and
surname=@name or other=@oda"
cmd.Parameters.AddWithValue("@mn", txtmn.Text)
cmd.Parameters.AddWithValue("@name", txtname.Text)
cmd.Parameters.AddWithValue("@oda", txtname.Text)
Dim ds As SqlDataReader
ds = cmd.ExecuteReader
If ds.HasRows = True Then
ds.Read()
Dim lvi As ListViewItem
lvi = frmresult.ListView1.Items.Add(ds.Item("surname"))
lvi.SubItems.Add(ds.Item("other"))
lvi.SubItems.Add(ds.Item("title"))
lvi.SubItems.Add(ds.Item("sex"))
lvi.SubItems.Add(ds.Item("dob"))
lvi.SubItems.Add(ds.Item("pob"))
lvi.SubItems.Add(ds.Item("mstatus"))
lvi.SubItems.Add(ds.Item("soo"))
lvi.SubItems.Add(ds.Item("lga"))
lvi.SubItems.Add(ds.Item("nat"))
lvi.SubItems.Add(ds.Item("rel"))
lvi.SubItems.Add(ds.Item("yoe"))
lvi.SubItems.Add(ds.Item("moe"))
lvi.SubItems.Add(ds.Item("eyog"))
lvi.SubItems.Add(ds.Item("ygrad"))
lvi.SubItems.Add(ds.Item("prog"))
lvi.SubItems.Add(ds.Item("fac"))
lvi.SubItems.Add(ds.Item("dept"))
lvi.SubItems.Add(ds.Item("course"))
lvi.SubItems.Add(ds.Item("doc"))
lvi.SubItems.Add(ds.Item("matno"))

66
lvi.SubItems.Add(ds.Item("lev"))
lvi.SubItems.Add(ds.Item("div"))
lvi.SubItems.Add(ds.Item("gog"))
lvi.SubItems.Add(ds.Item("cog"))
lvi.SubItems.Add(ds.Item("extension"))
lvi.SubItems.Add(ds.Item("badrec"))
lvi.SubItems.Add(ds.Item("koo"))

Dim lv As ListViewItem
lv = frmresult.ListView2.Items.Add(ds.Item("burs"))
lv.SubItems.Add(ds.Item("awarded"))
lv.SubItems.Add(ds.Item("dateAwrded"))
lv.SubItems.Add(ds.Item("sname"))
lv.SubItems.Add(ds.Item("sadd"))
lv.SubItems.Add(ds.Item("srel"))
lv.SubItems.Add(ds.Item("kname"))
lv.SubItems.Add(ds.Item("kaddress"))
lv.SubItems.Add(ds.Item("krel"))
frmresult.Show()
ds.Close()
Me.Close()
Else
MsgBox("Student is not registered")
End If
End Sub
End Class

67

You might also like