REAL-TIME DRUG INTERACTION, VERIFICATION AND AUTHENTICATION

88 PAGES (10745 WORDS) Information Technology Project

Counterfeiting is the concern of everyone – the consumers and the manufacturers alike. Drugs counterfeiting has been on the increased, the market is not sought for and the income is on the high side but to the detriment of both the consumers, suppliers and manufacturers. Technology can be of utmost importance in this area via the development of an interacting and authenticating system with a database that will authenticate drugs. The drug interacting authenticating systems will confirm the truth of an attribute of a single piece of data claimed true by an entity. The system gives drug users to choice of checking the effect of two combination of drugs before it's in take and as well confirm if the drug is edible for consumption by verifying and authenticating the drug from the database of drug agencies.This proposed research is a web based system with modules on interacting authenticating, Verification for drug users and others; Dynamic System Development Method was used. Adobe Dreamwever and SQL Server Management Studio 2008 are employed for the design of the front end and back end respectively.


TABLE OF CONTENT

Table of Contents ----------------------------------- i

Dedication ----------------------------------- iv

Acknowledgment ----------------------------------- v

Abstract ------------------------------------ vi

CHAPTER ONE

1.0 Introduction --------------------------- 1

1.1 Background of the Study ---------------------------- 3

1.2 Statement of the Problem ---------------------------- 5

1.3 Objectives of the study ---------------------------- 5

1.4 Significance of the study ---------------------------- 6

1.5 Scope/ Limitation of the study ---------------------------- 7

1.7 Definition of terms ---------------------------- 7

CHAPTER TWO: LITERATURE REVIEW

2.0 Literature review ------------------------- 9

2.1 Review of related literature ------------------------- 9

2.2 Drug Verification and Authentication ------------------------- 15

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

3.1 System Analysis ------------------------ 22

3.2 Methodology ----------------------- 25

3.3 Data Collection/Gathering ----------------------- 28

CHAPTER FOUR: SYSTEM TESTING AND DOCUMENTATION

4.1 System Specification ----------------------- 29

4.2 Systems requirement ----------------------- 32

4.3 System Testing ------------------------ 33

4.4 System Change Over ----------------------- 36

4.5 System Documentation ------------------------ 36

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 Summary ------------------------- 37

5.2 Problems Encountered ------------------------ 38

5.3 Conclusion ------------------------ 38

5.4 Recommendation for Further Studies ----------------------- 39

References ----------------------- 40

Appendices I ----------------------- 41

Appendices II ----------------------- 54