IMRAD Revise Rdic
IMRAD Revise Rdic
1
College of Computer Studies
2
Research Development and Innovation Center
3
Our Lady of Fatima University
4
Research Adviser
September 2022
i
Endorsement
This thesis entitled: “Alumni Credential Verification Blockchain Base System” prepared by John
Remster Bacaron, Mark Agustin, Pamela Blas and Mercy Joy Romo of BSCS 3YB-1, in partial
fulfilment of the requirements for the degree Bachelor of Science in Computer Science has been
examined and now recommended for Oral Examination.
This is to certify that John Remster Bacaron and his group are ready for the Oral Examination.
Tech. Adviser
Content Adviser
ii
Table of Contents
Endorsement .................................................................................................................................... i
Abstract ............................................................................................................................................1
1.0 Introduction ................................................................................................................................2
2.0 Related Studies and Literature ...................................................................................................6
Foreign .........................................................................................................................................6
local .............................................................................................................................................8
3.0 Methodology ............................................................................................................................11
3.1 System Design ....................................................................................................................11
3.2 Requirements Documentation ............................................................................................12
3.2.1 Flowchart ..................................................................................................................12
3.2.1 Data Gathering Procedure .........................................................................................13
3.3 Design of Software .............................................................................................................13
3.3.1 Conceptual Framework .............................................................................................13
3.4 Development and testing.....................................................................................................13
Reference .......................................................................................................................................17
3.5 Introduction .........................................................................................................................16
3.6 Research Design ..................................................................................................................16
3.7 Research Setting ..................................................................................................................16
3.8 Population and Sampling ...................................................................................................16
3.9 Research Instrument ...........................................................................................................18
3.9.1 Research Ethics ........................................................................................................18
3.9.1.1 Informed Consent ......................................................................................16
3.9.1.1.1 Data Protection and Disposal .....................................................18
3.9.1.1.2 Risk .............................................................................................18
iii
Table List
Table 1.0: Respondents 12
Table 2.0: Likert Scale 15
List of Figures
Figure 1: Visual Presentation of Agile for System Design 10
Abstract
Telegraph or Telephone Messages are met with the common penalty of prision correccional or
imprisonment ranging from six (6) months and 1 day to six (6) years based on the Article 173 of
the Revised Penal Code. Due to the poor system or processing and validating documents, this
became a hidden normal to the many Filipinos. They won’t have any choice but to proceed to a
procedure that is hassle free regardless of the legality. Hence, the researchers completely
understand the factors, causes, and the possible effects of committing falsification of legal
documents. That being the case, this research paper aims to provide a solution for the possible
leaks, issues, and concerns relating to the important legal documents and as to how we could build
a systematic procedure in keeping and processing the documents. To obtain the aim of this
research, Agile Development System will be used to digitalize and evaluate the effectivity of
proposed program. With the help of this research, different institutions may have a fast-paced
1.0 Introduction
The basic structure of student cycle taking admission in kindergarten, after that changing
the admission of school into primary, secondary and high school. After completing high school
student needs to get admission into college and completing all requirements need to get a degree.
This is the basic cycle of student’s studies but the problem of this studies is that student needs to
produce all his/her certificate in each stage for validation. This process of validation takes a lot of
time and poses a risk in losing and damaging the certificate. Due to the large amount of student
graduate, it is very hard to track and validate all the records because of this problem the tempering
and production of fake or duplicate certificate is rises. The researcher proposes a system that can
solve the current issue using blockchain technology. The data under the blockchain smart contract
cannot change under the predetermined condition. And with the use of merkle tree it is easy to
verify each certificate by providing a digital signature in each certificate that the institution issued.
Using the Alumni Credential Verification blockchain Base System, companies hiring for
an employee can now verify the legitimacy of the students or the person’s credentials. With the
help of this system, the researcher can now avoid hiring people out of lies or fake credentials. With
the help of this system, the process of easy hiring procedure will be free from hassle and toxicity.
And lastly, with the help of this system once been practice, people who uses fake credentials will
The target of this researcher is to help the companies hire more credible and competent
employees. In order to produce quality outputs and not to waste anyone’s time, dedication, and
money, the researcher desire to make this system known to everyone especially to company or
business owners.
With the increasing of student graduate, it also rises the applicants who are determined to
climb the career ladder with the use of fake credential. The legitimate and qualified individuals are
not easy to find. The urgent need to hire new employee tempting to skip over thoroughly verifying
application information that can ultimately put the company in a very vulnerable position. With
the intervention that the blockchain technology, it promises to solve problems that involves
administrative control not only in the virtual currencies, blockchain is open., it is a distributed
ledger that can record, save, or store any transactions, information, or contracts between two parties
efficiently an in a permanent way. With the help of blockchain technology, the researcher can
visualize information embedded in a digital code and stored in transparent, shared databased,
where they are protected from deletion, revision, or tampering. In today’s era, every agreement,
signatures, transactions, conversation, important information, process, payments, and even our
signatures would be done digitally and could be identified, validated, stored, and shared without
purpose of this researcher is to generate a digitize certificate that can be upload in the blockchain
with the technique in which is mainly implemented a has value to certificate and it will easy verify
by the system using a series of cryptographic solution to resolve the issues in academic community.
And to establish a secure relation with the company and the institution.
Forgeries are well known in the Philippines. These forged documents are often used by
individuals in order to obtained experience and support for employment. Even before the
pandemic, the production of fake certificates is popular especially to the students who are willing
to use this document for their own benefits. University of Recto, a term to nonexistent schools, are
well-known in falsifying documents residing around universities in Manila are one of the reasons
why forged documents still exist. (Hadi et. al, 2015) states that forgery and falsification of
documents is an act of committing fraud. In which fraud act as serious committed crime such as
corruption, bribery and extortion. This instance made the researchers to produce a system named
"Alumni Credential Verification blockchain Base System" in which verifying documents are the
main objective. The system will verify credentials that was given only by university to ensure that
the documents are true otherwise certificates which are not verified will received actions instantly.
The researchers aim to provide an action ensuring security and legitimacy of documents for the
institution.
The study entitled Alumni Credential Verification Blockchain based System aims to have
a legitimate credential certificate in digitalize form and verify them in short amount of time.
Providing them an immutable, tamperproof and non-repudiation property of blockchain. [1] The
researcher develop a Blockchain based system that allows to verify credentials. [2]
Evaluate the Alumni Credential Verification Blockchain based System with the help of I.T Expert
using the ISO 25010. [3] Evaluate the Alumni Credential Verification Blockchain based System
with the help of Blockchain software developer using the ISO 25010. [4] The Alumni, Registrar
staff the target user to evaluates the Alumni Credential Verification Blockchain based System
This study aims to create a decentralized Alumni Credential Verification Blockchain based
System that enables the student preserves their credential and certification in a secure digital asset.
This research also intends to answer the following question. [1] How does the researcher develop
a system that can verify credentials? [2] How will the I.T experts and evaluate the system analysis
using the ISO 25010 in terms of: [3] How will the Blockchain Software Developer experts and
evaluate the system analysis using the ISO 25010. [4] How the Alumni, Registrar staff the target
user to evaluates the Alumni Credential Verification Blockchain based System using the ISO
25010:
This project will benefit many companies by providing them legitimate credential
certificate that they can verify in just a short amount of time and also for the student to have access
to their own credential by logging in the “Alumni Credential Verification Blockchain based
System”.
The limitation of this project is that it only verifies certification other material like skill,
test score, grading sheet, etc. are not included in the system and cannot be verified. Another
limitation is it only verify what the user and institution issued, stored in the system. Other student
who are not enrolled in the institution where the system deploy are cannot access the system. Even
with this limitation, still it can be a huge help to reduce fraud and building trust to the institution
Foreign
Revitalizing blockchain technology potentials for smooth academic records management and
According to Alnafrah and Mouselli (2021), that the issuance, maintenance and
needs an improvement due to continuous adaptation of students and teachers on institution. Along
with these are the problems associated with issuances among universities. Therefore, the
researchers proposed this blockchain-based platform to verify and issue student credentials.
blockchain
Since the digital world era, there are changes of doing a traditional way. Transactions can
be done online including banking, shopping, etc. The documents of this resultants are stored on a
centralized and is controlled by a single admin. In which, this can be poses of danger and are at
risk of attacks from unknown authority. Also, there's a chance that the admin be in-charge of
modifying, deleting of existing data due to personal reason. This explains that today's technology
can easy to forge hard and soft copies of the documents. In fact, there are numerous incidents
where credentials of students and institutions being forged which makes the quality of education
On this research, the authors describe that the consumers of diamonds do have concern
regarding the authenticity of their purchases as it is also this proves the quality of the diamond.
Since the traditional way of certifying an authentic jewelry are issued on a paper that specify many
details, this cannot be proved due to a certain problem. First, it can be faked. Second, the source
of information is more likely less clear. However, with the use of blockchain technology, a
platform like Everledger2 can provide a unique digital thumb-print differ in each diamond in terms
of its appearance and other qualities. And with the help of this technology, this can certify every
The author states that the blockchain are a new way for achieving of data integrity by using
decentralized which stores a good data. As well as it can be implemented within a management
that automates a system for private sectors of an institution. Since education is a core area were a
person need to share and modify their information, these can take place in different measure of
security levels. With the help of blockchain, students have freedom accessing their personal data.
This technology stores data that is immutable and permanent data encrypted using cryptographic
In Morocco, digital signature is a service where it is certified under the law and is related
as a confidence service for the digital transactions. Barid eSign is an online certification were
digital signature, etc. This paper proposes a method a much secure and decentralized model
According to Asiri (2020), that the certificates and diplomas certifies a person as a result
of attending college which has important role in applying a job. Implying that these credentials are
not just a paper. As these documents is a proof that the student is graduated from a university as
well as a proof of their skills. The following are some drawbacks of a paper credentials. (1) These
credentials need to be manually issued and verified. (2) The process of issuing this certificate is
time-consuming.
And can be forged and buy through a mill diploma website. With blockchain technology, as a
distributed ledger technology, this enables much higher level of security. The main advantage of
using this technology is by using cryptographic hashing which provide unchangeable features.
A part of this research article the author describes the value of blockchain technology which
can be a benefit for education. This technology let everyone to validate their credentials and
qualifications and to do this with high measures of security. As it avoids record forgery and fraud.
Also, this empowers everyone by giving complete control over their data.Invalid source specified.
Local
Philippines
continuously grows. All stakeholders concerned in a student's growth will be using blockchain to
keep track records. All data is immutable and transparent. Existing challenges, worries, and
dilemmas are resolved in real time, providing a huge competitiveness. The use of blockchain in
education has various applications. Digital verification and certification are one of them, a
blockchain platform based on Ethereum that schools can design and use. Invalid source specified.
These documents are often shared by recipients with another institution or third parties,
such as an employer, for ethical and useful objectives. A third party or entity must confirm the
authenticity of a document by calling the original provider and asking if the certificate was truly
issued by them. Furthermore, the original issuer may check their centralized or localized certificate
databases. If the original issuer lacks a database to offer, the traditional method of verifying the
security measures embedded into the hardcopy certificate will be used. As a result, document
verification takes time and can be hard or simple depending on the institution.
The decentralized verification of academic credentials presented in this study is built on a private
blockchain technology, specifically the open source Multichain. Invalid source specified.
According to researchers that the blockchain technology has become a major list of
recorded data, commonly referred to as blocks, that are connected in a network utilizing
encryption. Every block in the blockchain has its own cryptographic hash based on the date stamp
of the preceding block, as well as transaction records (i.e., Merkle tree). It operates on open ledger
concepts and takes pleasure in the way it monitors and stores data, develops data trust, and reduces
blockchain are the three basic element types of blockchain technology. The aim behind this type
of blockchain technology is to strictly provide an authorized person the access that is meant for
them in a particular network. This process avoids information from leaking to those who do not
3.0 Methodology
For this project the researchers have decided to use the Agile development system that
involves the following steps; The planning stage where the researcher gather all the necessary
information that can lead to this project achieve its goal, setting roles for each team, discussing the
resources that needed to develop the system and what will be the problems that the researcher may
encounter. The next stage is the designing stage where the team discuss and introduce them the
requirements outlined in the first step. Also, in this stage the team introduce the function and
identities and the essential tool, the programming language, syntax libraries and the basic
framework. At same stage the user interface is also being discuss by the researcher. the next stage
after making plans and having design for the system the researcher now develops the system itself
execute all the functionalities and solving all the problem that may encounter and test it in the next
stage. The testing stage conduct series of test to ensure that the system is fully function. If
in this stage consumer feedback is collected. Deployment stage the system is now fully develop
The system starts by loggin in the system and the system will provide the dashboard which
you can fill up all the requirements need. The system has an upload tab which u can upload your
credential certificate with its merkle root which has a file extension. json otherwise the system
the certificate in the next tab. In verifying the certificate, the user needs to upload the file with its
merkle root. The system will reject the file if the name, batch is not the same in the uploaded file
Respondents No. of
respondents
Alumni 5
Registrar Staff 5
I.t Expert 5
Blockchain Expert 5
Total 20
The table 1: show the different respondents that will need. With the use of
evaluation forms the researcher will do multiple trials to ensure the functionalities and usability
of the system is comes with it. The main respondents will (5) alumni, (5) registrar staff, (5) I.T
expert, (5) blockchain expert. That will test the system as a whole and providing them evaluation
about the functionalities and usability using the system. The combined evaluation and feedback
The figure: 2 shows the conceptual framework of the project. The institution is the one
who can create and provide digitalize certification that has a hash value that can upload to the
student login portal blockchain base system. Institution issued certificate given to student as their
credential for applying in the company. The company can verify the credential submitted by the
student providing them a QR code that directing them to the system. The student also can upload
their own certificate and can manage all their information on how long the company can see their
credential.
In developing the system, the researcher used visual studio code 2022 to develop the
Ethereum blockchain and smart contract, merkle tree and the front-end of the system. The
researcher installs all the needed requirements to make the system work such as the node.js where
you will install the dependencies of the program. As for the smart contract to run the researcher
use ganache-traffle suite and install all the dependencies need and compile to know if the contract
is correct and the ganache providing an ETH coin to test the project in web3 browser. Truffle
migrate is where the contracts will deploy and what host or server it run the researcher uses the
ganache rpc server HTTP://127.0.0.1:7545 for launching the system. To launch the system in web3
server the researcher downloads and install the metamask extension and imported a private key
provided by the ganache to have 100 ETH coin to process the system. For certificate to have a
merkle root the researcher uses merkle tree algorithm to provide hash for each certificate and
upload the certificate with the file extension json to the system for the company to verify the
For uploading and verifying the certificate the researcher conduct multiple ways on how
the system will verify each certificate from the changing the content of the file to change the file
extension every time that the system experiencing any error the researcher finds what is the cause
of the error and fixing quickly. The researcher monitoring also the transaction using etherscan
ropsten testnet network to see if the transaction is successfully made and also if the merkle root is
added to the blockchain technology to verify the certificate issued by the institution. The result is
that only certificate that has hash and uploaded to system with the added merkle root are the once
that can verified by the system for does that don’t have merkle root are not verified by the system.
This area will discuss the actions to be considered in gathering data for the study. The
researchers selected descriptive as research design since the procedure of evaluation will be
through a survey. As well its setting to be done through hybrid meetings. This section also provides
the number of respondents that need to participate in the study. As well as ethical procedures such
This project utilizes quantitative research particularly as descriptive since gathering of data
will be survey basis. Through surveys, researchers will also be aware of the system's full potential.
The goal of the study is to evaluate the system as well as to see its effectiveness and advantages in
The study will be conducted through hybrid meeting, which the research setting will occur
inside Our Lady of Fatima University and Zoom Meeting application. The idea of this setting is to
have a flexible way of conducting evaluation due to limited access to in -person surveys amidst
pandemic season.
This study will use stratified sampling since the survey questionnaire will be distributed
according to respondents criteria and role as a user of the system. The researchers will have the
following respondents: (10) Ten alumni from OLFU; Five (5) OLFU Registrar staff; (5) Five
Human Resources representatives on selected companies affiliated by OLFU; (5) Five I.T Expert;
will only rely if the individual has met the criteria above otherwise will not be considered.
Where:
x = Mean
x1 = elements or number
w = weights
i= count
Mean was used to assign a quantitative value to a criterion in the table. Using the average
result The Likert Scale will be used by the researchers as a statistical instrument to assess the
Alumni Credential Verification Blockchain based System as well as the front-end of the system’s
The survey will consist of 4 parts. First part is providing a consent form to be answered by
respondents to assure their safety. For the second part, their personal information to be collected
that will be used on a project. Third, a survey in which the following question will evaluate the
system performance. Last, the respondents are open to give feedback regarding their thoughts on
the project and the option to send them information about the survey.
Researchers of this project follow Republic Act No. 10173 or the Data Privacy Act of 2012,
in which the research team is responsible for ensuring the safety of those who will take part in the
study.
wherein the respondents will be informed before the occurence of data study. Researchers
will provide consent form to be answered in which selected respondents are allow to accept or
wherein the selected individuals will receive formal letters provided by the researchers.
wherein personal informations to be gathered are limited and will be use only for the project
benefits. wherein personal data are only disclosed to the research team and user who shared the
information.
wherein data to be collected will stay at research premises such as Gdrive, flash drive held
by the capstone team while personal surveys will be collected by the documentation committee.
wherein data will be stored and will only remove once the research is done by doing the:
2.1 Data Destruction wherein methods of removing data such as shredding and wiping data.
3.9.1.1.2 Risk
wherein researchers will provide extra measures to avoid risk and problem while the
project is going .
References
https://ethereum.org/en/developers/tutorials/downsizing-contracts-to-fight-the-contract-size-
limit/
https://www.martinstellnberger.co/document-certification-through-the-blockchain
https://exonum.com/use-case-document-verification
https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-021-00122-5
https://projectsgeek.com/2015/11/alumni-management-system-java-project.html
https://www.slideshare.net/snehaindulkar2/alumni-management-system-248322228
BLAS, PAMELA S.
6-4 Kamatsile st., Palmera Homes, 1117
09772614898
[email protected]
PERSONAL INFORMATION
EDUCATIONAL BACKGROUND
WORK EXPERIENCE
• Namiroseus
51 Adrian, Novaliches, Quezon City, Metro Manila
Virtual Assistant
2021
SEMINARS/TRAININGS
N/A
LINKS
Facebook: https://www.facebook.com/pam.blas.27
Email: [email protected]
REFERENCE
PERSONAL INFORMATION
EDUCATIONAL BACKGROUND
WORK EXPERIENCE
SEMINARS/TRAININGS
LINKS
Email: [email protected]
PERSONAL INFORMATION
EDUCATIONAL BACKGROUND
WORK EXPERIENCE
• N/A
SEMINARS/TRAININGS
LINKS
Facebook: https://www.facebook.com/MercyJoyClerigoRomo/
Email: [email protected]
REFERENCE
PERSONAL INFORMATION
EDUCATIONAL BACKGROUND
• N/A
SEMINARS/TRAININGS
N/A
LINKS
Email: [email protected]
REFERENCE
N/A