DESIGN AND IMPLEMENTATION OF COMPUTERISED STUDENTS' IDENTITY CARD (ID CARD) SYSTEM


 DESIGN AND IMPLEMENTATION OF COMPUTERISED STUDENTS' IDENTITY CARD (ID CARD) SYSTEM

ABSTRACT

Introduction

An identity document is any document which may be used to verify aspects of a person’s personality. If issued in the form of a small, mostly standard-sized card, it is usually called and identity card (IC). Countries which do not have formal identity documents may require informal documents.

In the absence of formal identity document, driving licenses can be used in many countries as a method of proof of identity, although some countries do not accept driving licenses for identification, often because in those countries they do not expire as documents and can be old easily forged. Most countries accepts passports as a form of identification.

Most countries have the rule that foreign citizens need to have their passport or occasionally a national identity card from their country, available at anytime if they do not have residence permit in the country. A student identification card can only be issued to genuine bonafide students. Card holders can use the can to identify themselves as a student around the campus or outside the campus. The identity card is managed and administered by the (Student Identity Card Association (SICA) of the school.

TABLE OF CONTENTS

Title Page  

Certification                

Dedication  -      

Acknowledgement       

Abstract      -    

Table of Contents -      

CHAPTER ONE – INTRODUCTION

1.0     Introduction       

1.1     Theoretical Background -  

1.2     Statement of Problem    -       

1.3     Aim and Objectives of the Study  

1.4     Significance of the Study                

1.5     Scope of the Study             

1.6     Organization of the Research 

1.7     Definition of Terms     

CHAPTER TWO

2.0     Introduction        

2.1     Concept of Identity Card             

2.2     Overview of Plastic Identity Badges     

2.3     Identity Card- An Overview    

Overview of Identity Document Forgery  

Use Scenarios, Forgery Techniques and Security Countermeasures of ID-Cards.   

CHAPTER THREE – SYSTEM ANALYSIS AND DESIGN

3.0     Introduction       

3.1     Research Methodology -   

3.2     System Analysis 

3.2.1  Analysis of the Existing System    

3.2.2  Problem of the Existing System     

3.2.3  Analysis of the Proposed System    

3.2.3.1        Advantages of the Proposed System      

3.2.3.2       Disadvantages of the Proposed System    

3.3     System Design   

3.3.1  Input Layout      

3.3.2  Program Flowchart      

3.3.3  Output Format    

CHAPTER FOUR -      SYSTEM IMPLEMENTATION AND DOCUMENTATION

40      Introduction         -      

4.1     System Design Diagram      

4.2     Choice of Programming Language   

4.3     Analysis of Modules      -

4.4     Programming Environment   

4.4.1  Hardware Requirement  -    

4.4.2  Software Requirement  

4.5     System Implementation -   

CHAPTER FIVE     –    SUMMARY, CONCLUSION AND

RECOMMENDATION

5.0     Introduction       

5.1     Constraints of the Study       

5.2     Summary  

5.3     Conclusion

5.4     Recommendations      

References 

Appendix A (Program Flowchart)  

Appendix B (Source Code)    

Appendix C (Output Format)

CHAPTER ONE

INTRODUCTION 

1.0 Introduction 

An identity document is any document which may be used to verify aspects of a person’s personality. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). Countries which do not have formal identity documents may require informal documents. 

In the absence of formal identity document, driving licenses can be used in many countries as a method of proof of identity, although some countries do not accept driving licenses for identification, often because in those countries they do not expire as documents and can be old easily forged. Most countries accepts passports as a form of identification. 

Most countries have the rule that foreign citizens need to have their passport or occasionally a national identity card from their country, available at anytime if they do not have residence permit in the country. A student identification card can only be issued to genuine bonafide students. Card holders can use the card to identify themselves as a student around the campus or outside the campus. The identity card is managed and administered by the (Student Identity Card Association (SICA) of the school. 

1.1 Theoretical Background       

Today, it is believed that the application of computer technology in any activity would go a long way in making that activity much easier. To the research, this statement remains a theory until proven otherwise by the implementation of a computerized student ID-card processing system. It is also believed that benefits and advantage of using computers outweighs that of manual methods.   

This also wants to be proven beyond doubts by the researcher through the implementation of the new system.

1.2 Statement of the Problem 

The major problems that gave rise to this research project is faced by Akwa Ibom State Polytechnic and they include late registration of student’s, corrupt students that know diverse ways of producing fake identity cards, corrupt and tactical student’s   who have a way of sneaking into the examination hall with fake identity cards. 

1.3 Aim and Objectives of the Study

The aim of the study is to design and implement workable computerized system for student’s identity cards. 

The objectives of the study are as follows: 

1. To establish efficient means of tracking students with fake ID-Card.

2. To reduce examination malpractice in Akwa Ibom State Polytechnic, at least in the area of impersonation

3. To create a reliable database of students in Akwa Ibom State Polytechnic, with unique features like passport photographs and registration numbers.

4. For research purpose (project writing defense).  

1.4 Significance of the Study 

This research work would be unnecessary if it has no significance to humanity.

Firstly, the newly designed system would make other-higher institutions to see the need for creating a computerized student ID-card processing system to use in production of student ID-card. 

Secondly, the knowledge that the new system has designed would make students and invigilators contemplating on impersonation and have a change of mind for fear of being caught. 

Thirdly, the designed of the system would provide jobs for system analysts and programmers contacted to build the system for other institutions. 

Fourthly, student identity card is used to check out books from the library, register to vote on student union matters, and get student discount. 

Finally, the research projects would serve as reference material to other scholars interested to further research on the topic. 

1.5 Scope of the Study

This research work restricted to implementation of computerized student ID-card processing system; using Akwa Ibom State Polytechnic as a case study. Data used for the study were gathered from this source.  

1.6 Organization of the Research 

This research work has been arrange in the following order: 

Chapter one contains introduction, theoretical background, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the  research and definition of terms (where necessary).

Chapter two focused on the relevant literature review, highlighting basic concept. 

Chapter three is concerned with the system design which emphasis on system design and flowcharting. It also expands the development of the new information system that would facilitate tracking of fake ID-cards.

Chapter four is the system implementation which gives the direction of system and analysis of modules.

Chapter five summarizes and concludes the research work offering some useful recommendations. 

1.7 Definition of Terms

In order to do away with ambiguity, some terms and keywords in the context of this research are hereby defined. 

Identity Card: It is a proof of the holder’s identity that includes a photograph.

Impersonation: The act of pretending to be avoid candidate in order to write examination for someone else using that person identity card.

Verification: Is the evidence that proves that something is true or current.

Photograph: It is an image appeared on the identity card owner.

Malpractice: Is a careless, wrong, or illegal practices that is not ethical in a particular field like academics. 

CHAPTER TWO

LITERATURE REVIEW  

2.0 Introduction 

This chapter focused on the review of related literature on research topics, it take a look at the suggestion, comments, citations, of various authors, scholar’s and professionals and the issue of the student ID-Card. The review is carried out under the following sub-headings:

2.1 Concept if Identity Card  

Security lapses on school campuses are a real threat and growing problem in today’s world. Improve security at your school by updating the visitor sign-is process, which often fails to provide sufficient visitor identity information, and replace it with an automated ID-card scanning solution (Ben, Quarmby, 2003). Ensure that along with visitor name, data and time of entry, you also gave their address, drivers licenses number and basic physical description in your system. Is your school using antiquated paper attendance tracking and manual visitor log book? In addition to increase safety, modern attendance tracking software can save time and money for teachers and school alike. Using the existing student and staff ID-cards on use on  campus, upgrade, school tracking system by incorporating magnetic stripe, barcode reader or proximity smart card technologies. Attendance tracking software increase accuracy with immediate transmission to central location, offering the ability to quick compile attendance data from which you can learn if certain classes routinely struggle with attendance problem, and which students if any, are frequently tardy to class or absent. The data can be as individualized or campus-wide as you’d like, so you can learn about developing or potential problems before it too late depending on the schools policy you can also automatically notify parents. According to (Naledi, 2003), schools and educational institutions can save money by using a single photo ID-card to serve multitude of applications. Student ID-cards first and foremost as a form of identification, but can also be used for school food service account management, access to computer and technology facilities, secure access control for tracking student activity and attendance. With an onsite photo ID system student faculty, staff and visitor IDs can be produced and demand using photo ID printers, with very little wait time. Students can have their photos taken and receive their printed ID cards within minutes, without involving an outside vendor and the time and cost involved in dealing with one. 

.

DESIGN AND IMPLEMENTATION OF COMPUTERISED STUDENTS' IDENTITY CARD (ID CARD) SYSTEM



TYPE IN YOUR TOPIC AND CLICK SEARCH.






RESEARCHWAP.ORG

Researchwap.org is an online repository for free project topics and research materials, articles and custom writing of research works. We’re an online resource centre that provides a vast database for students to access numerous research project topics and materials. Researchwap.org guides and assist Postgraduate, Undergraduate and Final Year Students with well researched and quality project topics, topic ideas, research guides and project materials. We’re reliable and trustworthy, and we really understand what is called “time factor”, that is why we’ve simplified the process so that students can get their research projects ready on time. Our platform provides more educational services, such as hiring a writer, research analysis, and software for computer science research and we also seriously adhere to a timely delivery.

TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • "Researchwap.org is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.org" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.