Page Length: 73

Size: 704 KB

Format: PDF & Word

3,000.00

ABSTRACT

 

Forgery has long crept into our educational system and, counterfeit and forged certificate and document have upper hand in various certificate and degrees awarding institution. Invalid studentship has become greater than valid studentship. The need for student verification system has become necessary to check mate and expunge invalid studentship, invalid document and invalid certificate yielding to authenticity of certificate and documents. This research work DESIGNED AND IMPLEMENTED STUDENT VERIFCATION SYSTEM FOR DELTA STATE UNIVERSITY (DELSU

E-VERIFY). The proposed model is concerned with monitoring the studentship of students, keeping students basic academic record, tracking students if there is malpractice of any kind and, verifying every certificate of Delta State University in the future.

 

 

 

 

 

 

 

vi

 

TABLE OF CONTENTS

 

TITLEPAGES                                                                         i &ii

 

CERTIFICATION                                                                   iii

DEDICATION                                                                        iv

ACKNOWLEDGEMENT                                                       v

ABSTRACT                                                                           vi

TABLEOFCONTENTS                                                          vii-ix

LISTOFFIGURES                                                                   x

LISTOFTABLES                                                                    x

CHAPTER ONE– Introduction                                              1

vii

CHAPTER TWO –LiteratureReview                                                11

CHAPTER THREE – System Analysisand Design                          29

CHAPTER FOUR – Designand Implementation                              48

4.0     Introduction                                                                            48

viii

CHAPTER FIVE – Summaryand Conclusion                                  57

 

 

5.1     Summary   57
5.2     Recommendation   58
5.3     Conclusion   58
REFERENCE   60
APPENDIX (SOURCE CODES)  

 

 

 

ix

62

 

LIST OF FIGURES

 

1.1 The SSADM Approach. 8
1.2 The RAD Model. 9
2.1 Credit/Debit Card – front and back view 28
3.1 Input form to add Administrator 40
3.2 The main interface form 41
3.3a Verification Form 42
3.3b The Verification Result form 43
3.4 System’s database table for Admin 45
4.1 Use Case diagram for SVS 51

 

 

 

LIST OF TABLES

  • Address Verification Service –thetypes 13
  • Address Verification Service –detaildescription 17

3.1     CompanyTable                                                                       44

x

 

CHAPTER ONE

 

INTRODUCTION

 

A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software components of a computer.

According to Stella C. Chiemeke and Franca A. Egbokdara (2006), a system is set of components that interact to achieve a common goal. In another sense, a system is a group of interrelated or intersecting elements forming a unified whole.

A verification system as in this project is an application program used to verify that someone or something rightly and legally belongs to a collection, an organization or an individual. There are different verification system, notably address verification system, adult verification system and card verification system to mention but a few.

Student verification system is used to know whether or not a studentis

 

orwasalegalandrightlyregisteredstudent.Inthiscontext,itisusedto

1

 

verify that a student belongs/belonged to an institution and to confirm that he/she is properly registered in a particular department running any of the institutions programme.

This student verification system (SVS), also known as DELSU e- Verify is a window based system. It is an electronic and computerized means of verifying someone’s claim of studentship to an institution by means of their matriculation number (Mat No) being input, hence using an output clearly showing the truth or false of his/her claim.

1.1                                    BACKGROUND OF THESTUDY

 

In this modern age, computers have verified the cause of their existence. The advent of computers in our society caused a lot of criticism on the danger it poses on the society. Critics of computer and new techniques express their fear on how computers will displace and replace all human skills thus resulting to mass unemployment. The presence of computeronvirtuallyeveryfieldoftoday’sfastlifehasprovedthecritic

wrongastheinventionofcomputersandnewtechnologiescontinuesto

2

 

create additional jobs for those who identify themselves with computers and new technologies. This make computes partner to human beings in any  fields of humanendeavour.

Over the past decades, students identification and verification has been a major problem in large institutions as documents, certificate and studentship can be forged at a great rate and easy way, using the computer negatively. Forgers fail to know that in this fast moving world, the computer has equally served as an aid to decision making, verification and authentication.

This is because of computers efficiency in terms of speed, accuracy, reliability, cost and security among others.

In recent years, awareness has existed and created in people as it concerned the use of computer in verifying, authenticating and security activities either through web-based (internet) or window-based. Decision support system (DSS) and others system like management information

system (MIS) and information system (IS) are used in organization.

3

 

Decisions are largely based on experience and principle. The value of every degree is the reputation of the institution and the students produced, hence, the greatest obstacle to any academic institution which is dishonesty and forgery has to be balanced with verification and authentication systems and processes. “In recent times, effort are bring made to build intelligence into computer system, whereby the computer can be used to process large volume of structural and unstructured information for decision making”. Said Uzoka,1998.

1.2                                    OBJECTIVES OF THESTUDY

 

  1. The importance of authentic document and certificate can not be overemphasized as the reputations of institution are affected in every counterfeit or forged document orcertificate.
  2. To design and implement student verification system for Delta State University. The systemwill

 

 

 

 

 

4

 

  • Prove the authenticity of document and certificate belonging to Delta State University thereby expunging forged and counterfeit certificate and document fromcirculation.
  • Show the valid and legally registered student of Delta State University.
  • Prove its supremacy over the existing manual system of verification and identification by using dummydata.
  1. To highlight the importance of verifying and authenticating document andcertificates.

1.3                                    SCOPE OF THESTUDY

 

The scope and focus of this study is on students’ identification, verification and authentication of document and degrees (certificate) and monitoring of students via the keep of their basic academic information and bio data. Importantly, the student must be students of Delta State University or was a student of Delta State University.

 

5

 

1.4                                    LIMITATION OF THESTUDY

 

This study is limited to information gathered from the review of literature and the data collection method used. The proposed system is designed on

.NET frame work. Others limitations to the study include:

 

  1. The implementation and usefulness of the system by Delta State University and other education might not beaccepted.
  2. In availability of the system on the internet, thought others user apart from the administrator can use it with some abstraction upon the purchase of the software and installation therein.
  3. Restricted access to some vital and important data andinformation.

 

1.5                                    METHODOLOGY

 

Software methodology is the set of rules and practices used to create computer software. It is composed of any one of the software development models used together with at least a techniques thus,

METHODOLOGY = SOFTWARE MODEL + TECHNIQUES(S)

 

 

 

6

 

An in-depth literature review is done using document review and the internet.

The proposed design will be implemented using MS Visual Studio 2008 tools and Visual Basic as the programming language and MS SQL server 2005 for the database.

The methodology to be adopted for this project is the SSADM (Structured System Analysis and Design Methodology). The SSADM emphasizes on the completing a phase of the software development before proceeding to the next phase and also being able to go back to the other phases in a purely sequential manner. The model used for this project is the RAD (Rapid Application Development model proposed by IBM (International Business Machine) in 1980 and introduced to software community by James Martins through his book Rapid Application Development).

 

 

 

 

 

7

 

 

 

 

 

Deploy

Fig. 1.1 THE SSADM APPROACH

 

 

 

 

 

 

8

 

 

 

 

 

 

 

 

 

 

 

 

Analyze
Design
Code
Test

 

 

 

 

Fig. 1.2 THE RAD MODEL

9

 

SSADM and RAD takes a modular approach to this student’s verification system using a best practice guide to ensure the successful implementation of the parts of this project sequentially. The design and testing of the system’s relational database management system (RDBMS) is to confirm the design specification. Therefore the window based graphical user face (GUI) will be integrated to input data into the system’s database. This project starts small and break down the implementation process into modules that are attainable based on the adopted requirement and analysis methodology.

 

 

 

DOWNLOAD COMPLETE WORK

DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
Hello and welcome. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.