Design and Implementation of an Online Identity Card Generation System a Case Study of National Open University Nigeria

 

ABSTRACT

This project focuses on an online system which generates student Identity Card (ID). The project shows how an online system works as well as its uses and advantages to the National Open University of Nigeria. It highlight on the Identity Card, and the security sciences rendered by the online system servers (Client, Recipient, Hosts, Nodes) which provides access information from processed data for the users before entering switched data (packets) into the system. In this medium, the system transfers the data to its original format where it can be generated as identity card. The design was executed using PHP, MYSQL database, HTML and XAMP server.  

CHAPTER ONE

INTRODUCTION

1.1       Background of the Study

An identity document is any document which may be used to verify aspects of a person’s personality. It is issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). Countries which do not have formal identity documents may require informal documents. In the absence of formal identity document, driving licence can be used in many countries as a method of proof of identity. Although, some countries do not accept driving licence for identification, often because in those countries they do not expire as documents and can be easily forged. Most countries accept passports as a form of identification. Most countries have the rule that foreign citizens need to have their passports or occasionally a national identity card from their countrirs, available at any time if they do not have residence permit in the country. A student identification card can only be issued to genuine bonafide students. Card holders can use the card to identify themselves as students around the campus or outside the campus. The identity card is managed and administered by the (Student Identity Card Association (SICA) of the school or Dean of Students Affairs.

Today, it is believed that the application of computer technology in any activity would go a long way in making that activity much easier. To the researcher, this statement remains a theory until it is proven otherwise by the implementation of a computerized student ID-card processing system. It is also believed that benefits and advantages of using computers outweighs that of manual methods. This is also proven beyond doubts by the researcher through the implementation of the new system.

1.2       Statement of the Problem

The major problems that gave rise to this research project is faced by NOUN and they include late registration of students, corrupt students that know diverse ways of producing fake identity cards, corrupt and tactical students who have a way of sneaking into the examination hall with fake identity cards.

1.3       Aim and Objectives of the Study

 The aim of the study is to design and implement workable computerized system for students’ identity cards. The objectives of the study are as follows:

  • To establish efficient means of tracking students with fake ID-Card.
  • To reduce examination malpractice in NOUN, at least in the area of impersonation
  • To create a reliable database of students in NOUN, with unique features like passport photographs and registration numbers for research purpose (project writing defence).

1.4       Purpose of the Study

  1. To design a system with the capability of providing a wait-and-take processed ID-card.
  2. To design an ID-card processing system that ensures timely processing.
  3. To improve on the already existing system by designing a successful, secured privacy and reliable ID-card processing system that will help in providing complementary help to ID-card processing personnel through the availability of computerized information.

1.5       Significance of the Study

This research work would be unnecessary if it has no significance to humanity. Firstly, the newly designed system would make other-higher institutions to see the need for creating a computerized student ID-card processing system to use in production of student ID-card. Secondly, the knowledge of the new system designed would make students and teachers/lectures contemplating on impersonation and have a change of mind for fear of being caught. Thirdly, the designed system would provide jobs for system analysts, programmers, and information specialists contacted to build the system for other institutions. Fourthly, student identity card is used to check out books from the library, register to vote on Student Union Government (SUG) election. Finally, the research projects would serve as reference materials to other scholars interested for further research on the related topics.

1.6       Organization of the Work

This research work has been arranged in the following order:

Chapter one: contains introduction, background of the study, aims and objective, purpose of the study, significance of the study, organization of the work and definition of terms.

Chapter two: literature review, Chapter three: research methodology, Chapter four: implementation and evaluation, Chapter five: summary of results, conclusion and recommendation.

1.7       Definition of Terms

In order to do away with ambiguity, some terms and keywords in the context of this research work are hereby defined.

Identity Card: It is a proof of the holder’s identity that includes a photograph. Impersonation: The act of pretending to be candidate in order to write examination for someone else using that person identity card.

Verification: Is the evidence that proves that something is true or current/false.

Photograph: It is an image appeared on the identity card owner.

Malpractice: Is a careless, wrong, or illegal practices that is not ethical in a particular field like academics.

 

DOWNLOAD CHAPTERS 1 TO 5 PDF

GET MORE COMPUTER SCIENCE TOPICS

//
Welcome! My name is Damaris I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.