Sei sulla pagina 1di 15

Chapter I

INTRODUCTION
The present 21st century is a digital era. Nowadays, the development in
various aspects of computer technology has reached beyond our imagination
and expectations. Every new day, new system and technology is presented in the
community.
In certain, Sultan Kudarat State University, Kalamansig Campus students
have identification cards which serves as their gate pass and be recognized as a
student of the said University as what like the other schools or institutions do.
However, releasing of the school identification cards was delayed due to
contractual basis system wherein it undergoes series of process. Classes may
also be hampered due to a photo shoot schedule which also adds a delay in
releasing the ID cards. In that reason, students will not be able to use their ID
cards as soon as the class starts. Also, in case of its loss, the students should go
again to the contracted printing service firm in order to have it printed again and it
spent weeks before its release.
With these regards, the researcher came up of an idea in developing the
Automated Identification Card Generating System. Students identification cards
will be automatically released as soon as they are officially enrolled and in case
of its loss, the user or assigned person will be able to print it again because it has
a database that will automatically store students information. This will also serve
as an income generating project of Sultan Kudarat State University.

Objectives of the Study


Generally, the study aims to develop an Automated Identification Card
Generating System.
Specifically this study aims to:

Design a system that will store students information.

Automatically generates students identification card.

Evaluate the functionality of the system.


Significance of the Study
With this proposed system, students identification cards will be
automatically generated and released for its use. This process is faster than the
old practice of providing students IDs. In-case of its loss, the registrar or
assigned personnel can easily reprint or provide another ID for the students. The
school will also benefit in this because it will serve as another source of income.
Scope and Limitation
The focus of Automated Identification Card Generating System is to
automatically generate identification cards for SKSU students. This is to be used
only by Sultan Kudarat State University, Kalamansig Campus, Kalamansig,
Sultan Kudarat. The study is conducted from the month of June until October
2016.

Operational Definition of Terms


Identification Card

a card that has your name and other


information about you and that often includes
your photograph.

Computer

a machine that performs tasks, such as


calculation or electronic communication under
of set of instruction called program.

Database

a collection of pieces of information that is


organized and used on a computer.

System

a set of rules, an arrangement of things, or a


group of related things that work toward a
common goal.

Visual Basic 6.0

is a programming environment from Microsoft


in which a programmer uses a graphical user
interface

(GUI)

to

choose

and

modify

preselected sections of code written in the


BASIC programming language.
Graphical User Interface

a visual way of interacting with a computer


using items such as windows, icons, and
menus, used by most modern operating
systems.

Chapter II
REVIEW OF RELATED LITERATURE
Identity Card or Identification Card
We can define an identity document as the document and it will help to
make the proper verification of the personal identity of a person. The ID is also
known as ID or the portion of identification or the paper of any person. It is a
small standard size card and usually called the identity card that can be easily
kept in a pocket or inside wallet. A card can show data of the identification about
any person including names (firstname, sur name, last name), age, address, a
portrait photograph to have colour of body, hair and eyes. These types
identification are used commonly in place of school for the student, companies
for the employees. Therefore it can be said that student ID card is the card of
identification which is used for holding specific characteristic of students.
Richard Dybowski (2012)
Smart Card
The advent of Smart Card Technology has brought many positive changes
to the society such as security and convenience in the performance of an array of
activities. Since its introduction in 1974, the use of smart cards has become
increasingly prominent. Over 3.8 billion were estimated to be in use as at the last
millennium. The smart card with its many applications has been implemented in
Angola, Morocco, Germany, Italy and some other European countries as a
medium of electronic identification with a good amount of success. With the
tremendous success of smart card technology, it is extremely rare to find
individuals from the developed and developing societies and nations with only
one card in their carriage. They probably have atleast two or more cards each,
one serving its distinct function i.e. either for the identification e.g. national ID
card, drivers license or as a means of business transaction e.g. E-tranzact card,
Bank ATM card etc. Fowler et. Al (2009)
Smart card is a digitally encoded card, similar to a credit card, usually
containing a variety of information about the individual(s) authorized to use it.

The information can be accessed by a card reader into where the card is
inserted. The information may include access codes for authentication, account
numbers including merchant and banking account numbers, and electronic cash.
(Farrow, 2002).
Digital Signature
Digital signature authentication schemes provide secure communication
with minimum computational cost for real time applications such as electronic
commerce, electronic voting etc. The sender generates the signature of a given
message using his secret key; the receiver then verifies the signature by using
senders public key. Ramasamy and Prabakar (2009)
Many organizations prefer going paperless by using electronic forms of
sending and receiving data. In this context, it is essential that not only the sender
needs to authenticate the receiver, the receiver should also authenticate the
sender and ascertain himself from whom the message was received. Roja and
Avandhani (2007)
Photo Identification
Scholars advocating requiring photo ID argues that having by requiring a
photo ID when one votes reduces voter fraud. The other perspective is that you
should have to show voter ID to prevent potential voter fraud. Sara DAgostini
discusses the Michigan Supreme Court Case that directly relates to the
constitutionality of whether one should be required to show a photo ID. This court
case refers back to HAVA (Help America Vote Act of 2002) and addresses
HAVA's Voter ID Requirements. The HAVA requires those who vote for the first
time to bring in proof 10 of identity, such as a photo ID, current utility bill, bank
statement, government check, paycheck, or any other government document that
shows both the name and address of the voter. The Carter-Baker National
Commission on Federal Election Reform, which was made to analyze HAVA with
recommendations to improve, suggest voters must provide photo ID if they wish

to vote. The Carter-Baker National Commission states, "the electoral system


cannot inspire public confidence if no safeguards exist to deter or detect fraud or
to confirm the identity of voters. Photo ID's currently are needed to board a plane,
enter federal buildings, and cash a check. Voting is equally important" (582).To
address this statement the U.S. Supreme Court says that there are places that
you can get a free photo ID such as the BMV which for those who want an ID to
vote, should not require too much inconvenience. In concordance with the
regulations enforced, Michigan's Secretary of State says, "the prevention of inperson voter fraud is critical because it is impossible to remedy the harm inflicted
by the fraudulently cast ballot by correcting the vote count, as our constitution
requires that ballots remain secret. (D'Agostini, 2009)
According to the Jostens company website, school yearbooks have been
published since 1845, so student photos have been getting taken captured for
well over 160 years (Jostens, 2013). The cost of developing photographs,
however, was extremely prohibitive. Only after a significant improvement to the
Kodachrome development process in 1974 would printing individual student
photos have become affordable for schools (Kodak, 2013).
Management System
Management system is the systems that provide information for managing
organization information. At the beginning, management system is use to
manage organization with the paper base that included planning, implement and
controller. Then, management system computer base is use to generate
information for control coordination performance and to provide background
information to all organization operation including business activity. (Alter, 1996)

Chapter III
METHODOLOGY
Research Design
This study uses a descriptive research design which focused on the
generation and printing of identification cards. This designed system gives the
campus an easy access to the ID card records.
Tools and Materials
Hardware Requirements

1 set of Computer

PVC Card Printer

Signature Tablet

HD Webcamera

Software Requirements

Windows 7 Operating System

Microsoft Visual Basic 6.0/ Microsoft Access 2008

Adobe Photoshop CS6

Students Basic Information

Supplies

PVC Card

ID Laces

Sultan Kudarat State University, Kalamansig Campus Manual Generation of Iden

RESEARCH FLOW PROCESS

GATHERING OF DATA
Conducting interview, observation and acquire other requirement for the study.
ANALYSIS
Analyzing data gathered and problems met for possible solution.
DESIGN
Designing the program/system flow, the system interface, as well as the flow of the system t
DEVELOPMENT OF THE STUDY
Developing the system.
EVALUATION
Evaluating the functionality and efficiency of the program/system and the hardware
IMPLEMENTATION
The program / system is ready to use.

Sultan Kudarat State University, Kalamansig Campus Automated Identification Card G

Figure 1. Conceptual Framework

Research Flow Process


Gathering of Data
Data is gathered through interview; observation and securing other
requirements as well as data and information regarding the generation of
identification card of Sultan Kudarat State University, Kalamansig Campus.
Related studies on the proposed system is also gathered through books and
reliable websites.
Analysis
After the data is gathered, it shows that the manual procedure of ID card
generation in the said campus, leads to delay of printing and releasing of ID to
the students.
Design
The interface of the system will be designed, as well as how the
transaction will flow upon the implementation. The ID card will also be layout.
Development of the study
After the design is complete, the system will be created and developed
using Visual Basic 6.0. Some of the designs in the ID card will be edited in the
Adobe Photoshop then will be layout in the system. Connection of the printer and
the signature tablet will also be built.
Evaluation
This phase includes the dry run of the program to ensure that the system
and hardware are ready to be used and to avoid the system malfunctioning
during implementation. Errors occurred will then be fixed. System interface,
functionality, accuracy and security will be evaluated by selected respondents.

Implementation
After the conduct of the evaluation, comments, suggestions and
recommendations of the evaluators will be assessed. After the evaluation,
program/system will then be recommended for implementation.

Table 1
Gantt Chart
The Gantt Chart show the whole duration of the study by the researcher in
developing the Automated Identification Card Generating System of Sultan
Kudarat State University, Kalamansig Campus from the month of 2nd week of
June to 2nd week of October 2016.

SDLC Phases
Gathering of Data
Analysis
Design
Development
Evaluation
Implementation

SCHEDULE OF ACTIVITIES GANTT CHART


June
July
August
September
2 3 4 1 2 3 4 1 2 3 4 1 2 3 4

Oct
1 2

Table 2
Budgetary Requirement
Quantity
1

Unit
Set

Specification
Computer

Expenditure

Monitor: Samsung 16 LED


HDD: Seagate Barracuda 1000GB
Memory: Kingston 4GB DDR3
Motherboard:H61M-S2-B3
Processor: Intel Core i5
Keyboard: A4Tech USB Keyboard
Mouse: A4Tech USB Mouse
UPS: Smart UPS 15 Minutes
AVR: Logic 500 Watts
1
1
1

Set
Set
Set

5
Pcs
Sub Total
Contingency (10%)
Overall Total

Operating System: MS Windows 7 Ultimate


PVC Card Printer with 250 PVC card
Signature Tablet
HD Webcamera
Microsoft Visual Basic 6.0 installation
Adobe Photoshop CS6 installation
ID Laces

30, 000.00
20, 000.00
9, 000.00
3, 000.00
500.00
500.00
350.00
60, 350.00
6, 035.00
66, 385.00

Literature Cited
Richard Dybowski (2012). The ClassLectures. IT project. September-October.
London: School Of technology and Management
Fowler, Daniell C. and Swatman, Paula M.C.,(2009), "Issues Affecting the
Implementation of Multiple Application Smart Card Systems." University of
Baltimore United States of America: s.n.
Ramasamy, R. R. and Prabakar, M.A. (2009): Digital signature scheme with
message recovery using knapsack-based ECC, International Journal of
Network Security, Vol. 12 No. 1, pp. 15-20.
Roja, P. P. and Avadhani, P.S. (2007): Digital signature development using
truncated polynomials, International Journal of Computer Science and
Network Securityvol. 7 No.7.
DAgostini, Sara N. (2009). Voter Identification Laws: The Past, The Present,
and the Unpredictable Future. University of Detroit Mercy Law Review
(Spring): 579-602.
Jostens,
Inc.
(2013).
School
Yearbooks.
http://www.jostens.com/yearbooks/ybk_lp_main.html

Retrieved

from:

Kodak, Inc. (2013). History of Kodak: Milestones- chronology 1960-1979.


Retrieved
from:
http://www.kodak.com/ek/US/en/Our_Company/History_of_Kodak/Milesto
nes_-_chronology/1960-1979.html

Receipt

ID Issuance Report

Students
ID card Data
Students

Student

Figure 2. Context Diagram

Automated Identificat

Students Data
STUDENT

Students Info
D1 Profile

Record Students Info

Students ID card

Students Info

Generate Students ID card

ID Issuance Report
IN-CHARGE

Students Info

Update Students Record

Figure 3. Data Flow Diagram

Potrebbero piacerti anche