0% found this document useful (0 votes)
170 views62 pages

Final Project Chapter One-Five

This document describes a web-based graduate certificate verification system project created by three students - Wondimu Gatiso, Degife Geremu, and GebreMariam Zewge - for their university. The project was advised by Mr. Workineh E. and includes chapters on describing the existing manual system, requirements for the proposed web-based system, system analysis and design, architectural design, and conclusions. The goal of the project was to develop a web application to allow online verification of graduates' certificates for higher education institutions in Ethiopia.

Uploaded by

werkineh eshete
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views62 pages

Final Project Chapter One-Five

This document describes a web-based graduate certificate verification system project created by three students - Wondimu Gatiso, Degife Geremu, and GebreMariam Zewge - for their university. The project was advised by Mr. Workineh E. and includes chapters on describing the existing manual system, requirements for the proposed web-based system, system analysis and design, architectural design, and conclusions. The goal of the project was to develop a web application to allow online verification of graduates' certificates for higher education institutions in Ethiopia.

Uploaded by

werkineh eshete
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 62

HAWASSA UNIVERSITYINSTITUTE OF TECHNOLOGY(IOT)

FACALITY OF INFORMATICS

DEPARTMENT OF COMPUTER SCIENCE

TITLE:- WEB BASED GRADUATE’S CERTIFICATE VERIFICATION SYSTEM FOR


HEI

BY:

1. WONDIMU GATISO………..EVCS/163/09

2. DEGIFE GEREMU…………EVCSS/041/09

3. GEBREMARIAM ZEWGE….EVCS/009/09

Advisor: Mr Workineh E

May 15, 2021

Hawassa, Sidama, Ethiopia


WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

ADVISER APPROVAL
I approve that this industrial project report entitled
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

By:

Name Signature
1.WondimuGatiso…Evcs/163/09

2.DegifeGeremu…Evcs/041/09 ---------------------------

3.GebreMariamZewge..Evcs/009/09 --------------------------

is approved by me for submission. I certify further that, to the best of my knowledge, the report
represents work carried out by the students.

__________________ _________________________ ________________________

Date Signature Name of Adviser

Examining committee members’ Signature

1.

2.

3.

4.

It is approved that this project has been written in compliance with the formatting rules laid down by the
university.

Page 1 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table of Contents
CHAPTER ONE..........................................................................................................................................1
1.Introduction..............................................................................................................................................1
1.2.Background of the Project.................................................................................................................1
1.3.Statement of the Problem...................................................................................................................2
1.5.2. System Analysis and Design Methodology................................................................................4
1.5.3. System Implementation.............................................................................................................4
1.5.4. Testing and Development Methodology....................................................................................4
1.6. Scope of the Project..........................................................................................................................5
1.9.2 Software Tools............................................................................................................................6
1.10.Risks................................................................................................................................................7
CHAPTER TWO.........................................................................................................................................8
DESCRIPTIONS OF EXSTING SYSTEM................................................................................................8
2.1 Introduction.......................................................................................................................................8
Major Functions in the Existing System...................................................................................................9
2.2. Proposed System Description.........................................................................................................10
2.2.3. Business Rule..............................................................................................................................10
2.3. Strength of Existing System...........................................................................................................10
2.4. Weakness of the Existing System...................................................................................................11
 Performance:..............................................................................................................................11
 Security and Controls.................................................................................................................11
 Efficiency....................................................................................................................................11
CHAPTER THREE...................................................................................................................................12
SYSTEM FEATURES OF THE PROPOSED SYSYEM..........................................................................12
3.1. Introduction....................................................................................................................................12
3.2. Functional Requirements................................................................................................................12
3.3. Non-Functional Requirements........................................................................................................13
3.4. Analysis Models.............................................................................................................................14

Page 2 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

3.4.1 Use-Case Diagram....................................................................................................................14


Actor and Use Case Identification.........................................................................................................14
Use Case Description.............................................................................................................................17
3.4.2 Sequence Diagrams..................................................................................................................24
Sequence Diagram for Login.............................................................................................................25
Sequence Diagram for create an acount.............................................................................................26
Sequence Diagram for Verify Certificate..........................................................................................27
Sequence Diagram for Search Graduate information.........................................................................28
Sequence Diagram for Approval of Service......................................................................................29
Sequence diagram for request academic service................................................................................31
3.4.3 Activity Diagram......................................................................................................................32
3.4.4 Class Diagram...........................................................................................................................41
3.4.5 User Interface Design...............................................................................................................42
CHAPTER FOUR.....................................................................................................................................43
SYSTEM DESIGN....................................................................................................................................43
4.2 Purpose of System Design Document..............................................................................................43
4.4. Architectural Design.......................................................................................................................45
4.4.1. Logical view of the Architecture..............................................................................................45
4.4 Process view....................................................................................................................................46
4.6 Deployment View............................................................................................................................55
4.7 Database Design..............................................................................................................................56
CHAPTER FIVE.......................................................................................................................................57
5. CONCLUSION AND RECOMMENDATION.....................................................................................57
5.1 Conclusion.......................................................................................................................................57
5.2 Recommendation.............................................................................................................................57
REFERENCE............................................................................................................................................58

Page 3 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

CHAPTER ONE
1.Introduction
A verification system as in this project is an application program used to verify that someoneor
something rightly and legally belongs to a collection or an organization. There are
differentverification system, especially address verification system and card verification system
to mentionbut a few. Certificate verification system is used to know whether or not the certificate
provide dislegal and rightly issued for the student. In this context, it is also used to verify that a
studentbelongs to an institution and to confirm that he or she is properly registered in a
particulardepartment running any of the institutions program and checking whether the student
Certificate is correct even if their name is registered and certificate is given for them. This
Certificate verification system, is an electronic and computerized means of verifying someone’s
claim ofstudentship or validating degree certificate by an institution using an output clearly
showing thetruth or false of his or her claim.

1.2.Background of the Project


Over the past decades, student’s identification and verification has been a major problem inlarge
institutions as documents, certificate and studentship can be forged at a great rate and easyway,
using the computer negatively. Forgers fail to know that in this fast-moving world, thecomputer
has equally served as an aid to decision making, verification and authentication.In recent years,
awareness has existed and created in people as it concerned the use of computerin verifying,
authenticating and security activities either through web-based(internet) or windowbased. The
value of every degree is the reputation of theinstitution and the students produced,hence, the
greatest obstacle to any academicinstitution which is dishonesty and forgery has to bechecked
with verification andauthentication systems and processes.Certificate verification ismandatory
for most of the reputed companies or organizations in order to reduce the risks related to it.
Most of the universities as well as educational providers comes up with computerized
verification systems and also support electronic verifications. Also, enrolment verification is
designed to fulfill the verification requirements of companies that offer products or services

Page 4 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

requiring proof of a student's enrolment status. For accessing several academic documents
graduated students spends much time and cost and loose several good career opportunities in
their life.

1.3.Statement of the Problem


Currently, there is no specific computerized system to deal with degree verification for bachelors
as well as post graduate degree holders from Ethiopian Higher Educational Institution(HEI). In
this manual process of certificate verification, theinstitutions/organization or employer that want
to verify a certificate will have to write an official letter and have to trip to deliver the letter to
the concerned HEI which is very time and energy consuming process. The letter will be received
by the HEI concerned student academic affairs and he/she try to find the requested document on
the shelf and write official letter back to the requesting employee/organization about the
findings. Some of the problems related to the existing system are listed below:

Difficulty of searching the graduated students file.


Time consuming and cost.
Vulnerable to different factors such as fraud certificate and corruption.
Lack of security in existing system.
Tedious and less speed.
Illegal or faulty modification of credentials.
Increased illegal employee in the country.
Declined legal credentials values
Embarrassment and negative impact to the organization's reputation.

1.4.Objectives of the Project


1.4.1General Objective
The general objective of this project is to design, develop and to test Graduates credential
verification system that provides instant online verifications of university degrees and
postgraduates certificates, immediate, secure and affordable online credentials verifications,
various timely and well-informed service for different verification requests from organizations
and management of the graduate student’s information are centralized.

Page 5 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

1.4.2 Specific Objectives


To achieve the above-mentioned general objective, the project addressed the following specific
objectives. The system provides the following:

Prepare user friendly website where specific action for registrar, administratorandexternal
users such as organizations are defined.
Store and manage graduated student’s information.
User management and authentication.
Request Certificate Verification
View certificate verification response
Create and manage account
Registration of employee within necessary personal information
Process Online application for various service required by the organization.
Design and implement a database for proper implementation of the system.
Search graduated students file.

1.5. Methodology
1.5.1.Data Collection Methodology
Data collection is one of the important tasks in determining and analyzing the existing system.
The data that we need to develop the new system are obtained from system users, forms
anddocuments.
To gather data from the different users and manager of the existing system project team used the
following techniques.
Interview: Different users of the existing system along with manager were involved to have
an understanding about how the system works, what are its different features, factors, and any
disadvantage as well as advantages so we have proposed to obtain detail information from them.
Direct Observation: We observed various manual systems and academicrequest service
through different ways such as approval letter, fax, e-mail, etc. We will have also observed the
existing academiccertificates request system to know how the process is going and to understand
themanagement features it provides.
Document Analysis: To get information about background of the system project team

Page 6 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

review necessary documents, books that support this project. To make this project more feasible
and structured the team are analyzing other thesis management websites from universities other
in our country and others, and internet for explanation about someword definitions and for search
books.
1.5.2. System Analysis and Design Methodology
1.5.2.1. System Analysis
In process of collecting and interpreting facts, identifying the problems, and decomposition of a
system into its components. We were trying to review how to apply and what is required during
registrationby job application(CV)
1.5.2.2. System Design

Here in planning for a new system, design goals of the project are to
improve data management strategy, to make data available when needed, to narrow the gap
occurred during lack of data exchange.

1.5.3. System Implementation


In process of Implementation, ensuring that the information system isoperational the object
model will be translated into source code, whichincludes implementing the attributes and
methods of each object tofunction as a single system.

1.5.4. Testing and Development Methodology


1.5.4.1. Testing Methodology
The system is tested with sample input data sets. in order to identify any gaps, errors, or missing
requirements in contrary to the actual requirements.
First unit testing will be employed to assure individual modules functionality to determine if
there are any issues. And then integration testing will be done Upon completion of unit testing to
check the units are to be integrated which gives raise to integration testing. The purpose of
integration testing is to verify the functional, performance, and reliability between the modules
that are integrated.
1.5.4.2. Development Methodology

Since a system is composed of many different functions, we use the


Waterfall system development model because the work we do havesequential software
development process, where progress flowssteadily toward the conclusion through the phases of

Page 7 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

a project (that is, analysis, design, development, testing). This model involves a rigidstructure
that demands all system requirements be defined at the verystart of a project. Only then after that
can the design and developmentstages begin.

1.6. Scope of the Project


The scope of this project focus on online Graduated certificate verification system for HEI
andauthentication of documents only for under-graduate degree and post graduate degree.Thus,
graduateswere must be graduatedfrom eachInstitutions/colleges and also the system is available
for HEI only, but they should have their own websites.

1.7. Limitations of the Project


Even if the project has so many significances it will face the following limitations:
Non-graduating students or any person are not entered to the system.
If there is no power and internet connection the system is not available.

1.8. Significance of the project


The benefits of the project are listed below:
Cost and time reduction.
Minimize faulty certificate.
Avoid modification made by students on their certificate.
Increased the speed of access or faster certificate verifications.
Increased accuracy and availability.
Increased quality of education throughout the country.
Minimize corruption.
Greater convenience.
Allows Accessing database easily.
Improved fraud detection.
To make timely and well-informed hiring, promotion and compensation decisions in
anorganization.
Avoiding data loss because of improper data storage.

Page 8 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

1.9. Development Environment


The system development includes the overview of how the systemactivities will proceed and
what tools are needed. Here we use hardwareand software tools.We use the following Hardware
and software tools to develop our system. Some of these listed asfollows:

1.9.1Hardware Tools
Table1: Hardware Tools
Activities Tools
Training Papers
Writing Something Pen
Writing Soft copy of Documentation Computer (Desktop
Part or Laptop)
Printing Purpose Printer
Storing File CD
File Transferring Flash 8 GB

1.9.2 Software Tools


Table2: Software Tools

Activities Programs
Code Writing Dreamweaver, Notepad++
Database
WAMP Server
Server
Web Server Apache (IIS)
Server-side
PHP
Scripting
Client-Side
HTML
Coding
Client-Side
JavaScript
Scripting
Coding
PHP
Language
Cascading
Style CSS
Sheet
Browsers IE, Mozilla Firefox, Google Chrome,
Documentati MS Word 2010, MS power point for
on presentation
Modeling
and Edraw max, Visual paradigm…
Scheduling

Page 9 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

1.10.Risks
The following are the risks and constraints that will face to project team:
Virus attacks the file used for development.
If a team member leaves the project or faces an issue.
If miss installation or configuration with the development tools occur.
If connection or internet is failed in this campus.
If there may not some development tools.
The tool cost may increase during development.
There may be holy days and vacations to miss the project activity days.
The developing tools may not exist or live out.
The internet may not available in the campus.
The adviser may be having limited time in order to advise the team.
The group member may be health problem or sickness.
The developing tools may increase cost or cost variation.
There may miss-configure the server setups.
There may some conflict in our country.

Page 10 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

CHAPTER TWO
DESCRIPTIONS OF EXSTING SYSTEM
2.1 Introduction
Now a day’s educational credential or certificate needs a verification or validation system. A
university is an example of an organization that creates so many documents for their students. It
issues a certificate and academic transcript for each of its graduates. The certificate contains
information that certifies a person has graduated froma certain specialization and obtained results
as stipulated in the certificate. The certificate can then be used for job hunting or pursuing
academics or any other purpose. The graduation certificate issued by the universities/institutions
is one of the important documents for the graduate. It is a proof of graduate’s qualification and
can be used anywhere. Every yearmillions of students graduate from colleges and Universities,
and their numbers are growing[1]. Institutions issue certificates to those who have successfully
completed the requirements of graduation. A graduation certificate is still in the form of a
paper-based document because, as of yet, an electronic document cannot effectively replace a
physical certificate. But most of the organizations or companies depend on the manual system
provided by the educational institutions or Universities in order to verify their employee’s
certificate. In our institution HU also there is no computerized verification or validation system
that helps to verify the certificates of their graduates. Any organization that need to hire
university graduates they verify it manually by checking the university logo, stamps in the
certificates of universities and by sending postal for an approval letter from that university or
simply ignore verifications.
Certificate verification system is used to know whether or not the certificate provided
is legal and rightly issued for the student. In this context, it is also used to verify that a student
belongs to an institution and to confirm that he or she is properly registered in a particular
department running any of the institutions program and checking whether the student certificate
is correct even if their name is registered and certificate is given for them.

Page 11 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Academic certificate verification request service for the candidates performed manually that
means the user must come to the registrar and get the approval and verification for his/her
academic request in manual form which is a time taking process. In the existing system the
process also depends on the concerned officer’s time and availability. Therefore, we need online
system that replace the existing manual system and works efficiently and effectively.

Players in Existing System


In the existing system, there are various players those have different responsibilities of
performing a number of activities within the system.

The main players in the existing system include:

 Registrar: responsible for the activities related to student’s credentials (graduates’


certificate in our case) such as approval of certificate, student’s information management,
security and control of student’s academic records. it also give a response when external
users are requesting for withdrawal or approval of their certificates or other letter of
approval.
 Student: In the existing, when the student need any activities related to their academic
credentials they should come to the office of the registrar physically and get what they
need.
 Admin:-The admin can insert, update and search graduate’s information, Create and
Manage Account and manage graduate’s information.
 Company/Organization: The companies or organizations can enter requests
The companies or organizations must be register itself in order to use our online
verification system.

Major Functions in the Existing System


The Administrator take the request from a companies/Organizations, then sends a certificate
verification request to the registrar, then registrar check the students certificate, and give
response to it. Finally the administrator gives response to the company.

Page 12 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

2.2. Proposed System Description


Requirements specify a set of features that the system must have. Requirements elicitation
focuses on describing the purpose of the system. The client, the developers, and the users
identify a problem area and define a system that addresses the problem. Such a definition is
called a requirements specification and serves as a contract between the client and the
developers. Requirements elicitation and analysis focus only on the user’s view of the system.
For example, the system functionality, the interaction between the user and the system, the errors
that the system can detect and handle, and the environmental conditions in which the system
functions are part of the requirements.

2.2.3.Business Rule
The business rule works as follow:

 Students should be graduated in a given time interval assigned to each department by the
university
 The student should submit all their academic grade to the registrar office to be graduated.
 The student should score the necessary grade to be graduated according to the university
schedule.
 The student should pay the cost sharing that they have used through their stay in the
university.
 The student’s certificate should be verified as original during their graduation.

2.3. Strength of Existing System


 Accessibility: The system available to the users 24 hours if internet connection and
electric power is existing.
 Performance :The system perform its operations within a minimum amount of time.
The system is interactive and the user gets the expected result within few seconds.
The system give access to many users inside or outside the university.
 Security and Access permissions: Administration part of the system is accessible
only for the authorized Administration staff according to their Assigned right. An
Unauthorized user should not access the administration page by any means. Some of
the resources and activity shall be restricted and allowed only for authorized users.
Therefore, the system shall have user identification method and it should grant or
deny access to users as per the privilege of the prospective user.

Page 13 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

2.4. Weakness of the Existing System


The existing systems have some drawbacks and limitations. These weaknesses prevent the
students to have an accurate or effective approval and verification of their certificate.

 Performance: - In the existing system performance is poor since the students should come
to the registrar of the university physically, which is time consuming and costive.
 Security and Controls: - In Security and control, the existing Graduate certificate
Verification system is also poor. This led to a security problem, poor control which case
to data lose, which means it has no guarantee.
 Efficiency: Since the work is performed manually the efficiency of the working system
is not satisfactory for the customers and employees also.
 Time consuming:- as the number of the customer increase the waiting time of the
customer will be increased. The resource of the customer and company is being waste.

Page 14 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

CHAPTER THREE
SYSTEM FEATURES OF THE PROPOSED SYSYEM
3.1. Introduction
This chapter covers the functional aspect of analysis that is functional modeling. The set of
functional requirements that have to be analyzed is done in an object-oriented way. UML
(Unified Modeling Language) an object-oriented, graphic language, is unified for all the aspects
of the requirement analysis. The functional model consists of use case modeling to show the
system functionality from user point of view, use case description, activity diagram to describe
the details of internal system functioning and sequence diagram.

3.2. Functional Requirements


Functional requirements describe the interactions between the system and its environment
independent of its implementation. The environment includes the user and any other external
system with which the system interacts. It drives the application architecture of a system.

A requirement specifies a function that a system or component must be able to perform.


Functional requirements specify specific behavior or functions. The functional requirements of
the proposed system are listed as follows:

 Authenticate and authorize users according to user’s role.


 The system should check all the supplied user input.
 Enables administrator to manage the users.
 The companies or organizations must be register itself in order to verify the student’s
certificate.

Page 15 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

 The system should give the facility to view detail information, add, edit, and delete
graduate’s information for the users such as administrator or director of registrar.
 The companies or organizations can enter requests but cannot approve or delete requests.
 Members of the Registrar group can approve a request but cannot delete requests.
 Members of the Administrators group cannot approve requests but can delete requests.
 The registrar can insert, update and search graduate’s information.
 Members of the finance officers can download fee receipt and enter approval or
disapproval remark but cannot delete any request.
 Data redundancy is avoided, through the proper design of the database.
 The system must provide help for the user.

3.3. Non-Functional Requirements


Non-functional requirements describe user-visible aspects of the system that are not directly
related with the functional behavior of the system that are listed above. A non-functional
requirement is a statement of how a system must behave; it is a constraint upon the systems
behavior. They specify criteria that judge the operation of a system, rather than specific behavior.
Non-functional requirements of the proposed systems are listed as follows:

 Extensibility: Adding features and carry-forward of customizations at next major


version upgrade along with the business re-engineering is possible.
 Backup and recovery: There shall be a frequent and full back up mechanism to
avoid any information loss and inconsistency.
 User interface: The user interface of the system shall be user friendly and easy
enough to work with. System provides web interfaces that are compatible with
browsers like Internet explorer, Mozilla Firefox, Google chrome.
 Availability: - The system must be simple and easy to be used by all its potential
users.

Page 16 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

 Security: The system is secured as much as possible. In saying this, the securing
methodshould not be difficult to the user to understand and not complicated and
costly tomanage. Here, it uses simple, secure and understandable way of security
(entering username and password).
 Reliability: - The main database on the server has to be back up regularly at least at
the end of every day.
 Scalability: - The system will be extendable or scalable to future needs.

3.4. Analysis Models


3.4.1 Use-Case Diagram
Use case diagrams are ideal artifacts to capture the requirements of the system. They represent
the user requirements gathered during requirement elicitation. Use case diagram consists of use
cases, actors, their relationship and system boundary.

Actor and Use Case Identification

Table 1:Actor and use case identification

Actors Use case


 Student  Login
 Company  Request Certificate Verification
 Administrator  View Certificate Verification Link
 Registrar  Manage Graduate Information
 Finance  Create and Manage Account
 Registration of Employee
 Approve Service Request
 Approve Payment

Page 17 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

When we draw use case, we use the following shapes

Table 2: Use case representations

No Shapes Representation
It represents the users of systems known as actors. It
1 represents a role that a user can play but not specific
user.

It represents a user goal that can be achieved by


2 accessing the system or software application.

It represents scope of systems. Known as system


3 boundary. The use case of a system is placed inside
this, while the actors who interact with the system are
put outside the system.
It represents that a use case contains the behaviour
4 defined in another use case.

It represents how and when the behaviour defined in


5 the extending use case can be inserted in to the
behaviour defined in the extended use case.
It is used to associate actor and use case to indicate
6 that the actor participates in that use case. Therefore,
an association correspond to a sequence of actions
between the actors and use case in achieving the use
case.

Page 18 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Create and
manage account
Manage Graduate Registrar
Admin <include>
certificate
logout
Search
graduate info

<include> Verify Certificate


<include>

Manage system

<include>
<extend>
Student Approve request
certificate
Check certificate
<include>
<include>
<include>

View Certificate

<include>
Company Send request Finance
Approve payment
<include>
<include>

<include> Login
View Response

Figure 1:Use case diagram

Page 19 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Use Case Description

Table 3:Use case descriptions

Use Case ID Use Case Name Description


UC_01 Log In It describes the process of authenticating the user
name& password before granting access to his or
her Graduate’s Certificate Verification System
(GCVS) account.
UC_02 Request Verify It describes the process of starting verifying the
Certificate graduated student’s credentials.
UC_03 Manage Graduate It describes the process of updating, inserting,
Information removing, searching data or files related to the
graduate’s credentials.
UC_04 Accept It describes the process of verifying and accepting
(Approve)Paymen the application fee for the service request of the
t organizations or companies by the finance officer.

UC_05 Approve Service It describes the process of verifying & approving the
Request service requests of the organizations or companies
by the director of registrar.
UC_06 Create or Manage It describes the process of creating or managing
Accounts account for the authorized users of the system like
director of registrar or finance officer.
UC_07 View Certificate It describes the process of viewing a certificate
Link verification that sends to external user throw their
email.

Page 20 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table 4: Use case descriptions for login

Use Case ID UC_01


Use Case Name Log in
Primarily Actor Administrator, Registrar, Finance.
Description It describes the process of authenticating the user name & password
before granting access to his or her GCVS account.
Trigger Administrator, Registrar and Finance and need to login his or her
account to use this system.
Pre-Condition Administrator, Registrar and., Finance login.
Normal Action Actor’s Action System Response
 Step 1: Administrator,  Step 2: The system displays the
Registrar and Finance login page.
initiate to login.  Step 4: System checks the
 Step3: Administrator, authentication of username and
Registrar and Finance password.
enter a valid user name &  Step 5:System displays their
password. corresponding GCVS user page.
Post condition Administrator, Registrar and Finance can do different activities
depending on the permission provided to them.
Alternative  Step 4: If the username and password is not valid, system
Action displays error message and go to step 2.

Page 21 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table 5:Use case description for verify certificates

Use Case ID UC_02


Use Case Name Request Verify Certificates.
Primarily Actor External User.
Description It describes the process of requesting verify the graduate’s credentials.
Trigger External User want to request verify their credentials.
Pre-Condition Companies’ should register itself and graduates profiles.
Normal Action Actor’s Action System Response
 Step 1: External User  Step 2: The system displays the
initiates to requesting Requesting form.
verification.  Step 4: Systems validate information
 Step 3: External User submitted.
enters the  Step 5: System sends the certificate
organization details verification link throw the email.
and graduates  Step 6: System store the user’s
profiles. information and activity.
Post condition External user read Certificate Verification link
Alternative  Step 4: If entered information is not valid the system displays
Action error message and go to step 2.

Page 22 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table 6:Use case descriptions for insert, update search, and delete graduate’s information

Use case ID UC_03


Use case name Manage Graduate student information.
Actor Administrator, Registrar.
Description It describes the process of updating, Searching, adding, removing data or
files related to the graduated students files or credentials.
Trigger Administrator or Registrar wants to Searching, updating, delete, add
information.
Precondition Administrator or Registrar has to be remembering user name and
password.
Normal Actor’s Action (for update) System Response
Action  Step 1: Admin or Registrar initiates for  Step 2: System
Searching information. displays Manages
 Step 3: User clicks Manages Graduates Graduates
information link. The user can update, information link.
search, delete, view, and insert their task.  Step 5: System asks
 Step 4: Here user clicks the search to enter the student
option. ID.
 Step 6: User enters the student ID and  Step 7: System
clicks OK. displays the searched
Step 8: User View information Searched. information about
the student.
Post condition User uses the searched information.
Alternative  Step 9:If ID entered violates the data entry rules, searching fails and
Action informs the user.

Page 23 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table 7:Use case description for accept payment

Use case ID UC_04


Use case name Accept Payment.
Actor Finance officer.
Description It describes the process of approving the payment of students.
Trigger Finance officer wants to check and approve payment of graduates.
Precondition Finance has to be remembering user name and password.
Normal Action Actor’s Action System Response
 Step 1: Finance initiates for  Step 2: System displays the
approving payment. List for approval of
 Step 3: User clicks the List for payment link.
approval of payment link.  Step 4:System displays the
 Step 5: User downloads and list of student’s requests for
verifies the receipt, confirms with different services, along
the bank. with the fee details they
 Step 6: Users enter approved submitted.
remark and submit.  Step 7: System updates the
database, with the user’s
remark.
Post condition Database is updated by finance officer’s remark. Service request waits
for Registrar’s approval.
Alternative  Step 5: If confirmation fails, user updates the database with rejected
Action remark, followed by reason.

Page 24 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table 8:Use case description for approve verification service request

Use Case ID UC_05


Use case name Approves Verification Service Request
Actor Director of Registrar
Description It describes the process of verifying & approving the Verification service
requests of the organization or companies by the director of registrar.
Trigger User wants to check and approve Verification service requests of
Organization or companies.
Precondition User has to login.
Normal Action Actor’s Action System Response
 Step 1: User initiates for  Step 2: System displays the List for
approving requests. approval of service request link.
 Step 3: User clicks the  Step 4: System displays the list of
List for approval of Organization or Companies requests for
service request link. different Verification services, along with
 Step 5: User verifies the the fee details submitted by students.
data, remark of finance.  Step 7: System updates the database, with
 Step 6: Users enter the user’s remark.
approved remark and  Step 8: System generates requested
clicks to generate report document.
based on the request.  Step 9: System displays the report for the
 Step 10: User views the user with option for further entry option.
report and enters his  Step 11: Systems save the report to the
remark and clicks save. database and sends credential verification
link to organization.
Post condition External user or organization views the certification Verification link.
Alternative  Step 5: If confirmation fails, user updates the database with rejected
Action remark, followed by reason. Mail is send to the requested External user or
organization.

Page 25 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Table 9:Use case descriptions for create or manage account

Use Case ID UC_06


Use Case Name Create Account
Actor Administrator
Description It describes the process of creating a new mail account for the users by
the administrator.
Trigger Administrator needs to create an account for the user to use the
system.
Pre-Condition The Administrator who knows the administrator password should
login as and use the create account facility in the system.
Normal Action Actor’s Action System Response
 Step 1: The Administrator  Step 2: The system displays
initiate to login. the login page.
 Step 3: Administrator enters  Step 4: System checks the
valid user name & password. authentication of username and
 Step 6: From the admin page password.
Create Account Option is  Step 5: System displays admin
selected by the page.
Administrator.  Step 7: System displays create
 Step 8: System administrator account page.
enters user information.  Step 9System creates user
account.
Post condition New user account is created which the user can use for different
activities.
Alternative  Step 4: If the username and password is not validated and verified,
Action system displays error message and go to step 2.
 Step 8: If the user information is not validated and verified,
system display error message and go to step 7.

Page 26 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

3.4.2 Sequence Diagrams


Sequence diagrams show a succession of interaction between classes or object instances over
time. It also shows the processing described in a single scenario. It describes interaction among
classes in terms of an exchange of message overtime. It is a good way to visualize and validate
various runtime scenarios.

When we draw sequence diagram, we use the following shapes.

Table 10:Shapes of sequence diagram

No Shapes Representation
It describes the way an object will
1 behave in context

Known as activation box, used to


2 represent the time an object needs to
complete a task.
It is a message that represents
3 communication between objects.
Lifelines that represents the objects
4 presence overtime
Reply message that represents
5 message is back to the original
lifeline
A message that an object sends to
6 itself.

Delete icon that represent destruction


7 of object.

Page 27 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence Diagram for Login

:Home page :Login page :Login Link :Database


<UI> <UI> <Controller> <server>
Student
<Actor
>
1. initiate to
login

2. Display
Login Form

3.Enter
Username and 5. Validate()
Password

6. Invalid user
name and 7.send
password
8.check

10.if not
9. autenticate
authenticated

Figure 2:Sequence diagram for login

Page 28 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence Diagram for create an acount

:Admin home page :Create Account Manage account : DB


<<UI>> <<UI>> <Controller> <<Server>>

:Admin
1: Initiate to
<Actor
Create 2: Click
>
Account Create
Account
3: send
4:Validate
5:Error
Message

6:access
7:Display
Create
Account Form

8: Fill Account
Form
9.authenticate

10.if not
authenticated 11.authe nticat
ed
12:User
Account
Created
SuccessFully

Figure 3:Sequence diagram for create account

Page 29 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence Diagram for Verify Certificate

user home Verification .verify : System


page Page <Controller <Database
<Ul> <Ul> > Server>

User 1 Initiate for


Verification
2.fill the
registration
form
4.Validation
3. submit()
5.Display
error
message
6.send()

7.Click

8. submit()
9.authenticate

11.Display 10.send()
verification
page
12.Fill the
Application
form
13.Display
the required
information

Figure 4:sequence diagram for verify certificate

Page 30 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence Diagram for Search Graduate information


:Admin :SearchButton :Data search Database
home page <UI> <Cotroller> <Server>
<UI>

Admin 1.Initiate for


search 2.click search

3.Display data
search form

4.enter
student ID 5.Validation
6.display
error message

7.send

8.display the
info

Figure 5:sequence diagram for search graduate information

Page 31 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence Diagram for Approval of Service

: Approval
: User home Page
:Login form : Approval List page : DB
<<Controller
<<UI>> <<UI>> <<UI>> <<Server>>
: Regi >>
strar
<Acto
r> Initiate for 2: Click
approval List for
Approval

4: Approval
Page
Displayed 5: Check
the
required 7:check
Information
6: Enter
Information
to Generate
Report
7:Validate
8: Error
Message
Displayed

11: Generate
approved
report

Figure 6:sequence diagram for approval of service

Page 32 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence Diagram for Accept payment

:Login page :F-Home page Link :Approval page Database


<UI> <UI> <Controller> <Server>

Finance

1.login 2.click check


payment

3.Display
approval page

4.fill the
information for
approval 5.Validation
6.error
message
displayed

7.Access

8.Confirmation
message
displayed

Figure 7:Sequence diagram for accept payment

Page 33 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Sequence diagram for request academic service


:User home :Service request :System
:Request page <Database
page
service <UI> <controller> server>
<UI>

1.Initiate for
Student service
request 2.click
request
service
3.access

4.Display
application
form

5:Fill the
application
6.Validation
7.Display
error message
8.Send to
database
10.Acknowle
dgment
message
displayed

Figure 8:Sequence diagram for request academic service

Page 34 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

3.4.3 Activity Diagram


Activity diagram is one of the UML elements which used for business process modeling and
used for modeling the logic captured by single use case usage scenario. It also helps to model the
internal logic of complex operations of the system. In addition to this, it shows the work flow
from start point to end point details and many decision parts that exist in progression of event
contain in activity. Generally activity diagram is essentially a flowchart, showing flow of control
from activity to activity (9). When we draw activity diagram we use the following shapes.

Table 11.Representation of activity diagram

No Shapes Representation
Join symbol, represent when two con-current
1 activities combined

Fork symbol , represents splitting of two


2 activities into two concurrent activities

Connector symbol that represents directional


3 flow, or control flow of the activity

Indicates the activities that make up a modelled


4 process.

It is start symbol that represents the beginning of


5 a process or work flow.

It represents a completion of a process or


6 workflow.

Diamond shape represents the branching or


7 merging of various flows with the symbol acting
as the frame or container.

Page 35 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Activity Diagram for Login

Click Login

Enter user name


and password

Submit

Invali
d valid Display the
Validate
requested Page

Figure 9:Activity Diagram for login

Page 36 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Activity Diagram for service Verification Request

Service
Description Page

select required
service

Fill the Form

Submit

invali Display
d valid Send for
Validate confirmation
Approval
meseage

Figure 10:Activity diagram for service verification request

Page 37 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Activity Diagram for Accept Payment

Login

Display Finance
Page

Click List for Verify the


Approval Payment Receipt

Not NO Yes
Validate Approved
Approved

Enter Remark and


Submit It

Remark
Submitted to
Database

Figure 11:Activity Diagram for accept payment

Page 38 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

login

Display registrar
interface

click list for approval

Verify the request and


finance remark

invalid send message to


validate
external user

valid store the report of


approval and remark
Generate report as per
request approve and mail the
report to external user

Figure 12:Activity diagram for approve service

Page 39 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Activity Diagram for Verify Certificate

login

click verify
certificate

Display the form

fill certificate
verification form

invalid
validate

valid

display the required


graduated students
info

Figure 13:Activity diagram for verify certificate

Page 40 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Activity Diagram for Manage Graduate Information (Search)

Click Login

click search

Enter Search
parameter

Invalid
Validate

Valid

Dispay
information

Figure 14:Activity diagram for manage graduate information(Search)

Page 41 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Activity Diagram for Create or Manage Account

Page 42 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Admin page
displayed

click create
acount

Display craete
acount form

Enter user name Dislay error


validate
and password message

acount created

Figure 15:Activity diagram for create or manage account

Page 43 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

3.4.4 Class Diagram


Class modeling used to describe the structure of the system. Classes are abstractions that specify
the common structure and behavior of a set of objects in the new system. In this modeling the
team’s members have designed the system in terms of objects, classes, attributes, operations and
their association. Of course, the model depicted here is a sample.

send()
* has
request()

Graduate-Student
Request Verification
+G-Fname:String
+G-Mname:String Service Company
+G-Lname:String +request-id
-CGPA: float +Fname
+Com-name:string
+Year-of +Mname
+Com-city:string
graduation:int +Lname
+Com-country:string
+Gender:string -Graduate-ID
+Gender
** +Com-Phone no:int
-
Email +Company-
Qualification:Varchar
+Year of graduate email:varchar
+Department:string
-G-ID:int +Request date
+photo *
** *
verify()
search() manage()
approve()

1
Course-detail
Admin
1
1
Acount Finance +C-name
Registrar +C-code
+department
use() +search()
-user name create() +semester
+create()
+password +approve-
+search() +display()
+email payment()
+Update() -login()
-login()
+Display() 1 * -logout() 1 *
-logout()
-Login()
-Logout()
1 1 1
*

Figure 16:Class diagram

Page 44 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

3.4.5 User Interface Design


User Interface Prototype is an iterative analysis technique in which users are actively involved in
the making-up of the UI for a system. A user interface prototype is a vehicle for user to
communicate the possible UI design of system.

Home
Page

Company Student Admin Finance Registrar

Login
Login Login Login Login

List of Approval
Request
Payment Manage Graduate
Certificate
Verification Info

List of Approved
View Payment Approve Service
Aknowledgement Request
message Manage graduate
information

View verification Verify Certificate


Add graduate
information

Send Request Generate report


View Graduate
Request
View response
Create account

Figure 17:User interface prototypes

Page 45 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

CHAPTER FOUR
SYSTEM DESIGN
4.1 Introduction
In this chapter, we model the system design using different UML modeling techniques and it
described in detail. Design new system that would solve current problems indicated. This part is
targeted in such a way that solves the problems of fake certificate. It provides more
efficient, reliable and time saving system. It is designed to simplify functions of the manual
system and it is capable of doing large amount of works in short period of time with more
accuracy and reliability. Generally, this design phase will describe how the project is designed,
and the way how the system doing. System design is the transformation of the analysis model
into a system design model. System design is the first part to get into the solution domain in a
software development.
This chapter focuses on transforming the analysis model into the design model that takes into
account the non-functional requirements and constraints described in the problem statement and
requirement analysis sections discussed earlier. During system design the team concentrates on
the process of data structures and software and hard ware components necessary to implement it.

4.2 Purpose of System Design Document


The purpose of design is to determine how the system is going to be built and to obtain
information needed to drive the actual implementation of the system. It focuses on understanding
the model how the software will be built. System design is the detail investigation of system
elements from logical view.

The design of our system considers or incorporates the following major goals.

 Usability: the system is easy and user friendly users. It doesn`t require a high level of
expertise in computers. Any user can access it simply using user guide.
 Response time: The system responds as quickly as possible for authorized or
unauthorized access requests.

Page 46 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Efficiency: the system doing something well and thoroughly without waste of money and
time. The proposed graduate’s credential verification system exercises different methods
for the system to be effective. Therefore, it is efficient in using different resources
available.
Flexibility: The proposed system will be highly flexible since users can access the
components as they need.
Reliability: The system is expected to accept inputs and requests from the user and make
the necessary execution. The systems accept all valid user data and produce the expected
output. Therefore, the system is reliable.
User friendliness: The proposed graduate’s certificate verification system is graphical
user interface (GUI) oriented which makes users to interact easily with the system. The
system should have simple and understandable graphical Interface. All the interfaces,
forms and buttons are written or designed in a simple language or common language so
that they can access it without any difficult.
Low cost: The proposed system regarding cost is reducing the cost to verify the certificate.
Fault tolerance: Fault may originate in a system level, in the system environment, or
in the interaction between user and the system. Some of the faults that may occur
include: computer failure, system failure due to virus, unauthorized user. The system
tolerate the error occur due to user-system interaction using proper execution handling
methods.
Security: The system is secured as much as possible. In saying this, the securing method
should not be difficult to the user to understand and not complicated and costly to
manage. Here, it uses simple, secure and understandable way of security (entering user
name and password).
Readability: The code will be easily readable and understandable by other
programmers. To achieve this goal, we will supplement the code by proper naming
convention, proper indentation and comment.
Modifiability: To realize this goal the system will be well-documented. Proper
documentation must be done at every phase of the system development. Documentation
will include Requirement Analysis Document, and System Design Document.
Portability: The system works in different plat form and OS
Throughput: The system can be accomplished by different users at the same time
because of the system designed is as client-server architecture. The database server
reopened to each user based on their request at the same time.

Page 47 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

4.4. Architectural Design


4.4.1. Logical view of the Architecture

User interface layer

The user interface (UI) layer is the first layer of the system in which the user and the system is
communicated. It is the form which provides the application to either programmer or end user.
Controller/process layer
The process layer implements business logic that involves collaborating with several domain
classes or even other process classes.
Business/Domain layer
This layer is used to transfer data from application layer or presentation layer to data layer.
This layer is also used when a class variables are declared corresponding to the fields of
the database which can be required for the application and make the properties. So that, the
team can get or sets the data using these properties into the variables.
Persistence layer
Persistence layers encapsulate the capability to store, retrieve, and delete objects/data
permanently without revealing details of the underlying storage technology in the system. Often
implement between object schema and database schema and there are various available to us. For
instance, our system uses MySQL database.
System layer
This Layer provides operating-system-specific functionality for our applications, isolating our
software from the operating system (OS) by wrapping OS-specific features, increasing the

Page 48 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

portability of our system.

4.4 Process view


In this part the team used to model the behaviors of the objects by drawing the process
viewdiagram. That shows the sequence of states that an object goes through, the events that
cause the transition from one state to the other and the actions that result from a state change.
The process view used to show the sequence of states that an object goes through the events that
cause the transition from one state to the other and the actions that result from a state change.
Moreover, a process view is a view of a state machine that models the changing behavior ofa
state. Process view shows the various states that an object goes through, as well as the events that
cause a transition from one state to another.

Figure2: process view for login

Page 49 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure3: process view for signup

Figure4: process view to add certificate

Page 50 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure5: process view to request certificate

Figure6: process view to verify certificate

Figure7: process view to view request

Page 51 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure8: process view to update certificate

Figure9: process view to accept payment

Page 52 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure10: process view to change password

Page 53 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

4.5 Collaboration modeling


A collaboration diagram shows an interaction organized around the objects in the interaction and
their links to each other. Unlike a sequence diagram, a collaboration diagram shows the
relationships among the objects. On the other hand, a collaboration diagram does not show time
as a separate dimension, so sequence numbers determine the sequence of messages and the
concurrent threads. A collaboration diagram describes interactions among objects in terms of
sequenced messages. Collaboration diagrams represent a combination of information taken from
class, sequence, and use case diagrams describing both the static structure and dynamic behavior
of a system.
The UML Collaboration diagram is used to model how objects involved in a scenario interact,
with each object instantiating a particular class in the system. Objects are connected by links,
each link representing an instance of an association between the respective classes involved. The
link shows messages sent between the objects, and the type of message passed.

Figure 11: collaboration diagram for login

Page 54 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure 12: collaboration diagram for sign up

Figure 13: collaboration diagram to add certificate

Page 55 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure 14: collaboration diagram to update certificate

Figure 15: collaboration diagram to add student

Page 56 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

Figure 16: collaboration diagram to verify certificate

Figure 17: collaboration diagram to accept payment

Page 57 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

4.6 Deployment View


A deployment diagram shows how artifacts are deployed on system hardware, and how the
pieces of hardware connect to one another. The main hardware item is a node, a generic name for
a computing resource. The name deployment itself describes the purpose of the diagram.
Deployment diagrams are used for describing the hardware components where software
components are deployed. Component diagrams and deployment diagrams are closely related.
The purpose of deployment diagrams can be described as:
Visualize hardware topology of a system.
Describe the hardware components used to deploy software components.
Describe runtime processing nodes.

Figure 18: deployment design

Page 58 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

4.7 Database Design


Persistence models in our system are used to communicate the design of database. This is
basically the entity relation in database application. The system that we design overall
persistent modeling is described at class modeling part. The next diagram implies mapping
with the different tables of the database that are supposed to be found in the database of the
proposed system. Persistent data management is all about permanent data that are stored and
how they should be managed.

Figure 19: Database design

Page 59 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

CHAPTER FIVE
5. CONCLUSION AND RECOMMENDATION
5.1 Conclusion
This Certificate verification system, is an electronic and computerized means of verifying
someone’s claim of studentship or validating degree certificate by an institution using an output
clearly showing the truth or false of his or her claim.
This system is a web-based application to serve citizens as well as the working group of system
in different better manner. The benefits of the system can be summarized as improved the
manual system to centralized online system whichincreased the speed of access or faster
certificate verifications, increased accuracy and availability, increased quality of education
throughout the country, and minimize corruption.

5.2 Recommendation
We would like to recommend whom concerned Higher Educational Institution(HEI) to
implement the system to manage graduate student certificate and to make sure any company that
wants to check certificate of students.

Page 60 of 62
WEB BASED GRADUATES CERTIFICATE VERIFICATION SYSTEM FOR HEI

REFERENCE

 [Online] http://www.businessdictionary.com/definition/feasibility-study.html.
 Stellman, Andrew, Greene, Jennifer. Applied software Project Management. s.l. : O'Reilly
Media, 2005. p. 113. ISBN 978-0-596-00948-9.
 Prentice Object-Oriented Software Engineering, Third Edition.
 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 5 Issue 3, March 2016[1]

Page 61 of 62

You might also like