0% found this document useful (0 votes)
170 views53 pages

QR Code Based Examination Card Verificat

This document discusses a QR code based examination card verification system for Kebbi State University of Science and Technology. The system will generate QR codes containing student data like admission number, courses registered, and affix it to examination cards to authenticate students. The document discusses QR codes, the system workflow and architecture, requirements, design tools, and security concerns of using QR codes.

Uploaded by

ejioforjo01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views53 pages

QR Code Based Examination Card Verificat

This document discusses a QR code based examination card verification system for Kebbi State University of Science and Technology. The system will generate QR codes containing student data like admission number, courses registered, and affix it to examination cards to authenticate students. The document discusses QR codes, the system workflow and architecture, requirements, design tools, and security concerns of using QR codes.

Uploaded by

ejioforjo01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

QR CODE BASED EXAMINATION CARD VERIFICATION

SYSTEM
(A CASE STUDY OF KSUSTA)

MUSTAPHA ABUBAKAR NASIR (1510340005)

A PROJECT SUBMITTED IN FULFILLMENT OF THE


REQUIREMENTS FOR THE AWARD OF DEGREE OF
BACHELOR OF TECHNOLOGY
(B. Tech) INFORMATION AND COMMUNICATION
TECHNOLOGY

FACULTY OF ENGINEERING, KEBBI STATE


UNIVERSITY OF SCIENCE AND TECHNOLOGY, ALIERO

MAY, 2021.
ii

DECLRATION

This is to certify that this project work QR CODE BASED


EXAMINATION CARD VERIFICATION SYSTEM was carried out by me.

Sign--------------------------------------- -----------------------------
MUSTAPHA ABUBAKAR NASIR DATE
iii

CERTIFICATION

This Project is written under the direction and supervision of the candidate„s
Project supervisor and approved. This is to satisfy that the student has presented it
orally to the Department of Information and Communication Technology, kebbi
State University Of Science And Technology, Aliero, in partial fulfillment for the
award of Bachelor of Technology (B.Tech) Degree in Information and
Communication Technology.

Sign…………………………… ………………………………
Mr. Yazid Haruna Shayau Date
(Project Supervisor)

Sign…………………………… ………………………………
Assoc. Dr. Aliyu Rufai yauri Date
(Head of Department)

Sign…………………………… ………………………………
Prof. Saleh Abdullahi Date
(External Examiner)

Sign…………………………… ………………………………
Mr. Yunusa Adamu Bena Date
(Project coordinator)
iv

DEDICATION

I dedicate this project report to Almighty God whose love and grace towards my
Academic pursuit is endless and to my parents for their love and contribution.
v

ACKNOWLEDGEMENT

Profound gratitude goes to the project supervisor Mr. Haruna Yazid Shayau and
also to the Mr. Idris Labaran Jega for making this project a learning process,
others in the trend are departmental lecturers and a lots of friends in the faculty of
Engineering. Special gratitude goes out to (Soft Tech ISSL, Abuja) that helped me
with all kind of coding throughout my SIWES program. Also to acknowledge my
parents and my siblings for their great support during academic pursuit; may the
Almighty God bless them for me. My great thanks go to God Almighty who has
made this project a success.
vi

ABSTRACT

This project introduces an examination card Management System that


integrates 2-Dimensional Barcode which is responsible to produce more secure,
reliable examination cards. This system will capture the personalized data including
session, semester, admission Number and courses code registered by the holder and
dynamically generate an image of 2D Barcode containing the information provided
and affix this barcode image on examination Card. This examination card can be
used to validate and authenticate the holder. Main advantage of using 2D Barcode is
its data encoding capacity, 2D Barcode is able to encode up to 500 bytes per square
inch. Some data is used for error correction encoding provides the capability to
tolerate the holes, cuts and dirt marks and makes 2D Barcode readable. There are
varieties of 2D Barcodes available. This project uses one of the standard 2D Barcode
to demonstrate the examination card management. The project discusses 2D barcodes
and their encoding methodology, system workflow and architecture of proposed
examination card management system.
vii

TABLE OF CONTENTS

CHAPTER TITLE PAGE

DECLARATION ii
CERTIFICATION iii
DEDICATION iv
ACKNOWLEDGEMENT v
ABSTRACT vi
TABLE OF CONTENTS vii
LIST OF TABLES x
LIST OF FIGURES xii
LIST OF APPENDICES xiii

1 INTRODUCTION 1
1.1 Introduction 1
1.2 Theoretical Background of QR-code 2
1.2.1 How Qr-codes works 3
1.2.1 Features of Qr-codes 4
1.3 Problem Statement 5
1.4 Project Aim 5
1.5 Project Objective 6
1.6 Project Scope 6
1.7 Project Significance 7
1.8 Operational Definition of terms 7
2 LITERATURE REVIEW 9
2.1 Introduction 9
2.2 QR-code 9
2.3 Related Works 10
3 METHODOLOGY 12
viii

3.1 Software Development Methodology 12


3.1.1 Iterative Model 13
3.1.2 Phases Involve 13
3.1.2.1 Requirement Analysis 14
3.1.2.2 Design 14
3.1.2.3 implementation and Testing 14
3.1.2.4 Review 14
3.2 Benefits of Using Iterative Model 37
3.3 System Analysis 15
3.3.1 Analysis of the Existing System 15
3.3.2 Problem with the Existing System 16
3.4. Analysis of the Proposed System 16
3.4.1 Advantages of the Proposed System 17
3.5 Method of Data Collection 17
3.5.1 The Primary Source of Data 17
3.5.1.1 Interview 17
3.5.1.2 Direct Observation 18
3.5.2 Secondary Source of Data 18
3.6 The Use Case Model 18
3.6.1 Actors 19
3.6.2 Use Case 19
3.7 System Requirements 21
3.7.1 Input Requirement 21
3.7.2 output Requirement 21
3.7.3 Hardware and Software Requirement 21
3.8 Table Specification 22
3.9 Design Tools 24
3.9.1 Visual Basic 24
3.9.2 Microsoft Access 25
3.10 Security Concerns of QR-code 25
3.10.1 Phishing 25
3.10.2 Fraud 25
3.10.3 Malware Propagation 26
ix

3.11 Tips on Using QR-code 26


4 ANALYSIS AND DISCUSSION OF RESULT 27
4.1 Introduction 27
4.2 Discussion of Results 27
4.2.1 The Home Page 27
4.2.2 Users Log in Page 28
4.2.3 Student and Change Password Module 29
4.2.4 Course Registration Module 29
4.2.5 Exams Card Print Module 30
4.2.6 The Admin Module 31
4.3 Results 31
5 CONCLUSION AND RECOMMENDATION 33
5.1 Summary 33
5.2 Review of Achievement 33
5.3 Area of Application 34
5.4 Conclusions 34
5.4 Recommendation 34
REFERENCES 35
APPENDICES 37
x

LIST OF TABLES

TABLE NO TITLE PAGE

3.1 Students Registration Table 23


3.2 Course Table 23
3.3 Department Table 24
xi

LIST OF FIGURES

FIGURE NO. TITLE PAGE

1.1 QR-code Structure. 12


3.1 iterative model 15
3.2 Use case diagram 17
4.1 The Home Page 28
4.2 Users Log in Page 28
4.3 Student and Change Password Module 29
4.4 Course Registration Module 30
4.5 Exams Card Print Module 30
4.6 The Admin Module 31
4.7 Add/Delete Depts. /Course Module 31
4.8 QR-code to be scanned 32
4.9 Results of The Scanned QR-code 32
xii

LIST OF APPENDICES

APPENDIX TITLE PAGE

A Database connection 37
B Admin Modules 37
CHAPTER 1

INTRODUCTION

1.1 Introduction

The use and administration of examinations card is a common means of


identifying any student of any department, faculty etc. However, what is
obtainable in a typical tertiary institution is peculiar. It is peculiar in the sense
that most times, huge number of diverse nationalities, ethnics and races are
involved.

In most tertiary institutions in Nigeria, examination cards given to student are


without either means of authentication or verification. With the advent and access to
innovative technology, such examination cards are susceptible to cloning by persons
who may be desperate to be a student of particular department, or have ulterior plans.

Therefore, there is a need for a mobile and accessible exams card authentication
system as solution to both physical security and certain administrative duties that
demand examination card authentication and verification.

This work proposes an embedded QR-code on examination card to be given


to students and introduction of Smartphone App which will be used to authenticate
and verify the QR-codes on these cards. Since there‟s proliferation of mobile phone
users in recent time, coupled with the fact that smart phone prices are now
2

affordable, it is assumed that the potential users of the proposed system presented in
This research would have been used to the operation of smart phone. Thus, the
proposed system will be accessible to these intending users at no additional cost and
less training.

This research presents an examination card automation system utilizes smart


phone for reading and recognizing of QR-code embedded within the card using the
in-built camera function of smart phones in an offline and real-time basis. Being an
offline system, the proposed system isn't hooked in to the supply of network
connection for its deployment unlike other existing systems. Therefore, making it
deployable anywhere, anytime, even in remote areas where there aren't any networks.

1.2 Theoretical Background of QR-code

Quick Response codes or in brief QR-codes, are two dimensional (2D) matrix
barcodes that are scanned using web capable smart mobile phones having camera,
with QR Reader put in as default application, allows one to access some pre-written
content such as a web site address, email address, details of things within the
catalogue, phone numbers etc (Hui et al., 2014; Shettar, 2020).

QR-code is a reasonably 2-D zymology developed by Toyota subsidiary


Denso Wave in1994 with the first aim of being a symbol that is easily decoded by
scanner instrumentation at high speed with additional knowledge content than
conventional barcodes. Conventional Universal Product Code contains decoded data
in one direction i.e. vertically into bars and house in between; whereas QR-code
contains decoded data in each of the directions i.e. vertical and horizontal direction.
QR-code is capable of holding additional volume of data than barcode, which is even
an entire bunch of times as abundant data (Ahmed & Jang, 2017; Haque &
Dybowski, 2014; Shettar, 2020).
3

1.2.1 How Qr-codes works

(Bajpai & Agrawal, 2013; Shettar, 2020; Ump, n.d.)Data may be encoded
into a QR-code by QR-code generator (Some of QR-code Generators available
online are listed in later part). Information may be easily encoded in to QR-codes by
using any freely available QR-code generators, enter the data to be encoded in to the
sphere provided by generators. QR-code generators may ask you to enter data to
several Data Fields available, depending on what data you're encoding. Once all the
data fields are filled out with necessary data in correct format, QR-code generator
can publish the QR-code for the information, which is in a position to be within the
main image format (JPEG, BMP, and PNG etc.). This could be used directly on
internet or mails in e-format or may be revealed in Print format. It‟s additionally
attainable to disarrange the color and even attainable to feature image in to QR-codes
to provide creative embellishment.

Figure 1.1 QR-code Structure

(Haque & Dybowski, 2014; Shettar, 2020)Decoding of those QR-codes may


be done by on-line QR-code decoders associated with any Internet enabled good
4

phone that has QR-code Reader software package program pre-installed, If not the
software may be downloaded from varied sites that are freely available on internet
(Some of QR-code readers offered on-line are listed in later part). QR-codes could
also be decoded with on-line decoder like ZXing Decoder on-line, MiniQR, on-line
Barcode Reader, Patrick WiedQR Generator, QR-code Generator and Recovery. QR-
codes also can be decoded with good Phone‟s Camera by directing it towards theQR-
code and scanning with image capture. Then pre-installed QR-code reader decodes
the QR-code and displays content as text or uniform resource locator format. QR-
codes additionally prompt your mobile devices navigate to an internet page actions
like dial variety, send SMS, Save Reminders, save variety to Phone Book etc. Most
common QR-code functions are given below:

i. Encode phone numbers, text messages, commands and phone data.


ii. Prompt to direct to open a URL
iii. Bookmark a site link
iv. Prompt to form a call from mobile
v. Prompt to send a SMS from mobile
vi. Prompt to begin an email
vii. Send a vCard
viii. Store a date in your calendar (to schedule an appointment)
ix. Return text
x. Encryption
xi. Record geographic coordinates.

1.2.2 Features of Qr-codes

(Bajpai & Agrawal, 2013; Haque & Dybowski, 2014; Shettar,


2020)According to Denso Wave, developers of QR-codes:
5

i. Conventional barcode can store a maximum of 20 digits; whereas QR-code


can capable to store hundred to thousand-fold of more information.
ii. QR-codes are capable of handling all data varieties, such as Alpha-Numeric,
Special characters, Kanji, Kana, Hiragana, binary and control codes.
iii. A QR-code Data storage capacity: Max. 7,089 numeric characters, Max.
4,296 alphanumeric characters, Max. 2,953 binary bytes, Max. 1,817 Kanji,
full-width Kana characters or a mixture of all others.
iv. For QR-codes very little output Size is needed, as QR-code carries data both
horizontally and vertically. Comparing to Barcode, QR-code is capable to
store same quantity of data in about one-tenth of the area.\
v. QR-code is readable from any direction across 360 degree (Omni-
directional).
vi. QR-code has error correction capacity. Even dirty or broken image is repaired
and maximum up to 30% code will be corrected.

1.3 Problem Statement

The problems found during verification of a student examination was so


much that there were cases of invigilators spending lot of time in order to verify the
authenticity of examination card presented to them during exams.

1.4 Project Aim

Due to sensitive circumstances, the aim of this project is limited to a


completed implementation of Qr-code based examination card verification system
6

that will manage the courses registrations and examination card management system
for easy verification and authentications.

1.5 Project Objective

i. To ensure unregistered students do not write exams for other registered


students.
ii. To reduce rate of fraud in the educational sector and increase self-
confidence on students.
iii. To resolve the issue of manual verification of examination card by
attaching QR-code on the examination card.
iv. To easily confirm the authenticity of any examination card by the
invigilator.

1.6 Project Scope

This research will concentrate on complete implementation of QR code based


examination card verification system for the department of information and
communication technology, faculty of engineering.

Due to time constraints, I couldn‟t link the system to remote server (school
Data base), so I create a simple database to store students and courses information
using Microsoft Access.
7

1.7 Project Significance

The significance of this study is to aid the verification of the authenticity of


examination card from the students. The verification system would improve the
monitoring capacities of those who maintain the system. Furthermore, the examiner
will be helped when it comes to adding and generating the examination card of the
student, letting them print it promptly and accordingly.

1.8 Operational Definition of terms

Database: A collection of related information which can be stored and retrieved.

Examination: A measure for the test of knowledge.

Malpractices: This refers to negligence or misconduct

Impersonation: General process of acting on behalf of a client.

Impersonator: A performed skilled at copying the manner or expression of another


mime.

Elimination: To get rid of

Design: Is a creative activity whose aim is to establish the multi-faceted qualities of


objects processes, service and their systems in whole life cycles.

Security access: Permission granted to users based on their identification.


8

Authentication: The process of identifying someone base on users‟ names or


passwords in security system.

Authorization: Act of granting someone the permission to do or take something.


9

CHAPTER 2

LITERATURE REVIEW

2.1 Introduction

This chapter reviews existing literature on QR-code verification systems. It


starts with the review of relevant theoretical framework under the study and
empirical studies. The empirical review focuses on studies done on QR-code
verification system.

2.2 QR-code

Quick Response (QR) codes are two-dimensional barcodes that visually


encode bits of data represented as black square dots placed on a white square grid
(Ayeleso et al., 2017; Yakub, 2018). QR was developed by a Japanese corporation
Denso Wave in 1994. It was developed to safely and easily identify various
components.

As results of the proliferation of smart phones across many domains, reading


and decoding QR-codes has become much easier than using systems supported
complex technology. A QR-code system has edge over RFID-based systems: since
reading QR-codes requires closer proximity, which makes it almost impossible to
10

read an undesired code. From this attitude , QR-code reading is unambiguous,


because it only requires close proximity of the reader device to the instrument to read
the code from (Haque & Dybowski, 2014; Wei et al., 2017).

Another plus to QR-code is that it's a two-dimensional barcode. Thus, implies


it scans in two directions that‟s, vertical also as horizontal compared to the normal
barcode. In addition, QR-code-based technology is additionally superior in other
ways, like higher data storage capacity, lower implementation cost, technical
simplicity, widespread use and widely available, free programs for reading and
decoding by camera equipped smart phones (Averin & Zyulyarkina, 2020; Kumar &
Kareemulla, 2017). These features make this technology popular for identification
and authentication systems, especially in sectors with limited resources.

2.3 Related Works

There are various existing research works on possible application and


implementation of QR-code, especially in educational sector. Some of these
reviewed works are highlighted during this section. In a paper presented by (Bajpai
& Agrawal, 2013), personalized data, signature and picture of card holders were
captured, while the system dynamically generated 2D Barcode that represents
captured data and affixed this barcode image on card . The card was thereafter wont
to validate and authenticate the holder within the central database online. The basic
idea behind the authentication was to match the encrypted unique ID of the person
within the barcodes with the one within the central database. The work presented by
(Bajpai & Agrawal, 2013)depends on the availability of network for its operation.

According to the research Sir Revath provides a replacement enhancing


security in identity documents using QR-code (Ump, n.d.). The main focus of this
11

system is they want to use QR-code to perform checking authentication of


documents such as certificates. In this research it focuses on using personal detail
information to embed into QR-code. The personal detail information such as the
name of the person, date of birth, register number, and nationality which are used to
generate the QR-code.

Similarly, Singhal and Pavithr in their work applied the utilization of QR-
code and Smart phone to degree certificate verification and authentication. The
verification process scans the QR-code embedded on the certificate (M1) and
decrypts the signature from the university's public key in order to generate the hash
value (M2) (Singhal, 2015) If the hashed value generated from M1, matched that of
M2, then the certificate under authentication test is passed or otherwise. This work
does not look in the direction of an offline system that will save the technicality
demands and cost requirements of an online system.

Review of the earlier stated systems show that they are all online systems.
That is, their operation is solely dependent to the availability of a network
connection. Availability of a reliable network connection and thus the implication is
often a huge deal in some developing countries. This network dependence motivated
this proposed work for an offline system.
12

CHAPTER 3

METHODOLOGY

3.1 Software Development Methodology

This section discusses about development methodology, in order to attain


quite a reasonable acceptance of the research work, we made use of the
internationally accepted software engineering model, which is iterative model.

3.1.1 Iterative Model

An iterative life cycle model doesn't plan to start with a full specification of
requirements. Instead, development begins by specifying and implementing just a
part of the software, which may then be reviewed so as to spot further requirements.
This process is then repeated, producing a replacement version of the software for
every cycle of the model (SDLC Iterartive model, 2021).
13

3.1.2 Phases Involve

Consider an iterative life cycle model, which consists of repeating the following
four, phases in sequence:

REQUIREMENT DESIGN

REVIEW IMPLEMEN
TATION & TEST

Figure 3.1 iterative model

3.1.2.1 Phase 1 Requirement Analysis

The system-related information is collected and analyzed during the


requirements process of software development. The collected requirements are then
used to plan the system's development.
14

3.1.2.2 Phase 2: Design

The software solution is prepared in the Design process to satisfy the design
requirements. The device design could be brand new or a continuation of a previous
build.

3.1.2.3 Phase 3: implementation and Testing

The framework is built during the implementation and test phases by coding
and designing the user interface and modules, which are then implemented and
checked.

3.1.2.4 Phase 4: Review

The program is estimated and reviewed against the current requirement


during the review process. Then, in the next version, further specifications are
addressed and evaluated in order to suggest an upgrade

3.2 Benefits of Using Iterative Model

i. Produces working system rapidly and before time throughout the software
development life cycle.
ii. Provides more and more flexible and enhance based on requirements.
iii. Simple to test as well as repair as small iteration.
15

3.3 System Analysis

System analysis is a process of collecting factual data, understanding the


processes involved, identifying problems and recommending feasible suggestions
for improving the system. System analysis also includes decoupling of complex
processes that make up the entire system.

3.3.1 Analysis of the Existing System

The current system does not make use of the QR-code concepts. In the
current examination card system, students will register their courses which they will
sit for during the examination and after the registration, an e-photo card is brought to
the exam hall, but this is still not a strong measure of security because the card will
be observed/inspected to check the passport photograph and compare to the holder.

Any student who is not capable of writing the exam due to laziness or
corruption/malpractice in studies might pay someone else to write the exam for
him/her. The person involved is the impersonator.

In the university system, not all students are known by the lecturers. Student
simply arrives at the exam hall for the exam and enters with his exams card without
been check properly if he/she is a student of the department/faculty.

As a result, students from other department/faculty can come and impersonate


for other students. This is now common among youth and graduating student since
there is no proper security check for the student to ascertain if truly, they are made to
write the course and if the student is from that department/faculty.
16

3.3.2 Problem with the Existing System

i. Ineffective in its application and comprehension of the act of exam


impersonation.
ii. It deals with the process of authorization. This is a concept of ―what
you have which can be manipulated at any time.
iii. Matching to establish security measures occurs through the physical
eye and this is a very big problem and requires great power of
recognition, hence an impersonator can be present with recognition.

3.4 Analysis of the Proposed System

The proposed system will identify the student by scanning the QR-code
placed on the student‟s examination card. Each black and white box on the code,
when scan is translated to digital information; which will allow the computer to
access the database and provide the student academic record. This new system would
ensure that there is a unique way of identifying an individual as KSUSTA student
and the system would have high integrity, confidentiality, be accessible and non-
repudiating. It would be such that when a student‟s Exam card is scanned and
his/her identity is obtained, it should be possible to ascertain that they are who they
say they are and this can be repeated everywhere around the country with the same
result. The system would be the pure automated solution and it will help to generate
student Identification/exams card easily. It is a special type of software, which will
be used to make an advance examination card using QR-code instead of the barcode.
The QR-code would be attached to each student‟s examinations card and the
information that would be embedded in the QR-code will contain unique data of the
student such as matriculation number, department, faculty, Level, course registered
and all other important information about the student.
17

3.4.1 Advantages of the Proposed System

The designed system is a fully automated system, reliable, fast, accurate and
eliminates paper work. It saves time, cost-effective, difficult to replicate or simulate
and difficult to alter. This proposed system will eliminate any possibilities of identity
theft and examinations card forgery.

3.5 Method of Data Collection

The process by which data collected are systematically analyzed and


interpreted by a researcher. The two data that are analyzed usually are: -

i. The primary data


ii. The secondary data

3.5.1 The Primary Source of Data

This primarily centers on direct involvement with personnel or experts in the


field of discipline the researcher is carrying out his/ her research on. The major tool
for the collection of the primary data for this researcher work is: -

3.5.1.1 Interview

Use of interview-oral awarding of questions to the examination malpractice


committee (E.M.C) of KSUSTA and some students. The accuracy in using this
method of obtaining data for processing is high because there are no assumed figures
or data. The information gotten is trusted to be genuine. The awarding of oral
18

questions to respondents was to aid the researcher get a leverage ground of the
technical knowhow of the impact of the use of the system especially in KSUSTA
which is chosen as the case study for this research. All this aimed towards arriving at
a good conclusion.

3.5.1.2 Direct Observation

Complementing the interview is personal observation of the routine of the


college.

3.5.2 Secondary Source of Data

The secondary source of data used for this research is the use of libraries
which comprises of textbooks, past project works, the internet, and other related
works. This method of data collection is to broaden the scope of the researcher and to
look into several peoples work and what has been done so far in order to give his/her
own quota to the topic under review.

3.6 The Use Case Model

Use case diagrams describe what a system does from the standpoint of an
external observer. The emphasis of use case diagrams is on what a system does rather
than how. They are used to show the interactions between users of the system and the
system. A use case represents the several users called actors and the different ways in
which they interact with the system.
19

3.6.1 Actors

i. Students
ii. Admin

3.6.2 Use Case

i. Register
ii. Login
iii. Change password
iv. Register courses
v. Print examination card
vi. Add/remove course/department
vii. Compute result
viii. View all student details
ix. Create a user account
x. Log out.
20

Below is the diagram of the use case for the proposed system.

Register

Log In

Change Password

Course Reg.

Print Exam Card

Admin Student
View Student Data

Add/delete Course/Depts.

Add Admin

Figure 3.2 Use case diagram


21

3.7 System Requirements

To be used efficiently, all computer software needs certain hardware


components or other software resources to be present on a computer. These
prerequisites are known (as computer) system requirements and are often used as a
guideline as opposed to an absolute rule.

Below are the requirements for the proposed system:

3.7.1 Input Requirement

The input requirements include: users ID, students‟ details, course details,
faculty, department, levels, reports, course unit etc.

3.7.2 output Requirement

The output requirements include: reports, viewing of the courses registered,


course information, students‟ details etc.

3.7.3 Hardware and Software Requirement

The hardware is the physical and tangible components of a system unit, which
will function together to perform the required task. These components are:
i. Central processing unit (CPU)
ii. Keyboard
iii. Minimum of 2GB RAM
iv. 256 GB of hard disc
v. Monitor (VDU-visual display unit)
vi. Printer
vii. Smartphone or QR-code scanner
22

viii. Mouse

The software is the non-physical part of the system that uses the hardware
components to successfully run the system that has been built. These components
are:
i. Windows operating system
ii. Microsoft visual studio 2012 and above
iii. Web browser
iv. MS Access 2007
v. Visual Basic

3.8 Table Specification

The information on the database of the system, which is in formatted tables,


making it a relational database, it has to be regularly updated and edited. Implying
that there should be masters file which according to Mr. Adegoke (introduction to
file processing, 2008) is not permanent in nature, since it has to reflect current
changes to reflect the current events as they unfold. Among the tables to be regarded
as master files in this research work is;

i. tblStudentReg
ii. tblAdminAddCourse
iii. tblRegCourse
iv. tblDepartments.
23

Table 3.1: Students Registration Table

Field Name Data type Field


size
Matric. Number Number 10
Full Name Text 30
Level Number 4
Program Text 10
Faculty Text 25
Department Text 20
Course Text 20
Gender Text 6
Mobile number Number 11
State Text 15
Address Text 50
Picture OLE Object

Email Text 20
Password Text 20

Table 3.2: Course Table

Field Name Data type Field size


Course_Code Text 6
Course_Name Text 20
Course_Unit Number 4
Nature Text 10
Department Text 20
Level Number 3
24

Table 3.3: Department Table

Field Name Data type Field size


ID Number 6
Faculty Text 15
Name Text 15

3.9 Design Tools

The technologies/tools that will be used for this work are as follows:

3.9.1 Visual Basic

Visual basic programming language allows programmers to create software


interface and code in an easy to use graphical environment. VB is the combination of
different components that are used on forms having specific attributes and actions
with the help of those components.

On the other hand, it allows programmers to develop windows-based


applications rapidly; on the other hand, it helps greatly in accessing databases, using
ADO while letting the programmer‟s use ActiveX controls and various objects.
While it is intended more to develop applications, it is also useful for games
development for particular or limited purposes, unlike C++ that is more suitable for
developing games.
25

3.9.2 Microsoft Access

Microsoft access is an information management tool, or relational database, that


helps you store information for reference, reporting and analysis. Access can
overcome the limitations found when trying to manage large amounts of information
in Excel or other spreadsheet applications.

3.10 Security Concerns of QR-code

Although we know that QR codes have advantages that have contributed to


their success, there are some inherent risks or loopholes that users should be aware of
(Averin & Zyulyarkina, 2020).

3.10.1 Phishing

QR codes with malicious URLs are often used to guide visitors to a bogus
website that needs login information. When users attempt to log in via the false login
tab, they unwittingly supply the intruder with their login credentials

3.10.2 Fraud

QR codes used in ads, such as special deals, may contain hyperlinks to a


malicious website masquerading as a legitimate website (i.e. cloned). Victims who
visit the malicious website will unwittingly provide their credit card information,
which could be used fraudulently in the future.
26

3.10.3 Malware Propagation

A user can unintentionally download malware by clicking on a malicious


URL encoded in a QR code. This malware could steal sensitive information from a
victim's computer without the victim's awareness.

3.11 Tips on Using QR-code

Users would be enticed to try QR codes as they become more popular. Let's
take a look at some warning signs and security tips that we should be aware of in
order to use QR codes safely.

i. QR codes are commonly placed on posters used for famous ads such
as movies and competitions. An attacker can easily print and overlay
his own malicious QR codes on top of the legitimate QR codes.
ii. Install a mobile security application with antivirus, antispyware and
web filtering abilities to protect your mobile devices.
iii. Until launching the associated software on your mobile devices, use a
QR code scanner that shows the content of the QR code. If the content
is a URL, the scanner can show you the URL, website info, a safety
rating for the URL, and the option to be redirected to the site by
clicking on it. This allows you to search for questionable URLs and
therefore prevents you from visiting a malicious website.
iv. If a QR code asks for personal information, don't give it out until
you're sure it's genuine. Use a browser search to find the website and
don't click on any other links or provide any details.
27

CHAPTER 4

ANALYSIS AND DISCUSSION OF RESULT

4.1 Introduction

Design and implementation refer to the real live running of the designed
program. This section consists of program modules, showing what they represent,
and how the system can be used and deployed.

4.2 Discussion of Results

Below are the system modules and how they operate, it will give the users
better understanding of how the system works.

4.2.1 The Home Page

This is the first page that opens to a user as the user opens the system. The
page gives the highlight of the website. It answers the anticipation of the user as to
what is contained in the website. It further gives the user the opportunity to browse
and navigate through the site. Below is the screenshot of the home page.
28

Figure 4.1 The Home Page

4.2.2 Users Log in Page

The user‟s login page is the page where users of the system can login and
have access to their dashboard. The login page has two-user login, the student login
and the admin login, the admin login is where the admin can have access to his own
dashboard (page), the students will login with their matric. number to gain access to
the application page. Below is the user's and the admin login page.

Figure 4.2 the User Login Page


29

4.2.3 Student and Change Password Module

This page is where a student is taken to after login in with his matric. number,
on this page there are menu links where students can carry out some operations, such
as course registration, print the examination card and can change his password.
Below is the student‟s panel.

Figure 4.3 Student and Change Password Module

4.2.4 Course Registration Module

On clicking the register course from the student panel, this is the page that is
displayed to the students, if the students matric. number is valid, some details about
the students is also displayed, the student will then go ahead and register for a course.
Below is the application module.
30

Figure 4.4 Course registrations Module

4.2.5 Exams Card Print Module

Students can view and prints their exams card from this page, below is the
students print exams card page.

Figure 4.5 Print Exam card modules


31

4.2.6 The Admin Module

This is the page that is displayed to the admin after login with his log-in ID
and password to carry out some operations. The page welcomes the admin if the
userid and password are valid. The page has menu links where the admin can
navigate to carry out the operations. The admin dashboard is shown below.

Figure 4.6 Admin Dash Board

4.3 Results
Below shows the QR code scanned using a mobile phone and also display the
results of the scanned QR code.
32

Figure 4.7 QR-code to be scanned

Figure 4.8 Results of The Scanned QR-code


33

CHAPTER 5

CONCLUSION AND RECOMENDATION

5.1 Summary

This project work titled “QR-code based examination card verification


system” developed, is based on the analysis of the existing system. Identification of
the drawbacks of the existing system led to the designing of the computerized system
that will be compatible with the existing system, the proposed system is user friendly
and more GUI oriented.

This research project was able to build a QR-code based examination card
verification system for Kebbi State University of Science And Technology to
manage the processes involved in examination card issuing system and management.
Having a robust database, it stores every information as related to courses and
students. It also allows updating of such information, as it is one of the activities of
file processing and the characteristics of a database.

5.2 Review of Achievement

The QR code-based examination card verification system has been tested and
found to achieve the following:
i. Courses registrations by the students.
ii. printing of examinations card
34

iii. Ensure security of information.


iv. Ability to embed students record in to the QR-code and can later
be verified using QR scanner.

5.3 Area of Application

This software can be used by any institution that uses the same examination
card management system and course registrations policy with Kebbi State
University of Science and Technology, which is applicable to all institutions of
higher learning in Nigeria.

5.4 Conclusions

In conclusion, the QR code-based examination verification system developed


with Visual basic provides a platform for students of Kebbi State University of
Science and Technology, to carry out their courses registration, printing of
examinations card with QR code attached to it and to also enable the Admin manage
the system. The proposed system is faster and efficient compared to the existing
system and can perform the following task:
i. Course registration
ii. Enables students, course and departments information management
iii. Printing of examinations card with QR code attached to it.

5.5 Recommendation

The researcher wishes to recommend that, other researchers should work on


areas such as the implementation of the Android based QR code examination card
verification system.
35

REFERENCES

Ahmed, H. A., & Jang, J. (2017). Higher Educational Certificate


Authentication System Using QR Code Tag. 12(20), 9728–9734.
Averin, A., & Zyulyarkina, N. (2020). 2020 Global Smart Industry
Conference ( GloSIC ) South Ural State University ( national research university
). December, 18–19. https://doi.org/10.1109/GloSIC50886.2020.9267840
Ayeleso, E. C., Adekiigbe, A., Onyeka, N. C., & Oladele, M. O. (2017).
Identity Card Authentication System Using QR Code and Smartphone. 2(9), 61–
67.
Bajpai, M., & Agrawal, A. P. (2013). Integration of 2 D Secure Barcode
in Identity Cards : A New Approach. 2(4), 1225–1233.
Haque, S., & Dybowski, R. (2014). Advanced QR Code Based Identity
Card : A New Era for Generating Student ID Card in Developing Countries. 76–
82. https://doi.org/10.1109/SIMS.2014.24
Hui, K. L., Pan, S. L., & Tan, B. (2014). The Impact of Internet on
Education : Towards an Emerging Paradigm The Impact of Internet on
Education : Towards an Emerging Paradigm. January 2001.
Kumar, B. D., & Kareemulla, S. (2017). Smart Mobile Attendance System
for Employees Using QR Scanner. 1(5), 35–39.
Shettar, I. M. (2020). Quick Response ( QR ) Codes in Libraries : Case
study on the use of QR codes in the Central Library , NITK. April 2016.
Ump, P. (n.d.). CERTIFICATE AUTHENTICATION SYSTEM USING QR
CODE CHAN MN TING ( GRAPHICS & MULTIMEDIA TECHNOLOGY ).
Wei, X., Manori, A., Devnath, N., Pasi, N., & Kumar, V. (2017). QR
Code Based Smart Attendance System. 5(1), 1–10.
Yakub, S. (2018). Student Identity Card Based On Advanced Quick
Response Code Technology. October.

Ahmed, H. A., & Jang, J. (2017). Higher Educational Certificate


Authentication System Using QR Code Tag. 12(20), 9728–9734.
Averin, A., & Zyulyarkina, N. (2020). 2020 Global Smart Industry
Conference ( GloSIC ) South Ural State University ( national research university
). December, 18–19. https://doi.org/10.1109/GloSIC50886.2020.9267840
36

Ayeleso, E. C., Adekiigbe, A., Onyeka, N. C., & Oladele, M. O. (2017).


Identity Card Authentication System Using QR Code and Smartphone. 2(9), 61–
67.
Bajpai, M., & Agrawal, A. P. (2013). Integration of 2 D Secure Barcode
in Identity Cards : A New Approach. 2(4), 1225–1233.
Haque, S., & Dybowski, R. (2014). Advanced QR Code Based Identity
Card : A New Era for Generating Student ID Card in Developing Countries. 76–
82. https://doi.org/10.1109/SIMS.2014.24
Hui, K. L., Pan, S. L., & Tan, B. (2014). The Impact of Internet on
Education : Towards an Emerging Paradigm The Impact of Internet on
Education : Towards an Emerging Paradigm. January 2001.
Kumar, B. D., & Kareemulla, S. (2017). Smart Mobile Attendance System
for Employees Using QR Scanner. 1(5), 35–39.
Shettar, I. M. (2020). Quick Response ( QR ) Codes in Libraries : Case
study on the use of QR codes in the Central Library , NITK. April 2016.
Ump, P. (n.d.). CERTIFICATE AUTHENTICATION SYSTEM USING QR
CODE CHAN MN TING ( GRAPHICS & MULTIMEDIA TECHNOLOGY ).
Wei, X., Manori, A., Devnath, N., Pasi, N., & Kumar, V. (2017). QR
Code Based Smart Attendance System. 5(1), 1–10.
Yakub, S. (2018). Student Identity Card Based On Advanced Quick
Response Code Technology. October.
37

APPENDIX

APPENDICES A:

connections
Imports System.Data.OleDb
Module Module1

Public cn As New OleDbConnection


Public cm As New OleDbCommand
Public dr As OleDbDataReader
Public da As OleDbDataAdapter
Public strUser As String
Public strPass As String
Public strName As String
Public strUsertype As String
Public strStatus As String
Public strSession As String
Public strSemester As String
Public str1 As String
Public str2 As String
Public str3 As String
Public str4 As String
Public str5 As String
Public str6 As String
Public str7 As String
Public str8 As String
Public str9 As String
Public str10 As String

Sub ConnectToDB()
Try
With cn
.ConnectionString = "Provider=Microsoft.ACE.OLEDB.12.0;Data
Source=|DataDirectory|\CourseReg_DB.accdb"
End With
Catch ex As Exception
cn.Close()
End Try
End Sub

End Module

APPENDICES B:
Admin Module
Imports System.Data.OleDb
Imports System.IO
Public Class frmAdmin

Dim da As New OleDbDataAdapter


Dim bytImage() As Byte
Private Sub PictureBox1_Click(sender As Object, e As EventArgs) Handles PictureBox1.Click
Me.Dispose()
End Sub

Private Sub btnAdd_Click(sender As Object, e As EventArgs) Handles btnAdd.Click


If Len(Trim(txtUsername.Text)) = 0 Then
MsgBox("Enter a Username?", vbCritical)
txtUsername.Focus()
Return
End If
If Len(Trim(txtPassword.Text)) = 0 Then
MsgBox("Enter a Password?", vbCritical)
txtPassword.Focus()
Return
End If
If Len(Trim(txtCPassword.Text)) = 0 Then
MsgBox("Re-enter your password?", vbCritical)
txtCPassword.Focus()
Return
End If
If txtPassword.Text <> txtCPassword.Text Then
MsgBox("Confirm password do not match?", vbCritical)
Return
38

End If
If Len(Trim(cboQuestion.Text)) = 0 Or cboQuestion.Text = "N/A" Then
MsgBox("Select a security question?", vbCritical)
cboQuestion.Focus()
Return
End If
If Len(Trim(txtAnswer.Text)) = 0 Then
MsgBox("Enter your security answer?", vbCritical)
txtAnswer.Focus()
Return
End If
If Len(Trim(cboStatus.Text)) = 0 Then
MsgBox("Select status?", vbCritical)
cboStatus.Focus()
Return
End If
If Len(Trim(cboUserType.Text)) = 0 Then
MsgBox("Select usertype?", vbCritical)
cboUserType.Focus()
Return

Else
Try
Dim da As New OleDbDataAdapter("SELECT [Username] FROM tblAdminLogin WHERE [Username] = '" &
txtUsername.Text & "'", cn)

Dim dt As New DataTable


da.Fill(dt)

If dt.Rows.Count > 0 Then


MsgBox("Username already exist!", vbCritical)
Exit Sub
cn.Close()
End If

Dim ms As New System.IO.MemoryStream


Dim bmpImage As New Bitmap(RegPic.Image)

bmpImage.Save(ms, System.Drawing.Imaging.ImageFormat.Jpeg)
bytImage = ms.ToArray()
ms.Close()

If MsgBox("Check well before submitting!", vbQuestion + vbYesNo) = vbYes Then


cn.Open()
cm = New OleDbCommand("INSERT INTO tblAdminLogin
([Username],[Password],[Question],[Answer],[Picture],[Status],[Usertype]) VALUES('" & txtUsername.Text & "','" & txtPassword.Text & "','" &
cboQuestion.Text & "','" & txtAnswer.Text & "',@d1,'" & cboStatus.Text & "','" & cboUserType.Text & "')", cn)
cm.Parameters.AddWithValue("@d1", bytImage)
cm.ExecuteNonQuery()
MsgBox("Account Created Successfully", vbInformation)
Clear()
LoadRecord()
frmAdminMenu.LoadName()
cn.Close()
End If
Catch ex As Exception
MsgBox(ex.Message)
End Try
End If
End Sub

Private Sub btnUpdate_Click(sender As Object, e As EventArgs) Handles btnUpdate.Click


If Len(Trim(txtUsername.Text)) = 0 Then
MsgBox("Enter a Username?", vbCritical)
txtUsername.Focus()
Return
End If
If Len(Trim(txtPassword.Text)) = 0 Then
MsgBox("Enter a Password?", vbCritical)
txtPassword.Focus()
Return
End If
If Len(Trim(txtCPassword.Text)) = 0 Then
MsgBox("Re-enter your password?", vbCritical)
txtCPassword.Focus()
Return
End If
If txtPassword.Text <> txtCPassword.Text Then
MsgBox("Confirm password do not match?", vbCritical)
Return
End If
If Len(Trim(cboQuestion.Text)) = 0 Or cboQuestion.Text = "N/A" Then
MsgBox("Select a security question?", vbCritical)
cboQuestion.Focus()
Return
End If
If Len(Trim(txtAnswer.Text)) = 0 Then
39

MsgBox("Enter your security answer?", vbCritical)


txtAnswer.Focus()
Return
End If
If Len(Trim(cboStatus.Text)) = 0 Then
MsgBox("Select status?", vbCritical)
cboStatus.Focus()
Return
End If
If Len(Trim(cboUserType.Text)) = 0 Then
MsgBox("Select usertype?", vbCritical)
cboUserType.Focus()
Return

Else
Try

Dim ms As New System.IO.MemoryStream


Dim bmpImage As New Bitmap(RegPic.Image)

bmpImage.Save(ms, System.Drawing.Imaging.ImageFormat.Jpeg)
bytImage = ms.ToArray()
ms.Close()

If MsgBox("Check well before submitting!", vbQuestion + vbYesNo) = vbYes Then


cn.Open()
cm = New OleDbCommand("UPDATE tblAdminLogin SET [Password] = '" & txtPassword.Text & "',[Question] = '" &
cboQuestion.Text & "',[Answer] = '" & txtAnswer.Text & "',[Picture] = @d1,[Status] = '" & cboStatus.Text & "',[Usertype] = '" &
cboUserType.Text & "' WHERE [Username] = '" & txtUsername.Text & "'", cn)
cm.Parameters.AddWithValue("@d1", bytImage)
cm.ExecuteNonQuery()
MsgBox("Account Updated Successfully", vbInformation)
Clear()
LoadRecord()
frmAdminMenu.LoadName()
cn.Close()
End If
Catch ex As Exception
MsgBox(ex.Message)
End Try
End If
End Sub

Private Sub btnRemove_Click(sender As Object, e As EventArgs) Handles btnRemove.Click


If Len(Trim(txtUsername.Text)) = 0 Then
MsgBox("Enter a Username?", vbCritical)
txtUsername.Focus()
Return
End If
If Len(Trim(txtPassword.Text)) = 0 Then
MsgBox("Enter a Password?", vbCritical)
txtPassword.Focus()
Return
End If
If Len(Trim(txtCPassword.Text)) = 0 Then
MsgBox("Re-enter your password?", vbCritical)
txtCPassword.Focus()
Return
End If
If txtPassword.Text <> txtCPassword.Text Then
MsgBox("Confirm password do not match?", vbCritical)
Return
End If
If Len(Trim(cboQuestion.Text)) = 0 Or cboQuestion.Text = "N/A" Then
MsgBox("Select a security question?", vbCritical)
cboQuestion.Focus()
Return
End If
If Len(Trim(txtAnswer.Text)) = 0 Then
MsgBox("Enter your security answer?", vbCritical)
txtAnswer.Focus()
Return
End If
If Len(Trim(cboStatus.Text)) = 0 Then
MsgBox("Select status?", vbCritical)
cboStatus.Focus()
Return
End If
If Len(Trim(cboUserType.Text)) = 0 Then
MsgBox("Select usertype?", vbCritical)
cboUserType.Focus()
Return

Else
Try

Dim ms As New System.IO.MemoryStream


40

Dim bmpImage As New Bitmap(RegPic.Image)

bmpImage.Save(ms, System.Drawing.Imaging.ImageFormat.Jpeg)
bytImage = ms.ToArray()
ms.Close()

If MsgBox("Check well before submitting!", vbQuestion + vbYesNo) = vbYes Then


cn.Open()
cm = New OleDbCommand("DELETE FROM tblAdminLogin WHERE [Username] = '" & txtUsername.Text & "'", cn)
cm.Parameters.AddWithValue("@d1", bytImage)
cm.ExecuteNonQuery()
MsgBox("Account Deleted Successfully", vbInformation)
Clear()
LoadRecord()
frmAdminMenu.LoadName()
cn.Close()
End If
Catch ex As Exception
MsgBox(ex.Message)
End Try
End If
End Sub

Sub LoadRecord()

DataGridView1.DataSource = Nothing
cm = New OleDbCommand("SELECT * from tblAdminLogin", cn)
da = New OleDbDataAdapter(cm)

Dim ds As New DataSet

da.Fill(ds, "tblAdminLogin")
DataGridView1.DataSource = ds
DataGridView1.DataMember = "tblAdminLogin"

cn.Close()
DataGridView1.Refresh()
DataGridView1.RefreshEdit()
End Sub

Sub Clear()
txtUsername.Clear()
txtPassword.Clear()
txtCPassword.Clear()
cboQuestion.Text = ""
cboStatus.Text = ""
cboUserType.Text = ""
txtAnswer.Clear()
RegPic.Image = RegPic.InitialImage

End Sub

Private Sub btnImage_Click(sender As Object, e As EventArgs) Handles btnImage.Click


Try
With OpenFileDialog1
.Filter = "images files(*.bmp;*.jpg;*.png;*.gif)|*.bmp*;*.jpg;*.png;*.gif;"
.FilterIndex = 4
End With
OpenFileDialog1.FileName = ""
If OpenFileDialog1.ShowDialog = DialogResult.OK Then
RegPic.Image = Image.FromFile(OpenFileDialog1.FileName)
End If
Catch ex As Exception
MsgBox(ex.ToString)
End Try
End Sub

Private Sub frmAdmin_Load(sender As Object, e As EventArgs) Handles MyBase.Load


ConnectToDB()
LoadRecord()
End Sub

Private Sub DataGridView1_CellContentClick(sender As Object, e As DataGridViewCellEventArgs) Handles


DataGridView1.CellContentClick
txtUsername.Text = DataGridView1.CurrentRow.Cells(0).Value.ToString
txtPassword.Text = DataGridView1.CurrentRow.Cells(1).Value.ToString
txtCPassword.Text = DataGridView1.CurrentRow.Cells(1).Value.ToString
cboQuestion.Text = DataGridView1.CurrentRow.Cells(2).Value.ToString
txtAnswer.Text = DataGridView1.CurrentRow.Cells(3).Value.ToString

Dim bytes As [Byte]() = DataGridView1.CurrentRow.Cells(4).Value


Dim ms As New MemoryStream(bytes)
RegPic.Image = Image.FromStream(ms)

cboStatus.Text = DataGridView1.CurrentRow.Cells(5).Value.ToString
cboUserType.Text = DataGridView1.CurrentRow.Cells(6).Value.ToString
End Sub
41

End Class

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy