Professional Documents
Culture Documents
INTRODUCTION
1.0 PREAMBLE
The National Identity Card Processing system is one of the means through which a
nation’s populations figure can be ascertain to be accepted as a citizen within a given
geographical area, this is because it is necessary for a particular person to have a
citizenship. This citizenship can be approved through issuing National Identity Card.
This identity card will bear your name, states, every single information about you as an
individual or person. This therefore boils down to what we know as National Identity
Card.
The Question is “what is an identity card? As defined by many authors and dictionary
including the encyclopedia. It is a national document certifying State, nationality, issued
by the government of a country to every individual or person; it can also be defined as a
true image of an individual or person, because it tells well about a person.” Every citizen
of a country within a stipulated age has constitutionally has the right to apply for the
Insurance of the National Identity Card in the state he or she is staying. The National
Identity Card is not issued to people who are below a particular age. For this reason,
there is a need for the maintenance and assessment of records in order to maintain
current data concerning an individual. It is also for easy references, to know the number
of labor force, Identification and fraud check and also good for revenue allocation of the
federal government for proper population figure.
However, there are different arms in the internal affair ministry which takes the
responsibility of checking and issuing the National Identity Card. But as it concerns our
area of interest in this project work, Department of National Civil Registration Under the
Federal ministry of Internal Affairs, of Nigeria will be our target
1
1.2 HISTORICAL BACKGROUND
World War II initiated the contemporary era of ID cards. In 1938, lawmakers in the
United Kingdom passed the National Registry Act, which mandated that all residents
possess identity cards. The German government also instituted an ID system that year
(although these cards contained information about residents’ religion for discriminatory
purposes). In 1940, the Vichy government in France instituted an ID system as well, as in
Greece and Poland. These systems largely endure to this day, except in the United
Kingdom, where courts repealed mandatory IDs in 1952. Analysts have noted that civil
law countries are more likely to maintain ID statutes than common law countries (such as
the UK). With only a handful of exceptions, no common law country in the world has
accepted a peacetime identification system.
Overall, ID card policy depends on each country’s institutional specificities, but some
trends are common across countries. National ID systems are often implemented in times
of heightened security risk. Governments also tend to implement ID systems to
consolidate state institutions or during periods of economic transformation. In sum, ID
card adoption is more likely following economic or political shocks, which give
governments the incentive and legitimacy to create identity systems.
1.1 STATEMENT OF THE PROBLEM
National Identity Card processing system is not an easy task. This is because it involves
absolute carefulness to ascertain a population figure, prevent forgery and avoid the
dangers of Impersonation, duplication of multiple National Identity Card for a particular
person. Scanning through reports for a file with definite information can be a techniques
and time consuming due to the volume of record to be scanned. Also editing particular
information as a result of marriage, change of name, or loss of Identity card in other
words known as update will also be a tug of way for the individual in charge. It creates
weariness and loss of dedication to duties by the staff thereby restricting the powers of
the Department of National Civil Registration services following the constitution of the
Federal Republic of Nigeria which states that “No Public Officer shall put himself in a
position where his personal interest conflict with his duties and responsibilities” (1999
2
Constitution 5th schedule point 1 no.1), the processing and administration system will be
capable of restricting to non-authorized person.
1.3 AIMS AND OBJECTIVE
The primary purpose of the study is to critically analyze the activities of National Identity
card Processing and Administration system with a view of controlling forgery and
duplication as well as finding a lasting solution to these problems. To create a better and
lasting identity card system for Nigeria as a whole.
For the fact that this project research is aimed at having comprehensive review of the
manual system of operation being carried out in the Identity Card section of the
Department of National Civil Registration Nigeria into a computerized system. The
following will be taken into consideration for subject matters. They are:
Ensure accurate and timely update of the holder record.
Check multiple possession of the National Identity card.
Deprive immigrant who are not citizen of the country from obtaining the
National Identity Card.
1.5 LIMITATIONS
The limitation is based on the facts which the researcher could not lay hands on
pertaining to the study, which evolves the problems of insufficient analysis.
In addition to these limitations are time factors and financial insufficiencies.
3
1.6 SIGNIFICANCE OF THE STUDY
Computer have added immense effort in the monitoring of national identity card
holders in and out of Nigeria. Since we are in the path of information technology
growth, we need the basic capability to install and use advanced computers.
With computer installed in the ministry of internal affairs service (especially the identity
card section) we are expected to have these.
An easy data storage, update and retrieved very easy and accurate.
An accurate, timely and comprehensive report generation on processing is
achieved.
Also, a special protective means are introduced into the system.
As easy to use terminals which can be operated by the consumer of
information.
INTERNET: can be defined as a medium for communication and information exchange in many
Forms. It used to connect two or more computer system together to send and recieve information
globally without concepts and location.
DATA:data means are raw fact that are not processed or yet to processed.
ID: Means Identity is the distinguishing character or personality of an individual
1.8 PROJECT ORGANIZATION
This project consist of five(5) chapters: the chapter one (1) is made up introduction, overview,
historical backgroud, statement of the problem, aims and objectives, significance of the study,
scope and limitation of the study, and definations of the term.so also chapter two (2) consist of
literature review and review of related literature. Then chapater three (3) with the
introduction,overview of research methodology,method used for data collection,analysis of the
current system,justification of the new system,UML diagram,flow chart diagram, and use case
diagram. Likewise chapter four (4) consist of introduction, choice of programming
language,input specification, database design, and system testin and implementation. Then
chapter five (5) which is final stage consist of summary, recommendation and conclusion.
CHAPTER TWO
LITERATURE REVIEW
5
2.0 OVERVIEW
National Identity Card can also be called a true image of an individual or persons because
it tells well about a person. ”Identity card as defined cannot be issued by either from
school nor home. But, there is a special organization or ministry that takes charge of both
processing and administration of National Identity Card. The Ministry of Internal Affairs
under the Department of National Civic Registration.
Identity Card is a mark of Identification. And also, it tightly identifies the holder whose
photograph is placed in the identity card. It is also contain all necessary information
needed to know about the holder of the identity card (J.K 1997). Furthermore, J.K
emphasized that the essence of such identification is mainly for security purposes.
(John Orgeon 2000), in his book. “Travellers and Juorism” defines travelers as a process
of making long journey within or outside ones territory. People travels in order their
relatives do business with people or for changing environment. To this effect, there is a
need for the travelers to bears a mark of identification, which is the National Identity
Card. The Identity Card being and outstanding document, is very official and is only
issued out and controlled by the Government under the auspices of the Ministry of
Internal Affairs.
Dan Jougliow (2001), in his book. “Automatic Document and Processing” defines
document processing as preparation of printed evidences for births, deaths, marriage,
identification etc. These document are processed to be very unified and easily
maintained. With the introduction of identity card, the problem associated with identity
card processing system has been totally solved. The computer maintain and access
information about identity card holders automatically with little human intervention.
Fraud is eliminated. The machine access everything automatically according to
predefined program instruction using a defined government criteria. (Tony Ikara, 2003)
in a journal titled “Identity Card Processing. Effects and Benefits” Says that identity card
represents the image of a nation.
According to (Al-Khouri, 2006), the National ID system incorporates the latest
technological advances. The system guarantees secured communication throughout the
6
system’s national network structure by using Virtual Private Network (VPN) technology
and an associated technical Public Key Infrastructure (PKI).The fingerprint-based
biometry provides the means to ensure a single identity for each applicant and to
authenticate the identity of the Identity card bearer. In principle, the National Identity
System is designed to provide three primary operations, Population Register and
Document Imaging Management (PRDIM).
The National Identity system maintains the Population Register that records information
about every United Arab Emirates (UAE) citizen and legal resident registered on the
system and assigns a unique. Identification Number (IDN) to each person. The system is
currently sized to manage five million records. It provides the means to record events
such as births, marriages, divorces and deaths, as well as the updating variable
(constantly of changing) information such as address, education, employer, etc. The
National Identity system also stores images of the official support documents presented
during the application for an Identity card or on events declaration on the Population
Register.
The National identification system includes a process for the enrollment, processing,
production and delivery of identification card. This process is adapted for the first
application for an identification card including the renewal of an expired Identity card or
placement of a damaged, lost or stolen Identity card. The Identity card produced by the
national Identification system includes biometric fingerprint-based authentication
capabilities and uses a public key infrastructure (PKI) that is adapted for future e-
government and e-commerce usage.
2.1 IDENTITY
Academic experts have invested considerable efforts in exploring to what extent and how
digital identity may be different compared to physical identity. Greenwood (2007)
introduces a useful typology for different forms of identity in relationships with
government:
7
Digital identity (e.g. username, email address);
Physical identity (e.g. passport, driver’s license, birth certificate); and
Dual or “converged identity”, a combination of digital and physical identity
(e.g. a ‘chipped’ person or animal, biometric passport) (Greenwood, 2007, p.5).
Several scholars argue that, now that people increasingly are operating in digital
environments, individuals have a growing amount of digital identities used to identify
themselves in relationship with other entities (Clarke, 1994; Pittman, 2007). Whereas, in
the physical world, identity is considered to entail a rather comprehensive set of
individual characteristics by which a person is recognized or known, in the digital world
on the other hand an identity can be a rather simple subset of identity information (e.g. an
email-address) (OECD, 2007). Moreover in the digital world, even a role-based identity
can be defined as an identity, which may be used by a group of individuals who share the
same role concurrently or in turns (Clarke, 2008).
As an expression of digital identity, most scholars utilize the concept of identity
information, i.e. data relating to a person. Moreover, an individual can represent a subset
of identity information, which is often referred to by the concept of partial identity.
Identity attributes are used to express the contents of partial identities or digital identities
(OECD, 2007).
Unlike physical identity, digital identities are typically distributed in different forms and
related to different locations (Norlin & Durand, 2002). For instance, identity can be
defined as “any subset of attributes of an individual which sufficiently identifies this
individual within any set of individuals” (Pfitzmann & Hansen, 2006, p.28). Usually an
individual does not know all of her identities. Moreover, these identities may change as
the person’s attributes change. Consequently, aiming at developing a universal definition
of identity and/or an “identity provider” is very hard, if not impossible (Pfitzmann, 2007).
Moreover, several scholars perceive the social context as a determinant factor for
identity. From this relativist perspective, identity is granted and modulated by an
individual's roles, relationships, and reputations in a variety of social networks
8
(Clippinger, 2005). Based on a subjective interpretation of digital identity, Blakley et al
distinguish the following properties (OECD, 2007, p.26):
• Identity is social– To engage in social interactions people need something that
persists and that can be used as a basis for recognition of others;
• Identity is subjective– different people attribute different characteristics to an
individual, constructing different identities for him.
• Identity is valuable– by building a history of a person’s past actions, exchange of
identity information creates social capital and enables transactions that would not
be possible without identity;
• Identity is referential – an identity is not a person, it is only a reference to a
person.
• Identity is composite– while some information is provided voluntarily by the
individual, other information about him is developed by others without the
person’s involvement;
• Identity is consequential– because identity tells of a person’s past actions, the
decision to exchange identity information carries consequences;
• Identity is dynamic– identity information is always changing;
• Identity is contextual– people have different identities that they may wish to
keep entirely separate. Keeping identities separate all owes a person to have more
autonomy;
• Identity is equivocal – the process of identification is inherently error-prone.
2.2 IDENTIFICATION
Identity Management (IDM) conceptualizations not only have an ‘Identity dimension’,
i.e. a set of characteristics representing a person, they also have an ‘Identification
dimension’, that is a set of terms, concepts and mechanisms that relate to the disclosure
of Identity information and the use of this information (FIDIS, 2005, p.26). Generally, the
term ‘Identification’ describes the process of ensuring a person is who he or she claims to
be (Crompton, 2004). Identification in digital environments can be defined as the
association of data with a particular human being: an identified record or transaction is
9
one in which the data can be readily related to a particular individual (Clarke, 1994, p.8).
FIDIS-researchers utilize the following definition for identification, which may cover
identification in both physical and digital environments: the set of approaches and
mechanisms that intervene in the course of an interaction and which are very broadly
related to the disclosure of identity information (FIDIS, 2005, p.36).
Many authors utilize the concept of an identifier to indicate an information item that can
be used to provide some level of authentication for a person (OECD, 2007; FIDIS, 2005).
Identification occurs when a person or entity compares the identifiers of another person
or entity, with a set of identifiers that the person or entity has previously recorded, and
finds a match between the two (Harper, 2006). Generally, scholars distinguish the
following four broad categories of identifiers (e.g. Harper, 2006; FIDIS, 2005; Anrig et
al, 2004):
• Something that you are – characteristics that are inherent in a person or attached
to an individual’s physical body, e.g. DNA, fingerprints, voice signatures;
• Something you do – characteristics that relate to the behavior of an individual,
e.g. click behavior in a digital environment, attitudes in a specific social context;
• Something you know – the characteristic of having some distinct knowledge,
usually knowledge that few others have, e.g. passwords, mother’s maiden name
etc.
• Something you have – the characteristic of possessing some distinct item, these
identifiers are often called “tokens”, e.g. smart cards, software tokens like digital
certificates, keys.
• Something you are assigned to – identifiers that are socially defined for the
person, these identifiers are associated with people but not inherent or attached,
e.g. name, addresses, titles, social security number, etc(Harper, 2006).
• Scholars seem to agree that these categories of identifiers differ in their usability
and their reliability.
• Moreover, scholars point out that identification can be used for interventions in
the following contexts (FIDIS, 2005, p.36-37):
10
• Access control to restricted resources or areas – this control comprises two
different aspects: authentication of the individual and access management;
• Exploitation of identity information – allowing access to relevant information
so that the impact of the interaction can be increased (e.g. customization of
services, diagnostic services, direct marketing);
• Monitoring to enable accountability – the ability to record and audit the actions
of a person (e.g. for supporting transactions, developing an individual’s
reputation).
Another distinction made by scholars is that identification can happen explicitly or
implicitly (FIDIS, 2005, p.38-39):
• Explicit identification relates- to processes in which the person is aware, and
even participates in identification. Examples of explicit identification mechanisms
are passwords, ID cards, biometric elements, business cards, introduction of the
individual by another person in a social process;
2.3 AUTHENTICATION
Authentication relates to the verification of the individual’s identity, ensuring he or she is
the person he or she claims to be (FIDIS, 2005; van der Ploeg, 1999). Several authors
describe authentication as the process of checking a claim or assertion made by the
person about their identity, such as confirming that a person making a bank transaction is
indeed the account owner (e.g. Crompton, 2004; Greenwood, 2007). In comparison,
Clarke defines authentication as the process of testing an assertion in order to establish a
11
level of confidence in the assertion’s reliability (Clarke, 2008). Identification Identity
verification can be done on the basis of one or more identifiers. Moreover, verification is
not restricted by the two individuals or entities involved in the identification process, but
can be done through the use of (trusted) third party. Such as a certification authority.
Botswana It is compulsory for all citizens at age 16, and there are penalties for not
obtaining it within one month of turning 16 or obtaining citizenship, whichever
comes last. Includes the image of the individual (no headgear or eyewear), their
particulars, and their right thumbprint. Valid for 10 years, whereupon it must be
renewed and a new photograph taken. Must be presented upon request by any
agent of the state, and the state requires all non-state institutions to use the
National ID card as the only acceptable means of identification for citizens -
passports and driver's licences should not be used, even though they contain most
of the information on the ID card, including the ID card number. There are
penalties for being issued a replacement card when it has been lost, however, if it
is changed to update information on it only the application fee must be paid (e.g.
12
upon expiry, and legal name changes as when a woman gets married and assumes
her husband's surname). Every time a new one is issued for whatever reason, a new
photograph must be taken. The individual keeps their National ID card number for
life, and in recent years it has been linked to the birth certificate number of
newborn infants (it is the same number). The National ID card must be surrendered
to the government upon the demise of the individual, at which time it will be
exchanged with an official death certificate.
Compulsory for all German citizens aged 16 or older to possess either a
"Personalausweis" (identity card) or a passport, but not to carry it. While police
officers and some other officials have a right to demand to see one of those
documents, the law does not state that one is obliged to submit the document at
that very moment. Fines may only be applied if an identity card or passport is not
possessed at all, if the document is expired or if one explicitly refuses to show ID
to the police. If one is unable to produce an ID card or passport (or any other form
of credible identification) during a police control, one can (in theory) be brought to
the next police post and detained for a maximum of 12 hours, or until positive
identification is possible. However, this measure is only applied if the police have
reasonable grounds to believe the person detained has committed an offence.
As driving licences are not legally accepted forms of identification in Germany,
most persons actually carry their "Personalausweis" with them.
CHAPTER THREE
RESEARCH METHODOLOGY
3.0 INTRODUCTION
13
The Aims of this project is to advance an e-National Identity Card System, that allow
citizen’s to start for their Enrollment at home, a great portable interface of interaction
between the citizen’s and system and so also, the system will guide the user by its simple
illustrations.
14
The researcher selected primary method for data collection such as questionnaire and
interview. The researcher used six geopolitical zonal for questionnaire in order to gather
the information.
The researcher also used secondary method for data collection such as magazine,
journalism, listing radio and viewing television as secondary method.
15
With computer installed in the Ministry of Internal Affairs Service (especially the identity
card section) we are expected to have these.
An easy data storage, update and retrieved very easy and accurate.
An accurate, timely and comprehensive report generation on processing is
achieved.
Also, a special protective means are introduced into the system.
As easy to use terminals which can be operated by the consumer of
information.
START
REGISTRATION
LOGIN
16
ADMIN
Figure 3.1 Flow chart
3.5.2 USE CASE DIAGRAM
The Unified Modeling Language (UML) is a general-purpose, developmental, modeling
language in the field of software engineering that is intended to provide a standard way to
visualize the design of a system.
UML was originally motivated by the desire to standardize the disparate notational
systems and approaches to software design developed by Grady Booch, Ivar
Jacobson and James Rumbaugh at Rational Software in 1994–95, with further
development led by them through 1996.
In 1997 UML was adopted as a standard by the Object Management Group (OMG), and
has been managed by this organization ever since. In 2005 the Unified Modeling
Language was also published by the International Organization for
Standardization (ISO) as an approved ISO standard. Since then it has been periodically
revised to cover the latest revision of UML.
17
Figure 3.2: Use Case Diagram
18
Figure 3.3
In the above figure 3.3, described or shows the advantage of statistical analysis of the
respondents on the views of computer profession and skills, which analyzed the 50% of
the respondents are Literate and Illiterate among them were exceed 40% while the natural
among the respondent as described in the above figure called others only occupy 10% in
the views.
QUESTION: Your Age range
Figure 3.4
The above figure 3.4: show the statistical analysis of the respondents on the views of the
age range from the six political zone.
QUESTION: Your Geopolitical zone
19
Figure 3.5
The above figure 3.5: shows the statistical analysis of the respondents on the views for
each geopolitical zone.
QUESTION: Biometric data would identify the true identity of a citizen
Figure 3.6
The above figure 3.6: shows the result of statistical analysis of the respondents on the
views of biometric data would identify the true identity of a citizen.
20
QUESTION: Does the manual National-ID meet the desired goal
Figure 3.7
The above figure 3.7: shows the result of statistical analysis of the respondents on the
views for manual National ID meet the desired goals.
CHAPTER FOUR
22
SYSTEM ANALYSIS, DESIGN AND IMPLEMENTATION
4.0 INTRODUCTION
Systems analysis as "the process of studying a procedure or business in order to identify
its goals and purposes and create systems and procedures that will achieve them in an
efficient way". Another view sees systems analysis as a problem-solving technique that
decomposes a system into its component pieces for the purpose of the studying how well
those component parts work and interact to accomplish their purpose.
Systems design is the process of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. Systems design could
be seen as the application of systems theory to product development. There is some
overlap with the disciplines of systems analysis, systems architecture and systems
engineering. In another word System design is the process of defining the elements of a
system such as the architecture, modules and components, the different interfaces of
those components and the data that goes through that system. It is meant to satisfy
specific needs and requirements of a business or organization through the engineering of
a coherent and well-running system.
Implementation is the carrying out, execution, or practice of a plan, a method, or any
design, idea, model, specification, standard or policy for doing something. In another
word implementation is the action that must follow any preliminary thinking in order for
something to actually happen. Implementation is the realization of an application, or
execution of a plan, idea, model, design, specification, standard ,algorithm, or policy.
23
any other language in the history of computing. This choice was informed by the
following features of the Visual Basics scripting language:
It is Open Source
Closely integrated with MS Access database
Has an inbuilt XML parser
It is light weight and does not consume much server resources to render page
Easy syntax flow supports
In any good database design, effort should be made to remove completely or minimize
the redundancy. The database design in the software is achieved using Microsoft access
database. Below is the structure of the file designed in the database.
25
1 IDENTITY NUMBER NATID CHARACTER 15
2 FIRST NAME FNM CHARACTER 20
3 MIDDLENAME MNM CHARACTER 3
4 OTHERNAME ONM NUMERIC 8
5. PHONE NUMBER GSM CHARACTER 10
6 GENDER GENDER CHARACTER 10
7 STATUS STATUS CHARACTER 12
8 STATE STATE CHARACTER 8
9 LOCALGOVT. LGA CHARACTER 3
10 RESIDENTIALADDRESS RAADD CHARACTER 2
11 CONTACT ADDRESS CAADD CHARACTER 8
12 DATE OF BIRTH DOB CHARACTER 10
13 WARD WARD CHARACTER 10
14 OCCUPATION OCCU NUMERIC 3
15 NEXT OF KIN KIN CHARACTER 8
16 MOTHER’S NAME MONM CHARACTER 8
17 THUMB THUMB OLE OBJECT 10
18 PHOTO PHOTO OLE OBJECT 8
19 PHOTOLOC PHOTOLOC CHARACTER 3
26
1 EMAIL EMAIL EMAIL 15
2 PASSWORD PSSWRD CHARACTER 20
3 CURRENT PSSWRD CPSSWRD CHARACTER 3
4 FIRST NAME FNM CHARACTER 8
5 PHONE NUMBER GSM CHARACTER 10
4.5.1 Unit Testing: Unit testing is a procedure used to validate that individual
units of source code are working properly . A unit is the smallest testable part of
an application . A web page is taken as an individual unit in the present application
27
parameter and data inputs. Simulated usage of shared data areas and inter process
communication is tested and individual subsystems are exercised through their input
interface. The strategy adopted in this research is incremental integration testing, a
combination of top-down and bottom-up testing.
4.5.4 Output Testing: The integrated system is tested for the predefined
output for the specified input . This testing is done at the unit level. It is ensured that
the system generates valid and consistent outputs.
4.5.5 User Acceptance Testing (UAT): UAT is one of the final stages of a
project and often occurs before a client or customer accepts the new system . This
test ensures that the system is developed as per the requirements specifications.
UAT acts as a final verification of the required business function and proper
functioning of the system , emulating real-world usage conditions. The software
works as intended and without issues during a simulation of normal use, it is
reasonably inferred the same level of stability in production.
28
test ensures that the software doesn’t crash in conditions of insufficient
computational resources (such as memory or disk space ), unusually high
concurrency, or denial of service attacks . The boundary conditions are also tested
for arrays and other data structure used in the system.
4.5.8 Links Testing: A list of links associated with the interface layout , for
example menu bars , index items , etc. are prepared and executed individually . Links
within each content object is tested for bad URL or for improver linking.
4.5.9 Forms Testing: Here tests are performed to ensure that; Labels correctly
identify fields within the form and mandatory fields are identify visually for the
user . The server receives all information contained within the form and that no
data is lost between the client and the server. Appropriate defaults are used if the
user doesn’t select from a list or menu. Browser functions do not correct data in the
form. Scripts that perform error checking on inputs work properly and give
meaningful error messages . Form fields have proper width and data types. The Tab key
ensures proper movement from fields
4.6 IMPLEMENTATION
Systems implementation is the construction of the new system and the delivery of that
system into production (that is, the day-to-day business or organization operation).
29
System Implementation uses the structure created during architectural design and the
results of system analysis to construct system elements that meet the stakeholder
requirements and system requirements developed in the early life cycle phases. These
system elements are then integrated to form intermediate aggregates and finally the
complete system-of-interest (SoI). See System Integration.
30
Correction: Defect discovered during the use of the software can be corrected
by the software developer which is known as corrective maintenance.
Adaptation: Over time, original environment such as Operating System,
Central Processing Unit (CPU) for which the software was developed is likely
to change. Thus, adaptive maintenance results in modification of software to
accommodate changes in its external environment.
Enhancement: As software is used, the user will recognize additional
functions to increase the productivity of software. Perfective maintenance
extends the software beyond its original functional requirements.
Preventive: Software deteriorates due to change, and because of this
preventive maintenance called software reengineering, and changes to
software so that it can be
More easily corrected, adapted, and enhanced
31
Fig 4.5.1 Login Windo
32
Fig 4.5.2 Account creating window
33
Fig4.4 Admin login window
34
CHAPTER 5
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 SUMMARY
In a nutshell, the project describes the overview of National Identity Card system as a
concept to a certain population figure of a region, state and country large. It also describe
the use of an Identity card as means of identifying a citizen of a country or legal resident
for security purpose.
The project consist of five (5) chapters, with chapter one relating as an introduction to the
project, which consist the Historical background, statement of the problem, aims and
objectives, scope of the study, limitations, significance of the study and definitions of
terms
The second chapter highlights the literature review part of the project, the chapter consist
the research part of the project, national identity card has been review from different
perception of different authors and other countries national identity cards, the chapter
comprise the definition of Identity, identification and authentication.
Research methodology of the project has been discussed in the third chapter of the
project, which gives an overview of research methodology, data collection process, data
flow diagram, justification of new system, statistical analysis of the system as well as
system requirements.
Chapter four parts comprise the critical part of the project in which the system design,
analysis and implementation of the software has been describe. The analysis part describe
the process of analyzing the current system requirement, while the design part gives the
blue print of the system, and the last portion which is system implementation consist the
process of converting the blue print to workable environment.
The last chapters comprise the project summary where the whole project has been
summarise precisely, conclusion of the project and recommendation. The chapter items
include, summary, conclusion, recommendation, appendix and references.
35
5.2 RECOMMENDATION
Computer has all times proven its superiority over every other technological
invention. To this effect, I recommend that for further elaboration on this project.
Every aspect of the National Identity Card operation should cease to a manual
operation.
A system analyst should be employed to make-up the board of decision that are
responsible for planning and implementing the attire of National Identity Card
issuance and assessment.
The workers should be given more incentives to enable them put in relenting
efforts in discharging their duties.
The computerization should be maintained up-to date at all times.
Security code inscription should be maintained on all the National Identity Card.
The staff should be trained to very computer literate
5.3 CONCLUSION
The work has been designed and computerized for the National Identity Card section of
the department of National Civic Registration under the ministry of internal affairs. To
assess and monitor the procurement of the National Identity Card by individuals in order
to eradicate the forgery and duplication of National Identity Cards thereby restricting
individuals only to one national identity card for citizens. Using VB.NET Program is a
way of manipulating the processes involved in the assessment to bearest minimum.
Computer has made work very ready and interesting. The national identity card as
produced in time and adequate measures are taken to maintain proper record and security
pursuits. This work made the staff to have more time to themselves.
REFERENCES
36
ANAN, J.J.& GRAW, M.C. (1991). Population Control’s London.
London: Broad Street Press.
Clarke, J.I. (1994; Pittman, 2007). Population Geography and the Developing Countries.
Texas: Ohio Press.
DAN, J. (2001). In his book. “Automatic Document Processing”. Chicago: Abram’s
Press.
Efraim, T., Aronson, E. & Ting-Peng, L. (2008).Identity Cards.
Amsterdam: British Publishers.
GACHET, A. (2004). Literature on the Problems Involved in Identity Cards
Washington: Abraham Press.
Harper, (2006; FIDIS, 2005; Anrig etal, 2004) introduce a fifth category of identifiers:
Scholars Point Press
HENK, G. Sol et al. (1987). Advantages &Disadvantages of Identity Cards.
Hong-Kong: Tai Sun Press.
J.K (199). Place in his Book “Information Processing and Identification”.
Vanguard Press.
JOHN,Orgeon. (2000), in his Book. “Travelers and Tourism” Lagos:
Vanguard Press.
KEEN, P.G.W. (1978). The Importance of National Identity. Netherland:
Rich Press.
https://en.wikipedia.org/wiki/Systems_design
37
web.simmons.edu/~benoit/lis486/SystemsImplementation
Designhttps://en.wikipedia.org/wiki/Systems_design
APPENDIX A
38
QUESTIONNAIRE
BUPOLY HADEJIA
QUESTIONNAIRE ON PROJECT RESEARCH WORK ON THE TOPIC NATIONAL
IDENTITY CARD SYSTEM
FROM COMPUTER SCIENCE DEPARTMENT
NAME: YUSUF ISMAI’L
REG NO: NDCSC/2014/069
QUESTIONS
1. Your Gender? Male Female
2. Your age Range?
(ii) 18-25 (ii) 26-35 (iii) 36-50 (iv) 50-Above
3. Your geopolitical zone?
(i) NW (ii) NE (iii) NC (iv) SW (v) SE (vi) SS
4. Does the manual National-ID meet the desired goal?
(i) Strongly Agree (ii) Agree (iii) Neutral (iv) Disagree
(v) Strongly Disagree
5. Computerize National Identity Card would help reveal the exact population of each
geopolitical zone?
(i) Strongly Agree (ii) Agree (iii) Neutral (iv) Disagree
(v) Strongly Disagree
6. Biometric data would identify the true identity of a citizen?
(i) Strongly Agree (ii) Agree (iii)Neutral (iv) Disagree
(v) Strongly Disagree
7. With the National Identity Card, all illegal immigrants would be identify?
(i) Strongly Agree (ii) Agree (iii) Neutral (iv)Disagree
(iv) Strongly Disagree
39
APPENDIX B
INTERVIEW
FIRST INTERVIEW
Student: Good morning sir.
DG: Morning, thank you
Student: Sir, my name is Yusuf Ismail from Binyaminu Usman Polytechnic Hadejia.
DG: Of course, you are welcome.
Student: Sir, May I know your name and your rank?
DG: My name is Engr. Aliyu A. Aziz and my rank is Director General
Student: Does manual National-ID processing meet the desired goal?
DG: the manual National-ID partially meet the desired goal.
Student: If I bring you e-National Identity Card System will you appreciate it?
DG: why not! Of course.
SECOND INTERVIEW
Student: Good morning sir.
Staff: Morning, thank you
Student: Sir, my name is Yusuf Ismail from Binyaminu Usman Polytechnic hadejia.
Staff: Alright, you are welcome.
Student: Sir, May I know your name?
Staff: My name is Mal Ibrahim Hassan
Student: Biometric data would identify the true identity of a citizen?
Staff: Of course, it will identify
Student: With the National Identity Card, all illegal immigrants would be identify?
Staff: Yes, through the National Identity Card all illegal will be identify.
APPENDIX C
40
SOURCE CODE
Registration page
<%@ Page Language="vb" AutoEventWireup="false" CodeBehind="Registration.aspx.vb"
Inherits="Client.Registration" %>
<html >
<head id="Head1" runat="server">
<title>National</title>
<style type="text/css">
body
{
color: #574c3f;
font-family: Corbel, Arial, Helvetica, Verdana, Sans-Serif;
font-size : 16px;
background-color: white;
}
#wrapper
{
width: 1100px;
margin: auto;
padding-bottom: 20px;
background-color: White;
-moz-border-radius: 25px;
-webkit-border-radius :25px;
border-radius: 25px;
overflow: hidden;
}
#content
{
padding: 20px;
min-height:400px;
}
.style20
{
width: 64%;
}
.style28
{
width: 200px;
text-align: left;
}
.style29
{
width: 126px;
text-align: left;
}
.style30
{
width: 201px;
text-align: left;
41
}
.style31
{
width: 157px;
text-align: left;
}
.style32
{
width: 21%;
}
.style33
{
width: 79px;
}
.style34
{
width: 70px;
}
.style35
{
width: 157px;
text-align: left;
height: 22px;
}
.style36
{
width: 201px;
text-align: left;
height: 22px;
}
.style37
{
width: 126px;
text-align: left;
height: 22px;
}
.style38
{
width: 200px;
text-align: left;
height: 22px;
}
</style>
</head>
<body>
<form id="form1" runat="server">
<div style="text-align: center">
<div id="wrapper">
<div id="banner">
<asp:Image ID="Image1" runat="server" ImageUrl="~/Images/bann1.jpg"
Width="100%" Height="102px" />
</div>
</div>
</div>
<div style="text-align: center">
<h1>
REGISTRATION PAGE</h1>
42
</div>
<div style="text-align: center">
43
</td>
<td class="style37">
<strong>State:</strong></td>
<td class="style38">
<asp:TextBox ID="txtsta" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Local Govt.:</strong></td>
<td class="style30">
<asp:TextBox ID="txtlga" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Contact Address:</strong></td>
<td class="style28">
<asp:TextBox ID="txtcadd" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Residential Address:</strong> </td>
<td class="style30">
<asp:TextBox ID="txtradd" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Date of Birth:</strong></td>
<td class="style28">
<asp:TextBox ID="txtdob" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Place of Birth:</strong></td>
<td class="style30">
<asp:TextBox ID="txtpob" runat="server" Width="200px"></asp:TextBox>
</td>
<td class="style29">
<strong>Ward:</strong></td>
<td class="style28">
<asp:TextBox ID="txtward" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
<strong>Next of Kin:</strong></td>
<td class="style30">
<asp:TextBox ID="txtkin" runat="server" Width="200px"
Height="22px"></asp:TextBox>
</td>
<td class="style29">
<strong>Occupation:</strong></td>
<td class="style28">
<asp:TextBox ID="txtocc" runat="server" Width="200px"></asp:TextBox>
</td>
</tr>
<tr>
<td class="style31">
44
<strong>Mothers' Name:</strong></td>
<td class="style30">
<asp:TextBox ID="txtmonm" runat="server" Width="200px"
Height="21px"></asp:TextBox>
</td>
<td class="style29">
Date:</td>
<td class="style28">
<asp:TextBox ID="TextBox1" runat="server"
Width="171px"></asp:TextBox>
</td>
</tr>
</table>
<br />
<table align="center" class="style32">
<tr>
<td class="style33">
<asp:Button ID="btnadd" runat="server" Text="Submit" Width="82px" />
</td>
<td class="style34">
<asp:Button ID="btnreset" runat="server" Text="Reset" Width="82px" />
</td>
<td>
<asp:Button ID="btnbck" runat="server" Text="Back" Width="81px" />
</td>
</tr>
</table>
</div>
<div id="content" align="center">
<asp:PlaceHolder ID="PlaceHolder1" runat="server"></asp:PlaceHolder>
<asp:Label ID="lbl" runat="server" Font-Bold="True" Font-Size="X-
Large"></asp:Label>
</div>
</form>
</body>
</html>
45