Professional Documents
Culture Documents
Acknowledgment
First of all we would like to give a great thanks to the Almighty God who helped us to success
well. We take this opportunity to express our sincere thanks to our Advisor Mr.
Buruk&Mr.Yohanse for the best guidance and support through his suggestions and ideas
throughout our project and correcting various documents error of our project with attention and
care. In addition to this we would like to forward our special words of gratitude to our co-
Advisor DrGopal for his valuable and useful suggestion.
Finally, we would like extend special thanks to our parents for their unwavering confidence,
encouragement and emotional support which was instrumental to the successful completion of
our bachelor degree coursework and for our classmates for their great help and keeping us some
suggestions based on the projects and others.
Abstract
Forgery has long crept into our educational system and counterfeit certificate(s) and document(s)
have upper hand in various certificate and degrees awarding institution. Invalid studentship has
become greater than valid studentship. The need for student verification system has become
necessary to check mate and expunge invalid studentship, invalid document and invalid
certificate yielding for the authenticity of certificate and documents. This project titled
“Graduates Credentials Verification System forAmboUniversity”. The proposed model is
concerned with verifying certificates (graduate, postgraduate) issued from AU and processing
several academic requests from the graduated students in the future. Graduates Credentials
Verification System for Ambo University provides a comfortable communication among AU
and outside organization(s) as nation’s source for accurate degree data. Moreover, it will be a
web based system where the users will be provided with comfortable interfaces to interact with
AU for their immediate requirements in a trustworthy manner from anywhere. The system will
have a great significance on the AU as well as Ministry of Education in the future. This is an
attempt from Ethiopians for the Ethiopians to obliterate the counterfeit from the educational
system.
List of Figure
Chapter One
Introduction of whole project process
1.1 Introduction
A verification system as in this project is an application program used to verify that
someone or something rightly and legally belongs to a collection or an organization. There are
different verification system, especially address verification system and card verification system
to mention but a few. Credentials verification system is used to know whether or not the
certificate provided is legal and rightly issued for the student. In this context, it is also used to
verify that a student belongs to an institution and to confirm that he or she is properly registered
in a particular department running any of the institutions program and checking whether the
student Credentials is correct even if their name is registeredand certificate is given for them.
This Credentials verification system, is an electronic and computerized means of verifying
someone’s claim of studentship or validating degree certificate by an institution using an output
clearly showing the truth or false of his or her claim.
Ambo University is one of the oldest and famous Universities in Ethiopian higher
Educational institution. It was established in 1939 as a junior high school offering diploma
programs to mid-level professionals who could help in technology transfer for farmers. The
university since its establishment had passed through several levels of development. In the
course of these developmental processes have been given course; The courses provided at
that time were Animal Science, Crop Production, Agricultural Engineering, Mathematics,
and English in the diploma level, this expresses the collage have passed more than sixtyyear,
and it changes in to the university in 2000 EC; this university have developed gradually and
now it has 9 faculties and above 35 departments ;from this the university have many students
to graduate in each academic year: even the resent time there is increment graduated
credentials, least more than 2300 students graduated in each academic year this condition
may have impact of the faulty credentials in the university.[1]
Ambo University is dedicated to serve the Ethiopian society and the world in discovery,
development and application of knowledge in wide range of disciplines. The university is
committed to maintain and ensure the provision of quality, cost effective, timely and need- based
education at undergraduate and graduate levels; engage in research and knowledge transfer;
conduct short term trainings and consultancy; and offer community services in a professional and
innovative manner so as to address the need of stakeholders.[1]
The technical team of this project comprises 10 computer science B.Sc. undergraduate students
with experience of doing different mini projects. The ultimate objective of the team members is
to develop a reliable and proficient verification and service system for graduated students.
1.7 Feasibility
1.7.1 Operational Feasibility
The system can be used effectively after it has been developed. Users will not have any difficulty
with the new system, producing the expected benefits. System will be developed based on the
policies of the university plus the new business rules.
The purpose of assessing economic feasibility is to identify the financial benefit and cost association
with the development project, economic feasibility is referred to us cost benefit analysis.
So, cost=27080 birr, since the benefits are larger than the cost that spend to do the
project, our team is conclude that this project is economically feasible.
01th May-
04th Dec
14th May
30 April
16 Dec
Dec-
16 Jan
Jan-
June
rd
th
th
05th
17th
30th
1 Project Proposal
2 Requirement
Analysis
3 Design
4 Implementation
5 Installation &
Testing
6 Project Closure
Key:
- use to show start date
1.11.2.1 Interview
Different users of the existing system along with manager were involved to have an
understanding about how the system works, what are its different features, factors, and any
disadvantage as well as advantages so we obtain detail information from them etc.
Black-box testing - Our project can be viewed solely in terms of its input, output and
transfer characteristics without any knowledge of its internal workings. We used this
testing technique for the following reasons
o More effective on larger units of code.
o Tester needs no knowledge of implementation, including specific
programming languages.
o Tester and programmer are independent of each other
o Tests are done from a user's point of view.
o Will help to expose any ambiguities or inconsistencies in the
specifications.
White-box Testing- We use this type of testing technique by observing the internal
structures of our program. We use this testing technique for the following reasons:
o It is easy to find out which type of input or data can help in testing the
application effectively.
o To optimize the code.
o It helps in removing the extra lines of code, which can bring in hidden
defects.
o Early detection of errors during software development.
1.17.1 Risk
Virus attacks the file used for development.
If a team member leave the project or faces an issues.
If miss installation or configuration with the development tools occur.
If connection or internet is fail in this campus.
If there may not some development tools.
The tool cost may increase during development.
1.17.2 Contingency
Data loss happens, so the team uses different back up techniques through our
daily activity in the project.
The project is not completed on schedule so the other group members cover
those parts.
The development tools not working so Re-configure the setup.
There is no means of searching and obtaining information from the internet so
our team Use optionally out of the campuses. Example main campuses and
private broadcast.
Impossible to continue without development tools so we may buy tools depend
on condition necessity.
It is difficult for our team but Buy tools atimmediate in the development time.
1.18.1 Assumptions
We will finish this project with the given schedule.
We use the development tools in the table 5 above.
The internet is available in the campuses at all days.
The adviser and co –advisers have great role in this project success.
We will meet at all project activity days.
We will think all the developing tools are available.
We will think the developing tools not increment cost.
We will suggest we configure full setup (server).
1.18.2 Constraints
Constraints are the limiting factor of the project that pools back to the activity of the
project. So during the development of the project there may be different constraints.
There may be holy days and vacations to miss the project activity days.
The developing tools may not exist or live out.
The internet may not available in the campus.
The adviser and co-adviser may be have limited time in order to advise the team.
The group member may be health problem (sickness).
The developing tools may increase cost or cost variation.
There may miss-configure the server setups.
Chapter Two
Description of the Existing System & The Proposed System
Process:
From Graduates
The Organization/Companies give a form application to the candidate who submit the
application form to the registrar and collect all information according to the given form
from the registrar. But this is only for scholarships.
From Organization/Companies
Output:
If the given credentials don’t meet any forgery at first sight they may be considered
for the further processing of his post.
If any first sight fault is noted they may contact the university directly or they may
ask the candidate for getting verification letters from the university.
Finally if any fault exists it is caught as a clear fraud, then criminal action will be
taken.
Process:
The candidate fills the academic request form given by the registrar office and submits to
the registrar.
The registrar office director accepts the filled form and gives back to the candidate for
further processing.
The candidate goes to the finance office and pays the required fee for the document.
After the payment the candidate has to go to the dead file office and submits their request
form along with payment receipt.
The official in charge has to record the application along with the receipt and search for
the concerned file/document and give to the registrar.
Registrar copies the original document, authenticates it as equivalent to the original and
send by postal/give to the candidate as per the status of the document.
Returns the original for safe custody again to dead file office.
Output: Deliver the concerned service in the form of the graduates requested document(s).
2.7.1 Performance: The universities take weeks and months for manual verification of
certificates mark sheets and any sort of other service requests. The manual system
is at snail’s speed.
2.7.2 Information:
Inputs:-
2.7.4 Efficiency:
- Waste of time
o Data is redundantly input or copied.
o Data is redundantly processed.
o Information is redundantly generated.
o Unavailability of staff’s on time.
2.7.5 Service:
The existing system is not easy to use.
The existing system is uncomfortable to use.
The system is not easy to coordinate.
2.8Practices to Be Preserved
The offices and the officials involved in the verification process will be preserved except
the dead file office. Instead the new system needs an administrator who takes also the
responsibility of dead file office manager, but in an easy way.
The main business rules will be preserved as it is. But business rulesre-engineeringcan be
suggested to improve the economic benefit of AU.
Provides facilities to download the academic credentials as per the requests from the
graduates.
The companies/organizationscan enter requests but cannot approve or delete requests.
Members of the Registrar group can approve a request but cannot delete requests.
Members of the Administrators group cannot approve requests but can delete requests.
The admin can insert/update/search graduates information.
Members of the finance officers can download fee receipt and enter approval or
disapproval remark but cannot delete any request.
Data redundancy is avoided, through the proper design of the database.
The system must provide help for the user.
2.10.2.1 Accessibility:
The system available to the users 24 hours if internet connection and electric
power is exist.
2.10.2.2Performance: The system shall perform its operations within a minimum
amount of time. The system shall be interactive and the user gets the
expected result within few seconds. The system will be accessed by many
users inside/outside the university. For better response and throughput it
should be given more emphasis for the faster access to the system across the
network. Constraints can be user’s computer low RAM, Network or
connectivity failure, and others.
Chapter Three
System Analysis & Modeling
Use case diagram consists of use cases, actors, and their relationship and system
boundary.
Request
Association Certificate <<Include>> Registration
Association
Verification ( of Employer)
External
User
Registrar
View Certificate
Association
Verification link
Approve Service
Request
<<Include>>
Association
Association Extend
Association Manage <<Include>>
Association Graduate
Information Login
Admin
<<Include>>
Create and <<Include>> Association
Accept Payment
Manage
Account
Finance
UC_04 Accept Payment It describes the process of verifying and accepting the
application fee for the service request of the
organizations or companies by the finance officer.
UC_05 Approve Service It describes the process of verifying & approving the
Request service requests of the organizations or companies by
the director of registrar.
Description It describes the process of authenticating the user name & password
before granting access to his or her GCVS account.
Trigger Administrator, Registrar and Finance and need to login his or her
account to use this system.
Pre-Condition Administrator, Registrar and Finance login.
Alternative Action Step 4: If entered information is not valid the system displays error
message and go to step 2.
Alternative Step 9: If ID entered violates the data entry rules, searching fails and
Action informs the user.
Post condition Database is updated by finance officer’s remark. Service request waits for
Registrar’s approval.
Alternative Step 5: If confirmation fails, user updates the database with rejected remark,
Action followed by reason.
Description It describes the process of verifying & approving the Verification service
requests of the Organization/Companiesby the director of registrar.
Trigger User wants to check and approve Verification service requests of
Organization/Companies.
Precondition User has to login.
Alternative Step 5: If confirmation fails, user updates the database with rejected remark,
Action followed by reason. Mail is send to the requested External user/organization.
Actor Administrator
Description It describes the process of creating a new mail account for the users by
the administrator.
Trigger Administrator needs to create an account for the user to use the system.
Post condition New user account is created which the user can use for different
activities.
Step 4: If the username and password is not validated and verified,
system displays error message and go to step 2.
Alternative Action Step 8: If the user information is not validated and verified, system
display error message and go to step 7.
1:Intiate 2:Click
check
payment 3:Access
4:Approval
Page Display
5:Fill the 6:validation
Information
for Approval 7:Error
Message 8:Approved
Displayed
9:Confirmati
on Message
Displayed
1:Initiates
2:Click List
for Approval
3:Access
4:Approval
Page
Displayed
5:Check the
Required
Information 6:Enter 7:Validation
Information
to Generate
8:Error report
message 9:Request 10:Verify and
Displayed for Report Generate
11:Report Generation Report
Generated
Figure 5 Sequence Diagram for Approving Services (for credentials from graduates).
Figure 7 Sequence Diagram for Searching Graduates Information from the Database.
1 :Initiate for
Crea te Account
2: Click Create
3: Access
Account
4: Display
Create Account
Form
5: Fill Account 6 :Va l id a te
Form
7: Error
Message
8:Send
9: User Account
Created
Successfully
<<UI>>
User Login Page
Cancel Operation
Enter User ID & Password
<<Controller>>
No Click Login
Yes
Display th Required Page
<<UI>>
Service Description Page
<<Controller>>
Select Required Service
[Cancel Operation]
Fill the Application Form
<<Controller>>
Click Submit
Valid
Display Error Message Store Basic Information send for Approval Display Confirmation Message
Invalid
<<Control>>
Display Finance Link
NO
<<Controller>>
Display Register Interface
<<Control>>
Click List for Approval
<<Controller>>
Certification Verfiction
Invalid
Valid
<<UI>>
Display Admin Page
<<Cntoller>>
Click Search
NO
YES
<<UI>>
Admin Page
Displayed
<<Controller>>
Click Create
Account
Display Create
Cancel
Account Form
Account
Created
Description of a set of objects that share the same attributes, operations, relationships, and
Semantics.
* * *
* *
Home page
List of Manage
Manage Graduate
Approval
Graduate Information
Information Payment
Request
Certificate
Verification Update
List of Graduate
Approved Information
Add Payment
Graduates
information
View
Acknowledge
ment message Approve Service
Request
View
Graduate
View Request
Verificati
on Link Temporary
Report
Create Account Report
Original Degree
Report
Abbreviations
Acronyms Descriptions
AU Ambo University.
UI user Interface.
ID Identification
IE Internet Explorer
IT Information Technology
MS Micro Soft
UC Use Case
Reference
[1]:www.ambou.edu.et
[2]: Simon Bonnet. And Steve McRobb ,Object Oriented System Analysis and Design
Using UML in may(2003), 4th edition Ray Former, published by McGraw-Hill Higher
Education
[3]: Larman, Craig. 1998 Applying UML and Patterns an Introduction to Object Oriented
Analysis and Design Prentice Hall [5]: Schuler, Joseph. 1999 Teach Your UML in 24 Hours
Sams