Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 45

DESIGN AND IMPLEMENTATION OF COMPUTERISED STUDENTS’

IDENTITY CARD

CHAPTER ONE

INTRODUCTION

1.0 Background to the Study

An Identity card system (ID) is packaged with all of the components needed to be up-
and-running and printing IDs within 15 minutes -guaranteed. Every ID Maker System
comes with an intuitive, full-featured ID Maker Software, photo-taking tools, as well
as enough blank card stock and printer ribbons to get through first run. A system, with
numerous definitions can be literally seen in a computer way as a collection of the
hardware and software components of a computer. According to Chiemeke and Franca
(2006), a system is set of components that interact to achieve a common goal. In
another sense, a system is a group of interrelated or intersecting elements forming a
unified whole. A computerized system as in this project is an application program
used to verify that someone or something rightly and legally belongs to a collection,
an organization or an individual.

A new student comes in, and while their paperwork is being filled out, an ID card is
printed. This ID card has a full color picture of the student, their signature, and a
barcode or magnetic stripe. The student visits the library and since their ID card also
works as a library card, it is scanned to record the checkout details. The student visits
the cafeteria, and instead of handing over money, they simply have their ID card
scanned. Since it also works as a meal card, the total amount is deducted directly from
their student account.

The student attempts to enter the staff lounge, and is because their special student ID
card also works as a security card, and it does not allow them access to the staff
lounge. When the student enters a classroom, they swipe their ID and are marked
present. When they leave the classroom, they swipe again to verify they were in class
the full time... and to verify where they were last. If that student turns up missing, the
school's security system will know where they were last -- and when. The student

1
goes to computer class, and swipes their ID to log into a computer. That computer
then allows access to specific applications only... based on their pre-set configured
access levels.

There are different computerized system, notably address computer system, adult
verification system and card verification system to mention but a few. Student
verification system is used to know whether or not a student is or was a legal and
rightly registered student. In this context, it is used to verify that a student
belongs/belonged to an institution and to confirm that he/she is properly registered in a
particular department running any of the institutions programme. This student
verification system (SVS), also known as DELSU e-Verify is a window based system.
It is an electronic and computerized means of verifying someone’s claim of
studentship to an institution by means of their matriculation number (Mat No) being
input, hence using an output clearly showing the truth or false of his/her claim.

An identity document is any document which may be used to verify aspects of a


person’s personality. If issued in the form of a small, mostly standard-sized card, it is
usually called and identity card (IC). Countries which do not have formal identity
documents may require informal documents.

In the absence of formal identity document, driving licenses can be used in many
countries as a method of proof of identity, although some countries do not accept
driving licenses for identification, often because in those countries they do not expire
as documents and can be old easily forged. Most countries accepts passports as a form
of identification. Schools, colleges and universities utilize secure ID cards to foster a
safe learning environment, often combining access control, identification and
transactional applications into one card for flexibility and convenience. Datacard®
school ID systems make it easy and affordable to integrate new ID card technologies
that make campus life more efficient for everyone.

Students Identity card issued by the school administrators to a citizen intending to


travel abroad from the definition, identity card can also be called a true image of an
individual, because it tells well about a person coming into a country. Citizens in a
country have the right to apply for issuance of an interstudents passport. There is a

2
need for the maintenance and processing of students records in order to maintain
current data concerning an individual in the institute of management and technology
Enugu, the unit, which takes the responsibility of producing an identity card for
student, has many sections. A system, with numerous definitions can be literally seen
in a computer way as a collection of the hardware and software components of a
computer.

According to Chiemeke & Franca (2006), a system is set of components that interact
to achieve a common goal. In another sense, a system is a group of interrelated or
intersecting elements forming a unified whole. A verification system as in this project
is an application program used to verify that someone or something rightly and legally
belongs to a collection, an organization or an individual. There are different
verification system, notably address verification system, adult verification system and
card verification system to mention but a few. Student verification system is used to
know whether or not a student is or was a legal and rightly registered student. In this
context, it is used to verify that a student belongs/belonged to an institution and to
confirm that he/she is properly registered in a particular department running any of the
institutions programme. This student verification system (SVS), also known as
DELSU e-Verify is a window based system. It is an electronic and computerized
means of verifying someone’s claim of studentship to an institution by means of their
matriculation number (Mat No) being input, hence using an output clearly showing the
truth or false of his/her claim.

In this modern age, computers have verified the cause of their existence. The advent of
computers in our society caused a lot of criticism on the danger it poses on the society.
Critics of computer and new techniques express their fear on how computers will
displace and replace all human skills thus resulting to mass unemployment. The
presence of computer on virtually every field of today’s fast life has proved the critic
wrong as the invention of computers and new technologies continues to create
additional jobs for those who identify themselves with computers and new
technologies. This make computes partner to human beings in any fields of human
endeavour. Over the past decades, students identification and verification has been a

3
major problem in large institutions as documents, certificate and studentship can be
forged at a great rate and easy way, using the computer negatively. Forgers fail to
know that in this fast moving world, the computer has equally served as an aid to
decision making, verification and authentication. This is because of computers
efficiency in terms of speed, accuracy, reliability, cost and security among others. In
recent years, awareness has existed and created in people as it concerned the use of
computer in verifying, authenticating and security activities either through web-based
(internet) or window-based. Decision support system (DSS) and others system like
management information system (MIS) and information system (IS) are used in
organization. Decisions are largely based on experience and principle. The value of
every degree is the reputation of the institution and the students produced, hence, the
greatest obstacle to any academic institution which is dishonesty and forgery has to be
balanced with verification and authentication systems and processes. “In recent times,
effort are bring made to build intelligence into computer system, whereby the
computer can be used to process large volume of structural and unstructured
information for decision making.

Most countries have the rule that foreign citizens need to have their passport or
occasionally a students identity card from their country, available at anytime if they do
not have residence permit in the country. A student identification card can only be
issued to genuine bonafide students. Card holders can use the can to identify
themselves as a student around the campus or outside the campus. The identity card is
managed and administered by the (Student Identity Card Association (SICA) of the
school.

In recent times, systems design is the process of defining the architecture,


components, modules, interfaces, and data for a system to satisfy specified
requirements. It could be seen as the application of systems theory to product
development. The design and implementation of World Wide Web has become an
environment for distributed applications of all kinds. The originally intended use of
the Web as distributed system for knowledge-interchange seems to disappear,
compared to the increasing number of Electronic Commerce Web applications.

4
Organizations offer products and services in the Web, and use the Web as a means to
integrate their (heterogeneous) business application systems. Offering Web-based
products requires combining services of different application systems, which were
build on the coarse-grained Web implementation model. Reusing the respective fine-
grained services and application systems respectively integrating these cross-platform
application systems increases quality and reduces costs of the new product.

1.1 Statement of the Problem

In examination of the main processing techniques used in ID-card processing system


from the stage of data processing system to end stage of the processed ID-Card, a
number of problem area are made known, which are as follows: It has been noted that
for students to relieve or collect their ID-Card in institute of management and
technology (IMT) Enugu, they queen up for several hours from one unit of the
processing center to the another with the manual processed involved in handling the
students ID-card process, most of them waste the whole day in the processing center
without getting their ID-cards. So student do waste a lot of time in taking information
and retrieving the students records.

1.2 Aim and Objectives

The aim of the study is to examine the design and implementation of computerised
students’ identity card (Id card system).

Other objectives of study include:

1. To identify various existing students’ identity card (Id card system) being used
in the school.
1. Determine the factors affecting students’ identity card (Id card system).
2. Examine the extent of the use of students’ inventory management systems in
students’ identity card (Id card system).
3. Assess the appropriateness of the regulations and rules guiding the students’
identity card (Id card system)
4. Develop the students’ identity card (Id card system).

5
1.3 Research Questions

The following research questions are as follows:

1. What are the various existing students’ identity card (Id card system) being
used in the school?
2. What are the factors affecting students’ identity card (Id card system)?
3. What are the extent of the use of students’ inventory management systems in
students’ identity card (Id card system)?
4. What are the appropriateness of the regulations and rules guiding the students’
identity card (Id card system)?

1.4 Research Hypotheses

The following research hypotheses are as follows:

1. Various existing students’ identity card (Id card system) is not significantly
used in the school.
2. There is no significant use of factors affecting students’ identity card (Id card
system).
3. There is no significant use of students’ inventory management systems in
students’ identity card (Id card system).
4. There is no appropriateness of the regulations and rules guiding the students’
identity card (Id card system)

1.5 Significance of the Study

For the fact that this project research is aimed at having comprehensive review of
the manual system of operation being carried out in the s t u d e n ts identity card.
The following will be taken into consideration for subject matters. They are:

- Ensure accurate and timely update of the holder record.

- Check multiple possession of the students Identity card.

- Deprive fake students who are not bonafide students from obtaining the
identity card.

6
- A proper account of the identity card issued.

- Finally, a proper storage system which keeps all vital information ready for
use.

1.6 Scope of the Study

This research work will be limited in scope to the design and implementation of
computerised students’ identity card (Id card system). The study would be limited to
the students of a selected schools in Lagos state.

1.7 Limitation of the Study

Some of the constraints that they have in one-way or another affected the outcome of
this work include:

a. Resources: Due to the complex and insecurity associated with human factors
during this research work, personnel who are used to the manual system
perhaps for fear of losing their jobs have been reserved in relinquishing all
necessary information to make this project an enticingly extensive one.

a. Time: Due to time allowed for this project work, as a student was limited to
come up with a reasonable work within the stipulated time.

b. Power: Availability of stable, efficient and reliable power supply was also a
major limitation of this project as it had to be suspended several times during
design and testing stages.

1.8 Definition of Terms

The following words have been defined as they will be used in the study:

Computer: An electronic machine capable of accepting data in the form of input,


processes it under a set of complete condition, stores information or request for
references and generated result in the form of output.

Application: As it concerns this subject matter, it is one who applies to the


Department of Students Civil Registration for the Issuance of Students Identity
Card of the stipulated age.

7
Students: Under the provision of the amended constitution of 1999, students is any
person who becomes learner of any country either by birth, descendant, Registration
or Studentsization.

Identity Card Processing: The procedure involved in processing and identity card.

Students Id Card Assessment: The procedure or act of checking Identity card


already in used.

8
CHAPTER TWO

LITERATURE REVIEW

The literature review in this chapter will gives background explanations of the
elements of the research work such as design and implementation of computerized
students’ identity card (Id card system).

2.0 Conceptual Framework:


Webster’s Ninth New Collegiate Dictionary defines Identity Card as a formal
document that is used by an authorized official of a country to one of its citizens. The
Question is “what is an identity card? As defined by many authors and dictionary
including the encyclopedia, it is a students document certifying state/Studentsity, issued
by t h e Government of a Country t o every individuals or person that is of the
stipulated age of ownership. From the definition, Students Identity Card can also
be called a true image of an individual or persons because it tells well about a
person.”
Identity card as defined cannot be acquired from neither from school nor home.
But, there is a special organization or ministry that takes charge of both processing
and administration of Students Identity Card. The ministry of Internal Affairs Under
the Department of Students Civic Registration. According to J.K PLACK in his book
“INFORMATION Processing and Identification” says that identity card is a mark of
Identification. And also, it tightly identifies the holder whose photograph is placed in
the identity card. It also contains all necessary information needed to know about the
holder of the identity card.
Furthermore, he emphasized that the essence of such identification is mainly for
security purposes. During student’s identity card processing, everything is put into
consideration to check fraud of any form. Any fraud is detected and canceled
because the identity cards are made unique. It is not always easy. Forging of
identity card. And personification in areas where adequate attention is not
given to processing of the Students identity card.

9
JOHN ORGEON in his book. “TRAVELLERS AND JUORISM” defines travelers
as a process of making long journey within or outside one’s territory.
People travels in other to visit people, do business with people or for changing
environment. To this effect, there is every need that he/she traveling bears a mark
of identification, which is the students identity card. The identity card being and
outstanding document, is very official and is only issued out and controlled by the
Government under the auspices of the ministry of Internal Affairs.
DAN J O U G L I O W i n h i s b o o k . “AUTOMATIC D O C U M E N T A N D
PROCESSING” defines document processing as preparation of printed
evidences for births, deaths, marriage, identification e.t.c.
These documents are processed to bevery unified and easily maintained.
With the introduction of identity card, the problem associated with identity card
processing system has been totally solved. The computer maintain and access
information about identity card holders automatically with little human
intervention. Fraud is eliminated. The machine assess everything automatically
according to predefined program instruction using a defined government criteria.

TONY IKARA in a journal titled “IDENTITY CARD PROCESSING


EFFECTS AND BENEFITS” Says that identity card represents the image of a
nation.

IKAM also emphasized that every Students should attach more importance to the
mode of insurance and assessment of identity card since it will contribute to a
large extent sanitizing the image of countries within or outside their own
country. Identity card holders should at the same time exhibit good and
recommendable character within and outside the Nation at all time.

2.1 Studies on Students Identity Cards

This project work focused on the design and implementation of a system for
processing students ID-Card. The study investigates the ID-Card processing expert
system as a tool for revolutionized computer profession. It concentrates on how
improved representations of processing knowledge and problem-solving strategies
have advanced the field of artificial intelligence in computer. The system generally
10
involves mainly in manual process and it was discussed under the following process,
when students visits the processing department for the purposes of ID-card their
personal data are ended in the record and they will be asked to leave and come back
in some days or weeks to collect their processed ID-card. The researcher investigates
the manual system in detail with the view of finding out the need to automate it.
Happily, the final result of the processing expert system was its ability to produce on
the spot a wait and take processed ID-Card by processing the input data and provide
summary of the ID-Card process for a particular student.  

An identity document is any document which may be used to verify aspects of a


person’s personality. If issued in the form of a small, mostly standard-sized card, it is
usually called and identity card (IC). Countries which do not have formal identity
documents may require informal documents (Garfinkel, 2001). In the absence of
formal identity document, driving licenses can be used in many countries as a
method of proof of identity, although some countries do not accept driving licenses
for identification, often because in those countries they do not expire as documents
and can be old easily forged. Most countries accept passports as a form of
identification.  An identity document (also called a piece of identification or ID, or
colloquially as one's 'papers') is any document which may be used to verify aspects of
a person's personal identity. If issued in the form of a small, mostly standard-sized
card, it is usually called an identity card (IC or ID card). Countries which do not have
formal identity documents may require identity verification using informal
documents (Ben, 2003).

In the absence of a formal identity document, driving licences may be accepted in


many countries for identity verification. Some countries do not accept driving
licences for identification, often because in those countries they do not expire as
documents and can be old or easily forged. Most countries accept passports as a form
of identification. Some countries require foreigners to have a passport or occasionally
a student’s identity card from their country available at any time if they do not have a
residence permit in the country. The personal information present on the identity
document, or in a supporting database, might include the bearer's full name, a portrait

11
photo, age, birth date, address, an identification number, profession or rank, religion,
ethnic or racial classification, restrictions, and citizenship status (Doward, 2005).

Most countries have the rule that foreign citizens need to have their passport or
occasionally a students identity card from their country, available at anytime if they
do not have residence permit in the country. A student identification card can only be
issued to genuine bonafide students. Card holders can use the can to identify
themselves as a student around the campus or outside the campus. The identity card
is managed and administered by the (Student Identity Card Association (SICA) of the
school. 

In examination of the main processing techniques used in ID-card processing system


from the stage of data processing system to end stage of the processed ID-Card, a
number of problem area are made known, which are as follows: It has been noted
that for students to relieve or collect their ID-Card in institute of management and
technology (IMT) Enugu, they que up for several hours from one unit of the
processing center to the another with the manual processed involved in handling the
students ID-card process, most of them waste the whole day in the processing center
without getting their ID-cards. So, student do waste a lot of time in taking
information and retrieving the students records. The study would be limited to the
students of a selected schools in Lagos state. This is also an overview of literature
and past research work in related areas which provide a premise for this current
research. Webster’s Ninth New Collegiate Dictionary defines Identity Card as a
formal document that is used by an authorized official of a country to one of its
citizens. The Question is “what is an identity card? As defined by many authors
and dictionary including the encyclopedia, it is a students document certifying
state/Studentsity, issued by the Government of a Country to every individuals or
person that is of the stipulated age of ownership. From the definition, Students
Identity Card can also be called a true image of an individual or persons because it
tells well about a person.”

Identity card as defined cannot be acquired from neither from school nor home.
But, there is a special organization or ministry that takes charge of both

12
processing and administration of Students Identity Card. The ministry of Internal
Affairs under the Department of Students Civic Registration. According to Plack in
his book “Information Processing and Identification” says that identity card is a
mark of Identification. And also, it tightly identifies the holder whose photograph is
placed in the identity card. It also contain all necessary information needed to know
about the holder of the identity card.

Furthermore, he emphasized that the essence of such identification is mainly for


security purposes. During identity card processing, everything is put into
consideration to check fraud of any form. Any fraud is detected and canceled
because the identity cards are made unique. It is not always easy. Forging of
identity card. And personification in areas where adequate attention is not given to
processing of the Students identity card. With the introduction of identity card, the
problem associated with identity card processing system has been totally solved.
The computer maintain and access information about identity card holders
automatically with little human intervention. Fraud is eliminated. The machine
assess everything automatically according to predefined program instruction using
a defined government criteria. Systems design is simply concerned with how to
provide an efficient (economical) and effective (relevant and useful) system. It is an
integral part of software development which embarked after a detail analysis of the
system has been done, and the project feasibility study undertaken.

The purpose of the design is to meet the user’s specification of the system software,
determine flexible system alternative that will achieve the recommended result and
make optimum use of the hardware, software and other processing resources that
may be used in implementing the solution for there to be good system design, top-
down development was used so as to achieve a structure programming that is
directed in developing programmed in orderly way, decomposing the requirement
into well specified high level model.

The ID Center operates under the direction of the Office of Auxiliary Services. An
AUB ID card identifies an individual as a member of the university community.
Cardholders should carry the ID at all times while on campus and present it, upon

13
request, to university officials whose assigned responsibilities authorize them to seek
proper identification.
2. Location and Staff
The ID Center is located at Ada Dodge Hall, first floor, Room 100. The ID center
can reach at extensions 2376 and 2377.
3. Objective
The ID center is entrusted with the responsibility of the issuance of ID cards to all
authorized members of the AUB community. The objective of the ID Center is to
centralize the issuance of the identification cards and to automate the information
using the network facility and the centralized servers.
Information for issuing new ID cards for students, academic and non-academic
employees, including retirees, is electronically sent to the ID Center. The ID
Center can access the information gathered by the departments concerned via the
main server in order to produce and renew the IDs for those authorized by the
Registrar's Office for students and the Human Resources Department for faculty
and staff.

14
ID's are issued to the following categories:
Categories Approved By Color of the Validity
Bar
Students Registrar Red 1 year
Faculty and Staff Human Resources Green 5 years
Part Time Teachers Human Resources Green Contract Period
Faculty and Staff Auxiliary Services Light Green 5 years
Dependents
Hospital Residents Human Resources Dark Blue 1 year
Hospital Interns Human Resources Light Blue 1 year
Household Help Auxiliary Services Yellow Residency Period
(Permanent)
Alumni Members Office of Orange No Limit
Development
Retired Professors and Human Resources Dark Green No Limit
Employees
Contractors and Auxiliary Services
Contract Workers
Alumni Association Office of
Development
President's Club Auxiliary Services
Members
Scholarship Fundraising Auxiliary Services
Committee
Friends of the AUB Auxiliary Services
Museum
Casual Domestic Help Auxiliary Services

CHAPTER THREE
15
3.0 System Design Methodology
3.1 Design of The New System
The purpose of the system is to produce specifications, which will enable a
complete, accurate. And specialized implementation of the new system. The new
system designed after a detailed analysis of the existing system. The functional units
of the existing system were included the problem associated with them were
detected and possible solutions in the new design.
3.2 Output Specifications and Design
Here, the input is determined by the output. The output is very precise and
comprehensive. It is the report generated on citizen issued with the Students
Identity Card. Also, the output design tries to create room for assessment of
records and data.
The fields that could be found at the output include:
NAME:
ADDRESS:
AGE:
SEX:
MARITAL STATUS:
DATE OF BIRTH:
STATE OF ORIGIN:
HEIGHT:
CURRENT ADDRESS:
PROFESSION:
OCCUPATION:
NEXT OF KIN:
GONOTYPE:
BLOOD GROUP:.

STUDENTS IDENTITIY CARD


16
NAME: ………………………..… DATE OF BIRTH…………….……
ADDRESS:…………………….. TOWN:………………………………. AGE:
…………………………….. STATE:………………………………. HEIGHT:
……………………….. BLOOD GROUP:…………………… L.G.A:
…………….TOWN:……………ID FORM NO:………………….
STUDENTSITY:………………….. PERSONAL NO:……………………
PROFESSION/OCCUPATION:…………………………………………
R.C:…………………..SEQUENCE N0…………………….
DATE OF ID ISSUED:…………………… SIGNATURE:…………….

3.3 Input Specification And Design

The input to the system is flexible and precise. It is also supplied through the
system is flexible and precise. It is also supplied through the keyboard. The
input items include,
SURNAME:
SEX: AGE:
DATE OF BIRTH:
HEITHT:
STATE OF ORIGIN: L.G.A
CURRENT ADDRESS: PROFESSION:
MARITAL STATUS:
NEXT OF KIN:
BLOOD GROUP:
GONOTYPE:

17
Also, there are some spaces reserved for the officers in charge of Students
identity card section. The input format is thus: -
SURNAME: OTHERNACES:

SEX: MALE FEMALE

DATE OF BIRTH: AGE:


PLACE OF BIRTH: TOWN: STATE:
STATE OF ORIGIN: L.G. ATOWN:
CURRENT ADDRESS: STATE: TOWN:
CLASS LEVEL:
HEIGHT: BLOOD GROUP: GENOTYPE:

SPECIAL FEATURES

MAIDEN NAME

PARTICULARS OF NEXT OF KIN


SURNAME:
FIRST NAME: MIDDLE NAME:
ADDRESS:
APPLICANTS ORIGIN:
PLACE: STATE:
DATE OF ID CARD ISSUE: PLACE:

STATE: LGA: RC: SEQUENCE NO.


ID FORM NUMBER:
PERSONAL NUMBER:

18
3.4 File Design

The file design was for the purpose of good storage of received proper data.
Proper management assessment and reliable retrieval of data. The file was
grated in a random made with the structure below.
File Structure

VARIABLE

WIDTH
NAME
FIELD

TYPE
1 SURNAME SN CHARACTER 15

2 OTHERNAME ON CHARACTER 20

3 SEX SE CHARACTER 3

4 DATE OF BIRTH DB NUMERIC 8

5. PLACE OF BIRTH PB CHARACTER 10

6 STATE OF ORIGIN SO CHARACTER 10

7 CURRENT ADDRESS CA CHARACTER 12

8 HEIGHT HE CHARACTER 3

9 BLOOD GROUP BG CHARACTER 2

10 DATE OF ID CARD ISSUE DCI NUMERIC 3

11 PLACE PL CHARACTER 8

12 STATE ST CHARACTER 8

13 L.G.A LGA CHARACTER 10

14 RC RC NUMERIC 8

19 SEQUENCE NUMBER SN NUMERIC 3

20 ID FORM NUMBER IFN NUMERIC 3

21 PERSONAL NUMBER PN NUMERIC 8

19
3.5 PROCEDURE CHART

FORM DOCUMENTS
(APPLICATION FORM)

RECEIVE DATA FROM KEYBOARD

STORE DATA IN THE OPENED FILE

STORE RECORD IN FILE

STORE FILE ON DISK

RECEIVE FILE FROM DISK

OPEN FILE RETRIEVE RECORD

OPEN FILE ACCESS RECORD

DISPLAY RECORD

20
3.6 SYSTEM FLOW CHART

ENTER PASSWORD

MAIN MENU

ENTRY UPDATE

CHOOSE
RECEIVE ENTRIES
A MENU

UPDATE RECORDS

REPORT
EXIT TO MAIN MENU

CHOOSE VIEW RECORD

EXIT TO MAIN MENU

A MENU
DISPLAY VIEW OVERALL RECORDS

DISK STORAGE

21
3.7 System Requirements
The system objective is the most paid and also the most defined during system
analysis which will involve the actual usage of software developed towards which
the design is directed and entails to its intended purposes.

The system software is developed using the Quick Basic programming language,
the choice is made and preferred owing to the fact that it runs in all compatible
computers (HP or otherwise). Also, some anti-virus programs were installed in
order to maintain a functions and effective running of the program and also protect
the loss of files.

Hardware Requirements
This will include a 14 Video display unit, terminal keyboard for input cables
connecting the components. Printers for output and memory storage, which can be
a 586 or 686 on a 32 MB hard disk density of 3.5GB. The storage memory
allocation will not be less than 350 kilobytes base memory. The printer not be less
than a HP Laser jet 5 and above for a hard copy printout. This new system should
be sited within the computer room for its main place where all these operations
take place and also for accessibility for both citizens and then of the department of
students civic Registrations services.
Description and Analyses of The Existing System
The existence of the computerized student’s identity card processing and
administration does not give a full criterion of what is required to process a
particular identity card. Computer as we all know, is used to store and process a
particular identity card and process data and records. Likewise the computer used in
the identity card section because of aspect of the identity card activities are carried
out with aid of the computer while the rest are carried out manually. The parable
mode of operation is very expensive to maintain and it is very difficult to
operate. This is because a high and intensive is needed in order to avoid the risk
of impersonation in the identity card section.
The INPUT made being rigid, does not allow or easy operation in the case of
error. To this effect, there is no room for easy update because of its ancient
system set up. Initially, the input mode is made on paper, it is not on-line. Data
update and assessment update is not reliable to partial manual operation in its
achievement.
Report Generation which aids processing of students identity card is not made
timely therefore delays fast decision. Also, it is always not as accurate as desired
by the management due to a lot of discrepancies during the processing even
when there is a need of inspection to know how the service of department works,
there seems to be a delay in the report generation. Therefore, the existing system
has failed to meet up entirely with the expectation requested of it before the
design started. This is a result of the advancement in the society which has
outgrown the prospects of the existing system design.
3.8 Fact Finding Method
During the course of this study, the researcher applied different method of finding
fact. The methods include.
- INTERVIEW
- REFERENCES TO WEITTEN DOCUMENT AND STUDENTS
IDENTITY CARD MANUAL BOOK.

INTERVIEW
The researcher visited the Students Identity card Office (especially the
Administrative, Field Operation, Local government) which was used as a case
study of several occasion and interviewed the staff and personal available on
seat orally.
The persons involved responded to the interviewed question to the best to their
knowledge. The facts and answers incurred from the discussion made it possible
for the researcher to begin the study, some of the interview question include:-
- What is STUDENTS IDENTITY CARD?
- What is the importance of the STUDENTS IDENTITY CARD?
- What are the conditions for issuing STUDENTS IDENTITY
CARD?
- What are the major rules of the operation and Border patrol
section over the processing of the identity card?
- What are the objectives of the existing Students identity card
processing system?
- What are the problems encountered by both the operation/Border
Patrol as well as the management as a whole?
- What are the possible solutions?
Also, the personnel who were involved in the interview tried to link the
researcher with other zones who were connected with the processing as well as the
processing of the Students identity card itself.

REFERENCES TO WRITTEN DOCUMENT AND


MANUAL
The researcher addition to her findings visited some libraries
and the department of students civic registrations library and
made references to already written document for more details
concerning this study. To this effect, the fact provided by the
referenced next made it possible for the completion of the study
work.
3.9 Objective Of The Existing System.

The existing system was set to achieve the following-


- To produce a system that will be accurate in report generation.
- To produce a system that will make storage and processing very easy
and accurate.
- To make the management take quick and adequate decision at all
time.
- To always process and produce valid and genuine students identity card
for its citizen at all time.

3.10 Input, Process, And Output Analysis.


INPUT ANALYSIS
The input to the system is made on papers in forms. The forms are filled by the
Students Identity applicant and submitted to the clearance officer for clearance
then to the duty clerk who files it and makes it flow. Before a form is issued to
the applicant, he/she must meet some necessary condition stated as thus
- Letter of identification from the local government through the
councilor in charge of your areas.
- Age declaration of birth certificate.

And until this condition is met, no applicant can be given a right to fill a form
in procurement for an students identity card. Since the input is very rigid, it
does not allow for easy correction of data if any mistake is noticed. Also due to
the mistakes and clean up using fluids, it makes input form very unity.

STUDENTS IDENTITY CARD

NAME: BLOOD GROUP:


CLASS: GONOTYPE: AGE:
SEX:

DATE OF BIRTH

TOWN:
L.G.A:
STATE:
NEXT OF KIN:
DATE:
STATUS:
HEIGHT:
SIGN:
Process Analysis
The processing analysis is the use of laid down conditions in assessing the
application record. This processing is a careful exercise. It takes a lot of time to
come to a conclusion on whether to issue students identity card to an applicant or
not. This also involved the checking of the validation of the supplied record by
the Applicant.

Output Analysis
The output is the Students identity card booklet information which builds up the
students identity card holders records with the Department of students civic
Registration or the ministry of internal affairs and students identity card
section. These records are kept for security purposes and for the major purposes
of references when necessary.
The sample above shows the students identity card output. The management when
necessary references to these items listed.

STUDENTS IDENTITY CARD

NAME: TOWN:
ADDRESS: STATE:
AGE: SEX: BLOOD GROUP:
HEIGHT: GONOTYPE: L.G.A:
TOWN
STUDENTSITY:
STATUS:
DATE OF ISSUE:
DATE OF BIRTH: SIGNATURE:
3.5 INFORMATION FLOW DIAGRAM

FILLED FORM

FILLED D

COMPILED FORMS

OPERATIONS

ENDORSED

STUDENTS IDENTITY CARD OFFICER

IDENTITY CARD BOOKLET

FINISHED

3.6 Problems Of The Existing System


The ministry of internal affairs has sometimes been in the new either
because of the fraud caused by its men through coming with individual to
produce a non-documented Students identity card or collecting illegal fees from
individuals.
By this manual systems, many of the set objective has been fulfilled
partially. The technological development an activity growth in the society has
out grown the existing system.
- There is always difficulty and delay in information update and report
generation, due to the nature of information storage.
- The rigidity of the input is a big problem, which aids inaccuracy,
- The simplicity of the system is not accrued (i.e the existing system is very
difficult to use) and it is expensive to maintain and also Students identity
card can be used by proxy.
- Also, data link medium is not found and as a result cause a lot of delay
information relay.
- The existing system lack on-line data entry which leads to inaccuracy and
incomprehensible.

3.7 Justification For The New System.


Computer have added immense effort in the monitoring of students identity card
holders in and out of Nigeria. Since we are in the path of information
technology growth, we need the basic capability to install and use advanced
computers.
With computer installed in the ministry of internal affairs service (especially the
identity card section) we are expected to have these.
- An easy data storage, update and retrieved very easy and accurate.
- An accurate, timely and comprehensive report generation on
processing is achieved.
- Also, a special protective means are introduced into the system.
- At the center of any on-line, real-time information system, one needs
a database technology, which permits the establishment or
relationship between various pieces of information. This facilitates the
rapid storage, classification, retrieved, update as well as the
assessment of the data.
- As easy to use terminals which can be operated by the consumer of
information.In future, we will see the rapid introduction of intelligent
work stations which are able to perform memory functions.
Intelligence is the value ended components in computers.
CHAPTER FOUR
SYSTEM IMPLEMENTATION

This chapter entails the manual guide on design and implementation of computerised
students’ identity card (ID card system) and how to run the program effectively. All
the steps that will help in the smooth running and operating or using the program
are all documented.

4.1 System Documentation


The language interpreter files are stored in a floppy disk labeled “FAITH” or if
your system runs a Q BASIC PROGRAM, you insert your diskette and follow the
under sated procedures to achieve your aim.
To change to drive A your drive C-C:\> Type A: Press <enter> key, the prompt
changes thus A:\> At this prompt, type QBASIC:A:\> QBASIC and confirm it with
an enter key.

With this, it loads the QBASIC Interpreter.


Press (ESC) to remove the dialogue box and the environment is ready. The
program is loaded through the language environment. On the language
environment, press ALT+F and use your arrow keys to highlight open and press
enter.
Type in STUDENTS IDENTITY CARD and press enter –A:\> STUDENTS
Identity Card has this automatically loads the source program into the
memory.
To run the program, press F5 this launches the password section.

Here, for you to gain access to the main environment, you will have to key in the
correct password code.
The correct code launches you into the main menu screen.
The main menu is colorful and it is made up of three options viz.
ENTRY/UPDATE
REPORT GENERATION
EXIT TO PROGRAM
Each option is selected by pressing the number against each option
1. ENTRY/UPDATE
2. REPORT GENERATION
3. EXIT TO PROGRAM

This option takes you to another colorful menu which is made up of 4 options
thus:
1. create a data file
2. add records to file
3. delete a record
4. Exit

This is where you choose a particular option by pressing the number against it.
Create a data file: this is where you create and fill in the data in response to a
particular name. Some of the fields supplied include:
Surname…………………………….other names……………………
Sex ………………………………………………………………………. Date
of birth…………………………place of birth……………………
Add record to file: this is where you have the chance to change or update a
record due to either marriage, change of name, change of work and others.
Delete record: Here, you are allowed to delete or erase a particular record or eve
the entire record because of death e.t.c.
Exit to Menu: This closes the ENTRY/UPDATE Option and takes you back to
the main menu.
After the analysis of this entire Software System, I chose to work with Adobe
CS5 Dreamweaver and MySQL database as our development tools.
The choice of Adobe CS5 was due to the fact that it is a development platform
that helps in creating web applications at a very fast speed. It is a high level
programming language that provides a very user friendly environment to write
managed applications and involves less coding.
Our choice of MySQL database is due to the fact that it can be used to set up a
query which, when applied to a database typically returns a set of records that
matches your SQL (Structured Query Language) query. It is also used to handle
large databases

4.2 System Requirement


In order to realize this project, the following software components were used

4.2.1 Hardware Requirement


In the cause of the design, the software developed needed the following
hardware for an effective and efficient operation of the new system
Intel Computer System
1. At least 512 MB RAM
2. At least 40gb hard disk
3. Colored Monitor
4. An uninterruptible power supply (UPS)
5. Printer

4.2.2 Software Requirement


The software requirement includes:
1. A window 98 or higher version for faster processing
2. Microsoft Access
3. Visual Basic Integrated development environment (version 6.0)
4. Dream Weaver
5. Font Page

4.4 Database Implementation


Several database tables and forms were designed and implemented in this
project using MYSQL (Structured Query Language) database. Each of these
tables and forms has their corresponding user interface that enables the user to
supply data to the system. Application table was designed for this system in
order to capture the account number of each application submitted. Once an
application is entered, it is automatically numbered and this is seen on top of
every application / students registration form. The students ID card number of
every application is automatically captured and stored in the account database
table. In the implementation phase, the project reaches fruition. A critical
phase in SLDC (System Development Life Cycle) is the successful
implementation of the system; implementation simply means bringing the new
system into operation. Due to our well-written documentation and user training
methods developed by the experts will aid the user staff so that they can use the
system efficiently and effectively. Firstly install the software and start using. As
the software has been implemented for performing all the tasks related to client
information system and as a result it will reduce the complexity at work.

4.8 Implementation The New System


The new design is computerized. It was designed to solve the problem in line
with the existing system. A skeletal guides to the development of the new
program code, detailed under this chapter. Also the program design
pseudocodes, flowcharts, and source program codes are all contained in this
chapter.
4.9 Program Design
The program complexity were broken down into simplier units and solved
separately and individually. The units were represented as module in the
artifacts of the design. This makes it easy for modifications in order to meet with
the new technological changes. There were a total of three modules in the entire
program design. A earlier, stated. The modules were represented individually.
ENTRY/UPDATE MODULE

This module takes care of all the entries concerning the system as well as the
modifications on already keyed in data. The entries are made through the
keyboard. The update as well makes necessary update as requested and
equally updates the content of the master file. The entry module takes care of
automatic savings of the entered records. It is sensitive and interactive in
information handling.
REPORT MODULE

This report module generates results from processed information. It works on


the special request from the user. It acts as a data base, where we can sort or
determine a particular item to search for. It also gives a report on the particular
file by sending the printer or printing on the screen.
EXIT MODULE

Here all operations that are involved in the closure of the files and the
program itself are achieved.
ID CARD SYSTEM APPLICATION
DOCUMENTATION
The Application is a web based application which used HTML, CSS, and
JAVASRCIPT AND PHP. It was marked up using Html, styles with Css and
Programmed using JavaScript as a Client Side Language and PHP as a server side
language.
The application gives room for creating departments as students are grouped in
departments. It allows for creating of new idcards, editing them and printing of
selected departments.
FILE/FOLDER STRUCTURE
1. Folder Structure
I. App
i. Core
a. Id card_ template(folder)
b. Passports (folder)
c. Signatures (folder)
d. Actions.php
e. Db_config.php
f. Edit_card.php
g. Functions.php
ii. Css (folder)
iii. Font-awesome (folder)
iv. Fonts (folder)
v. Js (folder)
vi. All_cards.php
vii. Auth.php
viii. Back_card.php
ix. Card.php
x. Card_edit.php
xi. Dashboard.php
xii. Dept.php
xiii. Header.php
xiv. Settings.php
xv. View_all.php
xvi.

2. Css (folder)
3. Font-awesome (folder)
4. Fonts (folder)
5. Img (folder)
6. Js (folder)
7. Index.php

DETAILS OF EACH FOLDERS


The application is divided into two parts, the core application and a welcome page
(index.php) which is in the root of the application.
 The index.php file: This is the welcome page of the application
 The APP FOLDER: This is where all logics of the application resides
 The APP/CORE FOLDER: This houses several folders and scripts that serves
as main functions to the application.
 The APP/CORE/IDCARD_TEMPLATE FOLDER: This is Where uploaded
idcard front and back are been stored using a php script.
 The APP/CORE/PASSPORTS FOLDER: this is where all uploaded
passports are been stored using a php script.
 The APP/CORE/SIGNATURES FOLDER: This is where all uploaded
signatures are been sored using a php script.
 The APP/ACTIONS.PHP: This runs logics for adding departments, deleting
departments, editing departments, uploading idcard templates and editing
them.
 The APP/DB_CONFIG.PHP: This is the server configuration file. The Host,
Username, Password and database name.
 The APP/EDIT_CARD.PHP: This is the script which performs single idcard
editing.
 The APP/FUNCTIONS.PHP: Some functions used all over the applications
are been declared and structured in this file. Functions such as
 clean( ),
 get Dept( ),
 get Field ( ),
 get Count ( )

 The APP/CSS FOLDER: The houses the style sheets for the APP folder.
 The APP/FONT-AWESOME FOLDER: This houses the font-awesome css
styles used in the application folder.
 The APP/FONTS FOLDER: This is what the font-awesome folder uses to
refrence its fonts
 The APP/JS FOLDER: This houses JavaScript files used in the application.
 OTHER SCRIPTS IN THE APPLICATION: Every scripts have been
carefully named and designed using a modular programming approach. They
are readily commented to show what each block of codes does.
IDCARD PROCESS FLOWCHARD
Department Process Flowchart
Fig 4.1 Account form (Students ID Card) implementation

4.3.1System Security Implementation


Login menu is for the user that has registered already and simply wishes to
access the system. Fig 4.2 shows the user interface that captures data from a
new user. Here the user supplies username and password which are verified for
validity and existence, if they already exist, they are rejected, but if they are
unique and valid, the username and password are created for that user.
4.3.2 Implementation of the Feedback Table
Design
Fig 4.3 is the implementation of the user interface that captures feedback data
from users in terms of how they feel about the system, their comments,
recommendations, etc. When this information is supplied, it is captured and
stored in the feedback database table.
4.3.3 Implementation of Transaction Table
Design
Fig 4.4 is the implementation of teller interface for students ID card that
captured data and stored in the transaction database table.
4.4 The Test Plan
The test plan used in this project was to test the modules, the subsystems and
then the entire system. The testing was done in two parts: unit testing and
integration and final testing.
4.4.1 Test Data, Expected versus Actual Test
Result
At subsystem level testing, each subsystem was taken as the test data while at
module level testing; each module was taken as the test data. The entire system
was also taken as the test data during the system testing. During this testing, the
expected result was noted, which was compared with the actual result that came
up. These step by step processes were taken in all the stages of the testing
process and are hereby presented in the following tables.

4.4.2 Testing the database


The database was tested by supplying sample data to each of the database tables
and then verifying that the data supplied is reflected in the database.
Account Number Testing
 Login Page Testing
Test Data Expected Result Actual Result
It was expected to see the logon The logon page was
form displayed and when data
Login Form displayed and ready to accept input was supplied, it reflected
from user. The database was also in the database.
expected to be updated with the
information supplied on the logon
Table 4.3 Login page Testing
Feedback Form Testing

Test Data Expected Result Actual Result


It was expected to see the feedback The feedback form was
Form
Feedback Form displayed and when data
displayed and ready to accept input was supplied, it reflected
from the user. The database was also in the database.
expected to be updated with the
data inputs supplied.
Table 4.4 Feedback Form Testing
4.4.3 Testing the Admin side
On testing the Admin side, all the admin side subsystems were tested as well as
their individual modules. There was unit and general testing, in other words
each module was tested individually and finally tested collectively as a
subsystem.
4.4.5 Integrated Testing
After the unit and general testing, all the modules in each subsystem were
integrated into one subsystem and tested and finally all the subsystems were
integrated into one system and equally tested.

4.4.6 System Evaluation


The system performance was satisfactory. It is very simple to use.
Performance evaluation was carried out in all the testing process
including the unit and general testing.

CHAPTER FIVE

5.0 Conclusion And Research Option/Further Reading


5.1 Conclusion

The work has been designed and computerized for the students Identity Card
section of the department of students Civic Registration under the ministry of
internal affairs. To assess and monitor the procurement of the students Identity
Card by individuals in order to eradicate the forgery and duplication of students
Identity Cards thereby restricting individuals only to one students identity card for
citizens. Using QBASIC Program is a way of manipulating the processes
involved in the assessment to bearest minimum. Computer has made work very
ready and interesting. The students identity card as produced in time and
adequate measures are taken to maintain proper record and security pursuits.
This work made the staff to have more time to themselves. Also by
implementing of this work, the huge maintenance of the manual record system
will drastically be reduced.
5.2 Research Option/Further Reading
Computer has all times proven its superiority over every other technological
invention. To this effect, I recommend that for further elaboration on this
project.
- Every aspect of the students Identity Card operation should cease to a
manual operation.
- A system analyst should be employed to make-up the board of
decision that are responsible for planning and implementing the attire of
students Identity Card issuance and assessment.
- The workers should be given more incentives to enable them put in
relenting efforts in discharging their duties.
- The computerization should be maintained up-to date at all times.
- Security code inscription should be maintained on all the STUDENTS
Identity Card.
- The staff should be trained to very computer literate.
- The program should be modified to suit all the sections of
Department of Students civic

REFERENCES
ANAN, J.J. & GRAW, M.C. (2012). Population Control’s London.

London: Broad Street Press.

CLARKE, J.I. (2009). Population Geography and the Developing

Countries. Texas: Ohio Press.

DAN, J. (2007). Automatic Document Processing. Chicago: Abram’s

Press.

Efraim, T., Aronson, E. & Ting-Peng, L. (2008). Identity Cards.

Amsterdam: British Publishers.

GACHET, A. (2004). Literature on the Problems Involved in Identity Cards

Washington: Abraham Press.

HENK, G. Sol et al. (2007). Advantages &Disadvantages of Identity Cards.

Hong-Kong: Tai Sun Press.

JOHN,O. (2007). Travelers and Tourism. Lagos: Vanguard Press.

KEEN, P.G.W. (2008). The Importance of STUDENTS Identity. Netherland:


Rich Press.
OMINDE, S.H. (2012). Population Growth and Economic Development in
Africa: Lagos: Ola Press.
PAUL, C., (1987). Information Processing for BTEC. USA: Kleen

UniversityPres
45

You might also like