Get the complete project »
- The Complete Research Material is averagely 36 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
An identity document is any document which may be used to verify aspects of a person’s personality. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). Countries which do not have formal identity documents may require informal documents.
In the absence of formal identity document, driving licenses can be used in many countries as a method of proof of identity, although some countries do not accept driving licenses for identification, often because in those countries they do not expire as documents and can be old easily forged. Most countries accepts passports as a form of identification.
Most countries have the rule that foreign citizens need to have their passport or occasionally a national identity card from their country, available at anytime if they do not have residence permit in the country. A student identification card can only be issued to genuine bonafide students. Card holders can use the card to identify themselves as a student around the campus or outside the campus. The identity card is managed and administered by the (Student Identity Card Association (SICA) of the school.
1.1 Theoretical Background
Today, it is believed that the application of computer technology in any activity would go a long way in making that activity much easier. To the research, this statement remains a theory until proven otherwise by the implementation of a computerized student ID-card processing system. It is also believed that benefits and advantage of using computers outweighs that of manual methods.
This also wants to be proven beyond doubts by the researcher through the implementation of the new system.
1.2 Statement of the Problem
The major problems that gave rise to this research project is faced by Akwa Ibom State Polytechnic and they include late registration of student’s, corrupt students that know diverse ways of producing fake identity cards, corrupt and tactical student’s who have a way of sneaking into the examination hall with fake identity cards.
1.3 Aim and Objectives of the Study
The aim of the study is to design and implement workable computerized system for student’s identity cards.
The objectives of the study are as follows:
1. To establish efficient means of tracking students with fake ID-Card.
2. To reduce examination malpractice in Akwa Ibom State Polytechnic, at least in the area of impersonation
3. To create a reliable database of students in Akwa Ibom State Polytechnic, with unique features like passport photographs and registration numbers.
4. For research purpose (project writing defense).
1.4 Significance of the Study
This research work would be unnecessary if it has no significance to humanity.
Firstly, the newly designed system would make other-higher institutions to see the need for creating a computerized student ID-card processing system to use in production of student ID-card.
Secondly, the knowledge that the new system has designed would make students and invigilators contemplating on impersonation and have a change of mind for fear of being caught.
Thirdly, the designed of the system would provide jobs for system analysts and programmers contacted to build the system for other institutions.
Fourthly, student identity card is used to check out books from the library, register to vote on student union matters, and get student discount.
Finally, the research projects would serve as reference material to other scholars interested to further research on the topic.
1.5 Scope of the Study
This research work restricted to implementation of computerized student ID-card processing system; using Akwa Ibom State Polytechnic as a case study. Data used for the study were gathered from this source.
1.6 Organization of the Research
This research work has been arrange in the following order:
Chapter one contains introduction, theoretical background, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the research and definition of terms (where necessary).
Chapter two focused on the relevant literature review, highlighting basic concept.
Chapter three is concerned with the system design which emphasis on system design and flowcharting. It also expands the development of the new information system that would facilitate tracking of fake ID-cards.
Chapter four is the system implementation which gives the direction of system and analysis of modules.
Chapter five summarizes and concludes the research work offering some useful recommendations.
1.7 Definition of Terms
In order to do away with ambiguity, some terms and keywords in the context of this research are hereby defined.
Identity Card: It is a proof of the holder’s identity that includes a photograph.
Impersonation: The act of pretending to be avoid candidate in order to write examination for someone else using that person identity card.
Verification: Is the evidence that proves that something is true or current.
Photograph: It is an image appeared on the identity card owner.
Malpractice: Is a careless, wrong, or illegal practices that is not ethical in a particular field like academics.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
1. DESIGN AND IMPLEMENTATION OF STUDENT VERIFICATION SYSTEM FOR DELTA STATE UNIVERSITY NIGERIA (DELSU E-VERIFY)» CHAPTER ONE INTRODUCTION A system, with numerous definitions can be literally seen in a computer way as a collection of the hardware and software comp...Continue Reading »
» ABSTRACT English is the official language of only seven countries comprising little more than five percent of the world's population. Yet the majority...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND TO THE STUDY The methods that are used to share ideas and for collaboration are constantly changing and evolvi...Continue Reading »
4. STUDENT ATTENDANCE MANAGEMENT SYSTEM USING RADIO FREQUENCY IDENTIFICATION (RFID), A CASE STUDY OF FEDERAL UNIVERSITY OF TECHNOLOGY MINNA.» CHAPTER ONE INTRODUCTION 1.1 Background of Study The accessibility of virtually all material on the World Wide Web nowadays have make students less en...Continue Reading »
» CHAPTER ONE INTRODUCTION This project is about integration of intelligent traffic control system, for the types of collisions, congestion and traffics...Continue Reading »
» 1.0 INTRODUCTION 1.1 INSIGHT TO ONLINE MARKETPLACE Online Market, commonly known as e commerce or eCommerce, or e business consists of the buying and ...Continue Reading »
» CHAPTER ONEINTRODUCTION1.0 IntroductionThis chapter presents the introduction to an intelligence based system for students performance evaluation. It ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Employee records may be defined as "record that contain initial application forms, results of physica...Continue Reading »
» ABSTRACTLife’s circumstances are mathematical in nature. It is therefore clear that answers to such circumstances are obtainable through mathematica...Continue Reading »
10. DESIGN AND IMPLEMENTATION OF A COMPUTERIZED LIBRARY MANAGEMENT SYSTEM (A CASE STUDY OF UNIVERSITY OF UYO GENERAL LIBRARY)» ABSTRACTLibrary management system is a project which aims in developing a computerized system to maintain all the daily works of library. This project...Continue Reading »