Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

DESIGN AND IMPLEMENTATION OF AN AUTOMATED &

COMPUTERIZED STUDENT IDENTITY CARD AND VERIFICATION


(CASE STUDY OF ESPAM FORMATION UNIVERSITY)

BY

OLADOKUN ABDULAZEEZ DAMOLA

ESPAM/CSC/21/0187

BEING A RESEARCH PROPOSAL SUBMITTED TO THE DEPARTMENT


OF COMPUTER SCIENCE, FACULTY OF PURE & APPLIED SCIENCES,
ECOLE SUPERIEUR PANAFRICANE DE MANAGEMENT APPLIQUE
(ESPAM FORMATION UNIVERSITY REPUBLIC OF BENIN.
IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE
AWARD OF BACHELOR OF SCIENCE (B.sc) DEGREE IN COMPUTER
SCIENCE.
SUPERVISED BY
MR ADEYEMO KAYODE
CERTIFICATION
This is to certify that this project was carried out by OLADOKUN ABDULAZEEZ
DAMOLA with matriculation number ESPAM/CSC/21/0187, in the department of
computer science, faculty of pure & applied science. This work has been read and
accepted as part of requirements for the award of Bachelor of Science (B.sc)
COMPUTER SCIENCE, ESPAM FORMATION UNIVERSITY
CHAPTER ONE

INTRODUCTION

1.1 Background of the study


Today, it is believed that the application of computer technology in any activity would
go a long way in making that activity much easier it is also believed that the benefits and
advantages of using computers outweigh that of the manual method. Student identity card
forging has been an increasing crime rate in the university setting and examination
impersonation has also been a key factor that needs urgent redress. Hence, an automated
student identity card generating/verification system is important in other to tackle these
limitations by way of tying each student to a unique bar code, as a means of authentication.
However, the description of the structure in view, is to create a reliable database of
student in the university of Espam Formation University with unique feature that can link
student bio-data to ID Card and produce ID card automatically just with the student’s
registration number.

1.2 Statement of the problem


The major problem that gave rise to this research project faced by Espam Formation
University includes;

1. Student information’s are collected and stored manually


2. There is no proper Database for student record
3. Difficulty in Identifying with fake ID card
4. ID card process is done manually

1.3 Aim and Objectives of study

The aim of the study is to Design and implement an automated student identity card
generating system. The system will achieve the following objectives.
i. To create a reliable database where admin can add student in the Espam Formation
University with unique features.
ii. To reduce the problem of impersonation and examination malpractice by introducing
the id card verification module.
iii. To create an automated system, a format for automatic generation of student ID card.
iv. To identify students with fake ID card who are not bona fide students of the university
1.4 Research Questions:
Research questions play a crucial role in guiding a study on the design and
implementation of Automated and Computerized Student Identity Card. They help in
focusing the research and gathering relevant informati0 con. Here are some questions
for my project.

1. In what ways does the implementation of automated student identity card cards
impact data management and privacy, and how can institutions optimize the
design to uphold data integrity and protect student’s personal information.
2. What design considerations are essential for developing a user- friendly interface
in the implementation of automated and computerized student identity card
systems, ensuring seamless interaction for both students and administrative
personnel?
3. How can the integration of automation and computerization enhance the efficiency
and security of student identity card systems in educational institutions, addressing
factors such as data accuracy, access control, and overall user experience?
4. How can the incorporation of biometric technology contribute to the security and
authenticity of student identity cards in an automated system, and what are the
potential challenges and ethical considerations associated with its implementation.

1.5 Research Methodology:

The proposed research methodology that would be adopted are as follows:


1. Security and Privacy Assessment: Conducting a comprehensive security and
privacy assessment is crucial in the implementation of automated student identity
cards. This involves identifying potential vulnerabilities, evaluating encryption
methods, and addressing privacy concerns.
2. Prototyping and Iterative Development: Utilizing prototyping allows for the
creation early versions of the automated system enabling stakeholders to visualize
and interact with the design. Iterative development involves refining the system
based on feedback, ensuring that it evolves to meet the specific needs of the
educational institution and its users.
3. User-Centered Design (UCD): Employing UCD principles involves
understanding the needs and preferences of end- users (students, administrative
staff) throughout the design and implementation process. This methodology
ensures that the automated student identity card system is intuitive, efficient, and
meets the practical requirements of its users.

1.6 Scope and Limitation of the study

The scope of the research work will be limited to design and implementation of an
automated student identity card generating system (ID card system). The study will be
limited to university of Espam formation university. Some of the constraints that have in
one way or another affected the outcome of the work include;

a. Resource: Due to the complex and insecurity associated with human factor during this
research, personal who are used to the manual system perhaps for fear of losing their
jobs have been reserved in distinguishing all necessary extensive one.
b. Time: due to time allowed for this project work as a student was limited to come up
with a reasonable work with the stipulated time.
c. Power: Availability of stable and efficient power supply was also a major limitation of
this project as it had been suspended several times during design stages.

1.7 Significance of the study


Identity card helps to identity and control access for currently enrolled student.
Students who are currently enrolled can be easily identified from those who are not, who
are from another campus, or who have had certain access privileges revoked with school
ID card.
The following are importance of student identity card
1. To ensure student stronger security
2. Streamlined surveillance
3. Improved access control for school technology
4. Protect student personal data
1.8 Definition of terms:

The following words have been defined as they will be used in the study.

Design: a design is a plan or specification for the construction of an object or systems, for
the implementation of an activity algorithms or policy.

Implementation: It is the realization of an application or executive of plan idea mode


Design specification, standard algorithm or policy.

Automated system: an automated system is an integration of sensors, control, and act


actors design to perform a function with minimal or no human intervention.

Identity card processing: the procedure involved in the processing of an identity card.

Student ID card assessment: the procedure or act of checking identity card already in
used.
CHAPTER TWO
REVIEW OF RELATED LITERATURE
2.1 Introduction
This chapter gives an insight of various studies conducted by outstanding researchers,
as well as it explained terminologies with regards to the design and implementation of an
automated student identity card generating system. The chapter gives a review of the
history and present a status of the problem outlined by a concise review of the previous
studies into closely related problems.

2.1.1 Concept of ID card


An identity card is a portable document typically a plasticized card with digitally
embedded information, that someone is required or encouraged to carry as a means of
confirming their identity. Since world trade center tragedy of September 11, 2001, many
countries have discussed issuing national identity cards as a way to distinguish terrorist
from the law-abiding population (Quarmby, Ben 2003).

2.1.2 History of Identity card


The history of identification date back thousands of years. In fact, the first mention
(Pharmby, Ben) A version of the passport considered to be the earliest identity document
inscribed into law was introduced by King Henny V of England with the safe conduct
ACTs 1414. For the next 500 years up to the onset of the first world war, most people did
not have or need an identity document.
Photographic identification appeared in 1876 but did not become widely used until the
early 20th century when photographs became part of passports and other ID documents such
as driver licenses, all which came to be referred to as “photo IDs” both Australia and Great
Britain, for example, introduced the requirements for a photographic passport in 1915 after
the se-called lody spy scandal scandal (Doward, Jamie 2005).
The shape and size of identity cards were standardized in 1985 ISOIIEC 7810.
Some modern identity documents are smart card that include a difficult-to-forge embedded
integrated circuit standardized in 1998 bt IsoIIEC 7816. New technologies allow identity
document cards to contain biometric information, such as a photograph, face, hand or Iris
measurement or fingerprints. Many countries issue electronic identity cards (Guardian
2006).

2.1.3 Importance of student Identity cards in the school system


Identity card helps to identify and control access for currently enrolled student.
Students who are currently enrolled can be easily identified from those who are not, who
are from other campus, or who have had certain access privileges revoked with school ID
card (Roya and Auandnani 2007).
The following are importance of student identity card

a) To ensure stronger security


b) Streamlined surveillance
c) Protect student personal data
d) Improved access control for school technology
e) A more efficient visitor process

2.2 Grammatical Description of Standard Structure and Process of System in View

The description of the structure to create a reliable database of student in the Espam
Formation University with unique feature that can be link with the ID card processing system
that access a student Bio-data and produce ID card automatically within 2 minute and reduce
the problem of impersonation and examination malpractice by introducing the use of Biometric
verification.

The purpose of the design is to meet the specification of the system software,
determine flexible system alternative that will achieve the recommended result and the
optimum use of the hardware, software and other processing resources that may be used in
implementing solution for there to be good system design, top down developing programmed
in orderly way, decomposing the requirement into well specific high level model.

2.3 Review of related literature

The advert of smart card technology has brought many positive changes to the society
such as security and convenient in the performance of an array of activates. Since it’s
introduced in 1974, the use of smart cards has become increasingly prominent over 3.8 billion
were estimated to be in use as the last millennium. The smart card with it many applications
has been implemented in Angola, Morocco, Germany, Italy, Nigeria and many other European
countries as a medium of electronic identification with a good amount of success. With the
tremendous success of smart card technology, it is extremely rare to find individuals from the
developed and developing society and nation with only one card in their carriage. They
probably have a least two or more cards each one serving its distinct function

You might also like