You are on page 1of 45

CHAPTER ONE

INTRODUCTION
1.0 PREAMBLE
The National Identity Card Processing system is one of the means through which a
nation’s populations figure can be ascertain to be accepted as a citizen within a given
geographical area, this is because it is necessary for a particular person to have a
citizenship. This citizenship can be approved through issuing National Identity Card.
This identity card will bear your name, states, every single information about you as an
individual or person. This therefore boils down to what we know as National Identity
Card.
The Question is “what is an identity card? As defined by many authors and dictionary
including the encyclopedia. It is a national document certifying State, nationality, issued
by the government of a country to every individual or person; it can also be defined as a
true image of an individual or person, because it tells well about a person.” Every citizen
of a country within a stipulated age has constitutionally has the right to apply for the
Insurance of the National Identity Card in the state he or she is staying. The National
Identity Card is not issued to people who are below a particular age. For this reason,
there is a need for the maintenance and assessment of records in order to maintain
current data concerning an individual. It is also for easy references, to know the number
of labor force, Identification and fraud check and also good for revenue allocation of the
federal government for proper population figure.
However, there are different arms in the internal affair ministry which takes the
responsibility of checking and issuing the National Identity Card. But as it concerns our
area of interest in this project work, Department of National Civil Registration Under the
Federal ministry of Internal Affairs, of Nigeria will be our target

1
1.2 HISTORICAL BACKGROUND
World War II initiated the contemporary era of ID cards. In 1938, lawmakers in the
United Kingdom passed the National Registry Act, which mandated that all residents
possess identity cards. The German government also instituted an ID system that year
(although these cards contained information about residents’ religion for discriminatory
purposes). In 1940, the Vichy government in France instituted an ID system as well, as in
Greece and Poland. These systems largely endure to this day, except in the United
Kingdom, where courts repealed mandatory IDs in 1952. Analysts have noted that civil
law countries are more likely to maintain ID statutes than common law countries (such as
the UK). With only a handful of exceptions, no common law country in the world has
accepted a peacetime identification system.
Overall, ID card policy depends on each country’s institutional specificities, but some
trends are common across countries. National ID systems are often implemented in times
of heightened security risk. Governments also tend to implement ID systems to
consolidate state institutions or during periods of economic transformation. In sum, ID
card adoption is more likely following economic or political shocks, which give
governments the incentive and legitimacy to create identity systems.
1.1 STATEMENT OF THE PROBLEM
National Identity Card processing system is not an easy task. This is because it involves
absolute carefulness to ascertain a population figure, prevent forgery and avoid the
dangers of Impersonation, duplication of multiple National Identity Card for a particular
person. Scanning through reports for a file with definite information can be a techniques
and time consuming due to the volume of record to be scanned. Also editing particular
information as a result of marriage, change of name, or loss of Identity card in other
words known as update will also be a tug of way for the individual in charge. It creates
weariness and loss of dedication to duties by the staff thereby restricting the powers of
the Department of National Civil Registration services following the constitution of the
Federal Republic of Nigeria which states that “No Public Officer shall put himself in a
position where his personal interest conflict with his duties and responsibilities” (1999
2
Constitution 5th schedule point 1 no.1), the processing and administration system will be
capable of restricting to non-authorized person.
1.3 AIMS AND OBJECTIVE
The primary purpose of the study is to critically analyze the activities of National Identity
card Processing and Administration system with a view of controlling forgery and
duplication as well as finding a lasting solution to these problems. To create a better and
lasting identity card system for Nigeria as a whole.
For the fact that this project research is aimed at having comprehensive review of the
manual system of operation being carried out in the Identity Card section of the
Department of National Civil Registration Nigeria into a computerized system. The
following will be taken into consideration for subject matters. They are:
 Ensure accurate and timely update of the holder record.
 Check multiple possession of the National Identity card.
 Deprive immigrant who are not citizen of the country from obtaining the
National Identity Card.

1.4 SCOPE OF THE STUDY


This is limited to the activities involved in National Identity Card Processing and its
administration system and also report generation on the National Identity Card holders
Information.

1.5 LIMITATIONS
The limitation is based on the facts which the researcher could not lay hands on
pertaining to the study, which evolves the problems of insufficient analysis.
In addition to these limitations are time factors and financial insufficiencies.

3
1.6 SIGNIFICANCE OF THE STUDY
Computer have added immense effort in the monitoring of national identity card
holders in and out of Nigeria. Since we are in the path of information technology
growth, we need the basic capability to install and use advanced computers.
With computer installed in the ministry of internal affairs service (especially the identity
card section) we are expected to have these.
 An easy data storage, update and retrieved very easy and accurate.
 An accurate, timely and comprehensive report generation on processing is
achieved.
 Also, a special protective means are introduced into the system.
 As easy to use terminals which can be operated by the consumer of
information.

1.7 DEFINITION OF TERMS


As we go into this work, some words will need precise definition to enable the reader
assimilate the entire contents.
COMPUTER: An electronic machine capable of accepting data in the form of input,
processes it under a set of complete condition, stores information or request for
references and generated result in the form of output.
APPLICATION: As it concerns this subject matter, it is one who applies to the
Department of National Civil Registration for the Issuance of National Identity Card of
the stipulated age.
CITIZEN: Under the provision of the amended constitution decree No. 32 of 1974,
citizen is any person who becomes citizen of any country either by birth, descendant,
Registration or Nationalization.
IDENTITY CARD PROCESSING: The procedure involved in processing and identity
card.
IDENTITY CARD ASSESSMENT: The procedure or act of checking Identity card
already in use or to be produce.
4
SOFTWARE: is a general term used to describe all the various programs that may be used on a
Computer system together with their associated documentation.

INTERNET: can be defined as a medium for communication and information exchange in many
Forms. It used to connect two or more computer system together to send and recieve information
globally without concepts and location.

DATA:data means are raw fact that are not processed or yet to processed.
ID: Means Identity is the distinguishing character or personality of an individual
1.8 PROJECT ORGANIZATION

This project consist of five(5) chapters: the chapter one (1) is made up introduction, overview,
historical backgroud, statement of the problem, aims and objectives, significance of the study,
scope and limitation of the study, and definations of the term.so also chapter two (2) consist of
literature review and review of related literature. Then chapater three (3) with the
introduction,overview of research methodology,method used for data collection,analysis of the
current system,justification of the new system,UML diagram,flow chart diagram, and use case
diagram. Likewise chapter four (4) consist of introduction, choice of programming
language,input specification, database design, and system testin and implementation. Then
chapter five (5) which is final stage consist of summary, recommendation and conclusion.

CHAPTER TWO
LITERATURE REVIEW

5
2.0 OVERVIEW
National Identity Card can also be called a true image of an individual or persons because
it tells well about a person. ”Identity card as defined cannot be issued by either from
school nor home. But, there is a special organization or ministry that takes charge of both
processing and administration of National Identity Card. The Ministry of Internal Affairs
under the Department of National Civic Registration.
Identity Card is a mark of Identification. And also, it tightly identifies the holder whose
photograph is placed in the identity card. It is also contain all necessary information
needed to know about the holder of the identity card (J.K 1997). Furthermore, J.K
emphasized that the essence of such identification is mainly for security purposes.
(John Orgeon 2000), in his book. “Travellers and Juorism” defines travelers as a process
of making long journey within or outside ones territory. People travels in order their
relatives do business with people or for changing environment. To this effect, there is a
need for the travelers to bears a mark of identification, which is the National Identity
Card. The Identity Card being and outstanding document, is very official and is only
issued out and controlled by the Government under the auspices of the Ministry of
Internal Affairs.
Dan Jougliow (2001), in his book. “Automatic Document and Processing” defines
document processing as preparation of printed evidences for births, deaths, marriage,
identification etc. These document are processed to be very unified and easily
maintained. With the introduction of identity card, the problem associated with identity
card processing system has been totally solved. The computer maintain and access
information about identity card holders automatically with little human intervention.
Fraud is eliminated. The machine access everything automatically according to
predefined program instruction using a defined government criteria. (Tony Ikara, 2003)
in a journal titled “Identity Card Processing. Effects and Benefits” Says that identity card
represents the image of a nation.
According to (Al-Khouri, 2006), the National ID system incorporates the latest
technological advances. The system guarantees secured communication throughout the
6
system’s national network structure by using Virtual Private Network (VPN) technology
and an associated technical Public Key Infrastructure (PKI).The fingerprint-based
biometry provides the means to ensure a single identity for each applicant and to
authenticate the identity of the Identity card bearer. In principle, the National Identity
System is designed to provide three primary operations, Population Register and
Document Imaging Management (PRDIM).
The National Identity system maintains the Population Register that records information
about every United Arab Emirates (UAE) citizen and legal resident registered on the
system and assigns a unique. Identification Number (IDN) to each person. The system is
currently sized to manage five million records. It provides the means to record events
such as births, marriages, divorces and deaths, as well as the updating variable
(constantly of changing) information such as address, education, employer, etc. The
National Identity system also stores images of the official support documents presented
during the application for an Identity card or on events declaration on the Population
Register.
The National identification system includes a process for the enrollment, processing,
production and delivery of identification card. This process is adapted for the first
application for an identification card including the renewal of an expired Identity card or
placement of a damaged, lost or stolen Identity card. The Identity card produced by the
national Identification system includes biometric fingerprint-based authentication
capabilities and uses a public key infrastructure (PKI) that is adapted for future e-
government and e-commerce usage.

2.1 IDENTITY
Academic experts have invested considerable efforts in exploring to what extent and how
digital identity may be different compared to physical identity. Greenwood (2007)
introduces a useful typology for different forms of identity in relationships with
government:
7
 Digital identity (e.g. username, email address);
 Physical identity (e.g. passport, driver’s license, birth certificate); and
 Dual or “converged identity”, a combination of digital and physical identity
(e.g. a ‘chipped’ person or animal, biometric passport) (Greenwood, 2007, p.5).
Several scholars argue that, now that people increasingly are operating in digital
environments, individuals have a growing amount of digital identities used to identify
themselves in relationship with other entities (Clarke, 1994; Pittman, 2007). Whereas, in
the physical world, identity is considered to entail a rather comprehensive set of
individual characteristics by which a person is recognized or known, in the digital world
on the other hand an identity can be a rather simple subset of identity information (e.g. an
email-address) (OECD, 2007). Moreover in the digital world, even a role-based identity
can be defined as an identity, which may be used by a group of individuals who share the
same role concurrently or in turns (Clarke, 2008).
As an expression of digital identity, most scholars utilize the concept of identity
information, i.e. data relating to a person. Moreover, an individual can represent a subset
of identity information, which is often referred to by the concept of partial identity.
Identity attributes are used to express the contents of partial identities or digital identities
(OECD, 2007).
Unlike physical identity, digital identities are typically distributed in different forms and
related to different locations (Norlin & Durand, 2002). For instance, identity can be
defined as “any subset of attributes of an individual which sufficiently identifies this
individual within any set of individuals” (Pfitzmann & Hansen, 2006, p.28). Usually an
individual does not know all of her identities. Moreover, these identities may change as
the person’s attributes change. Consequently, aiming at developing a universal definition
of identity and/or an “identity provider” is very hard, if not impossible (Pfitzmann, 2007).
Moreover, several scholars perceive the social context as a determinant factor for
identity. From this relativist perspective, identity is granted and modulated by an
individual's roles, relationships, and reputations in a variety of social networks

8
(Clippinger, 2005). Based on a subjective interpretation of digital identity, Blakley et al
distinguish the following properties (OECD, 2007, p.26):
• Identity is social– To engage in social interactions people need something that
persists and that can be used as a basis for recognition of others;
• Identity is subjective– different people attribute different characteristics to an
individual, constructing different identities for him.
• Identity is valuable– by building a history of a person’s past actions, exchange of
identity information creates social capital and enables transactions that would not
be possible without identity;
• Identity is referential – an identity is not a person, it is only a reference to a
person.
• Identity is composite– while some information is provided voluntarily by the
individual, other information about him is developed by others without the
person’s involvement;
• Identity is consequential– because identity tells of a person’s past actions, the
decision to exchange identity information carries consequences;
• Identity is dynamic– identity information is always changing;
• Identity is contextual– people have different identities that they may wish to
keep entirely separate. Keeping identities separate all owes a person to have more
autonomy;
• Identity is equivocal – the process of identification is inherently error-prone.
2.2 IDENTIFICATION
Identity Management (IDM) conceptualizations not only have an ‘Identity dimension’,
i.e. a set of characteristics representing a person, they also have an ‘Identification
dimension’, that is a set of terms, concepts and mechanisms that relate to the disclosure
of Identity information and the use of this information (FIDIS, 2005, p.26). Generally, the
term ‘Identification’ describes the process of ensuring a person is who he or she claims to
be (Crompton, 2004). Identification in digital environments can be defined as the
association of data with a particular human being: an identified record or transaction is
9
one in which the data can be readily related to a particular individual (Clarke, 1994, p.8).
FIDIS-researchers utilize the following definition for identification, which may cover
identification in both physical and digital environments: the set of approaches and
mechanisms that intervene in the course of an interaction and which are very broadly
related to the disclosure of identity information (FIDIS, 2005, p.36).
Many authors utilize the concept of an identifier to indicate an information item that can
be used to provide some level of authentication for a person (OECD, 2007; FIDIS, 2005).
Identification occurs when a person or entity compares the identifiers of another person
or entity, with a set of identifiers that the person or entity has previously recorded, and
finds a match between the two (Harper, 2006). Generally, scholars distinguish the
following four broad categories of identifiers (e.g. Harper, 2006; FIDIS, 2005; Anrig et
al, 2004):
• Something that you are – characteristics that are inherent in a person or attached
to an individual’s physical body, e.g. DNA, fingerprints, voice signatures;
• Something you do – characteristics that relate to the behavior of an individual,
e.g. click behavior in a digital environment, attitudes in a specific social context;
• Something you know – the characteristic of having some distinct knowledge,
usually knowledge that few others have, e.g. passwords, mother’s maiden name
etc.
• Something you have – the characteristic of possessing some distinct item, these
identifiers are often called “tokens”, e.g. smart cards, software tokens like digital
certificates, keys.
• Something you are assigned to – identifiers that are socially defined for the
person, these identifiers are associated with people but not inherent or attached,
e.g. name, addresses, titles, social security number, etc(Harper, 2006).
• Scholars seem to agree that these categories of identifiers differ in their usability
and their reliability.
• Moreover, scholars point out that identification can be used for interventions in
the following contexts (FIDIS, 2005, p.36-37):
10
• Access control to restricted resources or areas – this control comprises two
different aspects: authentication of the individual and access management;
• Exploitation of identity information – allowing access to relevant information
so that the impact of the interaction can be increased (e.g. customization of
services, diagnostic services, direct marketing);
• Monitoring to enable accountability – the ability to record and audit the actions
of a person (e.g. for supporting transactions, developing an individual’s
reputation).
Another distinction made by scholars is that identification can happen explicitly or
implicitly (FIDIS, 2005, p.38-39):
• Explicit identification relates- to processes in which the person is aware, and
even participates in identification. Examples of explicit identification mechanisms
are passwords, ID cards, biometric elements, business cards, introduction of the
individual by another person in a social process;

• Implicit (or inferred) identification relates- to processes that are used to


authenticate the person and obtain the identity information without this person
being aware, relying upon a series of available information from which the
identity information is inferred or extracted. This can include identifiers attached
to the person (e.g. visual appearance, IP number, RFID), or traces of
characteristics that can be captured and analyzed.

2.3 AUTHENTICATION
Authentication relates to the verification of the individual’s identity, ensuring he or she is
the person he or she claims to be (FIDIS, 2005; van der Ploeg, 1999). Several authors
describe authentication as the process of checking a claim or assertion made by the
person about their identity, such as confirming that a person making a bank transaction is
indeed the account owner (e.g. Crompton, 2004; Greenwood, 2007). In comparison,
Clarke defines authentication as the process of testing an assertion in order to establish a
11
level of confidence in the assertion’s reliability (Clarke, 2008). Identification Identity
verification can be done on the basis of one or more identifiers. Moreover, verification is
not restricted by the two individuals or entities involved in the identification process, but
can be done through the use of (trusted) third party. Such as a certification authority.

2.4 RELATED LITERATURE REVIEW


The card is first issued at age 12, compulsory by 15. Since the beginning of 2005
the e-ID (electronic ID entity-card) has been issued to Belgian citizens who apply
for a new identity card. Apart from being a form of identification, the card also is
used for authentication purposes. Future usages include using the e-ID as a library
card, keycard for restricted areas or chartrooms and the digital signing of
documents. It is expected that in 2009 all Belgians will have an e-ID card. The
identity cards for Belgians living abroad are not electronic cards like those issued
in Belgium. They are, however, equally valid and are accepted and used in the
same way as the electronic identity card. They have to be carried at all times.

Botswana It is compulsory for all citizens at age 16, and there are penalties for not
obtaining it within one month of turning 16 or obtaining citizenship, whichever
comes last. Includes the image of the individual (no headgear or eyewear), their
particulars, and their right thumbprint. Valid for 10 years, whereupon it must be
renewed and a new photograph taken. Must be presented upon request by any
agent of the state, and the state requires all non-state institutions to use the
National ID card as the only acceptable means of identification for citizens -
passports and driver's licences should not be used, even though they contain most
of the information on the ID card, including the ID card number. There are
penalties for being issued a replacement card when it has been lost, however, if it
is changed to update information on it only the application fee must be paid (e.g.

12
upon expiry, and legal name changes as when a woman gets married and assumes
her husband's surname). Every time a new one is issued for whatever reason, a new
photograph must be taken. The individual keeps their National ID card number for
life, and in recent years it has been linked to the birth certificate number of
newborn infants (it is the same number). The National ID card must be surrendered
to the government upon the demise of the individual, at which time it will be
exchanged with an official death certificate.
Compulsory for all German citizens aged 16 or older to possess either a
"Personalausweis" (identity card) or a passport, but not to carry it. While police
officers and some other officials have a right to demand to see one of those
documents, the law does not state that one is obliged to submit the document at
that very moment. Fines may only be applied if an identity card or passport is not
possessed at all, if the document is expired or if one explicitly refuses to show ID
to the police. If one is unable to produce an ID card or passport (or any other form
of credible identification) during a police control, one can (in theory) be brought to
the next police post and detained for a maximum of 12 hours, or until positive
identification is possible. However, this measure is only applied if the police have
reasonable grounds to believe the person detained has committed an offence.
As driving licences are not legally accepted forms of identification in Germany,
most persons actually carry their "Personalausweis" with them.

CHAPTER THREE
RESEARCH METHODOLOGY

3.0 INTRODUCTION
13
The Aims of this project is to advance an e-National Identity Card System, that allow
citizen’s to start for their Enrollment at home, a great portable interface of interaction
between the citizen’s and system and so also, the system will guide the user by its simple
illustrations.

3.1 OVERVIEW OF RESEARCH METHODOLOGY


Research methodology is the process used to collect information and data for the purpose
of making research decisions and to achieved a desired goal. The methodology may
include publication research, interviews, surveys and other research techniques, and
could include both present and historical information.
In simple terms, methodology can be defined as, giving a clear cut idea on what methods
or process the researcher is going to use in his or her research to achieve research
objectives. In order to plan for the whole research process at a right point of time and to
advance the research work in the right direction, carefully chosen research
methodology is very critical. In other words; what is Research methodology can be
answered as it maps out the whole research work and gives credibility to whole effort of
the researcher (J.K 1997).

3.2 METHOD USED FOR DATA COLLECTION


Data Collection is an important aspect of any type of research study. Inaccurate data
collection can impact the results of a study and ultimately lead to invalid results. Data
collection methods for impact evaluation vary along a continuum. At the one end of this
continuum are quantitative methods and at the other end of the continuum are qualitative
methods for data collection.
During the course of this study, the researcher applied different method of finding fact.
The methods include.
 Primary method used for data collection
 Secondary method used for data collection

14
The researcher selected primary method for data collection such as questionnaire and
interview. The researcher used six geopolitical zonal for questionnaire in order to gather
the information.
The researcher also used secondary method for data collection such as magazine,
journalism, listing radio and viewing television as secondary method.

3.3 ANALYSIS OF THE CURRENT SYSTEM


The identity card processing system is not an easy task. The reason is because it involves
networking all the computers in that organization and as well as to present forgery and
avoid the dangers of duplication of multiple passports for one particular person. The
system in question can also defined how loses a tight the security department is change of
the passports section.
Scanning through for definite information can be a tedious and time wasting work
because of the large volumes of record to be scanned. Also, to change a particular
information may be as a result of marriage, change of name and loss of passport in other
words known, as update is also a tag of war for the individual in charge. It is also a big
task detecting who and who were given or issued with a passport thereby creating space
for duplication of passport and for a person. It results to weariness and loss of dedication
to duties by the staff.  

3.4 JUSTIFICATION OF THE NEW SYSTEM


Computers have added immense effort in the monitoring of National Identity Card
holders in and out of Nigeria. Since we are in the path of information technology
growth, we need the basic capability to install and use advanced computers.

15
With computer installed in the Ministry of Internal Affairs Service (especially the identity
card section) we are expected to have these.
 An easy data storage, update and retrieved very easy and accurate.
 An accurate, timely and comprehensive report generation on processing is
achieved.
 Also, a special protective means are introduced into the system.
 As easy to use terminals which can be operated by the consumer of
information.

3.5 DATA FLOW CHART DIAGRAM


A flowchart is a type of diagram that represents an algorithm, workflow or process,
showing the steps as boxes of various kinds, and their order by connecting them with
arrows. This diagrammatic representation illustrates a solution model to a given problem.
Flowcharts are used in analyzing, designing, documenting or managing a process or
program in various fields.
A flowchart is a formalized graphic representation of a logic sequence, work or
manufacturing process, organization chart, or similar formalized structure. The purpose
of a flow chart is to provide people with a common language or reference point when
dealing with a project or process. Flowcharts use simple geometric symbols and arrows
to define relationships. In programming, for instance, the beginning or end of a program
is represented by an oval.  A process is represented by a rectangle, a decision is
represented by a diamond and an I/O process is represented by a parallelogram. The
Internet is represented by a cloud. 

START

REGISTRATION

LOGIN
16

ADMIN
Figure 3.1 Flow chart
3.5.2 USE CASE DIAGRAM
The Unified Modeling Language (UML) is a general-purpose, developmental, modeling
language in the field of software engineering that is intended to provide a standard way to
visualize the design of a system.
UML was originally motivated by the desire to standardize the disparate notational
systems and approaches to software design developed by Grady Booch, Ivar
Jacobson and James Rumbaugh at Rational Software in 1994–95, with further
development led by them through 1996.
In 1997 UML was adopted as a standard by the Object Management Group (OMG), and
has been managed by this organization ever since. In 2005 the Unified Modeling
Language was also published by the International Organization for
Standardization (ISO) as an approved ISO standard. Since then it has been periodically
revised to cover the latest revision of UML.
17
Figure 3.2: Use Case Diagram

3.6 STATISTICAL ANALYSIS OF THE RESULT


The statistical analysis describes the results obtained by the questionnaire from the
respondent views of charts. The following are the charts below

QUESTION: Your Gender

18
Figure 3.3
In the above figure 3.3, described or shows the advantage of statistical analysis of the
respondents on the views of computer profession and skills, which analyzed the 50% of
the respondents are Literate and Illiterate among them were exceed 40% while the natural
among the respondent as described in the above figure called others only occupy 10% in
the views.
QUESTION: Your Age range

Figure 3.4
The above figure 3.4: show the statistical analysis of the respondents on the views of the
age range from the six political zone.
QUESTION: Your Geopolitical zone

19
Figure 3.5
The above figure 3.5: shows the statistical analysis of the respondents on the views for
each geopolitical zone.
QUESTION: Biometric data would identify the true identity of a citizen

Figure 3.6
The above figure 3.6: shows the result of statistical analysis of the respondents on the
views of biometric data would identify the true identity of a citizen.

20
QUESTION: Does the manual National-ID meet the desired goal

Figure 3.7
The above figure 3.7: shows the result of statistical analysis of the respondents on the
views for manual National ID meet the desired goals.

3.7 SYSTEM REQUIREMENT


The system objective are the most paid and also the most defined during system analysis
which will involve the actual usage of software developed towards which the design is
directed and entails to its intended purposes.

3.8 HARDWARE REQUIREMENTS


The hardware requirements for the project are:
1. A minimum of Pentium IV system
2. A 2GB of RAM or more.
3. 50Ggb of Hard disk or more

3.9 SOFTWARE REQUIREMENTS


21
The software requirements include:
1. A window XP and Window 7 or higher version for faster processing.
2. Visual Basic integrated development environment (vb.net )
3. Database Access

CHAPTER FOUR

22
SYSTEM ANALYSIS, DESIGN AND IMPLEMENTATION

4.0 INTRODUCTION
Systems analysis as "the process of studying a procedure or business in order to identify
its goals and purposes and create systems and procedures that will achieve them in an
efficient way". Another view sees systems analysis as a problem-solving technique that
decomposes a system into its component pieces for the purpose of the studying how well
those component parts work and interact to accomplish their purpose.
Systems design is the process of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. Systems design could
be seen as the application of systems theory to product development. There is some
overlap with the disciplines of systems analysis, systems architecture and systems
engineering. In another word System design is the process of defining the elements of a
system such as the architecture, modules and components, the different interfaces of
those components and the data that goes through that system. It is meant to satisfy
specific needs and requirements of a business or organization through the engineering of
a coherent and well-running system.
Implementation is the carrying out, execution, or practice of a plan, a method, or any
design, idea, model, specification, standard or policy for doing something. In another
word implementation is the action that must follow any preliminary thinking in order for
something to actually happen. Implementation is the realization of an application, or
execution of a plan, idea, model, design, specification, standard ,algorithm, or policy.

4.1 CHOICE OF PROGRAMMING LANGUAGE


The scripting language selected to accomplish actualize the project is Visual Basic.
"Visual" refers to the method used to create what the user sees the graphical user
interface, or GUI. "Basic" refers to the BASIC (Beginners All-Purpose Symbolic
Instruction Code) programming language, a language used by more programmers than

23
any other language in the history of computing. This choice was informed by the
following features of the Visual Basics scripting language:

 It is Open Source
 Closely integrated with MS Access database
 Has an inbuilt XML parser
 It is light weight and does not consume much server resources to render page
 Easy syntax flow supports

4.2. INPUT SPECIFICATION


The input to the system is flexible and precise. It is also supplied through the system is
flexible and precise. It is also supplied through the keyboard.
The input items include,
IDENTITY NO. FIRST NAME:
MIDDLE NAME: OHER NAME:
PHONE NO GENDE:
GENDER: STATUS:
STATE: LOCAL GOVT:
RESIDENTIAL ADDRESS: CONTACT ADDERSS:
DATE OF BIRTH: WARD:
OCCPATION: NEX OF KIN:
MOTHER’S NAME:

4.3 OUTPUT SPECIFICATIONS


Here, the input is determined by the output. The output is very precise and
comprehensive. It is the report generated on citizen issued with the National Identity
Card. Also the output design tries to create room for assessment of records and data.
24
The fields that could be found at the output include:
IDENTITY NO:
SURNAME:
MIDDLENAME:
DATE OF BIRTH:
GENDER:

NATIONAL IDENTITIY CARD


IDENTITY NO.:………………………….. SURNAME:…………………………...
MIDDLENAME:…………………………. DATE OF BIRTH:…………………….
GENDER:…………………………………

4.4 DATABASE DESIGN

In any good database design, effort should be made to remove completely or minimize
the redundancy. The database design in the software is achieved using Microsoft access
database. Below is the structure of the file designed in the database.

4.4.1 Pre-Enrolment Table

FIELD NAME VARIABLE TYPE WIDTH

25
1 IDENTITY NUMBER NATID CHARACTER 15
2 FIRST NAME FNM CHARACTER 20
3 MIDDLENAME MNM CHARACTER 3
4 OTHERNAME ONM NUMERIC 8
5. PHONE NUMBER GSM CHARACTER 10
6 GENDER GENDER CHARACTER 10
7 STATUS STATUS CHARACTER 12
8 STATE STATE CHARACTER 8
9 LOCALGOVT. LGA CHARACTER 3
10 RESIDENTIALADDRESS RAADD CHARACTER 2
11 CONTACT ADDRESS CAADD CHARACTER 8
12 DATE OF BIRTH DOB CHARACTER 10
13 WARD WARD CHARACTER 10
14 OCCUPATION OCCU NUMERIC 3
15 NEXT OF KIN KIN CHARACTER 8
16 MOTHER’S NAME MONM CHARACTER 8
17 THUMB THUMB OLE OBJECT 10
18 PHOTO PHOTO OLE OBJECT 8
19 PHOTOLOC PHOTOLOC CHARACTER 3

Table 4.1: Pre-enrolment

4.4.2 Account Creating Table


FIEL WIDTH
NAME VARIABLE TYPE
D

26
1 EMAIL EMAIL EMAIL 15
2 PASSWORD PSSWRD CHARACTER 20
3 CURRENT PSSWRD CPSSWRD CHARACTER 3
4 FIRST NAME FNM CHARACTER 8
5 PHONE NUMBER GSM CHARACTER 10

Table 4.2: Registration

4.5 SYSTEM TESTING


System testing is a test conducted on a completed, integrated system to evaluate the
system's compliance with its specified requirements. System testing falls within the scope
of black box testing, and as such, should require no knowledge of the inner design of the
code or logic.
As a rule, system testing takes, as its input, all of the "integrated" software components
that have successfully passed integration testing. The purpose of integration testing is to
detect any inconsistencies between the software units that are integrated together (called
assemblages). System testing is a more limiting type of testing; it seeks to detect defects
both within the "inter-assemblages" and also within the system as a whole.
The following are the strategies adopted at the testing phase of the system:

4.5.1 Unit Testing: Unit testing is a procedure used to validate that individual
units of source code are working properly . A unit is the smallest testable part of
an application . A web page is taken as an individual unit in the present application

4.5.2 Integration Testing: Integration testing is a systematic technique for


constructing the software architecture while at the same time conducting tests to uncover
errors associated with interfacing. The purpose of integration testing is to verify
functional performance and reliability requirements placed on major design items.
These “design items”, or groups of units, are exercised through their interfaces. Using
Black Box testing , success and error cases being simulated via appropriate

27
parameter and data inputs. Simulated usage of shared data areas and inter process
communication is tested and individual subsystems are exercised through their input
interface. The strategy adopted in this research is incremental integration testing, a
combination of top-down and bottom-up testing.

4.5.3 Validation Testing: Validation testing is a concern which overlaps with


integration testing. Ensuring that the application fulfils its specification is a major
criterion for the construction of an integration test . Validation testing also overlaps
to a large extent with system testing , where the application is tested with respect
to the typical working environment . Consequently, for many processes no clear
division between validation and system testing can be made.
Validation succeeds when the software functions in the manner that can be
reasonably expected by the client.

4.5.4 Output Testing: The integrated system is tested for the predefined
output for the specified input . This testing is done at the unit level. It is ensured that
the system generates valid and consistent outputs.

4.5.5 User Acceptance Testing (UAT): UAT is one of the final stages of a
project and often occurs before a client or customer accepts the new system . This
test ensures that the system is developed as per the requirements specifications.
UAT acts as a final verification of the required business function and proper
functioning of the system , emulating real-world usage conditions. The software
works as intended and without issues during a simulation of normal use, it is
reasonably inferred the same level of stability in production.

4.5.6 Stress Testing: Stress testing is done to put a greater emphasis on


robustness, availability and error handling under a heavy load . In particular , this

28
test ensures that the software doesn’t crash in conditions of insufficient
computational resources (such as memory or disk space ), unusually high
concurrency, or denial of service attacks . The boundary conditions are also tested
for arrays and other data structure used in the system.

4.5.7 Performance Testing: Performance testing serves to validate and verify


the quality attributes of the system , such as scalability and reliability . Performance
test is also coupled with stress testing and require both software and hardware
instrumentation. It is necessary to determine resource utilization. The actual runtime
performance for the application is tested. The runtime taken to test and locate data is
found out. The data conversion accuracy and speed is also tested.

4.5.8 Links Testing: A list of links associated with the interface layout , for
example menu bars , index items , etc. are prepared and executed individually . Links
within each content object is tested for bad URL or for improver linking.

4.5.9 Forms Testing: Here tests are performed to ensure that; Labels correctly
identify fields within the form and mandatory fields are identify visually for the
user . The server receives all information contained within the form and that no
data is lost between the client and the server. Appropriate defaults are used if the
user doesn’t select from a list or menu. Browser functions do not correct data in the
form. Scripts that perform error checking on inputs work properly and give
meaningful error messages . Form fields have proper width and data types. The Tab key
ensures proper movement from fields

4.6 IMPLEMENTATION
Systems implementation is the construction of the new system and the delivery of that
system into production (that is, the day-to-day business or organization operation).

29
System Implementation uses the structure created during architectural design and the
results of system analysis to construct system elements that meet the stakeholder
requirements and system requirements developed in the early life cycle phases. These
system elements are then integrated to form intermediate aggregates and finally the
complete system-of-interest (SoI). See System Integration.

4.6.1 Software Implementation


Software implementation occurs when the new or proposed software might have been
realized after which the new software is tested and found to be working properly without
errors. It is the installation of new software after all requirements are met based on user
definition of quality. The new system must have additional functionality before it can be
considered to replace (if necessary) the old system. Such functionality includes;
reliability of the software, performance of the software and security of the software.
Therefore, the web based applications comprises of different interfaces for the category
of users.

4.6.2 System Documentation


This gives an insight of the information in the main structure of the program. The
program is designed in such a way that it will take care of almost all aspects involves in
keeping adequate criminal data and records, example; names and address.

4.6.3 Software Maintenance


This is also known as the support phase that focuses on changes associated with error,
correction, adaptations required as the software environment evolves, changes due to
enhancements brought about by changing customer’s requirements. In general, four types
of changes are encountered during this phase which are:

30
 Correction: Defect discovered during the use of the software can be corrected
by the software developer which is known as corrective maintenance.
 Adaptation: Over time, original environment such as Operating System,
Central Processing Unit (CPU) for which the software was developed is likely
to change. Thus, adaptive maintenance results in modification of software to
accommodate changes in its external environment.
 Enhancement: As software is used, the user will recognize additional
functions to increase the productivity of software. Perfective maintenance
extends the software beyond its original functional requirements.
 Preventive: Software deteriorates due to change, and because of this
preventive maintenance called software reengineering, and changes to
software so that it can be
 More easily corrected, adapted, and enhanced

4.6.4 Features of the System


The features of the software comprises of User login Window, Creating Account
Window, admin page. Each of the page mentioned above executes certain functionality
and the combination of that pages make up the complete software.

4.6.5 Login Window


This window is specifically designed for users that have already gotten their Email
Address and password to access to the information in the software system.

31
Fig 4.5.1 Login Windo

4.6.6 Create Account Page


This is a page that allow a user to create an account that can give him access to the
system if he does not have an account.

32
Fig 4.5.2 Account creating window

4.6.7 Pre-Enrollment Window


This window is specially designed for the users to register national identity information.
The registration is done automatically by the software.

Fig 4.5.3 Pre-enrollment window

4.6.8 Admin Page


This page provides a brief description of the work of an administrator, links for all
categories of users is listed in this page and the personal information of an admin is
display here in this page.

33
Fig4.4 Admin login window

4.6.9 Installation Instruction


To install the software, insert the CD into a CD-ROM drive of the system that has met
with the above software and hardware requirements then follow the steps below:
 Go to run;
 click browse button in the run dialog box
 Navigate to your CD-ROM driver and select it to open its content.
 Double click on the set up item to set the software up in the system
 Follow the on screen instruction to complete the setup

34
CHAPTER 5
SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 SUMMARY
In a nutshell, the project describes the overview of National Identity Card system as a
concept to a certain population figure of a region, state and country large. It also describe
the use of an Identity card as means of identifying a citizen of a country or legal resident
for security purpose.
The project consist of five (5) chapters, with chapter one relating as an introduction to the
project, which consist the Historical background, statement of the problem, aims and
objectives, scope of the study, limitations, significance of the study and definitions of
terms
The second chapter highlights the literature review part of the project, the chapter consist
the research part of the project, national identity card has been review from different
perception of different authors and other countries national identity cards, the chapter
comprise the definition of Identity, identification and authentication.
Research methodology of the project has been discussed in the third chapter of the
project, which gives an overview of research methodology, data collection process, data
flow diagram, justification of new system, statistical analysis of the system as well as
system requirements.
Chapter four parts comprise the critical part of the project in which the system design,
analysis and implementation of the software has been describe. The analysis part describe
the process of analyzing the current system requirement, while the design part gives the
blue print of the system, and the last portion which is system implementation consist the
process of converting the blue print to workable environment.
The last chapters comprise the project summary where the whole project has been
summarise precisely, conclusion of the project and recommendation. The chapter items
include, summary, conclusion, recommendation, appendix and references.

35
5.2 RECOMMENDATION
Computer has all times proven its superiority over every other technological
invention. To this effect, I recommend that for further elaboration on this project.
 Every aspect of the National Identity Card operation should cease to a manual
operation.
 A system analyst should be employed to make-up the board of decision that are
responsible for planning and implementing the attire of National Identity Card
issuance and assessment.
 The workers should be given more incentives to enable them put in relenting
efforts in discharging their duties.
 The computerization should be maintained up-to date at all times.
 Security code inscription should be maintained on all the National Identity Card.
 The staff should be trained to very computer literate

5.3 CONCLUSION
The work has been designed and computerized for the National Identity Card section of
the department of National Civic Registration under the ministry of internal affairs. To
assess and monitor the procurement of the National Identity Card by individuals in order
to eradicate the forgery and duplication of National Identity Cards thereby restricting
individuals only to one national identity card for citizens. Using VB.NET Program is a
way of manipulating the processes involved in the assessment to bearest minimum.
Computer has made work very ready and interesting. The national identity card as
produced in time and adequate measures are taken to maintain proper record and security
pursuits. This work made the staff to have more time to themselves.

REFERENCES

36
ANAN, J.J.& GRAW, M.C. (1991). Population Control’s London.
London: Broad Street Press.
Clarke, J.I. (1994; Pittman, 2007). Population Geography and the Developing Countries.
Texas: Ohio Press.
DAN, J. (2001). In his book. “Automatic Document Processing”. Chicago: Abram’s
Press.
Efraim, T., Aronson, E. & Ting-Peng, L. (2008).Identity Cards.
Amsterdam: British Publishers.
GACHET, A. (2004). Literature on the Problems Involved in Identity Cards
Washington: Abraham Press.
Harper, (2006; FIDIS, 2005; Anrig etal, 2004) introduce a fifth category of identifiers:
Scholars Point Press
HENK, G. Sol et al. (1987). Advantages &Disadvantages of Identity Cards.
Hong-Kong: Tai Sun Press.
J.K (199). Place in his Book “Information Processing and Identification”.
Vanguard Press.
JOHN,Orgeon. (2000), in his Book. “Travelers and Tourism” Lagos:
Vanguard Press.
KEEN, P.G.W. (1978). The Importance of National Identity. Netherland:
Rich Press.

OMINDE, S.H. (1991).Population Growth and Economic Development in


Africa:Lagos: Ola Press.
PAUL, C., (1987). Information Processing for BTEC. USA: Kleen
University Press.
Tony Ikara. (2003) in a journal titled “Identity Card Processing Effects and Benefits”
Vanguard Press.

https://en.wikipedia.org/wiki/Systems_design

37
web.simmons.edu/~benoit/lis486/SystemsImplementation
Designhttps://en.wikipedia.org/wiki/Systems_design

APPENDIX A

38
QUESTIONNAIRE
BUPOLY HADEJIA
QUESTIONNAIRE ON PROJECT RESEARCH WORK ON THE TOPIC NATIONAL
IDENTITY CARD SYSTEM
FROM COMPUTER SCIENCE DEPARTMENT
NAME: YUSUF ISMAI’L
REG NO: NDCSC/2014/069
QUESTIONS
1. Your Gender? Male Female
2. Your age Range?
(ii) 18-25 (ii) 26-35 (iii) 36-50 (iv) 50-Above
3. Your geopolitical zone?
(i) NW (ii) NE (iii) NC (iv) SW (v) SE (vi) SS
4. Does the manual National-ID meet the desired goal?
(i) Strongly Agree (ii) Agree (iii) Neutral (iv) Disagree
(v) Strongly Disagree
5. Computerize National Identity Card would help reveal the exact population of each
geopolitical zone?
(i) Strongly Agree (ii) Agree (iii) Neutral (iv) Disagree
(v) Strongly Disagree
6. Biometric data would identify the true identity of a citizen?
(i) Strongly Agree (ii) Agree (iii)Neutral (iv) Disagree
(v) Strongly Disagree
7. With the National Identity Card, all illegal immigrants would be identify?
(i) Strongly Agree (ii) Agree (iii) Neutral (iv)Disagree
(iv) Strongly Disagree

39
APPENDIX B
INTERVIEW
FIRST INTERVIEW
Student: Good morning sir.
DG: Morning, thank you
Student: Sir, my name is Yusuf Ismail from Binyaminu Usman Polytechnic Hadejia.
DG: Of course, you are welcome.
Student: Sir, May I know your name and your rank?
DG: My name is Engr. Aliyu A. Aziz and my rank is Director General
Student: Does manual National-ID processing meet the desired goal?
DG: the manual National-ID partially meet the desired goal.
Student: If I bring you e-National Identity Card System will you appreciate it?
DG: why not! Of course.

SECOND INTERVIEW
Student: Good morning sir.
Staff: Morning, thank you
Student: Sir, my name is Yusuf Ismail from Binyaminu Usman Polytechnic hadejia.
Staff: Alright, you are welcome.
Student: Sir, May I know your name?
Staff: My name is Mal Ibrahim Hassan
Student: Biometric data would identify the true identity of a citizen?
Staff: Of course, it will identify
Student: With the National Identity Card, all illegal immigrants would be identify?
Staff: Yes, through the National Identity Card all illegal will be identify.

APPENDIX C
40
SOURCE CODE

Registration page
<%@ Page Language="vb" AutoEventWireup="false" CodeBehind="Registration.aspx.vb"
Inherits="Client.Registration" %>

<!DOCTYPE html >

<html >
<head id="Head1" runat="server">
<title>National</title>
<style type="text/css">
body
{
color: #574c3f;
font-family: Corbel, Arial, Helvetica, Verdana, Sans-Serif;
font-size : 16px;
background-color: white;
}

#wrapper
{
width: 1100px;
margin: auto;
padding-bottom: 20px;
background-color: White;
-moz-border-radius: 25px;
-webkit-border-radius :25px;
border-radius: 25px;
overflow: hidden;
}
#content
{
padding: 20px;
min-height:400px;

}
.style20
{
width: 64%;
}
.style28
{
width: 200px;
text-align: left;
}
.style29
{
width: 126px;
text-align: left;
}
.style30
{
width: 201px;
text-align: left;

41
}
.style31
{
width: 157px;
text-align: left;
}
.style32
{
width: 21%;
}
.style33
{
width: 79px;
}
.style34
{
width: 70px;
}
.style35
{
width: 157px;
text-align: left;
height: 22px;
}
.style36
{
width: 201px;
text-align: left;
height: 22px;
}
.style37
{
width: 126px;
text-align: left;
height: 22px;
}
.style38
{
width: 200px;
text-align: left;
height: 22px;
}
</style>
</head>
<body>
<form id="form1" runat="server">
<div style="text-align: center">
<div id="wrapper">
<div id="banner">
<asp:Image ID="Image1" runat="server" ImageUrl="~/Images/bann1.jpg"
Width="100%" Height="102px" />
</div>
</div>
</div>
<div style="text-align: center">

<h1>
REGISTRATION PAGE</h1>
42
</div>
<div style="text-align: center">

<table align="center" class="style20">


<tr>
<td class="style31">
<strong>National Identity No:</strong></td>
<td class="style30">
<asp:TextBox ID="txtid" runat="server" Width="200px" Enabled="False"
style="margin-left: 0px"></asp:TextBox>
</td>
<td class="style29">
<strong>First Name:</strong></td>
<td class="style28">
<asp:TextBox ID="txtfnm" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Middle Name:</strong></td>
<td class="style30">
<asp:TextBox ID="txtmnm" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Other Name:</strong></td>
<td class="style28">
<asp:TextBox ID="txtonm" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Phone Number:</strong></td>
<td class="style30">
<asp:TextBox ID="txtno" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Gender</strong></td>
<td class="style28">
<asp:DropDownList ID="ddlsex" runat="server" Height="20px"
Width="205px">
<asp:ListItem>---Choose---</asp:ListItem>
<asp:ListItem>Male</asp:ListItem>
<asp:ListItem>Female</asp:ListItem>
</asp:DropDownList>
</td>
</tr>
<tr>
<td class="style35">
<strong>Status:</strong></td>
<td class="style36">
<asp:DropDownList ID="ddlstu" runat="server" Height="20px"
Width="205px">
<asp:ListItem>---Choose----</asp:ListItem>
<asp:ListItem>Married</asp:ListItem>
<asp:ListItem>Single</asp:ListItem>
</asp:DropDownList>

43
</td>
<td class="style37">
<strong>State:</strong></td>
<td class="style38">
<asp:TextBox ID="txtsta" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Local Govt.:</strong></td>
<td class="style30">
<asp:TextBox ID="txtlga" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Contact Address:</strong></td>
<td class="style28">
<asp:TextBox ID="txtcadd" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Residential Address:</strong>&nbsp;&nbsp;&nbsp;</td>
<td class="style30">
<asp:TextBox ID="txtradd" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Date of Birth:</strong></td>
<td class="style28">
<asp:TextBox ID="txtdob" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Place of Birth:</strong></td>
<td class="style30">
<asp:TextBox ID="txtpob" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Ward:</strong></td>
<td class="style28">
<asp:TextBox ID="txtward" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Next of Kin:</strong></td>
<td class="style30">
<asp:TextBox ID="txtkin" runat="server" Width="200px"
Height="22px"></asp:TextBox>
</td>
<td class="style29">
<strong>Occupation:</strong></td>
<td class="style28">
<asp:TextBox ID="txtocc" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">

44
&nbsp;<strong>Mothers&#39; Name:</strong></td>
<td class="style30">
<asp:TextBox ID="txtmonm" runat="server" Width="200px"
Height="21px"></asp:TextBox>
</td>
<td class="style29">
Date:</td>
<td class="style28">
<asp:TextBox ID="TextBox1" runat="server"
Width="171px"></asp:TextBox>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</td>
</tr>
</table>
<br />
<table align="center" class="style32">
<tr>
<td class="style33">
<asp:Button ID="btnadd" runat="server" Text="Submit" Width="82px" />
</td>
<td class="style34">
<asp:Button ID="btnreset" runat="server" Text="Reset" Width="82px" />
</td>
<td>
<asp:Button ID="btnbck" runat="server" Text="Back" Width="81px" />
</td>
</tr>
</table>

</div>
<div id="content" align="center">
<asp:PlaceHolder ID="PlaceHolder1" runat="server"></asp:PlaceHolder>
<asp:Label ID="lbl" runat="server" Font-Bold="True" Font-Size="X-
Large"></asp:Label>
</div>
</form>
</body>
</html>

45

You might also like