Professional Documents
Culture Documents
Design and Implementation of Student Ver
Design and Implementation of Student Ver
(DELSU E-VERIFY)
BY
NOVEMBER, 2011
i
DESIGN AND IMPLEMENTATION OF STUDENT VERIFICATION
(DELSU E-VERIFY)
BY
FOS/07/08/130685
COMPUTER SCIENCE
NOVEMBER, 2011
ii
CERTIFICATION
(DELSU E-VERIFY)
BY
This is to certify that this research work was carried out by JOHNPAUL
____________________ ___________________
______________ ______________
DATE DATE
iii
DEDICATION
This research work is dedicated first to Jehovah God for his mercies
that endures forever and his grace and love that made me who I am today.
and all my supporters, God used to provide the product (me) today.
iv
ACKNOWLEDGEMENT
scale through despites the unpleasant events of nature. For the intuition, life,
Peace and every good thing God has been giving me, I say baba thank you.
more than a friend to me. I wish to thank Tony E., Fegor O., Rachael I.,
I say thank you to Mrs. F.A. Oshasha, Mrs. Patricia and the Hampos’
notably Emma Hampo. Also to all my critics and supporters, I love you all.
especially computer science unit notably Mr. Ogini N.O. and Mr. Ojeme
B.O.
v
ABSTRACT
Forgery has long crept into our educational system and, counterfeit and
forged certificate and document have upper hand in various certificate and
valid studentship. The need for student verification system has become
vi
TABLE OF CONTENTS
CERTIFICATION iii
DEDICATION iv
ACKNOWLEDGEMENT v
ABSTRACT vi
LIST OF FIGURES x
LIST OF TABLES x
1.5 Methodology 6
vii
CHAPTER TWO – Literature Review 11
2.1 Introduction 11
3.1 Introduction 29
4.0 Introduction 48
viii
4.1 System design 48
5.1 Summary 57
5.2 Recommendation 58
5.3 Conclusion 58
REFERENCE 60
ix
LIST OF FIGURES
LIST OF TABLES
x
CHAPTER ONE
INTRODUCTION
computer.
institutions programme.
their matriculation number (Mat No) being input, hence using an output
techniques express their fear on how computers will displace and replace all
computer on virtually every field of today’s fast life has proved the critic
studentship can be forged at a great rate and easy way, using the computer
negatively. Forgers fail to know that in this fast moving world, the computer
authentication.
every degree is the reputation of the institution and the students produced,
and processes. “In recent times, effort are bring made to build intelligence
into computer system, whereby the computer can be used to process large
4
• Prove the authenticity of document and certificate belonging to Delta
University.
and certificates.
monitoring of students via the keep of their basic academic information and
bio data. Importantly, the student must be students of Delta State University
5
1.4 LIMITATION OF THE STUDY
and the data collection method used. The proposed system is designed on
from the administrator can use it with some abstraction upon the purchase of
1.5 METHODOLOGY
6
An in-depth literature review is done using document review and the
internet.
2008 tools and Visual Basic as the programming language and MS SQL
proceeding to the next phase and also being able to go back to the other
phases in a purely sequential manner. The model used for this project is the
Development).
7
Requirement
Specification
Design
Implementation
Test
Deploy
8
Elicit requirement
Modularize requirement
Analyze
Code
Test
Integrate all the modules
user face (GUI) will be integrated to input data into the system’s database.
This project starts small and break down the implementation process into
modules that are attainable based on the adopted requirement and analysis
methodology.
10
CHAPTER TWO
LITERATURE REVIEW
2.1 INTRODUCTION
with confirmation systems. This chapter shows research work and their
claiming to own a credit card. The system will check the billing address of
the credit card provider by the user with the address on file at the credit card
company. This system also uses another security features for the credit card
AVS is used when the merchant verifies credit card data, such as
billing address and zip code, against the VISA/master card billing
11
information of the card holder. This system makes some that the billing
address of the credit or debit card matches the address that was given by the
customer. Because AVS only verifies the numeric portion of the address,
main street, highland, CA 92346, AVS will check only for 101 and 92346.
times it does not. Card holder may receive false negative or partial decline
for AVS from e-commerce verification system, which may require manual
with the card issue’s records. AVS is widely supported by VISA and master
card in the USA, Canada and United Kingdom. American express only
12
supports AVS in the USA. Cardholders with a bank that does not support
AVS may receive an error from internet stores due to lack of data.
W, X, Y, Z domestic alphabetic
P visa.
Q, T, V cards only.
13
verified.
international
international
international
14
postal code match express only
domestic
match, but billing postal code does not match express only
verified international
15
domestic
domestic
functioning properly
domestic
16
domestic
alphabetic codes.
as an age gate, (is a computing system) is used to confirm that the user
view the content of the websites, which typically include sex, nudity,
violence and so on that affects the life style of children, (usually under18
years) negatively.
AVS company can provide adult verification for multiple websites, thus
17
In 1999, landslide Inc, an AVS was at the centre of police crackdown
which web users using a landslide AVS were identified by their financial
record when the company which stored the data went into liquidation.
Problems with age gate include the ease at which a child may get
access to an adult’s credit card, for instance, that of their parents, defeating
the stated purpose of age gate. Also, the ease of using a fake script to
defraud user’s into divulging their credit card number to an individual to use
approved a three-year project that will greatly enhance the data collection
information being submitted to the state for school annual report cards. This
18
implementation the tracking system that will help district to provide more
accurate students information for state assessment used for the report card.
SIS has been in the planning stages for several years and it finally
continued “with the requirement that no child left behind (NCLB) places on
state and school, this will help all of us to improve the process of data
and district,
19
Reducing the burden of respond data collection by school and districts,
the old and manual annual data collection by ISBE from its 4,000 schools in
phases.
Phase 1 of the project (School year 2004-2005) will involve two pilot
local student information system, ISBE students’ assessment staff and ISBE
testing contractors.
20
Assigning a unique student’s identifier to each student in each pilot
district. This identifier will serve as a link between local student information
ensure that their systems are able to store the unique state student identifier
unique state student’s identifier for students entering the district during the
year.
The second pilot will involve working with selected district, ISBE
student’s assessment scores for NCLB reporting during the 2005 testing
cycle.
wide, building on the lessons and experience gained during the phase 1
pilots.
21
Phase 3 (school year 2006-2007) will focus on integrating existing
special education career and technical education students systems into the
a student ID card system will deliver the security you need to protect your
campus from both internal and external threats. The A plus ID student ID
Physical access control to facilities, secure area parking lots and parking
23
The Pakistani Higher Education Commission (HEC) has planned to
abroad for further education. This was stated by member operation and
planning HEC Dr. Mukhtar Ahmed. He further said, that the commission
Lateness and for identification of candidate before admitting them for the
carried out a pilot scheme aimed at test running the biometric verification
particular centre; he or she cannot be captured against that centre and can
examination numbers and examination towns and centre. The slip will be
used for identification, while the system for verification and validation.
25
The Unified Tertiary Matriculation Examination represents a merger
show the capacity of the system, the board also reserved that a total of one
million, four hundred and ninety-three thousand, six hundred and three
(1,493,603) candidate registered for the 2011 UTME, against one million,
The card security code (CSC), sometimes called card verification data
(CVD), card verification value card (CVVC), card verification code (CVC
The first code, called CVC1 or CVV1 is encoded on the magnetic stripe
of the card and used for transaction in person. This ensures that data stored
on the magnetic stripe are valid and generated by the issuing bank.
The second code and most citied is CVV2 or CVC2. This CSC (also
them to secure card not present transaction occurring over the internet, by
data from a tag to an object) and chip card may supply there own code
These codes should not be confused with standard bank account number,
card pin or password. These codes are not printed or embedded in the card
27
but are manually entered at the time of transaction. Users have to be careful
Fig 2.1 -
28
CHAPTER THREE
3.1 INTRODUCTION
In this chapter the analysis of the proposal system and its design is
discussed more. That is to say, what the proposal system- DELSU e-Verify,
is made of, its features and how it is designed- its outputs, inputs and
database. Likewise the tools and technology that are used are not left out.
software; that interact to achieve a common goal. ( Stella C.C and France
A.E., 2006).
system designers’ works at two levels - what to do and how to do. Analysis
29
Every system is created against at least a particular problem; that is
manual method where a request usually via letter or memo is sent to the
an automated system that simplifies the activities of the manual system with
2008 using visual basic (VB. Net) as it language and Microsoft SQL
30
System analysis squarely deals with the software development activities.
Three basic stages are involved in designing and delivering a good student
solved.
application letter for verification and the reply thereof when compared to the
window based student verification system. The speed of the manual system
is a snail’s speed.
paper work of the manual system is far greater than the paper work of the
automated system.
important and private information may be made open during the process of
32
3.4 PROPOSED SYSTEM DESIGN
Start
If new then do
Read data
If update then do
Read data
End if
33
Else if exist then do
Close application
End if
10 if search then do
If by programme then do
Read programme
End if
Read faculty
End if
Read level
End if
Read department
End if
34
Else if unique search then do
Read mat no
End if
End if
20 if verification then do
If graduate then
Else
If undergraduate then
End if
End if
If admin then do
If add then do
If edit then do
Admin start
Read data
If delete then do
Delete admin
Else
If add then do
Read data
Else
If edit the do
Update data
Else
Read data
Delete data
End if
End if
If add then do
Read data
Else
If modify the do
Read data
Update data
37
Else
If delete then do
Read data
Delete data
End if
End if
If file then do
If exit then do
Close application
End if
End if
End if
End if
38
End
processed to yield the required output. The input document used to record
The supplied data on the input forms servers as the input to the
system. These inputs are linked to the systems database and comparison is
The system has a menu called verification which consists of two sub
the clicking of any of the sub-menus. The required fields used as inputs in
this form include Name and Mat no. The important and primary field is
39
Fig. 3.1 input form to add Administrator
40
3.4.3 INTERFACE DESIGN
This is the physical structure of the visible side of the system, mainly
to the users. That is the front and of the system, which the users of the
system interacts with, it comprises of both inputs and out put forms.
41
3.4.4 OUTPUT DESIGN
After students details has been inputted into the student verification
form. This form that shows the output (result) is the output form.
42
Fig. 3.3b The Verification Result form
SQL server engine. This database consists of table of which some are.
43
tblstud, tblcourses, tbladmin, amongst others. Each of these tables has their
column name (Field) and data types respectively. Notable, tblacomp has
Username varchav
Pass varchav
Comp varchav
Squest varchav
Compid varchav
Dob varchav
Demp varchav
44
Fig 3.4 system’s database table for admin
internet connection.
45
Microsoft visual studio 2008 is an integrated Development
User Interface) application, web sites, web pages, web application and
services (native code and managed codes and included). Visual studio
includes a code editor, compiler, debugger and build-in tools like forms,
Language. Visual studio supports VB. Net with a complete featured code
46
SQL server 2005 is a relational database management system
equ-el”.
47
CHAPTER FOUR
4.0 INTRODUCTION
implemented can not be used to perform well as the case may be. “Even
after the development phase is over, the system project isn’t complete. The
new system must be implemented or installed” (said Stella C.C. and Franca
A.E, (2006)).
Development) Model which are object oriented. The UML which was
48
formulated by Booch, Rumbaugh and Jacobson in 1997 is used to describe
the system and the use Case diagram shows the system design (Detail
and constructing the artifacts of software system. A Use case diagram is one
and the computer system. As defined by Stella C. C. and Franca A.E. (2006)
in their book principle of system analysis and design, use case are included
different users. The use case diagram consist of actors use cases and arrows
department, status, session and so on. The organization menu is meant for
registration gives license to the organization to own and use the student
verification system.
50
Registration
Update
Student Search
Verification
Modify Admin
Delete Admin
Organisation
System Operations
Organisation Menu
System Boundary
Fig 4.1 Use Case Diagram - Shows the description of the student verification
system.
51
From the above use case diagram, after the log in process has been
student or an organization log-in, he/she can only see and perform two
function - search and verification, apart from closing the application. When
an administrator logs in, he/she can use all the system components.
depends on the hardware, software and people. Hence, the hardware being
mainly a personal computer (PC) with printers, scanners and any peripheral
system is MS SQL server 2005 which serves as the database but there is no
52
The people consist of the users of the system which encompasses of
Administrators, organization and students. All the users must be trained and
computer literates else the system’s aim and objective will be defeated.
• Pentium 4 Processor
• 512 kb RAM
• GB Hard disk
53
• Microsoft SQL server 2005
be tested to make sure. They work both individually and as a unit. Testing
from individual programs and system application. The testing of this system
54
• Comparison of the system’s actual performance versus the anticipated
performance objectives
• Correction of any error that may occur after its use for say one months;
• Unexpected problems
RW/ROM of the computer system you intend to have this software installed
on. Then Run the inserted disk and follow the setup procedure, there after,
the software will open if it has been successfully installed. This installed
software does no open on its own but open on the users demand by double
click on its icon or right click on the icon and click on open.
55
• Avoid the use of this software by a computer illiterate
• Ensure that you hardware and software meets the hardware requirements
problems.
56
CHAPTER FIVE
5.1 SUMMARY
institution. The system that has been in existence is the manual system
which has many defects as mentioned earlier in section 3.3 of this material.
The merits of this automated system over the existing one are as follows
• Accuracy
• Reliability
• It cannot be manipulated
• Simple process
57
5.2 RECOMMENDATION
Despite the fact that the system is a window based system (application
5.3 CONCLUSION
to manual systems.
document.
58
Since the value of every degree is the reputation of the institution and
59
REFERENCE
Byron, S.G. (2001). Theory and Problems of Programming with visual basic
Stella, C.C. and Franca, A.E (2006). Principles of System Analysis and Design.
Suhansa, R., George, Y. and Ronald, W. (2011). Students verification system for
WEBSTIES
www.atmae.org/jil/Article/rodchua-student-verification-system-07122011.Pdf
60
http://propakistani.pk/2009/01/25/hec-onlinedegree-verification-system-for-
www.zimbio.com/Nigeria+today/articles/qpgfit02wiR/Biometric+fingerprint+2011
October 2011).
2011)
2011).
61
APPENDIX (SOURCE CODES)
Imports ADODB
Imports dao
Imports Microsoft
Imports VBIDE
Imports System.Data.SqlClient
Imports System.Data.OleDb
End Sub
End Sub
End Class
Imports System.Data.SqlClient
Public Class frmpp
62
Private Sub btnsave_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles btnsave.Click
If btnsave.Text = "SAVE" Then
Dim hamplus As New jpsoft
hamplus.dbconnect()
Dim CMD2 As New SqlCommand
CMD2.Connection = hamplus.cn
CMD2.CommandText = "select * from tblstud where matno=@mn"
CMD2.Parameters.AddWithValue("@mn", frmedudata.txtmat.Text)
Dim DS As SqlDataReader
DS = CMD2.ExecuteReader
If DS.HasRows = True Then
MsgBox("Student Already Registered")
Else
DS.Close()
Dim cmd As New SqlCommand
cmd.Connection = hamplus.cn
cmd.CommandText = "insert into tblstud
(surname,other,title,sex,dob,pob,mstatus,soo,lga,nat,rel,yoe,moe,eyog,y
grad,burs,awarded,prog,fac,dept,course,lev,matno,doc,div,sname,sadd,sre
l,kname,kaddress,krel,gog,cog,extension,badrec,koo,dateAwrded) values
(@surname,@other,@title,@sex,@dob,@pob,@mstatus,@soo,@lga,@nat,@rel,@yo
e,@moe,@eyog,@ygrad,@burs,@awarded,@prog,@fac,@dept,@course,@lev,@matno
,@doc,@div,@sname,@sadd,@srel,@kname,@kaddress,@krel,@gog,@cog,@extensi
on,@badrec,@koo,@dateAwrded)"
cmd.Parameters.AddWithValue("@surname",
frmbiodata.txtsn.Text)
cmd.Parameters.AddWithValue("other",
frmbiodata.txton.Text)
cmd.Parameters.AddWithValue("@title",
frmbiodata.cbotitle.Text)
cmd.Parameters.AddWithValue("@sex",
frmbiodata.cbosex.Text)
cmd.Parameters.AddWithValue("@dob",
frmbiodata.DateTimePicker1.Text)
cmd.Parameters.AddWithValue("@pob",
frmbiodata.txtpob.Text)
cmd.Parameters.AddWithValue("@mstatus",
frmbiodata.cbomstatus.Text)
cmd.Parameters.AddWithValue("@soo",
frmbiodata.cbosoo.Text)
cmd.Parameters.AddWithValue("@lga",
frmbiodata.txtlga.Text)
63
cmd.Parameters.AddWithValue("@nat",
frmbiodata.txtnation.Text)
cmd.Parameters.AddWithValue("@rel",
frmbiodata.cboreligion.Text)
cmd.Parameters.AddWithValue("@yoe",
frmedudata.cboyoe.Text)
cmd.Parameters.AddWithValue("@moe",
frmedudata.cbomoe.Text)
cmd.Parameters.AddWithValue("@eyog",
frmedudata.cboeyog.Text)
cmd.Parameters.AddWithValue("@ygrad",
frmedudata.cboyog.Text)
cmd.Parameters.AddWithValue("@burs",
frmburs.rbnyes.Text) '&frmburs.rbnno.Text)
cmd.Parameters.AddWithValue("@awarded",
frmburs.txtadward.Text)
cmd.Parameters.AddWithValue("@prog",
frmedudata.cboprogramme.Text)
cmd.Parameters.AddWithValue("@fac",
frmedudata.cbofac.Text)
cmd.Parameters.AddWithValue("@dept",
frmedudata.cbodept.Text)
cmd.Parameters.AddWithValue("@course",
frmedudata.cboco.Text)
cmd.Parameters.AddWithValue("@lev",
frmedudata.cbolev.Text)
cmd.Parameters.AddWithValue("@matno",
frmedudata.txtmat.Text)
cmd.Parameters.AddWithValue("@doc",
frmedudata.cbodoc.Text)
cmd.Parameters.AddWithValue("@div",
frmedudata.cbodegree.Text)
cmd.Parameters.AddWithValue("@sname",
frmspon.txtspn.Text)
cmd.Parameters.AddWithValue("@sadd",
frmspon.txtspa.Text)
cmd.Parameters.AddWithValue("@srel",
frmspon.cbosr.Text)
cmd.Parameters.AddWithValue("@kname",
frmkin.txtkn.Text)
cmd.Parameters.AddWithValue("@kaddress",
frmkin.txtka.Text)
cmd.Parameters.AddWithValue("@krel", frmkin.cbonr.Text)
64
cmd.Parameters.AddWithValue("@gog",
frmngrad.txtgog.Text)
cmd.Parameters.AddWithValue("@cog",
frmngrad.cbocog.Text)
cmd.Parameters.AddWithValue("@extension",
(frmngrad.cboext.Text)) '& "to" & (frmngrad.cboext2.Text))
cmd.Parameters.AddWithValue("@badrec",
frmngrad.RadioButton5.Text) '& frmngrad.RadioButton6.Text)
cmd.Parameters.AddWithValue("@koo",
frmngrad.txtoffence.Text)
'cmd.Parameters.AddWithValue("@passport",
PictureBox1.Image)
cmd.Parameters.AddWithValue("@dateAwrded",
frmburs.txtda.Text)
cmd.ExecuteNonQuery()
cmd.Parameters.Clear()
MsgBox("Student Added")
frmedudata.Close()
frmbiodata.Close()
frmkin.Close()
frmspon.Close()
frmngrad.Close()
End If
End If
Me.Close()
End Sub
65
Private Sub btnclear_Click(ByVal sender As System.Object, ByVal e
As System.EventArgs) Handles btnclear.Click
txtmn.Text = Nothing
txtname.Text = ""
End Sub
66
lvi.SubItems.Add(ds.Item("lev"))
lvi.SubItems.Add(ds.Item("div"))
lvi.SubItems.Add(ds.Item("gog"))
lvi.SubItems.Add(ds.Item("cog"))
lvi.SubItems.Add(ds.Item("extension"))
lvi.SubItems.Add(ds.Item("badrec"))
lvi.SubItems.Add(ds.Item("koo"))
Dim lv As ListViewItem
lv = frmresult.ListView2.Items.Add(ds.Item("burs"))
lv.SubItems.Add(ds.Item("awarded"))
lv.SubItems.Add(ds.Item("dateAwrded"))
lv.SubItems.Add(ds.Item("sname"))
lv.SubItems.Add(ds.Item("sadd"))
lv.SubItems.Add(ds.Item("srel"))
lv.SubItems.Add(ds.Item("kname"))
lv.SubItems.Add(ds.Item("kaddress"))
lv.SubItems.Add(ds.Item("krel"))
frmresult.Show()
ds.Close()
Me.Close()
Else
MsgBox("Student is not registered")
End If
End Sub
End Class
67