SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
COLLEGE OF ENGINEERING, DESIGN, ART AND
TECHNOLOGY
DEPARTMENT OF ELECTRICAL AND COMPUTER
ENGINEERING
Project Title: A smart Examination Permit using the Student ID
Kaweesi Simon Peter
10/U/10079/PS
210008165
Project partner: Kajibwami Micheal
Thesis
Report submitted in partial fulfillment of the requirements for the award of the
Degree of Bachelors of Science in Computer Engineering
JUNE 2014
Makerere University
i
DECLARATION
I, Kaweesi Simon Peter declare that the information represented in this thesis is original
and has never been presented anywhere for academic purposes.
......................................................................
Kaweesi Simon Peter
I the supervisor of the above named student has analyzed the content of this research
paper and certify by the power entrusted with me that it measures up to the requirements
of the College of Engineering, Design, Art and Technology, Department of Electrical and
Computer Engineering for the award of a Bachelor of Science Degree in Computer
Engineering of Makerere University
Main Supervisor
Mr. MAXIMUS BYAMUKAMA
Assistant Lecturer
Department of Electrical and Computer Engineering
College of Engineering, Design, Art and Technology
Makerere University
Contact…..........................................
Signature…………………………
Date………………………………
ii
DEDICATION
I dedicate this achievement to my dear beloved Mother Ms Nakacwa Prossy for the
relentless support, provision she extended to me during these four years at Engineering
school. Thank you So much and may the good Lord reward you abundantly.
iii
ACKNOWLEDGEMENT
The journey at engineering school has been a journey of self-Discovery a lot of learning. I
thank the Almighty Lord who gave me that splendid opportunity to set foot in Engineering
School.
For the incredible support, inspiration and motivation, I am greatly indebted to
Mr.Maximus Byamukama. In many aspects of my research, he shared his experience with
me, he me to better the application I was developing i will surely be forever grateful. May
God richly bless you.
Special thanks go to my Project Partner Kajibwami Micheal who was the project
manager for the relentless effort you put in to ensure that this project was a success. God
Richly bless you
iv
TABLE OF CONTENTS
DECLARATION……………………………………………………………………………………………………… i
DEDICATION………………………………………………………………………………………………………… ii
ACKNOWLEDGEMENT………………………………………………………………………………………….. iii
LIST OF FIGURES………………………………………………………………………………………………….. vi
LIST OF TABLES……………………………………………………………………………………………………. vii
CHAPTER ONE: INTRODUCTION…………………………………………………………………………… 1
1.2 Statement of Problem……………………………………………………………………………………..…………. 2
1.3 Research of Objectives ……………………………………………………………………………………………… 3
1.3.1 Main ……………………………………………………………………………………………………………………. 3
1.3.2 Specific ………………………………………………………………………………………………………………... 3
1.4 Justification ………………………………………………………………………………………………………………. 3
1.5 Scope ………………………………………………………………………………………………………………………… 4
1.6 Conceptual Framework ……………………………………………………………………………………………. 5
CHAPTER TWO: LITERATURE REVIEW ……………………………………………………………….. 6
2.1 Authentication ……………………………………………………………………………………………………….. 6
2.1.1 Types of Authentication ……………………………………………………………………………………… 6
2.2 Authorization …………………………………………………………………………………………………………. 7
2.2.1 Types of Authorization ………………………………………………………………………………………… 8
2.3 Relationship between Authentication and Authorization ……………………………………… 9
2.4. Tools used in Authentication and Authorization …………………………………………………. 10
2.4.1. Card Readers ………………………….…………………………………………………………………………. 10
2.4.2 Radius Server …………………………………………………………………………………………………….. 15
2.5. SMART ID Architecture ………………………………………………………………………………………….. 17
CHAPTER THREE: DESIGN AND IMPLEMENTATION…………………………………………… 19
v
3.1 System Design …………………………………………………………………………………………………….. 19
3.2. System Flow Diagram ………………………………………………………………………………………… 20
3.3 Data Design ……………………………………………………………………………………………………….. 22
3.3.1 Data Description ………………………………………………………………………………………………. 22
3.4 Testing ……………………………………………………………………………………………………………….. 29
3.5 Implementation ………………………………………………………………………………………………….. 29
3.6 Ethical Consideration ………………………………………………………………………………………….. 31
CHAPTER FOUR:RESULTS PRESENTATIONS AND CONCLUSIONS 32
4.1Summary of results ………………………………………………………………………………………………. 32
4.2 Limitations ………………………………………………………………………………………………………….. 32
4.3 Recommendations ……………………………………………………………………………………………… 32
REFERENCES ………………………………………………………………………………………………….. 33
APPENDICIES …………………………………………………………………………………………………. 34
vi
LIST OF FIGURES
Fig 1:1 Makerere University Main Building…………………………………...…………….……1
Fig 1:2 Students make a queue to pick their Examination permits…………….….........2
Fig 1:3 The Snippet of the Conceptual Plan……………………………………………………….5
Fig 2:1 Relationship between Authentication and Authorization…………….…………..9
Fig 2:2 Magnetic Strip Card Reader………………………………………….………..………………9
Fig 2:3 A Representation of Barcode types………………………………………………………..10
Fig 2:4 Reading a Barcode using a Scanner…………………………………………………….....10
Fig 2:5 A Pictorial View of the exciting types of Barcode Scanners………………….......14
Fig 2:6 RADIUS Authentication and Authorization Flow………………………………….....15
Fig 2:7 The Makerere University MakAir Radius Server………………………………..…....16
Fig 2:8 Using Smart card Reader with computer system………………………..……………17
Fig 2:9 Interfacing card reader with the smart phone………………….…………………….17
Fig 3:1 System Flow Diagram…………………………………………………………………………..19
Fig 3:2 Entity Relation Diagram……………………………………………………………………… 21
vii
LIST OF TABLES
Table 1:1 The desired Milestones to be achieved………………………………………………15
1
CHAPTER ONE: INTRODUCTION
1.1 Background
Figure 1:1 Makerere University Main Building
Vision.
“To be the leading institution for academic excellence and innovations in Africa.”
Mission.
“To provide innovative teaching, learning, research and services responsive to National
and Global needs.”
The College soon began offering various other courses in Medical Care, Agriculture,
Veterinary Sciences and Teacher Training. It expanded over the years to become a
Center for Higher Education in East Africa in 1935. In 1937, the College started
developing into an institution of higher education, offering post-school certificate
courses.
In 1949, it became a University College affiliated to the University College of London,
offering courses leading to the general degrees of its then mother institution. With the
establishment of the University of East Africa in June 29, 1963, the special relationship
with the University of London came to a close and degrees of the University of East
Africa were instituted.
On July 1, 1970, Makerere became an independent national university of the Republic of
Uganda, offering undergraduate and postgraduate courses leading to its own awards.
Established in 1922 as a humble technical
school, Makerere University is one of the
oldest and most prestigious Universities in
Africa. In January of that year, the school,
which was later renamed Uganda Technical
College, opened its doors to 14 day students
who began studying Carpentry, Building
and Mechanics.
2
Makerere University offers not only day but also evening and external study
programmes to a student body of about 35,000 undergraduates and 3,000
postgraduates (both Ugandan and foreign). It is also a very active center for research.
The University transitioned from the Faculty-based to the collegiate system on 1st July
2011 and as of Friday 30th December 2011, Makerere University officially transformed
into a Collegiate University with 9 Constituent Colleges and one School, operating as
semi-autonomous units of the University.
1.2 Statement of Problem.
For a university whose track record has remained un-matched in the region for many
years, it requires great systems in place to keep it as a pinnacle of intellectualism, the
epitome of understanding, the icon of knowledge and the summit of wisdom.
For a long time, Makerere University has tried to put Information technology at the
center of many operation in this great university expect in the area where we saw a
serious problem.
The use of paper Examinations permit has presented a serious challenge to the major
university stake holders (students) as well as the administrators.
Figure 1.2: Student Make a queue to pick Examination Permit
3
Despite the various improvements in the permit processing procedure, the challenges of
using the paper Examination Permits are still immense.
1.3Research of Objectives
1.3.1 Main
To develop a smart Examination permit verified using a barcode Scanner.
1.3.2 Specific
To develop an Electronic permit to replace the Paper Examination permits.
Create a database that stores student Details against which authentication can be
done.
1.4 Justification
Makerere stormed into the top-five tier of universities in Africa after beating
competition from four South African universities to make it to number four in just seven
months, according to ranking released by Webometrics, an organization that monitors
university performance worldwide.
Considering the illustration below that depicts the tedious and less efficient process of
acquiring an Examination. With the large number of students, this process presents a
challenge during the examination period.
With the current system that is being used by the University, students pay their Tuition
almost one week to the Examinations time and this puts the University Financial
Students Online Registration
University retrieves
Students Financial
Records
Printing and Issuing of
Examination Permits
4
position in a worrying state because it finds it had to collectively cater for the students’
needs plus the Lecturers who have constantly complained about lack of teaching
facilities to ease their work and this has put the University in a state of not being able to
pay it’s service providers in time hence the rampant strikes at the University.
For a University that is currently ranked fourth in Africa, this puts it in state that needs
urgent help in its implementation and delivery of service hence the idea of
implementing the proposed system as it can be simply illustrated below
1.5 Scope
The proposed system will be used in the University in the different colleges has a way of
helping students easily access their financial details. The system entails designing a
virtual database using Mysql,a user interface using C#, a barcode scanner and
together connected to a Network via a computer system as shown below
Computer System
Virtual Database
(Financial DB)
Hardware
(Readers and IDs)
Students’/Lecturers User
interface
5
This will be for the presentation purpose and when approved, it will be upgraded to a
standalone system that can be fixed at the entrances to Examination rooms that will
authenticate the students as shown in the illustration below
1.6 Conceptual Framework
Figure 1.3: The Snippet of the Conceptual Plan
6
CHAPTER TWO: LITERATURE REVIEW
2.1 Authentication
This is the act of confirming the truth of an attribute of a datum or entity. This might
involve confirming the identity of a person or software program, tracing the origins of
an artifact, or ensuring that a product is what it’s packaging and labeling claims to be.
Authentication often involves verifying the validity of at least one form of identification.
Categorically, Authentication is;
The first type of authentication is accepting proof of identity given by a credible person
who has evidence on the said identity, or on the originator and the object under
assessment as the originator's artifact respectively.
The second type of authentication is comparing the attributes of the object itself to
what is known about objects of that origin. For example, an art expert might look for
similarities in the style of painting, check the location and form of a signature, or
compare the object to an old photograph. An archaeologist might use carbon dating to
verify the age of an artifact, do a chemical analysis of the materials used, or compare the
style of construction or decoration to other artifacts of similar origin.
The third type of authentication relies on documentation or other external
affirmations. For example, the rules of evidence in criminal courts often require
establishing the chain of custody of evidence presented. This can be accomplished
through a written evidence log, or by testimony from the police detectives and forensics
staff that handled it.
2.1.1 Types of Authentication
 Password based authentication
Requires the user to know some predetermined quantity (their password)
Advantages: Easy to implement, requires no special equipment.
Disadvantages: Easy to forget password. User can tell another user their
password. Password can be written down. Password can be reused.
7
 Device based authentication
Requires the user to possess some item such as a key, magnetic strip, card, key
device, etc.
Advantages: Difficult to copy and cannot forget password. If used with a PIN is
near useless if stolen.
Disadvantages: Must have device to use service so the user might forget it at
home.
Easy to target for theft. Still doesn't actually actively identify the user.
 Biometric Authentication
Use of the Biometric means to verify user e.g. use of voice, thumb print and Facial
recognition. This type of authentication utilizes the body parts of the user for
identity and it’s the most recent and commonly used mean of authentication. The
types below follow under this category.
1. Retina Scanners:
Advantages: Accurately identifies the user when it works.
Disadvantages: New technology that is still evolving. Not perfect yet.
2. Hand Scanners:
Advantages: Difficult to separate from the user. Accurately identifies the user.
Disadvantages: Getting your hand stolen to break into a vault sucks a lot more
than getting your ID card stolen.
2.2 Authorization
This is the function of specifying access rights to resources, which is related to
information security and computer security in general and to access control in
particular. More formally, "to authorize" is to define access policy. For example, Human
resources staff is normally authorized to access employee records, and this policy is
usually formalized as access control rules in a computer system.
8
During operation, the system uses the access control rules to decide whether access
requests from (authenticated) consumers shall be approved (granted) or disapproved
(rejected). Resources include individual files or items' data, computer programs,
computer devices and functionality provided by computer applications.
2.2.1 Types of Authorization
 Server-side authorization
The server has three authorization modes. Depending on the authorization mode
we choose, the server will decide if it accepts or declines an incoming invocation.
None: This is the simplest type of authorization. No authorization will be
performed.
Self: A client will be allowed to use a grid service if the client's identity is the
same as the service's identity.
Grid map: A gridmap is a list of 'authorized users' akin to an ACL (Access Control
List). We will see them in detail later on. When this type of authorization is used,
only the users that are listed in the service's gridmap may invoke it.
 Client-side authorization
This allows the client to figure out when it will allow a grid service to be invoked.
This might seem like an odd type of authorization, since authorization is
generally seen from the server's perspective ("Do I allow client X to connect to
grid service Y?"). However, in GSI, clients have every right to be picky about the
services they can access.
None: No authorization will be performed.
Self: The client will authorize an invocation if the service's identity is the same as
the client. If we use both client-side and server-side Self authorization, a service
can be invoked if and only if its identity matches the client's.
9
Host: The client will authorize an invocation if the host returns an identity
containing the hostname. This is done using host certificates. The tutorial
currently doesn't cover host certificates, although a future version will.
2.3 Relationship between Authentication and Authorization
Authentication verifies who you are.
Authorization verifies what you are authorized to do.
Consider the illustration below;
Figure 2.1: Relationship between Authentication and Authorization
10
2.4. Tools used in Authentication and Authorization
2.4.1. Card Readers
Makerere University is currently using Barcoded enabled students’ Identification Cards.
Below is a clear description of these two types of card readers as they are the key focus
for this project. Below are the Types of Card Readers
2.4.1.1 Magnetic Stripe Card Reader
2.4.1.2 Bar Code Readers/Scanner (Preferred for Project Implementation)
Figure 2.3: A Representation of Barcode Types
A barcode reader (or barcode scanner) is an electronic device for reading
printed barcodes. Like a flatbed scanner, it consists of a light source, a lens and a light
sensor translating optical impulses into electrical ones. Additionally, nearly all barcode
A magnetic stripe card is a type of card capable of storing
data by modifying the magnetism of tiny iron-based
magnetic particles on a band of magnetic material on the
card. The magnetic stripe, sometimes called swipe card or
magstripe, is read by swiping past a magnetic reading head.
Figure 2.2: Magnetic Stripe Card
Reader
11
readers contain decoder circuitry analyzing the barcode's image data provided by the
sensor and sending the barcode's content to the scanner's output port.
Figure 2.4: Reading a barcode using a Scanner
2.4.1.2.1 Types of Barcode Scanners
Barcode readers can be differentiated by either their deployed Technology or Housing
(a)Technology
Pen-type readers
Pen-type readers consist of a light source and photodiode that are placed next to each
other in the tip of a pen or wand. To read a bar code, the person holding the pen must
move the tip of it across the bars at a relatively uniform speed. The photodiode
measures the intensity of the light reflected back from the light source as the tip crosses
each bar and space in the printed code.
The photodiode generates a waveform that is used to measure the widths of the bars
and spaces in the bar code. Dark bars in the bar code absorb light and white spaces
reflect light so that the voltage waveform generated by the photo diode is a
representation of the bar and space pattern in the bar code. This waveform is decoded
by the scanner in a manner similar to the way Morse code dots and dashes are decoded.
12
Laser scanners
Laser scanners work the same way as pen type readers except that they use
a laser beam as the light source and typically employ either a reciprocating mirror or a
rotating prism to scan the laser beam back and forth across the bar code. As with the
pen type reader, a photodiode is used to measure the intensity of the light reflected
back from the bar code.
In both pen readers and laser scanners, the light emitted by the reader is rapidly varied
in brightness with a data pattern and the photodiode receive circuitry is designed to
detect only signals with the same modulated pattern.
CCD readers
CCD readers use an array of hundreds of tiny light sensors lined up in a row in the head
of the reader. Each sensor measures the intensity of the light immediately in front of it.
Each individual light sensor in the CCD reader is extremely small and because there are
hundreds of sensors lined up in a row, a voltage pattern identical to the pattern in a bar
code is generated in the reader by sequentially measuring the voltages across each
sensor in the row.
The important difference between a CCD reader and a pen or laser scanner is that the
CCD reader is measuring emitted ambient light from the bar code whereas pen or laser
scanners are measuring reflected light of a specific frequency originating from the
scanner itself.
Camera-based readers
Two-dimensional imaging scanners are the sixth and newest type of bar code reader.
They use a camera and image processing techniques to decode the bar code.
Video camera readers use small video cameras with the same CCD technology as in a
CCD bar code reader except that instead of having a single row of sensors, a video
camera has hundreds of rows of sensors arranged in a two dimensional array so that
they can generate an image.
Large field-of-view readers use high resolution industrial cameras to capture multiple
bar codes simultaneously. All the bar codes appearing in the photo are decoded
13
instantly (ImageID patents and code creation tools) or by use of plugins (e.g.
the Barcodepedia uses a flash application and some web cam for querying a database),
have been realized options for resolving the given tasks.
Omni-directional barcode scanners
Omni-directional scanning uses "series of straight or curved scanning lines of varying
directions in the form of a starburst, a lissajous pattern, or other multi-angle
arrangement are projected at the symbol and one or more of them will be able to cross
all of the symbol's bars and spaces, no matter what the orientation.
Omni-directional scanners almost all use a laser. Unlike the simpler single-line
laser scanners, they produce a pattern of beams in varying orientations allowing them
to read barcodes presented to it at different angles.
Smartphones
Smartphones can be used in Google's mobile Android operating system via both their
own Goggles’ application or 3rd party barcode scanners like Scan.
Nokia's Symbian operating system features a barcode scanner which can scan
barcodes,[4] while mbarcode is a barcode reader for the Maemo operating system. In
the Apple iOS, a barcode reader is not automatically included, but there are more than
fifty free or paid apps available with both scanning capabilities and hard-linking to URI.
With Blackberry devices, the App World application can natively scan
barcodes. Windows Phone 8 is able to scan barcodes through the Bing search app.
(b) Housing
Barcode readers can also be distinguished based on housing design as follows:
Hand-held scanner
With a handle and typically a trigger button for switching on the light source
Pen scanner (or wand scanner)
A pen-shaped scanner that is swiped.
14
Stationary scanner
Wall-or table-mounted scanners that the barcode is passed under or beside.
These are commonly found at the checkout counters of supermarkets and
other retailers.
Fixed-position scanner
An industrial barcode reader used to identify products during manufacture or logistics.
Often used on conveyor tracks to identify cartons or pallets which need to be routed to
another process or shipping location.
Systems like this are used in factory and farm automation for quality management and
shipping.
PDA scanner (or Auto-ID PDA)
A PDA with a built-in barcode reader or attached barcode scanner.
Automatic reader
a back office equipment to read barcoded documents at high speed
(50,000/hour).
Cordless scanner (or Wireless scanner)
a cordless barcode scanner is operated by a battery fitted inside it and is not
connected to the electricity mains and transfer data to the connected device like
PC.
Fig 2:5 A pictorial view the existing types of barcode Scanners
15
2.4.2 Radius Server
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that
provides centralized Authentication, Authorization, and Accounting (AAA) management for
users that connect and use a network service, because of the broad support and the ubiquitous
nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to
the Internet or internal networks, wireless networks, and integrated e-mail services. These
networks may incorporate modems, DSL, access points, VPNs, network ports, web servers,
etc.
Authentication and Authorization by the Radius Server
The user or machine sends a request to a Remote Access Server (RAS) to gain access to
a particular network resource using access credentials. The credentials are passed to
the RAS device via the link-layer protocol - for example, Point-to-Point Protocol (PPP) in
the case of many dialup or DSL providers or posted in an HTTPS secure web form.
In turn, the RAS sends a RADIUS Access Request message to the RADIUS server,
requesting authorization to grant access via the RADIUS protocol.
This request includes access credentials, typically in the form of username and
password or security certificate provided by the user. Additionally, the request may
contain other information which the RAS knows about the user, such as its network
address or phone number, and information regarding the user's physical point of
attachment to the RAS.
16
Fig 2:6 RADIUS Authentication and Authorization Flow
Considering the above tool, Makerere University has implemented it majorly in data
roaming via wireless Internet service called MakAir that is accessed at certain points
around campus and the criteria of access is that the user must have a valid Students
Email address from the respective college of study as shown below.
Fig 2:7 The Makerere Univesity MakAir Radius Server
17
2.5. SMART ID Architecture
The 3 Tier Network architecture shall be used in this Project. This Architecture shall
contain Two Server and a Client Machine. The First Server shall be the Authentication
Server that will be used to authenticate new users of the System. The Second Server
will contain the Financial Details of Every Student. Accessing the Financial Details
Server Requires Authentication by the Authentication Server.
Figure 2:8 Using a Smart Card Reader/Scanner with a Laptop
18
Figure 2:9 Interfacing the Card Reader/Scanner with a Smart Phone
The Framework supports interfacing the smart card Reader/Barcode Reader with a
Laptop as shown in Figure1 and as well interfacing the Smart Card Reader with a Smart
Phone.
19
CHAPTER THREE: DESIGN AND IMPLEMENTATION
3.1 System Design
Computer System
Hardware
(Readers and IDs)
Students’/Lecturers
User interface
Virtual Database
(Financial DB)
Student and
Examination
Database
Student and
Examination
Database
Administrators
and Invigilator
Database
20
3.2. System Flow Diagram
Choose Course Unit to Invigilate
Exit
Is Login Valid?
START
LOAD Application
INVIGILATOR LOGIN
Yes
NoRegister?
No
Register
Yes
Is Registration
Successful?
No
Yes
Is course unit Valid? ExitNo
Scan Student Indentification Card
Yes
Print Paper Attendence
Figure 3.1: System Flow Diagram
21
The design of this project has been divided into three stages that include
Creation of required Databases
Three prototype Databases are created using Mysql platforms which include the
Students Financial and Examination Database that contains their financial
records during the semester and the papers being registered to be examined by
Lecturers after the semester.
The details of these two databases are directly gotten from the payments made by
students to the University Account and the Online/Manual Registration done by
students earlier in the semester.
The last database to be created is the Administrators’ Database who are in this
case the Examination Invigilators, this is created with details like Staff ID, Name,
Paper ID etc. and these details are entered at the Staff Login Section of the
System as shown below.
Creation of Proposed User Interfaces
The Interfaces are designed to be as simple as possible to ensure, giving Students’
Credentials which Include Names, Course done, Financial Details and Papers
Registered and the respective year of study.
The interface is programmed and designed in C# programming Language because
it’s simple and it’s meant to give a buzzing sound to both scenarios when the
Student is PERMITTED (Legible to do Exam) and NOT PERMITTED (Not Legible
to do Exam).
PERMITTED means that the Student has a balance of Zero hence legible to do the
Examination while NOT PERMITTED means that the student has not yet Cleared
his/her Tuition or didn’t register for the Examination and in both these cases, the
details are clearly shown on the interface.
The Proposed Interfaces clearly show the following details;
 Student Financial status (Amount paid and Balance)
 Seat Number (Shown only when balance is Zero)
 Student Photo and Details
 Registered Examinations
 Status -Permitted (Zero Balance)-Can do Examination
22
-Not Permitted (Balance)-Cannot do an Examination
Linking the Databases, Interfaces and Hardware
The hardware to be used is a Hand Held or Stationary Barcode Scanner to
retrieve the student Number that is stored in Barcode behind the Student IDs, that
acts has our Primary Key (PK) that uniquely identifies every student of
Makerere University.
The linking of these three platforms will be done using a Computer system with
good Processing speed and RAM to ensure the system doesn’t experience freezing
moments since it’s meant to work on quite a big number of students.
3.3 Data Design
3.3.1 Data Description
The data description is divided into 3 database design phases i.e the conceptual
database design, logical database design and the physical database design.
Conceptual Database Design
The conceptual design describes an entity relationship diagram which shows how
the different entities interact and the relationships between them as shown in the
figure below.
23
Figure3.2: Entity Relation Diagram
Logical Database design
The second stage is the logical design which involves the description of the different
entities with their attributes.
View1
Student (std_no, std_reg, std_fname, std_lname, course, sponsorship, photo, year)
Primary Key: std_no
View2:
Student_financial(financial_id,std_no,Amount_paid,Date)
Foreign Key: std_no references(Student)
View3:
Invigilatior(Invg_id,
Title,Staff_no,FirstName,LastName,photo,Department,Password)
24
Primary Key: Staff_no references(Student)
View4
Financial_structure(Financial_struct_id,course_name,course_code,course_tuition,
course_function_fees)
Primary Key: Financial_struct_id
View5:
papers(PaperID,PaperCode,PaperName,Year,Semester,Instructor,Date)
Primary Key :PaperID
Foreign Key: std_no references(Student)
View6:
Exam_time_table(exam_paper_id,course,paper_name,Year,Time,exam_room_number
)
Primary Key: Exam paper_id
Foreign Key: paper_name references (papers)
View7:
Check_in(check_in_id, seat_number, std_no, checkin_time, invg_id, paperID,status)
Primary Key: std_no
Foreign Key std_no references(student)
View8:
Papers_registered (paper_reg_id,std_no,reg_papercode,DateRegistered)
Primary Key: paper_reg_id
Foreign Key: std_no references(Student)
25
Physical Database Design
 Check_in
Check_in` (
`check_in_id` int(11) NOT NULL AUTO_INCREMENT,
`seat_number` int(11) NOT NULL,
`std_no` varchar(25) NOT NULL,
`checkin_time` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP
ON UPDATE CURRENT_TIMESTAMP
`invg_id` int(25) NOT NULL',
`paperID` int(11) NOT NULL',
PRIMARY KEY (`check_in_id`),
KEY `paperID` (`paperID`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=26 ;
 Student
Student(
`stdno` varchar(25) NOT NULL,
`std_regno` varchar(15) NOT NULL,
`std_fname` varchar(25) NOT NULL,
`std_lname` varchar(25) NOT NULL,
`course` varchar(50) NOT NULL,
`photo` varchar(50) NOT NULL,
`year` int(5) NOT NULL,
PRIMARY KEY (`stdno`)
26
) ENGINE=InnoDB DEFAULT CHARSET=latin1;
 Invigilators
invigilators` (
`invg_id` int(10) NOT NULL AUTO_INCREMENT,
`Title` varchar(20) NOT NULL,
`staff_no` int(15) NOT NULL,
`FirstName` varchar(40) NOT NULL,
`LastName` varchar(40) NOT NULL,
`photo` blob NOT NULL,
`Department` varchar(40) NOT NULL,
`Password` varchar(40) NOT NULL,
PRIMARY KEY (`invg_id`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;
 Financial Stucture
`financial_structure` (
`financial_struct_id` int(11) NOT NULL AUTO_INCREMENT,
`course_name` varchar(50) NOT NULL,
`course_code` varchar(5) NOT NULL,
`course_tuition` decimal(10,2) NOT NULL,
`course_function_fees` decimal(10,2) NOT NULL,
PRIMARY KEY (`financial_struct_id`)
27
) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;
 Student Financials
`student_financials` (
`financial_id` int(11) NOT NULL AUTO_INCREMENT,
`std_no` varchar(25) NOT NULL,
`Amount_Paid` decimal(12,0) NOT NULL DEFAULT '0',
`Date` datetime NOT NULL,
PRIMARY KEY (`financial_id`),
UNIQUE KEY `std_no` (`std_no`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=4 ;
 Exam time table
exam_time_table` (
`exam_paper_id` int(11) NOT NULL AUTO_INCREMENT,
`course` varchar(50) NOT NULL,
`paper_name` varchar(10) NOT NULL,
`Year` int(2) NOT NULL,
`Time` datetime NOT NULL,
`exam_room_number` int(5) NOT NULL,
PRIMARY KEY (`exam_paper_id`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=2 ;
28
 Papers Registered
papers_registered` (
`paper_reg_id` int(11) NOT NULL AUTO_INCREMENT,
`std_no` int(10) NOT NULL,
`reg_papercode` varchar(7) NOT NULL,
`DateRegistered` timestamp NOT NULL DEFAULT
CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
PRIMARY KEY (`paper_reg_id`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;
 Papers
‘papers’ (
`PaperID` int(2) DEFAULT NULL,
`PaperCode` varchar(8) DEFAULT NULL,
`PaperName` varchar(41) DEFAULT NULL,
`Year` int(1) DEFAULT NULL,
`Semester` int(1) DEFAULT NULL,
`Instructor` varchar(22) DEFAULT NULL,
`Date` varchar(10) DEFAULT NULL
) ENGINE=MyISAM DEFAULT CHARSET=utf8;
freezing moments since it’s meant to work on quite a big number of students.
29
3.4 Testing
The testing was to ensure Speed and Accuracy of the System,10 Students were used,5
with cleared Financial details, Zero Balance,3 Students with some balance on their
Tuition and 2 Students that were not registered in the Database. This was done achieve;
Instant response of the system.
Ability to retrieve information on the Student IDs.
Compare the Different reactions of the system to different Students.
To ensure the Interfaces displayed match with the students’ Financial Statuses.
Having successfully tested the system, it was surely ready to be used remotely by
anyone that desires that Makerere University needs to upgrade it’s current system.
3.5 Implementation
The implementation is into stages namely;
Testing and Presentation Purpose
This was done in preparation for graduation and Panel Presentation case that is
done on a very small scale, this is to ensure that the system is ready for
deployment to the intended users.
University Implementation
This type of implementation is our golden objective to see Makerere University
shift from Paper based Examination Permits to Electronic Examination Permits
using the Student IDs.
This is supposed to be ensured by our Supervisor, and how we manage to
convince the Panel the need for the Shift. Since this implementation is on a large
scale, we intend to make our system to be remotely accessed and Executable
(System.exe) hence can be installed on different Computer systems.
Using the Client-Server knowledge over a created Network, we can assign
computers to be used Static IP Addresses to ensure ease and less time usage as
shown below.
30
Fig 3:1 A client-Server Environment of the System
31
3.6 Ethical Consideration
Our project involves the use of students’ confidential information like their Financial
details hence for starters, we shall use the virtual database to avoid exposing this
information then when the project is ready to be implemented, the University
representative will be part of the implementation process hence their details can be
used.
Our Supervisor is to spear head the implementation of this project by Makerere
University and all the work should be done by us which includes Development, Testing,
Implementation and Maintenance.
32
CHAPTER FOUR: RESULTS PRESENTATIONS AND CONCLUSIONS
4.1Summary of results
Since this was a software based system, the set targets were met and the project was
100% functioning on a very small scale hence with this confidence we can always
upgrade it to large scale which will be our next venture when given an opportunity to
implement it.
4.2 Limitations
The major limitations of this project were two;
1. We could not get access to the University Financial Databases because they contain
very vital information of both the University and students hence we ended up using
virtue databases we created hence the implementation of this entire project will need
another great deal of work.
2. Some students IDs are really in bad shape so it was hard for us to retrieve the
information deployed in the barcode section hence this call for students to get new IDs
for the efficiency of this project in future.
3. The Scanner was of less resolution so it sometimes took longer to scan as expected.
4.3 Recommendations
We recommend this great Invention to Makerere University as an easier way of
resolving the current recognized problems as stated earlier and also considering the
cost of this entire process of Printing Examination Permits, I strongly believe this
system will bring a great relief on the University expenditure.
33
REFERENCES
1. Orouit, 20 Feb 2013, A Smart Card Framework for .NET available at
http://www.codeproject.com/Articles/16653/A-Smart-Card-Framework-for-NET [‘May
24th 2014’]
2. Smart Card Readers available at http://wikipedia.org/wiki/Smart_card [‘September
19th 2013’].
3. Klonovs, J, Kjeldgaard, C, Regan, Olsen, H 2002, Development of a Mobile EEG-based
Biometric Authentication System, Aalborg University Copenhagen, Copenhagen, Denmark.
4. Step-by-Step Guide to Installing and Using a Smart Card Reader ( February 01, 2000).
Techet.microsoft.com, [Online], Available at: Techet.microsoft.com
5. C#Programming. Available at http://www.tutorialspoint.com/csharp [‘February 5th
2014’].
6. Jesse, L. , Donald, X (December 2007) Oreilly Programming C# 5Th Edition, 44, pp.87-
100.
34
APPENDICIES
A Snippet of the proposed User Interface for PERMITTED
35
A Snippet of the proposed User Interface for NOT PERMITTED
36
A Snippet of the proposed User Interface for NOT IN DATABASE
37
A Snippet of the Invigilator Login Interface
38
A Snippet of the proposed User Interface for Students’ Examination Attendance
39
A Snippet for tht New Student Registration Interface
40
A Snippet of the Sample Interface code
40
A snippet of proposed College Expenditure on Printing

Weitere ähnliche Inhalte

Andere mochten auch

The lor ds instructions for the coming tribulation
The lor ds instructions for the coming tribulation The lor ds instructions for the coming tribulation
The lor ds instructions for the coming tribulation KIRINYAGA UNIVERSITY
 
How to survive the great tribulation and enter heaven
How to survive the great tribulation and enter heavenHow to survive the great tribulation and enter heaven
How to survive the great tribulation and enter heavenKIRINYAGA UNIVERSITY
 
Suomen Riistakeskus: Koirakokeet ja kouluttaminen
Suomen Riistakeskus: Koirakokeet ja kouluttaminenSuomen Riistakeskus: Koirakokeet ja kouluttaminen
Suomen Riistakeskus: Koirakokeet ja kouluttaminenTapio Martimo
 
презентация кладбище потом2
презентация кладбище потом2презентация кладбище потом2
презентация кладбище потом2Yochanan Kosenko
 
Sandack tax points
Sandack tax pointsSandack tax points
Sandack tax pointsjlcrane
 
The healings of the lord and endtime revival
The healings of the lord and endtime revivalThe healings of the lord and endtime revival
The healings of the lord and endtime revivalKIRINYAGA UNIVERSITY
 
Being a good planner and researcher
Being a good planner and researcherBeing a good planner and researcher
Being a good planner and researcherbenkeyworth1
 
Tuulivoima ja riistatalous
Tuulivoima ja riistatalousTuulivoima ja riistatalous
Tuulivoima ja riistatalousTapio Martimo
 

Andere mochten auch (15)

The lor ds instructions for the coming tribulation
The lor ds instructions for the coming tribulation The lor ds instructions for the coming tribulation
The lor ds instructions for the coming tribulation
 
How to survive the great tribulation and enter heaven
How to survive the great tribulation and enter heavenHow to survive the great tribulation and enter heaven
How to survive the great tribulation and enter heaven
 
Permasalahan pengapian
Permasalahan pengapianPermasalahan pengapian
Permasalahan pengapian
 
Left behind-after-the-rapture
Left behind-after-the-raptureLeft behind-after-the-rapture
Left behind-after-the-rapture
 
Suomen Riistakeskus: Koirakokeet ja kouluttaminen
Suomen Riistakeskus: Koirakokeet ja kouluttaminenSuomen Riistakeskus: Koirakokeet ja kouluttaminen
Suomen Riistakeskus: Koirakokeet ja kouluttaminen
 
презентация кладбище потом2
презентация кладбище потом2презентация кладбище потом2
презентация кладбище потом2
 
Marriage supper
Marriage supperMarriage supper
Marriage supper
 
Sandack tax points
Sandack tax pointsSandack tax points
Sandack tax points
 
gambaran umum engine
gambaran umum enginegambaran umum engine
gambaran umum engine
 
The healings of the lord and endtime revival
The healings of the lord and endtime revivalThe healings of the lord and endtime revival
The healings of the lord and endtime revival
 
Bride of-christ-prepare-now
Bride of-christ-prepare-nowBride of-christ-prepare-now
Bride of-christ-prepare-now
 
Being a good planner and researcher
Being a good planner and researcherBeing a good planner and researcher
Being a good planner and researcher
 
Tuulivoima ja riistatalous
Tuulivoima ja riistatalousTuulivoima ja riistatalous
Tuulivoima ja riistatalous
 
Nipt pcg
Nipt pcgNipt pcg
Nipt pcg
 
Anal presentation
Anal presentationAnal presentation
Anal presentation
 

Ähnlich wie KAWEESI_FINAL

Kaahwa armstrong intern report
Kaahwa armstrong intern reportKaahwa armstrong intern report
Kaahwa armstrong intern reportkaahwa Armstrong
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship reportkaahwa Armstrong
 
AMIZONER: Final Report
AMIZONER: Final ReportAMIZONER: Final Report
AMIZONER: Final ReportNeil Mathew
 
000845202 kyar nyo thinn project
000845202 kyar nyo thinn project000845202 kyar nyo thinn project
000845202 kyar nyo thinn projectKyar Nyo
 
BIT (UCSC) Final Year Project - Microfinance Loan Management System
BIT (UCSC) Final Year Project - Microfinance Loan Management SystemBIT (UCSC) Final Year Project - Microfinance Loan Management System
BIT (UCSC) Final Year Project - Microfinance Loan Management SystemThiwanka Makumburage
 
LAWRENCE NGUNJIRI MATHENGE final report
LAWRENCE NGUNJIRI  MATHENGE final reportLAWRENCE NGUNJIRI  MATHENGE final report
LAWRENCE NGUNJIRI MATHENGE final reportLawrence Ngunjiri
 
Swep report
Swep reportSwep report
Swep reportoz4don
 
Online shopping-project-documentation-template
Online shopping-project-documentation-templateOnline shopping-project-documentation-template
Online shopping-project-documentation-templateLaibaMalik17
 
India Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech ProjectIndia Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech ProjectAditya Gupta
 
Students in the director's seat: Teaching and learning across the school curr...
Students in the director's seat: Teaching and learning across the school curr...Students in the director's seat: Teaching and learning across the school curr...
Students in the director's seat: Teaching and learning across the school curr...Matthew Kearney
 
A Project Paper On Smart Gym Management System
A Project Paper On Smart Gym Management SystemA Project Paper On Smart Gym Management System
A Project Paper On Smart Gym Management SystemAmy Roman
 
Geredi NIYIBIGIRA Final Internship Report
Geredi NIYIBIGIRA Final Internship ReportGeredi NIYIBIGIRA Final Internship Report
Geredi NIYIBIGIRA Final Internship ReportNIYIBIGIRAGeredi
 
Dormitory management system project report
Dormitory management system project reportDormitory management system project report
Dormitory management system project reportShomnath Somu
 

Ähnlich wie KAWEESI_FINAL (20)

Kaahwa armstrong intern report
Kaahwa armstrong intern reportKaahwa armstrong intern report
Kaahwa armstrong intern report
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
AMIZONER: Final Report
AMIZONER: Final ReportAMIZONER: Final Report
AMIZONER: Final Report
 
Report docx
Report docxReport docx
Report docx
 
000845202 kyar nyo thinn project
000845202 kyar nyo thinn project000845202 kyar nyo thinn project
000845202 kyar nyo thinn project
 
Puvan Dissertation 2
Puvan Dissertation 2Puvan Dissertation 2
Puvan Dissertation 2
 
Siwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahayaSiwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahaya
 
BIT (UCSC) Final Year Project - Microfinance Loan Management System
BIT (UCSC) Final Year Project - Microfinance Loan Management SystemBIT (UCSC) Final Year Project - Microfinance Loan Management System
BIT (UCSC) Final Year Project - Microfinance Loan Management System
 
LAWRENCE NGUNJIRI MATHENGE final report
LAWRENCE NGUNJIRI  MATHENGE final reportLAWRENCE NGUNJIRI  MATHENGE final report
LAWRENCE NGUNJIRI MATHENGE final report
 
Swep report
Swep reportSwep report
Swep report
 
Attachment Report
Attachment ReportAttachment Report
Attachment Report
 
fac_alahari001_planczhaov1
fac_alahari001_planczhaov1fac_alahari001_planczhaov1
fac_alahari001_planczhaov1
 
Online shopping-project-documentation-template
Online shopping-project-documentation-templateOnline shopping-project-documentation-template
Online shopping-project-documentation-template
 
project report erp
project report erpproject report erp
project report erp
 
India Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech ProjectIndia Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech Project
 
Students in the director's seat: Teaching and learning across the school curr...
Students in the director's seat: Teaching and learning across the school curr...Students in the director's seat: Teaching and learning across the school curr...
Students in the director's seat: Teaching and learning across the school curr...
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
A Project Paper On Smart Gym Management System
A Project Paper On Smart Gym Management SystemA Project Paper On Smart Gym Management System
A Project Paper On Smart Gym Management System
 
Geredi NIYIBIGIRA Final Internship Report
Geredi NIYIBIGIRA Final Internship ReportGeredi NIYIBIGIRA Final Internship Report
Geredi NIYIBIGIRA Final Internship Report
 
Dormitory management system project report
Dormitory management system project reportDormitory management system project report
Dormitory management system project report
 

KAWEESI_FINAL

  • 1. COLLEGE OF ENGINEERING, DESIGN, ART AND TECHNOLOGY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING Project Title: A smart Examination Permit using the Student ID Kaweesi Simon Peter 10/U/10079/PS 210008165 Project partner: Kajibwami Micheal Thesis Report submitted in partial fulfillment of the requirements for the award of the Degree of Bachelors of Science in Computer Engineering JUNE 2014 Makerere University
  • 2. i DECLARATION I, Kaweesi Simon Peter declare that the information represented in this thesis is original and has never been presented anywhere for academic purposes. ...................................................................... Kaweesi Simon Peter I the supervisor of the above named student has analyzed the content of this research paper and certify by the power entrusted with me that it measures up to the requirements of the College of Engineering, Design, Art and Technology, Department of Electrical and Computer Engineering for the award of a Bachelor of Science Degree in Computer Engineering of Makerere University Main Supervisor Mr. MAXIMUS BYAMUKAMA Assistant Lecturer Department of Electrical and Computer Engineering College of Engineering, Design, Art and Technology Makerere University Contact….......................................... Signature………………………… Date………………………………
  • 3. ii DEDICATION I dedicate this achievement to my dear beloved Mother Ms Nakacwa Prossy for the relentless support, provision she extended to me during these four years at Engineering school. Thank you So much and may the good Lord reward you abundantly.
  • 4. iii ACKNOWLEDGEMENT The journey at engineering school has been a journey of self-Discovery a lot of learning. I thank the Almighty Lord who gave me that splendid opportunity to set foot in Engineering School. For the incredible support, inspiration and motivation, I am greatly indebted to Mr.Maximus Byamukama. In many aspects of my research, he shared his experience with me, he me to better the application I was developing i will surely be forever grateful. May God richly bless you. Special thanks go to my Project Partner Kajibwami Micheal who was the project manager for the relentless effort you put in to ensure that this project was a success. God Richly bless you
  • 5. iv TABLE OF CONTENTS DECLARATION……………………………………………………………………………………………………… i DEDICATION………………………………………………………………………………………………………… ii ACKNOWLEDGEMENT………………………………………………………………………………………….. iii LIST OF FIGURES………………………………………………………………………………………………….. vi LIST OF TABLES……………………………………………………………………………………………………. vii CHAPTER ONE: INTRODUCTION…………………………………………………………………………… 1 1.2 Statement of Problem……………………………………………………………………………………..…………. 2 1.3 Research of Objectives ……………………………………………………………………………………………… 3 1.3.1 Main ……………………………………………………………………………………………………………………. 3 1.3.2 Specific ………………………………………………………………………………………………………………... 3 1.4 Justification ………………………………………………………………………………………………………………. 3 1.5 Scope ………………………………………………………………………………………………………………………… 4 1.6 Conceptual Framework ……………………………………………………………………………………………. 5 CHAPTER TWO: LITERATURE REVIEW ……………………………………………………………….. 6 2.1 Authentication ……………………………………………………………………………………………………….. 6 2.1.1 Types of Authentication ……………………………………………………………………………………… 6 2.2 Authorization …………………………………………………………………………………………………………. 7 2.2.1 Types of Authorization ………………………………………………………………………………………… 8 2.3 Relationship between Authentication and Authorization ……………………………………… 9 2.4. Tools used in Authentication and Authorization …………………………………………………. 10 2.4.1. Card Readers ………………………….…………………………………………………………………………. 10 2.4.2 Radius Server …………………………………………………………………………………………………….. 15 2.5. SMART ID Architecture ………………………………………………………………………………………….. 17 CHAPTER THREE: DESIGN AND IMPLEMENTATION…………………………………………… 19
  • 6. v 3.1 System Design …………………………………………………………………………………………………….. 19 3.2. System Flow Diagram ………………………………………………………………………………………… 20 3.3 Data Design ……………………………………………………………………………………………………….. 22 3.3.1 Data Description ………………………………………………………………………………………………. 22 3.4 Testing ……………………………………………………………………………………………………………….. 29 3.5 Implementation ………………………………………………………………………………………………….. 29 3.6 Ethical Consideration ………………………………………………………………………………………….. 31 CHAPTER FOUR:RESULTS PRESENTATIONS AND CONCLUSIONS 32 4.1Summary of results ………………………………………………………………………………………………. 32 4.2 Limitations ………………………………………………………………………………………………………….. 32 4.3 Recommendations ……………………………………………………………………………………………… 32 REFERENCES ………………………………………………………………………………………………….. 33 APPENDICIES …………………………………………………………………………………………………. 34
  • 7. vi LIST OF FIGURES Fig 1:1 Makerere University Main Building…………………………………...…………….……1 Fig 1:2 Students make a queue to pick their Examination permits…………….….........2 Fig 1:3 The Snippet of the Conceptual Plan……………………………………………………….5 Fig 2:1 Relationship between Authentication and Authorization…………….…………..9 Fig 2:2 Magnetic Strip Card Reader………………………………………….………..………………9 Fig 2:3 A Representation of Barcode types………………………………………………………..10 Fig 2:4 Reading a Barcode using a Scanner…………………………………………………….....10 Fig 2:5 A Pictorial View of the exciting types of Barcode Scanners………………….......14 Fig 2:6 RADIUS Authentication and Authorization Flow………………………………….....15 Fig 2:7 The Makerere University MakAir Radius Server………………………………..…....16 Fig 2:8 Using Smart card Reader with computer system………………………..……………17 Fig 2:9 Interfacing card reader with the smart phone………………….…………………….17 Fig 3:1 System Flow Diagram…………………………………………………………………………..19 Fig 3:2 Entity Relation Diagram……………………………………………………………………… 21
  • 8. vii LIST OF TABLES Table 1:1 The desired Milestones to be achieved………………………………………………15
  • 9. 1 CHAPTER ONE: INTRODUCTION 1.1 Background Figure 1:1 Makerere University Main Building Vision. “To be the leading institution for academic excellence and innovations in Africa.” Mission. “To provide innovative teaching, learning, research and services responsive to National and Global needs.” The College soon began offering various other courses in Medical Care, Agriculture, Veterinary Sciences and Teacher Training. It expanded over the years to become a Center for Higher Education in East Africa in 1935. In 1937, the College started developing into an institution of higher education, offering post-school certificate courses. In 1949, it became a University College affiliated to the University College of London, offering courses leading to the general degrees of its then mother institution. With the establishment of the University of East Africa in June 29, 1963, the special relationship with the University of London came to a close and degrees of the University of East Africa were instituted. On July 1, 1970, Makerere became an independent national university of the Republic of Uganda, offering undergraduate and postgraduate courses leading to its own awards. Established in 1922 as a humble technical school, Makerere University is one of the oldest and most prestigious Universities in Africa. In January of that year, the school, which was later renamed Uganda Technical College, opened its doors to 14 day students who began studying Carpentry, Building and Mechanics.
  • 10. 2 Makerere University offers not only day but also evening and external study programmes to a student body of about 35,000 undergraduates and 3,000 postgraduates (both Ugandan and foreign). It is also a very active center for research. The University transitioned from the Faculty-based to the collegiate system on 1st July 2011 and as of Friday 30th December 2011, Makerere University officially transformed into a Collegiate University with 9 Constituent Colleges and one School, operating as semi-autonomous units of the University. 1.2 Statement of Problem. For a university whose track record has remained un-matched in the region for many years, it requires great systems in place to keep it as a pinnacle of intellectualism, the epitome of understanding, the icon of knowledge and the summit of wisdom. For a long time, Makerere University has tried to put Information technology at the center of many operation in this great university expect in the area where we saw a serious problem. The use of paper Examinations permit has presented a serious challenge to the major university stake holders (students) as well as the administrators. Figure 1.2: Student Make a queue to pick Examination Permit
  • 11. 3 Despite the various improvements in the permit processing procedure, the challenges of using the paper Examination Permits are still immense. 1.3Research of Objectives 1.3.1 Main To develop a smart Examination permit verified using a barcode Scanner. 1.3.2 Specific To develop an Electronic permit to replace the Paper Examination permits. Create a database that stores student Details against which authentication can be done. 1.4 Justification Makerere stormed into the top-five tier of universities in Africa after beating competition from four South African universities to make it to number four in just seven months, according to ranking released by Webometrics, an organization that monitors university performance worldwide. Considering the illustration below that depicts the tedious and less efficient process of acquiring an Examination. With the large number of students, this process presents a challenge during the examination period. With the current system that is being used by the University, students pay their Tuition almost one week to the Examinations time and this puts the University Financial Students Online Registration University retrieves Students Financial Records Printing and Issuing of Examination Permits
  • 12. 4 position in a worrying state because it finds it had to collectively cater for the students’ needs plus the Lecturers who have constantly complained about lack of teaching facilities to ease their work and this has put the University in a state of not being able to pay it’s service providers in time hence the rampant strikes at the University. For a University that is currently ranked fourth in Africa, this puts it in state that needs urgent help in its implementation and delivery of service hence the idea of implementing the proposed system as it can be simply illustrated below 1.5 Scope The proposed system will be used in the University in the different colleges has a way of helping students easily access their financial details. The system entails designing a virtual database using Mysql,a user interface using C#, a barcode scanner and together connected to a Network via a computer system as shown below Computer System Virtual Database (Financial DB) Hardware (Readers and IDs) Students’/Lecturers User interface
  • 13. 5 This will be for the presentation purpose and when approved, it will be upgraded to a standalone system that can be fixed at the entrances to Examination rooms that will authenticate the students as shown in the illustration below 1.6 Conceptual Framework Figure 1.3: The Snippet of the Conceptual Plan
  • 14. 6 CHAPTER TWO: LITERATURE REVIEW 2.1 Authentication This is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person or software program, tracing the origins of an artifact, or ensuring that a product is what it’s packaging and labeling claims to be. Authentication often involves verifying the validity of at least one form of identification. Categorically, Authentication is; The first type of authentication is accepting proof of identity given by a credible person who has evidence on the said identity, or on the originator and the object under assessment as the originator's artifact respectively. The second type of authentication is comparing the attributes of the object itself to what is known about objects of that origin. For example, an art expert might look for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph. An archaeologist might use carbon dating to verify the age of an artifact, do a chemical analysis of the materials used, or compare the style of construction or decoration to other artifacts of similar origin. The third type of authentication relies on documentation or other external affirmations. For example, the rules of evidence in criminal courts often require establishing the chain of custody of evidence presented. This can be accomplished through a written evidence log, or by testimony from the police detectives and forensics staff that handled it. 2.1.1 Types of Authentication  Password based authentication Requires the user to know some predetermined quantity (their password) Advantages: Easy to implement, requires no special equipment. Disadvantages: Easy to forget password. User can tell another user their password. Password can be written down. Password can be reused.
  • 15. 7  Device based authentication Requires the user to possess some item such as a key, magnetic strip, card, key device, etc. Advantages: Difficult to copy and cannot forget password. If used with a PIN is near useless if stolen. Disadvantages: Must have device to use service so the user might forget it at home. Easy to target for theft. Still doesn't actually actively identify the user.  Biometric Authentication Use of the Biometric means to verify user e.g. use of voice, thumb print and Facial recognition. This type of authentication utilizes the body parts of the user for identity and it’s the most recent and commonly used mean of authentication. The types below follow under this category. 1. Retina Scanners: Advantages: Accurately identifies the user when it works. Disadvantages: New technology that is still evolving. Not perfect yet. 2. Hand Scanners: Advantages: Difficult to separate from the user. Accurately identifies the user. Disadvantages: Getting your hand stolen to break into a vault sucks a lot more than getting your ID card stolen. 2.2 Authorization This is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. More formally, "to authorize" is to define access policy. For example, Human resources staff is normally authorized to access employee records, and this policy is usually formalized as access control rules in a computer system.
  • 16. 8 During operation, the system uses the access control rules to decide whether access requests from (authenticated) consumers shall be approved (granted) or disapproved (rejected). Resources include individual files or items' data, computer programs, computer devices and functionality provided by computer applications. 2.2.1 Types of Authorization  Server-side authorization The server has three authorization modes. Depending on the authorization mode we choose, the server will decide if it accepts or declines an incoming invocation. None: This is the simplest type of authorization. No authorization will be performed. Self: A client will be allowed to use a grid service if the client's identity is the same as the service's identity. Grid map: A gridmap is a list of 'authorized users' akin to an ACL (Access Control List). We will see them in detail later on. When this type of authorization is used, only the users that are listed in the service's gridmap may invoke it.  Client-side authorization This allows the client to figure out when it will allow a grid service to be invoked. This might seem like an odd type of authorization, since authorization is generally seen from the server's perspective ("Do I allow client X to connect to grid service Y?"). However, in GSI, clients have every right to be picky about the services they can access. None: No authorization will be performed. Self: The client will authorize an invocation if the service's identity is the same as the client. If we use both client-side and server-side Self authorization, a service can be invoked if and only if its identity matches the client's.
  • 17. 9 Host: The client will authorize an invocation if the host returns an identity containing the hostname. This is done using host certificates. The tutorial currently doesn't cover host certificates, although a future version will. 2.3 Relationship between Authentication and Authorization Authentication verifies who you are. Authorization verifies what you are authorized to do. Consider the illustration below; Figure 2.1: Relationship between Authentication and Authorization
  • 18. 10 2.4. Tools used in Authentication and Authorization 2.4.1. Card Readers Makerere University is currently using Barcoded enabled students’ Identification Cards. Below is a clear description of these two types of card readers as they are the key focus for this project. Below are the Types of Card Readers 2.4.1.1 Magnetic Stripe Card Reader 2.4.1.2 Bar Code Readers/Scanner (Preferred for Project Implementation) Figure 2.3: A Representation of Barcode Types A barcode reader (or barcode scanner) is an electronic device for reading printed barcodes. Like a flatbed scanner, it consists of a light source, a lens and a light sensor translating optical impulses into electrical ones. Additionally, nearly all barcode A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by swiping past a magnetic reading head. Figure 2.2: Magnetic Stripe Card Reader
  • 19. 11 readers contain decoder circuitry analyzing the barcode's image data provided by the sensor and sending the barcode's content to the scanner's output port. Figure 2.4: Reading a barcode using a Scanner 2.4.1.2.1 Types of Barcode Scanners Barcode readers can be differentiated by either their deployed Technology or Housing (a)Technology Pen-type readers Pen-type readers consist of a light source and photodiode that are placed next to each other in the tip of a pen or wand. To read a bar code, the person holding the pen must move the tip of it across the bars at a relatively uniform speed. The photodiode measures the intensity of the light reflected back from the light source as the tip crosses each bar and space in the printed code. The photodiode generates a waveform that is used to measure the widths of the bars and spaces in the bar code. Dark bars in the bar code absorb light and white spaces reflect light so that the voltage waveform generated by the photo diode is a representation of the bar and space pattern in the bar code. This waveform is decoded by the scanner in a manner similar to the way Morse code dots and dashes are decoded.
  • 20. 12 Laser scanners Laser scanners work the same way as pen type readers except that they use a laser beam as the light source and typically employ either a reciprocating mirror or a rotating prism to scan the laser beam back and forth across the bar code. As with the pen type reader, a photodiode is used to measure the intensity of the light reflected back from the bar code. In both pen readers and laser scanners, the light emitted by the reader is rapidly varied in brightness with a data pattern and the photodiode receive circuitry is designed to detect only signals with the same modulated pattern. CCD readers CCD readers use an array of hundreds of tiny light sensors lined up in a row in the head of the reader. Each sensor measures the intensity of the light immediately in front of it. Each individual light sensor in the CCD reader is extremely small and because there are hundreds of sensors lined up in a row, a voltage pattern identical to the pattern in a bar code is generated in the reader by sequentially measuring the voltages across each sensor in the row. The important difference between a CCD reader and a pen or laser scanner is that the CCD reader is measuring emitted ambient light from the bar code whereas pen or laser scanners are measuring reflected light of a specific frequency originating from the scanner itself. Camera-based readers Two-dimensional imaging scanners are the sixth and newest type of bar code reader. They use a camera and image processing techniques to decode the bar code. Video camera readers use small video cameras with the same CCD technology as in a CCD bar code reader except that instead of having a single row of sensors, a video camera has hundreds of rows of sensors arranged in a two dimensional array so that they can generate an image. Large field-of-view readers use high resolution industrial cameras to capture multiple bar codes simultaneously. All the bar codes appearing in the photo are decoded
  • 21. 13 instantly (ImageID patents and code creation tools) or by use of plugins (e.g. the Barcodepedia uses a flash application and some web cam for querying a database), have been realized options for resolving the given tasks. Omni-directional barcode scanners Omni-directional scanning uses "series of straight or curved scanning lines of varying directions in the form of a starburst, a lissajous pattern, or other multi-angle arrangement are projected at the symbol and one or more of them will be able to cross all of the symbol's bars and spaces, no matter what the orientation. Omni-directional scanners almost all use a laser. Unlike the simpler single-line laser scanners, they produce a pattern of beams in varying orientations allowing them to read barcodes presented to it at different angles. Smartphones Smartphones can be used in Google's mobile Android operating system via both their own Goggles’ application or 3rd party barcode scanners like Scan. Nokia's Symbian operating system features a barcode scanner which can scan barcodes,[4] while mbarcode is a barcode reader for the Maemo operating system. In the Apple iOS, a barcode reader is not automatically included, but there are more than fifty free or paid apps available with both scanning capabilities and hard-linking to URI. With Blackberry devices, the App World application can natively scan barcodes. Windows Phone 8 is able to scan barcodes through the Bing search app. (b) Housing Barcode readers can also be distinguished based on housing design as follows: Hand-held scanner With a handle and typically a trigger button for switching on the light source Pen scanner (or wand scanner) A pen-shaped scanner that is swiped.
  • 22. 14 Stationary scanner Wall-or table-mounted scanners that the barcode is passed under or beside. These are commonly found at the checkout counters of supermarkets and other retailers. Fixed-position scanner An industrial barcode reader used to identify products during manufacture or logistics. Often used on conveyor tracks to identify cartons or pallets which need to be routed to another process or shipping location. Systems like this are used in factory and farm automation for quality management and shipping. PDA scanner (or Auto-ID PDA) A PDA with a built-in barcode reader or attached barcode scanner. Automatic reader a back office equipment to read barcoded documents at high speed (50,000/hour). Cordless scanner (or Wireless scanner) a cordless barcode scanner is operated by a battery fitted inside it and is not connected to the electricity mains and transfer data to the connected device like PC. Fig 2:5 A pictorial view the existing types of barcode Scanners
  • 23. 15 2.4.2 Radius Server Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users that connect and use a network service, because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may incorporate modems, DSL, access points, VPNs, network ports, web servers, etc. Authentication and Authorization by the Radius Server The user or machine sends a request to a Remote Access Server (RAS) to gain access to a particular network resource using access credentials. The credentials are passed to the RAS device via the link-layer protocol - for example, Point-to-Point Protocol (PPP) in the case of many dialup or DSL providers or posted in an HTTPS secure web form. In turn, the RAS sends a RADIUS Access Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol. This request includes access credentials, typically in the form of username and password or security certificate provided by the user. Additionally, the request may contain other information which the RAS knows about the user, such as its network address or phone number, and information regarding the user's physical point of attachment to the RAS.
  • 24. 16 Fig 2:6 RADIUS Authentication and Authorization Flow Considering the above tool, Makerere University has implemented it majorly in data roaming via wireless Internet service called MakAir that is accessed at certain points around campus and the criteria of access is that the user must have a valid Students Email address from the respective college of study as shown below. Fig 2:7 The Makerere Univesity MakAir Radius Server
  • 25. 17 2.5. SMART ID Architecture The 3 Tier Network architecture shall be used in this Project. This Architecture shall contain Two Server and a Client Machine. The First Server shall be the Authentication Server that will be used to authenticate new users of the System. The Second Server will contain the Financial Details of Every Student. Accessing the Financial Details Server Requires Authentication by the Authentication Server. Figure 2:8 Using a Smart Card Reader/Scanner with a Laptop
  • 26. 18 Figure 2:9 Interfacing the Card Reader/Scanner with a Smart Phone The Framework supports interfacing the smart card Reader/Barcode Reader with a Laptop as shown in Figure1 and as well interfacing the Smart Card Reader with a Smart Phone.
  • 27. 19 CHAPTER THREE: DESIGN AND IMPLEMENTATION 3.1 System Design Computer System Hardware (Readers and IDs) Students’/Lecturers User interface Virtual Database (Financial DB) Student and Examination Database Student and Examination Database Administrators and Invigilator Database
  • 28. 20 3.2. System Flow Diagram Choose Course Unit to Invigilate Exit Is Login Valid? START LOAD Application INVIGILATOR LOGIN Yes NoRegister? No Register Yes Is Registration Successful? No Yes Is course unit Valid? ExitNo Scan Student Indentification Card Yes Print Paper Attendence Figure 3.1: System Flow Diagram
  • 29. 21 The design of this project has been divided into three stages that include Creation of required Databases Three prototype Databases are created using Mysql platforms which include the Students Financial and Examination Database that contains their financial records during the semester and the papers being registered to be examined by Lecturers after the semester. The details of these two databases are directly gotten from the payments made by students to the University Account and the Online/Manual Registration done by students earlier in the semester. The last database to be created is the Administrators’ Database who are in this case the Examination Invigilators, this is created with details like Staff ID, Name, Paper ID etc. and these details are entered at the Staff Login Section of the System as shown below. Creation of Proposed User Interfaces The Interfaces are designed to be as simple as possible to ensure, giving Students’ Credentials which Include Names, Course done, Financial Details and Papers Registered and the respective year of study. The interface is programmed and designed in C# programming Language because it’s simple and it’s meant to give a buzzing sound to both scenarios when the Student is PERMITTED (Legible to do Exam) and NOT PERMITTED (Not Legible to do Exam). PERMITTED means that the Student has a balance of Zero hence legible to do the Examination while NOT PERMITTED means that the student has not yet Cleared his/her Tuition or didn’t register for the Examination and in both these cases, the details are clearly shown on the interface. The Proposed Interfaces clearly show the following details;  Student Financial status (Amount paid and Balance)  Seat Number (Shown only when balance is Zero)  Student Photo and Details  Registered Examinations  Status -Permitted (Zero Balance)-Can do Examination
  • 30. 22 -Not Permitted (Balance)-Cannot do an Examination Linking the Databases, Interfaces and Hardware The hardware to be used is a Hand Held or Stationary Barcode Scanner to retrieve the student Number that is stored in Barcode behind the Student IDs, that acts has our Primary Key (PK) that uniquely identifies every student of Makerere University. The linking of these three platforms will be done using a Computer system with good Processing speed and RAM to ensure the system doesn’t experience freezing moments since it’s meant to work on quite a big number of students. 3.3 Data Design 3.3.1 Data Description The data description is divided into 3 database design phases i.e the conceptual database design, logical database design and the physical database design. Conceptual Database Design The conceptual design describes an entity relationship diagram which shows how the different entities interact and the relationships between them as shown in the figure below.
  • 31. 23 Figure3.2: Entity Relation Diagram Logical Database design The second stage is the logical design which involves the description of the different entities with their attributes. View1 Student (std_no, std_reg, std_fname, std_lname, course, sponsorship, photo, year) Primary Key: std_no View2: Student_financial(financial_id,std_no,Amount_paid,Date) Foreign Key: std_no references(Student) View3: Invigilatior(Invg_id, Title,Staff_no,FirstName,LastName,photo,Department,Password)
  • 32. 24 Primary Key: Staff_no references(Student) View4 Financial_structure(Financial_struct_id,course_name,course_code,course_tuition, course_function_fees) Primary Key: Financial_struct_id View5: papers(PaperID,PaperCode,PaperName,Year,Semester,Instructor,Date) Primary Key :PaperID Foreign Key: std_no references(Student) View6: Exam_time_table(exam_paper_id,course,paper_name,Year,Time,exam_room_number ) Primary Key: Exam paper_id Foreign Key: paper_name references (papers) View7: Check_in(check_in_id, seat_number, std_no, checkin_time, invg_id, paperID,status) Primary Key: std_no Foreign Key std_no references(student) View8: Papers_registered (paper_reg_id,std_no,reg_papercode,DateRegistered) Primary Key: paper_reg_id Foreign Key: std_no references(Student)
  • 33. 25 Physical Database Design  Check_in Check_in` ( `check_in_id` int(11) NOT NULL AUTO_INCREMENT, `seat_number` int(11) NOT NULL, `std_no` varchar(25) NOT NULL, `checkin_time` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP `invg_id` int(25) NOT NULL', `paperID` int(11) NOT NULL', PRIMARY KEY (`check_in_id`), KEY `paperID` (`paperID`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=26 ;  Student Student( `stdno` varchar(25) NOT NULL, `std_regno` varchar(15) NOT NULL, `std_fname` varchar(25) NOT NULL, `std_lname` varchar(25) NOT NULL, `course` varchar(50) NOT NULL, `photo` varchar(50) NOT NULL, `year` int(5) NOT NULL, PRIMARY KEY (`stdno`)
  • 34. 26 ) ENGINE=InnoDB DEFAULT CHARSET=latin1;  Invigilators invigilators` ( `invg_id` int(10) NOT NULL AUTO_INCREMENT, `Title` varchar(20) NOT NULL, `staff_no` int(15) NOT NULL, `FirstName` varchar(40) NOT NULL, `LastName` varchar(40) NOT NULL, `photo` blob NOT NULL, `Department` varchar(40) NOT NULL, `Password` varchar(40) NOT NULL, PRIMARY KEY (`invg_id`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;  Financial Stucture `financial_structure` ( `financial_struct_id` int(11) NOT NULL AUTO_INCREMENT, `course_name` varchar(50) NOT NULL, `course_code` varchar(5) NOT NULL, `course_tuition` decimal(10,2) NOT NULL, `course_function_fees` decimal(10,2) NOT NULL, PRIMARY KEY (`financial_struct_id`)
  • 35. 27 ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;  Student Financials `student_financials` ( `financial_id` int(11) NOT NULL AUTO_INCREMENT, `std_no` varchar(25) NOT NULL, `Amount_Paid` decimal(12,0) NOT NULL DEFAULT '0', `Date` datetime NOT NULL, PRIMARY KEY (`financial_id`), UNIQUE KEY `std_no` (`std_no`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=4 ;  Exam time table exam_time_table` ( `exam_paper_id` int(11) NOT NULL AUTO_INCREMENT, `course` varchar(50) NOT NULL, `paper_name` varchar(10) NOT NULL, `Year` int(2) NOT NULL, `Time` datetime NOT NULL, `exam_room_number` int(5) NOT NULL, PRIMARY KEY (`exam_paper_id`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=2 ;
  • 36. 28  Papers Registered papers_registered` ( `paper_reg_id` int(11) NOT NULL AUTO_INCREMENT, `std_no` int(10) NOT NULL, `reg_papercode` varchar(7) NOT NULL, `DateRegistered` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP, PRIMARY KEY (`paper_reg_id`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;  Papers ‘papers’ ( `PaperID` int(2) DEFAULT NULL, `PaperCode` varchar(8) DEFAULT NULL, `PaperName` varchar(41) DEFAULT NULL, `Year` int(1) DEFAULT NULL, `Semester` int(1) DEFAULT NULL, `Instructor` varchar(22) DEFAULT NULL, `Date` varchar(10) DEFAULT NULL ) ENGINE=MyISAM DEFAULT CHARSET=utf8; freezing moments since it’s meant to work on quite a big number of students.
  • 37. 29 3.4 Testing The testing was to ensure Speed and Accuracy of the System,10 Students were used,5 with cleared Financial details, Zero Balance,3 Students with some balance on their Tuition and 2 Students that were not registered in the Database. This was done achieve; Instant response of the system. Ability to retrieve information on the Student IDs. Compare the Different reactions of the system to different Students. To ensure the Interfaces displayed match with the students’ Financial Statuses. Having successfully tested the system, it was surely ready to be used remotely by anyone that desires that Makerere University needs to upgrade it’s current system. 3.5 Implementation The implementation is into stages namely; Testing and Presentation Purpose This was done in preparation for graduation and Panel Presentation case that is done on a very small scale, this is to ensure that the system is ready for deployment to the intended users. University Implementation This type of implementation is our golden objective to see Makerere University shift from Paper based Examination Permits to Electronic Examination Permits using the Student IDs. This is supposed to be ensured by our Supervisor, and how we manage to convince the Panel the need for the Shift. Since this implementation is on a large scale, we intend to make our system to be remotely accessed and Executable (System.exe) hence can be installed on different Computer systems. Using the Client-Server knowledge over a created Network, we can assign computers to be used Static IP Addresses to ensure ease and less time usage as shown below.
  • 38. 30 Fig 3:1 A client-Server Environment of the System
  • 39. 31 3.6 Ethical Consideration Our project involves the use of students’ confidential information like their Financial details hence for starters, we shall use the virtual database to avoid exposing this information then when the project is ready to be implemented, the University representative will be part of the implementation process hence their details can be used. Our Supervisor is to spear head the implementation of this project by Makerere University and all the work should be done by us which includes Development, Testing, Implementation and Maintenance.
  • 40. 32 CHAPTER FOUR: RESULTS PRESENTATIONS AND CONCLUSIONS 4.1Summary of results Since this was a software based system, the set targets were met and the project was 100% functioning on a very small scale hence with this confidence we can always upgrade it to large scale which will be our next venture when given an opportunity to implement it. 4.2 Limitations The major limitations of this project were two; 1. We could not get access to the University Financial Databases because they contain very vital information of both the University and students hence we ended up using virtue databases we created hence the implementation of this entire project will need another great deal of work. 2. Some students IDs are really in bad shape so it was hard for us to retrieve the information deployed in the barcode section hence this call for students to get new IDs for the efficiency of this project in future. 3. The Scanner was of less resolution so it sometimes took longer to scan as expected. 4.3 Recommendations We recommend this great Invention to Makerere University as an easier way of resolving the current recognized problems as stated earlier and also considering the cost of this entire process of Printing Examination Permits, I strongly believe this system will bring a great relief on the University expenditure.
  • 41. 33 REFERENCES 1. Orouit, 20 Feb 2013, A Smart Card Framework for .NET available at http://www.codeproject.com/Articles/16653/A-Smart-Card-Framework-for-NET [‘May 24th 2014’] 2. Smart Card Readers available at http://wikipedia.org/wiki/Smart_card [‘September 19th 2013’]. 3. Klonovs, J, Kjeldgaard, C, Regan, Olsen, H 2002, Development of a Mobile EEG-based Biometric Authentication System, Aalborg University Copenhagen, Copenhagen, Denmark. 4. Step-by-Step Guide to Installing and Using a Smart Card Reader ( February 01, 2000). Techet.microsoft.com, [Online], Available at: Techet.microsoft.com 5. C#Programming. Available at http://www.tutorialspoint.com/csharp [‘February 5th 2014’]. 6. Jesse, L. , Donald, X (December 2007) Oreilly Programming C# 5Th Edition, 44, pp.87- 100.
  • 42. 34 APPENDICIES A Snippet of the proposed User Interface for PERMITTED
  • 43. 35 A Snippet of the proposed User Interface for NOT PERMITTED
  • 44. 36 A Snippet of the proposed User Interface for NOT IN DATABASE
  • 45. 37 A Snippet of the Invigilator Login Interface
  • 46. 38 A Snippet of the proposed User Interface for Students’ Examination Attendance
  • 47. 39 A Snippet for tht New Student Registration Interface
  • 48. 40 A Snippet of the Sample Interface code
  • 49. 40 A snippet of proposed College Expenditure on Printing