Design of A National Identity Card System
Design of A National Identity Card System
BY
JULY, 2013.
i
CERTIFICATION
--------------------------------------------- ---------------------
NNAMDI SAMUEL UCHENNA Date
22
APPROVAL PAGE
--------------------------------------------- ---------------------
--------------------------------------------- ---------------------
--------------------------------------------- ---------------------
Dr. Boniface Ekechukwu Date
External Examiner
DEDICATION
Title Page - - - - - - - - - -i
Certification - - - - - - - - - -ii
Approval Page.- - - - - - - - - -iii
Dedication- - - - - - - - - - -iv
Acknowledgement- - - - - - - - -v
Abstract- - - - - - - - - - -vi
Table of contents- - - - - - - - - -vii
CHAPTER ONE
1.0 Introduction - - - - - - - - -1
1.1 Statement of the problem - - - - - - -2
1.2 Purpose of study- - - - - - - - -2
1.3 Aims and objectives- - - - - - - -2
1.4 Scope- - - - - - - - - -3
1.5 Limitations- - - - - - - - - -3
1.6 Assumptions- - - - - - - - -3
1.7 Definitions of terms- - - - - - - -4
CHAPTER TWO
2.0 literature review- - - - - - - - -5
CHAPTER THREE
3.0 description and analysis of the existing system - - - -7
3.1 Fact finding method used.- - - - - - -8
3.2 Organizational structure- - - - - - - -9
3.3 Objective of the existing system- - - - - -10
3.4 Input, process, output analysis- - - - - - -10
3.5 Information flow diagram - - - - - -13
3.6 Problem of the existing system - - - - - -13
3.7 Justification for the new system- - - - - -14
CHAPTER FOUR
4.0 System design methodology - - - - - -16
4.1 Design of the new system- - - - - - -16
4.2 Output specifications and design - - - - -16
4.3 Input specifications and design- - - - - - -17
4.4 File design- - - - - - - - - -19
4.5 Procedure chart- - - - - - - - -20
4.6 System flow chart- - - - - - - - -21
4.7 System requirements- - - - - - - -22
4.8 Implementation of the new system - - - - - -22
4.9 Program design- - - - - - - - -23
4.10 Program flow chart- - - - - - - -24
CHAPTER FIVE
5.0 Documentation - - - - - - - - -29
5.1 System documentation - - - - - - - -29
5.2 Program documentation- - - - - - - -30
5.3 User documentation- - - - - - - -31
CHAPTER SIX
6.0 Conclusion and recommendation - - - - - -32
6.1 Conclusion- - - - - - - - - -32
6.2 Recommendations- - - - - - - -32
References- - - - - - - - - -34
Appendix- - - - - - - - - -35
viii
CHAPTER ONE
INTRODUCTION
1
1.1 STATEMENT OF THE PROBLEM
National Identity Card processing and Administration system is not an easy
task. This reason is because it involves absolute carefulness to ascertain a
population figure, prevent forgery and avoid the dangers of Impersonation,
duplication of multiple National Identity Card for one particular person.
Scanning through reports for a file with definite information can be a
techniques and time wasting work because of the large volume of record to
be scanned. Also to change particular information may be as a result of
marriage, change of name, or loss of the Identity card in other words known
as update will also be a tug of way for the individual in charge. It creates
weariness and loss of dedication to duties by the staff thereby restricting the
powers of the Department of National Civil Registration services following
the constitution of the Federal Republic of Nigeria which states that No
Public Officer shall put himself in a position where his personal interest
th
conflict with his duties and responsibilities (1999 Constitution 5 schedule
point 1 no.1)
Finally, the processing and administration system will be capable of
restricting to non-authorized person.
2
Card section of the Department of National Civil Registration Ngwo Local
government area of Enugu state into a computerized system. The following
will be taken into consideration for subject matters. They are:
- Ensure accurate and timely update of the holder record.
- Check multiple possession of the National Identity card.
- Deprive immigrant who are not citizen of the country form
obtaining the national identity card.
- A proper account of the identity card issued.
- Finally, a proper storage system which keeps all vital information
ready for use.
1.5 LIMITATIONS
The limitation is based on the facts which the researcher could not lay hands
on pertaining to the study, which evolves the problems of insufficient
analysis.
In addition to these limitations are time factors and financial insufficiencies.
1.6 ASSUMPTIONS
Assuming that this design is implemented work flow and assessment as well
as record keeping of the national identity card section of the Ngwo Local
Government Area of Enugu State will be made easy, interesting and
flexible- also, the management will make quick finding so that conclusion
and decision will be reached as aid when due.
LITERATURE REVIEW
Websters Ninth New Collegiate Dictionary defines Identity Card as a
formal document that is used by an authorized official of a country to one of
its citizen.
The Question is what is an identity card? As defined by many authors and
dictionary including the encyclopedia, it is a national document certifying
state/Nationality, issued by the Government of a Country to every
individuals or person that is of the stipulated age of ownership. From the
definition, National Identity Card can also be called a true image of an
individual or persons because it tells well about a person.
Identity card as defined cannot be acquired from neither from school nor
home. But, there is a special organization or ministry that takes charge of
both processing and administration of National Identity Card. The ministry
of Internal Affairs Under the Department of National Civic Registration.
According to J.K PLACK in his book INFORMATION Processing and
Identification says that identity card is a mark of Identification. And also, it
tightly identifies the holder whose photograph is placed in the identity card.
It also contain all necessary information needed to know about the holder of
the identity card.
Furthermore, he emphasized that the essence of such identification is mainly
for security purposes.
During national identity card processing, everything is put into
consideration to check fraud of any form. Any fraud is detected and
canceled because the identity cards are made unique. It is not always easy.
Forging of identity card. And personification in areas where adequate
attention is not given to processing of the National identity card.
JOHN ORGEON in his book. TRAVELLERS AND JUORISM defines
travelers as a process of making long journey within or outside ones
territory. People travels in other to visit people, do business with people or
for changing environment. To this effect, there is every need that he/she
traveling bears a mark of identification, which is the national identity card.
The identity card being and outstanding document, is very official and is
only issued out and controlled by the Government under the auspices of the
ministry of Internal Affairs.
DAN JOUGLIOW in his book. AUTOMATIC DOCUMENT AND
PROCESSING defines document processing as preparation of printed
evidences for births, deaths, marriage, identificatione.t.c.
These document are processed to bevery unified and easily maintained.
With the introduction of identity card, the problem associated with identity
card processing system has been totally solved. The computer maintain and
access information about identity card holders automatically with little
human intervention. Fraud is eliminated. The machine assess everything
automatically according to predefined program instruction using a defined
government criteria.
STATE CO-ORDINATOR
WORKS
ADMINISTRATION SECURITY SECTION FIELD OPERATION
ADDRESS: GONOTYPE:
AGE:
SEX:
DATE OF BIRTH
TOWN:
L.G.A:
STATE:
NEXT OF KIN:
PROFESSION:
DATE:
MARITAL STATUS:
OCCUPATION:
HEIGHT:
SIGN:
PROCESS ANALYSIS
The processing analysis is the use of laid down conditions in assessing the
application record. This processing is a careful exercise. It takes a lot of
time to come to a conclusion on whether to issue national identity card to an
applicant or not. This also involved the checking of the validation of the
supplied record by the Applicant.
OUTPUT ANALYSIS
The output is the National identity card booklet information which builds up
the national identity card holders records with the Department of national
civic Registration or the ministry of internal affairs and national identity
card section. These records are kept for security purposes and for the major
purposes of references when necessary.
The sample above shows the national identity card output. The management
when necessary references to these items listed.
NAME: TOWN:
ADDRESS: STATE:
HEIGHT: GONOTYPE:
L.G.A: TOWN
NATIONALITY:
MARITAL STATUS:
DATE OF ISSUE:
FILLED FORM
DUTY CLERK
COMPILED FORMS
SUPERVISOR OPERATIONS
ENDORSED
CONTROLLER
SPECIAL FEATURES
MAIDEN NAME
PARTICULARS OF NEXT OF KIN
SURNAME:
FIRST NAME: MIDDLE NAME:
ADDRESS:
APPLICANTS ORIGIN:
PLACE: STATE:
DATE OF ID CARD ISSUE: PLACE:
STATE: LGA: RC: SEQUENCE NO.
ID FORM NUMBER:
PERSONAL NUMBER:
4.4 FILE DESIGN
The file design was for the purpose of good storage of received proper data.
Proper management assessment and reliable retrieval of data. The file was
grated in a random made with the structure below.
FILE STRUCTURE
FIELD
NAME
1 SURNAME
2 OTHERNAME
3 SEX
4 DATE OF BIRTH
5. PLACE OF BIRTH
6 STATE OF ORIGIN
7 CURRENT ADDRESS
8 PROFESSION/OCCUPATION
9 HEIGHT
10 BLOOD GROUP
11 MARITAL STATUS
12 MAIDEN NAME
13 NEXT OF KIN
14 DATE OF ID CARD ISSUE
15 PLACE
16 STATE
17 L.G.A
18 RC
19 SEQUENCE NUMBER
20 ID FORM NUMBER
21 PERSONAL NUMBER
FORM DOCUMENTS
(APPLICATION FORM)
DISPLAY RECORD
4.6 SYSTEM FLOW CHART
ENTER PASSWORD
MAIN MENU
ENTRY UPDATE
A MENU
UPDATE RECORDS
REPORT
EXIT TO MAIN MENU
CHOOSE
VIEW RECORD
A MENU
REPORT
4.7 SYSTEM REQUIREMENTS
The system objective are the most paid and also the most defined during
system analysis which will involve the actual usage of software developed
towards which the design is directed and entails to its intended purposes.
SOFTWARE REQUIREMENTS
The system software is developed using the Quick Basic programming
language, the choice is made and preferred owing to the fact that it runs in
all compatible computers (HP or otherwise). Also, some anti-virus programs
were installed in order to maintain a functions and effective running of the
program and also protect the loss of files.
HARDWARE REQUIREMENTS
This will include a 14 Video display unit, terminal keyboard for input cables
connecting the components. Printers for output and memory storage, which
can be a 586 or 686 on a 32 MB hard disk density of 3.5GB. The storage
memory allocation will not be less than 350 kilobytes base memory. The
printer not be less than a HP Laser jet 5 and above for a hard copy printout.
This new system should be sited within the computer room for its main
place where all these operation take place and also for accessibility for both
citizens and then of the department of national civic Registrations services.
4.8 IMPLEMENTATION THE NEW SYSTEM
The new design is computerized. It was designed to solve the problem in
line with the existing system. A skeletal guides to the development of the
new program code, detailed under this chapter. Also the program design
pseudocodes, flowcharts, and source program codes are all contained in this
chapter.
4.9 PROGRAM DESIGN
The program complexity were broken down into simplier units and solved
separately and individually. The units were represented as module in the
artifacts of the design. This makes it easy for modifications in order to meet
with the new technological changes. There were a total of three modules in
the entire program design. A earlier, stated. The modules were represented
individually.
ENTRY/UPDATE MODULE
This module takes care of all the entries concerning the system as well as
the modifications on already keyed in data. The entries are made through the
keyboard. The update as well makes necessary update as requested and
equally updates the content of the master file. The entry module takes care
of automatic savings of the entered records. It is sensitive and interactive in
information handling.
REPORT MODULE
This report module generates results from processed information. It works
on the special request from the user. It acts as a data base, where we can sort
or determine a particular item to search for. It also gives a report on the
particular file by sending the printer or printing on the screen.
EXIT MODULE
Here all operations that are involved in the closure of the files and the
program itself are achieved.
4.10 PROGRAM FLOW CHART
FIG 5A
START
UPDATE NO
NO UPDATE YES
RECORDS B
NO
D
REPORT
DELETE YES
RECORDS C
NO NO
STOP
FIG 5B
A
INPUT RECORD
ARE ENTRIES NO
CORRECT
YES
STORE RECORD
MORE
YES
RECORD
STOP
FIG 5C
RECEIVE
UPDATE
YES NO
DOES IT IS IT EOF
EXIST
UPDATE
RECORD YES
NO
STOP
FIG 5D
RECEIVE
RECORD CODE
NO
DOES IT
EXIST
MAKE RECORD
FOR DELETION
DELETE RECORD
STOP
FIG5E
RECEIVE
RECORD CODE
NO
DOES IT IS IT EOF
EXIST
DISPLAY YES
RECORD
STOP
CHAPTER FIVE
5.0 DOCUMENTATION
This chapter details the manual guide on how to run the program effectively.
All the steps that will help in the smooth running and operating or using the
program are all documented.
6.1 CONCLUSION
The work has been designed and computerized for the National Identity
Card section of the department of National Civic Registration under the
ministry of internal affairs. To assess and monitor the procurement of the
National Identity Card by individuals in order to eradicate the forgery and
duplication of National Identity Cards thereby restricting individuals only to
one national identity card for citizens. Using QBASIC Program is a way of
manipulating the processes involved in the assessment to bearest minimum.
Computer has made work very ready and interesting. The national identity
card as produced in time and adequate measures are taken to maintain
proper record and security pursuits. This work made the staff to have more
time to themselves. Also by implementing of this work, the huge
maintenance of the manual record system will drastically be reduced.
6.2 RECOMMENDATION
Computer has all times proven its superiority over every other technological
invention. To this effect, I recommend that for further elaboration on this
project.
- Every aspect of the National Identity Card operation should cease to a
manual operation.
- A system analyst should be employed to make-up the board of
decision that are responsible for planning and implementing the attire
of National Identity Card issuance and assessment.
- The workers should be given more incentives to enable them put in
relenting efforts in discharging their duties.
- The computerization should be maintained up-to date at all times.
- Security code inscription should be maintained on all the National
Identity Card.
- The staff should be trained to very computer literate.
- The program should be modified to suit all the sections of
Department of national civic registration.
REFERENCES
Press.
Rich Press.
University Press.
APPENDIX
SCREEN SHOT OF PROGRAM
36
SOURCE CODE
<body>
<tr><td>
Census ID: </td><td><input type="text" name="censusid"
/></td></tr>
<tr><td>Name:</td><td><input type="text" name="name"
/></td></tr>
<tr><td> Address:</td><td><input type="text" name="address"
/></td></tr>
<tr><td>Place of origin :</td><td><input type="text"
name="placeorigin" /></td></tr>
37
<tr><td>Local government Area :</td><td><input type="text"
name="lga" /></td></tr>
<tr><td>Date of Birth:</td><td><input type="text" name="dob"
/></td></tr>
<tr><td>Gender:</td><td><input type="text" name="gender"
/></td></tr>
<tr><td>
Place of Birth: </td><td><input type="text" name="placebirth"
/></td></tr>
<tr><td>Occupation:</td><td><input type="text"
name="occupation" /></td></tr>
<tr><td> Height:</td><td><input type="text" name="height"
/></td></tr>
<tr><td>Weight:</td><td><input type="text" name="weight"
/></td></tr>
<tr><td>Children :</td><td><input type="text" name="children"
/></td></tr>
<tr><td>Education:</td><td><input type="text" name="education"
/></td></tr>
</th>
</tr>
</table>
<?php
$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
mysql_select_db("idmanagement", $con);
if (!mysql_query($sql,$con))
{
die('Error: ' . mysql_error());
}
echo "1 record added";
mysql_close($con)
<body>
<H1> welcome to the Identity Management System<h1>
<table width="1200" border="1">
<tr>
<?php
//require_once(secret.php);
$con = mysql_connect("localhost","root","");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
mysql_select_db("idmanagement", $con);
</tr>";
while($row = mysql_fetch_array($result))
{
echo "<tr>";
echo "<td>" . $row['censusid'] . "</td>";
echo "<td>" . $row['name'] . "</td>";
echo "<td>" . $row['address'] . "</td>";
echo "<td>" . $row['placeorigin'] . "</td>";
echo "<td>" . $row['lga'] . "</td>";
echo "<td>" . $row['dob'] . "</td>"; echo
"<td>" . $row['gender']. "</td>"; echo
"<td>" . $row['placebirth'] . "</td>";
echo "<td>" . $row['occupation'] . "</td>";
echo "<td>" . $row['height'] . "</td>";
echo "<td>" . $row['weight'] . "</td>";
echo "<td>" . $row['children'] . "</td>";
echo "<td>" . $row['education'] . "</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
<body>
<H1> welcome to the Identity Management System<h1>
<table width="1200" border="1">
<tr>
mysql_select_db("idmanagement", $con);
$sql="DELETE FROM census WHERE
censusid='$_POST[censusid]'";
if (!mysql_query($sql,$con))
{
die('Error: ' . mysql_error());
}
echo "1 record deleted";
mysql_close($con);
#menu a:hover {
top:2px;
left:2px;
color:#fff;
border-color:#345 #cde #def #678;