Volume 16 , Issue 2 , PP: 137-146, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Mohammed Kamal Nsaif 1 * , Abdullah A. Rashid 2 , Haifaa J. Muhasin 3 , Wisam A. Shukur 4 , Amna Y. Muhammad 5 , Firas A. Abdullatif 6
Doi: https://doi.org/10.54216/JCIM.160210
Certificate generation systems play an important role in higher education institutions because they prepare certified students for the job market and induce organizational efficiency. In this context, the College of Education for Pure Science / Ibn Al-Haitham (CEPSIH) does not, however, have its own electronic system. This point motivates us to conduct this monitoring situation as a case. We designed and implemented the Ibn al-Haitham Certificate System (IHCS) as an automated certificate generation database system at the CEPSIH. This case study aims to put this system in a real educational environment into a valuable context, where the successfully implemented system meets the objectives of CEPSIH, illustrates the major bottlenecks, the overwhelming challenges, and the negative impact resulting from a time-consuming, manual certificate issue process at the CEPSIH. The authorized staff members will generate certificates using IHCS database server with a user-friendly interface. Users (or the student graduators) will go through online panel and register before logging into the IHCS. Registered users authenticate themselves, after which new user accounts can be used to request the graduation certificate from IHCS database and then generated it automatically. To implement the IHCS, it was necessary to collect data from paper records and old Excel sheets which belong to more than 35000 graduates since 1980s. The collected data should be converted to CSV files which we designed in particular form in order to be imported to the IHCS database. Data verification and validation are conducted in specific manners within IHCS to ensure that all stored data are correct without any errors and meet certain standards of the CEPSIH. All graduate information stored in the IHCS database are encrypted by AIS algorithm using encryption key of 256 bit.
Certificate generation , Graduate database , Data verification , Data validation , Generate e-certificate , Encrypted relational database
[1] Z. A. Shaikh, A. A. Khan, L. Baitenova, and G. Zambinova, "Blockchain hyperledger with non-linear machine learning: A novel and secure educational accreditation registration and distributed ledger preservation architecture," Applied Sciences, vol. 12, no. 5, pp. 1234-1245, 2022.
[2] A. Rustemi, F. Dalipi, V. Atanasovski, and A. Risteski, "A systematic literature review on blockchain-based systems for academic certificate verification," IEEE Access, vol. 11, pp. 11234-11250, 2023.
[3] A. R. Khan, M. A. Laghari, and S. Bourouis, "A blockchain framework for secure academic credentials and degree verification," Journal of Information Technology Education: Research, vol. 20, pp. 1-20, 2021.
[4] M. Hashim, I. Tlemsani, and R. Matthews, "Higher education strategy in digital transformation," Education and Information Technologies, vol. 27, no. 4, pp. 3171-3195, 2022.
[5] R. Hasan, S. Palaniappan, S. Mahmood, A. Abbas, K. U. Sarker, and M. U. Sattar, "Predicting student performance in higher educational institutions using video learning analytics and data mining techniques," Applied Sciences, vol. 10, no. 11, pp. 3894, 2020.
[6] M. Labayen, R. Vea, J. Florez, N. Aginako, and B. Sierra, "Online student authentication and proctoring system based on multimodal biometrics technology," IEEE Access, vol. 9, pp. 72398-72411, 2021.
[7] K. A. Perrotta and C. H. Bohan, "Reflective study of online faculty teaching experiences in higher education," Journal of Effective Teaching in Higher Education, vol. 3, no. 1, pp. 50-66, 2020.
[8] M. F. Myers et al., "A report of the AGCPD task force to evaluate associations between select admissions requirements, demographics, and performance on ABGC certification examination," Journal of Genetic Counseling, vol. 31, no. 2, pp. 302-315, 2021.
[9] B. Svendsen and S. Kadry, "A Dataset for recognition of Norwegian Sign Language," International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 1-10, 2023.
[10] M. V. Santelices, "Validity of Assessment Systems for Admissions and Certification," in Validity of Educational Assessments in Chile and Latin America, J. Manzi, M. R. García, and S. Taut, Eds. Cham: Springer, 2021, pp. 25-40.
[11] D. Albar and B. F. F. Perdana, "Designing Digital Certificate Issuance Information System," IOP Conference Series: Materials Science and Engineering, vol. 1200, no. 1, pp. 1-10, 2021.
[12] A. Djajadi, K. S. Lestari, L. E. Englista, and A. Destaryana, "Blockchain-Based E-Certificate verification and Validation automation architecture to avoid counterfeiting of digital assets," CCIT Journal, vol. 16, no. 1, pp. 68-85, 2023.
[13] V. Thusyanthy, K. Thiruthanigesan, W. M. P. P. Wanninayake, and N. Thiruchchelvan, "Automated Certificate Issuing and Students’ Management System for College of Technology, Jaffna: Sri Lanka," Middle-East Journal of Scientific Research, vol. 24, no. 7, pp. 2204-2208, 2016.
[14] U. A. Muhammad, G. I. O. Aimufua, and A. Muhammad, "Certificate Generation and Verification System Using Blockchain Technology and Quick Response Code," IOSR Journal of Computer Engineering, vol. 24, no. 1, pp. 1-8, 2022.
[15] K. P. N. Rao and S. Chinnaiyan, "Blockchain-Powered Patient-Centric Access Control with MIDC AES-256 Encryption for Enhanced Healthcare Data Security," Acta Informatica Pragensia, vol. 13, no. 3, pp. 374-394, 2024.
[16] T. G. Sant and V. Tripathi, "Deep blockchain-enabled security enhancement in trade finance," International Journal of Systematic Innovation, vol. 7, no. 8, pp. 1-10, 2023.
[17] J. Swati and P. Nitin, "Securing decentralized storage in Blockchain: a hybrid cryptographic framework," Cybernetics and Information Technologies, vol. 24, no. 2, pp. 16-31, 2024.
[18] H. Mestiri, "Evaluating AES Security: Correlation Power Analysis Attack Implementation using the Switching Distance Power Model," Engineering Technology & Applied Science Research, vol. 15, no. 1, pp. 20314-20320, 2025.
[19] S. A. Moosavi, M. Asgari, and S. R. Kamel, "Developing a comprehensive BACnet attack dataset: A step towards improved cybersecurity in building automation systems," Data in Brief, vol. 57, pp. 111192, 2024.
[20] A. R. Khan, A. A. Laghari, and S. Bourouis, "Blockchain in education: Enhancing security and trust in degree verification systems," Journal of Educational Technology, vol. 15, no. 2, pp. 100-115, 2023.