Last Modified
Last Modified
Submitted to Department of Computer Science and IT, Faculty of Engineering, AMIT, Arba Minch
University, in Partial fulfillment for the requirement of the Degree of Bachelor Science in (Computer
Science and IT).
Arbaminch, Ethiopia
Table of Contents
List of Tables......................................................................................................................................iii
Executive Summary............................................................................................................................iv
Abbreviation........................................................................................................................................v
1 Introduction.......................................................................................................................................1
1.1 Background information of the Arba Minch University...............................................................1
1.1.1Vision.......................................................................................................................................1
1.1.2 Mission....................................................................................................................................1
1.2 Background of the project..............................................................................................................2
1.3 Team Composition.........................................................................................................................3
Tasks and Schedule..............................................................................................................................4
1.4 Statement of the Problem...............................................................................................................5
1.5 Objectives......................................................................................................................................6
1.5.1 General Objectives..................................................................................................................6
1.5.2 Specific Objectives.................................................................................................................6
1.6 Feasibility Analysis........................................................................................................................7
1.6.1 Operational Feasibility.........................................................................................................7
1.6.4 Behavioural/Political Feasibility.............................................................................................7
1.7 Scope and Significance of the Project.........................................................................................10
1.7.1 Scope of the Project..............................................................................................................10
1.7.2 Significance of the Project....................................................................................................10
1.8 Target Beneficiaries of the System..............................................................................................11
1.9 Methodology for the project........................................................................................................12
1.9.1 Data Source...........................................................................................................................12
1.9.2 Fact Finding Technique 12
List of Tables
Executive Summary
Forgery has long crept into our educational system and counterfeit certificate(s) and
document(s) have upper hand in various certificate and degrees awarding institution. Invalid
studentship has become greater than valid studentship. The need for student verification
system has become necessary to check mate and expunge invalid studentship, invalid
document and invalid certificate yielding for the authenticity of certificate and documents.
This project titled “St. Graduates Credentials Verification System for Arba Minch
University”. The proposed model is concerned with verifying certificates (graduate,
postgraduate) issued from AMU and processing several academic requests from the
graduated students in the future. Graduates Credentials Verification System for Arba Minch
University provides a comfortable communication among AMU and outside organization(s)
as nation’s source for accurate degree data. Moreover, it will be a web based system where
the users will be provided with comfortable interfaces to interact with AMU for their
immediate requirements in a trustworthy manner from anywhere. The system will have a
great significance on the AMU as well as Ministry of Education in the future. This is an
attempt from Ethiopians for the Ethiopians to obliterate the counterfeit from the educational
systems.
Abbreviation
GB------------------------------------------------------------------------Giga Bytes
IE--------------------------------------------------------------------------Internet Explorer
MS------------------------------------------------------------------------Microsoft
PHP----------------------------------------------------------------------Hypertext Pre-processor
CD-----------------------------------------------------------------------Compact Disc
ID------------------------------------------------------------------------Identity
1 Introduction
A verification system as in this project is an application program used to verify that
someone or something rightly and legally belongs to a collection or an organization.
Credentials verification system is used to know whether or not the certificate provided is
legal and rightly issued for the student. In this context, it is also used to verify that a student
belongs to an institution and to confirm that he or she is properly registered in a particular
department running any of the institutions program and checking whether the student
Credentials is correct even if their name is registered and certificate is given for them. This
Credentials verification system, is an electronic and computerized means of verifying
someone’s claim of studentship or validating degree certificate by an institution using an
output clearly showing the truth or false of his or her claim.
1.1.1Vision
1.1.2 Mission
Arba Minch University has a mission of offering relevant and quality education and
training; conducting demand driven research and rendering accessible community services.
Activities List
March 30-
Dec 10-21
March 25
June 05-
April 20
Dec 23-
Feb 9-
June 6
Jan 6-
Feb 7
Jan 4
Project Proposal
Requirement Analysis
System Design
Implementation/coding
Testing
Project Defence
1.5 Objectives
The general objective of this project is to design, develop and to test ‘SGCVSAMU” that
provides instant online verifications of university degrees and post graduates certificates,
immediate, secure and affordable online credentials verifications, various timely and well
informed service for different verification requests from organizations and management of
the graduate student’s information are centralized.
To achieve the above mentioned general objective, the project addressed the following
specific objectives. The system provides the following:
Prepare user friendly website where specific action for registrar, administrator and
external users such as organizations are defined.
Store and manage graduated student’s information.
Give proper administration features like:
User management and authentication.
Having downloaded or send features in order to download or e-mail the verified
information of the candidate or degree and post graduated professional certificate(s)
in the form of mark sheet.
Online application for various service required by the organization.
Design and implement a database for proper implementation of the system.
Search graduated students file.
Project Costs
Resources like time and equipment are needed for any system development. Some of
resources needed for project team are listed below with their estimated cost.
No. Item Description Quantit Unit Unit Price Total price
y
1 Removable flash disk 2 Birr 150.00 300.00
2 Blank CD 5 Birr 6.00 30.00
3 Binding 2 Birr 20.00 40.00
4 Paper 1 pack Birr 100.00 100.00
5 Pencil 4 Birr 1.00 4.00
6 Pen 10 Birr 4.00 40.00
8 Printing 3 Birr 50.00 150.00
Total 664.00
Contingency 31.70
Grand Total 695.70
Recurring cost
A cost associated with ongoing evolution and use of a system. A cost which used to ongoing the
project or to do the project at the time includes Flash, paper, pen and copy.
Recurring Pen 5 4 20
cost
Copy unknown ______ _______
Tangible Benefits
These benefits can be measured in money and visible to the users. Some of tangible benefits
are such like, cost reduction, error reduction, increase the speed of gathering activity,
increased accuracy and availability, improvement in information management, and increasing
user’s interest in their work.
Intangible Benefits
These benefits derived after the development of a system that cannot be easily measured in
terms of money.
..
The scope of this project focus on online St. Graduated credentials verification system for
AMU and authentication of documents only for bachelor’s degree and post graduate degree.
Thus graduates were must be graduated from AMU and also the system is available only for
AMU.
For AMU Graduates Minimize time and cost and get several good careers opportunities
in their life
For Government Reduce corruption and illegal parties
Data collection is one of the important tasks in determining and analysing the existing
system. The data that we need to develop the new system are obtained from system users,
forms and documents in the Arba Minch main registrar.
1.9.2 Fact Finding Techniques
to gather data from the different users and manager of the existing system our team used
following techniques.
Interview
Different users of the existing system along with manager were involved to have an
understanding about how the system works, what are its different features, factors, and any
disadvantage as well as advantages so we obtain detail information from them etc.
Direct Observation
We observed various online verification systems and academic request service providers on
the internet. We will have also observed the existing academic credentials request system to
knowhow the process is going and to understand the management features it provides.
Document Analysis
To get information about background of the system project team review necessary
documents, books that support this project. To make this project more feasible and structured
the team are analysing other thesis management websites from universities other in our
country and others, and internet for explanation about some word definitions and for search
books.
Among the different methodologies available we are using object oriented methodology for
the analysis and design of our system. Object oriented methodology enables us to represent
complex relations among different objects and represent data and process with consistent
notation throughout the system. Important features such as Inheritance, Polymorphism, Data
Hiding, Encapsulation etc.... suits the design very well. This greatly improves the
communication among customers, analyzers, designers and programmers. It increases
consistency among analyser, designer, implementation and testing. It also allows the
reusability of the code which will help to enhance the project in the future. To develop this
system water fall model system development methodology is usable, because of the
following advantages.
It is simple, easy to understand and use.
It is easy to manage due to the rigidity of the model – each phase has
specific deliverables and a review process.
Each phase are processed and completed one at a time. Phases do not
overlap.
We are using various hardware and software tools in order to develop our system. Some of
these are:
Activities Programs Why
Code Writing Macromedia Dreamweaver, Easy to use
Notepad++
Database Server MySQL Database server for PHP
Web Server Apache (IIS) Web server for PHP
Server side Scripting PHP Understand by server
Client Side Coding HTML It works with PHP
Client Side Scripting JavaScript Easy way to validate form
Coding Language PHP Easy to writing code
Platform MS Windows Comfortable to work on it
Browsers IE, Mozilla Firefox, Google Better for displaying web
Chrome pages
Documentation MS Word Easy to use
User Training MS PowerPoint Best for presentation
Modelling and Scheduling Edraw, Star Uml Easy to design diagrams
1.9.5Testing procedures
The Credentials Verification and service Management system will be tested using the
following system testing procedures.
Unit or class testing
The team tests at each development step. So, when a problem is encountered we
immediately fix it. It includes: -
Black-box testing
Our project can be viewed solely in terms of its input, output and transfer characteristics
without any knowledge of its internal workings. We used this testing technique for the
following reasons:-
More effective on larger units of code.
Tester and programmer are independent of each other
Tests are done from a user's point of view.
Will help to expose any ambiguities or inconsistencies in the specifications.
White-box Testing
We use this testing technique for the following reasons:
It is easy to find out which type of input or data can help in testing the application
effectively.
It helps in removing the extra lines of code and to optimize the code.
Early detection of errors during software development.
System testing
our team performs to ensure that by putting the software in different environments (e.g.,
Operating Systems) it still works. System testing is done with full system implementation and
environment.
Acceptance Testing
this testing is done by the customer to ensure that the delivered product meets the
requirements and works as the customer expected.
1.9.6 Implementation
This project implemented partially with the existing system. Because of some cases such
as power and internet connections may not available so the existing system can be used.
To secure and separate user the System will uses Signature algorithm (Digital Signature
algorithm). Signature algorithms (both for signing and for verifying) often begin with a hash
function. There is a verification algorithm that takes as input the message, the signature and
answers "true" (they match) or "false" (they don't). Message-digest algorithms (MD5) are mainly
used in implementing digital signature.
Risk
Assumptions
Constraints are the limiting factor of the project that pools back to the activity
of the project. So during the development of the project there may be different
constraints.
There may be holy days and vacations to miss the project activity days.
The developing tools may not exist or live out.
The internet may not available in the campus.
The adviser and co-adviser may be have limited time in order to advise the
team.
The group member may be health problem (sickness).
The developing tools may increase cost or cost variation.
There may miss-configure the server setups.
REFERENCES
1. [Online] http://www.amu.edu.et.
2. [Online] https://en.m.wikipedia.org/wiki/Functional_requirement.
4. Stellman, Andrew, Greene, Jennifer.Applied software Project Management. s.l. : O'Reilly Media,
2005. p. 113. ISBN 978-0-596-00948-9.
5. [Online] http://www.businessdictionary.com/definition/feasibility-study.html.
6. [Online] http://msdn.microsoft.com/en-us/library/dd409477.aspx.
7. [Online] http://www.smartdraw.com/sequence-diagram/.
8. [Online] http://refcardz.dzone.com/refcardz/getting-started-uml.
9. [Online] http://www.lucidchart.com/pages/uml-activity-diagram-symbols-meaning.
11. Hawryszkiewycz, Igor T.Introductions to Systems Analysis and Design. s.l. : Prentice Hall PTR,
1994.