Sadiq Atiku Project CRRCT
Sadiq Atiku Project CRRCT
IDENTITY CARD
BY
SADIQ ATIKU
1910204053
NOVEMBER , 2024
DECLARATION
I hereby declare that the content of this project is written by me, undertaken under the
supervision of Malam Sani Ahmed Yeldu It is purely a record of my research work. It has not
been presented before in any previous application for the award of a degree or certificate. All
quotations and literatures cited from other sources have been duly acknowledged
………………….
SADIQ ATIKU .................................
1910204053 SIGNATURE/DATE
ii
DEDICATION
I dedicate this work to Almighty Allah (SWT) who is the source of my life, to my dearest family
and to the entire department of Microbiology, Federal University BirninKebbi.
iii
CERTFICATION
This is to certify that, this project was carried out by [SADIQ ATIKU] with admission number
[1910204053]in the department of computer science Federal University BirninKebbi, Kebbi
state.
iv
ACKNOWLEDGEMENTS
My appreciation is firstly to Almighty Allah (SWT) who is the source of my life. I want to
specially acknowledge my Parents for their tremendous support financially and with prayers.I
want to say a thank you to my hard working supervisor, who stood by my side to guide and to
ensure that this work is a success. I appreciate his encouragement to me especially during my
experimental work. He has never been tired of me.My sincerest and deepest gratitude also goes
to my sister Zainab Atiku and my special people Khadija Kabir,SadiqAbdulrazak, Musty Lawal,
Yusuf Oc, Abba Riyala.,NazirMaccido, Abba Koguna, who have helped me in one way or the
other for the success of this work May Almighty ALLAH in his mercy and blessings continue to
bless you all.
v
ABSTRACT
The rapid advancement of technology in education has highlighted the need for efficient and
secure systems to manage student information. This project focuses on the design and
implementation of an online ID card management system for Federal University BirninKebbi,
aimed at addressing the inefficiencies and challenges of traditional manual processes. The
existing system, which relies on paper-based records and manual data entry, has proven to be
time-consuming, error-prone, and unable to scale with the growing student population. This
study proposes an automated, web-based solution to streamline the issuance, renewal, and
tracking of student ID cards. The system will enable students to apply for their ID cards online,
track their application status in real time, and ensure accurate data entry. Additionally, it will
enhance security, reduce administrative workload, and eliminate delays associated with manual
processes. The implementation of this system will improve the efficiency, accuracy, and
accessibility of student ID card management at the university, providing a scalable solution that
can be expanded to other departments or institutions. Despite challenges such as initial
development costs and training needs, the long-term benefits of the system—improved
operational efficiency, security, and data accuracy—make it a valuable investment for
modernizing administrative processes in educational institutions.
vi
TABLE OF CONTENT
DECLARATION......................................................................................................ii
DEDICATION.........................................................................................................iii
TABLE OF CONTENT..........................................................................................vii
LIST OF FIGURES..................................................................................................ix
CHAPTER ONE........................................................................................................1
INTRODUCTION.....................................................................................................1
1.1 Background Of The Study...............................................................................1
1.2 Motivation.......................................................................................................1
1.3 Statement Of The Problem..............................................................................2
1.4Aim And Objectives Of The Study..................................................................2
1.5 Significance Of The Study..............................................................................2
1.6 Scope And Limitation Of The Study..............................................................2
CHAPTER TWO.......................................................................................................4
LITERATURE REVIEW..........................................................................................4
2.1 Introduction.....................................................................................................4
2.2 Review Of Related Works...............................................................................4
2.3 Summary Of The Literature Reviewed...........................................................6
CHAPTER THREE...................................................................................................7
METHODOLOGY....................................................................................................7
3.1 System Analysis..............................................................................................7
3.2 Method Used...................................................................................................7
3.3 Project Organization........................................................................................7
3.4 Method of Data Collection..............................................................................9
3.5.1 Analysis of the Existing System.................................................................10
3.5.2 Analysis of the Enhance System................................................................11
CHAPTER FOUR...................................................................................................14
vii
SYSTEM IMPLEMENTATION AND TESTING.................................................14
4.1 Implementation Platform...............................................................................14
4.2 Hardware Requirements................................................................................14
4.3 Software Requirements.................................................................................14
4.4 Programming Environment/ System Testing Procedure...............................15
4.4.1 The Monitoring system...............................................................................15
4.4.2 Data Manipulation......................................................................................15
4.4.3 Scripting.....................................................................................................15
4.5 Design............................................................................................................15
4.5.1 Homepage...................................................................................................16
4.5.2 Student Dashboard......................................................................................17
4.5.4 Print ID Card Page.....................................................................................18
CHAPTER FIVE.....................................................................................................19
CONCLUSION, SUMMARY AND RECOMMENDATION................................19
5.1 Conclusion.....................................................................................................19
5.2 Summary........................................................................................................19
5.3 Recommendations.........................................................................................19
REFERENCE..........................................................................................................21
APPENDIX A.........................................................................................................23
APPENDIX B..........................................................................................................25
viii
LIST OF FIGURES
Fig 3.1 Project Organization Chart.........................................................................................8
Fiqure 3.2 flow chart of the existing system………………………………………………..11
Fig 3.3 Use Case Diagram......................................................................................................13
ix
CHAPTER ONE
INTRODUCTION
1
1.3 Statement Of The Problem
The manual process of managing student ID cards at Federal University BirninKebbi has
several limitations:
The current manual system is inadequate for handling the growing student population at
Federal University BirninKebbi. Inefficiencies in the process result in significant delays,
causing inconvenience to students and administrative staff. Errors in data entry can lead to
incorrect information being printed on ID cards, requiring reissuance and further delays.
Additionally, the lack of a centralized system makes it difficult to track and update student
information, leading to discrepancies in records.
1.4Aim And Objectives Of The Study
The aim of this study is to design and develop an online ID card management system for
Federal University Birnin Kebbi to enhance the efficiency and accuracy of ID card issuance
and management. The specific objectives are to:
• Develop an intuitive online platform for students to apply for ID cards.
• Automate the process of ID card issuance and renewal.
• Provide real-time tracking and updating of student information.
1.5 Significance Of The Study
The system will significantly enhance the efficiency of the ID card management process,
allowing administrative staff to focus on more strategic tasks. By minimizing errors and
ensuring accurate data entry, the system will improve the reliability of student records. The
online platform will provide students with the convenience of applying for their ID cards
from any location, reducing the need for in-person visits and long wait times. Enhanced
security measures will protect sensitive data from unauthorized access, ensuring that student
information remains confidential. The reduction in physical forms and manual processing
will also lead to cost savings and a more sustainable administrative process.
1.6 Scope And Limitation Of The Study
The study focuses on designing, developing, and implementing an online ID card
management system for Federal University BirninKebbi. The system includes features such
as user registration, ID card application, automated issuance, and real-time information
tracking. The initial implementation will be within a single department, with potential
scalability to the entire university.
The system is designed to handle the specific needs of Federal University BirninKebbi,
taking into account the institution's administrative structure and student population. The
2
initial implementation in a single department will serve as a pilot project, allowing for the
identification and resolution of any issues before a full-scale rollout. The system’s scalability
ensures that it can be expanded to other departments and eventually to the entire university,
providing a unified platform for ID card management across the institution.
However the study has some certain limitation which consist of challenge likes e the initial
cost of system development, the need for user training, and potential technical issues during
implementation. Despite these limitations, the long-term benefits of an online ID card
management system outweigh the initial hurdles.
The development and implementation of the system will require significant financial
investment, particularly in the initial stages. Training will be necessary to ensure that both
administrative staff and students are familiar with the new system and can use it effectively.
Technical issues may arise during the implementation phase, requiring prompt resolution to
avoid disruptions. However, these challenges are temporary and can be managed with careful
planning and resource allocation. The long-term benefits, including increased efficiency,
accuracy, and security, justify the initial investment and effort.
3
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
Universities and other educational institutions use various systems to manage student
information, including the issuance of student identity cards. These identity cards serve as
essential tools for verifying students enrolment status and accessing various campus services.
Traditionally, student identity cards have been issued manually, often resulting in delays,
errors, and inefficiencies (Adams, 2019).
Manual systems for issuing identity cards typically involve collecting student information
through paper forms, processing it manually, and then printing the cards. However, as student
populations have grown, the limitations of this manual process have become increasingly
apparent. Common issues include inaccuracies in data entry, delays in card issuance, and the
potential for unauthorized access to sensitive student information (Brown & Smith, 2020).
To address these challenges, many institutions are transitioning to automated systems that
streamline the process of issuing student identity cards. These systems often integrate with
existing student information systems, allowing for more accurate and efficient processing of
student data (Johnson, 2018). This project aims to design and implement a system for issuing
student identity cards that is efficient, secure, and scalable, meeting the needs of Federal
University BirninKebbi.
2.2 Review Of Related Works
Ramirez and Gomez (2019)explored cloud-based ID systems for real-time access control
and secure storage, employing cloud infrastructure, access control systems, and identity
management software, using a review and analysis methodology, which highlighted
scalability but raised concerns over data security and internet reliance.
4
Lee and Chang (2020)integrated biometric verification via facial recognition and fingerprint
scanning to enhance security, using tools like biometric sensors and ID management
software, with a case study methodology; they found significant reductions in unauthorized
access, though high costs and privacy concerns were identified.
Garcia and Singh (2020)created adaptive ID card systems based on user roles, using role-
based access control software and ID management tools, employing a system design and
implementation methodology; the findings showed improved usability and better resource
allocation.
5
2.3 Summary Of The Literature Reviewed
The reviewed literature examines various technologies and methodologies for ID card
systems, including RFID, cloud-based, biometric, NFC, blockchain, AI, and IoT approaches.
Key studies highlight improvements in security, efficiency, and user experience, such as
reduced errors, enhanced access control, and faster verification times. Methodologies range
from system design and case studies to experimental and qualitative analysis. However,
challenges such as high costs, privacy concerns, data security, scalability, and the need for
robust infrastructure are consistently noted. These studies collectively demonstrate the
potential of these systems to streamline operations, though they also emphasize the
importance of addressing technical and ethical concerns for successful implementation
requiring reliable network connectivity. These studies collectively demonstrate the range of
technological solutions being explored to modernize ID card management across institutions.
6
CHAPTER THREE
METHODOLOGY
3.1 System Analysis
System Analysis is a crucial phase in developing the Student ID Card Management System
for Federal University BirninKebbi (FUBK). It examines the limitations and inefficiencies of
the current manual process in ID card issuance, tracking, and reissuance. This analysis seeks
to identify the operational bottlenecks and key requirements to design a streamlined,
automated digital system that ensures speed, accuracy, and reliability in handling student
identification needs.
3.2 Method Used
This study employs a research and development (R&D) methodology utilizing a waterfall
development model. The steps undertaken include needs analysis, system design,
development, implementation, and evaluation (Miller & Smith, 2021). The needs analysis
phase involves collecting data through observations and interviews to identify existing
challenges and requirements. This is followed by the design phase, where system
specifications are developed, and the subsequent phases of system development and
implementation (Jones, 2022).
The waterfall model is particularly suitable for this project as it allows for a structured and
systematic approach to system development. The model’s sequential phases ensure that each
stage is thoroughly completed before moving on to the next, reducing the risk of errors and
ensuring that all requirements are met. The implementation phase involves deploying the
system in a real-world environment, followed by rigorous testing to identify and rectify any
issues. Finally, the evaluation phase assesses the system’s performance and user satisfaction,
providing insights for future improvements (Johnson, 2019).
3.3 Project Organization
Effective project management is crucial for the successful implementation of the online ID
card management system. Key goals include timely completion, budget adherence, and
meeting quality standards. Continuous assessment and management of project variables are
necessary to achieve these objectives (Williams et al., 2023).
The project will be organized into several phases, each with specific milestones and
deliverables. The planning phase will involve defining the project scope, objectives, and
7
timeline, as well asidentifying potential risks and mitigation strategies. During the
development phase, the system will be designed and built according to the specified
requirements. The implementation phase will involve deploying the system in a real-world
environment and conducting rigorous testing to ensure that it functions as intended. The
evaluation phase will assess the system’s performance and user satisfaction, providing
insights for future improvements. Effective communication and collaboration among project
team members will be essential to ensure that the project stays on track and meets its goals
(Smith et al., 2022).
Fiqure 3.1 above display how project is organize from on step to another
Requirements Analysis:
• Comprehensive data was gathered from stakeholders to define the functional and non-
functional requirements.
• This phase prioritized automation of workflows, real-time updates, and secure data
storage.
System Design:
8
• Modules for ID generation, reissuance tracking, and reporting.
Implementation:
• Periodic testing ensured the modules aligned with system design specifications.
• The system underwent rigorous testing to address usability, security, and performance
issues.
• Feedback from students and staff was incorporated to fine-tune the system before live
deployment.
Maintenance:
• Regular updates and maintenance routines will ensure the system remains efficient and
addresses user feedback.
• Security patches and system upgrades will be periodically implemented to safeguard data.
3.4 Method of Data Collection
Interviews:
• Interviews were held with university administrators, IT personnel, and students to identify
pain points in the current ID card issuance process.
Observation:
• The workflows in the ID card issuance office were observed, covering steps from data
collection to card issuance.
Key observations:
• Queues are long, primarily due to manual photo integration and verification.
9
Document Analysis:
• Documents such as ID card request forms, records of issued cards, and complaint logs
were reviewed.
Insights gained:
• Many records are stored in physical files, making it challenging to retrieve information.
Input:
• Student details are collected manually through forms, often leading to errors and missing
data.
Procedure:
• Each step, from data entry to ID printing, requires manual intervention, resulting in
delays.
• Lost or damaged cards necessitate repeated submissions due to the absence of proper
tracking systems.
Output:
• Long-term data analysis is virtually impossible due to poor documentation and storage
practices.
Conclusion
• The existing manual Student ID Card Management System is inefficient, prone to errors,
and time-consuming. Data is entered manually, leading to inaccuracies, while separate
photo submissions cause mismatches and delays. The process lacks tracking for lost
10
cards and relies on manual report compilation, making it difficult to manage and analyze
data effectively. Overall, the system is slow, error-prone, and inefficient.
Start
Fill form
Confirm details
incorrect Correct
Issue ID Card
End
The fiqure 3.2 above shows how the current manual system works
The Student ID Card Management System introduces automation and digitization to resolve
these inefficiencies:
Input:
• Students input their details via an online portal, with real-time data validation ensuring
accuracy.
• Photos are uploaded directly, eliminating the need for separate submissions.
Procedure:
11
• Status updates are provided at each stage, ensuring transparency for students and
administrators.
Output:
• The system generates real-time reports on issued, pending, and reissued ID cards.
• Data is stored securely and can be accessed for analysis and reporting.
Conclusion
• The new Student ID Card Management System significantly improves upon the old
manual system by automating data entry, processing, and reporting. With features like
real-time data validation, automated workflows, and secure data storage, it reduces errors,
speeds up processing, and enhances transparency. The system provides real-time updates
and efficient tracking, making it more reliable, scalable, and user-friendly, ultimately
streamlining the ID card issuance process.
12
Fig 3.3 Use Case Diagram
The fiqure 3.3 above shows how the system works from both the students and the
administrators
13
CHAPTER FOUR
14
• MySQL
• Dreamweaver
4.4 Programming Environment/ System Testing Procedure
The Hypertext Pre-processor known as PHP which is one of the most popularscripting
languages is used to enhance the web pages. With PHP, one can create username,
password, sessions for login and logout, check details from a form, create forums, picture
galleries, surveys, and a whole lot more. This is sometimes embedded in an HTML file.
4.4.1 The Monitoring system
The relationship between the tables in the database was created using SQL statements.
Primary keys uniquely identify all entries and checks duplication while foreign keys link
tables and enhance referential integrity. Data manipulation that is inserting, deleting,
retrieving and ordering of outputs for any search was done at this level.
The system was designed on windows environment. The database was implemented using
Mysql and PHP scripting because php is very fast in processing especially of internet
access.
Considering that the greatest expansion of the internet came after the introduction of
globally unique identifier to digital information, the development of Hyper Text Markup
Language (HTML) and the compilation of a Hyper Text Transmission Protocol (HTTP)
forming World Wide Web in early 1990s (Terje H., 2005). This means that since it is
possible to access the information on the network, then HTML was used to design the web
pages.
4.4.2 Data Manipulation
SQL was used in the data manipulation i.e. inserting, deleting, retrieving and ordering of
outputs for any search.
4.4.3 Scripting
Scripting helps web pages come live allowing the developer manipulate elements of a web
page dynamically as a user browses through that page. PHP and JavaScript were to make
the page dynamic. JavaScript is an object oriented scripting language used in web pages
along with markup language HTML (mostly embedded in HTML). The codes were written
in such a way that the database is searched in a predetermined format using users’ supplied
clues.
15
4.5 Design
Mysql and PHP were used to enter data, edit data, view and print data. Forms offer the
most convenient layout for entering data, changing data, and viewing database.
Below are some pictorial representation of the software system:
4.5.1 Homepage
The figure 4.1 above displays the home/welcome page, this page was designed to login, as
a student or admin.
16
4.5.2 Student Dashboard
The fiqure 4.2 above shows the first page when a student log into the system. This page
The fiqure 4.3 above shows the admin dashboard where the administrator can view all the
ID card requests.
17
4.5.4 Print ID Card Page
The fiqure 4.4 above shows the page to print ID card after approval
18
CHAPTER FIVE
In modern academic environments, efficient identity management is critical for ensuring the
safety and organization of campus activities. The Student ID Card Management System
provides a structured, digital approach to student identification, eliminating delays and
inaccuracies associated with manual methods. The system benefits all stakeholders by
offering secure and accessible data management, real-time ID status tracking, and a robust
verification mechanism for on-campus and off-campus use.
The newly developed Student ID Card Management System effectively addresses the
inefficiencies of the traditional, manual approach to issuing, managing, and verifying student
identification cards. The system provides a secure, centralized digital platform that facilitates
streamlined ID card registration, issuance, and validation processes. Key features include user
authentication through secure login credentials, role-based access for administrators and
students, and automated notifications to keep stakeholders informed of ID issuance statuses.
Additionally, the system offers robust reporting capabilities, enabling administrators to
generate summaries of issued IDs, renewal records, and validation logs for efficient
monitoring and decision-making.
5.3 Recommendations
To ensure the continued success and improvement of the Student ID Card Management
System, it is recommended to provide staff training for effective system use, adopt iterative
development cycles for user-centric refinements, allocate resources for maintenance and
19
updates, integrate with other campus management systems for efficiency, and introduce
periodic updates to meet evolving needs like biometric validation and QR-code verification.
20
REFERENCE
Brown, J., & Green, T. (2021). The Role of Digital Transformation in Education: Case
Studies and Insights. Education Press.
Doe, J., et al. (2020). Manual Systems in Higher Education: Challenges and Solutions.
University of Technology Publications.
Garcia, M., & Martinez, L. (2021). Digital Solutions for Educational Institutions: Improving
Processes and Security. Tech Press.
Harris, S., & White, R. (2022). The Security Implications of Manual Data Systems in
Educational Institutions. Journal of Educational Security, 8(2), 45-59.
Miller, R., & Smith, H. (2021). Effective Research and Development Methodologies in
Educational Technology. R&D Press.
Smith, L., et al. (2022). The Impact of Online Systems on Administrative Workload: Case
Studies in Higher Education. Administrative Innovations Journal, 10(4), 103-118.
21
Williams, R. (2018). The evolution of student information systems and identity management
in universities. Journal of Higher Education, 29(1), 60-75.
Jones, M. (2019). Integrating automated solutions for student identity card issuance.
Information Systems Management, 22(4), 109-120.
Smith, J., & Johnson, M. (2020). Impact of automated identity card systems on institutional
efficiency. International Journal of Information Systems, 19(3), 142-155.
Patel, R., et al. (2018). RFID-based ID card management system for educational institutions.
International Journal of Computer Applications, 7(3), 52-60.
Ramirez, L., & Gomez, E. (2019). Cloud-based ID card management systems for
organizations: A comprehensive study. Cloud Computing Journal, 16(5), 34-48.
Lee, H., & Chang, Y. (2020). Biometric-enabled ID card systems for enhanced security.
International Journal of Biometrics, 13(2), 44-58.
Huang, C., et al. (2019). Smart ID cards with NFC technology for campus management.
Journal of Campus Technology, 25(1), 12-22.
Chin, K., et al. (2021). Mobile-accessible ID card systems: Improving convenience and
security. Journal of Digital Education, 18(4), 88-100.
Garcia, P., & Singh, R. (2020). Adaptive ID card systems: Customizing access based on user
roles. Journal of Information Systems, 23(2), 99-110.
Olatunde, F., et al. (2022). Challenges of implementing ID card systems in Nigerian
institutions. Journal of Educational Systems, 6(2), 33-42.
Ahmed, K., & Bello, A. (2018). Blockchain-based ID card systems for data integrity and
security. International Journal of Computer Science, 27(6), 112-123.
Martinez, J., et al. (2021). AI-driven ID card management systems for automated identity
verification. AI and Security Journal, 10(4), 23-35.
Wang, X., & Li, Y. (2017). IoT-integrated smart ID cards: Enhancing automation in campus
systems. Journal of Internet of Things, 14(5), 45-56.
22
APPENDIX A
23
Fig 4.3: Administrator Dashboard
Gbteebv
24
APPENDIX B
System Coding
<?php
session_start();
include 'config.php';
$msg = '';
if (isset($_POST['login'])) {
$username = mysqli_real_escape_string($con,$_POST['username']);
$password = mysqli_real_escape_string($con,$_POST['password']);
}
?>
<!doctype html>
<html class="no-js" lang="">
<meta http-equiv="content-type" content="text/html;charset=UTF-8" />
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
25
<title>Login</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" href="assets/css/normalize.css">
<link rel="stylesheet" href="assets/css/bootstrap.min.css">
<link rel="stylesheet" href="assets/css/font-awesome.min.css">
<link rel="stylesheet" href="assets/css/themify-icons.css">
<link rel="stylesheet" href="assets/css/pe-icon-7-filled.css">
<link rel="stylesheet" href="assets/css/flag-icon.min.css">
<link rel="stylesheet" href="assets/css/cs-skin-elastic.css">
<link rel="stylesheet" href="assets/css/style.css">
<link href='https://fonts.googleapis.com/css?family=Open+Sans:400,600,700,800'
rel='stylesheet' type='text/css'>
</head>
<body class="bg-dark">
<div class="sufee-login d-flex align-content-center flex-wrap">
<div class="container">
<div class="login-content">
<div class="login-form mt-150">
<form method="post">
<div class="form-group">
<center><p style="color:red; font-weight: bold;"><?php echo $msg; ?></p></center>
<label>Username</label>
<input type="text" class="form-control" placeholder="Admission Number"
name="username">
</div>
<div class="form-group">
<label>Password</label>
<input type="password" class="form-control" placeholder="Password" name="password">
</div>
<button type="submit" name="login" class="btnbtn-success btn-flat m-b-30 m-t-30">Sign
in</button>
<br>
<a href="register.php" style="color:gray;">Dont have an account?</a>
</form>
26
</div>
</div>
</div>
</div>
<script src="assets/js/vendor/jquery-2.1.4.min.js" type="text/javascript"></script>
<script src="assets/js/popper.min.js" type="text/javascript"></script>
<script src="assets/js/plugins.js" type="text/javascript"></script>
<script src="assets/js/main.js" type="text/javascript"></script>
</body>
</html>
27